Islamic State
Blog
Interpreting Data About Islamic State Online
January 18, 2017By Ali Fisher Challenging ISIS has little to do with their number of followers, or the decline in their number of messages. This type of tactical-level data can indicate success, but genuine impact can only occur with robust interpretation of data at the strategic level. Recent studies have been used to claim success in reducing the number of followers ...
Blog
Who is Winning the Syrian Digital War?
December 7, 2016By Amarnath Amarasingam The Syrian war has been, for good and often for ill, an incubator for developing new tools and strategies for digital conflict. Whether any of these actors “win” the Syrian war, their digital strategies will likely be with us for a long time. ISIS and other jihadist groups have inspired tens of ...
Blog
Some Recent Trends in the Use of the Internet/ICT for Terrorist Purposes – Part III
November 16, 2016The following is the third of three blog posts reporting on discussions at a workshop held in the Swiss Federal Institute of Technology, ETH Zurich, Switzerland on 25 August 2016 under the auspices of the UN Counter Terrorism Committee Executive Directorate (UNCTED) and the Swiss-based ICT4Peace Foundation and their joint project on ‘Private Sector Engagement in ...
Blog
Some Recent Trends in the Use of the Internet/ICT for Terrorist Purposes – Part II
November 9, 2016The following is the second of three blog posts reporting on discussions at a workshop held in the Swiss Federal Institute of Technology, ETH Zurich, Switzerland on 25 August 2016 under the auspices of the UN Counter Terrorism Committee Executive Directorate (UNCTED) and the Swiss-based ICT4Peace Foundation and their joint project on ‘Private Sector Engagement ...
Blog
Some Recent Trends in the Use of the Internet/ICT for Terrorist Purposes – Part I
November 2, 2016The following is the first of three blog posts reporting on discussions at a workshop held in the Swiss Federal Institute of Technology, ETH Zurich, Switzerland on 25 August 2016 under the auspices of the UN Counter Terrorism Committee Executive Directorate (UNCTED) and the Swiss-based ICT4Peace Foundation and their joint project on ‘Private Sector Engagement ...
Blog
Online Responses to Terrorist Attacks: A #niceattack Case Study – Part 2: The Aftermath
October 26, 2016This blog post is a follow-up to last week’s post on Twitter activity following the terrorist attack that took place in Nice, France, on 14 July, 2016 and associated real-world events during the ensuing week. It is part of a larger project exploring hashtag activism in CVE. The first posts traced the online reaction to ...
Blog
Online Responses to Terrorist Attacks: A #niceattack Case Study – Part 1: The First 20 Minutes
October 19, 2016This blog post and a follow-up next week analyse Twitter activity following the terrorist attack that took place in Nice, France on 14 July, 2016 and associated real-world events during the ensuing week. It is part of a larger project exploring hashtag activism in CVE. This first posts traces the online reaction to developments during ...
Blog
Women’s Key Role in Islamic State Online Networks, Explained
October 5, 2016By Neil Johnson In early September, three women were arrested in Paris for attempting to detonate a car bomb outside Notre Dame cathedral. “If at first it appeared that women were confined to family and domestic chores by the Daesh terrorist organization, it must be noted that this view is now completely outdated,” François Molins, a ...
Blog
EXTREMISMO VIRAL – When did Islamic State’s (IS) Online Media Strategy Begin to Take Shape?
July 27, 2016At the end of April, VOX-Pol’s Coordinator, Prof. Maura Conway, exchanged a series of emails with Brazilian magazine Imprensa’s Gabriela Ferigato for a feature piece she was writing on the so-called ‘Islamic State’s’ online activity. The feature appeared recently and is available to read HERE for Portuguese speakers. A lightly edited version of the original ...
Blog
Dataset Spotlight: How ISIS Uses Twitter- Interview with Khuram Zaman
July 20, 2016by Megan Risdal Many of us know that data collection, cleaning, and processing is a time-consuming and sometimes arduous ordeal that requires patience along with elbow grease. It’s usually the end product—insights from an analysis to feed action—that motivates us to munge. In this interview, Khuram Zaman of Fifth Tribe, explains how a desire to ...