The 60 Days of PVE Campaign: Lessons on Organizing an Online, Peer-to-Peer, Counter-radicalization Program

Alex Wilner, Brandon Rigato


Combatting violent extremism can involve organizing Peer-to-Peer (P2P) preventing violent extremism (PVE) programs and social media campaigns. While hundreds of PVE campaigns have been launched around the world in recent months and years, very few of these campaigns have actually been reviewed, analyzed, or assessed in any systematic way. Metrics of success and failure have yet to be fully developed, and very little is publically known as to what might differentiate a great and successful P2P campaign from a mediocre one. This article will provide first-hand insight on orchestrating a publically funded, university-based, online, peer-to-peer PVE campaign – 60 Days of PVE – based on the experience of a group of Canadian graduate students. The article provides an account of the group’s approach to PVE. It highlights the entirety of the group’s campaign, from theory and conceptualization to branding, media strategy, and evaluation, and describes the campaign’s core objectives and implementation. The article also analyzes the campaign’s digital footprint and reach using data gleamed from social media. Finally, the article discusses the challenges and difficulties the group faced in running their campaign, lessons that are pertinent for others contemplating a similar endeavour.


Counter-Narrative, Preventing Violent Extremism (PVE), Peer-to-Peer (P2P) campaign, ISIS, Social Media, Canada

Full Text:



Agarwal, R. K. (2011). “The Politics of Hate Speech: A Case Comment on Warman v. Lemire,” Constitutional Forum, 19:2.

Akbarzadeh, S. (2013). “Investing in Mentoring and Educational Initiatives: The Limits of De-radicalisation Programmes in Australia,” Journal of Muslim Minority Affairs, 33:4.

Anonymous (2017, February 12). “Terrorism Today,” The PVE Project, Retrieved September 2017 from

Ashour, O. (2010). “Online De-radicalization? Countering Violent Extremist Narratives,” Perspectives on Terrorism, 4:6.

Berger, J. M. (2016). Making CVE Work A Focused Approach Based on Process Disruption, International Centre for Counter-Terrorism.

Berger, J.M., & Morgan, J., (2016). “The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter, Brookings Institution.

Boudreau , C. (2017, March 10). “Parents and PVE,” The PVE Project. Retrieved September 2017 from

Bourrie, M. (2016). Killing game: Maryrdom, Murder, and the Lure of ISIS (Toronto: HarperCollins).

Braddock, H. & Dillard J.P. (2016), “Meta-analytic Evidence for the Persuasive Effect of Narratives on Beliefs, Attitudes, Intentions, and Behaviors,” Communication Monographs 83:4.

Braddock, H. & Horgan J. (2016). “Towards a Guide for Constructing and Disseminating Counternarratives to Reduce Support for Terrorism,” Studies in Conflict & Terrorism 39:5.

Briggs, R., & Feve, S. (2013). Review of Programs to Counter Narratives of Violent Extremism: What Works and What are the Implications for Government? Institute for Strategic Dialogue.

Clark, C. (2017, April 04). “Preventing Violent Extremism in London, ON,” The PVE Project, Retrieved September 2017 from

Cohen, J. D. (2016). “The next Generation of Government CVE Strategies at Home,” The ANNALS of the American Academy of Political and Social Science 668:1.

Dawson, L. L. (2017, March 26). “The Struggle with the Role of Religion in Radicalization,” The PVE Project, Retrieved September 2017 from

Ducol, B., Bouchard, M., Davies, G., Ouellet, M., & Neudecker, C. (2016). “Assessment of the State of Knowledge: Connections between Research on the Social Psychology of the Internet and Violent Extremism,” TSAS Working Paper.

EdVenture Partners, (2017). EdVenture Partners: Peer to Peer – Facebook Global Digital Challenge. Retrieved September 2017 from

Ellis, J. 0., III . (2017, March 15). “An Overview of Modern Right-Wing Extremism in Canada,” The PVE Project, Retrieved September 2017 from

Finn, M., Momani, B., Opatowski, M., & Opondo, M. (2016). “Youth Evaluations of CVE/PVE Programming in Kenya in Context,” Journal for Deradicalization Iss. 7.

