Closing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist Finance
This Insight is published to coincide with Global Media and Information Literacy Week to highlight...
Malicious Use of AI and the Race to Respond: Innovation, Regulation, and Risk
Terrorist and Violent Extremist (TVE) actors are known as early adopters of emerging technologies. There...
ICERAID: Surveillance, Vigilantism, and Crypto-Rewards
Over the last several years, extremist and terrorist groups have begun using cryptocurrencies in a...
Everyday Extremism: Molka, Nth Room, and the Infrastructure of Digital Misogyny
Digital sex crimes such as South Korea’s molka (hidden camera) phenomenon and the Nth Room...
Light of Darkness: An Analysis of ISKP’s Digital Handbook
The digital bulletin, Light of Darkness, was originally conceived as a supplementary component to Voice...
Symbols and Scripts: Firearms as Artefacts of Extremist Violence
On 10 September 2025, in Orem, Utah, right-wing political commentator Charlie Kirk was shot and...
‘The Generation of ‘Digital Natives’: How Far-Right Extremists Target Australian Youth Online for Radicalisation and Recruitment’
Content disclaimers: All identifiers referencing real-life cases will be anonymised with pseudonyms, noting that in...
OSINT: The Digital Force-Multiplier for Extremist Violence
Violent extremists are continually adapting the ways in which they exploit digital platforms for coordination...
Gen-Zs and Ghost Guns: Trends, Threats and Implications
Ghost guns, in particular 3D-printed guns, have been gaining popularity among youth, with several criminal...
Virtual Worlds, Real Threats: Violent Extremist Exploitation of Roblox and Wider Gaming Ecosystems
In January 2025, a man named James Wesley Burger used Roblox—a platform designed for creativity...
Mapping Terrorist AI Use: Identifying Factors Behind a Relatively Slow Adoption Rate
Over the past three years, regional, national, and international governments have repeatedly raised concerns that...
Evolution, Expansion and Diversification: Tehreek-e-Taliban Pakistan’s Umar Media
Since 2021, Tehreek-e-Taliban Pakistan (TTP) has reformed its organisational structure every year – imitating the...
State of the Art: Unpacking the FATF’s Terrorist Financing Threat Assessment
On 8 July 2025, the Financial Action Task Force (FATF) – the global standard setter...
Can Gaming Support Disengagement? Exploring Opportunities and Challenges for Innovative Disengagement Approaches
The last few years have seen an increase in research efforts detailing how extremist actors...
Beyond Hawala: Emerging Online Financing Trends Among South Asian Violent Extremist Groups in 2025
Throughout 2025, we have witnessed the rapid evolution of fundraising tactics used by violent extremist...
Building Digital Trust: Youth-Led Tech Solutions to Prevent Extremism in the Horn of Africa
The Horn of Africa – a region encompassing Ethiopia, Somalia, Eritrea, and Djibouti – has...
Pixelated Profits: Terrorist Financing Through In-Game Economies in Indonesia
Indonesia’s massive gaming market, led by Mobile Legends, Free Fire, and PUBG Mobile, generates billions...
Voices of Extremism: The Rise of Ala Nahjen Qaweem Foundation
On 6 May 2025, a new Islamic State-supportive unofficial media outlet emerged on Element. According...
Building Community, Spreading Hate: Extremism, Hate, and Arma 3
Following the 2019 Christchurch massacre, 4chan users allegedly showcased their efforts to replicate and roleplay...
Spreading Fire: Arson, Social Media, and the Violent Extreme-Right in Ireland
In early June 2025, anti-migrant violence exploded in Northern Ireland following the alleged sexual assault...
Digital Aftershocks: Deepfakes in the Wake of the Pahalgam Attack in Kashmir
The terrorist attack in Pahalgam, India, on 22 April 2025 marked a tragic moment in...
Antisemitism and Terrorist Manifestos: “Where did you get your current beliefs? Mostly from the internet.”
This Insight contributes to GNET’s PhD Researcher Series, highlighting emerging academic voices in the field...
Sovereign Solutions: Unpacking the Criminal History and Digital Footprint of an Extremist Seller
This Insight contributes to GNET’s PhD Researcher Series, highlighting emerging academic voices in the field...
Introducing BR-ECHO: A Tool to Fight Online Extremism in Brazilian Portuguese
This Insight contributes to GNET’s PhD Researcher Series, highlighting emerging academic voices in the field...
“Remaining and Expanding:” IS Munasirin and the pro-Islamic State Ecosystem on SimpleX Chat
Ever since the arrest of Telegram founder and Chief Executive Officer (CEO) Pavel Durov, IS...
