Online radicalisation

By Mehwish Rani Foreign fighters became a subject of the global security debate when many young Europeans, male and female, started travelling to Syria to take part in the conflict there in 2014 and 2015. In Pakistan, the foreign fighter phenomenon has a longer history, having emerged in the 1980s during the Soviet-Afghan War. From…

By Paul Gill Reviews of the terrorism research literature regularly highlight the paucity of original data that inform analyses (Schmid and Jongman 1988; Silke 2001, 2004). In his most recent review of the literature, Silke (2013) noted: “[O]ne feels that a great deal more needs to be done before research is consistently building on past…

Deplatforming terrorists from messaging apps may damage existing networks, but those who remain often double down in their beliefs. By Amarnath Amarasingam Earlier this week, a fellow terrorism researcher and friend sent me a text which stated: “TamTam is amazing. I missed all the early ISIS stuff on Telegram. Now I feel like I was…

Par Laurence Bindner et Raphael Gluck, co-fondateurs de JOS Project Au cours de l’année 2018, alors que Daech recule de plus en plus sur le terrain, l’Etat islamique (EI) résiste sur un autre front, celui du djihad médiatique. Les nouvelles productions, en nombre certes réduit, continuent d’être diffusées sur le web, tandis que les archives…

By Linda Schlegel The rise of social media usage as an everyday activity for millions of citizens has been accompanied by a discussion about the dangers of this development. Echo chambers or “filter bubbles” are often mentioned in this regard.[1] Both concepts refer to the possibility that social media users only engage with content that…

Why global coding collaboration benefits everyone – including terrorists and violent extremists. Summary Much of the software that powers the internet and decentralised platforms currently depends on software that was developed under the “open-source model” – not to be confused with Open Source Intelligence (OSINT) – in which the source code is available to the general public for use or…

VOX-Pol is pleased to present a new, open access research article by former VOX-Pol Fellow Zoey Reeve. The study, titled Engaging with Online Extremist Material: Experimental Evidence was published in the journal Terrorism and Political Violence online on 24 July 2019. ABOUT THE ARTICLE Despite calls from governments to clamp down on violent extremist material in the online…

By Pamela Ligouri Bunker and Robert J. Bunker The 2019 Terrorism and Social Media (TASM) Conference took place on 25 and 26 June 2019 at Swansea University Bay Campus, Wales, United Kingdom. The conference was organised by Swansea University’s Hillary Rodham Clinton School of Law and its Cyber Threats Research Centre (CYTREC), with the support…

By Mike Caulfield Sam prides himself on questioning conventional wisdom and subjecting claims to intellectual scrutiny. For kids today, that means Googling stuff. One might think these searches would turn up a variety of perspectives, including at least a few compelling counterarguments. One would be wrong. The Google searches flooded his developing brain with endless…

By Laurence Bindner This post was originally published on our Blog in French in January 2019. It was cross-posted with permission from Ultima Ratio, IFRI’s security and defence Blog. This is its first time appearing in English. [Ed.] The appeal trial of the administrators of the Ansar al-Haqq forum got under way at the Paris Regional…