You are here
Terrorist Definitions and Designations Lists: What Technology Companies Need to KnowChris Meserole and Daniel Byman
Other Publications, 19 July 2019
Cyber, Terrorism and Conflict, The Global Research Network on Terrorism and Technology, Technology, Terrorism
Key Findings and Recommendations
Many technology companies refer to third-party terrorist definitions and designation lists when moderating potential terrorist accounts. However, those definitions and lists are often produced for specific legal, political or academic purposes and may not be suitable for general use. Technology companies should understand such lists’ relative strengths and limitations before relying on them.
- Technology companies should define terrorist entities in a way that distinguishes them from non-violent dissidents, state actors, conventional rebel groups, and criminals or criminal syndicates.
- Technology companies should use government designation lists with caution, since even the lists compiled by democratic governments are more likely to include some terrorist groups but not others.
- The technology sector and representatives from civil society, academia and government should work together to develop a global, unbiased and real-time database of possible terrorist entities. The database could be used to produce different designation lists based on various inclusion criteria.
Chris Meserole is a Fellow in the Foreign Policy Program at the Brookings Institution.
Daniel Byman is a Professor and Vice Dean in the School of Foreign Service at Georgetown University and a Senior Fellow at the Center for Middle East Policy at the Brookings Institution.
The authors would like to thank Israa Saber and Malika Mehrotra for research assistance.