There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means by which to address the effects of these narratives. Countering violent extremism (CVE) is a broad umbrella phrase that covers a wide array of approaches that
Search Results for: advanced
Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness, and Web Interactivity
Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia terrorist/extremist collections and advanced analytical methodologies, our empirical understanding of their Internet usage is still very limited. To address this research gap, we explore an integrated approach for identifying and
How Do Terrorist Organizations Use Information Technologies- Understanding Cyber Terrorism
Globalization with advanced information technologies has changed the life of the people in the world. When something occurs in one part of the world, other part of the world can be informed easily within seconds. Current information technologies such as internet, social media, blogs and news channels have enabled the people to create virtual groups
Occasional Paper – The Islamic State’s Diminishing Returns on Twitter: How suspensions are limiting the social networks of English-speaking ISIS supporters
Since late 2014, Islamic State of Iraq and Syria (ISIS) social networks on Twitter have been subjected to periodic account suspensions. In a study of metrics for a network of English language ISIS supporters active from June to October 2015, suspensions held the size and reach of the overall network flat, while devastating the reach
Code wars: Steganography, Signals Intelligence, and Terrorism
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this
Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations
This report analyzes terrorist groups’ use of advanced information and communication technologies in efforts to plan, coordinate, and command their operations. It is one component of a larger study that examines terrorists’ use of technology, a critical arena in the war against terrorism. The goal of the investigation reported here is to identify which network
Main Findings of GIFCT Tech Trials: Combining Behavioural Signals to Surface Terrorist and Violent Extremist Incidents Online
By Tom Thorley & Erin Saltman This article summarises a recent paper published in Studies in Conflict & Terrorism that forms part of a special issue on the practicalities and complexities of (regulating) online terrorist content moderation. The special issue contains papers that were presented at Swansea University’s Terrorism and Social Media Conference 2022. Technical
Weeda Mehran
Weeda Mehran, PhD (Cambridge), MSc (Oxford) is a faculty member at the Department of Politics & Co-director of the Centre for Advanced International Studies (CAIS) at the University of Exeter. Dr Mehran has formerly worked at the Global Studies Institute, Georgia State University, McGill University and Dublin City University (as aVox-POL visiting scholar). She has
J.M. Berger
J.M. Berger is a consultant and author working on a suite of related issues that include extremism, misinformation, propaganda, advanced social media analysis, and technology sector content policies. A research fellow with VOX-Pol and a postgraduate research student at Swansea University’s School of Law, where he studies extremist ideologies, he is the author of four
The parallel economy: the rightwing movement creating a safe haven for deplatformed conservative influencers
By Jing Zeng, Utrecht University and Daniela Mahl, University of Zurich The last few years have seen the west swept by political polarisation, much of which has played out online. Debates around race, gender and freedom of speech have splintered democracies, spread conspiracy theories and sparked a series of culture wars. One byproduct of this