Contextual
Resources
Once a government or tech company develops a definition of terrorism or violent extremism, it can be difficult to know how to apply these definitions to the variety of ways that terrorism and violent extremism manifests internationally and across online spaces.
This section of the site aims to highlight contextual resources on themes related to applying definitions to the online space. GIFCT funds the Global Network on Extremism and Technology (GNET) to bring forward actionable insights from experts and practitioners around the world to better inform and give context to tech companies, governments, practitioners and other stakeholders in this field. Insights are curated here under context-based themes.
Filters
Tactical Exploitation of Online Services
Please select
Tactical Exploitation of Online Services
Online terrorism and violent extremism comes in many forms and platforms are equally exploited in a variety of ways. Terrorist and violent extremist groups and individuals, like average users, use a mixture of platforms to further their aims. This cross-platform approach facilitates in storing content, holding private or confidential conversations, e-commerce for buying and selling goods as well as fundraising, recruitment, and the amplification of propaganda and messaging to the public. These signals, trends and adversarial shifts around this exploitation are highlighted by global experts.
-
04th November 2025The Attention Window: Online Ecosystems of Rage, Mobilisation, and Extremist Narratives Following the Heaton Park Synagogue AttackElla Goldschmied
-
30th October 2025Islamic State Information Technology: The New “Security Tips Series” of Electronic Horizon FoundationAlessandro Bolpagni and Eleonora Ristuccia
-
24th October 2025Closing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist FinanceAdam Rousselle
-
15th October 2025Everyday Extremism: Molka, Nth Room, and the Infrastructure of Digital MisogynySe Youn Park
-
13th October 2025Light of Darkness: An Analysis of ISKP’s Digital HandbookPaula Nunez-Guerra
-
03rd October 2025OSINT: The Digital Force-Multiplier for Extremist ViolenceTimothy Kappler
-
17th September 2025Mapping Terrorist AI Use: Identifying Factors Behind a Relatively Slow Adoption RateDavid Wells
-
29th August 2025Pixelated Profits: Terrorist Financing Through In-Game Economies in IndonesiaJose Akmal
-
18th August 2025Digital Aftershocks: Deepfakes in the Wake of the Pahalgam Attack in KashmirTarun Agarwal