Right- and left-wing violent extremist abuse of digital technologies in South America, Africa and Asia
April 14, 2025
The abuse of digital technologies by violent extremists is keeping pace with the exponential growth of new technologies, and poses multifaceted challenges to national and global security. Cyber-enabled threats manifest for example in terrorist-operated websites, the shift to alternative or fringe social media platforms, the use of the decentralised web, the exploitation of gaming and ...
Uncovering Salafi jihadist terror activity through advanced technological tools
March 25, 2025
This study investigates the evolving challenges intelligence and law enforcement agencies face in countering Salafi jihadist terrorist activities across digital platforms, focusing on integrating artificial intelligence (AI) and data fusion technologies in open-source intelligence (OSINT) methodologies. Through an analysis of case studies involving ISIS and other non-state actors, the study examines how terrorist organisations adapt ...
Islam, New Media and Young Muslims Radicalization
March 25, 2025
The aim of the article is to present the phenomenon of radicalization of young Muslims from both Muslim countries and Western Europe, which takes place using new media. The paper uses the method of critical analysis of sources because it allows the interpretation of facts and relating them to the motives of conduct and the ...
Teenage Terrorists and the Digital Ecosystem of the Islamic State
March 25, 2025
The author seeks to highlight just how central this unofficial Islamic State ecosystem is to audiences inspired by the group and how the interplay between this ecosystem and youth requires reframing the challenge rather than doubling down on the same playbooks. This article will first present the connection between these young peoples’ use of social ...
Perceptions of Individuals Radicalised Online: Examining the Victim-Perpetrator Nexus
March 25, 2025
This study explored the victim-perpetrator nexus in the context of cognitive online radicalisation. Specifically, we examined if a person’s age and whether they were exposed to extremist content/users incidentally or following active search shape perceptions of victimhood. We further assessed whether and how perceptions of victimhood shape support for distinct criminal justice responses. ...
Threat Surfaces in Games: Challenges and Best Practices
March 25, 2025
Gaming Community of Practice: The Gaming Community of Practice (GCoP) was formed to foster collaboration, knowledge sharing, and innovation among practitioners in the gaming industry alongside global experts. The group aimed to inform the development of best practices and guidance to prevent terrorists and violent extremists (TVE) from exploiting games, gaming-adjacent services, and the gaming community. ...
2024 Resource List: Violent Extremism, Radicalization, and Gaming
March 25, 2025
Gaming Community of Practice: The Gaming Community of Practice (GCoP) was formed to foster collaboration, knowledge sharing, and innovation among practitioners in the gaming industry alongside global experts. The group aimed to inform the development of best practices and guidance to prevent terrorists and violent extremists (TVE) from exploiting games, gaming-adjacent services, and the gaming community. ...
Prevent, Detect, and React: A Framework for Countering Violent Extremism on Gaming Surfaces
March 25, 2025
Gaming Community of Practice: The Gaming Community of Practice (GCoP) was formed to foster collaboration, knowledge sharing, and innovation among practitioners in the gaming industry alongside global experts. The group aimed to inform the development of best practices and guidance to prevent terrorists and violent extremists (TVE) from exploiting games, gaming-adjacent services, and the gaming community. ...
GIFCT Incident Response Working Group Report: A Review of the Content Incident Protocol and Incident Response Framework
March 25, 2025
Incident Response Working Group: GIFCT conducted a robust multistakeholder review of its Incident Response Framework (IRF) to better reflect the needs and feedback of key stakeholders and draw on lessons learned from prior activations. Widespread concerns about the potential rise in AI generated content around terrorist attacks, and the increasing prevalence of violence associated with accelerationist movements ...
Hash-Sharing Database Review: Challenges and Opportunities
March 25, 2025
Hash Sharing Working Group:  As technologies, content, and types of violent extremist and terrorist groups change, GIFCT continuously reviews its definitions and parameters to evolve in line with trends and member needs. This group reviewed GIFCT’s Hash-Sharing Database inclusion criteria and proposed enhancements to improve its transparency and accuracy. The National Consortium for the Study of Terrorism and ...