- Mar102025
The EU’s AI Act: Implications on Justice and Counter-Terrorism
Introduction The European Union’s AI Act, adopted in June 2024, represents the first multinational framework regulating Artificial Intelligence (AI) development…
admin_gnet - Mar072025
Mapping the Enemy, Mobilising the Future: Surveillance and Recruitment Strategies of Lakurawa Terror Group in Nigeria
Introduction In November 2024, Nigerian authorities officially declared the Lakurawa group a terrorist organisation and banned it across the country.…
John Sunday Ojo - Mar052025
Hate, Harms and Hashing: An Overview of OFCOM Guidance for P/CVE
Introduction On the 16th of December 2024, the government-backed UK media regulation body, OFCOM, published the Illegal Harms Codes, a…
Erin Stoner - Mar032025
“Watching foids seethe is actual lifefuel”: Celebratory Male Supremacism in the Aftermath of the 2024 US Presidential Election
Content warning: This Insight contains misogynistic, racist and transphobic slurs and mentions of suicide. Introduction Six weeks ago, Donald Trump…
Allysa Czerwinsky - Feb282025
Decoding Saboteurism: An Explanation of Infrastructure Attacks by Far-Right Extremists
Introduction In recent years, far‐right extremist tactics have taken a turn toward targeting critical infrastructure — a renewed trend rooted…
admin_gnet - Feb262025
Policing Extremism on Gaming-Adjacent Platforms: Awful but Lawful?
Introduction The study of the intersection between gaming and extremism has focused largely on a few key areas: the presence…
Dr. William Allchorn - Feb252025
AI or Aryan Ideals? Part Two: A Thematic Content Analysis of White Supremacist Engagement with Generative AI: Discourse
Introduction This Insight is the second in a two-part series investigating the ways white supremacists engage with generative artificial intelligence…
Louis Dean - Feb242025
Harnessing AI for Online P/CVE Efforts: Tools, Challenges, and Ethical Considerations
Introduction Artificial intelligence (AI) has become integrated in every field—from infrastructure to medicine to law enforcement and education—and is also…
admin_gnet - Feb202025
The New Orleans Attack: Vulnerabilities of Peer-to-Peer Rental Services
Introduction On 1 January 2025, two acts of violent extremism shook the United States. In New Orleans, a 42-year-old Army…
Marc-André Argentino - Feb192025
Combating Islamic State Finance: Central Asia and Around the World
According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…
Adam Rousselle - Feb182025
Combating Islamic State Finance: West Africa and the Sahel
According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…
Adam Rousselle - Feb172025
Combating the Islamic State Finance: Somalia and the Pan-African Nexus
According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…
Adam Rousselle - Feb102025
Sonic Hate: Examining Brazil’s NSBM Scene and Its Global Networks
Introduction This Insight will discuss the Brazilian National Socialist Black Metal (NSBM) scene and its role in propagating extremist ideologies,…
Ricardo Cabral Penteado - Feb062025
3D2A: The Second Amendment, 3D Printed Guns and Memed Accelerationism
Introduction In the ever-evolving landscape of global security, guns and small munitions are the lifeblood of political resistance. In the…
Anonymous Author - Jan302025
The New Orleans Attack: The Technology Behind IS-Inspired Plots
Introduction The use of technology by terrorists and violent extremists is a perennially trendy issue in counterterrorism (CT) research—and for…
Clara Broekaert - Jan292025
Scouting Uneven Terrain: Challenges for Prevention and Counter-Extremism Practitioners in Digital Gaming Spaces
Linda Schlegel and Judith Jaskowski are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…
Linda Schlegel - Jan282025
AI Tools and the Alt-Right: A Double-Edged Sword for P/CVE
Introduction The emergence of artificial intelligence (AI) tools represents a great resource to support prevent/counter-violent extremism (P/CVE) practitioners in their…
Aurora Agnolon - Jan272025
Droning On: The Response to Use of Drones by Domestic Violent Extremists
Introduction On 4 November 2024, federal agents arrested 24-year-old white supremacist Skyler Philippi for plotting to destroy an electric power…
Jonathan Lewis - Jan232025
Leveraging AI-Driven Tools for Capacity Building in Crisis Response: Enhancing Moderation and Crisis Management on Smaller Digital Platforms in Africa
Introduction In recent years, smaller digital platforms across Africa have emerged as vital spaces for social engagement, entrepreneurship, and information…
