- Aug312021
One -Stop -Shop for Recruitment and Dating: Extremists’ Exploitation of Dating Platforms
Dating apps have become an essential part of life, especially during the COVID-19 pandemic, as individuals have limited face-to-face interactions.…
Kesa White - Aug252021
The Role of Online Communities in Supporting 3D-Printed Firearms
On 9 October 2019, Stephen Balliet, a 27-year-old German neo-Nazi, shot to death two people and injured another two near…
Nicolò Miotto - Aug242021
Connecting the Fringes: Neo-Nazi Glorification of Salafi-Jihadi Representations Online
On 1 April 2021, the French security service of the Direction Générale de la Sécurité Intérieure (DGSI) received an urgent…
Julien Bellaiche - Aug232021
The Global Jihadist Movement and Cyberterrorism
The events of 11 September 2001 placed jihadi-inspired extremism at the forefront of counterterrorism policy. Legislation such as the USA…
Noah Turner - Aug202021
Memes in Far-Right Digital Visual Culture
Internet memes are an important means of visual communication for the far-right. As American white supremacist Richard Spencer bragged to…
Jordan McSwiney - Aug172021
The Great Subcultural Convergence: How Illiberalism is Whipping Up a Storm
What are the extremist threats being incubated thanks to the technological advantages of the Internet? We could easily answer this…
Dr. Chamila Liyanage - Aug162021
From ‘Night Letters’ to the Internet: Propaganda, the Taliban and the Afghanistan Crisis
The fast-unfolding crisis in Afghanistan, spearheaded by the Taliban’s territorial juggernaut and the fall of Kabul, also became a significant…
Kabir Taneja - Aug132021
Insurrection Snapshot: Emerging Narrative Themes Following the January 6 Storming of the US Capitol
Although individuals on the far right, fascists, and white supremacists had a prior presence on Telegram, the aftermath of the…
Meili Criezis - Aug112021
The ‘4M Way’ to Promoting Alternative Narratives to Violent Islamist Extremism in Muslim Mindanao
Following the collapse of the so-called caliphate in March 2019, Islamic State (IS) has “repositioned its propaganda narrative to one…
Dr. Kumar Ramakrishna - Aug092021
Digital Misogynoir and White Supremacy: What Black Feminist Theory Can Teach Us About Far Right Extremism
What is Misogynoir? Far-right studies has been historically overrepresented by white scholars and those who don’t acquaint themselves with Black…
Alexandria Onuoha - Aug062021
White Nationalists are Driving the CRT Conversation Online
Critical race theory (CRT) has become an important topic of discussion, but parent activists and governments are not the only…
Kesa White - Aug042021
Current Priorities in Counterterrorism and Prevention: Results of the CENS Online Expert Survey
The Centre of Excellence for National Security (CENS) in Singapore designed a survey to assess the pandemic’s impact on violent…
Cameron Sumpter - Aug022021
How Will Violent Extremists Use Technology in the Future?
