Articles

The Return of Iranian Terrorism to Europe, Dr. Ely Karmon, November 2018

Authorities in Belgium, France, and Denmark arrested several Iranian operatives, including an Iranian diplomat, in a plot to plant a bomb to disrupt a political rally of the Iranian opposition in Paris, France and to assassinate an opposition leader in Denmark. Time has come for European leaders to acknowledge the Iranian/Hezbollah terrorist threat looming high in the continent and act accordingly.

READ MORE


Summary of Information on Jihadists Websites August 2018, ICT JWMG Desk, November 2018.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites June 2018, ICT JWMG Desk, October 2018.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


MIA: An International Definition for Terrorism, Prof. Boaz Ganor, October 2018

Today, most states and most political decisionmakers are happy with the current definitional opacity because it gives them room to maneuver and to deny—at the expense of more effective international counter-terrorism efforts. It thus seems that achieving international agreement regarding the term cannot be based on traditional diplomacy, such as through bilateral or multilateral treaties or UN Security Council resolutions. Instead, we need a new, direct kind of diplomacy, via civilian society and global organizations that represent supra-national interests, led by the internet service providers and social networks. It is these players, after all, that most need a clear, independent definition of the phenomenon to eradicate attempts to use their platforms to recruit, train, and incite terrorists.

READ MORE


Summary of Information on Jihadists Websites May 2018, ICT JWMG Desk, August 2018.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites April 2018, ICT JWMG Desk, July 2018.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Prison Radicalization in Australia and the Returnee Threat: Assessing the Case of Goulburn Correcti, Ido Levy, July 2018

With the military defeat of Islamic State, scores of radicalized Australian citizens stand to return home. How can law enforcement deal with these potentially dangerous returnees? This paper analyzes corrections policy at Goulburn Corrections Centre in New South Wales, Australia to better understand prison radicalization and how to combat it. It contextualizes the phenomenon of radicalization through a discussion of the concept and its presence in prisons, using Abu Bakr al-Baghdadi’s time at Camp Bucca detention center as case study. It then analyzes the current Goulburn strategy. It concludes with a recommendation to shift toward a rehabilitative rather than deterrent strategy.

READ MORE


Index of Radicalization: Islamic Radicalization in Michigan, Elizabeth Iskow, July 2018

This paper is designed to provide an overview of Islamic radicalization in the state of Michigan. This report is divided into four sections. Part one contains the background on migration to Michigan and why the state is important to study. Part two contains the organization and explanation of the different types of Islamic institutions in the state of Michigan. Part three explains the radicalization process, terrorist organizations present in Michigan and terrorist activity in the state. Part four enfolds the main findings of the paper.

READ MORE


Summary of Information on Jihadists Websites March 2018, ICT JWMG Desk, June 2018.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Global Jihad – The Shift from Hierarchal Terrorist Organizations to Decentralized SystemsDr. Eitan Azani, June 2018.

The development of Al-Qaeda in general can be divided into four main sub-periods: A. Establishment and Consolidation – 1988-2001 (until the September 11 terrorist attacks); B. Strategic Defense – 2001-2011; C. Revival – 2011-2014; D. Internal and External Struggle – 2014 and on. Developments during these periods took place along four axes that complemented one another synergistically, and allowed the global jihad leadership maximum flexibility in formulating policy and putting it into practice: the organizational axis; the ideological axis; the strategic axis; and the operative axis.

READ MORE


A New Study on Lone Wolf Terrorism in Israel, Prof. Boaz Ganor and Prof. Ariel Merari, June 2018.

Findings from a new study being presented at the International Homeland Security Forum, led by the Minister of Public Security Gilad Erdan and the U.S. Secretary of Homeland Security Kirstjen Nielsen, shed light on the “lone wolf” phenomenon and the psychological and sociological profile of attackers in the recent wave of terrorism over the past year and a half.

READ MORE


Deradicalization Programs in Australia and the Foreign Fighter Phenomenon, Ido Levy, April 2018.

As increasing numbers of Australians have traveled to Iraq and Syria to fight as “foreign fighters” for Islamist terror groups, the government and civil society have been setting up “deradicalization programs”.

READ MORE


The Henry Jackson Society Conference- A Toolbox for Confronting Radical Islamic Narratives, Bar, S. December 2017.

The article describes the need for monitoring the radical discourse as a sin qua non for acting against it.

Toolbox for Countering Religious Doctrines for HJS


The European Values Conference – Origins and Sources of Radical Islam, Centre for the Response to Radicalisation and Terrorism (CRT) at the Henry Jackson Society, December 2017.

The discussion focused on the sources of radical Islam and how they manifest themselves in social media and other media

HJS_Panel_4_Transcription


The Tony Blair Foundation – Religious Sources of Radical Islam, Comerford, M. and Bryson, R., November, 2017.

The project was performed using our software for identifying the verses and quotes used by different radical groups as indicators of their affiliation

TBI_Struggle-over-Scripture


Threat to the United States Homeland: Internet Propaganda and Planners Inspiring Individual Jihad, Kelvington, Michael R., January 2018.

Since Abu Bakr al-Baghdadi’s declaration of the Islamic caliphate on July 3rd, 2014, the intelligence community estimates approximately 30,000 foreign fighters emigrated from their homeland to the Middle East to join the Islamic State.[1]  However, the spigot of foreign fighters flocking to the caliphate has since been largely shut down, causing the jihadi terrorist organization to alter its global messaging, specifically to new recruits within the Sunni Muslim ummah [community].

READ MORE


Fighting Terrorism: The Democracy Advantage , Magen, A., January 2018.

