Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Posts tagged with ‘P/CVE’

  • Jul212021

    Schrems II and the Future of 3rd Party Security Service Access to Data From the UK

    Happy Birthday Schrems II, but hold back the cake. As the EU’s judgment in Data Protection Commissioner v Facebook Ireland…

    Read more
  • Jul192021

    Technology and Terrorist Financing

    Terrorists are increasingly exploiting technology to finance their activities. However, terrorist adoption of technology is an evolution, not a revolution. As the…

    Read more
  • Jun162021

    Stopping Terrorist Violence, One Cellphone Shutdown at a Time

    In 2008, terrorists were involved in carrying out deadly attacks in Mumbai which killed 172 people and were spread across…

    Read more
  • Jun092021

    A Proprietary Solution to GIFCT’s Consolidated List Problem

    In 2017, Facebook, YouTube, Twitter, and Microsoft formed the Global Internet Forum to Counter Terrorism (“GIFCT”) “to formalize the existing…

    Read more
  • Jun022021

    Tracking Violent Extremism Online and the Challenge of Open-Source Intelligence

    Understanding online behaviours of extremist groups requires observation, analysis and often dissemination. Academic researchers, government agencies, and civil society groups…

    Read more
  • May042021

    Predictive Technologies in Preventive Counterterrorism

    On 3 May 2017, an Australian Super Hornet airstrike in Iraq dropped a GPS-guided bomb on a house in West…

    Read more
  • Apr232021

    Do Researchers Have an Obligation to Report Dangerous Actors?

    The Lowy Institute recently conducted a survey of the terrorism and extremism research community regarding research on the role of…

    Read more
  • Dec182020

    Deradicalisation by Videoconference

    The pandemic has pushed the boundaries of what is possible (and appropriate) on videoconferencing applications. Despite strange side-effects like Zoom…

    Read more