Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

User Journeys in Online Extremist Groups

User Journeys in Online Extremist Groups
24th July 2024 Nicola Mathieson
In Report-Gnet

This project by GNET looks at the user journeys of individuals who enter and participate in the online spaces of extremist communities. A user journey here refers to the distinct path a user may follow to reach their goals when accessing and using an online space belonging to extremist communities.

User journeys are particularly important in offering insights into the rationale and motivations of users on the one hand, and to the inner workings of extremist online communities on the other. This is vital for understanding their goals and objectives.

In selecting the ideologies for this project, we drew upon extremist communities – rather than extremist and terrorist organisations or groups – including those actors that participate in the extremist milieu and share ideas but do not necessarily operate in concert. These ideologies include those of formal and well‐defined extremist organisations of White supremacist and anti‐government extremist groups in the United States, supporter networks of Islamic State (IS), and looser communities of extremist actors, including accelerationists, incels and chan site members who operate on shared platforms, congregating around common beliefs without the connection of formal membership.

This project is a response to the growing interest in understanding how individuals enter and participate in online spaces of extremist communities. A core goal of the project was to understand the role of algorithms in leading users to extremist communities, including the changes in algorithmic recommendations that lead users to more extreme content online. However, examining these changes proved impossible due to the precautions taken by the expert contributors to the project, such as the use of separate technology and VPNs throughout their research.

The project also highlights the distinct posting behaviour and operational security protocols of different groups, usually along ideological lines.

Read full report