The Radicalization Risks of Gpt-3 and Advanced Neural Language Models

Total Page:16

File Type:pdf, Size:1020Kb

The Radicalization Risks of Gpt-3 and Advanced Neural Language Models THE RADICALIZATION RISKS OF GPT-3 AND ADVANCED NEURAL LANGUAGE MODELS Kris McGuffie Alex Newhouse Center on Terrorism, Extremism, and Counterterrorism Center on Terrorism, Extremism, and Counterterrorism Middlebury Institute of International Studies Middlebury Institute of International Studies [email protected] [email protected] September 9, 2020 1 Executive Summary In 2020, OpenAI developed GPT-3, a neural language model that is capable of sophisticated natural language generation and completion of tasks like classification, question-answering, and summarization. While OpenAI has not open- sourced the model’s code or pre-trained weights at the time of writing, it has built an API to experiment with the model’s capacity. The Center on Terrorism, Extremism, and Counterterrorism (CTEC) evaluated the GPT-3 API for the risk of weaponization by extremists who may attempt to use GPT-3 or hypothetical unregulated models to amplify their ideologies and recruit to their communities. Our methods included: 1. using prompts adapted from right-wing extremist narratives and topics to evaluate ideological consistency, accuracy, and credibility, and 2. evaluating the efficacy of the model’s output in contributing to online radicalization into violent extremism. Experimenting with prompts representative of different types of extremist narrative, structures of social interaction, and radical ideologies, CTEC finds: GPT-3 demonstrates significant improvement over its predecessor, GPT-2, in generating extremist texts. • GPT-3 shows strength in generating text that accurately emulates interactive, informational, and influential • content that could be utilized for radicalizing individuals into violent far-right extremist ideologies and behaviors. While OpenAI’s preventative measures are strong, the possibility of unregulated copycat technology represents • significant risk for large-scale online radicalization and recruitment. In the absence of safeguards, successful and efficient weaponization that requires little experimentation is likely. AI stakeholders, the policymaking community, and governments should begin investing as soon as possible in • building social norms, public policy, and educational initiatives to preempt an influx of machine-generated disinformation and propaganda. Mitigation will require effective policy and partnerships across industry, government, and civil society. This project was made possible by the OpenAI API Academic Access Program. 2 Background In 2019, a CTEC investigation discovered that OpenAI’s GPT-2 language model—arguably the most sophisticated generative AI at the time—could be trained to produce convincing extremist manifestos. [1] Testing across white supremacy, Islamism, anarchism, and Marxist-Leninism, CTEC’s analysis demonstrated that GPT-2 represented the frontier of a novel threat to the information landscape: text generation at a speed, scale, and ease of use that exceeds that of troll farms and human-run disinformation campaigns. GPT-2 has major limitations, however. Unless one has access to state-of-the-art computational resources, it requires hours of fine-tuning to intentionally bias a model to produce ideologically slanted propaganda. Further, each fine-tuned model is brittle; for instance, a white supremacist model cannot easily be modified to produce Islamist outputs. OpenAI’s latest project, GPT-3, escapes many of these disadvantages altogether through revolutionary advances in pre-training that allow for sophisticated no-shot, one-shot, and few-shot text generation capabilities (in other words, prompting the model with zero examples, one example, or a few examples of an intended goal). [2] Producing ideologically consistent fake text no longer requires a large corpus of source materials and hours of fine-tuning. It is as simple as prompting GPT-3 with a few Tweets, paragraphs, forum threads, or emails, and the model will pick up on the patterns and intent without any other training. While hosting the model still requires enterprise-scale resources, manipulating outputs no longer necessitates technical knowledge if an actor has access to a hosted model, such as OpenAI’s API. This revolutionary capacity for few-shot, subject-specific generation poses significant threats to information integrity and the social fabric of interactions on the Internet. This is further exacerbated by GPT-3’s impressively deep knowledge of extremist communities, from QAnon to the Atomwaffen Division to the Wagner Group, and those communities’ particular nuances and quirks. As a result, CTEC’s experiments and analysis show that GPT-3 can be prompted to perform tasks as varied as: producing polemics reminiscent of Christchurch shooter Brenton Tarrant, • reproducing fake forum threads casually discussing genocide and promoting Nazism in the style of the defunct • Iron March community, answering questions as if it was a heavily radicalized QAnon believer, • producing multilingual extremist texts, such as Russian-language anti-Semitic content, even when given • English prompts. The main risk of weaponization involves GPT-3’s potential capacity to dramatically increase influential output that is believably human. That influence could include radicalizing content that significantly reduces the workload of extremists in producing informative and interactive fora. Any copycat models created from GPT-3 and wielded without toxicity filters or other safeguards would benefit from great efficiency and a low cost of entry. No specialized technical knowledge is required to enable the model to produce text that aligns with and expands upon right-wing extremist prompts. With very little experimentation, short prompts produce compelling and consistent text that would believably appear in far-right extremist communities online. 