VOX-Pol Publication |
Violent Extremism and Terrorism Online in 2017: The Year in Review
View Abstract
The use of the Internet, particularly social media, by violent extremists and terrorists and their supporters received an increasing amount of attention from policymakers, media, Internet companies, and civil society organisations in 2017. In addition to politicians stepping-up their rhetoric regarding the threat posed by consumption of and networking around violent extremist and terrorist online content, prominent and heavily trafficked social media platforms also took a stronger stand on the issue this year, which caused civil liberties organisations considerable disquiet. This report treats developments in the violent extremist and terrorist online scene(s) and responses to them in the 12-month period from 1 December 2016 to 30 November 2017.
|
2018 |
Conway, M., with Courtney, M. |
View
Publisher
|
VOX-Pol Blog |
EXTREMISMO VIRAL – When did Islamic State’s (IS) Online Media Strategy Begin to Take Shape?
View Abstract
|
2016 |
Ferigato, G. and Conway, M. |
View
Publisher
|
Journal Article |
Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns, and Processes
View Abstract
Public interest and policy debates surrounding the role of the Internet in terrorist activities is increasing. Criminology has said very little on the matter. By using a unique data set of 223 convicted United Kingdom–based terrorists, this article focuses on how they used the Internet in the commission of their crimes. As most samples of terrorist offenders vary in terms of capabilities (lone-actor vs. group offenders) and criminal sophistication (improvised explosive devices vs. stabbings), we tested whether the affordances they sought from the Internet significantly differed. The results suggest that extreme-right-wing individuals, those who planned an attack (as opposed to merely providing material support), conducted a lethal attack, committed an improvised explosive device (IED) attack, committed an armed assault, acted within a cell, attempted to recruit others, and engaged in non-virtual network activities and non-virtual place interactions were significantly more likely to learn online compared with those who did not engage in these behaviours. Those undertaking unarmed assaults were significantly less likely to display online learning. The results also suggested that extreme-right-wing individuals who perpetrated an IED attack, associated with a wider network, attempted to recruit others, and engaged in non-virtual network activities and non-virtual place interactions were significantly more likely to communicate online with co-ideologues.
This article is a revised and updated version of the 2015 VOX-Pol report ‘What are the Roles of the Internet In Terrorism? Measuring Online Behaviors of Convicted UK Terrorists.’
|
2017 |
Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M. and Horgan, J. |
View
Publisher
|
VOX-Pol Publication |
What are the Roles of the Internet In Terrorism? Measuring Online Behaviors of Convicted UK Terrorists
View Abstract
Using a unique dataset of 227 convicted UK-based terrorists, this report fills a large gap in the existing literature. Using descriptive statistics, we first outline the degree to which various online activities related to radicalisation were present within the sample. The results illustrate the variance in behaviours often attributed to ‘online radicalisation’. Second, we conducted a smallest-space analysis to illustrate two clusters of commonly co-occurring behaviours that delineate behaviours from those directly associated with attack planning. Third, we conduct a series of bivariate and multivariate analyses to question whether those who interact virtually with like-minded individuals or learn online, exhibit markedly different experiences (e.g. radicalisation, event preparation, attack outcomes) than those who do not.
|
2015 |
Gill, P., Corner, E., Thornton, A. and Conway, M. |
View
Publisher
|
Journal Article |
Two Sides of the Same Coin? A Largescale Comparative Analysis of Extreme Right and Jihadi Online Text(s)
View Abstract
This article describes and discusses a comparative semiotic analysis of online text collected from eight extreme right websites and four violent jihadi groups’ online magazines. The two datasets, which comprise just over 1 million words each, were analyzed using LIWC software. The core issues explored were the shared and different linguistic patterns used among extreme right and violent jihadi extremists and the emotional, cognitive, psychological, and social dimensions of the online textual discourses of each ideological grouping and what function these played in their overall political rhetoric. The findings bring to light some nuanced differences and similarities in the cognitive, social, psychological, and temporal dimensions of language used by each. For example, while both types of ideological text showed the same level of certainty in arguments as a cognitive process, the language depicting social and emotional processes, and religion were used more often by the violent jihadi extremists (VJEs) than the extreme right. The findings also point to the fact that VJEs were more likely than right-wing extremists to discuss the future and promise change as motivational incentives.
|
2022 |
Mehran, W., Herron, S., Miller, B., Lemieux, A.F. and Conway, M. |
View
Publisher
|
Journal Article |
Down the (White) Rabbit Hole: The Extreme Right and Online Recommender Systems
View Abstract
In addition to hosting user-generated video content, YouTube provides recommendation services, where sets of related and recommended videos are presented to users, based on factors such as co-visitation count and prior viewing history. This article is specifically concerned with extreme right (ER) video content, portions of which contravene hate laws and are thus illegal in certain countries, which are recommended by YouTube to some users. We develop a categorization of this content based on various schema found in a selection of academic literature on the ER, which is then used to demonstrate the political articulations of YouTube’s recommender system, particularly the narrowing of the range of content to which users are exposed and the potential impacts of this. For this purpose, we use two data sets of English and German language ER YouTube channels, along with channels suggested by YouTube’s related video service. A process is observable whereby users accessing an ER YouTube video are likely to be recommended further ER content, leading to immersion in an ideological bubble in just a few short clicks. The evidence presented in this article supports a shift of the almost exclusive focus on users as content creators and protagonists in extremist cyberspaces to also consider online platform providers as important actors in these same spaces.
|
2014 |
O’Callaghan D., Greene D., Conway M., Carthy J. and Cunningham P. |
View
Publisher
|