Report |
Spiders of the Caliphate: Mapping the Islamic State’s Global Support Network on Facebook
View Abstract
This report analyzes the strength of the Islamic State’s (IS) network on Facebook using online network measurement tools and uncovers the myriad of ways in which IS operates on Facebook. To do so, we mapped the accounts and connections between 1,000 IS-supporting Facebook profiles with links to 96 countries on every continent except Antarctica using the open-source network analysis and visualization software, Gephi. It should be noted, however, that hundreds of additional pro-IS profiles were excluded from the dataset. This is because while we were able to identify the IS supporting Facebook accounts, there was no information on those users’ locations. Therefore, this data represents only a portion of IS’s support network on the platform. Our analysis of online IS communities globally, regionally, and nationally suggests that IS’s online networks, in particular on Facebook, are growing and can be utilized to plan and direct terror attacks as well as mobilize foreign fighters for multiple areas of insurgency. Secondly, IS’s presence on Facebook is pervasive and professionalized, contrary to the tech company’s rhetoric and efforts to convince the public, policymakers, and corporate advertisers from believing otherwise. Our findings illustrate that IS has developed a structured and deliberate strategy of
using Facebook to radicalize, recruit, support, and terrorize individuals around the world. According to our observations, it appears that IS utilizes a limited number of central players who work to magnify the group’s presence on the platform, and also works to strengthen its networks so that no one individual IS Facebook account (node) serves as an irreplaceable connection (edge) to other pro-IS accounts located elsewhere.
|
2018 |
Waters, G. and Postings, R. |
View
Publisher
|
Journal Article |
Building social capital to counter polarization and extremism? A comparative analysis of tech platforms’ official blog posts
View Abstract
This research employs the concept of social capital to compare the efforts that a range of tech companies have claimed to take to counter polarization and extremism and build resilience on their platforms. The dataset on which our analysis is based is made-up of a purposive sample of official blog posts from three ‘older’ (i.e., Facebook, Twitter, YouTube) and three ‘newer’ (i.e., TikTok, Discord, and Telegram) technology platforms. The selected posts focused on companies’ efforts to make their platform safer, build community resilience, counter violent extremism and/or polarization, or mentioned related topics such as countering hate organizations, radicalization, or misinformation. Revealed were seven themes incorporating, to a greater or lesser extent, the three main types of social capital (i.e., bonding, bridging and linking). These themes were granting user powers, strengthening existing communities, provision of information and education, building community, enhancing user rights, keeping users safe, and building trust and relationships with users. Analysis of these showed that while creation of all three types of social capital was apparent, similar to previous studies, bridging capital dominated here too; while there were some discrepancies between social capital generating activities and their framings on ‘older’ versus ‘newer’ platforms, other factors, including platform size and company values are likely to be equally or more important; and, finally, that companies attempts at generating online social capital can have negative as well as positive impacts with regard to countering polarization and extremism.
|
2022 |
Watkin, A. and Conway, M. |
View
Publisher
|
Journal Article |
“The Lions Of Tomorrow”: A News Value Analysis Of Child Images In Jihadi Magazines
View Abstract
This article reports and discusses the results of a study that investigated photographic images of children in five online terrorist magazines to understand the roles of children in these groups. The analysis encompasses issues of Inspire, Dabiq, Jihad Recollections (JR), Azan, and Gaidi Mtanni (GM) from 2009 to 2016. The total number of images was ninety-four. A news value framework was applied that systematically investigated what values the images held that resulted in them being “newsworthy” enough to be published. This article discusses the key findings, which were that Dabiq distinguished different roles for boys and girls, portrayed fierce and prestigious boy child perpetrators, and children flourishing under the caliphate; Inspire and Azan focused on portraying children as victims of Western-backed warfare; GM portrayed children supporting the cause peacefully; and JR contained no re-occurring findings.
|
2018 |
Watkin, A. and Looney, S. |
View
Publisher
|
Journal Article |
Introduction: Exploring societal resilience to online polarization and extremism
View Abstract
The seven articles in this special issue were selected from those delivered at a series of workshops undertaken by the European Commission H2020-funded Building Resilience Against Violent Extremism (BRaVE) Project in 2020–2021. Understanding polarization and (violent) extremism as distinct, interlinked, phenomena, the collected articles ask how online platforms can be mobilised to disrupt and reframe ideologies underpinning polarising and extremist messaging. To what extent can social media platforms serve as critical resources that contribute to building pro-social resilience? And, how can we build on what has been effective so far in terms of building online resilience, including what else might social media platforms and their users do to enhance what has already been found to be effective?
|
2022 |
Watkin, A., Gerrand, V. and Conway, M. |
View
Publisher
|
Statement |
Personal Statement from James Watkins to Committee on Homeland Security 8chan Inquiry
View Abstract
Chairman Thompson and Members of the Committee: Today, James Watkins appears for a congressional deposition addressing your Committee’s concern over social media companies’ efforts to address online extremist content. We have prepared this statement in an effort to assist the Committee in understanding how careful and responsible a platform 8chan is. While Mr. Watkins is empathetic to the victims of mass shootings in America, 8chan has never tolerated illegal speech and has a consistent track record of working with law enforcement agencies when appropriate. After the current disruption of service, 8chan has taken steps to improve its ability to identify illegal content and to act more quickly in doing so. To these ends, it hopes to be of continued assistance to law enforcement officers in times of need. Mindful of tragedies America has faced, Mr. Watkins also believes in the exceptional promise of the First Amendment. 8chan is the only platform featuring a full commitment to free speech—a one-of-a-kind discussion board where anonymous users shared tactics about French democracy protests, how to circumvent censorship in repressive countries, and the best way to beat a classic video game. In this hodgepodge of chaotic discussion, down-home recipes are traded, sorrows lifted, and a small minority of users post hateful and ignorant items. As Justice Hugo Black once noted, the “First Amendment provides the only kind of security system that can preserve a free government – one that leaves the way wide open for people to favor, discuss, advocate, or incite causes and doctrines however obnoxious and antagonistic such views may be to the rest of us.” It is with this in mind that Mr. Watkins is proud to host the only platform compatible with the First Amendment.
|
2019 |
Watkins, J. |
View
Publisher
|
MA Thesis |
New Zealand Government And Critical Infrastructure Ready Reaction To Cyber Terrorism
View Abstract
The purpose of this research is to obtain input from government agencies, elements of the critical infrastructure and cyber space, to determine what level of knowledge on cyber terrorism exists. Furthermore, are there ready reaction plans in place, and is staff-awareness training conducted on a regular basis? This probably won’t prevent or stop an attack of cyber terrorism, and like any other disaster in the IT world, if contingency planning exists, recovery can be quicker and greater mitigation of costs.
Interview questions were distributed to New Zealand government departments and elements that make up the critical infrastructure, to obtain an insight into the current situation. From this and other comparisons, inferences have been drawn to determine that if some of the groups were targeted would the fact that they could be deficient in knowledge on cyber terrorism, make the effect more intense and longer lasting. It has also provided the state of knowledge, the level of planning and the general readiness that currently exists.
In view of these findings recommendations have been made that will ensure there is consistency across all organisations, both government and nongovernment. All organisations, including the government, are reliant on the critical infrastructure and the internet for both operational and domestic survival. It is therefore pertinent that agencies give some consideration to these findings.
|
2008 |
Watt, A. C. |
View
Publisher
|