- Mar242025
Cryptocurrency and Extremism: How Social Network Analysis is Used to Track Extremist Cryptocurrency Donations
Introduction Among the digital tools emerging in today’s decentralised financial framework, cryptocurrency has been especially attractive for extremist fundraising by…
Clara Jammot - Mar202025
Building Tech Capacity: Cross-Cultural, Gender-Responsive Solutions to Prevent Extremism in Gaming
Introduction When discussing social harms in online gaming spaces, the term “toxicity” frequently takes centre stage. It is often used…
Rachel Kowert - Mar182025
Digital Pathways to Violence: the Tech Ecosystem Behind the Antioch Shooting
Introduction: Technology, Radicalisation, and Security Failures On 22 January 2025, a 17-year-old student carried out a shooting at Antioch High…
Ricardo Cabral Penteado - Mar142025
Sadaqah Jariyah: The Thriving Cryptocurrency Fundraising Efforts Behind ISKP’s Official Media
Methodology The authors monitored the official and unofficial channels, as well as internal discussions of ISKP media operatives and supporters,…
Mona Thakkar - Mar132025
Free the Captives: Islamic State Central Asian Fundraising Networks in Support of IS Families in Syria and Iraq
Methodology The authors monitored the financial and propaganda activities of IS women and ISKP propagandists on Telegram, and Instagram between…
Mona Thakkar - Mar122025
The Rise of Hayat Tahrir al-Sham in Syria: From Wartime Propaganda to Diplomatic Rhetoric
Introduction Less than two weeks were enough for the Hayat Tahrir al-Sham (HTS)-led ‘Operations Room’ to overthrow the tyrannical and…
Brune Descamps - Mar102025
The EU’s AI Act: Implications on Justice and Counter-Terrorism
Introduction The European Union’s AI Act, adopted in June 2024, represents the first multinational framework regulating Artificial Intelligence (AI) development…
Jade Briend - Mar072025
Mapping the Enemy, Mobilising the Future: Surveillance and Recruitment Strategies of Lakurawa Terror Group in Nigeria
Introduction In November 2024, Nigerian authorities officially declared the Lakurawa group a terrorist organisation and banned it across the country.…
John Sunday Ojo - Mar052025
Hate, Harms and Hashing: An Overview of OFCOM Guidance for P/CVE
Introduction On the 16th of December 2024, the government-backed UK media regulation body, OFCOM, published the Illegal Harms Codes, a…
Erin Stoner - Mar032025
“Watching foids seethe is actual lifefuel”: Celebratory Male Supremacism in the Aftermath of the 2024 US Presidential Election
Content warning: This Insight contains misogynistic, racist and transphobic slurs and mentions of suicide. Introduction Six weeks ago, Donald Trump…
Allysa Czerwinsky - Feb282025
Decoding Saboteurism: An Explanation of Infrastructure Attacks by Far-Right Extremists
Introduction In recent years, far‐right extremist tactics have taken a turn toward targeting critical infrastructure — a renewed trend rooted…
Adam Frolík - Feb262025
Policing Extremism on Gaming-Adjacent Platforms: Awful but Lawful?
Introduction The study of the intersection between gaming and extremism has focused largely on a few key areas: the presence…
Dr. William Allchorn - Feb252025
AI or Aryan Ideals? Part Two: A Thematic Content Analysis of White Supremacist Engagement with Generative AI: Discourse
Introduction This Insight is the second in a two-part series investigating the ways white supremacists engage with generative artificial intelligence…
Louis Dean - Feb242025
Harnessing AI for Online P/CVE Efforts: Tools, Challenges, and Ethical Considerations
Introduction Artificial intelligence (AI) has become integrated in every field—from infrastructure to medicine to law enforcement and education—and is also…
Clarisa Nelu - Feb202025
The New Orleans Attack: Vulnerabilities of Peer-to-Peer Rental Services
Introduction On 1 January 2025, two acts of violent extremism shook the United States. In New Orleans, a 42-year-old Army…
Marc-André Argentino - Feb192025
Combating Islamic State Finance: Central Asia and Around the World
According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…
Adam Rousselle - Feb182025
Combating Islamic State Finance: West Africa and the Sahel
According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…
Adam Rousselle - Feb172025
Combating the Islamic State Finance: Somalia and the Pan-African Nexus
According to the United Nations, the Islamic State’s most successful regional financial offices include al-Karrar, al-Furqan, and al-Siddiq. This series…
Adam Rousselle - Feb102025
