"This report focuses on the interactional dynamics between anti-Muslim extremists and radical Islamists in Germany and beyond. It reveals ideological underpinnings, approaches to mobilization and communication patterns, which all prove to be analogous on both sides, and it places emphasis on the rec
...
iprocity of hate that may serve to intensify processes of individual and group radicalization. Our study presents the first systematic analysis of the interplay between both forms of extremism that plays out on different places on the Internet. It provides direct evidence showing that Islamist and far-right movements converge at different levels and mutually amplify one another. The analysis focuses on measuring the online interaction between extremist content, individuals and events. Overall, over 10,000 Islamist and far-right Facebook posts and over one million German anti-Muslim tweets between 1 January 2013 and 30 November 2017 were analyzed for this study. Additionally, we conducted three months of ethnographic research into encrypted pro-IS and pro-Al-Qaeda groups on Telegram as well as into far-right chat groups.
Key Findings
Radical Islamism and anti-Muslim racism, which manifest themselves in the form of far-right extremism and right-wing populism exhibit a symbiotic relationship. In the context of glocal interaction patterns, the far right operates as a national sphere of resonance for international jihadism. Both negate and dismantle basic democratic values such as the inviolability of human dignity and religious freedom. What’s more, racism against Muslims paves the way for radicalization through Islamic fundamentalists. We identified three key patterns that reveal common worldviews and argumentative resemblance: First, the demonization of enemies based on a clear distinction between friend and foe. Second, the victimization of one’s own group as both sides take advantage of the alleged discrimination of their own group and the constructed dominance of the other. Third, conspiracy, which is the basic explanation provided for why the respective milieus do not share their exclusionary claim to truth. The alleged systematic blindness caused by the Jews or fake news are needed to balance the dissonance between claims and reality as well as to contribute to demonizing other groups." (Executive summary)
more
"This handbook attempts to fill the gap in empirical scholarship of media and communication research in Africa, from an Africanist perspective. The collection draws on expert knowledge of key media and communication scholars in Africa and the diaspora, offering a counter-narrative to existing Wester
...
n and Eurocentric discourses of knowledge-production. As the decolonial turn takes centre stage across Africa, this collection further rethinks media and communication research in a post-colonial setting and provides empirical evidence as to why some of the methods conceptualised in Europe will not work in Africa. The result is a thorough appraisal of the current threats, challenges and opportunities facing the discipline on the continent." (Publisher description)
more
"This book offers fresh insights on digital activism and cyberconflicts through a comparison of sociopolitical and ethnoreligious movements in Nigeria. Occupy Nigeria, Boko Haram and The Movement for the Emancipation of the Niger Delta (MEND) highlight the digital and organizational aspects of confl
...
ict mobilization in contemporary Nigeria." (Publisher description)
more
"This guide is driven by the need not to add to the library of information on violent extremism but to underscore a message often missed: to reach young people effectively, we must respect their ability to grasp the reality of injustice, intolerance, and inequity [...] we found that three key messag
...
es emerged from our analysis of all Youth Contributor submissions. For each key message, we have identified a corresponding framework to guide policy support to empower stakeholders.
1. Peace, empathy, and compassion cannot be taught. These are skills that are only fully realized through experiential learning and lived experience.
Policy Action: Provide opportunities for exchange and interaction and create conducive environments in which young people can develop and practice these skills.
2. Start now. Stakeholders can take immediate and important actions, even small actions, to support a culture that prevents violent extremism. No one needs to wait for permission or a comprehensive set of instructions.
Policy Action: Provide resources such as technical support, financing, guidance, and networks to empower actors.
3. This is a long, slow process. Preventing violent extremism requires the development of a resilient culture. It is the work of expanding opportunity. All stakeholders can play critical roles in making this culture a reality." (Preface, page 10-11)
more
"This preliminary technical report examines the relationship between media uses of Lebanese youth and their potential attraction to extremism—broadly conceived. The study focuses on school students aged 14 to 18 and their teachers. It is based on 16 focus groups distributed across the country and
...