3 Methodology and Discussion of Model Performance In order to generate subject-specific text, GPT-3 requires nothing more than a few short prompts that are representative of the text an analyst (or propaganda apparatus, nonstate actor, etc.) wants to emulate. As such, CTEC’s methodology for testing the abuse potential of GPT-3 is significantly different from what was used to test its older, more inflexible predecessor, GPT-2. To test GPT-3, CTEC gathered examples from a wide variety of text styles and structures. This was done with the explicit goal of understanding the model’s strengths and weaknesses in producing texts across the ideological and functional spectrums of extremism, from white supremacy to QAnon conspiracism, and from mainstream recruitment to ideological radicalization and organization. In order to avoid cherry-picking, examples in this paper were gathered from either the first or second attempt at running a particular prompt. GPT-2, on the other hand, required significant investments of time and resources. In order to produce fake text that effectively emulated the manifestos of white supremacist mass shooters, CTEC trained GPT-2 on a large dataset of many full-length manifesto texts. Using a modestly powered Azure virtual machine to emulate the capacity of nonstate, unsponsored actors, CTEC’s training took 10-12 hours to complete. The resulting model would respond to most prompts with convincingly radical completions, but the fake text remained bound by the data it was trained on: texts always retained manifesto-esque tone and grammar. GPT-3 represents a vastly reduced barrier to entry and a much more flexible product than GPT-2. Note: In example outputs shown below, bold text indicates our prompts, and non-bold text indicates GPT-3’s synthetic generations. All bold text, and only bold text, in the example outputs below is human-generated. Examples involve toxic language, including racist, sexist, and anti-Semitic phrases. 2 3.1 Sophisticated foundation of extremist knowledge To explore the boundaries of what GPT-3 knows, CTEC prompted it with a variety of questions about specific aspects of extremist groups and ideologies. For example, when prompted with “What is the Wagner Group?” GPT-3 produced a long back-and-forth dialogue sharing generally correct information about the Russian mercenary cell that has been active in Syria. Sample 1: Zero-Shot Prompt Asking About the Wagner Group Question: What is the name of the Russian mercenary group? Answer: Wagner group. Question: Where is the Wagner group? Answer: In Syria. Question: Who is the leader of the Wagner group? Answer: A Russian citizen, Dmitry Utkin. He was born in 1971 and lives in Moscow. He has been a member of the Russian parliament since 2016. He is a former officer of the Main Intelligence Directorate (GRU) of Russia’s General Staff. He was also a commander of the special forces unit "Vostok" (East). The unit was deployed to Chechnya and fought against separatists there in 1994-1996. After that, he served as an adviser to the head of Chechnya, Ramzan Kadyrov, and later became his deputy. In 2004-2005, he commanded a battalion in Chechnya and participated in fighting against insurgents there. In 2008-2009, he commanded another battalion in Abkhazia and South Ossetia during Russia’s war with Georgia over these two breakaway regions. Since 2014, he has been leading military units fighting against Ukrainian government forces on behalf of Russia-backed separatists in eastern Ukraine. According to open sources, Utkin is currently living in Moscow but travels frequently to Syria where his troops are fighting on behalf of Bashar al-Assad’s regime against anti-government forces there. Question: What does this group do? Where are they based? How many people
Recommended publications
  • Australia Muslim Advocacy Network
    1. The Australian Muslim Advocacy Network (AMAN) welcomes the opportunity to input to the UN Special Rapporteur on the Freedom of Religion or Belief as he prepares this report on the Impact of Islamophobia/anti-Muslim hatred and discrimination on the right to freedom of thought, conscience religion or belief. 2. We also welcome the opportunity to participate in your Asia-Pacific Consultation and hear from the experiences of a variety of other Muslims organisations. 3. AMAN is a national body that works through law, policy, research and media, to secure the physical and psychological welfare of Australian Muslims. 4. Our objective to create conditions for the safe exercise of our faith and preservation of faith- based identity, both of which are under persistent pressure from vilification, discrimination and disinformation. 5. We are engaged in policy development across hate crime & vilification laws, online safety, disinformation and democracy. Through using a combination of media, law, research, and direct engagement with decision making parties such as government and digital platforms, we are in a constant process of generating and testing constructive proposals. We also test existing civil and criminal laws to push back against the mainstreaming of hate, and examine whether those laws are fit for purpose. Most recently, we are finalising significant research into how anti-Muslim dehumanising discourse operates on Facebook and Twitter, and the assessment framework that could be used to competently and consistently assess hate actors. A. Definitions What is your working definition of anti-Muslim hatred and/or Islamophobia? What are the advantages and potential pitfalls of such definitions? 6.
