Skip to main content

The Use of Counter Narratives to Combat Violent Extremism Online

  • Chapter
  • First Online:
Digital Transformation in Policing: The Promise, Perils and Solutions

Abstract

Due to recent rises in extremism across the globe (Dean et al. in J Polic Intell Count Terror 11:121–142, 2016; Le Roux in Responding to the rise in violent extremism in the Sahel. Africa Center For Strategic Studies, 2019, p. 26) and (Jones in Int Secur 32:7–40, 2008), governments and law enforcement organisations, such as the police, have looked to new strategies to counter violent extremism (Russell and Theodosiou in Counter-extremism: a decade on from 7/7. Quilliam Foundation, 2015). Specifically, there has been an expanse of the field now widely known as Countering Violent Extremism (CVE). CVE is a highly contested area; however, upon conducting a literature review, Inserra (Revisiting efforts to counter violent extremism: leadership needed. The Heritage Foundation, 2015, p. 2) helpfully reduced the term CVE down to descriptions of interventions intended to “stop individuals from radicalizing”. LaFree and Freilich (Annu Rev Criminol 2:383–404, 2019) distinguish counter-terrorism from CVE, they describe counter-terrorism as military responses (‘hard’) as opposed to non-military responses (‘soft’), referred to as countering violent extremism strategies. This chapter contends that, although counter narratives tend to lack academic standing, there does appear to be a widespread acceptance that narratives influence individuals’ beliefs. Therefore, in the absence of other more effective methods of CVE online, it is argued that counter-narratives (CN) should be used in informed ways by organisations such as the police (Monaghan in Crime Media Cult 18(1):21–39, 2020). This chapter will compare academic understandings of narrative and communication alongside examples of counter narratives issued against them. It will then assess the impact of such strategies and potential alternatives for CN.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aistrope T (2016) The Muslim paranoia narrative in counter-radicalisation policy. Crit Stud Terror 9(1):182–204. https://doi.org/10.1080/17539153.2016.1175272

    Article  Google Scholar 

  2. Ackerberg DA (2001) Empirically distinguishing informative and prestige effects of advertising. RAND J Econ 32(2):316–333

    Article  Google Scholar 

  3. Aly A, Weimann-Saks D, Weimann G (2014) Making “noise” online: an analysis of the say no to terror online campaign. Perspect Terror 8(5):3–47

    Google Scholar 

  4. Aly A, Macdonald S, Jarvis L, Chen T (2016) Violent extremism online: new perspectives on terrorism and the internet. Routledge

    Google Scholar 

  5. Aziz SF (2017) Losing the war of ideas: a critique of countering violent extremism programs. Texas Int Law J 52:255

    Google Scholar 

  6. Bauman Z, Bigo D, Esteves P, Guild E, Jabri V, Lyon D, Walker RB (2014) After snowden: rethinking the impact of surveillance. Int Polit Sociol 8(2):121–144

    Article  Google Scholar 

  7. Bélanger JJ, Nisa CF, Schumpe BM, Gurmu T, Williams MJ, Putra IE (2020) Do counter-narratives reduce support for ISIS? Yes, but not for their target audience. Front Psychol 11(1):126–144

    Google Scholar 

  8. Benson DC (2014) Why the Internet is not increasing terrorism. Secur Stud 23(2):293–328

    Article  Google Scholar 

  9. Bennett WL, Lawrence RG, Livingston S (2006) None dare call it torture: indexing and the limits of press independence in the Abu Ghraib scandal. J Commun 56(3):467–485

    Article  Google Scholar 

  10. Berger JM (2018) Extremism. MIT Press

    Book  Google Scholar 

  11. Berger JM (2016) Making CVE work. International Centre for Counter-Terrorism, The Hague, p 7

    Google Scholar 

  12. Bertram L (2016) Terrorism, the Internet and the social media advantage: exploring how terrorist organizations exploit aspects of the Internet, social media and how these same platforms could be used to counter-violent extremism. J Deradical 7:225–252

    Google Scholar 

  13. Bertram L (2015) How could a terrorist be de-radicalised? J Deradical 23(1):44–63

    Google Scholar 

  14. Bineham JL (1988) A historical account of the hypodermic model in mass communication. Commun Monogr 55(3):230–246

    Article  Google Scholar 

  15. Bishop P, Macdonald S (2019) Terrorist content and the social media ecosystem: the role of regulation. Digital Jihad: Online Commun Viol Extrem 31(1):135–152

