<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel>
    <generator>RSS Builder by B!Soft</generator>
    <title> International Institute for Counter-Terrorism (ICT) </title>
    <link>https://www.ict.org.il/</link>
    <description>Founded in 1996, the International Institute for Counter-Terrorism (ICT) is one of the leading academic institutes for counter-terrorism in the world, facilitating international cooperation in the global struggle against terrorism. ICT is an independent think tank providing expertise in terrorism, counter-terrorism, homeland security, threat vulnerability, risk assessment, intelligence analysis, national security and defense policy. ICT’s Research and Publications include short analyses and in-depth publications on a wide variety of topics including: terrorism, counter-terrorism, homeland security, radicalization process, cyber-terrorism, reviews from Jihadi Websites and insights from our database.
</description>
    <language>en</language>
    <managingEditor>Webmaster@ict.org.il (ICT Staff)</managingEditor>
    <copyright> International Institute for Counter-Terrorism (ICT) </copyright>
    <image>
      <title> International Institute for Counter-Terrorism (ICT) </title>
      <link>https://www.ict.org.il/</link>
      <url>https://www.ict.org.il/images/WorkerDef.jpg</url>
      <width>144</width>
      <height>144</height>
    </image>
    <item>
      <title>Summary of Information on Jihadist Websites The First Half of June 2016</title>
      <pubDate>Tue, 1 Nov 2016 12:06:45 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1797/summary-of-information-on-jihadist-websites-the-first-half-of-june-2016</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/png" />
      <description><![CDATA[This report summarizes notable events discussed on jihadist Web forums during the first half of June 2016.]]></description>
    </item>
    <item>
      <title>Signs of Iranian weakness?</title>
      <pubDate>Mon, 10 Oct 2016 12:07:43 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1792/signs-of-iranian-weakness</link>
      <enclosure url="https://www.ict.org.il/images/Ely_Karmon.jpg" length="1" type="image/jpg" />
      <description><![CDATA[Republication of the Jerusalem Report Commentary.

The iran nuclear deal that came into effect in January 2016 (The Joint Comprehensive Plan of Action or JCPOA) was seen by the country’s leaders as a victory for the Iranian nation. Despite “hostility and trouble” from the United States, Iran extracted major gains from the nuclear talks, the culmination of a long and smart negotiation with the P5 + 1 group of nations.]]></description>
    </item>
    <item>
      <title>Use of the ZeroNet Network by the Islamic State</title>
      <pubDate>Sun, 9 Oct 2016 13:31:36 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1790/use-of-the-zeronet-network-by-the-islamic-state</link>
      <enclosure url="https://www.ict.org.il/images/CyberDeskPr.png" length="1" type="image/png" />
      <description><![CDATA[During the month of September 2016, members of Cyber Kahilafah began to promote and advertise the use of a technology called ZeroNet, which enables decentralized Web site hosting using a peer-to-peer (P2P) network. The obvious advantage of this technology, which was initially released in 2015, lies in the fact that a Web site’s data is stored on several computers simultaneously (as opposed to a central storage server) and, therefore, it is difficult to remove from the Internet. Web sites on this network can be accessed by installing an application tailored to a variety of computer operating systems. In addition, ToR can be used in order to increase users’ level of anonymity and to encrypt information traffic.

]]></description>
    </item>
    <item>
      <title>Summary from the Jihadi Forums - The Second Half of May 2016</title>
      <pubDate>Wed, 28 Sep 2016 13:34:58 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1780/periodical-review-summary-from-the-jihadi-forums-the-second-half-of-may-2016</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/png" />
      <description><![CDATA[This report summarizes notable events discussed on jihadist Web forums during the second half of May 2016.]]></description>
    </item>
    <item>
      <title>ICT Cyber-Desk Review: Report #16</title>
      <pubDate>Tue, 13 Sep 2016 13:32:32 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1773/Cyber-Desk-Review-Report-16</link>
      <enclosure url="https://www.ict.org.il/images/CyberDeskPr.png" length="https://www.ict.org.il/images/CyberDeskPr.png" type="image/png" />
      <description><![CDATA[This report covers the period of January - March 2016 and covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse) and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack).

]]></description>
    </item>
    <item>
      <title>"Killing Lists" – The Evolution of Cyber Terrorism?</title>
      <pubDate>Wed, 14 Sep 2016 13:34:15 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1793/killing-lists-the-evolution-of-cyber-terrorism</link>
      <enclosure url="https://www.ict.org.il/images/CyberDeskPr.png" length="1" type="image/png" />
      <description><![CDATA[Over the past year, there have been increasing calls warning of the possible danger of a successful cyber-attack by the Islamic State against the West. In the beginning of April 2016, Admiral Michael Rogers, Commander of the US Cyber Command, claimed that the IS could easily carry out cyber-attacks against the US.[1] The IS operates on the Internet as a platform for a very wide variety of uses but also views the space as an arena for battle. In the past, the organization carried out a number of successful cyber-attacks, including breaches of social network accounts as well as the theft and leak of information, such as lists containing the personal details of security forces.

