Towards a Framework Understanding of Online Programs for Countering Violent Extremism

There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means by which to address the effects of these narratives. Countering violent extremism (CVE) is a broad umbrella phrase that covers a wide array of approaches that

Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness, and Web Interactivity

Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia terrorist/extremist collections and advanced analytical methodologies, our empirical understanding of their Internet usage is still very limited. To address this research gap, we explore an integrated approach for identifying and

Code wars: Steganography, Signals Intelligence, and Terrorism

This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this

Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations

This report analyzes terrorist groups’ use of advanced information and communication technologies in efforts to plan, coordinate, and command their operations. It is one component of a larger study that examines terrorists’ use of technology, a critical arena in the war against terrorism. The goal of the investigation reported here is to identify which network

Main Findings of GIFCT Tech Trials: Combining Behavioural Signals to Surface Terrorist and Violent Extremist Incidents Online

By Tom Thorley & Erin Saltman This article summarises a recent paper published in Studies in Conflict & Terrorism that forms part of a special issue on the practicalities and complexities of (regulating) online terrorist content moderation. The special issue contains papers that were presented at Swansea University’s Terrorism and Social Media Conference 2022. Technical

Weeda Mehran

Weeda Mehran, PhD (Cambridge), MSc (Oxford) is a faculty member at the Department of Politics & Co-director of the Centre for Advanced International Studies (CAIS) at the University of Exeter. Dr Mehran has formerly worked at the Global Studies Institute, Georgia State University, McGill University and Dublin City University (as aVox-POL visiting scholar). She has

J.M. Berger

J.M. Berger is a consultant and author working on a suite of related issues that include extremism, misinformation, propaganda, advanced social media analysis, and technology sector content policies. A research fellow with VOX-Pol and a postgraduate research student at Swansea University’s School of Law, where he studies extremist ideologies, he is the author of four

The parallel economy: the rightwing movement creating a safe haven for deplatformed conservative influencers

By Jing Zeng, Utrecht University and Daniela Mahl, University of Zurich The last few years have seen the west swept by political polarisation, much of which has played out online. Debates around race, gender and freedom of speech have splintered democracies, spread conspiracy theories and sparked a series of culture wars. One byproduct of this