Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Posts tagged with ‘P/CVE’

  • Sep052022

    Can Serious Games Make a Difference in P/CVE?

    Video games and gamification have become key tools of extremist actors’ recruitment arsenal and have taken a central role in…

    Read more
  • Aug032022

    Mass Shooterism and the Need for Online Interventions and Bystander Resources

    This Insight was originally posted on Moonshot’s blog. For more information on Moonshot’s digital interventions, please visit their website or get…

    Read more
  • Jul112022

    Terrorist Financing and Technology: Understanding Approaches and Anticipating Risks

    Over the last two decades, there has been considerable focus in the international community on countering the financing of terrorism…

    Read more
  • Jul052022

    Persuading with Fantasy: Why Digital P/CVE Narrative Campaigns May Benefit from Fictional Elements 

    The narratives we are exposed to and the stories we tell ourselves and each other have a profound impact on…

    Read more
  • May172022

    Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad

    Islamic State’s (IS) propaganda campaign in 2014-2015 marked a turning point in the history of digital jihad. The quality and…

    Read more
  • May052022

    How to Erode Terrorists’ Trust in Cyberspace: The Role of Intelligence Services

    One of the most crucial missions entrusted to intelligence services in the fight against jihadist terrorism is carried out on…

    Read more
  • Mar162022

    A Review of International Multi-Stakeholder Frameworks for Countering Terrorism and Violent Extremism Online

    In the last ten years, there has been a significant increase in multi-stakeholder forums working to create self-regulatory practices for…

    Read more
  • Feb072022

    Creating Digital Narrative Worlds: The Promises of Transmedia Storytelling for P/CVE Narrative Campaigns

    Extremism is – at least partially – a communication challenge. The acceptance of extremist narratives, which provide followers with a…

    Read more
  • Nov042021

    The Robots Will Not Save Us: The Limits of Machine Learning for Counterterrorism

    At the dawn of the Global War on Terror (GWOT), Secretary of Defense Donald Rumsfeld argued it would trigger a…

    Read more
  • Nov022021

    Applying Systematic Content Moderation for Extremist Deterrence

    Platforms that are committed to making their online communities inhospitable to extremism require pragmatic, layered approaches to policy, detection, moderation,…

    Read more