Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Insights

  • Nov142025

    From TechHaven to Telegram: How Latin American Youth Are Being Drawn into Jihadist Networks

    This Insight was published as part of GIFCT’s Working Group on Addressing Youth Radicalization and Mobilization. GIFCT Working Groups bring…

    Read more
  • Nov122025

    Echoes of Resistance: Mapping Geuzenbond and its Latest Plot in the Netherlands

    On 14 August 2025, Thomas Daveson – identified as Thomas D. by the media – was arrested in Badhoevendorp, in…

    Read more
  • Nov042025

    The Attention Window: Online Ecosystems of Rage, Mobilisation, and Extremist Narratives Following the Heaton Park Synagogue Attack

    On 2 October 2025, all eyes turned to the shocking events unfolding at a synagogue in Manchester, United Kingdom. The…

    Read more
  • Nov032025

    Climate Catastrophe: Militants’ Manipulation of Climate Narratives in Pakistan

    Pakistan has faced the devastating impacts of climate change in recent years, with flash floods between June and October this…

    Read more
  • Oct302025

    Islamic State Information Technology: The New “Security Tips Series” of Electronic Horizon Foundation

    In 2020, at the launch of its first “Supporter’s Security Magazine” on the pro-IS Rocket.Chat server, the Electronic Horizon Foundation…

    Read more
  • Oct282025

    Youth Radicalisation in the Gaming Sphere: An Exploration of Identity-Based Hate and Extremist Content on Roblox

    This Insight was published as part of GIFCT’s Working Group on Addressing Youth Radicalization and Mobilization. GIFCT Working Groups bring…

    Read more
  • Oct242025

    Closing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist Finance

    This Insight is published to coincide with Global Media and Information Literacy Week to highlight positive interventionist technology tools in…

    Read more
  • Oct232025

    Malicious Use of AI and the Race to Respond: Innovation, Regulation, and Risk

    Terrorist and Violent Extremist (TVE) actors are known as early adopters of emerging technologies. There is growing evidence that TVEs…

    Read more
  • Oct202025

    ICERAID: Surveillance, Vigilantism, and Crypto-Rewards

    Over the last several years, extremist and terrorist groups have begun using cryptocurrencies in a myriad of operational capacities.      …

    Read more
  • Oct152025

    Everyday Extremism: Molka, Nth Room, and the Infrastructure of Digital Misogyny

    Digital sex crimes such as South Korea’s molka (hidden camera) phenomenon and the Nth Room case are frequently described as…

    Read more