MA Thesis |
Jihad in the Global Village: Al-Qaeda’s Digital Radicalization and Recruitment Campaign
View Abstract
Following America’s “War on Terror,” al-Qaeda and its affiliates became highly decentralized in terms of organizational and media operations. Though mass media outlets continue to play a significant role in drawing attention to al-Qaeda’s transnational campaign, Salafi Jihadists have recently begun to rely on new media for purposes of legitimization and promotion. The Internet serves as a suitable platform for these groups’ media objectives since it is inherently anonymous and absent of censorship. Most importantly, the Internet facilitates al-Qaeda in reaching a global audience, which is made evident by the growing amount of Salafi Jihadist media that is translated or created for English speakers. The latter change may seem paradoxical to the groups’ anti-Western sentiment, but it underscores an important shift in al-Qaeda’s recruitment strategies. The proliferation of English content promoting the Salafi Jihadist cause may imply that al- Qaeda is shifting its attention towards the Muslim diaspora in the West with the intent to recruit, radicalize, and promote acts of terror.
This study analyzed a variety of online publications that were disseminated by al- Qaeda and similar Salafi Jihadist groups. The sample included speech and video transcripts, digital magazines, and articles that were analyzed for the intent to radicalize readers through the employment of Albert Bandura’s eight mechanisms of moral disengagement. The analysis provided substantial support for the latter claim, indicating that many of the digital publications disseminated by Salafi Jihadist groups are intended to both radicalize and recruit readers through the promotion of moral disengagement.
|
2014 |
Cannata, K. |
View
Publisher
|
Journal Article |
Online Social Media in the Syria Conflict: Encompassing the Extremes and the In-Betweens
View Abstract
The Syria conflict has been described as the most socially mediated in history, with online social media playing a particularly important role. At the same time, the everchanging landscape of the conflict leads to difficulties in applying analytical approaches taken by other studies of online political activism. Therefore, in this paper, we use an approach that does not require strong prior assumptions or the proposal of an advance hypothesis to analyze Twitter and YouTube activity of a range of protagonists to the conflict, in an attempt to reveal additional insights into the relationships between them. By means of a network representation that combines multiple data views, we uncover communities of accounts falling into four categories that broadly reflect the situation on the ground in Syria. A detailed analysis of selected communities within the antiregime categories is provided, focusing on their central actors, preferred online platforms, and activity surrounding “real world” events. Our findings indicate that social media activity in Syria is considerably more convoluted than reported in many other studies of online political activism, suggesting that alternative analytical approaches can play an important role in this type of scenario.
|
2014 |
O’Callaghan, D., Prucha, N., Greene, D., Conway, M., Carthy, J. and Cunningham, P. |
View
Publisher
|
Report |
Iraq Information Controls Update: Analyzing Internet Filtering and Mobile Apps
View Abstract
We have examined two mobile applications that have received significant attention in
coverage of the Iraq insurgency. The first, FireChat, is a U.S.-developed mobile messaging platform that
facilitates off-the-grid messaging; features which make it ideal in situations where Internet access is restricted,
and that has resulted in growing user numbers in Iraq. However, it is crucial that as applications such as
FireChat become more popular in dangerous environments like Iraq, that users are informed about the security
features and limitations of using such tools. The second application, Dawn of Glad Tidings, is an Android app
developed by ISIS that has been reported to broadcast messages using the Twitter accounts of users who
install the application.
|
2014 |
Dalek, J., Senft, A., Winter, P., and Dranka A. |
View
Publisher
|
Journal Article |
Down the (White) Rabbit Hole: The Extreme Right and Online Recommender Systems
View Abstract
In addition to hosting user-generated video content, YouTube provides recommendation services, where sets of related and recommended videos are presented to users, based on factors such as co-visitation count and prior viewing history. This article is specifically concerned with extreme right (ER) video content, portions of which contravene hate laws and are thus illegal in certain countries, which are recommended by YouTube to some users. We develop a categorization of this content based on various schema found in a selection of academic literature on the ER, which is then used to demonstrate the political articulations of YouTube’s recommender system, particularly the narrowing of the range of content to which users are exposed and the potential impacts of this. For this purpose, we use two data sets of English and German language ER YouTube channels, along with channels suggested by YouTube’s related video service. A process is observable whereby users accessing an ER YouTube video are likely to be recommended further ER content, leading to immersion in an ideological bubble in just a few short clicks. The evidence presented in this article supports a shift of the almost exclusive focus on users as content creators and protagonists in extremist cyberspaces to also consider online platform providers as important actors in these same spaces.
