My year-in-review thread: This year I've been working a fairly unified theme, developing a framework for studying extremism and radicalization.
The most important piece of this was Extremist Construction of Identity, a paper published by the Counter Terrorism Strategic Communications program at @ICCT_TheHagueicct.nl/publication/ex…
• • •
Missing some Tweet in this thread? You can try to
force a refresh
What this report says is the GRU is associated with the name Cybercaliphate, which isn't quite the same thing as the Russians being behind it. That they aided and amplified it, I have no doubt, but there's substantial evidence that most CC activity was ISIS linked. 1/x
CC activity was clearly linked to social networks on Twitter linked to Junaid Hussein, a verifiable ISIS hacker. But those social networks were different from most ISIS social networks in that they followed other hackers, rather than following mainly ISIS adherents. 2/x
Hackers tend to communicate and collaborate across ideological lines, even when the hackers were ideological. Thus CC-linked networks had connections to the Syrian Electronic Army, Iranian hackers, Russian hackers and more. 3/x
So if people laughing at Trump during the correspondent's dinner goaded him into running for president, getting laughed out of the UN should be good for...
Extremism, my new book with @mitpress, is out today on Kindle and other ebook formats. Print coming this month. A few words on what it covers.
First and foremost, the purpose of the book is to offer a framework for understanding and analyzing extremist movements, including most importantly the question of definition.
The term extremism is not clearly defined, either in normal discourse, nor in academic literature, nor in policy circles. The book presents and explains a definition that helps reduce (but not completely eliminate) gray areas in understanding whether a movement is extremist.