Welcome to VOX-Pol’s Online Library, a research and teaching resource, which collects in one place a large volume of publications related to various aspects of violent online political extremism.
Our searchable database contains material in a variety of different formats including downloadable PDFs, videos, and audio files comprising e-books, book chapters, journal articles, research reports, policy documents and reports, and theses.
All open access material collected in the Library is easy to download. Where the publications are only accessible through subscription, the Library will take you to the publisher’s page from where you can access the material.
We will continue to add more material as it becomes available with the aim of making it the most comprehensive online Library in this field.
If you have any material you think belongs in the Library—whether your own or another authors—please contact us at onlinelibrary@voxpol.eu and we will consider adding it to the Library. It is also our aim to make the Library a truly inclusive multilingual facility and we thus welcome contributions in all languages.
Featured
Full Listing
Title | Year | Author | Type | Links |
---|---|---|---|---|
![]() Validating extremism Strategic use of authority appeals in al-Naba’ infographics |
2018 | Winkler C., el-Damanhoury, K., Lemieux, A. | Article | |
Daesh’s centralized media operations provide a steady stream of media products to citizens living in and around its controlled territories, with the result that several nations occupied or adjacent to the group have emerged as many of the most fruitful recruiting grounds for new members. To better understand the argumentation strategies targeting such audiences, this study examines the 119 infographics in the first 50 issues of Daesh’s official weekly Arabic newsletter, al-Naba’. The findings suggest that through a patterned application of statistical, historical, religious, and scientific arguments from authority to predictable topical areas, the infographics in al-Naba’ reinforce Daesh as a key source of information for the citizenry of the proclaimed caliphate. | ||||
![]() Variations on a Theme? Comparing 4chan, 8kun, and Other chans’ Far-Right “/pol” Boards |
2021 | Baele, S.J., Brace, L. and Coan, T.G. | Article | |
Online forums such as 4chan and 8chan have grown in notoriety following a number of high-profile attacks conducted in 2019 by right-wing extremists who used their “/pol” boards (dedicated to “politically incorrect” discussions). Despite growing academic interest in these online spaces, little is still known about them; in particular, their similarities and differences remain to be teased out, and their respective roles in fostering a certain farright subculture need to be specified. This article therefore directly compares the content and discussion pace of six different /pol boards of “chan” forums, including some that exist solely on the dark web. We find that while these boards constitute together a particular subculture, differences in terms of both rate of traffic and content demonstrate the fragmentation of this subculture. Specifically, we show that the different /pol boards can be grouped into a three-tiered architecture based upon both at once how popular they are and how extreme their content is. |
||||
![]() Victims’ Use of Social Media during and after the Utøya Terror Attack: Fear, Resilience, Sorrow and Solidarity |
2018 | Frey E. | Chapter | |
This chapter examines how those directly affected by the terror attack on Utøya in Norway on 22 July 2011 used social media to cope with the trauma. Through interviews with eight survivors and a study of their Facebook walls during the first month after the shooting, the chapter sets out to answer how they tell and re-tell the trauma on Facebook. In what way does their re-telling of the terror event give it meaning? With Narrative Therapy as its inspiration, this chapter studies different themes and stories on the Facebook walls, what is told about the event, its effects and responses to it. The meaning derived from the trauma is a story of national unity, democratic values and the redefining of Norway as a multicultural society. As for the perpetrator, he is written out of the story. Book edited by Harald Hornmoen and Klas Backholm |
||||
![]() Video Games, Terrorism, and ISIS’s Jihad 3.0 |
2016 | Al-Raqi, A. | Journal | |
This study discusses different media strategies followed by the Islamic State in Iraq and Syria (ISIS). In particular, the study attempts to understand the way ISIS’s video game that is called “Salil al-Sawarem” (The Clanging of the Swords) has been received by the online Arab public. The article argues that the goal behind making and releasing the video game was to gain publicity and attract attention to the group, and the general target was young people. The main technique used by ISIS is what I call “troll, flame, and engage.” The results indicate that the majority of comments are against ISIS and its game, though most of the top ten videos are favorable towards the group. The sectarian dimension between Sunnis and Shiites is highly emphasized in the online exchanges, and YouTube remains an active social networking site that is used by ISIS followers and sympathizers to promote the group and recruit others. | ||||
![]() Video Vortex Reader II Moving Images Beyond YouTube 2011 |
2011 | Lovink, G. and Somers Miles, R. | Report | |
This second Video Vortex Reader marks the transition of online video into the mainstream. Staggering statistics of hypergrowth no longer impress us. Massive usage is not an indication of relevance. Heavy use does not automatically translate into well-funded research or critical art practices. Is the study of online video, like most new media topics, doomed to remain a niche activity – or will we see a conceptual quantum leap, in line with the billions of clips watched daily? | ||||
