cyber terrorism

By Lorand Bodo Understanding terrorists’ use of the Internet is of paramount importance, especially in the context of today’s digital efforts to counter violent extremism. In particular, IS and its unprecedented, successful, multilingual and multimedia online campaigns have led to a surge of academic interest across the globe since 2014. Tech and social media companies…

By Peter King When the so-called Islamic State ramped up its media operation in the summer of 2014 to promote its territorial advances across Iraq and Syria, terrorism researchers who had been in the business for a decade or more were forced to take a step back and reconsider the effect the propaganda was having…

By Tiana Gaudette, Ryan Scrivens, and Garth Davies Since the advent of the Internet, far-right extremists – amongst other extremist movements – from across the globe have exploited online resources to build a transnational ‘virtual community’. The Internet is a fundamental medium that facilitates these radical communities, not only in ‘traditional’ hate sites such as Stormfront,…

By Haroro J. Ingram & Alastair Reed In Part I of this series, the authors presented the key findings of the CTSC Project’s latest publication titled “Islamic State’s English-language Magazines, 2014-17: Trends & Implications for CT-CVE Strategic Communications”. It began by highlighting the limitations inherent to studies of ISIS’s English language messaging before identifying the first…

By Ryan Scrivens and Garth Davies Violent extremists and those who subscribe to radical beliefs have left their digital footprints online since the inception of the World Wide Web. Notable examples include Anders Breivik, the Norwegian far-right terrorist convicted of killing 77 people in 2011, who was a registered member of a white supremacy web forum and had ties…

By Molly Land In the wake of the recent attacks in Manchester and London, British Prime Minister Theresa May has called on social media companies to eliminate “safe spaces” online for extremist ideology. Despite losing the majority in the recent election, she is moving forward with plans to regulate online communications, including in cooperation with…

This post is Part 2 of 2. Click here for Part 1 By Ahmet S. Yayla & Anne Speckhard Reaching out on to ISIS members via Telegram channels is a significant challenge for beginners. First of all, as the Telegram application is installed, the application copies all the contact numbers on one’s cell phone and connects the…

By Ahmet S. Yayla & Anne Speckhard ISIS has been the most successful terrorist organization in history using social media and the Internet for distributing its propaganda, dissemination of its news and more importantly to communicate. There is no doubt that the frequency and quality of ISIS posts on the Internet, including their videos, memes…

This post is Part 1 of 3. Background Previous research on terrorist use of the Internet generally discusses the opportunities offered by the Internet to terrorist groups. Such accounts implicitly view the interaction between the Internet and the user as uni-directional (i.e. exposure to Internet content may cause behaviour change). This lacks an acknowledgement that not…

The following is the first of three blog posts reporting on discussions at a workshop held in the Swiss Federal Institute of Technology, ETH Zurich, Switzerland on 25 August 2016 under the auspices of the UN Counter Terrorism Committee Executive Directorate (UNCTED) and the Swiss-based ICT4Peace Foundation and their joint project on ‘Private Sector Engagement…