By Laurence Bindner and Raphael Gluck On April 27 2018, a Europol press release announced that new action was underway to disrupt ISIS’[1] ability to spread its propaganda online. The press release referred to an operation that commenced two days earlier, which was led by the Belgian Federal Prosecutor’s Office and coordinated with six European countries…
ISIS
By Loránd Bodó Understanding terrorists’ use of the Internet is of paramount importance, especially in the context of today’s digital efforts to counter violent extremism. In particular, IS and its unprecedented, successful, multilingual and multimedia online campaigns have led to a surge of academic interest across the globe since 2014. Tech and social media companies…
Earlier this month (9 Nov.), Hassan Khalif Shire Ali (30) carried out a terrorist attack on Bourke Street mall in Melbourne, Australia in which he stabbed one person to death and injured two others. Attention immediately turned to whether Shire Ali was in direct–potemtially online–contact with so-called ‘Islamic State’ (IS). The Australian Federal Police later said…
By Jennifer Yang Hui In the wake of high-profile terrorist activities in Indonesia, social media’s role in violent extremism is once again under scrutiny. The 36-hour standoff on 8 May 2018 between inmates linked to the so-called Islamic State (IS) and prison officers at Mako Brimob (the detention centre of the Indonesian National Police Mobile…
By Ahmad Helmi Bin Mohamad Hasbi and Remy Mahzam Synopsis Given their transaction anonymity and user-friendliness, cryptocurrencies appeal to extremist groups as they offer a viable alternative to the mainstream financial system and fiat money which are perceived as ‘kafir’ (infidel) currencies. The threat of cyber-driven terrorist financing is expected to grow. Commentary Bitcoins and…
By Linda Schlegel & Till Baaken In recent years, radicalisation, its causes and facilitating conditions as well as possible counter-strategies have been widely discussed within the academic community, among practitioners, and by politicians. Today, there are a variety of radicalisation models available in order to facilitate our understanding of this phenomenon and the empirical evidence is progressively…
By Sam Jackson For years, researchers studying online political extremism have used computational tools to collect large amounts of data from social media, most often from Twitter. Two main logics guide these data collections: they can be built around users (e.g., collecting all tweets sent by given accounts) or they can be built around vocabulary (e.g.,…
By Mehwish Rani Daesh and Tehrik-e-Taliban Pakistan (TTP) are two competitor militant organisations in Pakistan. Although, Daesh has no organisational presence in the country, small groups inspired by it have carried out attacks in the name of the organisation. Both organisations publish propaganda magazines to, amongst other things, gain new recruits. While Daesh published approximately…
VOX-Pol has released its latest report in the VOX-Pol publication series, titled A Tale Of Two Caliphates: Comparing the Islamic State’s Internal and External Messaging Priorities, co-authored by Dr. Dounia Mahlouly and Charlie Winter. About the Report In recent years, the media department of the self-proclaimed Islamic State has proven itself to be highly adept at…
By Anne Speckhard, Ardian Shajkovci & Lorand Bodo This blog post synopsises a study that attempted to intervene with over fifty English-speaking Facebook accounts endorsing, promoting, and following ISIS. Methodology and Research Design For this study, several anonymized Facebook accounts were used to identify English-speaking radicalized Facebook profiles as our target for an online counter-narrative intervention.…