Contextual
Resources

Once a government or tech company develops a definition of terrorism or violent extremism, it can be difficult to know how to apply these definitions to the variety of ways that terrorism and violent extremism manifests internationally and across online spaces.

This section of the site aims to highlight contextual resources on themes related to applying definitions to the online space.  GIFCT funds the Global Network on Extremism and Technology (GNET) to bring forward actionable insights from experts and practitioners around the world to better inform and give context to tech companies, governments, practitioners and other stakeholders in this field. Insights are curated here under context-based themes.

Filters

Tactical Exploitation of Online Services

Online terrorism and violent extremism comes in many forms and platforms are equally exploited in a variety of ways. Terrorist and violent extremist groups and individuals, like average users, use a mixture of platforms to further their aims. This cross-platform approach facilitates in storing content, holding private or confidential conversations, e-commerce for buying and selling goods as well as fundraising, recruitment, and the amplification of propaganda and messaging to the public. These signals, trends and adversarial shifts around this exploitation are highlighted by global experts.

  • 17th December 2025
    Monetising Misogyny: Engagement Farming and the Tactics Behind Incendiary Online Content
    Fabio Daniele, Laura Bücher, Giampaolo Servida and Rachele Gilman
  • 11th December 2025
    The Weaponisation of Femininity: Gendered Realities in ISIS’s Digital Caliphate
    Riza Kumar
  • 08th December 2025
    You Talkin’ to Me? Algorithmic Mirrors and Chatbot Radicalisation
    Kye Allen
  • 05th December 2025
    Could Chatbots Seduce Us into Extremism? Radicalisation Risks in an Age of AI Companions.
    Kye Allen
  • 03rd December 2025
    Have Any Change to Spare? How the Islamic State Leverages Instagram for Fundraising
    Meili Criezis
  • 21st November 2025
    Neo-Nazi Exploitation Online: AI Voice-Cloning and the Revival of Hitler Speeches
    Daria Alexe
  • 04th November 2025
    The Attention Window: Online Ecosystems of Rage, Mobilisation, and Extremist Narratives Following the Heaton Park Synagogue Attack
    Ella Goldschmied
  • 30th October 2025
    Islamic State Information Technology: The New “Security Tips Series” of Electronic Horizon Foundation
    Alessandro Bolpagni and Eleonora Ristuccia
  • 24th October 2025
    Closing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist Finance
    Adam Rousselle

We use cookies to improve your experience on our website. See our privacy policy.