Open Access Publisher and Free Library
TERRORISM.jpeg

TERRORISM

Terrorism-Domestic-International-Radicalization-War-Weapons-Trafficking-Crime-Mass Shootings

Posts in Radicalism
Returning Nuance to Nostalgic Group Studies: Understanding White Supremacy as a Hegemonic Force

By Amy Cooter

A dominant analytical frame has emerged in extremism studies that attributes nearly all right wing, far right, or nostalgic group ideology1 and action to white supremacy. Some versions of this narrative further posit that these extremist groups intentionally and consciously effect white supremacy through a “cohesive social network based on commonly held beliefs,” a “white power movement.”2 However, these conceptions sometimes lack definitions of social movements, white supremacy, and other key concepts that are central to their arguments.3 This has led to over-generalizations about nostalgic group actors’ motives and goals in a way that downplays both the power of white supremacy as a hegemonic system and the specific harms caused by overtly supremacist actors. This paper clarifies a social science understanding of the key, but sometimes taken-for-granted, terms necessary for understanding these dynamics and demonstrates how faulty or unclear usage of this terminology leads to both analytical problems and the perpetuation of power structures that the field of extremism studies hopes to address. Specifically, I argue that improper conceptualization of white supremacy and related terms creates risks falling into three categories: analytic accuracy and predictive capacity, preventing near-term harm, and perpetuating white supremacy’s power structure and radicalization.

Monterey, CA: Center on Terrorism, Extremism and Counterterrorism, Middlebury Institute of International Studies. 2024. 29p.

download
Protecting Minors from Online Radicalisation in Indonesia

By Noor Huda Ismail and Putri Kusuma Amanda

The rise of JAD Nusantara, an ISIS-linked online network drawing in large numbers of minors, exposes serious gaps in Indonesia’s child protection systems. Vulnerable adolescents, often grappling with bullying, isolation, or absent parents, are being recruited without showing clear outward signs of radicalisation. In line with UN child rights standards, Indonesia must adopt an approach that prioritises rehabilitative, child-centred responses, safeguarding children’s rights while tackling the vulnerabilities and special needs that extremists exploit.

COMMENTARY
The case of a 12-year-old boy in Pemalang, Central Java, who joined the terrorist group JAD Nusantara, underscores a worrisome trend: radicalisation is increasingly happening entirely online, beyond parental or authority awareness. 

Social media platforms and messaging apps serve as conduits, enabling extremist content to reach vulnerable youth undetected. Research analyses show that extremism thrives on platforms that offer anonymity, rapid dissemination, and emotional appeal – qualities that make virtual spaces ideal for radical recruitment. 

Detecting online-driven radicalisation through traditional community surveillance is extremely difficult. Therefore, child protection systems need to adopt digital literacy and monitoring capabilities so that educators and social workers, not just security personnel, can recognize warning signs and intervene early.

A comprehensive society-wide strategy is needed – one that identifies young people at risk and engages them through pastoral, not punitive, channels.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 6p.

download
The Right Fit: How Active Club Propaganda Attracts Women to the Far-Right

By Robin O'Luanaigh, Hannah Ritchey and Frances Breidenstein

One image shows two young women sparring with each other, donning boxing gloves and athletic wear. A second image shows a young woman wrapping her hands and wrists, presumably preparing for a fight. On her arm is a tattoo of an Othala rune, a symbol common in neo-Nazi and white supremacist communities. 

These images, identified in online Active Club spaces, diverge from more traditional portrayals of women in right-wing extremist movements and communities. Instead of quaint cottagecore aesthetics and traditional ‘tradwives’ tending to the family and home, these images present women as activists, ideologues and warriors. While the Active Club network’s portrayals of women still promote traditional gender roles–especially within romantic relationships–the invocation of ‘warrior women’ tropes opens the door to a more palatable form of right-wing extremist activism – one that is less overtly misogynistic and ostensibly more ‘gender equal’. 