    Google Scholar 

  16. Bodine-Baron E, Helmus TC, Magnuson M, Winkelman Z (2016) Examining ISIS support and opposition networks on Twitter. RAND Corporation

    Google Scholar 

  17. Bouhana N, Marchment Z, Schumann S (2018) Ours is not to reason why, but where: investigating the social ecology of radicalisation. American Society of Criminology Annual Meeting, Atlanta, GA

    Google Scholar 

  18. Bouzis K (2015) Countering the Islamic State: US counterterrorism measures. Stud Confl Terror 38(10):885–897

    Article  Google Scholar 

  19. Briggs R, Feve S (2013) Review of programs to counter narratives of violent extremism: what works and what are the implications for government? Institute for Strategic Dialogue

    Google Scholar 

  20. Braddock K (2020) Weaponized words: the strategic role of persuasion in violent radicalization and counter-radicalization. Cambridge University Press

    Google Scholar 

  21. Braddock K, Horgan J (2016) Towards a guide for constructing and disseminating counternarratives to reduce support for terrorism. Stud Confl Terror 39(5):381–404

    Article  Google Scholar 

  22. Braddock K, Dillard JP (2016) Meta-analytic evidence for the persuasive effect of narratives on beliefs, attitudes, intentions, and behaviors. Commun Monogr 83(4):446–467

    Article  Google Scholar 

  23. Braddock KH (2012) Fighting words: the persuasive effect of online extremist narratives on the radicalization process. Pennsylvania State University Press

    Google Scholar 

  24. Brown K, Pearson E (2018) Social media, the online environment and terrorism. In: Routledge handbook of terrorism and counterterrorism. Routledge

    Book  Google Scholar 

  25. Bull M, Rane H (2019) Beyond faith: social marginalisation and the prevention of radicalisation among young Muslim Australians. Crit Stud Terror 12(2):273–297

    Article  Google Scholar 

  26. Cherney A, Murphy K (2017) Police and community cooperation in counterterrorism: evidence and insights from Australia. Stud Confl Terror 40(12):1023–1037

    Article  Google Scholar 

  27. Crenshaw M (1981) The causes of terrorism. Comp Polit 13(4):379–399

    Article  Google Scholar 

  28. Dean G, Bell P, Vakhitova Z (2016) Right-wing extremism in Australia: the rise of the new radical right. J Polic Intell Count Terror 11(2):121–142

    Article  Google Scholar 

  29. English R (2010) Terrorism: how to respond. Oxford University Press

    Google Scholar 

  30. Europol (2019) 2019 EU Internet referral unit transparency report. https://www.europol.europa.eu/publications-documents/eu-iru-transparency-report-2019. Accessed April 2021

  31. Europa (2017) Countering terrorist narratives. Policy Department for Citizens Rights and Constitutional Affairs. https://www.europarl.europa.eu/RegData/etudes/STUD/2017/596829/IPOL_STU(2017)596829_EN.pdf. Accessed April 2021

  32. Fussey P, Sandhu A (2020) Surveillance arbitration in the era of digital policing. Theor Criminol 26(1):3–22

    Article  Google Scholar 

  33. Frischlich L, Rieger D, Morten A, Bente G (2018) The power of a good story: narrative persuasion in extremist propaganda and videos against violent extremism. Int J Confl Viol (IJCV) 12(1):42–63

    Google Scholar 

  34. Gelfand MJ, LaFree G, Fahey S, Feinberg E (2013) Culture and extremism. J Soc Issues 69(3):495–517

    Article  Google Scholar 

  35. Gill P, Corner E, Conway M, Thornton A, Bloom M, Horgan J (2017) Terrorist use of the Internet by the numbers: quantifying behaviors, patterns, and processes. Criminol Public Policy 16(1):99–117

    Article  Google Scholar 

  36. Ganesh B, Bright J (2020) Countering extremists on social media: challenges for strategic communication and content moderation. Policy Internet 12(1):6–19

    Article  Google Scholar 

  37. Gaudette T, Scrivens R, Venkatesh V (2020) The role of the Internet in facilitating violent extremism: insights from former right-wing extremists. Terror Polit Viol 21(1):1–18

