Report |
Right-Wing Extremists’ Persistent Online Presence: History and Contemporary Trends
View Abstract
This policy brief traces how Western right-wing extremists have exploited the power of the internet from early dial-up bulletin board systems to contemporary social media and messaging apps. It demonstrates how the extreme right has been quick to adopt a variety of emerging online tools, not only to connect with the like-minded, but to radicalise some audiences while intimidating others, and ultimately to recruit new members, some of whom have engaged in hate crimes and/or terrorism. Highlighted throughout is the fast pace of change of both the internet and its associated platforms and technologies, on the one hand, and the extreme right, on the other, as well as how these have interacted and evolved over time. Underlined too is the persistence, despite these changes, of rightwing extremists’ online presence, which poses challenges for effectively responding to this activity moving forward.
|
2019 |
Conway, M., Scrivens, R. and Macnair, L. |
View
Publisher
|
Journal Article |
Branding the Islamic State of Iraq and Syria
View Abstract
This article will explore three crucial parameters that have been taken into consideration to attract millennials towards the Islamic State or Islamic State of Iraq and Syria (ISIS) brand: the first parameter is story creation around the historical significance of Islamic prophecies justifying the ISIS brand. Second is the symbolisms attached to the ISIS brand and its relevance (a flag, a leader, a logo, a caliphate) and, third, the actions or the sense of attachment to the ISIS brand in the form of practising ideology, gaining recognition and appeal to the millennials. The promotion of the brand has been advanced through diverse means – social media platforms, mainstream media organizations, YouTube videos, all orchestrated to gain recognition of a rising state brand on the one end and a brand of fear and intimidation on the other.
|
2019 |
Bandopadhyaya, S. |
View
Publisher
|
Journal Article |
Intersections of ISIS media leader loss and media campaign strategy A visual framing analysis
View Abstract
The decision to target leaders of groups like ISIS to hamper their effectiveness has served as a longstanding principle of counterterrorism efforts. Yet, previous research suggests that any results may simply be temporary. Using insights from confiscated ISIS documents from Afghanistan to define the media leader roles that qualified for each level of the cascade, CTC (Combating Terrorism Center) records to identify media leaders who died, and a content analysis of all ISIS images displayed in the group’s Arabic weekly newsletter to identify the group’s visual framing strategies, this study assesses whether and how leader loss helps explain changes in the level and nature of the group’s visual output over time. ISIS’s quantity of output and visual framing strategies displayed significant changes before, during, and after media leader losses. The level of the killed leader within the group’s organizational hierarchy also corresponded to different changes in ISIS’s media framing.
|
2019 |
Winkler, C., El-Damanhoury, K., Saleh, Z., Hendry, J. and El-Karhili, N. |
View
Publisher
|
Journal Article |
Reviewing the Role of the Internet in Radicalization Processes
View Abstract
This review presents the existing research on the role of the Internet in radicalization processes. Using a systematic literature search strategy, our paper yields 88 studies on the role of the Internet in a) right-wing extremism and b) radical jihadism. Available studies display a predominant interest in the characteristics of radical websites and a remarkable absence of a user-centred perspective. They show that extremist groups make use of the Internet to spread right wing or jihadist ideologies, connect like-minded others in echo chambers and cloaked websites, and address particularly marginalized individuals of a society, with specific strategies for recruitment. Existing studies have thus far not sufficiently examined the users of available sites, nor have they studied the causal mechanisms that unfold at the intersection between the Internet and its users. The present review suggests avenues for future research, drawing on media and violence research and research on social identity and deindividuation effects in computer-mediated communication.
|
2019 |
Odağa, Ö., Leiserb, A. and Boehnkec, K. |
View
Publisher
|
Journal Article |
“You Know What to Do”: Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks
View Abstract
Video sharing platforms like YouTube are increasingly targeted by aggression and hate attacks. Prior work has shown how these attacks often take place as a result of “raids,” i.e., organized efforts by ad-hoc mobs coordinating from third-party communities. Despite the increasing relevance of this phenomenon, however, online services often lack effective countermeasures to mitigate it. Unlike well-studied problems like spam and phishing, coordinated aggressive behavior both targets and is perpetrated by humans, making defense mechanisms that look for automated activity unsuitable. Therefore, the de-facto solution is to reactively rely on user reports and human moderation. In this paper, we propose an automated solution to identify YouTube videos that are likely to be targeted by coordinated harassers from fringe communities like 4chan. First, we characterize and model YouTube videos along several axes (metadata, audio transcripts, thumbnails) based on a ground truth dataset of videos that were targeted by raids. Then, we use an ensemble of classifiers to determine the likelihood that a video will be raided with very good results (AUC up to 94%). Overall, our work provides an important first step towards deploying proactive systems to detect and mitigate coordinated hate attacks on platforms like YouTube.
|
2019 |
Mariconti, E., Suarez-Tangil, G., Blackburn, J., de Cristofaro, E., Kourtellis, N., Leontiadis, I., Serrano, J.L. and Stringhini, G. |
View
Publisher
|
Book |
Islamic State’s Online Activity And Responses
View Abstract
‘Islamic State’s Online Activity and Responses’ provides a unique examination of Islamic State’s online activity at the peak of its “golden age” between 2014 and 2017 and evaluates some of the principal responses to this phenomenon. Featuring contributions from experts across a range of disciplines, the volume examines a variety of aspects of IS’s online activity, including their strategic objectives, the content and nature of their magazines and videos, and their online targeting of females and depiction of children. It also details and analyses responses to IS’s online activity – from content moderation and account suspensions to informal counter-messaging and disrupting terrorist financing – and explores the possible impact of technological developments, such as decentralised and peer-to-peer networks, going forward. Platforms discussed include dedicated jihadi forums, major social media sites such as Facebook, Twitter, and YouTube, and newer services, including Twister.
‘Islamic State’s Online Activity and Responses’ is essential reading for researchers, students, policymakers, and all those interested in the contemporary challenges posed by online terrorist propaganda and radicalisation. The chapters were originally published as a special issue of Studies in Conflict & Terrorism.
|
2019 |
Conway, M. and Macdonald, S. |
View
Publisher
|