This document summarizes the research and strategy behind a social media campaign called "Challenge The Truth" aimed at countering violent extremism at Miami University. Research found that students lacked knowledge about violent extremism and ISIS. The strategy was to provide accurate, unbiased information on social media platforms to educate students and counter the exaggerated portrayals in the media. The campaign would create informative articles and use polls to engage students while revealing the facts about violent extremism.
Us intelligence officer 'every single terrorist attack in us was a false fla...RepentSinner
The document discusses a US intelligence officer's claim that every terrorist attack in the US has been a "false flag" operation. It then provides context on the concept of "false flag" attacks using 9/11 as an example. The document also discusses whistleblower claims that groups like Al-Qaeda and potentially ISIS have been created or amplified by Western intelligence for geopolitical goals. An FBI whistleblower is quoted saying the US revives terror scares to promote the terror war industry.
Us intelligence officer 'every single terrorist attack in us was a false fla...RepentSinner
The document discusses the claims of US intelligence whistleblowers regarding "false flag" terrorist attacks. It summarizes the statements of David Steele, a former Marine Corps intelligence officer, who said that every terrorist incident in the US has been a false flag operation or instigated by FBI informants. It also discusses the possibility that groups like Al-Qaeda and ISIS were created or amplified by Western intelligence for geopolitical goals. An interview with FBI whistleblower Sibel Edmonds is presented, where she argues that terrorist groups are marketing brands that can be changed or replaced as needed by intelligence agencies.
The Role of the Internet Post-9:11 in Terrorism and Counterterrorism Valerie Williams
This document summarizes the key findings of a journal article about the role of the internet in terrorism and counterterrorism since 9/11. It discusses how terrorist groups have used the internet to spread propaganda, connect with recruits and supporters, plan attacks, and inspire radicalization. Several case studies are provided of terrorists who used the internet to communicate and coordinate their plots. It also describes the strategies used by counterterrorism agencies like the FBI to monitor online activity and conduct undercover operations online to detect and prevent terrorist activities in the post-9/11 era.
The document summarizes the Islamic State's methods for recruiting Western female youth through social media. IS recruiters target disillusioned youth experiencing difficulties fitting into mainstream Western society. They utilize sophisticated propaganda employing Western pop culture and focus on fulfilling needs for belonging, purpose, and self-actualization. Recruiters groom potential recruits individually through social media to isolate them from their families and dependence on the recruiter, similar to techniques used by human traffickers, pedophiles, gangs and cults. Approximately 10% of Westerners fighting for IS are women aged 18-25 who are recruited online and encouraged to travel to Syria or carry out attacks at home.
Dr. Aref Nayed analyses the propaganda strategy and methods utilised by ISIS and affiliates in sophisticated video productions aimed at propagating their ideology, and recruiting the young and ignorant. The videos, he notes, are of a very high production value that seem on par with movies coming out of Hollywood studios. He also noted that the videos invoke familiar scenes from violent video games that are clearly designed to pique the interest of the youth. This propaganda, coupled with an ignorance of faith and invocation of familiar motifs such as religion and entertainment, draws vulnerable and disenfranchised youth into the ranks of nefarious organisations such as ISIS.
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyInternet Law Center
Silicon Valley will play an important role in countering terrorism given its leadership in technology innovation. Its companies are creating new security technologies to detect threats and protect systems and data. While individual privacy must be respected, Silicon Valley firms are rising to the challenge of national security based on a conference of entrepreneurs showcasing emerging solutions. New approaches could enhance physical security, detect dangerous materials, and enable advanced analytics for counterterrorism. Silicon Valley is positioning itself at the forefront of combating terrorism through technological progress.
Al-Qaeda is using sophisticated methods to recruit and indoctrinate children. They produce propaganda films depicting violence to inspire young viewers. Some children willingly join due to patriotism, while others are kidnapped. Summer camps teach children military tactics and how to use weapons. Al-Qaeda relies on distorting Islamic ideology to brainwash children into carrying out suicide operations. They portray the West as enemies of God to generate hatred. While recruitment of child soldiers has occurred for years, efforts are being made to protect children and undermine Al-Qaeda's radicalization efforts.
Terrorist incidents and attacks against Jews and Israelis in the United State...Juval Aviv
Analyzing Five Decades of Incidents, Study Finds Synagogues Most Frequent Location of Attacks Against Jewish Community
New York (December 12, 2016) -- A pioneering analysis of attacks against Jewish and Israeli targets in the United States has found the severity of incidents has risen in recent years. The Community Security Service (CSS), a leading Jewish security organization in the United States, partnered with Yehudit Barsky, a counterterrorism expert, to conduct the study, entitled Terrorist Incidents and Attacks Against Jews and Israelis in the United States, 1969-2016. The report is an examination of the 104 most serious attacks and terrorist acts against Jews and Israelis in the US from 1969 through the present, out of the thousands of more general anti-semitic incidents and hate crimes that occur annually.
Us intelligence officer 'every single terrorist attack in us was a false fla...RepentSinner
The document discusses a US intelligence officer's claim that every terrorist attack in the US has been a "false flag" operation. It then provides context on the concept of "false flag" attacks using 9/11 as an example. The document also discusses whistleblower claims that groups like Al-Qaeda and potentially ISIS have been created or amplified by Western intelligence for geopolitical goals. An FBI whistleblower is quoted saying the US revives terror scares to promote the terror war industry.
Us intelligence officer 'every single terrorist attack in us was a false fla...RepentSinner
The document discusses the claims of US intelligence whistleblowers regarding "false flag" terrorist attacks. It summarizes the statements of David Steele, a former Marine Corps intelligence officer, who said that every terrorist incident in the US has been a false flag operation or instigated by FBI informants. It also discusses the possibility that groups like Al-Qaeda and ISIS were created or amplified by Western intelligence for geopolitical goals. An interview with FBI whistleblower Sibel Edmonds is presented, where she argues that terrorist groups are marketing brands that can be changed or replaced as needed by intelligence agencies.
The Role of the Internet Post-9:11 in Terrorism and Counterterrorism Valerie Williams
This document summarizes the key findings of a journal article about the role of the internet in terrorism and counterterrorism since 9/11. It discusses how terrorist groups have used the internet to spread propaganda, connect with recruits and supporters, plan attacks, and inspire radicalization. Several case studies are provided of terrorists who used the internet to communicate and coordinate their plots. It also describes the strategies used by counterterrorism agencies like the FBI to monitor online activity and conduct undercover operations online to detect and prevent terrorist activities in the post-9/11 era.
The document summarizes the Islamic State's methods for recruiting Western female youth through social media. IS recruiters target disillusioned youth experiencing difficulties fitting into mainstream Western society. They utilize sophisticated propaganda employing Western pop culture and focus on fulfilling needs for belonging, purpose, and self-actualization. Recruiters groom potential recruits individually through social media to isolate them from their families and dependence on the recruiter, similar to techniques used by human traffickers, pedophiles, gangs and cults. Approximately 10% of Westerners fighting for IS are women aged 18-25 who are recruited online and encouraged to travel to Syria or carry out attacks at home.