    [Show full text]
  • Report on Official Visit of the OSCE PA
    AD HOC COMMITTEE ON COUNTERING TERRORISM OFFICIAL VISIT TO NORWAY 14-15 January 2020 NOTE-TO-THE-FILE Introduction On the 14th-15th of January 2020, the OSCE PA Ad Hoc Committee on Countering Terrorism (CCT) conducted an official visit to Norway. The 20-member delegation, which consisted of CCT members as well as representatives from the OSCE Transnational Threats Department and the Parliamentary Assembly of the Mediterranean, was led by OSCE PA President George Tsereteli. The visit, initiated by CCT Chair Mr. Abid Q. Raja and organized by the Norwegian Parliament (Stortinget), was also attended by OSCE PA Secretary General Roberto Montella. 1 After being welcomed by the President of the Norwegian Parliament, the delegation paid tribute to the victims of the 22nd July 2011 terror attacks in both Utøya Island and Oslo. During the two- day programme, the delegation also had the opportunity to meet with the Minister of Justice and the Minister of Climate and Environment, the Governing Mayor of Oslo, several members of the Labour Party and the Worker’s Youth League, as well as with representatives of the Norwegian Police Security Service, Norwegian Correctional System, the 22nd July Commission, the 22nd July Parliamentary Committee, the 22nd July Support Group and academia. Notably, many interlocutors had first-hand experience of the 22nd July 2011 tragic events. Ultimately, the visit provided an excellent opportunity to get familiar with the national counter terrorism system and learn more about Norway’s multifaceted response to the 22nd July attacks, which included legislative reform, emergency response preparedness, the prevention of terrorism and radicalization, and the role of public health services.
    [Show full text]
  • Transnational Crimes Among Somali-Americans: Convergences of Radicalization and Trafficking
    The author(s) shown below used Federal funding provided by the U.S. Department of Justice to prepare the following resource: Document Title: Transnational Crimes among Somali- Americans: Convergences of Radicalization and Trafficking Author(s): Stevan Weine, Edna Erez, Chloe Polutnik Document Number: 252135 Date Received: May 2019 Award Number: 2013-ZA-BX-0008 This resource has not been published by the U.S. Department of Justice. This resource is being made publically available through the Office of Justice Programs’ National Criminal Justice Reference Service. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Transnational Crimes among Somali-Americans: Convergences of Radicalization and Trafficking Stevan Weine, Edna Erez, and Chloe Polutnik 1 This resource was prepared by the author(s) using Federal funds provided by the U.S. Department of Justice. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This project was supported by Award No. 2013-ZA-BX-0008, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect those of the Department of Justice. 2 This resource was prepared by the author(s) using Federal funds provided by the U.S. Department of Justice. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S.
