Open Access Publisher and Free Library
TERRORISM.jpeg

TERRORISM

Terrorism-Domestic-International-Radicalization-War-Weapons-Trafficking-Crime-Mass Shootings

Posts tagged cybersecurity
Prevent, Detect, and React: A Framework for Countering Violent Extremism on Gaming Surfaces

By Galen Lamphere-Englund

GIFCT hosts Working Groups annually to bring together international experts across sectors to work together in helping tech companies counter terrorist and violent extremist exploitation online. GIFCT's GCoP Working Group ran from May 2024 through January 2025, with the aim of providing a space to share insights and feedback on how gameplay spaces could evolve safety work, review safety policies, tools, and practices, and anticipate evolving safety risks. The following document, Interventions for Countering Violent Extremism on Gaming Surfaces, is a series of explanations that detail various intervention strategies, structured across three stages of Prevent, Detect, and React. Each stage outlines specific interventions that gaming platforms can implement, organized by clearly described objectives (“How”) and supported by real-world examples with links to resources (“Case Studies”). Many thanks to the 2024 GIFCT GCoP members for sharing their expertise, particularly to Linda Schlegel (Peace Research Institute Frankfurt; PRIF) and Rachel Kowert, Ph.D. (Discord) for their helpful suggestions. How to Use This Resource Each section below presents a strategic goal (Prevent, Detect, or React), specific objectives that support that goal (such as “Design Games and Gaming Experiences With User Safety in Mind”), and practical case studies with linked resources. The examples given should be seen as illustrative, not exhaustive. GIFCT’s academic research arm, the Global Network on Extremism and Technology (GNET), regularly shares the latest research related to gaming and gaming-adjacent platforms, which can be found here. Additionally, the Extremism and Gaming Research Network (EGRN), where GIFCT is a founding member, distributes resources here. GIFCT offers tailored guidance and support to any online gameplay company seeking to prevent TVE from exploiting their platform.   

(Washington, D.C.: Global Internet Forum to Counter Terrorism, Year 4 Working Groups. 2025. 28p.

download
Ransomware Analysis: Knowledge Extraction and Classification for Advanced Cyber Threat Intelligence

By Claudia Lanza, Abdelkader Lahmadi, and Jérôme François

This book presents the development of a classification scheme to organize and represent ransomware threat knowledge through the implementation of an innovative methodology centered around the semantic annotation of domain-specific source documentation. By combining principles from computer science, document management, and semantic data processing, the research establishes an innovative framework to organize ransomware data extracted from specialized source texts in a systematic classification system. Through detailed chapters, the book explores the process of applying semantic annotation to a specialized corpus comprising CVE prose descriptions linked to known ransomware threats. This approach not only organizes but also deeply analyzes these descriptions, uncovering patterns and vulnerabilities within ransomware operations. The book presents a pioneering methodology that integrates CVE descriptions with ATT&CK frameworks, significantly refining the granularity of threat intelligence. The insights gained from a pattern-based analysis of vulnerability-related documentation are structured into a hierarchical model within an ontology framework, enhancing the capability for predictive operations. This model prepares cybersecurity professionals to anticipate and mitigate risks associated with new vulnerabilities as they are cataloged in the CVE list, by identifying recurrent characteristics tied to specific ransomware and related vulnerabilities. With real-world examples, this book empowers its readers to implement these methodologies in their environments, leading to improved prediction and prevention strategies in the face of growing ransomware challenges.

Boca Raton, FL: CRC Press, 2024. 113p.

download