Dr. Aref Nayed analyses the propaganda strategy and methods utilised by ISIS and affiliates in sophisticated video productions aimed at propagating their ideology, and recruiting the young and ignorant. The videos, he notes, are of a very high production value that seem on par with movies coming out of Hollywood studios. He also noted that the videos invoke familiar scenes from violent video games that are clearly designed to pique the interest of the youth. This propaganda, coupled with an ignorance of faith and invocation of familiar motifs such as religion and entertainment, draws vulnerable and disenfranchised youth into the ranks of nefarious organisations such as ISIS.
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyInternet Law Center
Silicon Valley will play an important role in countering terrorism given its leadership in technology innovation. Its companies are creating new security technologies to detect threats and protect systems and data. While individual privacy must be respected, Silicon Valley firms are rising to the challenge of national security based on a conference of entrepreneurs showcasing emerging solutions. New approaches could enhance physical security, detect dangerous materials, and enable advanced analytics for counterterrorism. Silicon Valley is positioning itself at the forefront of combating terrorism through technological progress.
Al-Qaeda is using sophisticated methods to recruit and indoctrinate children. They produce propaganda films depicting violence to inspire young viewers. Some children willingly join due to patriotism, while others are kidnapped. Summer camps teach children military tactics and how to use weapons. Al-Qaeda relies on distorting Islamic ideology to brainwash children into carrying out suicide operations. They portray the West as enemies of God to generate hatred. While recruitment of child soldiers has occurred for years, efforts are being made to protect children and undermine Al-Qaeda's radicalization efforts.
Terrorist incidents and attacks against Jews and Israelis in the United State...Juval Aviv
Analyzing Five Decades of Incidents, Study Finds Synagogues Most Frequent Location of Attacks Against Jewish Community
New York (December 12, 2016) -- A pioneering analysis of attacks against Jewish and Israeli targets in the United States has found the severity of incidents has risen in recent years. The Community Security Service (CSS), a leading Jewish security organization in the United States, partnered with Yehudit Barsky, a counterterrorism expert, to conduct the study, entitled Terrorist Incidents and Attacks Against Jews and Israelis in the United States, 1969-2016. The report is an examination of the 104 most serious attacks and terrorist acts against Jews and Israelis in the US from 1969 through the present, out of the thousands of more general anti-semitic incidents and hate crimes that occur annually.
Ways in which travelers are using Twitter for tipsRafat Ali
Allianz Global Assistance, the travel insurance giant, has come out with a study of Twitter usage among travelers and the kinds of requests that they have related to travel.
For more, check Skift's story: http://skift.com/2013/07/05/the-10-ways-in-which-travelers-are-using-twitter-for-tips/
The document discusses different types of narratives that motivate individuals and groups towards violent extremism. It identifies three primary categories of narratives: global narratives that conjure a worldwide community bound by a shared struggle, local narratives that focus on more narrow goals within a particular region, and national narratives that leverage patriotism and connection to a homeland. While individual motivations for extremism are complex, understanding these overarching narratives provides insight into why large movements form and the extraordinary actions they inspire. The competition between local and global narratives may influence factions vying for power following the Arab Spring.
This document analyzes trends in luxury travel based on data from social media postings. Some key findings include:
1. Millennials are helping to redefine luxury travel as experiences that can be easily shared on social media like Instagram.
2. Luxury travel hotspots are shifting from traditional locations like Paris and Las Vegas to newer destinations in southern and eastern areas like Abu Dhabi, Da Nang, and Lima.
3. TripAdvisor remains the dominant site for luxury hotel reviews globally but Chinese review sites are growing rapidly in influence as the number of Chinese travelers increases.
Terrorist behavior: Terrorists personalities reveal aggressiveness, a degree of flawed self-concept, a tendency to blame and scapegoat others, and a proneness to failure.
National media heavily criticized Iraqi Prime Minister Nouri al-Maliki following ISIS's seizure of Mosul in June 2014. Publications like CNN, Al Jazeera America, and TIME accused Maliki of consolidating power, neglecting Sunni factions, and exacerbating sectarian tensions, thereby enabling ISIS's rise. This widespread condemnation from influential outlets increased pressure on Maliki, and he resigned in August 2014 in a historic transfer of power. The document analyzes this media coverage and its impact in escalating calls for Maliki to step down after his leadership failures allowed ISIS to gain control in Iraq.
Fred Hof argues that the only way to destroy ISIS is to first remove Bashar al-Assad from power in Syria. As an expert on the Middle East who has worked with the US government, Hof uses his experience and knowledge to persuasively argue that the current strategy of bombing ISIS is not effective and that strengthening governments in Iraq and Syria is essential. While not citing sources, Hof backs his opinion with facts and references other articles that support his view that Assad's removal is necessary to cut off ISIS's support and resources. The article is aimed at changing perceptions of how to address ISIS and convincing the audience of a more aggressive strategy.
The document discusses the pull factors that attract young people to join terrorist organizations like the Abu Sayyaf Group in the Philippines, using it as a case study. It argues that there are both ideational and material pull factors. Ideationally, terrorist groups use radical religious ideologies to attract youth and give their lives meaning. Materially, they offer monetary rewards, supplies, and support to families to entice impoverished youth. The Abu Sayyaf Group initially grew due to the charismatic preaching of its founder but later resorted more to kidnapping-for-ransom activities to fund recruitment through financial incentives as ideological fervor waned. Understanding these pull factors is important for counterterrorism policy.
This document discusses the problem of homegrown terrorism and self-radicalization in the United States. It notes that since 9/11, nearly half of terrorist plots against the US have been carried out by American citizens or residents who became radicalized in the US. While domestic attacks cause fear, they result in far fewer deaths than international terrorism. However, terrorist organizations see value in recruiting and radicalizing Americans due to their ability to move freely within the US and between countries. The document examines past cases of self-radicalization and discusses the process of becoming radicalized through consuming terrorist propaganda online and communicating with terrorist recruiters. It argues that homegrown terrorism remains a threat and more must be done to identify and stop self-
This document discusses a single platform for businesses that allows searching across media and places on a city grid. The platform enables users to perform searches that return JSON formatted results for data exchange between the platform and users.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The document provides 12 scenarios related to decision making in an organizational setting. For each scenario, there are 4 potential responses marked A, B, C, and D. The correct responses are provided in a key at the end, with +2 marking the best response, +1 an acceptable response, -1 a response to avoid, and -2 the worst response.
