Maria ZuppelloFrom TechHaven to Telegram: How Latin American Youth Are Being Drawn into Jihadist Networks
Read moreThis Insight was published as part of GIFCT’s Working Group on Addressing Youth Radicalization and Mobilization. GIFCT Working Groups bring…
Paola TestaEchoes of Resistance: Mapping Geuzenbond and its Latest Plot in the Netherlands
Read moreOn 14 August 2025, Thomas Daveson – identified as Thomas D. by the media – was arrested in Badhoevendorp, in…
Ella GoldschmiedThe Attention Window: Online Ecosystems of Rage, Mobilisation, and Extremist Narratives Following the Heaton Park Synagogue Attack
Read moreOn 2 October 2025, all eyes turned to the shocking events unfolding at a synagogue in Manchester, United Kingdom. The…
Imtiaz BalochClimate Catastrophe: Militants’ Manipulation of Climate Narratives in Pakistan
Read morePakistan has faced the devastating impacts of climate change in recent years, with flash floods between June and October this…
Alessandro BolpagniIslamic State Information Technology: The New “Security Tips Series” of Electronic Horizon Foundation
Read moreIn 2020, at the launch of its first “Supporter’s Security Magazine” on the pro-IS Rocket.Chat server, the Electronic Horizon Foundation…
Linda SchlegelYouth Radicalisation in the Gaming Sphere: An Exploration of Identity-Based Hate and Extremist Content on Roblox
Read moreThis Insight was published as part of GIFCT’s Working Group on Addressing Youth Radicalization and Mobilization. GIFCT Working Groups bring…
Adam RousselleClosing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist Finance
Read moreThis Insight is published to coincide with Global Media and Information Literacy Week to highlight positive interventionist technology tools in…
Kevin Marc BlasiakMalicious Use of AI and the Race to Respond: Innovation, Regulation, and Risk
Read moreTerrorist and Violent Extremist (TVE) actors are known as early adopters of emerging technologies. There is growing evidence that TVEs…
Nina KurtICERAID: Surveillance, Vigilantism, and Crypto-Rewards
Read moreOver the last several years, extremist and terrorist groups have begun using cryptocurrencies in a myriad of operational capacities. …
Se Youn ParkEveryday Extremism: Molka, Nth Room, and the Infrastructure of Digital Misogyny
Read moreDigital sex crimes such as South Korea’s molka (hidden camera) phenomenon and the Nth Room case are frequently described as…
Insights
GNET > Insights
GNET’s Research Digest
Sign up for our monthly newsletter to stay updated about our work