Blog

By Stefan Theil Germany’s infamous network enforcement law – which seeks to more heavily regulate social media – came into force at the start of 2018 to almost unanimous criticism. That is unfortunate, because I believe the law is a risk worth taking and can serve as a good starting point for governments considering tougher regulations…

By William Allchorn The 9th of June saw one of the most prominent far-right mobilisations of the year. Assembling in Trafalgar Square, hundreds of demonstrators turned out to protest the arrest and imprisonment of former English Defence League (EDL) leader, Tommy Robinson (real name Stephen Christopher Yaxley Lennon), for contempt of court after he broadcast live…

By Nick Feamster This post contains reflections from a Humboldt Institute for Internet and Society workshop on the use of artificial intelligence in governing communication online that took place earlier this year [Ed.] Context In the United States and Europe, many platforms that host user content, such as Facebook, YouTube, and Twitter, have enjoyed safe harbor protections for the…

By Mehwish Rani Daesh and Tehrik-e-Taliban Pakistan (TTP) are two competitor militant organisations in Pakistan. Although, Daesh has no organisational presence in the country, small groups inspired by it have carried out attacks in the name of the organisation. Both organisations publish propaganda magazines to, amongst other things, gain new recruits. While Daesh published approximately…

By Anne Speckhard, Ardian Shajkovci & Lorand Bodo This blog post synopsises a study that attempted to intervene with over fifty English-speaking Facebook accounts endorsing, promoting, and following ISIS. Methodology and Research Design For this study, several anonymized Facebook accounts were used to identify English-speaking radicalized Facebook profiles as our target for an online counter-narrative intervention.…

By Jonathan Saunders What if you could save an airport from terrorists, escape insurgents in South Sudan, and rescue civilians in an underground station all in one morning? With modern technology, the ability to recreate these scenarios within virtual and augmented reality is here, and we’re using it to help train counter-terrorism officers and aid workers.…

By Lorand Bodo On 25–26 April 2018, a major multinational digital content takedown operation was conducted against the Islamic State (IS). The operation targeted the major online media outlets directly associated with IS. The operation was reportedly successful in collecting digital evidence about IS activities, including the seizure of servers located in Canada, the Netherlands…

By Alexander Ritzmann The Propaganda Process Is online propaganda really effective? How can it be countered? And what can practitioners of Preventing Violent Extremism (PVE) and policymakers learn from the research findings of other relevant disciplines, such as anthropology, psychology and neuroscience? Propaganda, understood here as the strategic communication of ideas aiming at manipulating specific target…

By Gabe Maldoff The General Data Protection Regulation (GDPR) will come into effect in the spring of 2018, replacing the Data Protection Directive 95/46/EC and imposing new obligations on organizations that process the personal data of European Union residents. While the Regulation aims to bolster privacy rights, it arrives as a centerpiece of the EU Digital…

By Andre Oboler Online bullying, hate and incitement are on the rise, and new approaches are needed to tackle them. As the Australian Senate conducts hearings for its Inquiry into cyberbullying, it should consider a two-pronged approach to combating the problem. First, the government should follow the lead of Germany in imposing financial penalties on major…