Technology

TSAS WP17-05: ‘Analysis of Low-Tech Terrorism in Western Democracies: Attacks with Vehicles, Blades and Incendiary Devices’

Year: 2017
Description:

This study explores the issue of low-tech terrorism in Canada, France, Germany, the United States and the United Kingdom from 2001 through 2017. As a descriptive analysis, this study reveals – …

Sentiment-Based Identification of Radical Authors (SIRA)

Year: 2015
Description:

Abstract: As violent extremists continue to surface in online discussion forums, counter-extremism agencies search for new and innovative ways of uncovering their digital indicators. Using a sample of approximately 1 – …

Visible War: Information War, Surveillance and Speed

Year: 2006

Liking and hyperlinking: Community detection in online child exploitation networks

Year: 2016

Assessing the Validity of Automated Webcrawlers as Data Collection Tools to Investigate Online Child Sexual Exploitation

Year: 2015
Subjects: Crime, Webcrawler

The Dallas Patrol Management Experiment: Can AVL Technologies be Used to Harness Unallocated Patrol Time For Crime Prevention?

Year: 2015

‘Questions about Dawlah. DM me, plz.’ The Sock Puppet Problem in Online Terrorism Research

Year: 2015

Identifying Digital Threats in a Hacker Web Forum

Year: 2015

Sentiment Crawling: Extremist Content Collection through a Sentiment Analysis Guided Web-Crawler

Author(s): Frank– R. | Mei– J.
Year: 2015

This is Not Your Mother’s Terrorism: Social Media, Online Radicalization and the Practice of Political Jamming

Author(s): Huey-- Laura
Year: 2015
Description:

Abstract: It is commonly recognized that social media presents vast new opportunities for terrorist groups seeking to radicalize audiences. However, few scholars have studied the actual mechanisms by which radicalizing – …

#IS_Fangirl: Exploring a New Role for Women in Terrorism

Year: 2016
Description:

Abstract: In this paper we present initial results from an ongoing study of women affiliated with pro-IS networks on Twitter and other social media. Our particular focus is on 20 – …

The ecology of trust among hackers

Year: 2016
Description:

Abstract: Malicious hackers profit from the division of labour among highly skilled associates. However, duplicity and betrayal form an intrinsic part of their daily operations. This article examines how a – …

Comment le jihadisme est-il devenu numérique ? Évolutions, tendances et ripostes,

Author(s): Ducol-- Benjamin
Year: 2015
Description:

Abstract: Twitter constitue un terrain de jeu de prédilection pour le groupe État islamique (EI) : espace de médiatisation, de revendication et de mobilisation. Depuis sa matrice de naissance afghane – …

Toward a Framework Understanding of Online Programs for Countering Violent Extremism

Year: 2016
Description:

Abstract: There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means – …

Voices of the Caucasus Emirate: Mapping and analyzing North Caucasus insurgency websites.

Geography: Eastern Europe
Year: 2015
Description:

Abstract: This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. Using a mixed methods research design that – …

‘Just Being Mean to Somebody Isn’t a Police Matter’: Police Perspectives on Policing Cyber-bullying

Geography: Canada
Year: 2015
Description:

Abstract: Increasing public awareness of cyberbullying, coupled with several highly publicized youth suicides linked to electronic bullying, have led lawmakers and politicians to consider new criminal legislation specifically related to – …

Spreading the message digitally: A look into extremist organizations’ use of the Internet

Year: 2015
Description:

Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups – …

A Radical Sociability: In Defense of an Online/Offline Multidimensional Approach to Radicalisation

Publisher: Routledge
Year: 2015

TSAS WP16-05: Assessment of the state of knowledge: Connections between research on the social psychology of the Internet and violent extremism

Publisher: TSAS
Description:

This paper seeks to answer the question: How does social psychology contribute to our understanding of the link between the Internet and violent extremism?

Crime Facilitation Purposes of Social Networking Sites: A Review and Analysis of the Cyberbanging Phenomenon

Year: 2013

Technologies et luttes d’influence chez les professionnels de la sécurité frontalière

Year: 2014

Framing the Online Women’s Movements in the Arab world

Author(s): Al-Rawi– Ahmed
Publisher: Routledge
Year: 2015

TSAS WP14-09: A Systematic Approach to Develop a Computational Framework for Counter-terrorism and Public Safety

Year: 2014
Description:

Can agent-based modelling and virtual environment technologies be used to create a decision support, response planning and risk assessment system for emergence preparedness?