![]() Violence and Political Myth: Radicalizing Believers in the Pages of Inspire Magazine |
2015 | Kirke, X. | Journal | |
Violent Jihadist movements have increasingly produced online English language magazines in order to encourage young Muslims into terrorism. This article argues that sociological approaches to the study of these magazines should engage with theories of political myth, understood as the collective “work” on dramatic and figurative narratives which provide significance to the political conditions of social groups. The utility of this approach is demonstrated through an analysis of al-Qaeda's online magazine, Inspire. Targeted toward an alienated young Western Muslim readership, Inspire stylistically mimics Western magazines by using satirical representations of politicians and making references to popular culture. The authors seek to convince their readership that they are part of a violent conflict with Western “crusaders” and treacherous false Muslims. Through a rhetorical strategy of “legitimization via proximization,” perceived injustices committed by the purported enemies of Islam throughout the world are seen as direct attacks on the reader and all Muslims. The reader must sacrifice his/her livelihood in order to become a “hero” and defend the Umma against its enemies. The article concludes that the mobilizing potential of the work on myth in these magazines necessitates further research. | ||||
![]() Violence begetting violence: An examination of extremist content on deep Web social networks |
2020 | Malevich, S. and Robertson, T. | Article | |
Several incidents of mass violence in 2019 were preceded by manifestoes posted to deep Web social media sites by their perpetrators. These sites, most notably 4chan and 8chan, are buried in the deep Web, away from the neutralizing effects of broad public discourse. Many of the posts to these sites reference earlier extremist incidents, and indeed the incidents themselves mimic aspects of previous attacks. Building on previous research, this paper examines these deep Web social media sites. Through an analysis of traffic and posts, we confirm that these sites often act as a self-reinforcing community of users encouraging each other to violence, and we map a statistically significant rise in post volume; on these sites immediately following terrorist attacks. | ||||
![]() Violent Extremism and Terrorism Online In 2016: The Year In Review |
2016 | Conway, M. | VOX-Pol Publication | |
The use of the Internet, including social media, by violent extremists and terrorists and their supporters has been a source of anxiety for policymakers and publics for a number of years. This is based on the idea that there is a connection between consumption of and networking around violent extremist and terrorist online content and adoption of extremist ideology (i.e. so-called ‘online radicalisation’) and/or recruitment into violent extremist or terrorist groups or movements and/or attack planning and preparation and/or, ultimately, engagement in violent extremism and terrorism. Concerns have been raised, in particular, regarding easy access to large volumes of potentially influencing violent extremist and terrorist content on prominent and heavily trafficked social media platforms. | ||||
![]() Violent Extremism and Terrorism Online in 2017: The Year in Review |
2018 | Conway, M., with Courtney, M. | VOX-Pol Publication | |
The use of the Internet, particularly social media, by violent extremists and terrorists and their supporters received an increasing amount of attention from policymakers, media, Internet companies, and civil society organisations in 2017. In addition to politicians stepping-up their rhetoric regarding the threat posed by consumption of and networking around violent extremist and terrorist online content, prominent and heavily trafficked social media platforms also took a stronger stand on the issue this year, which caused civil liberties organisations considerable disquiet. This report treats developments in the violent extremist and terrorist online scene(s) and responses to them in the 12-month period from 1 December 2016 to 30 November 2017. | ||||
![]() Violent Extremism and Terrorism Online in 2018: The Year in Review |
2019 | Conway, M. | VOX-Pol Publication | |
This report treats developments in the violent extremist and terrorist online scene(s) in the 12-month period from 1 December 2017 to 30 November 2018.1 It is divided into three parts: Part I focuses on the online activities of violent jihadis, particularly the so-called ‘Islamic State’ (hereafter IS); Part II supplies information on contemporary extreme right online activity; and Part III identifies issues in the violent extremism and terrorism online realm that bear watching in 2019. In terms of overarching trends, the focus of policymakers, internet companies, media, and thus also publics has, since 2014, been almost exclusively on IS’s online activity. A growing concern with extreme right activity, both its online and offline variants, began to be apparent in 2017 however, especially in the wake of events in Charlottesville. This solidified in 2018 due to a number of factors, including a decrease in IS terrorist attacks in the West and an uptick in extreme right and hate attacks and terrorist events, a number of the latter of which appeared to have significant online components. Having said this, IS is still active on the ground in numerous locales globally and continues to produce and widely disseminate online content, as do a large number of other groups that share core tenets of its ideology. IS may be down therefore, but it is certainly not out. |
||||
![]() Violent Extremism And Terrorism Online In 2019 The Year In Review |