]]></description>
    </item>
    <item>
      <title>Summary of Information on Jihadist Websites The First Half of May 2016</title>
      <pubDate>Sun, 21 Aug 2016 16:51:08 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1764/Periodical-Review-Summary-First-Half-of-May-2016</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/png" />
      <description><![CDATA[This report summarizes notable events discussed on jihadist Web forums during the first half of May 2016.]]></description>
    </item>
    <item>
      <title>Trends in the Aviation Terrorism Threat</title>
      <pubDate>Wed, 10 Aug 2016 15:40:26 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1757/trends-in-the-aviation-terrorism-threat?utm_source=rss&amp;utm_medium=referral&amp;utm_campaign=Aviation</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[On October 31, 2015 a Russian Airbus A321 plane was shot down on its way from Sinai to Saint Petersburg by a bomb that was planted under one of the plane’s seats.[1] The Islamic State claimed responsibility for the terror attack and claimed that it had been able to detect a security breach at the international airport in Sharm El-Sheikh in the Sinai Peninsula.[2] The force of the blast on the plane was equivalent to one kilogram of TNT explosive material which, according to the organization, had been hidden in a beverage can. The attack, which was carried out in the wake of Russia’s involvement in the war in Syria, caused the plane to crash and killed all 224 people on board.[3]
]]></description>
    </item>
    <item>
      <title>Jabhat Fateh al-Sham - Did Jabhat al-Nusra Split from Al-Qaeda?</title>
      <pubDate>Thu, 4 Aug 2016 16:33:09 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1751/jabhat-fateh-al-sham-did-jabhat-al-nusra-split-from-al-qaeda</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[In our June 14, 2016 paper ,"Jabhat al-Nusra at Crossroads," a backgrounder for the Herzliya Conference Simulation: The Middle East after the Territorial Demise of the Islamic State in Iraq and Syria, we evaluated that on the backdrop of the Russian involvement in Syria, the negotiations for a solution to the Syrian conflict, the threat of cooperation between Russia and the U.S against the group and the military blows that ISIS suffered in Syria and Iraq, Jabhat al-Nusra (JN - Al-Nusra Front) had to choose between three opposing options.[1]
]]></description>
    </item>
    <item>
      <title>Has Al-Nusra Front Severed Ties With Al-Qaeda? – Implications and Significance</title>
      <pubDate>Wed, 3 Aug 2016 16:33:45 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1752/has-al-nusra-front-severed-ties-with-al-qaeda</link>
      <enclosure url="https://www.ict.org.il/images/Michael_Barak.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[At the end of July 2016, Al-Qaeda’s leadership expressed willingness, for the first time in its history, to sever ties with one of its branches, Al-Nusra Front in Syria. It claimed that unity among the ranks of the mujahideen in the arena of jihad in Syria, and the importance of successful efforts by jihadist factions to defeat the forces of heresy precede all organizational and factional considerations. The decision was made at the senior echelon after long negotiations were carried out between Al-Qaeda and Al-Nusra Front leaders while considering the costs and benefits if such a move. On the surface, it seems that Al-Qaeda lost power in the decision because of, among other reasons, its “loss” of control over Syrian territory. However, in was actually a strategic decision that is likely to serve both its long-term and short-term goals, and perhaps even contribute to a positive image of the organization in the eyes of jihad fighters; to depict it as an organization that is not bound by narrow and utilitarian interests, but rather as an organization with vision, understanding of, and responsibility for what is happening in the field.
]]></description>
    </item>
    <item>
      <title>Israel's Counter Terrorism Bill - Policy Paper</title>
      <pubDate>Wed, 20 Jul 2016 16:34:40 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1736/israels-counter-terrorism-bill</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[This position paper was written by Mr. Uri Ben Yaakov, Senior Researcher, and Dr. Dror Harel, Research Fellow, with the assistance of the ICT team and their colleagues.
The new Israeli counter-terrorism bill[1], that was put forth by the Government,constitutes an attempt to regulate internal Israeli legislation and adjust the tools at the authorities’ disposal to cope with renewed terrorism threats, while striking an appropriate balance between the state’s security interests and its need to safeguard the fundamental principles of the liberal-democratic system and the human rights that it protects.]]></description>
    </item>
    <item>
      <title>Al-Sumud Magazine – A Review</title>
      <pubDate>Wed, 13 Jul 2016 11:48:13 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1732/al-sumud-magazine-a-review</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/png" />
      <description><![CDATA[Al-Sumud is an Arabic language magazine published by the Taliban in Afghanistan, which covers the jihad objectives in the Afghan arena. The organization, which is also called the "Islamic Emirate of Afghanistan", is an Islamic jihad Sunni organization first active in Afghanistan in 1994, after the fall off the Soviet regime in that country. Initially, the organization was for the most part comprised of students pursuing Islamic Studies, and thus the new name "Taliban" – literally meaning "students". The organization ruled in Afghanistan from 1996 to 2001, when the United States entered Afghanistan after the September 11 attacks. Today, the organization is headed by Mawlawi Haibatullah Akhundzada, appointed as leader in May 2016 after the death of the previous leader, Mullah Akhtar Mansour – who was killed by an American drone. Today the organization's activities focus on two areas: terror attacks against foreign forces in the country and against the Afghan government, and conquest of Afghan lands and the implementation of Sharia law in the occupied regions.
