The 764 Network and the Architecture of Digital Nihilism

Hyper-Violent Content, Stochastic Terror, and the New Lone-Wolf Threat

By Etienne Darcas – Rise to Peace

Introduction

In September 2023, the Federal Bureau of Investigation issued a Public Service Announcement about an online network it described as a violent extremist group engaged in sextortion, the production and distribution of child sexual exploitation material, and the systematic psychological destruction of minors. The network was called 764, named after the first three digits of a ZIP code in Stephenville, Texas. What began as a Discord server founded by a fifteen-year-old dropout has since metastasised into what the Department of Justice now classifies as a Tier One investigative matter for the FBI – the same designation reserved for international terrorism.

The 764 network represents something qualitatively different from the extremist threats that have dominated counterterrorism discourse over the past two decades. It is neither jihadist nor conventionally far-right. Its ideological core, if there is one at all, is nihilism. The deliberate destruction of social bonds, psychological wellbeing, and civilisational order through the systematic targeting of vulnerable minors. Canada has designated 764 as a terrorist organisation. The United States has charged multiple members under terrorism statutes. Emerging from gaming platforms, Discord servers, and the open internet, this group represents something qualitatively different to its predecessors, and yet can be linked into a broader swathe of Neo-Nazi Accelerationist movements like Atomwaffen and the Order of 9 Angles. Already, several lone-wolf mass shooters in the past few years have been linked to this group and others.

This article examines the rise of 764 and the broader ecosystem of Nihilistic Violent Extremism (NVE) as a case study in the mainstreaming of hyper-violent content online. It analyses the relationship between these networks and the phenomenon of stochastic terrorism in thee use of mass communication to incite statistically predictable but individually unpredictable acts of violence. Finally, it considers the implications for counterterrorism policy, platform governance, and child protection at a moment when the boundaries between online radicalisation and real-world violence have effectively collapsed.

Origins and Structure of the 764 Network

The 764 network was founded in 2021 by Bradley Chance Cadenhead, a teenage school dropout in Texas who learned techniques of online exploitation and sextortion on a Discord server called CVLT. According to Europol, CVLT was founded by a 23-year-old Indian national studying economics in France who sought to create a space where hatred of Jews and Muslims could be expressed alongside discussions of fascism and nihilism. The networks core principles, as identified by European law enforcement, were nihilism, paedophilia, and neo-Nazism – a tripartite ideology that would become the template for 764 and its offshoots.

Cadenhead met an unknown associate through Minecraft who assisted him in establishing the 764 network. The name itself derives from the first three digits of his local ZIP code. By recruiting members from CVLT and similar spaces, Cadenhead built a community whose admission requirements were based on the quality and notoriety of the content they produced, such as chilling videos of victims carving 764 members names into their bodies, recordings of victims setting themselves on fire, and documentation of escalating psychological and physical abuse.

The network operates primarily on Discord and Telegram, with significant presence on gaming platforms including Roblox and Minecraft. This platforming strategy is deliberate. These spaces are populated by minors, often those already experiencing social isolation or mental health difficulties. FBI documents describe how 764 actors systematically target underage females, especially those already struggling with depression, eating disorders or other mental health issues. The targeting methodology mirrors grooming techniques documented in child sexual exploitation cases, but with an additional dimension, as the ultimate objective is the complete psychological destruction of the victim.

Victims are coerced through escalating demands. Initial contact often establishes trust or romantic attachment. This is followed by requests for compromising material, which is then used as leverage for increasingly severe demands: self-harm, sexual exploitation of siblings, harm to animals, and ultimately suicide. The content produced is circulated among network members as digital currency, traded and archived in encrypted vaults, and then used for recruitment and status within the network.These collections are known as Lorebooks, and their possession marks advancement within the hierarchy.

