Beyond Binary Labels: Political Ideology Prediction of Twitter Users

Total Page:16

File Type:pdf, Size:1020Kb

Beyond Binary Labels: Political Ideology Prediction of Twitter Users Beyond Binary Labels: Political Ideology Prediction of Twitter Users Daniel Preot¸iuc-Pietro Ye Liu∗ Positive Psychology Center School of Computing University of Pennsylvania National University of Singapore [email protected] [email protected] Daniel J. Hopkins Lyle Ungar Political Science Department Computing & Information Science University of Pennsylvania University of Pennsylvania [email protected] [email protected] Abstract User trait prediction from text is based on the as- sumption that language use reflects a user’s de- Automatic political preference prediction mographics, psychological states or preferences. from social media posts has to date proven Applications include prediction of age (Rao et al., successful only in distinguishing between 2010; Flekova et al., 2016b), gender (Burger et al., publicly declared liberals and conserva- 2011; Sap et al., 2014), personality (Schwartz tives in the US. This study examines et al., 2013; Preot¸iuc-Pietro et al., 2016), socio- users’ political ideology using a seven- economic status (Preot¸iuc-Pietro et al., 2015a,b; point scale which enables us to identify Liu et al., 2016c), popularity (Lampos et al., 2014) politically moderate and neutral users – or location (Cheng et al., 2010). groups which are of particular interest to Research on predicting political orientation has political scientists and pollsters. Using focused on methodological improvements (Pen- a novel data set with political ideology nacchiotti and Popescu, 2011) and used data sets labels self-reported through surveys, our with publicly stated dichotomous political orien- goal is two-fold: a) to characterize the po- tation labels due to their easy accessibility (Syl- litical groups of users through language wester and Purver, 2015). However, these data use on Twitter; b) to build a fine-grained sets are not representative samples of the entire model that predicts political ideology of population (Cohen and Ruths, 2013) and do not unseen users. Our results identify differ- accurately reflect the variety of political attitudes ences in both political leaning and engage- and engagement (Kam et al., 2007). ment and the extent to which each group For example, we expect users who state their tweets using political keywords. Finally, political affiliation in their profile description, we demonstrate how to improve ideology tweet with partisan hashtags or appear in public prediction accuracy by exploiting the rela- party lists to use social media as a means of popu- tionships between the user groups. larizing and supporting their political beliefs (Bar- berASa, 2015). Many users may choose not to 1 Introduction publicly post about their political preference for various social goals or perhaps this preference Social media is used by people to share their opin- may not be strong or representative enough to be ions and views. Unsurprisingly, an important part disclosed online. Dichotomous political prefer- of the population shares opinions and news related ence also ignores users who do not have a political to politics or causes they support, thus offering ideology. All of these types of users are very im- strong cues about their political preferences and portant for researchers aiming to understand group ideologies. In addition, political membership is preferences, traits or moral values (Lewis and Rei- also predictable purely from one’s interests or de- ley, 2014; Hersh, 2015). mographics — it is much more likely for a reli- The most common political ideology spectrum gious person to be conservative or for a younger in the US is the conservative – liberal (Ellis and person to lean liberal (Ellis and Stimson, 2012). Stimson, 2012). We collect a novel data set of ∗ Work carried out during a research visit at the Univer- Twitter users mapped to this seven-point spectrum sity of Pennsylvania which allows us to: 1. Uncover the differences in language use be- or to detect bias (Yano et al., 2010) or impartial- tween ideological groups; ity (Zafar et al., 2016) at a document level. 2. Develop a user-level political ideology predic- Our study belongs to the second category, where tion algorithm that classifies all levels of en- political orientation is inferred at a user-level. All gagement and leverages the structure in the po- previous studies study labeling US conservatives litical ideology spectrum. vs. liberals using either text (Rao et al., 2010), First, using a broad range of language features social network connections (Zamal et al., 2012), including unigrams, word clusters and emotions, platform-specific features (Conover et al., 2011) we study the linguistic differences between the or a combination of these (Pennacchiotti and two ideologically extreme groups, the two ideo- Popescu, 2011; Volkova et al., 2014), with very logically moderate groups and between both ex- high reported accuracies of up to 94.9% (Conover tremes and moderates in order to provide insight et al., 2011). into the content