Skip to main content
University of Nebraska at Omaha logo University of Nebraska at Omaha
REQUEST INFO VISIT APPLY

MY UNO DIRECTORY
University of Nebraska at Omaha logo
A U.S. Department of Homeland Security Center of Excellence National Counterterrorism Innovation, Technology, and Education Center (NCITE)
REQUEST INFO VISIT APPLY
MY UNO DIRECTORY
  • About Backback to Main menu
    • We Are NCITE
    • Newsletters
    • Our Community
    • Center Directory
  • Research Backback to Main menu
    • NCITE Research
    • Published Reports
    • Notice of Funding Opportunity (NOFO)
  • News Backback to Main menu
    • News Center
    • NCITE in the News
  • Rapid Reports Backback to Main menu
    • Iran-Aligned Foreign Terrorist Organizations (FTOs)
    • 764: Federal & State Charges
    • Nihilistic Violent Extremism (NVE)
  • Events Backback to Main menu
    • Upcoming Events
    • ENVISION Conference
  • Get Involved Backback to Main menu
    • Donate to NCITE
    • Job Opportunities
  • Podcast

National Counterterrorism Innovation, Technology, and Education Center (NCITE) News

Tuesday, March 03, 2026
  1. UNO
  2. National Counterterrorism Innovation, Technology, and Education Center (NCITE)
  3. News
indextrue177135990103395799870News CenterGet the latest updates from the National Counterterrorism Innovation, Technology, and Education (NCITE) Center.Get the latest updates from the National Counterterrorism Innovation, Technology, and Education (NCITE) Center.1462078800000NCITE News and Events/news/indexNCITEsite://NCITE/news/indexjmccahill15929207551507490061717725849351491671429600000
News ReleaseNoNoYesYes1772431200000In response to the escalating U.S.–Israel–Iran conflict, NCITE has developed a rapid report examining Iran-aligned, newly-designated Foreign Terrorist Organizations (FTOs)./news/2026/03/iran-fto-article-image.pngnavigationYessite://NCITE/news/2026/03/iran-fto-article-image.pngNCITEiran-fto-article-image.png86760750003334An image of the first page of the NCITE rapid report with an NCITE background logo on either side. ///YouTube

In response to the escalating U.S.–Israel–Iran conflict, NCITE has developed a rapid report examining Iran-aligned, newly-designated Foreign Terrorist Organizations (FTOs). As the Department of Homeland Security’s Center of Excellence focused on counterterrorism, NCITE developed the report to support policymakers, law enforcement, and homeland security partners navigating the current security environment.

The FTOs profiled include:

  • Harakat Ansar Allah al-Awfiya
  • Harakat Hezbollah al-Nujaba
  • Kata’ib Sayyid al-Shuhada
  • Kata’ib al-Imam Ali
  • Ansar Allah (Houthis)

Beyond these profiles, the report examines the tactics and capabilities of the Iran-backed Axis of Resistance and the implications for U.S. homeland security and defense.


Further Resources

For further context, see items below from the NCITE repository. 

On Homegrown Violent Extremism (HVE)

Homegrown: U.S. Federal Cases Against ISIS (2014-2025)

  • This NCITE report analyzes 272 U.S. federal ISIS-related cases from 2014–2025, illustrating the scope, demographics, and legal outcomes of ISIS-linked activity in the United States.

On Hezbollah

The Mapping Militants Project, helmed by NCITE consortium experts Martha Crenshaw, Ph.D., and Kaitlyn Robinson, Ph.D., updated their profile on the Lebanon-based foreign terrorist organization Hezbollah in early 2026. In October 2024, Crenshaw recorded a podcast with NCITE on the group's history, drawing from over four decades of experience researching in the counterterrorism field.

On Malign Use of Drones

Read two articles below from NCITE's research into malign exploitation of unmanned aerial systems (UAS). 

The Logic of Terrorist Use of Unmanned Aerial Systems, Enabling Factors, and Barriers to Exploitation

  • Drones provide versatile operational capabilities across the terrorist ecosystem today
  • Terrorists value drones for disruption, precision, and reputational signaling effects
  • Adoption driven by network diffusion, affordability, and commercial accessibility
  • Barriers remain but continue weakening as technology advances globally
  • Enabling conditions suggest sustained growth in terrorist drone threats
Risk Factors in Terrorist Use of Unmanned Aerial Systems
  • Drones exploit aerial vulnerabilities bypassing traditional ground-based security measures
  • Military installations and critical infrastructure frequently targeted by drone attacks
  • Open spaces and exposed buildings remain highly susceptible to intrusion
  • Infrastructure sectors risk cascading disruptions from coordinated drone attacks
  • Proactive geospatial risk mapping essential for effective counter-UAS strategies

On Feb. 3, NCITE hosted a webinar on the widespread adoption of drones by Mexican cartel forces and the robust supply chains that support these operations. Read the key takeaways from the team's panelists, Austin Doctor, Ph.D., Joel Elson, Ph.D., and Suat Cubukcu, Ph.D., and watch a recording below.

