Library

Welcome to VOX-Pol’s online Library, a research and teaching resource, which collects in one place a large volume of publications related to various aspects of violent online political extremism.

Our searchable database contains material in a variety of different formats including downloadable PDFs, videos, and audio files comprising e-books, book chapters, journal articles, research reports, policy documents and reports, and theses.

All open access material collected in the Library is easy to download. Where the publications are only accessible through subscription, the Library will take you to the publisher’s page from where you can access the material.

We will continue to add more material as it becomes available with the aim of making it the most comprehensive online Library in this field.

If you have any material you think belongs in the Library—whether your own or another authors—please contact us at onlinelibrary@voxpol.eu and we will consider adding it to the Library. It is also our aim to make the Library a truly inclusive multilingual facility and we thus welcome contributions in all languages.

Featured

Full Listing

TitleYearAuthorTypeLinks
A Tale Of Two Caliphates: Comparing the Islamic State's Internal and External Messaging Priorities
2018Mahlouly, D., and Winter, C.VOX-Pol Publication
In recent years, the media department of the self-proclaimed Islamic State has proven itself to be highly adept at strategic communication. While much research has gone into the group’s digital and online capabilities, there remains a significant gap in the knowledge regarding its in-country propaganda operations and objectives. In recognition of this, the following research paper approaches the issue from a different angle, attempting to better understand how and why the group communicates its brand through the lens of two publications – al-Naba’, its Arabic-language newspaper, which appears to be designed primarily for offline dissemination in the caliphate itself, and Rumiyah, its foreign-language electronic magazine, which has only ever appeared online. Using content analysis to identify and compare each publication’s internal (local) and external (global) media priorities over the four-month period between September and December 2016, we develop an empirical evaluation of the group’s recent forays into targeted outreach.
Mounting a Facebook Brand Awareness and Safety Ad Campaign to Break the ISIS Brand in Iraq
2018Speckhard, A., Shajkovci, A., Wooster, C., and Izadi, NeimaArticle
This article reports on the International Center for Study of Violent Extremism (ICSVE’s) most recent Facebook ad
campaign aimed at raising awareness about the realities of living under ISIS and protecting vulnerable potential
recruits from considering joining. During the course of 24 days in December of 2017, ICSVE researchers mounted
the campaign on Facebook using a counter-narrative video produced by ICSVE. The Facebook ad campaign
targeted Iraq, where Facebook is the most widely used social media platform, with ISIS also driving powerful
recruiting campaigns on Facebook and enticing youth into joining. The results were promising in terms of driving
engagement with our counternarrative video materials, leading close to 1.7 million views and hundreds of specific
comments related to both our video content and ISIS in general. In terms of policy implications, in addition to
raising awareness about the dangers of joining ISIS and our Breaking the ISIS Brand Counter Narrative Project, the
campaign served as an important platform to challenge extremist narratives as well as channel doubt, frustration,
and anger into positive exchange of ideas and participation.
Jihadi Beheading Videos and their Non-Jihadi Echoes
2018Koch, A.Article
In recent years, the Islamic State terror organization has become notorious for its evil brutality. The brutal nature
of its propaganda (distributed mostly online) inspires Jihadi sympathizers around the world, encouraging them
to use violence against “the enemies of Islam”. This form of violent behavior has also been adopted and imitated
by others – including non-Muslim individuals and groups – regardless of their geographic location, worldview,
religion, ethnicity, or nationality. Drawing from numerous examples, this article illustrates two processes: first,
the “mainstreaming” of beheadings among Jihadists, and second, the imitation of this method (decapitation)
by individuals motivated by other kinds of extremism.
Studying Jihadists on Social Media: A Critique of Data Collection Methodologies
2018Parekh, D., Amarasingam, A., Dawson, L., Ruths, D.Article
In this article, we propose a general model of data collection from social media, in the context of terrorism research,
focusing on recent studies of jihadists. By analyzing Twitter data collection methods in the existing research, we
show that the methods used are prone to sampling biases, and that the sampled datasets are not sufficiently filtered
or validated to ensure reliability of conclusions derived from them. Alternatively, we propose some best practices for
the collection of data in future research on jihadist using social media (as well as other kinds of terrorist groups).
Given the similarity of the methodological challenges posed by research on almost all social media platforms, in
the context of terrorism studies, the critique and recommendations offered remain relevant despite the recent shift
of most jihadists from Twitter to Telegram and other forms of social media.
The Role of Police Online in PVE and CVE
2018Lenos, S. and Wouterse, L.Report
This paper is written for police wanting an
overview of their online PCVE options, and is
based on the RAN POL meeting on ‘The role of
