<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://feeds.buzzsprout.com/1684819.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Tech Against Terrorism</title>

  <lastBuildDate>Wed, 04 Mar 2026 14:14:02 -0500</lastBuildDate>
  <link>http://www.techagainstterrorism.org</link>
  <language>en-gb</language>
  <copyright>© 2026 Tech Against Terrorism</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>2fd8bfad-6e52-55e8-a276-4e0827fb5017</podcast:guid>
  <itunes:author>Tech Against Terrorism</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[Want to learn more about how terrorists and violent extremists are using the internet to communicate and share propaganda? Perhaps you’re interested in why terrorists share their manifestos online and livestream their attacks? The Tech Against Terrorism podcast is a deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat. Join us as we speak to the world’s leading experts in this field and uncover everything from the online propaganda behind an IS prison break in Syria, to the online network of neo-Nazis behind a foiled terrorist plot in Texas.]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>Tech Against Terrorism</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/tzzdlkbjm4w4mmc1yym6l36giust?.jpg</url>
     <title>Tech Against Terrorism</title>
     <link>http://www.techagainstterrorism.org</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/tzzdlkbjm4w4mmc1yym6l36giust?.jpg" />
  <itunes:category text="Technology" />
  <itunes:category text="Society &amp; Culture" />
  <itunes:category text="Education" />
  <item>
    <itunes:title>Understanding Hezbollah: From Ideology to Operations</itunes:title>
    <title>Understanding Hezbollah: From Ideology to Operations</title>
    <itunes:summary><![CDATA[Hezbollah is one of the most powerful and complex militant organisations in the world today -  operating simultaneously as a political party, armed militia, and social movement. But how did the group evolve, how does it maintain influence today and what impact has the October 7th attack had on the group? In this episode, host Lucas Webber is joined by American political scientist and leading expert on Hezbollah, Matthew Levitt. Together, they explore the group’s ideological origins, its ...]]></itunes:summary>
    <description><![CDATA[<p><b>Hezbollah is one of the most powerful and complex militant organisations in the world today -  operating simultaneously as a political party, armed militia, and social movement. But how did the group evolve, how does it maintain influence today and what impact has the October 7th attack had on the group?</b></p><p><b>In this episode, host Lucas Webber is joined by American political scientist and leading expert on Hezbollah, Matthew Levitt. Together, they explore the group’s ideological origins, its sophisticated propaganda operations, and how Hezbollah is adapting its strategy and technology amid ongoing regional conflict.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b>➡︎ How Hezbollah’s 1985 founding document still shapes its ideology</b></p><p><b>➡︎ Why Hezbollah was an early leader in propaganda and media strategy</b></p><p><b>➡︎ What Hezbollah learned from earlier groups and taught those that followed</b></p><p><b>➡︎ How Hezbollah has reacted to and exploited the aftermath of October 7, 2023</b></p><p><b>➡︎ How the conflict has impacted Hezbollah’s current capabilities</b></p><p><b>➡︎ Why Hezbollah’s use of emerging technologies is a growing concern</b></p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/matthew-levitt-82939aaa/'><b>Matthew Levitt</b></a><b>.</b></p><p><b>🗺️Check out The Washington Institute’s </b><a href='https://www.washingtoninstitute.org/hezbollahinteractivemap/'><b>interactive map</b></a><b> tracking Hezbollah activities </b></p><p><b>🎧Listen to Matthew’s podcast Breaking Hezbollah&apos;s Golden Rule </b><a href='https://www.washingtoninstitute.org/policy-analysis/podcast-breaking-hezbollahs-golden-rule-season-1'><b>here</b></a><b>. </b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/ygTbBVvCmMq'><b>here</b></a><b>.  </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><b><br/><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Hezbollah is one of the most powerful and complex militant organisations in the world today -  operating simultaneously as a political party, armed militia, and social movement. But how did the group evolve, how does it maintain influence today and what impact has the October 7th attack had on the group?</b></p><p><b>In this episode, host Lucas Webber is joined by American political scientist and leading expert on Hezbollah, Matthew Levitt. Together, they explore the group’s ideological origins, its sophisticated propaganda operations, and how Hezbollah is adapting its strategy and technology amid ongoing regional conflict.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b>➡︎ How Hezbollah’s 1985 founding document still shapes its ideology</b></p><p><b>➡︎ Why Hezbollah was an early leader in propaganda and media strategy</b></p><p><b>➡︎ What Hezbollah learned from earlier groups and taught those that followed</b></p><p><b>➡︎ How Hezbollah has reacted to and exploited the aftermath of October 7, 2023</b></p><p><b>➡︎ How the conflict has impacted Hezbollah’s current capabilities</b></p><p><b>➡︎ Why Hezbollah’s use of emerging technologies is a growing concern</b></p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/matthew-levitt-82939aaa/'><b>Matthew Levitt</b></a><b>.</b></p><p><b>🗺️Check out The Washington Institute’s </b><a href='https://www.washingtoninstitute.org/hezbollahinteractivemap/'><b>interactive map</b></a><b> tracking Hezbollah activities </b></p><p><b>🎧Listen to Matthew’s podcast Breaking Hezbollah&apos;s Golden Rule </b><a href='https://www.washingtoninstitute.org/policy-analysis/podcast-breaking-hezbollahs-golden-rule-season-1'><b>here</b></a><b>. </b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/ygTbBVvCmMq'><b>here</b></a><b>.  </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><b><br/><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/18589290-understanding-hezbollah-from-ideology-to-operations.mp3" length="25972277" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18589290</guid>
    <pubDate>Thu, 29 Jan 2026 12:00:00 +0000</pubDate>
    <itunes:duration>2160</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Pathways to Violence: Understanding Youth Radicalisation</itunes:title>
    <title>Pathways to Violence: Understanding Youth Radicalisation</title>
    <itunes:summary><![CDATA[Youth radicalisation is changing. Young people today are increasingly being drawn into extremist movements through online platforms, social networks, and gaming environments. But these pathways look very different from previous generations, shaped by technology, social dynamics, and evolving ideologies. In this episode, host Lucas Webber is joined by Jacob Ware, research fellow at the Council on Foreign Relations and adjunct professor at Georgetown University’s Walsh School of Foreign Service...]]></itunes:summary>
    <description><![CDATA[<p><b>Youth radicalisation is changing. Young people today are increasingly being drawn into extremist movements through online platforms, social networks, and gaming environments. But these pathways look very different from previous generations, shaped by technology, social dynamics, and evolving ideologies.</b></p><p><b>In this episode, host Lucas Webber is joined by Jacob Ware, research fellow at the Council on Foreign Relations and adjunct professor at Georgetown University’s Walsh School of Foreign Service and DeSales University. Together, they explore how young people are being radicalised online, the role of emerging platforms and algorithms, and what can be done to prevent this worrying trend of youth extremism. </b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b>➡︎ How youth radicalisation today differs from previous generations</b></p><p><b>➡︎ The role of online platforms and gaming environments in recruitment</b></p><p><b>➡︎ Whether algorithmic recommendation systems are amplifying extremist content</b></p><p><b>➡︎ About the complexity of social or psychological needs VS ideology</b></p><p><b>➡︎ Recommendations for effective interventions </b></p><p><br/></p><p><b>📱Connect with </b><a href='http://linkedin.com/in/jacob-ware-421778b7'><b>Jacob Ware</b></a><b>.</b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/F724TdR2ZQi'><b>here</b></a><b>. </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Youth radicalisation is changing. Young people today are increasingly being drawn into extremist movements through online platforms, social networks, and gaming environments. But these pathways look very different from previous generations, shaped by technology, social dynamics, and evolving ideologies.</b></p><p><b>In this episode, host Lucas Webber is joined by Jacob Ware, research fellow at the Council on Foreign Relations and adjunct professor at Georgetown University’s Walsh School of Foreign Service and DeSales University. Together, they explore how young people are being radicalised online, the role of emerging platforms and algorithms, and what can be done to prevent this worrying trend of youth extremism. </b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b>➡︎ How youth radicalisation today differs from previous generations</b></p><p><b>➡︎ The role of online platforms and gaming environments in recruitment</b></p><p><b>➡︎ Whether algorithmic recommendation systems are amplifying extremist content</b></p><p><b>➡︎ About the complexity of social or psychological needs VS ideology</b></p><p><b>➡︎ Recommendations for effective interventions </b></p><p><br/></p><p><b>📱Connect with </b><a href='http://linkedin.com/in/jacob-ware-421778b7'><b>Jacob Ware</b></a><b>.</b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/F724TdR2ZQi'><b>here</b></a><b>. </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/18371741-pathways-to-violence-understanding-youth-radicalisation.mp3" length="30004132" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18371741</guid>
    <pubDate>Thu, 18 Dec 2025 01:00:00 +0000</pubDate>
    <itunes:duration>2497</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Improvised Explosives: Drones, 3D Printing, and Emerging Tech </itunes:title>
    <title>Improvised Explosives: Drones, 3D Printing, and Emerging Tech </title>
    <itunes:summary><![CDATA[Improvised Explosive Devices (IEDs) have long been a weapon of choice for terrorist organisations. They’re cheap, adaptable, and devastatingly effective. But as technology evolves, so too do the tactics and tools used to build and deploy these weapons. In this episode, host Lucas Webber is joined by Dr Austin Doctor, political scientist, Associate Professor at the University of Nebraska at Omaha, and Director of Strategic Initiatives at the National Counterterrorism Innovation, Technology, an...]]></itunes:summary>
    <description><![CDATA[<p><b>Improvised Explosive Devices (IEDs) have long been a weapon of choice for terrorist organisations. They’re cheap, adaptable, and devastatingly effective. But as technology evolves, so too do the tactics and tools used to build and deploy these weapons.</b></p><p><b>In this episode, host Lucas Webber is joined by Dr Austin Doctor, political scientist, Associate Professor at the University of Nebraska at Omaha, and Director of Strategic Initiatives at the National Counterterrorism Innovation, Technology, and Education Center (NCITE). Together, they explore how emerging technologies - from drones to 3D printing - are reshaping the global threat landscape, and how governments can respond to this rapidly evolving challenge.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b>➡︎ How terrorist groups are adapting IED tactics using emerging technologies</b></p><p><b>➡︎ The growing role of drones and dual-use tools in attack planning</b></p><p><b>➡︎ The rise of DIY manuals and online knowledge-sharing around explosives</b></p><p><b>➡︎ How younger people are increasingly being drawn into IED making and assembly</b></p><p><b>➡︎ Strategies to mitigate these evolving threats</b></p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/austin-doctor/'><b>Austin Doctor</b></a><b>.</b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/a1Rzz7AQn4Z'><b>here</b></a><b>. </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><b><br/><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Improvised Explosive Devices (IEDs) have long been a weapon of choice for terrorist organisations. They’re cheap, adaptable, and devastatingly effective. But as technology evolves, so too do the tactics and tools used to build and deploy these weapons.</b></p><p><b>In this episode, host Lucas Webber is joined by Dr Austin Doctor, political scientist, Associate Professor at the University of Nebraska at Omaha, and Director of Strategic Initiatives at the National Counterterrorism Innovation, Technology, and Education Center (NCITE). Together, they explore how emerging technologies - from drones to 3D printing - are reshaping the global threat landscape, and how governments can respond to this rapidly evolving challenge.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b>➡︎ How terrorist groups are adapting IED tactics using emerging technologies</b></p><p><b>➡︎ The growing role of drones and dual-use tools in attack planning</b></p><p><b>➡︎ The rise of DIY manuals and online knowledge-sharing around explosives</b></p><p><b>➡︎ How younger people are increasingly being drawn into IED making and assembly</b></p><p><b>➡︎ Strategies to mitigate these evolving threats</b></p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/austin-doctor/'><b>Austin Doctor</b></a><b>.</b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/a1Rzz7AQn4Z'><b>here</b></a><b>. </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><b><br/><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/18210779-improvised-explosives-drones-3d-printing-and-emerging-tech.mp3" length="26714275" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18210779</guid>
    <pubDate>Thu, 20 Nov 2025 01:00:00 +0000</pubDate>
    <itunes:duration>2222</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Terrorism in Europe: How political polarisation is fueling radicalisation</itunes:title>
    <title>Terrorism in Europe: How political polarisation is fueling radicalisation</title>
    <itunes:summary><![CDATA[As political uncertainty continues to rise across Europe, increasing polarisation is creating a breeding ground for radicalisation. More than ever, extremist groups are exploiting online platforms and social networks - using them as virtual planning hubs, spaces to share extremist propaganda and recruit young people.  In this episode, host Lucas Webber is joined by Dr Nicolas Stockhammer, a political scientist and Director of the Research Cluster "Counter-Terrorism, CVE and Intelligence"...]]></itunes:summary>
    <description><![CDATA[<p><b>As political uncertainty continues to rise across Europe, increasing polarisation is creating a breeding ground for radicalisation. More than ever, extremist groups are exploiting online platforms and social networks - using them as virtual planning hubs, spaces to share extremist propaganda and recruit young people. </b></p><p><b>In this episode, host Lucas Webber is joined by Dr Nicolas Stockhammer, a political scientist and Director of the Research Cluster &quot;Counter-Terrorism, CVE and Intelligence&quot; at Danube-University Krems in Austria. They explore the online trends emerging across Europe, and what these developments mean for counter-terrorism efforts.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b>➡︎ How terrorist groups are exploiting social media and online communities</b></p><p><b>➡︎ The role of online propaganda in radicalising young people</b></p><p><b>➡︎ How virtual spaces are used for training and operational planning</b></p><p><b>➡︎ The impact of political instability on extremist influence online</b></p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/dr-nicolas-stockhammer-b9ba939/?originalSubdomain=at'><b>Dr Nicolas Stockhammer</b></a><b>.</b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/rq8h4vwUqD6'><b>here</b></a><b>. </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p>]]></description>
    <content:encoded><![CDATA[<p><b>As political uncertainty continues to rise across Europe, increasing polarisation is creating a breeding ground for radicalisation. More than ever, extremist groups are exploiting online platforms and social networks - using them as virtual planning hubs, spaces to share extremist propaganda and recruit young people. </b></p><p><b>In this episode, host Lucas Webber is joined by Dr Nicolas Stockhammer, a political scientist and Director of the Research Cluster &quot;Counter-Terrorism, CVE and Intelligence&quot; at Danube-University Krems in Austria. They explore the online trends emerging across Europe, and what these developments mean for counter-terrorism efforts.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b>➡︎ How terrorist groups are exploiting social media and online communities</b></p><p><b>➡︎ The role of online propaganda in radicalising young people</b></p><p><b>➡︎ How virtual spaces are used for training and operational planning</b></p><p><b>➡︎ The impact of political instability on extremist influence online</b></p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/dr-nicolas-stockhammer-b9ba939/?originalSubdomain=at'><b>Dr Nicolas Stockhammer</b></a><b>.</b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/rq8h4vwUqD6'><b>here</b></a><b>. </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/18015129-terrorism-in-europe-how-political-polarisation-is-fueling-radicalisation.mp3" length="26318619" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18015129</guid>
    <pubDate>Thu, 16 Oct 2025 01:00:00 +0100</pubDate>
    <itunes:duration>2189</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Radicalisation in Southeast Asia: What we can learn from the region </itunes:title>
    <title>Radicalisation in Southeast Asia: What we can learn from the region </title>
    <itunes:summary><![CDATA[From online propaganda targeting youth, to the gendered dynamics of extremist groups, Southeast Asia faces a unique set of terrorism challenges that are often overlooked by the international community. In this episode, host Lucas Webber is joined by Julie Chernov Hwang - Associate Professor at Goucher College, Senior Research Fellow at The Soufan Center, and an expert on terrorism in Southeast Asia. Together, they explore the key drivers of radicalisation in the region, how individuals diseng...]]></itunes:summary>
    <description><![CDATA[<p><b>From online propaganda targeting youth, to the gendered dynamics of extremist groups, Southeast Asia faces a unique set of terrorism challenges that are often overlooked by the international community.</b></p><p><b>In this episode, host Lucas Webber is joined by Julie Chernov Hwang - Associate Professor at Goucher College, Senior Research Fellow at The Soufan Center, and an expert on terrorism in Southeast Asia. Together, they explore the key drivers of radicalisation in the region, how individuals disengage from violent groups, and what local civil society initiatives are doing to counter extremism.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b>➡︎ How social bonds play a central role in radicalisation</b></p><p><b>➡︎ The growing trend of youth and women in extremist networks in South East Asia</b></p><p><b>➡︎ What drives militants to leave terrorist groups</b></p><p><b>➡︎ The role of locally led deradicalisation efforts</b></p><p><b>➡︎ What the world can learn from Southeast Asia&apos;s experience</b></p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/julie-chernov-hwang-4455b484'><b>Julie Chernov Hwang</b></a><b>.</b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/PBWbNOk9S7i'><b>here</b></a><b>.  </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>From online propaganda targeting youth, to the gendered dynamics of extremist groups, Southeast Asia faces a unique set of terrorism challenges that are often overlooked by the international community.</b></p><p><b>In this episode, host Lucas Webber is joined by Julie Chernov Hwang - Associate Professor at Goucher College, Senior Research Fellow at The Soufan Center, and an expert on terrorism in Southeast Asia. Together, they explore the key drivers of radicalisation in the region, how individuals disengage from violent groups, and what local civil society initiatives are doing to counter extremism.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b>➡︎ How social bonds play a central role in radicalisation</b></p><p><b>➡︎ The growing trend of youth and women in extremist networks in South East Asia</b></p><p><b>➡︎ What drives militants to leave terrorist groups</b></p><p><b>➡︎ The role of locally led deradicalisation efforts</b></p><p><b>➡︎ What the world can learn from Southeast Asia&apos;s experience</b></p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/julie-chernov-hwang-4455b484'><b>Julie Chernov Hwang</b></a><b>.</b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/PBWbNOk9S7i'><b>here</b></a><b>.  </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/17860452-radicalisation-in-southeast-asia-what-we-can-learn-from-the-region.mp3" length="31277998" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17860452</guid>
    <pubDate>Thu, 18 Sep 2025 01:00:00 +0100</pubDate>
    <itunes:duration>2603</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Al Qaeda: Current Capabilities and Threat Trajectories</itunes:title>
    <title>Al Qaeda: Current Capabilities and Threat Trajectories</title>
    <itunes:summary><![CDATA[Founded by Osama bin Laden in the late 1980s, Al-Qaeda is best known for orchestrating the September 11, 2001 terrorist attacks in the United States, which killed nearly 3,000 people. But what kind of threat does the violent Islamist organisation pose in 2025? In this episode, host Lucas Webber is joined by Edmund Fitton-Brown, a former British diplomat and former Coordinator of the United Nations’ Monitoring Team, and an expert on Al-Qaeda. Edmund shares unique insights into Al-Qaeda’s curre...]]></itunes:summary>
    <description><![CDATA[<p><b>Founded by Osama bin Laden in the late 1980s, Al-Qaeda is best known for orchestrating the September 11, 2001 terrorist attacks in the United States, which killed nearly 3,000 people. But what kind of threat does the violent Islamist organisation pose in 2025?</b></p><p><b>In this episode, host Lucas Webber is joined by Edmund Fitton-Brown, a former British diplomat and former Coordinator of the United Nations’ Monitoring Team, and an expert on Al-Qaeda. Edmund shares unique insights into Al-Qaeda’s current capabilities, the group’s strategic recalibration following the October 7th, 2023 Hamas attack, and why he believes a directed Al-Qaeda attack may not be far off.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b> ➡︎ How serious a threat Al-Qaeda currently poses on the global stage</b></p><p><b> ➡︎ Why the group is ramping up recruitment and training</b></p><p><b> ➡︎ What indicators suggest a directed attack on the West could be imminent</b></p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/edmund-fitton-brown-59176227/'><b>Edmund Fitton-Brown</b></a><b>. </b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/C3rlONZ1VMY'><b>here</b></a><b>. </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Founded by Osama bin Laden in the late 1980s, Al-Qaeda is best known for orchestrating the September 11, 2001 terrorist attacks in the United States, which killed nearly 3,000 people. But what kind of threat does the violent Islamist organisation pose in 2025?</b></p><p><b>In this episode, host Lucas Webber is joined by Edmund Fitton-Brown, a former British diplomat and former Coordinator of the United Nations’ Monitoring Team, and an expert on Al-Qaeda. Edmund shares unique insights into Al-Qaeda’s current capabilities, the group’s strategic recalibration following the October 7th, 2023 Hamas attack, and why he believes a directed Al-Qaeda attack may not be far off.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b> ➡︎ How serious a threat Al-Qaeda currently poses on the global stage</b></p><p><b> ➡︎ Why the group is ramping up recruitment and training</b></p><p><b> ➡︎ What indicators suggest a directed attack on the West could be imminent</b></p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/edmund-fitton-brown-59176227/'><b>Edmund Fitton-Brown</b></a><b>. </b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/C3rlONZ1VMY'><b>here</b></a><b>. </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/17611423-al-qaeda-current-capabilities-and-threat-trajectories.mp3" length="26428647" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17611423</guid>
    <pubDate>Thu, 14 Aug 2025 01:00:00 +0100</pubDate>
    <itunes:duration>2199</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Balochistan Liberation Army: Pakistan’s Rising Militant Challenge</itunes:title>
    <title>Balochistan Liberation Army: Pakistan’s Rising Militant Challenge</title>
    <itunes:summary><![CDATA[The Balochistan Liberation Army (BLA) is fighting for the independence of Balochistan, a resource-rich but politically marginalised region in Pakistan. In pursuit of that goal, the group have evolved both their offline and online strategies, from suicide bombings to increasingly sophisticated online propaganda. Now, experts are warning the BLA could represent the most significant internal threat Pakistan faces. In this episode, host Lucas Webber is joined by Riccardo Valle, a researcher speci...]]></itunes:summary>
    <description><![CDATA[<p><b>The Balochistan Liberation Army (BLA) is fighting for the independence of Balochistan, a resource-rich but politically marginalised region in Pakistan. In pursuit of that goal, the group have evolved both their offline and online strategies, from suicide bombings to increasingly sophisticated online propaganda. Now, experts are warning the BLA could represent the most significant internal threat Pakistan faces.</b></p><p><b>In this episode, host Lucas Webber is joined by Riccardo Valle, a researcher specialising in jihadism, armed groups, and regional politics in Afghanistan and Pakistan. Together, they unpack the rise of the BLA, its growing presence on social media and messaging platforms, and the unique role women play in the group’s operations.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b> ➡︎ The origins of the BLA </b></p><p><b> ➡︎ About their sophisticated online media campaign  </b></p><p><b> ➡︎ About the group’s female suicide bombers </b></p><p><b> ➡︎ How Pakistan is responding to the BLA’s threat</b></p><p><b> ➡︎ How the group has become Pakistan&apos;s biggest internal threat </b></p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/riccardo-valle-850683195/'><b>Riccardo Valle</b></a><b>.</b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/VFp0lYdl3se'><b>here</b></a><b>. </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p>]]></description>
    <content:encoded><![CDATA[<p><b>The Balochistan Liberation Army (BLA) is fighting for the independence of Balochistan, a resource-rich but politically marginalised region in Pakistan. In pursuit of that goal, the group have evolved both their offline and online strategies, from suicide bombings to increasingly sophisticated online propaganda. Now, experts are warning the BLA could represent the most significant internal threat Pakistan faces.</b></p><p><b>In this episode, host Lucas Webber is joined by Riccardo Valle, a researcher specialising in jihadism, armed groups, and regional politics in Afghanistan and Pakistan. Together, they unpack the rise of the BLA, its growing presence on social media and messaging platforms, and the unique role women play in the group’s operations.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b> ➡︎ The origins of the BLA </b></p><p><b> ➡︎ About their sophisticated online media campaign  </b></p><p><b> ➡︎ About the group’s female suicide bombers </b></p><p><b> ➡︎ How Pakistan is responding to the BLA’s threat</b></p><p><b> ➡︎ How the group has become Pakistan&apos;s biggest internal threat </b></p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/riccardo-valle-850683195/'><b>Riccardo Valle</b></a><b>.</b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/VFp0lYdl3se'><b>here</b></a><b>. </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/17513591-balochistan-liberation-army-pakistan-s-rising-militant-challenge.mp3" length="26077971" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17513591</guid>
    <pubDate>Thu, 17 Jul 2025 01:00:00 +0100</pubDate>
    <itunes:duration>2169</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Accelerationism: From Online Subcultures to Real-World Violence</itunes:title>
    <title>Accelerationism: From Online Subcultures to Real-World Violence</title>
    <itunes:summary><![CDATA[Accelerationism is no longer a fringe theory - it’s become a dangerous ideological driver behind a growing number of real-world terrorist attacks. Rooted in the belief that societal collapse should be sped up to bring new world order, this radical worldview has been adopted by extremists across the spectrum - from the far-right to violent anarchists. In this episode, host Lucas Webber is joined by Ben Makuch, national security reporter and contributor to The Guardian and Peter Smith, an indep...]]></itunes:summary>
    <description><![CDATA[<p>Accelerationism is no longer a fringe theory - it’s become a dangerous ideological driver behind a growing number of real-world terrorist attacks. Rooted in the belief that societal collapse should be sped up to bring new world order, this radical worldview has been adopted by extremists across the spectrum - from the far-right to violent anarchists.</p><p>In this episode, host Lucas Webber is joined by Ben Makuch, national security reporter and contributor to The Guardian and Peter Smith, an independent researcher and journalist with the Canadian Anti Hate Network. They unpack where accelerationist narratives started, and how the rise of the digital age has helped spread them. They also examine <em>why </em>this ideology appeals to violent actors - and the challenges law enforcement faces in countering the threat.</p><p>🎧 Listen to learn:</p><p> ➡︎ What accelerationism is, and how it has evolved over time.<br/> ➡︎ How extremist communities are using this ideology to justify real-world violence.</p><p> ➡︎ The role of memes, manifestos, and online subcultures in spreading </p><p>accelerationist ideas.<br/> ➡︎ The challenges in tackling the threat of accelerationism. </p><p>📱Connect with <a href='https://www.linkedin.com/in/ben-makuch-846ba2196/'>Ben Makuch</a> and <a href='https://www.linkedin.com/in/peter-smith-555b92218/'>Peter Smith</a>.</p><p>⚡Follow Tech Against Terrorism on <a href='https://bsky.app/profile/techvsterrorism.bsky.social'>Bluesky</a> and <a href='https://www.linkedin.com/company/tech-against-terrorism/'>LinkedIn</a>. </p><p>🌐Check out the Tech Against Terrorism <a href='https://techagainstterrorism.org/home'>website</a>.</p><p>💬 Connect with our host, <a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'>Lucas Webber</a>. </p><p>📄 Read a full transcript of this episode <a href='https://share.descript.com/view/FwKldDw6Pu9'>here</a>.  </p><p>🎙️ An <a href='https://www.ogpodcasts.co.uk/'>OG Podcasts Ltd</a> production. </p>]]></description>
    <content:encoded><![CDATA[<p>Accelerationism is no longer a fringe theory - it’s become a dangerous ideological driver behind a growing number of real-world terrorist attacks. Rooted in the belief that societal collapse should be sped up to bring new world order, this radical worldview has been adopted by extremists across the spectrum - from the far-right to violent anarchists.</p><p>In this episode, host Lucas Webber is joined by Ben Makuch, national security reporter and contributor to The Guardian and Peter Smith, an independent researcher and journalist with the Canadian Anti Hate Network. They unpack where accelerationist narratives started, and how the rise of the digital age has helped spread them. They also examine <em>why </em>this ideology appeals to violent actors - and the challenges law enforcement faces in countering the threat.</p><p>🎧 Listen to learn:</p><p> ➡︎ What accelerationism is, and how it has evolved over time.<br/> ➡︎ How extremist communities are using this ideology to justify real-world violence.</p><p> ➡︎ The role of memes, manifestos, and online subcultures in spreading </p><p>accelerationist ideas.<br/> ➡︎ The challenges in tackling the threat of accelerationism. </p><p>📱Connect with <a href='https://www.linkedin.com/in/ben-makuch-846ba2196/'>Ben Makuch</a> and <a href='https://www.linkedin.com/in/peter-smith-555b92218/'>Peter Smith</a>.</p><p>⚡Follow Tech Against Terrorism on <a href='https://bsky.app/profile/techvsterrorism.bsky.social'>Bluesky</a> and <a href='https://www.linkedin.com/company/tech-against-terrorism/'>LinkedIn</a>. </p><p>🌐Check out the Tech Against Terrorism <a href='https://techagainstterrorism.org/home'>website</a>.</p><p>💬 Connect with our host, <a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'>Lucas Webber</a>. </p><p>📄 Read a full transcript of this episode <a href='https://share.descript.com/view/FwKldDw6Pu9'>here</a>.  </p><p>🎙️ An <a href='https://www.ogpodcasts.co.uk/'>OG Podcasts Ltd</a> production. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/17305980-accelerationism-from-online-subcultures-to-real-world-violence.mp3" length="27080798" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17305980</guid>
    <pubDate>Thu, 12 Jun 2025 01:00:00 +0100</pubDate>
    <itunes:duration>2253</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Blueprints for Violence: How Extremists Are Weaponising 3D Printing</itunes:title>
    <title>Blueprints for Violence: How Extremists Are Weaponising 3D Printing</title>
    <itunes:summary><![CDATA[Once a revolutionary manufacturing innovation, 3D printing has become a double-edged sword. While the technology is driving progress across sectors like medicine and aerospace, it’s also being exploited to produce untraceable, homemade firearms. In this episode, host Lucas Webber is joined by Yannick Veilleux-Lepage, Assistant Professor at the Royal Military College of Canada and a leading expert on the intersection of terrorism and emerging technologies. Together, they explore how 3D-printed...]]></itunes:summary>
    <description><![CDATA[<p><b>Once a revolutionary manufacturing innovation, 3D printing has become a double-edged sword. While the technology is driving progress across sectors like medicine and aerospace, it’s also being exploited to produce untraceable, homemade firearms.</b></p><p><b>In this episode, host Lucas Webber is joined by Yannick Veilleux-Lepage, Assistant Professor at the Royal Military College of Canada and a leading expert on the intersection of terrorism and emerging technologies. Together, they explore how 3D-printed weapons are being used by extremist actors, how online communities are spreading firearm blueprints, and why policymakers are struggling to respond to this growing security challenge.</b></p><p><b>🎧 Listen to learn:</b></p><p><b> ➡︎ Why 3D printing has become so attractive to extremists.<br/> ➡︎ How online communities are facilitating the global spread of 3D-printed firearm designs.<br/> ➡︎ The different types of 3D-printed weapons in circulation.<br/> ➡︎ What governments and platforms can do to mitigate this evolving threat.</b></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/yveilleuxlepage/?originalSubdomain=ca'><b>Yannick Veilleux-Lepage</b></a><b>. </b></p><p><b>📚Read Yannick’s latest research </b><a href='https://ctc.westpoint.edu/printing-terror-an-empirical-overview-of-the-use-of-3d-printed-firearms-by-right-wing-extremists/'><b>Printing Terror: An Empirical Overview of the Use of 3D-Printed Firearms by Right-Wing Extremists</b></a></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/8E3qQTkgauq'><b>here</b></a><b>.  </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Once a revolutionary manufacturing innovation, 3D printing has become a double-edged sword. While the technology is driving progress across sectors like medicine and aerospace, it’s also being exploited to produce untraceable, homemade firearms.</b></p><p><b>In this episode, host Lucas Webber is joined by Yannick Veilleux-Lepage, Assistant Professor at the Royal Military College of Canada and a leading expert on the intersection of terrorism and emerging technologies. Together, they explore how 3D-printed weapons are being used by extremist actors, how online communities are spreading firearm blueprints, and why policymakers are struggling to respond to this growing security challenge.</b></p><p><b>🎧 Listen to learn:</b></p><p><b> ➡︎ Why 3D printing has become so attractive to extremists.<br/> ➡︎ How online communities are facilitating the global spread of 3D-printed firearm designs.<br/> ➡︎ The different types of 3D-printed weapons in circulation.<br/> ➡︎ What governments and platforms can do to mitigate this evolving threat.</b></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/yveilleuxlepage/?originalSubdomain=ca'><b>Yannick Veilleux-Lepage</b></a><b>. </b></p><p><b>📚Read Yannick’s latest research </b><a href='https://ctc.westpoint.edu/printing-terror-an-empirical-overview-of-the-use-of-3d-printed-firearms-by-right-wing-extremists/'><b>Printing Terror: An Empirical Overview of the Use of 3D-Printed Firearms by Right-Wing Extremists</b></a></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/8E3qQTkgauq'><b>here</b></a><b>.  </b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/17157359-blueprints-for-violence-how-extremists-are-weaponising-3d-printing.mp3" length="30344011" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17157359</guid>
    <pubDate>Thu, 15 May 2025 01:00:00 +0100</pubDate>
    <itunes:duration>2525</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Evolution of the Islamic State: From Regional Force to Global Threat</itunes:title>
    <title>The Evolution of the Islamic State: From Regional Force to Global Threat</title>
    <itunes:summary><![CDATA[The Islamic State, once a local insurgency rooted in Iraq and Syria, has transformed into a global network with far-reaching influence. In this episode of the podcast, we chart how its operations have expanded beyond the Middle East, as the group leveraged technology, propaganda, and local affiliates to spread its ideology across borders.  Host Lucas Webber is joined by Aaron Zelin, a Fellow at the Washington Institute for Near East Policy and founder of the widely acclaimed website, Jih...]]></itunes:summary>
    <description><![CDATA[<p>The Islamic State, once a local insurgency rooted in Iraq and Syria, has transformed into a global network with far-reaching influence. In this episode of the podcast, we chart how its operations have expanded beyond the Middle East, as the group leveraged technology, propaganda, and local affiliates to spread its ideology across borders. </p><p>Host Lucas Webber is joined by Aaron Zelin, a Fellow at the Washington Institute for Near East Policy and founder of the widely acclaimed website, <a href='https://www.jihadology.net/'>Jihadology</a>. Aaron explains how The General Directorate of Provinces, a global hierarchy structure responsible for overseeing and coordinating Islamic State’s global affiliates, is central to much of the group&apos;s expansion.</p><p><br/></p><p>🎧 Listen to learn:</p><p>➡︎ How The General Directorate of Provinces has helped IS integrate more globally.</p><p>➡︎ The implications of The General Directorate of Provinces for global security. </p><p>➡︎ How current political instability in Syria affects the operational capabilities of IS.</p><p>➡︎ Strategies which could mitigate the Islamic State’s influence globally.</p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/aaronzelin/'><b>Aaron Zelin</b></a><b>.</b></p><p><b>📚Learn more about jihadology.net </b><a href='https://jihadology.net/'><b>here</b></a><b>. </b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/N7TYHPFYuxW'><b>here</b></a><b>.</b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p>]]></description>
    <content:encoded><![CDATA[<p>The Islamic State, once a local insurgency rooted in Iraq and Syria, has transformed into a global network with far-reaching influence. In this episode of the podcast, we chart how its operations have expanded beyond the Middle East, as the group leveraged technology, propaganda, and local affiliates to spread its ideology across borders. </p><p>Host Lucas Webber is joined by Aaron Zelin, a Fellow at the Washington Institute for Near East Policy and founder of the widely acclaimed website, <a href='https://www.jihadology.net/'>Jihadology</a>. Aaron explains how The General Directorate of Provinces, a global hierarchy structure responsible for overseeing and coordinating Islamic State’s global affiliates, is central to much of the group&apos;s expansion.</p><p><br/></p><p>🎧 Listen to learn:</p><p>➡︎ How The General Directorate of Provinces has helped IS integrate more globally.</p><p>➡︎ The implications of The General Directorate of Provinces for global security. </p><p>➡︎ How current political instability in Syria affects the operational capabilities of IS.</p><p>➡︎ Strategies which could mitigate the Islamic State’s influence globally.</p><p><br/></p><p><b>📱Connect with </b><a href='https://www.linkedin.com/in/aaronzelin/'><b>Aaron Zelin</b></a><b>.</b></p><p><b>📚Learn more about jihadology.net </b><a href='https://jihadology.net/'><b>here</b></a><b>. </b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/N7TYHPFYuxW'><b>here</b></a><b>.</b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/16940133-the-evolution-of-the-islamic-state-from-regional-force-to-global-threat.mp3" length="29285920" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16940133</guid>
    <pubDate>Thu, 10 Apr 2025 01:00:00 +0100</pubDate>
    <itunes:duration>2437</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Dark Side of Drone Tech: How Extremists Are Exploiting UAVs</itunes:title>
    <title>The Dark Side of Drone Tech: How Extremists Are Exploiting UAVs</title>
