“Agentic Smurfing”: How AI-Autonomous Micro-Laundering is Outpacing Traditional Terrorist Financing Detection
The convergence of artificial intelligence and cryptocurrency has created a new threat to counter-terrorism financing...
The Moscow Oblast School Stabbing: Digital Rehearsal, Gaming Communities, and Youth Pathways to Violence
In the morning on 16 December 2025, local police were called to a school in...
From Defence to Offence: How Anti-Drone Technologies Are Empowering Militants in a New Era of Coordinated Drone Warfare
In 2025, Pakistani security forces witnessed at least 405 quadcopter attacks by Islamists Tehreek-e-Taliban (TTP)...
3D-Printed Warfare: A New Phase in Jihadist “Do-It-Yourself” Innovation Targeting the West?
This Insight analyses potential security threats associated with the use of 3D-printing technologies for the...
The Moscow Oblast School Stabbing: Understanding Hybrid Radicalisation and Transnational Online Subcultures
The fatal stabbing of a 10-year-old Tajik immigrant schoolboy in the Odintsovo district of Moscow...
Testing Resilience: Can the Proposed EU Drone Wall Defend Against Extremist Actors?
The European Union is developing a “Drone Wall”, officially named the European Drone Defence Initiative,...
Understanding Cyberhacktivist Radicalisation: A Socio-Psychological Approach
Note: The following Insight draws on research conducted by Sonja Belkin and Kristy Sakano under...
The Exploration of Dialogue-Based AI Interventions in P/CVE: Opportunities, Limits, and Lessons
Across the Preventing and Countering Violent Extremism (P/CVE) field, practitioners know that radicalisation processes increasingly...
Modern Warfare: The Islamic State’s Emerging Drone Instruction Ecosystem
Over the past decade, Islamic State (IS) has repeatedly adjusted the way it teaches technical...
The Jakarta Bombing: Youth Digital Radicalisation and the Urgent Need for Adaptive PCVE Responses
This Insight analyses the digital influences, memetic behaviours, and visual-symbolic cues that underpinned the explosion...
The Nordic Front of ‘764’: Trends, Drivers, and Countering Youth Exploitation and Radicalisation
This Insight was published as part of GIFCT’s Working Group on Addressing Youth Radicalization and...
Cutting a Hydra’s Head: Infrastructure-Level Content Moderation and the Case of Kiwi Farms
On 18 November 2025, the popular Content Delivery Network (CDN) and Distributed Denial of Service...
Cosplaying Columbine: How Memetic Violence Transformed Southeast Asia’s Extremist Threat
The 7 November 2025 attack at Sekolah Menengah Atas Negeri 72 (SMAN 72) in North...
Participatory Memetic Violence: Legend, Ostension, and Ideologically Diffuse Violence
Folk studies are not a source of analysis often used in the P/CVE space. However,...
Monetising Misogyny: Engagement Farming and the Tactics Behind Incendiary Online Content
This Insight is part of GNET’s Gender and Online Violent Extremism series, aligning with the...
Digital Weaponisation: Taliban Propaganda and Narrative Warfare on X
The Pakistani state and Afghan Taliban forces recently clashed along the Durand Line—one of the...
The Feed That Shapes Us: Extremism and Adolescence in the Age of Algorithms
This Insight was published as part of GIFCT’s Working Group on Addressing Youth Radicalization and...
The Weaponisation of Femininity: Gendered Realities in ISIS’s Digital Caliphate
This Insight is part of GNET’s Gender and Online Violent Extremism series, aligning with the...
You Talkin’ to Me? Algorithmic Mirrors and Chatbot Radicalisation
In his latest assessment to Parliament, Jonathan Hall KC, the UK Government’s Independent Reviewer of...
Could Chatbots Seduce Us into Extremism? Radicalisation Risks in an Age of AI Companions
In July, the UK Government’s Independent Reviewer of Terrorism Legislation, Jonathan Hall KC, relayed his...
Have Any Change to Spare? How the Islamic State Leverages Instagram for Fundraising
Following the 2019 Battle of Baghouz, which marked the Islamic State’s territorial collapse, IS-affiliated individuals...
Fractures on the (Storm-)Front: Contesting the Role of Women in White Supremacy
This Insight is part of GNET’s Gender and Online Violent Extremism series, aligning with the UN’s...
Back to Basics: 325 and the Renewed Critique of Technological Civilisation
This Insight examines the return of 325, an insurrectionary anarchist zine, and the renewed prominence...
Intersectionality in the Incelosphere: Understanding the Racial Dimensions of Misogynistic Extremism
This Insight is part of GNET’s Gender and Online Violent Extremism series, aligning with the...
