Counterterrorism
Public support for counterterrorism efforts using probabilistic computing technologies to decipher terrorist communication on the internet
September 18, 2023Advancements in big data analytics offer new avenues for the analysis and deciphering of suspicious activities on the internet. One promising new technology to increase the identification of terrorism threats is based on probabilistic computing. The technology promises to provide more efficient problem solutions in encryption and cybersecurity. Probabilistic computing technologies use large amounts of ...
Manipulating Access To Communication Technology: Government Repression or Counterterrorism?
September 18, 2023This report offers a preliminary analysis of the effectiveness of network disruptions in achieving one specific outcome: tackling terrorist violence. It analyses the relationship between network disruptions and deaths and injuries from terrorist attacks to determine whether there is support for the commonly made argument that network disruptions are an important counterterrorism tactic. Using a ...
Social media corporations as actors of counter-terrorism
September 18, 2023This article discusses the role of giant social media corporations Facebook, Google (YouTube), and Twitter in counter-terrorism and countering violent extremisms (CT/CVEs). Based on a qualitative investigation mobilizing corporate communications as well as a collection of interviews with European stakeholders, it argues that these firms have become actors in this policy area of what is ...
Counter-terrorism, social media and the regulation of extremist content
September 18, 2023This insightful book provides an analysis of the central ethical issues that have arisen in combatting global terrorism and, in particular, jihadist terrorist groups, notably Al Qaeda, Islamic State and their affiliates. Chapters explore the theoretical problems that arise in relation to terrorism, such as the definition of terrorism and the concept of collective responsibility, ...
Digital Media and Violent Extremism in Bangladesh: Profiles and Narratives
September 18, 2023Despite the visible presence of violent extremist groups, and evidence of their connection with transnational groups such as Islamic State and Al-Qaeda, the number of empirical studies on this topic is limited in Bangladesh. There have been over 50 violent extremist attacks in Bangladesh in recent years (2013-2017) and digital media was used in different ...
New Models for Deploying Counterspeech: Measuring Behavioral Change and Sentiment Analysis
September 18, 2023The counterterrorism and CVE community has long questioned the effectiveness of counterspeech in countering extremism online. While most evaluation of counterspeech rely on limited reach and engagement metrics, this paper explores two models to better measure behavioral change and sentiment analysis. Conducted via partnerships between Facebook and counter-extremism NGOs, the first model uses A/B testing ...
New Models for Deploying Counterspeech: Measuring Behavioral Change and Sentiment Analysis
September 18, 2023The counterterrorism and CVE community has long questioned the effectiveness of counterspeech in countering extremism online. While most evaluation of counterspeech rely on limited reach and engagement metrics, this paper explores two models to better measure behavioral change and sentiment analysis. Conducted via partnerships between Facebook and counter-extremism NGOs, the first model uses A/B testing ...
Countering terrorism or criminalizing curiosity? The troubled history of UK responses to right-wing and other extremism
September 18, 2023The growth of right-wing extremism, especially where it segues into hate crime and terrorism, poses new challenges for governments, not least because its perpetrators are typically lone actors, often radicalized online. The United Kingdom has struggled to define, tackle or legitimate against extremism, though it already has an extensive array of terrorism-related offences that target ...
Tweeting Terror Live: Al-Shabaab’s Use of Twitter during the Westgate Attack and Implications for Counterterrorism Communications
September 18, 2023This article will analyze the motivations for and use of live-tweets during a terrorist attack. The employment of live-tweets offers terrorist groups the opportunity to adopt the role of a media outlet to exploit the advantages of live coverage typically exercised by mainstream media. This poses a unique challenge to policy makers and international media ...
Jihadist, Far-right And Far-left Terrorism In Cyberspace – Same Threat And Same Countermeasures?
September 18, 2023This paper investigates whether the counter-terrorism measures developed and implemented within the European Union have a universal character and are equally effective in the context of various types of terrorism. The authors focus on the strategies applicable to the terrorist activities online, since information and communication technology is perceived as the fastest growing and continually ...