This Insight serves as a first look into the hypermasculine extremist spaces and communities of the Active Club network and how they co-opt and utilise images of women in their propaganda. We first introduce the Active Club network before reviewing existing literature on representations of women in right-wing extremist content. Next, we identify and discuss distinctly gendered tropes regarding the representation of women and couples in Active Club content. We conclude with a cautionary analysis of how such content can make Active Clubs and similar organisations palatable to women who may view these groups as gender-equal or empowering. 

Global Network on Extremism & Technology, 2023. 

download
Dangerous Organizations and Bad Actors: The Active Club Network

By Middlebury Institute of International Studies

Active Clubs make up a decentralized network of individually-formed organizations that are centered around the premise of a white supremacist fraternal brotherhood. First introduced in December of 2020 by Robert Rundo, the leader of the white supremacist Rise Above Movement (R.A.M), Active Clubs are intended to preserve and defend the white population and traditional European culture from a perceived global genocide by non-white ethnic and racial groups. 

Rundo was inspired to create the Active Club network—something he referred to as “white nationalism 3.0”—in response to the numerous arrests of R.A.M. members made in 2018. He wanted to create an organization that would be less perceptible to law enforcement, and thus less susceptible to disruption or destruction. From this, Active Clubs were born—small, decentralized organizations that would focus recruitment efforts on localized areas and thus garner less attention than traditional white nationalist organizations. This structure would also ensure that Active Clubs were not reliant on a particular physical entity or leadership figure for survival.

Active Clubs provide like-minded white men with physical spaces where they can train in mixed martial arts in preparation for war against their perceived enemies. Ideologically, Active Clubs adhere to neofascist and accelerationist principles, with the promotion of violence comprising a key theme in Active Club communication and propaganda. Located across the United States and in several countries transnationally, the Active Club network ensures that groups of men devoted to training for battle are available for mobilization in multiple locations across Western countries. 

Monterey, CA: Middlebury Institute of International Studies and Center on terrorism, Extremism, and Counterterrorism, 2024.

download
Veteran Perspectives on Extremist Exploitation of the Military: Sources and Solutions

 By Amy Cooter

There has been increasing attention to how military service members and veterans may be recruited or exploited by extremists, yet there is little research on precisely how this may happen or on how such ties may, in turn, influence military cohesion. It is important to emphasize that the vast majority of service members are not extremist, but a growing number of domestic extremists have military connections who may then have an outsized ability to enact harm, including by training others in military techniques. Given the potential for veterans’ knowledge and experiences to be exploited by extremist groups, understanding these connections is pressing. This paper shares findings from an in-depth interview study with 42 veterans from all military branches who collectively shed light on how extremism influences various aspects of military life from recruitment to readiness and who offer concrete steps the military could pursue at every stage of service to limit extremists’ exploitation of the institution and those who serve.

Monterey, CA: Center on Terrorism, Extremism, and Counterterrorism (CTEC) at the Middlebury Institute of International Studies 2025. 31p.

download
Active Clubs: The Growing Threat of ‘White Nationalism 3.0’ across the United States

By Ciarán O’Connor, Laurie Wood, Katherine Keneally and Kevin D. Reyes

The number of Active Clubs in the United States, Canada and Europe is increasing, posing a threat to public safety. Active Clubs (“ACs”) are white nationalist extremist groups that emphasize physical fitness and hand-to-hand combat skills and have a history of violence. Though each “club” is autonomous, the groups frequently engage in coordinated activities offline, such as mixed martial arts (MMA) tournaments, protests and physical training. In recent years, these clubs have used their social media profiles to encourage likeminded individuals to establish their own clubs in their respective locations. ISD’s research shows this strategy has been highly effective throughout the US.

This report identifies and analyzes the network of Active Clubs operating within the US along three themes: ideology, tactics and targets. The research predominately focuses on the use of the messaging platform Telegram by ACs, and includes detailed data analysis exploring how this network uses Telegram to produce and promote white nationalist propaganda, expand the network of clubs, and facilitate on- and offline collaboration between members and groups.

