#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives

The rapid expansion of cyberspace has greatly facilitated the strategic shift of traditional crimes to online platforms. This has included malicious actors, such as extremist organisations, making use of online networks to disseminate propaganda and incite violence through radicalising individuals. In this article, we seek to advance current research by exploring how supporters of extremist organisations craft and disseminate their content, and how posts from counter-extremism agencies compare to them. In particular, this study will apply computational techniques to analyse the narratives of various pro-extremist and counter-extremist Twitter accounts, and investigate how the psychological motivation behind the messages compares between pro-ISIS and counter-extremism narratives. Our findings show that pro-extremist accounts often use different strategies to disseminate content (such as the types of hashtags used) when compared to counter-extremist accounts across different types of organisations, including accounts of governments and NGOs. Through this study, we provide unique insights into both extremist and counter-extremist narratives on social media platforms. Furthermore, we define several avenues for discussion regarding the extent to which counter-messaging may be effective at diminishing the online influence of extremist and other criminal organisations. Cybercrime, online radicalisation, counterextremism, social media analysis, Twitter, cyber-criminals.

[1]  Robyn Torok,et al.  Developing an explanatory model for the process of online radicalisation and terrorism , 2013, Security Informatics.

[2]  Media Sport,et al.  Online harms white paper , 2019 .

[3]  John Nerbonne,et al.  The Secret Life of Pronouns. What Our Words Say About Us , 2014, Lit. Linguistic Comput..

[4]  O. Ashour The De-Radicalization of Jihadists: Transforming Armed Islamist Movements , 2009 .

[5]  Matteo Vergani,et al.  The evolution of the ISIS' language: a quantitative analysis of the language of the first year of Dabiq magazine , 2015 .

[6]  Rolf Wynn,et al.  Language of motivation and emotion in an internet support group for smoking cessation: explorative use of automated content analysis to measure regulatory focus , 2014, Psychology research and behavior management.

[7]  E. Higgins,et al.  Beyond pleasure and pain. , 1997, The American psychologist.

[8]  Stefano Maria Iacus,et al.  ISIS at Its Apogee: The Arabic Discourse on Twitter and What We Can Learn From That About ISIS Support and Foreign Fighters , 2018, SAGE Open.

[9]  Karen J. Greenberg Counter-Radicalization via the Internet , 2016 .

[10]  Ryan L. Boyd,et al.  The Development and Psychometric Properties of LIWC2015 , 2015 .

[11]  Yael-Janette Zupnik,et al.  A pragmatic analysis of the use of person deixis in political discourse , 1994 .

[12]  A. Rothman,et al.  Getting there and hanging on: the effect of regulatory focus on performance in smoking and weight loss interventions. , 2008, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[13]  Laura G. E. Smith,et al.  Islamic State’s Propaganda and Social Media , 2020 .

[14]  L. Vaughn Contents of Hopes and Duties: A Linguistic Analysis , 2018, Front. Psychol..

[15]  Andrea J. Cullen,et al.  A preliminary radicalisation framework based on social engineering techniques , 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA).

[16]  Carl Dean Meyer,et al.  A Case Study in Text Mining: Interpreting Twitter Data From World Cup Tweets , 2014, ArXiv.

[17]  Jethro Tan,et al.  Understanding the Psychology of Persuasive Violent Extremist Online Platforms , 2016 .

[18]  Harith Alani,et al.  Understanding the Roots of Radicalisation on Twitter , 2018, WebSci.

[19]  Michael Goldsmith,et al.  Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter , 2019, 2019 IEEE International Conference on Intelligence and Security Informatics (ISI).

[20]  John-Charles Wilson Politically Speaking: The Pragmatic Analysis of Political Language , 1990 .

[21]  Harith Alani,et al.  Contextual Semantics for Radicalisation Detection on Twitter , 2018, SW4SG@ISWC.

[22]  Victor Ho STRATEGIC USE OF NOUNS AND PRONOUNS IN PUBLIC DISCOURSE: THE CASE OF THE FINE-TUNING OF THE MEDIUM OF INSTRUCTION POLICY IN HONG KONG , 2013 .

[23]  Luke Bertram,et al.  Terrorism, the Internet and the Social Media Advantage: Exploring how terrorist organizations exploit aspects of the internet, social media and how these same platforms could be used to counter-violent extremism. , 2016 .

[24]  G. Bente,et al.  Dying the right-way? Interest in and perceived persuasiveness of parochial extremist propaganda increases after mortality salience , 2015, Front. Psychol..

[25]  Garth Davies,et al.  TOWARD A FRAMEWORK UNDERSTANDING OF ONLINE PROGRAMS FOR COUNTERING VIOLENT EXTREMISM , 2016 .

[26]  Omar Ashour,et al.  Online De-Radicalization? Countering Violent Extremist Narratives: Message, Messenger and Media Strategy , 2011 .