Posted in Archives Generalities Insights

Call It Verbal Terrorism: Extremism Begins With Hate

Many research studies on preventing and countering terrorism focus on Countering Violent Extremism (CVE). But terrorism begins with a seed of hate which is expressed,…

Continue Reading...
Posted in Archives LinkedIn

Digest of P/CVE LinkedIn Posts, April 2020

We have packaged the 20 most-consulted LinkedIn posts on the topic of P/CVE from April by Thorsten Koch, MA, PgDip. Sorted in descending order: ‘Abstract…

Continue Reading...
Posted in Archives Insights

Characteristics of ‘Abstract Radicalization’ Online

Some differences between personal, groomer-led radicalization and abstract, impersonal radicalization online: Personal radicalization online // Abstract, impersonal radicalization online one-on-one communication <-> content browsing, choice,…

Continue Reading...
Posted in Archives Insights

‘Abstract Radicalization’ Online – Not Necessarily Groomer-Led

So-called groomers are not always responsible for terrorist radicalization. ‘Abstract Radicalization’ could well be the main driver in some cases of overt violent extremism, as…

Continue Reading...
Posted in Archives LinkedIn

Digest of P/CVE LinkedIn Posts, March 2020

We have packaged the 10 most-consulted LinkedIn posts on P/CVE from March by Thorsten Koch, MA, PgDip. Sorted in descending order: Sometimes radicalisation and psychological…

Continue Reading...
Posted in Archives LinkedIn

Digest of P/CVE LinkedIn Posts, February 2020

We have packaged the 10 most-consulted LinkedIn posts on P/CVE from February by Thorsten Koch, MA, PgDip. Sorted in descending order: Stop calling far-right terrorists…

Continue Reading...
Posted in Archives Ethics Insights

Hate Speech Laws and Social Media Companies

The German government cabinet has passed a tougher stance against hate speech. What makes sense about the legal project, in Germany and elswhere, is to…

Continue Reading...
Posted in Archives Insights

Hiding Hate in Plain Sight: Extremists’ Obscured Branding

Extremists often employ subtle coding instead of being bold and blunt, be it via tentative allusions, fashion statements, or references to cultural items, such as…

Continue Reading...