    Google Scholar 

  38. Hemmingsen AS, Castro KI (2017) The trouble with counter-narratives (No. 2017: 01). DIIS report. https://www.econstor.eu/bitstream/10419/197640/1/880712619.pdf. Accessed March 2021

  39. Hamid N (2020) The ecology of extremists’ communications: messaging effectiveness, social environments and individual attributes. RUSI J 165(1):54–63

    Article  Google Scholar 

  40. Harman J (2014) Future terrorists. Los Angeles Times. http://articles.latimes.com/2014/jan/06/opinion/la-oe-harman-terrorism-response20140106. Accessed March 2021

  41. Hardy K (2018) Comparing theories of radicalisation with countering violent extremism policy. J Deradical 15:76–110

    Google Scholar 

  42. Ingram HJ (2016) A brief history of propaganda during conflict. The International Center for Counter-Terrorism, The Hague, p 7

    Google Scholar 

  43. Ingram HJ (2016) Deciphering the siren call of militant Islamist propaganda: meaning, credibility & behavioural change. International Centre for Counter-Terrorism, The Hague

    Google Scholar 

  44. Ingram HJ (2017) The strategic logic of the “linkage-based” approach to combating militant Islamist propaganda: conceptual and empirical. International Centre for Counter-Terrorism, The Hague

    Google Scholar 

  45. Inserra D (2015) Revisiting efforts to counter violent extremism: leadership needed. The Heritage Foundation, No. 4390

    Google Scholar 

  46. Jacobson M (2010) Terrorist dropouts: learning from those who have left. Washington Institute for Near East Policy

    Google Scholar 

  47. Jacobson M (2010) Terrorist financing and the Internet. Stud Confl Terror 33(4):353–363

    Article  Google Scholar 

  48. Jones SG (2008) The rise of Afghanistan’s insurgency: state failure and Jihad. Int Secur 32(4):7–40

    Article  Google Scholar 

  49. Kaplan JT, Gimbel SI, Harris S (2016) Neural correlates of maintaining one’s political beliefs in the face of counterevidence. Sci Rep 6(1):1–11

    Google Scholar 

  50. Katz R (2014) The State Department’s Twitter war with ISIS is embarrassing. Time Magazine. https://time.com/3387065/isis-twitter-war-state-department. Accessed March 2021

  51. Koehler D (2014) The radical online: individual radicalization processes and the role of the Internet. J Deradical 1:116–134

    Google Scholar 

  52. Kovaleva N (2018) Russian information space, Russian scholarship, and Kremlin controls. Def Strat Commun 4(4):133–171

    Article  MathSciNet  Google Scholar 

  53. Life After Hate (2020) About us page. https://www.lifeafterhate.org/about-us-page. Accessed April 2021

  54. LaFree G, Freilich JD (2019) Government policies for counteracting violent extremism. Annu Rev Criminol 2(1):383–404

    Article  Google Scholar 

  55. Lavorgna A (2015) Organised crime goes online: realities and challenges. J Money Laund Control 18(2):153–168

    Article  Google Scholar 

  56. Lee B (2019) Informal counter messaging: the potential and perils of the informal counter messaging space. Stud Confl Terror 42(1):161–177

    Article  Google Scholar 

  57. Lee B (2020) Countering violent extremism online: the experiences of informal counter messaging actors. Policy Internet 12(1):66–87

    Article  Google Scholar 

  58. Lee E, Leets L (2002) Persuasive storytelling by hate groups online: examining its effects on adolescents. Am Behav Sci 45(6):927–957

    Article  Google Scholar 

  59. Leuprecht C, Hataley T, Moskalenko S, McCauley C (2009) Winning the battle but losing the war? Narrative and counter-narratives strategy. Perspect Terror 3(2):25–35

    Google Scholar 

  60. Lippmann W (1922) Public opinion. New York: Macmillan

    Google Scholar 

  61. Mackie DM (1986) Social identification effects in group polarization. J Pers Soc Psychol 50(4):720

    Article  Google Scholar 

  62. Mahood S, Rane H (2017) Islamist narratives in ISIS recruitment propaganda. J Int Commun 23(1):15–35

    Article  Google Scholar 

  63. McCants W, Watts C (2012) U.S. strategy for countering violent extremism: an assessment. Foreign Policy Research Institute. http://www.fpri.org/articles/2012/12/us-strategy-countering-violent-extremism-assessment. Accessed April 2021

