ICT

ICT

106
By Ms. J. Skidmore, ICT As the conflict in Syria approaches its third year, increasing attention is being paid to the various non-state militant actors...

198
This report covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever...

61
By ICT’s Jihadi Websites Monitoring Group Sheikh Sheikh Adam Gadahn, a senior leader of Al-Qaeda, called on jihadists and Muslims to attack American diplomats in...

26
By ICT’s Jihadi Websites Monitoring Group This report summarizes notable events discussed on jihadist Web forums during the first half of August 2013. The following...

25
The following is a summary and analysis of the terrorist attacks and counter-terrorism operations that occurred during August 2013, as researched and recorded by...

38
By ICT’s Jihadi Websites Monitoring Group This report summarizes notable events discussed on jihadist Web forums during the second half of July 2013. Following are...

125
This report covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever...

89
By ICT’s Jihadi Websites Monitoring Group This report summarizes notable events discussed on jihadist Web forums during the first half of July 2013. Following are...

174
By ICT’s Jihadi Websites Monitoring Group This report summarizes notable events discussed on jihadist Web forums during the second half of June 2013. Following are...

114
The following is a summary and analysis of the terrorist attacks and counter-terrorism operations that occurred during July 2013, researched and recorded by the...

25
Periodical Report: Summary of Terrorist Incidents and Counter-Terrorist Operations Worldwide, June 2013 By ICT The following is a summary and analysis of the terrorist attacks and...

71
According to recent research, an Islamic state such as Iran must not be allowed to achieve nuclear capabilities. In such a scenario the Middle...

51
Bi-weekly Report: Summary of Information from Jihadi Forums - The First Half of May 2013  By ICT's Jihadi Websites Monitoring Group This report summarizes notable events discussed on...

92
Bi-monthly Report: Summary from Jihadi Forums - The Second Half of April 2013 By ICT's Jihadi Websites Monitoring Group This report summarizes the most notable events...

128
By ICT's Jihadi Websites Monitoring Group This report summarizes notable events discussed on jihadist Web forums during the first half of march 2013. Following are...

31
Last week’s military coup in Egypt, which culminated in the overthrow of the sitting President Mohamed Morsi and the arrest of hundreds of his...

29
This report summarizes notable events discussed on jihadist Web forums during the first half of march 2013. Following are the main points covered in...

16
This report summarizes notable events discussed on jihadist Web forums during the first half of March 2013. Following are the main points covered in...

38
Periodical  Review: Summary of Information from Jihadi Forums - The Second Half of February 2013  This report summarizes notable events discussed on jihadist Web forums during...

35
This report covers two main subjets: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse);  cyber-crime, whenever and wherever it...

75
Boaz Ganor, Ph.D. Deputy Dean, Lauder School of Government, Founder & Executive Director, ICT-The Institute for Counter-Terrorism The Interdisciplinary Center, Herzliya, Israel   Boaz...

27
By Dr. Boaz Ganor As a rule, terrorist attacks can be divided into two types: “personal initiative” attacks, and “organized terrorism”. In organized terrorism, a...

iHLS Events

5

1007