The document provides guidelines on preventing radicalization of children on social media and the internet. It is divided into three sections addressing different stakeholders. The first section outlines two tech guidelines: 1) tech companies should consider modifying algorithms and data collection practices to reduce targeting of extremist propaganda to children, and 2) tech companies should enhance cross-platform collaboration to address challenges of identifying and managing online risks, especially for smaller companies.
Guidelines on Managing the Humanitarian and Security Dimensions in Northeast ...Cecilia Polizzi
The al-Hol and Roj camps present monumental humanitarian challenges and a significant security concern, with children suffering exceedingly severe living conditions, exposure to violence, vulnerability to exploitation, as well as radicalization risks. The repatriation of children stands as both a moral imperative and a crucial political necessity, serving children´s well-being and preempting potential regional destabilization.
The second volume of the CRTG Working Group´s Children Affected by the Foreign Fighter Phenomenon (CAFF) Series offers guidance on potential avenues to improve humanitarian and security conditions for children, address legal and judicial challenges, mitigate child radicalization risks, as well as steps to support successful repatriation procedures.
https://www.linkedin.com/posts/cecilia-polizzi-2a9663143_children-affected-by-the-foreign-fighter-activity-7150189589364736000-qJir?utm_source=share&utm_medium=member_desktop
Children Affected by the Foreign Fighter Phenomenon: Guidelines on Managing t...Cecilia Polizzi
Introducing the second volume of our Children Affected by the Foreign Fighter Phenomenon (CAFF) Series! The CAFF is an undertaking by the CRTG Working Group expounding the trajectory of child involvement with the Islamic State in relation to the foreign fighter phenomenon and offering solutions across sectors and disciplines.
This report should be of interest to states, their United Nations partners, the Autonomous Administration of North and East Syria (AANES), and Syrian Democratic Forces (SDF), along with the nongovernmental organizations (NGOs) who are focused on providing support to children in al-Hol and Roj.
The recommendations that follow include both potential avenues to improve humanitarian and security conditions for children, address legal and judicial challenges, mitigate child exploitation and radicalization risks, as well as steps to support successful repatriation of displaced populations and long-term security in the region.
We express our gratitude to Dr. Elie Abouaoun (DDS, MBA), Country Director Libya at the International Rescue Committee, and Mr. Zuhrab Saadi, Director of DAN for Relief and Development, for generously contributing their expertise.
This month marks a noteworthy achievement for the CRTG Working Group as we ob...Cecilia Polizzi
As we commemorate the CRTG Working Group inaugural five-year anniversary, I am pleased to share with you this message, where I reflect on our trajectory and lay my vision for the future.
On the occasion of this milestone, it is important to acknowledge how far we have come but also to recognize how much work remains to be done. The recruitment and radicalization of children is an increasingly pressing issue. The ramifications of inaction, as evidenced by the current manifestations of child involvement with terrorism and violent extremism, carry weight and substance.
I extend my heartfelt thanks to everyone who has accompanied us so far on this journey. Vision, resilience, strategic thinking, empathy, and commitment to excellence are qualities that propelled CRTG Working Group throughout its first five years and which will continue to inspire us as we blaze new trails and rise to new heights.
https://www.linkedin.com/posts/cecilia-polizzi-2a9663143_a-new-chapter-for-crtg-working-group-a-message-activity-7177998957522919425-pPX8?utm_source=share&utm_medium=member_desktop
The Radicalisation and Recruitment game_ How Terrorist and Violent Extremist ...Cecilia Polizzi
In this Q&A discussion, our Chief Executive Officer, Cecilia Polizzi, addressed crucial issues of concern. The topics explored included the growing online radicalization among children, an evaluation of the UK's Prevent program, and the challenges facing children within the Sahel region.
Right-Wing Extremism: Children´s Perspectives, Policy and Practice.pdfCecilia Polizzi
On April 7, 2022 the CRTG Working Group hosted an Expert Briefing on Violent Right-Wing Extremism: Children ́ s Perspectives, Policy and Practice by Mr. Robert Örell, EU Radicalisation Awareness Network. The purpose of this paper is to offer a series of recommendations to policy-makers and practitioners responsible for preventing and countering child radicalization to Right-Wing Extremism (RWE). This guidance is the result of shared insights, lessons learned, practical examples and policy recommendations from the joint meeting between the CRTG Working Group and Mr. Robert Örell.
The Islamic State in Central African and the Centrality of Children in its Ex...Cecilia Polizzi
Violent extremist threats in Central Africa have been on the rise in recent years. The Allied Democratic Forces, an Islamist rebel group, established increasing ideological, financial, and operational ties with the Islamic State. This association also reflects in ADF/ ISCAP's increasing rate of child recruitment and use. In this report, our fellow Guillaume Soto-Mayor offers in-depth insights into the ADF/ISCAP's trajectory, strategies, and potential impacts in Central Africa and raises awareness of the need to address child protection risks across the region.
The Islamic State in Central Africa and the Centrality of Children in its Exp...Cecilia Polizzi
Last month, ADF militants stormed a school in Uganda in a tragic attack that resulted in the deaths of over 40 people, and more students were abducted.
In this analysis, our fellow Guillaume Soto-Mayor traces the trajectory of the ADF, and exposes firmly established ideological, financial, and operational links with the Islamic State.
An increase in the rate of child recruitment and use at the hands of ADF/ISCAP has significant implications. It coincides with the group's adoption of a Salafi-jihadi ideological stance, methods, and purposes of territorial expansionism and poses serious threats to the safety and rights of children and security in the region.
The Islamic State in Central Africa and the Centrality of Children in its Exp...Cecilia Polizzi
Last month, ADF militants stormed a school in Uganda in a tragic attack that resulted in the deaths of over 40 people, and more students were abducted.
In this analysis, our fellow Guillaume Soto-Mayor traces the trajectory of the ADF, and exposes firmly established ideological, financial, and operational links with the Islamic State.
An increase in the rate of child recruitment and use at the hands of ADF/ISCAP has significant implications. It coincides with the group's adoption of a Salafi-jihadi ideological stance, methods, and purposes of territorial expansionism and poses serious threats to the safety and rights of children and security in the region.
Guidelines on Managing the Humanitarian and Security Dimensions in Northeast ...Cecilia Polizzi
The al-Hol and Roj camps present monumental humanitarian challenges and a significant security concern, with children suffering exceedingly severe living conditions, exposure to violence, vulnerability to exploitation, as well as radicalization risks. The repatriation of children stands as both a moral imperative and a crucial political necessity, serving children´s well-being and preempting potential regional destabilization.
The second volume of the CRTG Working Group´s Children Affected by the Foreign Fighter Phenomenon (CAFF) Series offers guidance on potential avenues to improve humanitarian and security conditions for children, address legal and judicial challenges, mitigate child radicalization risks, as well as steps to support successful repatriation procedures.
https://www.linkedin.com/posts/cecilia-polizzi-2a9663143_children-affected-by-the-foreign-fighter-activity-7150189589364736000-qJir?utm_source=share&utm_medium=member_desktop
Children Affected by the Foreign Fighter Phenomenon: Guidelines on Managing t...Cecilia Polizzi
Introducing the second volume of our Children Affected by the Foreign Fighter Phenomenon (CAFF) Series! The CAFF is an undertaking by the CRTG Working Group expounding the trajectory of child involvement with the Islamic State in relation to the foreign fighter phenomenon and offering solutions across sectors and disciplines.
This report should be of interest to states, their United Nations partners, the Autonomous Administration of North and East Syria (AANES), and Syrian Democratic Forces (SDF), along with the nongovernmental organizations (NGOs) who are focused on providing support to children in al-Hol and Roj.
The recommendations that follow include both potential avenues to improve humanitarian and security conditions for children, address legal and judicial challenges, mitigate child exploitation and radicalization risks, as well as steps to support successful repatriation of displaced populations and long-term security in the region.
We express our gratitude to Dr. Elie Abouaoun (DDS, MBA), Country Director Libya at the International Rescue Committee, and Mr. Zuhrab Saadi, Director of DAN for Relief and Development, for generously contributing their expertise.
This month marks a noteworthy achievement for the CRTG Working Group as we ob...Cecilia Polizzi
As we commemorate the CRTG Working Group inaugural five-year anniversary, I am pleased to share with you this message, where I reflect on our trajectory and lay my vision for the future.
On the occasion of this milestone, it is important to acknowledge how far we have come but also to recognize how much work remains to be done. The recruitment and radicalization of children is an increasingly pressing issue. The ramifications of inaction, as evidenced by the current manifestations of child involvement with terrorism and violent extremism, carry weight and substance.
I extend my heartfelt thanks to everyone who has accompanied us so far on this journey. Vision, resilience, strategic thinking, empathy, and commitment to excellence are qualities that propelled CRTG Working Group throughout its first five years and which will continue to inspire us as we blaze new trails and rise to new heights.
https://www.linkedin.com/posts/cecilia-polizzi-2a9663143_a-new-chapter-for-crtg-working-group-a-message-activity-7177998957522919425-pPX8?utm_source=share&utm_medium=member_desktop
The Radicalisation and Recruitment game_ How Terrorist and Violent Extremist ...Cecilia Polizzi
In this Q&A discussion, our Chief Executive Officer, Cecilia Polizzi, addressed crucial issues of concern. The topics explored included the growing online radicalization among children, an evaluation of the UK's Prevent program, and the challenges facing children within the Sahel region.
Right-Wing Extremism: Children´s Perspectives, Policy and Practice.pdfCecilia Polizzi
On April 7, 2022 the CRTG Working Group hosted an Expert Briefing on Violent Right-Wing Extremism: Children ́ s Perspectives, Policy and Practice by Mr. Robert Örell, EU Radicalisation Awareness Network. The purpose of this paper is to offer a series of recommendations to policy-makers and practitioners responsible for preventing and countering child radicalization to Right-Wing Extremism (RWE). This guidance is the result of shared insights, lessons learned, practical examples and policy recommendations from the joint meeting between the CRTG Working Group and Mr. Robert Örell.
The Islamic State in Central African and the Centrality of Children in its Ex...Cecilia Polizzi
Violent extremist threats in Central Africa have been on the rise in recent years. The Allied Democratic Forces, an Islamist rebel group, established increasing ideological, financial, and operational ties with the Islamic State. This association also reflects in ADF/ ISCAP's increasing rate of child recruitment and use. In this report, our fellow Guillaume Soto-Mayor offers in-depth insights into the ADF/ISCAP's trajectory, strategies, and potential impacts in Central Africa and raises awareness of the need to address child protection risks across the region.
The Islamic State in Central Africa and the Centrality of Children in its Exp...Cecilia Polizzi
Last month, ADF militants stormed a school in Uganda in a tragic attack that resulted in the deaths of over 40 people, and more students were abducted.
In this analysis, our fellow Guillaume Soto-Mayor traces the trajectory of the ADF, and exposes firmly established ideological, financial, and operational links with the Islamic State.
An increase in the rate of child recruitment and use at the hands of ADF/ISCAP has significant implications. It coincides with the group's adoption of a Salafi-jihadi ideological stance, methods, and purposes of territorial expansionism and poses serious threats to the safety and rights of children and security in the region.
The Islamic State in Central Africa and the Centrality of Children in its Exp...Cecilia Polizzi
Last month, ADF militants stormed a school in Uganda in a tragic attack that resulted in the deaths of over 40 people, and more students were abducted.
In this analysis, our fellow Guillaume Soto-Mayor traces the trajectory of the ADF, and exposes firmly established ideological, financial, and operational links with the Islamic State.