police online’ that took place on 1-2 March in
Oslo.
NYPD vs. Revolution Muslim: Te Inside Story of the Defeat of a Local Radicalization Hub
2018Morton, J. and Silber, M.Report
Between 2006 and 2012, two men working on opposite
sides of the struggle between global jihadis and the United
States faced of in New York City. One was the founder of
Revolution Muslim, a group which proselytized—online
and on New York streets—on behalf of al-Qa`ida. The
other led eforts to track the terrorist threat facing the
city. Here, they tell the inside story of the rise of Revolution
Muslim and how the NYPD, by using undercover ofcers
and other methods, put the most dangerous homegrown
jihadi support group to emerge on U.S. soil since 9/11
out of business. As the Islamic State adjusts to its loss of
territory, this case study provides lessons for current and
future counterterrorism investigations.
The British Hacker Who Became the Islamic State's Chief Terror CyberCoach: A Profile of Junaid Hussain
2018Hameed, N.
Until his death in a U.S. drone strike in August 2015, Junaid
Hussain was the Islamic State’s most prolific Englishlanguage
social media propagandist, working to incite and
guide sympathizers in the United Kingdom, United States,
and beyond to launch terrorist attacks. Before joining the
jihad in Syria, Hussain was part of a hacking collective in
the United Kingdom, focusing much of his attention on
perceived injustices against Muslims. In many respects,
he was well integrated into British society with his family
home in a leafy suburb of Birmingham. A spell in prison
contributed to his radicalization and his decision to move
to Syria, where he married fellow extremist Sally Jones.
Spiders of the Caliphate: Mapping the Islamic State’s Global Support Network on Facebook
2018Waters, G. and Postings, R.Featured
This report analyzes the strength of the Islamic State’s (IS) network on Facebook using online network
measurement tools and uncovers the myriad of ways in which IS operates on Facebook. To do so, we mapped the
accounts and connections between 1,000 IS-supporting Facebook profiles with links to 96 countries on every
continent except Antarctica using the open-source network analysis and visualization software, Gephi. It should
be noted, however, that hundreds of additional pro-IS profiles were excluded from the dataset. This is because
while we were able to identify the IS supporting Facebook accounts, there was no information on those users’
locations. Therefore, this data represents only a portion of IS’s support network on the platform.
Our analysis of online IS communities globally, regionally, and nationally suggests that IS’s online networks, in
particular on Facebook, are growing and can be utilized to plan and direct terror attacks as well as mobilize foreign
fighters for multiple areas of insurgency. Secondly, IS’s presence on Facebook is pervasive and professionalized,
contrary to the tech company’s rhetoric and efforts to convince the public, policymakers, and corporate advertisers
from believing otherwise. Our findings illustrate that IS has developed a structured and deliberate strategy of
using Facebook to radicalize, recruit, support, and terrorize individuals around the world. According to our
observations, it appears that IS utilizes a limited number of central players who work to magnify the group’s
presence on the platform, and also works to strengthen its networks so that no one individual IS Facebook account
(node) serves as an irreplaceable connection (edge) to other pro-IS accounts located elsewhere.
Online Networks of Racial Hate: A Systematic Review of 10 Years of Research on Cyber-Racism
2018Bliuc, A.M., Faulkner, N., Jakubowicz, A., McGarty, C.Journal
The ways in which the Internet can facilitate the expression and spread of racist views and ideologies have been the subject of a growing body of research across disciplines. To date, however, there has been no systematic reviews of this research. To synthesise current knowledge on the topic and identify directions for future research, we systematically review a decade of research on cyber-racism as perpetrated by groups and individuals (i.e., according to the source of cyber-racism). Overall, the cyber-racism research reviewed shows that racist groups and individuals use different communication channels, are driven by different goals, adopt different strategies, and the effects of their communication are distinctive. Despite these differences, both groups and individuals share a high level of skill and sophistication when expressing cyber-racism. Most of the studies reviewed relied on qualitative analyses of online textual data. Our review suggests there is a need for researchers to employ a broader array of methods, devote more attention to targets' perspectives, and extend their focus by exploring issues such as the roles of Internet in mobilising isolated racist individuals and in enabling ideological clustering of supporters of racist ideologies.
Internet Censorship in the United Kingdom: National Schemes and European Norms
2018McIntyre, T.J.Chapter
The United Kingdom (UK) has been at the vanguard of online censorship in democracies from the beginning of the modern internet. Since the mid-1990s the government has developed distinctive patterns of regulation – targeting intermediaries, using the bully pulpit to promote ‘voluntary’ self-regulation, and promoting automated censorship tools such as web blocking – which have been influential internationally but raise significant issues of legitimacy, transparency and accountability. This chapter examines this UK experience in light of the European Convention on Human Rights (ECHR) and EU law, arguing that in key regards current censorship practices fail to meet European standards.