    <itunes:summary><![CDATA[Unmanned aerial vehicles - better known as drones - are transforming modern warfare. As the technology becomes more accessible to the general public, it also becomes easier for bad actors to exploit.  From surveillance and reconnaissance to weaponised drone attacks, extremist groups are increasingly using this technology to enhance their operational capabilities. In this episode of the Tech Against Terrorism podcast, host Lucas Webber speaks to Don Rassler, Director of Strategic Initiati...]]></itunes:summary>
    <description><![CDATA[<p><b>Unmanned aerial vehicles - better known as drones - are transforming modern warfare. As the technology becomes more accessible to the general public, it also becomes easier for bad actors to exploit. </b></p><p><b>From surveillance and reconnaissance to weaponised drone attacks, extremist groups are increasingly using this technology to enhance their operational capabilities.</b></p><p><b>In this episode of the Tech Against Terrorism podcast, host Lucas Webber speaks to Don Rassler, Director of Strategic Initiatives at the Combating Terrorism Center at the US Military Academy at West Point. Together, they discuss how drones are being leveraged by terrorist organisations, the evolving threat landscape, and the countermeasures being developed to mitigate these risks.</b></p><p><b>The views expressed by the guest in this podcast are his and do not necessarily reflect those of the Combating Terrorism Center, United States Military Academy, Department of Defense, or U.S. Government.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b>➡︎ How terrorist groups are acquiring and adapting drone technology</b></p><p><b>➡︎ The tactical advantages drones offer to extremist organisations</b></p><p><b>➡︎ How governments are responding to this emerging threat</b></p><p><b>➡︎ The future of drone warfare in terrorist operations</b></p><p><br/></p><p><b>📱 Connect with </b><a href='https://www.linkedin.com/in/don-rassler-8a69473/'><b>Don Rassler</b></a><b>.</b></p><p><b>📚Learn more about the Combating Terrorism Center </b><a href='https://ctc.westpoint.edu/'><b>here</b></a><b>.</b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/pwYMFzBz2wO'><b>here</b></a><b>.</b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>Unmanned aerial vehicles - better known as drones - are transforming modern warfare. As the technology becomes more accessible to the general public, it also becomes easier for bad actors to exploit. </b></p><p><b>From surveillance and reconnaissance to weaponised drone attacks, extremist groups are increasingly using this technology to enhance their operational capabilities.</b></p><p><b>In this episode of the Tech Against Terrorism podcast, host Lucas Webber speaks to Don Rassler, Director of Strategic Initiatives at the Combating Terrorism Center at the US Military Academy at West Point. Together, they discuss how drones are being leveraged by terrorist organisations, the evolving threat landscape, and the countermeasures being developed to mitigate these risks.</b></p><p><b>The views expressed by the guest in this podcast are his and do not necessarily reflect those of the Combating Terrorism Center, United States Military Academy, Department of Defense, or U.S. Government.</b></p><p><br/></p><p><b>🎧 Listen to learn:</b></p><p><b>➡︎ How terrorist groups are acquiring and adapting drone technology</b></p><p><b>➡︎ The tactical advantages drones offer to extremist organisations</b></p><p><b>➡︎ How governments are responding to this emerging threat</b></p><p><b>➡︎ The future of drone warfare in terrorist operations</b></p><p><br/></p><p><b>📱 Connect with </b><a href='https://www.linkedin.com/in/don-rassler-8a69473/'><b>Don Rassler</b></a><b>.</b></p><p><b>📚Learn more about the Combating Terrorism Center </b><a href='https://ctc.westpoint.edu/'><b>here</b></a><b>.</b></p><p><b>⚡Follow Tech Against Terrorism on </b><a href='https://bsky.app/profile/techvsterrorism.bsky.social'><b>Bluesky</b></a><b> and </b><a href='https://www.linkedin.com/company/tech-against-terrorism/'><b>LinkedIn</b></a><b>. </b></p><p><b>🌐Check out the Tech Against Terrorism </b><a href='https://techagainstterrorism.org/home'><b>website</b></a><b>.</b></p><p><b>💬 Connect with our host, </b><a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'><b>Lucas Webber</b></a><b>. </b></p><p><b>📄 Read a full transcript of this episode </b><a href='https://share.descript.com/view/pwYMFzBz2wO'><b>here</b></a><b>.</b></p><p><b>🎙️ An </b><a href='https://www.ogpodcasts.co.uk/'><b>OG Podcasts Ltd</b></a><b> production. </b></p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/16773399-the-dark-side-of-drone-tech-how-extremists-are-exploiting-uavs.mp3" length="28856731" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16773399</guid>
    <pubDate>Thu, 13 Mar 2025 01:00:00 +0000</pubDate>
    <itunes:duration>2401</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Game On: How Simulations are Enhancing Counter-Terrorism Responses</itunes:title>
    <title>Game On: How Simulations are Enhancing Counter-Terrorism Responses</title>
    <itunes:summary><![CDATA[Video games are increasingly being leveraged as powerful tools in the fight against extremism. Counter-terrorism practitioners are using these "serious games" to enhance critical thinking and decision-making by immersing participants in realistic scenarios that mirror real-world security challenges. In this episode of the Tech Against Terrorism podcast, host Lucas Webber is joined by Daveed Gartenstein-Ross, Founder &amp; CEO of Valens Games and an internationally recognised expert on politic...]]></itunes:summary>
    <description><![CDATA[<p>Video games are increasingly being leveraged as powerful tools in the fight against extremism. Counter-terrorism practitioners are using these &quot;serious games&quot; to enhance critical thinking and decision-making by immersing participants in realistic scenarios that mirror real-world security challenges.</p><p>In this episode of the Tech Against Terrorism podcast, host Lucas Webber is joined by Daveed Gartenstein-Ross, Founder &amp; CEO of Valens Games and an internationally recognised expert on political violence, alongside Eleanor Ross, Director of Game Design at Valens Games. Together, they discuss how immersive wargames and AI-driven narrative simulations are shaping the future of intelligence and counter-terrorism training.</p><p><br/></p><p>🎧 Listen to learn:</p><p>➡︎ About the intersection of gaming and counter-terrorism</p><p>➡︎ How Valens Games develops simulations for practitioners</p><p>➡︎ The real-world applications of video game technology in security strategy</p><p>➡︎ The Challenges and risks associated with gamifying counter-terrorism training</p><p>➡︎ The role of AI and interactive storytelling in security simulations</p><p><br/></p><p>📱Connect with <a href='https://www.linkedin.com/in/daveedgr/'>Daveed Gartenstein-Ross</a> and <a href='https://www.linkedin.com/in/eleanor-ross-35b65b203/'>Eleanor Ross</a>. </p><p>📚Learn more about Valens Games <a href='https://valensgames.com/'>here</a>. </p><p>⚡Follow Tech Against Terrorism on <a href='https://bsky.app/profile/techvsterrorism.bsky.social'>Bluesky</a> and <a href='https://www.linkedin.com/company/tech-against-terrorism/'>LinkedIn</a>. </p><p>🌐Check out the Tech Against Terrorism <a href='https://techagainstterrorism.org/home'>website</a>.</p><p>💬 Connect with our host, <a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'>Lucas Webber</a>. </p><p>📄 Read a full transcript of this episode <a href='https://share.descript.com/view/dVGp2RYVk3P'>here</a>. </p><p>🎙️ An <a href='https://www.ogpodcasts.co.uk/'>OG Podcasts Ltd</a> production.</p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Video games are increasingly being leveraged as powerful tools in the fight against extremism. Counter-terrorism practitioners are using these &quot;serious games&quot; to enhance critical thinking and decision-making by immersing participants in realistic scenarios that mirror real-world security challenges.</p><p>In this episode of the Tech Against Terrorism podcast, host Lucas Webber is joined by Daveed Gartenstein-Ross, Founder &amp; CEO of Valens Games and an internationally recognised expert on political violence, alongside Eleanor Ross, Director of Game Design at Valens Games. Together, they discuss how immersive wargames and AI-driven narrative simulations are shaping the future of intelligence and counter-terrorism training.</p><p><br/></p><p>🎧 Listen to learn:</p><p>➡︎ About the intersection of gaming and counter-terrorism</p><p>➡︎ How Valens Games develops simulations for practitioners</p><p>➡︎ The real-world applications of video game technology in security strategy</p><p>➡︎ The Challenges and risks associated with gamifying counter-terrorism training</p><p>➡︎ The role of AI and interactive storytelling in security simulations</p><p><br/></p><p>📱Connect with <a href='https://www.linkedin.com/in/daveedgr/'>Daveed Gartenstein-Ross</a> and <a href='https://www.linkedin.com/in/eleanor-ross-35b65b203/'>Eleanor Ross</a>. </p><p>📚Learn more about Valens Games <a href='https://valensgames.com/'>here</a>. </p><p>⚡Follow Tech Against Terrorism on <a href='https://bsky.app/profile/techvsterrorism.bsky.social'>Bluesky</a> and <a href='https://www.linkedin.com/company/tech-against-terrorism/'>LinkedIn</a>. </p><p>🌐Check out the Tech Against Terrorism <a href='https://techagainstterrorism.org/home'>website</a>.</p><p>💬 Connect with our host, <a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'>Lucas Webber</a>. </p><p>📄 Read a full transcript of this episode <a href='https://share.descript.com/view/dVGp2RYVk3P'>here</a>. </p><p>🎙️ An <a href='https://www.ogpodcasts.co.uk/'>OG Podcasts Ltd</a> production.</p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/16617047-game-on-how-simulations-are-enhancing-counter-terrorism-responses.mp3" length="24198903" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16617047</guid>
    <pubDate>Thu, 20 Feb 2025 01:00:00 +0000</pubDate>
    <itunes:duration>2013</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How New Technologies Are Fueling Terrorism </itunes:title>
    <title>How New Technologies Are Fueling Terrorism </title>
    <itunes:summary><![CDATA[Emerging technologies like 3D printing, drones, and artificial intelligence are reshaping the threat landscape, giving terrorists new tools to carry out attacks, spread propaganda, and fund their operations. But the risks don’t stop there. On the horizon are technologies like quantum computing and more, which experts warn could be the next frontier for exploitation. Join Lucas Webber as he explores more about these emerging technologies with internationally renowned terrorism expert Colin Cla...]]></itunes:summary>
    <description><![CDATA[<p>Emerging technologies like 3D printing, drones, and artificial intelligence are reshaping the threat landscape, giving terrorists new tools to carry out attacks, spread propaganda, and fund their operations. But the risks don’t stop there. On the horizon are technologies like quantum computing and more, which experts warn could be the next frontier for exploitation.</p><p>Join Lucas Webber as he explores more about these emerging technologies with internationally renowned terrorism expert Colin Clarke, Director of Research at The Soufan Center. And Clara Broekaert, a Research Fellow at The Soufan Center. </p><p><br/></p><p>🎧 Listen to find out:</p><p>➡︎ How terrorists are using 3D printers to manufacture weapons</p><p>➡︎ Why quantum computing poses an underestimated risk</p><p>➡︎ The truth about artificial intelligence misuse by terrorists</p><p>➡︎ What’s behind the rise in youth extremism</p><p>➡︎ The unique challenges governments, regulators, and tech platforms face in combating these threats</p><p><br/></p><p>📱Connect with <a href='https://www.linkedin.com/in/colinc1/'>Colin Clarke</a> and <a href='https://www.linkedin.com/in/clara-anna-christine-broekaert/'>Clara Broekaert</a>. </p><p>📚Learn more about The Soufan Center <a href='https://thesoufancenter.org/'>here</a>. </p><p>⚡Follow Tech Against Terrorism on <a href='https://bsky.app/profile/techvsterrorism.bsky.social'>Bluesky</a> and <a href='https://www.linkedin.com/company/tech-against-terrorism/'>LinkedIn</a>.<br/> <br/>🌐Check out the Tech Against Terrorism <a href='https://techagainstterrorism.org/home'>website </a> </p><p>💬Connect with our host, <a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'>Lucas Webber</a>. </p><p>📄Read a full transcript of this episode <a href='https://share.descript.com/view/O5omKCNe6j2'>here</a>. </p><p><br/></p><p>🎙️An <a href='https://www.ogpodcasts.co.uk/'>OG Podcasts Ltd</a> production.</p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Emerging technologies like 3D printing, drones, and artificial intelligence are reshaping the threat landscape, giving terrorists new tools to carry out attacks, spread propaganda, and fund their operations. But the risks don’t stop there. On the horizon are technologies like quantum computing and more, which experts warn could be the next frontier for exploitation.</p><p>Join Lucas Webber as he explores more about these emerging technologies with internationally renowned terrorism expert Colin Clarke, Director of Research at The Soufan Center. And Clara Broekaert, a Research Fellow at The Soufan Center. </p><p><br/></p><p>🎧 Listen to find out:</p><p>➡︎ How terrorists are using 3D printers to manufacture weapons</p><p>➡︎ Why quantum computing poses an underestimated risk</p><p>➡︎ The truth about artificial intelligence misuse by terrorists</p><p>➡︎ What’s behind the rise in youth extremism</p><p>➡︎ The unique challenges governments, regulators, and tech platforms face in combating these threats</p><p><br/></p><p>📱Connect with <a href='https://www.linkedin.com/in/colinc1/'>Colin Clarke</a> and <a href='https://www.linkedin.com/in/clara-anna-christine-broekaert/'>Clara Broekaert</a>. </p><p>📚Learn more about The Soufan Center <a href='https://thesoufancenter.org/'>here</a>. </p><p>⚡Follow Tech Against Terrorism on <a href='https://bsky.app/profile/techvsterrorism.bsky.social'>Bluesky</a> and <a href='https://www.linkedin.com/company/tech-against-terrorism/'>LinkedIn</a>.<br/> <br/>🌐Check out the Tech Against Terrorism <a href='https://techagainstterrorism.org/home'>website </a> </p><p>💬Connect with our host, <a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'>Lucas Webber</a>. </p><p>📄Read a full transcript of this episode <a href='https://share.descript.com/view/O5omKCNe6j2'>here</a>. </p><p><br/></p><p>🎙️An <a href='https://www.ogpodcasts.co.uk/'>OG Podcasts Ltd</a> production.</p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/16395158-how-new-technologies-are-fueling-terrorism.mp3" length="22602891" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16395158</guid>
    <pubDate>Thu, 23 Jan 2025 01:00:00 +0000</pubDate>
    <itunes:duration>1880</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Disrupting Terrorist Financing in the Digital Age</itunes:title>
    <title>Disrupting Terrorist Financing in the Digital Age</title>
    <itunes:summary><![CDATA[From buying weapons to funding attacks and recruiting new members, terrorist organisations need money to carry out their activities. But how do they raise, store and transfer finances? And what lessons can counter-terrorism teams learn from tracking terrorist money?   Join Lucas Webber as he discusses all this and more with internationally renowned terrorism finance expert Dr. Jessica Davis, president and principal consultant at Insight Threat Intelligence.   🎧 Listen to find out: ➡︎ Wha...]]></itunes:summary>
    <description><![CDATA[<p>From buying weapons to funding attacks and recruiting new members, terrorist organisations need money to carry out their activities. But how do they raise, store and transfer finances? And what lessons can counter-terrorism teams learn from tracking terrorist money?  </p><p>Join Lucas Webber as he discusses all this and more with internationally renowned terrorism finance expert Dr. Jessica Davis, president and principal consultant at Insight Threat Intelligence.<br/><br/></p><p>🎧 Listen to find out:</p><p>➡︎ What money can tell us about a potential attack plot</p><p>➡︎ What methods terrorists use to raise funds </p><p>➡︎ How terrorists leverage criminal activity</p><p>➡︎ The role of cryptocurrency</p><p>➡︎ How women are involved in terrorism financing </p><p><br/></p><p>📱Connect with <a href='https://www.linkedin.com/in/jmdottawa/'>Dr. Jessica Davis</a>. </p><p>📚Learn more about Insight Threat Intelligence <a href='https://www.insightthreatintel.com/'>here</a>. </p><p>⚡️ Follow Tech Against Terrorism on <a href='https://bsky.app/profile/techvsterrorism.bsky.social'>Bluesky</a> and <a href='https://www.linkedin.com/company/tech-against-terrorism/'>LinkedIn</a>.<br/><br/>🌐Check out the Tech Against Terrorism <a href='https://techagainstterrorism.org/home'>website </a> </p><p>💬 Connect with our host, <a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'>Lucas Webber</a>. </p><p>📄 Read a full transcript of this episode <a href='https://share.descript.com/view/xE1o3etvVug'>here</a>.  </p><p>🎙️ An <a href='https://www.ogpodcasts.co.uk/'>OG Podcasts Ltd</a> production.</p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p>From buying weapons to funding attacks and recruiting new members, terrorist organisations need money to carry out their activities. But how do they raise, store and transfer finances? And what lessons can counter-terrorism teams learn from tracking terrorist money?  </p><p>Join Lucas Webber as he discusses all this and more with internationally renowned terrorism finance expert Dr. Jessica Davis, president and principal consultant at Insight Threat Intelligence.<br/><br/></p><p>🎧 Listen to find out:</p><p>➡︎ What money can tell us about a potential attack plot</p><p>➡︎ What methods terrorists use to raise funds </p><p>➡︎ How terrorists leverage criminal activity</p><p>➡︎ The role of cryptocurrency</p><p>➡︎ How women are involved in terrorism financing </p><p><br/></p><p>📱Connect with <a href='https://www.linkedin.com/in/jmdottawa/'>Dr. Jessica Davis</a>. </p><p>📚Learn more about Insight Threat Intelligence <a href='https://www.insightthreatintel.com/'>here</a>. </p><p>⚡️ Follow Tech Against Terrorism on <a href='https://bsky.app/profile/techvsterrorism.bsky.social'>Bluesky</a> and <a href='https://www.linkedin.com/company/tech-against-terrorism/'>LinkedIn</a>.<br/><br/>🌐Check out the Tech Against Terrorism <a href='https://techagainstterrorism.org/home'>website </a> </p><p>💬 Connect with our host, <a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'>Lucas Webber</a>. </p><p>📄 Read a full transcript of this episode <a href='https://share.descript.com/view/xE1o3etvVug'>here</a>.  </p><p>🎙️ An <a href='https://www.ogpodcasts.co.uk/'>OG Podcasts Ltd</a> production.</p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/16308255-disrupting-terrorist-financing-in-the-digital-age.mp3" length="24894014" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16308255</guid>
    <pubDate>Thu, 09 Jan 2025 01:00:00 +0000</pubDate>
    <itunes:duration>2070</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Persistence of Pro-IS Propaganda in Southeast Asia</itunes:title>
    <title>The Persistence of Pro-IS Propaganda in Southeast Asia</title>
    <itunes:summary><![CDATA[In this week’s episode we’re looking at how IS and al-Qaeda affiliated terrorist groups in Southeast Asia continue to exploit online platforms to disseminate propaganda, even as attacks in the region decline. We explore the history of militant Islamist activities in the region, as well as the key players; Why and how these groups and their supporters focus so much of their energy on online propaganda; And why we should care when terrorist content stays online. A note: we recorded this episode...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode we’re looking at how IS and al-Qaeda affiliated terrorist groups in Southeast Asia continue to exploit online platforms to disseminate propaganda, even as attacks in the region decline. We explore the history of militant Islamist activities in the region, as well as the key players; Why and how these groups and their supporters focus so much of their energy on online propaganda; And why we should care when terrorist content stays online.</p><p>A note: we recorded this episode before the <a href='https://www.reuters.com/world/asia-pacific/southeast-asian-militant-group-jemaah-islamiyah-be-disbanded-say-its-senior-2024-07-04/'>announcement</a> by leaders of the Jemaah Islamiyah, or JI, of the group’s disbandment. It’s one of the main groups we explore in this episode.</p><p>Archie Macfarlane is joined by <a href='https://www.linkedin.com/in/judithjacob/?originalSubdomain=uk'>Dr. Judith Jacob</a>. She is the director of Geopolitical Risk and Security Intelligence at Forward Global, a corporate intelligence and influence group. She also holds a PhD on Ideology, Terrorism, and Militant Islamism.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/lVQbkOZ2FG4'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p>Resources:</p><ul><li>Dr. Judith Jacob’s <a href='https://www.lse.ac.uk/International-History/People/alumni/jacob/jacob'>research at LSE</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode we’re looking at how IS and al-Qaeda affiliated terrorist groups in Southeast Asia continue to exploit online platforms to disseminate propaganda, even as attacks in the region decline. We explore the history of militant Islamist activities in the region, as well as the key players; Why and how these groups and their supporters focus so much of their energy on online propaganda; And why we should care when terrorist content stays online.</p><p>A note: we recorded this episode before the <a href='https://www.reuters.com/world/asia-pacific/southeast-asian-militant-group-jemaah-islamiyah-be-disbanded-say-its-senior-2024-07-04/'>announcement</a> by leaders of the Jemaah Islamiyah, or JI, of the group’s disbandment. It’s one of the main groups we explore in this episode.</p><p>Archie Macfarlane is joined by <a href='https://www.linkedin.com/in/judithjacob/?originalSubdomain=uk'>Dr. Judith Jacob</a>. She is the director of Geopolitical Risk and Security Intelligence at Forward Global, a corporate intelligence and influence group. She also holds a PhD on Ideology, Terrorism, and Militant Islamism.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/lVQbkOZ2FG4'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p>Resources:</p><ul><li>Dr. Judith Jacob’s <a href='https://www.lse.ac.uk/International-History/People/alumni/jacob/jacob'>research at LSE</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/15385959-the-persistence-of-pro-is-propaganda-in-southeast-asia.mp3" length="28960284" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15385959</guid>
    <pubDate>Thu, 25 Jul 2024 01:00:00 +0100</pubDate>
    <itunes:duration>2410</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>43</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Escaping the Incelosphere</itunes:title>
    <title>Escaping the Incelosphere</title>
    <itunes:summary><![CDATA[In this week’s episode, we’re returning to the topic of incels to explore the online spaces aiming to help individuals leave this violent misogynistic community. We start by providing a refresher on incel ideology, but if you want a deep dive we recommend first listening to the episode linked below. This time, we focus on tools for deradicalisation, the benefits and limitations of support-focused Reddit forums like r/inceltears and r/incelexit, and consider why it is so difficult to leave the...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we’re returning to the topic of incels to explore the online spaces aiming to help individuals leave this violent misogynistic community. We start by providing a refresher on incel ideology, but if you want a deep dive we recommend first listening to the episode linked below. This time, we focus on tools for deradicalisation, the benefits and limitations of support-focused Reddit forums like r/inceltears and r/incelexit, and consider why it is so difficult to leave the incelosphere.</p><p>Archie Macfarlane is joined by <a href='https://www.linkedin.com/in/allysa-czerwinsky/?originalSubdomain=uk'>Allysa Czerwinsky</a>, a PhD candidate at the University of Manchester, who specialises in male supremacist communities online.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/zSkRWWPhWQD'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p>Resources:</p><ul><li>Allysa Czerwinsky’s <a href='https://research.manchester.ac.uk/en/persons/allysa-czerwinsky'>research</a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/7794352-incels-online-misogyny-and-gender-based-terrorism'>Incels, Online Misogyny and Gender-Based Violence</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we’re returning to the topic of incels to explore the online spaces aiming to help individuals leave this violent misogynistic community. We start by providing a refresher on incel ideology, but if you want a deep dive we recommend first listening to the episode linked below. This time, we focus on tools for deradicalisation, the benefits and limitations of support-focused Reddit forums like r/inceltears and r/incelexit, and consider why it is so difficult to leave the incelosphere.</p><p>Archie Macfarlane is joined by <a href='https://www.linkedin.com/in/allysa-czerwinsky/?originalSubdomain=uk'>Allysa Czerwinsky</a>, a PhD candidate at the University of Manchester, who specialises in male supremacist communities online.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/zSkRWWPhWQD'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p>Resources:</p><ul><li>Allysa Czerwinsky’s <a href='https://research.manchester.ac.uk/en/persons/allysa-czerwinsky'>research</a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/7794352-incels-online-misogyny-and-gender-based-terrorism'>Incels, Online Misogyny and Gender-Based Violence</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/15385848-escaping-the-incelosphere.mp3" length="28828255" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15385848</guid>
    <pubDate>Thu, 11 Jul 2024 01:00:00 +0100</pubDate>
    <itunes:duration>2399</itunes:duration>
    <itunes:keywords>terrorism, counterterrorism, incel, extremism, extremist, misogyny</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>42</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Online Anti-LGBTQ+ Hate and its Offline Consequences</itunes:title>
    <title>Online Anti-LGBTQ+ Hate and its Offline Consequences</title>
    <itunes:summary><![CDATA[In this week’s episode we’re looking at the spread and normalisation of anti-LGBTQ+ hate online, and its dramatic, real-life consequences. The hysteria promoted by extremists around a so-called gay or trans agenda has led to a societal and legislative backlash for LGBTQ+ people in the US. And the hate has festered in the most mainstream of online spaces. We discuss some of the conspiracy theories against LGBTQ+ people, the link between online and offline violence, and what tech companies can ...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode we’re looking at the spread and normalisation of anti-LGBTQ+ hate online, and its dramatic, real-life consequences. The hysteria promoted by extremists around a so-called gay or trans agenda has led to a societal and legislative backlash for LGBTQ+ people in the US. And the hate has festered in the most mainstream of online spaces. We discuss some of the conspiracy theories against LGBTQ+ people, the link between online and offline violence, and what tech companies can do to protect this marginalised community.</p><p>Archie Macfarlane is joined by Sarah Moore, the senior manager of news and research at <a href='https://glaad.org/'>GLAAD</a>, a non-profit LGBTQ+ advocacy organisation, based in the US.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/mGEGqqojGQG'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p>Resources:</p><ul><li>GLAAD’s <a href='https://glaad.org/smsi/social-media-safety-index-2024/'>Social Media Safety Index</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode we’re looking at the spread and normalisation of anti-LGBTQ+ hate online, and its dramatic, real-life consequences. The hysteria promoted by extremists around a so-called gay or trans agenda has led to a societal and legislative backlash for LGBTQ+ people in the US. And the hate has festered in the most mainstream of online spaces. We discuss some of the conspiracy theories against LGBTQ+ people, the link between online and offline violence, and what tech companies can do to protect this marginalised community.</p><p>Archie Macfarlane is joined by Sarah Moore, the senior manager of news and research at <a href='https://glaad.org/'>GLAAD</a>, a non-profit LGBTQ+ advocacy organisation, based in the US.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/mGEGqqojGQG'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p>Resources:</p><ul><li>GLAAD’s <a href='https://glaad.org/smsi/social-media-safety-index-2024/'>Social Media Safety Index</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/15314807-online-anti-lgbtq-hate-and-its-offline-consequences.mp3" length="23569860" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15314807</guid>
    <pubDate>Thu, 27 Jun 2024 01:00:00 +0100</pubDate>
    <itunes:duration>1961</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>41</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title> Is Terrorist Use of Cryptocurrencies Overblown?</itunes:title>
    <title> Is Terrorist Use of Cryptocurrencies Overblown?</title>
    <itunes:summary><![CDATA[There has been a lot of concern about how cryptocurrencies are used by terrorist groups to finance their operations, especially since Hamas’s attack on Israel on October 7th. So in this week’s episode, we’re investigating that question – do terrorist groups actually use cryptocurrency? We discuss what is known about terrorist financing, where the hysteria around cryptocurrency comes from, and the challenges around adopting more effective international countermeasures. Archie Macfarlane is joi...]]></itunes:summary>
    <description><![CDATA[<p>There has been a lot of concern about how cryptocurrencies are used by terrorist groups to finance their operations, especially since Hamas’s attack on Israel on October 7th. So in this week’s episode, we’re investigating that question – do terrorist groups actually use cryptocurrency? We discuss what is known about terrorist financing, where the hysteria around cryptocurrency comes from, and the challenges around adopting more effective international countermeasures.</p><p>Archie Macfarlane is joined by <a href='https://rusi.org/people/reimer'>Stephen Reimer</a>, an Associate Fellow with the Centre for Finance and Security at the Royal United Services Institute&apos;s (RUSI). He is also an Adjunct Professor at the SciencesPo Paris School of International Affairs, where he lectures on financial intelligence and security.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/vhzIM3fa87X'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p>Resources:</p><ul><li>Stephen Reimer’s <a href='https://rusi.org/people/reimer'>research</a> at RUSI</li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/13627375-islamic-state-khorasan-is-k-a-growing-threat'>Islamic State Khorasan (IS-K): A Growing Threat?</a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/14777447-media-jihad-islamic-state-s-resurgent-propaganda-network'>Media Jihad: Islamic State&apos;s Resurgent Propaganda Network</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>There has been a lot of concern about how cryptocurrencies are used by terrorist groups to finance their operations, especially since Hamas’s attack on Israel on October 7th. So in this week’s episode, we’re investigating that question – do terrorist groups actually use cryptocurrency? We discuss what is known about terrorist financing, where the hysteria around cryptocurrency comes from, and the challenges around adopting more effective international countermeasures.</p><p>Archie Macfarlane is joined by <a href='https://rusi.org/people/reimer'>Stephen Reimer</a>, an Associate Fellow with the Centre for Finance and Security at the Royal United Services Institute&apos;s (RUSI). He is also an Adjunct Professor at the SciencesPo Paris School of International Affairs, where he lectures on financial intelligence and security.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/vhzIM3fa87X'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p>Resources:</p><ul><li>Stephen Reimer’s <a href='https://rusi.org/people/reimer'>research</a> at RUSI</li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/13627375-islamic-state-khorasan-is-k-a-growing-threat'>Islamic State Khorasan (IS-K): A Growing Threat?</a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/14777447-media-jihad-islamic-state-s-resurgent-propaganda-network'>Media Jihad: Islamic State&apos;s Resurgent Propaganda Network</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/15197800-is-terrorist-use-of-cryptocurrencies-overblown.mp3" length="22707064" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15197800</guid>
    <pubDate>Thu, 06 Jun 2024 01:00:00 +0100</pubDate>
    <itunes:duration>1889</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>HOPE Not Hate: Insights from Inside the Far-Right</itunes:title>
    <title>HOPE Not Hate: Insights from Inside the Far-Right</title>
    <itunes:summary><![CDATA[In this week’s episode, we’re getting unique insights into the state of the far-right in the UK. The advocacy and research organisation HOPE Not Hate is known for its tireless work countering extremism and hate through research, intelligence, campaigning and community engagement. This work has involved infiltrating and exposing extremist movements and even terrorist groups. HOPE Not Hate recently published their State of Hate 2024 report, which we discuss in detail in the episode.  Archi...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we’re getting unique insights into the state of the far-right in the UK. The advocacy and research organisation <a href='https://hopenothate.org.uk/'>HOPE Not Hate</a> is known for its tireless work countering extremism and hate through research, intelligence, campaigning and community engagement. This work has involved infiltrating and exposing extremist movements and even terrorist groups. HOPE Not Hate recently published their State of Hate 2024 report, which we discuss in detail in the episode. </p><p>Archie Macfarlane is joined by <a href='https://twitter.com/patrik_h?lang=en'>Patrik Hermansson</a>, a senior researcher from HOPE Not Hate. We learn what it’s like to go undercover in an extremist group, and the risks associated with it. We explore how far-right extremism has evolved over the years, the role of social media, and the wider societal drivers of hate.  </p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/MzdNiBzUGzs'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p>Resources:</p><ul><li>HOPE Not Hate’s <a href='https://hopenothate.org.uk/state-of-hate-2024/'>State of Hate 2024 report</a></li><li>Patrik’s research <a href='https://hopenothate.org.uk/state-of-hate-2024-fight-clubs/'>feature on Active Clubs</a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/14864219-active-clubs-fitness-fraternity-and-fascism'>Active Clubs: Fitness, Fraternity, and Fascism</a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/13708275-what-is-the-tradwives-movement'>What is the #tradwives Movement?</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we’re getting unique insights into the state of the far-right in the UK. The advocacy and research organisation <a href='https://hopenothate.org.uk/'>HOPE Not Hate</a> is known for its tireless work countering extremism and hate through research, intelligence, campaigning and community engagement. This work has involved infiltrating and exposing extremist movements and even terrorist groups. HOPE Not Hate recently published their State of Hate 2024 report, which we discuss in detail in the episode. </p><p>Archie Macfarlane is joined by <a href='https://twitter.com/patrik_h?lang=en'>Patrik Hermansson</a>, a senior researcher from HOPE Not Hate. We learn what it’s like to go undercover in an extremist group, and the risks associated with it. We explore how far-right extremism has evolved over the years, the role of social media, and the wider societal drivers of hate.  </p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/MzdNiBzUGzs'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p>Resources:</p><ul><li>HOPE Not Hate’s <a href='https://hopenothate.org.uk/state-of-hate-2024/'>State of Hate 2024 report</a></li><li>Patrik’s research <a href='https://hopenothate.org.uk/state-of-hate-2024-fight-clubs/'>feature on Active Clubs</a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/14864219-active-clubs-fitness-fraternity-and-fascism'>Active Clubs: Fitness, Fraternity, and Fascism</a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/13708275-what-is-the-tradwives-movement'>What is the #tradwives Movement?</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/15114860-hope-not-hate-insights-from-inside-the-far-right.mp3" length="25502774" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15114860</guid>
    <pubDate>Thu, 23 May 2024 01:00:00 +0100</pubDate>
    <itunes:duration>2122</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>39</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mapping Far-Right Terrorist Propaganda Online</itunes:title>
    <title>Mapping Far-Right Terrorist Propaganda Online</title>
    <itunes:summary><![CDATA[In this week’s episode, we’re delving into the key trends of the past three years in how online users disseminate far-right terrorist propaganda online. From gamification to Generative AI, we’ll be sharing findings from our upcoming report – TCAP Insights: Mapping Far-Right Terrorist Propaganda Online.   Archie Macfarlane is joined by Adam Donald, TCAP Manager at Tech Against Terrorism, who was part of the team working on our latest TCAP research report. We discuss the distribution of terrori...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we’re delving into the key trends of the past three years in how online users disseminate far-right terrorist propaganda online. From gamification to Generative AI, we’ll be sharing findings from our upcoming report – TCAP Insights: Mapping Far-Right Terrorist Propaganda Online. <br/><br/>Archie Macfarlane is joined by Adam Donald, TCAP Manager at Tech Against Terrorism, who was part of the team working on our latest TCAP research report. We discuss the distribution of terrorist content online using TCAP statistics, which terrorist entities are most proficient, and which platforms are most heavily exploited. We also cover how gamification and sanctification of far-right propaganda is leading to a larger audience reach for this content, even on mainstream platforms. Finally, we offer policy recommendations for platforms to counter these trends.<br/><br/>Sign up to join the webinar launching the full report <a href='https://techagainstterrorism.org/events/webinar-series-combatting-terrorist-misuse-of-messaging-apps-0'>here</a>.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/Gl92iz4CgNu'>here</a>.<br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we’re delving into the key trends of the past three years in how online users disseminate far-right terrorist propaganda online. From gamification to Generative AI, we’ll be sharing findings from our upcoming report – TCAP Insights: Mapping Far-Right Terrorist Propaganda Online. <br/><br/>Archie Macfarlane is joined by Adam Donald, TCAP Manager at Tech Against Terrorism, who was part of the team working on our latest TCAP research report. We discuss the distribution of terrorist content online using TCAP statistics, which terrorist entities are most proficient, and which platforms are most heavily exploited. We also cover how gamification and sanctification of far-right propaganda is leading to a larger audience reach for this content, even on mainstream platforms. Finally, we offer policy recommendations for platforms to counter these trends.<br/><br/>Sign up to join the webinar launching the full report <a href='https://techagainstterrorism.org/events/webinar-series-combatting-terrorist-misuse-of-messaging-apps-0'>here</a>.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/Gl92iz4CgNu'>here</a>.<br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/15033981-mapping-far-right-terrorist-propaganda-online.mp3" length="25352426" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15033981</guid>
    <pubDate>Thu, 09 May 2024 01:00:00 +0100</pubDate>
    <itunes:duration>2109</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>38</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Foiled Plots in the UK: How Terrorists Fail</itunes:title>
    <title>Foiled Plots in the UK: How Terrorists Fail</title>
    <itunes:summary><![CDATA[Since 2017, the UK has seen fifteen terrorist attacks – from the Manchester Arena bombing to the Dover firebomb attack. But during that time, more than twice as many attacks have also been foiled. So in this week’s episode, we’re looking at terror plotters in the UK. We are delving into the case studies of two very young plotters who were largely radicalised online, trying to understand what led them down their violent pathways and what can be done by stakeholders to prevent similar cases in ...]]></itunes:summary>