An increase in the rate of child recruitment and use at the hands of ADF/ISCAP has significant implications. It coincides with the group's adoption of a Salafi-jihadi ideological stance, methods, and purposes of territorial expansionism and poses serious threats to the safety and rights of children and security in the region.
The Legal Status of Children in Terrorism.pdfCecilia Polizzi
In this report, the CRTG Working Group addresses one of the most critical legal challenges pertaining to #children in #terrorism. How to classify and treat children associated with extremist actors? Are these children victims, perpetrators, or both? We offer guidance to policymakers and justice professionals in legal status determination, applicable frameworks, and intervention measures.
Main discussion outcomes:
- Children recruited and used by terrorist and violent extremist actors shall be considered and treated primarily as victims.
- To consider and treat children primarily as victims does not imply leniency or that the child should be granted immunity for criminal acts. It rather speaks to the applicability of child rights and juvenile justice principles and standards for children in a counter-terrorism context.
- Victim status does not preclude the activation of channels within the criminal justice system, provided that the child is above the Minimum Age of Criminal Accountability.
- Effective counterterrorism and human rights are not to be interpreted as conflicting goals but rather as complementary and mutually reinforcing.
The Legal Status of Children in Terrorism.pdfCecilia Polizzi
OnDecember19,2022,theCRTGWorkingGrouphostedanExpertBriefingonTheLegalStatusofChildreninTerrorism: Philippine Processes and Practices by Ms. Tricia Clare Oco, Executive Director of the Juvenile Justice and Welfare Council, Department of Social Welfare and Development of the Philippines. The purpose of this paper is to offer a series of recommendations to guide the efforts of policymakers and justice professionals in determining the legal status of children as well as the applicable legal frameworks and intervention measures. This guidance is the result of shared insights, lessons learned, practical examples, and policy recommendations from the joint meeting between the CRTG Working Group and Ms. Oco.
PREVENT Project: The Targeting of Children by Boko HaramCecilia Polizzi
Boko Haram insurgents abducted 276 girls from a school in Nigeria 10 years ago, sparking global outrage and the #BringBackOurGirls campaign.
Today, 89 girls remain missing, and 30 children were recently kidnapped in Katsina State. These events highlight ongoing challenges in securing the release of abducted children and the persistent threat of violent groups in the region.
The CRTG Working Group, monitors terrorist targeting of children in Nigeria and the Lake Chad Basin, understanding the strategic purposes behind such abductions.
Download the report here https://t.ly/iJdyf
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docxtoltonkendal
Running head: TECHNOLOGY INFLUENCES 1
TECHNOLOGY INFLUENCES 4
Technology Influences
Tiara Miller
Professor Gauvreau
CRJ 499
5/5/16
Technology Influences
Criminal injustice can take many forms and in this case, we choose to focus on terrorism which is the currently trending form of criminal injustice. According to Wilkinson, (2012) technology involves the application of scientific knowledge in order to achieve any objectives and affects the values of a given society. In one way or another technology has adversely contributed to its increment and effect rate of terrorism in many countries, thus affecting both the external and internal stakeholders. Technology takes a huge platform and due to the rate at which technology is advancing then many people are being affected by this since it is out of this that terrorism is also advancing.
For any terrorism threat to be conveyed any country then it has to be channeled through a medium of communication which takes any form of technology, it could be an email or a short message service through the social media platforms. The threat could also be through the magazines, audios or even video clips which are spread through the internet and this results in a threat in any given state. The terrorist can use the technology to disseminate a propaganda and takes the form of multimedia communications providing ideological or practical instruction, explanations, justifications or promotion of terrorist activities. With this justification then a part of the population tend to believe that their actions are right but in the real sense, it is affecting a country in many ways. The economy is greatly affected and therefore, it results to a countries downfall.
The internet has also been used as a platform to recruit the minors to the terrorist groups, it may sound impossible but it is the new direction taken by the terrorists. This is possible as they establish a relationship between themselves and those that are interested. Terrorist organization use many platforms such as password protected website platforms and restricted chat groups that enhance direct communication. The restriction offers a platform for them to learn about the organization its mission and vision and the objectives it wants to achieve. With this then they are supported and in any way, the organization will never die since the number of people to replace those who died increases. It is with the use of technological barriers to entering to the recruitment platforms also increases the complexity of tracking terrorism-related activity by intelligence and law enforcement personnel.
The internet being one of the forms of technology has been used as a good platform to incite the people and this makes terrorism gain more power. The Internet provides an abundance of material and opportunities to download, edit and distribute content that may be considered unlawful glorification of, or provocation to, acts of terrorism. Also with the incite comes ...
Investigation and Prosecution of Children in a Counter-Terrorism ContextCecilia Polizzi
On July 7, the CRTG Working Group hosted an Expert Briefing by Cachon Emerson representing the The International Institute for Justice and the Rule of Law (IIJ) and Irina Urumova, Independent Expert on Child Protection and International Investigations and Co-Author of the IIJ Juvenile Justice Note for Investigators (https://rb.gy/iha3ml). Participants shared insights, explored good practices and formulated recommendations to guide the efforts of investigators and prosecutors in handling cases of terrorism and related offenses involving children while upholding their rights. The session was attended by Jamie Brown on behalf of the Counter-Terrorism Division of the Council of Europe and Safinas Ahayeva, UNICEF Uzbekistan.
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
Abstract. The number of terrorist attacks that have brought about bloodshed and
left a mark on recent history have spotlighted once again the need to stem the attempts by terrorist organizations to conduct attacks within the EU, forestalling the
intentions of the martyrs-to-be. The Islamic State of Iraq and Syria (ISIS) is undoubtedly the terrorist group that, more than others, has taken advantage of Internet,
not only as a tactical means of coordination, but also as a tool to carry out proselytism, recruitment, propaganda, and fundraising. As one could imagine, constantly
monitoring the Internet for these activities is an extremely complex and time-consuming activity, requiring a huge amount of money and manpower, and resulting in
very poor – and only temporary – outcomes. To stem this rapidly spreading phenomenon, it can be useful to focus the attention of decision-makers, intelligence and
law enforcement on a possible profile of a “cyber terrorist”.
This paper aims at tracing the identikit of a possible “cyber terrorist” that is as
broad and consistent as possible.
Keywords. Al-Qaeda, cyber terrorist, Internet, ISIS, Islamic State, profiling, propaganda, proselytism, recruiting, terrorist organizations
The Radicalisation and Recruitment game: How Terrorist and Violent Extremist ...Cecilia Polizzi
I am pleased to have engaged in this Q&A session with CT Insight. Our discussion covered crucial subjects, ranging from the alarming increase in #radicalization among children to the recent evaluation of the UK #Prevent program, and the social, economic, political and security challenges in the #Sahel region.
https://www.linkedin.com/posts/cecilia-polizzi-2a9663143_the-radicalisation-and-recruitment-game-activity-7107793736901812225-9PEw?utm_source=share&utm_medium=member_desktop
The Radicalisation and Recruitment game: How Terrorist and Violent Extremist ...Cecilia Polizzi
I am pleased to have engaged in this Q&A session with CTInsight. Our discussion covered crucial subjects, ranging from the alarming increase in online #radicalization among children to the recent evaluation of the UK #Prevent program, and the social, economic, political and security challenges in the #Sahel region.
Iran's Misinformation and Global Propaganda Efforts.Gary Thatcher
Iran's misinformation and global propaganda efforts represent a sophisticated and multifaceted campaign aimed at influencing international perceptions and narratives to serve its geopolitical interests. Utilizing a blend of state-controlled media outlets, social media platforms, and cyber operations, Iran systematically disseminates tailored content to sow discord, shape political discourse, and undermine the credibility of its adversaries. These efforts span across various themes, including regional conflicts, nuclear capabilities, and human rights issues, to project power and foster a positive image of Iran while discrediting opposition voices. The global reach of these campaigns poses significant challenges to information integrity, necessitating a coordinated and proactive response from the international community to counteract and promote factual, unbiased information.
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxjoellemurphey
Running head: ASSIGNMENT 4
ASSIGNMENT 4
Assignment 4: Data Collection
Student Name
Affiliate Institution
Evidence-based researched data to indicate there is a problem
Terrorism is considered a historical and major problem for the U.S. Since 2001, the significance of the problem has increased. Therefore, several organizations and facilities collect and store terrorism data for events like attempted and occurred activities. The main data source for terrorism activities is the U.S. Department of Homeland Security. The mandate of this arm of government is to protect Americans both in locally and internationally against crime activities but terrorism seems the greatest enemy of American citizen wherever they are in the world.
Numerous and most useful data for terrorism is found from the following federal agency and private databases:
· The National Security Agency (NSA)
· Federal Bureau of Investigation (FBI)
· National Consortium for the Study of Terrorism and Response to Terrorism (NCSTRT) and
· Global Terrorism Database (GTD). (FBI, 2014; GTD, 2014)
Information from the above databases are analyzed to present diverse quantitative and qualitative terrorism data that cover several years including life threats to the U.S. soil. According to these databases, terrorism is an old problem and continues to intensify due to availability of uninterrupted new technology as well as growing financial power of their organizations. The Federal Agencies data bases provide information on terrorism activities and information on several strategies that have been used in the past and are currently used to curb the vice (FBI, 2014).
The other terrorist’s data sources are the media agencies. News agencies such as online newspapers and broadcasting corporations provide terrorism data as it occurs. Although these agencies might not provide analyzed data, their role is to increase public awareness about terrorism occurrences and development.
References
Federal Bureau of Investigation (2014). Crime Statistics. Retrieved on May 22, 2015 from http://www.fbi.gov/stats-services/crimestats
Global Terrorism Database (2014). Overview of the GTD. Retrieved on May 22, 2015 from http://www.start.umd.edu/gtd/about/
2
Running Head: Terrorism Stakeholders
Terrorism
Terrorism Stakeholders
Student name
Affiliate Institution
Terrorism
Modern day terrorism has caused sufficient harm to the society both in the political, social and the economic sectors. External and internal forces have influenced terrorism activities within the governments therefore increasing the intensity of the terrorism acts (Chong, 2007). After the terror attack that occurred in the U.S on the 9/11, 2001, it was realised that there have been low information sharing amongst the agencies that conducts the security surveillance of the country. Various institutions and agencies directly or indirectly are linked to the terrorist attack that takes p ...
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...ijtsrd
Social media platforms are viewed as all progressive in opening up democratic spaces the world over. In the Middle East and North Africa region, social media platforms are regarded as key to the Jasmine Revolution that resulted in the fall of some regimes widely regarded as repressive by the international community. In Southern Africa, the hashtag movements saw youth shrugging off political apathy to challenge the establishment. Information Communication Technologies are refreshingly enticing the youth to participate and revitalize politics in the sub region. However, regimes in the sub region, traditionally comfortable with the hegemonic stringent hold on mainstream media, are becoming uncomfortable with these new developments and have resorted to legislation that threaten freedom of expression by citizens on social media as well as surveillance of citizens. This study is therefore going to establish societal views on state surveillance and monitoring of citizens' activities on social media. This is going to be executed through in depth interviews with media practitioners, scholars, political analysts, policy makers and ordinary users of social media platforms. Findings will be presented and analysed qualitatively and thematically. Tawanda Mukurunge | Neo Tlali | Takura Bhila "Surveillance and Monitoring in the Social Media Era: Threats and Opportunities to Democratic Processes in Southern Africa" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29546.pdfPaper URL: https://www.ijtsrd.com/other-scientific-research-area/other/29546/surveillance-and-monitoring-in-the-social-media-era-threats-and-opportunities-to-democratic-processes-in-southern-africa/tawanda-mukurunge
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP
The Internet and social media today provide huge opportunities: access to communities and networks, online information and learning, business and entertainment. However online connected technologies can also present challenges for children and young people and other vulnerable groups who may not have the critical digital literacies and life skills to recognise risk, or the resilience to manage online stresses and challenges.
