About header image

Cracking the Terrorist Code

Identify & Disrupt Terrorist Networks

Across all platform types, terrorist organizations and their supporters are working to maintain relevance, construct communities and propagandize, all while avoiding detection by platforms and other authorities.

To conceal their activities terrorist deploy specialist codes and utilize evasion techniques including:

  • Double transliteration of keywords;
  • Diacritic visual keyword modification;
  • Character insertion into keywords;
  • Niche internal terminology as keywords.

Download the full report for actionable insights into these methodologies to strengthen your safeguards and comply with new regulatory requirements.