This document outlines the features of a website for renting parking spots. The website allows renters to search for available spots on a map, select spots, book them by providing time/date details and paying online. Lessors can add their parking spots to the website, provide descriptions and set rates. An admin manages members, payments, transactions, reviews and maintains the website.
This document provides a quote for various fan and water bottle promotional products from BX Merchandise, including:
1. Stylish desk fans powered by USB cables available from £3.29 each for quantities of 1000.
2. Electric metal desk fans available from £3.29 each for quantities of 960, with a £39 origination fee.
3. 3-in-1 flexible USB fans and lights available from £1.99 each for quantities of 1000, with a £35 origination fee.
4. Colourful mini electric fans available from £1.59 each for quantities of 1000, with a £35 origination fee.
The document contains 12 multiple choice questions related to decision making in management situations. For each question, there are 4 answer options marked K, L, M, and N. The correct answer key provided at the end of the document pairs each question number with the corresponding correct answer option.
CellMissy: enabling management and dissemination of cell migration dataPaola Chiara Masuzzo
This talk presents some key features of the CellMissy software for the management and dissemination of cell migration data. The slides were presented during the 'Data management and standardization in cell migration research' workshop.
The term ‘whistleblowing’ is sometimes confused with the need to report safeguarding or professional concerns about another member of staff or adult in the school. Whistleblowing is about systemic or procedural failures and is not only confined to issues about staff conduct.
<p><font>신경제 패러다임과 인터넷 마케팅, 소셜미디어 마케팅 전략</font></p><p><font>데브멘토 지식공유모임</font></p><div><font>정지훈 우리들병원 생명과학기술연구소장</font></div><div><font>나노경제학 => 프로슈밍(prosumin) 현상, 롱테일(Longtail)과 바이럴(Viral) 현상</font></div><div><font>Microsoft Vs Apple Vs Google</font></div><div><font>소셜미디어 마케팅 전략</font></div>
The document provides instructions for students to build a cooling fan using plastic materials to understand their properties better. It lists the necessary materials, such as old CDs, tealight candles, rubber bands, and PVC pipes. It explains that the fan column will be made from PVC pipe and the base must be 10 cm high. It also outlines that students can power the fan with batteries, USB, or solar cells and their project will be graded based on work in class, the final result, and their report.
The document discusses creating a positive learning environment for children. It emphasizes the importance of observation, planning, and adapting the physical environment, activities, and teaching approaches to meet the diverse needs of all children in an inclusive setting. High-quality early education is said to help children achieve better long-term outcomes by providing warm, responsive relationships and continuously challenging learning experiences both indoors and outdoors.
Ways in which travelers are using Twitter for tipsRafat Ali
Allianz Global Assistance, the travel insurance giant, has come out with a study of Twitter usage among travelers and the kinds of requests that they have related to travel.
For more, check Skift's story: http://skift.com/2013/07/05/the-10-ways-in-which-travelers-are-using-twitter-for-tips/
The document discusses different types of narratives that motivate individuals and groups towards violent extremism. It identifies three primary categories of narratives: global narratives that conjure a worldwide community bound by a shared struggle, local narratives that focus on more narrow goals within a particular region, and national narratives that leverage patriotism and connection to a homeland. While individual motivations for extremism are complex, understanding these overarching narratives provides insight into why large movements form and the extraordinary actions they inspire. The competition between local and global narratives may influence factions vying for power following the Arab Spring.
This document analyzes trends in luxury travel based on data from social media postings. Some key findings include:
1. Millennials are helping to redefine luxury travel as experiences that can be easily shared on social media like Instagram.
2. Luxury travel hotspots are shifting from traditional locations like Paris and Las Vegas to newer destinations in southern and eastern areas like Abu Dhabi, Da Nang, and Lima.
3. TripAdvisor remains the dominant site for luxury hotel reviews globally but Chinese review sites are growing rapidly in influence as the number of Chinese travelers increases.
Terrorist behavior: Terrorists personalities reveal aggressiveness, a degree of flawed self-concept, a tendency to blame and scapegoat others, and a proneness to failure.
National media heavily criticized Iraqi Prime Minister Nouri al-Maliki following ISIS's seizure of Mosul in June 2014. Publications like CNN, Al Jazeera America, and TIME accused Maliki of consolidating power, neglecting Sunni factions, and exacerbating sectarian tensions, thereby enabling ISIS's rise. This widespread condemnation from influential outlets increased pressure on Maliki, and he resigned in August 2014 in a historic transfer of power. The document analyzes this media coverage and its impact in escalating calls for Maliki to step down after his leadership failures allowed ISIS to gain control in Iraq.
Fred Hof argues that the only way to destroy ISIS is to first remove Bashar al-Assad from power in Syria. As an expert on the Middle East who has worked with the US government, Hof uses his experience and knowledge to persuasively argue that the current strategy of bombing ISIS is not effective and that strengthening governments in Iraq and Syria is essential. While not citing sources, Hof backs his opinion with facts and references other articles that support his view that Assad's removal is necessary to cut off ISIS's support and resources. The article is aimed at changing perceptions of how to address ISIS and convincing the audience of a more aggressive strategy.
The document discusses the pull factors that attract young people to join terrorist organizations like the Abu Sayyaf Group in the Philippines, using it as a case study. It argues that there are both ideational and material pull factors. Ideationally, terrorist groups use radical religious ideologies to attract youth and give their lives meaning. Materially, they offer monetary rewards, supplies, and support to families to entice impoverished youth. The Abu Sayyaf Group initially grew due to the charismatic preaching of its founder but later resorted more to kidnapping-for-ransom activities to fund recruitment through financial incentives as ideological fervor waned. Understanding these pull factors is important for counterterrorism policy.
This document discusses the problem of homegrown terrorism and self-radicalization in the United States. It notes that since 9/11, nearly half of terrorist plots against the US have been carried out by American citizens or residents who became radicalized in the US. While domestic attacks cause fear, they result in far fewer deaths than international terrorism. However, terrorist organizations see value in recruiting and radicalizing Americans due to their ability to move freely within the US and between countries. The document examines past cases of self-radicalization and discusses the process of becoming radicalized through consuming terrorist propaganda online and communicating with terrorist recruiters. It argues that homegrown terrorism remains a threat and more must be done to identify and stop self-
This document discusses a single platform for businesses that allows searching across media and places on a city grid. The platform enables users to perform searches that return JSON formatted results for data exchange between the platform and users.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The document provides 12 scenarios related to decision making in an organizational setting. For each scenario, there are 4 potential responses marked A, B, C, and D. The correct responses are provided in a key at the end, with +2 marking the best response, +1 an acceptable response, -1 a response to avoid, and -2 the worst response.
This document outlines the features of a website for renting parking spots. The website allows renters to search for available spots on a map, select spots, book them by providing time/date details and paying online. Lessors can add their parking spots to the website, provide descriptions and set rates. An admin manages members, payments, transactions, reviews and maintains the website.
