Post Type Description
Stuck in a Nativist Spiral: Content, Selection, and Effects of Right-Wing Populists’ Communication on Facebook
September 18, 2023Although social media have become important venues for right-wing populist (RWP) campaigns, the content, selection, and effects of RWP messages on social media remain largely unknown. Using content and panel analysis in two studies, we investigated the potential reciprocal relationship between RWP communication on social media and citizens’ anti-immigrant attitudes, anti-elitist attitudes, and feelings of ...
Three Constitutional Thickets: Why Regulating Online Violent Extremism is Hard
September 18, 2023In this paper, I review U.S. constitutional considerations for lawmakers seeking to balance terrorist threats against free expression online. The point is not to advocate for any particular rule. In particular, I do not seek to answer moral or norms-based questions about what content Internet platforms should take down. I do, however, note the serious ...
Countering Violent Extremism Online: The Experiences of Informal Counter Messaging Actors
September 18, 2023The online space is a haven for extremists of all kinds. Although efforts to remove violent and extremist content are increasing, there is a widely accepted need to also contest extremist messages with counter messages designed to undermine and disrupt extremist narratives. While the majority of academic focus has been on large and well‐funded efforts ...
Countering Violent Extremist Narratives Online: Lessons From Offline Countering Violent Extremism
September 18, 2023The literature examining use of online counter narratives to divert potential extremists from a path of violence highlights the importance of messenger credibility, interactive approaches, and the shaping of broader network contexts. However, counter‐narrative efforts have often failed to integrate these insights fully into their digital campaigns. After reviewing several prominent counter‐narrative initiatives in the ...
Leveraging CDA 230 to Counter Online Extremism
September 18, 2023This paper, part of the Legal Perspectives on Tech Series, was commissioned in conjunction with the Congressional Counterterrorism Caucus. ...
A Plan for Preventing and Countering Terrorist and Violent Extremist Exploitation of Information and Communications Technology in America
September 18, 2023Policymakers in the United States know that terrorists and violent extremists exploit information and communications technologies (ICTs), but the government still struggles to prevent and counter these threats. Although the U.S. does not face these challenges alone, the strategies and policies emphasized by some of its greatest allies are not viable or suitable frameworks for ...
Daesh Propaganda, Before and After its Collapse
September 18, 2023This report compares two archives of official Daesh media that were compiled four years apart. It explores the nuances of the group’s worldview and tracks how external and internal situational exigencies impacted them during its formative years as a caliphate. It finds that the organisation’s media infrastructure was about one-tenth as productive in mid-2019 as ...
Counterterrorism is a Public Function: Resetting the Balance Between Public and Private Sectors in Preventing Terrorist use of the Internet
September 18, 2023This paper, part of the Legal Perspectives on Tech Series, was commissioned in conjunction with the Congressional Counterterrorism Caucus. ...
Hard(Wired) For Terror: Unraveling the Mediatized Roots and Routes of Radicalization
September 18, 2023(Hard)Wired for Terror is divided into two parts. In the first part, (the ‘Roots’ ) we provide a historical, semantic analysis of the concepts of radicalism, extremism and terrorism, and how they are interconnected. Furthermore, a comprehensive overview is presented of the state of the art in which the current radicalization and terrorism research is ...
What Do Closed Source Data Tell Us About Lone Actor Terrorist Behavior? A Research Note
September 18, 2023This article contributes to the growing body of knowledge on loneactor terrorism with the incorporation of closed-source data. The analyses presented investigate the antecedent behaviors of U.K.- based lone-actor terrorists leading up to their planning or conducting a terrorist event. The results suggest that prior to their attack or arrest the vast majority of lone-actor ...