Sonic Hate: Examining Brazil’s NSBM Scene and Its Global Networks
Introduction This Insight will discuss the Brazilian National Socialist Black Metal (NSBM) scene and its role in propagating extremist ideologies,…
Ricardo Cabral Penteado - Feb062025
3D2A: The Second Amendment, 3D Printed Guns and Memed Accelerationism
Introduction In the ever-evolving landscape of global security, guns and small munitions are the lifeblood of political resistance. In the…
Anonymous Author - Jan302025
The New Orleans Attack: The Technology Behind IS-Inspired Plots
Introduction The use of technology by terrorists and violent extremists is a perennially trendy issue in counterterrorism (CT) research—and for…
Clara Broekaert - Jan292025
Scouting Uneven Terrain: Challenges for Prevention and Counter-Extremism Practitioners in Digital Gaming Spaces
Linda Schlegel and Judith Jaskowski are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…
Linda Schlegel - Jan282025
AI Tools and the Alt-Right: A Double-Edged Sword for P/CVE
Introduction The emergence of artificial intelligence (AI) tools represents a great resource to support prevent/counter-violent extremism (P/CVE) practitioners in their…
Aurora Agnolon - Jan272025
Droning On: The Response to Use of Drones by Domestic Violent Extremists
Introduction On 4 November 2024, federal agents arrested 24-year-old white supremacist Skyler Philippi for plotting to destroy an electric power…
Jonathan Lewis - Jan232025
Leveraging AI-Driven Tools: Enhancing Moderation and Crisis Management on Smaller Digital Platforms in Africa
Introduction In recent years, smaller digital platforms across Africa have emerged as vital spaces for social engagement, entrepreneurship, and information…
Abraham Ename Minko - Jan222025
E-Commerce and Extremism: Dropshipping and the Continued Sale of White Supremacist Merchandise on Amazon
Introduction Large online retailers have long faced criticism for their failure to proactively remove extremist content from their platforms, from…
Joseph Stabile - Jan162025
From Soundtracks to Side Quests: How Terrorist and Extremist Games Use Mainstream Platforms to Evade Detection and Draw Users
Emily Thompson and Galen Lamphere-Englund are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…
Galen Englund - Jan132025
AI or Aryan Ideals? A Thematic Content Analysis of White Supremacist Engagement with Generative AI
Introduction From the creation of Stormfront in 1996 to the adoption of the messaging application Telegram, extreme-right actors, most notably…
Louis Dean - Jan092025
“Ladies and gentlemen, we’re all domestic terrorists”: Incels on the Bondi Attack
Introduction This Insight examines responses to the Bondi stabbing attack of 2024 on incel forums, contributing to the current discussion…
Dr. Gerard Gill - Jan082025
Beyond the FGC-9: How the Urutau Redefines the Global 3D-Printed Firearm Movement
The following is a Special Extended Insight 1.Introduction On Wednesday, 21 August 2024, the build plans for a highly anticipated…
Dr Yannick Veilleux-Lepage - Dec202024
The Drones of Hayat Tahrir al-Sham: The Development and Use of UAS in Syria
The lightning offensive which toppled the Assad regime and captured Damascus in less than two weeks has shocked observers both…
Broderick McDonald - Dec192024
Anime and the Extreme-Right: Otaku Culture and Aesthetics in Extremist Digital Propaganda
Introduction If the political tumult of the 2016 and 2020 US presidential elections revealed anything, it’s that digital media and…
Joshua Bowes - Dec182024
Dark Signals: The Growing Threat of Satellite Internet in Extremist Networks
Introduction Many people are aware of the importance of satellite internet access, but few know of its growing importance in…
Gaetano Sicolo - Dec172024
Improving the Quality of Violent Extremism Research: Why CVE Researchers Should Play More Games
Elizabeth D. Kilmer and Rachel Kowert are members of the Extremism and Gaming Research Network (EGRN). The EGRN works together to…
Elizabeth D. Kilmer - Dec162024
Telegram Homeschooling: Maintaining A Salafi-Jihadist Oriented Echo Chamber
Introduction Journalists have documented instances where parents used homeschooling as an opportunity to create extremist-informed curricula in the United States…
Meili Criezis - Dec132024
The Targeting of Ethnic Tajiks by Online Extremists: A Global Problem
Introduction Extremist groups increasingly target ethnic Tajiks for recruitment through sophisticated online propaganda campaigns, resulting in some of the world’s…
Adam Rousselle