In April 2025, the Department of Justice arrested two individuals it identified as leaders of 764: Leonidas Varagiannis (alias War), a 21-year-old American residing in Greece, and Prasan Nepal (alias Trippy), a 20-year-old North Carolinian who had helped Cadenhead establish the network. They were charged with operating a global child exploitation enterprise. Court documents allege they exploited at least eight minor victims, some as young as thirteen, across multiple jurisdictions between 2020 and 2025.

Nihilistic Violent Extremism as an Ideological Category

The FBI classifies 764 as a Nihilistic Violent Extremism (NVE) group. This designation reflects a broader recognition within law enforcement and intelligence communities that traditional ideological categories such as jihadism, white supremacism, left-wing extremismare insufficient to capture the threat posed by networks whose primary motivation derives from hatred of society itself rather than commitment to any constructive political programme. As such, they lack the typical markers of traditional ideological grounding in a belief system, or a superstructure of thought about how society should be re-organised, opting instead for violence and destruction itself to be both the means and the end.

NVE groups, as defined by the FBI, engage in criminal conduct in furtherance of political, social, or religious goals that derive primarily from a hatred of society at large and a desire to bring about its collapse by sowing indiscriminate chaos, destruction, and social instability. This framing locates NVE within the broader accelerationist movement: the strategic commitment to hastening civilisational collapse through acts of spectacular violence from which a new order can emerge.

The ideological genealogy is significant. 764 and its offshoots exist within a constellation of networks that includes the Order of Nine Angles (O9A), a neo-Nazi occult movement founded in Britain in the 1970s; the Terrorgram ecosystem, a decentralised network of Telegram channels promoting militant accelerationism; and groups like Atomwaffen Division that have been proscribed as terrorist organisations across multiple jurisdictions. What connects these disparate entities is not a shared positive vision but a shared commitment to destruction as an intrinsic good.

The O9A connection is particularly instructive. O9A ideology prescribes a spiritual path requiring practitioners to break societal taboos through isolation, criminality, political extremism, violence, and what the group terms culling: acts of human sacrifice understood as accelerating spiritual and political transformation. O9A materials, particularly those produced by its American affiliate Tempel ov Blood, contain graphic depictions of child sexual abuse, physical violence, and torture designed to desensitise adherents to extreme violence. These texts have been widely distributed through Terrorgram channels and have directly influenced the operational practices of 764.

The convergence of terrorism content and child sexual exploitation material is structural rather than coincidental. Research by the Global Network on Extremism and Technology has documented that 764 recruitment occurs through communities dedicated to gore content, celebration of mass shooters, and broader extremist milieus. The targeting of children serves dual purposes: it produces exploitative material that functions as both currency and recruitment tool, and it cultivates future perpetrators who have been systematically desensitised to violence. The interpersonal violence and abuse encouraged by these groups is viewed as a necessary prerequisite for larger, public acts of violence by its members thereafter.

The Mainstreaming of Hyper-Violent Content

The 764 network could not exist without the broader normalisation of extreme content online. Its operational model depends on platforms where minors congregate, where moderation is inconsistent or ineffective, and where the boundaries between gaming, social interaction, and exploitation have become porous. Discord, Telegram, Roblox, and Minecraft are not fringe platforms, as they are among the most widely used communication and entertainment services for young people globally.

The gamification of exploitation is a defining characteristic. Members earn status by producing increasingly extreme content. Victims are offered Robux (Robloxs virtual currency) in exchange for self-harm. This transactional logic transforms abuse into a game with clearly defined rules, rewards, and progression mechanics. The victim becomes a resource to be extracted; the content becomes a commodity to be traded.

The psychological mechanisms at work are sophisticated. Initial contact exploits the fundamental human need for connection and validation. Perpetrators identify vulnerable individuals, such as those with existing mental health challenges, family instability, or social isolation and present themselves as understanding friends or romantic interests. The relationship is cultivated through attention, affirmation, and the creation of perceived intimacy. Only once this bond is established do demands begin, initially modest, then escalating. By the time victims recognise the trap, compromising material already exists and is being used as leverage. The victims shame becomes a weapon. Their fear of exposure makes them compliant. Their compliance generates more material.