This document provides a quote for various fan and water bottle promotional products from BX Merchandise, including:
1. Stylish desk fans powered by USB cables available from £3.29 each for quantities of 1000.
2. Electric metal desk fans available from £3.29 each for quantities of 960, with a £39 origination fee.
3. 3-in-1 flexible USB fans and lights available from £1.99 each for quantities of 1000, with a £35 origination fee.
4. Colourful mini electric fans available from £1.59 each for quantities of 1000, with a £35 origination fee.
The document contains 12 multiple choice questions related to decision making in management situations. For each question, there are 4 answer options marked K, L, M, and N. The correct answer key provided at the end of the document pairs each question number with the corresponding correct answer option.
CellMissy: enabling management and dissemination of cell migration dataPaola Chiara Masuzzo
This talk presents some key features of the CellMissy software for the management and dissemination of cell migration data. The slides were presented during the 'Data management and standardization in cell migration research' workshop.
The term ‘whistleblowing’ is sometimes confused with the need to report safeguarding or professional concerns about another member of staff or adult in the school. Whistleblowing is about systemic or procedural failures and is not only confined to issues about staff conduct.
<p><font>신경제 패러다임과 인터넷 마케팅, 소셜미디어 마케팅 전략</font></p><p><font>데브멘토 지식공유모임</font></p><div><font>정지훈 우리들병원 생명과학기술연구소장</font></div><div><font>나노경제학 => 프로슈밍(prosumin) 현상, 롱테일(Longtail)과 바이럴(Viral) 현상</font></div><div><font>Microsoft Vs Apple Vs Google</font></div><div><font>소셜미디어 마케팅 전략</font></div>
The document provides instructions for students to build a cooling fan using plastic materials to understand their properties better. It lists the necessary materials, such as old CDs, tealight candles, rubber bands, and PVC pipes. It explains that the fan column will be made from PVC pipe and the base must be 10 cm high. It also outlines that students can power the fan with batteries, USB, or solar cells and their project will be graded based on work in class, the final result, and their report.
The document discusses creating a positive learning environment for children. It emphasizes the importance of observation, planning, and adapting the physical environment, activities, and teaching approaches to meet the diverse needs of all children in an inclusive setting. High-quality early education is said to help children achieve better long-term outcomes by providing warm, responsive relationships and continuously challenging learning experiences both indoors and outdoors.
Mobile Apps Performance Testing Using Open Source Tool JMeterDevendra Singh
The document proposes using the open source tool JMeter to perform mobile performance testing in a low-cost manner. It describes capturing the HTTP traffic between a mobile app and server by routing all requests from a real device through a proxy server with JMeter installed. This allows generating test scripts that closely mimic real-world usage without requiring expensive tools or emulators. The approach is device and application independent, producing accurate results without network latency issues encountered through other tools.
This document provides an agenda for mobile app security testing. It discusses topics like mobile OS versions, the mobile app SDLC, testing techniques, vulnerabilities, and security tools. Testing approaches include black box testing, code review, penetration testing and security assessments. Real devices are preferred over emulators due to limitations like missing features and network behavior issues. Common vulnerabilities discussed are cross-site scripting, SQL injection, and client-side injection. Popular security tools mentioned are ZAP, IBM AppScan, HP Fortify, and VeraCode. A three-tiered approach of testing the client, network and server layers is recommended for building secure mobile apps.
This document discusses key aspects of teaching and learning for early childhood education. It addresses questions like how children learn, the role of adults, and characteristics of effective learning. Effective learning involves playing, exploring, being actively engaged, motivated, and thinking critically. Teachers should facilitate learning through providing time, resources, responsive interactions, and understanding children's development. Both Piaget and Vygotsky emphasized the importance of social relationships and environments for learning. The document also discusses assessing learning, dispositions, cognitive and other types of development in young children.
Avoiding damage, shame and regrets data protection for mobile client-server a...Stanfy
Prepared by Anastasiia, iOS Engineer at Stanfy for speaking at do {iOS} Amsterdam 2015.
We will talk a bit about avoiding snake oil, getting rid of cognitive biases when planning application security, and how to avoid becoming cryptography professor when you only need to protect your app.
Galliotti Policy Reccomendation ISIS and social mediaAustin Schiano
ISIS has effectively used social media to spread propaganda, communicate, and recruit. To counter this, the document recommends that the US government strengthen partnerships with social media companies to allow greater censorship of terrorist content online. Key points include: ISIS's innovative use of social media differs from al-Qaeda's strict hierarchy, social media companies are primarily US-based so cooperation is possible, and weaknesses include uncoordinated censorship and concerns over free speech limitations.
The document discusses how terrorist organizations like ISIS use social media strategically and effectively. It explores how they establish their brand online, spread their message to recruit supporters, especially young Westerners, and directly coordinate terrorist activities. ISIS in particular has seen rapid growth on platforms like Twitter due to sophisticated bot networks and their Dawn of Glad Tidings mobile app, which engages followers while accessing their personal information. However, social media companies and counterterrorism units are working to monitor these groups and remove threatening posts.
The document discusses how the media uses logical fallacies when covering the crisis with ISIS. It analyzes how the media appeals to authority by quoting politicians, appeals to fear by mentioning threats and consequences of retaliation, and uses positive and negative language. The document aims to show how the media manipulates audiences using fallacies and why people need to identify illogical arguments.
The document summarizes a campaign called the WANT Movement that aimed to prevent radicalization among young individuals. It did this through building community and platforms for Muslims to educate others about Islam and provide credible counter-narratives to radicalization. The campaign included a website, social media accounts, and an in-person event called WANT Week that facilitated dialogue and education. The campaign was successful in reaching over 246,000 people and generating over $10,000 in earned media coverage. It provided a toolkit for other organizations to replicate the campaign.
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Gab Billones
This document discusses the rise of fake news and disinformation online. It defines different types of false information like misinformation, disinformation, and mal-information. It explains that over half of people regularly see fake news on social media. Some reasons why fake news spreads are for propaganda, website traffic/revenue, and personalized targeting in social media feeds. It provides tips for identifying fake news like checking for secure websites, URLs known for fake news, poor grammar/formatting, and excessive punctuation. Finally, it discusses ways to combat fake news like practicing news detox, engaging critically with shared content, and focusing on fact-checking authoritative sources.
A Study Of Terrorism And The Terrorist
Internal Terrorism in India
Hindutva Essay
Worldview On Terrorism : Terrorism
Essay on The War on Terror
Cross Border Terrorism And Kashmir
Essay on Terrorism
Terrorism in India
Counter Terrorism Laws And Human Rights
Essay on Terrorism in the Media
Ethno-Nationalist Terrorism
Global TerrorismGVPT 406AbstractSocial M.docxbudbarber38650
Terrorist organizations such as ISIS, Al Qaeda, and Ansar Bayt al-Maqdis have effectively used social media sites like YouTube, Twitter, and Instagram to spread propaganda and recruit new members. The documents discuss how terrorist groups upload videos of attacks to promote their cause and potentially recruit people from other countries to join them. The author proposes to research how terrorist organizations use social media to distribute anonymous material and recruit remotely, as well as counterterrorism solutions like monitoring legislation.