    <description><![CDATA[<p>Since 2017, the UK has seen fifteen terrorist attacks – from the Manchester Arena bombing to the Dover firebomb attack. But during that time, more than twice as many attacks have also been foiled. So in this week’s episode, we’re looking at terror plotters in the UK. We are delving into the case studies of two very young plotters who were largely radicalised online, trying to understand what led them down their violent pathways and what can be done by stakeholders to prevent similar cases in future. </p><p>Archie Macfarlane is joined by <a href='https://twitter.com/lizziedearden?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Lizzie Dearden</a>, a home affairs and security journalist, and author of the book <em>Plotters: The UK Terrorists Who Failed.</em> </p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/6AlbVuxKUWk'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p>Resources:</p><ul><li>Lizzie Dearden’s book, <a href='https://www.amazon.de/Plotters-Uk-Terrorists-Who-Failed/dp/1787389294'><em>Plotters: The UK Terrorists Who Failed</em></a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/14584782-how-has-the-online-dissemination-of-jihadist-propaganda-evolved'>How has the Online Dissemination of Jihadist Propaganda Evolved?</a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/13082518-gaming-extremism-threats-and-opportunities'>Gaming and Extremism: Threats and Opportunities</a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/13170421-gaming-extremism-identity-fusion'>Gaming and Extremism: Identity Fusion</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>Since 2017, the UK has seen fifteen terrorist attacks – from the Manchester Arena bombing to the Dover firebomb attack. But during that time, more than twice as many attacks have also been foiled. So in this week’s episode, we’re looking at terror plotters in the UK. We are delving into the case studies of two very young plotters who were largely radicalised online, trying to understand what led them down their violent pathways and what can be done by stakeholders to prevent similar cases in future. </p><p>Archie Macfarlane is joined by <a href='https://twitter.com/lizziedearden?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Lizzie Dearden</a>, a home affairs and security journalist, and author of the book <em>Plotters: The UK Terrorists Who Failed.</em> </p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/6AlbVuxKUWk'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p>Resources:</p><ul><li>Lizzie Dearden’s book, <a href='https://www.amazon.de/Plotters-Uk-Terrorists-Who-Failed/dp/1787389294'><em>Plotters: The UK Terrorists Who Failed</em></a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/14584782-how-has-the-online-dissemination-of-jihadist-propaganda-evolved'>How has the Online Dissemination of Jihadist Propaganda Evolved?</a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/13082518-gaming-extremism-threats-and-opportunities'>Gaming and Extremism: Threats and Opportunities</a></li><li>TAT Podcast: <a href='https://podcast.techagainstterrorism.org/1684819/13170421-gaming-extremism-identity-fusion'>Gaming and Extremism: Identity Fusion</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/14941870-foiled-plots-in-the-uk-how-terrorists-fail.mp3" length="27412417" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14941870</guid>
    <pubDate>Thu, 25 Apr 2024 01:00:00 +0100</pubDate>
    <itunes:duration>2281</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>37</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Active Clubs: Fitness, Fraternity, and Fascism</itunes:title>
    <title>Active Clubs: Fitness, Fraternity, and Fascism</title>
    <itunes:summary><![CDATA[In this week’s episode, we’re introducing you to a new kind of far-right group – Active Clubs. Their unique pitch combines fitness, fraternity and fascism. We map out the origins and rapid growth of the movement, how they have utilised social media to create chapters globally, and their appealing offer to younger men in particular.   Archie Macfarlane is joined by Brody McDonald, director of the Oxford Disinformation and Extremism Lab, and Associate Fellow at King’s College London.   You...]]></itunes:summary>
    <description><![CDATA[<div>In this week’s episode, we’re introducing you to a new kind of far-right group – Active Clubs. Their unique pitch combines fitness, fraternity and fascism. We map out the origins and rapid growth of the movement, how they have utilised social media to create chapters globally, and their appealing offer to younger men in particular. <br/><br/></div><p>Archie Macfarlane is joined by <a href='https://www.brodymcdonald.io/'>Brody McDonald</a>, director of the Oxford Disinformation and Extremism Lab, and Associate Fellow at King’s College London. <br/><br/>You can read a transcript of the episode <a href='https://share.descript.com/view/Ev0oG03R91v'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. <br/><br/>Resources:<br/><br/></p><ul><li>Brody’s <a href='https://www.oxdisinformationextremismlab.com/broderick-brody-mcdonald-oxford'>recent research</a> </li><li>TAT Podcast: <a href='https://tech-against-terrorism-podcast.podcastpage.io/episode/god-guns-and-sedition-far-right-terrorism-in-america'>God, Guns and Sedition: Far-Right Terrorism in America</a></li></ul>]]></description>
    <content:encoded><![CDATA[<div>In this week’s episode, we’re introducing you to a new kind of far-right group – Active Clubs. Their unique pitch combines fitness, fraternity and fascism. We map out the origins and rapid growth of the movement, how they have utilised social media to create chapters globally, and their appealing offer to younger men in particular. <br/><br/></div><p>Archie Macfarlane is joined by <a href='https://www.brodymcdonald.io/'>Brody McDonald</a>, director of the Oxford Disinformation and Extremism Lab, and Associate Fellow at King’s College London. <br/><br/>You can read a transcript of the episode <a href='https://share.descript.com/view/Ev0oG03R91v'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. <br/><br/>Resources:<br/><br/></p><ul><li>Brody’s <a href='https://www.oxdisinformationextremismlab.com/broderick-brody-mcdonald-oxford'>recent research</a> </li><li>TAT Podcast: <a href='https://tech-against-terrorism-podcast.podcastpage.io/episode/god-guns-and-sedition-far-right-terrorism-in-america'>God, Guns and Sedition: Far-Right Terrorism in America</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/14864219-active-clubs-fitness-fraternity-and-fascism.mp3" length="20451207" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14864219</guid>
    <pubDate>Thu, 11 Apr 2024 01:00:00 +0100</pubDate>
    <itunes:duration>1682</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>36</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Media Jihad: Islamic State&#39;s Resurgent Propaganda Network</itunes:title>
    <title>Media Jihad: Islamic State&#39;s Resurgent Propaganda Network</title>
    <itunes:summary><![CDATA[In this week’s episode, we are delving into Islamic State’s global propaganda network. We map the group’s media apparatus, unpacking the term “media Jihad” to understand the role of pro-IS online networks in waging its propaganda war. We highlight the centrality of Islamic State Khorasan Province, also known as ISKP, in reinvigorating IS’s propaganda machine.  Note: this episode was recorded prior to the terrorist attack on the Crocus City concert hall in Moscow on 22 March 2024, which h...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we are delving into Islamic State’s global propaganda network. We map the group’s media apparatus, unpacking the term “media Jihad” to understand the role of pro-IS online networks in waging its propaganda war. We highlight the centrality of Islamic State Khorasan Province, also known as ISKP, in reinvigorating IS’s propaganda machine. </p><p>Note: this episode was recorded prior to the terrorist attack on the Crocus City concert hall in Moscow on 22 March 2024, which has killed at least 139 people. ISKP has claimed the attack.<br/><br/>Archie Macfarlane is joined by <a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'>Lucas Webber</a>, co-founder of Militant Wire, a media company that provides expert analysis on militant activity around the globe.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/bKgUDAPoKyV'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic.<br/> <br/>Resources:</p><ul><li><a href='https://www.militantwire.com/'>Militant Wire</a></li><li>Lucas Webber’s <a href='https://twitter.com/LucasADWebber?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X page</a></li><li>Tech Against Terrorism’s <a href='https://techagainstterrorism.org/news/moscow-attack-requires-renewed-and-coordinated-focus-on-islamic-state-khorasan'>report on ISKP’s Moscow attack</a></li><li>TAT analysis: <a href='https://techagainstterrorism.org/news/after-the-taliban-takeover-how-islamic-state-khorasan-are-exploiting-the-online-ecosystem-and-projecting-the-threat'>After the Taliban Takeover: How Islamic State-Khorasan Are Exploiting the Online Ecosystem and Projecting the Threat</a></li><li>TAT podcast: <a href='https://tech-against-terrorism-podcast.podcastpage.io/episode/islamic-state-khorasan-is-k-a-growing-threat'>Islamic State Khorasan (IS-K): A Growing Threat</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we are delving into Islamic State’s global propaganda network. We map the group’s media apparatus, unpacking the term “media Jihad” to understand the role of pro-IS online networks in waging its propaganda war. We highlight the centrality of Islamic State Khorasan Province, also known as ISKP, in reinvigorating IS’s propaganda machine. </p><p>Note: this episode was recorded prior to the terrorist attack on the Crocus City concert hall in Moscow on 22 March 2024, which has killed at least 139 people. ISKP has claimed the attack.<br/><br/>Archie Macfarlane is joined by <a href='https://www.linkedin.com/in/lucas-webber-4a8a60b3/'>Lucas Webber</a>, co-founder of Militant Wire, a media company that provides expert analysis on militant activity around the globe.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/bKgUDAPoKyV'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic.<br/> <br/>Resources:</p><ul><li><a href='https://www.militantwire.com/'>Militant Wire</a></li><li>Lucas Webber’s <a href='https://twitter.com/LucasADWebber?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X page</a></li><li>Tech Against Terrorism’s <a href='https://techagainstterrorism.org/news/moscow-attack-requires-renewed-and-coordinated-focus-on-islamic-state-khorasan'>report on ISKP’s Moscow attack</a></li><li>TAT analysis: <a href='https://techagainstterrorism.org/news/after-the-taliban-takeover-how-islamic-state-khorasan-are-exploiting-the-online-ecosystem-and-projecting-the-threat'>After the Taliban Takeover: How Islamic State-Khorasan Are Exploiting the Online Ecosystem and Projecting the Threat</a></li><li>TAT podcast: <a href='https://tech-against-terrorism-podcast.podcastpage.io/episode/islamic-state-khorasan-is-k-a-growing-threat'>Islamic State Khorasan (IS-K): A Growing Threat</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/14777447-media-jihad-islamic-state-s-resurgent-propaganda-network.mp3" length="28382836" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14777447</guid>
    <pubDate>Thu, 28 Mar 2024 01:00:00 +0000</pubDate>
    <itunes:duration>2339</itunes:duration>
    <itunes:keywords>terrorism, counterterrorism, jihad, extremism, extremist, islamist, IS</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>God, Guns and Sedition: Far-Right Terrorism in America</itunes:title>
    <title>God, Guns and Sedition: Far-Right Terrorism in America</title>
    <itunes:summary><![CDATA[In this week’s episode, we look at how the far-right threat has intersected with their exploitation of technology over the past 40 years or so. We trace the far-right's experimentation with technology back to white supremacists in 1980s America, discuss the revolutionary effect of social media on far-right terrorism , and explore the risks of violence in the upcoming US elections. This time, Archie Macfarlane is joined by Bruce Hoffman, senior fellow for counterterrorism and homeland security...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we look at how the far-right threat has intersected with their exploitation of technology over the past 40 years or so. We trace the far-right&apos;s experimentation with technology back to white supremacists in 1980s America, discuss the revolutionary effect of social media on far-right terrorism , and explore the risks of violence in the upcoming US elections.</p><p>This time, Archie Macfarlane is joined by <a href='https://www.cfr.org/expert/bruce-hoffman'>Bruce Hoffman</a>, senior fellow for counterterrorism and homeland security at the Council on Foreign Relations, and <a href='https://www.cfr.org/expert/jacob-ware'>Jacob Ware</a>, a research fellow at the Council of Foreign Relations. The episode explores their new book <em>God, Guns and Sedition: Far-Right Terrorism in America, </em>which traces the history of the far-right extremist movement in the US and how to counter it.<br/><br/></p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/U6aQu384Hwd'>here</a>. <br/><br/></p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. <br/><br/></p><p>Resources:</p><ul><li><a href='https://cup.columbia.edu/book/god-guns-and-sedition/9780231558808'>God, Guns and Sedition: Far-Right Terrorism in America</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we look at how the far-right threat has intersected with their exploitation of technology over the past 40 years or so. We trace the far-right&apos;s experimentation with technology back to white supremacists in 1980s America, discuss the revolutionary effect of social media on far-right terrorism , and explore the risks of violence in the upcoming US elections.</p><p>This time, Archie Macfarlane is joined by <a href='https://www.cfr.org/expert/bruce-hoffman'>Bruce Hoffman</a>, senior fellow for counterterrorism and homeland security at the Council on Foreign Relations, and <a href='https://www.cfr.org/expert/jacob-ware'>Jacob Ware</a>, a research fellow at the Council of Foreign Relations. The episode explores their new book <em>God, Guns and Sedition: Far-Right Terrorism in America, </em>which traces the history of the far-right extremist movement in the US and how to counter it.<br/><br/></p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/U6aQu384Hwd'>here</a>. <br/><br/></p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. <br/><br/></p><p>Resources:</p><ul><li><a href='https://cup.columbia.edu/book/god-guns-and-sedition/9780231558808'>God, Guns and Sedition: Far-Right Terrorism in America</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/14668696-god-guns-and-sedition-far-right-terrorism-in-america.mp3" length="28303477" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14668696</guid>
    <pubDate>Thu, 14 Mar 2024 01:00:00 +0000</pubDate>
    <itunes:duration>2336</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>34</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How has the Online Dissemination of Jihadist Propaganda Evolved?</itunes:title>
    <title>How has the Online Dissemination of Jihadist Propaganda Evolved?</title>
    <itunes:summary><![CDATA[In this week’s episode, we’re revisiting how Islamist terrorist groups disseminate propaganda online. We look at the tactics these groups use to ensure their propaganda remains online and reaches as wide an audience as possible. And we find out how platforms are fighting back.   Join Archie Macfarlane as he speaks with Dr. Stuart Macdonald, professor of law at Swansea University and Director of the University’s Cyber Threats Research Centre (CYTREC), and Sean McCafferty, a researcher and OSIN...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we’re revisiting how Islamist terrorist groups disseminate propaganda online. We look at the tactics these groups use to ensure their propaganda remains online and reaches as wide an audience as possible. And we find out how platforms are fighting back. <br/><br/>Join Archie Macfarlane as he speaks with <a href='https://www.swansea.ac.uk/staff/s.macdonald/'>Dr. Stuart Macdonald</a>, professor of law at Swansea University and Director of the University’s Cyber Threats Research Centre (CYTREC), and <a href='https://twitter.com/seanrmccafferty?lang=en'>Sean McCafferty</a>, a researcher and OSINT analyst at Dublin City University.<br/><br/>Stuart and Sean have co-authored a report on the state of &apos;Online Jihadist Propaganda dissemination.&apos; Their research provides insights into the characteristics of online terrorist ecosystems, the adaptive tactics employed by these entities in reaction to moderation, and presents recommendations for both tech platforms and policymakers.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/LnRmOlvd7ig'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>.<br/>Resources:</p><ul><li><em>Online Jihadist Propaganda dissemination </em>report (COMING SOON)</li><li><a href='https://pod.link/1481039245/episode/52547e7a64cdd8150b78e78630e542b1'>Tech Against Terrorism: Ethics of Content Moderation</a></li><li><a href='https://tech-against-terrorism-podcast.podcastpage.io/episode/combating-terrorist-use-of-file-sharing'>Tech Against Terrorism Podcast: Combating Terrorist Use of File-Sharing</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we’re revisiting how Islamist terrorist groups disseminate propaganda online. We look at the tactics these groups use to ensure their propaganda remains online and reaches as wide an audience as possible. And we find out how platforms are fighting back. <br/><br/>Join Archie Macfarlane as he speaks with <a href='https://www.swansea.ac.uk/staff/s.macdonald/'>Dr. Stuart Macdonald</a>, professor of law at Swansea University and Director of the University’s Cyber Threats Research Centre (CYTREC), and <a href='https://twitter.com/seanrmccafferty?lang=en'>Sean McCafferty</a>, a researcher and OSINT analyst at Dublin City University.<br/><br/>Stuart and Sean have co-authored a report on the state of &apos;Online Jihadist Propaganda dissemination.&apos; Their research provides insights into the characteristics of online terrorist ecosystems, the adaptive tactics employed by these entities in reaction to moderation, and presents recommendations for both tech platforms and policymakers.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/LnRmOlvd7ig'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>.<br/>Resources:</p><ul><li><em>Online Jihadist Propaganda dissemination </em>report (COMING SOON)</li><li><a href='https://pod.link/1481039245/episode/52547e7a64cdd8150b78e78630e542b1'>Tech Against Terrorism: Ethics of Content Moderation</a></li><li><a href='https://tech-against-terrorism-podcast.podcastpage.io/episode/combating-terrorist-use-of-file-sharing'>Tech Against Terrorism Podcast: Combating Terrorist Use of File-Sharing</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/14584782-how-has-the-online-dissemination-of-jihadist-propaganda-evolved.mp3" length="21139108" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14584782</guid>
    <pubDate>Thu, 29 Feb 2024 01:00:00 +0000</pubDate>
    <itunes:duration>1746</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What is White Jihadism?</itunes:title>
    <title>What is White Jihadism?</title>
    <itunes:summary><![CDATA[In this week’s episode, we investigate the term ‘White Jihad,’ the seemingly paradoxical interaction between white supremacy and Jihadism online. We ask how this loose online community emerged, who it attracts, and what can be done to counter it.    Join Archie Macfarlane as he speaks with Dr. Federico Borgonovo, a research-analyst at ITSTIME, the Italian Team for Security Terroristic Issues and Managing Emergencies, at the Catholic University of Sacred Heart, in Milan.   You can read a ...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we investigate the term ‘White Jihad,’ the seemingly paradoxical interaction between white supremacy and Jihadism online. We ask how this loose online community emerged, who it attracts, and what can be done to counter it. </p><p><br/></p><p>Join Archie Macfarlane as he speaks with <a href='https://www.rusi.org/people/borgonovo'>Dr. Federico Borgonovo</a>, a research-analyst at ITSTIME, the Italian Team for Security Terroristic Issues and Managing Emergencies, at the Catholic University of Sacred Heart, in Milan.</p><p><br/></p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/QQ5hdRQIOWN'>here</a>. </p><p><br/></p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p><br/></p><p>Resources:</p><ul><li>ITSTIME <a href='https://www.itstime.it/w/'>website</a></li><li><a href='https://www.sicurezzaterrorismosocieta.it/wp-content/uploads/2023/06/SicTerSoc_17-2023-6_Rizieri-Borgonovo_SicTerSoc-17_2023-1.pdf'>Exploring the Whitejihad Digital Ecosystem</a> - F.Borgonovo &amp; S.R.Lucini</li><li>Tech Against Terrorism Europe (TATE) <a href='https://tate.techagainstterrorism.org/'>website</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we investigate the term ‘White Jihad,’ the seemingly paradoxical interaction between white supremacy and Jihadism online. We ask how this loose online community emerged, who it attracts, and what can be done to counter it. </p><p><br/></p><p>Join Archie Macfarlane as he speaks with <a href='https://www.rusi.org/people/borgonovo'>Dr. Federico Borgonovo</a>, a research-analyst at ITSTIME, the Italian Team for Security Terroristic Issues and Managing Emergencies, at the Catholic University of Sacred Heart, in Milan.</p><p><br/></p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/QQ5hdRQIOWN'>here</a>. </p><p><br/></p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>X</a>, where you can find resources on this topic. </p><p><br/></p><p>Resources:</p><ul><li>ITSTIME <a href='https://www.itstime.it/w/'>website</a></li><li><a href='https://www.sicurezzaterrorismosocieta.it/wp-content/uploads/2023/06/SicTerSoc_17-2023-6_Rizieri-Borgonovo_SicTerSoc-17_2023-1.pdf'>Exploring the Whitejihad Digital Ecosystem</a> - F.Borgonovo &amp; S.R.Lucini</li><li>Tech Against Terrorism Europe (TATE) <a href='https://tate.techagainstterrorism.org/'>website</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/14503251-what-is-white-jihadism.mp3" length="15587068" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14503251</guid>
    <pubDate>Thu, 15 Feb 2024 01:00:00 +0000</pubDate>
    <itunes:duration>1276</itunes:duration>
    <itunes:keywords>terrorism, counterterrorism, jihad, far-right, extremism, extremist</itunes:keywords>
    <itunes:episode>32</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why Media Reporting on Terrorism Matters</itunes:title>
    <title>Why Media Reporting on Terrorism Matters</title>
    <itunes:summary><![CDATA[In this week’s episode, we ask why media reporting on terrorism matters, discussing the research on media coverage of terrorist attacks and suicides, the potentially harmful effects on society, and what guidelines can be put in place to ensure more responsible media reporting, including on social media.  Join Archie Macfarlane as he speaks with Dr. Brigitte Naderer, Prof. Thomas Niederkrotenthaler and Dr. Benedikt Till from the Medical University of Vienna.  You can read a transcript of this ...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we ask why media reporting on terrorism matters, discussing the research on media coverage of terrorist attacks and suicides, the potentially harmful effects on society, and what guidelines can be put in place to ensure more responsible media reporting, including on social media.<br/><br/>Join Archie Macfarlane as he speaks with <a href='https://www.researchgate.net/profile/Brigitte-Naderer'>Dr. Brigitte Naderer</a>, <a href='https://www.meduniwien.ac.at/web/forschung/researcher-profiles/researcher-profiles/index.php?id=688&amp;res_id=489&amp;name=Thomas_Niederkrotenthaler'>Prof. Thomas Niederkrotenthaler</a> and <a href='https://www.meduniwien.ac.at/web/en/forschung/researcher-profiles/researcher-profiles/detail/?res=benedikt_till&amp;cHash=1ee2942dda63dd8c061ddd22c6fe8632'>Dr. Benedikt Till</a> from the Medical University of Vienna.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/bIzMKXRQtGB'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. <br/><br/>Resources:<br/><br/></p><ul><li><a href='https://onlinelibrary.wiley.com/doi/full/10.1111/sltb.12636'>Short-Term Effects of Media Reports on Terrorism That Are Consistent vs. Not Consistent with Media Recommendations on Mass Shootings: A Randomized Controlled Trial</a></li><li><a href='https://www.reportingonmassshootings.org/'>Recommendations for Reporting on Mass Shootings</a></li><li>Tech Against Terrorism Europe (TATE) <a href='https://tate.techagainstterrorism.org/'>website</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we ask why media reporting on terrorism matters, discussing the research on media coverage of terrorist attacks and suicides, the potentially harmful effects on society, and what guidelines can be put in place to ensure more responsible media reporting, including on social media.<br/><br/>Join Archie Macfarlane as he speaks with <a href='https://www.researchgate.net/profile/Brigitte-Naderer'>Dr. Brigitte Naderer</a>, <a href='https://www.meduniwien.ac.at/web/forschung/researcher-profiles/researcher-profiles/index.php?id=688&amp;res_id=489&amp;name=Thomas_Niederkrotenthaler'>Prof. Thomas Niederkrotenthaler</a> and <a href='https://www.meduniwien.ac.at/web/en/forschung/researcher-profiles/researcher-profiles/detail/?res=benedikt_till&amp;cHash=1ee2942dda63dd8c061ddd22c6fe8632'>Dr. Benedikt Till</a> from the Medical University of Vienna.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/bIzMKXRQtGB'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. <br/><br/>Resources:<br/><br/></p><ul><li><a href='https://onlinelibrary.wiley.com/doi/full/10.1111/sltb.12636'>Short-Term Effects of Media Reports on Terrorism That Are Consistent vs. Not Consistent with Media Recommendations on Mass Shootings: A Randomized Controlled Trial</a></li><li><a href='https://www.reportingonmassshootings.org/'>Recommendations for Reporting on Mass Shootings</a></li><li>Tech Against Terrorism Europe (TATE) <a href='https://tate.techagainstterrorism.org/'>website</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/14330089-why-media-reporting-on-terrorism-matters.mp3" length="24088125" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14330089</guid>
    <pubDate>Thu, 18 Jan 2024 01:00:00 +0000</pubDate>
    <itunes:duration>2004</itunes:duration>
    <itunes:keywords>Counterterrorism, terrorism, suicide, papageno, conflict, extremism, extremist, far-right</itunes:keywords>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why is the Great Replacement Theory so Dangerous?</itunes:title>
    <title>Why is the Great Replacement Theory so Dangerous?</title>
    <itunes:summary><![CDATA[In this week’s episode, we discuss the Great Replacement Theory (GRT), a conspiracy theory which asserts that there is an orchestrated plan to replace native European and North American populations with non-white immigrants. We unpack why this narrative has become central to the worldview of the global far-right, how it has spread online; and to what extent these beliefs have infilitrated the mainstream.  Join Archie Macfarlane as he speaks with Jacob Davey, the Head of Research &amp; Policy ...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we discuss the Great Replacement Theory (GRT), a conspiracy theory which asserts that there is an orchestrated plan to replace native European and North American populations with non-white immigrants. We unpack why this narrative has become central to the worldview of the global far-right, how it has spread online; and to what extent these beliefs have infilitrated the mainstream.<br/><br/>Join Archie Macfarlane as he speaks with <a href='https://twitter.com/jacob_p_davey?lang=en-GB'>Jacob Davey</a>, the Head of Research &amp; Policy for Far-right and Hate Movements at the <a href='https://www.isdglobal.org/'>Institute for Strategic Dialogue</a>. Jacob’s work involves mapping far-right extremism and the development of new tools for tracking hate speech globally.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/AVDdiLg7dcE'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we discuss the Great Replacement Theory (GRT), a conspiracy theory which asserts that there is an orchestrated plan to replace native European and North American populations with non-white immigrants. We unpack why this narrative has become central to the worldview of the global far-right, how it has spread online; and to what extent these beliefs have infilitrated the mainstream.<br/><br/>Join Archie Macfarlane as he speaks with <a href='https://twitter.com/jacob_p_davey?lang=en-GB'>Jacob Davey</a>, the Head of Research &amp; Policy for Far-right and Hate Movements at the <a href='https://www.isdglobal.org/'>Institute for Strategic Dialogue</a>. Jacob’s work involves mapping far-right extremism and the development of new tools for tracking hate speech globally.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/AVDdiLg7dcE'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/14141630-why-is-the-great-replacement-theory-so-dangerous.mp3" length="14823919" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14141630</guid>
    <pubDate>Thu, 14 Dec 2023 01:00:00 +0000</pubDate>
    <itunes:duration>1232</itunes:duration>
    <itunes:keywords>terrorism, conspiracy theory, great replacement, immigration</itunes:keywords>
    <itunes:episode>30</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Ethics of Content Moderation: Who Should Decide What We Say Online?</itunes:title>
    <title>The Ethics of Content Moderation: Who Should Decide What We Say Online?</title>
    <itunes:summary><![CDATA[In this week's episode, we discuss the challenges and complexities of content moderation in the online space, asking who gets to decide what we say online and why. We situate this debate in the context of tech platforms facing ever-increasing pressure to moderate content that is considered harmful or otherwise undesirable.   We delve into the mechanics of how content is moderated, focusing on the evolving roles and responsibilities of tech companies and governments in determining acceptable c...]]></itunes:summary>
    <description><![CDATA[<p>In this week&apos;s episode, we discuss the challenges and complexities of content moderation in the online space, asking who gets to decide what we say online and why. We situate this debate in the context of tech platforms facing ever-increasing pressure to moderate content that is considered harmful or otherwise undesirable. <br/><br/>We delve into the mechanics of how content is moderated, focusing on the evolving roles and responsibilities of tech companies and governments in determining acceptable content. Decisions to deplatform individuals or groups, even when their content is not explicitly illegal, raise questions about the legitimacy of tech companies as arbiters of public dialogue. <br/><br/>Join Archie Macfarlane as he speaks with <a href='https://twitter.com/reed_alastair?lang=en'>Alastair Reed</a>, Associate Professor at the <a href='https://www.swansea.ac.uk/law/cytrec/'>Cyber Threats Research Centre (CYTREC)</a> at Swansea University and former Director of the <a href='https://www.icct.nl/'>International Centre for Counter-Terrorism (ICCT)</a> in the Hague. <br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/XesM226lMSL'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>In this week&apos;s episode, we discuss the challenges and complexities of content moderation in the online space, asking who gets to decide what we say online and why. We situate this debate in the context of tech platforms facing ever-increasing pressure to moderate content that is considered harmful or otherwise undesirable. <br/><br/>We delve into the mechanics of how content is moderated, focusing on the evolving roles and responsibilities of tech companies and governments in determining acceptable content. Decisions to deplatform individuals or groups, even when their content is not explicitly illegal, raise questions about the legitimacy of tech companies as arbiters of public dialogue. <br/><br/>Join Archie Macfarlane as he speaks with <a href='https://twitter.com/reed_alastair?lang=en'>Alastair Reed</a>, Associate Professor at the <a href='https://www.swansea.ac.uk/law/cytrec/'>Cyber Threats Research Centre (CYTREC)</a> at Swansea University and former Director of the <a href='https://www.icct.nl/'>International Centre for Counter-Terrorism (ICCT)</a> in the Hague. <br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/XesM226lMSL'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/14056708-the-ethics-of-content-moderation-who-should-decide-what-we-say-online.mp3" length="19927656" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14056708</guid>
    <pubDate>Thu, 30 Nov 2023 01:00:00 +0000</pubDate>
    <itunes:duration>1657</itunes:duration>
    <itunes:keywords>online, facebook, ethics, content moderation, social media, censorship, freedom of speech, freedom of expression, Mark Zuckerberg</itunes:keywords>
    <itunes:episode>29</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Nordic Extremism</itunes:title>
    <title>Nordic Extremism</title>
    <itunes:summary><![CDATA[In this week’s episode, we discuss the state of extremism in the Nordic region. We focus on Sweden as the long-term epicentre of regional far-right extremism, and explore the Nordic Resistance Movement’s (NRM) evolution. We also discuss the role of online platforms in amplifying NRM’s reach and radicalising supporters to violence and what can be done to counter this.   Join Archie Macfarlane as he speaks with Morgan Finnsiö, a journalist, researcher and educator at the anti-racist foundation ...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we discuss the state of extremism in the Nordic region. We focus on Sweden as the long-term epicentre of regional far-right extremism, and explore the Nordic Resistance Movement’s (NRM) evolution. We also discuss the role of online platforms in amplifying NRM’s reach and radicalising supporters to violence and what can be done to counter this. <br/><br/>Join Archie Macfarlane as he speaks with <a href='https://expo.se/profil/morgan-finnsi%C3%B6'>Morgan Finnsiö</a>, a journalist, researcher and educator at the anti-racist foundation <a href='https://expo.se/'>Expo</a>, which aims to defend democratic society against the threat posed by racism.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/Q06En0BoZQv'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we discuss the state of extremism in the Nordic region. We focus on Sweden as the long-term epicentre of regional far-right extremism, and explore the Nordic Resistance Movement’s (NRM) evolution. We also discuss the role of online platforms in amplifying NRM’s reach and radicalising supporters to violence and what can be done to counter this. <br/><br/>Join Archie Macfarlane as he speaks with <a href='https://expo.se/profil/morgan-finnsi%C3%B6'>Morgan Finnsiö</a>, a journalist, researcher and educator at the anti-racist foundation <a href='https://expo.se/'>Expo</a>, which aims to defend democratic society against the threat posed by racism.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/Q06En0BoZQv'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/13977854-nordic-extremism.mp3" length="21564427" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13977854</guid>
    <pubDate>Thu, 16 Nov 2023 01:00:00 +0000</pubDate>
    <itunes:duration>1793</itunes:duration>
    <itunes:keywords>terrorism, counterterrorism, extremism, nrm, nordic resistance movement, scandinavia, sweden, norway, far-right, nazi</itunes:keywords>
    <itunes:episode>28</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Extremist Manifestos with J.M. Berger</itunes:title>
    <title>Extremist Manifestos with J.M. Berger</title>
    <itunes:summary><![CDATA[In this week’s episode, we delve into extremist manifestos and how they’ve been used by perpetrators of violent attacks to promote their ideology and inspire further violence and hatred. We cover the evolution of manifestos as a terrorist tactic, discuss different authors and styles, and focus on the role of the internet in amplifying their reach and impact.  Join Anne Craanen as she speaks to J.M. Berger,  a Senior Research Fellow for the Center on Terrorism, Extremism, and Counterterro...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we delve into extremist manifestos and how they’ve been used by perpetrators of violent attacks to promote their ideology and inspire further violence and hatred. We cover the evolution of manifestos as a terrorist tactic, discuss different authors and styles, and focus on the role of the internet in amplifying their reach and impact.<br/><br/>Join Anne Craanen as she speaks to <a href='https://www.middlebury.edu/institute/people/jm-berger'>J.M. Berger</a>,  a Senior Research Fellow for the Center on Terrorism, Extremism, and Counterterrorism at the Middlebury Institute of International Studies, the author of four critically acclaimed books, and a research and policy consultant to tech companies and U.S. government agencies.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/zB6o0AfW14b'>here</a>. <b> </b><br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we delve into extremist manifestos and how they’ve been used by perpetrators of violent attacks to promote their ideology and inspire further violence and hatred. We cover the evolution of manifestos as a terrorist tactic, discuss different authors and styles, and focus on the role of the internet in amplifying their reach and impact.<br/><br/>Join Anne Craanen as she speaks to <a href='https://www.middlebury.edu/institute/people/jm-berger'>J.M. Berger</a>,  a Senior Research Fellow for the Center on Terrorism, Extremism, and Counterterrorism at the Middlebury Institute of International Studies, the author of four critically acclaimed books, and a research and policy consultant to tech companies and U.S. government agencies.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/zB6o0AfW14b'>here</a>. <b> </b><br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/13888957-extremist-manifestos-with-j-m-berger.mp3" length="15271166" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13888957</guid>
    <pubDate>Thu, 02 Nov 2023 01:00:00 +0000</pubDate>
    <itunes:duration>1269</itunes:duration>
    <itunes:keywords>Counterterrorism, J.M. Berger, manifesto, conflict, war, terrorist, terrorism, extremism, extremist, unabomber</itunes:keywords>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Power of Conspiracies</itunes:title>
    <title>The Power of Conspiracies</title>
    <itunes:summary><![CDATA[This week’s episode explores conspiracy theories, and their potency as tools of persuasion. We examine how conspiratorial narratives are common across extremist propaganda throughout history and their role in justifying and motivating violence towards certain groups. We also discuss how the internet has influenced the narrative power of conspiracies and consider the challenges AI and Large Language Models (LLM) present for tackling extreme conspiracies online.    Join Anne Craanen as she...]]></itunes:summary>
    <description><![CDATA[<p>This week’s episode explores conspiracy theories, and their potency as tools of persuasion. We examine how conspiratorial narratives are common across extremist propaganda throughout history and their role in justifying and motivating violence towards certain groups. We also discuss how the internet has influenced the narrative power of conspiracies and consider the challenges AI and Large Language Models (LLM) present for tackling extreme conspiracies online.  <br/><br/>Join Anne Craanen as she speaks to <a href='https://stephanebaele.wordpress.com/'>Dr Stephane Baele</a>, Professor of International Relations at UCLouvain (Belgium), and Honorary Associate Professor of Security &amp; Political Violence at the University of Exeter, UK.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/q48MhOCyQUq'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic.</p>]]></description>
    <content:encoded><![CDATA[<p>This week’s episode explores conspiracy theories, and their potency as tools of persuasion. We examine how conspiratorial narratives are common across extremist propaganda throughout history and their role in justifying and motivating violence towards certain groups. We also discuss how the internet has influenced the narrative power of conspiracies and consider the challenges AI and Large Language Models (LLM) present for tackling extreme conspiracies online.  <br/><br/>Join Anne Craanen as she speaks to <a href='https://stephanebaele.wordpress.com/'>Dr Stephane Baele</a>, Professor of International Relations at UCLouvain (Belgium), and Honorary Associate Professor of Security &amp; Political Violence at the University of Exeter, UK.<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/q48MhOCyQUq'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/13802233-the-power-of-conspiracies.mp3" length="21915979" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13802233</guid>
    <pubDate>Thu, 19 Oct 2023 01:00:00 +0100</pubDate>
    <itunes:duration>1823</itunes:duration>
    <itunes:keywords>Counterterrorism, conspiracy, conspiracies, conspiracy theories, conflict, war, terrorist, terrorism, deepfake, extremism, extremist, propaganda, politics, political violence</itunes:keywords>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What is the #tradwives Movement?</itunes:title>
    <title>What is the #tradwives Movement?</title>
    <itunes:summary><![CDATA[This week’s episode focuses on the ways in which gender identity is discussed and expressed within different segments of the online far-right. We investigate the #tradwives movement - a social media trend used by far-right supporters to promote traditional gender roles, discuss its ideological roots, and consider the challenges for moderating such content. Join Anne Craanen as she speaks to Ninian Frenguelli, a PhD candidate at Swansea University studying gender in the online extreme right. Y...]]></itunes:summary>
    <description><![CDATA[<p>This week’s episode focuses on the ways in which gender identity is discussed and expressed within different segments of the online far-right. We investigate the #tradwives movement - a social media trend used by far-right supporters to promote traditional gender roles, discuss its ideological roots, and consider the challenges for moderating such content.</p><p>Join Anne Craanen as she speaks to <a href='https://walesdtp.ac.uk/profile/frenguelli-non/'>Ninian Frenguelli</a>, a PhD candidate at Swansea University studying gender in the online extreme right.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/Zpfn9j1lvv2'>here</a>.</p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>This week’s episode focuses on the ways in which gender identity is discussed and expressed within different segments of the online far-right. We investigate the #tradwives movement - a social media trend used by far-right supporters to promote traditional gender roles, discuss its ideological roots, and consider the challenges for moderating such content.</p><p>Join Anne Craanen as she speaks to <a href='https://walesdtp.ac.uk/profile/frenguelli-non/'>Ninian Frenguelli</a>, a PhD candidate at Swansea University studying gender in the online extreme right.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/Zpfn9j1lvv2'>here</a>.</p><p>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/13708275-what-is-the-tradwives-movement.mp3" length="15178319" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13708275</guid>
