Garth Davies's research while affiliated with Simon Fraser University and other places

Publications (22)

Chapter
This chapter focuses on left-wing radicalism, with special focus on the movement known as Antifa. Over the past few years, this movement has gained widespread notoriety. It featured prominently at the Unite the Right Rally in Charlottesville, Virginia, in August 2017. Although one woman was killed in the fracas, this episode elevated the stature of...
Chapter
Traditionally, right-wing extremism and left-wing extremism have existed as political counterweights to each other. This tension has often been most prevalent in highly polarized political contexts (see, e.g., Italy in the late 1960s and into the 1970s, or Spain in the mid-1970s through the mid-1980s). Somewhat predictably, the rise in violent righ...
Article
Full-text available
Although many researchers, practitioners, and policymakers are concerned about identifying and characterizing online posting patterns of violent extremists prior to their engagement in violence offline, little is empirically known about their online patterns generally or differences in their patterns compared to their non-violent counterpart partic...
Chapter
Right-wing extremists, among other extremists, continue to exploit the power of the Internet and associated technologies by connecting with the like-minded from around the globe and developing a sense of identity there. A growing body of literature has been dedicated to exploring this phenomenon, with an interest in how online identities of these a...
Article
Full-text available
Historically, research in terrorism studies has drawn from a variety of disciplines including, but not limited to, political science, psychology, and security studies. More recently, however, researchers have argued that criminological approaches can and should inform terrorism studies as well. In this paper, we apply four criminological perspectiv...
Article
Media portrayals of terrorism, particularly right-wing terrorism, have been understudied. In response, this study focuses on understanding how right-wing terrorism is portrayed by the New York Times and the Washington Post. A qualitative content analysis was conducted on five cases. Framing theory and thematic analysis were used to inform the resea...
Article
Historically, pandemics had inevitably produced demonization and scapegoating, and the COVID-19 pandemic has been no exception. Some individuals and groups have attempted to weaponize and exploit the pandemic, to use it as a means of spreading their extremist ideologies and to radicalize others to their causes. Segmented regression analyses of seve...
Article
Full-text available
Since the advent of the Internet, right-wing extremists and those who subscribe to extreme right views have exploited online platforms to build a collective identity among the like-minded. Research in this area has largely focused on extremists’ use of websites, forums, and mainstream social media sites, but overlooked in this research has been an...
Article
Use of force is among the most contentious issue facing law enforcement today. Unfortunately, much of the conversation surrounding use of force is driven by misunderstandings, in large part the result of lacking data. Despite repeated calls for more and better information regarding police use of force, departments and agencies have been slow to ado...
Chapter
Full-text available
Purpose – This chapter examines how sentiment analysis and web-crawling technology can be used to conduct large-scale data analyses of extremist content online. Methods/approach – The authors describe a customized web-crawler that was developed for the purpose of collecting, classifying, and interpreting extremist content online and on a large sca...
Article
Full-text available
Researchers have previously explored how right-wing extremists build a collective identity online by targeting their perceived “threat,” but little is known about how this “us” versus “them” dynamic evolves over time. This study uses a sentiment analysis-based algorithm that adapts criminal career measures, as well as semi-parametric group-based mo...
Article
Moving away from high-profile, hard-lined tactics, approaches to crowd policing have become increasingly geared towards softer, negotiation-based policing methods. Despite their perceived benefits, there exist a number of challenges relating to the successful implementation of these low-profile approaches, most notably being the officers themselves...
Article
Full-text available
The dark web is a concealed portion of the Internet that can only be accessed through specialized software. Although multiple dark web technologies exist, with a common trait of using encryption to enforce anonymity, the Tor network remains the most prominent dark web network. To visit websites on the network, the user must use a heavily modified F...
Article
Both homicide and clearance rates in Canada have declined significantly over the last few decades. The existing literature predominantly focuses on differentiating between cleared and uncleared cases, with less attention given to circumstances affecting the time taken to solve homicides. To address this gap, data were taken from the Homicide Survey...
Article
Purpose The purpose of this paper is to examine the nature and dynamics of crowd disorder from the perspective of the police in a Canadian context, as well as to extend this perspective to include the opinions of female police officers. Design/methodology/approach A total of 460 Vancouver police officers participated in this study. Following the 2...
Article
Full-text available
As violent extremists continue to surface in online discussion forums, law enforcement agencies search for new ways of uncovering their digital indicators. Researchers have both described and hypothesized a number of ways to detect online traces of potential extremists, yet this area of inquiry remains in its infancy. This study proposes a new sear...
Article
Recognising that the police response may have a significant impact on the type of behaviour displayed by the crowd has prompted many police departments to adopt less obtrusive approaches to crowd management. Low-profile, negotiation-based public-order policing strategies have been used successfully in low-risk crowd situations. However, it remains...
Chapter
Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organi...