/
////YouTube/////YouTube//https://www.ketv.com/article/local-insight-on-the-new-orleans-terror-attack/63317342//No
/news/2026/03/homegrown-ve-landing-pagedepartmentphone4025542972emailncite@unomaha.educategoryMediaResearchlocationevent-startsevent-endssite://NCITE/news/2026/03/homegrown-ve-landing-pageNCITEhomegrown-ve-landing-pageProsecuting 764: An Examination of Federal and State ChargesNCITE Briefing — Iran-Aligned Newly Designated FTO'sIn response to the escalating U.S.–Israel–Iran conflict, NCITE has developed a rapid report examining Iran-aligned, newly-designated Foreign Terrorist Organizations (FTOs).Iran, homegrown violent extremism, Hamas, Hezbollah, FTONCITE CommunicationsIn response to the escalating U.S.–Israel–Iran conflict, NCITE has developed a rapid report examining Iran-aligned, newly-designated Foreign Terrorist Organizations (FTOs).Mar 2, 2026 3:00 PM
News ReleaseNoNoYesYes1770789600000On Feb. 3, NCITE hosted a webinar on the widespread adoption of drones by Mexican cartel forces and the robust supply chains that support these operations. See below for a recording and key takeaways.//news/2026/02/cartel-supply-chains-flyer.pngnavigationYessite://NCITE/news/2026/02/cartel-supply-chains-flyer.pngNCITEcartel-supply-chains-flyer.png1482111200800A flyer for the event, with the date and time on the left-hand side and drone imagery, a soldier, and tracking app illustrations on the right. /news/2026/02/img/cartel-drone-supply-chain-1200x800.pngnavigationYessite://NCITE/news/2026/02/img/cartel-drone-supply-chain-1200x800.pngNCITEcartel-drone-supply-chain-1200x800.png637881200800Infographic titled “Cartel Drone Supply Chains” showing a left-to-right process flow: Source → Make → Deliver → Deploy → Return. Under “Source” are the activities: Purchase, Steal, Receive, Code. Under “Make” are: Manufacture, Build, Modify, Test. “Deliver” is illustrated with a delivery truck icon. “Deploy” is illustrated with multiple drones in flight. “Return” is shown with a circular arrow icon. Between Source and Make, and between Make and Deliver, are pause symbols labeled “Deliver?” indicating potential intervention points. Below the main process flow are two horizontal bars labeled “Plan” and “Enable,” indicating overarching processes that support all stages./news/2026/02/img/cartel-drones-snip.pngnavigationYessite://NCITE/news/2026/02/img/cartel-drones-snip.pngNCITEcartel-drones-snip.png6480331200800The three panelists appear on Zoom in gallery view, with Joel Elson in the upper left, Austin Doctor to his right, and Suat Cubukcu in the middle. YouTube

On Feb. 3, NCITE hosted a webinar on the widespread adoption of drones by Mexican cartel forces and the robust supply chains that support these operations. Read below for key takeaways.

Because cartels treat drones as commodities, the traditional counter UAS focus – detection and tactical defeat – is insufficient to tackle the problem. That’s where NCITE is stepping in to provide value: to identify the points at which cartels depend on commercial markets, logistical networks, and technical expertise.

The three panelists are members of the NCITE research team working to characterize emerging patterns in malign UAS supply chains and identify related implications for homeland security and homeland defense. The panelists included:

  • Austin Doctor, Ph.D., NCITE director of strategic initiatives
  • Joel Elson, Ph.D., NCITE director of IS&T research initiatives
  • Suat Cubukcu, Ph.D., Towson University, director of the Integrated Homeland Security Management Program
Based on their findings, the team has published a two-page rapid report on the prevalence of attacks from 2021-2025: Mapping Weaponized Drone Attacks Attributed to Mexican Drug Cartels, 2021-2025.


Key Takeaways

Cartels are leaders in malign drone usage. While cartels began ramping up drone usage in the early 2020s, they have quickly established themselves as highly sophisticated and prolific users. The team identified 221 drone-involved cartel attacks from 2020–2025, accounting for roughly 13% of drone attacks globally conducted by FTO-designated organizations.

  • Cubukcu noted that drone usage by other FTOs and in the war in Ukraine has served as useful case studies for cartels.
  • “Air power is no longer monopolized by states,” Cubukcu said. “The state hegemony in the air domain is pretty much evaporated, especially [with] small drones.”

Commercial availability and innovation are key to the supply chain. The same drone models and tactics are showing up across unrelated conflicts and groups, which underscores that drone markets shape malign use capabilities. Elson noted three commercial technology buckets that cartels are sourcing:

  1. Devices – immediately operational, off-the-shelf products
  2. Components – hardware customizations like motors, sensors, batteries, flight controllers
  3. Parasites – software, firmware, and payloads that piggy-back on systems
  • New technologies, like low earth orbit (LEO) satellites (enabling remote global access) and AI-enabled autonomy, will greatly enhance cartel operations. “If we want to disrupt military drone use, we need to disrupt the systems that make it repeatable, not just the drone itself in the air,” Elson said.

NCITE's new adapted framework: M-SCOR UAS. NCITE’s team has adapted the Supply Chain Operations Reference (SCOR) model into the Malign Supply Chain Operations Reference for UAS model (M-SCOR UAS). It defines four core processes (as pictured above): Source, Make, Deliver, and Return, and two metaprocesses, Plan and Enable, allowing analysts to identify the flow of resources, where decision points happen, and where disruption opportunities exist.

  • “At every stage in our M-SCOR model here, it presents a different opportunity for intervention,” Elson said.

Drones are being institutionalized into operations. Mexican law enforcement raids on Cartel Jalisco Nueva Generación (CJNG) have uncovered workshops focused on drone modification, and the group is also deploying dedicated drone operators. In March 2024, another FTO, La Nueva Familia Michoacana, conducted a 72-hour drone campaign in multiple cities, dropping 40+ explosives to intimidate and force displacement of civilians.

