Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Insights

Insights

  • Jul262021

    When Counter-Speech Backfires: The Pitfalls of Strategic Online Interaction

    For a long time, hatred and incitement on social media have been treated as a relatively apolitical and purely virtual…

  • Jul212021

    Schrems II and the Future of 3rd Party Security Service Access to Data From the UK

    Happy Birthday Schrems II, but hold back the cake. As the EU’s judgment in Data Protection Commissioner v Facebook Ireland…

  • Jul192021

    Technology and Terrorist Financing

    Terrorists are increasingly exploiting technology to finance their activities. However, terrorist adoption of technology is an evolution, not a revolution. As the…

  • Jul142021

    Right-Wing Extremism Has Deep Roots in Southeast Asia

    The far right or right-wing extremism as an ideologically motivated violent extremism (IMVE) is the least understood security threat in…

  • Jul122021

    Competing, Connecting, Having Fun: How Gamification Could Make Extremist Content More Appealing

    Do extremists like to play? A few years ago, this question may have sounded ridiculous. But since the livestreamed attack…

  • Jul082021

    Current and Emerging Threats by Violent Extremists: Results of the Online CENS Expert Survey

    The Centre of Excellence for National Security (CENS) designed an online expert survey, primarily to assess the pandemic’s impact on…

  • Jul022021

    ‘Hard Platforms’ vs ‘Friendly Platforms’: Understanding Jihadist Activism on the Internet

    Our understanding of how the Internet has fostered terrorist activism is conditioned by an important bias that affects the robustness…

  • Jun302021

    The Jihadist of Rambouillet’s Facebook Account

    On 23 April 2021, Tunisia-born Jamel Gorchene murdered civil servant Stéphanie Monfermé at the police station in Rambouillet, 45 kilometers…

  • Jun282021

    A Survey of Violent Extremist and Terrorist Activities Across the Gaming Environment

    The relationship between video games and large-scale violence has been questioned since the 1999 shooting at Columbine High School. In…

  • Jun242021

    Terrorism and New Technology

    Terrorism is an indirect strategy from an operational perspective. It is a rational means of action for the weaker party…

  • Jun222021

    Extremism Unmasked

    Early analysis in 2020 raised two points, the COVID-19 health restrictions would likely have an impact on offline recruitment from…

  • Jun222021

    Creating a New Space for French Revolutionary Nationalists on the Internet

    On the 20 and 27 June 2021, the National Front (FN), the biggest French far-right movement, has a chance to…

  • Jun212021

    Far-Right in the Global South: Adapting and Applying Tech Policies Locally

    In the run-up to the 2020 US presidential election, Facebook prepared for the potential spreading of disinformation and election-related violence…

  • Jun172021

    Affirmations of Support and Rituals of Jihadi Martyrdoms

    When a big named jihadi leader dies, there is usually a cacophony of statements released eulogising the individual that was…

  • Jun162021

    Stopping Terrorist Violence, One Cellphone Shutdown at a Time

    In 2008, terrorists were involved in carrying out deadly attacks in Mumbai which killed 172 people and were spread across…

  • Jun142021

    The Darker Side of Social: QAnon Instagram Comments Before the Capitol Riots

    In the days and weeks following the US Capitol riots of 6 January 2021, journalists acknowledged the preparations made by…

  • Jun142021

    QAnon and the Great Awakening: How the Deep Web Rewrites Ideologies and Beliefs

    Web 2.0 technologies paved the way for the interactive web, opening a virtual topography easily accessible to countless people worldwide.…

  • Jun112021

    Crime, Cryptocurrency, and El Salvador’s Big Bet on Bitcoin

    This week, El Salvador made headlines as the first country to adopt bitcoin as a form of legal tender. Although…

  • Jun102021

    Gab’s Gift to the Far-Right

    As major social-networking platforms such as Facebook and Twitter have increased their efforts at moderation to crack down on hateful…

  • Jun092021

    A Proprietary Solution to GIFCT’s Consolidated List Problem

    In 2017, Facebook, YouTube, Twitter, and Microsoft formed the Global Internet Forum to Counter Terrorism (“GIFCT”) “to formalize the existing…

  • Jun072021

    The Role of Conspiratorial Narratives in the Violent Radicalisation of Right-Wing Lone Actors

    Conspiracy theories have been talked about a lot recently as a key ingredient in the radicalisation of right-wing lone actor…

  • Jun022021

    Tracking Violent Extremism Online and the Challenge of Open-Source Intelligence

    Understanding online behaviours of extremist groups requires observation, analysis and often dissemination. Academic researchers, government agencies, and civil society groups…

  • Jun012021

    Choosing Offline: Why India’s ‘Other’ Insurgencies Have not Gone Digital

    While majority of the debates in and around online extremism and radicalisation in India over the recent past have revolved…

  • May282021

    The Boogaloo Movement, Coded Communication and the Need for Context-Based Moderation

    From the political fringes to the front pages, the Boogaloo Boys were thrust into the national spotlight last year. But…

  • May252021

    Mapping the Turkestan Islamic Party’s Online Propaganda Networks

    The Turkestan Islamic Party (TIP) is considered the most prominent Salafi-jihadist terrorist organisation that originates from China. While it aims…

  • May242021

    Polarisation and the Pandemic: The Alternative für Deutschland’s Narration of COVID-19 on Twitter

    The impact of COVID-19 has been felt globally by societies in their entirety; from hospitalisations, deaths, the economic downturn and…

  • May202021

    Violent Extremism: The Ghost or the Machine?

    The Australian parliament’s Joint Committee on Intelligence and Security is currently holding an inquiry into extremist movements and radicalism in Australia. It…

  • May192021

    The Digital Transformations of Al-Qaeda and Islamic State in the Battle Against Online Propaganda

    In the face of repeated Europol-led crackdowns, and frequent flagging of content by the EU Internet Referral Unit (EU IRU),…

  • May172021

    Defining the Delta Between Hashed Terrorist Content and All Terrorist Content

    Terrorists and violent extremists (“VE”) have “exploit digital platforms” to share intelligence, recruit, and disseminate ideology. The Global Internet Forum…

  • May132021

    Examining Online Indicators of Extremism in Violent Right-Wing Extremist Forums

    Although many law enforcement and intelligence agencies are concerned about online communities known to facilitate violent right-wing extremism, little is…

  • May122021

    The Out-Group in the In-Group

    Extremists hate people who do not share their group identity. If scholars of terrorism and extremism can agree on little…

  • May102021

    Collaboration and Legislation: Confronting Online Violent Extremism from New Zealand

    It’s unclear exactly how many times the livestreamed video of the 2019 Christchurch attack was viewed or shared before the…

  • May072021

    Online Jihadist Chants: An Access Point for Incitement of Violence

    Anasheed or jihadi chants (Anasheed Jihadiya) are forms of creative expression that serve a number of purposes including enjoyment, celebration,…

  • May062021

    “I will never forget this for as long as I live”: Social Learning at the Capitol Hill Siege

    “Today was indeed a historical day for sure. I will never forget this for as long as I live… I’m…

  • May042021

    Predictive Technologies in Preventive Counterterrorism

    On 3 May 2017, an Australian Super Hornet airstrike in Iraq dropped a GPS-guided bomb on a house in West…

  • Apr292021

    QAnon Women in Politics Part Two: QAnon Careers

    Over the last year, the QAnon conspiracy has cemented itself as part of the furniture of the American political landscape,…

Load More