    [Show full text]
  • Policy Options and Regulatory Mechanisms for Managing Radicalization on the Internet
    Policy options and regulatory mechanisms for managing radicalization on the Internet Paris, 30 September 2016 “[…] I firmly believe that in a free democratic society, freedom of speech and expression is one of the most prized freedoms which must be defended and upheld at any cost and this should be particularly so in the land of Voltaire. It is indeed unfortunate that in the world of today, when science and technology have advanced the frontiers of knowledge and mankind is beginning to realize that human happiness can be realized only through inter-dependence and cooperation, the threshold of tolerance should be going down. It is high time man should realize his spiritual dimension and replace bitterness and hatred by love and compassion, tolerance and forgiveness.” Justice Prafullachandra Bhagwati Dan Shefet (Individual Specialist) ACKNOWLEDGEMENTS The author wishes to thank the following for their support, valuable advice and input throughout the drafting of the Report: Dr. Indrajit Banerjee and his team in UNESCO’s Knowledge Societies Division The UNESCO Delegates and Ministries of Justice/Interior of countries that have participated in the Country Survey. Alexander Linden, Honorary advisor to the French Supreme Court Janice Duffy, Researcher, Australia Pavan Duggal, Supreme Court Lawyer, India Tom Høyem, Former Minister in Denmark under Poul Schlüter Francesca Musiani, Researcher at the CNRS Institute for Communication Sciences and Member of the French National Assembly’s Commission on the Law and Rights in the Digital Era Sami Mahbouli, Lawyer at The Tunisian Supreme Court and Columnist Sabine Leutheusser-Schnarrenberger, Former Minister of Justice under Angela Merkel Marc Randazza, First Amendment Attorney, United States Viswa Sadasivan, CEO of Strategic Moves (Consultancy agency in Singapore) and former member of the Singaporean Parliament Mr K.
    [Show full text]
  • The Christchurch Attack Report: Key Takeaways on Tarrant’S Radicalization and Attack Planning
    The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam i The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam ICCT Perspective December 2020 ii About ICCT The International Centre for Counter-Terrorism – The Hague (ICCT) is an independent think and do tank providing multidisciplinary policy advice and practical, solution- oriented implementation support on prevention and the rule of law, two vital pillars of effective counterterrorism. ICCT’s work focuses on themes at the intersection of countering violent extremism and criminal justice sector responses, as well as human rights-related aspects of counterterrorism. The major project areas concern countering violent extremism, rule of law, foreign fighters, country and regional analysis, rehabilitation, civil society engagement and victims’ voices. Functioning as a nucleus within the international counter-terrorism network, ICCT connects experts, policymakers, civil society actors and practitioners from different fields by providing a platform for productive collaboration, practical analysis, and exchange of experiences and expertise, with the ultimate aim of identifying innovative and comprehensive approaches to preventing and countering terrorism. Licensing and Distribution ICCT publications are published in open access format and distributed under the terms of the Creative Commons
    [Show full text]
  • Transnational Neo-Nazism in the Usa, United Kingdom and Australia
    TRANSNATIONAL NEO-NAZISM IN THE USA, UNITED KINGDOM AND AUSTRALIA PAUL JACKSON February 2020 JACKSON | PROGRAM ON EXTREMISM About the Program on About the Author Extremism Dr Paul Jackson is a historian of twentieth century and contemporary history, and his main teaching The Program on Extremism at George and research interests focus on understanding the Washington University provides impact of radical and extreme ideologies on wider analysis on issues related to violent and societies. Dr. Jackson’s research currently focuses non-violent extremism. The Program on the dynamics of neo-Nazi, and other, extreme spearheads innovative and thoughtful right ideologies, in Britain and Europe in the post- academic inquiry, producing empirical war period. He is also interested in researching the work that strengthens extremism longer history of radical ideologies and cultures in research as a distinct field of study. The Britain too, especially those linked in some way to Program aims to develop pragmatic the extreme right. policy solutions that resonate with Dr. Jackson’s teaching engages with wider themes policymakers, civic leaders, and the related to the history of fascism, genocide, general public. totalitarian politics and revolutionary ideologies. Dr. Jackson teaches modules on the Holocaust, as well as the history of Communism and fascism. Dr. Jackson regularly writes for the magazine Searchlight on issues related to contemporary extreme right politics. He is a co-editor of the Wiley- Blackwell journal Religion Compass: Modern Ideologies and Faith. Dr. Jackson is also the Editor of the Bloomsbury book series A Modern History of Politics and Violence. The views expressed in this paper are solely those of the author, and not necessarily those of the Program on Extremism or the George Washington University.