The document discusses strategies for countering ISIS recruitment efforts on social media in the United States. It proposes conducting a covert CIA operation to infiltrate ISIS's social media networks by creating fake online profiles to interact with recruiters. If contact is made, interrogating recruiters could provide intelligence on recruitment techniques. It also suggests community programs bringing Muslims and non-Muslims together to reduce isolation and make recruitment appeals less effective. A dual approach of military tactics, covert operations, and social programs is recommended to protect citizens and undermine the ideology driving ISIS.
This document discusses combating Islamophobia through responsible journalism. It outlines that the main causes of Islamophobia are misconceptions and lack of accurate knowledge about Islam. Media portrayal often relies on negative stereotypes. The document advocates for responsible journalism to fact-check, collaborate, correct misconceptions, and promote understanding in order to build a more informed and accepting society.
This document discusses research on how non-profits can respond to fake news on social media. It finds that the effectiveness of crisis response strategies (denial vs attack) depends on individuals' level of involvement in the issue. Attacking fake news sources was found to reduce credibility more than denial, and high issue involvement predicted support for the non-profit. However, attacks increased fake news credibility for low-involved individuals. The research suggests non-profits consider audience involvement before aggressively responding to fake news.
This document discusses countering violent extremism (CVE) through alternative narratives and community engagement. It notes that social media is crucial for CVE work, as youth integrate online and offline worlds. Experts recommend empowering community leaders and engaging local actors to develop counter-narratives and address radicalization. Credible former extremists can also effectively counter recruitment narratives. The UN promotes CVE strategies that respect human rights while preventing terrorism.
This document discusses how media can both cause and help overcome Islamophobia. It analyzes media's role from sociological and psychological perspectives. From a sociological view, media representations construct reality and meaning by selectively presenting information that often associates Islam with terrorism and radicalism. This widespread negative portrayal through news coverage of violence and bombings has contributed to the rise of Islamophobia globally. Psychologically, audiences interpret this biased media content in ways that reinforce stereotypes and irrational fears, further fueling anti-Muslim sentiment. However, the document also notes that media can play a positive role by informing and educating in a way that promotes understanding and social change. It suggests media, along with government and Islamic organizations, could work
This document discusses how media can both cause and help overcome Islamophobia. It begins by defining Islamophobia and outlining some of its common symptoms, such as discrimination, excessive fear and suspicion of Muslims. It then analyzes media's role from both sociological and psychological perspectives. Sociologically, media representations can construct reality in a way that associates Islam with terrorism and radicalism, fueling Islamophobia. Psychologically, how audiences understand and internalize this media content can lead to stereotypical thinking and Islamophobic actions. However, the document also notes that if media focuses on informing and educating rather than entertaining, it could help overcome Islamophobia by shaping new social values. The key is for media,
Educational Strategies for the Prevention of Violent ExtremismRenee Hobbs
Professor Renee Hobbs identifies five instructional strategies for addressing the prevention of violent extremism based on the practice of digital and media literacy education.
The document discusses media bias and its effects. It argues that most news outlets have their own agendas that result in omitting some truths from stories. People often only hear one side of stories and believe what they are told without considering potential biases. This can create divides between people who consume different media and cause them to become entrenched in their own beliefs. The document advocates for people being more discerning about where they get their information and whether it can be fully trusted.
Catholic Distance University Principles of Terrorism Discussion.docxwrite12
1. The document discusses potential terrorist targets in the United States, including a nuclear power plant, mosques, synagogues, and black churches. It also mentions the Egyptian pyramids as a potential target.
2. Al-Qaeda and ISIS are still considered the two most credible terrorist threats to the US. The document discusses how their competition for resources and legitimacy could increase the likelihood of attacks in the US.
3. Three potential high-impact terrorist target types mentioned are the healthcare industry, media industry, and retail industry. Attacks on these soft targets could cause mass casualties, economic damage, and social disruption.
Catholic Distance University Principles of Terrorism Discussion.docxsdfghj21
1. The document discusses potential terrorist targets in the United States, including a nuclear power plant, mosques/synagogues/black churches, and soft civilian targets like hospitals, media outlets, and shopping centers. Attacking these types of targets could cause mass casualties, economic damage, and social unrest.
2. Al-Qaeda and ISIS remain serious terrorist threats to the US. Their competition for resources and supporters could increase the likelihood of attacks. Technological advances have expanded terrorists' capabilities.
3. Three potential high-impact target types discussed are the healthcare system, media industry, and retail sector. Crippling any of these could incite fear, economic harm, and rally support for the terrorist
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaCOMRADES project
This document presents a semantic graph-based approach for detecting radicalization on social media, specifically Twitter. The approach extracts semantic concepts and relations from tweets and represents them as graphs. Frequent subgraph mining is used to identify patterns that distinguish pro-ISIS and anti-ISIS stances. Classifiers are trained using these "semantic features" and are shown to outperform classifiers using only lexical, sentiment, topic and network features. The top entities and relations discussed differ between pro-ISIS and anti-ISIS users.
Targeted disinformation warfare how and why foreign efforts arearchiejones4
The document discusses targeted disinformation campaigns by foreign actors and provides recommendations for government action. It outlines how disinformation actors create and spread false content on social media to exacerbate societal divisions and undermine democracy. Specifically, it analyzes Russian disinformation tactics used during the Cold War and how they evolved to target liberal democracies using online platforms. The document recommends a four-pronged government response framework to address each stage of the disinformation process by allocating responsibilities, increasing information sharing, making platforms more accountable, and building public resilience against false narratives.
The Radicalisation and Recruitment game_ How Terrorist and Violent Extremist ...Cecilia Polizzi
In this Q&A discussion, our Chief Executive Officer, Cecilia Polizzi, addressed crucial issues of concern. The topics explored included the growing online radicalization among children, an evaluation of the UK's Prevent program, and the challenges facing children within the Sahel region.
2. Page 2Miami Advertising
Design, pilot, implement, and measure the success
of a social or digital initiative, product, or tool that:
• Motivates or empowers students to become
involved in countering violent extremism.
• Catalyzes other students to create their own
initatives, products, or tools to counter violent
extremism.
• Builds a community of interest/network focused
on living shared values that counter violent
extremism through action.
THE ASK
5. Page 5Miami Advertising Page 5Miami Advertising
In order to better understand the students
at Miami University and gain a baseline
understanding of violent extremism knowledge,
sentiment, and activism, we created a survey
using Google Forms. The survey asked questions
relating to awareness of violent extremism,
senitment relating to violent extremism, perceived
demographics of ISIS, and personal social media
usage.