  • Doctor said that, based on publicly available numbers from DHS, there were tens of thousands of drone flights tracked near the border in 2025. “Each of those operations are supported by thousands of unique, individual drone units," Doctor said, “and I think that really reflects the fact that there are relatively few limitations.”
  • Doctor reiterated the ease with which cartels can source drone components. “If we're comparing drones to the acquisition of firearms, for example, there are relatively fewer limitations to what these operators can actually source through relatively normal retail means,” Doctor said.

About the Panelists

Austin Doctor, Ph.D.

Austin Doctor, Ph.D., is the NCITE director of strategic initiatives and an associate professor at the University of Nebraska at Omaha. His research focuses on emerging threats, domestic and international terrorism, irregular warfare, and violent non-state actors.

He earned his Ph.D. from the School of Public and International Affairs at the University of Georgia.

Joel Elson, Ph.D.

Joel Elson, Ph.D., is the NCITE director of information science and technology research initiatives and is an assistant professor in the College of Information Science and Technology at the University of Nebraska at Omaha. Dr. Elson's research integrates human-centered computing with terrorism studies, focusing on innovation, collaboration, and decision-making within computer-mediated and mixed-initiative teams.

His research aims to produce both foundational and applied knowledge to enhance societal security and promote socially responsible technology use. His scholarly contributions address two key areas: preventing malicious uses of information technology and advancing beneficial technological applications to enhance human well-being and protect communities and national security.

Suat Cubukcu, Ph.D.

Suat Cubukcu, Ph.D., is the director of the Integrated Homeland Security Management Program and assistant professor of criminal justice at Towson University. He has extensively studied terrorism, extremism, policing, and methodological issues in data collection. His recent work examines the malign use of unmanned systems as well as their applications for homeland security purposes.

Prior to joining Towson in 2022, he was a professorial lecturer at American University. He has professional field experience in law enforcement and peacekeeping operations of the United Nations. He has engaged with government leaders and officers from many different countries during his career and gained insight into their challenges, which he has since integrated into his research. In 2019, he received a grant from NATO to organize an Advanced Research Workshop on ISIS. He served as a consultant senior researcher responsible for analyzing terrorist incidents for the U.S. State Department’s Country Reports on Terrorism.

Right/
///No
/news/2026/02/webinar-recap-cartel-supply-chainsdepartmentphone4025542972emailncite@unomaha.educategoryCollege of Information Science and TechnologyResearchCollege of Arts and Scienceslocationevent-startsevent-endssite://NCITE/news/2026/02/webinar-recap-cartel-supply-chainsNCITEwebinar-recap-cartel-supply-chainsWEBINAR RECAP: Non-State Special Operations With Craig WhitesideWEBINAR RECAP: Cartel Drone Operations & Related Supply ChainsOn Feb. 3, NCITE hosted a webinar on the widespread adoption of drones by Mexican cartel forces and the robust supply chains that support these operations.cartels, UAS, drones, FTOsNCITE CommunicationsOn Feb. 3, NCITE hosted a webinar on the widespread adoption of drones by Mexican cartel forces and the robust supply chains that support these operations.Feb 11, 2026 12:00 AM
News ReleaseNoNoYesYes1769752800000On Jan. 22, NCITE hosted a webinar with Meghann Teubner, assistant commissioner of intelligence analysis in the Intelligence Division of the NYPD Intelligence and Counterterrorism Bureau, on ISIS cases in the United States./news/2026/01/teubner-webinar-flyer.pngnavigationYessite://NCITE/news/2026/01/teubner-webinar-flyer.pngNCITEteubner-webinar-flyer.png3223971200800A flyer for the event, with the date and time on the left-hand side and a black and white headshot of Teubner on the right.///YouTube

On Jan. 22, NCITE hosted a webinar with Meghann Teubner, assistant commissioner of intelligence analysis in the Intelligence Division of the NYPD Intelligence and Counterterrorism Bureau, on ISIS cases in the United States and the NYPDs approach to countering the threat.

During the webinar, NCITE released new research on ten years of data regarding U.S.–based individuals arrested for support of ISIS. The event was moderated by Seamus Hughes, NCITE senior research faculty and policy associate.

A recording of the webinar is available upon request to ncite@unomaha.edu. 


Key Takeaways

ISIS inspiration is prevalent. In 2025, over half of the NYPD’s 29 counterterrorism arrests and disruptions (spread across eight states and five countries) were at least partially motivated by some form of violent jihadi ideology.  

  • Teubner noted several cases from 2025, including arrests in Texas and North Carolina, of ISIS-inspired individuals motivated to conduct attacks inside the U.S.  
  • In another case, a man was arrested at Newark airport while waiting to fly overseas to fight for ISIS in coordination with an associate in Seattle and foreign fighters. As ISIS has expanded activity in Africa, Teubner said, there’s been a corresponding rise in American sympathizers traveling to the region.  

ISIS influence is persistent – and trending. Teubner said there has been a surge in sharing content from the Islamic State’s height (2015-2017), including speeches by Abu Mohammad al-Adnani and Abu Bakr al-Baghdadi, instructions on how to build explosives, and videos on how to conduct attacks.  

  • Teubner said ISIS continues to inspire other groups like Al-Qaida in the Arabian Peninsula, which has adopted the Islamic State’s strategy of deploying pithy, English-language videos that encourage violence.  
  • “ISIS, despite losing the caliphate, despite years of counterterrorism pressure, continues to put out propaganda that reaches a wide audience," Teubner said.  
ISIS, despite losing the caliphate, despite years of counterterrorism pressure, continues to put out propaganda that reaches a wide audience. Meghann TeubnerRight

Partnerships are essential for prevention. Teubner is in constant contact with her counterparts at the New York Joint Terrorism Task Force and other federal partners. With an increasingly diverse and anonymized online environment and “the cross pollination between threat actors and narratives”, Teubner stressed the importance of coordinating across sectors.  