Amman | Berlin | London | Paris | Washington DC: Institute for Strategic Dialogue, 2023. 17p.

download
The “Chanification” of White Supremacist Extremism

By  Michael Miller Yoder,  David West Brown &  Kathleen M. Carley 

Much research has focused on the role of the alt-right in pushing far-right narratives into mainstream discourse. In this work, we focus on the alt-right’s effects on extremist narratives themselves. From 2012 to 2017, we find a rise in alt-right, 4chan-like discourse styles across multiple communication platforms known for white supremacist extremism, such as Stormfront. This discourse style incorporates inflammatory insults, irreverent comments, and talk about memes and online “chan” culture itself. A network analysis of one far-right extremist platform suggests that central users adopt and spread this alt-right style. This analysis has implications for understanding influence and change in online white supremacist extremism, as well as the role of style in white supremacist communications. Warning: This paper contains examples of hateful and offensive language.

Comput Math Organ Theory Volume 31, pages 222–235, (2025)

download
Discord and the Pentagon's Watchdog: Countering Extremism in the U.S. Military

By Amy C. Gaudion

In his 2022 book, Ward Farnsworth crafts a metaphor from the lead-pipe theory for the fall of Rome to consider how rage and misinformation traveling through today’s technology-enabled pipes are poisoning our civic engagement and threatening our governmental structures: “We have built networks for the delivery of information––the internet, and especially social media. These networks too, are a marvel. But they also carry a kind of poison with them. The mind fed from those sources learns to subsist happily on quick reactions, easy certainties, one-liners, and rage.” This Article carries the metaphor into a new context and considers what should be done when the poison being transported through the digital pipes is directed at members of the U.S. military. While extremism in the U.S. military is not a new threat, the events of January 6, 2021, brought the threat into much sharper focus. It exposed three preexisting trends, each sitting in plain sight but not yet woven together. These trends include a growing acceptance of extremist views and ideologies in U.S. military and veteran communities, an increase in violent extremist acts committed by individuals with military backgrounds, and the enhanced use of digital platforms by extremist groups to target their messaging to and strengthen their recruitment of individuals with military experience. To return to the metaphor, the extremist poison is teeming through the pipes at an alarming rate, and the number of pipes has increased to include social media platforms, encrypted chat tools, gaming platforms, podcasts, and music streaming apps, including YouTube, Discord, Gab, Telegram, and WhatsApp, among many others. In offering these observations, the author is mindful of not overstating the threat and takes seriously warnings as to the adverse consequences that follow from hyperbole and exaggeration. Indeed, a fundamental difficulty is the lack of understanding as to scope and scale of the extremism threat in the U.S. military. This Article attempts to draw the contours of that threat, exposes the structural and legal obstacles that make countering extremism in the military such a fraught exercise, and identifies actors, tools, and mechanisms—beyond the conventional options––able to overcome these long-standing structural and institutional obstacles.

Indiana Law Journal | Vol. 100:1743 | 2025, Penn State Dickinson Law Research Paper 10-2025

download
Exploring Youth Radicalisation within the Almajiri System in Northern Nigeria

By Oge Samuel Okonkwo

Boko Haram’s emergence in Northern Nigeria is closely tied to systemic vulnerabilities within the Almajiri system, a traditional Islamic educational framework mainly for boys. Founded by Mohammed Yusuf, an Almajiri graduate himself, the terror group exploited socio-cultural fractures, leveraging identity-based grievances, economic deprivation, and governance failures to recruit marginalised Almajirai. While the Almajiri system itself does not inherently radicalise individuals, it produces a large, unemployed youth demographic with a strong collective identity, creating fertile ground for extremist exploitation.Addressing systemic marginalisation and poverty within Nigeria's Almajiri educational system is crucial for preventing youth radicalisation, requiring integrated reforms across education, governance, and community engagement spheres.

The Hague: The International Centre for Counter-Terrorism (ICCT)  2025. 18p.

download
Addressing Online Self-Radicalisation in Singapore

By Sabariah Hussin

SYNOPSIS
The evolving nature of online self-radicalisation in Singapore raises pressing concerns that go beyond traditional counterterrorism frameworks. While Singapore’s preventive strategies are largely effective, emerging digital dynamics and psychosocial vulnerabilities call for more spiritually grounded, trauma-informed, and community-empowered approaches.

