Book |
Terrorists’ Use of the Internet
View Abstract
Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a selection of papers delivered at the NATO Advanced Research Workshop (ARW) on ‘Terrorists’ Use of the Internet’ held in Dublin, Ireland in June 2016. One aim of the workshop was to nurture dialogue between members of the academic, policy and practitioner communities, so the 60 delegates from 13 countries who attended the workshop included representatives from each of these. The participants encompassed a wide range of expertise (including engineering, computer science, law, criminology, political science, international relations, history, and linguistics) and the chapters contained herein reflect these diverse professional and disciplinary backgrounds. The workshop also aimed to address the convergence of threats. Following an introduction which provides an overview of the various ways in which terrorists use the Internet, the book’s remaining 25 chapters are grouped into 5 sections on cyber terrorism and critical infrastructure protection; cyber-enabled terrorist financing; jihadi online propaganda; online counterterrorism; and innovative approaches and responses. The book will be of interest to all those who need to maintain an awareness of the ways in which terrorists use the Internet and require an insight into how the threats posed by this use can be countered.
|
2017 |
Conway, M., Jarvis, L., Lehane, O., Macdonald, S. and Nouri, L. |
View
Publisher
|
Journal Article |
Down the (White) Rabbit Hole: The Extreme Right and Online Recommender Systems
View Abstract
In addition to hosting user-generated video content, YouTube provides recommendation services, where sets of related and recommended videos are presented to users, based on factors such as co-visitation count and prior viewing history. This article is specifically concerned with extreme right (ER) video content, portions of which contravene hate laws and are thus illegal in certain countries, which are recommended by YouTube to some users. We develop a categorization of this content based on various schema found in a selection of academic literature on the ER, which is then used to demonstrate the political articulations of YouTube’s recommender system, particularly the narrowing of the range of content to which users are exposed and the potential impacts of this. For this purpose, we use two data sets of English and German language ER YouTube channels, along with channels suggested by YouTube’s related video service. A process is observable whereby users accessing an ER YouTube video are likely to be recommended further ER content, leading to immersion in an ideological bubble in just a few short clicks. The evidence presented in this article supports a shift of the almost exclusive focus on users as content creators and protagonists in extremist cyberspaces to also consider online platform providers as important actors in these same spaces.
|
2014 |
O’Callaghan D., Greene D., Conway M., Carthy J. and Cunningham P. |
View
Publisher
|
Journal Article |
Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts
View Abstract
This article contributes to public and policy debates on the value of social media disruption activity with respect to terrorist material. In particular, it explores aggressive account and content takedown, with the aim of accurately measuring this activity and its impacts. The major emphasis of the analysis is the so-called Islamic State (IS) and disruption of their online activity, but a catchall “Other Jihadi” category is also utilized for comparison purposes. Our findings challenge the notion that Twitter remains a conducive space for pro-IS accounts and communities to flourish. However, not all jihadists on Twitter are subject to the same high levels of disruption as IS, and we show that there is differential disruption taking place. IS’s and other jihadists’ online activity was never solely restricted to Twitter; it is just one node in a wider jihadist social media ecology. This is described and some preliminary analysis of disruption trends in this area supplied too.
|
2018 |
Conway, M., Khawaja, M., Lakhani, S., Reffin, J., Robertson, A., & Weir, D. |
View
Publisher
|
VOX-Pol Publication |
Violent Extremism and Terrorism Online in 2018: The Year in Review
View Abstract
This report treats developments in the violent extremist and terrorist online scene(s) in the 12-month period from 1 December 2017 to 30 November 2018.1 It is divided into three parts: Part I focuses on the online activities of violent jihadis, particularly the so-called ‘Islamic State’ (hereafter IS); Part II supplies information on contemporary extreme right online activity; and Part III identifies issues in the violent extremism and terrorism online realm that bear watching in 2019.
In terms of overarching trends, the focus of policymakers, internet companies, media, and thus also publics has, since 2014, been almost exclusively on IS’s online activity. A growing concern with extreme right activity, both its online and offline variants, began to be apparent in 2017 however, especially in the wake of events in Charlottesville. This solidified in 2018 due to a number of factors, including a decrease in IS terrorist attacks in the West and an uptick in extreme right and hate attacks and terrorist events, a number of the latter of which appeared to have significant online components. Having said this, IS is still active on the ground in numerous locales globally and continues to produce and widely disseminate online content, as do a large number of other groups that share core tenets of its ideology. IS may be down therefore, but it is certainly not out.
|
2019 |
Conway, M. |
View
Publisher
|
Chapter |
The Roles of ‘Old’ and ‘New’ Media Tools and Technologies in the Facilitation of Violent Extremism and Terrorism
View Abstract
The media and communication strategies of two particular ideologies are focused on herein: right-wing extremists and violent jihadis – albeit an array of others is referred to also (e.g. nationalist-separatists such as the Irish Republican Army (IRA) and violent Islamists such as Hezbollah). Violent jihadists are inspired by Sunni Islamist-Salafism and seek to establish an Islamist society governed by their version of Islamic or Sharia law imposed by violence (Moghadam, 2008). Right-wing extremists may also subscribe to some radical interpretation of religion, but unlike those inspired by radical Islam, many extreme right adherents are not inspired by religious beliefs per se. Instead, what binds these actors is a racially, ethnically, and sexually defined nationalism, which is typically framed in terms of white power and grounded in xenophobic and exclusionary understandings of the perceived threats posed by such groups as non-whites, Jews, Muslims, immigrants, homosexuals, and feminists. Here the state is perceived as an illegitimate power serving the interests of all but the white man and, as such, right-wing extremists are willing to assume both an offensive and defensive stance in the interests of “preserving” their heritage and their “homeland” (Perry & Scrivens, 2016). With regard to the chapter’s structuring, the following sections are ordered chronologically, treating, in turn, early low-tech communication methods or what we term ‘pre-media,’ followed by other relatively low-tech tools, such as print and photocopying. The high-tech tools reviewed are film, radio, and television, followed by the Internet, especially social media.
|
2019 |
Scrivens, R. and Conway, M. |
View
Publisher
|
Report |
Right-Wing Extremists’ Persistent Online Presence: History and Contemporary Trends
View Abstract
This policy brief traces how Western right-wing extremists have exploited the power of the internet from early dial-up bulletin board systems to contemporary social media and messaging apps. It demonstrates how the extreme right has been quick to adopt a variety of emerging online tools, not only to connect with the like-minded, but to radicalise some audiences while intimidating others, and ultimately to recruit new members, some of whom have engaged in hate crimes and/or terrorism. Highlighted throughout is the fast pace of change of both the internet and its associated platforms and technologies, on the one hand, and the extreme right, on the other, as well as how these have interacted and evolved over time. Underlined too is the persistence, despite these changes, of rightwing extremists’ online presence, which poses challenges for effectively responding to this activity moving forward.
|
2019 |
Conway, M., Scrivens, R. and Macnair, L. |
View
Publisher
|