Uncovering Salafi jihadist terror activity through advanced technological tools
March 25, 2025
This study investigates the evolving challenges intelligence and law enforcement agencies face in countering Salafi jihadist terrorist activities across digital platforms, focusing on integrating artificial intelligence (AI) and data fusion technologies in open-source intelligence (OSINT) methodologies. Through an analysis of case studies involving ISIS and other non-state actors, the study examines how terrorist organisations adapt ...
Islam, New Media and Young Muslims Radicalization
March 25, 2025
The aim of the article is to present the phenomenon of radicalization of young Muslims from both Muslim countries and Western Europe, which takes place using new media. The paper uses the method of critical analysis of sources because it allows the interpretation of facts and relating them to the motives of conduct and the ...
Teenage Terrorists and the Digital Ecosystem of the Islamic State
March 25, 2025
The author seeks to highlight just how central this unofficial Islamic State ecosystem is to audiences inspired by the group and how the interplay between this ecosystem and youth requires reframing the challenge rather than doubling down on the same playbooks. This article will first present the connection between these young peoples’ use of social ...
Perceptions of Individuals Radicalised Online: Examining the Victim-Perpetrator Nexus
March 25, 2025
This study explored the victim-perpetrator nexus in the context of cognitive online radicalisation. Specifically, we examined if a person’s age and whether they were exposed to extremist content/users incidentally or following active search shape perceptions of victimhood. We further assessed whether and how perceptions of victimhood shape support for distinct criminal justice responses. ...
Threat Surfaces in Games: Challenges and Best Practices
March 25, 2025
Gaming Community of Practice: The Gaming Community of Practice (GCoP) was formed to foster collaboration, knowledge sharing, and innovation among practitioners in the gaming industry alongside global experts. The group aimed to inform the development of best practices and guidance to prevent terrorists and violent extremists (TVE) from exploiting games, gaming-adjacent services, and the gaming community. ...
2024 Resource List: Violent Extremism, Radicalization, and Gaming
March 25, 2025
Gaming Community of Practice: The Gaming Community of Practice (GCoP) was formed to foster collaboration, knowledge sharing, and innovation among practitioners in the gaming industry alongside global experts. The group aimed to inform the development of best practices and guidance to prevent terrorists and violent extremists (TVE) from exploiting games, gaming-adjacent services, and the gaming community. ...
Prevent, Detect, and React: A Framework for Countering Violent Extremism on Gaming Surfaces
March 25, 2025
Gaming Community of Practice: The Gaming Community of Practice (GCoP) was formed to foster collaboration, knowledge sharing, and innovation among practitioners in the gaming industry alongside global experts. The group aimed to inform the development of best practices and guidance to prevent terrorists and violent extremists (TVE) from exploiting games, gaming-adjacent services, and the gaming community. ...
GIFCT Incident Response Working Group Report: A Review of the Content Incident Protocol and Incident Response Framework
March 25, 2025
Incident Response Working Group: GIFCT conducted a robust multistakeholder review of its Incident Response Framework (IRF) to better reflect the needs and feedback of key stakeholders and draw on lessons learned from prior activations. Widespread concerns about the potential rise in AI generated content around terrorist attacks, and the increasing prevalence of violence associated with accelerationist movements ...
Hash-Sharing Database Review: Challenges and Opportunities
March 25, 2025
Hash Sharing Working Group:  As technologies, content, and types of violent extremist and terrorist groups change, GIFCT continuously reviews its definitions and parameters to evolve in line with trends and member needs. This group reviewed GIFCT’s Hash-Sharing Database inclusion criteria and proposed enhancements to improve its transparency and accuracy. The National Consortium for the Study of Terrorism and ...
Understanding Online Platform Usage of Extremist Groups via Graph Analytics
March 4, 2025
Graph analytics has become instrumental in uncovering insights across various domains, specifically in social networks. It serves as a crucial tool for analyzing the relationship between users in different online platforms. In this research, we apply methods of social network analysis to examine the communication patterns among participants in an online forum recognized for far-right ...