Report |
Mapping right-wing extremism in Victoria: Applying a gender lens to develop prevention and deradicalisation approaches
View Abstract
This project aims to map right-wing extremism in Victoria through the lens of gender. It begins from the premise that there is an underexplored connection between antifeminist sentiment and far-right extremist sentiment. It does this by focusing on select Victorian-based online groups that have an anti-feminist and far-right profile. The project also works with stakeholders who work in the areas of gender and family violence, to gain insight into their practices and experiences.
|
2020 |
Agius, C., Cook, K., Nicholas, L., Ahmed, A., bin Jehangir, H., Safa, N., Hardwick,
T. and Clark, S. |
View
Publisher
|
Report |
Mapping Networks and Narratives of Online Right-Wing Extremists in New South Wales
View Abstract
The project Mapping Networks and Narratives of Online Right-Wing Extremists in New South Wales (NSW) used the systematic mining and analysis of online data to generate evidence-based insights into online right-wing extremism (RWE) across the state. The project was conducted between July 2019 and February 2020 with data collection occurring from August to November 2019. The project addressed three key areas:
– What is the nature of the online RWE environment in NSW?
– How are themes and narratives framed in different online contexts in order to mobilise support?
– What level of risk does the online RWE environment pose?
The research areas were framed as broad questions to facilitate wide exploratory research into the online RWE movement in NSW, a milieu that has been little studied. This breadth of scope was considered pertinent in the wake of the March 2019 mass casualty terrorist attack in Christchurch, New Zealand, by an attacker originating from NSW.
|
2020 |
Ballsun-Stanton, B., Waldek, L., Droogan, J., Smith, D., Iqbal, M. and Puecker, M. |
View
Publisher
|
Journal Article |
Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events
View Abstract
This study explores the internal dynamics and networks of terrorist groups in cyberspace—in particular, Al-Qaeda and the Islamic State of Iraq and al-Sham (ISIS). Using a “Global Cyberterrorism Dataset” that features data on cyberterror attacks between 2011 and 2016, this research analyzes these two terrorist groups through the lens of a cyber-conflict theory that integrates conflict theory with Jaishankar’s space transition theory. Through a network analysis methodology, we examine the invisible relationships and connections between the national origins and target countries of cyberterror attacks. The analysis focuses on the networks of national origins of terrorists and victims, network structures of Al-Qaeda and ISIS actors, and clustering networks of Al-Qaeda and ISIS cyberterrorists. Results indicate that terror in cyberspace is ubiquitous, more flexible than traditional terrorism, and that cyberattacks mostly occurred within the countries of origin. We conclude by discussing the complex features of cyberterror networks and identify some of the geostrategic implications of the divergent cyber strategies adopted by Al-Qaeda and ISIS.
|
2021 |
Lee, C.S., Choi, K.S., Shandler, R. and Kayser, C., |
View
Publisher
|
Report |
Mapping Extremist Communities: A Social Network Analysis Approach
View Abstract
In the domain of computer science, the last years have witnessed the improvement of social network analysis at scale. One of the most challenging aspects of social network analysis is community detection; analysts use a variety of tools to visualise the spontaneous group structure emerging from interactions and friendship relations in multi-million-user networks. This visualisation, combined with influencer detection and automated text analysis tools such as topic detection, enables the analyst to grasp most of the complexity of a social network. This computer-science-oriented study explores three lines of research concerning online extremism. First, about the emerging narratives and the topics that can be found on open platforms. We show that many actors actively use terror-group related terms; most cannot be directly tied to any specific organisation. A second axis concerns the connections between platforms: the information space has no central point as content is shared across platforms. However, the links reveal clusters of locations: we observe a group of Pakistan-India conflict mentions, and a cluster of US alt-right websites, transforming terrorism into a migration problem. The third axis relates to the social media landscape structure. We rely on a combination of document-level topic modelling and graph analysis to detect and explore the social data, visualising the types of groups that are active on the topic. Among the results, we found a small botnet circulating a pro-Daesh pamphlet and a set of grassroot reactions that managed to moderate a controversial pro-Jihadi post on Reddit.
|
2020 |
NATO Strategic Communications Centre of Excellence |
View
Publisher
|
PhD Thesis |
Mapping Extremism: The Network Politics Of The Far-Right
View Abstract
In recent decades, political parties espousing extreme nationalist, xenophobic, and even outright racist platforms have enjoyed variable success in national elections across Europe. While vibrant research literature has sought to better understand the sources of support for such parties, remarkably little attention has been paid to the interplay between parties and the broader social networks of extremism in which they are embedded. To remedy this deficiency, the present study examines the relations between far-right parliamentary parties and their extra-parliamentary networks. One level of analysis tests whether there is a relationship between a party’s position within a network and its sustainability. Social network analysis is employed to assess the nature and structure of ties between Belgian organizations online. In addition, systematic textual analysis of website content is used to determine how a party ideological position within the network impacts its sustainability. The second level of analysis is a qualitative study based on in-depth interviews with members of the Flemish nationalist organization in order to better understand how actors experience social networks. Evidence suggests that the most sustainable parties are those that have dense connections with other nationalist organizations. Mapping relations between far-right parties that compete openly within the rules of institutionalized democracy and their wider social networks can provide important policy-relevant insight into contemporary challenges posed by illiberal forces.
|
2016 |
Jones, S. |
View
Publisher
|
Journal Article |
Many Faced Hate: A Cross Platform Study of Content Framing and Information Sharing by Online Hate Groups
View Abstract
Hate groups are increasingly using multiple social media platforms to promote extremist ideologies. Yet we know little about their communication practices across platforms. How do hate groups (or “in-groups”), frame their hateful agenda against the targeted group or the “out-group?” How do they share information? Utilizing “framing” theory from social movement research and analyzing domains in the shared links, we juxtapose the Facebook and Twitter communication of 72 Southern Poverty Law Center (SPLC) designated hate groups spanning five hate ideologies. Our findings show that hate groups use Twitter for educating the audience about problems with the out-group, maintaining positive self-image by emphasizing in-group’s high social status, and for demanding policy changes to negatively affect the out-group. On Facebook, they use fear appeals, call for active participation in group events (membership requests), all while portraying themselves as being oppressed by the out-group and failed by the system. Our study unravels the ecosystem of cross-platform communication by hate groups, suggesting that they use Facebook for group radicalization and recruitment, while Twitter for reaching a diverse follower base.
|
2020 |
Phadke, S, and Mitra, T. |
View
Publisher
|