GNET Insights

Oct 24
Closing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist Finance

This Insight is published to coincide with Global Media and Information Literacy Week to highlight...

Oct 23
Malicious Use of AI and the Race to Respond: Innovation, Regulation, and Risk

Terrorist and Violent Extremist (TVE) actors are known as early adopters of emerging technologies. There...

Oct 20
ICERAID: Surveillance, Vigilantism, and Crypto-Rewards

Over the last several years, extremist and terrorist groups have begun using cryptocurrencies in a...

Oct 15
Everyday Extremism: Molka, Nth Room, and the Infrastructure of Digital Misogyny

Digital sex crimes such as South Korea’s molka (hidden camera) phenomenon and the Nth Room...

Oct 13
Light of Darkness: An Analysis of ISKP’s Digital Handbook

The digital bulletin, Light of Darkness, was originally conceived as a supplementary component to Voice...

Oct 08
Symbols and Scripts: Firearms as Artefacts of Extremist Violence

On 10 September 2025, in Orem, Utah, right-wing political commentator Charlie Kirk was shot and...

Oct 07
‘The Generation of ‘Digital Natives’: How Far-Right Extremists Target Australian Youth Online for Radicalisation and Recruitment’

Content disclaimers: All identifiers referencing real-life cases will be anonymised with pseudonyms, noting that in...

Oct 03
OSINT: The Digital Force-Multiplier for Extremist Violence

Violent extremists are continually adapting the ways in which they exploit digital platforms for coordination...

Sep 24
Gen-Zs and Ghost Guns: Trends, Threats and Implications

Ghost guns, in particular 3D-printed guns, have been gaining popularity among youth, with several criminal...

Sep 22
Virtual Worlds, Real Threats: Violent Extremist Exploitation of Roblox and Wider Gaming Ecosystems

In January 2025, a man named James Wesley Burger used Roblox—a platform designed for creativity...

Sep 17
Mapping Terrorist AI Use: Identifying Factors Behind a Relatively Slow Adoption Rate

Over the past three years, regional, national, and international governments have repeatedly raised concerns that...

Sep 15
Evolution, Expansion and Diversification: Tehreek-e-Taliban Pakistan’s Umar Media

Since 2021, Tehreek-e-Taliban Pakistan (TTP) has reformed its organisational structure every year – imitating the...

Sep 10
State of the Art: Unpacking the FATF’s Terrorist Financing Threat Assessment 

On 8 July 2025, the Financial Action Task Force (FATF) – the global standard setter...

Sep 08
Can Gaming Support Disengagement? Exploring Opportunities and Challenges for Innovative Disengagement Approaches

The last few years have seen an increase in research efforts detailing how extremist actors...

Sep 05
Beyond Hawala: Emerging Online Financing Trends Among South Asian Violent Extremist Groups in 2025

Throughout 2025, we have witnessed the rapid evolution of fundraising tactics used by violent extremist...

Sep 03
Building Digital Trust: Youth-Led Tech Solutions to Prevent Extremism in the Horn of Africa

The Horn of Africa – a region encompassing Ethiopia, Somalia, Eritrea, and Djibouti – has...

Aug 29
Pixelated Profits: Terrorist Financing Through In-Game Economies in Indonesia

Indonesia’s massive gaming market, led by Mobile Legends, Free Fire, and PUBG Mobile, generates billions...

Aug 27
Voices of Extremism: The Rise of Ala Nahjen Qaweem Foundation

On 6 May 2025, a new Islamic State-supportive unofficial media outlet emerged on Element. According...

Aug 26
Building Community, Spreading Hate: Extremism, Hate, and Arma 3

Following the 2019 Christchurch massacre, 4chan users allegedly showcased their efforts to replicate and roleplay...

Aug 20
Spreading Fire: Arson, Social Media, and the Violent Extreme-Right in Ireland

In early June 2025, anti-migrant violence exploded in Northern Ireland following the alleged sexual assault...

Aug 18
Digital Aftershocks: Deepfakes in the Wake of the Pahalgam Attack in Kashmir

The terrorist attack in Pahalgam, India, on 22 April 2025 marked a tragic moment in...

Aug 15
Antisemitism and Terrorist Manifestos: “Where did you get your current beliefs? Mostly from the internet.”

This Insight contributes to GNET’s PhD Researcher Series, highlighting emerging academic voices in the field...

Aug 13
Sovereign Solutions: Unpacking the Criminal History and Digital Footprint of an Extremist Seller

This Insight contributes to GNET’s PhD Researcher Series, highlighting emerging academic voices in the field...

Aug 11
Introducing BR-ECHO: A Tool to Fight Online Extremism in Brazilian Portuguese

This Insight contributes to GNET’s PhD Researcher Series, highlighting emerging academic voices in the field...

