EU Terrorism Situation and Trend Report (TE-SAT) 2011
September 18, 2023
The EU Terrorism Situation and Trend Report (TE-SAT) was established in the aftermath of the 11 September 2001 attacks in the United States of America (US), as a reporting mechanism from the Terrorism Working Party (TWP) of the Council of the EU to the European Parliament. The content of the TE-SAT reports is based on ...
Systematic Analysis in Counterterrorism: Messages on an Islamist Internet- Forum
September 18, 2023
The article describes a systematic approach used by the Swiss Intelligence Service (SAP). The procedure described is illustrated by the authentic case of messages among extremists going on the Website www.islamic-minbar.com, a case that was prosecuted and brought to verdict by the Attorney General of the Swiss Confederation. ...
The Devil’s Long Tail: Religious and Other Radicals in the Internet Marketplace
September 18, 2023
This book is concerned with the links or relationships between religious radicalism, violent extremism and the Internet. ...
‘Bomb-Making for Beginners’: Inside al Al-Qaeda E-Learning Course
September 18, 2023
This study explores how terrorists utilise the Internet to learn bomb-making skills. Unlike previous studies, it does not focus on assessing the quality of online bomb recipes. Rather, it discusses the efforts being made by on-line jihadists to help others learn by providing so-called “e-learning courses.” As of today, such courses have few active participants ...
Social Networking Sites and the Surveillance Society: A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance
September 18, 2023
Advertising, business, community, privacy concerns, politics, sex, love – these are issues that are associated with the term social networking platforms in popular media clippings, such as the ones just cited. The examples, which certainly have differing depth, character, and quality, show that social networking sites (SNS) and what many term “Web 2.0” have become ...
Oversight of security-sensitive research material in UK universities: Guidance
September 18, 2023
Universities play a vital role in carrying out research on issues where security-sensitive material is relevant. This guidance document concerns the storage and circulation of security- sensitive research material. If circulated carelessly, such material is sometimes open to misinterpretation by the authorities, and can put authors in danger of arrest and prosecution under, for example, ...
Bastard Culture! How User Participation Transforms Cultural Production
September 18, 2023
On how participation via Internet and social media transform cultural production ...
Countering Militant Islamist Radicalisation on the Internet: A User Driven Strategy to Recover the Web
September 18, 2023
A strategy to counter violent radicalisation on the Internet must be user driven, empowering Internet users with “cultural intelligence”. Cultural intelligence is essentially shorthand for an understanding of the key pillars of, and vulnerabilities inherent in, militant Islamist rhetoric. What this report calls “Enabling Stakeholders”, such as schools, and religious and community organisations, can disseminate ...
Role Of Intelligence In Countering Terrorism on the Internet: Revisiting 3/11
September 18, 2023
In this paper we argue that understanding terrorism within the new cyber environment of the twenty-first century is paramount for the intelligence services in the dawn of the 21st century. We believe that the intelligence services will have to confront this new trend in terrorism tactics in years to come whether they are fully prepared ...
Youth Online and at Risk: Radicalisation Facilitated by the Internet
September 18, 2023
While the internet provides access to rich educational experiences, great entertainment, and the chance to connect with friends around the clock, it also creates a number of risks that young people, parents, and guardians need to be aware of. There are the commonly known concerns of identity theft, online predators, and cyber-bullying but there is ...