Alessandro BolpagniIslamic State Information Technology: The New “Security Tips Series” of Electronic Horizon Foundation
Read moreIn 2020, at the launch of its first “Supporter’s Security Magazine” on the pro-IS Rocket.Chat server, the Electronic Horizon Foundation…
Linda SchlegelYouth Radicalisation in the Gaming Sphere: An Exploration of Identity-Based Hate and Extremist Content on Roblox
Read moreThe gaming sector is becoming increasingly relevant in efforts to understand contemporary forms of extremism. Extremist actors of various ideological…
Adam RousselleClosing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist Finance
Read moreThis Insight is published to coincide with Global Media and Information Literacy Week to highlight positive interventionist technology tools in…
Kevin Marc BlasiakMalicious Use of AI and the Race to Respond: Innovation, Regulation, and Risk
Read moreTerrorist and Violent Extremist (TVE) actors are known as early adopters of emerging technologies. There is growing evidence that TVEs…
Nina KurtICERAID: Surveillance, Vigilantism, and Crypto-Rewards
Read moreOver the last several years, extremist and terrorist groups have begun using cryptocurrencies in a myriad of operational capacities. …
Se Youn ParkEveryday Extremism: Molka, Nth Room, and the Infrastructure of Digital Misogyny
Read moreDigital sex crimes such as South Korea’s molka (hidden camera) phenomenon and the Nth Room case are frequently described as…
Paula Nunez-GuerraLight of Darkness: An Analysis of ISKP’s Digital Handbook
Read moreThe digital bulletin, Light of Darkness, was originally conceived as a supplementary component to Voice of Khurasan and has gradually…
Dr Yannick Veilleux-LepageSymbols and Scripts: Firearms as Artefacts of Extremist Violence
Read moreOn 10 September 2025, in Orem, Utah, right-wing political commentator Charlie Kirk was shot and killed. Investigators later reported that…
Michaela Rana‘The Generation of ‘Digital Natives’: How Far-Right Extremists Target Australian Youth Online for Radicalisation and Recruitment’
Read moreContent disclaimers: All identifiers referencing real-life cases will be anonymised with pseudonyms, noting that in Australia, names are publicly withheld…
Timothy KapplerOSINT: The Digital Force-Multiplier for Extremist Violence
Read moreViolent extremists are continually adapting the ways in which they exploit digital platforms for coordination and recruitment. Open-source intelligence (OSINT),…
GNET’s Research Digest
Sign up for our monthly newsletter to stay updated about our work