This Comment addresses issues unique to potentially terrorist content targeted by Internet platforms’ Countering Violent Extremism (CVE) efforts. It focuses in particular on Islamist extremism, though some of the analysis may be generalized to other contexts.