Journal Article |
Terrorism as Process Narratives: A Study of Pre-Arrest Media Usage and the Emergence of Pathways to Engagement
View Abstract
Terrorism is a highly irregular form of crime where multiple factors combine to create circumstances that are unique to each case of involvement, or attempted involvement, in terrorist violence. Yet, there are commonalities in the way in which efforts to become involved unfold as processes, reflected as sequential developments where different forces combine to create conditions where individuals seek to plan acts of violence. The best way to frame this involvement is through analytical approaches that highlight these procedural dimensions but are equally sensitive to the nuances of each case. Analysing pre-arrest media usage of convicted terrorists, this paper focuses on the ways in which belief pathways and operational pathways interact in five distinct cases of terrorist involvement in the UK in what are termed ‘process narratives’.
|
2017 |
Holbrooke, D., and Taylor, M. |
View
Publisher
|
Journal |
A Critical Analysis of the Role of the Internet in the Preparation and Planning of Acts of Terrorism
View Abstract
ABSTRACT- The purpose of this paper is to offer a critical assessment of the way in which the internet and online material features as part of the process individuals embark on to plan acts of terrorism. The paper begins by evaluating concepts used to describe the role of the internet in the context of terrorism and political violence before analysing a single case study in detail in order to explore particular nuances that emerge which shed light on the relationship between perpetrator on the one hand and online content and behaviour on the other. The case study, in turn, is developed into a conceptual appraisal of terrorist use of the internet. The paper concludes by exploring the important distinction between the “theoretical” application of online learning as set out in terrorist propaganda and the hurdles that individuals face in practice.
|
2015 |
Holbrook, D. |
View
Publisher
|
Journal Article |
From solidarity to blame game: A computational approach to comparing far-right and general public Twitter discourse in the aftermath of the Hanau terror attack
View Abstract
Terror attacks are followed by public shock and disorientation. Previous research has found that people use social media to collectively negotiate responses, interpretations, and sense-making in the aftermath of terror attacks. However, the role of ideologically motivated discussions and their relevance to the overall discourse have not been studied. This paper ad-dresses this gap and focuses specifically on the far-right discourse, comparing it to the general public Twitter discourse following the terror attack in Hanau in 2020. A multi-method ap-proach combines network analysis and structural topic modelling to analyse 237,000 tweets. We find responsibility attribution to be one of the central themes: The general discourse pri-marily voiced sympathy with the victims and attributed responsibility for the attack to far-right terror or activism. In contrast, the far right – in an attempt to reshape the general narra-tive – raised a plethora of arguments to shift the attribution of responsibility from far-right activism towards the (political) elite and the personal circumstances of the shooter. In terms of information sharing and seeking, we demonstrate that new information was contextualised differentially depending on the ideological stance. The results are situated in the scientific dis-course concerning differences in social media communication ensuing terrorist attacks.
|
2022 |
Hohner, J., Schulze, H., Greipl, S. and Rieger, D. |
View
Publisher
|
Video |
Web as Weapon Internet as a Tool for Violent Radicalization and Homegrown Terrorism ( Part 2 of 2 )
View Abstract
Web as Weapon: Internet as a Tool for Violent Radicalization and Homegrown Terrorism (Part 2 of 2) Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. WITNESSES: Dr. Bruce Hoffman, Professor, Georgetown University; Ms. Rita Katz, Director, SITE Institute; Ms. Parry Aftab, Internet Attorney; Mr. Mark Weitzman, Director, Task Force Against Hate, Simon Wiesenthal Center. Video provided by U.S. House of Representatives. Discussion held on 071106. Originally uploaded by House.Resource.Org on 14 November 2011
|
2014 |
Hoffman, B. |
View
Publisher
|
Video |
Web as Weapon Internet as a Tool for Violent Radicalization and Homegrown Terrorism (Part 1 of 2)
View Abstract
Web as Weapon: Internet as a Tool for Violent Radicalization and Homegrown Terrorism (Part 1 of 2) Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment. WITNESSES: Dr. Bruce Hoffman, Professor, Georgetown University; Ms. Rita Katz, Director, SITE Institute; Ms. Parry Aftab, Internet Attorney; Mr. Mark Weitzman, Director, Task Force Against Hate, Simon Wiesenthal Center. Video provided by U.S. House of Representatives. Discussion held on 071106. Originally uploaded by House.Resource.Org on 14 November 2011
|
2014 |
Hoffman, B. |
View
Publisher
|
Journal Article |
A Longitudinal Measurement Study of 4chan’s Politically Incorrect Forum and its Effect on the Web
View Abstract
Although it has been a part of the dark underbelly of the Internet since its inception, recent events have brought the discussion board site 4chan to the forefront of the world’s collective mind. In particular, /pol/, 4chan’s “Politically Incorrect” board has become a central figure in the outlandish 2016 Presidential election. Even though 4chan has long been viewed as the “final boss of the Internet,” it remains relatively unstudied in the academic literature. In this paper we analyze /pol/ along several axes using a dataset of over 8M posts. We first perform a general characterization that reveals how active posters are, as well as how some unique features of 4chan affect the flow of discussion. We then analyze the content posted to /pol/ with a focus on determining topics of interest and types of media shared, as well as the usage of hate speech and differences in poster demographics. We additionally provide quantitative evidence of /pol/’s collective attacks on other social media platforms. We perform a quantitative case study of /pol/’s attempt to poison anti-trolling machine learning technology by altering the
language of hate on social media. Then, via analysis of comments from the 10s of thousands of YouTube videos linked on /pol/, we provide a mechanism for detecting attacks from /pol/ threads on 3rd party social media services.
|
2016 |
Hine, G.E., Onaolapo, J., De Cristofaro, E., Kourtellis, N., Leontadis, I., Samaras, R., Stringhini, G. and Blackburn, J. |
View
Publisher
|