Book |
Gaming and Extremism: The Radicalization of Digital Playgrounds
View Abstract
Charting the increase in the use of games for the dissemination of extremist propaganda, radicalization, recruitment, and mobilization, this book examines the “gamification of extremism.” Editors Linda Schlegel and Rachel Kowert bring together a range of insights from world-leading experts in the field to provide the first comprehensive overview of gaming and extremism. The potential nexus between gaming and extremism has become a key area of concern for researchers, policymakers, and practitioners seeking to prevent and counter radicalization and this book offers insights into key trends and debates, future directions, and potential prevention efforts. This includes the exploration of how games and game adjacent spaces, such as Discord, Twitch, Steam, and DLive, are being leveraged by extremists for the purposes of radicalization, recruitment, and mobilization. Additionally, the book presents the latest counterterrorism techniques, surveys promising preventing/countering violent extremism (P/CVE) measures currently being utilized in the gaming sphere, and examines the ongoing challenges, controversies, and current gaps in knowledge in the field. This text will be of interest to students and scholars of gaming and gaming culture, as well as an essential resource for researchers and practitioners working in prevention and counter-extremism, professionals working at gaming-related tech companies, and policymakers.
|
2024 |
Schlegel, L. and Kowert, R. |
View
Publisher
|
Journal Article |
Testing a probabilistic model of desistance from online posting in a right-wing extremist forum: distinguishing between violent and non-violent users
View Abstract
Little is known about online behaviours of violent extremists generally or differences compared to non-violent extremists who share ideological beliefs. Even less is known about desistance from posting behaviour. A sample of 99 violent and non-violent right-wing extremists to compare their online patterns of desistance within a sub-forum of the largest white supremacy web-forum was analysed. A probabilistic model of desistance was tested to determine the validity of criteria set for users reaching posting desistance. Findings indicated that the criteria predicted “true” desistance, with 5% misidentification. Each consecutive month without posting in the sub-forum resulted in a 7.6% increase in odds of posting desistance. There were no significant differences in effects for violent versus non-violent users, though statistical power was low.
|
2024 |
Wojciechowski, T.W., Scrivens, R., Freilich, J.D., Chermak, S.M. and Frank, R. |
View
Publisher
|
Report |
30 Years of Trends in Terrorist and Extremist Games
View Abstract
Violent extremist, terrorist, and targeted hate actors have been actively exploiting video games to propagandise, recruit and fundraise for more than 30 years. This report presents an analysis of that history using a unique dataset, the Extremist and Terrorist Games Database (ETGD), developed by the authors. It contains 155 reviewed entries of standalone games, modifications for existing games (mods) and browser‑based games dating from 1982 to 2024.
The titles analysed appear across the ideological spectrum: far right (101 titles), jihadist (24), far left (1) and other forms of extremism and targeted hate (29), including school‑massacre ideation (12). They span platforms ranging from simple standalone games for Atari in the 1980s to sophisticated mods for some of today’s most popular games. The number of titles has increased year on year – in line with global conflict and extremist ideological trends, and revealing a continued push by malicious actors to exploit gaming.
Far from being a comprehensive analysis of the ETGD, we intend this preliminary launch report to form a basis for future research of the dataset and a framework for continued contributions to the ETGD from Extremism and Gaming Research Network (EGRN) members. Above all, we seek to contribute to sensible policymaking to prevent violent extremism that situates games as part of a wider contested and exploited information space, which deserves far more attention from those working towards peaceful ends.
|
2024 |
Thompson, E. and Lamphere-Englund, G. |
View
Publisher
|
Journal Article |
Grounds for Cooperation in the Radicalisation Governance Milieu? A Qualitative Exploration of Stakeholder Issue Frames of Online Radicalisation
View Abstract
In the study of online radicalisation, little attention has been paid to the way local stakeholders within the broader online radicalisation milieu define, frame, and problematise online radicalisation. As these conceptions and problematisations are crucial to the possibility of cooperation and coordination between them, this lacuna represents a curious oversight. Drawing on a cross-national and highly diverse sample of stakeholders, including law enforcement actors, religious and community leaders, policy-makers and activists, and scientific experts, we inductively identify four largely shared ‘issue frames’. We conceptualise issue frames as ways of organising knowledge and meaning, and as crucial to the way problems – in this case online radicalisation – come to be defined, constructed, and contested by various social actors. Uncovering four shared issue frames, we show how stakeholders commonly 1) highlight the tension between individual and social understanding of radicalisation; 2) reflect on the national embeddedness of radicalisation discourse; 3) comment on the complex politics of online radicalisation monitoring; and 4) warn against the mysteries inherent in algorithmic surveillance and control. Demonstrating that these specific issue frames are largely shared between a highly diverse group of stakeholders, we emphasise the need for cooperation and coordination between these actor groups.
|
2024 |
van Oorschot, I., Touburg, G., Strelkov, A. and Jacobs, G. |
View
Publisher
|
Journal Article |
Dark web jihad: exploring the militant Islamist information ecosystem on The Onion Router
View Abstract
This paper maps communication channels exploited by the Salafi-jihadist violent extremist organisations (VEOs) and their followers between March 2020 and June 2022 on The Onion Router (TOR). It argues that the true scale of digital jihadist presence on TOR has remained insignificant for years. Militant Islamists have mostly used .onion domains as backup propaganda dissemination channels, which enable content takedown policies introduced by countering violent extremism stakeholders to be circumvented. Aside from propaganda distribution, TOR attracts Salafi-jihadist VEOs and their followers for other reasons, as it facilitates anonymous communication, crowdfunding, sharing of terrorist manuals or the organisation of terrorist attacks.
|
2023 |
Lakomy, M. |
View
Publisher
|
Report |
Exploiting Chaos: How Malicious Non-State Actors Are Using COVID-19 to Their Advantage in Cyberspace
View Abstract
Since the beginning of 2020, while societies and economies around the world have struggled to cope with the realities of the COVID-19 pandemic, cyberspace has given governments, businesses, and general end-users the ability to work, play, and connect in new and innovative ways. With everything from workspaces and classrooms to family gatherings and exercise routines forced online, the Internet has enabled people across the globe to carry on and maintain a sense of normalcy during very abnormal times. However, at the same time, while the world has been focused on the health, economic, political, and social ramifications of the pandemic, terrorist organizations, fringe groups, and extremist communities around the world have become emboldened, finding opportunity to exploit the situation, incite hate, (re)mobilize, and promote their ideologies online in novel ways. These groups—which we loosely classify as malicious nonstate actors for the purposes of this research —have been primarily focused on exploiting and contributing to the diffusion of information during the pandemic for their own strategic gain.
|
2023 |
Babb, C.E. and Wilner, A. |
View
Publisher
|