  • “It is a landscape that reminds us regularly the importance of partnerships, both across the federal, state, and local mission sets, and with our partners in academia and the private sector, in order to have the right tools to adapt to this evolving threat,” Teubner said.

Nihilistic violent extremism needs more attention. NVE, a recent arrival on the ideology spectrum, is described by the FBI as rooted in “a hatred of society at large” with adherents trying to arrange its collapse by “sowing indiscriminate chaos, destruction, and social instability”. (Read our NVE research). 

Because of its broad appeal, Teubner said, NVE serves as an ideology vector, particularly for perennially online youth. As ISIS and other groups use AI to streamline their propaganda machines, Teubner is concerned that the dangers of NVE-adherent networks like 764 aren’t being discussed enough.  

On the CT Workforce 

Near the end of the webinar, an NCITE student asked for advice on entering the counterterrorism field. Teubner said that while an entry-level job might not be what they want long-term, early career professionals should take opportunities to gain experience and get in the door. 

She also advised being content starting from the bottom. Teubner herself started in the operations center of the National Counterterrorism Center (NCTC), working 12-hour day and night shifts – each two weeks at a time. 

  • “I felt like I had jet lag for nine months,” Teubner said, but that the experience she earned was priceless.
  • “I love that people still want to do this work,” she said.  

About Meghann Teubner

Assistant Commissioner of Intelligence Analysis Meghann Teubner oversees the Intelligence Operations and Analysis Section of the Intelligence Division in the New York City Police Department’s Intelligence and Counterterrorism Bureau. In coordination with her operational counterpart, Assistant Commissioner Teubner ensures integration of intelligence analysis and operational efforts in support of the NYPD’s crime fighting, counterterrorism, counterintelligence, and cyber threat intelligence missions.

In this capacity, Assistant Commissioner Teubner further manages strategic and investigative analysis, production, and dissemination for internal NYPD executives and officers as well as NYPD’s public and private law enforcement and security partners. She previously served as Director of Counterterrorism Intelligence Analysis, leading strategic and tactical analysis on investigations, global terrorism developments and trends, and potential threats to New York City.

Prior to joining the NYPD, Assistant Commissioner Teubner served as an analyst and senior representative at the National Counterterrorism Center (NCTC.) As NCTC’s Senior Representative based in New York, she ensured the integration of effort between NCTC and its federal, state, local, and tribal partners in the Northeast region, facilitating information sharing and collaboration in support of all partners’ counterterrorism missions.

As an analyst in NCTC’s Directorate of Intelligence, Ms. Teubner developed strategic terrorism analysis on al-Qa‘ida-related issues and the evolution of the terrorism threat landscape. Ms. Teubner was recognized with multiple NCTC Director’s Awards and a National Intelligence Certificate of Distinction from the Director of National Intelligence for her dedication and support to NCTC’s mission.

/
///No
/news/2026/01/webinar-recap-teubnerdepartmentphone4025542972emailncite@unomaha.educategoryResearchCollege of Arts and Scienceslocationevent-startsevent-endssite://NCITE/news/2026/01/webinar-recap-teubnerNCITEwebinar-recap-teubnerWEBINAR RECAP: Non-State Special Operations With Craig WhitesideWEBINAR RECAP: Homegrown: ISIS in the U.S. with Meghann TeubnerOn Jan. 22, NCITE hosted a webinar with Meghann Teubner, assistant commissioner of intelligence analysis in the Intelligence Division of the NYPD Intelligence and Counterterrorism Bureau, on ISIS cases in the United States.ISIS, homegrown terrorism, domestic extremismNCITE CommunicationsOn Jan. 22, NCITE hosted a webinar with Meghann Teubner, assistant commissioner of intelligence analysis in the Intelligence Division of the NYPD Intelligence and Counterterrorism Bureau, on ISIS cases in the United States.Jan 30, 2026 12:00 AM
News ReleaseNoNoYesYes1756443600000The online child exploitation network, 764, shares and encourages self-harm and child sexual abuse material. In a new report, NCITE scopes the nature of this growing threat, its structure and ideology, and the latest U.S. federal and state charges against the group. /news/2025/08/img/incel_1200x800.pngnavigationYessite://NCITE/news/2025/08/img/incel_1200x800.pngNCITEincel_1200x800.png13889521200800Artwork depicting a dark room with conspiracy-like posters on the walls and the sole light coming from a computer screen. ///YouTube/////YouTube

US Attorney General Pamela Bondi described the violent extremist network 764 as “one of the most heinous online child exploitation enterprises we have ever encountered – a network built on terror, abuse, and the deliberate targeting of children”.

In December 2025, the FBI reported that it was actively conducting more than 350 investigations connected to 764 and other nihilist violent extremist (NVE) groups, while the number of victims is estimated to reach into the thousands globally and new cases continue to emerge.

Internationally, Canada is the first country to officially designate 764 as a terrorist entity under its Criminal Code thereby granting authorities expanded legal tools to disrupt their activities. In the absence of a similar U.S. designation, prosecutors are limited in the types of charges that can be applied to offenders.  

In a new report on 764, NCITE researchers describe the nature of this emergent threat, including its origin, structure, and ideology, and summarize the current state of federal charges in the U.S. linked to 764. 

