Internet and Terrorism

By Ali Fisher Challenging ISIS has little to do with their number of followers, or the decline in their number of messages. This type of tactical-level data can indicate success, but genuine impact can only occur with robust interpretation of data at the strategic level. Recent studies have been used to claim success in reducing the number of followers…

The United Nations General Assembly resolution adopted in July 2016 highlights the need to counter extremist narratives online. In the recent past, extremist content, usually content aiding terrorist activity has become a global concern. This post examines the methods adopted by state authorities and private entities to counter such online extremism. State Response The response to growing…

This blog post and a follow-up next week analyse Twitter activity following the terrorist attack that took place in Nice, France on 14 July, 2016 and associated real-world events during the ensuing week. It is part of a larger project exploring hashtag activism in CVE. This first posts traces the online reaction to developments during…

By Kirsten Fiedler In the past year, EDRi made numerous formal requests to get more information about the EU Internet Forum. This Forum was set up by the EU Commission to persuade companies to do “more” to fight terrorism. After months of obstruction from the European Commission, EDRi made a maladministration complaint to the European Ombudsman.…

By Jens-Henrik Jeppesen On 25 May, the European Commission published a set of proposals and documents under the umbrella of its Digital Single Market strategy. Among them is a Communication on ‘Online Platforms and the Digital Single Market Opportunities and Challenges for Europe’. This sets out the Commission’s conclusions and proposed actions based on its Platforms Consultation, which…

by Aaron Brantly and Muhammad al-`Ubaydi The average netizen has terrible digital hygiene. We click on random links, open emails from unknown individuals, use public WiFi hotspots, leave computers and devices unsecured, and often do not even use basic anti-virus packages. Most Chief Information Systems Officers’ largest problem is not a talented nation state, but…

by Paul Gill Over the past few years, a number of concerns have been raised about both the nature of the Internet’s relationship with terrorism and the threat posed by lone-actor terrorists. Despite these growing concerns, both literatures have lacked an empirical focus. The tendency to focus upon theory-building and illustrative examples means that we…