Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Insights

Insights

  • Mar242025

    Cryptocurrency and Extremism: How Social Network Analysis is Used to Track Extremist Cryptocurrency Donations

    Introduction Among the digital tools emerging in today’s decentralised financial framework, cryptocurrency has been especially attractive for extremist fundraising by…

  • Mar202025

    Building Tech Capacity: Cross-Cultural, Gender-Responsive Solutions to Prevent Extremism in Gaming

    Introduction  When discussing social harms in online gaming spaces, the term “toxicity” frequently takes centre stage. It is often used…

  • Mar182025

    Digital Pathways to Violence: the Tech Ecosystem Behind the Antioch Shooting

    Introduction: Technology, Radicalisation, and Security Failures On 22 January 2025, a 17-year-old student carried out a shooting at Antioch High…

  • Mar142025

    Sadaqah Jariyah: The Thriving Cryptocurrency Fundraising Efforts Behind ISKP’s Official Media

    Methodology The authors monitored the official and unofficial channels, as well as internal discussions of ISKP media operatives and supporters,…

  • Mar132025

    Free the Captives: Islamic State Central Asian Fundraising Networks in Support of IS Families in Syria and Iraq

    Methodology The authors monitored the financial and propaganda activities of IS women and ISKP propagandists on Telegram, and Instagram between…

  • Mar122025

    The Rise of Hayat Tahrir al-Sham in Syria: From Wartime Propaganda to Diplomatic Rhetoric

    Introduction Less than two weeks were enough for the Hayat Tahrir al-Sham (HTS)-led ‘Operations Room’ to overthrow the tyrannical and…

  • Mar102025

    The EU’s AI Act: Implications on Justice and Counter-Terrorism 

    Introduction The European Union’s AI Act, adopted in June 2024, represents the first multinational framework regulating Artificial Intelligence (AI) development…

  • Mar072025

    Mapping the Enemy, Mobilising the Future: Surveillance and Recruitment Strategies of Lakurawa Terror Group in Nigeria

    Introduction In November 2024, Nigerian authorities officially declared the Lakurawa group a terrorist organisation and banned it across the country.…

  • Mar052025

    Hate, Harms and Hashing: An Overview of OFCOM Guidance for P/CVE

    Introduction On the 16th of December 2024, the government-backed UK media regulation body, OFCOM, published the Illegal Harms Codes, a…

  • Mar032025

    “Watching foids seethe is actual lifefuel”: Celebratory Male Supremacism in the Aftermath of the 2024 US Presidential Election

    Content warning: This Insight contains misogynistic, racist and transphobic slurs and mentions of suicide.   Introduction Six weeks ago, Donald Trump…

  • Feb282025

    Decoding Saboteurism: An Explanation of Infrastructure Attacks by Far-Right Extremists

    Introduction In recent years, far‐right extremist tactics have taken a turn toward targeting critical infrastructure — a renewed trend rooted…

  • Feb262025

    Policing Extremism on Gaming-Adjacent Platforms: Awful but Lawful?

    Introduction The study of the intersection between gaming and extremism has focused largely on a few key areas: the presence…

  • Feb252025

    AI or Aryan Ideals? Part Two: A Thematic Content Analysis of White Supremacist Engagement with Generative AI: Discourse 

    Introduction This Insight is the second in a two-part series investigating the ways white supremacists engage with generative artificial intelligence…

  • Feb242025

    Harnessing AI for Online P/CVE Efforts: Tools, Challenges, and Ethical Considerations

    Introduction Artificial intelligence (AI) has become integrated in every field—from infrastructure to medicine to law enforcement and education—and is also…

  • Feb202025

    The New Orleans Attack: Vulnerabilities of Peer-to-Peer Rental Services

    Introduction On 1 January 2025, two acts of violent extremism shook the United States. In New Orleans, a 42-year-old Army…

  • Feb192025

    Combating Islamic State Finance: Central Asia and Around the World

    According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…

  • Feb182025

    Combating Islamic State Finance: West Africa and the Sahel 

    According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…

  • Feb172025

    Combating the Islamic State Finance: Somalia and the Pan-African Nexus

    According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…

  • Feb102025

    Sonic Hate: Examining Brazil’s NSBM Scene and Its Global Networks

    Introduction This Insight will discuss the Brazilian National Socialist Black Metal (NSBM) scene and its role in propagating extremist ideologies,…

