Journal Article |
The Metaverse and Terrorism: Threats and Challenges
View Abstract
The metaverse is currently the leading hype in the digital world because of its seemingly infinite potential and possibilities. Large corporations are drawn to the metaverse because it appears as the cutting edge of digital and technological developments. The metaverse is presented by communication technology companies as the next Internet, a leap towards a universe of boundless, interconnected virtual communities. However, there are many potential risks and challenges that the metaverse raises, including technical, legal, security, business, tax, privacy, security, and users’ well-being and safety (among many others). Cyber-savvy terrorists have been highly resourceful in adapting and applying online platforms and have taken advantage of every new development, platform, and application. Based on their past record, it is reasonable to assume that the metaverse is a new dimension that terrorists and violent extremists are poised to study, examine, and possibly utilise. This research note explores some potential uses of the metaverse by terrorists and suggests preemptive measures to minimise the risks of them doing so. If the advancement of the metaverse or similar developments is inevitable, we should consider risks and abuses and think more carefully about them when moving forward.
|
2023 |
Weimann, G. and Dimant, R. |
View
Publisher
|
Journal Article |
The Not-So-Silent “Majority”: An Automated Content Analysis of Anti-Government Online Communities
View Abstract
The United States is facing an ongoing threat of political violence due to widespread anti-government sentiment that has proliferated across social media platforms. Most saliently, these violent sentiments manifested in the January 6, 2021, attack on the US Capitol during the certification of the 2020 general election. This research extends prior work on the online mobilisation to offline violence by analysing the text of online discussions leading up to the January 6 attack. We focus this examination on two central questions. First, what are the key themes and topics discussed within and across two social media platforms? Second, how did these themes and topics change over time? Focusing on two far-right anti-government online communities, we explore how support for political violence, disinformation, and electoral outcomes emerge and change over time. Our findings provide insight into possible strategies to counteract misinformation and the temporal trajectory of escalating violent sentiment within and across online communities. Further, this study highlights the importance of collecting data prospectively and demonstrates the value of automated content analysis and text data in understanding anti-government extremist sentiments.
|
2023 |
Leap, B. and Becker, M.H. |
View
Publisher
|
Journal Article |
Google and Corporate Social Responsibility: YouTube in the Service of Terrorism
View Abstract
This article is concerned with the boundaries of freedom of expression on the Internet and, more specifically, with manifestations of terrorism on YouTube. The article opens with two definitions of terrorism. Section II discusses various responsibilities that businesses have: economic, legal, moral, social and discretionary. Section III addresses the concept of Corporate Social Responsibility (CSR). Unfortunately, not all companies adhere to the principles of Corporate Social Responsibility. Therefore, ethical standards should be anchored in appropriate laws and enforced by responsible governments. Section IV clarifies that incitement to violence is in the focus of attention. The philosophy of John Stuart Mill is instrumental in explaining the difference between advocacy (or preaching) and incitement (or instigation). Sections V and VI examine the influences of Anwar al-Awlaki, the American-Muslim jihadi preacher, and of Anjem Choudary, the British-Muslim jihadi preacher, on their followers. The words of al-Awlaki and of Choudary instigated many of the terrorist activities that the West had seen in recent years. There are direct links between their incitement and extreme violent incidents. Both of them were able to spread their instigation to terror on platforms provided by Google and specifically its subsidiary YouTube. Finally, Section VII probes YouTube and CSR. It is argued that the Internet is international in character, but it cannot be abused to override law. There is not one law for people and another for the Internet. It is further argued that power without responsibility is dangerous and corrosive.
|
2022 |
Cohen-Almagor, R. |
View
Publisher
|
Journal Article |
The Contagion and Copycat Effect in Transnational Far-right Terrorism: An Analysis of Language Evidence
View Abstract
This article corroborates the continued threat of extreme right terrorism by exemplifying textually interconnected links across linguistic evidence composed prior to or during attacks in the United States, New Zealand, Germany, Norway and Sweden. A qualitative content analysis of targeted violence manifestos and live-streams, attack announcements on online platforms, and writings on equipment (e.g., firearms) used during the incidents reveals an emerging illicit genre set that is increasingly consolidated in form and function. The messages accentuate an intricate far-right online ecosystem that empowers copycats and escorts them on their pathway to violence. A definition for targeted violence live-streams is proposed and operational applications are discussed.
|
2022 |
Kupper, J., Christensen, T.K., Wing, D., Hurt, M., Schumacher, M. and Meloy, R. |
View
Publisher
|
Journal Article |
Policy vs reality: comparing the policies of social media sites and users’ experiences, in the context of exposure to extremist content
View Abstract
Social media platforms have become a prominent feature in modern-day communication, allowing users to express opinion and communicate with friends and likeminded individuals. However, with this revolutionary form of communication comes risks of exploitation and utilisation of these platforms for potentially illegal and harmful means. This article aims to explore the community guidelines and policies of prominent social media sites regarding extremist material, comparing the platform’s policies with the user experiences. To measure social media user experience and user exposure to extremist material, this article pilots the use of a new scale: The Online Extremism Exposure Scale (OECE), which measures both the user’s exposure to extremist communication and hate speech online. Users reported varied levels of exposure to both hate speech and extremist communication, with. the results indicating that users in the sample are being exposed to extremist material approximately 48.44% of the time they spend on social media daily. The results of this pilot study highlight potential failings by prominent social media platforms in their efforts to reduce users being exposed to extremist material. Limitations, future research, and implications are discussed in detail.
|
2023 |
Williams, T.J.V., Tzani, C., Gavin, H. and Ioannou, M. |
View
Publisher
|
|
An exploratory analysis of leakage warning behavior in lone-actor terrorists
View Abstract
Leakage is one of the eight warning behaviors referred to in the violence risk and threat assessment literature. Previous research has highlighted the relevance and prevalence of leakage in lone-actor terrorists; however, a more detailed understanding of this phenomenon is lacking. This study sets out to expand our knowledge of this behavior by conducting an exploratory analysis using court records relating to IS-inspired lone-actor terrorism cases in the United States. The general patterns in leakage warning behavior were analyzed, and different types of leakage were examined with regard to from whom they were leaked, how they were leaked, their presence online, and whether or not they occurred before certain types of attacks more than others. It was found that leakage in the form of support tended to be leaked most frequently to members of the public, via written text and online, whilst the leakage of intent and specifics appeared to be more regularly leaked to co-conspirators and through verbal communication that avoided the online world. Significant relationships were also found between leakage, FBI interaction and attack initiation, but no significant relationship was found between leakage and mental health. The implications of these findings are discussed.
|
2023 |
Rose, M.M. and Morrison, J. |
View
Publisher
|