- Dr. Victoria McCloud
Schrems II and the Future of 3rd Party Security Service Access to Data From the UK
Read moreHappy Birthday Schrems II, but hold back the cake. As the EU’s judgment in Data Protection Commissioner v Facebook Ireland…
- Jessica Davis
Technology and Terrorist Financing
Read moreTerrorists are increasingly exploiting technology to finance their activities. However, terrorist adoption of technology is an evolution, not a revolution. As the…
- Fatima Mustafa
Stopping Terrorist Violence, One Cellphone Shutdown at a Time
Read moreIn 2008, terrorists were involved in carrying out deadly attacks in Mumbai which killed 172 people and were spread across…
- Brett Raffish
A Proprietary Solution to GIFCT’s Consolidated List Problem
Read moreIn 2017, Facebook, YouTube, Twitter, and Microsoft formed the Global Internet Forum to Counter Terrorism (“GIFCT”) “to formalize the existing…
- Lyria Bennett Moses
Tracking Violent Extremism Online and the Challenge of Open-Source Intelligence
Read moreUnderstanding online behaviours of extremist groups requires observation, analysis and often dissemination. Academic researchers, government agencies, and civil society groups…
- Shiri Krebs
Predictive Technologies in Preventive Counterterrorism
Read moreOn 3 May 2017, an Australian Super Hornet airstrike in Iraq dropped a GPS-guided bomb on a house in West…
- Lydia Khalil
Do Researchers Have an Obligation to Report Dangerous Actors?
Read moreThe Lowy Institute recently conducted a survey of the terrorism and extremism research community regarding research on the role of…
- Cameron Sumpter
Deradicalisation by Videoconference
Read moreThe pandemic has pushed the boundaries of what is possible (and appropriate) on videoconferencing applications. Despite strange side-effects like Zoom…
Posts tagged with ‘P/CVE’
GNET > P/CVE
GNET’s Research Digest
Sign up for our monthly newsletter to stay updated about our work