COMMENTARY
The issue of youth radicalisation is gaining attention in Singapore. During a speech by Acting Minister for Muslim Affairs, Faishal Ibrahim, at the Religious Rehabilitation Group (RRG) retreat on 24 June 2025, he noted that the availability of extremist content and the emergence of ideologically themed online communities have contributed to a gradual increase in radicalisation among young people. Given that many of these individuals are still developing their identities and critical thinking skills, they may be more susceptible to these influences.
It is concerning that a 17-year-old supporter of far-right ideology was reportedly planning a mass shooting of worshippers attending Friday prayers, while a 15-year-old girl expressed a desire to marry an ISIS fighter and engage in combat overseas. Both cases illustrate the phenomenon of self-radicalisation occurring entirely through online platforms.
These developments highlight a significant and rapid evolution in the patterns and scope of radicalisation, necessitating a thorough reassessment of Singapore’s CVE (countering violent extremism) strategies.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 6p.

download
EXTREME WEATHER: How a storm of false and misleading claims about extreme weather events spread unchecked on social media putting lives at risk

Social media companies are profiting from lies about extreme weather events.

  • On X, 88% of misleading extreme weather posts were from verified accounts. The platform enables paid subscriptions for five of these accounts – which combined have 14 million followers 

  • On YouTube, 73% of posts were from verified accounts. YouTube displayed ads next to 29% of misleading extreme weather videos. 

  • On Facebook and Instagram, 64% of posts were from verified accounts. Meta is sharing ad revenue with three content creators pushing misleading claims, enabling them to share in Meta’s revenue from ads near their posts. 

download
Evaluations of countering violent extremism programs: Linking success to content, approach, setting, and participants

By Wesam Charkawi , Kevin Dunn ,  Ana-Maria Bliuc

Since the September 11 attacks, prevention and countering violent extremism (P/CVE) programs have rapidly increased worldwide, garnering significant interest among researchers. This paper is a systematic review focusing on the evaluations of primary, secondary and tertiary prevention programs from 2001 until 2020. The review identified 74 program evaluations that included satisfactory measures and metrics. Only 32% of the studies deemed the intervention successful, 55% described limited success, and 8% deemed the program had failed. Many of the programs evaluated failed to reach their objectives; some generated negative outcomes such as community disdain and an increase in the likelihood of alienation and stigma. Success was largely a self-assessed measure by the facilitators or stakeholders of the programs or the evaluators of the study. Success indicators can be operationalized as the degree of enhanced sense of belonging (connectedness to the community, social connection), trust and willingness to engage in programs, development of critical thinking skills (integrative complexity theory), and a strong sense of worth (quest for significance). Without a generally accepted set of metrics and no cohesive framework for conducting evaluations, this review offers an important addition to the field on the evidence suitable for program evaluations. An important aim of this systematic review was to identify what makes an effective and successful countering violent extremism program. The key findings indicate that enhancing belonging, identity, trust and community engagement, acknowledging perceptions of injustice, religious mentoring, and the promotion of critical thinking/self-reflection are associated with successful programs. The findings press upon policymakers, funders, and researchers the need to consider and support high-quality evaluations of programs.

International Journal of Law, Crime and Justice, 2024., 19p.

download
More is More: Scaling up Online Extremism and Terrorism Research with Computer Vision 

By By Stephane J. Baele,* Lewys Brace, and Elahe Naserian 

Scholars and practitioners investigating extremist and violent political actors’ online communications face increasingly large information environments containing ever-growing amounts of data to find, collect, organise, and analyse. In this context, this article encourages terrorism and extremism analysts to use computational visual methods, mirroring for images what is now routinely done for text. Specifically, we chart how computer vision methods can be successfully applied to strengthen the study of extremist and violent political actors’ online ecosystems. Deploying two such methods – unsupervised deep clustering and supervised object identification – on an illustrative case (an original corpus containing thousands of images collected from incel platforms) allows us to explain the logic of these tools, to identify their specific advantages (and limitations), and to subsequently propose a research workflow associating computational methods with the other visual analysis approaches traditionally leveraged  

Perspectives on Terrorism, Volume XIX, Issue 1 March 2025  

download
Socio-Semantic Network Analysis for Extremist and Terrorist Online Ecosystems