    <pubDate>Thu, 05 Oct 2023 00:00:00 +0100</pubDate>
    <itunes:duration>1260</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, tradwives, moderation, safety, online, social media, extremism, Facebook</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Islamic State Khorasan (IS-K): A Growing Threat?</itunes:title>
    <title>Islamic State Khorasan (IS-K): A Growing Threat?</title>
    <itunes:summary><![CDATA[This week’s episode focuses on Islamic State Khorasan Province (IS-K), a regional affiliate of Islamic State primarily active in Afghanistan and Pakistan. We discuss the group in the context of the Taliban takeover two years ago, assessing the threat posed by the group to the region and to the West. We also focus on IS-K’s online activity and the increasingly prominent role the affiliate plays in IS propaganda, recruitment, and operational output.  Join Anne Craanen as she speaks to two membe...]]></itunes:summary>
    <description><![CDATA[<p>This week’s episode focuses on Islamic State Khorasan Province (IS-K), a regional affiliate of Islamic State primarily active in Afghanistan and Pakistan. We discuss the group in the context of the Taliban takeover two years ago, assessing the threat posed by the group to the region and to the West. We also focus on IS-K’s online activity and the increasingly prominent role the affiliate plays in IS propaganda, recruitment, and operational output.<br/><br/>Join Anne Craanen as she speaks to two members of the Tech Against Terrorism Open Source-Intelligence (OSINT) team: Arthur Bradley, the OSINT Manager with a background in security intelligence and specific expertise on terrorist propaganda, and Louise Meloy, an OSINT analyst who has previously worked for the EU Commission and NATO on security policy as well as in the private sector as an intel analyst. <br/><br/>TAT analysis: <a href='https://www.techagainstterrorism.org/2023/08/24/after-the-taliban-takeover-how-islamic-state-khorasan-are-exploiting-the-online-ecosystem-and-projecting-the-threat/'>After the Taliban Takeover: How Islamic State-Khorasan Are Exploiting the Online Ecosystem and Projecting the Threat</a><br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/IzGKZKulwfR'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>This week’s episode focuses on Islamic State Khorasan Province (IS-K), a regional affiliate of Islamic State primarily active in Afghanistan and Pakistan. We discuss the group in the context of the Taliban takeover two years ago, assessing the threat posed by the group to the region and to the West. We also focus on IS-K’s online activity and the increasingly prominent role the affiliate plays in IS propaganda, recruitment, and operational output.<br/><br/>Join Anne Craanen as she speaks to two members of the Tech Against Terrorism Open Source-Intelligence (OSINT) team: Arthur Bradley, the OSINT Manager with a background in security intelligence and specific expertise on terrorist propaganda, and Louise Meloy, an OSINT analyst who has previously worked for the EU Commission and NATO on security policy as well as in the private sector as an intel analyst. <br/><br/>TAT analysis: <a href='https://www.techagainstterrorism.org/2023/08/24/after-the-taliban-takeover-how-islamic-state-khorasan-are-exploiting-the-online-ecosystem-and-projecting-the-threat/'>After the Taliban Takeover: How Islamic State-Khorasan Are Exploiting the Online Ecosystem and Projecting the Threat</a><br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/IzGKZKulwfR'>here</a>. <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/13627375-islamic-state-khorasan-is-k-a-growing-threat.mp3" length="16670614" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13627375</guid>
    <pubDate>Thu, 21 Sep 2023 01:00:00 +0100</pubDate>
    <itunes:duration>1385</itunes:duration>
    <itunes:keywords>Counterterrorism, ISIS, IS-K, Islamic State, Taliban, Afghanistan, Terrorist, Terrorism</itunes:keywords>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Institutionalising Counterterrorism Practitioner Welfare</itunes:title>
    <title>Institutionalising Counterterrorism Practitioner Welfare</title>
    <itunes:summary><![CDATA[This week, we're discussing the unique psychological risks that exist for those working in the field of online counterterrorism. We provide practical guidance for identifying, understanding and combating trauma and other mental health issues associated with exposure to terrorist material, and explore the roles and responsibilities of both practitioner and organisation in mitigating these impacts to welfare. Join Anne Craanen as she speaks to Stevie Voogt, Director of People &amp; Culture at M...]]></itunes:summary>
    <description><![CDATA[<p>This week, we&apos;re discussing the unique psychological risks that exist for those working in the field of online counterterrorism. We provide practical guidance for identifying, understanding and combating trauma and other mental health issues associated with exposure to terrorist material, and explore the roles and responsibilities of both practitioner and organisation in mitigating these impacts to welfare.</p><p>Join <a href='https://twitter.com/CraanenAnne'>Anne Craanen</a> as she speaks to <a href='https://www.linkedin.com/in/stevie-voogt-31b20340/'>Stevie Voogt</a>, Director of People &amp; Culture at Moonshot, a social enterprise working to end online harms. And <a href='https://www.linkedin.com/in/fiona-dunkley/'>Fiona Dunkley</a>, a consultant senior psychotherapist, author and founder of <a href='https://fdconsultants.net/revive-your-mind/?gclid=Cj0KCQjwxuCnBhDLARIsAB-cq1raeLJrWpoH7WUjXP0X10SDjCSa9FFOzdjqyvzGXvbZT3t1Xg2mQdMaAu_fEALw_wcB'>FD Consultants</a>, a network of trauma specialist therapists offering psychosocial support to people exposed to traumatic material in their work.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/cKjepWVN45u'>here</a>. </p><p>Resources:</p><ul><li><a href='https://gnet-research.org/wp-content/uploads/2023/05/GNET-Infographic-May-2023-2-4.pdf'>Strategies for Researchers Analysing Terrorist and Violent Extremist Content (TVEC)</a></li><li><a href='https://www.voxpol.eu/researcher-welfare-2-wellbeing/'>Resource list on researcher welfare</a></li><li><a href='https://fdconsultants.net/vicarious-trauma-support/'>Protecting Your Mental Health: Vicarious Trauma Support</a></li><li><a href='https://fdconsultants.net/3-stages-of-support/'>Exposure to Traumatic Material: 3 Stages of Support</a></li><li><a href='https://fdconsultants.net/protecting-staff-from-vicarious-trauma/'>Protecting Staff from Vicarious Trauma</a> </li></ul><p>If you want to find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>This week, we&apos;re discussing the unique psychological risks that exist for those working in the field of online counterterrorism. We provide practical guidance for identifying, understanding and combating trauma and other mental health issues associated with exposure to terrorist material, and explore the roles and responsibilities of both practitioner and organisation in mitigating these impacts to welfare.</p><p>Join <a href='https://twitter.com/CraanenAnne'>Anne Craanen</a> as she speaks to <a href='https://www.linkedin.com/in/stevie-voogt-31b20340/'>Stevie Voogt</a>, Director of People &amp; Culture at Moonshot, a social enterprise working to end online harms. And <a href='https://www.linkedin.com/in/fiona-dunkley/'>Fiona Dunkley</a>, a consultant senior psychotherapist, author and founder of <a href='https://fdconsultants.net/revive-your-mind/?gclid=Cj0KCQjwxuCnBhDLARIsAB-cq1raeLJrWpoH7WUjXP0X10SDjCSa9FFOzdjqyvzGXvbZT3t1Xg2mQdMaAu_fEALw_wcB'>FD Consultants</a>, a network of trauma specialist therapists offering psychosocial support to people exposed to traumatic material in their work.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/cKjepWVN45u'>here</a>. </p><p>Resources:</p><ul><li><a href='https://gnet-research.org/wp-content/uploads/2023/05/GNET-Infographic-May-2023-2-4.pdf'>Strategies for Researchers Analysing Terrorist and Violent Extremist Content (TVEC)</a></li><li><a href='https://www.voxpol.eu/researcher-welfare-2-wellbeing/'>Resource list on researcher welfare</a></li><li><a href='https://fdconsultants.net/vicarious-trauma-support/'>Protecting Your Mental Health: Vicarious Trauma Support</a></li><li><a href='https://fdconsultants.net/3-stages-of-support/'>Exposure to Traumatic Material: 3 Stages of Support</a></li><li><a href='https://fdconsultants.net/protecting-staff-from-vicarious-trauma/'>Protecting Staff from Vicarious Trauma</a> </li></ul><p>If you want to find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/13541258-institutionalising-counterterrorism-practitioner-welfare.mp3" length="21179036" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13541258</guid>
    <pubDate>Thu, 07 Sep 2023 01:00:00 +0100</pubDate>
    <itunes:duration>1761</itunes:duration>
    <itunes:keywords>mental health, practitioner welfare, counterterrorism, wellbeing, human rights, trauma, therapy</itunes:keywords>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Islamic State Online: Emerging Trends and Tactics</itunes:title>
    <title>Islamic State Online: Emerging Trends and Tactics</title>
    <itunes:summary><![CDATA[This week, we're investigating the online activity of Islamic State (IS), an Islamist terrorist organisation renowned for its highly sophisticated media strategy and exploitation of the internet to disseminate its propaganda and recruit members.  We'll be examining how IS and its supporter networks have evolved in their use of the internet, what platforms and technologies they exploit, and the techniques they use to avoid tech platform moderation. We’ll also touch on the work being carri...]]></itunes:summary>
    <description><![CDATA[<p>This week, we&apos;re investigating the online activity of Islamic State (IS), an Islamist terrorist organisation renowned for its highly sophisticated media strategy and exploitation of the internet to disseminate its propaganda and recruit members. </p><p>We&apos;ll be examining how IS and its supporter networks have evolved in their use of the internet, what platforms and technologies they exploit, and the techniques they use to avoid tech platform moderation. We’ll also touch on the work being carried out by Tech Against Terrorism to monitor and combat the group’s online activities.</p><p>Join <a href='https://twitter.com/CraanenAnne'>Anne Craanen</a> as she speaks to <a href='https://www.hudson.org/experts/meili-criezis'>Meili Criezis</a>, a Graduate Fellow at the Polarization and Extremism Research and Innovation Lab (PERIL), and <a href='https://www.linkedin.com/in/specialtytape/'>Raphael Gluck</a>, Co-Founder of JihadOScope, an organisation that monitors Jihadist activity across the internet.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/mJWnagjPQBd'>here</a>. </p><p>You can find Tech Against Terrorism’s ‘State of Play: Trends in Terrorist and Violent Extremist Use of the Internet 2022’ report <a href='https://www.techagainstterrorism.org/wp-content/uploads/2023/01/FINAL-State-of-Play-2022-TAT.pdf'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>This week, we&apos;re investigating the online activity of Islamic State (IS), an Islamist terrorist organisation renowned for its highly sophisticated media strategy and exploitation of the internet to disseminate its propaganda and recruit members. </p><p>We&apos;ll be examining how IS and its supporter networks have evolved in their use of the internet, what platforms and technologies they exploit, and the techniques they use to avoid tech platform moderation. We’ll also touch on the work being carried out by Tech Against Terrorism to monitor and combat the group’s online activities.</p><p>Join <a href='https://twitter.com/CraanenAnne'>Anne Craanen</a> as she speaks to <a href='https://www.hudson.org/experts/meili-criezis'>Meili Criezis</a>, a Graduate Fellow at the Polarization and Extremism Research and Innovation Lab (PERIL), and <a href='https://www.linkedin.com/in/specialtytape/'>Raphael Gluck</a>, Co-Founder of JihadOScope, an organisation that monitors Jihadist activity across the internet.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/mJWnagjPQBd'>here</a>. </p><p>You can find Tech Against Terrorism’s ‘State of Play: Trends in Terrorist and Violent Extremist Use of the Internet 2022’ report <a href='https://www.techagainstterrorism.org/wp-content/uploads/2023/01/FINAL-State-of-Play-2022-TAT.pdf'>here</a>. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/13457640-islamic-state-online-emerging-trends-and-tactics.mp3" length="15134778" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13457640</guid>
    <pubDate>Thu, 24 Aug 2023 01:00:00 +0100</pubDate>
    <itunes:duration>1257</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tuning in to Hate: How Extremists Utilise Podcasts</itunes:title>
    <title>Tuning in to Hate: How Extremists Utilise Podcasts</title>
    <itunes:summary><![CDATA[This week, we’re investigating the use of podcasts by extremist actors, a growing and concerning trend, which, over the last decade or so, has seen extremists leveraging this medium to spread their ideology, recruit followers and network with like minded individuals.  Our expert guests expose how extremist groups and networks on the far-right have created an alternative media ecosystem that is reinforcing and normalising hateful ideologies, fringe ideas, and conspiratorial narratives. We...]]></itunes:summary>
    <description><![CDATA[<p>This week, we’re investigating the use of podcasts by extremist actors, a growing and concerning trend, which, over the last decade or so, has seen extremists leveraging this medium to spread their ideology, recruit followers and network with like minded individuals. </p><p>Our expert guests expose how extremist groups and networks on the far-right have created an alternative media ecosystem that is reinforcing and normalising hateful ideologies, fringe ideas, and conspiratorial narratives. We also discuss how the ease of creating and distributing audio content has allowed these actors to regularly produce content that reaches a global audience and the challenges in moderating this content.</p><p>Join <a href='https://twitter.com/CraanenAnne'>Anne Craanen</a> as she speaks to <a href='https://twitter.com/megansquire0?lang=en'>Dr Megan Squire</a>, Deputy Director for Data Analytics and OSINT (open source intelligence) at the Southern Poverty Law Center (SPLC), and <a href='https://twitter.com/bjornih?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Bjørn Ihler</a>, co-founder and CEO of Glitterpill and Director of the Khalifa Ihler Institute, a global peacebuilding foundation.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/jUnZhgFpZlZ'>here</a>.  </p><p>If you want to find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>This week, we’re investigating the use of podcasts by extremist actors, a growing and concerning trend, which, over the last decade or so, has seen extremists leveraging this medium to spread their ideology, recruit followers and network with like minded individuals. </p><p>Our expert guests expose how extremist groups and networks on the far-right have created an alternative media ecosystem that is reinforcing and normalising hateful ideologies, fringe ideas, and conspiratorial narratives. We also discuss how the ease of creating and distributing audio content has allowed these actors to regularly produce content that reaches a global audience and the challenges in moderating this content.</p><p>Join <a href='https://twitter.com/CraanenAnne'>Anne Craanen</a> as she speaks to <a href='https://twitter.com/megansquire0?lang=en'>Dr Megan Squire</a>, Deputy Director for Data Analytics and OSINT (open source intelligence) at the Southern Poverty Law Center (SPLC), and <a href='https://twitter.com/bjornih?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Bjørn Ihler</a>, co-founder and CEO of Glitterpill and Director of the Khalifa Ihler Institute, a global peacebuilding foundation.</p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/jUnZhgFpZlZ'>here</a>.  </p><p>If you want to find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/13376297-tuning-in-to-hate-how-extremists-utilise-podcasts.mp3" length="24503328" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13376297</guid>
    <pubDate>Thu, 10 Aug 2023 01:00:00 +0100</pubDate>
    <itunes:duration>2037</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>“Going Mainstream”: The Role of the Internet in Mainstreaming Extremist Ideas</itunes:title>
    <title>“Going Mainstream”: The Role of the Internet in Mainstreaming Extremist Ideas</title>
    <itunes:summary><![CDATA[This week, we’re exploring the role of the internet in the mainstreaming of radical ideas, which are increasingly infiltrating politics and popular culture. We also get a deeper insight into online extremist communities to understand what’s driving these ideas and how radicalisation is occurring.  Join Anne Craanen as she speaks to Dr Julia Ebner, a Senior Resident Research Fellow at the Institute for Strategic Dialogue (ISD), specialising in far-right extremism, reciprocal radicalisation, co...]]></itunes:summary>
    <description><![CDATA[<p>This week, we’re exploring the role of the internet in the mainstreaming of radical ideas, which are increasingly infiltrating politics and popular culture. We also get a deeper insight into online extremist communities to understand what’s driving these ideas and how radicalisation is occurring.<br/><br/>Join <a href='https://twitter.com/CraanenAnne'>Anne Craanen</a> as she speaks to <a href='https://www.isdglobal.org/isd_team/julia-ebner/'>Dr Julia Ebner</a>, a Senior Resident Research Fellow at the Institute for Strategic Dialogue (ISD), specialising in far-right extremism, reciprocal radicalisation, conspiracy myths and terrorism prevention. Julia is an award-winning and best-selling author of several books including:<br/><br/><a href='https://www.bloomsbury.com/uk/rage-9780755617272/'>The Rage: The Vicious Circle of Islamist and Far-Right Extremism</a><br/><br/><a href='https://www.bloomsbury.com/uk/going-dark-9781526616791/'>Going Dark: The Secret Social Lives of Extremists</a><br/><br/><a href='https://www.foyles.co.uk/book/going-mainstream/julia-ebner/9781804183151'>Going Mainstream: How Extremists are Taking Over</a><br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/UEuxvBIjOAP'>here</a>.  <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit<a href='https://www.techagainstterrorism.org/'> techagainstterrorism.org</a> or follow us on Twitter <a href='https://twitter.com/techvsterrorism'>@techvsterrorism</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>This week, we’re exploring the role of the internet in the mainstreaming of radical ideas, which are increasingly infiltrating politics and popular culture. We also get a deeper insight into online extremist communities to understand what’s driving these ideas and how radicalisation is occurring.<br/><br/>Join <a href='https://twitter.com/CraanenAnne'>Anne Craanen</a> as she speaks to <a href='https://www.isdglobal.org/isd_team/julia-ebner/'>Dr Julia Ebner</a>, a Senior Resident Research Fellow at the Institute for Strategic Dialogue (ISD), specialising in far-right extremism, reciprocal radicalisation, conspiracy myths and terrorism prevention. Julia is an award-winning and best-selling author of several books including:<br/><br/><a href='https://www.bloomsbury.com/uk/rage-9780755617272/'>The Rage: The Vicious Circle of Islamist and Far-Right Extremism</a><br/><br/><a href='https://www.bloomsbury.com/uk/going-dark-9781526616791/'>Going Dark: The Secret Social Lives of Extremists</a><br/><br/><a href='https://www.foyles.co.uk/book/going-mainstream/julia-ebner/9781804183151'>Going Mainstream: How Extremists are Taking Over</a><br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/UEuxvBIjOAP'>here</a>.  <br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit<a href='https://www.techagainstterrorism.org/'> techagainstterrorism.org</a> or follow us on Twitter <a href='https://twitter.com/techvsterrorism'>@techvsterrorism</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/13294688-going-mainstream-the-role-of-the-internet-in-mainstreaming-extremist-ideas.mp3" length="22800153" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13294688</guid>
    <pubDate>Thu, 27 Jul 2023 01:00:00 +0100</pubDate>
    <itunes:duration>1895</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Gaming &amp; Extremism: Identity Fusion</itunes:title>
    <title>Gaming &amp; Extremism: Identity Fusion</title>
    <itunes:summary><![CDATA[This week, we’re diving deeper into the nexus between gaming and extremism, exploring how gaming culture, storylines and symbols are being appropriated by extremist actors, and unpacking the concept of ‘identity fusion’: the phenomenon whereby players emotionally and psychologically merge their real-life identity with that of their in-game avatar or character.  Our guests also discuss how the growing immersiveness of online games and the increasingly blurred line between reality and virt...]]></itunes:summary>
    <description><![CDATA[<p>This week, we’re diving deeper into the nexus between gaming and extremism, exploring how gaming culture, storylines and symbols are being appropriated by extremist actors, and unpacking the concept of ‘identity fusion’: the phenomenon whereby players emotionally and psychologically merge their real-life identity with that of their in-game avatar or character. </p><p>Our guests also discuss how the growing immersiveness of online games and the increasingly blurred line between reality and virtual reality might impact radicalisation processes, and touch on how stakeholders can get ahead of this threat.</p><p>Join <a href='https://twitter.com/CraanenAnne'>Anne Craanen</a> as she speaks to <a href='https://twitter.com/DrKowert?s=20'>Dr Rachel Kowert</a>, a research psychologist and Research Director of gaming and mental health organisation <em>Take This</em>, and <a href='https://twitter.com/AshKingdon?s=20'>Dr Ashton Kingdon</a>, a lecturer of Criminology at the University of Southampton. </p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/rb9N2esntdW'>here</a>.</p><p>To find out more about the Extremism and Gaming Research Network (EGRN), visit <a href='https://extremismandgaming.org/'>https://extremismandgaming.org/</a>.</p><p>If you want to find out more about Tech Against Terrorism and our work, visit<a href='https://www.techagainstterrorism.org/'> techagainstterrorism.org</a> or follow us on Twitter <a href='https://twitter.com/techvsterrorism'>@techvsterrorism</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>This week, we’re diving deeper into the nexus between gaming and extremism, exploring how gaming culture, storylines and symbols are being appropriated by extremist actors, and unpacking the concept of ‘identity fusion’: the phenomenon whereby players emotionally and psychologically merge their real-life identity with that of their in-game avatar or character. </p><p>Our guests also discuss how the growing immersiveness of online games and the increasingly blurred line between reality and virtual reality might impact radicalisation processes, and touch on how stakeholders can get ahead of this threat.</p><p>Join <a href='https://twitter.com/CraanenAnne'>Anne Craanen</a> as she speaks to <a href='https://twitter.com/DrKowert?s=20'>Dr Rachel Kowert</a>, a research psychologist and Research Director of gaming and mental health organisation <em>Take This</em>, and <a href='https://twitter.com/AshKingdon?s=20'>Dr Ashton Kingdon</a>, a lecturer of Criminology at the University of Southampton. </p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/rb9N2esntdW'>here</a>.</p><p>To find out more about the Extremism and Gaming Research Network (EGRN), visit <a href='https://extremismandgaming.org/'>https://extremismandgaming.org/</a>.</p><p>If you want to find out more about Tech Against Terrorism and our work, visit<a href='https://www.techagainstterrorism.org/'> techagainstterrorism.org</a> or follow us on Twitter <a href='https://twitter.com/techvsterrorism'>@techvsterrorism</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/13170421-gaming-extremism-identity-fusion.mp3" length="14894457" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13170421</guid>
    <pubDate>Thu, 06 Jul 2023 08:00:00 +0100</pubDate>
    <itunes:duration>1237</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, moderation, safety, online, social media, extremism, gaming</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Gaming &amp; Extremism: Threats and Opportunities</itunes:title>
    <title>Gaming &amp; Extremism: Threats and Opportunities</title>
    <itunes:summary><![CDATA[This week, we’re exploring the interaction between gaming and extremism.  We discuss the growing misuse of gaming platforms by extremist actors and consider why gaming communities are at risk of fostering concerning attitudes towards misogyny, racism, and even violent extremism. We address the threat to children and young people, the challenges and opportunities for policymakers, gaming companies and other stakeholders, and finally, what the future of gaming could mean in the context of ...]]></itunes:summary>
    <description><![CDATA[<p><b>This week, we’re exploring the interaction between gaming and extremism.  We discuss the growing misuse of gaming platforms by extremist actors and consider why gaming communities are at risk of fostering concerning attitudes towards misogyny, racism, and even violent extremism. We address the threat to children and young people, the challenges and opportunities for policymakers, gaming companies and other stakeholders, and finally, what the future of gaming could mean in the context of extremism.<br/><br/>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://twitter.com/j_white692?lang=en'><b>Dr Jessica White</b></a><b>, a Senior Research Fellow in RUSI’s Terrorism and Conflict group, and </b><a href='http://englundconsulting.org/'><b>Galen Lamphere-Englund</b></a><b>, a Violent Extremism and Strategic Communications Researcher and Fellow at the Royal United Services Institute (RUSI).<br/><br/>You can read a transcript of this episode </b><a href='https://share.descript.com/view/pwkyFQPj2tr'><b>here</b></a><b>.  <br/><br/>To find out more about the Extremism and Gaming Research Network (EGRN), visit </b><a href='https://extremismandgaming.org/'><b>https://extremismandgaming.org/</b></a><b>.<br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week, we’re exploring the interaction between gaming and extremism.  We discuss the growing misuse of gaming platforms by extremist actors and consider why gaming communities are at risk of fostering concerning attitudes towards misogyny, racism, and even violent extremism. We address the threat to children and young people, the challenges and opportunities for policymakers, gaming companies and other stakeholders, and finally, what the future of gaming could mean in the context of extremism.<br/><br/>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://twitter.com/j_white692?lang=en'><b>Dr Jessica White</b></a><b>, a Senior Research Fellow in RUSI’s Terrorism and Conflict group, and </b><a href='http://englundconsulting.org/'><b>Galen Lamphere-Englund</b></a><b>, a Violent Extremism and Strategic Communications Researcher and Fellow at the Royal United Services Institute (RUSI).<br/><br/>You can read a transcript of this episode </b><a href='https://share.descript.com/view/pwkyFQPj2tr'><b>here</b></a><b>.  <br/><br/>To find out more about the Extremism and Gaming Research Network (EGRN), visit </b><a href='https://extremismandgaming.org/'><b>https://extremismandgaming.org/</b></a><b>.<br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/13082518-gaming-extremism-threats-and-opportunities.mp3" length="18778245" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13082518</guid>
    <pubDate>Thu, 22 Jun 2023 01:00:00 +0100</pubDate>
    <itunes:duration>1560</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Inside Tehreek-e-Taliban Pakistan’s Resurgence </itunes:title>
    <title>Inside Tehreek-e-Taliban Pakistan’s Resurgence </title>
    <itunes:summary><![CDATA[This week, we’re exploring Tehreek-e-Taliban Pakistan (TTP) or the Pakistani Taliban - an Islamist terrorist organisation known for its violent activities and ideological alignment with the Afghan Taliban.    In the episode, we discuss TTP’s evolution, its recent resurgence, and how it’s using propaganda to further its strategic goals. We’ll also unpack TTP’s online activities and how its official media arm has significantly enhanced its operations since the Taliban takeover of Afghanist...]]></itunes:summary>
    <description><![CDATA[<p>This week, we’re exploring Tehreek-e-Taliban Pakistan (TTP) or the Pakistani Taliban - an Islamist terrorist organisation known for its violent activities and ideological alignment with the Afghan Taliban.  <br/><br/>In the episode, we discuss TTP’s evolution, its recent resurgence, and how it’s using propaganda to further its strategic goals. We’ll also unpack TTP’s online activities and how its official media arm has significantly enhanced its operations since the Taliban takeover of Afghanistan in 2021, playing an important role in the group’s resurgence<br/><br/>Join Anne Craanen as she speaks to <a href='https://twitter.com/amirajadoon?lang=en'>Dr Amira Jadoon</a>, Assistant Professor in the Department of Political Science at Clemson University, and <a href='https://twitter.com/antoniogiustoz2?lang=en'>Dr Antonio Giustozzi</a>, a Senior Research Fellow at the Royal United Services Institute<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/pHmsZHp9ZgR'>here</a>.<br/><br/>Tech Against Terrorism’s <a href='https://www.terrorismanalytics.org/'>Terrorist Content Analytics Platform (TCAP)</a> has recently added TTP to its Inclusion Policy, alerting its official content to tech platforms. You can find our blog explaining the reasons why <a href='https://www.terrorismanalytics.org/project-news/TCAP-Expansion-TTP'>here</a>.<br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>This week, we’re exploring Tehreek-e-Taliban Pakistan (TTP) or the Pakistani Taliban - an Islamist terrorist organisation known for its violent activities and ideological alignment with the Afghan Taliban.  <br/><br/>In the episode, we discuss TTP’s evolution, its recent resurgence, and how it’s using propaganda to further its strategic goals. We’ll also unpack TTP’s online activities and how its official media arm has significantly enhanced its operations since the Taliban takeover of Afghanistan in 2021, playing an important role in the group’s resurgence<br/><br/>Join Anne Craanen as she speaks to <a href='https://twitter.com/amirajadoon?lang=en'>Dr Amira Jadoon</a>, Assistant Professor in the Department of Political Science at Clemson University, and <a href='https://twitter.com/antoniogiustoz2?lang=en'>Dr Antonio Giustozzi</a>, a Senior Research Fellow at the Royal United Services Institute<br/><br/>You can read a transcript of this episode <a href='https://share.descript.com/view/pHmsZHp9ZgR'>here</a>.<br/><br/>Tech Against Terrorism’s <a href='https://www.terrorismanalytics.org/'>Terrorist Content Analytics Platform (TCAP)</a> has recently added TTP to its Inclusion Policy, alerting its official content to tech platforms. You can find our blog explaining the reasons why <a href='https://www.terrorismanalytics.org/project-news/TCAP-Expansion-TTP'>here</a>.<br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on <a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/12996276-inside-tehreek-e-taliban-pakistan-s-resurgence.mp3" length="17669222" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12996276</guid>
    <pubDate>Thu, 08 Jun 2023 01:00:00 +0100</pubDate>
    <itunes:duration>1467</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>An Uncertain Future: Deepfakes and Extremism</itunes:title>
    <title>An Uncertain Future: Deepfakes and Extremism</title>
    <itunes:summary><![CDATA[This week, we’re discussing the rapidly evolving phenomenon of deepfakes powered by generative AI technology. We explore how deepfakes are being manipulated for malign purposes, including by terrorist and violent extremist actors. And we consider how this threat might develop as technology improves and what this means for terrorist propaganda, online disinformation, and global security. We also ask what tech platforms, the media and policymakers should be doing to get ahead of this threat. &n...]]></itunes:summary>
    <description><![CDATA[<p><b>This week, we’re discussing the rapidly evolving phenomenon of deepfakes powered by generative AI technology. We explore how deepfakes are being manipulated for malign purposes, including by terrorist and violent extremist actors. And we consider how this threat might develop as technology improves and what this means for terrorist propaganda, online disinformation, and global security. We also ask what tech platforms, the media and policymakers should be doing to get ahead of this threat.  </b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://www.brookings.edu/experts/daniel-l-byman/'><b>Daniel Byman</b></a><b>, Senior fellow in the Center for Middle East Policy at the </b><a href='https://www.brookings.edu/about-us/'><b>Brookings Institution</b></a><b>. And </b><a href='https://www.brookings.edu/experts/chris-meserole/'><b>Chris Meserole</b></a><b>, Director of the </b><a href='https://www.brookings.edu/project/artificial-intelligence-and-emerging-technology-initiative/'><b>Brookings Artificial Intelligence and Emerging Technology Initiative</b></a><b> and a fellow in Foreign Policy at the Brookings Institution. </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/z2hN0FedCZI'><b>here</b></a><b>. </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week, we’re discussing the rapidly evolving phenomenon of deepfakes powered by generative AI technology. We explore how deepfakes are being manipulated for malign purposes, including by terrorist and violent extremist actors. And we consider how this threat might develop as technology improves and what this means for terrorist propaganda, online disinformation, and global security. We also ask what tech platforms, the media and policymakers should be doing to get ahead of this threat.  </b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://www.brookings.edu/experts/daniel-l-byman/'><b>Daniel Byman</b></a><b>, Senior fellow in the Center for Middle East Policy at the </b><a href='https://www.brookings.edu/about-us/'><b>Brookings Institution</b></a><b>. And </b><a href='https://www.brookings.edu/experts/chris-meserole/'><b>Chris Meserole</b></a><b>, Director of the </b><a href='https://www.brookings.edu/project/artificial-intelligence-and-emerging-technology-initiative/'><b>Brookings Artificial Intelligence and Emerging Technology Initiative</b></a><b> and a fellow in Foreign Policy at the Brookings Institution. </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/z2hN0FedCZI'><b>here</b></a><b>. </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/12873698-an-uncertain-future-deepfakes-and-extremism.mp3" length="16487971" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12873698</guid>
    <pubDate>Thu, 25 May 2023 01:00:00 +0100</pubDate>
    <itunes:duration>1370</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Extremist Memes: The Dark Side of Internet Culture</itunes:title>
    <title>Extremist Memes: The Dark Side of Internet Culture</title>
    <itunes:summary><![CDATA[This week, we’re exploring the use of memes in the context of terrorism and violent extremism. Throughout the episode, we consider why memes are being used by terrorist and violent extremist actors, how they’re spread online and why their meaning is often hidden to ordinary internet users. We also look at some of the challenges this poses for tech platform moderators trying to counter their spread and what tech companies can do to address this issue.    Join Anne Craanen as she speaks to...]]></itunes:summary>
    <description><![CDATA[<p><b>This week, we’re exploring the use of memes in the context of terrorism and violent extremism. Throughout the episode, we consider why memes are being used by terrorist and violent extremist actors, how they’re spread online and why their meaning is often hidden to ordinary internet users. We also look at some of the challenges this poses for tech platform moderators trying to counter their spread and what tech companies can do to address this issue. <br/></b><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://twitter.com/arbradley'><b>Arthur Bradley</b></a><b>, OSINT Manager at Tech Against Terrorism. We’re also joined by </b><a href='https://twitter.com/Blyth_Crawford'><b>Blyth Crawford</b></a><b>, an Analyst at </b><a href='https://moonshotteam.com/'><b>Moonshot</b></a><b> and Research Fellow and PhD Candidate in War Studies, </b><a href='https://icsr.info/'><b>The International Centre for the Study of Radicalisation</b></a><b> (ICSR) at King’s College London and </b><a href='https://www.isdglobal.org/isd_team/moustafa-ayad/'><b>Moustafa Ayad</b></a><b>, Executive Director for Africa, Middle East and Asia, </b><a href='https://www.isdglobal.org/'><b>Institute for Strategic Dialogue</b></a><b> (ISD). </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/6XwmdTezgqi'><b>here</b></a><b>.  </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week, we’re exploring the use of memes in the context of terrorism and violent extremism. Throughout the episode, we consider why memes are being used by terrorist and violent extremist actors, how they’re spread online and why their meaning is often hidden to ordinary internet users. We also look at some of the challenges this poses for tech platform moderators trying to counter their spread and what tech companies can do to address this issue. <br/></b><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://twitter.com/arbradley'><b>Arthur Bradley</b></a><b>, OSINT Manager at Tech Against Terrorism. We’re also joined by </b><a href='https://twitter.com/Blyth_Crawford'><b>Blyth Crawford</b></a><b>, an Analyst at </b><a href='https://moonshotteam.com/'><b>Moonshot</b></a><b> and Research Fellow and PhD Candidate in War Studies, </b><a href='https://icsr.info/'><b>The International Centre for the Study of Radicalisation</b></a><b> (ICSR) at King’s College London and </b><a href='https://www.isdglobal.org/isd_team/moustafa-ayad/'><b>Moustafa Ayad</b></a><b>, Executive Director for Africa, Middle East and Asia, </b><a href='https://www.isdglobal.org/'><b>Institute for Strategic Dialogue</b></a><b> (ISD). </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/6XwmdTezgqi'><b>here</b></a><b>.  </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/12812984-extremist-memes-the-dark-side-of-internet-culture.mp3" length="27199871" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12812984</guid>
    <pubDate>Thu, 11 May 2023 01:00:00 +0100</pubDate>
    <itunes:duration>2263</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Sanitising Extremism: “Borderline Content” and Antisemitism Online</itunes:title>
    <title>Sanitising Extremism: “Borderline Content” and Antisemitism Online</title>
    <itunes:summary><![CDATA[This week, we’re looking into the contested term “borderline content”, using antisemitism as a case study for how terrorist and violent extremist (TVE) actors sanitise extremist content. We learn more about what borderline content is in practice, its strategic use for TVE actors, and what makes it so difficult to moderate. We also consider the potential consequences of allowing borderline content to spread on mainstream social media platforms and discuss what tech platforms and policymakers s...]]></itunes:summary>
    <description><![CDATA[<p><b>This week, we’re looking into the contested term “borderline content”, using antisemitism as a case study for how terrorist and violent extremist (TVE) actors sanitise extremist content. We learn more about what borderline content is in practice, its strategic use for TVE actors, and what makes it so difficult to moderate. We also consider the potential consequences of allowing borderline content to spread on mainstream social media platforms and discuss what tech platforms and policymakers should be doing to tackle it. <br/><br/>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to Isabelle Arnson, Senior Policy Analyst at Tech Against Terrorism  and Head of Tech Against Terrorism Europe (TATE). And </b><a href='https://twitter.com/hannah1_rose?lang=en'><b>Hannah Rose</b></a><b>, a PhD Candidate in War Studies at King&apos;s College London and a Research Fellow at the </b><a href='https://icsr.info/'><b>International Centre for the Study of Radicalisation</b></a><b> (ICSR). <br/><br/>You can read a transcript of this episode </b><a href='https://share.descript.com/view/U3NvsqMHMwt'><b>here</b></a><b>.<br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week, we’re looking into the contested term “borderline content”, using antisemitism as a case study for how terrorist and violent extremist (TVE) actors sanitise extremist content. We learn more about what borderline content is in practice, its strategic use for TVE actors, and what makes it so difficult to moderate. We also consider the potential consequences of allowing borderline content to spread on mainstream social media platforms and discuss what tech platforms and policymakers should be doing to tackle it. <br/><br/>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to Isabelle Arnson, Senior Policy Analyst at Tech Against Terrorism  and Head of Tech Against Terrorism Europe (TATE). And </b><a href='https://twitter.com/hannah1_rose?lang=en'><b>Hannah Rose</b></a><b>, a PhD Candidate in War Studies at King&apos;s College London and a Research Fellow at the </b><a href='https://icsr.info/'><b>International Centre for the Study of Radicalisation</b></a><b> (ICSR). <br/><br/>You can read a transcript of this episode </b><a href='https://share.descript.com/view/U3NvsqMHMwt'><b>here</b></a><b>.<br/><br/>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/12711788-sanitising-extremism-borderline-content-and-antisemitism-online.mp3" length="23114178" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12711788</guid>