This presentation highlights some of the themes to address when developing the digital literacies and digital well-being of children and young people, and those who work with or support them.
This report is the ninth in an annual series of publications, dating back to 2012, showcasing the latest developments in social media across the Middle East and North Africa (MENA) region.
This year’s study is produced in partnership with the New Media Academy. The New Media Academy was inaugurated in June 2020, by His Highness Sheikh Mohammed bin Rashid Al Maktoum, UAE Vice President and Prime Minister, and ruler of Dubai, to work within the space of development, with a focus on harnessing opportunities in the digital space.
Using a broad range of industry, academic and media sources, we dive into the trends - and biggest stories - which shaped MENA’s relationship with social media during the past year. Not surprisingly, this study is heavily influenced by the impact of
COVID-19. The novel coronavirus impacted on everyone’s lives around the world, including the Middle East. One by-product of the pandemic could be seen in our changing media habits. Social media usage - across all platforms - increased during the early stages of the outbreak.
More widely, given the importance of social media in our media diets, platforms, industry and governments alike sought to use these networks to promote public health messages, as well as counter misinformation related to the COVID crisis.
Alongside these developments, we have also seen continued investment in content on social media platforms - especially during Ramadan - and growing partnerships between traditional media players and social media channels and influencers. These developments reflect the popularity of high quality digital content consumed on social media, and a desire to reach audiences on these platforms, or bring existing social
audiences onto other networks.
We expect that this synergy will only rise, not least because many media habits developed during the pandemic may well continue post-COVID. As a result, social networks will become an increasingly important source for talent spotting, as well as a
key avenue for content and information consumption.
This trend, as we outline at the end of this report, matters for brands, creators and influencers, as well as governments and other public entities. Social media is already an important part of digital media habits and digital marketing strategies. In 2021,
that importance looks set to continue and grow even further.
We are thrilled to announce the onboarding of our new Non-Resident Fellow, Noor Huda Ismail, a catalyst for change in the realm of counter-terrorism and peacebuilding. His unique blend of academic rigor and on-the-ground impact has made him a global influencer, leaving a mark on the discourse surrounding extremism and rehabilitation.
With a Ph.D. focused on Indonesian Foreign Fighters, Dr. Ismail's journey has been both academically significant and personally profound. His dedication became evident during his journalistic stint when he discovered the involvement of a former schoolmate in the Bali bombings.
In 2008, Dr. Ismail founded the Institute for International Peace Building, providing solutions for the social rehabilitation of convicted terrorists. As an Ashoka Fellow, his influence extends globally, acknowledged through prestigious awards such as the EU Leadership and French Cultural Awards.
A true storyteller at heart, Dr. Ismail communicates the complexities of extremism through various mediums, including writings and documentaries like "Jihad Selfie" and "The Bride." His advocacy for a nuanced understanding of radicalization emphasizes countering online extremism and fostering communication changes that are crucial in our interconnected world.
Dr. Noor Huda Ismail's narrative serves as a compelling call to action, highlighting the essential role of rehabilitation and second chances in the journey toward sustainable peace. As a Visiting Fellow at RSIS | S. Rajaratnam School of International Studies, he continues to shape meaningful conversations and drive initiatives in his areas of expertise.
Please join us in extending a warm and formal welcome to Dr. Noor Huda Ismail as our newest Non-Resident Fellow.
Delighted to witness the continued growth of our team. Join me in extending a warm welcome to Thomas Wuchte, whose extensive experience bolsters our efforts in addressing children´s involvement with terrorism and violent extremism. We are eagerly anticipating the meaningful impact that Thomas will make as we work together.
More Related Content
Similar to Prevention of Radicalization on Social Media and the Internet in this Digital Era
The Legal Status of Children in Terrorism.pdfCecilia Polizzi
In this report, the CRTG Working Group addresses one of the most critical legal challenges pertaining to #children in #terrorism. How to classify and treat children associated with extremist actors? Are these children victims, perpetrators, or both? We offer guidance to policymakers and justice professionals in legal status determination, applicable frameworks, and intervention measures.
Main discussion outcomes:
- Children recruited and used by terrorist and violent extremist actors shall be considered and treated primarily as victims.
- To consider and treat children primarily as victims does not imply leniency or that the child should be granted immunity for criminal acts. It rather speaks to the applicability of child rights and juvenile justice principles and standards for children in a counter-terrorism context.
- Victim status does not preclude the activation of channels within the criminal justice system, provided that the child is above the Minimum Age of Criminal Accountability.
- Effective counterterrorism and human rights are not to be interpreted as conflicting goals but rather as complementary and mutually reinforcing.
The Legal Status of Children in Terrorism.pdfCecilia Polizzi
OnDecember19,2022,theCRTGWorkingGrouphostedanExpertBriefingonTheLegalStatusofChildreninTerrorism: Philippine Processes and Practices by Ms. Tricia Clare Oco, Executive Director of the Juvenile Justice and Welfare Council, Department of Social Welfare and Development of the Philippines. The purpose of this paper is to offer a series of recommendations to guide the efforts of policymakers and justice professionals in determining the legal status of children as well as the applicable legal frameworks and intervention measures. This guidance is the result of shared insights, lessons learned, practical examples, and policy recommendations from the joint meeting between the CRTG Working Group and Ms. Oco.
PREVENT Project: The Targeting of Children by Boko HaramCecilia Polizzi
Boko Haram insurgents abducted 276 girls from a school in Nigeria 10 years ago, sparking global outrage and the #BringBackOurGirls campaign.
Today, 89 girls remain missing, and 30 children were recently kidnapped in Katsina State. These events highlight ongoing challenges in securing the release of abducted children and the persistent threat of violent groups in the region.
The CRTG Working Group, monitors terrorist targeting of children in Nigeria and the Lake Chad Basin, understanding the strategic purposes behind such abductions.
Download the report here https://t.ly/iJdyf
Running head TECHNOLOGY INFLUENCES1TECHNOLOGY INFLUENCES4.docxtoltonkendal
Running head: TECHNOLOGY INFLUENCES 1
TECHNOLOGY INFLUENCES 4
Technology Influences
Tiara Miller
Professor Gauvreau
CRJ 499
5/5/16
Technology Influences
Criminal injustice can take many forms and in this case, we choose to focus on terrorism which is the currently trending form of criminal injustice. According to Wilkinson, (2012) technology involves the application of scientific knowledge in order to achieve any objectives and affects the values of a given society. In one way or another technology has adversely contributed to its increment and effect rate of terrorism in many countries, thus affecting both the external and internal stakeholders. Technology takes a huge platform and due to the rate at which technology is advancing then many people are being affected by this since it is out of this that terrorism is also advancing.
For any terrorism threat to be conveyed any country then it has to be channeled through a medium of communication which takes any form of technology, it could be an email or a short message service through the social media platforms. The threat could also be through the magazines, audios or even video clips which are spread through the internet and this results in a threat in any given state. The terrorist can use the technology to disseminate a propaganda and takes the form of multimedia communications providing ideological or practical instruction, explanations, justifications or promotion of terrorist activities. With this justification then a part of the population tend to believe that their actions are right but in the real sense, it is affecting a country in many ways. The economy is greatly affected and therefore, it results to a countries downfall.
The internet has also been used as a platform to recruit the minors to the terrorist groups, it may sound impossible but it is the new direction taken by the terrorists. This is possible as they establish a relationship between themselves and those that are interested. Terrorist organization use many platforms such as password protected website platforms and restricted chat groups that enhance direct communication. The restriction offers a platform for them to learn about the organization its mission and vision and the objectives it wants to achieve. With this then they are supported and in any way, the organization will never die since the number of people to replace those who died increases. It is with the use of technological barriers to entering to the recruitment platforms also increases the complexity of tracking terrorism-related activity by intelligence and law enforcement personnel.
The internet being one of the forms of technology has been used as a good platform to incite the people and this makes terrorism gain more power. The Internet provides an abundance of material and opportunities to download, edit and distribute content that may be considered unlawful glorification of, or provocation to, acts of terrorism. Also with the incite comes ...
Investigation and Prosecution of Children in a Counter-Terrorism ContextCecilia Polizzi
On July 7, the CRTG Working Group hosted an Expert Briefing by Cachon Emerson representing the The International Institute for Justice and the Rule of Law (IIJ) and Irina Urumova, Independent Expert on Child Protection and International Investigations and Co-Author of the IIJ Juvenile Justice Note for Investigators (https://rb.gy/iha3ml). Participants shared insights, explored good practices and formulated recommendations to guide the efforts of investigators and prosecutors in handling cases of terrorism and related offenses involving children while upholding their rights. The session was attended by Jamie Brown on behalf of the Counter-Terrorism Division of the Council of Europe and Safinas Ahayeva, UNICEF Uzbekistan.
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
Abstract. The number of terrorist attacks that have brought about bloodshed and
left a mark on recent history have spotlighted once again the need to stem the attempts by terrorist organizations to conduct attacks within the EU, forestalling the
intentions of the martyrs-to-be. The Islamic State of Iraq and Syria (ISIS) is undoubtedly the terrorist group that, more than others, has taken advantage of Internet,
not only as a tactical means of coordination, but also as a tool to carry out proselytism, recruitment, propaganda, and fundraising. As one could imagine, constantly
monitoring the Internet for these activities is an extremely complex and time-consuming activity, requiring a huge amount of money and manpower, and resulting in
very poor – and only temporary – outcomes. To stem this rapidly spreading phenomenon, it can be useful to focus the attention of decision-makers, intelligence and
law enforcement on a possible profile of a “cyber terrorist”.
This paper aims at tracing the identikit of a possible “cyber terrorist” that is as
broad and consistent as possible.
Keywords. Al-Qaeda, cyber terrorist, Internet, ISIS, Islamic State, profiling, propaganda, proselytism, recruiting, terrorist organizations
The Radicalisation and Recruitment game: How Terrorist and Violent Extremist ...Cecilia Polizzi
I am pleased to have engaged in this Q&A session with CT Insight. Our discussion covered crucial subjects, ranging from the alarming increase in #radicalization among children to the recent evaluation of the UK #Prevent program, and the social, economic, political and security challenges in the #Sahel region.
https://www.linkedin.com/posts/cecilia-polizzi-2a9663143_the-radicalisation-and-recruitment-game-activity-7107793736901812225-9PEw?utm_source=share&utm_medium=member_desktop
The Radicalisation and Recruitment game: How Terrorist and Violent Extremist ...Cecilia Polizzi
I am pleased to have engaged in this Q&A session with CTInsight. Our discussion covered crucial subjects, ranging from the alarming increase in online #radicalization among children to the recent evaluation of the UK #Prevent program, and the social, economic, political and security challenges in the #Sahel region.
Iran's Misinformation and Global Propaganda Efforts.Gary Thatcher
Iran's misinformation and global propaganda efforts represent a sophisticated and multifaceted campaign aimed at influencing international perceptions and narratives to serve its geopolitical interests. Utilizing a blend of state-controlled media outlets, social media platforms, and cyber operations, Iran systematically disseminates tailored content to sow discord, shape political discourse, and undermine the credibility of its adversaries. These efforts span across various themes, including regional conflicts, nuclear capabilities, and human rights issues, to project power and foster a positive image of Iran while discrediting opposition voices. The global reach of these campaigns poses significant challenges to information integrity, necessitating a coordinated and proactive response from the international community to counteract and promote factual, unbiased information.