By Stephane J. Baele and & Lewys Brace

How to best chart and analyse extremist digital ecosystems? This paper proposes to complement standard mapping methods based on URL outlinks, which are typically deployed but present several critical flaws, with socio-semantic network analysis. Adapting bi-nodal socio-semantic network principles to the specificities of extremist and terrorist digital communications, we put forward a simple yet efficient method for generating informative networks based on ideological or thematic proximity rather than URL connections. We use three datasets of various sizes and nature (French far-right websites, British far-right websites, US far-right Telegram channels) to compare traditional URL-based vs. socio-semantic networks, demonstrating how the latter bypasses the flaws of the former and offers significant advantages in multi-methods research designs. This empirical validation of our methodological proposition unfolds several new observations concerning the contemporary Western far-right digital ecosystem, highlighting specificities and commonalities of its French, British, and American variants.

download
WHERE DID THE WHITE PEOPLE GO? A thematic analysis of terrorist manifestos inspired by replacement theory

By Luke Baumgartner

On July 22, 2011, 32-year-old Anders Behring Breivik embarked on a threehour murder spree across Norway, killing seventy-seven in what would become the single largest loss of life in the country since the Second World War. Beginning that morning in central Oslo, Breivik’s terrorist attack claimed its first victims after detonating a van filled with nearly one ton of explosives outside of the Regjeringskvartalet complex, which housed the prime minister’s administrative offices. Disguised as a police officer, Breivik then boarded a ferry for the island of Utøya, where he proceeded to kill sixty-nine students attending a youth worker’s party summer camp in a mass shooting that lasted nearly ninety minutes. An hour before the bombing, Breivik emailed his manifesto, 2083: A European Declaration of Independence, to more than 1,000 contacts, asking for their assistance in disseminating his magnum opus, which, according to him, took more than three years to complete. The 1,500-page compendium contained a litany of grievances and rails against political correctness, feminists, and “multiculturalist/cultural Marxists,” ultimately accusing them of complicity in a grand conspiracy orchestrated by political elites of the European Union and Arab states to destroy Western civilization through the gradual replacement of white Christian Europeans by way of increased Muslim immigration—in other words, a Great Replacement. Breivik’s actions that day would inspire a cascade of copycat attacks in the United States, New Zealand, and Germany. As part of their attacks, each perpetrator wrote a manifesto to explain the rationale for their actions. In doing so, the manifestos can–and often do–serve multiple purposes: air the personal and societal grievances that led them to kill, provide a blueprint for future attackers, and perhaps, most importantly, gain the public notoriety and infamy they so desperately crave. At its core, terrorism is an act of violence that seeks validation through its very nature as a public spectacle, and thus, manifestos can provide answers to the ever-present question of why an event of this magnitude occurs. While these attacks are separated from one another in both time and space, the ideological glue binding them together is the belief in a racially and culturally homogenous dystopian future, one in which white people gradually cease to comprise demographic majorities in traditionally white dominions such as the United States and Europe. Or, in the most dire circumstances, cease to exist at all. These manifestos contain several common themes central to replacement theory–the conspiracy that motivated their attacks. This paper attempts to build on the current body of academic literature that focuses on the thematic elements of the manifestos and the historical and theoretical foundations upon which the attackers’ justifications for their actions lie. Beginning with a detailed history of replacement sentiment in the United States and Europe, this section seeks to provide the necessary background and context for where replacement theory comes from and how it has motivated actors across time and space. Within the context of the United States, replacement theory finds its ideological roots in late-19th and early-20th century race science, or eugenics, beginning with the works of sociologist Edward A. Ross and anthropologist Madison Grant, both of whom popularized the notion of “race suicide.” Subsequent generations of post-war white supremacists, such as David Duke and David Lane, transformed race suicide into the explicitly anti-semitic conspiracy theory of “white genocide,” laying the groundwork for contemporary militant far-right extremists to coalesce around the idea of replacement theory. Meanwhile, European manifestations of parallel racist conspiracies emerged during an intellectual movement of the 1960s in France known as the Nouvelle Droite, championed by the likes of Jean Raspail. Raspail’s work would influence leading public figures such as Italian author Oriana Fallaci and British Historian Bat Ye’or, who were instrumental in sparking Renaud Camus’ coining of the “Great Replacement.”

