Technology
Technology
Sentiment-Based Identification of Radical Authors (SIRA)
Abstract: As violent extremists continue to surface in online discussion forums, counter-extremism agencies search for new and innovative ways of uncovering their digital indicators. Using a sample of approximately 1 – …
Visible War: Information War, Surveillance and Speed
Liking and hyperlinking: Community detection in online child exploitation networks
The Dallas Patrol Management Experiment: Can AVL Technologies be Used to Harness Unallocated Patrol Time For Crime Prevention?
‘Questions about Dawlah. DM me, plz.’ The Sock Puppet Problem in Online Terrorism Research
Identifying Digital Threats in a Hacker Web Forum
Sentiment Crawling: Extremist Content Collection through a Sentiment Analysis Guided Web-Crawler
This is Not Your Mother’s Terrorism: Social Media, Online Radicalization and the Practice of Political Jamming
Abstract: It is commonly recognized that social media presents vast new opportunities for terrorist groups seeking to radicalize audiences. However, few scholars have studied the actual mechanisms by which radicalizing – …
#IS_Fangirl: Exploring a New Role for Women in Terrorism
Abstract: In this paper we present initial results from an ongoing study of women affiliated with pro-IS networks on Twitter and other social media. Our particular focus is on 20 – …
The ecology of trust among hackers
Abstract: Malicious hackers profit from the division of labour among highly skilled associates. However, duplicity and betrayal form an intrinsic part of their daily operations. This article examines how a – …
Comment le jihadisme est-il devenu numérique ? Évolutions, tendances et ripostes,
Abstract: Twitter constitue un terrain de jeu de prédilection pour le groupe État islamique (EI) : espace de médiatisation, de revendication et de mobilisation. Depuis sa matrice de naissance afghane – …
Toward a Framework Understanding of Online Programs for Countering Violent Extremism
Abstract: There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means – …
Voices of the Caucasus Emirate: Mapping and analyzing North Caucasus insurgency websites.
Abstract: This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. Using a mixed methods research design that – …
‘Just Being Mean to Somebody Isn’t a Police Matter’: Police Perspectives on Policing Cyber-bullying
Abstract: Increasing public awareness of cyberbullying, coupled with several highly publicized youth suicides linked to electronic bullying, have led lawmakers and politicians to consider new criminal legislation specifically related to – …
Spreading the message digitally: A look into extremist organizations’ use of the Internet
Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups – …
A Radical Sociability: In Defense of an Online/Offline Multidimensional Approach to Radicalisation
TSAS WP16-05: Assessment of the state of knowledge: Connections between research on the social psychology of the Internet and violent extremism
This paper seeks to answer the question: How does social psychology contribute to our understanding of the link between the Internet and violent extremism?
Crime Facilitation Purposes of Social Networking Sites: A Review and Analysis of the Cyberbanging Phenomenon
Framing the Online Women’s Movements in the Arab world
TSAS WP14-09: A Systematic Approach to Develop a Computational Framework for Counter-terrorism and Public Safety
Can agent-based modelling and virtual environment technologies be used to create a decision support, response planning and risk assessment system for emergence preparedness?
Cyber Warriors in the Middle East: The Case of the Syrian Electronic Army
This paper investigates the online hacking group, the Syrian Electronic Army (SEA), and examines its goals. (Source: Publication).
The Social Network of Hackers
Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical – …
We Don’t Have These Laser Beams and Stuff Like That’: Police Investigations as Low-Tech Work in a High-Tech World
The Proliferation of Cyber Security Strategies and Their Implications for Privacy
The commercial internet has now been in existence for almost fifteen years, but it seems that Western government have barely realized the extent to which this technology is redefining security – …
New Terrorism and New Media
This report examines how Al-Qaeda, its affiliates and other terrorist organizations have moved their online presence to YouTube, Twitter, Facebook, Instagram and other social media outlets, posing challenges to counter-terrorism – …
Voices of the ‘‘Caucasus Emirate’’: Mapping and Analyzing North Caucasus Insurgency Websites
This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. (Source: Publication).
TSAS WP14-01: Researching Terrorism and Counter-Terrorism through a Network Lens
In this paper, we argue that integrating network concepts and network methods to the study of terrorism and counter-terrorism are central ingredients in bringing the field forward from theoretical, empirical, – …
The Diffuse Border: Intelligence-Sharing, Control and Confinement along Canada’s Smart Border
Taking its cue from Deleuze’s reading of Foucault’s notion of apparatus (dispositif), this article explores the assemblage of mechanisms, institutions, discourses and practices that came to be conceptualized as a – …
Radicalization – A Guide for the Perplexed
The RCMP, National Security Criminal Investigations Program provides an introduction to terrorist radicalization in Canada, the challenges and how it’s being addressed.
Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor
It is now widely understood that extremists use the internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the terrorism and Extremism – …
A Vision of Crimes in the Future
How Cyberattacks Threaten Real-World Peace
FBI, Here I am!
The Security Mirage
Informing (In)Stability: The Security Implications of a Shifting News and Media Environment
This 60-page booklet contains highlights from the February 21-22 2012 conference that was held by the Canadian Security Intelligence Service in collaboration with Policy Horizons Canada.
Contested Topologies of UK Counterterrorist Surveillance: the Rise and Fall of Project Champion
This article empirically analyses the provenance, application and abandonment of Project Champion, a scheme designed to encircle two Birmingham neighbourhoods with surveillance cameras. (Source: Publication).
Assessing Cyber Threats to Canadian Infrastructure
The purpose of this study is threefold: (1) to examine the cyber threat environment confronting Canada’s Critical National Infrastructure (CNI), with a particular focus on four key sectors and their – …
‘Bomb-Making for Beginners’: Inside al Al-Qaeda E-Learning Course
This study explores how terrorists utilise the Internet to learn bomb-making skills. Unlike previous studies, it does not focus on assessing the quality of online bomb recipes. (Source: Publication).