Oversight of security-sensitive research material in UK universities: Guidance
September 18, 2023
Universities play a vital role in carrying out research on issues where security-sensitive material is relevant. This guidance document concerns the storage and circulation of security- sensitive research material. If circulated carelessly, such material is sometimes open to misinterpretation by the authorities, and can put authors in danger of arrest and prosecution under, for example, ...
Dimensions in Countering Ideological Support for Terrorism
September 18, 2023
Summary Report on conference organized by the George C. Marshall European Center for Security Studies in Cooperation with the Royal Jordanian National Defence College. ...
EU Terrorism Situation and Trend Report (TE-SAT) 2011
September 18, 2023
The EU Terrorism Situation and Trend Report (TE-SAT) was established in the aftermath of the 11 September 2001 attacks in the United States of America (US), as a reporting mechanism from the Terrorism Working Party (TWP) of the Council of the EU to the European Parliament. The content of the TE-SAT reports is based on ...
Current Status Of Military And Technology-Related Subsections On Top Jihadi Forums
September 18, 2023
Jihadis have long shared military-related information and expertise on top jihadi forums. Recently, much of that information has been circulated on the various social media outlets, as well. The shared information varies, from original content to translations, summaries, and recommended reading of non-Arabic material. Contrary to the common notion that jihadis are suspicious of, and ...
Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations
September 18, 2023
This report analyzes terrorist groups’ use of advanced information and communication technologies in efforts to plan, coordinate, and command their operations. It is one component of a larger study that examines terrorists’ use of technology, a critical arena in the war against terrorism. The goal of the investigation reported here is to identify which network ...
Jihadism Online Norwegian FFI
September 18, 2023
Brief analysis of how terrorists use the Internet, implications of Jihadism online, recruitment and radicalisation on the Internet, and counterterrorism and Jihadism online. ...
Who Matters Online: Measuring influence, evaluating content and countering violent extremism in online social networks
September 18, 2023
It is relatively easy to identify tens of thousands of social media users who have an interest in violent ideologies, but very difficult to figure out which users are worth watching. For students of extremist movements and those working to counter violent extremism online, deciphering the signal amid the noise can prove incredibly daunting. This ...
Report into the London Terrorist Attacks on 7 July 2005
September 18, 2023
On 7 July 2006 fifty-two people were killed in the terrorist attacks in London. This is the report of the findings of the Intelligence and Security Committee’s investigations into the attack. ...
Countering Online Hate Speech
September 18, 2023
The opportunities afforded by the Internet greatly overshadow the challenges. While not forgetting this, we can nevertheless still address some of the problems that arise. Hate speech online is one such problem. But what exactly is hate speech online, and how can we deal with it effectively? As with freedom of expression, on- or offline, ...
Cybersecurity Two Years Later
September 18, 2023
When CSIS published Securing Cyberspace for the 44th Presidency two years ago, cybersecurity was not a major issue for public policy. Along with the work of many others, our first report helped to change this. However, the new energy in the national dialogue on cybersecurity has not yet translated into sufficient progress. We thought then ...