Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Insights

  • Aug092021

    Digital Misogynoir and White Supremacy: What Black Feminist Theory Can Teach Us About Far Right Extremism

    What is Misogynoir? Far-right studies has been historically overrepresented by white scholars and those who don’t acquaint themselves with Black…

    Read more
  • Aug062021

    White Nationalists are Driving the CRT Conversation Online

    Critical race theory (CRT) has become an important topic of discussion, but parent activists and governments are not the only…

    Read more
  • Aug042021

    Current Priorities in Counterterrorism and Prevention: Results of the CENS Online Expert Survey

    The Centre of Excellence for National Security (CENS) in Singapore designed a survey to assess the pandemic’s impact on violent…

    Read more
  • Aug022021

    How Will Violent Extremists Use Technology in the Future?

    In thinking through how terrorists and violent extremists will continue to evolve in the future, one of the most pressing…

    Read more
  • Jul302021

    Safety vs Security: An Asymmetrical Opportunity for RWE in Australia

    In 1922 German political theorist Carl Schmitt wrote a seminal essay arguing that sovereignty is defined by the power to…

    Read more
  • Jul292021

    The Race War May No Longer Be Digitised: James Mason’s Designation as a Terrorist Entity in Canada

    Almost two decades into the War on Terror era, hundreds of designated terrorist entities operate globally. Far from posing a…

    Read more
  • Jul282021

    QAnon is not Dead: New Research into Telegram Shows the Movement is Alive and Well

    Following the role that QAnon adherents, and other actors, played in the insurrection on 6 January 2021, large social media…

    Read more
  • Jul262021

    When Counter-Speech Backfires: The Pitfalls of Strategic Online Interaction

    For a long time, hatred and incitement on social media have been treated as a relatively apolitical and purely virtual…

    Read more
  • Jul212021

    Schrems II and the Future of 3rd Party Security Service Access to Data From the UK

    Happy Birthday Schrems II, but hold back the cake. As the EU’s judgment in Data Protection Commissioner v Facebook Ireland…

    Read more
  • Jul192021

    Technology and Terrorist Financing

    Terrorists are increasingly exploiting technology to finance their activities. However, terrorist adoption of technology is an evolution, not a revolution. As the…

    Read more