Post Type Description
Oversight of security-sensitive research material in UK universities: Guidance
September 18, 2023Universities play a vital role in carrying out research on issues where security-sensitive material is relevant. This guidance document concerns the storage and circulation of security- sensitive research material. If circulated carelessly, such material is sometimes open to misinterpretation by the authorities, and can put authors in danger of arrest and prosecution under, for example, ...
Bastard Culture! How User Participation Transforms Cultural Production
September 18, 2023On how participation via Internet and social media transform cultural production ...
Countering Militant Islamist Radicalisation on the Internet: A User Driven Strategy to Recover the Web
September 18, 2023A strategy to counter violent radicalisation on the Internet must be user driven, empowering Internet users with “cultural intelligence”. Cultural intelligence is essentially shorthand for an understanding of the key pillars of, and vulnerabilities inherent in, militant Islamist rhetoric. What this report calls “Enabling Stakeholders”, such as schools, and religious and community organisations, can disseminate ...
Role Of Intelligence In Countering Terrorism on the Internet: Revisiting 3/11
September 18, 2023In this paper we argue that understanding terrorism within the new cyber environment of the twenty-first century is paramount for the intelligence services in the dawn of the 21st century. We believe that the intelligence services will have to confront this new trend in terrorism tactics in years to come whether they are fully prepared ...
Youth Online and at Risk: Radicalisation Facilitated by the Internet
September 18, 2023While the internet provides access to rich educational experiences, great entertainment, and the chance to connect with friends around the clock, it also creates a number of risks that young people, parents, and guardians need to be aware of. There are the commonly known concerns of identity theft, online predators, and cyber-bullying but there is ...
The Virtual Sanctuary of Al-Qaeda and Terrorism in an Age of Globalisation
September 18, 2023Chapter in Johan Eriksson, Giampiero Giacomello, ‘International Relations and Security in the Digital Age’ – The fusion of globalisation and terrorism in the 21 century created a new, adaptable and complex form of ‘networked’ asymmetric adversary. For al-Qaeda and its successor affiliates Internet has become not just a virtual sanctuary, where every dimension of the ...
Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations
September 18, 2023This report analyzes terrorist groups’ use of advanced information and communication technologies in efforts to plan, coordinate, and command their operations. It is one component of a larger study that examines terrorists’ use of technology, a critical arena in the war against terrorism. The goal of the investigation reported here is to identify which network ...
Social Science For Counterterrorism: Putting the Pieces Together
September 18, 2023This monograph by RAND surveys social-science literature relating to counterterrorism. It also takes steps toward integrating the knowledge reflected in that literature and suggesting theories and methods to inform analysis and modeling. ...
Current Status Of Military And Technology-Related Subsections On Top Jihadi Forums
September 18, 2023Jihadis have long shared military-related information and expertise on top jihadi forums. Recently, much of that information has been circulated on the various social media outlets, as well. The shared information varies, from original content to translations, summaries, and recommended reading of non-Arabic material. Contrary to the common notion that jihadis are suspicious of, and ...
Now on Twitter, Facebook: Jihadi Media Foundation Fursan Al-Balagh
September 18, 2023Media foundations connected to jihadi groups and jihad-supporting organizations, which once released their productions – videos, statements, and more – over jihadi forums, have turned to social media websites, mainly Facebook and Twitter, because of these forums’ inability to provide reliable means for communication, interaction, and publication due to constant and often lengthy disruption of ...