Contextual
Resources

Once a government or tech company develops a definition of terrorism or violent extremism, it can be difficult to know how to apply these definitions to the variety of ways that terrorism and violent extremism manifests internationally and across online spaces.

This section of the site aims to highlight contextual resources on themes related to applying definitions to the online space.  GIFCT funds the Global Network on Extremism and Technology (GNET) to bring forward actionable insights from experts and practitioners around the world to better inform and give context to tech companies, governments, practitioners and other stakeholders in this field. Insights are curated here under context-based themes.

Filters

  • 04th November 2025
    The Attention Window: Online Ecosystems of Rage, Mobilisation, and Extremist Narratives Following the Heaton Park Synagogue Attack
    Ella Goldschmied
  • 03rd November 2025
    Climate Catastrophe: Militants’ Manipulation of Climate Narratives in Pakistan
    Imtiaz Baloch
  • 30th October 2025
    Islamic State Information Technology: The New “Security Tips Series” of Electronic Horizon Foundation
    Alessandro Bolpagni and Eleonora Ristuccia
  • 28th October 2025
    Youth Radicalisation in the Gaming Sphere: An Exploration of Identity-Based Hate and Extremist Content on Roblox
    Linda Schlegel, Constantin Winkler and Lars Wiegold
  • 24th October 2025
    Closing the Enforcement Gap: AI, Illicit Liquidity, and the Next Phase of Counter-Terrorist Finance
    Adam Rousselle
  • 20th October 2025
    ICERAID: Surveillance, Vigilantism, and Crypto-Rewards
    Nina Kurt
  • 15th October 2025
    Everyday Extremism: Molka, Nth Room, and the Infrastructure of Digital Misogyny
    Se Youn Park
  • 13th October 2025
    Light of Darkness: An Analysis of ISKP’s Digital Handbook
    Paula Nunez-Guerra
  • 08th October 2025
    Symbols and Scripts: Firearms as Artefacts of Extremist Violence
    Dr Yannick Veilleux-Lepage

We use cookies to improve your experience on our website. See our privacy policy.