The chapter builds on the existing literature in two main ways. First, it assesses emerging censorship practices in the area of terrorist material and extreme pornography. Second, it considers how recent EU legislation and ECtHR case law might constrain the freedom of the UK government and force a move towards different models of censorship.

The chapter starts by outlining the regulatory context. It then takes three case studies – Child Abuse Material (CAM), terrorist material, and pornography/extreme pornography under the Digital Economy Act 2017 – and traces how censorship has evolved from one context to the next. These systems are then evaluated against the standards set by European law and in particular Articles 6 and 10 ECHR, the Open Internet Regulation, and the Directives on Sexual Abuse of Children and on Combating Terrorism.
Fool me Once: How Terrorists Like and Rely Upon the "See no Evil, Hear no Evil" Business Model of Google Facebook and Instagram
2018Digital Citizens AllianceReport
The latest Digital Citizens Alliance investigation exposes the fallacy that
much, if anything, has changed. Partnering with the Global Intellectual Property
Enforcement Center (GIPEC), Digital Citizens has reviewed dozens of examples
of how terrorist organizations continue to rely on digital platforms such as
Google, Facebook, YouTube and Instagram to promote hate speech and recruit.
What it underscores is that the problem is not a surface issue that can be
solved simply through greater vigilance or the hiring of more content monitors.
The true cause of these troubling issues is the business model of these
platforms. When Cambridge Analytica inappropriately received the personal
information of at least 87 million Americans harvested by Facebook there was
no breach—Facebook turned that information over to the company because its
business model is to monetize users’ personal information with advertisers and
third parties.
Inception Impact Assessment: Measures to Further Improve the Effectiveness of the Fight against Illegal Content Online
2018Keller, D.Journal
This Comment addresses issues unique to potentially terrorist content targeted by Internet
platforms’ Countering Violent Extremism (CVE) efforts.2
It focuses in particular on Islamist
extremism, though some of the analysis may be generalized to other contexts.
Representing the West and “Non-Believers” in the Online Jihadist Magazines Dabiq and Inspire
2018Lorenzo-Dus, N.Journal
This article analyses how jihadist ideology groups discursively represent “the West” and “non-believers” in their online propagandamagazines. In doing so, it contributes to the field of Critical Terrorism Studies conceptually, by considering the voices of violent actors, and methodologically, by illustrating how linguistic tools of enquiry can advance current knowledge of jihadist ideology groups. Our work adopts a case study approach, focusing on the online magazines Inspire and Dabiq, which are part of the propaganda machinery of, respectively, Al-Qaeda and ISIS. The analysis reveals a number of similarities and differences in the discursive strategies that these two groups use. On the one hand, both Inspire and Dabiq support and further construct an “us versus them” dichotomy that polarises differences between their jihadist ideologies and those of Westerners/non-believers. On the other, Dabiq’s discursive representation of “the West” targets a wider variety of individuals and groups of people and geographical locations than Inspire’s. Additionally, Inspire places a greater focus on the pejorative construction of “the West” than Dabiq, suggesting that Al-Qaeda places more emphasis than ISIS on presenting “the West” as the enemy of jihad.
Loners, Colleagues, or Peers? Assessing the Social Organization of Radicalization
2018Holt, T.J., Feilich, J.D, Chermak, S.M., Mills, C., and Silva J.Journal
This study explores the utility of a sociological model of social organization developed by Best and Luckenbill (1994) to classify the radicalization processes of terrorists (i.e., extremist perpetrators who engaged in ideologically motivated acts of violence) who are usually categorized as loner or lone wolf attackers. There are several organizational frameworks used to define or classify violent acts performed by individuals who may or may not have ties to extremist groups, but these studies largely ignore the role of social relationships in radicalization and the extent to which they inform our knowledge of terror. To address this gap, we apply the Best and Luckenbill model of social organization using a qualitative analysis of three case studies of four lone actor or small cell terrorists. The findings demonstrate lone actors are not always true loners in the context of radicalization, and highlights the ways that the Internet and social ties foster the radicalization processes of terror.