Collaborating NCITE Research Teams:

  • Youth Mobilization
    Rottweiler, B. (PI), Clemmow, C. (co-PI), & Doctor, A. (co-PI)
  • Prosecuting Illicit Threat Actors
    Hughes, S. (PI) & Harms, M. (co-PI)



Nature of the Threat

764 is an emerging threat that primarily employs sextortion tactics, including coercion, psychological manipulation, and enticement commonly leading to an escalating and self-perpetuating cycle of harm. Members deliberately target young and often vulnerable individuals on publicly available platforms, coercing them into recording or live-streaming acts of self-harm and sexually explicit behavior, including the production of child sexual abuse material (CSAM).

Both the victims and perpetrators of 764 tend to be young. Victims are typically aged between 11 and 17, although cases involving children as young as 6 have been reported while most perpetrators are under the age of 25, many are under the age of 18.  

Unlike traditional extremist groups that are motivated by some political, religious, or ideological goals, individuals involved in 764 appear to be driven mainly by a fascination with violence and a deep hostility toward society. Their actions are often less about advancing a clear cause and more about gaining status and recognition within online communities that glorify harm and social breakdown. 

This presents new challenges to U.S. law enforcement and prosecutors seeking to deter and disrupt the network, which presents unique challenges to traditional systems used to counter more conventional violent extremist organizations.

In response, NCITE researchers constructed a dataset comprising criminal charges, federal and state, in connection with 764 (and NVE more broadly) as part of a larger research portfolio examining emerging threats. The research team is examining the mobilization pathways of 764 members and challenges faced by law enforcement and prosecutors seeking to disrupt and dismantle the network. NCITE is working closely with end-users across the counterterrorism workforce to translate the research for practice. 

Methodology

The report is based upon an open-source database constructed by NCITE. Cases were identified through systematic searches of news reporting, court filings, press releases, and public law enforcement statements.

Once potential cases were identified, links to 764 or NVE more broadly were confirmed by reviewing official state and federal court records and charging dockets. Federal and, where applicable, state, court records were collected and reviewed for all cases that met our inclusion criteria. Charges, cases status, and sentencing outcomes were coded and are described below.  

Federal Cases

There have been 31 individuals publicly charged with federal crimes related to membership in 764 and precursor groups, CVLT and Greggy’s Cult. Of those, 22 cases were specifically linked to 764. Federally, the youngest member of 764 charged was 18 years old. 82% of 764 members who received federal charges were under the age of 25 years at the time of arrest. All individuals charged across 764, CVLT, and Greggy’s Cult were male. 

The first federal indictment of a 764 member was in 2021. Three additional 764 members were federally indicted in 2023. All remaining federal indictments related to 764 occurred in 2024 and 2025. Over half of all 764 federal indictments were in 2025 – a 350% increase compared to 2024. All federal indictments in the U.S. related to CVLT and Greggy’s Cult occurred between January 2025 and December 2025, though their primary activity occurred between 2019 and 2021. 

764, CVLT, and Greggy’s Cult members received 157 federal charges related to 20 criminal offenses. The most common criminal statute 764 defendants were charged with was the possession of or access with intent to view child pornography (18 U.S.C. §§ 2252(a)(4)(b) and (b)(2)) (70%), while the most common criminal statute CVLT and Greggy’s Cult defendants were charged with was participation in a child exploitation enterprise (18 U.S.C. §§ 2252A(g)) (100%).  

Examining the number of counts of a given offense can illuminate the magnitude of such offenses above and beyond the number of defendants charged with those offenses. Across the 157 counts applied to 764, CVLT, and Greggy’s Cult cases, the most frequent charges were for the exchange (distribution or receipt) of child pornography (18 U.S.C. §§ 2252(a)(2) and (b)(1)), followed by charges for the possession of or access with intent to view child pornography (18 U.S.C. §§ 2252(a)(4)(B) and (b)(2)). 

Across all charges, 59% (93) were for offenses related to child sexual abuse material. 19% (30) were related to the coercion, enticement, and sexual exploitation of a minor. 10% (16) of charges included a conspiracy enhancement, referring to offenses that involved more than one perpetrator. 

Full results and implications of the charges are outlined in the full report. 




Additional Resources

For more on Nihilistic Violent Extremism (NVE), check out NCITE's NVE landing page published in August following the NVE-inspired attack on the Annunciation Catholic School Church in Minneapolis. 

NCITE Insights — On 764

Listen to Seamus Hughes, NCITE senior research faculty and policy associate, discuss 764, the neo-Nazi, satanic, largely NVE-inspired online community.


NCITE Insights — On NVE, Youth Recruitment and Mobilization

Listen to NCITE researchers Bettina Rottweiler, Ph.D., and Brenna Helm, ABD, discuss their burgeoning research on NVE and youth recruitment and mobilization to violent extremism. Read more about the research project. 