2019 | Conway, M. | VOX-Pol Publication | |
This report treats developments in the violent extremist and terrorist online scene(s) and responses to them in the 13-month period from 1 December 2018 to 31 December 2019. It is divided into two parts: Part I focuses on the online activities of the extreme right, with a particular emphasis on the Christchurch attacks, and Part II on violent online jihadism, particularly the so-called ‘Islamic State’ (hereafter IS). The Conclusion provides a summing-up and identifies issues in this realm that bear watching in 2020. Those familiar with our previous reports will know that the structuring of these was slightly different, with analysis of violent jihadi activity preceding discussion of extreme right online activity in all instances. The March 2019 Christchurch attacks and a series of subsequent attacks in the United States and Germany put extreme right online activity firmly centre stage however, which is reflected in the structuring of the present report. | ||||
![]() Violent Extremism and Terrorism Online in 2021: The Year in Review |
2022 | Conway, M., Watkin, A.L., and Looney, S. | VOX-Pol Publication | |
This report treats developments in the violent extremist and terrorist online scene(s) in the 12-month period from 1 December 2020 to 30 November 2021. It accomplishes this by surveying, describing, and integrating the findings of relevant articles and reports produced by academics, thinktanks, civil society, and governmental organisations; high quality media coverage; and the first hand experience and primary research of the authors. This report treats developments in the violent extremist and terrorist online scene(s) in the 12-month period from 1 December 2020 to 30 November 2021. It accomplishes this by surveying, describing, and integrating the findings of relevant articles and reports produced by academics, thinktanks, civil society, and governmental organisations; high quality media coverage; and the firsthand experience and primary research of the authors. |
||||
![]() Violent Extremism Online: New Perspectives on Terrorism and the Internet |
2016 | Aly, A., Macdonald, S., Jarvis, L. and Chen, T. | Book | |
This book explores the interface between terrorism and the internet and presents contemporary approaches to understanding violent extremism online. The volume focuses on four issues in particular: terrorist propaganda on the internet; radicalisation and the internet; counter campaigns and approaches to disrupting internet radicalisation; and approaches to researching and understanding the role of the internet in radicalisation. The book brings together expertise from a wide range of disciplines and geographical regions including Europe, the US, Canada and Australia. These contributions explore the various roles played by the Internet in radicalisation; the reasons why terroristic propaganda may or may not influence others to engage in violence; the role of political conflict in online radicalisation; and the future of research into terrorism and the internet. By covering this broad range of topics, the volume will make an important and timely addition to the current collections on a growing and international subject. This book will be of much interest to students and researchers of cyber-security, internet politics, terrorism studies, media and communications studies, and International Relations. |
||||
![]() Violent Islamist Extremism, The Internet, and the Homegrown Terrorist Threat |
2008 | Lieberman, J. and Collins, s. | Report | |
This is the first in a series of reports by the Majority and Minority staff of the Senate Committee on Homeland Security and Governmental Affairs (Committee) on the threat of homegrown terrorism inspired by violent Islamist extremism. The Committee initiated an investigation into this threat during the 109th Congress under the leadership of Chairman Susan Collins (R-ME). | ||||
![]() Violent Radicalisation and Far-Right Extremism in Europe |
2018 | Kallis, A., Zeiger, S., and Öztürk, B. | Report | |
This volume has been made possible by the valuable collaboration between two esteemed organisations, namely SETA and Hedayah. Their collaboration was embodied in the form of a research project that aimed at shedding light on the burning issue of the violent radicalisation and extremism of individuals and groups that belong to - or at least are sympathetic to – the non-mainstream right currents in European countries. In this way, the current volume draws attention to the non-religious dimension of the phenomena of radicalisation and violent extremism and contributes to a relatively small body of works, as opposed to the dominant approach in the relevant literature which, for the most part, affiliates the phenomena with religious forces and elements. This approach is important since overemphasising one aspect of the phenomena runs the risk of blinding societies and policymakers to the other aspects and, therefore, making them less effective in terms of fending off the negative impacts of the phenomena. This work aims to be conducive to the due recognition of the overlooked aspects of these phenomena and hopefully serve as the first step towards tackling them. |
||||
![]() Virtual and Physical Realities: Violent Extremists’ Recruitment of Individuals Associated with the US Military |
2022 | Kim Cragin, R. | Article | |
In an era of social media, the lines between physical and virtual realities have become blurred. This is especially evident in recruitment activities by violent extremists. This article compares five case studies from the white power and militia movements to learn how extremists attract new members. The findings suggest that recruitment occurs through iterative interactions in virtual and physical spaces. These spaces are not isolated to a single movement; individuals instead move between them. The findings did not reveal a divergence between civilian vs military recruits. Nevertheless, more research is needed on the extent to which veterans recruit their peers. | ||||
