Want to learn more about how terrorists and violent extremists are using the internet to communicate and share propaganda? Perhaps you’re interested in why terrorists share their manifestos online and livestream their attacks? The Tech Against Terrorism podcast is a deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat. Join us as we speak to the world’ ...
T
Tech Against Terrorism


1
2022 Trends In Terrorist Behaviour Online
31:02
31:02
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
31:02
This week, we look back at some of the key trends and developments in terrorist and violent extremist use of the internet in 2022. We’ll be sharing findings from our “state of play” report which highlights shifts in terrorist behaviour and tactics online. Join Anne Craanen as she speaks to Tech Against Terrorism’s Charley, Rory and Arthur about dev…
T
Tech Against Terrorism


1
The Growing Threat of Misogyny and Gender-based Abuse Online
24:26
24:26
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
24:26
This week, we’re exploring the topic of online misogyny. With gender-based abuse in online spaces becoming a growing problem, we explore why misogynist views are so prominent online, the emotional impact of online harms, and what tech platforms can do to counter violent misogynistic content and protect victims from abuse. We also explore why misogy…
T
Tech Against Terrorism


1
Researcher Safety and Mental Health in Online Counterterrorism
26:40
26:40
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
26:40
This week, we’re exploring the topic of researcher safety and mental health, focusing on the particular difficulties facing those working with terrorist or violent extremist content. We ask whether there’s enough awareness around the subject, and what can be done, both individually and institutionally, to protect the emotional wellbeing and safety …
T
Tech Against Terrorism


1
OSINT: How our Analysts are Disrupting Terrorism Online
31:14
31:14
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
31:14
This week on the Tech Against Terrorism podcast, we’re taking you behind the scenes to learn more about the work of our Open-Source Intelligence (OSINT) Analysts who are responsible for tracking, analysing and alerting terrorist and violent extremist activity online. We share what a typical day in the life of an OSINT analyst looks like, some of th…
This week on the Tech Against Terrorism podcast we’re exploring the decentralised web. We discuss what the decentralised web is, its potential benefits for users, and whether terrorists and violent extremists are exploiting these technologies. We also consider future threats relating to exploitation of the decentralised web, and how tech companies …
T
Tech Against Terrorism


1
Terrorist Operated Websites
24:03
24:03
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
24:03
This week on the Tech Against Terrorism podcast we’re exploring the threat of terrorist operated websites (TOWs). We discuss what TOWs are, what features they offer, and what role they play in wider terrorist and violent extremist exploitation of the internet. We also discuss why removing websites is so legally and ethically complicated and require…
Welcome back to the Tech Against Terrorism podcast. For our first episode back, we’re taking a deep dive into the dark web. We discuss what the dark web is, who’s using it, plus consider the extent to which it’s exploited by terrorist actors. We also discuss how the dark web is regulated, consider future threats and whether it’s an area the tech se…
The Tech Against Terrorism podcast is returning on Thursday 13th October. Join us every other week as we unpick how terrorists and violent extremists are exploiting the darkest corners of the internet and what can be done to support the tech sector to disrupt this threat.โดย Tech Against Terrorism
T
Tech Against Terrorism


1
The TCAP: A Tool to Tackle Terrorist Content
33:18
33:18
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
33:18
For the final episode of Season 2 of the podcast we’re taking a closer look at a tool developed by Tech Against Terrorism called the Terrorist Content Analytics Platform (TCAP). We learn what the TCAP is, why it was set up, and how it’s used to automate the swift detection and removal of verified terrorist content on tech platforms. During the epis…
T
Tech Against Terrorism


1
Can Tech Platforms Rely on Algorithms to Remove Terrorist Content?
46:22
46:22
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
46:22
On this week’s episode, we’re exploring the role of automated solutions and Artificial Intelligence (AI) in tackling terrorist and violent extremist content and activity online. With the help of our expert guests, we delve into the historical use of machine learning algorithms for content moderation purposes, look at how they’ve developed over the …
T
Tech Against Terrorism


1
Debunking Russian Disinformation on “Denazification” of Ukraine (SPECIAL EPISODE)
35:35
35:35
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
35:35
This week we’re bringing you a special episode investigating the conflict in Ukraine. We unpack the truth around violent extremist elements operating in Ukraine amid the online information war that’s been unfolding. We speak to experts who expose the Russian claims of denazification as state-sponsored disinformation, and interrogate the reality of …
T
Tech Against Terrorism