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxjoellemurphey
Running head: ASSIGNMENT 4
ASSIGNMENT 4
Assignment 4: Data Collection
Student Name
Affiliate Institution
Evidence-based researched data to indicate there is a problem
Terrorism is considered a historical and major problem for the U.S. Since 2001, the significance of the problem has increased. Therefore, several organizations and facilities collect and store terrorism data for events like attempted and occurred activities. The main data source for terrorism activities is the U.S. Department of Homeland Security. The mandate of this arm of government is to protect Americans both in locally and internationally against crime activities but terrorism seems the greatest enemy of American citizen wherever they are in the world.
Numerous and most useful data for terrorism is found from the following federal agency and private databases:
· The National Security Agency (NSA)
· Federal Bureau of Investigation (FBI)
· National Consortium for the Study of Terrorism and Response to Terrorism (NCSTRT) and
· Global Terrorism Database (GTD). (FBI, 2014; GTD, 2014)
Information from the above databases are analyzed to present diverse quantitative and qualitative terrorism data that cover several years including life threats to the U.S. soil. According to these databases, terrorism is an old problem and continues to intensify due to availability of uninterrupted new technology as well as growing financial power of their organizations. The Federal Agencies data bases provide information on terrorism activities and information on several strategies that have been used in the past and are currently used to curb the vice (FBI, 2014).
The other terrorist’s data sources are the media agencies. News agencies such as online newspapers and broadcasting corporations provide terrorism data as it occurs. Although these agencies might not provide analyzed data, their role is to increase public awareness about terrorism occurrences and development.
References
Federal Bureau of Investigation (2014). Crime Statistics. Retrieved on May 22, 2015 from http://www.fbi.gov/stats-services/crimestats
Global Terrorism Database (2014). Overview of the GTD. Retrieved on May 22, 2015 from http://www.start.umd.edu/gtd/about/
2
Running Head: Terrorism Stakeholders
Terrorism
Terrorism Stakeholders
Student name
Affiliate Institution
Terrorism
Modern day terrorism has caused sufficient harm to the society both in the political, social and the economic sectors. External and internal forces have influenced terrorism activities within the governments therefore increasing the intensity of the terrorism acts (Chong, 2007). After the terror attack that occurred in the U.S on the 9/11, 2001, it was realised that there have been low information sharing amongst the agencies that conducts the security surveillance of the country. Various institutions and agencies directly or indirectly are linked to the terrorist attack that takes p ...
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...ijtsrd
Social media platforms are viewed as all progressive in opening up democratic spaces the world over. In the Middle East and North Africa region, social media platforms are regarded as key to the Jasmine Revolution that resulted in the fall of some regimes widely regarded as repressive by the international community. In Southern Africa, the hashtag movements saw youth shrugging off political apathy to challenge the establishment. Information Communication Technologies are refreshingly enticing the youth to participate and revitalize politics in the sub region. However, regimes in the sub region, traditionally comfortable with the hegemonic stringent hold on mainstream media, are becoming uncomfortable with these new developments and have resorted to legislation that threaten freedom of expression by citizens on social media as well as surveillance of citizens. This study is therefore going to establish societal views on state surveillance and monitoring of citizens' activities on social media. This is going to be executed through in depth interviews with media practitioners, scholars, political analysts, policy makers and ordinary users of social media platforms. Findings will be presented and analysed qualitatively and thematically. Tawanda Mukurunge | Neo Tlali | Takura Bhila "Surveillance and Monitoring in the Social Media Era: Threats and Opportunities to Democratic Processes in Southern Africa" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29546.pdfPaper URL: https://www.ijtsrd.com/other-scientific-research-area/other/29546/surveillance-and-monitoring-in-the-social-media-era-threats-and-opportunities-to-democratic-processes-in-southern-africa/tawanda-mukurunge
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP
The Internet and social media today provide huge opportunities: access to communities and networks, online information and learning, business and entertainment. However online connected technologies can also present challenges for children and young people and other vulnerable groups who may not have the critical digital literacies and life skills to recognise risk, or the resilience to manage online stresses and challenges.
This presentation highlights some of the themes to address when developing the digital literacies and digital well-being of children and young people, and those who work with or support them.
This report is the ninth in an annual series of publications, dating back to 2012, showcasing the latest developments in social media across the Middle East and North Africa (MENA) region.
This year’s study is produced in partnership with the New Media Academy. The New Media Academy was inaugurated in June 2020, by His Highness Sheikh Mohammed bin Rashid Al Maktoum, UAE Vice President and Prime Minister, and ruler of Dubai, to work within the space of development, with a focus on harnessing opportunities in the digital space.
Using a broad range of industry, academic and media sources, we dive into the trends - and biggest stories - which shaped MENA’s relationship with social media during the past year. Not surprisingly, this study is heavily influenced by the impact of
COVID-19. The novel coronavirus impacted on everyone’s lives around the world, including the Middle East. One by-product of the pandemic could be seen in our changing media habits. Social media usage - across all platforms - increased during the early stages of the outbreak.
More widely, given the importance of social media in our media diets, platforms, industry and governments alike sought to use these networks to promote public health messages, as well as counter misinformation related to the COVID crisis.
Alongside these developments, we have also seen continued investment in content on social media platforms - especially during Ramadan - and growing partnerships between traditional media players and social media channels and influencers. These developments reflect the popularity of high quality digital content consumed on social media, and a desire to reach audiences on these platforms, or bring existing social
audiences onto other networks.
We expect that this synergy will only rise, not least because many media habits developed during the pandemic may well continue post-COVID. As a result, social networks will become an increasingly important source for talent spotting, as well as a
key avenue for content and information consumption.
This trend, as we outline at the end of this report, matters for brands, creators and influencers, as well as governments and other public entities. Social media is already an important part of digital media habits and digital marketing strategies. In 2021,
that importance looks set to continue and grow even further.
We are thrilled to announce the onboarding of our new Non-Resident Fellow, Noor Huda Ismail, a catalyst for change in the realm of counter-terrorism and peacebuilding. His unique blend of academic rigor and on-the-ground impact has made him a global influencer, leaving a mark on the discourse surrounding extremism and rehabilitation.
With a Ph.D. focused on Indonesian Foreign Fighters, Dr. Ismail's journey has been both academically significant and personally profound. His dedication became evident during his journalistic stint when he discovered the involvement of a former schoolmate in the Bali bombings.
In 2008, Dr. Ismail founded the Institute for International Peace Building, providing solutions for the social rehabilitation of convicted terrorists. As an Ashoka Fellow, his influence extends globally, acknowledged through prestigious awards such as the EU Leadership and French Cultural Awards.
A true storyteller at heart, Dr. Ismail communicates the complexities of extremism through various mediums, including writings and documentaries like "Jihad Selfie" and "The Bride." His advocacy for a nuanced understanding of radicalization emphasizes countering online extremism and fostering communication changes that are crucial in our interconnected world.
Dr. Noor Huda Ismail's narrative serves as a compelling call to action, highlighting the essential role of rehabilitation and second chances in the journey toward sustainable peace. As a Visiting Fellow at RSIS | S. Rajaratnam School of International Studies, he continues to shape meaningful conversations and drive initiatives in his areas of expertise.
Please join us in extending a warm and formal welcome to Dr. Noor Huda Ismail as our newest Non-Resident Fellow.
Delighted to witness the continued growth of our team. Join me in extending a warm welcome to Thomas Wuchte, whose extensive experience bolsters our efforts in addressing children´s involvement with terrorism and violent extremism. We are eagerly anticipating the meaningful impact that Thomas will make as we work together.
We are thrilled to welcome Mr. Thomas Wuchte as an advisor to the CRTG Working Group!
Thomas Wuchte brings a wealth of experience to our team, having served as the former Executive Director for The International Institute for Justice and the Rule of Law (IIJ). A West Point graduate with a postgraduate degree in International Relations from the University of Illinois, his decorated public service background includes leadership in government and multilateral environments related to national security and counterterrorism.
Before the IIJ, he led counterterrorism efforts for the 57 participating States in the Organization for Security and Co-operation in Europe (OSCE) in Vienna, Austria. Throughout each period, he worked closely in a variety of formal and informal settings to advance #UN and global efforts working to eliminate extreme poverty, strengthen human rights and citizen participation, safeguard a sustainable planet, promote peace, and ensure dignity for all people. His efforts led to a multi-year project funded to emphasize the human rights aspects with particular emphasis on women and youth as key focus for partnerships.
Tom is the recipient of the U.S. Department of State Highest Award for Excellence in International Security Affairs for his efforts to work collaboratively with international partners. At present, he is the Founder of the Multilateral Collaboration and Cooperation Leadership (GCMCC), based in the Washington DC-Baltimore area and Bangkok. His focus is on empowering multilateral collaboration on non-traditional security issues such as climate change, while also working to balance resources for these new issues against the competing interests that often overlook the conditions conducive to violent extremism and terrorism.
Join us in welcoming Thomas Wuchte to our team! His expertise and dedication will undoubtedly enrich our initiatives towards addressing the involvement of children in terrorism and violent extremism.
Generational Warfare in the Sahel: The Khilafa Cubs and the Dynamics of Viole...Cecilia Polizzi
Over the last ten years, Africa has been a crucial strategic region for the Islamic State, with numerous affiliated groups receiving substantial backing. As threats from terrorist and extremist groups intensify, IS-linked entities are increasingly adopting the parent organization's strategies, placing particular emphasis on child radicalization.
Our analysis, led by Guillaume Soto-Mayor, delves into the role of children as pillars in the strategic continuity and expansion of violent insurgency in the #Sahel.
Read it here: https://rb.gy/y8wuju
Generational Warfare in the Sahel: The Khilafa Cubs and the Dynamics of Viole...Cecilia Polizzi
Over the last ten years, Africa has been a crucial strategic region for the Islamic State, with numerous affiliated groups receiving substantial backing. As threats from terrorist and extremist groups intensify, IS-linked entities are increasingly adopting the parent organization's strategies, placing particular emphasis on child radicalization.
Our analysis, led by Guillaume Soto-Mayor, delves into the role of children as pillars in the strategic continuity and expansion of violent insurgency in the #Sahel.
Last month, it was my pleasure to inform HQ Eurocorps Military Contribution to Human Security (MC2HS) in relation to NATO Policy on Children and Armed Conflict.
The effects of armed conflict on children are both direct and indirect, but always pervasive. Violations against children in armed conflict and near-conflict zones, as well as fragile states, span the broad spectrum of international legislative and normative frameworks and oftentimes amount to severe violations of the rule of law, fundamental rights and guarantees, including peremptory norms and jus cogens. The majority of violations have taken place in the past five years, underscoring increasingly severe, complex, and protracted protection crises.
Last month, it was my pleasure to inform HQ Eurocorps Military Contribution to Human Security (MC2HS) in relation to NATO Policy on Children and Armed Conflict.
The effects of armed conflict on children are both direct and indirect, but always pervasive. Violations against children in armed conflict and near-conflict zones, as well as fragile states, span the broad spectrum of international legislative and normative frameworks and oftentimes amount to severe violations of the rule of law, fundamental rights and guarantees, including peremptory norms and jus cogens. The majority of violations have taken place in the past five years, underscoring increasingly severe, complex, and protracted protection crises.
Al Hawl Shame: Another Layer of Dante ́s Inferno for Children | by Cecilia Po...Cecilia Polizzi
In her latest contribution, our President/CEO Cecilia Polizzi analyzes the challenges hindering the repatriation and social reintegration of Iraqi children from the #AlHol camp in north-east Syria.
