Examining the Developmental Pathways of Online Posting Behavior in Violent Right-Wing Extremist Forums

ABSTRACT Many researchers, practitioners, and policymakers are concerned about online communities that are known to facilitate violent right-wing extremism, but little is empirically known about these digital spaces in general and the developmental posting behaviors that make up these spaces in particular. In this study, group-based trajectory modeling—derived from a criminal career paradigm—was used to identify posting trajectories found in the open-access sections of the Iron March and Fascist Forge forums, both of which have gained notoriety for their members’ online advocacy of violence and acts of violence carried out by them. Multinomial logistic regression and analysis of variance were then used to assess whether posters’ time of entry into the violent forums predicted trajectory group assignment. Overall, the results highlight a number of similarities and differences in posting behaviors within and across platforms, many of which may inform future risk factor frameworks used by law enforcement and intelligence agencies to identify credible threats online. We conclude with a discussion of the implications of this analysis, followed by a discussion of study limitations and avenues for future research.

[1]  Aleksandra Urman,et al.  What they do in the shadows: examining the far-right networks on Telegram , 2020, Information, Communication & Society.

[2]  Thomas W. Wojciechowski PTSD as a Risk Factor for the Development of Violence Among Juvenile Offenders: A Group-Based Trajectory Modeling Approach , 2020, Journal of interpersonal violence.

[3]  G. Weimann,et al.  Research Note: Spreading Hate on TikTok , 2020, Studies in Conflict & Terrorism.

[4]  Ryan Scrivens,et al.  Exploring Radical Right-Wing Posting Behaviors Online , 2020, Deviant Behavior.

[5]  Isabelle van der Vegt,et al.  The temporal evolution of a far-right forum , 2020, J. Comput. Soc. Sci..

[6]  Garth Davies,et al.  Measuring the Evolution of Radical Right-Wing Posting Behaviors Online , 2020, Deviant Behavior.

[7]  J. Horgan,et al.  Terrorist Transformations: The Link between Terrorist Roles and Terrorist Disengagement , 2020, Studies in Conflict & Terrorism.

[8]  Joshua D. Freilich,et al.  Examining the Online Expression of Ideology among Far-Right Extremist Forum Users , 2020, Terrorism and Political Violence.

[9]  M. Conway,et al.  Right-wing extremists’ persistent online presence: history and contemporary trends , 2019 .

[10]  Mark Dredze,et al.  Elites and foreign actors among the alt-right: The Gab social media platform , 2019, First Monday.

[11]  Garth Davies,et al.  Searching for Extremist Content Online Using the Dark Crawler and Sentiment Analysis , 2019, Methods of Criminology and Criminal Justice Research.

[12]  Jacob Ware Siege: The Atomwaffen Division and Rising Far-Right Terrorism in the United States , 2019 .

[13]  Gloria Mark,et al.  Detecting Potential Warning Behaviors of Ideological Radicalization in an Alt-Right Subreddit , 2019, ICWSM.

[14]  N. Lorenzo-Dus,et al.  Investigating Reclaim Australia and Britain First’s Use of Social Media: Developing a New Model of Imagined Political Communities Online , 2019 .

[15]  Matteo Vergani,et al.  Collective identity changes in far-right online communities: The role of offline intergroup conflict , 2019, New Media Soc..

[16]  M. Bouchard,et al.  The Emergence of Violent Narratives in the Life-Course Trajectories of Online Forum Participants , 2019, Journal of Qualitative Criminal Justice & Criminology.

[17]  Lasse Lindekilde,et al.  Peripheral and embedded: relational patterns of lone-actor terrorist radicalization , 2018, Dynamics of Asymmetric Conflict.

[18]  Savvas Zannettou,et al.  A Quantitative Approach to Understanding Online Antisemitism , 2018, ICWSM.

[19]  P. Gill,et al.  The multifinality of vulnerability indicators in lone-actor terrorism , 2018, Psychology, Crime & Law.

[20]  M. Bouchard,et al.  The 40 Members of the Toronto 18: Group Boundaries and the Analysis of Illicit Networks , 2018, Deviant Behavior.

[21]  Richard Frank,et al.  Changes and stabilities in the language of Islamic state magazines: a sentiment analysis , 2018 .

[22]  Gianluca Stringhini,et al.  What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber , 2018, WWW.

[23]  Mattias Ekman Anti-refugee Mobilization in Social Media: The Case of Soldiers of Odin , 2018 .

[24]  M. Strohmaier,et al.  When populists become popular: comparing Facebook use by the right-wing movement Pegida and German political parties , 2017 .

[25]  Jon R. Sorensen,et al.  Analyzing the Offending Activity of Inmates: Trajectories of Offense Seriousness, Escalation, and De-escalation , 2017 .

[26]  M. Conway Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research , 2017 .

[27]  J. Sarnecki,et al.  Intergenerational Transmission of Trajectories of Offending over Three Generations , 2016 .