1
Is Official Terrorist Content Illegal Online? Terrorist Designation and the Online Realm
59:50
59:50
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
59:50
On this week’s episode of the podcast, we’re looking at terrorist designation. We analyse different countries’ designation systems and discuss how they can be improved. We consider the role designation plays in the fight against terrorism and how it can be used as a tool to tackle terrorist content online. Anne Craanen is joined by two experts on d…
T
Tech Against Terrorism


1
Navigating a Fragmented Regulatory Landscape
39:10
39:10
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
39:10
On this week’s episode of the podcast, we’re looking at online regulation. We consider why regulation is so important, how the landscape has evolved, and focus on some of the specific challenges around regulating terrorist content online. We also touch on influential regulation that’s been recently adopted as well as regulation that’s currently bei…
T
Tech Against Terrorism


1
Tech Policy Evolution & The Human Side of Moderating Terrorist Content (PART 2)
30:10
30:10
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
30:10
Welcome back to part 2 of our deep dive into tech platform policy around countering terrorism and violent extremism. In this episode, we’re getting insight from Zoom and Clubhouse into how their community standards have been developed with tackling harmful content in mind. In this episode, Anne Craanen speaks to Jessica Mason, Head of Global Policy…
T
Tech Against Terrorism


1
Tech Policy Evolution & The Human Side of Moderating Terrorist Content (PART 1)
31:25
31:25
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
31:25
Welcome to part 1 of our deep dive into tech platform policy around countering terrorism and violent extremism. There’s a slightly different format this week, as we first chat to Charlotte Willner who gives us some context into the evolution of moderating terrorist content before we get a tech platform perspective on how these challenges look today…
T
Tech Against Terrorism


1
Tracking Violent Islamist Behaviour Online
39:04
39:04
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
39:04
In this week’s episode, we’re looking into how violent Islamist groups exploit the internet, how this has evolved in the last decade, and why these online networks are so resilient to content moderation efforts. We also share some of the things we’re doing here at Tech Against Terrorism to counter this threat and consider what tech companies and go…
T
Tech Against Terrorism


1
Tracking Violent Far-right Behaviour Online
38:45
38:45
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
38:45
In this week’s episode, we’re exploring the violent far-right’s use of the internet. We learn what is meant by the ‘far-right’, how different platforms are exploited by violent far-right actors, and the constant evolution of violent far-right content and its online dissemination. We also address some of the challenges moderators and tech platforms …
T
Tech Against Terrorism


1
Understanding Online Radicalisation
41:27
41:27
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
41:27
This week, we’re discussing the role of the internet in the radicalisation of terrorists and violent extremists. We learn what radicalisation is, debunk some of the myths surrounding it, and explore how the online and offline worlds interact in radicalising an individual. We’ll also touch on a range of case studies and consider what tech companies …
T
Tech Against Terrorism


1
Ghuwayran Prison Break: A Propaganda Victory for Islamic State?
44:36
44:36
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
44:36
In this episode, we discuss Islamic State’s large-scale attack on Ghuwayran prison in north-eastern Syria to break out jailed IS fighters, focusing on the extent to which the event translated into a propaganda victory for the group. During the episode, we uncover how the prison break played out both online and offline, the reaction from online IS s…
T
Tech Against Terrorism


1
A Foiled Plot in Texas: The Threat of Violent Fringe Online Networks
37:54
37:54
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
37:54
In this episode, we learn about violent far-right groups who are using the internet to plan and carry out real-world attacks. We hear how dangerous these fringe online communities really are and the work that’s going on behind the scenes to tackle this threat. Join Anne Craanen as she speaks to Alex Newhouse, Deputy Director of the Center on Terror…
T
Tech Against Terrorism


1
Tackling Taliban Content Online
39:25
39:25
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
39:25
In this episode, we’re exploring how the Taliban’s use of the internet and social media has evolved following their takeover of Afghanistan. We also explore how this compares with wider terrorist use of the internet, and the implications for tech companies moderating this content. Join Anne Craanen as she speaks to Charlie Winter, one of the world’…
Tech Against Terrorism is back with season two of the podcast. Join us for a weekly deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat.โดย Tech Against Terrorism
T
Tech Against Terrorism