    <pubDate>Thu, 27 Apr 2023 01:00:00 +0100</pubDate>
    <itunes:duration>1922</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Information War: Online Disinformation Around the Conflict in Ukraine</itunes:title>
    <title>The Information War: Online Disinformation Around the Conflict in Ukraine</title>
    <itunes:summary><![CDATA[This week, we’re exploring the spread of online disinformation in the aftermath of the Russian invasion of Ukraine. We unpack the shifting online ecosystem around the conflict, and track pro-Kremlin narratives and disinformation campaigns both domestically and abroad. We also ask who’s behind these narratives and on which platforms they are being spread.    Join Anne Craanen as she speaks to Jordan Wildon, a Digital Investigator, Telegram expert and Founder &amp; CEO of Prose Intelligenc...]]></itunes:summary>
    <description><![CDATA[<p><b>This week, we’re exploring the spread of online disinformation in the aftermath of the Russian invasion of Ukraine. We unpack the shifting online ecosystem around the conflict, and track pro-Kremlin narratives and disinformation campaigns both domestically and abroad. We also ask who’s behind these narratives and on which platforms they are being spread. </b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://twitter.com/jordanwildon'><b>Jordan Wildon</b></a><b>, a Digital Investigator, Telegram expert and Founder &amp; CEO of </b><a href='https://www.prose.ltd/'><b>Prose Intelligence</b></a><b>. And </b><a href='https://twitter.com/charliewinter?lang=en'><b>Charlie Winter</b></a><b>, Co-Founder and Director of Research at </b><a href='https://www.extrac.io/'><b>ExTrac</b></a><b>.</b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/PxgtMJ6Mv6U'><b>here</b></a><b>. </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week, we’re exploring the spread of online disinformation in the aftermath of the Russian invasion of Ukraine. We unpack the shifting online ecosystem around the conflict, and track pro-Kremlin narratives and disinformation campaigns both domestically and abroad. We also ask who’s behind these narratives and on which platforms they are being spread. </b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://twitter.com/jordanwildon'><b>Jordan Wildon</b></a><b>, a Digital Investigator, Telegram expert and Founder &amp; CEO of </b><a href='https://www.prose.ltd/'><b>Prose Intelligence</b></a><b>. And </b><a href='https://twitter.com/charliewinter?lang=en'><b>Charlie Winter</b></a><b>, Co-Founder and Director of Research at </b><a href='https://www.extrac.io/'><b>ExTrac</b></a><b>.</b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/PxgtMJ6Mv6U'><b>here</b></a><b>. </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/12637896-the-information-war-online-disinformation-around-the-conflict-in-ukraine.mp3" length="22616872" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12637896</guid>
    <pubDate>Thu, 13 Apr 2023 01:00:00 +0100</pubDate>
    <itunes:duration>1881</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Canada Centre: Building Resilience Against Terrorism and Violent Extremism</itunes:title>
    <title>The Canada Centre: Building Resilience Against Terrorism and Violent Extremism</title>
    <itunes:summary><![CDATA[This week on the Tech Against Terrorism podcast, we’re heading to Canada to speak to two of the country's leading experts who are working to counter terrorism and violent extremism through the Canada Centre for Community Engagement and Prevention of Violence. Hear how the centre leads the Government of Canada's efforts to counter radicalisation to violence through a number of initiatives, including its Community Resilience Fund. Plus, how we at Tech Against Terrorism are working with the Cent...]]></itunes:summary>
    <description><![CDATA[<p><b>This week on the Tech Against Terrorism podcast, we’re heading to Canada to speak to two of the country&apos;s leading experts who are working to counter terrorism and violent extremism through the </b><a href='https://www.publicsafety.gc.ca/cnt/bt/cc/bt-en.aspx'><b>Canada Centre for Community Engagement and Prevention of Violence</b></a><b>. Hear how the centre leads the Government of Canada&apos;s efforts to counter radicalisation to violence through a number of initiatives, including its </b><a href='https://www.publicsafety.gc.ca/cnt/bt/cc/fnd-en.aspx'><b>Community Resilience Fund</b></a><b>. Plus, how we at Tech Against Terrorism are working with the Centre to expand the </b><a href='https://www.terrorismanalytics.org/'><b>Terrorist Content Analytics Platform</b></a><b> (TCAP), the world’s largest database of verified terrorist content.</b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to Brett Kubicek, Research Manager, and Robert Burley, Executive Director at the Canada Centre for Community Engagement and Prevention of Violence.</b></p><p><br/></p><p><b>Read our full report on terrorist designation </b><a href='https://www.techagainstterrorism.org/2023/03/23/designatingterrorism2023/'><b>here</b></a><b>. </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/coHG5qGu8jA'><b>here</b></a><b>. </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><b><br/><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week on the Tech Against Terrorism podcast, we’re heading to Canada to speak to two of the country&apos;s leading experts who are working to counter terrorism and violent extremism through the </b><a href='https://www.publicsafety.gc.ca/cnt/bt/cc/bt-en.aspx'><b>Canada Centre for Community Engagement and Prevention of Violence</b></a><b>. Hear how the centre leads the Government of Canada&apos;s efforts to counter radicalisation to violence through a number of initiatives, including its </b><a href='https://www.publicsafety.gc.ca/cnt/bt/cc/fnd-en.aspx'><b>Community Resilience Fund</b></a><b>. Plus, how we at Tech Against Terrorism are working with the Centre to expand the </b><a href='https://www.terrorismanalytics.org/'><b>Terrorist Content Analytics Platform</b></a><b> (TCAP), the world’s largest database of verified terrorist content.</b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to Brett Kubicek, Research Manager, and Robert Burley, Executive Director at the Canada Centre for Community Engagement and Prevention of Violence.</b></p><p><br/></p><p><b>Read our full report on terrorist designation </b><a href='https://www.techagainstterrorism.org/2023/03/23/designatingterrorism2023/'><b>here</b></a><b>. </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/coHG5qGu8jA'><b>here</b></a><b>. </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><b><br/><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/12594627-the-canada-centre-building-resilience-against-terrorism-and-violent-extremism.mp3" length="13943025" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12594627</guid>
    <pubDate>Thu, 06 Apr 2023 01:00:00 +0100</pubDate>
    <itunes:duration>1158</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Challenge of Hybrid Threats Online</itunes:title>
    <title>The Challenge of Hybrid Threats Online</title>
    <itunes:summary><![CDATA[With the help of our expert guests, we explore what hybrid threats are in the context of online terrorism and violent extremism. We consider why this hybridisation has increased in recent years and how online extremism has blurred and overlapped with other online harms such as disinformation and conspiracy theory movements.    We also touch on “grey area” content, consider whether algorithms promote more hateful or extreme narratives online, and discuss what the tech sector and policymak...]]></itunes:summary>
    <description><![CDATA[<p><b>With the help of our expert guests, we explore what hybrid threats are in the context of online terrorism and violent extremism. We consider why this hybridisation has increased in recent years and how online extremism has blurred and overlapped with other online harms such as disinformation and conspiracy theory movements. </b></p><p><br/></p><p><b>We also touch on “grey area” content, consider whether algorithms promote more hateful or extreme narratives online, and discuss what the tech sector and policymakers can do to tackle hybrid threats online. </b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://twitter.com/b_rottweilerucl?lang=en'><b>Dr Bettina Rottweiler</b></a><b>, a Research Fellow at University College London (UCL) where she specialises in researching risk and protective factors for violent extremism. And </b><a href='https://twitter.com/MiloComerford?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Milo Comerford</b></a><b>, Head of Policy &amp; Research at the </b><a href='https://www.isdglobal.org/'><b>Institute for Strategic Dialogue</b></a><b> (ISD), which specialises in research and policy advice on hate, extremism, and disinformation. </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/UPtz4ktz5ye'><b>here</b></a><b>.  </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>, where you can find resources on this topic. </b></p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>With the help of our expert guests, we explore what hybrid threats are in the context of online terrorism and violent extremism. We consider why this hybridisation has increased in recent years and how online extremism has blurred and overlapped with other online harms such as disinformation and conspiracy theory movements. </b></p><p><br/></p><p><b>We also touch on “grey area” content, consider whether algorithms promote more hateful or extreme narratives online, and discuss what the tech sector and policymakers can do to tackle hybrid threats online. </b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://twitter.com/b_rottweilerucl?lang=en'><b>Dr Bettina Rottweiler</b></a><b>, a Research Fellow at University College London (UCL) where she specialises in researching risk and protective factors for violent extremism. And </b><a href='https://twitter.com/MiloComerford?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Milo Comerford</b></a><b>, Head of Policy &amp; Research at the </b><a href='https://www.isdglobal.org/'><b>Institute for Strategic Dialogue</b></a><b> (ISD), which specialises in research and policy advice on hate, extremism, and disinformation. </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/UPtz4ktz5ye'><b>here</b></a><b>.  </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>, where you can find resources on this topic. </b></p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/12493220-the-challenge-of-hybrid-threats-online.mp3" length="17085071" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12493220</guid>
    <pubDate>Thu, 23 Mar 2023 01:00:00 +0000</pubDate>
    <itunes:duration>1420</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Regulating Online Harms in India</itunes:title>
    <title>Regulating Online Harms in India</title>
    <itunes:summary><![CDATA[This week, we’re looking at how the internet is regulated in India. We consider what the current landscape looks like, what this means for tech platforms operating in the market and how this is impacting platforms’ online counterterrorism and content moderation efforts.   Join Anne Craanen as she speaks to Tanmay Singh, Senior Litigation Counsel at the Internet Freedom Foundation. And Jyoti Panday, a researcher at the Internet Governance Project (IGP) at the Georgia Institute of Technology.  ...]]></itunes:summary>
    <description><![CDATA[<p><b>This week, we’re looking at how the internet is regulated in India. We consider what the current landscape looks like, what this means for tech platforms operating in the market and how this is impacting platforms’ online counterterrorism and content moderation efforts.<br/></b><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to Tanmay Singh, Senior Litigation Counsel at the </b><a href='https://internetfreedom.in/'><b>Internet Freedom Foundation</b></a><b>. And Jyoti Panday, a researcher at the </b><a href='https://www.internetgovernance.org/'><b>Internet Governance Project</b></a><b> (IGP) at the Georgia Institute of Technology.</b></p><p><br/></p><p><b>We unpack the recent legislation - the 2021 Information and Technology (IT) Rules - highlighting how they relate to global trends in regulating online content. Plus, we outline how civic engagement can influence online regulation. </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/JuavUBPALLp'><b>here</b></a><b>.</b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>. To find out more about global online regulation, read our analysis in the </b><a href='https://www.techagainstterrorism.org/2022/01/13/ors-2021-summary/'><b>Online Regulation Series</b></a><b>.</b></p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week, we’re looking at how the internet is regulated in India. We consider what the current landscape looks like, what this means for tech platforms operating in the market and how this is impacting platforms’ online counterterrorism and content moderation efforts.<br/></b><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to Tanmay Singh, Senior Litigation Counsel at the </b><a href='https://internetfreedom.in/'><b>Internet Freedom Foundation</b></a><b>. And Jyoti Panday, a researcher at the </b><a href='https://www.internetgovernance.org/'><b>Internet Governance Project</b></a><b> (IGP) at the Georgia Institute of Technology.</b></p><p><br/></p><p><b>We unpack the recent legislation - the 2021 Information and Technology (IT) Rules - highlighting how they relate to global trends in regulating online content. Plus, we outline how civic engagement can influence online regulation. </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/JuavUBPALLp'><b>here</b></a><b>.</b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>. To find out more about global online regulation, read our analysis in the </b><a href='https://www.techagainstterrorism.org/2022/01/13/ors-2021-summary/'><b>Online Regulation Series</b></a><b>.</b></p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/12461401-regulating-online-harms-in-india.mp3" length="29079319" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12461401</guid>
    <pubDate>Mon, 20 Mar 2023 01:00:00 +0000</pubDate>
    <itunes:duration>2419</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Combating Terrorist Use of File-Sharing</itunes:title>
    <title>Combating Terrorist Use of File-Sharing</title>
    <itunes:summary><![CDATA[This week, we’re looking at how violent Islamist organisations such as Islamic State disseminate propaganda online, particularly through the exploitation of file-sharing platforms.     Join Anne Craanen as she speaks to Professor Stuart Macdonald and Connor Rees from Swansea University about their data-driven research which explores pro-IS use of file-sharing platforms for propaganda dissemination.    The episode addresses how and why Islamic State and their supporters have had to d...]]></itunes:summary>
    <description><![CDATA[<p><b>This week, we’re looking at how violent Islamist organisations such as Islamic State disseminate propaganda online, particularly through the exploitation of file-sharing platforms.  </b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to Professor Stuart Macdonald and Connor Rees from Swansea University about their data-driven research which explores pro-IS use of file-sharing platforms for propaganda dissemination. </b></p><p><br/></p><p><b>The episode addresses how and why Islamic State and their supporters have had to develop such a sophisticated strategy for spreading their message. We also consider how data-driven research by academia can help inform a collaborative and multi-stakeholder approach to countering the threat of terrorist and violent extremist use of the internet. </b></p><p><br/></p><p><b>Download the full report, </b><b><em>Remove, Impede, Disrupt, Redirect: Understanding &amp; Combating Pro-Islamic State Use of File-Sharing Platforms</em></b><b> </b><a href='https://cronfa.swan.ac.uk/Record/cronfa59645'><b>here</b></a><b>. </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/ToH8OIOiGCo'><b>here</b></a><b>. </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>, where you can find resources on this topic. </b></p><p><b><br/><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week, we’re looking at how violent Islamist organisations such as Islamic State disseminate propaganda online, particularly through the exploitation of file-sharing platforms.  </b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to Professor Stuart Macdonald and Connor Rees from Swansea University about their data-driven research which explores pro-IS use of file-sharing platforms for propaganda dissemination. </b></p><p><br/></p><p><b>The episode addresses how and why Islamic State and their supporters have had to develop such a sophisticated strategy for spreading their message. We also consider how data-driven research by academia can help inform a collaborative and multi-stakeholder approach to countering the threat of terrorist and violent extremist use of the internet. </b></p><p><br/></p><p><b>Download the full report, </b><b><em>Remove, Impede, Disrupt, Redirect: Understanding &amp; Combating Pro-Islamic State Use of File-Sharing Platforms</em></b><b> </b><a href='https://cronfa.swan.ac.uk/Record/cronfa59645'><b>here</b></a><b>. </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/ToH8OIOiGCo'><b>here</b></a><b>. </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>, where you can find resources on this topic. </b></p><p><b><br/><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/12260623-combating-terrorist-use-of-file-sharing.mp3" length="22438977" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12260623</guid>
    <pubDate>Thu, 16 Feb 2023 01:00:00 +0000</pubDate>
    <itunes:duration>1866</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Deplatforming Debate</itunes:title>
    <title>The Deplatforming Debate</title>
    <itunes:summary><![CDATA[This week, we’re exploring the concept of deplatforming. We explain what deplatforming is, how tech company attitudes towards content removal have evolved over the years and consider whether there’s a case for allowing some “borderline” content to remain on platforms.    Join Anne Craanen as she speaks to Dr Joe Whittaker, a lecturer in Cyber Threats, Criminology, Sociology and Social Policy at Swansea University. Dr Whittaker has carried out extensive research focusing on online radical...]]></itunes:summary>
    <description><![CDATA[<p><b>This week, we’re exploring the concept of deplatforming. We explain what deplatforming is, how tech company attitudes towards content removal have evolved over the years and consider whether there’s a case for allowing some “borderline” content to remain on platforms. </b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://twitter.com/CTProject_JW'><b>Dr Joe Whittaker</b></a><b>, a lecturer in Cyber Threats, Criminology, Sociology and Social Policy at </b><a href='https://www.swansea.ac.uk/staff/j.j.whittaker/'><b>Swansea University</b></a><b>. Dr Whittaker has carried out extensive research focusing on online radicalisation, including looking into the role deplatforming plays in radicalisation online. He shares some of the unintended consequences of deplatforming and explains why he believes tech platforms now need a broader strategy to tackle terrorist and violent extremist content online. </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/gTjO1HmePkv'><b>here</b></a><b>.</b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>, where you can find resources on this topic. </b></p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week, we’re exploring the concept of deplatforming. We explain what deplatforming is, how tech company attitudes towards content removal have evolved over the years and consider whether there’s a case for allowing some “borderline” content to remain on platforms. </b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://twitter.com/CTProject_JW'><b>Dr Joe Whittaker</b></a><b>, a lecturer in Cyber Threats, Criminology, Sociology and Social Policy at </b><a href='https://www.swansea.ac.uk/staff/j.j.whittaker/'><b>Swansea University</b></a><b>. Dr Whittaker has carried out extensive research focusing on online radicalisation, including looking into the role deplatforming plays in radicalisation online. He shares some of the unintended consequences of deplatforming and explains why he believes tech platforms now need a broader strategy to tackle terrorist and violent extremist content online. </b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/gTjO1HmePkv'><b>here</b></a><b>.</b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>, where you can find resources on this topic. </b></p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/12161538-the-deplatforming-debate.mp3" length="14787939" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12161538</guid>
    <pubDate>Thu, 02 Feb 2023 01:00:00 +0000</pubDate>
    <itunes:duration>1228</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>2022 Trends In Terrorist Behaviour Online </itunes:title>
    <title>2022 Trends In Terrorist Behaviour Online </title>
    <itunes:summary><![CDATA[This week, we look back at some of the key trends and developments in terrorist and violent extremist use of the internet in 2022. We’ll be sharing findings from our “state of play” report which highlights shifts in terrorist behaviour and tactics online.    Join Anne Craanen as she speaks to Tech Against Terrorism’s Charley, Rory and Arthur about developments in Islamist and far-right terrorist exploitation of the internet, the growing threat of terrorist operated websites, and how TVE ...]]></itunes:summary>
    <description><![CDATA[<p><b>This week, we look back at some of the key trends and developments in terrorist and violent extremist use of the internet in 2022. We’ll be sharing findings from our “state of play” report which highlights shifts in terrorist behaviour and tactics online. </b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to Tech Against Terrorism’s Charley, Rory and Arthur about developments in Islamist and far-right terrorist exploitation of the internet, the growing threat of terrorist operated websites, and how TVE actors are experimenting with newer technologies such as the decentralised web. </b></p><p><br/></p><p><b>We also examine emerging threats in 2023 and discuss our priorities for the year ahead which include expanding our support for web infrastructure providers and increasing our crisis response capabilities.</b></p><p><br/></p><p><b>You can find the full report, “State of Play: Trends in Terrorist and Violent Extremist Exploitation of the Internet 2022” </b><a href='https://www.techagainstterrorism.org/2023/01/19/state-of-play-trends-in-terrorist-and-violent-extremist-use-of-the-internet-2022/'><b>here</b></a><b>.</b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/Wv9SbHb5xT3'><b>here</b></a><b>.</b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>, where you can find resources on this topic. </b></p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week, we look back at some of the key trends and developments in terrorist and violent extremist use of the internet in 2022. We’ll be sharing findings from our “state of play” report which highlights shifts in terrorist behaviour and tactics online. </b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to Tech Against Terrorism’s Charley, Rory and Arthur about developments in Islamist and far-right terrorist exploitation of the internet, the growing threat of terrorist operated websites, and how TVE actors are experimenting with newer technologies such as the decentralised web. </b></p><p><br/></p><p><b>We also examine emerging threats in 2023 and discuss our priorities for the year ahead which include expanding our support for web infrastructure providers and increasing our crisis response capabilities.</b></p><p><br/></p><p><b>You can find the full report, “State of Play: Trends in Terrorist and Violent Extremist Exploitation of the Internet 2022” </b><a href='https://www.techagainstterrorism.org/2023/01/19/state-of-play-trends-in-terrorist-and-violent-extremist-use-of-the-internet-2022/'><b>here</b></a><b>.</b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/Wv9SbHb5xT3'><b>here</b></a><b>.</b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>, where you can find resources on this topic. </b></p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/12075561-2022-trends-in-terrorist-behaviour-online.mp3" length="22388336" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12075561</guid>
    <pubDate>Thu, 19 Jan 2023 12:00:00 +0000</pubDate>
    <itunes:duration>1862</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Growing Threat of Misogyny and Gender-based Abuse Online</itunes:title>
    <title>The Growing Threat of Misogyny and Gender-based Abuse Online</title>
    <itunes:summary><![CDATA[This week, we’re exploring the topic of online misogyny. With gender-based abuse in online spaces becoming a growing problem, we explore why misogynist views are so prominent online, the emotional impact of online harms, and what tech platforms can do to counter violent misogynistic content and protect victims from abuse.   We also explore why misogyny is so prevalent in extremist networks online, not just among incels but across ideologies. And we learn more about how the online discussion p...]]></itunes:summary>
    <description><![CDATA[<p><b>This week, we’re exploring the topic of online misogyny. With gender-based abuse in online spaces becoming a growing problem, we explore why misogynist views are so prominent online, the emotional impact of online harms, and what tech platforms can do to counter violent misogynistic content and protect victims from abuse.</b></p><p><br/></p><p><b>We also explore why misogyny is so prevalent in extremist networks online, not just among incels but across ideologies. And we learn more about how the online discussion platform, Reddit, has developed its policies to better tackle violent misogynistic material.</b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://www.linkedin.com/in/jessicaashooh'><b>Dr Jessica Ashooh</b></a><b>, Senior Director of Policy at </b><a href='https://www.reddit.com/'><b>Reddit</b></a><b>. And </b><a href='https://twitter.com/ebmeuller'><b>Elsa Bengtsson Meuller</b></a><b>, a PhD candidate at </b><a href='https://www.gold.ac.uk/'><b>Goldsmiths, University of London</b></a><b>, where they are researching the politics of antifeminist and misogynistic (online) cultures.</b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/jIxkpwehVsx'><b>here</b></a><b>.  </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>, where you can find resources on this topic. </b></p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week, we’re exploring the topic of online misogyny. With gender-based abuse in online spaces becoming a growing problem, we explore why misogynist views are so prominent online, the emotional impact of online harms, and what tech platforms can do to counter violent misogynistic content and protect victims from abuse.</b></p><p><br/></p><p><b>We also explore why misogyny is so prevalent in extremist networks online, not just among incels but across ideologies. And we learn more about how the online discussion platform, Reddit, has developed its policies to better tackle violent misogynistic material.</b></p><p><br/></p><p><b>Join </b><a href='https://twitter.com/CraanenAnne'><b>Anne Craanen</b></a><b> as she speaks to </b><a href='https://www.linkedin.com/in/jessicaashooh'><b>Dr Jessica Ashooh</b></a><b>, Senior Director of Policy at </b><a href='https://www.reddit.com/'><b>Reddit</b></a><b>. And </b><a href='https://twitter.com/ebmeuller'><b>Elsa Bengtsson Meuller</b></a><b>, a PhD candidate at </b><a href='https://www.gold.ac.uk/'><b>Goldsmiths, University of London</b></a><b>, where they are researching the politics of antifeminist and misogynistic (online) cultures.</b></p><p><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/jIxkpwehVsx'><b>here</b></a><b>.  </b></p><p><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>, where you can find resources on this topic. </b></p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/11917713-the-growing-threat-of-misogyny-and-gender-based-abuse-online.mp3" length="17638512" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11917713</guid>
    <pubDate>Thu, 05 Jan 2023 01:00:00 +0000</pubDate>
    <itunes:duration>1466</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Researcher Safety and Mental Health in Online Counterterrorism</itunes:title>
    <title>Researcher Safety and Mental Health in Online Counterterrorism</title>
    <itunes:summary><![CDATA[This week, we’re exploring the topic of researcher safety and mental health, focusing on the particular difficulties facing those working with terrorist or violent extremist content.  We ask whether there’s enough awareness around the subject, and what can be done, both individually and institutionally, to protect the emotional wellbeing and safety of counterterrorism researchers and practitioners.   Join Anne Craanen as she speaks to Olivier Cauberghs, Head of Textgain Academy, and Kesa...]]></itunes:summary>
    <description><![CDATA[<p><b>This week, we’re exploring the topic of researcher safety and mental health, focusing on the particular difficulties facing those working with terrorist or violent extremist content. </b></p><p><b>We ask whether there’s enough awareness around the subject, and what can be done, both individually and institutionally, to protect the emotional wellbeing and safety of counterterrorism researchers and practitioners.<br/></b><br/></p><p><b>Join Anne Craanen as she speaks to </b><a href='https://mobile.twitter.com/oliviercauberg1'><b>Olivier Cauberghs</b></a><b>, Head of </b><a href='https://www.textgain.com/'><b>Textgain Academy</b></a><b>, and </b><a href='https://mobile.twitter.com/whitekesa'><b>Kesa White</b></a><b>, Lead Trends Analyst and Program Manager at the </b><a href='http://perilresearch.com/'><b>Polarization and Extremism Research and Innovation Lab</b></a><b> (PERIL) at the American University.  <br/></b><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/uDJYXMaMUz7'><b>here</b></a><b>.<br/></b><br/><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>, where you can find resources on this topic. </b></p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week, we’re exploring the topic of researcher safety and mental health, focusing on the particular difficulties facing those working with terrorist or violent extremist content. </b></p><p><b>We ask whether there’s enough awareness around the subject, and what can be done, both individually and institutionally, to protect the emotional wellbeing and safety of counterterrorism researchers and practitioners.<br/></b><br/></p><p><b>Join Anne Craanen as she speaks to </b><a href='https://mobile.twitter.com/oliviercauberg1'><b>Olivier Cauberghs</b></a><b>, Head of </b><a href='https://www.textgain.com/'><b>Textgain Academy</b></a><b>, and </b><a href='https://mobile.twitter.com/whitekesa'><b>Kesa White</b></a><b>, Lead Trends Analyst and Program Manager at the </b><a href='http://perilresearch.com/'><b>Polarization and Extremism Research and Innovation Lab</b></a><b> (PERIL) at the American University.  <br/></b><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/uDJYXMaMUz7'><b>here</b></a><b>.<br/></b><br/><b>If you want to find out more about Tech Against Terrorism and our work, visit </b><a href='https://www.techagainstterrorism.org/'><b>techagainstterrorism.org</b></a><b> or follow us on </b><a href='https://twitter.com/techvsterrorism?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>Twitter</b></a><b>, where you can find resources on this topic. </b></p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/11912562-researcher-safety-and-mental-health-in-online-counterterrorism.mp3" length="19249213" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11912562</guid>
    <pubDate>Thu, 22 Dec 2022 01:00:00 +0000</pubDate>
    <itunes:duration>1600</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>OSINT: How our Analysts are Disrupting Terrorism Online</itunes:title>
    <title>OSINT: How our Analysts are Disrupting Terrorism Online</title>
    <itunes:summary><![CDATA[This week on the Tech Against Terrorism podcast, we’re taking you behind the scenes to learn more about the work of our Open-Source Intelligence (OSINT) Analysts who are responsible for tracking, analysing and alerting terrorist and violent extremist activity online.   We share what a typical day in the life of an OSINT analyst looks like, some of the safety, ethical and mental health considerations around their work, plus we hear what skills you need for a career in OSINT. We also weigh up t...]]></itunes:summary>
    <description><![CDATA[<p><b>This week on the Tech Against Terrorism podcast, we’re taking you behind the scenes to learn more about the work of our Open-Source Intelligence (OSINT) Analysts who are responsible for tracking, analysing and alerting terrorist and violent extremist activity online.<br/></b><br/></p><p><b>We share what a typical day in the life of an OSINT analyst looks like, some of the safety, ethical and mental health considerations around their work, plus we hear what skills you need for a career in OSINT. We also weigh up the potential risks and benefits of self-taught OSINT and discuss the future of OSINT. <br/></b><br/></p><p><b>Join Anne Craanen and Archie Macfarlane as they speak to Arthur and Rory from the Tech Against Terrorism OSINT team. <br/></b><br/></p><p><b>If you’re interested in learning more about Open-source Intelligence, check out the resources at </b><a href='https://osintcurio.us/'><b>OSINTCurious</b></a><b>, </b><a href='https://www.osint-jobs.com/'><b>OSINTJobs</b></a><b> and </b><a href='https://www.bellingcat.com/'><b>Bellingcat</b></a><b>. <br/></b><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/IKJCJd4OvQu'><b>here</b></a><b>.<br/></b><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </b></p><p><b><br/><br/><br/><br/></b><br/></p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week on the Tech Against Terrorism podcast, we’re taking you behind the scenes to learn more about the work of our Open-Source Intelligence (OSINT) Analysts who are responsible for tracking, analysing and alerting terrorist and violent extremist activity online.<br/></b><br/></p><p><b>We share what a typical day in the life of an OSINT analyst looks like, some of the safety, ethical and mental health considerations around their work, plus we hear what skills you need for a career in OSINT. We also weigh up the potential risks and benefits of self-taught OSINT and discuss the future of OSINT. <br/></b><br/></p><p><b>Join Anne Craanen and Archie Macfarlane as they speak to Arthur and Rory from the Tech Against Terrorism OSINT team. <br/></b><br/></p><p><b>If you’re interested in learning more about Open-source Intelligence, check out the resources at </b><a href='https://osintcurio.us/'><b>OSINTCurious</b></a><b>, </b><a href='https://www.osint-jobs.com/'><b>OSINTJobs</b></a><b> and </b><a href='https://www.bellingcat.com/'><b>Bellingcat</b></a><b>. <br/></b><br/></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/IKJCJd4OvQu'><b>here</b></a><b>.<br/></b><br/></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </b></p><p><b><br/><br/><br/><br/></b><br/></p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/11788410-osint-how-our-analysts-are-disrupting-terrorism-online.mp3" length="22531701" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11788410</guid>
    <pubDate>Thu, 01 Dec 2022 01:00:00 +0000</pubDate>
    <itunes:duration>1874</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Decentralised Web </itunes:title>
    <title>The Decentralised Web </title>
    <itunes:summary><![CDATA[This week on the Tech Against Terrorism podcast we’re exploring the decentralised web. We discuss what the decentralised web is, its potential benefits for users, and whether terrorists and violent extremists are exploiting these technologies. We also consider future threats relating to exploitation of the decentralised web, and how tech companies building this technology can mitigate this by developing trust and safety mechanisms early on.   Join Anne Craanen as she speaks to Dr. I...]]></itunes:summary>
    <description><![CDATA[<p><b>This week on the Tech Against Terrorism podcast we’re exploring the decentralised web. We discuss what the decentralised web is, its potential benefits for users, and whether terrorists and violent extremists are exploiting these technologies. We also consider future threats relating to exploitation of the decentralised web, and how tech companies building this technology can mitigate this by developing trust and safety mechanisms early on.  </b></p><p><b>Join Anne Craanen as she speaks to Dr. Inga Trauthig, a Senior Research Fellow with the Propaganda Research Lab at The University of Texas at Austin, and Clara Tsao, Co-founder of the Trust &amp; Safety Professional Association (TSPA) and Senior Non-Resident Fellow at the Atlantic Council.</b></p><p><b>You can read Inga’s full research paper “Emergent Technologies and Extremists:</b></p><p><b>The DWeb as a New Internet Reality?” </b><a href='https://gnet-research.org/wp-content/uploads/2022/07/GNET-Report-Emergent-Technologies-Extremists-Web.pdf'><b>here</b></a><b>. And learn more about Clara’s work at The Trust &amp; Safety Professional Association </b><a href='https://www.tspa.org/'><b>here</b></a><b>. </b></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/tNMRAdNcrvs'><b>here</b></a><b>. </b></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>This week on the Tech Against Terrorism podcast we’re exploring the decentralised web. We discuss what the decentralised web is, its potential benefits for users, and whether terrorists and violent extremists are exploiting these technologies. We also consider future threats relating to exploitation of the decentralised web, and how tech companies building this technology can mitigate this by developing trust and safety mechanisms early on.  </b></p><p><b>Join Anne Craanen as she speaks to Dr. Inga Trauthig, a Senior Research Fellow with the Propaganda Research Lab at The University of Texas at Austin, and Clara Tsao, Co-founder of the Trust &amp; Safety Professional Association (TSPA) and Senior Non-Resident Fellow at the Atlantic Council.</b></p><p><b>You can read Inga’s full research paper “Emergent Technologies and Extremists:</b></p><p><b>The DWeb as a New Internet Reality?” </b><a href='https://gnet-research.org/wp-content/uploads/2022/07/GNET-Report-Emergent-Technologies-Extremists-Web.pdf'><b>here</b></a><b>. And learn more about Clara’s work at The Trust &amp; Safety Professional Association </b><a href='https://www.tspa.org/'><b>here</b></a><b>. </b></p><p><b>You can read a transcript of this episode </b><a href='https://share.descript.com/view/tNMRAdNcrvs'><b>here</b></a><b>. </b></p><p><b>If you want to find out more about Tech Against Terrorism and our work, visit</b><a href='https://www.techagainstterrorism.org/'><b> techagainstterrorism.org</b></a><b> or follow us on Twitter </b><a href='https://twitter.com/techvsterrorism'><b>@techvsterrorism</b></a><b>, where you can find resources on this topic. </b></p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/11697771-the-decentralised-web.mp3" length="19896857" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11697771</guid>
    <pubDate>Thu, 17 Nov 2022 01:00:00 +0000</pubDate>
    <itunes:duration>1654</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Terrorist Operated Websites</itunes:title>
    <title>Terrorist Operated Websites</title>
    <itunes:summary><![CDATA[This week on the Tech Against Terrorism podcast we’re exploring the threat of terrorist operated websites (TOWs). We discuss what TOWs are, what features they offer, and what role they play in wider terrorist and violent extremist exploitation of the internet.  We also discuss why removing websites is so legally and ethically complicated and requires multi-stakeholder solutions. Finally, we outline what TAT is doing to combat TOWs, and consider what can be done by policymakers, infrastru...]]></itunes:summary>
    <description><![CDATA[<p>This week on the Tech Against Terrorism podcast we’re exploring the threat of terrorist operated websites (TOWs). We discuss what TOWs are, what features they offer, and what role they play in wider terrorist and violent extremist exploitation of the internet. </p><p>We also discuss why removing websites is so legally and ethically complicated and requires multi-stakeholder solutions. Finally, we outline what TAT is doing to combat TOWs, and consider what can be done by policymakers, infrastructure providers and other relevant stakeholders. </p><p>Join Anne Craanen as she speaks to Ajith Francis, Director of the Data &amp; Jurisdiction Program at the <a href='https://www.internetjurisdiction.net/about/mission'>Internet &amp; Jurisdiction Policy Network</a> and Rory, an Open-source Intelligence (OSINT) Analyst at Tech Against Terrorism. </p><p>You can read our full report on the threat of terrorist and violent extremist operated websites <a href='https://www.techagainstterrorism.org/2022/01/28/report-the-threat-of-terrorist-and-violent-extremist-operated-websites/'>here</a>. </p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/zGE742O2wxZ'>here</a>.  </p><p>If you want to find out more about Tech Against Terrorism and our work, visit<a href='https://www.techagainstterrorism.org/'> techagainstterrorism.org</a> or follow us on Twitter <a href='https://twitter.com/techvsterrorism'>@techvsterrorism</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>This week on the Tech Against Terrorism podcast we’re exploring the threat of terrorist operated websites (TOWs). We discuss what TOWs are, what features they offer, and what role they play in wider terrorist and violent extremist exploitation of the internet. </p><p>We also discuss why removing websites is so legally and ethically complicated and requires multi-stakeholder solutions. Finally, we outline what TAT is doing to combat TOWs, and consider what can be done by policymakers, infrastructure providers and other relevant stakeholders. </p><p>Join Anne Craanen as she speaks to Ajith Francis, Director of the Data &amp; Jurisdiction Program at the <a href='https://www.internetjurisdiction.net/about/mission'>Internet &amp; Jurisdiction Policy Network</a> and Rory, an Open-source Intelligence (OSINT) Analyst at Tech Against Terrorism. </p><p>You can read our full report on the threat of terrorist and violent extremist operated websites <a href='https://www.techagainstterrorism.org/2022/01/28/report-the-threat-of-terrorist-and-violent-extremist-operated-websites/'>here</a>. </p><p>You can read a transcript of this episode <a href='https://share.descript.com/view/zGE742O2wxZ'>here</a>.  </p><p>If you want to find out more about Tech Against Terrorism and our work, visit<a href='https://www.techagainstterrorism.org/'> techagainstterrorism.org</a> or follow us on Twitter <a href='https://twitter.com/techvsterrorism'>@techvsterrorism</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/11573225-terrorist-operated-websites.mp3" length="17359199" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11573225</guid>
