Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Insights

  • Apr152025

    Attack at the Pear Tree Inn: An Analysis of a British Terrorist’s Manifesto

    The following is a Special Extended Insight  Content warning: racial and antisemitic slurs. Manifesto and Tweets give insight into a…

    Read more
  • Apr112025

    Automated Recruitment: Artificial Intelligence, ISKP, and Extremist Radicalisation

    Introduction The role of artificial intelligence in terrorist recruitment has grown exponentially, which has had a significant impact on the…

    Read more
  • Apr092025

    Mapping ISKP’s Strength: Social Network Analysis of Tech-Driven Jihad 

    Introduction The Islamic State (IS) has evolved to be one of the most serious threats to many states, no matter…

    Read more
  • Apr032025

    Anonymity, Performance, and Identity: An Analysis of the Antioch Shooting

    Introduction On 22 January 2025, a shooting at Antioch High School in Nashville, Tennessee, left one student dead and another…

    Read more
  • Mar312025

    When Grandpa Turns Extremist: Digital Immigrants,  Radicalisation and the German Reich Citizens Movement

    Introduction      Online radicalisation studies and P/CVE research, more broadly, tend to focus primarily on younger individuals and cases.…

    Read more
  • Mar272025

    The Great TikTok Migration: Western Extremists Flock to RedNote

    Introduction  Following the announcement on 15 January that TikTok would be banned in the United States on 19 January 2025,…

    Read more
  • Mar242025

    Cryptocurrency and Extremism: How Social Network Analysis is Used to Track Extremist Cryptocurrency Donations

    Introduction Among the digital tools emerging in today’s decentralised financial framework, cryptocurrency has been especially attractive for extremist fundraising by…

    Read more
  • Mar202025

    Building Tech Capacity: Cross-Cultural, Gender-Responsive Solutions to Prevent Extremism in Gaming

    Introduction  When discussing social harms in online gaming spaces, the term “toxicity” frequently takes centre stage. It is often used…

    Read more
  • Mar182025

    Digital Pathways to Violence: the Tech Ecosystem Behind the Antioch Shooting

    Introduction: Technology, Radicalisation, and Security Failures On 22 January 2025, a 17-year-old student carried out a shooting at Antioch High…

    Read more
  • Mar142025

    Sadaqah Jariyah: The Thriving Cryptocurrency Fundraising Efforts Behind ISKP’s Official Media

    Methodology The authors monitored the official and unofficial channels, as well as internal discussions of ISKP media operatives and supporters,…

    Read more