By Dimitrios Kalantzis Less than 24 hours after John Earnest opened fire at a San Diego-area synagogue killing one person and injuring three others, the focus of the developing story shifted to his digital life. News outlets reported that Earnest “posted an anti-Jewish screed online about an hour before the attack” and “praised the suspects…
Online radicalisation
By Suzanne Mos The Internet is a good place to get a sense of what topics certain groups or movements deem important. In this Blog post, I present the findings of comparative mixed methods research addressing the question ‘How does the use of Twitter by far-right political parties differ from right-wing extremist movements in terms…
By Louise Laing and Maura Conway One of the questions we get asked quite often at VOX-Pol—by not just PhD students and early career researchers, but established scholars too and, in fact, that we quite often ask ourselves! — is ‘what are appropriate academic journals for publication of research on online extremism and terrorism?’ A generic…
By Dr. William Allchorn In late January this year, the outgoing director general of the UK’s domestic intelligence agency, Sir Andrew Parker, suggested that technology was one of the biggest challenges facing the UK’s Security Services. Sir Andrew said he was particularly interested in artificial intelligence “because of our need to be able to make sense of…
By Nery Ramati The need to develop legal tools in order to cope with the dangers of online extremism and terrorism has been an issue that has kept legislators, government officials, and security forces around the globe very busy in recent years. In liberal democracies, the legal challenges are intensified due to the obvious dangers…
By Mehwish Rani Foreign fighters became a subject of the global security debate when many young Europeans, male and female, started travelling to Syria to take part in the conflict there in 2014 and 2015. In Pakistan, the foreign fighter phenomenon has a longer history, having emerged in the 1980s during the Soviet-Afghan War. From…
By Paul Gill Reviews of the terrorism research literature regularly highlight the paucity of original data that inform analyses (Schmid and Jongman 1988; Silke 2001, 2004). In his most recent review of the literature, Silke (2013) noted: “[O]ne feels that a great deal more needs to be done before research is consistently building on past…
Deplatforming terrorists from messaging apps may damage existing networks, but those who remain often double down in their beliefs. By Amarnath Amarasingam Earlier this week, a fellow terrorism researcher and friend sent me a text which stated: “TamTam is amazing. I missed all the early ISIS stuff on Telegram. Now I feel like I was…
Par Laurence Bindner et Raphael Gluck, co-fondateurs de JOS Project Au cours de l’année 2018, alors que Daech recule de plus en plus sur le terrain, l’Etat islamique (EI) résiste sur un autre front, celui du djihad médiatique. Les nouvelles productions, en nombre certes réduit, continuent d’être diffusées sur le web, tandis que les archives…
By Linda Schlegel The rise of social media usage as an everyday activity for millions of citizens has been accompanied by a discussion about the dangers of this development. Echo chambers or “filter bubbles” are often mentioned in this regard.[1] Both concepts refer to the possibility that social media users only engage with content that…