Aug 07
“Remaining and Expanding:” IS Munasirin and the pro-Islamic State Ecosystem on SimpleX Chat

Ever since the arrest of Telegram founder and Chief Executive Officer (CEO) Pavel Durov, IS...

Aug 04
The Shadow War in Balochistan: ISKP Weaponises Digital Land to Gain Influence

On 25 May, the Islamic State Khorasan Province (ISKP), through its so-called official media outlet,...

Aug 01
Transnational White Supremacy: Digital Violent Extremism from West to East

In February, an 18-year-old Singaporean, Nick Lee Xing Qiu, was detained for planning to attack...

Jul 30
Weaponised Skies: The Expansion of Terrorist Drone Use Across Africa

Unmanned Aerial Vehicles (UAVs), better known as drones, have been on the rise among violent...

Jul 28
Guerrillas Online: Recruitment, Propaganda, and Control by Colombia’s FARC-EP Dissidents and ELN

In 2016, Colombia signed a historic peace agreement with the Revolutionary Armed Forces of Colombia...

Jul 25
Post-Pahalgam Propaganda: Mapping Online Extremist Reactions to the April 2025 Kashmir Attack

On 22 April 2025, a terrorist attack in Pahalgam, Jammu & Kashmir, killed 26 people....

Jul 23
‘A New Society’: Behind Canadian Armed Forces Members’ Plot to Form a Militia and Seize Land 

On 8 July 2025, three men in Quebec, Canada, were arrested and charged with facilitating...

Jul 21
Hezbollah’s Latin American Networks: Stablecoins, Smuggling, and Sanctions Evasion

In early 2024, the U.S. Treasury’s Office of Foreign Asset Control (OFAC) sanctioned a Syria-based...

Jul 18
Meaning Through Its Opposite: Significance Quest Theory and Nihilistic Violent Extremism

This Insight examines groups under The Com umbrella (a catch-all name for 764 and related...

Jul 16
The Weaponisation of AI: Visual storytelling of the Great Replacement Conspiracy Theory Amid the Southport Riots

Artificial intelligence played a key role in the riots that followed the stabbing attack in...

Jul 14
AI at the Centre: Violent Extremist Exploitation in Pirkkala

On 20 May 2025, a 16-year-old boy stabbed three of his female classmates at the...

Jul 09
AI-powered Translation: How AI Tools Could Shape a New Frontier of IS Propaganda Dissemination

Terrorists have always adopted and employed emerging technologies to organise acts of terror, radicalise, and...

Jul 07
Techno-Caliphate or Terror from the Sky? ISWAP and Drone-Enabled Insurgency in the Lake Chad Basin Region

Insurgents and terrorists have been exploiting drones for intelligence gathering, propaganda, and attacks on civilian...

Jul 02
Playing with Hate: How Far-Right Extremists Use Minecraft to Gamify Radicalisation

This Insight will analyse how far-right extremist networks have turned Minecraft, one of the world’s...

Jun 30
Misogyny and Violent Extremism: Can Big Tech Fix the Glitch?

Content Warning: This Insight contains mentions of rape and violence against women. Sexual and Gender-Based...

Jun 26
AI and Counter-Terrorism in Africa: Assessing the Role of the African Union’s Continental AI Strategy

Artificial intelligence (AI) is fundamentally transforming societies by driving innovation in various sectors, including the...

Jun 24
Above the Battlefield: The Threat of UAVs in the Hands of VNAs

In 21st-century warfare, the loudest weapon may not be a missile, but rather the soft...

Jun 20
Murder of the Universe? Efilist Terrorism in Palm Springs

On the morning of 17 May 2025, a 25-year-old suspect carried out a suicide attack...

Jun 18
Nascent Adoption: Emerging Tech Trends by Terrorists in Afghanistan and Pakistan

In the Afghanistan-Pakistan region’s evolving threat landscape, terrorist groups have been slow in adopting technologies...

Jun 13
The Fifth Annual GNET Conference: A Summary of Key Takeaways

On Wednesday, 28 May, the Global Network on Extremism and Technology (GNET) hosted its Fifth...

Jun 12
Prompted to Harm: Analysing the Pirkkala School Stabbing and Its Digital Manifesto

On 20 May 2025, a stabbing incident occurred at a school in the town of...

Jun 10
Mapping the Money Trail: The Evolution of Terrorist Financing Networks in Indonesia

Introduction  Terrorist exploitation of digital financing is a technological, regulatory, and enforcement problem everywhere extremists...

Jun 05
Guns by Drone: The Rise of Drone-Assisted Firearm Smuggling on Israel’s Southern Border

Introduction Israel has witnessed a sharp uptick in a previously rare tactic: the use of...

Jun 03
Critical World Events: Extremist Misinformation Networks and Narratives in Times of Crisis

Introduction Global crises, such as COVID-19, produce societal instability and can create a fertile ground...