Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Insights

Insights

  • Mar102025

    The EU’s AI Act: Implications on Justice and Counter-Terrorism 

    Introduction The European Union’s AI Act, adopted in June 2024, represents the first multinational framework regulating Artificial Intelligence (AI) development…

  • Mar072025

    Mapping the Enemy, Mobilising the Future: Surveillance and Recruitment Strategies of Lakurawa Terror Group in Nigeria

    Introduction In November 2024, Nigerian authorities officially declared the Lakurawa group a terrorist organisation and banned it across the country.…

  • Mar052025

    Hate, Harms and Hashing: An Overview of OFCOM Guidance for P/CVE

    Introduction On the 16th of December 2024, the government-backed UK media regulation body, OFCOM, published the Illegal Harms Codes, a…

  • Mar032025

    “Watching foids seethe is actual lifefuel”: Celebratory Male Supremacism in the Aftermath of the 2024 US Presidential Election

    Content warning: This Insight contains misogynistic, racist and transphobic slurs and mentions of suicide.   Introduction Six weeks ago, Donald Trump…

  • Feb282025

    Decoding Saboteurism: An Explanation of Infrastructure Attacks by Far-Right Extremists

    Introduction In recent years, far‐right extremist tactics have taken a turn toward targeting critical infrastructure — a renewed trend rooted…

  • Feb262025

    Policing Extremism on Gaming-Adjacent Platforms: Awful but Lawful?

    Introduction The study of the intersection between gaming and extremism has focused largely on a few key areas: the presence…

  • Feb252025

    AI or Aryan Ideals? Part Two: A Thematic Content Analysis of White Supremacist Engagement with Generative AI: Discourse 

    Introduction This Insight is the second in a two-part series investigating the ways white supremacists engage with generative artificial intelligence…

  • Feb242025

    Harnessing AI for Online P/CVE Efforts: Tools, Challenges, and Ethical Considerations

    Introduction Artificial intelligence (AI) has become integrated in every field—from infrastructure to medicine to law enforcement and education—and is also…

  • Feb202025

    The New Orleans Attack: Vulnerabilities of Peer-to-Peer Rental Services

    Introduction On 1 January 2025, two acts of violent extremism shook the United States. In New Orleans, a 42-year-old Army…

  • Feb192025

    Combating Islamic State Finance: Central Asia and Around the World

    According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…

  • Feb182025

    Combating Islamic State Finance: West Africa and the Sahel 

    According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…

  • Feb172025

    Combating the Islamic State Finance: Somalia and the Pan-African Nexus

    According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…

  • Feb102025

    Sonic Hate: Examining Brazil’s NSBM Scene and Its Global Networks

    Introduction This Insight will discuss the Brazilian National Socialist Black Metal (NSBM) scene and its role in propagating extremist ideologies,…

  • Feb062025

    3D2A: The Second Amendment, 3D Printed Guns and Memed Accelerationism

    Introduction In the ever-evolving landscape of global security, guns and small munitions are the lifeblood of political resistance. In the…

  • Jan302025

    The New Orleans Attack: The Technology Behind IS-Inspired Plots

    Introduction  The use of technology by terrorists and violent extremists is a perennially trendy issue in counterterrorism (CT) research—and for…

  • Jan292025

    Scouting Uneven Terrain: Challenges for Prevention and Counter-Extremism Practitioners in Digital Gaming Spaces

    Linda Schlegel and Judith Jaskowski are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…

  • Jan282025

    AI Tools and the Alt-Right: A Double-Edged Sword for P/CVE

    Introduction The emergence of artificial intelligence (AI) tools represents a great resource to support prevent/counter-violent extremism (P/CVE) practitioners in their…

  • Jan272025

    Droning On: The Response to Use of Drones by Domestic Violent Extremists

    Introduction On 4 November 2024, federal agents arrested 24-year-old white supremacist Skyler Philippi for plotting to destroy an electric power…

  • Jan232025

    Leveraging AI-Driven Tools for Capacity Building in Crisis Response: Enhancing Moderation and Crisis Management on Smaller Digital Platforms in Africa