In reviewing the results, which will be discussed in
the next pages, we found the general population
of students lacked sophisticated knowlege on
the topic of violent extremism. Knowing this, we
centered our iniative on the tactical execution
of educating university students on the current
landscape of violent extermism.
RESEARCH SURVEY
6. Page 6Miami Advertising
FAMILIARITY WITH VIOLENT
EXTREMISM, ISIS + ISIL
HOW FAMILIAR ARE YOU WITH ISIS? HOW FAMILIAR ARE YOU WITH ISIL?
When comparing the two pi charts, there is a knowledge gap between ISIS and ISIL. Even though these two terms are
refering to the same group, there is a drastic difference. We take these responses together as a sign that students aren’t
really all that knowledgable when it comes to understanding violent extremism.
Very
Familiar
21%
Somwhat
Familiar
10%
Neutral
11%Somewhat
Unfamiliar
21%
Very
Unfamiliar
37%
Very
Familiar
21%
Somwhat
Familiar
26%
Neutral
37%
Somewhat
Unfamiliar
11%
Very
Unfamiliar
5%
7. Page 7Miami Advertising Page 7Miami Advertising
“They over dramatize it”
“Especially in America, we have a way of writing history
as if we’ve done nothing wrong. While ISIS is a horrible
institution, we have played a hand in their institution. The
media also has a way of sensationalizing everything. ISIS
isn’t a brand new group like the media tends to make them
out to be. The media is just as responsible for instituting
fear in the masses.”
“I don’t have a reason to believe that they do not”
“A large amount of the media’s coverage on ISIS/ISIL seems
to come from what the group itself puts out”
“They dont explain the situation, they only explain why they
are fear mongering the US audience by saying they are all
out just to kill Westerners”
THE MEDIA + ISIS
DO YOU THINK THE MEDIA ACCURATLEY
PORTRAYS ISIS?
WHY DO YOU FEEL THIS WAY?
`
8. Page 8Miami Advertising Page 8Miami Advertising
WORD ASSOCIATION
WHAT COMES TO MIND WHEN YOU HEAR THE WORD
“TERRORISM” OR “VIOLENT EXTREMISM”?
9. Page 9Miami Advertising Page 9Miami Advertising
THE AUDIENCE +
VIOLENT EXTREMISM
... BUT when asked , “Would you consider joining an anti-
extremist social media campaign against ISIS/ISIL?” ,
84%
21%
of respondants moderately
or strongly care about violent
extremism ...
of respondants would consider
joining a social campaign to end
violent extremism.
10. Page 10Miami Advertising
Before delving into counteractive tactics, we wanted to
dig deeper and found the heart of the issue. With the use
of scholarly articles and with the an in depth evaluation of
the basecamp articles provided, we were able to gather
impressive insights about the extremist landscape.
Currently, there are 15,000 ISIS foreign fighters from 80
different countries outside of Syria and Iraq, 2,000 of
which are from western territories. The reasoning ISIS
is so prominent in the extremist sphere is because they
make use of national holidays, uses historical symbols,
have deeply-held beliefs, and share core grievances with
oppressed individuals. Their narratives are centered
around fighting the enemy at home, fighting the far enemy
i.e. Western territories such as the US, and glorifying the
Caliphate in a way that leverages the feeling of economic
disenfranchisement and social exclusion of Muslim
communities. They promote the caliphate as a place
where they have a purpose and are part of a broader
transnational movement (1).
SECONDARY RESEARCH
15,000+
2,000+
FOREIGN FIGHTERS
RECRUITS FROM
WESTERN COUNTRIES
with
(1) Lavoy, P., Monti, A., & Wente, E. Why Is ISIS Winning the Narrative War? Retreived from https://asset1.basecamp.com/2015193/projects/11531424/attach-
ments/207539461/58a2eb939085e59c2d4cb09d83fc7e7d0010/original/Why%20Is%20ISIS%20Winning%20the%20Narrative%20War.pdf
11. Page 11Miami Advertising
Using Twitter as their main communication hub, ISIS is able to recruit
individuals who have a certain set of characteristics. In our research, those
most likely to be targeted are young males who lack a sense of belonging; they
lack deep rooted family connections. These at-risk individuals are generally
generally younger siblings who have been abused by their older siblings.
They often feel helpless and thus can be exploited by religious zealots. These
at-risk youths are angry and fall prey to the promise of a strong and caring
brotherhood, which ISIS tries to represent (2). Part of the main success in
converting these at-risk youths is by being active on Twitter and engaging with
these individuals. Part of the allure is in the successful tactic of tweeting about
mundane things, such as Nutella. This poses a “strange duality, a schizophrenia
that they’re showing this dark, brutal side, but they’re also trying to show, at
least as they might see it a more humane side to Western audiences” (3).
SECONDARY RESEARCH
(1) Lavoy, P., Monti, A., & Wente, E. Why Is ISIS Winning the Narrative War? Retreived from https://asset1.basecamp.com/2015193/projects/11531424/attach-
ments/207539461/58a2eb939085e59c2d4cb09d83fc7e7d0010/original/Why%20Is%20ISIS%20Winning%20the%20Narrative%20War.pdf
(2) Hudson, R. A. (1999). The Sociology and Psychology of Terrorism: Who Becomes A Terrorist and Why? Retrieved from https://www.loc.gov/rr/frd/pdf-files/Soc_
Psych_of_Terrorism.pdf
(3) Sreenivasan, H. (2014). Duality and Mission of ISIS on Social Media. Retrieved from http://www.zimbardo.com/downloads/2003%20Evil%20Chapter.pdf
12. Page 12Miami Advertising
TARGET AUDIENCES
Student at Miami University
Only somewhat knowledgeable
on violent extremism and ISIS
Believe the media does not
accurately portray ISIS
“Lone wolf” individuals who
lack social circle
Without a calling
(lack of responsability)
Age 15-30
Age 18 - 25
DIRECT AUDIENCE
“UNCOMMITTED AUDIENCE”
INDIRECT AUDIENCE
“AT RISK YOUTH”
14. Page 14Miami Advertising
THREE INTERSECTING VIEWS
ISIS
AUDIENCE
MEDIA
When looking at the current landscape of violent
extremism there is a disconnect between the media,
ISIS, and US citizens. It’s no secret that the media often
exaggerates stories for more intriguing headlines and
profit. ISIS then feeds the media to spread terror and gain
power. In the middle of this, US citizens do not question
the media and believe the headlines to be accurate.
This misinformed environment creates a seemingly
endless loop of hatred and violence that needs to stop.