Goodyear-Grant, E. (2017, March 21). “Violent Extremism in the News: A Cautionary Note,” The PVE Project, Retrieved September 2017 from

Goldstein, M. (2017, March 31). “Welcome to the Real Ottawa!” The PVE Project, Retrieved September 2017 from

Gurski, P. (2017). Western Foreign Fighters: The Threat to Homeland and International Security (New York: Rowman and Littlefield).

Gurski., P. (2016). The Threat from Within: Recognizing Al Qaeda-inspired Radicalization and Terrorism in the West, (New York: Rowman & Littlefield).

Hedayah. (2016) Counter-Narrative Library, Retrieved September 2017

Jebara, M. (2017, March 15). “Is the Counternarrative of Terrorists groups not Representing the True Islam Helpful for Members of the Muslim Community?” The PVE Project, [Video file], Retrieved September 2017, from

Harris-Hogan, S., Barrelle, K., & Zammit, A. (2016). “What is Countering Violent Extremism?,” Behavioral Sciences of Terrorism and Political Aggression 8:1.

Horgan, J., (2009). Walking Away From Terrorism (New York; Routledge).

Innes, M., Roberts, C., & Lowe, T. (2017). “A Disruptive Influence? “Preventing” Problems and Countering Violent Extremism Policy in Practice,” Law & Society Review 51:2.

Leiken, R. S. (2012). Europe’s angry Muslims: The revolt of the second generation, (New York: Oxford University Press).

Lim, M. (2013), “Many Clicks but Little Sticks: Social Media Activism in Indonesia,” Journal of Contemporary Asia 43:4.

Macnair, L., & Frank, R. (2017). “Voices Against Extremism: A case study of a community-based CVE counter-narrative campaign,” Journal for Deradicalization Iss. 10.

National Center for Injury Prevention and Control Division of Violence Prevention (2015). The Public Health Approach to Violence Prevention.

Ozimek, P., & Bierhoff, H. (2016). “Facebook use Depending on Age: The influence of Social Comparisons,” Computers in Human Behavior 61.

Perry, B., & Scrivens, R. (2016). “Uneasy Alliances: A look at the Right-wing Extremist Movement in Canada,” Studies in Conflict & Terrorism 39:9.

Pressman, E. (2009). “Risk Assessment Decisions for Violent Political Extremism,”Public Safety Canada.

PVE Project, An Interview with Ryan Scrivens. Retrieved September 2017 from

Radicalization Awareness Network (2015). Counter Narratives and Alternative Narratives RAN Issue Paper.

Shaikh, M. (2017, March 13). “Terrorism in Islamic Costume: Mubin Shaikh on Counter Terrorism,” The PVE Project [Video file], Retrieved September 2017, from

Sjoberg, L., & Gentry, C. E. (2007). Mothers, Monsters, Whores: Women’s violence in global politics (New York: Zed Books).

Sorial, D. S. (2014). “Free Speech, Hate Speech, and the problem of (Manufactured) Authority,” Canadian Journal of Law and Society 29:1.

Speckhard, A., & Shaikh, M. (2014). Undercover Jihadi: Inside the Toronto 18, Al Qaeda Inspired, Homegrown, Terrorism in the West. (Mclean, VA: Advances Press).

Tuck, H., & Silverman, T. (2016). The Counter-Narrative Handbook. Institute for Strategic Dialogue.

“Twitter Transparency Report”. (n.d.). Government TOS reports. Retrieved September 2017, from

Wallace, R (2017, March 29). “Re-Humanizing Refugees and Resettlement: Coverage of the Syrian Refugee Crisis in Canadian News Media,” The PVE Project, Retrieved September 2017 from

Wilner, A. S., & Dubouloz, C. (2011). “Transformative Radicalization: Applying Learning Theory to Islamist Radicalization,” Studies in Conflict & Terrorism 34:5.

Wilner, A. S. (2017, March 14). “Introduction to PVE,” The PVE Project, [Video file], Retrieved September 2017, from

Wong, M. A., Frank, R., & Allsup, R. (2015). “The Supremacy of Online White Supremacists,” Information & Communications Technology Law 24:1.

Zeiger, Sara (2016). “Counter-Narratives for Countering Violent Extremism (CVE) in South East Asia,” Hedayah, Retrieved September 2017 from


  • There are currently no refbacks.

Copyright (c) 2017 Alex Wilner, Brandon Rigato

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

ISSN: 2363-9849 

Proud Member of the Directory of Open Access Journals (DOAJ) and indexed by SCOPUS.