Report on the Operation
 in 2009 of the Terrorism Act 2000 & of Part 1 of the Terrorism Act 2006
September 18, 2023
Independent review of how Terrorism Act 2000 & of Part 1 of the Terrorism Act 2006 were operated in the UK in 2009 ...
Countering Violent Extremism: Scientific Methods and Strategies
September 18, 2023
This report represents a distillation of current Social, Behavioural and Economic research findings on violent extremism: What is the cultural basis for violent extremism and radicalization? What motivates individuals and groups to violence, and how is that risk measured? How does our understanding of these findings educate the mitigation of extremism? Can it be prevented ...
Youth Online and at Risk: Radicalisation Facilitated by the Internet
September 18, 2023
While the internet provides access to rich educational experiences, great entertainment, and the chance to connect with friends around the clock, it also creates a number of risks that young people, parents, and guardians need to be aware of. There are the commonly known concerns of identity theft, online predators, and cyber-bullying but there is ...
Now on Twitter, Facebook: Jihadi Media Foundation Fursan Al-Balagh
September 18, 2023
Media foundations connected to jihadi groups and jihad-supporting organizations, which once released their productions – videos, statements, and more – over jihadi forums, have turned to social media websites, mainly Facebook and Twitter, because of these forums’ inability to provide reliable means for communication, interaction, and publication due to constant and often lengthy disruption of ...
Social Networking Sites and the Surveillance Society: A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance
September 18, 2023
Advertising, business, community, privacy concerns, politics, sex, love – these are issues that are associated with the term social networking platforms in popular media clippings, such as the ones just cited. The examples, which certainly have differing depth, character, and quality, show that social networking sites (SNS) and what many term “Web 2.0” have become ...
Oversight of security-sensitive research material in UK universities: Guidance
September 18, 2023
Universities play a vital role in carrying out research on issues where security-sensitive material is relevant. This guidance document concerns the storage and circulation of security- sensitive research material. If circulated carelessly, such material is sometimes open to misinterpretation by the authorities, and can put authors in danger of arrest and prosecution under, for example, ...
Dimensions in Countering Ideological Support for Terrorism
September 18, 2023
Summary Report on conference organized by the George C. Marshall European Center for Security Studies in Cooperation with the Royal Jordanian National Defence College. ...
EU Terrorism Situation and Trend Report (TE-SAT) 2011
September 18, 2023
The EU Terrorism Situation and Trend Report (TE-SAT) was established in the aftermath of the 11 September 2001 attacks in the United States of America (US), as a reporting mechanism from the Terrorism Working Party (TWP) of the Council of the EU to the European Parliament. The content of the TE-SAT reports is based on ...
Current Status Of Military And Technology-Related Subsections On Top Jihadi Forums
September 18, 2023
Jihadis have long shared military-related information and expertise on top jihadi forums. Recently, much of that information has been circulated on the various social media outlets, as well. The shared information varies, from original content to translations, summaries, and recommended reading of non-Arabic material. Contrary to the common notion that jihadis are suspicious of, and ...
Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations
September 18, 2023
This report analyzes terrorist groups’ use of advanced information and communication technologies in efforts to plan, coordinate, and command their operations. It is one component of a larger study that examines terrorists’ use of technology, a critical arena in the war against terrorism. The goal of the investigation reported here is to identify which network ...