Srl | Item |
1 |
ID:
193086
|
|
|
Summary/Abstract |
The present article contends that terrorist activism on the Internet is determined by the technical configuration and ease of use of the tool. Engagement in Internet activities considered criminal offenses is not only explained by a progression in the level of radicalization of the individual. Rather, the type of barriers to entry which they must overcome plays a decisive role in the decision. The article classifies the various Internet spaces featuring terrorist content under the categories of “hard platforms” and “friendly platforms”. This differentiation will enable us to identify how the barriers to entry to such activism have evolved over the last two decades and how this evolution has been responsible for different levels of terrorist mobilization in cyberspace. The investigation focuses on jihadist terrorism and uses the antiterrorist operations carried out in Spain during the period 2001-2020 as a case study.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
147597
|
|
|
Summary/Abstract |
This article offers a descriptive analysis of the propaganda activities of Al Qaeda in the Islamic Maghreb on Internet social media. It examines the group's propaganda actions from its creation in 1998 until the end of 2015 and argues that the use of social media, Twitter in particular, has failed to offer any real remedy to its mediocre propaganda actions. During the period in which its Twitter profiles were active, the organization continued to manifest the same problems, including a shortage of qualified human resources and poor internal coordination, which had prevented it from engaging in efficient propaganda activity previously. The study of the social media experience of the group offers further evidence of the vulnerabilities of this Maghrebi jihadist organization.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
148925
|
|
|
Summary/Abstract |
This article offers a descriptive analysis of the private interactions which took place on the jihadist Internet forum known as Ansar Al Mujahideen between 2008 and 2010. The analysis of the non-visible part of the forum contributes to a more robust underpinning of some current assumptions regarding the jihadist Internet infrastructure and its hierarchical dependence on, and subordination to, formal terrorist organisations and charismatic leaders. In addition, it offers a new perspective on other aspects such as the many conflicts and rivalries between the different forums, the operational constraints caused by the lack of human and material resources, and the considerable vulnerability of the forums to cyber-sabotage and infiltration attempts.
|
|
|
|
|
|
|
|
|
|