Platform architecture facilitates these dynamics. Discords server structure allows for the creation of invite-only spaces that can evade content moderation. Telegrams encryption and minimal moderation have made it the preferred platform for accelerationist networks globally, while also easily splintering into dozens of sub-channels and groups. Gaming platforms designed to foster community among young people become vectors for exploitation precisely because they create spaces of trust and belonging that predators can infiltrate and subvert.

The challenge for platform governance is structural. Senator Mark Warner, in correspondence with Discord, noted that despite increased moderation, predators continue to target minors on your platform. The whack-a-mole dynamic of content moderation removing channels only to see them reconstitute under new names has proven inadequate to the scale of the threat. 764 itself has dissolved and reformed multiple times under names including 676, CVLT, Court, Kaskar, Harm Nation, Leak Society, and H3ll. Researchers now use 764 as an umbrella term for the broader ecosystem precisely because the networks structure is designed to survive disruption.

Stochastic Terrorism and the Lone-Wolf Model

The 764 network and its associated ecosystem represent a particularly sophisticated application of stochastic terrorism in the use of mass communication to incite violence that is statistically predictable in aggregate but individually unpredictable in its specific manifestation. The term entered security discourse in the 2010s to describe a circuit of communication involving originators who produce inciting content, amplifiers who distribute it, and receivers who may act on it, even in the absence of explicit directives.

The lone-wolf terrorism model has become the dominant form of political violence in Western democracies. Data from the Institute for Economics and Peace indicates that 93 percent of fatal terrorist attacks in the West over the past five years have been carried out by lone actors. The 2024 Global Terrorism Index recorded 52 terrorist incidents in Western countries, up from 32 the previous year. In the overwhelming majority of these cases, investigators found no direct link to organised terrorist groups.

Two trends within this pattern are particularly concerning. First, attackers are becoming progressively younger. In 2024, nearly two-thirds of ISIS-linked arrests in Europe involved teenagers. In the United Kingdom, one in five terror suspects is now under eighteen. Similar patterns have been documented in Australia, Austria, and France. Second, the radicalisation timeline has compressed dramatically. In 2002, it took an average of sixteen months for an individual to move from initial exposure to extremist material to executing an attack. By recent estimates, this period has shortened to months or even weeks.

This acceleration is facilitated by the algorithmic architecture of online platforms. Recommendation systems designed to maximise engagement can create radicalisation pipelines that deliver increasingly extreme content to users who have shown interest in related material. A teenager researching school shootings for a class project may find themselves served content glorifying perpetrators. A young person struggling with depression may encounter communities that reframe self-harm as empowerment. The path from curiosity to immersion can be measured in hours rather than months. The 764 ecosystem exploits these dynamics deliberately, positioning itself at the intersection of gaming communities, mental health support spaces, and fringe political forums where vulnerable individuals can be identified and targeted.

The 764 ecosystem represents the industrial application of these dynamics. It combines radicalisation infrastructure (communities that normalise extreme violence), operational instruction (techniques for targeting and exploiting victims), and social reinforcement (status systems that reward escalation) into an integrated pipeline. The goal, as articulated in FBI assessments, is not merely to produce exploitative content but to cultivate individuals who have been so thoroughly desensitised to violence that they become capable of executing real-world attacks.

The terrorism charges filed against 764 member Baron Martin illustrate this trajectory. Martin, an Arizona teenager, allegedly published guides on grooming and extortion, ran group chats that coerced minors into extreme acts, and attempted to hire someone to murder a victims grandmother. He called himself the ‘King of Extortion’. His 29-count indictment includes charges of conspiring to provide material support to terrorists and murder-for-hire. As one investigator observed, Martin looked like an average kid, just a gangly, skinny kid, but his looks were deceiving.

