Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Archive for 2025

  • Feb252025

    AI or Aryan Ideals? Part Two: A Thematic Content Analysis of White Supremacist Engagement with Generative AI: Discourse 

    Introduction This Insight is the second in a two-part series investigating the ways white supremacists engage with generative artificial intelligence…

    Read more
  • Feb242025

    Harnessing AI for Online P/CVE Efforts: Tools, Challenges, and Ethical Considerations

    Introduction Artificial intelligence (AI) has become integrated in every field—from infrastructure to medicine to law enforcement and education—and is also…

    Read more
  • Feb202025

    The New Orleans Attack: Vulnerabilities of Peer-to-Peer Rental Services

    Introduction On 1 January 2025, two acts of violent extremism shook the United States. In New Orleans, a 42-year-old Army…

    Read more
  • Feb192025

    Combating Islamic State Finance: Central Asia and Around the World

    According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…

    Read more
  • Feb182025

    Combating Islamic State Finance: West Africa and the Sahel 

    According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…

    Read more
  • Feb172025

    Combating the Islamic State Finance: Somalia and the Pan-African Nexus

    According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…

    Read more
  • Feb102025

    Sonic Hate: Examining Brazil’s NSBM Scene and Its Global Networks

    Introduction This Insight will discuss the Brazilian National Socialist Black Metal (NSBM) scene and its role in propagating extremist ideologies,…

    Read more
  • Feb062025

    3D2A: The Second Amendment, 3D Printed Guns and Memed Accelerationism

    Introduction In the ever-evolving landscape of global security, guns and small munitions are the lifeblood of political resistance. In the…

    Read more
  • Jan302025

    The New Orleans Attack: The Technology Behind IS-Inspired Plots

    Introduction  The use of technology by terrorists and violent extremists is a perennially trendy issue in counterterrorism (CT) research—and for…

    Read more
  • Jan292025

    Scouting Uneven Terrain: Challenges for Prevention and Counter-Extremism Practitioners in Digital Gaming Spaces

    Linda Schlegel and Judith Jaskowski are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…

    Read more