Countering Violent Extremism Online and Offline
Author(s):
In the wake of devastating attacks by violent extremists around the world, policy makers have invested considerable effort into understanding terrorists’ use of the Internet as they radicalize and mobilize to violence. To that end, the article “Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns, and Processes” by Paul Gill, Emily Corner, Maura Conway, Amy Thornton, Mia Bloom, and John Horgan (2017, this issue) contributes important data to a timely policy discussion. The authors’ central finding, “that there is no easy offline versus online violent radicalization dichotomy to be drawn,” highlights a gap in our current conceptualization of the radicalization process and suggests several implications, particularly for countering violent extremism (CVE) policies and programs.