Book |
Islamic State’s Online Activity And Responses
View Abstract
‘Islamic State’s Online Activity and Responses’ provides a unique examination of Islamic State’s online activity at the peak of its “golden age” between 2014 and 2017 and evaluates some of the principal responses to this phenomenon. Featuring contributions from experts across a range of disciplines, the volume examines a variety of aspects of IS’s online activity, including their strategic objectives, the content and nature of their magazines and videos, and their online targeting of females and depiction of children. It also details and analyses responses to IS’s online activity – from content moderation and account suspensions to informal counter-messaging and disrupting terrorist financing – and explores the possible impact of technological developments, such as decentralised and peer-to-peer networks, going forward. Platforms discussed include dedicated jihadi forums, major social media sites such as Facebook, Twitter, and YouTube, and newer services, including Twister.
‘Islamic State’s Online Activity and Responses’ is essential reading for researchers, students, policymakers, and all those interested in the contemporary challenges posed by online terrorist propaganda and radicalisation. The chapters were originally published as a special issue of Studies in Conflict & Terrorism.
|
2019 |
Conway, M. and Macdonald, S. |
View
Publisher
|
Journal Article |
Regulating terrorist content on social media: automation and the rule of law
View Abstract
Social-media companies make extensive use of artificial intelligence in their efforts to remove and block terrorist content from their platforms. This paper begins by arguing that, since such efforts amount to an attempt to channel human conduct, they should be regarded as a form of regulation that is subject to rule-of-law principles. The paper then discusses three sets of rule-of-law issues. The first set concerns enforceability. Here, the paper highlights the displacement effects that have resulted from the automated removal and blocking of terrorist content and argues that regard must be had to the whole social-media ecology, as well as to jihadist groups other than the so-called Islamic State and other forms of violent extremism. Since rule by law is only a necessary, and not a sufficient, condition for compliance with rule-of-law values, the paper then goes on to examine two further sets of issues: the clarity with which social-media companies define terrorist content and the adequacy of the processes by which a user may appeal against an account suspension or the blocking or removal of content. The paper concludes by identifying a range of research questions that emerge from the discussion and that together form a promising and timely research agenda to which legal scholarship has much to contribute.
|
2019 |
Macdonald, S., Correia, S.G. and Watkin, A.L. |
View
Publisher
|
Report |
Who Dissemnates Rumiyah? Examining the Relative Influence of Sympathiser and Non-Sympathiser Twitter Users
View Abstract
This paper was presented at the 2nd European Counter Terrorism Centre (ECTC) Advisory Group conference, 17-18 April 2018, at Europol Headquarters, The Hague. The views expressed are the authors’ own and do not necessarily represent those of Europol.
In a speech delivered at the United Nations General Assembly in September 2017, the U.K. Prime Minister Theresa May called on social media companies to do more to remove and block terrorist content from their platforms [1]. In the speech she stated that the average lifespan of online propaganda from the so-called Islamic State (IS) was 36 hours. For such content to be disrupted effectively, she claimed that this figure needed to be reduced to one to two hours. This has since come to be known as the ‘golden window’: if terrorist material can be detected and removed within one to two hours, its spread will be prevented.
|
2018 |
Grinnell D., Macdonald S., Mair D. & Lorenzo-Dus N. |
View
Publisher
|
Journal Article |
The Response of, and on, Twitter to the Release of Dabiq Issue 15
View Abstract
The so-called Islamic State (IS) has a sophisticated media strategy (Winter 2017), an important part of which has been its English-language online magazine Dabiq. Launched in July 2014, a total of fifteen issues of Dabiq in the two years that followed. These issues were disseminated in a variety of ways, including archive sites (Bodo and Speckhard 2017), web forums and file-sharing networks (Gambhir 2016), the dark web (Stacey 2017), and even via an attempt to sell the freely available magazines for profit through the online retailer Amazon (Masi 2015). One of the most important forums for dissemination, however, was the social media platform Twitter (Bodo and Speckhard 2017; Gambhir 2016; Cunningham, Everton and Schroeder 2015; Shaheen 2015). Released in July 2016, the theme of Dabiq issue 15 was ‘Break the Cross’. After referring to a number of attacks that had occurred in the preceding weeks, the issue’s foreword called on ‘pagan Christians’, ‘liberalist secularists’ and ‘sceptical atheists’ to ‘recognize their Creator and submit to Him’. In addition to regular features, including ‘Among the believers are men’ and ‘In the words of the enemy’ (which, in this issue’ focussed on Pope Francis), and advertisements for other IS media, issue 15 contained an 18 page feature article, also titled ‘Break the Cross’. Arguing that the Bible does not display the three hallmarks of a true divine text, the article discusses the doctrine of the Trinity, whether Jesus was crucified, and whether Paul’s New Testament teachings are authentic (repeatedly stating that Paul was a known liar). It then seeks to establish the authenticity of the Prophet Muhammad, before asking Christians rhetorically: ‘O People of the Scripture, follow the truth from your Lord, whom you claim to love. Would you follow your parents and ancestors if you knew they were walking into a fire?’ and concluding ‘Know well that our fight will continue until you are defeated and submit to the rule of your Creator, or until we achieve martyrdom. Allah has made our mission to wage war against disbelief until it ceases to exist, as he has ordered us to kill all pagans wherever they are found’. Drawing on an original dataset, in this article we examine the response to the release of Dabiq issue 15 on Twitter. We examine the response in two respects: first, the response from Twitter itself, in terms of suspension activity; and, second, the response from other users, in terms of their engagement with posts disseminating the new issue. Before presenting our findings, we begin by offering an overview of our methodology.
|
2017 |
Grinnell, D., Macdonald, S., and Mair, D. |
View
Publisher
|
Book |
Terrorists’ Use of the Internet
View Abstract
Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a selection of papers delivered at the NATO Advanced Research Workshop (ARW) on ‘Terrorists’ Use of the Internet’ held in Dublin, Ireland in June 2016. One aim of the workshop was to nurture dialogue between members of the academic, policy and practitioner communities, so the 60 delegates from 13 countries who attended the workshop included representatives from each of these. The participants encompassed a wide range of expertise (including engineering, computer science, law, criminology, political science, international relations, history, and linguistics) and the chapters contained herein reflect these diverse professional and disciplinary backgrounds. The workshop also aimed to address the convergence of threats. Following an introduction which provides an overview of the various ways in which terrorists use the Internet, the book’s remaining 25 chapters are grouped into 5 sections on cyber terrorism and critical infrastructure protection; cyber-enabled terrorist financing; jihadi online propaganda; online counterterrorism; and innovative approaches and responses. The book will be of interest to all those who need to maintain an awareness of the ways in which terrorists use the Internet and require an insight into how the threats posed by this use can be countered.
|
2017 |
Conway, M., Jarvis, L., Lehane, O., Macdonald, S. and Nouri, L. |
View
Publisher
|
Journal |
Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization
View Abstract
The Internet is a transformative technology that terrorists are exploiting for the spread of propaganda and radicalizing new recruits. While al-Qaeda has a longer history, Islamic State is conducting a modern and sophisticated media campaign centered around online social networking. This article introduces and contextualizes the contributions to this Special Issue by examining some of the ways in which terrorists make use of the Internet as part of their broader media strategies.
|
2016 |
Aly, A., Macdonald, S., Jarvis, L. and Chen, T. |
View
Publisher
|