Citations

... It alleges that the so-called '(Jewish) global elites' purposefully control the influx of migrants and refugees to destroy and degrade the white or Western culture 10 . Furthermore, Scrivens (2022) reports anti-Jewish hate in their analysis, "[the Jews have used a very sinister form of eugenics for thousands of years to build an extraordinarily cunning race]" 11 . ...
... Berbers et al. 2015;Figoureux and Van Gorp 2020). A striking pattern identified in this body of research is that Islam and Muslims tend to be disproportionately regarded as associated with terrorism, whereas incidents with perpetrators associated with, e.g., the extreme right appear to receive less attention and to be less likely to be characterised as terrorism (Kearns, Betus, and Lemieux 2019;Powell 2018;Zdjelar and Davies 2021). ...
... Two reports into online activity in the US (Moonshot 2020b) and Canada (Moonshot 2020a) both found evidence to suggest that searches for white supremacist keywords increased after lockdowns were introduced. Similarly, Davies, Wu, and Frank (2021) found that traffic on rightwing extremist and involuntary celibate (Incel) forums showed a demonstrable increase in posting behaviours. ...
... Such being the case, no matter what anti-riot tactic is being used, if the very rank-and-file who are assigned and expected to enforce such tactics are not suitable for that purpose, then the operation is deemed to fail (Dawson and Davies 2018). Indeed, police knowledge, attitudes, and values, by and large, shape, if not define, to a great extent the police approach to such public order interventions. ...
... we have been part of this growing field of research at the international CyberCrime research Centre (iCCrC), situated in Simon fraser University's School of Criminology. 1 our work has ranged from identifying radical users in online discussion forums (e.g., Scrivens, Davies, & frank, 2017) to understanding terrorist organizations' online recruitment efforts on various online platforms (e.g., Davies et al., 2015), to evaluating linguistic patterns presented in the online magazines of terrorist groups (e.g., macnair & frank, 2018a, 2018b). these experiences have provided us with insights regarding the applicability of a specific set of machine learning techniques and research methods to conduct large-scale data analyses of extremist content online. 2 in what follows, we will first describe a customized web-crawler that was developed at the iCCrC for the purpose of collecting, classifying, and interpreting extremist content online and on a large scale. ...
... Moreover, our analysis also revealed less discussed threats, mainly the worry that social media might act as an easy pathway for illegal activities among adolescents who would not normally engage in them. The prevalence of inappropriate content on social media and its effects on the wellbeing of adolescents has been extensively studied (Goodyear et al., 2018;Smahel et al., 2020) and it is known that social media plays a significant role in the radicalization of youth (Kardaş and Özdemir, 2018;Gaudette et al., 2021). This study extends prior research by focusing also on how social media promotes "lesser" crimes, such as shoplifting, which has received relatively little attention in prior research. ...
... Just as it makes sense to have a unifying framework to enhance consistency in these areas, it makes sense to have a national framework to standardize the collection, storage, and presentation of use-of-force data. This is especially important because differences currently exist across jurisdictions in terms of what data are collected (e.g., draw and display of intervention options versus actual applications of force) and how they are collected (Kiedrowski et al. 2015;Davies et al. 2019;Wortley et al. 2021). ...
... Articles were included if they used machine learning to develop a predictive model that could be applied to addressing or preventing violent extremism. Therefore, articles were excluded if they focused on other aspects of artificial intelligence that did not result in the development of a predictive model, such as the development of Web crawlers [49]. Articles were also excluded if they were only peripherally related to violent extremism. ...
... Sentiment analysis software has become increasingly popular in this field because, as the amount of 'opinionated data' online grows exponentially, it offers a wide range of applications that can help address previously untapped and challenging research problems (see Liu 2012). Researchers, for example, have successfully used sentiment analysis to detect extreme language (e.g., Davidson et al. 2017), websites (e.g., Scrivens and Frank 2016) and users online (e.g., Scrivens et al. 2017), as well as to measure levels of online propaganda (e.g., Burnap et al. 2014) and cyberhate (e.g., Williams and Burnap 2015) following a terrorism incident, and to evaluate how radical discourse evolves over time online (e.g., Scrivens et al. 2018). Sentiment analysis has also been used to detect violent extremist language (e.g., Abbasi and Chen 2005) and users online (e.g., Kaati et al. 2016), as well as to measure levels of -or propensity towards -violent radicalization online (e.g. ...
... Data were collected by researchers external to the authors of this paper, using an automated web crawler, designed specifically for operation on the Dark Web (see Monk et al., 2018). Known as The Dark Crawler (TDC), this tool integrated a law enforcement hash value database, comprising 2.1 million MD5 image hash values. ...