1
Incels, online misogyny and gender-based terrorism
1:03:02
1:03:02
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:03:02
Incels are members of an online subculture who define themselves as unable to find a romantic or sexual partner despite desiring one and can be characterised by their hatred towards women. Over the last 10 years, attacks claimed by individuals propagating an incel ideology have claimed the lives of almost 50 people, with an average of 8 per attack.…
T
Tech Against Terrorism


1
Trend alert: accelerationism
1:00:27
1:00:27
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
1:00:27
In this episode, we discuss why accelerationism has become a flagship doctrine of far-right violent extremism. To help us comprehend what accelerationism is and how it is reflected in the online sphere, Maygane Janin and Adam Hadley are joined by Professor Matthew Feldmann, Director of the Centre for Analysis of the Radical Right (CARR), and an exp…
T
Tech Against Terrorism


1
A Gender Approach to Women's Role in the Online Extremist Sphere
47:06
47:06
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
47:06
Across the ideological spectrum, there are misconceptions and oversimplifications when it comes to discussing the role of women in terrorist organisations. From the perception that women are groomed into joining violent extremist groups and can therefore be presumed innocent, to the notion that a woman’s role in a terrorist organisation is secondar…
T
Tech Against Terrorism


1
Regulating the online sphere
49:07
49:07
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
49:07
How to best regulate the online sphere will be amongst the most important topics of the upcoming decade. Up until recently, laws have been in place that serve to mostly shield digital intermediaries from liability for third-party illegal content on their platform. Since 2016 however, in response to mounting concerns over the criminal misuse of the …
T
Tech Against Terrorism


1
How are terrorists and violent extremists using gamification?
48:43
48:43
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
48:43
“You can sit at home and play Call of Duty or you can come and respond to the real Call of Duty…the choice is yours.” This was tweeted by a well-known ISIS hacker and propagandist. Gaming culture and popular video games, such as Call of Duty and World of Warcraft, have become exploited by terrorist and violent extremist actors for propaganda and ra…
T
Tech Against Terrorism


1
Far-right violent extremists and meme culture
35:48
35:48
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
35:48
During the recent protests against the coronavirus lockdown in the US, a protester was spotted with a flyer referring to “Boogaloo”, a popular far-right violent extremist slang term calling for a new civil war that has turned into a meme culture of its own amongst violent extremists. One year earlier, before attacking two mosques and killing 51 peo…
T
Tech Against Terrorism


1
How Nordic neo-Nazis use the internet
38:48
38:48
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
38:48
The Nordic Resistance Movement (NRM) is a neo-Nazi organisation that was originally founded in Sweden. The movement, which is openly anti-semitic, anti-immigration and anti-gay, aims to dismantle Nordic parliamentary democracies and replace them with a unified Nordic fascist state. Join Flora Deverell and Jacob Berntsson as they discuss NRM’s growi…
T
Tech Against Terrorism


1
How mainstream media can spread terrorist propaganda
39:58
39:58
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
39:58
In the case of the recent terrorist attack in Christchurch, British and Australian tabloids were instrumental in making the gunman’s attack video and manifesto go viral. There have been a number of occasions where the work of the tech sector to take down extremist content from online platforms has been undermined by mainstream media outlets. Join L…
Although terrorist and extremist groups largely use traditional methods to fund their activities, the anonymity cryptocurrency affords is becoming an increasingly attractive alternative. Join Adam Hadley and Lorand Bodo as they speak to Nick Furneaux, author of ‘Investigating Cryptocurrencies’, Florence Keen, research fellow at the International Ce…
T
Tech Against Terrorism


1
The power and responsibility of Open Source Intelligence
53:57
53:57
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
53:57
โดย Tech Against Terrorism
T
Tech Against Terrorism


1
How we fight terrorism while protecting human rights
48:05
48:05
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
48:05
Human rights experts around the world have warned that the rush to tackle terrorist activity online has had worrying implications for fundamental human rights and freedom of speech. How do we differentiate between ‘free speech’ and speech that aims to incite violence? In this episode we find out how governments and tech platforms are attempting to …
T
Tech Against Terrorism


1
How do terrorists use the internet?
42:26
42:26
เล่นในภายหลัง
เล่นในภายหลัง
ลิสต์
ถูกใจ
ที่ถูกใจแล้ว
42:26
โดย Right Angles