  • Feb062025

    3D2A: The Second Amendment, 3D Printed Guns and Memed Accelerationism

    Introduction In the ever-evolving landscape of global security, guns and small munitions are the lifeblood of political resistance. In the…

  • Jan302025

    The New Orleans Attack: The Technology Behind IS-Inspired Plots

    Introduction  The use of technology by terrorists and violent extremists is a perennially trendy issue in counterterrorism (CT) research—and for…

  • Jan292025

    Scouting Uneven Terrain: Challenges for Prevention and Counter-Extremism Practitioners in Digital Gaming Spaces

    Linda Schlegel and Judith Jaskowski are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…

  • Jan282025

    AI Tools and the Alt-Right: A Double-Edged Sword for P/CVE

    Introduction The emergence of artificial intelligence (AI) tools represents a great resource to support prevent/counter-violent extremism (P/CVE) practitioners in their…

  • Jan272025

    Droning On: The Response to Use of Drones by Domestic Violent Extremists

    Introduction On 4 November 2024, federal agents arrested 24-year-old white supremacist Skyler Philippi for plotting to destroy an electric power…

  • Jan232025

    Leveraging AI-Driven Tools: Enhancing Moderation and Crisis Management on Smaller Digital Platforms in Africa

    Introduction In recent years, smaller digital platforms across Africa have emerged as vital spaces for social engagement, entrepreneurship, and information…

  • Jan222025

    E-Commerce and Extremism: Dropshipping and the Continued Sale of White Supremacist Merchandise on Amazon

    Introduction Large online retailers have long faced criticism for their failure to proactively remove extremist content from their platforms, from…

  • Jan162025

    From Soundtracks to Side Quests: How Terrorist and Extremist Games Use Mainstream Platforms to Evade Detection and Draw Users

    Emily Thompson and Galen Lamphere-Englund are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…

  • Jan132025

    AI or Aryan Ideals? A Thematic Content Analysis of White Supremacist Engagement with Generative AI

    Introduction  From the creation of Stormfront in 1996 to the adoption of the messaging application Telegram, extreme-right actors, most notably…

  • Jan092025

    “Ladies and gentlemen, we’re all domestic terrorists”: Incels on the Bondi Attack

    Introduction This Insight examines responses to the Bondi stabbing attack of 2024 on incel forums, contributing to the current discussion…

  • Jan082025

    Beyond the FGC-9: How the Urutau Redefines the Global 3D-Printed Firearm Movement

    The following is a Special Extended Insight  1.Introduction On Wednesday, 21 August 2024, the build plans for a highly anticipated…

  • Dec202024

    The Drones of Hayat Tahrir al-Sham: The Development and Use of UAS in Syria

    The lightning offensive which toppled the Assad regime and captured Damascus in less than two weeks has shocked observers both…

  • Dec192024

    Anime and the Extreme-Right: Otaku Culture and Aesthetics in Extremist Digital Propaganda

    Introduction If the political tumult of the 2016 and 2020 US presidential elections revealed anything, it’s that digital media and…

  • Dec182024

    Dark Signals: The Growing Threat of Satellite Internet in Extremist Networks

    Introduction Many people are aware of the importance of satellite internet access, but few know of its growing importance in…

  • Dec172024

    Improving the Quality of Violent Extremism Research: Why CVE Researchers Should Play More Games

    Elizabeth D. Kilmer and Rachel Kowert are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…

  • Dec162024

    Telegram Homeschooling: Maintaining A Salafi-Jihadist Oriented Echo Chamber

    Introduction Journalists have documented instances where parents used homeschooling as an opportunity to create extremist-informed curricula in the United States…

  • Dec132024

    The Targeting of Ethnic Tajiks by Online Extremists: A Global Problem

    Introduction Extremist groups increasingly target ethnic Tajiks for recruitment through sophisticated online propaganda campaigns, resulting in some of the world’s…

Load More