Education is the answer and this starts with Challenge The
Truth. By revealing accurate unbiased facts, the Challenge
The Truth Initiative reveals the misconceptions of ISIS
and violent extremism portrayed in the media and creates
informed citizens – combating the exaggerated, biased
media, and stripping ISIS of it’s allure.
15. Page 15Miami Advertising
THE BIG IDEA
Provide accurate unbiased facts to reveal
the misconceptions of ISIS and violent
extremism portrayed in the media creating
informed citizens ready to take action.
16. Page 16Miami Advertising
By combating the exaggerated, biased media and educating the
audience on the truth of ISIS and violent extremism, we strip ISIS
of it’s potential fear and allure resulting in ...
GOALS
1. The prevention of future radicalization of uncomitted
audiences AND
2. The inspiration of uncommitted audiences to engage in
sharing the truth and other CVE initiatives.
17. Page 17Miami Advertising
TONE
EDUCATION
Rather than focus on misleading and
“click-bate” style headlines, we will
provide informative and accurate
articles with brief descriptions of
what topics are important.
CONTENT PILLARS
INFORMATIVE ARTICLE
To educate our audience our we will
provide informative and accurate
content to enable individuals to
learn more about the unbiased facts
regarding voplent extremism.
PEACE
Rather than promoting violent
extremism with more violence like
“carpet bombing”, we will provide
a peaceful message sharing that
education ends recruitment and
violence in the long term.
QURAN QUOTES
Realevent quotes from the Quran
expressing how Islam is not
manifested in the actions of these
violent extremists.
ACTION
Our call to action #ShareTheTruth
encourages the informed audience
to share the unbiased truth with their
social circles. The word of mouth
and network effects multiply the
Challenge the Truth message.
FACT V FICTION
Two answers to a simple statment.
Which is right? Fact V Fiction tests
individuals’ knowledge of ISIS and
violent extremism.
MESSAGING STRATEGY
18. Page 18Miami Advertising Page 18Miami Advertising
BRAND LOOK + FEEL
COLOR
We chose a blue color pallete because in color psychology blue is associated
with trust, intelligence, truth, peace, and calmness. To counteract the falacies
and violence of the media. The vibrant “start-up” blue adds energy, vibrancy, and
freedom. This is balanced with the sturdy time-tested Royal blue symbolizing
expertise and knowledge. Blues also highly accepted among males and being
that men are the primary rects of ISIS, we want to be sure to reach the target
audience.
White is often used as it is associated with light, goodness, and safety. Plenty
of white space to keep the message simple. Grey is added to the pallete as a
neutral color that lends additional depth and sophistication when needed.
TYPOGRAPHY
The font used is Roboto. Titles and page headings are
all caps ROBOTO MEDIUM, paragraph text is Roboto
Light, and subheadings are all caps ROBOTO BOLD. For
additional descriptions or emphasis Roboto Regular can
be used.
IMAGES
Images can be used for to convey powerful message
on their own or in conjunction with other information.
Images on their own can be vivid full color or black and
white. Images used as backgrounds should be vectorized
for effect and then taken to a 8-12% opacity.
19. Page 19Miami Advertising
The Challenge The Truth Initiative ia a multichannel approach with offline to online elements and vice versa. After
engaging at the activation event or with other print materials on campus, the audience is encouraged to visit
ChallengeTheTruth.com to learn more. Social platforms will be used to share user generated content and new sharable
information. The intention is to create a large social tribe of individuals uniting to challenge the truth of violent extremism.
The two primary aspects to our online digital strategy are
social networks (Facebook, Twitter) and an interactive
website. The social platforms are a means to provide
digestible pieces of content to the audience with the goal
of creating the most impressions possible to disseminate
the actual truth. We encourage the audience to submit
user generated content and feedback. While the social
platforms are for snippets of content, the website will be
used as a knowledge repository and interactive education
platform.
We want to include an experiential aspect to the Challenge
The Truth Initiative to spur word of mouth. The most
effective form of communication is WOM, so it is crtical
that we get people talking about these serious issues. Our
goal is to create an event that will garner reactions from
passers-by, participants, and the networks of those who
interacted.
MEDIA CHANNELS
DIGITAL
OVERALL STRATEGY
EXPERIENTIAL
20. Page 20Miami Advertising
DIGITAL
Our target market is on social media over an hour a day conservatively. The
most widely used social platfrom is Facebook followed by Snapchat and
Instagram. We will use Facebook because it is widely used and is a great
transport for news articles, images, and educational posts. Additionally,
Facebook has superior ad targeting to reach the at risk target demographic.
Although Twitter didn’t reasonate with our target audience as much as other
platforms, we thought Twitter was needed for two reason. The first being that
is where ISIS is most prevelanent and there needs to be counternarratives to
combat ISIS. The second being Twitter is a good medium to convey the brand
story and messaging we wanted to provide.
• Reach
• Shares
• Likes
• Impressions
• Clicks
• Hearts
• Retweets
• @mentions
• #’s
• Impressions
FACEBOOK
TWITTER
MEASURES OF SUCCESS
MEASURES OF SUCCESS
The prupose of the website is for it to be a repository of information where an
individual can go to to learn more about Challenge The Truth and sign up to be
part of the initiative to end violent extremism.
• Page views
• # of people who sign up to join the
Challenge The Truth Initiative
WEBSITE MEASURES OF SUCCESS
21. Page 21Miami Advertising
EXPERIENTIAL
We implemented an gamified educational experience at location
around campus. Students who wanted to participate in the chance to
win a free #ChallengeTheTruth to End Violent Exremism T-shirt where
asked a simple question and merely had to think and respond true or
false, fact or fiction. With the prevelant use of #ChallengeTheTruth
students were spurred to think about their own discrepancies
in perception. In addition, a pamphlet was provided with more
information on violent extremism and ISIS, as well as where they
could join the Challenge The Truth Initiative is online. The physical
print elements had calls to action leading participants to further
engage via social platforms or ChallengeTheTruth.com
• T-shirts passed out
• Pamphlets passed out
• Impressions
• Word of mouth
• Qaulity of Conversations
DESCRIPTION MEASURES OF SUCCESS
23. Page 23Miami Advertising
SOCIAL: FACEBOOK
CONTENT
We chose articles and quotes that shed the biased lens of the media
and revealed the truth of violent extremism and ISIS. Using Facebook
tools, we pre-sceduled our posts to optimize our posting. The posts were
schedule for the highest points of engagement during the week for our
audience.
PAGE DESIGN
The banner design aligned with our brand look + feel previously discussed.
The banner had a provacative image with the use of overlayed text to
create an impactful graphic.
BOOSTED ADS
To drive impressions and to
educate the audience on the
current landscape of violent
extremism and other ISIS related
topics, we used Facebook’s
promoted ad tools.
We scheduled a “like” campaign
for the month that the social
campaign was launched. In
addition, we promoted articles that
we saw increased engagement.
Once we found relavent,
interesting, and engaging content
we put our ad spend behind
promoted content.