|
2014 |
O’Callaghan D., Greene D., Conway M., Carthy J. and Cunningham P. |
View
Publisher
|
Report |
Report of the Special Rapporteur on contemporary forms of racism, racial discrimination, xenophobia and related intolerance
View Abstract
The unprecedented, rapid development of new communication and information technologies, such as the Internet and social media, has enabled wider dissemination of racist and xenophobic content that incites racial hatred and violence. In response, States, international and regional organizations, civil society and the private sector have undertaken a variety of legal and policy initiatives. In the present report, the Special Rapporteur examines the context, key trends and the manifestations of racism on the Internet and social media, and provides an overview of the legal and policy frameworks and the measures taken at international, regional and national levels, as well as some of the regulatory norms adopted by Internet and social network providers. He presents examples of measures taken to respond to the use of the Internet and social media to propagate racism, hatred, xenophobia and related intolerance, while highlighting the overall positive contribution of the Internet and social media as an effective tool for combating racism, discrimination, xenophobia and related intolerance.
|
2014 |
United Nations Human Rights Council |
View
Publisher
|
PhD Thesis |
CLC – Cyberterrorism Life Cycle Model
View Abstract
The rise of technology has brought with it many benefits but also the potential for great dangers. In particular, Information Communication Technology (ICT) is involved in many facets of life-influencing systems, which range from power plants to airports. Terrorists are now realising the great possibilities of interfering with critical infrastructure. Remote access, reduced costs, automation, replication, speed, direct effect, varied targets and anonymity are all benefits that make attacking computers and networks in cyberspace an attractive solution. ICT could thus serve as a powerful instrument to advance political and ideological viewpoints. The ICT landscape now faces an emerging threat in the form of cyberterrorists. However, it is important not to incorrectly perceive ordinary cyber attacks as cyberterrorism. Cyberterrorism is different from cybercrime in that is has differing motives, attack goals, techniques and intended effects. The motivation for cyberterrorism largely stems from political and ideological views (religious, social activism, retributional). Cyber attacks are mainly driven by financial theft, fraud or espionage, whereas cyberterrorism aims to create publicity for a cause and leave a high impact. In this study, a Cyberterrorism Life Cycle (CLC) Model is developed in order to demonstrate the various factors that lead to the establishment and growth of cyberterrorism. The model depicts the various strategic and technical issues that are relevant to the field. Overall, this model aims to structure the dynamic interaction of the behavioural and technological factors that influence the development of cyberterrorism. Throughout the research, various factors that are influential to cyberterrorism are investigated. The research follows a systematic approach of revealing various underlying issues and thereafter compiling the holistic CLC model to depict these critical issues. Part 1 introduces cyberterrorism and provides the background to the field by discussing incidents and example groups. Initially, the concept of cyberterrorism is explored and the proposed definition tested. Part 2 looks at investigating cyberterrorism more deeply. A conceptual framework is presented that introduces the most pertinent factors in the field of cyberterrorism. Next, the traditional and innovative use of the Internet to carry out and support terrorism is explored. Then, the study addresses the determination of additional social factors using Partial Least Squares Path Modelling. In Part 3, the field of cyberterrorism is more intensely studied. Cyberterrorism is mapped to the Observe-Orient- Decide-Act (OODA) loop, which will form the basis of the CLC model. Thereafter, the most influential concepts essential to the field of cyberterrorism are applied in order to classify attacks as cyberterrorism using ontologies. Furthermore, in Part 3, countermeasures are discussed to look at ways to combat cyberterrorism. Part 4 forms the crux of the research. The CLC model is presented as a structured representation of the various influential factors relevant to cyberterrorism. Thereafter, the CLC model is simulated to show the field more dynamically. Overall, the CLC model presented in this study aims to show the interaction of the various strategic, behavioural and technical issues. The CLC model can help elucidate the reasons for attraction into extremist groups and how attacks are carried out.
|
2014 |
Veerasamy, N. |
View
Publisher
|