The Digital Crucible: Understanding and Preventing Youth Recruitment to Terror, Hate, and Cartel Organizations Online
September 24, 2025
This report reviews recent literature on youth recruitment to criminal, terror, and hate organizations within the context of Meta’s Tier system to help understand the dynamics of youth recruitment into Tier 1 DOIs and provide actionable insights for platforms’ efforts to enforce against content and actors involved in DOI recruitment. A case study from each ...
QAnon’s Psychological Influence: Investigating Q’s Digital Messaging
September 24, 2025
This study uses a quantitative natural-language processing tool, the Linguistic Inquiry Word Count (LIWC), to evaluate the content of all Q drops over time, focusing on language themes associated with three core principles of psychological influence: cognitive, emotional, and social processes. Before detailing this study, we situate it within the broader contexts of national security ...
Tackling Online Terrorist Content Together: Cooperation between Counterterrorism Law Enforcement and Technology Companies
May 30, 2025
Cooperation between law enforcement and tech companies is widely regarded as necessary to tackle online terrorist content. Both sectors have publicly stated their commitment to working together and there are examples of mutual cooperation. Yet there are also impediments to such collaboration, including different cultures and operating practices, and there have been high-profile instances of ...
Maintaining the Movement: ISIS Outreach to Westerners in the Post-Caliphate Era
April 30, 2025
Since the fall of the Caliphate, the activities and overall threat posed by Western jihadists has undoubtedly diminished. 1 A recent study released by the Program on Extremism, for example, demonstrated a steady decline in jihadist activity in the United States (US) since 2020. In this three-year period, only twenty-nine Americans have been charged, compared ...
Bad Gateway: How Deplatforming Affects Extremist Websites
April 30, 2025
Deplatforming websites—removing infrastructure services they need to operate, such as website hosting—can reduce the spread and reach of extremism and hate online, but when does deplatforming succeed? This report shows that deplatforming can decrease the popularity of extremist websites, especially when done without warning. We present four case studies of English-language, U.S.-based extremist websites that ...
Who Designates Terrorism? The Need for Legal Clarity and Transparency to Moderate Terrorist Content Online
April 29, 2025
In this report, Tech Against Terrorism investigates the use of designation: a powerful tool available to governments to facilitate improved action against terrorist use of the internet in a way that upholds the rule of law. We detail how terrorist designation differs from one jurisdiction to another. We argue that these counterterrorism measures, whether online ...
Into the Abyss: QAnon and the Militia Sphere in the 2020 Election
April 29, 2025
The certification of the 2020 election drew a substantial crowd of far-right extremists, with 13% of individuals arrested for crimes committed at the Capitol on January 6th having ties to militia groups. Even before the 2020 election, a 2019 report highlighted the increasing popularity of QAnon conspiracy theories among militia members, a trend which only ...
Financing violent extremism: An examination of maligned creativity in the use of financial technologies
April 29, 2025
This workbook teaches researchers, analysts and practitioners how different sorts of terrorist and violent extremist actors utilise financial technologies and cryptocurrencies to finance their operations. The process of terrorist adoption of financial technologies is spelled out for various organisations and can assist analysts to estimate whether and when a group or terrorist actor would embrace ...
Dual-use regulation: Managing hate and terrorism online before and after Section 230 reform
April 29, 2025
The old military aphorism that the enemy gets a vote is oft forgotten in both Silicon Valley and Washington, D.C. This cliche is worth keeping in mind as Congress debates adjustments to Section 230 (230) of the Communications Decency Act. For starters, Silicon Valleys persistent inability to ground products in the knowledge that some users ...
‘questions about dawlah. dm me, plz.’ the sock puppet problem in online terrorism research
April 29, 2025
This paper explores the problem of deception in online terrorism research. While conducting research into the growing phenomenon of female migration to Islamic State-held territory by Western females, we began following a Twitter account exhibiting suspicious activity. The account owner–believed to be a Canadian teenage female–indicated interest in learning more about joining the IS. We ...