Public support for counterterrorism efforts using probabilistic computing technologies to decipher terrorist communication on the internet
September 18, 2023
Advancements in big data analytics offer new avenues for the analysis and deciphering of suspicious activities on the internet. One promising new technology to increase the identification of terrorism threats is based on probabilistic computing. The technology promises to provide more efficient problem solutions in encryption and cybersecurity. Probabilistic computing technologies use large amounts of ...
Do You See What I See? Capabilities and Limits of Automated Multimedia Content Analysis
September 18, 2023
The ever-increasing amount of user-generated content online has led, in recent years, to an expansion in research and investment in automated content analysis tools. Scrutiny of automated content analysis has accelerated during the COVID-19 pandemic, as social networking services have placed a greater reliance on these tools due to concerns about health risks to their ...
Migration Moments: Extremist Adoption of Text‑Based Instant Messaging Applications
September 18, 2023
This report examines the patchwork of online text‑based instant messaging applications preferred by jihadist and far‑right extremist groups, with a focus on charting their technical affordances and their host companies’ stances on user privacy, security and regulation. To this end, the report analyses six online messaging services (BCM, Gab Chat, Hoop Messenger, Riot.im, Rocket.Chat and ...
The Legal Response Of Western Democracies To Online Terrorism And Extremism
September 18, 2023
Extremists and terrorists have found the online sphere, and specifically its social networks, to be an efficient tool for advancing their methods and political needs. The legal responses to the resulting threats from this online activity vary from country to country. The immense importance of the Internet in the everyday life of billions of people ...
Extreme Digital Speech: Contexts, Responses and Solutions
September 18, 2023
Extreme digital speech (EDS) is an emerging challenge that requires co-ordination between governments, civil society and the private sector. In this report, a range of experts on countering extremism consider the challenges that EDS presents to these stakeholders, the impact that EDS has and the responses taken by these actors to counter it. By focusing ...
Social Networks as the New Frontier of Terrorism
September 18, 2023
Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics ...
Terrorism and the Proportionality of Internet Surveillance
September 18, 2023
As the Internet has become a mainstream communications mechanism, law enforcement and intelligence agencies have developed new surveillance capabilities and been given new legal powers to monitor its users. These capabilities have been particularly targeted toward terrorism suspects and organizations that have been observed using the Internet for communication, propaganda, research, planning, publicity, fundraising and ...
Private Sector Engagement in Responding to the Use of the Internet and ICT for Terrorist Purposes
September 18, 2023
On the one hand, the companies in question feel a business incentive to create a digital environment where their users feel safe, and are increasingly compelled by governments to cooperate in blocking, filtering, countering or removing content or accounts on the grounds of public safety or national security concerns. In addition, users expect the companies ...