Al Hawl Shame: Another Layer of Dante ́s Inferno for Children | by Cecilia Po...Cecilia Polizzi
In June, the Iraqi government has performed another round of repatriations from #AlHol. In my latest, I explore the issue of stigma and the
Key points:
1. The 50% of Al Hol residents are children, most of whom do not exceed the age of twelve years, continue to be exposed to forceful indoctrination and IS-inspired violence, and critical protection gaps exist across all sectors.
2. The obstacles encompassing repatriation processes to Iraq remain significant including including risks of violence and the lack of adequate preparations in terms of safety, lodging, economic needs, and social reintegration.
3. The attitude towards Al-Hol children is marked by ostracism both at the official and community levels. These perceptions force severe stigmatization and a high risk for children of becoming victims of secondary violence by communities, law enforcement, and military forces following their return, and inhibit and prevent social reintegration.
4. Since no attempt has ever been made to isolate extremists from IDPs, refugees, and victims of ISIS crimes, including minorities or ethnic groups, in Al Hol, all children bear the long-lasting shame and stigma of ISIS proximity, whether this perception of proximity is accurate or not.
5. Paradoxically, the same policies that discourage the return of families, the social, economic, and political ostracization, exacerbate factors that contribute to extremism.
The Lived Experiences of Children in the Al-Hol Camp: Sytemic Deprivation, Tr...Cecilia Polizzi
We are delighted to share the latest analysis by our research fellow, Esther Brito Ruiz. This publication expounds the impact of sexual and gender-based violence and trauma on the social development of young girls in #AlHol Camp and uncovers the gendered patterns driving the replication of #ISIL´s ideology.
The Experiences of Children in the Al-Hol Camp: Systemic Deprivation, Trauma,...Cecilia Polizzi
We are delighted to share the latest analysis by our research fellow, Esther Brito Ruiz. This publication expounds the impact of sexual and gender-based violence and trauma on the social development of young girls in #AlHol Camp and uncovers the gendered patterns driving the replication of #ISIL´s ideology.
Children Affected by the Foreign Fighter Phenomenon: Guidelines on the Preven...Cecilia Polizzi
The 2023 Children Affected by the Foreign Fighter Phenomenon (CAFF) Series aims to provide insight and advice for states, professionals, practitioners, and other relevant stakeholders. The CAFF expounds the trajectory of child involvement with the Islamic State of Iraq and the Levant (ISIL) in relation to the foreign fighter phenomenon and the life-cycle of the present scenario, offering solutions across sectors and disciplines and tackling the full range of issues it exerts. It encompasses key themes such as online safety, the Al-Hol crisis, repatriation, reintegration and rehabilitation, and offers four sets of Guidelines.
This line of effort by the CRTG Working Group proposes comprehensive, integrated and multi-faceted approaches to progress towards sustainable and meaningful solutions to the prolonged child protection and security crisis stemming from the issue of foreign fighters. Central to CAFF is ensuring that human rights, the rule of law, and children’s rights remain at the forefront throughout the development and implementation of interventions and programs.
These syntheses of accumulated experience and expertise on selected themes provide comprehensive, detailed, and nuanced overviews of their subject matter. The present Guidelines initiate this line of thematic work by the CRTG Working Group in a very important area - the online ecosystem of terrorism and violent extremism. It is the result of CRTG Working Group specialized knowledge and draws from a CRTG Working Group-led technical session with Ms. Hallie Stern, Founder and Director of Mad Mirror Media, and Mr. Ardian Shajkovci, Co-Founder and Director of the American Counterterrorism Targeting and Resilience Institute, concerned with preventing and mitigating harms against children in the digital sphere. Thus, acknowledging how ISIL and other terrorist and violent extremist actors exploit technological innovation, social media, and the Internet to entice, mobilize, recruit and radicalize children and seeking to enable appropriate responses, guaranteeing online safety and a secure online experience for all children and young people.
UNICEF Innocenti_Children´s Involvement in organized violenceCecilia Polizzi
I was honored to have participated in the UNICEF Innocenti roundtable on children's involvement in organized violence. It was an informative discussion, bringing together a diverse group of experts to exchange ideas on this crucial issue.
The current trends in child involvement with terrorist and violent extremist groups are a major concern:
1. The recruitment and use of children by UN-designated terrorist groups have risen sharply over the past two decades.
2. The landscape of terrorism and violent extremism has become more diverse and fragmented, with actors being empowered by advances in emerging technologies, adding other layers of complexity to this issue and enhancing risks for children and young people.
3. The radicalization of children and youth has become a primary focus for terrorist and violent extremist actors, with the potential to lead to their involvement in violent activities.
Moderation_Prevention of Child Recruitment and Radicalization: Online SafetyCecilia Polizzi
I am delighted to have moderated a panel discussion on the prevention of child recruitment and radicalization in the digital environment. It was an incredibly stimulating conversation that shed light on the ways in which children are targeted online, appropriate measures to limit the spread of violent propaganda and messaging, and ensuring online safety and a secure digital experience for all children and young people.
Prevention of Child Recruitment and Radicalization: Online SafetyCecilia Polizzi
The CRTG Working Group has concluded the first of its technical sessions, addressing issues related to children affected by the foreign fighter phenomenon. Our goal was to identify practical solutions that can help protect children navigating the digital environment, while preventing and limiting the spread of extremist ideologies online.
We are grateful to our panelists and participants including Ardian Shajkovci, Ph.D. Co-Founder and Director of American Counterterrorism Targeting and Resilience Institute (ACTRI), Hallie J. Stern Founder and Director of Mad Mirror Media, Guillaume Soto-Mayor Non-Resident Fellow CRTG Working Group, and Peta Lowe NSW JP Principal Consultant Phronesis Consulting and Training for their valuable contributions.
We look forward to share our findings and contribute to policymaking and responses to children in terrorism.
We are pleased to announce that Ms. Georgia Holmer has joined the CRTG Working Group as an Advisor. With her wealth of experience in counter-terrorism and human rights, Ms. Holmer´s insights will be instrumental in our mission to tackle the recruitment, use and radicalization of children by violent extremist actors. Welcome, Ms. Holmer!
As we write this new chapter of the CRTG Working Group, I am honored to welcome Elie Abouaoun (DDS, MBA), Qamar Huda, and Jeanette Boland APM Boland, APM, to our governance. The wide array of perspectives drawn from their experience at the highest levels of government and public policy, as well as their wisdom, influence, and global reach, lend weight to the CRTG Working Group's mission to protect children from violence and help prevent and mitigate threats stemming from child abuse in terrorism.
It is with sincere pleasure that we welcome Elie Abouaoun (DDS, MBA), Qamar Huda, and Jeanette Boland APM to the Board of Directors of the CRTG Working Group.
Dr. Elie Abouaoun is the Director of North Africa Programs and the MENA Regional Hub at the United States Institute of Peace. Prior to his longstanding service with USIP, Dr. Abouaoun was the Executive Director at the Arab Human Rights Fund and Country Director and Program Manager for the Danish Refugee Council / Dansk Flygtningehjælp in Iraq. Since 1996, Dr. Abouaoun has also worked as a senior trainer and consultant for various international organizations, including the Council of Europe.
Dr. Qamar Huda is the Michael E. Paul Distinguished Visiting Professor in International Affairs at the United States Naval Academy. Previously, he served as the Vice President of Strategy at the Newlines Institute for Strategy and Policy in Washington, D.C. Dr. Huda is a seasoned policy expert who worked in government and the non-profit policy community, focusing on security, US foreign policy, conflict zones, development, and key areas in Asia, North Africa, and the Middle East.
Jeanette Boland is a specialist consultant for The Commonwealth and a former high-ranking officer in the Australian Federal Police with more than three decades of experience working on counterterrorism as a community engagement officer and advising and leading the implementation of CVE programs, including prevention of youth engagement with violent extremism and repatriation efforts.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Donate to charity during this holiday seasonSERUDS INDIA
For people who have money and are philanthropic, there are infinite opportunities to gift a needy person or child a Merry Christmas. Even if you are living on a shoestring budget, you will be surprised at how much you can do.
Donate Us
https://serudsindia.org/how-to-donate-to-charity-during-this-holiday-season/
#charityforchildren, #donateforchildren, #donateclothesforchildren, #donatebooksforchildren, #donatetoysforchildren, #sponsorforchildren, #sponsorclothesforchildren, #sponsorbooksforchildren, #sponsortoysforchildren, #seruds, #kurnool
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
Russian anarchist and anti-war movement in the third year of full-scale warAntti Rautiainen
Anarchist group ANA Regensburg hosted my online-presentation on 16th of May 2024, in which I discussed tactics of anti-war activism in Russia, and reasons why the anti-war movement has not been able to make an impact to change the course of events yet. Cases of anarchists repressed for anti-war activities are presented, as well as strategies of support for political prisoners, and modest successes in supporting their struggles.
Thumbnail picture is by MediaZona, you may read their report on anti-war arson attacks in Russia here: https://en.zona.media/article/2022/10/13/burn-map
Links:
Autonomous Action
http://Avtonom.org
Anarchist Black Cross Moscow
http://Avtonom.org/abc
Solidarity Zone
https://t.me/solidarity_zone
Memorial
https://memopzk.org/, https://t.me/pzk_memorial
OVD-Info
https://en.ovdinfo.org/antiwar-ovd-info-guide
RosUznik
https://rosuznik.org/
Uznik Online
http://uznikonline.tilda.ws/
Russian Reader
https://therussianreader.com/
ABC Irkutsk
https://abc38.noblogs.org/
Send mail to prisoners from abroad:
http://Prisonmail.online
YouTube: https://youtu.be/c5nSOdU48O8
Spotify: https://podcasters.spotify.com/pod/show/libertarianlifecoach/episodes/Russian-anarchist-and-anti-war-movement-in-the-third-year-of-full-scale-war-e2k8ai4
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
A process server is a authorized person for delivering legal documents, such as summons, complaints, subpoenas, and other court papers, to peoples involved in legal proceedings.
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Prevention of Radicalization on Social Media and the Internet in this Digital Era
1. 2023 VOL. I
/ Cecilia Polizzi
Children Affected by the Foreign Fighter Phenomenon:
Guidelines on the Prevention of Radicalization on Social Media
and the Internet in this Digital Era
3. Executive Summary 1
Background 3
I. Tech Guidelines 5
II. Policy Guidelines 8
III. Non-Professional Guidelines 13
Contents
4. Executive Summary
The 2023 Children Affected by the Foreign Fighter Phenomenon (CAFF) Series aims to provide insight and advice for
states, professionals, practitioners, and other relevant stakeholders. The CAFF expounds the trajectory of child
involvement with the Islamic State of Iraq and the Levant (ISIL) in relation to the foreign
fi
ghter phenomenon and
the life-cycle of the present scenario, offering solutions across sectors and disciplines and tackling the full range
of issues it exerts. It encompasses key themes such as online safety, the Al-Hol crisis, repatriation, reintegration
and rehabilitation, and offers four sets of Guidelines.
This line of effort by the CRTG Working Group proposes comprehensive, integrated and multi-faceted approaches
to progress towards sustainable and meaningful solutions to the prolonged child protection and security crisis
stemming from the issue of foreign
fi
ghters. Central to CAFF is ensuring that human rights, the rule of law, and
children’s rights remain at the forefront throughout the development and implementation of interventions and
programs.