The connection between online exploitation networks and conventional terrorism is not metaphorical. The Terrorgram Collective, now designated as a terrorist organisation by the United States, United Kingdom, Australia, Canada, and New Zealand, has been linked to approximately three dozen criminal cases globally, including at least three mass shootings. In April 2025, a Wisconsin teenager who allegedly murdered his parents and plotted to assassinate President Trump was found to have been active in Terrorgram channels and to have cited materials produced by the network. He had been, in the assessment of one analyst, groomed to take drastic terrorist action in an accelerationist manner.

Implications for Policy and Response

The 764 network and the broader NVE ecosystem present challenges that cut across traditional institutional boundaries. The phenomenon is simultaneously a child protection issue, a counterterrorism concern, a platform governance problem, and a public health matter. No single agency or framework is adequate to the threat. In all this, there is also room for analysis of the material circumstances that seem to precede such groups, and the much talked about collapse of trust in social organisations and institutions in the US.

Current legal frameworks present significant obstacles. As Department of Justice officials have acknowledged, coercing a minor to engage in self-harm or to harm another is not necessarily criminalised in an easy way. Federal prosecutors must be creative in applying existing statutes to conduct that was not contemplated when those laws were drafted. The prosecution of minors presents additional complications: a substantial proportion of 764 perpetrators are themselves minors, creating difficult questions about culpability and appropriate response.

Legislative efforts have stalled. The Kids Online Safety Act, which would compel platforms to provide safeguards for minors, passed the Senate 91-3 but languished in the House amid First Amendment concerns. The tension between speech protection and child safety remains unresolved, and the pace of legislative deliberation is fundamentally mismatched with the speed at which these networks evolve.

Platform responses have been reactive rather than preventive too. The structural incentives of social media and gaming platforms optimising for engagement, growth, and retention create conditions conducive to exploitation even as trust and safety teams work to address specific harms. The decentralised architecture of Telegram and the pseudonymity of Discord make comprehensive enforcement practically impossible. When channels are removed, they reconstitute under new names within hours.

Counterterrorism approaches offer partial tools. The designation of the Terrorgram Collective and Order of Nine Angles as terrorist organisations enables asset freezing, travel restrictions, and enhanced penalties for material support. But these measures are designed for organisations with identifiable structures, not for fluid networks that deliberately resist organisational coherence. The FBIs classification of 764 as a Tier One priority signals the seriousness of the threat but does not resolve the fundamental mismatch between investigative resources and the scale of online radicalisation.

The most promising frameworks may be those borrowed from public health. A 2021 report from Arizona State Universitys Threatcasting Lab recommended approaches including containment of harmful narratives, improved attribution of online amplification, and resilience programmes to help communities resist radicalisation. This language of containment, resilience and community-based intervention reflects recognition that stochastic terrorism cannot be addressed through prosecution alone. The pipeline must be disrupted at multiple points: the platforms where radicalisation occurs, the communities that normalise violence, the individual vulnerabilities that predators exploit, and the social conditions that make nihilism attractive.

Conclusion

The 764 network is not an aberration but a symptom. It emerged from conditions that persist: platforms designed to maximise engagement without adequate safeguards, communities that celebrate violence as entertainment, legal frameworks that lag behind technological change, and a generation of young people navigating isolation, mental health challenges, and the search for belonging in digital spaces that can be weaponised against them.

What distinguishes this moment is the convergence of previously distinct threat categories. Child sexual exploitation, online radicalisation, accelerationist terrorism, and nihilistic violence have merged into an integrated ecosystem. The perpetrators are often themselves minors. The victims can become perpetrators. The content circulates as currency. The violence is both goal and method.

The question is whether institutions designed for twentieth-century threats can adapt to twenty-first-century realities. The 764 network does not respect the jurisdictional boundaries between nations, the bureaucratic distinctions between agencies, or the categorical separations between terrorism and child exploitation. An effective response will require the same fluidity: cross-border cooperation, multi-agency coordination, platform accountability, and sustained investment in prevention alongside prosecution.

About Rise to Peace: Rise to Peace is a counterterrorism and peacebuilding research organisation dedicated to analysing emerging security threats and developing evidence-based policy responses. For more information, visit risetopeace.org.