    Introduction In recent years, smaller digital platforms across Africa have emerged as vital spaces for social engagement, entrepreneurship, and information…

  • Jan222025

    E-Commerce and Extremism: Dropshipping and the Continued Sale of White Supremacist Merchandise on Amazon

    Introduction Large online retailers have long faced criticism for their failure to proactively remove extremist content from their platforms, from…

  • Jan162025

    From Soundtracks to Side Quests: How Terrorist and Extremist Games Use Mainstream Platforms to Evade Detection and Draw Users

    Emily Thompson and Galen Lamphere-Englund are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…

  • Jan132025

    AI or Aryan Ideals? A Thematic Content Analysis of White Supremacist Engagement with Generative AI

    Introduction  From the creation of Stormfront in 1996 to the adoption of the messaging application Telegram, extreme-right actors, most notably…

  • Jan092025

    “Ladies and gentlemen, we’re all domestic terrorists”: Incels on the Bondi Attack

    Introduction This Insight examines responses to the Bondi stabbing attack of 2024 on incel forums, contributing to the current discussion…

  • Jan082025

    Beyond the FGC-9: How the Urutau Redefines the Global 3D-Printed Firearm Movement

    The following is a Special Extended Insight  1.Introduction On Wednesday, 21 August 2024, the build plans for a highly anticipated…

  • Dec202024

    The Drones of Hayat Tahrir al-Sham: The Development and Use of UAS in Syria

    The lightning offensive which toppled the Assad regime and captured Damascus in less than two weeks has shocked observers both…

  • Dec192024

    Anime and the Extreme-Right: Otaku Culture and Aesthetics in Extremist Digital Propaganda

    Introduction If the political tumult of the 2016 and 2020 US presidential elections revealed anything, it’s that digital media and…

  • Dec182024

    Dark Signals: The Growing Threat of Satellite Internet in Extremist Networks

    Introduction Many people are aware of the importance of satellite internet access, but few know of its growing importance in…

  • Dec172024

    Improving the Quality of Violent Extremism Research: Why CVE Researchers Should Play More Games

    Elizabeth D. Kilmer and Rachel Kowert are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…

  • Dec162024

    Telegram Homeschooling: Maintaining A Salafi-Jihadist Oriented Echo Chamber

    Introduction Journalists have documented instances where parents used homeschooling as an opportunity to create extremist-informed curricula in the United States…

  • Dec132024

    The Targeting of Ethnic Tajiks by Online Extremists: A Global Problem

    Introduction Extremist groups increasingly target ethnic Tajiks for recruitment through sophisticated online propaganda campaigns, resulting in some of the world’s…

  • Dec122024

    Soliciting Terror: ISKP Digital Communications and Financing Tactics Through Voice of Khurasan

    Introduction It is well known that the Islamic State and its branches effectively use internet-based strategies to disseminate their propaganda and…

  • Dec112024

    Melodies of Malice: Understanding How AI Fuels the Creation and Spread of Extremist Music

    Introduction  Research on extremism and counter-terrorism has long underscored the role of music in reinforcing far-right extremist ideologies and serving…

  • Dec092024

    Digital Warfare in Kashmir: Evolving Tactics of Insurgency in the Region

    Introduction In the Indian region of Kashmir, the battlefield has shifted. No longer confined to guns and grenades, insurgent groups…

  • Dec042024

    Brotherhood of Blood: Understanding the Origins and Trajectory of the Maniac Murder Cult

    Introduction As heavy metal music begins to play on a video, a black and white face appears on the screen,…

  • Dec022024

    “Degenerate” Queers and “Chadsexual” Sapphics: Anti-LGBTQ+ Rhetoric in the Incelosphere

    Content warning: This insight contains references to homophobic and transphobic slurs and violence against women.   Introduction At present, our understandings…

  • Nov282024

    CaliphateTok: How Islamic State (IS) Leverages Social Media in Indonesia and the Power of Counter-Narratives

    Introduction On 31 July 2024, Indonesia’s Counterterrorism Special Detachment 88 (Densus 88) arrested a suspect in East Java accused of…

Load More