Counterterrorism
Tweeting Terror Live: Al-Shabaab’s Use of Twitter during the Westgate Attack and Implications for Counterterrorism Communications
September 18, 2023This article will analyze the motivations for and use of live-tweets during a terrorist attack. The employment of live-tweets offers terrorist groups the opportunity to adopt the role of a media outlet to exploit the advantages of live coverage typically exercised by mainstream media. This poses a unique challenge to policy makers and international media ...
Counterterrorism Yearbook 2020
September 18, 2023This year’s Counterterrorism Yearbook draws upon 19 contributing authors, each a renowned thought leader in their field, to promote practical counterterrorism solutions by reviewing a global range of terrorism developments and counterterrorism responses. ASIO’s Director General, Mike Burgess commends the publication for its ‘valuable contribution to the public discourse on counterterrorism’. While maintaining its geographic ...
Countering Terrorist Narratives Online and Offline
September 18, 2023The present Analytical Brief was prepared by the Counter-Terrorism Committee Executive Directorate (CTED) in accordance with Security Council resolution 2395 (2017), which directs CTED to conduct analytical work on emerging issues, trends and developments and to make its analytical products available throughout the United Nations system. Terrorist groups have always sought to radicalize others (especially ...
Intersections of ISIS media leader loss and media campaign strategy A visual framing analysis
September 18, 2023The decision to target leaders of groups like ISIS to hamper their effectiveness has served as a longstanding principle of counterterrorism efforts. Yet, previous research suggests that any results may simply be temporary. Using insights from confiscated ISIS documents from Afghanistan to define the media leader roles that qualified for each level of the cascade, ...
A Plan for Preventing and Countering Terrorist and Violent Extremist Exploitation of Information and Communications Technology in America
September 18, 2023Policymakers in the United States know that terrorists and violent extremists exploit information and communications technologies (ICTs), but the government still struggles to prevent and counter these threats. Although the U.S. does not face these challenges alone, the strategies and policies emphasized by some of its greatest allies are not viable or suitable frameworks for ...
Social Media, Terrorist Content Prohibitions, And The Rule Of Law
September 18, 2023To inform the discussion, the paper draws on the debates that have surrounded the U.K. ‘Encouragement of Terrorism’ criminal offence. Created by the Terrorism Act 2006, and recently amended by the Counter-Terrorism and Border Security Act 2019, this offence has proved controversial from its inception for two principal reasons. First, the offence expressly encompasses both ...
EU Policy – Preventing The Dissemination Of Terrorist Content Online
September 18, 2023The use of the internet for recruitment and the dissemination of violent extremist materials raises significant policy challenges for the European Union (EU), its Member States, and content sharing platforms (CSPs) 1 alike. This problem requires – through the eyes of the EU – a combination of legislative, non-legislative, and voluntary measures based on collaboration ...
Disinformation In Terrorist Content Online
September 18, 2023This paper, part of the Legal Perspectives on Tech Series, was commissioned in conjunction with the Congressional Counterterrorism Caucus. ...
Fighting Hate Speech And Terrorist Propaganda On Social Media In Germany
September 18, 2023Lessons learned after one year of the NetzDG law. ...
Counterterrorism is a Public Function: Resetting the Balance Between Public and Private Sectors in Preventing Terrorist use of the Internet
September 18, 2023This paper, part of the Legal Perspectives on Tech Series, was commissioned in conjunction with the Congressional Counterterrorism Caucus. ...