This article reviews the existing body of literature concerning terrorist leadership targeting and identifies limitations in the prevailing approaches. As past attempts to gauge the efficacy of decapitation strategies are disputed, this article calls for a new methodology for conducting decapitation research. Article by: Jacob Finn
Based on some of the mistakes made by the media community during the 2015 attacks in France and building on the Superior Council on AudioVisual’s (CSA) conclusions of February 12, 2015, this paper aims at suggesting additional guidelines to journalists in order to guide their
Violent non-state actors (VNSA) continue to weaponize Chemical, Biological, Radiological, and Nuclear materials (CBRN). Rising to infamy with al-Qaeda, the development of Weapons of Mass Destruction (WMD) is a significant objective for VNSA. Al-Qaeda looked to achieve this capability through state sponsorship, due to inability
The article, written in 2013, examines international legal norms prohibiting cyber terrorism and analyzes the relevant provisions of Israeli legislation in a comparative context. In conclusion, the article offers four observations about trends and global legal developments.
This brief investigation assesses that a universally accepted definition of terrorism would be beneficial on multiple levels. The first section provides a concise overview of the definitional debate. The second section delves into the academic and political advantages of having a shared definition of terrorism.
As the novel coronavirus has disturbed our way of life, it has also been weaponized in new ways by an established and expanding set of adversaries. Domestic extremists have proved resilient, energized, enterprising, and opportunistic amidst this crisis environment. Capitalizing on conspiracy theories and adapting
Narcoterrorism, Legal Challenges, and Lessons Learned from the Mexican Military’s Engagement in the War on Drugs By: Sean F. O’Brien
This paper critically analyzes the diversified political engagement of Somali diasporas that interact in distinctive ways and at different levels within their home countries, due to their fragmentation in space, time and goals. Specifically, it takes into consideration the different activities endorsed by the Somali
This article attempts to demonstrate that not only are CVE and PVE separate frameworks addressing distinct yet overlapping steps of the radicalization process, but that both frameworks are essential elements of a holistic CT action plan. Article by: Will Clifft
Considerable scholarly work on the post-Soviet region has focused on the various regional conflicts and security challenges, but rarely on the roots of the growing Islamism factor as a new source of threat.
The spread of hate messages online perpetrated by terrorist and extremist groups represents one of the biggest threats that has caught the attention of governments, security forces, and national and international experts.