Thornton Statement Nottingham University Terrorism Arrests
September 18, 2023
Comments made by Dr Rod Thornton, Lecturer, School of Politics and International Relations, University of Nottingham on the events surrounding, and the repercussions of , the terrorism arrests at Nottingham University in May 2008 ...
Countering Militant Islamist Radicalisation on the Internet: A User Driven Strategy to Recover the Web
September 18, 2023
A strategy to counter violent radicalisation on the Internet must be user driven, empowering Internet users with “cultural intelligence”. Cultural intelligence is essentially shorthand for an understanding of the key pillars of, and vulnerabilities inherent in, militant Islamist rhetoric. What this report calls “Enabling Stakeholders”, such as schools, and religious and community organisations, can disseminate ...
EU Terrorism Situation and Trend Report (TE-SAT) 2011
September 18, 2023
The EU Terrorism Situation and Trend Report (TE-SAT) was established in the aftermath of the 11 September 2001 attacks in the United States of America (US), as a reporting mechanism from the Terrorism Working Party (TWP) of the Council of the EU to the European Parliament. The content of the TE-SAT reports is based on ...
Rhetoric and Reality: Countering Terrorism in the Age of Obama
September 18, 2023
Analysis of President Obama’s Counter-terrorism strategy ...
Manipulating And Hiding Terrorist Content On The Internet: Legal And Tradecraft Issues
September 18, 2023
The global war on terror (“GWOT”) is being fought on many levels. In addition to traditional terror and counterterror activity, both sides are engaged in a public relations and propaganda war, employing the media, willingly and unwillingly, to support their positions. Hovering over these war campaigns are information technologies, which include the Internet. This article ...
Systematic Analysis in Counterterrorism: Messages on an Islamist Internet- Forum
September 18, 2023
The article describes a systematic approach used by the Swiss Intelligence Service (SAP). The procedure described is illustrated by the authentic case of messages among extremists going on the Website www.islamic-minbar.com, a case that was prosecuted and brought to verdict by the Attorney General of the Swiss Confederation. ...
Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations
September 18, 2023
This report analyzes terrorist groups’ use of advanced information and communication technologies in efforts to plan, coordinate, and command their operations. It is one component of a larger study that examines terrorists’ use of technology, a critical arena in the war against terrorism. The goal of the investigation reported here is to identify which network ...
Jihadism Online Norwegian FFI
September 18, 2023
Brief analysis of how terrorists use the Internet, implications of Jihadism online, recruitment and radicalisation on the Internet, and counterterrorism and Jihadism online. ...
Report into the London Terrorist Attacks on 7 July 2005
September 18, 2023
On 7 July 2006 fifty-two people were killed in the terrorist attacks in London. This is the report of the findings of the Intelligence and Security Committee’s investigations into the attack. ...
Understanding and Influencing Public Support for Insurgency and Terrorism
September 18, 2023
The monograph focuses on public support for insurgency and terrorism and how it can be influenced. It is organised around the testing and refinement of conceptual models that seek to integrate much of what is known from relevant social science about public support. ...