EXPLAINER 

Terrorist-Operated Websites

How terrorists and violent extremists are turning to websites to further their aims.

At Tech Against Terrorism, we have tracked and challenged a growing number of websites created to store, access and amplify terrorist content. Here we warn of the threat, and steps needed to take action.

Computer keyboard with glowing codes, programming concept

Terrorist-Operated Websites are a key concern for Tech Against Terrorism. While terrorists and violent extremists are finding it harder to exploit social media platforms, they are finding it easier to simply set up websites for recruitment and disseminating information.  

These websites operate in plain sight and despite our best efforts to have them taken down, terrorist-operated websites re-emerge due to fragmented international cooperation unclear legislation, and inconsistent responses from infrastructure providers. 

The scale of the problem

Since 2021, Tech Against Terrorism have uncovered over 300 websites operated by terrorist and violent extremist actors.

These sites are are not the exclusive practice of any single ideology or group. Violent far-right and violent Islamist groups both utilise such sites in similar ways.

In a report published in 2022, we explained how 33 of the most prominent websites – run by actors such as Islamic State, al-Qaeda, Atomwaffen Division and the Taliban – had 1.54 million monthly visitors, with the majority of visits coming from Algeria, Pakistan, United States, and the United Kingdom. 

1540000

monthly visitors in 2021-22

tow content 21-22

Why Terrorist-Operated Websites?

Since our 2022 report, we have monitored more websites through our Terrorist Content Analytics Platform

Websites are easy to register, set-up and keep online. If they are detected, they can quickly reappear elsewhere following disruption.

Terrorist-Operated Websites are publicly available and are often indexed by search engines. This is partly because they are subject to little or no content sanitisation or automated content moderation.

Those setting up these websites often exploit the higher threshold for removal placed by infrastructure providers compared to social media companies.

Registrant identity can be protected and made private; some providers do not require any personally identifiable information to register, which terrorist actors regularly exploit. 

The appeal of Terrorist-Operated Websites

📢 Undisturbed content distribution

📑 Archiving of content

💬 Communicating with other threat actors

💰 Generating revenue

Why this matters

Terrorist-Operated Websites offer threat actors a stable and accessible space in which to, among other activities, host propaganda content, recruit new members, and raise funds.

The proliferation of these websites are undermining counter-terrorism efforts across the industry. Their resurgence has been driven by improved tech sector responses to moderate terrorist content on social media and messaging platforms.

Yet Terrorist-Operated Websites now provide online terrorist actors with easily accessible locations where archives of content are connected to thousands of users; their existence presents a significant transnational threat. 

Terrorist and violent extremist operated websites have therefore been a blind spot for policymakers, practitioners, and researchers. In our view, this risks undermining positive action taken elsewhere across the tech eco-system to disrupt online terrorist activity.  

Countering the threat

Online terrorists actors are exploiting incoherent responses to Terrorist-Operated Websites across the tech sector.

It is now time for concerted cross-sector action to close the obvious loopholes.

Tech Against Terrorism is working to provide internet infrastructure services with the context and expertise required to improve their capabilities in countering this threat. 

We have also detailed recommendations for governments, regulatory bodies to adopt to stay ahead of the threat. These include:

tow domain name-1

Anatomy of domains

Threat actors often rely on domain name accessibility and quickly change domain infrastructure when their sites are disrupted. This is largely due to complex technical and legal components of domain infrastructure.

Recommendations

Governments Infrastructure providers Civil society
Prioritise Terrorist-Operated Websites in policy and regulatory discussions concerning terrorist use of the internet
Include explicit prohibition of terrorism in Terms of Service
Increase research on Terrorist-Operated Websites and on the potential impact of their removal
Develop a global mitigation strategy to tackle these websites by more targeted and proportionate action
Work with governments and law enforcement to act against Terrorist-Operated Websites
Report suspected Terrorist-Operated Websites to infrastructure providers and/or law enforcement
Ensure that activity tackling Terrorist-Operated Websites is carried out with the fullest respect for human rights and fundamental freedoms, including for online freedom of expression
Produce transparency reports, as recommended by Tech Against Terrorism
Scrutinise Terrorist-Operated Website removals to ensure human rights and fundamental freedoms are not adversely impacted
Improve the designation of terrorist groups by reference to human rights and fundamental freedom

REPORT

The Threat of Terrorist and Violent Extremist Operated Websites

STRATEGY

Responding to Terrorist-Extremist Operated Websites

Contact us

If you would like to discuss this important issue and help us take action against Terrorist-Operated Websites please contact us.