Understanding Online Radicalisation Using Data Science

Understanding Online Radicalisation Using Data Science

Yeslam Al-Saggaf
Copyright: © 2019 |Pages: 16
DOI: 10.4018/978-1-5225-7119-3.ch025
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

What characterises social media radicals? And why some people become attracted to radicalisation? To explore answers to these questions, a number of tweets posted by a group of suspected radicals tweeting in Arabic were analysed using social network analysis and machine learning. The study revealed that these suspected radicals' networks showed significant interaction with others; but this interactivity is only significant quantitatively as the interaction is not reciprocated. With regards to why these suspected radicals became attracted to radicalisation, Topic Modelling revealed these suspected radicals' tweets underpinned a perceived injustice that they believed the Secret Police and the Government inflicted upon them. Overall, the study has shown that data science tools have the potential to inform our understanding of online radicalisation. It is hoped this exploratory study will be the basis for a future study in which the research questions will be answered using a larger sample.
Chapter Preview
Top

Introduction

The extremist who took part in gunning his solider cousin in Saudi Arabia in 2015 was as young as 18 years old and the gunner himself was only 21 years old. All of the four suicide bombers who carried out attacks on mosques during the Friday prayers in Saudi Arabia in 2015 aged between 20 and 23 years. The fact that these attackers were this young suggests that radical groups can easily infect young people with the ‘radicalisation virus.’ Radicalising young people, who may not yet fully understand the grey areas surrounding right and wrong and who may not have the skill to reason and rationally analyse the outcomes of their actions, can have devastating consequences for people’s safety worldwide.

Radicals live by the rule ‘divide and conquer’. After dividing people into groups, they move to establishing their credibility to the groups they target (Al-Saggaf, Himma & Kharabsheh, 2008). Once this is achieved, they progress to communicating their ideology, explaining where they differ with others and providing the ‘justification’ for their thinking, which they often back up with ‘evidence’ (Al-Saggaf & Kharabsheh, 2009). However, their attempts to advocate violence in Saudi online communities, i.e. before the widespread adoption of social media, achieved limited success, as evidenced by fewer and smaller magnitude terrorist activities compared to the multiple, large attacks post the social media era.

One reason for this is because radicals were not alone in the Saudi online communities in which they operated (Al-Saggaf & Kharabsheh, 2009). The results of one study showed that there were voices louder than theirs in these online communities, which to some extent drowned their voices out (Al-Saggaf & Weckert, 2006). Other reasons for the limited success of these types of campaigns were that the radicals were either busy fighting in Iraq, killed during that war, serving time in jail or because the online communities’ moderators regularly removed their contributions (Al-Saggaf & Kharabsheh, 2009). Even those contributions that escaped the moderators culling tended to be met with heavy criticism from other online community members (Al-Saggaf, 2007).

However, the widespread adoption of social media sites has completely changed the environment in which radicals operate. Social media sites like YouTube, Facebook, Twitter, Instagram and Snapchat have allowed them to create their own channels to spread their messages and advance their agenda instead of, as before, competing with others for attention over shared mediums (Al-Saggaf & Simmons, 2015). The revelation that extremists now use the secure messaging App Telegram, which emerged while investigating those responsible for the November 2015 Paris attacks, highlights radicals’ technological sophistication and their ability to take advantage of the high-tech resources at their disposal. With more than 3.366 billion using the internet worldwide, which is nearly half of the world’s population, and 1.65 billion alone are active on Facebook, recruiting sympathisers via social media has never been easier (Torok, 2013).

There is a dearth of research studies that focus on online radicalisation (Torok, 2013), ostensibly because of the risks associated with this type of research (Reynolds, 2012). For example, there is no study in the literature that has investigated, using naturally occurring data (i.e. real social media data), the characteristics of social media radicals. Similarly, there are no studies on why unsuspecting people fall victim to the ‘radicalisation virus’. Yet the need to understand the profile of social media radicals and the reasons why vulnerable individuals fall victim to the ‘radicalisation virus’ has never been more critical.

Complete Chapter List

Search this Book:
Reset