    <pubDate>Thu, 27 Oct 2022 00:00:00 +0100</pubDate>
    <itunes:duration>1443</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, moderation, safety, online, social media, extremism, Facebook</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Dark Web</itunes:title>
    <title>The Dark Web</title>
    <itunes:summary><![CDATA[Welcome back to the Tech Against Terrorism podcast. For our first episode back, we’re taking a deep dive into the dark web. We discuss what the dark web is, who’s using it, plus consider the extent to which it’s exploited by terrorist actors. We also discuss how the dark web is regulated, consider future threats and whether it’s an area the tech sector and policymakers should be prioritising.  Join Anne Craanen as she speaks to Dr James Martin, a Senior Lecturer in Criminology at Deakin ...]]></itunes:summary>
    <description><![CDATA[<p>Welcome back to the Tech Against Terrorism podcast. For our first episode back, we’re taking a deep dive into the dark web. We discuss what the dark web is, who’s using it, plus consider the extent to which it’s exploited by terrorist actors. We also discuss how the dark web is regulated, consider future threats and whether it’s an area the tech sector and policymakers should be prioritising. </p><p>Join Anne Craanen as she speaks to Dr James Martin, a Senior Lecturer in Criminology at Deakin University, Australia. And Arthur Bradley, Open-source Intelligence Manager at Tech Against Terrorism. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit<a href='https://www.techagainstterrorism.org/'> techagainstterrorism.org</a> or follow us on Twitter <a href='https://twitter.com/techvsterrorism'>@techvsterrorism</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>Welcome back to the Tech Against Terrorism podcast. For our first episode back, we’re taking a deep dive into the dark web. We discuss what the dark web is, who’s using it, plus consider the extent to which it’s exploited by terrorist actors. We also discuss how the dark web is regulated, consider future threats and whether it’s an area the tech sector and policymakers should be prioritising. </p><p>Join Anne Craanen as she speaks to Dr James Martin, a Senior Lecturer in Criminology at Deakin University, Australia. And Arthur Bradley, Open-source Intelligence Manager at Tech Against Terrorism. </p><p>If you want to find out more about Tech Against Terrorism and our work, visit<a href='https://www.techagainstterrorism.org/'> techagainstterrorism.org</a> or follow us on Twitter <a href='https://twitter.com/techvsterrorism'>@techvsterrorism</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/11485688-the-dark-web.mp3" length="17547955" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11485688</guid>
    <pubDate>Thu, 13 Oct 2022 00:00:00 +0100</pubDate>
    <itunes:duration>1458</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, moderation, safety, online, social media, extremism, Facebook</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Trailer: Tech Against Terrorism</itunes:title>
    <title>Trailer: Tech Against Terrorism</title>
    <itunes:summary><![CDATA[The Tech Against Terrorism podcast is returning on Thursday 13th October. Join us every other week as we unpick how terrorists and violent extremists are exploiting the darkest corners of the internet and what can be done to support the tech sector to disrupt this threat. ]]></itunes:summary>
    <description><![CDATA[<p>The Tech Against Terrorism podcast is returning on Thursday 13th October. Join us every other week as we unpick how terrorists and violent extremists are exploiting the darkest corners of the internet and what can be done to support the tech sector to disrupt this threat.</p>]]></description>
    <content:encoded><![CDATA[<p>The Tech Against Terrorism podcast is returning on Thursday 13th October. Join us every other week as we unpick how terrorists and violent extremists are exploiting the darkest corners of the internet and what can be done to support the tech sector to disrupt this threat.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/11428007-trailer-tech-against-terrorism.mp3" length="947217" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11428007</guid>
    <pubDate>Tue, 04 Oct 2022 00:00:00 +0100</pubDate>
    <itunes:duration>75</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, moderation, safety, online, social media, extremism</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>trailer</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The TCAP: A Tool to Tackle Terrorist Content</itunes:title>
    <title>The TCAP: A Tool to Tackle Terrorist Content</title>
    <itunes:summary><![CDATA[For the final episode of Season 2 of the podcast we’re taking a closer look at a tool developed by Tech Against Terrorism called the Terrorist Content Analytics Platform (TCAP). We learn what the TCAP is, why it was set up, and how it’s used to automate the swift detection and removal of verified terrorist content on tech platforms. During the episode, Mariusz Żurawek explains how he struggled to single-handedly moderate extremist content on his platform JustPaste.it. We discuss how terrorist...]]></itunes:summary>
    <description><![CDATA[<p>For the final episode of Season 2 of the podcast we’re taking a closer look at a tool developed by Tech Against Terrorism called the <a href='https://www.terrorismanalytics.org/'>Terrorist Content Analytics Platform</a> (TCAP). We learn what the TCAP is, why it was set up, and how it’s used to automate the swift detection and removal of verified terrorist content on tech platforms.</p><p>During the episode, Mariusz Żurawek explains how he struggled to single-handedly moderate extremist content on his platform JustPaste.it. We discuss how terrorist exploitation of the whole online ecosystem, especially smaller platforms like Mariusz’, inspired the development of the TCAP.  We also chat to the TCAP team about the work they’re doing to add more functionality to the platform and about some of the processes that are in place to ensure it’s as transparent as possible to its stakeholders and the wider public. </p><p>Join Anne Craanen as she speaks to Jacob Berntsson who’s the Head of Policy &amp; Research at Tech Against Terrorism, Sophie Laitt who’s a Senior Product Manager at Tech Against Terrorism and Mariusz Żurawek, the founder of <a href='https://justpaste.it/'>JustPaste.it</a> - a website which uses the TCAP to help it take down potentially harmful terrorist content from its site. </p><p>If you want to find out more about the TCAP, head over to the website at<a href='https://www.terrorismanalytics.org/'> terrorismanalytics.org</a>. And for those interested you can find our Transparency Report<a href='https://tcap-website.s3.eu-west-2.amazonaws.com/about/Tech+Against+Terrorism+-+TCAP+Report%2C+March+2022_v6.pdf'> here</a>. To find out more about Tech Against Terrorism and our work, visit<a href='https://www.techagainstterrorism.org/'> techagainstterrorism.org</a> or follow us on Twitter <a href='https://twitter.com/techvsterrorism'>@techvsterrorism</a>, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>For the final episode of Season 2 of the podcast we’re taking a closer look at a tool developed by Tech Against Terrorism called the <a href='https://www.terrorismanalytics.org/'>Terrorist Content Analytics Platform</a> (TCAP). We learn what the TCAP is, why it was set up, and how it’s used to automate the swift detection and removal of verified terrorist content on tech platforms.</p><p>During the episode, Mariusz Żurawek explains how he struggled to single-handedly moderate extremist content on his platform JustPaste.it. We discuss how terrorist exploitation of the whole online ecosystem, especially smaller platforms like Mariusz’, inspired the development of the TCAP.  We also chat to the TCAP team about the work they’re doing to add more functionality to the platform and about some of the processes that are in place to ensure it’s as transparent as possible to its stakeholders and the wider public. </p><p>Join Anne Craanen as she speaks to Jacob Berntsson who’s the Head of Policy &amp; Research at Tech Against Terrorism, Sophie Laitt who’s a Senior Product Manager at Tech Against Terrorism and Mariusz Żurawek, the founder of <a href='https://justpaste.it/'>JustPaste.it</a> - a website which uses the TCAP to help it take down potentially harmful terrorist content from its site. </p><p>If you want to find out more about the TCAP, head over to the website at<a href='https://www.terrorismanalytics.org/'> terrorismanalytics.org</a>. And for those interested you can find our Transparency Report<a href='https://tcap-website.s3.eu-west-2.amazonaws.com/about/Tech+Against+Terrorism+-+TCAP+Report%2C+March+2022_v6.pdf'> here</a>. To find out more about Tech Against Terrorism and our work, visit<a href='https://www.techagainstterrorism.org/'> techagainstterrorism.org</a> or follow us on Twitter <a href='https://twitter.com/techvsterrorism'>@techvsterrorism</a>, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10551443-the-tcap-a-tool-to-tackle-terrorist-content.mp3" length="24021735" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10551443</guid>
    <pubDate>Wed, 04 May 2022 01:00:00 +0100</pubDate>
    <itunes:duration>1998</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, moderation, safety, online, social media, extremism, analytics, TCAP</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Can Tech Platforms Rely on Algorithms to Remove Terrorist Content?</itunes:title>
    <title>Can Tech Platforms Rely on Algorithms to Remove Terrorist Content?</title>
    <itunes:summary><![CDATA[On this week’s episode, we’re exploring the role of automated solutions and Artificial Intelligence (AI) in tackling terrorist and violent extremist content and activity online. With the help of our expert guests, we delve into the historical use of machine learning algorithms for content moderation purposes, look at how they’ve developed over the last decade or so, and discuss their potential going forward.  We consider some of the potential biases and ethical considerations around auto...]]></itunes:summary>
    <description><![CDATA[<p>On this week’s episode, we’re exploring the role of automated solutions and Artificial Intelligence (AI) in tackling terrorist and violent extremist content and activity online. With the help of our expert guests, we delve into the historical use of machine learning algorithms for content moderation purposes, look at how they’ve developed over the last decade or so, and discuss their potential going forward. </p><p>We consider some of the potential biases and ethical considerations around automated removal systems, such as the mistaken removal of war crime evidence or political speech in the Arabic language. Our guests explore how we can best utilise algorithms to tackle terrorist content, highlighting their potential for understanding patterns of terrorist behaviour online.</p><p>This week, Anne Craanen speaks to Adam Hadley, Founder and Executive Director of Tech Against Terrorism. We also hear from Dia Kayyali, director for advocacy at <a href='https://mnemonic.org/'>Mnemonic</a> where they focus on the real-life impact of policy decisions made by lawmakers and technology companies about content moderation and related topics. And Chris Meserole, a fellow in Foreign Policy at the <a href='https://www.brookings.edu/'>Brookings Institution</a> and director of research for the <a href='https://www.brookings.edu/project/artificial-intelligence-and-emerging-technology-initiative/'>Brookings Artificial Intelligence and Emerging Technology Initiative</a>. Chris is also an adjunct professor at Georgetown University.</p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic.</p>]]></description>
    <content:encoded><![CDATA[<p>On this week’s episode, we’re exploring the role of automated solutions and Artificial Intelligence (AI) in tackling terrorist and violent extremist content and activity online. With the help of our expert guests, we delve into the historical use of machine learning algorithms for content moderation purposes, look at how they’ve developed over the last decade or so, and discuss their potential going forward. </p><p>We consider some of the potential biases and ethical considerations around automated removal systems, such as the mistaken removal of war crime evidence or political speech in the Arabic language. Our guests explore how we can best utilise algorithms to tackle terrorist content, highlighting their potential for understanding patterns of terrorist behaviour online.</p><p>This week, Anne Craanen speaks to Adam Hadley, Founder and Executive Director of Tech Against Terrorism. We also hear from Dia Kayyali, director for advocacy at <a href='https://mnemonic.org/'>Mnemonic</a> where they focus on the real-life impact of policy decisions made by lawmakers and technology companies about content moderation and related topics. And Chris Meserole, a fellow in Foreign Policy at the <a href='https://www.brookings.edu/'>Brookings Institution</a> and director of research for the <a href='https://www.brookings.edu/project/artificial-intelligence-and-emerging-technology-initiative/'>Brookings Artificial Intelligence and Emerging Technology Initiative</a>. Chris is also an adjunct professor at Georgetown University.</p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10506835-can-tech-platforms-rely-on-algorithms-to-remove-terrorist-content.mp3" length="33433540" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10506835</guid>
    <pubDate>Wed, 27 Apr 2022 00:00:00 +0100</pubDate>
    <itunes:duration>2782</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, automation, AI, online, moderation, ethics, war</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Debunking Russian Disinformation on “Denazification” of Ukraine (SPECIAL EPISODE) </itunes:title>
    <title>Debunking Russian Disinformation on “Denazification” of Ukraine (SPECIAL EPISODE) </title>
    <itunes:summary><![CDATA[This week we’re bringing you a special episode investigating the conflict in Ukraine. We unpack the truth around violent extremist elements operating in Ukraine amid the online information war that’s been unfolding. We speak to experts who expose the Russian claims of denazification as state-sponsored disinformation, and interrogate the reality of the violent far-right presence and influence of foreign fighters in Ukraine.  Join Anne Craanen as she speaks to Ukraine-based Olga Yurkova wh...]]></itunes:summary>
    <description><![CDATA[<p>This week we’re bringing you a special episode investigating the conflict in Ukraine. We unpack the truth around violent extremist elements operating in Ukraine amid the online information war that’s been unfolding. We speak to experts who expose the Russian claims of denazification as state-sponsored disinformation, and interrogate the reality of the violent far-right presence and influence of foreign fighters in Ukraine. </p><p>Join Anne Craanen as she speaks to Ukraine-based Olga Yurkova who is the Co-founder of <a href='https://www.stopfake.org/ru/glavnaya-2/'>StopFake.org</a>, an educational platform which aims to teach people about the dangers of spreading false information. We also hear from Kacper Rekawek, a PhD, postdoctoral fellow at the <a href='https://www.sv.uio.no/c-rex/english/'>Center for Research on Extremism at the University of Oslo</a>. And finally, from Jason Blazakis who is a Professor at the <a href='https://www.middlebury.edu/institute/'>Middlebury Institute of International Studies</a> (MIIS) and former Director of the Counterterrorism Finance and Designations Office, <a href='https://www.state.gov/about-us-bureau-of-counterterrorism/'>Bureau of Counterterrorism, U.S. Department of State</a>. </p><p>We also get valuable insight from Arthur Bradley, a Senior OSINT analyst at Tech Against Terrorism, who explains the divergent reaction of the international far-right to the invasion online. Our experts reveal troubling links between the Russian state and far-right fighters in Ukraine exposing Kremlin narratives as not only false but contradictory.  </p><p>How do you tell if a photo or video posted online is real or fake? Here&apos;s a simple <a href='https://www.bbc.com/news/av/61096713'>video</a> by the BBC&apos;s Disinformation team on how to check and verify content shared online about the war in Ukraine. Or you can find this article on Olga’s website <a href='https://www.stopfake.org/ru/glavnaya-2/'>StopFake.org</a> on <a href='https://www.stopfake.org/ru/kak-raspoznat-fejk/'>“How to recognise a fake.”</a></p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>This week we’re bringing you a special episode investigating the conflict in Ukraine. We unpack the truth around violent extremist elements operating in Ukraine amid the online information war that’s been unfolding. We speak to experts who expose the Russian claims of denazification as state-sponsored disinformation, and interrogate the reality of the violent far-right presence and influence of foreign fighters in Ukraine. </p><p>Join Anne Craanen as she speaks to Ukraine-based Olga Yurkova who is the Co-founder of <a href='https://www.stopfake.org/ru/glavnaya-2/'>StopFake.org</a>, an educational platform which aims to teach people about the dangers of spreading false information. We also hear from Kacper Rekawek, a PhD, postdoctoral fellow at the <a href='https://www.sv.uio.no/c-rex/english/'>Center for Research on Extremism at the University of Oslo</a>. And finally, from Jason Blazakis who is a Professor at the <a href='https://www.middlebury.edu/institute/'>Middlebury Institute of International Studies</a> (MIIS) and former Director of the Counterterrorism Finance and Designations Office, <a href='https://www.state.gov/about-us-bureau-of-counterterrorism/'>Bureau of Counterterrorism, U.S. Department of State</a>. </p><p>We also get valuable insight from Arthur Bradley, a Senior OSINT analyst at Tech Against Terrorism, who explains the divergent reaction of the international far-right to the invasion online. Our experts reveal troubling links between the Russian state and far-right fighters in Ukraine exposing Kremlin narratives as not only false but contradictory.  </p><p>How do you tell if a photo or video posted online is real or fake? Here&apos;s a simple <a href='https://www.bbc.com/news/av/61096713'>video</a> by the BBC&apos;s Disinformation team on how to check and verify content shared online about the war in Ukraine. Or you can find this article on Olga’s website <a href='https://www.stopfake.org/ru/glavnaya-2/'>StopFake.org</a> on <a href='https://www.stopfake.org/ru/kak-raspoznat-fejk/'>“How to recognise a fake.”</a></p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10465894-debunking-russian-disinformation-on-denazification-of-ukraine-special-episode.mp3" length="25667836" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10465894</guid>
    <pubDate>Wed, 20 Apr 2022 00:00:00 +0100</pubDate>
    <itunes:duration>2135</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, moderation, safety, online, social media, extremism, far-right</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is Official Terrorist Content Illegal Online? Terrorist Designation and the Online Realm</itunes:title>
    <title>Is Official Terrorist Content Illegal Online? Terrorist Designation and the Online Realm</title>
    <itunes:summary><![CDATA[On this week’s episode of the podcast, we’re looking at terrorist designation. We analyse different countries’ designation systems and discuss how they can be improved. We consider the role designation plays in the fight against terrorism and how it can be used as a tool to tackle terrorist content online.  Anne Craanen is joined by two experts on designation, firstly Dr. Anna Meier who is an Assistant Professor of political science and international relations at the University of Nottin...]]></itunes:summary>
    <description><![CDATA[<p>On this week’s episode of the podcast, we’re looking at terrorist designation. We analyse different countries’ designation systems and discuss how they can be improved. We consider the role designation plays in the fight against terrorism and how it can be used as a tool to tackle terrorist content online. </p><p>Anne Craanen is joined by two experts on designation, firstly Dr. Anna Meier who is an Assistant Professor of political science and international relations at the University of Nottingham. Anna studies counterterrorism in Germany and the United States, with a particular interest in white supremacist violence and proscription policy. Anne also speaks to Jason Blazakis, Professor at the <a href='https://www.middlebury.edu/institute/'>Middlebury Institute of International Studies</a> (MIIS) and former Director of the Counterterrorism Finance and Designations Office, <a href='https://www.state.gov/bureaus-offices/under-secretary-for-civilian-security-democracy-and-human-rights/bureau-of-counterterrorism/'>Bureau of Counterterrorism</a>, U.S. Department of State. Jason is also a Senior Advisor at <a href='https://www.soufangroup.com/about/'>The Soufan Group</a>.</p><p>Our other guest this week is David Shanks who is the Chief Censor of the <a href='https://www.classificationoffice.govt.nz/'>New Zealand Classification Office</a>. David’s role as part of this media regulator includes making determinations about the legality of the most extreme and violent terrorist content. He gives us a fascinating insight into some of the dilemmas this responsibility entails and on what can be done to better tackle terrorist content online. We also get insight from Archie Macfarlane, who is a Junior Research Analyst at Tech Against Terrorism, on the work TAT has been doing on designation.<br/><br/>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p>]]></description>
    <content:encoded><![CDATA[<p>On this week’s episode of the podcast, we’re looking at terrorist designation. We analyse different countries’ designation systems and discuss how they can be improved. We consider the role designation plays in the fight against terrorism and how it can be used as a tool to tackle terrorist content online. </p><p>Anne Craanen is joined by two experts on designation, firstly Dr. Anna Meier who is an Assistant Professor of political science and international relations at the University of Nottingham. Anna studies counterterrorism in Germany and the United States, with a particular interest in white supremacist violence and proscription policy. Anne also speaks to Jason Blazakis, Professor at the <a href='https://www.middlebury.edu/institute/'>Middlebury Institute of International Studies</a> (MIIS) and former Director of the Counterterrorism Finance and Designations Office, <a href='https://www.state.gov/bureaus-offices/under-secretary-for-civilian-security-democracy-and-human-rights/bureau-of-counterterrorism/'>Bureau of Counterterrorism</a>, U.S. Department of State. Jason is also a Senior Advisor at <a href='https://www.soufangroup.com/about/'>The Soufan Group</a>.</p><p>Our other guest this week is David Shanks who is the Chief Censor of the <a href='https://www.classificationoffice.govt.nz/'>New Zealand Classification Office</a>. David’s role as part of this media regulator includes making determinations about the legality of the most extreme and violent terrorist content. He gives us a fascinating insight into some of the dilemmas this responsibility entails and on what can be done to better tackle terrorist content online. We also get insight from Archie Macfarlane, who is a Junior Research Analyst at Tech Against Terrorism, on the work TAT has been doing on designation.<br/><br/>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10425259-is-official-terrorist-content-illegal-online-terrorist-designation-and-the-online-realm.mp3" length="43133783" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10425259</guid>
    <pubDate>Wed, 13 Apr 2022 00:00:00 +0100</pubDate>
    <itunes:duration>3590</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, designation, politics, online, social media, extremism</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Navigating a Fragmented Regulatory Landscape</itunes:title>
    <title>Navigating a Fragmented Regulatory Landscape</title>
    <itunes:summary><![CDATA[On this week’s episode of the podcast, we’re looking at online regulation. We consider why regulation is so important, how the landscape has evolved, and focus on some of the specific challenges around regulating terrorist content online. We also touch on influential regulation that’s been recently adopted as well as regulation that’s currently being considered, including the UK’s Online Safety Bill.  Join Anne Craanen as she speaks to Luca Bertuzzi who is a tech journalist specialising ...]]></itunes:summary>
    <description><![CDATA[<p>On this week’s episode of the podcast, we’re looking at online regulation. We consider why regulation is so important, how the landscape has evolved, and focus on some of the specific challenges around regulating terrorist content online. We also touch on influential regulation that’s been recently adopted as well as regulation that’s currently being considered, including the UK’s <a href='https://www.gov.uk/government/publications/online-safety-bill-supporting-documents/online-safety-bill-factsheet'>Online Safety Bill</a>. </p><p>Join Anne Craanen as she speaks to Luca Bertuzzi who is a tech journalist specialising in digital policy and European affairs. He is Digital and Media Editor at <a href='https://www.euractiv.com/'>EURACTIV</a>, where he oversees an international team based in Brussels, Berlin and Paris. We&apos;re also joined by Asha Allen from the Centre of Democracy and Technology, Europe Office; where she coordinates the organisation&apos;s advocacy engagement on the Digital Services Act and European Democracy Action Plan. Asha is a human rights advocate and policy specialist with an extensive background in leading advocacy to eradicate online gender-based violence.</p><p>Anne also gets insight from Jacob Berntsson who is the Head of Policy &amp; Research at Tech Against Terrorism. He oversees the programmatic delivery and implementation of the organisation’s work. Jacob specialises in analysing tech policy and emerging global online regulation and has previous work experience in government intelligence and from the private sector.</p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. To find out more about the online regulatory landscape, check out <a href='https://www.techagainstterrorism.org/2021/07/16/the-online-regulation-series-the-handbook/#:~:text=The%20Online%20Regulation%20Series%20Handbook%20provides%20an%20analysis%20of%20global,terrorist%20and%20violent%20extremist%20content.'>The Online Regulation Series</a> Handbook. </p><p>You can follow Luca Bertuzzi on Twitter <a href='https://twitter.com/bertuzluca'>here</a> and Asha Allen <a href='https://twitter.com/AshaOAllen'>here</a>. </p><p>You can find out more about the Centre of Democracy and Technology <a href='https://cdt.org/'>here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>On this week’s episode of the podcast, we’re looking at online regulation. We consider why regulation is so important, how the landscape has evolved, and focus on some of the specific challenges around regulating terrorist content online. We also touch on influential regulation that’s been recently adopted as well as regulation that’s currently being considered, including the UK’s <a href='https://www.gov.uk/government/publications/online-safety-bill-supporting-documents/online-safety-bill-factsheet'>Online Safety Bill</a>. </p><p>Join Anne Craanen as she speaks to Luca Bertuzzi who is a tech journalist specialising in digital policy and European affairs. He is Digital and Media Editor at <a href='https://www.euractiv.com/'>EURACTIV</a>, where he oversees an international team based in Brussels, Berlin and Paris. We&apos;re also joined by Asha Allen from the Centre of Democracy and Technology, Europe Office; where she coordinates the organisation&apos;s advocacy engagement on the Digital Services Act and European Democracy Action Plan. Asha is a human rights advocate and policy specialist with an extensive background in leading advocacy to eradicate online gender-based violence.</p><p>Anne also gets insight from Jacob Berntsson who is the Head of Policy &amp; Research at Tech Against Terrorism. He oversees the programmatic delivery and implementation of the organisation’s work. Jacob specialises in analysing tech policy and emerging global online regulation and has previous work experience in government intelligence and from the private sector.</p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. To find out more about the online regulatory landscape, check out <a href='https://www.techagainstterrorism.org/2021/07/16/the-online-regulation-series-the-handbook/#:~:text=The%20Online%20Regulation%20Series%20Handbook%20provides%20an%20analysis%20of%20global,terrorist%20and%20violent%20extremist%20content.'>The Online Regulation Series</a> Handbook. </p><p>You can follow Luca Bertuzzi on Twitter <a href='https://twitter.com/bertuzluca'>here</a> and Asha Allen <a href='https://twitter.com/AshaOAllen'>here</a>. </p><p>You can find out more about the Centre of Democracy and Technology <a href='https://cdt.org/'>here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10381720-navigating-a-fragmented-regulatory-landscape.mp3" length="28242738" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10381720</guid>
    <pubDate>Wed, 06 Apr 2022 00:00:00 +0100</pubDate>
    <itunes:duration>2350</itunes:duration>
    <itunes:keywords>tech, terrorism, internet, social media, online, counterterrorism, extremism, regulation</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tech Policy Evolution &amp; The Human Side of Moderating Terrorist Content (PART 2)</itunes:title>
    <title>Tech Policy Evolution &amp; The Human Side of Moderating Terrorist Content (PART 2)</title>
    <itunes:summary><![CDATA[Welcome back to part 2 of our deep dive into tech platform policy around countering terrorism and violent extremism. In this episode, we’re getting insight from Zoom and Clubhouse into how their community standards have been developed with tackling harmful content in mind. In this episode, Anne Craanen speaks to Jessica Mason, Head of Global Policy and Public Affairs at Clubhouse, and Josh Parecki, Head of Trust and Safety at Zoom. They provide a tech platform perspective on what informs thei...]]></itunes:summary>
    <description><![CDATA[<p>Welcome back to part 2 of our deep dive into tech platform policy around countering terrorism and violent extremism. In this episode, we’re getting insight from Zoom and Clubhouse into how their community standards have been developed with tackling harmful content in mind.</p><p>In this episode, Anne Craanen speaks to Jessica Mason, Head of Global Policy and Public Affairs at Clubhouse, and Josh Parecki, Head of Trust and Safety at Zoom. They provide a tech platform perspective on what informs their counterterrorism policies, why each platform faces different challenges in implementing their policies, and what’s being done to support tech companies navigate these difficult trust and safety challenges. Fabienne Tarrant, a Senior Policy Analyst at Tech Against Terrorism, also explains how Tech Against Terrorism supports tech companies develop and strengthen these policies through mentorship and knowledge sharing.</p><p>If you missed part 1, Anne spoke to Charlotte Willner who’s the Executive Director at the Trust and Safety Professional Association, about her work as one of Facebook’s early content moderators and how the Trust and Safety landscape has changed since then. Charlotte shares valuable insight into the human side of moderating terrorist and violent extremist content online. </p><p>To find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>If you’re interested in learning more about Tech Against Terrorism’s support to tech companies, you can find out about mentorship <a href='https://www.techagainstterrorism.org/membership/tech-against-terrorism-mentorship/'>here</a>, or background information about our Knowledge Sharing Platform <a href='https://www.techagainstterrorism.org/2021/07/07/the-knowledge-sharing-platform-2021-re-launch/'>here</a>, which can be accessed following registration <a href='https://ksp.techagainstterrorism.org/'>here</a>. </p><p>You can read more about Trust &amp; Safety at Clubhouse <a href='https://clubhouseapp.zendesk.com/hc/en-us/categories/1500000163161--Trust-Safety-Privacy'>here</a> and Zoom <a href='https://explore.zoom.us/en/trust/trust-safety/'>here</a>. </p><p>You can learn more about the Trust &amp; Safety Professional Association <a href='https://www.tspa.org/'>here</a>.  </p>]]></description>
    <content:encoded><![CDATA[<p>Welcome back to part 2 of our deep dive into tech platform policy around countering terrorism and violent extremism. In this episode, we’re getting insight from Zoom and Clubhouse into how their community standards have been developed with tackling harmful content in mind.</p><p>In this episode, Anne Craanen speaks to Jessica Mason, Head of Global Policy and Public Affairs at Clubhouse, and Josh Parecki, Head of Trust and Safety at Zoom. They provide a tech platform perspective on what informs their counterterrorism policies, why each platform faces different challenges in implementing their policies, and what’s being done to support tech companies navigate these difficult trust and safety challenges. Fabienne Tarrant, a Senior Policy Analyst at Tech Against Terrorism, also explains how Tech Against Terrorism supports tech companies develop and strengthen these policies through mentorship and knowledge sharing.</p><p>If you missed part 1, Anne spoke to Charlotte Willner who’s the Executive Director at the Trust and Safety Professional Association, about her work as one of Facebook’s early content moderators and how the Trust and Safety landscape has changed since then. Charlotte shares valuable insight into the human side of moderating terrorist and violent extremist content online. </p><p>To find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>If you’re interested in learning more about Tech Against Terrorism’s support to tech companies, you can find out about mentorship <a href='https://www.techagainstterrorism.org/membership/tech-against-terrorism-mentorship/'>here</a>, or background information about our Knowledge Sharing Platform <a href='https://www.techagainstterrorism.org/2021/07/07/the-knowledge-sharing-platform-2021-re-launch/'>here</a>, which can be accessed following registration <a href='https://ksp.techagainstterrorism.org/'>here</a>. </p><p>You can read more about Trust &amp; Safety at Clubhouse <a href='https://clubhouseapp.zendesk.com/hc/en-us/categories/1500000163161--Trust-Safety-Privacy'>here</a> and Zoom <a href='https://explore.zoom.us/en/trust/trust-safety/'>here</a>. </p><p>You can learn more about the Trust &amp; Safety Professional Association <a href='https://www.tspa.org/'>here</a>.  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10338254-tech-policy-evolution-the-human-side-of-moderating-terrorist-content-part-2.mp3" length="21768710" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10338254</guid>
    <pubDate>Fri, 01 Apr 2022 00:00:00 +0100</pubDate>
    <itunes:duration>1810</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, moderation, safety, online, social media, extremism, Facebook</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tech Policy Evolution &amp; The Human Side of Moderating Terrorist Content (PART 1)</itunes:title>
    <title>Tech Policy Evolution &amp; The Human Side of Moderating Terrorist Content (PART 1)</title>
    <itunes:summary><![CDATA[Welcome to part 1 of our deep dive into tech platform policy around countering terrorism and violent extremism. There’s a slightly different format this week, as we first chat to Charlotte Willner who gives us some context into the evolution of moderating terrorist content before we get a tech platform perspective on how these challenges look today. In part 1, Anne Craanen speaks to Charlotte Willner who’s the Executive Director at the Trust &amp; Safety Professional Association. Charlotte wa...]]></itunes:summary>
    <description><![CDATA[<p>Welcome to part 1 of our deep dive into tech platform policy around countering terrorism and violent extremism. There’s a slightly different format this week, as we first chat to Charlotte Willner who gives us some context into the evolution of moderating terrorist content before we get a tech platform perspective on how these challenges look today.</p><p>In part 1, Anne Craanen speaks to Charlotte Willner who’s the Executive Director at the Trust &amp; Safety Professional Association. Charlotte was one of Facebook’s early content moderators and went on to build and lead the company&apos;s first Safety Operations team. She gives unique insight into the early challenges Facebook encountered in developing policies to counter terrorist content, how these content moderation challenges have evolved since, as well as inevitable dilemmas human moderators face in the field of Trust and Safety. </p><p>Come back for part 2, where we speak to Jessica Mason of Clubhouse and Josh Parecki of Zoom to get a tech platform perspective on what informs their counterterrorism policies, why each platform faces different challenges in implementing their policies, and what’s being done to support tech companies navigate these difficult Trust and Safety challenges.</p><p>To find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>You can learn more about the Trust &amp; Safety Professional Association <a href='https://www.tspa.org/'>here</a>.  </p>]]></description>
    <content:encoded><![CDATA[<p>Welcome to part 1 of our deep dive into tech platform policy around countering terrorism and violent extremism. There’s a slightly different format this week, as we first chat to Charlotte Willner who gives us some context into the evolution of moderating terrorist content before we get a tech platform perspective on how these challenges look today.</p><p>In part 1, Anne Craanen speaks to Charlotte Willner who’s the Executive Director at the Trust &amp; Safety Professional Association. Charlotte was one of Facebook’s early content moderators and went on to build and lead the company&apos;s first Safety Operations team. She gives unique insight into the early challenges Facebook encountered in developing policies to counter terrorist content, how these content moderation challenges have evolved since, as well as inevitable dilemmas human moderators face in the field of Trust and Safety. </p><p>Come back for part 2, where we speak to Jessica Mason of Clubhouse and Josh Parecki of Zoom to get a tech platform perspective on what informs their counterterrorism policies, why each platform faces different challenges in implementing their policies, and what’s being done to support tech companies navigate these difficult Trust and Safety challenges.</p><p>To find out more about Tech Against Terrorism and our work, visit techagainstterrorism.org or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>You can learn more about the Trust &amp; Safety Professional Association <a href='https://www.tspa.org/'>here</a>.  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10338244-tech-policy-evolution-the-human-side-of-moderating-terrorist-content-part-1.mp3" length="22662398" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10338244</guid>
    <pubDate>Wed, 30 Mar 2022 00:00:00 +0100</pubDate>
    <itunes:duration>1885</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, moderation, safety, online, social media, extremism, Facebook</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tracking Violent Islamist Behaviour Online</itunes:title>
    <title>Tracking Violent Islamist Behaviour Online</title>