24. Page 24Miami Advertising
POLLS
College students are generally
interested in content that has
a quizzical/game-like essence.
To adhere to such interests, our
Twitter activation was design to
gamify the education process. By
creating polls that asked followers
to answer “fact” or “fiction” to the
posed question (which was about
the extremist sphere), we were able
to engage with our target market
and were also able to gauge
their knowledge on the violent
extremist landscape. We then used
these insights to share relevant
articles and other tactics as to
better inform our target market in
the areas that needed the most
attention.
PAGE DESIGN
To keep the initiative cohesive among
all digital and non-digital channels, we
continued with the brand look + feel
as discussed previously. The alluring
photo of ISIS recruits coupled with a
color/graphical overlay makes for an
alluring/intriguing brand identity. This
essentially draws in a curious crowd
and well as our targeted market to
where audience interaction occurs.
CONTENT
We used Twitter as our visual space.
We wanted to engage with our
follows in a way that educated them
on the misconceptions of the Muslim
faith and would encourage them to
#ShareTheTruth. This was achieved
by providing alluring visuals, primarily
ones that contained quotes derived
from the Quran. Additionally, we
pushed out shareable content that
promoted a more peaceful nation.
Running with the #PeacePush we
urged our followers to focus their
efforts on everyday acts of kinds
that would essentially create a more
harmonious society. The only way to
counteract violent extremism is by
generating buzz around peace, which
was one of the primary tactics of
Twitter.
SOCIAL: TWITTER
25. Page 25Miami Advertising
WEBSITE
CONTENT
We wanted to expand upon the
information provided by social
media and the experiential
activation. We specifically mention
the intersection of ISIS, MEDIA,
+ YOU on our home page and
then go into more detail with a
“Fact V Fiction” page that points
out common misconceptions
and finally an about page named
“Challenge The Truth” that
describes what the purpose of the
intiaitive is.
DESIGN
The design follows the brand
look + feel guidelines as outlined
previously mixed with modern web
design principles
27. Page 27Miami Advertising Page 27Miami Advertising
EXPERIENTIAL MATERIALS
CHALLENGE THE TRUTH.
LEARN MORE ABOUT ISIS AND THE
LANDSCAPE OF VIOLENT EXTREMISM.
YOUR TRUTH MAY NOT BE ACCURATE.
ARE YOUR
ISIS FACTS
STRAIGHT?
WHAT IS THE
CHALLENGE THE
TRUTH INITIATIVE?
By providing accurate unbiased
facts, Challenge The Truth reveals
the misconceptions of ISIS and
violent extremism portrayed in
the media and creates informed
citizens – combating the
exaggerated, biased media, and
stripping ISIS of it’s potential fear
and potential allure.
Educate yourself, your friends
and your family. Together we can
take away the allure of violent
extremism, end ISIS’ recruitment,
and counter violence with
knowledge and peace.
Spread the unbiased truth
with #ShareTheTruth and point
out common misconceptions
about violent extremism with
#ChallengeTheTruth.
YOUR
CHALLENGE
/ChallengeTheTruth
@Challenge_Truth
ChallengeTheTruth.com
When designing the shirt we wanted
the shirts to be fashionable and
modern yet still convey our message.
We settled on the design you see
here. This design is optimized for
price efficiency with only one color on
each side and not additional pocket.
The pamphlets were designed to
intruige, inform, and activate those
who read it. The front cover asks a
provacative question followed by
relavent facts on the inside. Finally,
the back challenges the reader
to #ShareTheTruth and join the
initiative.
28. Page 28Miami Advertising
For our experiential activation we
wanted to gamify the education
experience and generate organic
word of mouth marketing for these
who were not reached by our
Facebook or Twitter campagins.
We ordered t-shirts as participation
prizes for those who played Fact or
Fiction with facts relating to ISIS. In
addition to having long conversations
with those who stopped to play the
game, we passed out informational
pamphlets to all who walked past.
Our experintial activation took place
in two of the most heavily trafficed
areas of Miami University – the
university seal at the crossroads of
the largest academic quad and the
student center.
EXPERIENTIAL ACTIVATION
30. Page 30Miami Advertising
Total Reach:
10,168
Post Engagements:
416
Page Likes:
128
Page Views:
207
Ad Targeting Critera:
Age: 15-25
Gender: Male and Female
Language: English (UK) or English (US)
Location: United States: Oxford (+25 mi) Ohio
Exclude people who like Challenge The Truth
People Who Match:
Interests: Islam, BBC News, Violence prevention, wallstreet journal, CNN,
Extreme, Politics, Breaking news, Video games or Suicidal Tendencies
School: Miami University
SOCIAL MEDIA: FACEBOOK
OUR INTERPRETATION:
We were very pleased with our large total. This is attributed to our targeting
and boosting of content that the audience was engaging with. It seemed that
informative articles and Quran quotes did the best in terms of performance
metics. In the future, we look forward to varying the types of posts we boost.
32. Page 32Miami Advertising
Total Reach:
912
Engagement:
5.3%
Page Views:
209
Followers:
22
Mentions:
3
Retweets:
1
SOCIAL MEDIA: TWITTER
OUR ANALYSIS:
We saw lower engagement on Twitter primarily for two reasons. The first is
that it takes over a month from account creation before Twitter will let you
promote any content. We did not know this and it limited our ability to reach our
target audience on Twitter. We saw such success on Facbook because of our
ability to promote content to a targeted audience. This shorticoming left a large
portion of our budget unused. The second is that our target audience doesn’t
use Twitter as much as Facebook or other platforms.
TOP PERFORMING TWEETS:
33. Page 33Miami Advertising
OUR ANALYSIS:
The priority of the campaign was not placed on the website. The website was
a tool used to build upon other information. Because of our small we decided
not to invest our talent into SEO, ad words, and other content marketing leading
towards the site. We believed that these efforts would have minimal ROI.
Pageviews:
126
Average Duration:
20 seconds
Pages/Session:
1.94
Bounce Rate:
87.7%
Subscribers:
2
WEBSITE
34. Page 34Miami Advertising
EXPERIENTIAL
Total Reach:
2,500+
Impressions:
1000+
Pamphlets Passed Out:
240
T-shirts passed out:
90
In-debth Conversations:
13
Word of Mouth:
~1,500
OUR ANALYSIS:
We saw lower engagement on Twitter primarily for two reasons. The first is that
it takes over a month from account creation before Twitter will let you promote
any content. We did not know this and it limited our ability to reach our target
audience on Twitter. We saw such success on Facbook because of our ability
to promote content to a target audience. This shorticoming left a large portion
of our budget unused.
EVENT FEEDBACK:
“This is a great idea.”
“What a wonderful iniative. Best of luck!”
“I’m reading a book
on ISIS now and look
forward to learning
from you too.”