Journal Article |
Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts
View Abstract
This article contributes to public and policy debates on the value of social media disruption activity with respect to terrorist material. In particular, it explores aggressive account and content takedown, with the aim of accurately measuring this activity and its impacts. The major emphasis of the analysis is the so-called Islamic State (IS) and disruption of their online activity, but a catchall “Other Jihadi” category is also utilized for comparison purposes. Our findings challenge the notion that Twitter remains a conducive space for pro-IS accounts and communities to flourish. However, not all jihadists on Twitter are subject to the same high levels of disruption as IS, and we show that there is differential disruption taking place. IS’s and other jihadists’ online activity was never solely restricted to Twitter; it is just one node in a wider jihadist social media ecology. This is described and some preliminary analysis of disruption trends in this area supplied too.
|
2018 |
Conway, M., Khawaja, M., Lakhani, S., Reffin, J., Robertson, A., & Weir, D. |
View
Publisher
|
Journal Article |
A Snapshot of the Syrian Jihadi Online Ecology: Differential Disruption, Community Strength, and Preferred Other Platforms
View Abstract
This article contributes to the growing literature on extremist and terrorist online ecologies and approaches to snapshotting these. It opens by measuring Twitter’s differential disruption of so-called “Islamic State” versus other jihadi parties to the Syria conflict, showing that while Twitter became increasingly inhospitable to IS in 2017 and 2018, Hay’at Tahrir al-Sham and Ahrar al-Sham retained strong communities on the platform during the same period. An analysis of the same groups’ Twitter out-linking activity has the twofold purpose of determining the reach of groups’ content by quantifying the number of platforms it was available on and analyzing the nature and functionalities of the online spaces out-linked to.
|
2021 |
Conway, M., Khawaja, M., Lakhani, S. and Reffin, J. |
View
Publisher
|
Book |
Terrorists’ Use of the Internet
View Abstract
Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a selection of papers delivered at the NATO Advanced Research Workshop (ARW) on ‘Terrorists’ Use of the Internet’ held in Dublin, Ireland in June 2016. One aim of the workshop was to nurture dialogue between members of the academic, policy and practitioner communities, so the 60 delegates from 13 countries who attended the workshop included representatives from each of these. The participants encompassed a wide range of expertise (including engineering, computer science, law, criminology, political science, international relations, history, and linguistics) and the chapters contained herein reflect these diverse professional and disciplinary backgrounds. The workshop also aimed to address the convergence of threats. Following an introduction which provides an overview of the various ways in which terrorists use the Internet, the book’s remaining 25 chapters are grouped into 5 sections on cyber terrorism and critical infrastructure protection; cyber-enabled terrorist financing; jihadi online propaganda; online counterterrorism; and innovative approaches and responses. The book will be of interest to all those who need to maintain an awareness of the ways in which terrorists use the Internet and require an insight into how the threats posed by this use can be countered.
|
2017 |
Conway, M., Jarvis, L., Lehane, O., Macdonald, S. and Nouri, L. |
View
Publisher
|
VOX-Pol Publication |
Future Trends: Live-streaming Terrorist Attacks
View Abstract
Magnanville, 13 June, 2016, around 8pm: policeman, Jean-Baptiste Salvaing has been stabbed to death outside his home. Forcing his way into the house, the attacker murders Jessica Schneider, who also worked for the police, by cutting her throat. The couple’s three year-old son is taken hostage by the killer, Larossi Abballa. Prior to a three hour stand-off with police negotiators, Aballa turns to social media to broadcast and justify his actions, dedicating them to his ‘Emir’ Abu Bakr Al-Baghdadi (Hume et al 2016). It is the first time a terrorist has used a live-streaming service in the midst of an attack. It is unlikely to be the last.
|
2016 |
Conway, M., and Dillon, J. |
View
Publisher
|
Journal Article |
Jihadi Video and Auto-Radicalisation: Evidence From an Exploratory YouTube Study
View Abstract
Large amounts of jihadi video content on YouTube along with the vast array of relational data that can be gathered opens up innovative avenues for exploration of the support base for political violence. This exploratory study analyses the online supporters of jihad-promoting video content on YouTube, focusing on those posting and commenting upon martyr-promoting material from Iraq. Findings suggest that a majority are under 35 years of age and resident outside the region of the Middle East and North Africa (MENA) with the largest percentage of supporters located in the United States. Evidence to support the potential for online radicalisation is presented. Findings relating to newly formed virtual relationships involving a YouTube user with no apparent prior links to jihadists are discussed.
|
2008 |
Conway, M. and McInerney, L. |
View
Publisher
|
Journal |
What’s Love Got To Do With It? Framing ‘JihadJane’ in the US Press
View Abstract
The purpose of this article is to compare and contrast the US press coverage accorded to female terrorist plotter, Colleen LaRose, with that of two male terrorist plotters in order to test whether assertions in the academic literature regarding media treatment of women terrorists stand up to empirical scrutiny. The authors employed TextSTAT software to generate frequency counts of all words contained in 150 newspaper reports on their three subjects and then slotted relevant terms into categories fitting the commonest female terrorist frames, as identified by Nacos’s article in Studies in Conflict and Terrorism (2005). The authors’ findings confirm that women involved in terrorism receive significantly more press coverage and are framed vastly differently in the US press than their male counterparts.
|
2012 |
Conway, M. and McInerney, L. |
View
Publisher
|