Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Archive for 2020

  • Jan072020

    Social Media and Terrorist Financing

    This report is from Phase 1 of GIFCT’s research network initiative. Please note that during this time the network was…

    Read more
  • Jan072020

    The International Cyber Terrorism Regulation Project

    This report is from Phase 1 of GIFCT’s research network initiative. Please note that during this time the network was…

    Read more
  • Jan072020

    Radical Filter Bubbles

    This report is from Phase 1 of GIFCT’s research network initiative. Please note that during this time the network was…

    Read more
  • Jan072020

    Terrorist Definitions and Designations Lists

    This report is from Phase 1 of GIFCT’s research network initiative. Please note that during this time the network was…

    Read more
  • Jan072020

    Mapping the Jihadist Information Ecosystem

    This report is from Phase 1 of GIFCT’s research network initiative. Please note that during this time the network was…

    Read more
  • Jan072020

    The Evolution of Online Violent Extremism in Indonesia and the Philippines

    This report is from Phase 1 of GIFCT’s research network initiative. Please note that during this time the network was…

    Read more
  • Jan072020

    Following the Whack-a-Mole: Britain First’s Visual Strategy from Facebook to Gab

    This report is from Phase 1 of GIFCT’s research network initiative. Please note that during this time the network was…

    Read more
  • Jan072020

    Shedding Light on Terrorist and Extremist Content Removal

    This report is from Phase 1 of GIFCT’s research network initiative. Please note that during this time the network was…

    Read more
  • Jan072020

    A Study of Outlinks Contained in Tweets Mentioning Rumiyah

    This report is from Phase 1 of GIFCT’s research network initiative. Please note that during this time the network was…

    Read more
  • Jan072020

    Public-Private Collaboration to Counter the Use of the Internet for Terrorist Purposes

    This report is from Phase 1 of GIFCT’s research network initiative. Please note that during this time the network was…

    Read more