they post on Twitter. In addition, However, all previous work on predicting user- we examine the extent to which the ideological level political preferences are limited to a binary groups in our data set post about politics and com- prediction between liberal/democrat and conser- pare it to a data set obtained similarly to previous vative/republican, disregarding any nuances in po- work. litical ideology. In addition, as the focus of the In prediction experiments, we show how accu- studies is more on the methodological or inter- rately we can distinguish between opposing ideo- pretation aspects of the problem, another down- logical groups in various scenarios and that previ- side is that the user labels were obtained in sim- ous binary political orientation prediction has been ple, albeit biased ways. These include users who oversimplified. Then, we measure the extent to explicitly state their political orientation on user which we can predict the two dimensions of polit- lists of party supporters (Zamal et al., 2012; Pen- ical leaning and engagement. Finally, we build an nacchiotti and Popescu, 2011), supporting par- ideology classifier in a multi-task learning setup tisan causes (Rao et al., 2010), by following that leverages the relationships between groups.1 political figures (Volkova et al., 2014) or party accounts (Sylwester and Purver, 2015) or that 2 Related Work retweet partisan hashtags (Conover et al., 2011). Automatically inferring user traits from their on- As also identified in (Cohen and Ruths, 2013) and line footprints is a prolific topic of research, en- further confirmed later in this study, these data sets abled by the increasing availability of user gen- are biased: most people do not clearly state their erated data and advances in machine learning. political preference online – fewer than 5% ac- Beyond its research oriented goals, user profil- cording to Priante et al.(2016) – and those that ing has important industry applications in online state their preference are very likely to be political marketing, personalization or large-scale audience activists. Cohen and Ruths(2013) demonstrated profiling. To this end, researchers have used a that predictive accuracy of classifiers is signifi- wide range of types of online footprints, includ- cantly lower when confronted with users that do ing video (Subramanian et al., 2013), audio (Alam not explicitly mention their political orientation. and Riccardi, 2014), text (Preot¸iuc-Pietro et al., Despite this, their study is limited because in their 2015a), profile images (Liu et al., 2016a), social hardest classification task, they use crowdsourced data (Van Der Heide et al., 2012; Hall et al., 2014), political orientation labels, which may not corre- social networks (Perozzi and Skiena, 2015; Rout spond to reality and suffer from biases (Flekova et al., 2013), payment data (Wang et al., 2016) and et al., 2016a; Carpenter et al., 2016). Further, they endorsements (Kosinski et al., 2013). still only look at predicting binary political orien- Political orientation prediction has been studied tation. To date, no other research on this topic has in two related, albeit crucially different scenarios, taken into account these findings. as also identified in (Zafar et al., 2016). First, re- searchers aimed to identify and quantify orienta- 3 Data Set tion of words (Monroe et al., 2008), hashtags (We- The main data set used in this study consists of ber et al., 2013) or documents (Iyyer et al., 2014), 3,938 users recruited through the Qualtrics plat- 1 Data is available at http://www.preotiuc.ro form (D1). Each participant was compensated 1000 Political Orientation @JoeBiden, @CoryBooker, @JohnKerry) or US conservative politics (@marcorubio, @tedcruz, 750 @RandPaul, @RealBenCarson). Liberals in our set (Nl = 7417) had to follow on Twitter all of 500 the liberal political figures and none of the con- 250 servative figures. Likewise, conservative users (Nc = 6234) had to follow all of the conservative 0 1 2 3 4 5 6 7 figures and no liberal figures. We downloaded up to 3,200 of each user’s most recent tweets, leading Figure 1: Distribution of political ideology in our data set, to a total of 25,493,407 tweets. All tweets were from 1 – Very Conservative through 7 – Very Liberal. downloaded around 10 August 2016. 4 Features with 3 USD for 15 minutes of their time. All participants first answered the same demographic In our analysis, we use a broad range of linguistic questions (including political ideology), then were features described below. directed to one of four sets of psychological ques- Unigrams We use the bag-of-words representa- tionnaires unrelated to the political ideology ques- tion to reduce each user’s posting history to a nor- tion. They were asked to self-report their politi- malised frequency distribution over the vocabulary cal ideology on a seven point scale: Very conser- consisting of all words used by at least 10% of the vative (1), Conservative (2), Moderately conser- users (6,060 words). vative (3), Moderate (4), Moderately liberal (5), LIWC Traditional psychological studies use a Liberal (6), Very liberal (7).