 

 

/
////YouTube//https://www.ketv.com/article/local-insight-on-the-new-orleans-terror-attack/63317342//No
/news/2025/12/764-landing-pagedepartmentphone4025546423emailncite@unomaha.educategoryMedialocationevent-startsevent-endssite://NCITE/news/2025/12/764-landing-pageNCITE764-landing-pageProsecuting 764: An Examination of Federal and State ChargesProsecuting 764: An Examination of Federal and State ChargesThe online child exploitation network, 764, shares and encourages self-harm and child sexual abuse material. In a new report, NCITE scopes the nature of this growing threat, its structure and ideology, and the latest U.S. federal and state charges against the group. 764, child abuse, online extremism, nihilistic violent extremism, NVEThe online child exploitation network, 764, shares and encourages self-harm and child sexual abuse material. In a new report, NCITE scopes the nature of this growing threat, its structure and ideology, and the latest U.S. federal and state charges against the group. Aug 29, 2025 3:00 PM
Extras
News ReleaseNoNoYesYes1763100000000On the latest episode of the podcast, listen in to a conversation with Jake Braun, author of the new book, "Fentanyl: Fighting the Mass Poisoning of America and the Cartel Behind It."/news/2025/11/img/cascade-version.pngnavigationYessite://NCITE/news/2025/11/img/cascade-version.pngNCITEcascade-version.png4085551200800Guest Jake Braun (right), author of the new book, "Fentanyl: Fighting the Mass Poisoning of America and the Cartel Behind It."A headshot of guest Jake Braun is on the right, with his new book, "Fentanyl: Fighting the Mass Poisoning of America and the Cartel Behind It", superimposed to his left, with the NCITE podcast logo and episode title text.///YouTube

"The thing that people don't get about fentanyl is that almost no one seeks it ... most people who use drugs are avoiding fentanyl like the plague."

NCITE Assistant Research Professor Alex Bruens, Ph.D., sits down with Jake Braun, member of the NCITE expert consortium and author of the new book, "Fentanyl: Fighting the Mass Poisoning of America and the Cartel Behind It." They discuss how the drug created a health crisis in the United States, the Mexican drug cartels (led by Sinaloa) developing the drug, the progress that has been made to combat its manufacture and dissemination, and what remains to be done to fight the health crisis.

About Jake Braun

Braun is the executive director of the Cyber Policy Initiative at the University of Chicago Harris School of Public Policy. He is also the CEO of Cambridge Global Advisors and served in the White House for over seven years in several capacities, including as the Acting Principal Deputy National Cyber Director and White House Liaison to the Department of Homeland Security. He holds an M.A. in both international relations and education and grew up in Omaha, NE. Inquiries regarding the book can be sent to jakebraun@uchicago.edu.

Inquiries for Bruens can be sent to ncite@unomaha.edu.


Disclaimer: The views and conclusions contained in this podcast are those of the authors and should not be interpreted as necessarily representing the official policies or views, either expressed or implied, of the U.S. Department of Homeland Security, the University of Nebraska, or guest-affiliated institutions.

Listen and subscribe to NCITE Insights on major podcast platforms:

  • Apple Podcasts
  • Podbean
  • Spotify
/
///No
/news/2025/11/podcast-ep-40-braun-bruensdepartmentphone4025546422emailncite@unomaha.educategoryResearchlocationevent-startsevent-endssite://NCITE/news/2025/11/podcast-ep-40-braun-bruensNCITEpodcast-ep-40-braun-bruensNCITE Insights No. 40 — Fighting Fentanyl: A Book Talk with Jake BraunNCITE Insights No. 40 — Fighting Fentanyl: A Book Talk with Jake BraunOn the latest episode of the podcast, listen in to a conversation with Jake Braun, author of the new book, "Fentanyl: Fighting the Mass Poisoning of America and the Cartel Behind It."Cartels, Sinaloa, fentanyl, drug trafficking, overdoseNCITE CommunicationsOn the latest episode of the podcast, listen in to a conversation with Jake Braun, author of the new book, "Fentanyl: Fighting the Mass Poisoning of America and the Cartel Behind It."Nov 14, 2025 12:00 AM
News ReleaseNoNoYesYes1756184400000On Aug. 20, NCITE hosted a webinar on the new book, "Non-State Special Operations; Capabilities and Effects" with author Craig Whiteside, LTC, USA (ret), Ph.D./news/images/still_1200x800.pngnavigationYessite://NCITE/news/images/still_1200x800.pngNCITEstill_1200x800.png5423741200800Guest Crag Whiteside, Ph.D., (right) speaks with Austin Doctor, Ph.D. (left), via a Zoom webinar. Guest Crag Whiteside, Ph.D. (right), speaks with Austin Doctor, Ph.D. (left), via a Zoom webinar. Whiteside's background includes a window, while behind Doctor is a bookshelf and NCITE artwork.///YouTube

On Aug. 20, NCITE hosted a webinar on the new book, "Non-State Special Operations; Capabilities and Effects" with author Craig Whiteside, LTC, USA (ret), Ph.D. In a conversation moderated by Austin Doctor, Ph.D., NCITE director of strategic initiatives, Whiteside discussed the book's examination of violent non-state actors' (VNSAs) development and execution of special operations.

Whiteside is professor of national security affairs at the US Naval War College resident program at the Naval Postgraduate School in Monterey, California, and co-authored the book with Ian Rice, adjunct senior lecturer in the department of defense analysis at the Naval Postgraduate School. 

 




Key Takeaways

Non-state special operations are similar to state operations — with significant resource limitations.

Whiteside defines a special operation as “a high risk, well-resourced, specialized tactical military action that is a departure from normal tactics and intended to create an outsized strategic or political effect.”

  • Special operations are typically ad hoc with temporary teams, as the cost of sustaining such initiatives is beyond the financial means of most non-state groups.

  • A prime example of special operations, according to Whiteside, were the October 7, 2023 attacks conducted by Hamas against Israel.

They’re relatively rare.

Of about 4,000 violent events committed by the Islamic State from 2007 – 2013, Whiteside and Rice found that only three qualified as special operations. “And that makes sense, because these groups are very risk-averse,” Whiteside said. “They're fighting larger states a lot of times, and so they have to be very careful.”

