Journal Article |
The Viral Mediation of Terror: ISIS, Image, Implosion
View Abstract
Operations involving the capture, processing, and transmission of terrorist events, campaigns, or images produce effects well beyond the representational/informational functions of media. This article examines several unspoken effects involved in the mediation of terrorism. We analyze the extent to which several mechanisms and operations of western media may be complicit in, if not fundamental to, the global production and administration of terror, particularly at the level of its image and what we call virality. We theorize the ways in which media not only “mediate” terror, but also function to regulate and/or administer it and, in particular, to exacerbate, amplify, and proliferate images and activities of Islamic State in Iraq and Syria (ISIS) across global networks of digital exchange. We argue that key to understanding the strategies and circulating effects of ISIS’s media involvement is the tendency of viral media operations to overproduce, overextend, and oversaturate. The condition of oversaturation denotes a hyperactive global media circuitry that is collapsing under its own weight. This condition reflects a strategic tendency of terror, which underlies all mediatic processing of images deployed by ISIS. It also reveals a vulnerability for terrorist strategy to exacerbate and exhaust the hyperactivity of media, and thus to accelerate the implosive collapse of the globally networked system. We theorize how implicit and unintended effects or outputs of the mediatic processing of terrorist meanings, images, and discourses may work to overstimulate the global system to the point of its reversal, exhaustion, or implosion.
|
2018 |
Artrip, R.E. |
View
Publisher
|
Policy |
The Use of the Internet for Terrorist Purposes
View Abstract
Terrorism, in all its manifestations, affects us all. The use of the Internet to further terrorist purposes disregards national borders, amplifying the potential impact on victims. By highlighting cases and best practices that respond to this unique challenge, the present publication has two aims: first, to promote a better understanding of the ways in which communications technologies may be misused in furtherance of acts of terrorism and, second, to increase collaboration among Member States, so that effective criminal justice responses to this transnational challenge can be developed.
|
2012 |
United Nations Office on Drugs and Crime (UNODC) |
View
Publisher
|
Chapter |
The Use of the Internet and the Internet of Things in Modern Terrorism and Violent Extremism
View Abstract
This chapter will examine the role of the Internet and associated technology such as the Internet of Things (IoT) and cloud computing (CC) in the process of radicalisation to terrorism and violent extremism. Particular emphasis will be placed upon the role of online environments in facilitating communication and the spread of extremist ideology, as opposed to operational and strategic recruiting functions of the Internet. Before assessing the debate, this chapter shall define two key concepts, radicalisation and violent extremism. Firstly, the chapter will provide an assessment of academic literature that has perpetuated a false offline and online dichotomy. Then, the chapter will demonstrate the new communicative role of technology within violent extremist movements since the emergence of Web 2.0. Following this, Sageman’s (Leaderless Jihad: Terror networks in the twenty-first century, University of Pennsylvania Press, 2008) ‘bunch of guys’ bottom-up framework will be employed to understand how the process of radicalisation can be facilitated and amplified by the digital age, referring to the concepts of moral outrage, othering, virtual communities and echo chambers. Lastly, contemporary literature that considers the interplay between online and offline domains will be explored.
|
2022 |
Sullivan, A. and Montasari, R. |
View
Publisher
|
Report |
The Use of Social Media by United States Extremists
View Abstract
Emerging communication technologies, and social media platforms in particular, play an increasingly important role
in the radicalization and mobilization processes of violent and non-violent extremists (Archetti, 2015; Cohen et al.,
2014; Farwell, 2014; Klausen, 2015). However, the extent to which extremists utilize social media, and whether it
influences terrorist outcomes, is still not well understood (Conway, 2017). This research brief expands the current
knowledge base by leveraging newly collected data on the social media activities of 479 extremists in the PIRUS
dataset who radicalized between 2005 and 2016.
1 This includes descriptive analyses of the frequency of social
media usage among U.S. extremists, the types of social media platforms used, the differences in the rates of social
media use by ideology and group membership, the purposes of social media use, and the impact of social media on
foreign fighter travel and domestic terrorism plots.
|
2018 |
Jensen M., James P., LaFree G., Safer-Lichtenstein A. and Yates E. |
View
Publisher
|
Report |
The Use of Social Media by Terrorist Fundraisers and Financiers
View Abstract
Financiers and fundraisers for al-Qaida and Islamic State (ISIS) are active
users of popular social media platforms, such as Facebook, Twitter,
YouTube and Instagram, in some cases even after being placed on a
United Nations or US government sanctions list. Terrorist financiers
and fundraisers have utilized social media to attract and direct funding
to procure weapons, pay salaries, strengthen infrastructure and operate
civil and social services. While the amount of funding raised via social
media is far less in comparison to revenues from oil sales or taxation,
al-Qaida and ISIS fundraisers have taken credit for millions of dollars
raised using social media-based campaigns—significant amounts by
any standard.
Terrorist financiers and fundraisers for al-Qaida and ISIS have relied on
social media services to communicate with colleagues and supporters,
attract new followers globally, and promote aligned causes and
organizations. With their potential to spur viral content growth, social
media services enable fundraisers to more quickly and effectively solicit
support and reach larger audiences.
Social media companies have actively terminated the accounts of
terrorist facilitators—including a number of designated terrorist
fundraisers and financiers—citing violations of their respective terms
of service restrictions that prohibit support for violence or hate speech
[see pg.12]. For example, in early February 2016 Twitter announced the
closure of more than 125,000 accounts “for threatening or promoting
terrorist acts, primarily related to ISIS,” noting that social media platforms
are “forced to make challenging judgment calls based on very limited
information and guidance.”1 Facebook has also stepped up its efforts
to remove users who back terror groups, and YouTube has taken down
content and terminated users who post terrorist material.2
|
2016 |
The Camstoll Group |
View
Publisher
|
Chapter |
The Use of Counter Narratives to Combat Violent Extremism Online
View Abstract
Due to recent rises in extremism across the globe (Dean et al. in J Polic Intell Count Terror 11:121–142, 2016; Le Roux in Responding to the rise in violent extremism in the Sahel. Africa Center For Strategic Studies, 2019, p. 26) and (Jones in Int Secur 32:7–40, 2008), governments and law enforcement organisations, such as the police, have looked to new strategies to counter violent extremism (Russell and Theodosiou in Counter-extremism: a decade on from 7/7. Quilliam Foundation, 2015). Specifically, there has been an expanse of the field now widely known as Countering Violent Extremism (CVE). CVE is a highly contested area; however, upon conducting a literature review, Inserra (Revisiting efforts to counter violent extremism: leadership needed. The Heritage Foundation, 2015, p. 2) helpfully reduced the term CVE down to descriptions of interventions intended to “stop individuals from radicalizing”. LaFree and Freilich (Annu Rev Criminol 2:383–404, 2019) distinguish counter-terrorism from CVE, they describe counter-terrorism as military responses (‘hard’) as opposed to non-military responses (‘soft’), referred to as countering violent extremism strategies. This chapter contends that, although counter narratives tend to lack academic standing, there does appear to be a widespread acceptance that narratives influence individuals’ beliefs. Therefore, in the absence of other more effective methods of CVE online, it is argued that counter-narratives (CN) should be used in informed ways by organisations such as the police (Monaghan in Crime Media Cult 18(1):21–39, 2020). This chapter will compare academic understandings of narrative and communication alongside examples of counter narratives issued against them. It will then assess the impact of such strategies and potential alternatives for CN.
|
2023 |
Rees, J. and Montasari, R. |
View
Publisher
|