Journal Article |
An Intelligence Reserve Corps to Counter Terrorist Use of the Internet
View Abstract
“Never before in history have terrorists had such easy access to the minds and eyeballs of
millions,” declared one journalistic account of the Islamic State’s propaganda machine and
proficient use of Twitter, Facebook, bots, and other modern means of getting its message out.
Such views that the group’s “mastery of modern digital tools” has transformed terrorism
are commonplace and, though usually presented breathlessly, contain some basic truths.1
Successful terrorist groups are good communicators and they employ the technology of
their times. Fighting terrorism today thus requires fighting terrorism on the Internet and
otherwise countering the use of advanced communications technologies. President Trump
himself stressed this in a tweet after a 2017 terrorist attack in London: “Loser terrorists must
be dealt with in a much tougher manner. The internet is their main recruitment tool which
we must cut off & use better!”2 Terrorists are only one dangerous actor on the Internet—and
the one this paper focuses on—but other dangers ranging from hostile state intelligence
services to criminal groups are also lurking. The above journalist’s quote could also apply to
Russian disinformation, sophisticated criminal phishing attempts, and other malicious uses
of the Internet.
This paper proceeds as follows. First, it examines some of the ways in which terrorist groups
use the Internet, focusing on the Islamic State in particular, and the limits and problems
they have had. Second, it looks at several of the historical problems the US government
has had in stopping this use and at the general issues that are likely to plague future efforts
regarding terrorist use of new technologies. Finally, the paper details some of the parameters
of an Intelligence Reserve Corps, describing its benefits and its limits.
|
2018 |
Byman, D. |
View
Publisher
|
Journal Article |
An influencer-based approach to understanding radical right viral tweets
View Abstract
Radical right influencers routinely use social media to spread highly divisive, disruptive and anti-democratic messages. Assessing and countering the challenge that such content poses is crucial for ensuring that online spaces remain open, safe and accessible. Previous work has paid little attention to understanding factors associated with radical right content that goes viral. We investigate this issue with a new dataset (ROT) which provides insight into the content, engagement and followership of a set of 35 radical right influencers. It includes over 50,000 original entries and over 40 million retweets, quotes, replies and mentions. We use a multilevel model to measure engagement with tweets, which are nested in each influencer. We show that it is crucial to account for the influencer-level structure, and find evidence of the importance of both influencer- and content-level factors, including the number of followers each influencer has, the type of content (original posts, quotes and replies), the length and toxicity of content, and whether influencers request retweets. We make ROT available for other researchers to use.
|
2021 |
Sprejer, L., Margetts, H., Oliveira, K., O'Sullivan, D. and Vidgen, B. |
View
Publisher
|
Journal |
An Exploratory, Dynamic Application of Social Network Analysis for Modelling the Development of Islamist Terror‐Cells in the West
View Abstract
The present paper represents an exploratory, dynamic and qualitative application of Social Network Analysis (SNA) for modelling the development of Islamist terror cells in the West. Two well‐known case studies are systematically re‐examined using this methodology as a supporting framework for interpreting the sequence of group development from a social psychological perspective. By drawing attention to salient features of evolving network structures, insight is gained into group functioning and underlying social–psychological mechanisms of radicalisation. This article represents a starting point for giving greater methodological and theoretical recognition to the dynamic structural properties of Islamist terrorist groups in the West. It is intended to stimulate discussion and ideas for future, more rigorous research.
|
2010 |
Mullins, S. and Dolnik, A. |
View
Publisher
|
|
An exploratory analysis of leakage warning behavior in lone-actor terrorists
View Abstract
Leakage is one of the eight warning behaviors referred to in the violence risk and threat assessment literature. Previous research has highlighted the relevance and prevalence of leakage in lone-actor terrorists; however, a more detailed understanding of this phenomenon is lacking. This study sets out to expand our knowledge of this behavior by conducting an exploratory analysis using court records relating to IS-inspired lone-actor terrorism cases in the United States. The general patterns in leakage warning behavior were analyzed, and different types of leakage were examined with regard to from whom they were leaked, how they were leaked, their presence online, and whether or not they occurred before certain types of attacks more than others. It was found that leakage in the form of support tended to be leaked most frequently to members of the public, via written text and online, whilst the leakage of intent and specifics appeared to be more regularly leaked to co-conspirators and through verbal communication that avoided the online world. Significant relationships were also found between leakage, FBI interaction and attack initiation, but no significant relationship was found between leakage and mental health. The implications of these findings are discussed.
|
2023 |
Rose, M.M. and Morrison, J. |
View
Publisher
|
Journal Article |
An Explorative Study into the Importance of Defining and Classifying Cyber Terrorism in the United Kingdom
View Abstract
Terrorism, crime, and war are all familiar notions; however, the way in which these have been altered through cyberspace is not yet fully, nor unanimously, understood through definitions, theories, and approaches. Although the threat level of terrorism in the UK has lowered to moderate, the threat posed by cyber terrorism has nonetheless heightened throughout the COVID pandemic due to the greater necessity and presence of technology in our lives. This research aimed to highlight the necessity for a unanimous cyber terrorism definition and framework and further aimed to determine what perceptions are held by the general public regarding cyber terrorism through a mixed methods approach. The literature review confirms that there is an absence of a unanimously agreed upon definition of cyber terrorism, and furthermore that the existing academic definitions are not compatible with UK legislation. In addition, the literature review highlights an absence of a cyber terrorism framework that classifies what kind of terrorist activity is cyber enabled or cyber dependent. Quantitative data from the online survey find a couple of significant effects implying the necessity for greater diversity amongst stakeholders which could potentially enhance the detection and prevention of terrorism in the UK. The qualitative data find that although there is some agreement amongst the sample population in views held towards cyber terrorism, some misconceptions are nonetheless present which could have implications on the general public’s ability to identify and report cyber terrorist activity. Overall, the findings from the literature review and the primary data collection aid in developing a cyber terrorism definition that is compatible with UK legislative definitions, and further aids in developing a terrorist activity framework that succinctly highlights the inextricable links between traditional, cyber enabled, and cyber-dependent terrorism.
|
2021 |
Jangada Correia, V. |
View
Publisher
|
Journal Article |
An Exploration of the Involuntary Celibate (Incel) Subculture Online
View Abstract
Incels, a portmanteau of the term involuntary celibates, operate in online communities to discuss difficulties in attaining sexual relationships. Past reports have found that multiple elements of the incel culture are misogynistic and favorable towards violence. Further, several violent incidents have been linked to this community, which suggests that incel communities may resemble other ideologically motivated extremist groups. The current study employed an inductive qualitative analysis of over 8,000 posts made in two online incel communities to identify the norms, values, and beliefs of these groups from a subcultural perspective. Analyses found that the incel community was structured around five interrelated normative orders: the sexual market, women as naturally evil, legitimizing masculinity, male oppression, and violence. The implications of this analysis for our understanding of extremism and the role of the internet in radicalization to violence are considered in depth.
|
2020 |
Liggett O’Malley, R. and Holt, K.M. |
View
Publisher
|