Have Any Change to Spare? How the Islamic State Leverages Instagram for Fundraising
Following the 2019 Battle of Baghouz, which marked the Islamic State’s territorial collapse, IS-affiliated individuals...
Fractures on the (Storm-)Front: Contesting the Role of Women in White Supremacy
This Insight is part of GNET’s Gender and Online Violent Extremism series, aligning with the UN’s...
Back to Basics: 325 and the Renewed Critique of Technological Civilisation
This Insight examines the return of 325, an insurrectionary anarchist zine, and the renewed prominence...
Intersectionality in the Incelosphere: Understanding the Racial Dimensions of Misogynistic Extremism
This Insight is part of GNET’s Gender and Online Violent Extremism series, aligning with the...
Sanctified Misogyny: The Use of Fundamentalist Sexual Narratives to Legitimise Incel Ideology
This Insight is part of GNET’s Gender and Online Violent Extremism series, aligning with the...
Neo-Nazi Exploitation Online: AI Voice-Cloning and the Revival of Hitler Speeches
For over a year, neo-Nazi networks have been exploiting readily available AI voice-cloning tools to...
Space Tech and Terrorism: Satellite Imagery and GPS-Guided Drones in TTP Propaganda
Tehrik-e-Taliban Pakistan (TTP), a UN-designated terrorist organisation and statistically the deadliest terrorist outfit in Pakistan,...
From TechHaven to Telegram: How Latin American Youth Are Being Drawn into Jihadist Networks
This Insight was published as part of GIFCT’s Working Group on Addressing Youth Radicalization and...
Echoes of Resistance: Mapping Geuzenbond and its Latest Plot in the Netherlands
On 14 August 2025, Thomas Daveson – identified as Thomas D. by the media –...
The Attention Window: Online Ecosystems of Rage, Mobilisation, and Extremist Narratives Following the Heaton Park Synagogue Attack
On 2 October 2025, all eyes turned to the shocking events unfolding at a synagogue...
Climate Catastrophe: Militants’ Manipulation of Climate Narratives in Pakistan
Pakistan has faced the devastating impacts of climate change in recent years, with flash floods...
Islamic State Information Technology: The New “Security Tips Series” of Electronic Horizon Foundation
In 2020, at the launch of its first “Supporter’s Security Magazine” on the pro-IS Rocket.Chat...
Youth Radicalisation in the Gaming Sphere: An Exploration of Identity-Based Hate and Extremist Content on Roblox
This Insight was published as part of GIFCT’s Working Group on Addressing Youth Radicalization and...
Closing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist Finance
This Insight is published to coincide with Global Media and Information Literacy Week to highlight...
Malicious Use of AI and the Race to Respond: Innovation, Regulation, and Risk
Terrorist and Violent Extremist (TVE) actors are known as early adopters of emerging technologies. There...
ICERAID: Surveillance, Vigilantism, and Crypto-Rewards
Over the last several years, extremist and terrorist groups have begun using cryptocurrencies in a...
Everyday Extremism: Molka, Nth Room, and the Infrastructure of Digital Misogyny
Digital sex crimes such as South Korea’s molka (hidden camera) phenomenon and the Nth Room...
Light of Darkness: An Analysis of ISKP’s Digital Handbook
The digital bulletin, Light of Darkness, was originally conceived as a supplementary component to Voice...
Symbols and Scripts: Firearms as Artefacts of Extremist Violence
On 10 September 2025, in Orem, Utah, right-wing political commentator Charlie Kirk was shot and...
‘The Generation of ‘Digital Natives’: How Far-Right Extremists Target Australian Youth Online for Radicalisation and Recruitment’
Content disclaimers: All identifiers referencing real-life cases will be anonymised with pseudonyms, noting that in...
OSINT: The Digital Force-Multiplier for Extremist Violence
Violent extremists are continually adapting the ways in which they exploit digital platforms for coordination...
Gen-Zs and Ghost Guns: Trends, Threats and Implications
Ghost guns, in particular 3D-printed guns, have been gaining popularity among youth, with several criminal...
Virtual Worlds, Real Threats: Violent Extremist Exploitation of Roblox and Wider Gaming Ecosystems
In January 2025, a man named James Wesley Burger used Roblox—a platform designed for creativity...
Mapping Terrorist AI Use: Identifying Factors Behind a Relatively Slow Adoption Rate
Over the past three years, regional, national, and international governments have repeatedly raised concerns that...
Evolution, Expansion and Diversification: Tehreek-e-Taliban Pakistan’s Umar Media
Since 2021, Tehreek-e-Taliban Pakistan (TTP) has reformed its organisational structure every year – imitating the...