These syntheses of accumulated experience and expertise on selected themes provide comprehensive, detailed,
and nuanced overviews of their subject matter. The present Guidelines initiate this line of thematic work by the
CRTG Working Group in a very important area - the online ecosystem of terrorism and violent extremism. It is the
result of CRTG Working Group specialized knowledge and draws from a CRTG Working Group-led technical session
with Ms. Hallie Stern, Founder and Director of Mad Mirror Media, and Mr. Ardian Shajkovci, Co-Founder and Director
of the American Counterterrorism Targeting and Resilience Institute, concerned with preventing and mitigating
harms against children in the digital sphere. Thus, acknowledging how ISIL and other terrorist and violent extremist
actors exploit technological innovation, social media, and the Internet to entice, mobilize, recruit and radicalize
children and seeking to enable appropriate responses, guaranteeing online safety and a secure online experience
for all children and young people.
The CRTG Working Group´s technical session sought to expose the complexities of the online ecosystem of
terrorism and violent extremism as related to the targeting of children and respond to the following questions:
1. What are the primary ways in which terrorist groups use the Internet to recruit and radicalize children, and
what strategies can be employed to prevent such activity? What is the role of governments, tech companies,
civil society, and non-professionals?
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 1
5. 2. Is child protection truly possible in the digital environment? If yes, through which strategies and in which
manner should prevention and mitigation efforts occur?
The Recommendations are categorized into three distinct sections, speci
fi
cally designed to cater to the roles and
responsibilities of different stakeholders: 1. Tech Guidelines; 2. Policy Guidelines; and 3. Non-Professional
Guidelines.
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 2
6. Background
The issue of foreign terrorist
fi
ghters (FTFs) has been a priority on the political agenda of a number of states for at
least the past
fi
ve years. Since the inception of the Syrian crisis, thousands of foreign nationals have traveled or
attempted to travel in a con
fl
ict zone in Syria and Iraq with the intent to join the Islamic State of Iraq and the
Levant (ISIL) and other insurgent terrorist groups. Following o
ffi
cial estimates, at least 4,640 children, constituting
between 9-12% of the group´s total foreign a
ffi
liates, were either brought by their parents to the con
fl
ict zone or
were born to FTF families in the region. To these statistics should also be added the hundreds of other foreign
1
minors who traveled on their own accord because of their exposure and enticement to ISIL´s propaganda
campaigns and recruitment strategies online. In recent years, social media and the Internet have expedited the
dissemination of information, reduced costs, and provided increasing opportunities for communication,
engagement and outreach across national boundaries, cultures, and languages. Terrorist and violent extremist
groups have leveraged these new mechanisms and platforms to ensure a continuous
fl
ow of supporters and
sympathizers into their movements and incite attacks regardless of chains of command, training, instruction,
material assistance, or operational planning. The promotion of violence and extremist rhetoric encouraging violent
acts are common trends in terrorism propaganda across Internet-based platforms. However, terrorist propaganda
contains signi
fi
cantly more than religious rhetoric or military strategy. Rather, these narratives are part of a
process that crystalizes a jihadi subculture designed to appeal to disaffected and/or marginalized individuals and
societal groups. The in
fl
uence of violent extremists´ propaganda, messaging, and recruiting strategies in the digital
realm disproportionately impacts children and young people, who not only comprise a large portion of users but
also present heightened vulnerabilities. ISIL demonstrates a heavy reliance on the Internet, social media platforms,
games and magazines as propagandistic tools, as well as adroitness in manipulating the media to alter domestic
and international opinion in the form of psychological operations. Its ability to radicalize, mobilize, in
fl
uence, or
2
entice minors cannot be underestimated. In fact, ISIL not only produces some of the most technologically
advanced propaganda yet but has also proven highly successful in spreading its narratives throughout a variety of
diverse platforms and in devising articulated grooming strategies across the digital space. ISIL’s propaganda
3
machine is highly sophisticated. At the height of the group´s occupation of territories across Syria and Iraq, through
a number of o
ffi
cial media producers and the Al-Hayat Media Center, an ISIL-media branch targeting young viewers
and generating content in multiple languages, ISIL produced and disseminated multi-media content, including
Cook, Joana and Gina Vale. "From Daesh to 'Diaspora': Tracing the Women and Minors of Islamic State." ICSR, 2018.
1
Polizzi, Cecilia. "Fourth Generation Warfare: An Analysis of Child Recruitment and Use as a Sala
fi
-Jihadi Doctrine of War." Small Wars Journal, 2022.
2
Lieberman, Ariel Victoria. "Terrorism, the Internet, and Propaganda: A Deadly Combination." Journal of National Security Law & Policy 9, no. 1 (Year): 95-120.
3
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 3
7. Hollywood-style documentaries and jihadi-travel shows portraying life under ISIL as glamorous and utopian and its
4
members as heroic and desirable. Reportedly, 2000 foreign citizens per month, including women and children,
traveled to Syria and Iraq in 2014. The territorial defeat of the ´caliphate´ did not alter the group´s online strategy. In
2017, ISIL´s media machinery continued to produce as many as 90,000 posts on Twitter, YouTube, Facebook, and
many other social media platforms every single day. According to some commentators, following the loss of
territory, the group progressively retreated into a “virtual caliphate”, a phase during which propaganda assumed
increasing relevance. The COVID-19 pandemic also rendered efforts to maintain a foothold in the digital realm more
critical as a means of survival.
While states continue to experience a strong set of unprecedented challenges concerning legal, ethical, and
practical questions with respect to their obligations and capabilities of handling the child returnee contingent, the
use of the Internet for malign purposes has added new layers of complexity to addressing terrorism and violent
extremism involving children and youth, and calls for appropriate and coordinated responses. However, due to the
vast variety of online platforms, the evolving nature and breadth of exploitative techniques used, the proliferation
of online terrorist and violent extremist content remains one of the major policy issues facing counterterrorism
authorities and digital communications technology providers.5
Al Hayat Media’s programming includes a jihadi-type travel show called “Eid Greetings from the Land of Khilafah,”
fi
lmed in Raqqa, Syria, which features ISIS
fi
ghters from
4
Western countries proclaiming how happy they are to be there.; Steve Rose, The ISIS Propaganda War: A Hi-Tech Media Jihad, THE GUARDIAN (Oct. 7, 2014), http://
www.theguardian.com/world/2014/oct/07/isis-media-machine-propaganda-war.
Clifford, Bennett. "Moderating Extremism: The State of Online Terrorist Content Removal Policy in the United States." Program on Extremism at George Washington
5
University, December 2021.
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 4
8. I. Tech Guidelines
01. Consider algorithmic pattern changes and seek to moderate data collection on children to
prevent the hyper-targeting of violent extremist propaganda and reduce radicalization and
recruitment risks.
In the rapidly evolving landscape of social media platforms, algorithmic patterns and data collection practices have
become subjects of intense scrutiny and debate. This section sheds light on the impact of algorithmic changes
made by major tech giants, such as Facebook and Google, and the implications of data collection within the context
of marketing, ad tech, and content moderation. In 2016, Facebook, Google, and other leading platforms modi
fi
ed
their algorithms to create personalized echo chambers within users' networks. By leveraging human ranking and
6
speci
fi
c user interactions, the algorithms were designed to prioritize content that resonated most with individuals.
While this approach yielded favorable outcomes for marketing and ad tech purposes, it also opened avenues for
malicious exploitation, such as the manipulation of content dissemination by terrorist and violent extremist actors
across the ideological spectrum. This highlights the need to reassess the algorithmic patterns deployed by these
platforms to mitigate the potential for unintended consequences. Inextricably linked to algorithmic patterns is the
collection of vast amounts of user data. The ability to precisely target audiences based on demographics, interests,
and even geographical locations has revolutionized the ad tech industry. However, this practice raises ethical
concerns, particularly when it comes to data collected from individuals under the age of eighteen. Understanding
the implications of data collection on children and the risks posed by algorithmic models can serve violent
extremism prevention and mitigation efforts and help ensure the integrity of digital platforms. In this framework, a
revisitation of algorithmic patterns, emphasizing diversity of content and reducing risks of fostering echo
chambers, and discussions surrounding the scope of data collection on children may support tech companies in
navigating these complex challenges and guide towards establishing a balanced approach between user
experience, privacy, and children´s and societal well-being.
02. Seek to enhance cross-platform information sharing and collaboration among tech
companies in order to address the challenges of identifying and managing digital risks,
particularly for those with limited resources.
Eg, R., Demirkol Tønnesen, Ö., & Tennfjord, M. K. (2023). A scoping review of personalized user experiences on social media: The interplay between algorithms and human
6
factors. Computers in Human Behavior Reports, 9, 100253. https://doi.org/10.1016/j.chbr.2022.100253.
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 5
9. The current landscape of online violent extremist content was shaped in large part by decisions made by major
social media companies to alter their content removal policies. Terrorist and violent extremist groups reacted to
this heightened enforcement in a number of ways, but centered their strategies for survival online on adaptation
and migration. Audrey Alexander observed that supporters of extremist groups “demonstrate tremendous agility
7
across multiple platforms” in reacting to major social media companies’ increased enforcement of TOS, noting that
“some accounts rallied in the face of shutdowns [while] others expressed interest in migrating to online
environments that were more hospitable or optimal for extremist users.” Despite the investments of major
8
platforms in TOS enforcement, extremist actors seek to maintain footholds on major social media platforms to
access global audiences. Yet, they have generally been successful in migrating to other social media platforms,
9
which they can exploit as alternatives when the major services are inaccessible. While using alternative platforms
10
can be disadvantageous in attaining a high rate of audience engagement and is oftentimes subject to service
disruptions, one clear advantage is found in the relatively more suitable environments for extremist content that
11
these platforms guarantee. Many smaller providers lack the personnel, resources, and expertise necessary to
institute a broad-based terrorist content removal paradigm. A commonly cited example of this type of company is
12
JustPaste.it, a
fi
le-sharing site operated by a Polish social media startup. Due to the platform’s simple design and
accessibility features, including operating with right-to-left alphabets like Arabic, ISIL supporters exploited the
platform to host multimedia propaganda releases. In the early days of ISIL social media campaigns on
13
JustPaste.it, the company had one staff member and a minimal budget; it simply could not keep up with the in
fl
ux
of violent extremist content. Following these considerations, cross-platform collaboration and partnership
14
between tech companies of different sizes, such as start-ups and tech giants, may hold great potential in
preventing and countering violent extremism online targeting children. This collaborative framework paves the way
for joint research and development endeavors, speci
fi
cally focused on enhancing content moderation technologies,
devising effective detection algorithms, bolstering the identi
fi
cation and removal of violent propaganda materials,
and fortifying reporting mechanisms. In conjunction with collaboration, the provision of technical assistance and
tools emerges as a vital aspect of supporting smaller tech companies. Big tech companies, acting as mentors, can
extend technical aid and provide access to tools such as Application Programming Interfaces (APIs) and software
development kits (SDKs). These invaluable resources aid in the identi
fi
cation and removal of violent propaganda
Alexander, “Digital Decay”; Alexander and Braniff, “Marginalizing Violent Extremists Online”; Clifford, Bennett. 2020. "Migration Moments: Extremist Adoption of Text
‐
Based
7
Instant Messaging Applications." Global Network on Extremism and Technology. November 2020. Accessed [May 1, 2023]. Available at: https://gnet-research.org/wp-content/
uploads/2020/11/GNET-Report-Migration-Moments-Extremist-Adoption-of-Text%E2%80%91Based-Instant-Messaging-Applications_V2.pdf.
Alexander, “Digital Decay.”
