Click here to read our latest report: Behind the Skull Mask: An Overview of Militant Accelerationism

Posts tagged with ‘P/CVE’

  • Sep052022

    Can Serious Games Make a Difference in P/CVE?

    Video games and gamification have become key tools of extremist actors’ recruitment arsenal and have taken a central role in…

    Read more
  • Aug032022

    Mass Shooterism and the Need for Online Interventions and Bystander Resources

    This Insight was originally posted on Moonshot’s blog. For more information on Moonshot’s digital interventions, please visit their website or get…

    Read more
  • Jul052022

    Persuading with Fantasy: Why Digital P/CVE Narrative Campaigns May Benefit from Fictional Elements 

    The narratives we are exposed to and the stories we tell ourselves and each other have a profound impact on…

    Read more
  • Sep152021

    Into the Dungeon? Possibilities for Primary and Secondary Prevention on Gaming (-Adjacent) Platforms

    Videogames, gaming-related content, and gaming (-adjacent) platforms are a new key area of discussion for those seeking to understand how…

    Read more
  • Jul212021

    Schrems II and the Future of 3rd Party Security Service Access to Data From the UK

    Happy Birthday Schrems II, but hold back the cake. As the EU’s judgment in Data Protection Commissioner v Facebook Ireland…

    Read more
  • Apr232021

    Do Researchers Have an Obligation to Report Dangerous Actors?

    The Lowy Institute recently conducted a survey of the terrorism and extremism research community regarding research on the role of…

    Read more
  • Dec182020

    Deradicalisation by Videoconference

    The pandemic has pushed the boundaries of what is possible (and appropriate) on videoconferencing applications. Despite strange side-effects like Zoom…

    Read more