- Apr232025
The Virtual Connection: Illicit Natural Resource Trade, Cryptocurrency, and Extremist Financing
Introduction The illicit extraction and trade of natural resources is a growing issue that afflicts many biodiverse regions across the…
admin_gnet - Apr222025
Ecology as Collateral: The Hidden Cost of Houthi Warfare
Introduction Ansar Allah, also known as the Houthis, has quickly expanded from a local insurgent group in Yemen to a…
Anadi - Apr152025
Attack at the Pear Tree Inn: An Analysis of a British Terrorist’s Manifesto
The following is a Special Extended Insight Content warning: racial and antisemitic slurs. Manifesto and Tweets give insight into a…
admin_gnet - Apr112025
Automated Recruitment: Artificial Intelligence, ISKP, and Extremist Radicalisation
Introduction The role of artificial intelligence in terrorist recruitment has grown exponentially, which has had a significant impact on the…
admin_gnet - Apr092025
Mapping ISKP’s Strength: Social Network Analysis of Tech-Driven Jihad
Introduction The Islamic State (IS) has evolved to be one of the most serious threats to many states, no matter…
admin_gnet - Apr032025
Anonymity, Performance, and Identity: An Analysis of the Antioch Shooting
Introduction On 22 January 2025, a shooting at Antioch High School in Nashville, Tennessee, left one student dead and another…
Manfredi Pozzoli - Mar312025
When Grandpa Turns Extremist: Digital Immigrants, Radicalisation and the German Reich Citizens Movement
Introduction Online radicalisation studies and P/CVE research, more broadly, tend to focus primarily on younger individuals and cases.…
admin_gnet - Mar272025
The Great TikTok Migration: Western Extremists Flock to RedNote
Introduction Following the announcement on 15 January that TikTok would be banned in the United States on 19 January 2025,…
admin_gnet - Mar242025
Cryptocurrency and Extremism: How Social Network Analysis is Used to Track Extremist Cryptocurrency Donations
Introduction Among the digital tools emerging in today’s decentralised financial framework, cryptocurrency has been especially attractive for extremist fundraising by…
admin_gnet - Mar202025
Building Tech Capacity: Cross-Cultural, Gender-Responsive Solutions to Prevent Extremism in Gaming
Introduction When discussing social harms in online gaming spaces, the term “toxicity” frequently takes centre stage. It is often used…
Rachel Kowert - Mar182025
Digital Pathways to Violence: the Tech Ecosystem Behind the Antioch Shooting
Introduction: Technology, Radicalisation, and Security Failures On 22 January 2025, a 17-year-old student carried out a shooting at Antioch High…
Ricardo Cabral Penteado - Mar142025
Sadaqah Jariyah: The Thriving Cryptocurrency Fundraising Efforts Behind ISKP’s Official Media
Methodology The authors monitored the official and unofficial channels, as well as internal discussions of ISKP media operatives and supporters,…
Mona Thakkar - Mar132025
Free the Captives: Islamic State Central Asian Fundraising Networks in Support of IS Families in Syria and Iraq
Methodology The authors monitored the financial and propaganda activities of IS women and ISKP propagandists on Telegram, and Instagram between…
Mona Thakkar - Mar122025
The Rise of Hayat Tahrir al-Sham in Syria: From Wartime Propaganda to Diplomatic Rhetoric
Introduction Less than two weeks were enough for the Hayat Tahrir al-Sham (HTS)-led ‘Operations Room’ to overthrow the tyrannical and…
Brune Descamps - Mar102025
The EU’s AI Act: Implications on Justice and Counter-Terrorism
Introduction The European Union’s AI Act, adopted in June 2024, represents the first multinational framework regulating Artificial Intelligence (AI) development…
admin_gnet - Mar072025
Mapping the Enemy, Mobilising the Future: Surveillance and Recruitment Strategies of Lakurawa Terror Group in Nigeria
Introduction In November 2024, Nigerian authorities officially declared the Lakurawa group a terrorist organisation and banned it across the country.…
John Sunday Ojo - Mar052025
Hate, Harms and Hashing: An Overview of OFCOM Guidance for P/CVE
Introduction On the 16th of December 2024, the government-backed UK media regulation body, OFCOM, published the Illegal Harms Codes, a…
Erin Stoner - Mar032025
“Watching foids seethe is actual lifefuel”: Celebratory Male Supremacism in the Aftermath of the 2024 US Presidential Election
Content warning: This Insight contains misogynistic, racist and transphobic slurs and mentions of suicide. Introduction Six weeks ago, Donald Trump…
Allysa Czerwinsky - Feb282025
Decoding Saboteurism: An Explanation of Infrastructure Attacks by Far-Right Extremists
Introduction In recent years, far‐right extremist tactics have taken a turn toward targeting critical infrastructure — a renewed trend rooted…
admin_gnet - Feb262025
Policing Extremism on Gaming-Adjacent Platforms: Awful but Lawful?
