New Jersey-Based Neo-Nazi Is Featured Guest On Rumble Livestream Where They Discuss X (Twitter) As A Social Media Platform Of Choice: 'X Is The Battlefield, Gab Is The Homebase'; Praise X For Enabling #BanTheADL Hashtag Campaign; Identify Resistance To Zionism As Gateway To Antisemitism; Praise Nick Fuentes, Denounce U.S. Military; Claim X Censorship Worse Since Elon Musk Traveled To Israel

print
January 24, 2024

YOU MUST BE SUBSCRIBED TO THE MEMRI DOMESTIC TERRORISM THREAT MONITOR (DTTM) TO READ THE FULL REPORT. GOVERNMENT AND MEDIA CAN REQUEST A COPY BY WRITING TO DTTMSUBS@MEMRI.ORG WITH THE REPORT TITLE IN THE SUBJECT LINE. PLEASE INCLUDE FULL ORGANIZATIONAL DETAILS AND AN OFFICIAL EMAIL ADDRESS IN YOUR REQUEST. NOTE: WE ARE ABLE TO PROVIDE A COPY ONLY TO MEMBERS OF GOVERNMENT, LAW ENFORCEMENT, MEDIA, AND ACADEMIA, AND TO SUBSCRIBERS; IF YOU DO NOT MEET THESE CRITERIA PLEASE DO NOT REQUEST.

The full text of this post is available to DTTM subscribers.

If you are a subscriber, log in here to read this report.

For information on the required credentials to access this material, visit the DTTM subscription page

Subscribe to DTTM

Join U.S. and other Western government agencies and law enforcement, as well as leading businesses and business organizations, in subscribing to the MEMRI Domestic Terrorism Threat Monitor (DTTM) Project, for the latest alerts, updates, and reports on imminent and potential threats from around the world.

ONLY GOVERNMENT, MEDIA, AND ACADEMIA WITH FULL CREDENTIALS CAN REQUEST ACCESS TO DTTM REPORTS.

Subscribe to DTTM

The Cyber & Jihad Lab

The Cyber & Jihad Lab monitors, tracks, translates, researches, and analyzes cyber jihad originating from the Middle East, Iran, South Asia, and North and West Africa. It innovates and experiments with possible solutions for stopping cyber jihad, advancing legislation and initiatives federally – including with Capitol Hill and attorneys-general – and on the state level, to draft and enforce measures that will serve as precedents for further action. It works with leaders in business, law enforcement, academia, and families of terror victims to craft and support efforts and solutions to combat cyber jihad, and recruits, and works with technology industry leaders to craft and support efforts and solutions.

Read More