Tech Against Terrorism is a leading resource of research on the intersection between technology, terrorism, violent extremism and human rights. You can search for specific content using the tags below the articles.
Cover | Title & Abstract | Tags | Author | Links |
---|---|---|---|---|
|
ICSR / VOX-Pol Paper – Research Perspectives on Online Radicalisation: A Literature Review 2006-2016 — This literature review seeks to recalibrate our understanding of online radicalisation, how it is conceptualised within the literature and the extent to which the policy debate has advanced in response to technological and legal developments. | Academia, Propaganda, Terrorism | View Full Article | |
|
Media Jihad: The Islamic State’s Doctrine for Information Warfare — Weeks after its capture of Mosul in 2014, the Islamic State set about transforming its strategic trajectory. Through an avalanche of media products, it worked to aggressively insert itself into the global public discourse and, in turn, popularise its brand, polarise adversary populations and drive rivals into the ideological side-lines. This research paper presents new, empirical insight into this troubling phenomenon, which has set a benchmark for insurgent strategic communications the world over. Comprising the translation and analysis of a 55-page document compiled and published by the Islamic State in 2016, it offers a unique window into the mind-set of Abu Bakr al-Baghdadi’s propagandists. | Academia, Propaganda | View Full Article | |
|
To Stop ISIS Recruitment, Focus Offline — The Islamic State emerged as social media was taking off around the globe, and endless news stories and pundit commentary discusses its skill at mastering this new form of communication. While the ubiquity of Islamic State social media propaganda is clear, its effect is more contested. Seamus Hughes of George Washington's Program on Extremism argues the role of the Internet is real but overblown. If we want to stop terrorist recruitment, it still requires a focus on stopping in-person contact. |
Academia, Terrorism | View Full Article | |
|
ISIS in America – from retweets to Raqqa, Lorenzo Vidino and Seamus Hughes — Social media plays a crucial role in the radicalization and, at times, mobilization of U.S.-based ISIS sympathizers. The Program on Extremism has identified some 300 American and/or U.S.-based ISIS sympathizers active on social media, spreading propaganda, and interacting with like-minded individuals. Some members of this online echo chamber eventually make the leap from keyboard warriors to actual militancy. ISIS-related radicalization is by no means limited to social media. While instances of purely web-driven, individual radicalization are numerous, in several cases U.S.-based individuals initially cultivated and later strengthened their interest in ISIS’s narrative through face-to-face relationships. In most cases online and offline dynamics complement one another. |
Academia, Terrorism, USA | View Full Article | |
|
EU Internet Forum: Bringing together governments, Europol and technology companies to counter terrorist content and hate speech online — Today, European Commissioner for Migration, Home Affairs and Citizenship, Dimitris Avramopoulos in cooperation with the Commissioner for Justice, Consumer and Gender Equality, Věra Jourová, will launch the EU Internet Forum. The forum brings together EU Interior Ministers, high-level representatives of major internet companies, Europol, the EU Counter Terrorism Co-ordinator and the European Parliament. The goal is to reach a joint, voluntary approach based on a public-private partnership to detect and address harmful material online. | Counterterrorism, Europe, Government Regulation | View Full Article | |
|
National Security Implications of Virtual Currency — This report examines the feasibility for non-state actors, including terrorist and insurgent groups, to increase their political and/or economic power by deploying a virtual currency (VC) for use in regular economic transactions. A VC, such as Bitcoin, is a digital representation of value that can be transferred, stored, or traded electronically and that is neither issued by a central bank or public authority, nor necessarily attached to a fiat currency (dollars, euros, etc.), but is accepted by people as a means of payment. We addressed the following research questions from both the technological and political-economic perspectives: (1) Why would a non-state actor deploy a VC? That is, what political and/or economic utility is there to gain? How might this non-state actor go about such a deployment? What challenges would it have to overcome? (2) How might a government or organization successfully technologically disrupt a VC deployment by a non-state actor, and what degree of cyber sophistication would be required? (3) What additional capabilities become possible when the technologies underlying the development and implementation of VCs are used for purposes broader than currency? This report should be of interest to policymakers interested in technology, counterterrorism, and intelligence and law enforcement issues, as well as for VC and cybersecurity researchers. |
Analysis, Fintech, Terrorism | View Full Article |