Online extremism
Blog
One-to-one Digital Interventions: How can Practitioners Directly Reach Young People Expressing Interest in Extremist Content Online?
January 30, 2019VOX-Pol contributed to the inaugural Radicalisation Awareness Network (RAN) Civil Society Empowerment Programme (CSEP) campaigns event in Brussels this week. We therefore thought we’d share some insights from a previous RAN event focused on online CVE. [Ed.] Introduction It is an essential part of extremist propaganda and outreach to not only communicate their messages to ...
Blog
How Social Media Users in Kyrgyzstan are Turned into “Extremists”
January 9, 2019By Elnura Alkanova Since the 2000s, social networks have been widely used both as platform for like-minded users and an instrument for spreading information and ideas. But the rapid dissemination of facts and opinions also results in an uncontrollable stream of information. As a result, we are witnessing an increasing number of posts with negative content ...
Blog
Upvoting Extremism, Part II: An Assessment of Extreme-Right Discourse on Reddit
December 5, 2018By Tiana Gaudette, Garth Davies, and Ryan Scrivens This blog is Part II of II. Click here for Part I. This blog is the second of a two-part series that was presented at the ‘VOX-Pol Conference – Violent Extremism, Terrorism, and the Internet: Present and Future Trends’ in Amsterdam on 20 August 2018. Last week on ...
Blog
Artificial Intelligence and the Future of Online Content Moderation
July 11, 2018By Nick Feamster This post contains reflections from a Humboldt Institute for Internet and Society workshop on the use of artificial intelligence in governing communication online that took place earlier this year [Ed.] Context In the United States and Europe, many platforms that host user content, such as Facebook, YouTube, and Twitter, have enjoyed safe harbor protections for the ...
Blog
The Future of Detecting Extreme-right Sentiment Online
May 16, 2018By Tiana Gaudette, Ryan Scrivens, and Garth Davies Since the advent of the Internet, far-right extremists – amongst other extremist movements – from across the globe have exploited online resources to build a transnational ‘virtual community’. The Internet is a fundamental medium that facilitates these radical communities, not only in ‘traditional’ hate sites such as Stormfront, ...
Blog
We Must Separate the Debates on Extremism and Encryption
September 20, 2017By Tom Morrison-Bell The encryption debate has reared its head again as the Home Secretary visited the US to meet with tech firms to understand the work being done to tackle extremism. In an article in The Telegraph, the Home Secretary appears to restate the Government’s desire for some sort of back-door to end-to-end encryption ...
Blog
Macedonia’s Jailed Jihadists Try to Recruit Online
July 26, 2017By Haris Fazliu While researching Bringing Down the Digital Caliphate – Breaking the ISIS Brand (under review), for the International Center for The Study of Violent Extremism, ICSVE, I discovered that convicted terrorists in Macedonia linked to ISIS continue to share propaganda online. Jihadists currently serving sentences in Macedonian prisons freely use smartphones to watch videos, ...
Blog
Telegram: The Mighty Application That ISIS Loves – PART II
June 14, 2017This post is Part 2 of 2. Click here for Part 1 By Ahmet S. Yayla & Anne Speckhard Reaching out on to ISIS members via Telegram channels is a significant challenge for beginners. First of all, as the Telegram application is installed, the application copies all the contact numbers on one’s cell phone and connects the ...
Blog
Despite short-term increases in arrests, counter-extremism powers need to do more to tackle the far-right
April 26, 2017By Bharath Ganesh In early March, the Home Office published new counter-terrorism statistics that indicated a significant increase in the arrest of ‘white’ extremists. Tabloids in the UK, including The Daily Mail, ran triumphant headlines claiming a crackdown on far-right extremism. Unfortunately, the data released by the Home Office does not support any such assertion. The ...
Blog
Terrorist Use of the Internet by the Numbers: Part III – Research and Policy Implications
April 5, 2017This post is Part 3 of 3; Part I is HERE and Part II HERE. Also, a PDF combining all three posts is available HERE Collectively, the results from the open source data analysis presented in Part I and the findings from the police data contained in Post II highlight the need to focus upon ...