Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Posts tagged with ‘P/CVE’

  • Aug042021

    Current Priorities in Counterterrorism and Prevention: Results of the CENS Online Expert Survey

    The Centre of Excellence for National Security (CENS) in Singapore designed a survey to assess the pandemic’s impact on violent…

    Read more
  • Jul262021

    When Counter-Speech Backfires: The Pitfalls of Strategic Online Interaction

    For a long time, hatred and incitement on social media have been treated as a relatively apolitical and purely virtual…

    Read more
  • Jul212021

    Schrems II and the Future of 3rd Party Security Service Access to Data From the UK

    Happy Birthday Schrems II, but hold back the cake. As the EU’s judgment in Data Protection Commissioner v Facebook Ireland…

    Read more
  • Jul192021

    Technology and Terrorist Financing

    Terrorists are increasingly exploiting technology to finance their activities. However, terrorist adoption of technology is an evolution, not a revolution. As the…

    Read more
  • Jun162021

    Stopping Terrorist Violence, One Cellphone Shutdown at a Time

    In 2008, terrorists were involved in carrying out deadly attacks in Mumbai which killed 172 people and were spread across…

    Read more
  • Jun092021

    A Proprietary Solution to GIFCT’s Consolidated List Problem

    In 2017, Facebook, YouTube, Twitter, and Microsoft formed the Global Internet Forum to Counter Terrorism (“GIFCT”) “to formalize the existing…

    Read more
  • Jun022021

    Tracking Violent Extremism Online and the Challenge of Open-Source Intelligence

    Understanding online behaviours of extremist groups requires observation, analysis and often dissemination. Academic researchers, government agencies, and civil society groups…

    Read more
  • May042021

    Predictive Technologies in Preventive Counterterrorism

    On 3 May 2017, an Australian Super Hornet airstrike in Iraq dropped a GPS-guided bomb on a house in West…

    Read more
  • Apr232021

    Do Researchers Have an Obligation to Report Dangerous Actors?

    The Lowy Institute recently conducted a survey of the terrorism and extremism research community regarding research on the role of…

    Read more
  • Dec182020

    Deradicalisation by Videoconference

    The pandemic has pushed the boundaries of what is possible (and appropriate) on videoconferencing applications. Despite strange side-effects like Zoom…

    Read more