Work Package 4

User Requirements for Safeguarding Against Behavioural Radicalisation Online

D4.1 Map and knowledge database of existing counter behavioural radicalisation programs

Motivations to identify specific intervention strategies helping to prevent violent radicalisation and political violence are upfront within Europe. This report (D4.1.) presents an impression of implemented counter-radicalisation strategies to combat radicalisation processes within different implementation domains. Additionally, an exploratory needs assessment based on 15 interviews was conducted to learn abut practitioners' views and eperiences in dealing with online radicalisation and terrorism in Europe. „Good practice" counter-measures regarding radicalisation were collected through a web search, resulting in 73 eligible counter-measures from nine European countries. Most counter-radicalisation activities were reported within the implementation domain government. However, a lack of evidence-based counter-measures was found and initiatives for the online environment. Only eleven counter-radicalisation programmes showed strong evidence based on theoretical assumptions and evaluation of efficacy. Furthermore, frontline practitioners reported their experiences and views regarding different spheres of action (i.e. capacity building, management, public reporting, identification of the vulnerable and influential, and profiling) in dealing with online radicalisation/terrorism. Strengths and limitations are discussed. Outcomes will contribute to the development of the PROPHETS toolkit (WP5, WP6 & WP7).

D4.2 End user requirements guide

... coming soon!

D4.3 Social and economic end user requirements guide

… coming soon!

D4.4 Judicial, policy, and legal end user requirements

… coming soon!

D4.5 Report on privacy and security safeguards

The analysis of citizen perceptions around privacy-security trade off in the online environment, forms a basis for the analysis, if the privacy loss is proportionate to the risks it is supposed to reduce. The privacy versus surveillance perceptions driving acceptance of security measures by LEAs and other parties will be systematically explored, explicitly including the societal acceptance and privacy risk perceptions of a closer cooperation between LEAs and private actors in order to prevent cybercrime. The main objective of this deliverable is after exploring the conflicts and contradictions in addressing the concerns around the privacy and security debate, its applicability to terrorist-related hate-speech, terrorist financing, terrorist generated content and terrorist recruitment and training related to behavioural radicalisation online, to thoroughly report the findings of the empirical research, that will complement the final outcomes of the project, enhancing the social aspect of the proposed solutions. The final outcome of the research indicates that there are no unsurmountable dividing lines between social groups in terms of their attitudes towards surveillance and privacy. There is acceptance that for cases of terrorism and child abuse such measures are even desirable, yet both security professionals and distinct societal groups are aware of the challenges that surveillance measures can pose if they become the ‘new normal’ for public life. The broad similarity of views amongst societal groups about causes, impact, and prevention strategies in relation to online radicalization (including in the field of terrorist-related hate-speech, terrorist financing, terrorist generated content and terrorist recruitment and training) is a major promising revelation, as a broad societal consensus allows to better develop and deliberate about specific policy measures and intervention to address the varying dimensions and the underlying factors of online radicalization processes (including in the field of terrorist-related hate-speech, terrorist financing, terrorist generated content and terrorist recruitment and training). The results directly feed into the validation scenarios of the PROPHETS digital platform. Namely, it provides insights as to which issues, scenarios and challenges have to be integrated into the digital tool to enhance its quality and adjust it to the real-life experiences of end-users.

D4.5 Report on Privacy and Security Safe
Adobe Acrobat Document 4.1 MB