Washington, DC: Program on Extremism at George Washington University , 2025. 32p.

download
Triads, Snakeheads, and Flying Money The Underworld of Chinese Criminal Networks in Latin America and the Caribbean

By Leland Lazarus and Alexander Gocso

This paper provides a comprehensive analysis of the Chinese individuals, gangs, and companies engaging in illicit activities in Latin America and the Caribbean. Our methodology was to research academic literature, news articles, press releases, official statements, and podcasts in Spanish, Portuguese, Mandarin and English, as well as conduct off-the-record interviews with U.S. and LAC intelligence and law enforcement officials to ascertain growing trends in Chinese criminal behavior in the region.

Miami: Florida International University, 2023. 33p.

download
THE EVOLUTION OF THREAT NETWORKS IN LATIN AMERICA

By Phil Williams and Sandra Quincoses

The economic and political environments in Latin America have been advantageous for local, regional, and transnational threat networks. Specifically, technology, increased international trade and economic interdependence, heightened interest in natural resources for profit, synthetic drug production, economic disparities, corruption, impunity, and unstable political conditions have led to a complex web of opportunities that requires new, progressive ways to address criminal activities. The creativity of threat networks along with their entrepreneurial strategies have resulted in increasing power and influence. Despite efforts by the United States and some governments in Latin America to combat these networks, the everchanging global environment has worked in their favor. Indeed, some countries in Central and South America are in danger of transforming into what Jorge Chabat described as “criminally possessed states.” Furthermore, gangs in Central America, especially in Honduras where MS-13 has become more closely linked to drug trafficking, have reduced local extortion, become more aware of their nascent political power and have even engaged in rudimentary social welfare provision. Another major trend identified in this report is the strategic diversification of trafficking routes, activities, and markets. For instance, licitly established transpacific trade between East Asia and Latin America has been exploited by criminal groups involved in wildlife and drug trafficking. This, along with other activities such as illegal logging and mining, have undermined licit trade. Moreover, criminal groups have also conducted cyber-attacks against government agencies to obtain false documentation to illegally conduct logging activities in protected areas of Brazil’s Amazon rainforest. Such activities illustrate the growing relationship between technology, illicit behavior, and criminal groups’ diverse capabilities. An emerging nexus between state and non-state threat networks is also identified as a key trend in the region. Notable links between criminal groups and malign state actors such as Cuba, Venezuela, and Nicaragua are publicly known with indigenous and under-resourced communities violently confronting illicit organizations that sometimes have the tacit support of government authorities and agencies. Moreover, external state actors’ investments and economic interests in highly corrupt and unstable political environments pave the way for impunity, which enables threat networks to operate without inhibition. The most explicit example pertains to the Revolutionary Armed Forces of Colombia (Fuerzas Armadas Revolucionarias de Colombia—FARC)-linked mining operations in Venezuela. Undoubtedly, trends are becoming increasingly complex now that activities have reached a global scale. This is also evident in illicit financial flows into, through, and out of the region. In terms of money laundering, tried and tested methods still seem to be favored, although it is likely that new opportunities, such as those provided by digital currencies, will be increasingly exploited in the future. The paper concludes that, in spite of adverse trends, it is important to avoid worst-case analysis. It also suggests, however, that many of the problems in the region stem fundamentally from poor governance—and that taking steps to deal with this should be a priority.

Miami: Florida International University, Jack D. Gordon Institute for Public Policy, 2019. 45p.

download
The Hydra on the Web: Challenges Associated with Extremist Use of the Fediverse – A Case Study of PeerTube

By Lea Gerster, Francesca Arcostanzo, Nestor Prieto-Chavana, Dominik Hammer and Christian Schwieter