In thinking through how terrorists and violent extremists will continue to evolve in the future, one of the most pressing…
Marigny Jane Kirschke-Schwartz - Jul302021
Safety vs Security: An Asymmetrical Opportunity for RWE in Australia
In 1922 German political theorist Carl Schmitt wrote a seminal essay arguing that sovereignty is defined by the power to…
Dr. Teagan Westendorf - Jul292021
The Race War May No Longer Be Digitised: James Mason’s Designation as a Terrorist Entity in Canada
Almost two decades into the War on Terror era, hundreds of designated terrorist entities operate globally. Far from posing a…
Dr. Bethan Johnson - Jul282021
QAnon is not Dead: New Research into Telegram Shows the Movement is Alive and Well
Following the role that QAnon adherents, and other actors, played in the insurrection on 6 January 2021, large social media…
Jordan Wildon - Jul262021
When Counter-Speech Backfires: The Pitfalls of Strategic Online Interaction
For a long time, hatred and incitement on social media have been treated as a relatively apolitical and purely virtual…
Maik Fielitz - Jul212021
Schrems II and the Future of 3rd Party Security Service Access to Data From the UK
Happy Birthday Schrems II, but hold back the cake. As the EU’s judgment in Data Protection Commissioner v Facebook Ireland…
Dr. Victoria McCloud - Jul192021
Technology and Terrorist Financing
Terrorists are increasingly exploiting technology to finance their activities. However, terrorist adoption of technology is an evolution, not a revolution. As the…
Jessica Davis - Jul142021
Right-Wing Extremism Has Deep Roots in Southeast Asia
The far right or right-wing extremism as an ideologically motivated violent extremism (IMVE) is the least understood security threat in…
Munira Mustaffa - Jul122021
Competing, Connecting, Having Fun: How Gamification Could Make Extremist Content More Appealing
Do extremists like to play? A few years ago, this question may have sounded ridiculous. But since the livestreamed attack…
Linda Schlegel - Jul082021
Current and Emerging Threats by Violent Extremists: Results of the Online CENS Expert Survey
The Centre of Excellence for National Security (CENS) designed an online expert survey, primarily to assess the pandemic’s impact on…
Joseph Franco - Jul022021
‘Hard Platforms’ vs ‘Friendly Platforms’: Understanding Jihadist Activism on the Internet
Our understanding of how the Internet has fostered terrorist activism is conditioned by an important bias that affects the robustness…
Manuel Ricardo Torres-Soriano - Jun302021
The Jihadist of Rambouillet’s Facebook Account
On 23 April 2021, Tunisia-born Jamel Gorchene murdered civil servant Stéphanie Monfermé at the police station in Rambouillet, 45 kilometers…
Brune Descamps - Jun282021
A Survey of Violent Extremist and Terrorist Activities Across the Gaming Environment
The relationship between video games and large-scale violence has been questioned since the 1999 shooting at Columbine High School. In…
Aaron Tielemans - Jun242021
Terrorism and New Technology
Terrorism is an indirect strategy from an operational perspective. It is a rational means of action for the weaker party…
Rachid El Houdaigui - Jun222021
Extremism Unmasked
Early analysis in 2020 raised two points, the COVID-19 health restrictions would likely have an impact on offline recruitment from…
Marc-André Argentino - Jun222021
Creating a New Space for French Revolutionary Nationalists on the Internet
On the 20 and 27 June 2021, the National Front (FN), the biggest French far-right movement, has a chance to…
Damien Saverot - Jun212021
Far-Right in the Global South: Adapting and Applying Tech Policies Locally
In the run-up to the 2020 US presidential election, Facebook prepared for the potential spreading of disinformation and election-related violence…
Dr. Eviane Leidig - Jun172021
Affirmations of Support and Rituals of Jihadi Martyrdoms
When a big named jihadi leader dies, there is usually a cacophony of statements released eulogising the individual that was…
Aaron Zelin - Jun162021
Stopping Terrorist Violence, One Cellphone Shutdown at a Time
In 2008, terrorists were involved in carrying out deadly attacks in Mumbai which killed 172 people and were spread across…
Fatima Mustafa - Jun142021
The Darker Side of Social: QAnon Instagram Comments Before the Capitol Riots
In the days and weeks following the US Capitol riots of 6 January 2021, journalists acknowledged the preparations made by…
Sara Aniano - Jun142021
QAnon and the Great Awakening: How the Deep Web Rewrites Ideologies and Beliefs
Web 2.0 technologies paved the way for the interactive web, opening a virtual topography easily accessible to countless people worldwide.…
Dr. Chamila Liyanage - Jun112021
Crime, Cryptocurrency, and El Salvador’s Big Bet on Bitcoin
This week, El Salvador made headlines as the first country to adopt bitcoin as a form of legal tender. Although…
Dr. Alexis Henshaw - Jun102021
Gab’s Gift to the Far-Right
As major social-networking platforms such as Facebook and Twitter have increased their efforts at moderation to crack down on hateful…
Jordan McSwiney - Jun092021
A Proprietary Solution to GIFCT’s Consolidated List Problem
In 2017, Facebook, YouTube, Twitter, and Microsoft formed the Global Internet Forum to Counter Terrorism (“GIFCT”) “to formalize the existing…
Brett Raffish