8
Clifford, Bennett, and Helen Powell. 2019. "De-Platforming and the Online Extremist’s Dilemma." Lawfare. June 6, 2019. Accessed [insert date accessed]. Available at: https://
9
www.lawfareblog.com/de-platforming-and-online-extremists-dilemma.
Ibid.
10
Clifford and Powell, “De-Platforming and the Online Extremist’s Dilemma”.
11
Tech Against Terrorism, “The Online Regulation Series”.
12
Ibid.
13
Ibid.
14
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 6
10. materials, enabling small tech companies to integrate robust content moderation and
fi
ltering systems into their
platforms. The seamless incorporation of these technologies ensures a more secure and responsible digital
environment. To further equip small tech companies with the tools and insights necessary to enable proactive
measures in detecting and removing violent propaganda, training programs and capacity-building initiatives may
also be considered.
03. Strengthening collaboration between tech companies and law enforcement: establishing
clear protocols to safeguard privacy, protect public interests, and combat harmful activities
against children in the online realm.
In today's digital landscape, the regulation of online discourse, particularly when it veers into the realm of violent
extremism and harm against children, presents a multitude of challenges. The importance of clear de
fi
nitions and
frameworks for identifying and addressing hateful speech and harmful content targeting children, in addition to the
need for metrics to measure impacts, is evident. While the limitations faced by tech companies in sharing private
data and di
ffi
culties in accessing social media-related information are acknowledged, within the context of online
regulation, the establishment of transparent protocols can be an effective way to safeguard privacy, protect public
interests, and prevent and mitigate harmful activities against children. These protocols should encompass
comprehensive guidelines that outline the appropriate procedures and methodologies, including the identi
fi
cation
and removal of abusive content, the reporting and escalation mechanisms for suspicious behavior, and the
implementation of proactive measures to prevent the dissemination of such content. These protocols should
adhere to legal and ethical standards, respecting privacy rights while still enabling the necessary collaboration
between tech companies and law enforcement agencies. Ensuring a balance between data accessibility and
privacy protection is paramount, necessitating a careful examination of constitutional and legislative limitations
and the formulation of protocols that align with relevant norms. By engaging in a multifaceted dialogue with a
range of stakeholders, including policymakers, child protection entities, and legal experts, tech companies can
ensure that the protocols address diverse perspectives and concerns, fostering a collective effort to combat
harmful activities against children in the online ecosystem. In terms of implementation, adequate resource
allocation may support the provision of training programs focusing on equipping staff with the necessary
knowledge and skills to effectively implement the protocols, including techniques for content moderation,
identi
fi
cation of potential risks, and handling sensitive information, therefore building capacity to address harmful
activities against children on their platforms and helping create a safer online environment.
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 7
11. II. Policy Guidelines
04. Consider mainstreaming technical perspectives and data science into policies, laws, and
initiatives aimed at preventing and mitigating online harm for children.
A viable strategy to combat the dissemination of terrorist content online involves the proactive removal of
individual posts or websites by technology companies or external entities. This approach is implemented through
various means, including government entities issuing requests for content removal, technology companies
adopting self-regulatory measures to eradicate such content, leveraging arti
fi
cial intelligence techniques such as
"upload
fi
lters," and engaging individual hackers or civil society-led initiatives for content takedown. While the
removal and
fi
ltering of terrorist and violent extremist content does impede the dissemination of terrorist
propaganda, it does not completely eradicate it. This challenge can be aptly described using the metaphor of
"Whack-A-Mole," drawing upon the analogy of the classic amusement park game where a mallet is used to strike
furry rodents as they randomly emerge from various holes on a board. When terrorist content is removed from
15
one website, it swiftly reappears on a different channel or multiple channels. The online landscape is in a perpetual
state of
fl
ux, presenting those responsible for content takedown and
fi
ltering with an incessant and exponentially
expanding stream of identical materials surfacing across multiple platforms. A narrative-driven approach alone, in
addition, may neglect the intricate technical and algorithmic elements that feed the AdTech economy and the
digital advertising ecosystem and inadvertently support the dissemination of harmful content to children. The data
collected from social media users to create detailed user pro
fi
les, including demographic information, interests,
and online behaviors is exploited by terrorist and violent extremist actors seeking to identify and engage children at
risk. Understanding disinformation, misinformation, and propagation as cybersecurity and information security
issues will assist not only in avoiding potential con
fl
icts with constitutional principles, such as freedom of speech,
but also in formulating informed policies that align with the complexities of the digital ecosystem and its
technological infrastructure and foster a safer online environment and experience. Machine learning, data science,
and network analysis specialists may help shed light on data collection and the ways in which it is used for
malignant intents to hypertarget violent content, and mainstream this knowledge into regulatory frameworks,
policy development, and implementation.
Peritz, Aki, ‘What Whac-A Mole Can Teach Us About How to Fight Terrorism,’ Foreign Policy, 12 August 2015. Available at: https://foreignpolicy.com/2015/08/12/what-whac-a-
15
mole-can-teach-us-about-how-to-
fi
ght- terrorism/.
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 8
12. 05. Consider establishing a community-led panel of modi
fi
ers to discuss and provide input on
trust and safety issues and help enforce regulation aimed at mitigating online harms against
children in the digital environment while effectively balancing the relationship between
governments, tech companies, and the collective interest.
The ubiquitous principles of libertarianism and capitalism, which constitute the foundations of the free market
paradigm, wield a substantial in
fl
uence over the regulatory capacity of governments concerning content control on
privately owned platforms that pro
fi
t from algorithm-based business models. This in
fl
uence assumes particular
signi
fi
cance when contemplating the potential risks in
fl
icted upon children who might become susceptible to
online radicalization or recruitment by terrorist and violent extremist actors. Libertarianism, as an ideology,
champions minimal governmental intervention in market affairs, emphasizing individual freedom and restrained
regulation. It espouses the notion that private entities should possess considerable latitude in their operations, with
minimal encroachment from governing bodies. Consequently, this perspective posits that governments ought to
abstain from imposing content-related restrictions, granting them the autonomy to fashion their own policies.
Capitalism further buttresses the ideology of the free market by accentuating the pursuit of pro
fi
t and fostering
competition among private entities. Within the domain of privately owned platforms that derive pro
fi
t through
algorithmic mechanisms, the primary objective revolves around maximizing user engagement and generating
revenue. Algorithms, engineered to optimize user experiences and bolster platform usage, frequently accord
precedence to content that elicits heightened levels of engagement. This predisposition can inadvertently lead to
the ampli
fi
cation of sensational or provocative material, which may encompass harmful or extremist content.
Within this milieu, the pro
fi
t-oriented nature of capitalism and the dependence on algorithms engender obstacles
for governments endeavoring to regulate injurious content that targets children. Governments commonly harbor a
vested interest in safeguarding citizens, including children, from exposure to harmful materials and thwarting the
dissemination of radical ideologies. However, the dynamics of the free market, impelled by libertarian and capitalist
principles, circumscribe the government's capacity to impose regulations that exert direct in
fl
uence over privately
held platforms. The economic viability of these platforms hinges heavily on user-generated content and
engagement, and stringent regulations may impede their growth prospects or erode their competitive advantage.
Furthermore, the expansive scale and global reach of these platforms engender intricate jurisdictional
complexities, rendering it arduous for individual governments to uniformly enforce regulations across borders. This
perspective raises a crucial question: What does the platform itself desire, and how does it serve broader societal
interests? Engaging in this line of inquiry leads to a paradoxical situation wherein delineating the responsibilities of
various stakeholders becomes challenging. A potential solution involves establishing a citizens advisory board or an
independent oversight panel that fosters substantive discussions and input on trust and safety issues. While
abstaining from direct voting power, these entities could voice concerns or preferences and contribute to the
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 9
13. de
fi
nition of standards within the tech platform. It is important to acknowledge that this perspective may exhibit
certain limitations, warranting further scrutiny. Nonetheless, the establishment of third-party entities, distinct from
both platform interests and governmental in
fl
uence, with a primary focus on representing the general community
perspective, could offer an intriguing avenue for mitigating potential harm in
fl
icted on children in the digital realm.
06. Conduct comprehensive examinations of violent extremist ecosystems in the digital space
for evidence-based policies and child-centric intervention measures.
The online ecosystem provides terrorist and violent extremist actors with fertile ground to disseminate their
ideologies, recruit, and exploit children. Through the Internet's global reach and the ease of online communication,
terrorist and violent extremist actors amplify their messages and engage with children on a scale previously
unimaginable. Over time, the online ecosystem has evolved, adapting to technological advancements and changes
in user behavior. Terrorist and violent extremist actors have become increasingly sophisticated in their use of the
Internet and social media platforms, employing various tactics such as targeted messaging, online forums,
encrypted messaging apps, and video sharing platforms to disseminate violent ideologies. This evolution has
16
posed signi
fi
cant challenges to traditional counter-terrorism efforts, necessitating a holistic understanding of the
online landscape. Despite the increasing focus on violent extremism in the digital sphere, there remain
fundamental gaps in understanding its characteristics, impact, scope and reach, which limit the identi
fi
cation of
appropriate policy responses. In addressing a continuously evolving scenario, a comprehensive examination of the
digital spaces, including key actors, networks, in
fl
uential communities, communication channels, and interactions,
will allow for a nuanced understanding of the online ecosystem, its vulnerabilities, and the dynamics of online
radicalization and recruitment as they relate to children. The mapping process, involves collecting and analyzing
vast amounts of data, including user pro
fi
les, online discussions, multimedia content, and network connections.
Advanced data analytics techniques, such as machine learning and natural language processing, can be employed
to identify patterns, trends, and indicators of child radicalization and recruitment. This analytical approach enables
the detection of potentially harmful content, the identi
fi
cation of high-risk individuals, and serves as a foundation
for evidence-based policymaking and the development of targeted intervention measures.
Best Practice
Ensuring youth and children's safety online and o
ffl
ine from extremist and terrorist group targeting is a critical
aspect of a project carried out by the American Counterterrorism Targeting and Resilience Institute (ACTRI). The
Marone, Francesco, and Paolo Magri, eds. Digital Jihad, Online Communication and Violent Extremism. ISPI, November 2019.
16
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 10
14. ACTRI’s Social Media Monitoring Project (SMMP) is an ongoing initiative that focuses on proactive, daily monitoring of
extremist and terrorist content and activities taking place, particularly online. It involves a thorough analysis of
extremist and terrorist-a
ffi
liated groups, conspiracy theories, and the spread of mis-and disinformation on
platforms like Telegram and other mainstream and alternative social messaging platforms. ACTRI and its partner
Storyzy have developed AI-led and other automated applications that enable the identi
fi
cation, storage, and
maintenance of extensive datasets across different social media platforms that promote harmful extremist content
and mis-and-disinformation. The primary objective of this initiative is to trace the developments, trends, and
changes in such platforms in terms of extremist and terrorist content and activities and mis-and-disinformation.
New groups and activities are continuously updated and incorporated into the monitoring process to facilitate
effective tracking of extremist content and mis-and-disinformation online, with a particular focus on closely
observing the impact of such content on local communities in the United States and beyond.
07. Consider implementing a multifaceted, multi-sectoral approach to ensure that children who
have been radicalized online are provided with appropriate support and intervention
measures.