Sanctified Misogyny: The Use of Fundamentalist Sexual Narratives to Legitimise Incel Ideology
This Insight is part of GNET’s Gender and Online Violent Extremism series, aligning with the...
Neo-Nazi Exploitation Online: AI Voice-Cloning and the Revival of Hitler Speeches
For over a year, neo-Nazi networks have been exploiting readily available AI voice-cloning tools to...
Space Tech and Terrorism: Satellite Imagery and GPS-Guided Drones in TTP Propaganda
Tehrik-e-Taliban Pakistan (TTP), a UN-designated terrorist organisation and statistically the deadliest terrorist outfit in Pakistan,...
From TechHaven to Telegram: How Latin American Youth Are Being Drawn into Jihadist Networks
This Insight was published as part of GIFCT’s Working Group on Addressing Youth Radicalization and...
Echoes of Resistance: Mapping Geuzenbond and its Latest Plot in the Netherlands
On 14 August 2025, Thomas Daveson – identified as Thomas D. by the media –...
The Attention Window: Online Ecosystems of Rage, Mobilisation, and Extremist Narratives Following the Heaton Park Synagogue Attack
On 2 October 2025, all eyes turned to the shocking events unfolding at a synagogue...
Climate Catastrophe: Militants’ Manipulation of Climate Narratives in Pakistan
Pakistan has faced the devastating impacts of climate change in recent years, with flash floods...
Islamic State Information Technology: The New “Security Tips Series” of Electronic Horizon Foundation
In 2020, at the launch of its first “Supporter’s Security Magazine” on the pro-IS Rocket.Chat...
Youth Radicalisation in the Gaming Sphere: An Exploration of Identity-Based Hate and Extremist Content on Roblox
This Insight was published as part of GIFCT’s Working Group on Addressing Youth Radicalization and...
Closing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist Finance
This Insight is published to coincide with Global Media and Information Literacy Week to highlight...
Malicious Use of AI and the Race to Respond: Innovation, Regulation, and Risk
Terrorist and Violent Extremist (TVE) actors are known as early adopters of emerging technologies. There...
ICERAID: Surveillance, Vigilantism, and Crypto-Rewards
Over the last several years, extremist and terrorist groups have begun using cryptocurrencies in a...
Everyday Extremism: Molka, Nth Room, and the Infrastructure of Digital Misogyny
Digital sex crimes such as South Korea’s molka (hidden camera) phenomenon and the Nth Room...
Light of Darkness: An Analysis of ISKP’s Digital Handbook
The digital bulletin, Light of Darkness, was originally conceived as a supplementary component to Voice...
Symbols and Scripts: Firearms as Artefacts of Extremist Violence
On 10 September 2025, in Orem, Utah, right-wing political commentator Charlie Kirk was shot and...
‘The Generation of ‘Digital Natives’: How Far-Right Extremists Target Australian Youth Online for Radicalisation and Recruitment’
Content disclaimers: All identifiers referencing real-life cases will be anonymised with pseudonyms, noting that in...
OSINT: The Digital Force-Multiplier for Extremist Violence
Violent extremists are continually adapting the ways in which they exploit digital platforms for coordination...
Gen-Zs and Ghost Guns: Trends, Threats and Implications
Ghost guns, in particular 3D-printed guns, have been gaining popularity among youth, with several criminal...
Virtual Worlds, Real Threats: Violent Extremist Exploitation of Roblox and Wider Gaming Ecosystems
In January 2025, a man named James Wesley Burger used Roblox—a platform designed for creativity...
Mapping Terrorist AI Use: Identifying Factors Behind a Relatively Slow Adoption Rate
Over the past three years, regional, national, and international governments have repeatedly raised concerns that...
Evolution, Expansion and Diversification: Tehreek-e-Taliban Pakistan’s Umar Media
Since 2021, Tehreek-e-Taliban Pakistan (TTP) has reformed its organisational structure every year – imitating the...
State of the Art: Unpacking the FATF’s Terrorist Financing Threat Assessment
On 8 July 2025, the Financial Action Task Force (FATF) – the global standard setter...
Can Gaming Support Disengagement? Exploring Opportunities and Challenges for Innovative Disengagement Approaches
The last few years have seen an increase in research efforts detailing how extremist actors...
Beyond Hawala: Emerging Online Financing Trends Among South Asian Violent Extremist Groups in 2025
Throughout 2025, we have witnessed the rapid evolution of fundraising tactics used by violent extremist...















