  64. McNeill BW (1989) Reconceptualizing social influence in counseling: the Elaboration Likelihood Model. J Couns Psychol 36(1):24–33

    Article  Google Scholar 

  65. Monaci S (2017) Explaining the Islamic state’s online media strategy: a transmedia approach. Int J Commun 11(1):19

    MathSciNet  Google Scholar 

  66. Monaghan J (2022) Performing counter-terrorism: police newsmaking and the dramaturgy of security. Crime Media Cult 18(1):21–39

    Article  Google Scholar 

  67. Müller F, van Zoonen L, Hirzalla F (2014) Anti-Islam propaganda and its effects: fitna, fear-based communication and the moderating role of public debate. Middle East J Cult Commun 7(1):82–100

    Article  Google Scholar 

  68. Nacos BL (2009) Revisiting the contagion hypothesis: terrorism, news coverage, and copycat attacks. Perspect Terror 3(3):3–13

    Google Scholar 

  69. Nashar M, Nayef H (2019) ‘Cooking the meal of terror’ manipulative strategies in terrorist discourse: a critical discourse analysis of ISIS statements. Terror Polit Viol 3:1–21

    Google Scholar 

  70. Neumann PR (2003) The trouble with radicalization. Int Aff 89(4):873–893

    Article  Google Scholar 

  71. Neumann PR (2013) Options and strategies for countering online radicalization in the United States. Stud Confl Terror 36(6):431–459

    Article  Google Scholar 

  72. O’Hara K, Stevens D (2015) Echo chambers and online radicalism: assessing the Internet’s complicity in violent extremism. Policy Internet 7(4):401–422

    Article  Google Scholar 

  73. Papadopoulos S, Kompatsiaris Y, Vakali A, Spyridonos P (2012) Community detection in social media. Data Min Knowl Disc 24(3):515–554

    Article  Google Scholar 

  74. Perliger A, Milton D (2016) From cradle to grave: the lifecycle of foreign fighters in Iraq and Syria. US Military Academy-Combating Terrorism Center West Point United States

    Google Scholar 

  75. Petty RE, Briñol P (2011) The elaboration likelihood model. Handb Theor Soc Psychol 1:224–245

    Google Scholar 

  76. Petty RE, Cacioppo JT (1986) The elaboration likelihood model of persuasion. In: Communication and persuasion. Springer

    Google Scholar 

  77. Quiggin T (2009) Understanding al-Qaeda’s ideology for counter-narrative work. Perspect Terror 3(2):18–24

    Google Scholar 

  78. Reed A, Dowling J (2018) The role of historical narratives in extremist propaganda. Def Strat Commun 4(1):79–104

    Article  Google Scholar 

  79. Reed A (2017) IS propaganda: should we counter the narrative? International Centre for Counter-Terrorism, The Hague. https://icct.nl/publication/is-propaganda-should-we-counter-the-narrative/. Accessed April 2021

  80. Reed A (2017) Counter-terrorism strategic communications: back to the future—lessons from past and present. In: Conway M, Jarvis L, Lehane O (eds) Terrorists’ use of the Internet: assessment and response. Los Press, pp 269–278

    Google Scholar 

  81. Rocca NM (2017) Mobilization and radicalization through persuasion: manipulative techniques in ISIS’ propaganda. Int Relat Dipl 5(11):660–670

    Google Scholar 

  82. Roselle L, Miskimmon A, O’loughlin B (2014) Strategic narrative: a new means to understand soft power. Media War Confl 7(1):70–84

    Google Scholar 

  83. Le Roux P (2019) Responding to the rise in violent extremism in the Sahel. Africa Center for Strategic Studies, p 26

    Google Scholar 

  84. Redirect Method (2019) The redirect method—a blueprint for bypassing extremism. https://redirectmethod.org/downloads/RedirectMethod-FullMethod-PDF.pdf. Accessed April 2021

  85. Russell J, Theodosiou A (2015) Counter-extremism: a decade on from 7/7. Quilliam Foundation

    Google Scholar 

  86. Schils N, Verhage A (2017) Understanding how and why young people enter radical or violent extremist groups. Int J Confl Viol 11:473–473