    <itunes:summary><![CDATA[In this week’s episode, we’re looking into how violent Islamist groups exploit the internet, how this has evolved in the last decade, and why these online networks are so resilient to content moderation efforts. We also share some of the things we’re doing here at Tech Against Terrorism to counter this threat and consider what tech companies and governments can do to help.  Join Anne Craanen as she speaks again to Mina Al-Lami who heads up the Jihadist Media Team at BBC Monitoring. Mina ...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we’re looking into how violent Islamist groups exploit the internet, how this has evolved in the last decade, and why these online networks are so resilient to content moderation efforts. We also share some of the things we’re doing here at Tech Against Terrorism to counter this threat and consider what tech companies and governments can do to help. </p><p>Join Anne Craanen as she speaks again to Mina Al-Lami who heads up the Jihadist Media Team at BBC Monitoring. Mina is a native Arabic speaker and has spent the past 15 years tracking and analysing jihadist activity, messaging and platforms.</p><p>Anne is also joined by Laurence Bindner who is the co-founder of the JihadOScope (JOS) Project, a platform for extremist and terrorist propaganda analysis. Laurence is also a member of the UNCTAD Global Research Network and a GNET (Global Network on Extremism and Technology) associate fellow.</p><p>We again chat to Arthur Bradley who’s a Senior Open-source Intelligence Analyst at Tech Against Terrorism and head of content collection for the Terrorist Content Analytics Platform (<a href='https://www.terrorismanalytics.org/'>TCAP</a>).</p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>You can learn more about the work BBC Monitoring does <a href='https://monitoring.bbc.co.uk/ouroffers-initiatives/ctec'>here.</a></p><p>You can find out more about the UNCTAD Global Research Network <a href='https://unctad.org/'>here</a> and <a href='https://gnet-research.org/'>GNET</a> here. You can also follow JihadOScope on twitter @<a href='https://twitter.com/jihadoscope?lang=en'>JihadoScope</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we’re looking into how violent Islamist groups exploit the internet, how this has evolved in the last decade, and why these online networks are so resilient to content moderation efforts. We also share some of the things we’re doing here at Tech Against Terrorism to counter this threat and consider what tech companies and governments can do to help. </p><p>Join Anne Craanen as she speaks again to Mina Al-Lami who heads up the Jihadist Media Team at BBC Monitoring. Mina is a native Arabic speaker and has spent the past 15 years tracking and analysing jihadist activity, messaging and platforms.</p><p>Anne is also joined by Laurence Bindner who is the co-founder of the JihadOScope (JOS) Project, a platform for extremist and terrorist propaganda analysis. Laurence is also a member of the UNCTAD Global Research Network and a GNET (Global Network on Extremism and Technology) associate fellow.</p><p>We again chat to Arthur Bradley who’s a Senior Open-source Intelligence Analyst at Tech Against Terrorism and head of content collection for the Terrorist Content Analytics Platform (<a href='https://www.terrorismanalytics.org/'>TCAP</a>).</p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>You can learn more about the work BBC Monitoring does <a href='https://monitoring.bbc.co.uk/ouroffers-initiatives/ctec'>here.</a></p><p>You can find out more about the UNCTAD Global Research Network <a href='https://unctad.org/'>here</a> and <a href='https://gnet-research.org/'>GNET</a> here. You can also follow JihadOScope on twitter @<a href='https://twitter.com/jihadoscope?lang=en'>JihadoScope</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10296985-tracking-violent-islamist-behaviour-online.mp3" length="28172115" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10296985</guid>
    <pubDate>Wed, 23 Mar 2022 00:00:00 +0000</pubDate>
    <itunes:duration>2344</itunes:duration>
    <itunes:keywords>tech, terrorism, internet, social media, online, counterterrorism, extremism</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tracking Violent Far-right Behaviour Online</itunes:title>
    <title>Tracking Violent Far-right Behaviour Online</title>
    <itunes:summary><![CDATA[In this week’s episode, we’re exploring the violent far-right’s use of the internet. We learn what is meant by the ‘far-right’, how different platforms are exploited by violent far-right actors, and the constant evolution of violent far-right content and its online dissemination. We also address some of the challenges moderators and tech platforms face when it comes to monitoring and taking down violent far-right content online. During the episode, we delve into conspiratorial narratives, unp...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode, we’re exploring the violent far-right’s use of the internet. We learn what is meant by the ‘far-right’, how different platforms are exploited by violent far-right actors, and the constant evolution of violent far-right content and its online dissemination. We also address some of the challenges moderators and tech platforms face when it comes to monitoring and taking down violent far-right content online. During the episode, we delve into conspiratorial narratives, unpack their centrality in far-right online culture, and explore why they become so deeply rooted. </p><p>Join Anne Craanen as she speaks to Blyth Crawford who’s a Research Fellow at the International Centre for the Study of Radicalisation where she specialises in far-right online social movements. Blyth is also a PhD candidate at King’s College London where she studies far-right radicalisation within online forums. </p><p>Beatriz Buarque is also on the panel - she’s a PhD candidate at the University of Manchester, investigating the legitimisation of alt-right conspiracy theories. Beatriz is also the founder of the award-winning NGO ‘Words Heal the World’. </p><p>We also hear from Arthur Bradley who’s a Senior Open-source Intelligence Analyst at Tech Against Terrorism and head of content collection for the Terrorist Content Analytics Platform (<a href='https://www.terrorismanalytics.org/'>TCAP</a>), where he works with tech companies and governments across the world in countering terrorist use of the internet using open-source intelligence.</p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>You can learn more about the International Centre for the Study of Radicalisation (ICSR) <a href='https://icsr.info/'>here</a>.</p><p>You can find out more about ‘Words Heal the World’ <a href='https://www.wordshealtheworld.com/'>here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode, we’re exploring the violent far-right’s use of the internet. We learn what is meant by the ‘far-right’, how different platforms are exploited by violent far-right actors, and the constant evolution of violent far-right content and its online dissemination. We also address some of the challenges moderators and tech platforms face when it comes to monitoring and taking down violent far-right content online. During the episode, we delve into conspiratorial narratives, unpack their centrality in far-right online culture, and explore why they become so deeply rooted. </p><p>Join Anne Craanen as she speaks to Blyth Crawford who’s a Research Fellow at the International Centre for the Study of Radicalisation where she specialises in far-right online social movements. Blyth is also a PhD candidate at King’s College London where she studies far-right radicalisation within online forums. </p><p>Beatriz Buarque is also on the panel - she’s a PhD candidate at the University of Manchester, investigating the legitimisation of alt-right conspiracy theories. Beatriz is also the founder of the award-winning NGO ‘Words Heal the World’. </p><p>We also hear from Arthur Bradley who’s a Senior Open-source Intelligence Analyst at Tech Against Terrorism and head of content collection for the Terrorist Content Analytics Platform (<a href='https://www.terrorismanalytics.org/'>TCAP</a>), where he works with tech companies and governments across the world in countering terrorist use of the internet using open-source intelligence.</p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>You can learn more about the International Centre for the Study of Radicalisation (ICSR) <a href='https://icsr.info/'>here</a>.</p><p>You can find out more about ‘Words Heal the World’ <a href='https://www.wordshealtheworld.com/'>here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10252501-tracking-violent-far-right-behaviour-online.mp3" length="27952527" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10252501</guid>
    <pubDate>Wed, 16 Mar 2022 00:00:00 +0000</pubDate>
    <itunes:duration>2325</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, Social media, far-right, OSINT</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Understanding Online Radicalisation </itunes:title>
    <title>Understanding Online Radicalisation </title>
    <itunes:summary><![CDATA[This week, we’re discussing the role of the internet in the radicalisation of terrorists and violent extremists. We learn what radicalisation is, debunk some of the myths surrounding it, and explore how the online and offline worlds interact in radicalising an individual. We’ll also touch on a range of case studies and consider what tech companies and governments can do to combat online radicalisation.  Join Anne Craanen as she speaks to Maura Conway, Professor of International Security ...]]></itunes:summary>
    <description><![CDATA[<p>This week, we’re discussing the role of the internet in the radicalisation of terrorists and violent extremists. We learn what radicalisation is, debunk some of the myths surrounding it, and explore how the online and offline worlds interact in radicalising an individual. We’ll also touch on a range of case studies and consider what tech companies and governments can do to combat online radicalisation. </p><p>Join Anne Craanen as she speaks to Maura Conway, Professor of International Security at the School of Law and Government at Dublin City University. Maura is also the Coordinator of VOX-Pol, an EU-funded project on violent online political extremism.</p><p>Anne is also joined by Ryan Scrivens, Assistant Professor at the School of Criminal Justice at Michigan State University. Ryan is an Associate Director at the International CyberCrime Research Centre at Simon Fraser University in Canada and a Research Fellow at VOX-Pol.</p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>You can learn more about the work of VOX-Pol <a href='https://www.voxpol.eu/'>here</a>.  </p><p>You can find out more about the International CyberCrime Research Centre <a href='https://www.sfu.ca/iccrc.html'>here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>This week, we’re discussing the role of the internet in the radicalisation of terrorists and violent extremists. We learn what radicalisation is, debunk some of the myths surrounding it, and explore how the online and offline worlds interact in radicalising an individual. We’ll also touch on a range of case studies and consider what tech companies and governments can do to combat online radicalisation. </p><p>Join Anne Craanen as she speaks to Maura Conway, Professor of International Security at the School of Law and Government at Dublin City University. Maura is also the Coordinator of VOX-Pol, an EU-funded project on violent online political extremism.</p><p>Anne is also joined by Ryan Scrivens, Assistant Professor at the School of Criminal Justice at Michigan State University. Ryan is an Associate Director at the International CyberCrime Research Centre at Simon Fraser University in Canada and a Research Fellow at VOX-Pol.</p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>You can learn more about the work of VOX-Pol <a href='https://www.voxpol.eu/'>here</a>.  </p><p>You can find out more about the International CyberCrime Research Centre <a href='https://www.sfu.ca/iccrc.html'>here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10209609-understanding-online-radicalisation.mp3" length="29886817" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10209609</guid>
    <pubDate>Wed, 09 Mar 2022 00:00:00 +0000</pubDate>
    <itunes:duration>2487</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, radicalisation, online, social media, extremism</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ghuwayran Prison Break: A Propaganda Victory for Islamic State?</itunes:title>
    <title>Ghuwayran Prison Break: A Propaganda Victory for Islamic State?</title>
    <itunes:summary><![CDATA[In this episode, we discuss Islamic State’s large-scale attack on Ghuwayran prison in north-eastern Syria to break out jailed IS fighters, focusing on the extent to which the event translated into a propaganda victory for the group.  During the episode, we uncover how the prison break played out both online and offline, the reaction from online IS supporter networks, and the effect of these kinds of operations on IS recruitment efforts. We also touch on the death of the group's leader, A...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, we discuss Islamic State’s large-scale attack on Ghuwayran prison in north-eastern Syria to break out jailed IS fighters, focusing on the extent to which the event translated into a propaganda victory for the group. </p><p>During the episode, we uncover how the prison break played out both online and offline, the reaction from online IS supporter networks, and the effect of these kinds of operations on IS recruitment efforts. We also touch on the death of the group&apos;s leader, Abu Ibrahim al-Hashimi al-Qurayshi, following a US raid in northern Syria, and unpack the muted response from online supporters. </p><p>Join Anne Craanen as she speaks to Mina Al-Lami who heads up the Jihadist Media Team at BBC Monitoring. Mina is a native Arabic speaker and has spent the past 15 years tracking and analysing jihadist activity, messaging and platforms.</p><p>Anne is also joined by Dr. Vera Mironova who is a renowned conflict journalist having reported from the front line of the fight against IS. She is also an academic, scholar, producer, speaker, research fellow and policy consultant, as well as an award-winning writer having authored &quot;<em>From Freedom Fighters to Jihadists: Human Resources of Non State Armed Groups.</em>&quot; </p><p>We also hear from Deeba Shadnia who’s an Open-source Intelligence Analyst at Tech Against Terrorism, specialising in tracking how violent Islamists and the violent far-right exploit online spaces. </p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>You can learn more about the work BBC Monitoring does <a href='https://monitoring.bbc.co.uk/ouroffers-initiatives/ctec'>here.</a></p><p>If you want to know more about Vera Mironova’s work, you can find her website <a href='https://vmironova.net/'>here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, we discuss Islamic State’s large-scale attack on Ghuwayran prison in north-eastern Syria to break out jailed IS fighters, focusing on the extent to which the event translated into a propaganda victory for the group. </p><p>During the episode, we uncover how the prison break played out both online and offline, the reaction from online IS supporter networks, and the effect of these kinds of operations on IS recruitment efforts. We also touch on the death of the group&apos;s leader, Abu Ibrahim al-Hashimi al-Qurayshi, following a US raid in northern Syria, and unpack the muted response from online supporters. </p><p>Join Anne Craanen as she speaks to Mina Al-Lami who heads up the Jihadist Media Team at BBC Monitoring. Mina is a native Arabic speaker and has spent the past 15 years tracking and analysing jihadist activity, messaging and platforms.</p><p>Anne is also joined by Dr. Vera Mironova who is a renowned conflict journalist having reported from the front line of the fight against IS. She is also an academic, scholar, producer, speaker, research fellow and policy consultant, as well as an award-winning writer having authored &quot;<em>From Freedom Fighters to Jihadists: Human Resources of Non State Armed Groups.</em>&quot; </p><p>We also hear from Deeba Shadnia who’s an Open-source Intelligence Analyst at Tech Against Terrorism, specialising in tracking how violent Islamists and the violent far-right exploit online spaces. </p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>You can learn more about the work BBC Monitoring does <a href='https://monitoring.bbc.co.uk/ouroffers-initiatives/ctec'>here.</a></p><p>If you want to know more about Vera Mironova’s work, you can find her website <a href='https://vmironova.net/'>here</a>. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10167403-ghuwayran-prison-break-a-propaganda-victory-for-islamic-state.mp3" length="32160280" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10167403</guid>
    <pubDate>Wed, 02 Mar 2022 00:00:00 +0000</pubDate>
    <itunes:duration>2676</itunes:duration>
    <itunes:keywords>tech, terrorism, internet, social media, online, counterterrorism, OSINT, IS, </itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A Foiled Plot in Texas: The Threat of Violent Fringe Online Networks</itunes:title>
    <title>A Foiled Plot in Texas: The Threat of Violent Fringe Online Networks</title>
    <itunes:summary><![CDATA[In this episode, we learn about violent far-right groups who are using the internet to plan and carry out real-world attacks. We hear how dangerous these fringe online communities really are and the work that’s going on behind the scenes to tackle this threat. Join Anne Craanen as she speaks to Alex Newhouse, Deputy Director of the Center on Terrorism, Extremism and Counterterrorism (CTEC) and Director of Technical Research at the Accelerationism Research Consortium (ARC). He also has an MA i...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, we learn about violent far-right groups who are using the internet to plan and carry out real-world attacks. We hear how dangerous these fringe online communities really are and the work that’s going on behind the scenes to tackle this threat.</p><p>Join Anne Craanen as she speaks to Alex Newhouse, Deputy Director of the Center on Terrorism, Extremism and Counterterrorism (CTEC) and Director of Technical Research at the Accelerationism Research Consortium (ARC). He also has an MA in Nonproliferation and Terrorism Studies from the Middlebury Institute and MS in Analytics from Georgia Tech.</p><p>Anne is also joined by Matt Kriner, Senior Research Scholar at the CTEC and Managing Director at ARC. Matt is an intelligence analyst with almost a decade of experience researching and analysing US domestic violent extremists, transnational far-right extremism, and radicalisation.</p><p>We also hear from Deeba Shadnia who’s an Open-source Intelligence Analyst at Tech Against Terrorism, specialising in tracking how violent Islamists and the violent far-right exploit online spaces. Her background is in social media intelligence and she has previously worked on projects identifying state-backed influence operations online.</p><p>During the episode, our experts uncover the online network of neo-Nazi accelerationist groups behind a foiled terrorist plot in Texas, how they exploit the internet to spread their message, and consider how this translates to offline violence. We also hear what tech companies and organisations such as the Accelerationism Research Consortium (ARC) are doing to monitor and combat these online groups.  </p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>You can learn more about the Center on Terrorism, Extremism and Counterterrorism (CTEC) <a href='https://www.middlebury.edu/institute/academics/centers-initiatives/ctec'>here.</a></p><p>You can find out more about the Accelerationism Research Consortium (ARC) <a href='https://www.accresearch.org/'>here.</a> </p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, we learn about violent far-right groups who are using the internet to plan and carry out real-world attacks. We hear how dangerous these fringe online communities really are and the work that’s going on behind the scenes to tackle this threat.</p><p>Join Anne Craanen as she speaks to Alex Newhouse, Deputy Director of the Center on Terrorism, Extremism and Counterterrorism (CTEC) and Director of Technical Research at the Accelerationism Research Consortium (ARC). He also has an MA in Nonproliferation and Terrorism Studies from the Middlebury Institute and MS in Analytics from Georgia Tech.</p><p>Anne is also joined by Matt Kriner, Senior Research Scholar at the CTEC and Managing Director at ARC. Matt is an intelligence analyst with almost a decade of experience researching and analysing US domestic violent extremists, transnational far-right extremism, and radicalisation.</p><p>We also hear from Deeba Shadnia who’s an Open-source Intelligence Analyst at Tech Against Terrorism, specialising in tracking how violent Islamists and the violent far-right exploit online spaces. Her background is in social media intelligence and she has previously worked on projects identifying state-backed influence operations online.</p><p>During the episode, our experts uncover the online network of neo-Nazi accelerationist groups behind a foiled terrorist plot in Texas, how they exploit the internet to spread their message, and consider how this translates to offline violence. We also hear what tech companies and organisations such as the Accelerationism Research Consortium (ARC) are doing to monitor and combat these online groups.  </p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>You can learn more about the Center on Terrorism, Extremism and Counterterrorism (CTEC) <a href='https://www.middlebury.edu/institute/academics/centers-initiatives/ctec'>here.</a></p><p>You can find out more about the Accelerationism Research Consortium (ARC) <a href='https://www.accresearch.org/'>here.</a> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10114086-a-foiled-plot-in-texas-the-threat-of-violent-fringe-online-networks.mp3" length="27343417" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10114086</guid>
    <pubDate>Wed, 23 Feb 2022 00:00:00 +0000</pubDate>
    <itunes:duration>2274</itunes:duration>
    <itunes:keywords>tech, terrorism, internet, social media, online, counterterrorism, OSINT, accelerationist</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tackling Taliban Content Online</itunes:title>
    <title>Tackling Taliban Content Online</title>
    <itunes:summary><![CDATA[In this episode, we’re exploring how the Taliban’s use of the internet and social media has evolved following their takeover of Afghanistan. We also explore how this compares with wider terrorist use of the internet, and the implications for tech companies moderating this content. Join Anne Craanen as she speaks to Charlie Winter, one of the world’s leading experts on terrorist propaganda. He is Director of Research at ExTrac, an organisation that tracks the real-time attack and communication...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, we’re exploring how the Taliban’s use of the internet and social media has evolved following their takeover of Afghanistan. We also explore how this compares with wider terrorist use of the internet, and the implications for tech companies moderating this content.</p><p>Join Anne Craanen as she speaks to Charlie Winter, one of the world’s leading experts on terrorist propaganda. He is Director of Research at ExTrac, an organisation that tracks the real-time attack and communications data of a range of violent extremist organisations, including the Taliban, to provide actionable insights for Counter-terrorism policymakers and practitioners. Charlie is also an Associate Fellow at the International Centre for Counter-Terrorism (ICCT), studying terrorism, insurgency and innovation, with focus on online and offline strategic communication.</p><p>We also hear from Colin P. Clarke, Director of Research at The Soufan Group and a Senior Research Fellow at The Soufan Center. He is an Associate Fellow at the International Centre for Counter-Terrorism (ICCT) – The Hague, and serves on the editorial board of <em>Studies in Conflict &amp; Terrorism</em>, as well as <em>Terrorism and Political Violence</em>. He appears frequently in the media to discuss terrorism and counterterrorism, and received his Ph.D. from the University of Pittsburgh’s Graduate School of Public and International Affairs. </p><p>Arthur Bradley is a Senior Open-source Intelligence Analyst at Tech Against Terrorism and head of content collection for the Terrorist Content Analytics Platform (TCAP), where he works with tech companies and governments across the world in countering terrorist use of the internet using open-source intelligence. Arthur joined Tech Against Terrorism in 2020 after working for several years in security intelligence with a focus on terrorist and violent extremist propaganda. </p><p>They explore how the Taliban’s media campaign has become increasingly sophisticated in recent years and uncover why different tech companies have different guidelines when it comes to moderating Taliban content, as well as the ethical implications of removing it. Finally, Anne asks the guests about the implications of the designation of the Taliban as a terrorist entity, both on their content online and on the delivery of humanitarian aid for Afghan civilians.</p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>Here&apos;s where you can learn more about ExTrac’s work: <a href='https://extrac.io/'>https://extrac.io/</a>  </p><p>The Soufan Center: <a href='https://thesoufancenter.org/'>https://thesoufancenter.org/</a> </p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, we’re exploring how the Taliban’s use of the internet and social media has evolved following their takeover of Afghanistan. We also explore how this compares with wider terrorist use of the internet, and the implications for tech companies moderating this content.</p><p>Join Anne Craanen as she speaks to Charlie Winter, one of the world’s leading experts on terrorist propaganda. He is Director of Research at ExTrac, an organisation that tracks the real-time attack and communications data of a range of violent extremist organisations, including the Taliban, to provide actionable insights for Counter-terrorism policymakers and practitioners. Charlie is also an Associate Fellow at the International Centre for Counter-Terrorism (ICCT), studying terrorism, insurgency and innovation, with focus on online and offline strategic communication.</p><p>We also hear from Colin P. Clarke, Director of Research at The Soufan Group and a Senior Research Fellow at The Soufan Center. He is an Associate Fellow at the International Centre for Counter-Terrorism (ICCT) – The Hague, and serves on the editorial board of <em>Studies in Conflict &amp; Terrorism</em>, as well as <em>Terrorism and Political Violence</em>. He appears frequently in the media to discuss terrorism and counterterrorism, and received his Ph.D. from the University of Pittsburgh’s Graduate School of Public and International Affairs. </p><p>Arthur Bradley is a Senior Open-source Intelligence Analyst at Tech Against Terrorism and head of content collection for the Terrorist Content Analytics Platform (TCAP), where he works with tech companies and governments across the world in countering terrorist use of the internet using open-source intelligence. Arthur joined Tech Against Terrorism in 2020 after working for several years in security intelligence with a focus on terrorist and violent extremist propaganda. </p><p>They explore how the Taliban’s media campaign has become increasingly sophisticated in recent years and uncover why different tech companies have different guidelines when it comes to moderating Taliban content, as well as the ethical implications of removing it. Finally, Anne asks the guests about the implications of the designation of the Taliban as a terrorist entity, both on their content online and on the delivery of humanitarian aid for Afghan civilians.</p><p>To find out more about Tech Against Terrorism and our work, visit <a href='https://www.techagainstterrorism.org/'>techagainstterrorism.org</a> or follow us on Twitter @techvsterrorism, where you can find resources on this topic. </p><p>Here&apos;s where you can learn more about ExTrac’s work: <a href='https://extrac.io/'>https://extrac.io/</a>  </p><p>The Soufan Center: <a href='https://thesoufancenter.org/'>https://thesoufancenter.org/</a> </p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10055679-tackling-taliban-content-online.mp3" length="28435630" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10055679</guid>
    <pubDate>Wed, 16 Feb 2022 00:00:00 +0000</pubDate>
    <itunes:duration>2365</itunes:duration>
    <itunes:keywords>terrorism, counter-terrorism, technology, Afghanistan, Social media, Twitter, Facebook</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Trailer: Season 2</itunes:title>
    <title>Trailer: Season 2</title>
    <itunes:summary><![CDATA[Tech Against Terrorism is back with season two of the podcast. Join us for a weekly deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat. ]]></itunes:summary>
    <description><![CDATA[<p>Tech Against Terrorism is back with season two of the podcast. Join us for a weekly deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat.</p>]]></description>
    <content:encoded><![CDATA[<p>Tech Against Terrorism is back with season two of the podcast. Join us for a weekly deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/10012450-trailer-season-2.mp3" length="1142614" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10012450</guid>
    <pubDate>Mon, 07 Feb 2022 05:00:00 +0000</pubDate>
    <itunes:duration>92</itunes:duration>
    <itunes:keywords>counter terrorism, technology,</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Incels, online misogyny and gender-based terrorism</itunes:title>
    <title>Incels, online misogyny and gender-based terrorism</title>
    <itunes:summary><![CDATA[Incels are members of an online subculture who define themselves as unable to find a romantic or sexual partner despite desiring one and can be characterised by their hatred towards women. Over the last 10 years, attacks claimed by individuals propagating an incel ideology have claimed the lives of almost 50 people, with an average of 8 per attack. Whilst incel attacks often attract a great deal of attention, incels’ concentrate a majority of their activity online, in which they interact with...]]></itunes:summary>
    <description><![CDATA[<p>Incels are members of an online subculture who define themselves as unable to find a romantic or sexual partner despite desiring one and can be characterised by their hatred towards women. Over the last 10 years, attacks claimed by individuals propagating an incel ideology have claimed the lives of almost 50 people, with an average of 8 per attack. Whilst incel attacks often attract a great deal of attention, incels’ concentrate a majority of their activity online, in which they interact with other misogynistic communities in the so-called online “manosphere”. In this episode, we discuss the roots of the incel movement and the contradictions baked into misogynistic incel theories and manifestos. From how the self-deprecation found in incel forums masks the male supremacist ideology, to how ‘Chads’ (the name given to men perceived as genetically attractive) are to be both admired and attacked. We also explore how the conceptualisation of incels, whether as hate speech, violent extremism or even in some cases, as terrorism, affects tech companies online regulation as well as wider counter-terrorism policies. </p><p>Anne Craanen and Jacob Berntsson discuss the nuances of misogynist incel ideology. They are joined by two of the most forefront voices in this space: Dr. Debbie Ging, an associate professor in the School of Communications at Dublin City University, where her research is focussed on digital hate, online anti-feminist men’s rights organisations and the incel phenomenon; and Alex DiBranco, the co-founder and executive director of the Institute for Research on Male Supremacism whose research is focussed on the development of right-wing and contemporary misogynist movements. Together, they consider what measures technology companies can take to deal with incel groups - such as partnering with entities that have expertise in countering these forms of extremism. They argue how incels and wider misogyny are a problem both offline and online, and how countering these issues requires collective action from both spheres. They also highlight the importance of the educational level, particularly through encouraging progressive sex education as well as lessons in media literacy and digital ethics. Finally, both agree that some forms of incel violence should be seen as gender-based terrorism. </p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Incels are members of an online subculture who define themselves as unable to find a romantic or sexual partner despite desiring one and can be characterised by their hatred towards women. Over the last 10 years, attacks claimed by individuals propagating an incel ideology have claimed the lives of almost 50 people, with an average of 8 per attack. Whilst incel attacks often attract a great deal of attention, incels’ concentrate a majority of their activity online, in which they interact with other misogynistic communities in the so-called online “manosphere”. In this episode, we discuss the roots of the incel movement and the contradictions baked into misogynistic incel theories and manifestos. From how the self-deprecation found in incel forums masks the male supremacist ideology, to how ‘Chads’ (the name given to men perceived as genetically attractive) are to be both admired and attacked. We also explore how the conceptualisation of incels, whether as hate speech, violent extremism or even in some cases, as terrorism, affects tech companies online regulation as well as wider counter-terrorism policies. </p><p>Anne Craanen and Jacob Berntsson discuss the nuances of misogynist incel ideology. They are joined by two of the most forefront voices in this space: Dr. Debbie Ging, an associate professor in the School of Communications at Dublin City University, where her research is focussed on digital hate, online anti-feminist men’s rights organisations and the incel phenomenon; and Alex DiBranco, the co-founder and executive director of the Institute for Research on Male Supremacism whose research is focussed on the development of right-wing and contemporary misogynist movements. Together, they consider what measures technology companies can take to deal with incel groups - such as partnering with entities that have expertise in countering these forms of extremism. They argue how incels and wider misogyny are a problem both offline and online, and how countering these issues requires collective action from both spheres. They also highlight the importance of the educational level, particularly through encouraging progressive sex education as well as lessons in media literacy and digital ethics. Finally, both agree that some forms of incel violence should be seen as gender-based terrorism. </p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/7794352-incels-online-misogyny-and-gender-based-terrorism.mp3" length="45425733" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5706040</guid>
    <pubDate>Fri, 02 Oct 2020 11:00:00 +0100</pubDate>
    <itunes:duration>3782</itunes:duration>
    <itunes:keywords>terrorists, extremists, content, tech, meme, propaganda, acraanen</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Trend alert: accelerationism</itunes:title>
    <title>Trend alert: accelerationism</title>
    <itunes:summary><![CDATA[In this episode, we discuss why accelerationism has become a flagship doctrine of far-right violent extremism. To help us comprehend what accelerationism is and how it is reflected in the online sphere, Maygane Janin and Adam Hadley are joined by Professor Matthew Feldmann, Director of the Centre for Analysis of the Radical Right (CARR), and an expert on fascist ideology, neo-Nazism and “lone actor” terrorism, and by Ashton Kingdon, a PhD student at the University of Southampton and a fellow ...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, we discuss why accelerationism has become a flagship doctrine of far-right violent extremism. To help us comprehend what accelerationism is and how it is reflected in the online sphere, Maygane Janin and Adam Hadley are joined by Professor Matthew Feldmann, Director of the Centre for Analysis of the Radical Right (CARR), and an expert on fascist ideology, neo-Nazism and “lone actor” terrorism, and by Ashton Kingdon, a PhD student at the University of Southampton and a fellow at CARR, whose research focuses on how far-right extremists use technology for recruitment and radicalisation. In today’s podcast, we also welcome Ben Makuch, a national security reporter with Vice News, who investigates far-right violent extremism, particularly neo-Nazism.</p><p>Together, they consider how propaganda is being repurposed on forums and mainstream platforms to coincide with particular events to misconstrue the narrative and cause political tension. We also discuss the emergence of accelerationist subcultures, and how they are using the pandemic to “initiate the collapse of society”, and discuss a rise in media attention on accelerationism in the US.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, we discuss why accelerationism has become a flagship doctrine of far-right violent extremism. To help us comprehend what accelerationism is and how it is reflected in the online sphere, Maygane Janin and Adam Hadley are joined by Professor Matthew Feldmann, Director of the Centre for Analysis of the Radical Right (CARR), and an expert on fascist ideology, neo-Nazism and “lone actor” terrorism, and by Ashton Kingdon, a PhD student at the University of Southampton and a fellow at CARR, whose research focuses on how far-right extremists use technology for recruitment and radicalisation. In today’s podcast, we also welcome Ben Makuch, a national security reporter with Vice News, who investigates far-right violent extremism, particularly neo-Nazism.</p><p>Together, they consider how propaganda is being repurposed on forums and mainstream platforms to coincide with particular events to misconstrue the narrative and cause political tension. We also discuss the emergence of accelerationist subcultures, and how they are using the pandemic to “initiate the collapse of society”, and discuss a rise in media attention on accelerationism in the US.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/7794355-trend-alert-accelerationism.mp3" length="43558126" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5297359</guid>
    <pubDate>Fri, 04 Sep 2020 16:00:00 +0100</pubDate>
    <itunes:duration>3627</itunes:duration>
    <itunes:keywords>terrorism, extremists, tech, accelerationism, propaganda </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A Gender Approach to Women&#39;s Role in the Online Extremist Sphere</itunes:title>
    <title>A Gender Approach to Women&#39;s Role in the Online Extremist Sphere</title>
    <itunes:summary><![CDATA[Across the ideological spectrum, there are misconceptions and oversimplifications when it comes to discussing the role of women in terrorist organisations. From the perception that women are groomed into joining violent extremist groups and can therefore be presumed innocent, to the notion that a woman’s role in a terrorist organisation is secondary simply because she is less likely to be the one picking up a weapon to carry out an attack. In this episode, we debunk many of these myths and ex...]]></itunes:summary>
    <description><![CDATA[<p>Across the ideological spectrum, there are misconceptions and oversimplifications when it comes to discussing the role of women in terrorist organisations. From the perception that women are groomed into joining violent extremist groups and can therefore be presumed innocent, to the notion that a woman’s role in a terrorist organisation is secondary simply because she is less likely to be the one picking up a weapon to carry out an attack. In this episode, we debunk many of these myths and explain why this issue has far more depth to it than the media conveys. We explore the misleading ‘jihadi bride’ stories perpetuated by the media, we examine women’s roles in online propaganda and recruitment, and we discuss the nuances to the “push and pull” factors of why women join terrorist groups - including far right groups. Drawing upon all of this, we provide recommendations on how the tech sector should counter women&apos;s role in online extremism and terrorism.</p><p>Maygane Janin and Anne Craanen discuss the complexities at the intersection of gender and terrorism. They are joined by two of the foremost voices in this space: Dr. Joana Cook, an Assistant Professor on Terrorism and Political Violence at Leiden University, Senior Project Manager and an Editor in Chief at the International Centre for Counterterrorism who recently published a book on gender and counterterrorism titled  “A Woman’s Place: U.S. counterterrorism since 9/11”; and Dr. Elisabeth Pearson, a lecturer at the Cyber Threats Research Centre at Swansea University who specialises in gender, extremism, and counter extremism. Together, they consider the broader socio-cultural context of how gender is viewed in extremist ideology participation - especially with regards to how understanding of gender identity, individuals’ experiences, age, and social class also impact the reasons someone might join an extremist group.</p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Across the ideological spectrum, there are misconceptions and oversimplifications when it comes to discussing the role of women in terrorist organisations. From the perception that women are groomed into joining violent extremist groups and can therefore be presumed innocent, to the notion that a woman’s role in a terrorist organisation is secondary simply because she is less likely to be the one picking up a weapon to carry out an attack. In this episode, we debunk many of these myths and explain why this issue has far more depth to it than the media conveys. We explore the misleading ‘jihadi bride’ stories perpetuated by the media, we examine women’s roles in online propaganda and recruitment, and we discuss the nuances to the “push and pull” factors of why women join terrorist groups - including far right groups. Drawing upon all of this, we provide recommendations on how the tech sector should counter women&apos;s role in online extremism and terrorism.</p><p>Maygane Janin and Anne Craanen discuss the complexities at the intersection of gender and terrorism. They are joined by two of the foremost voices in this space: Dr. Joana Cook, an Assistant Professor on Terrorism and Political Violence at Leiden University, Senior Project Manager and an Editor in Chief at the International Centre for Counterterrorism who recently published a book on gender and counterterrorism titled  “A Woman’s Place: U.S. counterterrorism since 9/11”; and Dr. Elisabeth Pearson, a lecturer at the Cyber Threats Research Centre at Swansea University who specialises in gender, extremism, and counter extremism. Together, they consider the broader socio-cultural context of how gender is viewed in extremist ideology participation - especially with regards to how understanding of gender identity, individuals’ experiences, age, and social class also impact the reasons someone might join an extremist group.</p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/7832800-a-gender-approach-to-women-s-role-in-the-online-extremist-sphere.mp3" length="33951928" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4514087</guid>
