Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Insights

Insights

  • Aug312021

    One -Stop -Shop for Recruitment and Dating: Extremists’ Exploitation of Dating Platforms

    Dating apps have become an essential part of life, especially during the COVID-19 pandemic, as individuals have limited face-to-face interactions.…

  • Aug252021

    The Role of Online Communities in Supporting 3D-Printed Firearms

    On 9 October 2019, Stephen Balliet, a 27-year-old German neo-Nazi, shot to death two people and injured another two near…

  • Aug242021

    Connecting the Fringes: Neo-Nazi Glorification of Salafi-Jihadi Representations Online

    On 1 April 2021, the French security service of the Direction Générale de la Sécurité Intérieure (DGSI) received an urgent…

  • Aug232021

    The Global Jihadist Movement and Cyberterrorism

    The events of 11 September 2001 placed jihadi-inspired extremism at the forefront of counterterrorism policy. Legislation such as the USA…

  • Aug202021

    Memes in Far-Right Digital Visual Culture

    Internet memes are an important means of visual communication for the far-right. As American white supremacist Richard Spencer bragged to…

  • Aug172021

    The Great Subcultural Convergence: How Illiberalism is Whipping Up a Storm

    What are the extremist threats being incubated thanks to the technological advantages of the Internet? We could easily answer this…

  • Aug162021

    From ‘Night Letters’ to the Internet: Propaganda, the Taliban and the Afghanistan Crisis

    The fast-unfolding crisis in Afghanistan, spearheaded by the Taliban’s territorial juggernaut and the fall of Kabul, also became a significant…

  • Aug132021

    Insurrection Snapshot: Emerging Narrative Themes Following the January 6 Storming of the US Capitol

    Although individuals on the far right, fascists, and white supremacists had a prior presence on Telegram, the aftermath of the…

  • Aug112021

    The ‘4M Way’ to Promoting Alternative Narratives to Violent Islamist Extremism in Muslim Mindanao

    Following the collapse of the so-called caliphate in March 2019, Islamic State (IS) has “repositioned its propaganda narrative to one…

  • Aug092021

    Digital Misogynoir and White Supremacy: What Black Feminist Theory Can Teach Us About Far Right Extremism

    What is Misogynoir? Far-right studies has been historically overrepresented by white scholars and those who don’t acquaint themselves with Black…

  • Aug062021

    White Nationalists are Driving the CRT Conversation Online

    Critical race theory (CRT) has become an important topic of discussion, but parent activists and governments are not the only…

  • Aug042021

    Current Priorities in Counterterrorism and Prevention: Results of the CENS Online Expert Survey

    The Centre of Excellence for National Security (CENS) in Singapore designed a survey to assess the pandemic’s impact on violent…

  • Aug022021

    How Will Violent Extremists Use Technology in the Future?

    In thinking through how terrorists and violent extremists will continue to evolve in the future, one of the most pressing…

  • Jul302021

    Safety vs Security: An Asymmetrical Opportunity for RWE in Australia

    In 1922 German political theorist Carl Schmitt wrote a seminal essay arguing that sovereignty is defined by the power to…

  • Jul292021

    The Race War May No Longer Be Digitised: James Mason’s Designation as a Terrorist Entity in Canada

    Almost two decades into the War on Terror era, hundreds of designated terrorist entities operate globally. Far from posing a…

  • Jul282021

    QAnon is not Dead: New Research into Telegram Shows the Movement is Alive and Well

    Following the role that QAnon adherents, and other actors, played in the insurrection on 6 January 2021, large social media…

  • Jul262021

    When Counter-Speech Backfires: The Pitfalls of Strategic Online Interaction

    For a long time, hatred and incitement on social media have been treated as a relatively apolitical and purely virtual…

  • Jul212021

    Schrems II and the Future of 3rd Party Security Service Access to Data From the UK

    Happy Birthday Schrems II, but hold back the cake. As the EU’s judgment in Data Protection Commissioner v Facebook Ireland…

  • Jul192021

    Technology and Terrorist Financing

    Terrorists are increasingly exploiting technology to finance their activities. However, terrorist adoption of technology is an evolution, not a revolution. As the…

  • Jul142021

    Right-Wing Extremism Has Deep Roots in Southeast Asia

    The far right or right-wing extremism as an ideologically motivated violent extremism (IMVE) is the least understood security threat in…

  • Jul122021

    Competing, Connecting, Having Fun: How Gamification Could Make Extremist Content More Appealing

    Do extremists like to play? A few years ago, this question may have sounded ridiculous. But since the livestreamed attack…

  • Jul082021

    Current and Emerging Threats by Violent Extremists: Results of the Online CENS Expert Survey

    The Centre of Excellence for National Security (CENS) designed an online expert survey, primarily to assess the pandemic’s impact on…

  • Jul022021

    ‘Hard Platforms’ vs ‘Friendly Platforms’: Understanding Jihadist Activism on the Internet

    Our understanding of how the Internet has fostered terrorist activism is conditioned by an important bias that affects the robustness…

  • Jun302021

    The Jihadist of Rambouillet’s Facebook Account

    On 23 April 2021, Tunisia-born Jamel Gorchene murdered civil servant Stéphanie Monfermé at the police station in Rambouillet, 45 kilometers…

  • Jun282021

    A Survey of Violent Extremist and Terrorist Activities Across the Gaming Environment

    The relationship between video games and large-scale violence has been questioned since the 1999 shooting at Columbine High School. In…

  • Jun242021

    Terrorism and New Technology

    Terrorism is an indirect strategy from an operational perspective. It is a rational means of action for the weaker party…

  • Jun222021

    Extremism Unmasked

    Early analysis in 2020 raised two points, the COVID-19 health restrictions would likely have an impact on offline recruitment from…

  • Jun222021

    Creating a New Space for French Revolutionary Nationalists on the Internet

    On the 20 and 27 June 2021, the National Front (FN), the biggest French far-right movement, has a chance to…

  • Jun212021

    Far-Right in the Global South: Adapting and Applying Tech Policies Locally

    In the run-up to the 2020 US presidential election, Facebook prepared for the potential spreading of disinformation and election-related violence…

  • Jun172021

    Affirmations of Support and Rituals of Jihadi Martyrdoms

    When a big named jihadi leader dies, there is usually a cacophony of statements released eulogising the individual that was…

  • Jun162021

    Stopping Terrorist Violence, One Cellphone Shutdown at a Time

    In 2008, terrorists were involved in carrying out deadly attacks in Mumbai which killed 172 people and were spread across…

  • Jun142021

    The Darker Side of Social: QAnon Instagram Comments Before the Capitol Riots

    In the days and weeks following the US Capitol riots of 6 January 2021, journalists acknowledged the preparations made by…

  • Jun142021

    QAnon and the Great Awakening: How the Deep Web Rewrites Ideologies and Beliefs

    Web 2.0 technologies paved the way for the interactive web, opening a virtual topography easily accessible to countless people worldwide.…

  • Jun112021

    Crime, Cryptocurrency, and El Salvador’s Big Bet on Bitcoin

    This week, El Salvador made headlines as the first country to adopt bitcoin as a form of legal tender. Although…

  • Jun102021

    Gab’s Gift to the Far-Right

    As major social-networking platforms such as Facebook and Twitter have increased their efforts at moderation to crack down on hateful…

  • Jun092021

    A Proprietary Solution to GIFCT’s Consolidated List Problem

    In 2017, Facebook, YouTube, Twitter, and Microsoft formed the Global Internet Forum to Counter Terrorism (“GIFCT”) “to formalize the existing…

Load More