Barcelona, Berlin, Boston, Brussels, London, Madrid, Manchester, New York, Nice, Paris, Stockholm, Sydney—over the past several years these and other cities of the democratic West have become places widely identified with terrorist attacks involving suicide belts, rammings by cars or trucks, improvised bombs, mass shootings, or stabbings. Outside the West, meanwhile, groups such as the Islamic State in Iraq and Syria (ISIS), Boko Haram, and various al-Qaeda affiliates—in the Caucasus, the Arabian Peninsula, Sinai, and parts of Africa—have seized tracts of land in fragile states1 as homes for “emirates” and “caliphates” whose political ambitions are as vast as they are inimical to the liberal international order.

READ MORE


Jihadists’ Use of Virtual Coin, ICT Cyber Desk, January 2018.

Sporadic evidence of terrorists’ use of digital currency has been in existence since 2012 and there is no doubt that in recent months this trend has been growing and taking shape and now holds a prominent presence online. ICT’s Cyber-Desk reviewed documented cases of jihadists’ use of virtual currency.

READ MORE


The “Shoe Bomber” Richard Reid – His Radicalization Explained, Jager, A., March 2018.

On December 22, 2001 Richard Colvin Reid boarded an American Airlines flight from Paris to Miami with the intention to bomb the flight. As luck would have it, he encountered technical issues and was unable to carry out the attack.

READ MORE


The Origin of America’s Jihadists, Jenkins, B., November 2017.

The U.S. homeland faces a multilayered threat from terrorist organizations. Homegrown jihadists account for most of the terrorist activity in the United States since 9/11. Efforts by jihadist terrorist organizations to inspire terrorist attacks in the United States have thus far yielded meager results.  No American jihadist group has emerged to sustain a terrorist campaign, and there is no evidence of an active jihadist underground to support a continuing terrorist holy war.

READ MORE


Incitement – Terrorist Attack in Wimbeldon, ICT Cyber Desk, July 2017.

On Wednesday, July 5, 2017 a call was posted on a Telegram channel belonging to jihadist operatives to carry out a terrorist attack in Wimbledon similar to the attack that took place at the “Manchester Arena” events hall during a performance by the singer, Ariana Grande. On May 22, 2017 a terrorist carried out a suicide bombing as he mixed in with the audience during the exit from the event. 22 people were killed in the attack and over 50 others were injured. The next day, the Islamic State claimed responsibility for the attack.

READ MORE


Central Asia Jihadism: Home and Abroad, Fainberg, A., and Azani, E., November 2017.

The flow of foreign fighters travelling to Syria to join various jihadist groups attracted the attention of both decision makers and academic researchers, and become an object for a significant number of papers, not least because of its mass nature and broad geographical spread.

READ MORE


The Importance of Maintaining and Expressing Allegiance to Al-Qaeda – Ayman al-Zawahiri, Nov 2017, ICT JWMG Desk, December 2017.

On November 28, 2017, Al-Sahab jihadist media institution published a new speech by Ayman al-Zawahiri, the leader of Al-Qaeda, titled, “We Will Fight Them as One Body”. In the opening remarks, al-Zawahiri noted that over the last year jihad operatives, especially those in Syria, have experienced many upheavals characterized by great confusion and even division among the ranks.

READ MORE


Cyber Counter-terrorism Legislation and Policy: National and International Developments, Housen-Couriel, D., September 2017.

Recent years have seen interesting developments in the evolution of legal and policy counter-terrorism initiatives at both the national and international levels. These developments have been partially driven by an earlier lack of legal frameworks for responding effectively to the bitter experience of terrorist attacks that have taken lives around the globe.[1]

READ MORE


Cyber-terrorism, Cyber-crime, and Data Protection, Terzi, G., September 2017.

READ MORE


Summary of Information on Jihadists Websites January 2017, ICT JWMG Desk, June 2017.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites February 2017, ICT JWMG Desk, June 2017.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites March 2017, ICT JWMG Desk, June 2017.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites April 2017, ICT JWMG Desk, July 2017.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites May 2017

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites June 2017, ICT JWMG Desk, August 2017.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites July 2017, ICT JWMG Desk, December 2017.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites August 2017, ICT JWMG Desk, January 2018.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites September 2017, ICT JWMG Desk, February 2018.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites October 2017, ICT JWMG Desk, March 2018.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites First Half of November 2017, ICT JWMG Desk, March 2018.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Summary of Information on Jihadists Websites February 2018, ICT JWMG Desk, April 2018.

A review composed by the Jihadi Websites Monitoring Group (JWMG) at the International Institute for Counter-Terrorism (ICT). The JWMG monitors websites that support and serve Global Jihad organizations. The unique characteristic of JWMG publications comes from the team’s integration of diverse materials from a wide variety of Arabic sources.

READ MORE


Cyber Report no. 23 June-August 2017, ICT Cyber Desk, September 2017.

Cyber Report no. 23 by the International Institute for Counter-Terrorism (ICT) reviewed the prominent uses made of cyberspace by terrorist organizations and their supporters during the months of June, July and August 2017.

READ MORE


Cyber Report no. 24 September-November 2017, ICT Cyber Desk, March 2018.

Cyber Report no. 24 by the International Institute for Counter-Terrorism (ICT) reviewed the prominent uses made of cyberspace by terrorist organizations and their supporters during the months of September, October and November 2017.

READ MORE


Stability of glassy hierarchical networks, M Zamani, L Camargo-Forero and T Vicsek, New Journal of Physics, Volume 20, February 2018

READ MORE


A new lightweight symmetric searchable encryption scheme for string identification. Ray, I.G., Rahulamathava, Y. and Rajarajan, M., March 2018. IEEE Transactions on Cloud Computing


Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations. Asif, W., Ray, I.G. Shahzaib, T. and Rajarajan, M.

Accepted for publication at International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2018.