Abraham Ename Minko - Jan222025
E-Commerce and Extremism: Dropshipping and the Continued Sale of White Supremacist Merchandise on Amazon
Introduction Large online retailers have long faced criticism for their failure to proactively remove extremist content from their platforms, from…
Joseph Stabile - Jan162025
From Soundtracks to Side Quests: How Terrorist and Extremist Games Use Mainstream Platforms to Evade Detection and Draw Users
Emily Thompson and Galen Lamphere-Englund are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…
Galen Englund - Jan132025
AI or Aryan Ideals? A Thematic Content Analysis of White Supremacist Engagement with Generative AI
Introduction From the creation of Stormfront in 1996 to the adoption of the messaging application Telegram, extreme-right actors, most notably…
Louis Dean - Jan092025
“Ladies and gentlemen, we’re all domestic terrorists”: Incels on the Bondi Attack
Introduction This Insight examines responses to the Bondi stabbing attack of 2024 on incel forums, contributing to the current discussion…
Dr. Gerard Gill - Jan082025
Beyond the FGC-9: How the Urutau Redefines the Global 3D-Printed Firearm Movement
The following is a Special Extended Insight 1.Introduction On Wednesday, 21 August 2024, the build plans for a highly anticipated…
Dr Yannick Veilleux-Lepage - Dec202024
The Drones of Hayat Tahrir al-Sham: The Development and Use of UAS in Syria
The lightning offensive which toppled the Assad regime and captured Damascus in less than two weeks has shocked observers both…
Broderick McDonald - Dec192024
Anime and the Extreme-Right: Otaku Culture and Aesthetics in Extremist Digital Propaganda
Introduction If the political tumult of the 2016 and 2020 US presidential elections revealed anything, it’s that digital media and…
Joshua Bowes - Dec182024
Dark Signals: The Growing Threat of Satellite Internet in Extremist Networks
Introduction Many people are aware of the importance of satellite internet access, but few know of its growing importance in…
Gaetano Sicolo - Dec172024
Improving the Quality of Violent Extremism Research: Why CVE Researchers Should Play More Games
Elizabeth D. Kilmer and Rachel Kowert are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…
Elizabeth D. Kilmer - Dec162024
Telegram Homeschooling: Maintaining A Salafi-Jihadist Oriented Echo Chamber
Introduction Journalists have documented instances where parents used homeschooling as an opportunity to create extremist-informed curricula in the United States…
Meili Criezis - Dec132024
The Targeting of Ethnic Tajiks by Online Extremists: A Global Problem
Introduction Extremist groups increasingly target ethnic Tajiks for recruitment through sophisticated online propaganda campaigns, resulting in some of the world’s…
Adam Rousselle - Dec122024
Soliciting Terror: ISKP Digital Communications and Financing Tactics Through Voice of Khurasan
Introduction It is well known that the Islamic State and its branches effectively use internet-based strategies to disseminate their propaganda and…
Ahmet Yiğitalp Tulga - Dec112024
Melodies of Malice: Understanding How AI Fuels the Creation and Spread of Extremist Music
Introduction Research on extremism and counter-terrorism has long underscored the role of music in reinforcing far-right extremist ideologies and serving…
Heron Lopes - Dec092024
Digital Warfare in Kashmir: Evolving Tactics of Insurgency in the Region
Introduction In the Indian region of Kashmir, the battlefield has shifted. No longer confined to guns and grenades, insurgent groups…
Spotlight Team - DataLEADS - Dec042024
Brotherhood of Blood: Understanding the Origins and Trajectory of the Maniac Murder Cult
Introduction As heavy metal music begins to play on a video, a black and white face appears on the screen,…
Peter Smith - Dec022024
“Degenerate” Queers and “Chadsexual” Sapphics: Anti-LGBTQ+ Rhetoric in the Incelosphere
Content warning: This insight contains references to homophobic and transphobic slurs and violence against women. Introduction At present, our understandings…
Allysa Czerwinsky - Nov282024
CaliphateTok: How Islamic State (IS) Leverages Social Media in Indonesia and the Power of Counter-Narratives
Introduction On 31 July 2024, Indonesia’s Counterterrorism Special Detachment 88 (Densus 88) arrested a suspect in East Java accused of…
Jonathan Suseno Sarwono
GNET’s Research Digest
Sign up for our monthly newsletter to stay updated about our work