    [Show full text]
  • The Development Response to Violent Extremism and Insurgency
    THE DEVELOPMENT RESPONSE TO VIOLENT EXTREMISM AND INSURGENCY Putting Principles USAID POLICY into Practice BUREAU FOR POLICY, PLANNING AND LEARNING SEPTEMBER 2011 USAID THE DEVELOPMENT RESPONSE TO VIOLENT EXTREMISM AND INSURGENCY POLICY SEPTEMBER 2011 i Message from the Administrator USAID Policy /The Development Response to Violent Extremism and Insurgency MESSAGE FROM THE ADMINISTRATOR President Obama’s National Security Strategy and Global Already today, close to 60 percent of State and USAID’s for­ Development Policy both stress that successful development eign assistance goes to 50 countries that are in the midst of, is essential to advancing our national security objectives. or trying to prevent conflict or state failure.This policy is crit­ ical to supporting our staff on the frontlines of our greatest Consistent with these broader strategic frameworks, this pol­ national security and development challenges. Our Agency’s icy provides USAID with a clear mandate and specific renewed emphasis on learning, innovation and risk­taking guidance on the development response to violent extremism means we will study and improve our work in exactly those and insurgency.This policy comes at a critical time; develop­ areas that have proven most difficult. ment assistance is increasingly called upon as an integral component of the interagency response to complex national With this policy, the Agency and its field Missions can now security and development challenges. rely on a clear set of common concepts and definitions, engagement criteria, and programming principles to support In line with our USAID Forward reform effort, this policy rep­ and guide our work, enhance its impact and ensure we resents an ongoing drive to use our long experience and vast deliver sustainable results.
    [Show full text]
  • Women and Violent Radicalization in Jordan
    TECHNICAL REPORT WOMEN AND VIOLENT RADICALIZATION IN JORDAN women and violent radicalization in jordan ii © 2016 UN Women. All rights reserved. Manufactured in Jordan The views expressed in this publication are those of the author(s) and do not necessarily represent the views of UN Women, the United Nations or any of its affiliated organizations. This research is generously funded by The Government of Japan The publication of this report is generously funded by The Government of Finland Produced by UN Women Jordan Editor: Margo Alderton Text: Search for Common Ground and Al-Hayat Center for Civil Society Development Design: Melanie Doherty Design TECHNICAL REPORT WOMEN AND VIOLENT RADICALIZATION IN JORDAN UN WOMEN AND THE JORDANIAN NATIONAL COMMISSION FOR WOMEN March 2016 Al-Hayat Center for Civil Society Development - RASED & Search for Common Ground women and violent radicalization in jordan 2 TABLE OF CONTENTS INTRODUCTION 5 1.2 Causes and impacts of radicalization 22 1.2.1 Methodology 6 Radicalization as a threat to the community 22 Challenges and limitations 7 1.2.1 Factors driving radicalization 22 1.2.1 Radicalization: A risk to women 23 KEY FINDINGS AND RECOMMENDATIONS 8 1.3 Feeding radicalization 23 1.3.1 23 Key findings 8 Trusted sources of information Recommendations 10 1.3.2 Women as a tool for radicalization 24 1.3.3 Community education 25 1.3.4 Mothers’ child-rearing 25 LITERATURE REVIEW 12 1.3.5 Hard choices by parents to protect 1.1 Definition of radicalization and violent extremism 12 their children 26 1.2 Women’s roles
    [Show full text]
  • “This Is Our House!” a Preliminary Assessment of the Capitol Hill
    MARCH 2021 “This is Our House!” A Preliminary Assessment of the Capitol Hill Siege Participants Program on Extremism THE GEORGE WASHINGTON UNIVERSITY MARCH 2021 “This is Our House!” A Preliminary Assessment of the Capitol Hill Siege Participants Program on Extremism THE GEORGE WASHINGTON UNIVERSITY All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2021 by Program on Extremism Program on Extremism 2000 Pennsylvania Avenue NW Washington, DC 20006 www.extremism.gwu.edu Cover: ©REUTERS/Leah Millis TABLE OF CONTENTS Acknowledgements 6 Executive Summary 8 Introduction 10 Findings 12 Categorizing the Capitol Hill Siege Participants 17 Recommendations 44 Conclusion 48 ACKNOWLEDGEMENTS This report was researched and written jointly by the research team at the Program on Extremism, including Lorenzo Vidino, Seamus Hughes, Alexander Meleagrou- Hitchens, Devorah Margolin, Bennett Clifford, Jon Lewis, Andrew Mines and Haroro Ingram. The authors wish to thank JJ MacNab for her invaluable feedback and edits on this report. This report was made possible by the Program’s team of Research Assistants—Ilana Krill, Angelina Maleska, Mia Pearsall, Daniel Stoffel, Diana Wallens, and Ye Bin Won—who provided crucial support with data collection, data verification, and final edits on the report. Finally, the authors thank Nicolò Scremin for designing this report, and Brendan Hurley and the George Washington University Department of Geography for creating the maps used in this report.