Cyber Warriors in the Middle East: The Case of the Syrian Electronic Army

Author(s): Al-Rawi-- Ahmed
Publisher: Elsevier
Year: 2013
Description:

This paper investigates the online hacking group, the Syrian Electronic Army (SEA), and examines its goals. (Source: Publication).

The Social Network of Hackers

Year: 2012
Description:

Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical – …

We Don’t Have These Laser Beams and Stuff Like That’: Police Investigations as Low-Tech Work in a High-Tech World

Publisher: Routledge
Year: 2012

The Proliferation of Cyber Security Strategies and Their Implications for Privacy

Author(s): Dupont-- Benoit
Year: 2013
Description:

The commercial internet has now been in existence for almost fifteen years, but it seems that Western government have barely realized the extent to which this technology is redefining security – …

New Terrorism and New Media

Author(s): Gabriel Weimann
Year: 2014
Description:

This report examines how Al-Qaeda, its affiliates and other terrorist organizations have moved their online presence to YouTube, Twitter, Facebook, Instagram and other social media outlets, posing challenges to counter-terrorism – …

Voices of the ‘‘Caucasus Emirate’’: Mapping and Analyzing North Caucasus Insurgency Websites

Year: 2014
Description:

This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. (Source: Publication).

TSAS WP14-01: Researching Terrorism and Counter-Terrorism through a Network Lens

Publisher: TSAS
Year: 2014
Description:

In this paper, we argue that integrating network concepts and network methods to the study of terrorism and counter-terrorism are central ingredients in bringing the field forward from theoretical, empirical, – …

The Diffuse Border: Intelligence-Sharing, Control and Confinement along Canada’s Smart Border

Geography: Canada, North America
Year: 2008
Description:

Taking its cue from Deleuze’s reading of Foucault’s notion of apparatus (dispositif), this article explores the assemblage of mechanisms, institutions, discourses and practices that came to be conceptualized as a – …

Radicalization – A Guide for the Perplexed

Geography: Canada, North America
Year: 2009
Description:

The RCMP, National Security Criminal Investigations Program provides an introduction to terrorist radicalization in Canada, the challenges and how it’s being addressed.

Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor

Year: 2014
Description:

It is now widely understood that extremists use the internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the terrorism and Extremism – …

A Vision of Crimes in the Future

Author(s): Goodman– Marc
Publisher: TED Talk
Year: 2012

How Cyberattacks Threaten Real-World Peace

Publisher: TED Talk
Year: 2011

FBI, Here I am!

Author(s): Elahi– Hasan
Publisher: TED Talk
Year: 2011

The Security Mirage

Publisher: TED Talk
Year: 2011

Informing (In)Stability: The Security Implications of a Shifting News and Media Environment

Publisher: CSIS
Geography: Canada, North America
Year: 2012
Description:

This 60-page booklet contains highlights from the February 21-22 2012 conference that was held by the Canadian Security Intelligence Service in collaboration with Policy Horizons Canada.

Contested Topologies of UK Counterterrorist Surveillance: the Rise and Fall of Project Champion

Author(s): Fussey-- Pete
Year: 2013
Description:

This article empirically analyses the provenance, application and abandonment of Project Champion, a scheme designed to encircle two Birmingham neighbourhoods with surveillance cameras. (Source: Publication).

Assessing Cyber Threats to Canadian Infrastructure

Publisher: CSIS
Geography: Canada, North America
Year: 2012
Description:

The purpose of this study is threefold: (1) to examine the cyber threat environment confronting Canada’s Critical National Infrastructure (CNI), with a particular focus on four key sectors and their – …

‘Bomb-Making for Beginners’: Inside al Al-Qaeda E-Learning Course

Author(s): Stenersen-- Anne
Year: 2013
Description:

This study explores how terrorists utilise the Internet to learn bomb-making skills. Unlike previous studies, it does not focus on assessing the quality of online bomb recipes. (Source: Publication).