In the face of content takedown and account suspensions on the biggest social media platforms, terrorist groups and their supporters have resorted to the use of file-sharing sites to ensure stable access to their propaganda. Amongst those to have employed this strategy are supporters of the so-called Islamic State (IS). Yet, whilst studies have repeatedly highlighted the key role that file-sharing platforms play in the dissemination of IS propaganda, there has been little investigation of the strategic considerations that may influence the choice of file-sharing sites from the many available. To address this, this report uses data gathered from 13 public IS Telegram channels over a 45-day period in July-September 2021 to assess three possib...
This paper presents the results of a conference focused on identifying good practices in using the ...
Since the inception of the internet as a communication tool with other functions, there has been inc...
The use of Web sites by terrorist groups has been evident since the mid 1990s. Security experts and ...
This report seeks to contribute to public and policy debates on the value of social media disruption...
This report seeks to contribute to public and policy debates on the value of social media disruption...
Between 2014 and 2017, the Islamic State maintained vibrant communities on a range of social media p...
In 2014, the Islamic State (IS) captured the world’s attention with the declaration of the Caliphate...
This article contributes to the growing literature on extremist and terrorist online ecologies and a...
Terrorists in cyberspace are increasingly utilizing social media to promote their ideologies, recrui...
Abstract: Contemporary and future advancements in innovative technologies have revolutionized the wa...
This research delves into the profound impact of Information and Communication Technology (ICT) on t...
Terrorism is designed to attract attention to the terrorist's cause and to spread fear and anxiety a...
Online radicalisation has been highlighted by policymakers, the media, and academics as a top securi...
Terrorism is designed to attract attention to the terrorist’s cause and to spread fear and anxiety a...
No previous organization has managed to execute such a widespread and sophisticated model for produc...
This paper presents the results of a conference focused on identifying good practices in using the ...
Since the inception of the internet as a communication tool with other functions, there has been inc...
The use of Web sites by terrorist groups has been evident since the mid 1990s. Security experts and ...
This report seeks to contribute to public and policy debates on the value of social media disruption...
This report seeks to contribute to public and policy debates on the value of social media disruption...
Between 2014 and 2017, the Islamic State maintained vibrant communities on a range of social media p...
In 2014, the Islamic State (IS) captured the world’s attention with the declaration of the Caliphate...
This article contributes to the growing literature on extremist and terrorist online ecologies and a...
Terrorists in cyberspace are increasingly utilizing social media to promote their ideologies, recrui...
Abstract: Contemporary and future advancements in innovative technologies have revolutionized the wa...
This research delves into the profound impact of Information and Communication Technology (ICT) on t...
Terrorism is designed to attract attention to the terrorist's cause and to spread fear and anxiety a...
Online radicalisation has been highlighted by policymakers, the media, and academics as a top securi...
Terrorism is designed to attract attention to the terrorist’s cause and to spread fear and anxiety a...
No previous organization has managed to execute such a widespread and sophisticated model for produc...
This paper presents the results of a conference focused on identifying good practices in using the ...
Since the inception of the internet as a communication tool with other functions, there has been inc...
The use of Web sites by terrorist groups has been evident since the mid 1990s. Security experts and ...