Recommended publications
  • CTC Sentinel Welcomes Submissions
    Combating Terrorism Center at West Point Objective • Relevant • Rigorous | April 2018 • Volume 11, Issue 4 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE Five Years After the NYPD vs. Revolution Muslim Boston Marathon Bombing The inside story of how the NYPD defeated the radicalization hub Jesse Morton and Mitchell Silber William Weinreb and Harold Shaw FEATURE ARTICLE Editor in Chief 1 NYPD vs. Revolution Muslim: The Inside Story of the Defeat of a Local Radicalization Hub Paul Cruickshank Jesse Morton and Mitchell Silber Managing Editor INTERVIEW Kristina Hummel 8 A View from the CT Foxhole: Five Years After the Boston Marathon Bombing EDITORIAL BOARD Nicholas Tallant Colonel Suzanne Nielsen, Ph.D. ANALYSIS Department Head Dept. of Social Sciences (West Point) 15 The Islamic State's Lingering Legacy among Young Men from the Mosul Area Scott Atran, Hoshang Waziri, Ángel Gómez, Hammad Sheikh, Lucía Lieutenant Colonel Bryan Price, Ph.D. López-Rodríguez, Charles Rogan, and Richard Davis Director, CTC 23 Challenging the ISK Brand in Afghanistan-Pakistan: Rivalries and Divided Loyalties Brian Dodwell Amira Jadoon, Nakissa Jahanbani, and Charmaine Willis Deputy Director, CTC 30 The British Hacker Who Became the Islamic State's Chief Terror Cyber- Coach: A Profile of Junaid Hussain CONTACT Nafees Hamid Combating Terrorism Center U.S. Military Academy Between 2006 and 2012, two men working on opposite sides of the strug- 607 Cullum Road, Lincoln Hall gle between global jihadis and the United States faced of in New York City. Jesse Morton was the founder of Revolution Muslim, a group that prosely- West Point, NY 10996 tized—online and on New York City streets—on behalf of al-Qa`ida.
    [Show full text]
  • Radicalization”
    Policing “Radicalization” Amna Akbar* Introduction ..................................................................................................................... 810 I. Radicalization Briefly Historicized ........................................................................... 818 II. Radicalization Defined and Deconstructed ........................................................... 833 III. Policing the New Terrorism ................................................................................... 845 A. Standards ........................................................................................................ 846 B. Tactics ............................................................................................................. 854 1. Mapping .................................................................................................. 855 2. Voluntary Interviews ............................................................................ 859 3. Informants .............................................................................................. 861 4. Internet Monitoring .............................................................................. 865 5. Community Engagement ..................................................................... 866 IV. Radical Harms ........................................................................................................... 868 A. Religion, Politics, and Geography .............................................................. 869 B. A Fundamental Tension
    [Show full text]
  • Abu Talhah Al-Amrikee: an Extensive Online Footprint
    Abu Talhah Al-Amrikee An Extensive Online Footprint Updated: May 17, 2011 Introduction A Virginia man who targeted the creators of South Park for satirizing issues surrounding the depiction of the Prophet Muhammad has been sentenced to 25 years in prison for attempting to travel to Somalia and join an Al Qaeda-linked terrorist group. On October 20, 2010, Zachary Adam Chesser (a.k.a. Abu Talhah Al- Amrikee), 20, pleaded guilty to providing material support to Al Shabaab, an Al Qaeda-linked terrorist organization based in Somalia, soliciting crimes of violence and communicating threats. He was sentenced on February 24, 2011. Chesser, a U.S. citizen from Virginia, was arrested and charged on July 21, 2010, two weeks after he was originally apprehended as he attempted to board a plane to Uganda, en route to Somalia to join Al Shabaab. He later told federal authorities that he had also attempted to travel to Somalia several months before. Chesser explained to authorities that he expected to receive firearms and basic training with Al Shabaab, according to the affidavit. He expected to be placed in Al Shabaab's media branch, similar to the role held by Omar Hammami, an American citizen from Alabama who has become a primary recruiter for Al Shabaab. Chesser also told officials that Al Shabaab members asked him to bring laptops and cameras, to be used for high quality film productions to bolster the terrorist group's propaganda campaign. Prior to his arrest, Chesser admitted that he posted videos and other propaganda materials on behalf of individuals in Al Shabaab on extremist message boards, according to the affidavit.
