Contextual
Resources

Once a government or tech company develops a definition of terrorism or violent extremism, it can be difficult to know how to apply these definitions to the variety of ways that terrorism and violent extremism manifests internationally and across online spaces.

This section of the site aims to highlight contextual resources on themes related to applying definitions to the online space.  GIFCT funds the Global Network on Extremism and Technology (GNET) to bring forward actionable insights from experts and practitioners around the world to better inform and give context to tech companies, governments, practitioners and other stakeholders in this field. Insights are curated here under context-based themes.

Filters

Tactical Exploitation of Online Services

Online terrorism and violent extremism comes in many forms and platforms are equally exploited in a variety of ways. Terrorist and violent extremist groups and individuals, like average users, use a mixture of platforms to further their aims. This cross-platform approach facilitates in storing content, holding private or confidential conversations, e-commerce for buying and selling goods as well as fundraising, recruitment, and the amplification of propaganda and messaging to the public. These signals, trends and adversarial shifts around this exploitation are highlighted by global experts.

Cyberterrorism/Hacking

Online Islamist extremist terrorist attacks present a real and continuing threat that is in constant evolution. These cyberattacks have profound ramifications, including the loss of money, privacy, time, and a sense of security. In addition, research points to growing concerns around various linkages between terrorist groups and hacktivist collectives.

  • 18th January 2024
    The Midgård Leak: Exposing The Global Business Of The Far Right
    Peter Smith
  • 23rd August 2021
    The Global Jihadist Movement and Cyberterrorism
    Noah Turner and Dr. Thomas J. Holt
  • 29th April 2020
    Jihadactivist
    Raffaello Pantucci

We use cookies to improve your experience on our website. See our privacy policy.