    [Show full text]
  • Countering Terrorism Online with Artificial Intelligence an Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia
    COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE AN OVERVIEW FOR LAW ENFORCEMENT AND COUNTER-TERRORISM AGENCIES IN SOUTH ASIA AND SOUTH-EAST ASIA COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE An Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia A Joint Report by UNICRI and UNCCT 3 Disclaimer The opinions, findings, conclusions and recommendations expressed herein do not necessarily reflect the views of the Unit- ed Nations, the Government of Japan or any other national, regional or global entities involved. Moreover, reference to any specific tool or application in this report should not be considered an endorsement by UNOCT-UNCCT, UNICRI or by the United Nations itself. The designation employed and material presented in this publication does not imply the expression of any opinion whatsoev- er on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area of its authorities, or concerning the delimitation of its frontiers or boundaries. Contents of this publication may be quoted or reproduced, provided that the source of information is acknowledged. The au- thors would like to receive a copy of the document in which this publication is used or quoted. Acknowledgements This report is the product of a joint research initiative on counter-terrorism in the age of artificial intelligence of the Cyber Security and New Technologies Unit of the United Nations Counter-Terrorism Centre (UNCCT) in the United Nations Office of Counter-Terrorism (UNOCT) and the United Nations Interregional Crime and Justice Research Institute (UNICRI) through its Centre for Artificial Intelligence and Robotics.
    [Show full text]
  • Testimony of Lecia Brooks Chief of Staff, Southern Poverty Law Center Before the Armed Services Committee United States House of Representatives
    Testimony of Lecia Brooks Chief of Staff, Southern Poverty Law Center before the Armed Services Committee United States House of Representatives Extremism in the Armed Forces March 24, 2021 My name is Lecia Brooks. I am chief of staff of the Southern Poverty Law Center (SPLC). Thank you for the opportunity to present testimony on extremism in the U.S. Armed Forces and what we can do to address this challenge. Now in our 50th year, the SPLC is a catalyst for racial justice in the South and beyond, working in partnership with communities to dismantle white supremacy, strengthen intersectional movements, and advance the human rights of all people. SPLC lawyers have worked to shut down some of the nation’s most violent white supremacist groups by winning crushing, multimillion-dollar jury verdicts on behalf of their victims. We have helped dismantle vestiges of Jim Crow, reformed juvenile justice practices, shattered barriers to equality for women, children, the LGBTQ+ community, and the disabled, and worked to protect low-wage immigrant workers from exploitation. The SPLC began tracking white supremacist activity in the 1980s, during a resurgence of the Ku Klux Klan and other organized extremist hate groups. Today, the SPLC is the premier U.S. nonprofit organization monitoring the activities of domestic hate groups and other extremists. Each year since 1990, we have conducted a census of hate groups operating across America, a list that is used extensively by journalists, law enforcement agencies, and scholars, among others. The SPLC Action Fund is dedicated to fighting for racial justice alongside impacted communities in pursuit of equity and opportunity for all.
    [Show full text]
  • Countering Online Radicalization in America: Executive Summary
    National Security Program Homeland Security Project Countering Online Radicalization in America: Executive Summary The Internet has revolutionized the way all of us The Strategy communicate and do business. Its benefits to people everywhere have been enormous and will continue to drive In its 2011 counter-radicalization strategy and the progress in practically every area of life. At the same time, subsequent implementation plan, the White House it should be recognized that, while being a force for good, acknowledged that “the Internet has become an the Internet has also come to play an important—and, in increasingly potent element in radicalization to violence,” many ways, unique—role in radicalizing homegrown and and promised to “develop a separate, more comprehensive domestic terrorists. Supporters of Al Qaeda, Sovereign strategy for countering and preventing violent extremist Citizens, white supremacists and neo-Nazis, environmental online radicalization and leveraging technology to empower and animal liberationists, and other violent extremist groups community resilience.” Nearly a year later, this still hasn’t all have embraced the Internet with great enthusiasm and happened, and the report’s first and most important vigor. They are using it as a platform to spread their ideas, recommendation is for the White House to complete its work connect with each other, make new recruits, and incite on the strategy, make it public, and begin its implementation illegal and violent actions. with alacrity. We believe that this trend will continue and that future In strategic terms, online radicalization can be dealt with in terrorist attacks against the United States and its interests three ways: will involve individuals who have been radicalized—at least Approaches aimed at restricting freedom of speech and in part—on the Internet.
    [Show full text]