Groups use special operations as larger campaign transition points.

Concerning the Islamic State, Whiteside said that groups use special operations as part of their “operational art”, or their higher-level strategic sequencing. He made note of the 2012 Haditha raid and the 2013 Abu Ghraib prison breakout as special operations designed to signal the IS “Breaking the Walls” and “Harvest of the Soldiers” campaigns, respectively.

These strategic placements aren’t obvious, Whiteside said. “When I look back, I'm really kind of embarrassed that I spent, you know, a large part of my life studying this group, and yet it took writing this book to be like, oh, wow, these are very oddly timed,” Whiteside said.

Cartels – the newest additions to the U.S. FTO list – fit uniquely into the mold.

Whiteside said that while cartels have similar special operations to militant groups like ISIS – leader targeting, prison breaks – their strategy still surrounds their bottom line.

“Creating a monopoly from the grower to the buyer in a market and then being able to lock down every aspect of that supply chain is really their special operation,” Whiteside said.

“Strategic empathy” is crucial from a countering perspective.

Reflecting on his counterinsurgency experience as a U.S. Army infantry officer in Iraq, Whiteside said that understanding militants’ perspectives is key to predicting tomorrow’s attacks.

“I was humbled by them frequently enough to not just take them seriously,” Whiteside said, “but to understand what they’re trying to do from a strategic, operational, tactical perspective.”

/
///No
/news/2025/08/webinar-recap-whitesidedepartmentphone4025546423emailncite@unomaha.educategoryResearchCollege of Arts and Scienceslocationevent-startsevent-endssite://NCITE/news/2025/08/webinar-recap-whitesideNCITEwebinar-recap-whitesideWEBINAR RECAP: Non-State Special Operations With Craig WhitesideWEBINAR RECAP: Non-State Special Operations With Craig WhitesideOn Aug. 20, NCITE hosted a webinar on the new book, "Non-State Special Operations; Capabilities and Effects" with author Craig Whiteside, LTC, USA (ret), Ph.D.non-state actors, special operations, October 7NCITE CommunicationsOn Aug. 20, NCITE hosted a webinar on the new book, "Non-State Special Operations; Capabilities and Effects" with author Craig Whiteside, LTC, USA (ret), Ph.D.Aug 26, 2025 12:00 AM
News ReleaseNoNoYesYes1754715600000On the latest episode of the podcast, NCITE doctoral student Callie Vitro hosts NCITE research associate Michael Becker, Ph.D. to discuss all things methods./news/images/cascade-thumbnail.pngnavigationYessite://NCITE/news/images/cascade-thumbnail.pngNCITEcascade-thumbnail.png7349071200800NCITE research associate Michael Becker (left) speaks with NCITE criminology doctoral student Callie Vitro (right).On a Zoom gallery screen, NCITE research associate Michael Becker, on the left, speaks with NCITE criminology doctoral student Callie Vitro, on the right. A title card of the episode appears at the bottom, with a top and bottom screen background of a repeating NCITE logo.///YouTube

On the latest episode of the podcast, NCITE doctoral student Callie Vitro hosts NCITE research associate Michael Becker, Ph.D. to discuss all things methods. They cover 1) how they source data, 2) how they process data, and 3) Becker's work on the NCITE geospatial technologies project. To check out the unique data request form generated by Becker and his team, see the YouTube version of this episode (20:23–42). 

Curious to learn more? Email Dr. Becker at mbecker26@nebraska.edu or NCITE at ncite@unomaha.edu.

NOTE — At 3:15, it is the National Incident-Based "Reporting" System (NIBRS), not "Response".  

/
///No
/news/2025/08/podcast-ep-38-vitro-beckerdepartmentphone4025546423emailncite@unomaha.educategoryResearchCollege of Public Affairs and Community Servicelocationevent-startsevent-endssite://NCITE/news/2025/08/podcast-ep-38-vitro-beckerNCITEpodcast-ep-38-vitro-beckerNCITE Insights No. 38 — Methods: The Value of Data-Generating ProcessesNCITE Insights No. 38 — Methods: The Value of Data-Generating ProcessesOn the latest episode of the podcast, NCITE doctoral student Callie Vitro hosts NCITE research associate Michael Becker, Ph.D. to discuss all things methods. methods, data, geospatial technologiesNCITE CommunicationsOn the latest episode of the podcast, NCITE doctoral student Callie Vitro hosts NCITE research associate Michael Becker, Ph.D. to discuss all things methods.Aug 9, 2025 12:00 AM
/
/
/
UNO News Center/news/indexsite://www/news/indexwwwindexUNO News CenterUNO News CenterMavericks are making news. Follow the latest headlines to learn about our dedication to students, our national recognition for community engagement and Division I athletics, and the opportunities to excel in scholarship and research. Students, faculty, staff, and alumni are changing the landscape of our community every day. Mavericks are making news. Follow the latest headlines to learn about our dedication to students, our national recognition for community engagement and Division I athletics, and the opportunities to excel in scholarship and research. Students, faculty, staff, and alumni are changing the landscape of our community every day. Mavericks are making news. Follow the latest headlines to learn about our dedication to students, our national recognition for community engagement and Division I athletics, and the opportunities to excel in scholarship and research. Students, faculty, staff, and alumni are changing the landscape of our community every day. Jul 2, 2021 12:00 AMhttp:///events/indexnavigationYessite://NCITE/events/indexNCITEindexEventsNCITE Events & Partner EventsList of upcoming and past events for NCITE and partners. http:///http://///Check out events //ENVISION24 - NCITE Annual Conference/events/envision-conferencenavigationYessite://NCITE/events/envision-conferenceNCITEenvision-conferenceNCITE Conference: ENVISIONNCITE ENVISION ConferenceThis is the landing page for ENVISION, NCITE's conference. This is the landing page for ENVISION, the conference for the National Counterterrorism Innovation, Technology and Education (NCITE) Center at the University of Nebraska at Omaha. http:///http:///http:///http:///http://
/
BelowCSS/http://

Featured

An image of the first page of the NCITE rapid report with an NCITE background logo on either side.

