Skip to main content

Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad

Details

Author: Miron Lakomy

Date of Publication: March 17th, 2022

Journal/Publisher: Terrorism and Political Violence


Purpose of Study

This study assesses the reasons why content moderation and control in cyberspace as a primary means of online CVE does not work as intended. This was approached by utilising open-sources intelligence techniques (OSINT).


Design of Study

Approach

This study used OSINT to map digital jihadist envornments from 2020-2021. The investigations discovered 331 channels engaged in the distribution of militant Islamist propaganda. This included 99 standalone websites, 30 social media and blog accounts, and 152 file-sharing services, alongside 50 other means of communication. This online ecosystem was then analysed by the author. 


Key Findings

Despite years of efforts from CVE stakeholders, the propaganda of militant Islamist VEOs is still easily accessible on the Internet. CVE programmes have been unevenly applied to militant Islamist organizations. There have been groups which represent violent extremist ideology but are not actively combated by stakeholders. As a result, these groups have been able to establish a solid foothold on the surface web. And, the efficiency of CVE strategies based on content takedowns are decreased by the relative ease of terrorists reestablishing banned communication channels, the availability of vast alternatives for online propaganda dissemination, the introduction of impractical legislation by governments, overlapping jurisdictions on the Internet.


Key Recommendations

Internet take downs do not work and may in fact be counter-productive. However, this study does not argue that militant Islamist propaganda should not be taken down at all. Removal of their productions from mainstream communication channels, such as social media, makes perfect sense. Restricting the most shocking or alluring productions published elsewhere is also a viable strategy. Nevertheless, these activities should be preceded by multidimensional and professional investigations focused on responsible media operatives. For this purpose, an information exchange mechanism between Internet companies and law enforcement should be established.


You might also like: