ICT’s Research and Publications include short analyses and in-depth publications on a wide variety of topics including: terrorism, counter-terrorism, homeland security, radicalization process, cyber-terrorism, reviews from Jihadi Websites and insights from our database.
ICT uses its unique expertise on terrorism and counter-terrorism to offer a number of exciting educational opportunities, including BA and MA Degree, an Executive Course, E-learning Course and special, customed training and courses.
Through academic publications, events and conferences, the ICT serves as a joint forum for international policymakers and scholars to share information and expertise.
Counter-Terrorism Solutions Lts. (CTS) is the training and consulting arm of ICT provides services in threat assessment, risk analysis, red teaming, war-gaming, terrorist prosecution, open source intelligence (OSINT) as well as courses and training.
The Counter-Terrorism Studies Program combines academic study, simulation models, workshops, and onsite briefings.
For more information about the Courses or Registration
ICT's 16th International Conference: World Summit on Counter-Terrorism will address the terrorism challenges currently faced by the international community.
The review covers a broad range of fields and presents trends in the dialogue between Jihadi activists and supporters. It examines new Jihadi publications (Social media) as well as traditional news sources.
This report covers the period of January - March 2016 and addresses two main subjects: cyber-terrorism (offensive, defensive, in the media, and the main topics of jihadist discourse) and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack).
In this special edition of Counter Terrorism Today, Mr. Dan Diker sat down with Prof. Boaz Ganor, the founder and director of the International Institute for Counter-Terrorism.
This review reports the main fatwas [religious-legal rulings] issued in April-May 2015 in response to readers’ questions by Minbar Al-Tawhid wal-Jihad, the Web site of Salafist ideologue Abu Muhammad al-Maqdisi.
Al-Sumud is an Arabic language magazine published by the Taliban in Afghanistan, which covers the jihad objectives in the Afghan arena. The organization, which is also called the "Islamic Emirate of Afghanistan", is an Islamic jihad Sunni organization first active in Afghanistan in 1994, after the fall off the Soviet regime in that country.
The Newsletter highlights ICT's activities, including information on ICT's academic publications & programs, international seminars, briefings, and conferences.
In this edition of Counter Terrorism Today Mr. Dan Diker invited several prominent experts in the fields of national security, counterterrorism and Middle Eastern studies to discuss Turkey’s unstable role in the Middle East.
On October 31, 2015 a Russian Airbus A321 plane was shot down on its way from the Sinai Peninsula to Saint Petersburg by a bomb that was planted under one of the plane’s seats. The Islamic State claimed responsibility for the terror attack and said that it had been able to detect a security breach at the international airport in Sharm El-Sheikh in the Sinai Peninsula. The force of the blast on the plane was equivalent to one kilogram of TNT explosive material which, according to the organization, had been hidden in a beverage can. The attack, which was carried out in the wake of Russia’s involvement in the war in Syria, caused the plane to crash and killed all 224 people on board.
Written by Dr. Eitan Azani, Lorena Atiyas Lvovsky and Danielle Haberfeld
At the end of July 2016, Al-Qaeda’s leadership expressed willingness, for the first time in its history, to sever ties with one of its branches, Al-Nusra Front in Syria. It claimed that unity among the ranks of the mujahideen in the arena of jihad in Syria, and the importance of successful efforts by jihadist factions to defeat the forces of heresy precede all organizational and factional considerations. The decision was made at the senior echelon after long negotiations were carried out between Al-Qaeda and Al-Nusra Front leaders while considering the costs and benefits if such a move. On the surface, it seems that Al-Qaeda lost power in the decision because of, among other reasons, its “loss” of control over Syrian territory. However, in was actually a strategic decision that is likely to serve both its long-term and short-term goals, and perhaps even contribute to a positive image of the organization in the eyes of jihad fighters; to depict it as an organization that is not bound by narrow and utilitarian interests, but rather as an organization with vision, understanding of, and responsibility for what is happening in the field.
The July wave of murderous jihadist attacks in France and Germany, for many of which Islamic State (IS) took responsibility, proves that Europe is not yet ready to challenge Islamist/jihadist terror.
First publish on on The Israel Public Diplomacy Forum website, August 2016
Al Qaeda and Daesh publish English language magazines to appeal to Western supporters and encourage them to join their cause as a fighter or as a lone wolf terrorist. A key feature of Al Qaeda’s magazine, Inspire, is a section titled Open Source Jihad, which provides aspiring jihadists with step-by-step instructions to carry out lone terror attacks in the West. By examining ten attack types that have been published over the past six years, this paper explains Open Source Jihad, presents cases where these types of attacks have been carried out, and assesses the threat presented by the easy access to Open Source Jihad.
Criminologists are neither police nor magistrates. They must view criminals, no matter how violent they are, clinically. They must understand their functioning and analyze their activities. A criminologist must first establish a diagnosis to give an idea of the nature of the problem, then consider the means of curbing criminal activity, and finally engage in a therapeutic debate to determine what type of remedy it is better to prescribe—homeopathic (chamomile), chemical (pharmaceutical), or surgical (the route to the operating theater). In a normal medical system, these three steps are generally followed and the same should be true in criminology.
How virulent contagions of political fanaticism spread across the globe—or, what the Muslim Brotherhood and its descendants share with The Little Red Book
This story originally appeared in Tablet magazine, at tabletmag.com
The ongoing immigration to Europe together with the related fear of terrorist attacks, has almost immediately turned into a hot topic for experts from social, economic and security fields becoming one of the highest priority for political decision makers and food for the media. Unfortunately, Europe immediately started to lose control over the situation. Often, decision-makers use the interpretation of the situation provided by the media, to meet the citizens’ demands. But at the same time, since the media want to sell their products, they use stories which appeal to their readership: if it is hungry for fear and blood, they will serve exactly what the readers want. Otherwise they will be replaced. Much like the politicians. As a result, individual countries lose their ability to keep distance from details and are not able to control the situation strategically.
It is an honour to address this distinguished audience on extremism and radicalization: a subject which for a very long time should have been considered of the highest importance for our public opinions, political and cultural establishments, media and communication specialists. It was instead confined, until quite recently to the realm of counterterrorism and social science.
During the month of September 2016, members of Cyber Kahilafah began to promote and advertise the use of a technology called ZeroNet, which enables decentralized Web site hosting using a peer-to-peer (P2P) network. The obvious advantage of this technology, which was initially released in 2015, lies in the fact that a Web site’s data is stored on several computers simultaneously (as opposed to a central storage server) and, therefore, it is difficult to remove from the Internet. Web sites on this network can be accessed by installing an application tailored to a variety of computer operating systems. In addition, ToR can be used in order to increase users’ level of anonymity and to encrypt information traffic.
Concerned by regional developments, Iran is buttressing its strategic alliances; Israel should take note.
Republication of the Jerusalem Report Commentary.