Inter-agency cooperation is the most challenging area to address when promoting multi-faceted, multi-sectoral
strategies. Although such cooperation is di
ffi
cult in any thematic area, it is particularly problematic in the case of
preventing and countering violent extremism due to a legacy of securitization resulting in an absence of trust,
credibility, and legitimacy. The lack of existing mechanisms for coordination and the technical skills required to
17
conduct effective partnerships and engagements may also hinder the success of inter-agency cooperation
approaches. However, while complex, partnerships between relevant governments and non-governmental actors
18
may bring a wide array of bene
fi
ts in both the short and long term. The development and effective implementation
of an inter-agency cooperation framework may enable information sharing, support increased understanding and
awareness of emerging trends in the exploitation of the online ecosystem by terrorist and violent extremist actors,
serve the identi
fi
cation of existing gaps, and enable timely interventions. Additionally, by leveraging the strengths
and capabilities of different sectors, inter-agency collaboration allows for a holistic assessment of the needs of
children and the delivery of a more robust, comprehensive, and tailored response.
Best Practice
Organization for Security and Co-operation in Europe. "Preventing and Countering the Use of the Internet for Terrorist Purposes." Accessed May 24, 2023. https://
17
www.osce.org/
fi
les/f/documents/a/7/444340_0.pdf.
Ibid.; The organization of regular meetings, joint training sessions, the development of shared protocols and guidelines as well as adequate resource allocation may assist
18
in overcoming obstacles to successful interagency collaboration.
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 11
15. The Danish Government has developed a model (the Aarhus model) for preventing and countering violent
19
extremism and radicalization, with a particular emphasis on preventing individuals from traveling to Syria and Iraq
and the returnee contingent. The Aarhus model is based on the development of new initiatives and methods
through multi-agency collaboration and coordination among diverse social service providers, including the
educational system, the health care system, the police, and the intelligence and security services, which has
evolved over a decade. Local practitioners receive guidelines from the state, and after testing them in actual
conditions, they provide feedback that is used to re
fi
ne the guidelines further. Alternatively, local practitioners may
develop concrete initiatives or methods and put them into practice, after which they are adopted at the state level
and copied in other local contexts. The approach and its concrete methods are therefore continuously being
developed both top-down and bottom-up, a process that allows them to be adapted to changes in an evolving
environment. Many of the initiatives developed revolve around helping people self-help through, for example,
mentoring, counseling, and exit programmes. Crucial to this approach is the fact that participation is voluntary and
numerous cost-free offers of assistance are made available.
08. Enhance the knowledge and awareness of children and young individuals regarding the
potential risks associated with the online environment and their interaction on social media
platforms through the implementation of focused public awareness campaigns.20
Neuroscience, psychosocial science and indeed all disciplines investigating brain function further inform regarding
child vulnerabilities and developmental needs. It is recognized that children and young people have rudimentary
21
skills of factual cognition or mental processes such as learning, using and understanding language, memory,
thinking and perception, but also moral cognition and conative ability, regulating impulse control. Children´s
22
evolving cognitive capacities may result in an enhanced disregard for risks and an inclination towards engaging in
risk-taking behavior. Compounded by their limited understanding of the online environment, children may
unknowingly expose themselves to various dangers, including violent propaganda campaigns and harmful
23
content, grooming, and sustained radicalization and recruitment strategies enacted by terrorist and violent
extremist actors. The implementation of tailored awareness-raising campaigns for children and youth assumes a
signi
fi
cant role. These campaigns may equip young individuals with the necessary skills to identify age-
inappropriate or harmful content, withstand radicalization, and resist triggers or encouragements to engage in
unsafe action or associate with terrorist and violent extremist actors. By empowering children and youth with the
Folketinget. "Bilag 248 - Samling 2015-16 - Alm.del - Reu - Bilag 248 Offentligt." Accessed May 24, 2023. https://www.ft.dk/samling/20151/almdel/reu/bilag/248/1617692.pdf.
19
This recommendation may be applicable to both governments and civil society organizations.
20
Cecilia Polizzi. “Inside Sala
fi
-jihadism: the Rationale Driving the Recruitment and Use of Children” YouTube, May 1, 2023, https://www.youtube.com/watch?v=y7H8dsUZ1lo.
21
Ibid.
22
Speckhard, Dr. Anne; Shajkovci, Ardian; Wooster, Claire; and Izadi, Neima. "Engaging English Speaking Facebook Users in an Anti-ISIS Awareness Campaign." Journal of
23
Strategic Security 11, no. 3 (2018) : 52-78. DOI: https://doi.org/10.5038/1944-0472.11.3.1679 Available at: https://digitalcommons.usf.edu/jss/vol11/iss3/4.
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 12
16. ability to navigate the online world more safely and make informed decisions, these awareness-raising campaigns
can serve as a vital preventive measure against the potential risks and consequences associated with their online
interactions.
III. Non-Professional Guidelines
09.
Incorporate digital resilience and media literacy education into the scholastic curriculum
to empower children to responsibly navigate the online landscape.
One approach to prevent online terrorism is by fostering digital resilience and media literacy skills. This strategy is
24
built on two assumptions. Firstly, by developing digital resilience and media literacy, individuals can effectively
address grievances that may lead to radicalization based on misinformation or disinformation. Secondly, individuals
who can critically evaluate information and assess the credibility of sources are less likely to be in
fl
uenced by
terrorist propaganda. The formal education sector plays a vital role in equipping children with the ability to
25
discern various tactics employed by terrorist groups in disseminating their messages. Educators devote their
efforts to enhancing students' inclinations, interests, and educational requirements, drawing from their own wealth
of experiences. They serve as exemplars for their students, striving to shield them from various forms of
deleterious behaviors. In line with their responsibility to safeguard students from detrimental in
fl
uences, teachers
may also crucially contribute to shielding them from the rami
fi
cations associated with extremist ideologies. This is
of paramount importance as radicalization and extremist narratives have the potential to yield destructive
outcomes for children, families, communities, and society. By integrating digital resilience and media literacy
26
education into the scholastic curriculum, teachers can empower students to navigate the online landscape
responsibly. Some educators may not consider themselves quali
fi
ed to engage in prevention unless they possess a
certain level of expertise. While the affordability of specialized training for educators in line with human rights,
27
the rights of children, and do-no-harm principle is to be prioritized, activities such as mentoring and counseling,
28
pedagogical support, active or strategic listening, communication skills, and critical thinking are a few examples of
UNESCO offers tools, such as a framework and assessment tools, to monitor the global progress of digital literacy skills, aligning with Sustainable Development Goal 4 on
24
Quality Education. This framework provides guidelines on various digital competencies, including information and data literacy (e.g., browsing, searching, and evaluating
online data), communication and collaboration (e.g., interacting and sharing through digital technologies), digital content creation (e.g., developing digital content and
understanding copyrights and licensing), safety (e.g., protecting devices, personal data, and well-being), and problem-solving (e.g., identifying needs and digital/technical
solutions). It is important to note that the digital literacy framework has a broader scope beyond terrorism prevention online and is intended for integration into school
systems worldwide.; Law, Nancy, David Woo, Jimmy de la Torre, and Gary Wong. "A Global Framework of Reference on Digital Literacy Skills for Indicator 4.4.2; Information
Paper No. 51." June 2018. UIS/2018/ICT/IP/51; UNESCO.
Zeiger, Sara and Joseph Gyte. "Chapter 12: Prevention of Radicalization on Social Media and the Internet." In Handbook of Terrorism Prevention and Preparedness, 358.
25
Koçak, Emrah. "A Guide for Empowering Teachers Against Extremism.” SAVE, Erasmus+ project. 2017-1-TR01-KA201-046311.
26
Doda, Alush and Marina Mclellan. "Promoting a Multi-Stakeholder Approach to Preventing and Countering Violent Extremism and Radicalization that Lead to Terrorism:
27
Summary report of roundtable discussions on the National Strategy for Countering Violent Extremism in the Republic of North Macedonia." OSCE.
UNICEF. “Ethical Guidelines”Accessed May, 1 2023. URL. https://www.unicef.org/serbia/en/ethical-
28
guidelines#:~:text=Guidelines%20for%20interviewing%20children,and%20grief%20from%20traumatic%20events..
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 13
17. educators´ abilities and capacity to offer support. Critical thinking skills are particularly valuable in this framework
as they serve as an enabler of students´ capacity to question the accuracy and credibility of information they
encounter, develop and strengthen resilience.
10. Address the risks of radicalization in holistic manner accounting for both the o
ffl
ine and
online domains.
The Internet and social media have provided enhanced opportunities for terrorist and violent extremist actors
across the ideological spectrum. Digital technologies have not only facilitated the dissemination of extremist
propaganda but have also fundamentally altered the mechanisms of recruitment, mobilization and active
participation. In Western societies, the vast majority of cases involving jihadist radicalization cannot be dissociated
from their online components, which often include sporadic consumption of extremist propaganda. As active
29
Internet users, children and adolescents are at particular risk. While addressing the online ecosystem of violent
extremism targeting children is critical and requires concerted efforts and targeted initiatives, to adequately
prevent and mitigate risks of child radicalization and/or involvement with terrorism and violent extremism, it is
equally crucial to focus on the o
ffl
ine elements that contribute to child vulnerability and susceptibility to extremist
ideologies, therefore accounting for both the online and o
ffl
ine spheres in a balanced manner. Children and young
people oftentimes face a plethora of underlying issues such as social exclusion, trauma, poverty, and
discrimination, which constitute, among other factors, the root causes of child vulnerability to violent extremism in
the digital environment. Understanding the interconnectedness between the drivers of violent extremism and the
ways in which these manifest in children´s behaviors and approaches online is essential to formulating a cohesive
approach to prevent and mitigate the risks of child radicalization, the potential for child involvement in violent acts
or association with terrorist and violent extremist groups.
11. Build self-awareness and foster a greater understanding of the risks associated with online
radicalization and recruitment among children.
In today's digital age, it is essential for parents and caregivers to be vigilant and proactive in protecting their
children from the risks of online radicalization and recruitment by terrorist and violent extremist actors. Families
are oftentimes insu
ffi
ciently equipped with knowledge or tools to understand and address violent extremism and
radicalization. In some instances, family members may be able to identify early signs of radicalization to violent
30
extremism. However, early detection may be challenged by the fast evolution of radicalization processes or by
Marone, Francesco, and Paolo Magri, eds. Digital Jihad, Online Communication and Violent Extremism. ISPI, November 2019.
29
CRTG Working Group, Right Wing Extremism: Children´s Perspectives, Policy and Practice (2022).
30
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 14
18. existing analogies between early indicators of radicalization and other challenges, including trauma, depression,
addiction, discrimination or marginalization, among others. Families play an important role in safeguarding children
at risk. It is therefore critical that the tactics and strategies employed by terrorist and violent extremist groups
targeting children in the digital environment, as well as the nature of radicalization processes are adequately
understood. Consistent educational programs and authoritative and reputable sources, informing about terrorism
31
and violent extremism, radicalization, child vulnerability, online safety, social media use and dialogue may support
increased awareness, intervention and responses. Parents or caregivers may also play a constructive role in the
32
prevention and mitigation of radicalization risks through communication. By creating an environment where
children feel comfortable discussing their online activities and experiences, parents or caregivers may establish a
strong foundation for promoting digital literacy, critical thinking, identifying potential vulnerabilities, and
addressing risks. This involves encouraging open communication and dialogue without moralizing or judgment,
ensuring that children understand they can approach their parents with any concerns or questions. The role of
parents and caregivers is complementary and supportive of the one played by governments, tech companies, and
civil society. While these stakeholders have distinct responsibilities and contributions, a comprehensive approach
to safeguarding children from the in
fl
uence of extremist ideologies is crucial.
UNESCO, Preventing Violent Extremism through Education: A Guide for Policy-Makers (2017).
31
Ibid.
32
Guidelines on the Prevention of Radicalization on Social Media and the Internet in this Digital Era 15