    Google Scholar 

  87. Schieb C, Preuss M (2018) Considering the elaboration likelihood model for simulating hate and counter speech on Facebook. SCM Stud Commun Media 7(4):580–606

    Google Scholar 

  88. Schmid AP (2013) Radicalisation, de-radicalisation, counter-radicalisation: a conceptual discussion and literature review. International Centre for Counter-Terrorism. http://www.icct.nl/download/file/ICCT-Schmid-Radicalisation-De-Radicalisation-Counter-Radicalisation-March-2013.pdf. Accessed April 2021

  89. Schmid AP (2015) Challenging the narrative of the “Islamic State.” International Centre for Counter-Terrorism, The Hague, pp 1–19

    Google Scholar 

  90. Sheikh H, Gómez Á, Atran S (2016) Empirical evidence for the devoted actor model. Curr Anthropol 57(13):204–209

    Article  Google Scholar 

  91. Silverman T, Stewart CJ, Birdwell J, Amanullah Z (2016) The impact of counter-narratives. Institute for Strategic Dialogue, pp 1–54

    Google Scholar 

  92. Slater MD, Rouner D (2002) Entertainment, education and elaboration likelihood: understanding the processing of narrative persuasion. Commun Theory 12(2):173–191

    Google Scholar 

  93. Slovic P, Finucane ML, Peters E, MacGregor DG (2004) Risk as analysis and risk as feelings: some thoughts about affect, reason, risk, and rationality. Risk Anal: Int J 24(2):311–322

    Article  Google Scholar 

  94. Speckhard A, Shajkovci A, Bodo L (2018) Fighting ISIS on Facebook—breaking the ISIS brand counter-narratives project. http://www.icsve.org/research-reports/fighting-isis-onfacebook-breaking-the-isis-brand-counter-narratives-project/. Accessed April 2022

  95. Spencer A (2006) The problems of evaluating counter-terrorism. Revista UNISCI 12:179–201

    Google Scholar 

  96. Stevens T, Neumann PR (2009) Countering online radicalisation: a strategy for action. The International Centre for the Study of Radicalisation and Political Violence, London. https://cst.org.uk/docs/countering_online_radicalisation1.pdf. Accessed March 2021

  97. Supreme Court of the United States (1968) U.S. reports: Brandenburg v. Ohio, 395 U.S. 444. Retrieved from the Library of Congress: https://www.loc.gov/item/usrep395444/. Accessed March 2021

  98. Szmania S, Fincher P (2017) Countering violent extremism online and offline. Criminol Public Policy 16:119–132

    Article  Google Scholar 

  99. Thomas M (2019) Was television responsible for a new generation of smokers? J Consum Res 46(4):689–707

    Google Scholar 

  100. U.K. Government (2019) Public perceptions of extremism report. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/835681/Public_Perceptions_of_Extremism_Interim_report_Final_.pdf. Accessed April 2021

  101. U.K. Government (2019) Online Harms White Paper. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/973939/Online_Harms_White_Paper_V2.pdf. Accessed April 2021

  102. United Nations (2017) Security Council Resolution 2017. https://www.undocs.org/S/RES/2017%20(2011). Accessed April 2021

  103. Watt E (2017) The right to privacy and the future of mass surveillance. Int J Human Rights 21(7):773–799

    Article  Google Scholar 

  104. Weimann G (2007) Using the Internet for terrorist. Hypermedia seduction for terrorist recruiting 25:47

    Google Scholar 

  105. Williams MJ (2020) Preventing and countering violent extremism: designing and evaluating evidence-based programs. Taylor & Francis

    Google Scholar 

  106. Williford AC (2018) Blurred lines: what is extremism. J Law Reform 52:913–937

    Google Scholar 

  107. Yu J (2018) Regulation of social media platforms to curb ISIS incitement and recruitment: the need for an international framework and its free speech implications. J Glob Justice Public Policy 4(1):122–136

    Google Scholar 

  108. Zeiger S, Aly A (2015) Countering violent extremism: developing an evidence-base for policy and practice. Curtin University

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Rees .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Rees, J., Montasari, R. (2023). The Use of Counter Narratives to Combat Violent Extremism Online. In: Montasari, R., Carpenter, V., Masys, A.J. (eds) Digital Transformation in Policing: The Promise, Perils and Solutions. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-09691-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-09691-4_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-09690-7

  • Online ISBN: 978-3-031-09691-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics