- Aug172021
The Great Subcultural Convergence: How Illiberalism is Whipping Up a Storm
What are the extremist threats being incubated thanks to the technological advantages of the Internet? We could easily answer this…
Dr. Chamila Liyanage - Aug162021
From ‘Night Letters’ to the Internet: Propaganda, the Taliban and the Afghanistan Crisis
The fast-unfolding crisis in Afghanistan, spearheaded by the Taliban’s territorial juggernaut and the fall of Kabul, also became a significant…
Kabir Taneja - Aug132021
Insurrection Snapshot: Emerging Narrative Themes Following the January 6 Storming of the US Capitol
Although individuals on the far right, fascists, and white supremacists had a prior presence on Telegram, the aftermath of the…
Meili Criezis - Aug112021
The ‘4M Way’ to Promoting Alternative Narratives to Violent Islamist Extremism in Muslim Mindanao
Following the collapse of the so-called caliphate in March 2019, Islamic State (IS) has “repositioned its propaganda narrative to one…
Dr. Kumar Ramakrishna - Aug092021
Digital Misogynoir and White Supremacy: What Black Feminist Theory Can Teach Us About Far Right Extremism
What is Misogynoir? Far-right studies has been historically overrepresented by white scholars and those who don’t acquaint themselves with Black…
Alexandria Onuoha - Aug062021
White Nationalists are Driving the CRT Conversation Online
Critical race theory (CRT) has become an important topic of discussion, but parent activists and governments are not the only…
Kesa White - Aug042021
Current Priorities in Counterterrorism and Prevention: Results of the CENS Online Expert Survey
The Centre of Excellence for National Security (CENS) in Singapore designed a survey to assess the pandemic’s impact on violent…
Cameron Sumpter - Aug022021
How Will Violent Extremists Use Technology in the Future?
In thinking through how terrorists and violent extremists will continue to evolve in the future, one of the most pressing…
Marigny Jane Kirschke-Schwartz - Jul302021
Safety vs Security: An Asymmetrical Opportunity for RWE in Australia
In 1922 German political theorist Carl Schmitt wrote a seminal essay arguing that sovereignty is defined by the power to…
Dr. Teagan Westendorf - Jul292021
The Race War May No Longer Be Digitised: James Mason’s Designation as a Terrorist Entity in Canada
Almost two decades into the War on Terror era, hundreds of designated terrorist entities operate globally. Far from posing a…
Dr. Bethan Johnson - Jul282021
QAnon is not Dead: New Research into Telegram Shows the Movement is Alive and Well
Following the role that QAnon adherents, and other actors, played in the insurrection on 6 January 2021, large social media…
Jordan Wildon - Jul262021
When Counter-Speech Backfires: The Pitfalls of Strategic Online Interaction
For a long time, hatred and incitement on social media have been treated as a relatively apolitical and purely virtual…
Maik Fielitz - Jul212021
Schrems II and the Future of 3rd Party Security Service Access to Data From the UK
Happy Birthday Schrems II, but hold back the cake. As the EU’s judgment in Data Protection Commissioner v Facebook Ireland…
Dr. Victoria McCloud - Jul192021
Technology and Terrorist Financing
Terrorists are increasingly exploiting technology to finance their activities. However, terrorist adoption of technology is an evolution, not a revolution. As the…
Jessica Davis - Jul142021
Right-Wing Extremism Has Deep Roots in Southeast Asia
The far right or right-wing extremism as an ideologically motivated violent extremism (IMVE) is the least understood security threat in…
Munira Mustaffa - Jul122021
Competing, Connecting, Having Fun: How Gamification Could Make Extremist Content More Appealing
Do extremists like to play? A few years ago, this question may have sounded ridiculous. But since the livestreamed attack…
Linda Schlegel - Jul082021
Current and Emerging Threats by Violent Extremists: Results of the Online CENS Expert Survey
The Centre of Excellence for National Security (CENS) designed an online expert survey, primarily to assess the pandemic’s impact on…
Joseph Franco - Jul022021
‘Hard Platforms’ vs ‘Friendly Platforms’: Understanding Jihadist Activism on the Internet
Our understanding of how the Internet has fostered terrorist activism is conditioned by an important bias that affects the robustness…
Manuel Ricardo Torres-Soriano - Jun302021
The Jihadist of Rambouillet’s Facebook Account
On 23 April 2021, Tunisia-born Jamel Gorchene murdered civil servant Stéphanie Monfermé at the police station in Rambouillet, 45 kilometers…
Brune Descamps - Jun282021
A Survey of Violent Extremist and Terrorist Activities Across the Gaming Environment
The relationship between video games and large-scale violence has been questioned since the 1999 shooting at Columbine High School. In…
Aaron Tielemans - Jun242021
Terrorism and New Technology
Terrorism is an indirect strategy from an operational perspective. It is a rational means of action for the weaker party…
Rachid El Houdaigui - Jun222021
Extremism Unmasked
Early analysis in 2020 raised two points, the COVID-19 health restrictions would likely have an impact on offline recruitment from…
Marc-André Argentino - Jun222021
Creating a New Space for French Revolutionary Nationalists on the Internet
On the 20 and 27 June 2021, the National Front (FN), the biggest French far-right movement, has a chance to…
Damien Saverot - Jun212021
Far-Right in the Global South: Adapting and Applying Tech Policies Locally
In the run-up to the 2020 US presidential election, Facebook prepared for the potential spreading of disinformation and election-related violence…
Dr. Eviane Leidig - Jun172021
Affirmations of Support and Rituals of Jihadi Martyrdoms
When a big named jihadi leader dies, there is usually a cacophony of statements released eulogising the individual that was…
Aaron Zelin - Jun162021
Stopping Terrorist Violence, One Cellphone Shutdown at a Time
In 2008, terrorists were involved in carrying out deadly attacks in Mumbai which killed 172 people and were spread across…
Fatima Mustafa - Jun142021
The Darker Side of Social: QAnon Instagram Comments Before the Capitol Riots
In the days and weeks following the US Capitol riots of 6 January 2021, journalists acknowledged the preparations made by…
Sara Aniano - Jun142021
QAnon and the Great Awakening: How the Deep Web Rewrites Ideologies and Beliefs
Web 2.0 technologies paved the way for the interactive web, opening a virtual topography easily accessible to countless people worldwide.…
Dr. Chamila Liyanage - Jun112021
Crime, Cryptocurrency, and El Salvador’s Big Bet on Bitcoin
This week, El Salvador made headlines as the first country to adopt bitcoin as a form of legal tender. Although…
Dr. Alexis Henshaw - Jun102021
Gab’s Gift to the Far-Right
As major social-networking platforms such as Facebook and Twitter have increased their efforts at moderation to crack down on hateful…
Jordan McSwiney - Jun092021
A Proprietary Solution to GIFCT’s Consolidated List Problem
In 2017, Facebook, YouTube, Twitter, and Microsoft formed the Global Internet Forum to Counter Terrorism (“GIFCT”) “to formalize the existing…
Brett Raffish - Jun072021
The Role of Conspiratorial Narratives in the Violent Radicalisation of Right-Wing Lone Actors
Conspiracy theories have been talked about a lot recently as a key ingredient in the radicalisation of right-wing lone actor…
Dr. William Allchorn - Jun022021
Tracking Violent Extremism Online and the Challenge of Open-Source Intelligence
Understanding online behaviours of extremist groups requires observation, analysis and often dissemination. Academic researchers, government agencies, and civil society groups…
Lyria Bennett Moses - Jun012021
Choosing Offline: Why India’s ‘Other’ Insurgencies Have not Gone Digital
While majority of the debates in and around online extremism and radicalisation in India over the recent past have revolved…
Kabir Taneja - May282021
The Boogaloo Movement, Coded Communication and the Need for Context-Based Moderation
From the political fringes to the front pages, the Boogaloo Boys were thrust into the national spotlight last year. But…
Storyful - May252021
Mapping the Turkestan Islamic Party’s Online Propaganda Networks
The Turkestan Islamic Party (TIP) is considered the most prominent Salafi-jihadist terrorist organisation that originates from China. While it aims…
Miron Lakomy