U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.


  1. Home
  2. About Us
  3. Site Links
  4. Archived
  5. News Archive
  6. DHS Announces the Launch of the "Countering Terrorists Exploitation of Social Media and the Internet" Training

Archived Content

In an effort to keep DHS.gov current, the archive contains outdated information that may not reflect current policy or programs.

DHS Announces the Launch of the "Countering Terrorists Exploitation of Social Media and the Internet" Training

Release Date: June 11, 2018

Last week, the Department of Homeland Security’s hosted U.S. Countering Violent Extremism (CVE) Task Force and the United Kingdom’s Home Office provided a demonstration of a new online educational training course, “Countering Terrorists Exploitation of Social Media and the Internet,” to members of the Global Internet Forum to Counter Terrorism (GIFCT). This training was first announced by DHS Secretary Kirstjen M. Nielsen in February 2018 at the 2018 Digital Forum on Terrorism Prevention.

Countering Terrorists Exploitation of Social Media and the Interneted. Developed by the US Government's domestically-focused Countering Violent Extremism Task Force and the UK Home Office. CVE Task Force Logo. UK Home Office Logo. With 300 hours of content uploaded every minute to content service platforms, identifying and removing or blocking terrorist content has been a challenge for companies, especially smaller startups with limited resources to manage.

This online 90-minute training is designed to educate startup companies and social media companies about how terrorists may seek to exploit their platforms. This narrated course includes videos and images of official and unofficial terrorist media products, quizzes to test knowledge, as well as supplementary notes pages to explore select topics in greater detail.

The majority of the training examines the online activities of ISIS, al‑Qa'ida, and these two groups’ supporters, as well as White Supremacist Extremists. The final section of the training course highlights select initiatives where governments and industry have worked either together or independently to counter this threat. This section is designed to highlight the significant progress made to date in countering terrorist exploitation of social media and the internet and to encourage additional thinking about how to continue collaboration on this issue.

Companies interested in gaining access to the training can request it on Tech Against Terrorism’s Knowledge Sharing Platform (Sign up at: https://ksp.techagainstterrorism.org/) or reach out to contact@techagainstterrorism.org with the subject line “Training”.

# # #

Last Updated: 02/05/2021
Was this page helpful?
This page was not helpful because the content