Contextual
Resources
Once a government or tech company develops a definition of terrorism or violent extremism, it can be difficult to know how to apply these definitions to the variety of ways that terrorism and violent extremism manifests internationally and across online spaces.
This section of the site aims to highlight contextual resources on themes related to applying definitions to the online space. GIFCT funds the Global Network on Extremism and Technology (GNET) to bring forward actionable insights from experts and practitioners around the world to better inform and give context to tech companies, governments, practitioners and other stakeholders in this field. Insights are curated here under context-based themes.
Filters
Tactical Exploitation of Online Services
Please select
Tactical Exploitation of Online Services
Online terrorism and violent extremism comes in many forms and platforms are equally exploited in a variety of ways. Terrorist and violent extremist groups and individuals, like average users, use a mixture of platforms to further their aims. This cross-platform approach facilitates in storing content, holding private or confidential conversations, e-commerce for buying and selling goods as well as fundraising, recruitment, and the amplification of propaganda and messaging to the public. These signals, trends and adversarial shifts around this exploitation are highlighted by global experts.
-
09th July 2025AI-powered Translation: How AI Tools Could Shape a New Frontier of IS Propaganda DisseminationAlessandro Bolpagni and Eleonora Ristuccia
-
-
03rd June 2025Critical World Events: Extremist Misinformation Networks and Narratives in Times of CrisisDr. William Allchorn, Elisa Orofino and Lakshmi Babu Saheer
-
09th May 2025Platforming the Caliphate: Hizb ut-Tahrir’s Digital Strategy and Radicalisation RisksMuhammad Makmun Rasyid
-
23rd April 2025The Virtual Connection: Illicit Natural Resource Trade, Cryptocurrency, and Extremist FinancingDan Bruton
-
11th April 2025Automated Recruitment: Artificial Intelligence, ISKP, and Extremist RadicalisationFabrizio Minniti
-
09th April 2025Mapping ISKP’s Strength: Social Network Analysis of Tech-Driven JihadFahadh Firoz
-
14th March 2025Sadaqah Jariyah: The Thriving Cryptocurrency Fundraising Efforts Behind ISKP’s Official MediaMona Thakkar and Riccardo Valle
-
13th March 2025Free the Captives: Islamic State Central Asian Fundraising Networks in Support of IS Families in Syria and IraqMona Thakkar and Riccardo Valle