Cultivating Trust and Perceptions of Source Credibility in Online Counternarratives Intended to Reduce Support for Terrorism
September 18, 2023
Terrorism researchers have long sought to identify methods for challenging terrorist ideologies. The construction and dissemination of counternarratives has begun to receive substantial attention as a means of doing so. However, the effectiveness of this approach is contingent on message targets’ trust in the counternarrative’s content and source. This article draws from literatures on trust ...
The Challenges and Limitations of Online Counter-Narratives in the Fight against ISIS Recruitment in Europe and North America
September 18, 2023
The rise of the Islamic State has contributed to both an increased terrorism threat in Western nations and an unprecedented number of citizens joining the group of so-called foreign fighters. IS has used the internet as a way to both disseminate propaganda and radicalize and recruit supporters. This article will begin by analyzing some of ...
Multimodal Classification of Violent Online Political Extremism Content with Graph Convolutional Networks
September 18, 2023
In this paper we present a multimodal approach to categorizing user posts based on their discussion topic. To integrate heterogeneous information extracted from the posts, i.e. text, visual content and the information about user interactions with the online platform, we deploy graph convolutional networks that were recently proven effective in classification tasks on knowledge graphs. ...
The Path to Persuasion: An Investigation into how Al-Shabab Constructs their Brand in their Digital Magazine Gaidi Mtaani.
September 18, 2023
Branding strategies are becoming increasingly important for terrorist organisations who need to take a more purposeful approach at imbuing aspirational associations to their organisations in order secure recruits and funds in an increasingly competitive environment. The creation and implication of these individual brands are further amplified through the sophisticated harnessing of ICT and digital media, ...
“A View from the CT Foxhole: An Interview with Brian Fishman, Counterterrorism Policy Manager, Facebook”
September 18, 2023
In our interview, Brian Fishman, Facebook’s Counterterrorism Policy Manager, provides a detailed description of how Facebook is using artificial intelligence and a dedicated team of counterterrorism specialists to remove terrorism content from its platform. Given the emergence of a new generation of leadership within al-Qa`ida, it is critical to understand the evolving threat from the ...
The Islamic State’s Virtual Caliphate
September 18, 2023
The public outcry attending President Trump’s attempted travel ban from seven radical Muslim states, designed to prevent foreign terrorists from entering the country, has diverted attention from the longstanding danger of homegrown jihadists. As early as 2007, the New York Police Department (NYPD) released a 92-page report documenting the extent of al-Qaeda-linked homegrown jihad in ...
The Cybercoaching of Terrorists: Cause for Alarm?
September 18, 2023
John Mueller examines the degree to which the cybercoaching of terrorists should be cause for concern, arguing that in many cases cybercoaches have little control over their amateurish charges. ...
The 60 Days of PVE Campaign: Lessons on Organizing an Online, Peer-to-Peer, Counter-radicalization Program
September 18, 2023
Combatting violent extremism can involve organizing Peer-to-Peer (P2P) preventing violent extremism (PVE) programs and social media campaigns. While hundreds of PVE campaigns have been launched around the world in recent months and years, very few of these campaigns have actually been reviewed, analyzed, or assessed in any systematic way. Metrics of success and failure have ...
The Role of Internet Intermediaries in Tackling Terrorism online
September 18, 2023
Gatekeeping is defined as the work of third parties “who are able to disrupt misconduct by withholding their cooperation from wrongdoers.”1 Internet intermediaries need to be far more proactive as gatekeepers than they are now. Socially responsible measures can prevent the translation of violent thoughts into violent actions. Designated monitoring mechanisms can potentially prevent such ...
Youth and Violent Extremism on Social Media: Mapping the Research
September 18, 2023
Does social media lead vulnerable individuals to resort to violence? Many people believe it does. And they respond with online censorship, surveillance and counter-speech. But what do we really know about the Internet as a cause, and what do we know about the impact of these reactions? All over the world, governments and Internet companies ...