The Shadow War in Balochistan: ISKP Weaponises Digital Land to Gain Influence
On 25 May, the Islamic State Khorasan Province (ISKP), through its so-called official media outlet,...
Transnational White Supremacy: Digital Violent Extremism from West to East
In February, an 18-year-old Singaporean, Nick Lee Xing Qiu, was detained for planning to attack...
Weaponised Skies: The Expansion of Terrorist Drone Use Across Africa
Unmanned Aerial Vehicles (UAVs), better known as drones, have been on the rise among violent...
Guerrillas Online: Recruitment, Propaganda, and Control by Colombia’s FARC-EP Dissidents and ELN
In 2016, Colombia signed a historic peace agreement with the Revolutionary Armed Forces of Colombia...
Post-Pahalgam Propaganda: Mapping Online Extremist Reactions to the April 2025 Kashmir Attack
On 22 April 2025, a terrorist attack in Pahalgam, Jammu & Kashmir, killed 26 people....
‘A New Society’: Behind Canadian Armed Forces Members’ Plot to Form a Militia and Seize Land
On 8 July 2025, three men in Quebec, Canada, were arrested and charged with facilitating...
Hezbollah’s Latin American Networks: Stablecoins, Smuggling, and Sanctions Evasion
In early 2024, the U.S. Treasury’s Office of Foreign Asset Control (OFAC) sanctioned a Syria-based...
Meaning Through Its Opposite: Significance Quest Theory and Nihilistic Violent Extremism
This Insight examines groups under The Com umbrella (a catch-all name for 764 and related...
The Weaponisation of AI: Visual storytelling of the Great Replacement Conspiracy Theory Amid the Southport Riots
Artificial intelligence played a key role in the riots that followed the stabbing attack in...
AI at the Centre: Violent Extremist Exploitation in Pirkkala
On 20 May 2025, a 16-year-old boy stabbed three of his female classmates at the...
AI-powered Translation: How AI Tools Could Shape a New Frontier of IS Propaganda Dissemination
Terrorists have always adopted and employed emerging technologies to organise acts of terror, radicalise, and...
Techno-Caliphate or Terror from the Sky? ISWAP and Drone-Enabled Insurgency in the Lake Chad Basin Region
Insurgents and terrorists have been exploiting drones for intelligence gathering, propaganda, and attacks on civilian...
Playing with Hate: How Far-Right Extremists Use Minecraft to Gamify Radicalisation
This Insight will analyse how far-right extremist networks have turned Minecraft, one of the world’s...
Misogyny and Violent Extremism: Can Big Tech Fix the Glitch?
Content Warning: This Insight contains mentions of rape and violence against women. Sexual and Gender-Based...
AI and Counter-Terrorism in Africa: Assessing the Role of the African Union’s Continental AI Strategy
Artificial intelligence (AI) is fundamentally transforming societies by driving innovation in various sectors, including the...
Above the Battlefield: The Threat of UAVs in the Hands of VNAs
In 21st-century warfare, the loudest weapon may not be a missile, but rather the soft...
Murder of the Universe? Efilist Terrorism in Palm Springs
On the morning of 17 May 2025, a 25-year-old suspect carried out a suicide attack...
Nascent Adoption: Emerging Tech Trends by Terrorists in Afghanistan and Pakistan
In the Afghanistan-Pakistan region’s evolving threat landscape, terrorist groups have been slow in adopting technologies...
The Fifth Annual GNET Conference: A Summary of Key Takeaways
On Wednesday, 28 May, the Global Network on Extremism and Technology (GNET) hosted its Fifth...
Prompted to Harm: Analysing the Pirkkala School Stabbing and Its Digital Manifesto
On 20 May 2025, a stabbing incident occurred at a school in the town of...
Mapping the Money Trail: The Evolution of Terrorist Financing Networks in Indonesia
Introduction Terrorist exploitation of digital financing is a technological, regulatory, and enforcement problem everywhere extremists...
Guns by Drone: The Rise of Drone-Assisted Firearm Smuggling on Israel’s Southern Border
Introduction Israel has witnessed a sharp uptick in a previously rare tactic: the use of...
Critical World Events: Extremist Misinformation Networks and Narratives in Times of Crisis
Introduction Global crises, such as COVID-19, produce societal instability and can create a fertile ground...
 
  
 














