As part of its project on “Combating Radicalisation in Right-Wing Extremist Online Subcultures”, ISD is investigating smaller platforms to which the German-speaking far-right online scene is retreating. Their aim is to circumvent regulation and moderation on large platforms, for example as required by the German Network Enforcement Act (NetzDG, or 'Facebook Act'). Analyses contained in the report on “Telegram as a Buttress” have already made clear the importance of investigating PeerTube. While writing the previous report, the ISD research team came across multiple video platforms with almost identical layouts and functionalities. It was found that eight out of 19 video platforms identified were set up using the free software PeerTube. PeerTube is an example of a growing socio-technological movement that attempts to turn away from large, centralised platforms towards decentralised and mostly community-managed websites. Instead of a single platform with a monopoly on content, this movement is building a network based on servers that are maintained independently of one another. This is leading to a “hydra effect”: even if connected servers are cut off, the network itself survives, allowing for new servers to be added at will. While far-right extremists are not the ones driving this phenomenon, it does appear that they are exploiting these new-found possibilities. For example, various far-right figureheads have established platforms via PeerTube where users can in some cases create their own accounts. Some of these PeerTube platforms record millions of visits per month. But it is not just its reach but also its structure which makes PeerTube worth investigating. With PeerTube, individuals or organisations can create their own video platforms where they set the rules for content, moderation and user registration. This is essential for far-right and conspiracy groups and individuals who, according to previous ISD research, prefer audiovisual platforms to other types, such as micro-blogging services. PeerTube is a particularly valuable tool since it is more technologically demanding to host and access audiovisual materials than text files. In contrast to centralized platforms such as YouTube, PeerTube content is managed separately by so-called instances - this refers to the small-scale video platforms created with PeerTube software. Different instances can network with each other and form federations. This allows videos that have been uploaded on one instance to be played on another instance without having to change the website. PeerTube belongs to the so-called Fediverse, which will be discussed in more detail below. Another difference to centralized video platforms is that this software uses peer-to-peer technology (P2P), which presumably explains the name. The fact that instances are not managed by large companies, but by individuals or groups at their own expense and with the help of free software, also has implications for their regulation. Key Findings • There is no central moderating authority for managing content. PeerTube offers individuals or groups, whose content has been blocked on centrally managed video platforms for to violating the terms of service, an attractive way of continuing to share their content online. Where it is these groups or individuals who control moderation, content can only be removed from the network by switching off the server. • It is difficult to accurately map the size and connections of the Fediverse. The network is constantly in flux as the relationships between instances can change rapidly due to blocking and follow requests. Instances can also go offline from one day to the next. • The instances used by far-right and conspiracy actors make up only a small fraction of the Fediverse network. They primarily network among themselves. However, some of the instances that were investigated are connected to a wider Fediverse through their own highly networked servers. • The deletion of extremist YouTube channels is not necessarily reflected in the number of account registrations on the corresponding PeerTube instances. PeerTube is rather used as a back-up option for deplatforming. The frequently observed phenomenon that not all users migrate to the new platform can also be observed here. • Instances are often customised in different ways. For example, each instance varies in whether they permit third parties to register for accounts and upload videos. There is no clear correlation between the numbers of accounts, videos and views. However, the most watched videos on relevant instances were mostly created by prominent members of the milieu, which would appear to indicate that persons with a pre-established audience are particularly successful on PeerTube. • The instances selected for the five case studies hosted a lot of content that focused on the COVID-19 pandemic. Another frequent narrative was an alleged conspiracy perpetuated by elites who, according to conspiracy theorists, use events such as the pandemic or Putin's war against Ukraine to further their secret agenda. These findings suggest that PeerTube instances provide safe refuge for disinformation. • Because PeerTube is a piece of software that anyone can access and use in a variety of different ways, state regulation will do little to limit its use by farright extremists. While state agencies can enforce individual aspects of the NetzDG against PeerTube instances, many instances do not have the number of users required to impose reporting obligations or requirements to delete content. Moreover, most content is not hosted with the aim of generating profit, which limits the applicability of both the Facebook Act and the EU's Digital Services Act. • However, PeerTube's community moderation function does allow the community to moderate the use of PeerTube for promoting harmful content. One way of doing this is by isolating extremist instances. Efforts should be undertaken to work with the Fediverse community, i.e. with the server operators and their users, and to develop best practices for identifying and combating extremist activities. This could include further training on how to spot hate speech or setting up a body for reporting extremist instances.