    [Show full text]
  • 814437.En Pe 441.663
    WRITTEN QUESTION E-3155/10 by Lorenzo Fontana (EFD) to the Commission Subject: Measures to combat the proliferation of messages inciting religious hatred on the internet Following the broadcasting of an episode of the popular 'South Park' cartoon series in which the Prophet Mohammed was portrayed as a grizzly bear, the leader of the Revolution Muslim organisation, in a message published on its US website, wrote that Matt Stone and Trey Parker, the authors of the series, could 'wind up like Theo Van Gogh'. This message could be interpreted in several ways. However, in the margins of the message itself, the home addresses of the two authors were specifically published, together with the address of their offices in California and the New York head office of the TV network which broadcasts the series. The same site, known for its content inciting hatred of non-Muslims has, in the past, published a video expressing joy over the death of US journalist Daniel Pearl, who was abducted and beheaded by Islamic fundamentalists in Pakistan. The site has also published videos by the Anglo-Jamaican imam, Sheikh Abdullah al-Faisal, known for his preaching of hatred and his repeated calls to kill non- Muslims. In the past, the 'South Park' cartoon series has broadcast similar episodes in which other religions have been desecrated, in particular the Catholic religion, and the Christian community has on several occasions criticised its content, without resorting to violent or unseemly reactions. Moreover, many Christian communities in countries with an Islamic majority have recently been subjected to countless episodes of religious intolerance.
    [Show full text]
  • Analyzing the Islamic Extremist Phenomenon in the United States: a Study of Recent Activity
    JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY ANALYZING THE ISLAMIC EXTREMIST PHENOMENON IN THE UNITED STATES: A STUDY OF RECENT ACTIVITY BY JOAN NEUHAUS SCHAAN FELLOW IN HOMELAND SECURITY AND TERRORISM JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY AND JESSICA PHILLIPS INTERN, HOMELAND SECURITY AND TERRORISM PROGRAM JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY NOVEMBER 7, 2011 The Islamic Extremist Phenomenon in the United States THESE PAPERS WERE WRITTEN BY A RESEARCHER (OR RESEARCHERS) WHO PARTICIPATED IN A BAKER INSTITUTE RESEARCH PROJECT. WHEREVER FEASIBLE, THESE PAPERS ARE REVIEWED BY OUTSIDE EXPERTS BEFORE THEY ARE RELEASED. HOWEVER, THE RESEARCH AND VIEWS EXPRESSED IN THESE PAPERS ARE THOSE OF THE INDIVIDUAL RESEARCHER(S), AND DO NOT NECESSARILY REPRESENT THE VIEWS OF THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY. © 2011 BY THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY OF RICE UNIVERSITY THIS MATERIAL MAY BE QUOTED OR REPRODUCED WITHOUT PRIOR PERMISSION, PROVIDED APPROPRIATE CREDIT IS GIVEN TO THE AUTHOR AND THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY. 2 The Islamic Extremist Phenomenon in the United States Abstract The study of terrorism strives to identify logic and patterns in a phenomenon that is in constant flux. Weapons, tactics, recruitment, financing, and other elements are fluid as they evolve and adapt to current conditions and the environment. Successful policy requires remaining abreast of the ever-evolving threat and responding accordingly. As such, U.S. policymakers need to understand the current dynamics and trends in order to mitigate and combat the threats to our nation.
    [Show full text]
  • From Hasan Al-Banna to Mohammad Morsi; the Political Experience of Muslim Brotherhood in Egypt
    FROM HASAN AL-BANNA TO MOHAMMAD MORSI; THE POLITICAL EXPERIENCE OF MUSLIM BROTHERHOOD IN EGYPT A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF SOCIAL SCIENCES OF MIDDLE EAST TECHNICAL UNIVERSITY BY AHMET YUSUF ÖZDEMİR IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN MIDDLE EASTERN STUDIES JULY 2013 Approval of the Graduate School of Social Sciences Prof. Dr. Meliha Altunışık Director I certify that this thesis satisfies all the requirements as a thesis for the degree of Master of Science Assoc.Prof.Dr. Özlem Tür Head of Department This is to certify that we have read this thesis and that in our opinion it is fully adequate, in scope and quality, as a thesis for the degree of Master of Science Prof. Dr. İhsan D. Dağı Supervisor Examining Committee Members Prof. Dr. Nuri Yurdusev (METU,IR) Prof. Dr. İhsan D. Dağı (METU, IR) Assis. Prof. Dr. Bayram Sinkaya (YBU, IR) I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Name, Last name: Ahmet Yusuf Özdemir Signature : iii ABSTRACT FROM HASAN AL-BANNA TO MOHAMMAD MORSI; THE POLITICAL EXPERIENCE OF MUSLIM BROTHERHOOD IN EGYPT Özdemir, Ahmet Yusuf M.S. Program of Middle East Studies Supervisor: Prof. Dr. İhsan D. Dağı July 2013, 141 pages This thesis analyses the political and ideological transformation of the Society of Muslim Brotherhood in Egypt from its foundation in 1928 to 2012.