    <pubDate>Fri, 10 Jul 2020 17:00:00 +0100</pubDate>
    <itunes:duration>2826</itunes:duration>
    <itunes:keywords>terrorists, extremists, content, tech, meme, propaganda, jcook</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Regulating the online sphere</itunes:title>
    <title>Regulating the online sphere</title>
    <itunes:summary><![CDATA[How to best regulate the online sphere will be amongst the most important topics of the upcoming decade. Up until recently, laws have been in place that serve to mostly shield digital intermediaries from liability for third-party illegal content on their platform. Since 2016 however, in response to mounting concerns over the criminal misuse of the internet and a surge in noxious content online, the regulatory landscape has begun to change. Governments around the world have started to impose l...]]></itunes:summary>
    <description><![CDATA[<p>How to best regulate the online sphere will be amongst the most important topics of the upcoming decade. Up until recently, laws have been in place that serve to mostly shield digital intermediaries from liability for third-party illegal content on their platform. Since 2016 however, in response to mounting concerns over the criminal misuse of the internet and a surge in noxious content online, the regulatory landscape has begun to change. Governments around the world have started to impose laws and regulatory frameworks that oblige online platforms to expediently and proactively address illegal or harmful content on their sites. Increasingly, however, platforms have also developed their own modes of self-regulation, endeavouring to incorporate new structures of responsibility and accountability into their business models. </p><p>Join Flora Deverell and Jacob Berntson as they discuss the ways in which online regulation is being pursued by companies, governments, and multi-lateral organisations, such as with the upcoming EU wide law on the dissemination of terrorist content. They are joined by two of the foremost voices in this space: Evelyn Douek, a lecturer in law and SJD candidate at Harvard Law School, and affiliate at the Berkman Klein Center for Internet &amp; Society, studying international and transnational regulation of online speech; and Daphne Keller, Director of Platform Regulation at Stanford’s Cyber Policy Center – formerly Assistant General Counsel at Google and Director of Intermediary Liability at Stanford’s Center for Internet and Society – who has worked on groundbreaking Intermediary Liability litigation and legislation around the world. They also explore the implications of Facebook’s new Oversight Board and what this really means for governance and accountability processes, whether we should use international human rights law as a framework for ruling the internet, and why terrorist content is such an important topic in regulatory discourse.<br/><br/><em>Full list of resources on our website: </em><a href='https://www.techagainstterrorism.fm/regulating-the-online-sphere/'><em>https://www.techagainstterrorism.fm/regulating-the-online-sphere/</em></a></p>]]></description>
    <content:encoded><![CDATA[<p>How to best regulate the online sphere will be amongst the most important topics of the upcoming decade. Up until recently, laws have been in place that serve to mostly shield digital intermediaries from liability for third-party illegal content on their platform. Since 2016 however, in response to mounting concerns over the criminal misuse of the internet and a surge in noxious content online, the regulatory landscape has begun to change. Governments around the world have started to impose laws and regulatory frameworks that oblige online platforms to expediently and proactively address illegal or harmful content on their sites. Increasingly, however, platforms have also developed their own modes of self-regulation, endeavouring to incorporate new structures of responsibility and accountability into their business models. </p><p>Join Flora Deverell and Jacob Berntson as they discuss the ways in which online regulation is being pursued by companies, governments, and multi-lateral organisations, such as with the upcoming EU wide law on the dissemination of terrorist content. They are joined by two of the foremost voices in this space: Evelyn Douek, a lecturer in law and SJD candidate at Harvard Law School, and affiliate at the Berkman Klein Center for Internet &amp; Society, studying international and transnational regulation of online speech; and Daphne Keller, Director of Platform Regulation at Stanford’s Cyber Policy Center – formerly Assistant General Counsel at Google and Director of Intermediary Liability at Stanford’s Center for Internet and Society – who has worked on groundbreaking Intermediary Liability litigation and legislation around the world. They also explore the implications of Facebook’s new Oversight Board and what this really means for governance and accountability processes, whether we should use international human rights law as a framework for ruling the internet, and why terrorist content is such an important topic in regulatory discourse.<br/><br/><em>Full list of resources on our website: </em><a href='https://www.techagainstterrorism.fm/regulating-the-online-sphere/'><em>https://www.techagainstterrorism.fm/regulating-the-online-sphere/</em></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/7832803-regulating-the-online-sphere.mp3" length="35398517" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3855002</guid>
    <pubDate>Thu, 21 May 2020 09:00:00 +0100</pubDate>
    <itunes:duration>2947</itunes:duration>
    <itunes:keywords>dkeller, tech, terrorism, media, internet, facebook, criminal</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How are terrorists and violent extremists using gamification?</itunes:title>
    <title>How are terrorists and violent extremists using gamification?</title>
    <itunes:summary><![CDATA[“You can sit at home and play Call of Duty or you can come and respond to the real Call of Duty…the choice is yours.” This was tweeted by a well-known ISIS hacker and propagandist. Gaming culture and popular video games, such as Call of Duty and World of Warcraft, have become exploited by terrorist and violent extremist actors for propaganda and radicalisation purposes. Join Maygane Janin and Flora Deverell as they discuss how terrorist and violent extremists exploit gaming culture for their ...]]></itunes:summary>
    <description><![CDATA[<p>“You can sit at home and play Call of Duty or you can come and respond to the real Call of Duty…the choice is yours.” This was tweeted by a well-known ISIS hacker and propagandist. Gaming culture and popular video games, such as Call of Duty and World of Warcraft, have become exploited by terrorist and violent extremist actors for propaganda and radicalisation purposes.</p><p>Join Maygane Janin and Flora Deverell as they discuss how terrorist and violent extremists exploit gaming culture for their own ends. They are joined by Linda Schlegel, a senior editor at The Counterterrorism Group and a regular contributor for the European Eye on Radicalization, where she recently published a number of articles on the exploitation of gaming culture; and Dr. Nick Robinson, an associate professor in politics and international studies at the University of Leeds who has been researching the links between videogames, social media, militarism, and terrorism for over a decade. They address in particular the “gamification of radicalisation,” the exploitation of gaming platforms, as well as why terrorist organisations developing their own games to serve their own ideologies and purposes is less prevalent now than it used to be. </p><p><br/><em>Full list of resources on our website: </em><a href='https://www.techagainstterrorism.fm/how-are-terrorists-and-violent-extremists-using-gamification/'>https://www.techagainstterrorism.fm/how-are-terrorists-and-violent-extremists-using-gamification/</a></p><p><b>Linda Schlegel (@LiSchlegel)</b></p><p><b>Dr. Nick Robinson</b></p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>“You can sit at home and play Call of Duty or you can come and respond to the real Call of Duty…the choice is yours.” This was tweeted by a well-known ISIS hacker and propagandist. Gaming culture and popular video games, such as Call of Duty and World of Warcraft, have become exploited by terrorist and violent extremist actors for propaganda and radicalisation purposes.</p><p>Join Maygane Janin and Flora Deverell as they discuss how terrorist and violent extremists exploit gaming culture for their own ends. They are joined by Linda Schlegel, a senior editor at The Counterterrorism Group and a regular contributor for the European Eye on Radicalization, where she recently published a number of articles on the exploitation of gaming culture; and Dr. Nick Robinson, an associate professor in politics and international studies at the University of Leeds who has been researching the links between videogames, social media, militarism, and terrorism for over a decade. They address in particular the “gamification of radicalisation,” the exploitation of gaming platforms, as well as why terrorist organisations developing their own games to serve their own ideologies and purposes is less prevalent now than it used to be. </p><p><br/><em>Full list of resources on our website: </em><a href='https://www.techagainstterrorism.fm/how-are-terrorists-and-violent-extremists-using-gamification/'>https://www.techagainstterrorism.fm/how-are-terrorists-and-violent-extremists-using-gamification/</a></p><p><b>Linda Schlegel (@LiSchlegel)</b></p><p><b>Dr. Nick Robinson</b></p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/7832806-how-are-terrorists-and-violent-extremists-using-gamification.mp3" length="35115520" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3737744</guid>
    <pubDate>Wed, 13 May 2020 09:00:00 +0100</pubDate>
    <itunes:duration>2923</itunes:duration>
    <itunes:keywords>terrorists, extremists, content, tech, meme, propaganda, mjanin</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Far-right violent extremists and meme culture</itunes:title>
    <title>Far-right violent extremists and meme culture</title>
    <itunes:summary><![CDATA[During the recent protests against the coronavirus lockdown in the US, a protester was spotted with a flyer referring to “Boogaloo”, a popular far-right violent extremist slang term calling for a new civil war that has turned into a meme culture of its own amongst violent extremists. One year earlier, before attacking two mosques and killing 51 people, the Christchurch shooter posted on messaging board 8chan, encouraging readers to continue to make memes.  Join Maygane Janin and Jacob Be...]]></itunes:summary>
    <description><![CDATA[<p>During the recent protests against the coronavirus lockdown in the US, a protester was spotted with a flyer referring to “Boogaloo”, a popular far-right violent extremist slang term calling for a new civil war that has turned into a meme culture of its own amongst violent extremists. One year earlier, before attacking two mosques and killing 51 people, the Christchurch shooter posted on messaging board 8chan, encouraging readers to continue to make memes. </p><p>Join Maygane Janin and Jacob Berntsson as they discuss how memes have become an unconventional strategy for violent extremists to easily spread their ideologies. They are joined by Maik Fielitz, a researcher at the Jena Institute for Democracy and Civil Society, and a fellow at the Centre of Analysis of the Radical Right specialising in far-right extremism in Germany; and Lisa Bogerts, an expert of visual communication, both of them are contributors to the 2019 book, ‘Post-Digital Cultures of the Far Right’. They discuss how far-right violent extremists take advantage of the intrinsic virality of seemingly harmless online jokes to reach out to new audiences and penetrate mainstream culture.</p><p><b>Resources</b></p><ul><li><a href='https://blog.prif.org/2020/03/31/the-visual-culture-of-far-right-terrorism/'>The visual culture of far-right terrorism</a> (Bogerts &amp; Fielitz, 2020)  </li><li><a href='file:///Users/mayganejanin/Downloads/Do_You_Want_Meme_War_Understanding_the_Visual_Meme.pdf'>“Do you want meme war”</a> (Bogerts &amp; Fielitz, 2018) </li><li><a href='https://blog.prif.org/2020/03/31/the-visual-culture-of-far-right-terrorism/'>The visual culture of far-right terrorism</a> (LBogerts &amp; Fielitz, 2020)</li><li><a href='https://www.researchgate.net/publication/338237080_Digital_Fascism_Challenges_for_the_Open_Society_in_Times_of_Social_Media'>Digital fascism: challenges for the open society in times of social media</a> (Fielietz, Marcks, 2019) </li><li><a href='https://www.aspistrategist.org.au/how-memes-are-becoming-the-new-frontier-of-information-warfare/'>How memes are becoming the new frontier of information warfare</a> (Ascott, 2020)</li><li><a href='https://ncri.io/reports/cyber-swarming-memetic-warfare-and-viral-insurgency-how-domestic-militants-organize-on-memes-to-incite-violent-insurrection-and-terror-against-government-and-law-enforcement/?link_id=14&amp;can_id=42607a93137edf2e0ad6df2905d2f330&amp;source=email-coronavirus&amp;email_referrer=email_731333&amp;email_subject=magatrends'>Cyber swarming, memetic warfare and viral insurgency</a> (Goldenberg, Finkelstein, 2020) </li><li><a href='https://time.com/5627494/we-analyzed-how-the-great-replacement-and-far-right-ideas-spread-online-the-trends-reveal-deep-concerns/'>We Analyzed How the &quot;Great Replacement&quot; and Far Right Ideas Spread Online. The Trends Reveal Deep Concerns</a> (Ebner &amp; Davey, 2019)</li><li><a href='https://onezero.medium.com/the-far-right-is-weaponizing-instagram-to-recruit-gen-z-43257ddb2c9f'>The far-right is weaponizing Instagram to recruit Gen Z</a> (Bateman, 2019)</li><li><a href='https://www.radicalrightanalysis.com/2020/03/27/how-the-radical-right-weaponizes-memes/'>How the radical right weaponizes memes?</a> (Liyanage, 2020) </li><li><a href='https://www.opendemocracy.net/en/can-europe-make-it/meme-warfare-in-swedish-context/'>Meme warfare in the Swedish context</a> (Davey, 2018)</li></ul><p><em>Full list of resources on our website: </em><a href='https://www.techagainstterrorism.fm/far-right-violent-extremists-and-meme-culture/'><em>https://www.techagainstterrorism.fm/far-right-violent-extremists-and-meme-culture/</em></a></p><p><b>Maik Fielitz (@maik_fielitz) </b></p><p><b>Lisa Bogerts</b></p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>During the recent protests against the coronavirus lockdown in the US, a protester was spotted with a flyer referring to “Boogaloo”, a popular far-right violent extremist slang term calling for a new civil war that has turned into a meme culture of its own amongst violent extremists. One year earlier, before attacking two mosques and killing 51 people, the Christchurch shooter posted on messaging board 8chan, encouraging readers to continue to make memes. </p><p>Join Maygane Janin and Jacob Berntsson as they discuss how memes have become an unconventional strategy for violent extremists to easily spread their ideologies. They are joined by Maik Fielitz, a researcher at the Jena Institute for Democracy and Civil Society, and a fellow at the Centre of Analysis of the Radical Right specialising in far-right extremism in Germany; and Lisa Bogerts, an expert of visual communication, both of them are contributors to the 2019 book, ‘Post-Digital Cultures of the Far Right’. They discuss how far-right violent extremists take advantage of the intrinsic virality of seemingly harmless online jokes to reach out to new audiences and penetrate mainstream culture.</p><p><b>Resources</b></p><ul><li><a href='https://blog.prif.org/2020/03/31/the-visual-culture-of-far-right-terrorism/'>The visual culture of far-right terrorism</a> (Bogerts &amp; Fielitz, 2020)  </li><li><a href='file:///Users/mayganejanin/Downloads/Do_You_Want_Meme_War_Understanding_the_Visual_Meme.pdf'>“Do you want meme war”</a> (Bogerts &amp; Fielitz, 2018) </li><li><a href='https://blog.prif.org/2020/03/31/the-visual-culture-of-far-right-terrorism/'>The visual culture of far-right terrorism</a> (LBogerts &amp; Fielitz, 2020)</li><li><a href='https://www.researchgate.net/publication/338237080_Digital_Fascism_Challenges_for_the_Open_Society_in_Times_of_Social_Media'>Digital fascism: challenges for the open society in times of social media</a> (Fielietz, Marcks, 2019) </li><li><a href='https://www.aspistrategist.org.au/how-memes-are-becoming-the-new-frontier-of-information-warfare/'>How memes are becoming the new frontier of information warfare</a> (Ascott, 2020)</li><li><a href='https://ncri.io/reports/cyber-swarming-memetic-warfare-and-viral-insurgency-how-domestic-militants-organize-on-memes-to-incite-violent-insurrection-and-terror-against-government-and-law-enforcement/?link_id=14&amp;can_id=42607a93137edf2e0ad6df2905d2f330&amp;source=email-coronavirus&amp;email_referrer=email_731333&amp;email_subject=magatrends'>Cyber swarming, memetic warfare and viral insurgency</a> (Goldenberg, Finkelstein, 2020) </li><li><a href='https://time.com/5627494/we-analyzed-how-the-great-replacement-and-far-right-ideas-spread-online-the-trends-reveal-deep-concerns/'>We Analyzed How the &quot;Great Replacement&quot; and Far Right Ideas Spread Online. The Trends Reveal Deep Concerns</a> (Ebner &amp; Davey, 2019)</li><li><a href='https://onezero.medium.com/the-far-right-is-weaponizing-instagram-to-recruit-gen-z-43257ddb2c9f'>The far-right is weaponizing Instagram to recruit Gen Z</a> (Bateman, 2019)</li><li><a href='https://www.radicalrightanalysis.com/2020/03/27/how-the-radical-right-weaponizes-memes/'>How the radical right weaponizes memes?</a> (Liyanage, 2020) </li><li><a href='https://www.opendemocracy.net/en/can-europe-make-it/meme-warfare-in-swedish-context/'>Meme warfare in the Swedish context</a> (Davey, 2018)</li></ul><p><em>Full list of resources on our website: </em><a href='https://www.techagainstterrorism.fm/far-right-violent-extremists-and-meme-culture/'><em>https://www.techagainstterrorism.fm/far-right-violent-extremists-and-meme-culture/</em></a></p><p><b>Maik Fielitz (@maik_fielitz) </b></p><p><b>Lisa Bogerts</b></p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/7832809-far-right-violent-extremists-and-meme-culture.mp3" length="25814852" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3550504</guid>
    <pubDate>Wed, 29 Apr 2020 09:00:00 +0100</pubDate>
    <itunes:duration>2148</itunes:duration>
    <itunes:keywords>media, newspapers, terrorists, extremists, content, tech, campaign, memes, propaganda, mfielitz</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How Nordic neo-Nazis use the internet</itunes:title>
    <title>How Nordic neo-Nazis use the internet</title>
    <itunes:summary><![CDATA[The Nordic Resistance Movement (NRM) is a neo-Nazi organisation that was originally founded in Sweden. The movement, which is openly anti-semitic, anti-immigration and anti-gay, aims to dismantle Nordic parliamentary democracies and replace them with a unified Nordic fascist state. Join Flora Deverell and Jacob Berntsson as they discuss NRM’s growing influence with guest Jonathan Leman, a researcher at Stockholm-based Expo, which monitors violent extremist far-right activity in the Nordic cou...]]></itunes:summary>
    <description><![CDATA[<p>The Nordic Resistance Movement (NRM) is a neo-Nazi organisation that was originally founded in Sweden. The movement, which is openly anti-semitic, anti-immigration and anti-gay, aims to dismantle Nordic parliamentary democracies and replace them with a unified Nordic fascist state. Join Flora Deverell and Jacob Berntsson as they discuss NRM’s growing influence with guest Jonathan Leman, a researcher at Stockholm-based Expo, which monitors violent extremist far-right activity in the Nordic countries. The podcast also takes a look at some of the most prominent individuals in the Nordic neo-Nazi scene with expert Dr. Louie Dean Valencia-García, an assistant professor of digital history at Texas State University. Together, they explore how Nordic neo-Nazis are exploiting online platforms as a “safe haven” and other mainstream trends, such as memes, to spread their message and aid radicalisation on a global scale.</p><p><b>Resources</b></p><ul><li><a href='https://www.tandfonline.com/doi/abs/10.1080/09546553.2018.1445888'>Right-wing terrorism and militancy in the Nordic countries: a comparative case study</a> (Ravndal, 2018)</li><li><a href='http://content.time.com/time/specials/packages/article/0,28804,2085728_2085727_2085733,00.html'>Europe’s right wing: A nation-by-nation guide to political parties and extremist groups</a>  (van Gilder Cooke, 2011)</li><li><a href='https://phys.org/news/2019-02-right-wing-extremism-norwaychanges.html'>Right-wing extremism in Norway – changes and challenges</a> (Bjorgo, 2019)</li><li><a href='https://www.reuters.com/article/us-europe-migrants-finland-idUSKCN0UR20G20160113'>Anti-immigrant ‘Soldiers of Odin’  raise concern in Finland</a> (Rosendahl &amp; Forsell, 2016)</li><li><a href='https://www.radicalrightanalysis.com/2020/03/24/the-nordic-resistance-movement/'>The Nordic Resistance Movement</a> (Dr Wiggen, 2020)</li><li><a href='https://www.vice.com/en_us/article/3k3558/how-a-small-budapest-publishing-house-is-quietly-fueling-far-right-extremism'>How a small  Budapest publishing house is quietly fuelling far-right extremism</a> (Owen, 2019)</li><li><a href='https://www.hopenothate.org.uk/2019/03/05/arktos-vs-counter-currents-feud-splitting-alt-right/'>Arktos Vs Counter-Current feud splits the alt-right</a> (Lawrence, 2019)</li><li><a href='https://www.radicalrightanalysis.com/2018/07/06/finspang-an-execution-meme-of-the-swedish-radical-right-ignites-the-political-discourse/'>’Finspång’ – an execution meme of the Swedish radical right ignites the political discourse</a> (Onnerfors,2018)</li></ul><p><b>Louie Dean Valencia-Garcia (@BurntCitrus):</b></p><ul><li><a href='https://www.routledge.com/Far-Right-Revisionism-and-the-End-of-History-Alt-Histories-1st-Edition/Valencia-Garcia/p/book/9780367460082'>Far-right revisionism and the end of history</a> (2020)</li><li><a href='https://www.europenowjournal.org/2018/01/31/the-rise-of-the-european-far-right-in-the-internet-age/'>The rise of the European far-right in the internet age</a> (Valencia-Garcia, 2018)</li></ul><p><b>Jonathan Leman (@JonathanLeman):</b></p><ul><li><a href='https://www.adl.org/media/13538/download'>Hate Beyond Border: The internationalization of white supremacy</a> (ADL)</li><li>Expo: <a href='https://expo.se/what-expo'>https://expo.se/what-expo</a></li></ul><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>The Nordic Resistance Movement (NRM) is a neo-Nazi organisation that was originally founded in Sweden. The movement, which is openly anti-semitic, anti-immigration and anti-gay, aims to dismantle Nordic parliamentary democracies and replace them with a unified Nordic fascist state. Join Flora Deverell and Jacob Berntsson as they discuss NRM’s growing influence with guest Jonathan Leman, a researcher at Stockholm-based Expo, which monitors violent extremist far-right activity in the Nordic countries. The podcast also takes a look at some of the most prominent individuals in the Nordic neo-Nazi scene with expert Dr. Louie Dean Valencia-García, an assistant professor of digital history at Texas State University. Together, they explore how Nordic neo-Nazis are exploiting online platforms as a “safe haven” and other mainstream trends, such as memes, to spread their message and aid radicalisation on a global scale.</p><p><b>Resources</b></p><ul><li><a href='https://www.tandfonline.com/doi/abs/10.1080/09546553.2018.1445888'>Right-wing terrorism and militancy in the Nordic countries: a comparative case study</a> (Ravndal, 2018)</li><li><a href='http://content.time.com/time/specials/packages/article/0,28804,2085728_2085727_2085733,00.html'>Europe’s right wing: A nation-by-nation guide to political parties and extremist groups</a>  (van Gilder Cooke, 2011)</li><li><a href='https://phys.org/news/2019-02-right-wing-extremism-norwaychanges.html'>Right-wing extremism in Norway – changes and challenges</a> (Bjorgo, 2019)</li><li><a href='https://www.reuters.com/article/us-europe-migrants-finland-idUSKCN0UR20G20160113'>Anti-immigrant ‘Soldiers of Odin’  raise concern in Finland</a> (Rosendahl &amp; Forsell, 2016)</li><li><a href='https://www.radicalrightanalysis.com/2020/03/24/the-nordic-resistance-movement/'>The Nordic Resistance Movement</a> (Dr Wiggen, 2020)</li><li><a href='https://www.vice.com/en_us/article/3k3558/how-a-small-budapest-publishing-house-is-quietly-fueling-far-right-extremism'>How a small  Budapest publishing house is quietly fuelling far-right extremism</a> (Owen, 2019)</li><li><a href='https://www.hopenothate.org.uk/2019/03/05/arktos-vs-counter-currents-feud-splitting-alt-right/'>Arktos Vs Counter-Current feud splits the alt-right</a> (Lawrence, 2019)</li><li><a href='https://www.radicalrightanalysis.com/2018/07/06/finspang-an-execution-meme-of-the-swedish-radical-right-ignites-the-political-discourse/'>’Finspång’ – an execution meme of the Swedish radical right ignites the political discourse</a> (Onnerfors,2018)</li></ul><p><b>Louie Dean Valencia-Garcia (@BurntCitrus):</b></p><ul><li><a href='https://www.routledge.com/Far-Right-Revisionism-and-the-End-of-History-Alt-Histories-1st-Edition/Valencia-Garcia/p/book/9780367460082'>Far-right revisionism and the end of history</a> (2020)</li><li><a href='https://www.europenowjournal.org/2018/01/31/the-rise-of-the-european-far-right-in-the-internet-age/'>The rise of the European far-right in the internet age</a> (Valencia-Garcia, 2018)</li></ul><p><b>Jonathan Leman (@JonathanLeman):</b></p><ul><li><a href='https://www.adl.org/media/13538/download'>Hate Beyond Border: The internationalization of white supremacy</a> (ADL)</li><li>Expo: <a href='https://expo.se/what-expo'>https://expo.se/what-expo</a></li></ul><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/7832812-how-nordic-neo-nazis-use-the-internet.mp3" length="27976521" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3356242</guid>
    <pubDate>Thu, 16 Apr 2020 19:00:00 +0100</pubDate>
    <itunes:duration>2328</itunes:duration>
    <itunes:keywords>jnewman, media, newspapers, terrorists, extremists, content, tech, campaign, BBC, propaganda</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How mainstream media can spread terrorist propaganda</itunes:title>
    <title>How mainstream media can spread terrorist propaganda</title>
    <itunes:summary><![CDATA[In the case of the recent terrorist attack in Christchurch, British and Australian tabloids were instrumental in making the gunman’s attack video and manifesto go viral. There have been a number of occasions where the work of the tech sector to take down extremist content from online platforms has been undermined by mainstream media outlets. Join Lorand Bodo as he speaks to Kyle Taylor, executive director of Hacked Off, a group which campaigns for a free and accountable press in the UK, and A...]]></itunes:summary>
    <description><![CDATA[<p>In the case of the recent terrorist attack in Christchurch, British and Australian tabloids were instrumental in making the gunman’s attack video and manifesto go viral. There have been a number of occasions where the work of the tech sector to take down extremist content from online platforms has been undermined by mainstream media outlets. Join Lorand Bodo as he speaks to Kyle Taylor, executive director of Hacked Off, a group which campaigns for a free and accountable press in the UK, and Abdirahim Saaed, a journalist for BBC Monitoring, who tracks and analyses the propaganda output of salafi-jihadist groups like ISIS and Al-Qaeda. Focussing on the UK landscape, this episode explores how news media can provide some of the most effective PR for terrorists, promoting and giving tremendous reach to their messages of hate, by spreading videos and images. It particularly focuses on the importance of imposing stringent and robust rules on UK newspapers, which currently lack independent regulation. It&apos;s clear we need a solution, because right now we’re playing directly into the terrorists’ hands.</p>]]></description>
    <content:encoded><![CDATA[<p>In the case of the recent terrorist attack in Christchurch, British and Australian tabloids were instrumental in making the gunman’s attack video and manifesto go viral. There have been a number of occasions where the work of the tech sector to take down extremist content from online platforms has been undermined by mainstream media outlets. Join Lorand Bodo as he speaks to Kyle Taylor, executive director of Hacked Off, a group which campaigns for a free and accountable press in the UK, and Abdirahim Saaed, a journalist for BBC Monitoring, who tracks and analyses the propaganda output of salafi-jihadist groups like ISIS and Al-Qaeda. Focussing on the UK landscape, this episode explores how news media can provide some of the most effective PR for terrorists, promoting and giving tremendous reach to their messages of hate, by spreading videos and images. It particularly focuses on the importance of imposing stringent and robust rules on UK newspapers, which currently lack independent regulation. It&apos;s clear we need a solution, because right now we’re playing directly into the terrorists’ hands.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/7832815-how-mainstream-media-can-spread-terrorist-propaganda.mp3" length="28814186" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2136518</guid>
    <pubDate>Fri, 10 Jan 2020 17:00:00 +0000</pubDate>
    <itunes:duration>2398</itunes:duration>
    <itunes:keywords>ktaylor, asaaed, media, newspapers, terrorists, extremists, content, tech, campaign, BBC, propaganda</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How terrorism is financed</itunes:title>
    <title>How terrorism is financed</title>
    <itunes:summary><![CDATA[Although terrorist and extremist groups largely use traditional methods to fund their activities, the anonymity cryptocurrency affords is becoming an increasingly attractive alternative. Join Adam Hadley and Lorand Bodo as they speak to Nick Furneaux, author of ‘Investigating Cryptocurrencies’, Florence Keen, research fellow at the International Centre for the Study of Radicalisation at King’s College London, and retired police officer Andrew McDonald, who served as head of specialist investi...]]></itunes:summary>
    <description><![CDATA[<p>Although terrorist and extremist groups largely use traditional methods to fund their activities, the anonymity cryptocurrency affords is becoming an increasingly attractive alternative. Join Adam Hadley and Lorand Bodo as they speak to Nick Furneaux, author of ‘Investigating Cryptocurrencies’, Florence Keen, research fellow at the International Centre for the Study of Radicalisation at King’s College London, and retired police officer Andrew McDonald, who served as head of specialist investigations of the UK National Terrorist Financial Investigation Unit at New Scotland Yard. This episode explores the myriad of means used by terrorists to sustain their lifestyle, fund operations, recruit individuals, and build capacity. It highlights the need for increased knowledge sharing between law enforcement officials, researchers, and the fintech community, to combat the issue. Although we&apos;re not yet in the danger zone with terrorist use of digital money, it&apos;s coming. Terrorists are like any other criminals, and they will exploit any avenue necessary to achieve their goals. </p>]]></description>
    <content:encoded><![CDATA[<p>Although terrorist and extremist groups largely use traditional methods to fund their activities, the anonymity cryptocurrency affords is becoming an increasingly attractive alternative. Join Adam Hadley and Lorand Bodo as they speak to Nick Furneaux, author of ‘Investigating Cryptocurrencies’, Florence Keen, research fellow at the International Centre for the Study of Radicalisation at King’s College London, and retired police officer Andrew McDonald, who served as head of specialist investigations of the UK National Terrorist Financial Investigation Unit at New Scotland Yard. This episode explores the myriad of means used by terrorists to sustain their lifestyle, fund operations, recruit individuals, and build capacity. It highlights the need for increased knowledge sharing between law enforcement officials, researchers, and the fintech community, to combat the issue. Although we&apos;re not yet in the danger zone with terrorist use of digital money, it&apos;s coming. Terrorists are like any other criminals, and they will exploit any avenue necessary to achieve their goals. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/7832818-how-terrorism-is-financed.mp3" length="38114769" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2188922</guid>
    <pubDate>Fri, 29 Nov 2019 13:00:00 +0000</pubDate>
    <itunes:duration>3173</itunes:duration>
    <itunes:keywords>terrorism, finance, money, digital, crypto tech, far-right, extremism, radical, combat</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The power and responsibility of Open Source Intelligence</itunes:title>
    <title>The power and responsibility of Open Source Intelligence</title>
    <itunes:summary><![CDATA[Effective analysis of publicly available information is critical in countering terrorist use of the internet. But just as open source intelligence can used as a tool for good, would-be terrorists can also exploit the data to plan attacks. Join Adam Hadley and Lorand Bodo as they speak to Benjamin Strick, an open-source investigator for BBC Africa Eye, Nico, a.k.a ‘DutchOSINTGuy’, a former police officer in the Netherlands, and Terry Pattar, who runs the intelligence unit at the security analy...]]></itunes:summary>
    <description><![CDATA[<p>Effective analysis of publicly available information is critical in countering terrorist use of the internet. But just as open source intelligence can used as a tool for good, would-be terrorists can also exploit the data to plan attacks. Join Adam Hadley and Lorand Bodo as they speak to Benjamin Strick, an open-source investigator for BBC Africa Eye, Nico, a.k.a ‘DutchOSINTGuy’, a former police officer in the Netherlands, and Terry Pattar, who runs the intelligence unit at the security analysis firm Jane’s 360. This episode explores how intrigue and curiosity helps these experts infiltrate online extremist networks, where messages of propaganda and hate and being spread. Be warned - tread carefully when entering the world of OSINT and the dark web. Because when you’re looking at terrorists, they could be looking right back at you.</p>]]></description>
    <content:encoded><![CDATA[<p>Effective analysis of publicly available information is critical in countering terrorist use of the internet. But just as open source intelligence can used as a tool for good, would-be terrorists can also exploit the data to plan attacks. Join Adam Hadley and Lorand Bodo as they speak to Benjamin Strick, an open-source investigator for BBC Africa Eye, Nico, a.k.a ‘DutchOSINTGuy’, a former police officer in the Netherlands, and Terry Pattar, who runs the intelligence unit at the security analysis firm Jane’s 360. This episode explores how intrigue and curiosity helps these experts infiltrate online extremist networks, where messages of propaganda and hate and being spread. Be warned - tread carefully when entering the world of OSINT and the dark web. Because when you’re looking at terrorists, they could be looking right back at you.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/7832821-the-power-and-responsibility-of-open-source-intelligence.mp3" length="38878755" type="audio/mpeg" />
    <itunes:author>Tech Against Terrorism</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1918502</guid>
    <pubDate>Wed, 23 Oct 2019 12:00:00 +0100</pubDate>
    <itunes:duration>3237</itunes:duration>
    <itunes:keywords>terrorism, tech, far-right, extremism, OSINT, intelligence, dark web, internet, online, combat, fight,</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How we fight terrorism while protecting human rights</itunes:title>
    <title>How we fight terrorism while protecting human rights</title>
    <itunes:summary><![CDATA[Human rights experts around the world have warned that the rush to tackle terrorist activity online has had worrying implications for fundamental human rights and freedom of speech. How do we differentiate between ‘free speech’ and speech that aims to incite violence? In this episode we find out how governments and tech platforms are attempting to strike a balance between protecting our safety, and protecting our rights. Join Flora Deverell and Jacob Berntsson as they speak to Emma Llanso, di...]]></itunes:summary>
    <description><![CDATA[<p>Human rights experts around the world have warned that the rush to tackle terrorist activity online has had worrying implications for fundamental human rights and freedom of speech. How do we differentiate between ‘free speech’ and speech that aims to incite violence? In this episode we find out how governments and tech platforms are attempting to strike a balance between protecting our safety, and protecting our rights. Join Flora Deverell and Jacob Berntsson as they speak to Emma Llanso, director of the Free Expression Project at the Center for Democracy and Technology, and Dr. Krisztina Huszti-Orban, senior legal advisor to the UN Special Rapporteur on Counter-terrorism and Human Rights. As governments and tech platforms across the world work to combat online extremism, this conversation asks – where should we draw the line, and how can we ensure our fundamental freedoms are protected? </p>]]></description>
    <content:encoded><![CDATA[<p>Human rights experts around the world have warned that the rush to tackle terrorist activity online has had worrying implications for fundamental human rights and freedom of speech. How do we differentiate between ‘free speech’ and speech that aims to incite violence? In this episode we find out how governments and tech platforms are attempting to strike a balance between protecting our safety, and protecting our rights. Join Flora Deverell and Jacob Berntsson as they speak to Emma Llanso, director of the Free Expression Project at the Center for Democracy and Technology, and Dr. Krisztina Huszti-Orban, senior legal advisor to the UN Special Rapporteur on Counter-terrorism and Human Rights. As governments and tech platforms across the world work to combat online extremism, this conversation asks – where should we draw the line, and how can we ensure our fundamental freedoms are protected? </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/7832824-how-we-fight-terrorism-while-protecting-human-rights.mp3" length="34664445" type="audio/mpeg" />
    <itunes:author>Right Angles</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1850905</guid>
    <pubDate>Fri, 11 Oct 2019 11:00:00 +0100</pubDate>
    <itunes:duration>2885</itunes:duration>
    <itunes:keywords>ellanso, khuszti, terrorism, tech, far-right, extremism, radical, decentralized, human rights, free speech, freedom</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How do terrorists use the internet?</itunes:title>
    <title>How do terrorists use the internet?</title>
    <itunes:summary><![CDATA[Whether it’s a manifesto posted on 8chan or an attack video uploaded to Facebook, terrorists and right-wing extremists are increasingly using the internet as a way to spread their hate-filled messages. In this episode, we find out how these groups are exploiting an entire tech ecosystem, and what is being done to combat it. Join Adam Hadley and Lorand Bodo as they speak to Matthew Feldman, director of the Centre for Analysis of the Radical Right, and Audrey Alexander, researcher and instructo...]]></itunes:summary>
    <description><![CDATA[<p><b>Whether it’s a manifesto posted on 8chan or an attack video uploaded to Facebook, terrorists and right-wing extremists are increasingly using the internet as a way to spread their hate-filled messages. In this episode, we find out how these groups are exploiting an entire tech ecosystem, and what is being done to combat it. Join Adam Hadley and Lorand Bodo as they speak to Matthew Feldman, director of the Centre for Analysis of the Radical Right, and Audrey Alexander, researcher and instructor at West Point’s Combating Terrorism Center. This conversation uncovers how violent extremist groups like ISIS are adapting to an online world, as their physical power diminishes. But does this decentralization actually make them a greater risk?</b></p>]]></description>
    <content:encoded><![CDATA[<p><b>Whether it’s a manifesto posted on 8chan or an attack video uploaded to Facebook, terrorists and right-wing extremists are increasingly using the internet as a way to spread their hate-filled messages. In this episode, we find out how these groups are exploiting an entire tech ecosystem, and what is being done to combat it. Join Adam Hadley and Lorand Bodo as they speak to Matthew Feldman, director of the Centre for Analysis of the Radical Right, and Audrey Alexander, researcher and instructor at West Point’s Combating Terrorism Center. This conversation uncovers how violent extremist groups like ISIS are adapting to an online world, as their physical power diminishes. But does this decentralization actually make them a greater risk?</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1684819/episodes/7832827-how-do-terrorists-use-the-internet.mp3" length="30592444" type="audio/mpeg" />
    <itunes:author>Right Angles</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1702168</guid>
    <pubDate>Fri, 13 Sep 2019 11:00:00 +0100</pubDate>
    <itunes:duration>2546</itunes:duration>
    <itunes:keywords>terrorism, tech, far-right, extremism, radical, decentralized, combat, fight, feldman, alexander, ep1</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
