Blog

Would you like to submit a VOX-Pol Blog Post? Click here for submission instructions.

by Andrea Cerase, Elena D’Angelo and Claudia Santoro The rise of racism in Europe In recent years online racism has seen a quick and serious growth in many European and non-European countries, till to become a worrying global phenomenon.(1) One of the most striking examples of such process is the rise of White Supremacist Movements online. Their strategy…

by Benjamin Ducol Beyond a dichotomic view of radicalisation in the digital era The dichotomisation of “virtual” versus “real world” is one of the major pitfalls in current studies of radicalisation in the digital era. In many cases, scholars tend to conceptualise virtual spaces as autonomous from what actually happens in the “real world” and…

by Jacob Mchangama The global spate of terrorist attacks has brought the phenomenon of online radicalisation to the forefront. Governments and intelligence services warn that extremist groups use social media to recruit new adherents and potential terrorists. From the perspective of human rights, this raises a question – where should the line be drawn between…

By Sam Garin In a video entitled “There is no Life without Jihad,” young men shaded by verdant palm trees empathetically assure their audience that they understand their struggle as Muslims in a western country. The video shows English-speaking members of the Islamic State give calm, earnest testimonies urging Muslims in the West to join the terrorist…

by Aaron Brantly and Muhammad al-`Ubaydi The average netizen has terrible digital hygiene. We click on random links, open emails from unknown individuals, use public WiFi hotspots, leave computers and devices unsecured, and often do not even use basic anti-virus packages. Most Chief Information Systems Officers’ largest problem is not a talented nation state, but…

By Joshua Sinai In the United States, Canada and Western Europe, dozens of al Qaeda, al-Shabab- and ISIS-related terrorist plots have been thwarted by government counterterrorism agencies through electronic surveillance of terrorist operatives’ suspicious activities on the Internet. While their activities were likely also monitored “on the ground,” the fact that terrorists of all extremist…