    [Show full text]
  • CTX Vol 2 No 4
    Vol. 2, No. 4 | CTX EDITORIAL STAFF From the Editor MICHAEL FREEMAN Executive Editor Welcome to our first special issue of CTX, “Social Media in Jihad and ANNA SIMONS Executive Editor Counterterrorism,” which is devoted to a wide-ranging exploration of social ELIZABETH SKINNER Managing Editor media and counterterrorism. Social media have become valuable tools for RYAN STUART Design & Layout combating crime and terrorism. According to LexisNexis® Risk Solutions, four out of five respondents to their survey of law enforcement professionals EDITORIAL REVIEW BOARD reported using social media, particularly Facebook and YouTube, to aid VICTOR ASAL investigations. One officer said he believed his department’s use of social University at Albany SUNY media allowed personnel to defuse a terrorist threat involving students at a ALEJANDRA BOLANOS local high school. Two-thirds said they thought access to social media helps National Defense University solve crimes more quickly. LAWRENCE CLINE Naval Postgraduate School To better understand the role of social media in combating terrorism, the Naval Postgraduate School (NPS) in Monterey, California held a small STEPHEN DI RIENZO workshop on Social Media and Counterterrorism this past June. Sponsored National Intelligence University by the Combating Terrorism Fellowship Program, the workshop brought SAJJAN GOHEL together a diverse group of people, including researchers, law enforcement Asia Pacific Foundation and military officers, and media experts from the United States, Ireland, and SEBASTIAN GORKA the Philippines. Participants were invited to submit papers for inclusion in National Defense University this special issue of CTX. JAKUB GRYGIEL School of Advanced International We are delighted to present here six papers that we received from partici- Studies pants of the workshop.
    [Show full text]
  • A Discursive Analysis of the Egyptian Muslim Brotherhood Balancing Act, from the Authoritarian Era to the Arab Spring
    AN EDUCATION IN PRUDENCE: A DISCURSIVE ANALYSIS OF THE EGYPTIAN MUSLIM BROTHERHOOD BALANCING ACT, FROM THE AUTHORITARIAN ERA TO THE ARAB SPRING Major Derek Prohar JCSP 38 PCEMI 38 Master of Defence Studies Maîtrise en études de la défense Disclaimer Avertissement Opinions expressed remain those of the author and do Les opinons exprimées n’engagent que leurs auteurs et not represent Department of National Defence or ne reflètent aucunement des politiques du Ministère de Canadian Forces policy. This paper may not be used la Défense nationale ou des Forces canadiennes. Ce without written permission. papier ne peut être reproduit sans autorisation écrite. © Her Majesty the Queen in Right of Canada, as represented by the © Sa Majesté la Reine du Chef du Canada, représentée par le Minister of National Defence, 2012 ministre de la Défense nationale, 2012. CANADIAN FORCES COLLEGE - COLLÈGE DES FORCES CANADIENNES JCSP 38 - PCEMI 38 MASTER OF DEFENCE STUDIES - MAITRISE EN ÉTUDES DE LA DÉFENSE An Education in Prudence: A Discursive Analysis of the Egyptian Muslim Brotherhood Balancing Act, from the Authoritarian Era to the Arab Spring By Major Derek Prohar This paper was written by a student attending La présente étude a été rédigée par un stagiaire the Canadian Forces College in fulfilment of one du Collège des Forces canadiennes pour of the requirements of the Course of Studies. satisfaire à l'une des exigences du cours. L'étude The paper is a scholastic document, and thus est un document qui se rapporte au cours et contains facts and opinions, which the author contient donc des faits et des opinions que seul alone considered appropriate and correct for l'auteur considère appropriés et convenables au the subject.
