Abstract
Anno Bunnik explores the ramifications of Big Data for countering terrorism, extremism, and radicalisation. With the recent rise of jihadists and other extremists groups in the Middle East and Europe, how do state agencies respond through the use of Big Data? This chapter critically engages with questions such as the extent to which Big Data can inform us about and help prevent radicalisation. It deals with the role of non-governmental organisations and the private sector in this regard. Bunnik makes the argument that whilst it is inevitable that Big Data will take centre stage in counter-terrorism, its potential should also be utilised to better understand radicalisation and extremism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
BBC News. (2011). Birmingham Project Champion ‘spy’ cameras being removed. Retrieved from http://www.bbc.co.uk/news/uk-england-birmingham-13331161
Council of the European Union. (2005a, November 24). The European Union strategy for combating radicalisation and recruitment to terrorism. Retrieved from http://register.consilium.europa.eu/pdf/en/05/st14/st14781-re01.en05.pdf
Council of the European Union. (2005b, November 30). The European Union-terrorism strategy. Retrieved from http://register.consilium.eu.int/pdf/en/05/st14/st14469-re04.en05.pdf
Gambetta, D., & Hertog, S. (2009). Why are there so many engineers among Islamic radicals? Archives Européennes de Sociologie, 50(2), 201–230.
Hasan, M. (2014). What the Jihadists who bought ‘Islam for Dummies’ on Amazon tell us about radicalisation. Huffington Post. Retrieved from http://www.huffingtonpost.co.uk/mehdi-hasan/jihadist-radicalisation-islam-for-dummies_b_5697160.html
HM Government. (2011, July). CONTEST: The United Kingdom’s strategy for countering terrorism. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/97994/contest-summary.pdf
HM Government. (2012, October). Channel: Protecting vulnerable people from being drawn into terrorism. A guide for local partnerships. Retrieved from http://www.npcc.police.uk/documents/TAM/2012/201210TAMChannelGuidance.pdf
HM Government. (2015, October). Counter-extremism strategy. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/470088/51859_Cm9148_Accessible.pdf
Lee, D. (2013, August 27). Government requests to Facebook outlined in report. BBC News. Retrieved from http://www.bbc.co.uk/news/technology-23852230
Maher, S., & Frampton, M. (2009, March 8). Choosing our friends wisely: Criteria for engagement with Muslim groups. Policy Exchange. Retrieved from http://www.policyexchange.org.uk/publications/category/item/choosing-our-friends-wisely-criteria-for-engagement-with-muslim-groups
Ranstorp, M. (2010). Introduction. In M. Ranstorp (Ed.), Understanding violent radicalisation: Terrorist and jihadist movements in Europe. New York: Routledge.
Rayment, S. (2011, October 8). 200 suicide bombers ‘planning attacks in UK’. The Telegraph. Retrieved from http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/8815574/200-suicide-bombers-planning-attacks-in-UK.html
Schmid, A. (2013). Radicalisation, de-radicalisation, counter-radicalisation: A conceptual discussion and literature review. ICCT Research Paper. Retrieved from http://www.icct.nl/download/file/ICCT-Schmid-Radicalisation-De-Radicalisation-Counter-Radicalisation-March-2013_2.pdf
Sky News. (2015, July 1). Anti-radicalisation law introduced in UK. Retrieved from http://news.sky.com/story/1511229/anti-radicalisation-law-introduced-in-uk
Stevens, T., & Neumann, P. (2009). Countering online radicalisation: A strategy for action. The International Centre for the Study of Radicalisation and Political Violence. Retrieved from http://icsr.info/wp-content/uploads/2012/10/1236768491ICSROnlineRadicalisationReport.pdf
The Guardian. (2012, December 6). Woman jailed after al-Qaida terrorist material found on her phone. The Guardian. Retrieved from http://www.theguardian.com/world/2012/dec/06/woman-jailed-al-qaida-material-on-phone
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Copyright information
© 2016 The Editor(s) (if applicable) and The Author(s)
About this chapter
Cite this chapter
Bunnik, A. (2016). Countering and Understanding Terrorism, Extremism, and Radicalisation in a Big Data Age. In: Bunnik, A., Cawley, A., Mulqueen, M., Zwitter, A. (eds) Big Data Challenges. Palgrave, London. https://doi.org/10.1057/978-1-349-94885-7_8
Download citation
DOI: https://doi.org/10.1057/978-1-349-94885-7_8
Published:
Publisher Name: Palgrave, London
Print ISBN: 978-1-349-94884-0
Online ISBN: 978-1-349-94885-7
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)