Showing 12 of 2488 results.

This paper examines the relationship between gender and violent extremism (VE) among individuals engaged in VE clinical services in Montreal, Quebec (Canada). We use mixed methods to understand the experiences and characteristics of individuals who express support for male supremacist ideologies. Study participants include 86 patients enrolled in VE clinical…

VOX-Pol’s new report presents findings from the REASSURE (Researcher, Security, Safety, and Resilience) project’s in-depth interviews with 39 online extremism and terrorism researchers. Based at universities, research institutes, and think tanks in Europe and North America, the interviewees studied mainly, albeit not exclusively, far-right and violent jihadist online activity. The…

This issue of the Counter Terrorist Trends and Analyses (CTTA) covers the following chapters: Africa and Afghanistan the Current Hotspots, but Jihadist Also Eye China and Russia; Al-Shabaab versus the Islamic State in Somalia Province: Why Only Al-Qaeda’s Affiliate Remains Unrivalled; Boko Haram-ISWAP and the Growing Footprint of Islamic State (IS) in Africa;…

The far-right anti-government extremist movement poses a significant threat in the United States. The January 6, 2021, attack on the US Capitol illustrates the capacity of this movement to plan and mount violent attacks against government targets and democratic institutions. In this article, we explore how the organisational and tactical…

Social media platforms play a key role in fostering the outreach of extremism by influencing the views, opinions, and perceptions of people. These platforms are increasingly exploited by extremist elements for spreading propaganda, radicalizing, and recruiting youth. Hence, research on extremism detection on social media platforms is essential to curb…

In 2019, Telegram took extensive action to remove Islamic State (IS) channels and supporters of the group from its platform. Telegram’s crackdown led to the attempted migration of IS supporters to apps like Hoop Messenger, Rocket.Chat and TamTam, with Hoop Messenger being the most popular encrypted social media platform for…

This Geneva Paper describes the main components of international counterterrorism law. In addition to the sectoral United Nations (UN) conventions on terrorism, international counterterrorism law encompasses rules across international humanitarian law and international criminal law, and its application is regulated by international human rights law. Also considered is the manner…

This is a translation of a report first published in German on 1 February 2023 under the title “Im digitalen Labyrinth: Rechtsextreme Strategien der Dezentralisierung im Netz und mögliche Gegenmaßnahmen”. In response to the increased deletion of hate content and conspiracy theorist accounts on YouTube and other mainstream sites, right-wing…

The vast majority of those engaging with radical ideas do not pursue radicalization trajectories to an endpoint of violent extremism. However, empirical research charting journeys of “non-radicalization” remains scarce. This article draws on ethnographic research tracing pathways through an “extreme right” milieu. It identifies a range of journeys – of…

This report details the modus operandi and the evolution of violent extremist groups over time. It examines how these groups have increased their influence as ideological affiliates of global terrorist organizations such as ISIL and Al-Qaeda and penetrated new areas by exploiting localized grievances, positioning themselves as alternative service providers…

The literature on terrorism and the rehabilitation of terrorists is growing continuously, but primary studies of high quality are still scarce. In many countries, the number of clients convicted of terrorist offences is increasing. As such, prison and probation services serve as important actors in the prevention of recidivism and…

Social media is a modern person’s digital voice to project and engage with new ideas and mobilise communities—a power shared with extremists. Given the societal risks of unvetted content-moderating algorithms for Extremism, Radicalisation, and Hate speech (ERH) detection, responsible software engineering must understand the who, what, when, where, and why such models are necessary…