    [Show full text]
  • Borderless World, Boundless Threat:Online Jihadists and Modern
    BORDERLESS WORLD, BOUNDLESS THREAT: ONLINE JIHADISTS AND MODERN TERRORISM A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Security Studies By Spencer O. Hayne, B.A. Washington, DC November 19, 2010 Copyright © 2010 by Spencer O. Hayne All Rights Reserved ii BORDERLESS WORLD, BOUNDLESS THREAT: ONLINE JIHADISTS AND MODERN TERRORISM Spencer O. Hayne, B.A. Thesis Advisor: Justine A. Rosenthal, Ph.D. ABSTRACT The online jihadist community represents a new phenomenon in the global spread of Islamic radicalism. Many terrorism experts largely ignore the fact that the Internet is more than just a tool for established terrorist organizations—it can be a platform for the evolution of the jihadist social movement itself. While the majority of this movement’s members are casual supporters of a global Islamist jihad against the West, a number of the community’s members have already proven willing to take their virtual beliefs into the real world through terrorist acts. Many of these terrorists have attracted significant media attention—Jihad Jane, the Christmas Day Bomber, the Fort Hood Shooter, the attack on CIA agents in Afghanistan, the Times Square Bomber, and a number of other “homegrown” terrorists. The individuals perpetrating these terrorist acts are as diverse as they are dangerous, presenting a significant challenge to counterterrorism officials and policymakers. This study profiles 20 recent cases of online jihadists who have made the transition to real-world terrorism along a number of characteristics: age, ethnicity, immigration status, education, religious upbringing, socio-economic class, openness about beliefs, suicidal tendencies, rhetoric focus, location, target, terrorist action, offline and online activity, and social isolation or the presence of an identity crisis.
    [Show full text]
  • SALAFISM in AMERICA History, Evolution, Radicalization
    SALAFISM in AMERICA History, Evolution, Radicalization ALEXANDER MELEAGROU-HITCHENS October 2018 Table of Contents Acknowledgements .................................................................................................................... ii Glossary of Terms ..................................................................................................................... iii Executive Summary .................................................................................................................... 1 Introduction ................................................................................................................................ 4 I. Understanding Salafism ....................................................................................................... 6 I.I What is Salafism? .............................................................................................................. 6 I.II Categorizing Salafism ..................................................................................................... 9 Quietists ................................................................................................................................... 9 Activists .................................................................................................................................. 11 Jihadis .................................................................................................................................... 14 I.III Salafism and Extremism ............................................................................................
    [Show full text]
  • The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015
    The author(s) shown below used Federal funding provided by the U.S. Department of Justice to prepare the following resource: Document Title: The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015 Author(s): Jytte Klausen Document Number: 250416 Date Received: November 2016 Award Number: 2012-ZA-BX-0006 This resource has not been published by the U.S. Department of Justice. This resource is being made publically available through the Office of Justice Programs’ National Criminal Justice Reference Service. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. FINAL REPORT The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015. Principal Investigator: Jytte Klausen, Brandeis University. June 2016. This project was supported by Award No. 2012-ZA-BX-0006, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this report are those of the author and do not necessarily reflect those of the U.S. Department of Justice. This resource was prepared by the author(s) using Federal funds provided by the U.S. Department of Justice. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice Contents EXECUTIVE SUMMARY ........................................................................................................... I 1. INTRODUCTION....................................................................................................................
    [Show full text]
  • Inciting Violent Jihad: Understanding the Impact and Appeal of English-Speaking Radical Islamic Ideologues on International Terrorism
    INCITING VIOLENT JIHAD: UNDERSTANDING THE IMPACT AND APPEAL OF ENGLISH-SPEAKING RADICAL ISLAMIC IDEOLOGUES ON INTERNATIONAL TERRORISM A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Studies By Matthew Steven Mabe, B.A. Georgetown University Washington, D.C. April 1, 2013 INCITING VIOLENT JIHAD: UNDERSTANDING THE IMPACT AND APPEAL OF ENGLISH-SPEAKING RADICAL ISLAMIC IDEOLOGUES ON INTERNATIONAL TERRORISM Matthew Steven Mabe, B.A. MALS Mentor: R. Nicholas Palarino, Ph. D. ABSTRACT Since September 11, 2001, the United States and our Western allies have become greatly concerned by the threat posed by “homegrown terrorists” and the individuals responsible for their radicalization. These extremists no longer need to travel abroad to join a terrorist group and receive indoctrination; rather, they can be inspired, recruited, and radicalized by radical English-speaking Islamic ideologues either in their home country or through the Internet. The three radical Islamic ideologues who will be evaluated in this study are Anwar al-Aulaqi, Abdullah al-Faisal, and Anjem Choudary; all of whom have played a significant role in influencing radical Islam during the past decade. Through an analysis of existing scholarship on terrorism, U.S. and British court documents, radical Islamic publications, official government press releases, and news reports regarding the three ideologues this thesis demonstrates three key elements which explains these ideologues’ appeal and influence. These elements include the use of the Internet to disseminate their messages, the use of the English language, to include the ability to tailor their message to a specific audience, and their credibility and extremist bona fides.
    [Show full text]