Anti-refugee Mobilization in Social Media: The Case of Soldiers of Odin
2018Ekman, MattiasJournal
In the wake of the international refugee crisis, racist attitudes are becoming more publicly evident across the European Union. Propelled by the attacks in Köln on New Year’s Eve 2015 and harsher public sentiments on immigration, vigilante gangs have emerged in various European cities. These gangs mobilize through social media networks and claim to protect citizens from alleged violent and sexual attacks by refugees. This article analyzes how racist actors use social media to mobilize and organize street politics targeting refugees/immigrants. The aim is to explore the relation between social media and anti-refugee mobilization in a time of perceived insecurity and forced migration. The study uses the vigilante network Soldiers of Odin as a specific case, looking at (1) how they communicate through social media, (2) how they are represented in the large “alternative” space of right-wing online sites, and (3) how they are represented in traditional mainstream news. Using a critical adaption of Cammaerts’ theory of “mediation opportunity structure,” the article explicates the (inverted) rationale of racist online networks. Using quantitative and qualitative content analysis, both social media content and traditional news media are examined. The results show that although racist actors succeed in utilizing many of the opportunities embedded in social media communication and protest logic, they are also subject to constraints, such as a lack of public support and negative framing in news media. The article calls for more research on the (critical) relationship between uncivil engagement and social media networks.
Jihad Cool/Jihad Chic”: The Roles of the Internet and Imagined Relations in the Self-Radicalization of Colleen LaRose (Jihad Jane)
2015Picart, C.J.S.Journal
The internet provides the means through which a “self-activating terrorist” may first self-radicalize through some imaginary or sympathetic connection with an organized terrorist network. Additionally, the internet allows such a self-activating terrorist to move into the stage of radical violent action. The internet serves both functions by providing the lone wolf with not only a rhetorical medium for self-justification and communication through the use of “monster talk” and its converse, the rhetoric about the “good citizen,” but it is also a source for relatively inexpensive and more unpredictable technologies of mass destruction. Crucial to this analysis is the distinction between radicalization of thought and radicalization of action, as a theoretical rhetoric of radicalization does not automatically convert into a rhetoric of radical action unless there are catalysts at work. The internet, as well as imagined relations cemented by the rhetorics of “jihadi cool” or “jihadi chic,” function as these crucial catalysts, galvanizing monster talk into monstrous action. The article focuses specifically on the case of self-activating terrorist Colleen LaRose to analyze how different factors—mental, psychological, social, and economic—interact with imaginative elements, such as surrogate father-mentor-lover relations for LaRose, and contribute to the formation of a self-activating terrorist, and what ultimately motivates and galvanizes her to move from a rhetoric of radical talk to a rhetoric of radical action, using Silber and Bhatt’s model of radicalization as an initial heuristic. In the case of Colleen LaRose, the romance of “jihadi chic” or “jihadi cool” (the converse of the rhetoric of the monstrous “infidel” or “lone wolf terrorist”) was an essential factor to her self-radicalization. It is this imagined status of “jihadi chic” or “jihadi cool” (that nevertheless must somehow have a look of “reality” or “authenticity” and command a response from its audience) that continues to be a crucial component of the success of recruitment strategies of radical jihadi groups, such as ISIS.
Who Are the Online Extremists Among Us? Sociodemographic Characteristics, Social Networking, and Online Experiences of Those Who Produce Online Hate Materials
2018Costello, M. and Hawdon, J.Journal
What are the factors associated with the production of online hate material? Past research has focused on attributes associated with seeing and being targeted by online hate material, but we know surprisingly little about the creators of such material. This study seeks to address this gap in the knowledge, using a random sample of Americans, aged 15–36. Descriptive results indicate that nearly one-fifth of our sample reported producing online material that others would likely interpret as hateful or degrading. We utilize a logistic regression to understand more about these individuals. Results indicate that men are significantly more likely than women to produce online hate material. This fits with the broader pattern of men being more apt to engage