Internet Intermediaries, Human Rights, and Extremist Content
Content removal on social media platforms often takes place through semi-automated or automated processes. Algorithms are widely used for content filtering and content removal processes1, including on...
View ArticleA Glossary of Internet Content Blocking Tools
We have published a number of recent Blog posts–see HERE, HERE, and HERE–that address issues around content regulation and intermediary liability. We therefore thought the below would be a timely...
View ArticleIdentifying Radical Content Online
By Ryan Scrivens and Garth Davies Violent extremists and those who subscribe to radical beliefs have left their digital footprints online since the inception of the World Wide Web. Notable examples...
View ArticleOnline Jihadi Instructional Content: IS’s Rumiyah in 2017
By Maura Conway and Michael Courtney Jihadi magazines have a long pedigree, are the subject of extensive media coverage and scholarly analysis,[1] and are still easily accessible online. In a recent...
View ArticleBreaking the ISIS Brand Counter-Narratives: Intervention with Albanian...
This is part one of a two-part series. By Anne Speckhard, Ardian Shajkovci, Lorand Bodo & Haris Fazliu It is estimated that of the 38,000 foreign fighters who have joined Sunni militant groups,...
View ArticleBreaking the ISIS Brand Counter-Narratives – Part II: Ethical Considerations...
This is the second in a two-part series; part one is HERE. By Anne Speckhard & Ardian Shajkovci Last week’s Blog post described ICVSE’s efforts directing counter narratives into the ISIS-dominated...
View ArticleThe NRA’s Video Channel is a Hotbed of Online Hostility
By Adam G. Klein As the National Rifle Association, the most influential gun rights advocacy group in the U.S., comes under pressure from victims’ groups and gun control advocates, internet companies...
View ArticleOnline Extremism: UK Government’s Islamic State Blocking Tool is Neat but...
By Raheel Nawaz The UK government – with considerable pomp and ceremony – recently unveiled a new online tool for detection and removal of jihadi videos boasting a high success rate. It has been...
View ArticleWho Needs Courts? A Deeper Look At the European Commission’s Plans to Speed...
By Emma Llansó In early March the European Commission released its “Recommendation on measures to effectively tackle illegal content online”, which presents the Commission’s ideas for how to speed up...
View ArticleReverse-Engineering the ISIS Playbook, Part I: CT-CVE Messaging Lessons from...
By Haroro J. Ingram & Alastair Reed The challenges associated with confronting militant Islamist propaganda have not waned with the territorial demise of the so-called Islamic State (ISIS). Sure,...
View ArticleReverse-Engineering the ISIS Playbook, Part II: CT-CVE Messaging Lessons from...
By Haroro J. Ingram & Alastair Reed In Part I of this series, the authors presented the key findings of the CTSC Project’s latest publication titled “Islamic State’s English-language Magazines,...
View ArticleFacebook Data: Why Ethical Reviews Matter in Academic Research
We’re at Swansea University this week for a joint workshop with The Cyberterrorism Project on ‘The Ethics of Internet-mediated Terrorism Research,’ so we thought we’d post a Blog on ethics-related...
View ArticleAcademics Call on Facebook to Make Data More Widely Available for Research
By Shelley Hepworth A group of 20 academics based at universities around the world have written an open letter to Facebook, calling on the company to rethink how it engages with the research community....
View ArticleFacebook’s Data Lockdown is a Disaster for Academic Researchers
By Marco Bastos and Shawn T. Walker Facebook recently announced dramatic data access restrictions on its app and website. The company framed the lockdown as an attempt to protect user information, in...
View ArticleThe Future of Detecting Extreme-right Sentiment Online
By Tiana Gaudette, Ryan Scrivens, and Garth Davies Since the advent of the Internet, far-right extremists – amongst other extremist movements – from across the globe have exploited online resources to...
View ArticleTechnology and Regulation Must Work in Concert to Combat Hate Speech Online
By Andre Oboler Online bullying, hate and incitement are on the rise, and new approaches are needed to tackle them. As the Australian Senate conducts hearings for its Inquiry into cyberbullying, it...
View ArticleHow GDPR Changes the Rules for Research
By Gabe Maldoff The General Data Protection Regulation (GDPR) will come into effect in the spring of 2018, replacing the Data Protection Directive 95/46/EC and imposing new obligations on organizations...
View ArticleA Tribal Call to Arms: Propaganda and What PVE Can Learn from Anthropology,...
By Alexander Ritzmann The Propaganda Process Is online propaganda really effective? How can it be countered? And what can practitioners of Preventing Violent Extremism (PVE) and policymakers learn from...
View ArticleNow You See It, Now You Don’t? Moving Beyond Account & Content Removal in...
By Lorand Bodo On 25–26 April 2018, a major multinational digital content takedown operation was conducted against the Islamic State (IS). The operation targeted the major online media outlets directly...
View ArticleCounter-Terrorism Police Are Now Training with Virtual Terrorists
By Jonathan Saunders What if you could save an airport from terrorists, escape insurgents in South Sudan, and rescue civilians in an underground station all in one morning? With modern technology, the...
View Article