Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Posts tagged with ‘P/CVE’

  • Oct222021

    A Call for Orientation and Cultural Competency in Online Extremist Milieus within Prevention Efforts

    The field of behavioural threat assessment and management (BTAM) has grown significantly in recent years with increasing numbers of law…

    Read more
  • Sep152021

    Into the Dungeon? Possibilities for Primary and Secondary Prevention on Gaming (-Adjacent) Platforms

    Videogames, gaming-related content, and gaming (-adjacent) platforms are a new key area of discussion for those seeking to understand how…

    Read more
  • Aug042021

    Current Priorities in Counterterrorism and Prevention: Results of the CENS Online Expert Survey

    The Centre of Excellence for National Security (CENS) in Singapore designed a survey to assess the pandemic’s impact on violent…

    Read more
  • Jul262021

    When Counter-Speech Backfires: The Pitfalls of Strategic Online Interaction

    For a long time, hatred and incitement on social media have been treated as a relatively apolitical and purely virtual…

    Read more
  • Jul212021

    Schrems II and the Future of 3rd Party Security Service Access to Data From the UK

    Happy Birthday Schrems II, but hold back the cake. As the EU’s judgment in Data Protection Commissioner v Facebook Ireland…

    Read more
  • Jul192021

    Technology and Terrorist Financing

    Terrorists are increasingly exploiting technology to finance their activities. However, terrorist adoption of technology is an evolution, not a revolution. As the…

    Read more
  • Jun162021

    Stopping Terrorist Violence, One Cellphone Shutdown at a Time

    In 2008, terrorists were involved in carrying out deadly attacks in Mumbai which killed 172 people and were spread across…

    Read more
  • Jun092021

    A Proprietary Solution to GIFCT’s Consolidated List Problem

    In 2017, Facebook, YouTube, Twitter, and Microsoft formed the Global Internet Forum to Counter Terrorism (“GIFCT”) “to formalize the existing…

    Read more
  • Jun022021

    Tracking Violent Extremism Online and the Challenge of Open-Source Intelligence

    Understanding online behaviours of extremist groups requires observation, analysis and often dissemination. Academic researchers, government agencies, and civil society groups…

    Read more
  • May042021

    Predictive Technologies in Preventive Counterterrorism

    On 3 May 2017, an Australian Super Hornet airstrike in Iraq dropped a GPS-guided bomb on a house in West…

    Read more