“…Extremists exploit social media platforms, and the Internet more generally, for a range of reasons; from spreading hateful narratives and propaganda to financing, recruitment, and sharing operational information (Gill et al, 2017). How best to counter such activity has recently been the focus of an emerging field of academic and policy debate (Aly, Macdonald, Jarvis, & Chen, 2016;Braddock & Horgan, 2016;Davies, Neudecker, Ouellet, Bouchard, & Ducol, 2016;Helmus, 2018;Szmania & Fincher, 2017). While many extremists end up barred from social media at the discretion of hosting platforms (Citron, 2018;Gillespie, 2018), often in discussion with government and law enforcement (Brocato, 2015;Brown & Pearson, 2018), significant attention is being paid to countermessaging and other strategic communication techniques as potential responses (Bertram, 2016;Beutel et al, 2016;Braddock & Horgan, 2016;Briggs & Feve, 2013;Brown & Marway, 2018;Cherney, 2016;Eerten & van Doosje, 2019).…”