Introduction The study of the intersection between gaming and extremism has focused largely on a few key areas: the presence…
Dr. William Allchorn - Feb252025
AI or Aryan Ideals? Part Two: A Thematic Content Analysis of White Supremacist Engagement with Generative AI: Discourse
Introduction This Insight is the second in a two-part series investigating the ways white supremacists engage with generative artificial intelligence…
Louis Dean - Feb242025
Harnessing AI for Online P/CVE Efforts: Tools, Challenges, and Ethical Considerations
Introduction Artificial intelligence (AI) has become integrated in every field—from infrastructure to medicine to law enforcement and education—and is also…
admin_gnet - Feb202025
The New Orleans Attack: Vulnerabilities of Peer-to-Peer Rental Services
Introduction On 1 January 2025, two acts of violent extremism shook the United States. In New Orleans, a 42-year-old Army…
Marc-André Argentino - Feb192025
Combating Islamic State Finance: Central Asia and Around the World
According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…
Adam Rousselle - Feb182025
Combating Islamic State Finance: West Africa and the Sahel
According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…
Adam Rousselle - Feb172025
Combating the Islamic State Finance: Somalia and the Pan-African Nexus
According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…
Adam Rousselle - Feb102025
Sonic Hate: Examining Brazil’s NSBM Scene and Its Global Networks
Introduction This Insight will discuss the Brazilian National Socialist Black Metal (NSBM) scene and its role in propagating extremist ideologies,…
Ricardo Cabral Penteado - Feb062025
3D2A: The Second Amendment, 3D Printed Guns and Memed Accelerationism
Introduction In the ever-evolving landscape of global security, guns and small munitions are the lifeblood of political resistance. In the…
Anonymous Author - Jan302025
The New Orleans Attack: The Technology Behind IS-Inspired Plots
Introduction The use of technology by terrorists and violent extremists is a perennially trendy issue in counterterrorism (CT) research—and for…
Clara Broekaert - Jan292025
Scouting Uneven Terrain: Challenges for Prevention and Counter-Extremism Practitioners in Digital Gaming Spaces
Linda Schlegel and Judith Jaskowski are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…
Linda Schlegel - Jan282025
AI Tools and the Alt-Right: A Double-Edged Sword for P/CVE
Introduction The emergence of artificial intelligence (AI) tools represents a great resource to support prevent/counter-violent extremism (P/CVE) practitioners in their…
Aurora Agnolon - Jan272025
Droning On: The Response to Use of Drones by Domestic Violent Extremists
Introduction On 4 November 2024, federal agents arrested 24-year-old white supremacist Skyler Philippi for plotting to destroy an electric power…
Jonathan Lewis - Jan232025
Leveraging AI-Driven Tools for Capacity Building in Crisis Response: Enhancing Moderation and Crisis Management on Smaller Digital Platforms in Africa
Introduction In recent years, smaller digital platforms across Africa have emerged as vital spaces for social engagement, entrepreneurship, and information…
Abraham Ename Minko - Jan222025
E-Commerce and Extremism: Dropshipping and the Continued Sale of White Supremacist Merchandise on Amazon
Introduction Large online retailers have long faced criticism for their failure to proactively remove extremist content from their platforms, from…
Joseph Stabile - Jan162025
From Soundtracks to Side Quests: How Terrorist and Extremist Games Use Mainstream Platforms to Evade Detection and Draw Users
Emily Thompson and Galen Lamphere-Englund are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…
Galen Englund - Jan132025
AI or Aryan Ideals? A Thematic Content Analysis of White Supremacist Engagement with Generative AI
Introduction From the creation of Stormfront in 1996 to the adoption of the messaging application Telegram, extreme-right actors, most notably…
Louis Dean
GNET’s Research Digest
Sign up for our monthly newsletter to stay updated about our work