How online interaction radicalises while group involvement restrains: a case study of Action Zealandia from 2019 to 2021
September 18, 2023
Scholars have long seen radicalisation as a predominantly group based phenomenon, occurring largely through ‘real world,’ in person interaction. By contrast, the internet is seen as playing only a limited ‘facilitating’ role in radicalising people to violence. However, a series of attacks by far right extremists over the past decade has demonstrated that this perspective ...
Understanding the New Zealand Online Extremist Ecosystem
September 18, 2023
In this report, the Institute for Strategic Dialogue and CASM Technology provide a data-driven snapshot of the online activities of extremists with a demonstrable link to New Zealand, as well as the digital platforms connecting New Zealand to an international extremist ecosystem. ...
Shaved heads and sonnenrads: comparing white supremacist skinheads and the alt-right in New Zealand
September 18, 2023
This article looks at two periods in the history of white supremacy in New Zealand: the short-lived explosion of skinhead groups in the 1990s, and the contemporary rise of the internet-driven alt-right. It looks at the similarities and differences between the two groups, looking at style, symbols, ideology, and behaviour. It looks at the history ...
Security sector practitioner perceptions of the terror threat environment before the Christchurch attacks
September 18, 2023
On 15 March 2019, Brenton Tarrant destroyed New Zealand’s perception of its low threat terrorist risk. Security sector practitioners interviewed for this study before 15 March spoke about the challenges of performing counter terrorism roles in that low threat environment. Their perceptions revealed a fear that terrorist attacks occurring overseas, would sooner or later occur ...
New Zealand Government And Critical Infrastructure Ready Reaction To Cyber Terrorism
September 18, 2023
The purpose of this research is to obtain input from government agencies, elements of the critical infrastructure and cyber space, to determine what level of knowledge on cyber terrorism exists. Furthermore, are there ready reaction plans in place, and is staff-awareness training conducted on a regular basis? This probably won’t prevent or stop an attack ...