NCITE Briefing — Iran-Aligned Newly Designated FTO's

In response to the escalating U.S.–Israel–Iran conflict, NCITE has developed a rapid report examining Iran-aligned, newly-designated Foreign Terrorist Organizations (FTOs).

A flyer for the event, with the date and time on the left-hand side and drone imagery, a soldier, and tracking app illustrations on the right.

WEBINAR RECAP: Cartel Drone Operations & Related Supply Chains

On Feb. 3, NCITE hosted a webinar on the widespread adoption of drones by Mexican cartel forces and the robust supply chains that support these operations.

A flyer for the event, with the date and time on the left-hand side and a black and white headshot of Teubner on the right.

WEBINAR RECAP: Homegrown: ISIS in the U.S. with Meghann Teubner

On Jan. 22, NCITE hosted a webinar with Meghann Teubner, assistant commissioner of intelligence analysis in the Intelligence Division of the NYPD Intelligence and Counterterrorism Bureau, on ISIS cases in the United States.

Artwork depicting a dark room with conspiracy-like posters on the walls and the sole light coming from a computer screen.

Prosecuting 764: An Examination of Federal and State Charges

The online child exploitation network, 764, shares and encourages self-harm and child sexual abuse material. In a new report, NCITE scopes the nature of this growing threat, its structure and ideology, and the latest U.S. federal and state charges against the group.

Extras

more
A headshot of guest Jake Braun is on the right, with his new book, "Fentanyl: Fighting the Mass Poisoning of America and the Cartel Behind It", superimposed to his left, with the NCITE podcast logo and episode title text.

NCITE Insights No. 40 — Fighting Fentanyl: A Book Talk with Jake Braun

On the latest episode of the podcast, listen in to a conversation with Jake Braun, author of the new book, "Fentanyl: Fighting the Mass Poisoning of America and the Cartel Behind It."

Guest Crag Whiteside, Ph.D. (right), speaks with Austin Doctor, Ph.D. (left), via a Zoom webinar. Whiteside's background includes a window, while behind Doctor is a bookshelf and NCITE artwork.

WEBINAR RECAP: Non-State Special Operations With Craig Whiteside

On Aug. 20, NCITE hosted a webinar on the new book, "Non-State Special Operations; Capabilities and Effects" with author Craig Whiteside, LTC, USA (ret), Ph.D.

On a Zoom gallery screen, NCITE research associate Michael Becker, on the left, speaks with NCITE criminology doctoral student Callie Vitro, on the right. A title card of the episode appears at the bottom, with a top and bottom screen background of a repeating NCITE logo.

NCITE Insights No. 38 — Methods: The Value of Data-Generating Processes

On the latest episode of the podcast, NCITE doctoral student Callie Vitro hosts NCITE research associate Michael Becker, Ph.D. to discuss all things methods.

UNO News Center

  • UNO News Center
  • NCITE Events & Partner Events

Events

view more

ENVISION24 - NCITE Annual Conference

  • NCITE ENVISION Conference

National Counterterrorism Innovation, Technology, and Education Center (NCITE)

Connect with NCITE
  • 6001 Dodge St.
  • Omaha, NE
  • ncite@unomaha.edu
Social media
Our DHS Partners
  • Centers of Excellence
  • Science & Technology Directorate (S&T)
  • Office of University Programs (OUP)
U.S. Department of Homeland Security Science and Technology Grant Acknowledgement and Disclaimer. The material on this website is based on work supported by the U.S. Department of Homeland Security under Grant Award Number 20STTPC00001-05. The views and conclusions included here are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security.

Services and Resources

  • Academic Calendar
  • Course Catalogs
  • MavCARD Services
  • MavLINK
  • my.unomaha.edu
  • UNO Brand Guide

Related Links

  • A-Z List
  • Employment
  • University of Nebraska System

Campus Links

  • Accessibility
  • Billing Office
  • Buildings and Maps
  • Campus Directory
  • Campus Safety
  • Events
  • Human Resources
  • Library
  • Military-Connected Resource Center
  • News
  • Registrar
  • Samuel Bak Museum: The Learning Center

Policies and Reporting

  • Emergency Information Alert
  • MavsReport
  • Notice of Nondiscrimination
  • NU Foundation
  • Privacy Statement
  • University Policies
  1. Privacy Statement
  2. Accessibility
  1. 402.554.2800

University of Nebraska at Omaha
University of Nebraska at Omaha, 6001 Dodge Street, Omaha, NE, 68182
  • ©  

Social Media


Omaha Skyline

Our Campus. Otherwise Known as Omaha.

The University of Nebraska does not discriminate based on race, color, ethnicity, national origin, sex, pregnancy, sexual orientation, gender identity, religion, disability, age, genetic information, veteran status, marital status, and/or political affiliation in its education programs or activities, including admissions and employment. The University prohibits any form of retaliation taken against anyone for reporting discrimination, harassment, or retaliation for otherwise engaging in protected activity. Read the full statement.