Blog

Would you like to submit a VOX-Pol Blog Post? Click here for submission instructions.

By Joey Düker A recent paper I co-wrote with Cathrine Thorleifsson (C-REX, Norway) for the Radicalisation Awareness Network addresses the importance of digital environments for so-called Lone Actor terrorists. As a brief guide for practitioners, I will expand on the various roles that different platforms serve in this context, with a focus on the far…

By Elisa Orofino A “proto-state”, a “socio-political movement, the ”beast“ – all names given to a single group that, at its height, seemed to embody the west’s worst nightmare. Islamic State appeared to be a motivated, well-led insurgency group dedicated to building its own “caliphate” in conquered areas across the Middle East. Now, the recent violent…

by Elizaveta Gaufman Russian far-right watchers might have not paid much attention to Vladislav Pozdnyakov – next to neofascist Alexander Dugin or late neo-Nazi leader Maxim Martsinkevitch, he seemed to be a marginal character, attracting 155k supporters on Russian social network Vkontakte at the height of his fame. However, Pozdnyakov and his now banned organization “the Male State” need…

By Lisa Kaati One of the most challenging threats towards societal security is attacks from so called violent ‘lone offenders’. These individuals are said to act alone or with minimal help from others, without any economic incitements or direct orders from violent extremist organisations. Between late 2018 and early 2020, several violent attacks in New…

By Joel S. Elson, Austin C. Doctor, and Sam Hunter The metaverse is coming. Like all technological innovation, it brings new opportunities and new risks. The metaverse is an immersive virtual reality version of the internet where people can interact with digital objects and digital representations of themselves and others, and can move more or less freely…

By Jakob Guhl, Moustafa Ayad and Julia Ebner How Islamist extremists and the violent right wing interact and influence each other The interplay between Islamist extremists and the violent right wing has raised fears among policy makers and practitioners about a vicious cycle of escalating tensions between extremist movements. These dynamics do not merely present…

By Antonia Vaughan The use of internet data in academic research without informed consent (covert research) is subject to a number of ethical quandaries. Here, the particular considerations that researching the radical right imposes are teased out, such as whether terms of service can be taken as a form of consent; whether internet data is…

By Tech Against Terrorism Since the 2000s Ireland has emerged as the preferred destination for many leading tech companies, and for many members of the Global Internet Forum to Counter Terrorism (GIFCT) – including all founding members: Meta, Twitter, and Microsoft1 – to establish their EU headquarters. This concentration of tech headquarters in Dublin places…