covers a total of 80 students and 80 teachers. To research youth’s media uses and their understanding of media and digital literacy, the study examines their use of various media tools: traditional and digital media, as well as social media, games, and smartphones. The qualitative study reveals various types of extremist inclinations among youth, including religious/sectarian, political, familial/tribal, and racial extremism. Some patterns of extremism may be linked to students’ uses of the Internet and social media, as a catalyst or trigger for action. The widespread use of chatting applications shows a potential risk for connection with extremist groups, while the use of violent video games demonstrates a potential link to students’ violent reactions in their communities, as the examples in the report show. Consistently, participating students are especially drawn to violent, horror and action films. The study also reveals that students are less interested in watching television, which has declined in favor of new media platforms. When it comes to policies regarding media uses that aim to protect students from extremism, few schools have them, yet all except one school teacher expressed concerns about their students receiving media messages that incite violent behavior and lead to recruitment by extremist groups. The teachers expressed fear that their students may be potentially encouraged through new media to engage in risky and violent acts, including extremism, terrorism, early sexual behavior, and drug abuse. Despite this fear, findings show that extremism among the young students was the most limited in schools where clear policies regulate media uses, curricula include some digital and media literacy instruction, and teachers follow up with students when they detect signs of extremist behaviors." (Abstract)
more
"In this chapter we have discussed a number of concrete strategies and practical examples on how to implement digital media literacy projects even in a difficult political and socio-cultural context like South Sudan. These are based in developing a holistic approach that considers citizen interactio
...
n with media via the accessible vehicle of social media platforms, as an integral part of both a peacebuilding as well as literacy development strategy. From raising awareness of the direct effects of media-induced hate speech on the conflict, even for citizens who are not media literate, to the training of technical ICT, text messaging and social media skills, familiarizes people with a technology and social process such that they feel empowered to take action to move beyond conflict. Social media interaction can also be transformed from a very individual practice, into a truly social and collaborative exercise, for example through "peace jamming" or integrating social media into the many peacebuilding conferences and youth actions that regularly take place across the country. Where often the manipulation of social media with the intention to exacerbate conflict and instability comes from outside the country, learning counter-messaging skills, employing and understanding social media ethics, and identifying the vocabulary of dangerous speech can act toward occupying an undefined social media space with a language of peacebuilding, rather than leaving that space open to agents of conflict." (Conclusion)
more
"Although not always consistent, Boko Haram has ensured its narrative is publicly disseminated, which is revealing for a group that is extremely secretive. Messaging creates awareness about the group and its activities, which can tie into recruitment. Messaging demonstrates a clear pattern of expand
...
ed target groups and geographic areas, while outlining group grievances. Boko Haram’s intended audience has shifted over time, but core groups have likely been augmented by expanding dynamics, rather than supplanted. Further research on Boko Haram messaging and its resonance within the local population should be conducted." (Key points, page 2)
more
"Menschenfeindliche und rassistische Äußerungen (Hate Speech) gegenüber religiösen und ethnischen Gruppen im Internet haben sich weltweit massiv ausgebreitet. Das Internet ist weniger ein Ort der multikulturellen Begegnung als des aggressiven Kulturkampfes mit weitreichenden Folgen für gesellsc
...
haftliches Handeln von der Diskriminierung bis zur fremdenfeindlichen Gewalt. Der vorliegende Beitrag beschäftigt sich in konzentrierter Form mit unterschiedlichen politikwissenschaftlichen, soziologischen und kommunikationswissenschaftlichen Erklärungsversuchen für die Ursachen der Hasskommunikation. Abgerundet wird der Beitrag durch eine Reflexion über ethische und co-regulative Maßnahmen in einer wehrhaften liberalen Demokratie." (Abstract)
more
"The central objective of this volume has been to show that legislation against hate speech in the EU may be an effective first step towards combatting the phenomenon, but it might not be adequate on its own to contain the present situation. This is because hate speech has multiple ways of being exp
...
ressed. In this volume, we have identified several strategies of Othering that can be used to express such an unfavourable position towards members of a minority: categorisation and stereotyping, hate concealed as patriotism, metaphorical language, sarcasm, allusions and constructed dialogue can all be ‘subtle’ ways in which discrimination emerges in public discourse. And while we are not in a position, as linguists, to suggest that such strategies belong to the category of prosecutable hate speech, we think that it is safe to assume that they do form part of what we have dubbed soft hate speech." (Concluding remarks, page 87)
more
"Based on a bibliometric and scientific study of research conducted in Europe, North America, Latin America, the Caribbean, the Arab world, parts of Africa and Asia on the links between the use of social media and the phenomena of radicalization, the Report analyzes more than 550 studies published i
...
n scientific literature and “grey literature”, covering outputs in English (260), French (196) and Arabic (96). It shows that very little research has focused on the effective role of the use of social media in violent radicalization. Although many articles deal with electronic strategies and the use of the Internet and online social media for recruitment, there are very few empirical studies that describe and examine the real effects of these strategies on youth, and they rarely examine gender aspects. The Report examines the specificities of online prevention initiatives: counter/alternative narratives and media information literacy (MIL). Several formal and informal MIL initiatives have been implemented around the world according to MIL as a pedagogical practice with a specific set of skills that can respond to narratives of anger and revenge." (Executive summary, page 5)
more
"The monitoring and the analysis carried out for the purpose of this study found out that the media and the institutional channels of mass communication of religious communities have behaved correctly while carrying out their duties, and have established a climate of communication that emits and fos
...
