Journal Article |
Variations on a Theme? Comparing 4chan, 8kun, and Other chans’ Far-Right “/pol” Boards
View Abstract
Online forums such as 4chan and 8chan have grown in notoriety following a number of high-profile attacks conducted in 2019 by right-wing extremists who used their “/pol” boards (dedicated to “politically incorrect” discussions). Despite growing academic interest in these online spaces, little is still known about them; in particular, their similarities and differences remain to be teased out, and their respective roles in fostering a certain farright subculture need to be specified. This article therefore directly compares the content and discussion pace of six different /pol boards of “chan” forums, including some that exist solely on the dark web. We find that while these boards constitute together a particular subculture, differences in terms of both rate of traffic and content demonstrate the fragmentation of this subculture. Specifically, we show that the different /pol boards can be grouped
into a three-tiered architecture based upon both at once how popular they are and how extreme their content is.
|
2021 |
Baele, S.J., Brace, L. and Coan, T.G. |
View
Publisher
|
Journal Article |
Selling terror: a multidimensional analysis of the Islamic State’s recruitment propaganda
View Abstract
The Islamic State (ISIS) early became infamous for its broadcasts of extreme violence. However, within months, the group’s initially dominant images of combat and executions had been subsumed into a broader propaganda platform more focused on state-building and community engagement. Drawing on a close reading of Abu Bakr Naji’s Management of Savagery, this article conceptualises three dominant themes within ISIS’ recruitment propaganda—violence, state and caliphate—and analyses their development and presentation over time. Employing a recruitment model adapted from Prochaska and DiClemente’s theory of behavioural change, it finds that ISIS developed a multidimensional propaganda platform, undergoing both broad thematic and structural evolution, which democratised the appeal of its jihad to cohorts who would otherwise be uninspired by extremist violence. ‘Technological coding’—the selective publication of thematic content by broadcast format—is proposed as a means by which ISIS was able to sustain binary violent and non-violent identities, and its function in the group’s propaganda machine is explored in depth. In the wake of ISIS’ territorial defeat, understanding the logic and effectiveness of its recruitment methodology is essential in preventing its resurgence or the rise of a newer organisation seeking to take its place.
|
2021 |
N. Johnston |
View
Publisher
|
Journal Article |
Leaking in terrorist attacks: A review
View Abstract
In the recent past, the numbers of religiously- and politically-motivated terrorist attacks have increased, inevitably raising the question of effective measures to prevent further terrorist attacks. Empirical studies related to school shootings have shown that school shooters reliably (directly and indirectly) disclosed their intentions or plans prior to the attack, a phenomenon termed leaking or leakage. Leaking has been used for preventive purposes in this area of research. Recent research has indicated that leaking was also present prior to politically and religiously motivated terrorist attacks. In order to determine the current state of knowledge about leaking related to these offenses, we conducted a review of the international literature on religiously and politically motivated terrorist attacks. Up to 90% of the offenders showed some type of leaking prior to the attacks. A range of different forms of leaking could be observed. Leaking often occurred in the form of verbal communication with family and friends and/or via communication over the Internet. Terrorist offenders apparently tend to show leaking more often than other groups of mass murderers. Findings regarding similarities and dissimilarities in leaking between religiously motivated, jihadist and politically-motivated, far-right terrorist attacks were contradictory. We discuss the implications of these findings for practice and research as well as the strengths and possible weaknesses of the leaking concept.
|
2021 |
Dudenhoefer, A.L., Niesse, C., Görgen, T., Tampe, L., Megler, M., Gröpler, C. and Bondü, R. |
View
Publisher
|
Journal Article |
Recontextualising the News: How antisemitic discourses are constructed in extreme far-right alternative media
View Abstract
This study explores how an extreme far-right alternative media site uses content from pro-fessional media to convey uncivil news with an antisemitic message. Analytically, it rests on a critical discourse analysis of 231 news items, originating from established national and international news sources, published on Frihetskamp from 2011–2018. In the study, we explore how news items are recontextualised to portray both overt and covert antisemitic discourses, and we identify four antisemitic representations that are reinforced through the selection and adjustment of news: Jews as powerful, as intolerant and anti-liberal, as exploiters of victimhood, and as inferior. These conspiratorial and exclusionary ideas, also known from historical Nazi propaganda, are thus reproduced by linking them to con-temporary societal and political contexts and the current news agenda. We argue that this kind of recontextualised, uncivil news can be difficult to detect in a digital public sphere.
|
2021 |
Haanshuus, B.P. and Ihlebæk, K.A. |
View
Publisher
|
Report |
Do You See What I See? Capabilities and Limits of Automated Multimedia Content Analysis
View Abstract
The ever-increasing amount of user-generated content online has led, in recent years, to an expansion in research and investment in automated content analysis tools. Scrutiny of automated content analysis has accelerated during the COVID-19 pandemic, as social networking services have placed a greater reliance on these tools due to concerns about health risks to their moderation staff from in-person work. At the same time, there are important policy debates around the world about how to improve content moderation while protecting free expression and privacy. In order to advance these debates, we need to understand the potential role of automated content analysis tools.
This paper explains the capabilities and limitations of tools for analyzing online multimedia content and highlights the potential risks of using these tools at scale without accounting for their limitations. It focuses on two main categories of tools: matching models and computer prediction models. Matching models include cryptographic and perceptual hashing, which compare user-generated content with existing and known content. Predictive models (including computer vision and computer audition) are machine learning techniques that aim to identify characteristics of new or previously unknown content.
|
2021 |
Thakur, D. and Llansó, E. |
View
Publisher
|
Journal Article |
The hidden hierarchy of far-right digital guerrilla warfare
View Abstract
The polarizing tendency of politically leaned social media is usually claimed to be spontaneous, or a by-product of underlying platform algorithms. This contribution revisits both claims by articulating the digital world of social media and rules derived from capitalist accumulation in the post-Fordist age, from a transdisciplinary perspective articulating the human and exact sciences. Behind claims of individual freedom, there is a rigid pyramidal hierarchy of power heavily using military techniques developed in the late years of the cold war, namely Russia Reflexive Control and the Boyd’s decision cycle in the USA. This hierarchy is not the old-style “command-and-control” from Fordist times, but an “emergent” one, whereby individual agents respond to informational stimuli, coordinated to move as a swarm. Such a post-Fordist organizational structure resembles guerrilla warfare. In this new world, it is the far right who plays the revolutionaries by deploying avant-garde guerrilla methods, while the so-called left paradoxically appears as conservatives defending the existing structure of exploitation. Although the tactical goal is unclear, the strategic objective of far-right guerrillas is to hold on to power and benefit particular groups to accumulate more capital. We draw examples from the Brazilian far right to support our claims.
|
2021 |
Cesarino, L. and Nardelli, P.H.J. |
View
Publisher
|