in deviant and criminal behaviors, both online and offline. Other results show that the use of particular social networking sites, such as Reddit, Tumblr, and general messaging boards, is positively related to the dissemination of hate material online. Counter to expectations, the use of first-person shooter games actually decreased the likelihood of producing hate material online. This could suggest that violent videogames serve as outlet for aggression, and not a precursor. In addition, we find that individuals who are close to an online community, or spend more time in areas populated by hate, are more inclined to produce hate material. We expected that spending more time online would correlate with the production of hate, but this turned out not to be true. In fact, spending more time online actually reduces the likelihood of doing so. This result could indicate that individuals who spend more time online are focused on a particular set of tasks, as opposed to using the Internet to disseminate hate.
Terror in the Dark: How Terrorists Use Encryption, the Darknet, and Cryptocurrencies
2018Malik, N.Journal
This report demonstrates how terrorists and extremists have utilised the Darknet to mask their communication and propaganda efforts, to recruit and radicalise, and to gain material benefits such as illicit goods, including, but not limited to, weapons and fraudulent documents. In addition, this report notes the growing tendency of these individuals to utilise cryptocurrencies for transactions and fundraising, enabling them to evade detection by law enforcement entities.
'Sometimes You Just Have to Try Something' - A Critical Analysis of Danish State-Led Initiatives Countering Online Radicalisation
2018Warrington, A.Journal
This research paper argues that Danish online radicalisation policies are driven by logics of urgency (the threat is imminent) within a limited realm of discursive possibilities (the threat is securitised) which blur the lines between state and civil society as well as state and private sector interactions. Potential political implications bring into play questions about the democratic values that are perceived as safeguarded by these policies. The Danish case shows that we (as citizens, policy makers and researchers) must engage in further discussions on dynamics between the current threat perception of online radicalisation and policies addressing such a threat. My argument is constructed from a discourse analysis of official documents as of 2016-2017 on countering and preventing violent extremism and an analysis of the political logics driving a state-level conceptualisation of online radicalisation through interviews with government officials. The two-part analysis is theoretically based on Securitisation from the Copenhagen School in combination with Critical Terrorism Studies to create a critically inspired approach that remains within existing structures of Danish politics. This is done to engage with the current political landscape characterised by a securitisation of specific forms of online content associated with the Islamic State as an Other. Online radicalisation is herein constructed as a multidimensional threat towards a societal Self referring to the physical safety of citizens and a value based ‘way of life’. The decentralised structure of the internet allows communication flows that enable radicalisation to be understood as an inter-sectoral threat where multiple elements of the referent object are threatened simultaneously. This threat perception challenges government officials in developing and implementing policies to address the threat of the Other while safeguarding the democratic values of the Danish Self.
Extreme Right Images of Radical Authenticity: Multimodal Aesthetics of History, Nature, and Gender Roles in Social Media
2017Forchtner, B. and Kolvera, C.Journal
Over recent years, the German extreme right has undergone significant changes, including the appropriation of symbols, styles, and action repertoires of contemporary (youth) cultures, sometimes even taken from the far left. In this article, we investigate extreme right visual communication through Facebook, focusing on claims to truth and authentic Nazism in relation to ‘history’, ‘nature’, and ‘gender roles’. These themes were central in National Socialism, but today need to be (re)negotiated vis-à-vis contemporary (youth) cultures. We show that while a traditional notion of ideological authority is enabled through visuals, there is also a strand of imagery depicting and celebrating ‘intimate’ communion. While this simultaneity leads to tensions within the ‘ideal extreme right subject’, we argue that such dilemmas can also be productive, allowing for the (re)negotiation of classic National Socialist doctrine in the context of contemporary (youth) cultures, and thus, potentially, for a revitalisation of the extreme right.
1 2 3 33