ters mutual respect among the faithful, tolerance and harmony that have prevailed the Albanian religious tradition. On the other hand, alongside media institutions of religious communities or organizations operating in the country, the Albanian online world has been infiltrated by a relatively large number of websites which appear to have been created and operated by Islamic religious organizations based in Turkey or other countries in the Middle East. Some of these websites promote schools of Islam that do not match the tradition of the Albanian Islam, and provide a more radical interpretation of the Islamic doctrine. Especially problematic are some websites that promote in Albanian the schools of Salafism and Wahhabism as well as other extremist schools or sects. Meanwhile, the monitoring of the mainstream print and broadcast media in Albania, revealed that they report on religion and activities of religious background mainly during religious festivities, on cases of religiously-motivated clashes or conflicts, on controversial statements regarding religion, its history and religious cohabitation in Albania, as well as cases of scandal and controversy among the ranks of religious authorities." (Page 3)
more
"Why has the Taliban been so much more effective in presenting messages that resonate with the Afghan population than the United States, the Afghan Government and their allies? This book, based on years of field research and the assessment of hundreds of original source materials, examines the infor
...
mation operations and related narratives of Afghan insurgents, especially the Afghan Taliban, and investigates how the Taliban has won the information war. Taliban messaging, wrapped in the narrative of jihad, is both to the point and in tune with the target audiences it wishes to influence. On the other hand, the United States and its Kabul allies committed a basic messaging blunder, failing to present narratives that spoke to or, often, were even understood by their target audiences. Thomas Johnson systematically explains why the United States lost this "battle of the story" in Afghanistan, and argues that this defeat may have lost the U.S. the entire war, despite its conventional and technological superiority." (Publisher description)
more
"Seib traces how terrorism has proliferated and increased significantly in menace in the relatively brief period between the rise of al-Qaeda and the creation of Islamic State. With close attention to the linkages between media, religion, and violence, the book offers incisive analysis of how organi
...
zations such as Islamic State, al-Qaeda, and Boko Haram operate and reflects on how terrorism may continue to evolve. Seib argues that twenty-first-century terrorism is enabled by new media and depends on social networks as connective tissue, while interacting simultaneously with religion and socio-economic and political grievances. As Terrorism Evolves prescribes new measures for counterterrorism efforts, underscores the importance of soft power, and makes a strong case for recognizing that we have entered an era of terrorism of undetermined duration." (Publisher description)
more
"Key findings include: The Internet can play a role in the radicalisation process; There are few examples of individuals radicalising entirely online, but there are signs that this could increase over time; There is less evidence of the internet’s role in recruitment to terrorist networks or the u
...
se of violence – offline socialisation remains of pivotal importance; Groups such as Al Qaeda, Islamic State (IS) and Al-Shabaab have sophisticated online presences, comprising of online media organisations, mother sites feeding content to others, and a large number of other websites and forums maintained by the wider network; Extremists are making more use of social media, and its importance is likely to grow. It is especially important in allowing women to play a larger role in networks; Extremists use the internet for operational purposes, including communication and the coordination of attacks." (Overview, page 2)
more
"The study is divided into three parts, the first of which describes the Islamic State’s publishing house, Maktabat al-Himma, and its activities and offers a rough chronology of when the group published various works. The second part examines the group’s classroom textbooks, drawing comparisons
...
with the Saudi religious curriculum and highlighting the Islamic State’s unique program of “ISization” that makes them especially lethal. The paper’s third part features a deep dive into other literature produced by the group, including book-length editions, manuals of ritual observance, and instructions to fighters, as well as shorter pamphlets. The paper closes with a series of concluding observations and policy recommendations, as well as appendices that include a list of the works surveyed, translations by the author of selections from the classroom textbooks, images of textbook covers, and a glossary of terminology IS uses in its literature." (Executive summary, page xi)
more
"An app called Telegram is the new hot thing for jihadists to disseminate their propaganda. Terror organizations like the 'Islamic State' (IS) also use this app to win over German us-ers. jugendschutz.net documented a vast amount of graphic content like beheading videos – anyone can use his smartp
...
hone to access such content. So far, the provider has taken only little action to protect his young users." (Introduction)
more