Contextual
Resources
Once a government or tech company develops a definition of terrorism or violent extremism, it can be difficult to know how to apply these definitions to the variety of ways that terrorism and violent extremism manifests internationally and across online spaces.
This section of the site aims to highlight contextual resources on themes related to applying definitions to the online space. GIFCT funds the Global Network on Extremism and Technology (GNET) to bring forward actionable insights from experts and practitioners around the world to better inform and give context to tech companies, governments, practitioners and other stakeholders in this field. Insights are curated here under context-based themes.
Filters
Tactical Exploitation of Online Services
Please select
Tactical Exploitation of Online Services
Online terrorism and violent extremism comes in many forms and platforms are equally exploited in a variety of ways. Terrorist and violent extremist groups and individuals, like average users, use a mixture of platforms to further their aims. This cross-platform approach facilitates in storing content, holding private or confidential conversations, e-commerce for buying and selling goods as well as fundraising, recruitment, and the amplification of propaganda and messaging to the public. These signals, trends and adversarial shifts around this exploitation are highlighted by global experts.
-
26th July 2022Comparing Online Posting Typologies Among Violent and Nonviolent Right-Wing ExtremistsDr. Ryan Scrivens, Dr. Garth Davies, Tiana Gaudette and Dr. Richard Frank
-
20th July 2022White Nationalism, Stormfront, and the Extremist Politicisation of ScienceYotam Ophir, Ayse Lokmanoglu, Dror Walter and Meredith L. Pruden
-
18th July 2022Examining White Supremacist and Militant Accelerationism Trends on TikTokAbbie Richards
-
13th July 2022Ideological Nihilism and Aesthetic Violence: Mass Shooters and Online Antisocial SubculturesSimon Purdue
-
11th July 2022Terrorist Financing and Technology: Understanding Approaches and Anticipating RisksJessica Davis
-
01st July 2022The Buffalo Attack – Insights From the Suspected Terrorist’s DiaryLaurence Bindner and Raphael Gluck
-
28th June 2022Al Qaeda, Islamic State, and Targeted Online Propaganda Around India’s Domestic Political DiscourseKabir Taneja
-
23rd June 2022The Future is Now: The Use of 3D-Printed Guns by Extremists and TerroristsRajan Basra
-