![]() Virtual Disputes: The Use of the Internet for Terrorist Debates |
2007 | Weimann, G. | Journal | |
Terrorists are using the Internet for various purposes. Most of the attempts to monitor and study terrorist presence on the Net focused on the practical and communicative uses of this channel by modern terrorists. Yet, not much attention has been paid to the use of the Net as a medium for terrorist debates and disputes. This descriptive article presents this less noticed facet of terrorism on the Net by providing examples of virtual debates among and within terrorist groups. The analysis of the online controversies, disputes, and debates may say a lot about the mindsets of terrorists, their motivations, their doubts and fears. In many ways, it allows the researcher to open a window to a world about which so little is known. It may also serve counterterrorism: by learning the inner cleavages and debates one can find practical ways to support the voices against terror, to broaden gaps within these dangerous communities, and to channel the discourse to nonviolent forms of action. | ||||
![]() Virtual Jihadist Media: Function, Legitimacy, and Radicalising Efficacy. |
2007 | Awan, A. | Journal | |
Within the last 10 years, the internet has become the principal platform for the dissemination and mediation of the culture and ideology of jihadism. The exponential growth of jihadist fora, with their increasingly 'high-end' production values, sophisticated critiques of prevailing narratives and ostensive attempts at impartiality, do not occur in a vacuum. To a great extent they are reactive, their raison d'etre supplied by the mainstream media's perceived collusion with governmental (mis)information, or at least its uncritical acceptance. The jihadist media are far from alone in these critiques and there has been a growing convergence of interests with other non-mainstream and media outlets which are also challenging conventional modes of mediation. This article seeks to explore the functions of the new jihadist media, the ways in which it is granted legitimacy, and the compelling issue of radicalizing efficacy and recruitment. | ||||
![]() Virtual Plotters. Drones. Weaponized AI?: Violent Non-State Actors as Deadly Early Adopters |
2019 | Gartenstein-Ross, D., Shear, M. and Jones, D. | Report | |
Over the past decade, violent non-state actors’ (VNSAs) adoption of new technologies that can help their operations have tended to follow a recognizable general pattern, which this study dubs the VNSA technology adoption curve: As a consumer technology becomes widely available, VNSAs find ways to adapt it to their deadly purposes. This curve tends to progress in four stages: 1. Early Adoption – The VNSA tries to adopt a new technology, and disproportionately underperforms or fails in definable ways. 2. Iteration – The consumer technology that the VNSA is attempting to repurpose undergoes improvements driven by the companies that brought the technology to market. These improvements are designed to enhance consumers’ experience and the utility that consumers derive from the technology. The improvements help the intended end user, but also aid the VNSA, which iterates alongside the company. 3. Breakthrough – During this stage, the VNSA’s success rate with the new technology significantly improves. 4. Competition – Following the VNSA’s seemingly sudden success, technology companies, state actors, and other stakeholders develop countermeasures designed to mitigate the VNSA’s exploitation of the technology. The outcome of this phase is uncertain, as both the VNSA and its competitors enter relatively uncharted territory in the current technological environment. The authorities and VNSA will try to stay one step ahead of one another. This report begins by explaining the adoption curve, and more broadly the manner in which VNSAs engage in organizational learning. The report then details two critical case studies of past VNSA technological adoption to illustrate how the adoption curve works in practice, and to inform our analysis of VNSA technological adoptions that are likely in the future. |
||||
![]() Virtual Terrorism and the Internet E-Learning Options |
2007 | Cole, D.R. | Article | |
E-learning on the Internet is constituted by the options that this global technology gives the user. This article explores these options in terms of the lifestyle choices and decisions that the learner will make about the virtual worlds, textual meanings and cultural groupings that they will find as they learn online. This is a non-linear process that complicates dualistic approaches to e-learning, such as those which propose real/virtual distinctions. It also sets up the notion of virtual terrorism, which is explained in terms of the political forces that have come about due to e-learning. This article uses the philosophy of Gilles Deleuze as a best fit in order to understand the ways in which the e-learning of the Internet options is apparent in contemporary society. Deleuze made a division between unconscious learning and apprenticeship learning, that makes sense in terms of the virtual and cultural worlds that inform the lifestyle choices on the Net. This is because the navigation of virtual worlds involves imaginative processes that are at the same time an education of the senses of the type that the apprentice will receive. Furthermore, in his work with Félix Guattari, he developed the notion of the plane of immanence, which is used to pinpoint the presence of virtual terrorism in e-learning practices. |