The online behaviors of Islamic state terrorists in the United States

被引:9
作者
Whittaker, Joe [1 ]
机构
[1] Swansea Univ, Coll Law, Dept Criminol, Richard Price Bldg, Swansea SA2 8PP, W Glam, Wales
关键词
Extremism; online radicalization; terrorism; RADICALIZATION; STRATEGIES; INTERNET; VIOLENCE;
D O I
10.1111/1745-9133.12537
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Research Summary This study offers an empirical insight into terrorists' use of the Internet. Although criminology has previously been quiet on this topic, behavior-based studies can aid in understanding the interactions between terrorists and their environments. Using a database of 231 US-based Islamic State terrorists, four important findings are offered: (1) This cohort utilized the Internet heavily for the purposes of both networking with co-ideologues and learning about their intended activity. (2) There is little reason to believe that these online interactions are replacing offline ones, as has previously been suggested. Rather, terrorists tend to operate in both domains. (3) Online activity seems to be similar across the sample, regardless of the number of co-offenders or the sophistication of attack. (4) There is reason to believe that using the Internet may be an impediment to terrorists' success. Policy Implications The findings of this study have two important policy implications. First, it is vital to understand the multiplicity of environments in which terrorists inhabit. Policy makers have tended to emphasize the online domain as particularly dangerous and ripe for exploitation. While this is understandable from one perspective, simplistic and monocausal explanations for radicalization must be avoided. Terrorists operate in both the online and offline domain and there is little reason to believe that the former is replacing the latter. The two may offer different criminogenic inducements to would-be terrorists, and at times they may be inseparably intertwined. Second, when policy responses do focus on online interventions, it is vital to understand the unintended consequences. This is particularly the case for content removal, which may inadvertently be aiding terrorists and hampering law enforcement investigations.
引用
收藏
页码:177 / 203
页数:27
相关论文
共 104 条
[1]   Video games, terrorism, and ISIS's Jihad 3.0 [J].
Al-Rawi, Ahmed .
TERRORISM AND POLITICAL VIOLENCE, 2018, 30 (04) :740-760
[2]  
Alexander A., 2016, PROGRAM EXTREMISM
[3]  
Alexander A., 2019, CTC SENTINEL, V12, P22
[4]  
[Anonymous], 2014, REV EU STRAT COMB RA
[5]  
[Anonymous], 2015, Foreign Fighters-an Updated Assessment of the Flow of Foreign Fighters Into Syria and Iraq
[6]  
[Anonymous], 2018, ABC News, V12 Ekim
[7]  
Bakker E., 2006, JIHADI TERRORISTS EU
[8]  
Basra R., 2016, Perspectives on Terrorism, V10
[9]   Exploring the "Demand Side" of Online Radicalization: Evidence from the Canadian Context [J].
Bastug, Mehmet F. ;
Douai, Aziz ;
Akca, Davut .
STUDIES IN CONFLICT & TERRORISM, 2020, 43 (07) :616-637
[10]  
Baugut Philip, 2020, Information, Communication & Society, V23, P1570, DOI 10.1080/1369118X.2019.1594333