London: Institute for Strategic Dialogue (2023). 44p.

download
Understanding what violent street crime, globalization, and ice cream have in common

By Gary LaFree

In recent years, nutrition researchers have found that ice cream may have as many health benefits as low-fat milk or yoghurt for those with diabetes or at risk of diabetes. Nonetheless, they have resisted reporting this finding to the media, the public, or other researchers. This observation got me thinking about how preconceived assumptions and biases affect social science in general and criminology in particular, are affected by the preconceived assumptions and biases of those who produce them. In this essay, I argue that the production of criminology is a cultural enterprise that reflects the attitudes and values of those who produce it. In my address for the Stockholm Prize, I summarize the main thesis of my Losing Legitimacy book and then discuss two recent projects that were influenced by the idea that strong social institutions reduce criminal behavior. The first examines the impact of the death of Freddie Gray in Baltimore in 2015 on crime and arrest rates. The second examines the impact of globalization on national homicide rates. In both cases, the results were unexpected.

Policy Implications

As scientists, it is critical that we evaluate research based on its theoretical soundness and methodological sophistication rather than whether it fits a currently hot topic or politically popular perspective. Science progresses by the constant process of evaluating theoretical propositions with empirical data—regardless of where those data lead us. Openness about crime and reactions to crime is no less important than honesty about the positive benefits of ice-cream consumption.

Criminology and Public Policy, 2025, 19p.

download
The Role of Antisemitism in the Mobilization to Violence by Extremist and Terrorist Actors, 

By Alexander Ritzmann With contributions by Jean-Yves Camus, Joshua Fisher-Birch, Bulcsú Hunyadi, Jacek Purski and Jakub Woroncow  

• This report explores the role of antisemitism in mobilizing extremist and terrorist actors to violence, focusing on trends and patterns across France, Germany, Hungary, Poland and the United States. It discusses antisemitic narratives, key antisemitic actors, transnational connections, dissemination strategies, and provides policy recommendations. • Antisemitic narratives serve as tools to justify violence across ideological lines, framing Jewish communities and individuals as threats or scapegoats. Rightwing extremists propagate conspiracy theories like the “Great Replacement,” portraying Jews as orchestrating adverse societal change. Islamist extremists often conflate Jewish identity with global oppression, particularly in the Israeli-Palestinian conflict. Left-wing extremists link Jews to capitalism or imperialism, using antizionism to mask antisemitism. These narratives are adapted to local and geopolitical contexts, reinforcing the targeting of Jewish communities and individuals. • The report documents a sharp increase in antisemitic incidents following the October 7, 2023, Hamas attacks and ensuing war. Violent antisemitic rhetoric has spiked in demonstrations and online discourses. Islamist extremist networks, left-wing extremist actors and pro-Palestinian extremist groups have particularly amplified violent antisemitic sentiments under the guise of antizionist rhetoric, sometimes overlapping with traditional right-wing antisemitic themes. • Transnational networks facilitate the spread of antisemitic narratives. Right-wing extremist groups connect online and through events and annual marches, while Islamist extremist groups leverage shared ideological or religious frameworks to justify violence. Left-wing extremist and pro-Palestinian extremist groups maintain operations across Europe and in the U.S., amplifying violent antisemitic narratives. Shared slogans, symbols, and coordinated protests underline their interconnectedness. • In some countries, an increase in violent attacks against Jewish or Israeli targets has been documented. • The report emphasizes that the concept of combatting organized antisemitism should be added to strategies that aim at targeting violence-oriented antisemitic actors. Such professional organized antisemitic actors often operate in (transnational) networks, utilizing online platforms and offline activities to propagate hate and justify or conduct violence. • The report also calls attention to the role of states like the Islamic Republic of Iran and the Russian Federation in fostering violent antisemitism through proxies and propaganda. • Policy recommendations include focusing on identifying and disrupting key antisemitic actors, enhancing data collection and analysis, and fostering international collaboration. The report also stresses the need for tailored preventative and educational initiatives and stricter online content regulation and enforcement to combat the spread of antisemitism and its violent manifestations. 

Counter Extremism Project, 2025. 153p.

download