Manipulating And Hiding Terrorist Content On The Internet: Legal And Tradecraft Issues
September 18, 2023
The global war on terror (“GWOT”) is being fought on many levels. In addition to traditional terror and counterterror activity, both sides are engaged in a public relations and propaganda war, employing the media, willingly and unwillingly, to support their positions. Hovering over these war campaigns are information technologies, which include the Internet. This article ...
Systematic Analysis in Counterterrorism: Messages on an Islamist Internet- Forum
September 18, 2023
The article describes a systematic approach used by the Swiss Intelligence Service (SAP). The procedure described is illustrated by the authentic case of messages among extremists going on the Website www.islamic-minbar.com, a case that was prosecuted and brought to verdict by the Attorney General of the Swiss Confederation. ...
Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations
September 18, 2023
This report analyzes terrorist groups’ use of advanced information and communication technologies in efforts to plan, coordinate, and command their operations. It is one component of a larger study that examines terrorists’ use of technology, a critical arena in the war against terrorism. The goal of the investigation reported here is to identify which network ...
Jihadism Online Norwegian FFI
September 18, 2023
Brief analysis of how terrorists use the Internet, implications of Jihadism online, recruitment and radicalisation on the Internet, and counterterrorism and Jihadism online. ...
Report into the London Terrorist Attacks on 7 July 2005
September 18, 2023
On 7 July 2006 fifty-two people were killed in the terrorist attacks in London. This is the report of the findings of the Intelligence and Security Committee’s investigations into the attack. ...
Understanding and Influencing Public Support for Insurgency and Terrorism
September 18, 2023
The monograph focuses on public support for insurgency and terrorism and how it can be influenced. It is organised around the testing and refinement of conceptual models that seek to integrate much of what is known from relevant social science about public support. ...
Cybersecurity Two Years Later
September 18, 2023
When CSIS published Securing Cyberspace for the 44th Presidency two years ago, cybersecurity was not a major issue for public policy. Along with the work of many others, our first report helped to change this. However, the new energy in the national dialogue on cybersecurity has not yet translated into sufficient progress. We thought then ...
GCHQ Cyber Speech For International Institute For Strategic Studies
September 18, 2023
Speech by GCHQ Director Ian Lobban at International Institute for Strategic Studies, October 2010 ...
Report of the Official Account of the Bombings in London on 7th July 2005
September 18, 2023
The 7 July bombings were an act of indiscriminate terror. This narrative summarises what the police, intelligence and security agencies discovered about the bombers and how and why they came to do what they did. This is one of a number of reports into aspects of the attacks. ...
Social Networks, Terrorism and Counter-terrorism: Radical and Connected
September 18, 2023
This book examines two key themes in terrorism studies, the radicalisation process and counter-terrorism policies, through the lens of social networks. It aims to show that networks should be at the forefront not only when analysing terrorists, but also when assessing the responses to their actions. The volume makes a unique contribution by addressing two ...