[28]  Anura P. Jayasumana,et al.  Detecting radicalization trajectories using graph pattern matching algorithms , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).

[29]  Alessandro Flammini,et al.  Predicting online extremism, content adopters, and interaction reciprocity , 2016, SocInfo.

[30]  Akhlaq Ahmad The Ties that Bind and Blind: Embeddedness and Radicalisation of Youth in One Islamist Organisation in Pakistan , 2016 .

[31]  Roderick Graham Inter-ideological mingling: White extremist ideology entering the mainstream on Twitter , 2016 .

[32]  Joshua D. Freilich,et al.  A test of Sprinzak’s split delegitimization’s theory of the life course of far-right organizational behavior , 2015 .

[33]  M. Caiani,et al.  The transnationalization of the extreme right and the use of the Internet , 2015 .

[34]  Derek Greene,et al.  Down the (White) Rabbit Hole: The Extreme Right and Online Recommender Systems , 2015 .

[35]  Matthew Leighton Williams,et al.  Cyber Hate Speech on Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making , 2015 .

[36]  M. Zahn The Spectacular Few: Prisoner Radicalization and the Evolving Terrorist Threat , 2015 .

[37]  Mattias Ekman The dark side of online activism : Swedish right-wing extremist video activism on YouTube , 2014 .

[38]  Christopher W. Mullins,et al.  Awakenings: The Emergence of White Supremacist Ideologies , 2014 .

[39]  B. Ganor,et al.  Who matters online: measuring influence, evaluating content and countering violent extremism in online social networks , 2013 .

[40]  Benjamin Ducol Uncovering the French-speaking jihadisphere: An exploratory analysis , 2012 .

[41]  Nancy A. Morris,et al.  Estimating Country-Level Terrorism Trends Using Group-Based Trajectory Analyses: Latent Class Growth Analysis and General Mixture Modeling , 2012 .

[42]  Scott Helfstein,et al.  Covert or Convenient? Evolution of Terror Attack Networks , 2011 .

[43]  G. LaFree,et al.  Cross-National Patterns of Terrorism: Comparing Trajectories for Total, Attributed and Fatal Attacks, 1970-2006 , 2010 .

[44]  Magdalena Wojcieszak,et al.  ‘Don’t talk to me’: effects of ideologically homogeneous online groups and politically dissimilar offline ties on extremism , 2010, New Media Soc..

[45]  Priscilla Marie Meddaugh,et al.  Hate Speech or “Reasonable Racism?” The Other in Stormfront , 2009 .

[46]  Alan F. Smeaton,et al.  Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.

[47]  W. Koster,et al.  ‘STORMFRONT IS LIKE A SECOND HOME TO ME’ , 2008 .

[48]  Daniel S. Nagin,et al.  Advances in Group-Based Trajectory Modeling and an SAS Procedure for Estimating Them , 2007 .

[49]  Pete Simi,et al.  Free Spaces, Collective Identity, and the Persistence of U.S. White Power Activism , 2004 .

[50]  L. Back Aryans reading Adorno: cyber-culture and twenty-firstcentury racism , 2002 .

[51]  V. Burris,et al.  White Supremacist Networks on the Internet , 2000 .

[52]  D. Nagin,et al.  Trajectories of boys' physical aggression, opposition, and hyperactivity on the path to physically violent and nonviolent juvenile delinquency. , 1999, Child development.

[53]  T. Moffitt Adolescence-limited and life-course-persistent antisocial behavior: a developmental taxonomy. , 1993, Psychological review.

[54]  K. Land,et al.  AGE, CRIMINAL CAREERS, AND POPULATION HETEROGENEITY: SPECIFICATION AND ESTIMATION OF A NONPARAMETRIC, MIXED POISSON MODEL* , 1993 .

[55]  M. Conway,et al.  The Role of the Internet in Facilitating Violent Extremism and Terrorism: Suggestions for Progressing Research , 2019, The Palgrave Handbook of International Cybercrime and Cyberdeviance.

[56]  J. Junker Cyber Racism White Supremacy Online And The New Attack On Civil Rights , 2016 .

[57]  Bjørn Enge Bertelsen Tore Bjørgo: Strategies for preventing terrorism , 2015 .

[58]  Matteo Vergani,et al.  The evolution of the ISIS' language: a quantitative analysis of the language of the first year of Dabiq magazine , 2015 .

[59]  Francesca Polletta,et al.  Free spaces , 2012 .

[60]  Joseph C. Pitt,et al.  Don’t Talk to Me , 2011 .

[61]  H. Weaver,et al.  Anti-Defamation League , 2011 .

[62]  Sue-Ming Yang,et al.  Trajectories of terrorism Attack patterns of foreign groups that have targeted the United States , 1970 – 2004 , 2009 .

[63]  F. Buijs,et al.  Decline and disengagement: An analysis of processes of deradicalization , 2008 .

[64]  A. Blumstein Criminal careers and "career criminals" , 1986 .