State of the Art: Unpacking the FATF’s Terrorist Financing Threat Assessment
On 8 July 2025, the Financial Action Task Force (FATF) – the global standard setter...
Can Gaming Support Disengagement? Exploring Opportunities and Challenges for Innovative Disengagement Approaches
The last few years have seen an increase in research efforts detailing how extremist actors...
Beyond Hawala: Emerging Online Financing Trends Among South Asian Violent Extremist Groups in 2025
Throughout 2025, we have witnessed the rapid evolution of fundraising tactics used by violent extremist...
Building Digital Trust: Youth-Led Tech Solutions to Prevent Extremism in the Horn of Africa
This Insight was published as part of GIFCT’s Working Group on Addressing Youth Radicalization and...
Pixelated Profits: Terrorist Financing Through In-Game Economies in Indonesia
Indonesia’s massive gaming market, led by Mobile Legends, Free Fire, and PUBG Mobile, generates billions...
Voices of Extremism: The Rise of Ala Nahjen Qaweem Foundation
On 6 May 2025, a new Islamic State-supportive unofficial media outlet emerged on Element. According...
Building Community, Spreading Hate: Extremism, Hate, and Arma 3
Following the 2019 Christchurch massacre, 4chan users allegedly showcased their efforts to replicate and roleplay...
Spreading Fire: Arson, Social Media, and the Violent Extreme-Right in Ireland
In early June 2025, anti-migrant violence exploded in Northern Ireland following the alleged sexual assault...
Digital Aftershocks: Deepfakes in the Wake of the Pahalgam Attack in Kashmir
The terrorist attack in Pahalgam, India, on 22 April 2025 marked a tragic moment in...
Antisemitism and Terrorist Manifestos: “Where did you get your current beliefs? Mostly from the internet.”
This Insight contributes to GNET’s PhD Researcher Series, highlighting emerging academic voices in the field...
Sovereign Solutions: Unpacking the Criminal History and Digital Footprint of an Extremist Seller
This Insight contributes to GNET’s PhD Researcher Series, highlighting emerging academic voices in the field...
Introducing BR-ECHO: A Tool to Fight Online Extremism in Brazilian Portuguese
This Insight contributes to GNET’s PhD Researcher Series, highlighting emerging academic voices in the field...
“Remaining and Expanding:” IS Munasirin and the pro-Islamic State Ecosystem on SimpleX Chat
Ever since the arrest of Telegram founder and Chief Executive Officer (CEO) Pavel Durov, IS...
The Shadow War in Balochistan: ISKP Weaponises Digital Land to Gain Influence
On 25 May, the Islamic State Khorasan Province (ISKP), through its so-called official media outlet,...
Transnational White Supremacy: Digital Violent Extremism from West to East
In February, an 18-year-old Singaporean, Nick Lee Xing Qiu, was detained for planning to attack...
Weaponised Skies: The Expansion of Terrorist Drone Use Across Africa
Unmanned Aerial Vehicles (UAVs), better known as drones, have been on the rise among violent...
Guerrillas Online: Recruitment, Propaganda, and Control by Colombia’s FARC-EP Dissidents and ELN
In 2016, Colombia signed a historic peace agreement with the Revolutionary Armed Forces of Colombia...
Post-Pahalgam Propaganda: Mapping Online Extremist Reactions to the April 2025 Kashmir Attack
On 22 April 2025, a terrorist attack in Pahalgam, Jammu & Kashmir, killed 26 people....
‘A New Society’: Behind Canadian Armed Forces Members’ Plot to Form a Militia and Seize Land
On 8 July 2025, three men in Quebec, Canada, were arrested and charged with facilitating...
Hezbollah’s Latin American Networks: Stablecoins, Smuggling, and Sanctions Evasion
In early 2024, the U.S. Treasury’s Office of Foreign Asset Control (OFAC) sanctioned a Syria-based...
Meaning Through Its Opposite: Significance Quest Theory and Nihilistic Violent Extremism
This Insight examines groups under The Com umbrella (a catch-all name for 764 and related...
The Weaponisation of AI: Visual storytelling of the Great Replacement Conspiracy Theory Amid the Southport Riots
Artificial intelligence played a key role in the riots that followed the stabbing attack in...
AI at the Centre: Violent Extremist Exploitation in Pirkkala
On 20 May 2025, a 16-year-old boy stabbed three of his female classmates at the...















































