Blog

By Mohammed Al Darwish A typical Daesh propaganda release goes through multiple phases on its journey from Telegram to reach more popular social web platforms like Twitter.1 This transition from Telegram to a wider audience on a more accessible platform requires the intervention of “fanboys” who dedicate their time and effort to spreading the propaganda…

One of our Top 4 Blog posts of 2019 was Loránd Bodó’s Decentralised Terrorism: The Next Big Step for the So-Called Islamic State (IS)? Today’s post presents the pros and cons of what’s sometimes called ‘Web 3.0.’ [Ed.] By Edina Harbinja and Vasileios Karagiannopoulos Have you recently considered deleting your Facebook account, boycotting Amazon or…

The VOX-Pol Blog is now in its 6th year, with just over 380 posts having been published to-date. We always welcome original posts, we cross-post with permission, and can also accept posts that have been published elsewhere in languages other than English and have them translated. Please email info@voxpol.eu with submissions and/or questions. Each year during August we take…

By Jim Killock The CTIRU’s work consists of filing notifications of terrorist-related content to platforms, for them to consider removals. They say they have removed over 300,000 pieces of extremist content. Censor or not censor? The CTIRU consider its scheme to be voluntary, but detailed notification under the e-Commerce Directive has legal effect, as it…

By Manuel R. Torres-Soriano The collapse of Islamic State’s “caliphate” has had an enormous impact on jihadist activism on the Internet. In a short space of time, we have witnessed a shift from an ecosystem that orbited around the leadership of a strong organisation capable of shouldering the initiative and most of the work needed to…

By Cori E. Dauber and Mark D. Robinson Despite the fact that there is a robust conversation regarding “terrorism and technology,” that discussion uniformly addresses – as near as we can tell – the back end, the dissemination of what terrorists have already produced. We have found virtually nothing in the popular press[1] and nothing in…

By Pamela Ligouri Bunker and Robert J. Bunker The 2019 Terrorism and Social Media (TASM) Conference took place on 25 and 26 June 2019 at Swansea University Bay Campus, Wales, United Kingdom. The conference was organised by Swansea University’s Hillary Rodham Clinton School of Law and its Cyber Threats Research Centre (CYTREC), with the support…

Summary of Tech Against Terrorism’s analysis: Analysis of more than 45,000 URLs since 2014 across more than 330 platforms shows that smaller platforms are heavily targeted by ISIS and that 49% of all URLs were found on just eight of these platforms. Key conclusions: ISIS experimentation with small social media platform Koonekti is the most…

By Philippa Smith When it comes to debates about free speech that needs to be protected and hate speech that needs to be legislated, the idiom of “drawing the line” is constantly referenced by politicians, journalists and academics. It has surfaced again as New Zealanders struggle to comprehend the abhorrence of the Christchurch terror attack and…

By David Watts Data ethics is now a cause célèbre. “Digital ethics and privacy” shot into research and advisory company Gartner’s top ten strategic technology trends for 2019. Before that it barely raised a mention. In the past year governments, corporations and policy and technology think tanks have published data ethics guides. An entire cohort…