Tech Against Terrorism
Tech Against Terrorism
Want to learn more about how terrorists and violent extremists are using the internet to communicate and share propaganda? Perhaps you’re interested in why terrorists share their manifestos online and livestream their attacks? The Tech Against Terrorism podcast is a deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat. Join us as we speak to the world’s leading experts in this field and uncover everything from the online propaganda behind an IS prison break in Syria, to the online network of neo-Nazis behind a foiled terrorist plot in Texas.
Categoria: Tecnologia
Ascolta l'ultimo episodio:
Since 2017, the UK has seen fifteen terrorist attacks – from the Manchester Arena bombing to the Dover firebomb attack. But during that time, more than twice as many attacks have also been foiled. So in this week’s episode, we’re looking at terror plotters in the UK. We are delving into the case studies of two very young plotters who were largely radicalised online, trying to understand what led them down their violent pathways and what can be done by stakeholders to prevent similar cases in future.
Archie Macfarlane is joined by Lizzie Dearden, a home affairs and security journalist, and author of the book Plotters: The UK Terrorists Who Failed.
You can read a transcript of this episode here.
If you want to find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on X, where you can find resources on this topic.
Resources:
- Lizzie Dearden’s book, Plotters: The UK Terrorists Who Failed
- TAT Podcast: How has the Online Dissemination of Jihadist Propaganda Evolved?
- TAT Podcast: Gaming and Extremism: Threats and Opportunities
- TAT Podcast: Gaming and Extremism: Identity Fusion
Episodi precedenti
-
64 - Foiled Plots in the UK: How Terrorists Fail Thu, 25 Apr 2024
-
63 - Active Clubs: Fitness, Fraternity, and Fascism Thu, 11 Apr 2024
-
62 - Media Jihad: Islamic State's Resurgent Propaganda Network Thu, 28 Mar 2024
-
61 - God, Guns and Sedition: Far-Right Terrorism in America Thu, 14 Mar 2024
-
60 - How has the Online Dissemination of Jihadist Propaganda Evolved? Thu, 29 Feb 2024
-
59 - What is White Jihadism? Thu, 15 Feb 2024
-
58 - Why Media Reporting on Terrorism Matters Thu, 18 Jan 2024
-
57 - Why is the Great Replacement Theory so Dangerous? Thu, 14 Dec 2023
-
56 - The Ethics of Content Moderation: Who Should Decide What We Say Online? Thu, 30 Nov 2023
-
55 - Nordic Extremism Thu, 16 Nov 2023
-
54 - Extremist Manifestos with J.M. Berger Thu, 02 Nov 2023
-
53 - The Power of Conspiracies Thu, 19 Oct 2023
-
52 - What is the #tradwives Movement? Thu, 05 Oct 2023
-
51 - Islamic State Khorasan (IS-K): A Growing Threat? Thu, 21 Sep 2023
-
50 - Institutionalising Counterterrorism Practitioner Welfare Thu, 07 Sep 2023
-
49 - Islamic State Online: Emerging Trends and Tactics Thu, 24 Aug 2023
-
48 - Tuning in to Hate: How Extremists Utilise Podcasts Thu, 10 Aug 2023
-
47 - “Going Mainstream”: The Role of the Internet in Mainstreaming Extremist Ideas Thu, 27 Jul 2023
-
46 - Gaming & Extremism: Identity Fusion Thu, 06 Jul 2023
-
45 - Gaming & Extremism: Threats and Opportunities Thu, 22 Jun 2023
-
44 - Inside Tehreek-e-Taliban Pakistan’s Resurgence Thu, 08 Jun 2023
-
43 - An Uncertain Future: Deepfakes and Extremism Thu, 25 May 2023
-
42 - Extremist Memes: The Dark Side of Internet Culture Thu, 11 May 2023
-
41 - Sanitising Extremism: “Borderline Content” and Antisemitism Online Thu, 27 Apr 2023
-
40 - The Information War: Online Disinformation Around the Conflict in Ukraine Thu, 13 Apr 2023
-
39 - The Canada Centre: Building Resilience Against Terrorism and Violent Extremism Thu, 06 Apr 2023
-
38 - The Challenge of Hybrid Threats Online Thu, 23 Mar 2023
-
37 - Regulating Online Harms in India Mon, 20 Mar 2023
-
36 - Combating Terrorist Use of File-Sharing Thu, 16 Feb 2023
-
35 - The Deplatforming Debate Thu, 02 Feb 2023
-
34 - 2022 Trends In Terrorist Behaviour Online Thu, 19 Jan 2023
-
33 - The Growing Threat of Misogyny and Gender-based Abuse Online Thu, 05 Jan 2023
-
32 - Researcher Safety and Mental Health in Online Counterterrorism Thu, 22 Dec 2022
-
31 - OSINT: How our Analysts are Disrupting Terrorism Online Thu, 01 Dec 2022
-
30 - The Decentralised Web Thu, 17 Nov 2022
-
29 - Terrorist Operated Websites Thu, 27 Oct 2022
-
28 - The Dark Web Thu, 13 Oct 2022
-
27 - Trailer: Tech Against Terrorism Tue, 04 Oct 2022
-
26 - The TCAP: A Tool to Tackle Terrorist Content Wed, 04 May 2022
-
25 - Can Tech Platforms Rely on Algorithms to Remove Terrorist Content? Wed, 27 Apr 2022
-
24 - Debunking Russian Disinformation on “Denazification” of Ukraine (SPECIAL EPISODE) Wed, 20 Apr 2022
-
23 - Is Official Terrorist Content Illegal Online? Terrorist Designation and the Online Realm Wed, 13 Apr 2022
-
22 - Navigating a Fragmented Regulatory Landscape Wed, 06 Apr 2022
-
21 - Tech Policy Evolution & The Human Side of Moderating Terrorist Content (PART 2) Fri, 01 Apr 2022
-
20 - Tech Policy Evolution & The Human Side of Moderating Terrorist Content (PART 1) Wed, 30 Mar 2022
-
19 - Tracking Violent Islamist Behaviour Online Wed, 23 Mar 2022
-
18 - Tracking Violent Far-right Behaviour Online Wed, 16 Mar 2022
-
17 - Understanding Online Radicalisation Wed, 09 Mar 2022
-
16 - Ghuwayran Prison Break: A Propaganda Victory for Islamic State? Wed, 02 Mar 2022
-
15 - A Foiled Plot in Texas: The Threat of Violent Fringe Online Networks Wed, 23 Feb 2022