]]></description>
    </item>
    <item>
      <title>Periodical Review - Summary from the Jihadi Forums - The Second Half of April 2016</title>
      <pubDate>Tue, 5 Jul 2016 11:28:54 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1727/Periodical-Review-Summary-Second-Half-of-April-2016</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/png" />
      <description><![CDATA[This report summarizes notable events discussed on jihadist Web forums during the second half of April 2016.]]></description>
    </item>
    <item>
      <title>The Irony of the Iron Dome: Intelligent Defense Systems, Law, and Security</title>
      <pubDate>Tue, 28 Jun 2016 10:15:11 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1689/the-irony-of-the-iron-dome</link>
      <enclosure url="https://www.ict.org.il/images/Daphn%C3%A9RichemondBarakPr.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[International law does not directly address intelligent defense systems (IDSs), of which Israel’s Iron Dome embodies the most successful implementation to date. This Article argues that international humanitarian law (“IHL”) should encourage the development and use of systems like Iron Dome by conceptualizing such systems as civil defense.]]></description>
    </item>
    <item>
      <title>Summary from the Jihadi Forums - The First Half of April 2016</title>
      <pubDate>Tue, 28 Jun 2016 10:14:43 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1690/Periodical-Review-Summary-First-Half-of-April-2016</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/png" />
      <description><![CDATA[This report summarizes notable events discussed on jihadist Web forums during the first half of April 2016.]]></description>
    </item>
    <item>
      <title>"Struggle and Winds of Change" – Revolution and Guerilla Strategies by Saif al-Adel</title>
      <pubDate>Thu, 23 Jun 2016 10:07:28 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1687/struggle-and-winds-of-change-revolution-and-guerilla-strategies-by-saif-al-adel</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/png" />
      <description><![CDATA[Saif al-Adel (meaning: "Sword of Justice") is a pseudonym for Mohammed bin Salah al-Din Zidan, an Egyptian strategist from the generation of Al-Qaeda's founders. Zidan was in charge of security for Bin Laden, and was also the organization's explosives expert. He was involved – among other things – in planning the attacks on the American embassies in Kenya and Tanzania in 1998. In recent years, Zidan's location has been a mystery, though it is commonly assumed that he was under house arrest in Iran, and eventually released – according a September 2015 report.]]></description>
    </item>
    <item>
      <title>ICT Cyber-Desk Review: Report #15</title>
      <pubDate>Tue, 21 Jun 2016 13:48:26 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1686/Cyber-Desk-Review-Report-15</link>
      <enclosure url="https://www.ict.org.il/images/CyberDeskPr.png" length="1" type="image/png" />
      <description><![CDATA[ This report covers the period of October - December 2015 and covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse) and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack).]]></description>
    </item>
    <item>
      <title>The Terrorist Attack in Orlando – Preliminary Conclusions</title>
      <pubDate>Thu, 16 Jun 2016 10:46:52 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1683/the-terrorist-attack-in-orlando-preliminary-conclusions</link>
      <enclosure url="https://www.ict.org.il/images/BoazGanorPr.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[What conclusions can be drawn from the little information coming out of the terrorist attack at an LGBT club in Orlando; an attack in which the terrorist, Omar Saddiqui Mateen, burst into the Pulse nightclub and murdered 50 civilians, held hostages and injured dozens more over a period of approximately three hours before security forces stormed the club and killed him? Already at this early stage of the investigation one can find oversights and mistakes in judgement made by various authorities that enabled the execution of the worst terrorist attack to take place in the United States since September 11, 2001: intelligence oversights, operational oversights, a limited understanding of the threat facing the US and the entire western world, all heavily and dangerously cloaked in political correctness.]]></description>
    </item>
    <item>
      <title>Jabhat al-Nusra at Crossroads</title>
      <pubDate>Wed, 15 Jun 2016 10:47:09 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1681/jabhat-al-nusra-at-crossroads</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[Backgrounder for the The Herzliya Conference Simulation: The Middle East after the Territorial Demise of the Islamic State in Iraq and Syria, June 14, 2016.
Written by Dr. Shaul Shay and Dr. Ely Karmon]]></description>
    </item>
    <item>
      <title>"The Thirty Suggestions" of Abu Ayyub al-Misri</title>
      <pubDate>Wed, 8 Jun 2016 12:13:40 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1679/the-thirty-suggestions-of-abu-ayyub-al-misri</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/png" />
      <description><![CDATA[The media institution called "The Al-Himma Library", which publishes pamphlets and manifestos for the Islamic State, published a new edition of a document entitled "Thirty Suggestions for Islamic State Emirs and Soldiers". The document was originally authored by Abd al-Mun'im bin Izz al-Din al-Badawi, also known as Abu Hamza al-Muhajer and as Abu Ayyub al-Misri. Al-Misri was a prominent Egyptian Jihadist official who served as a leader of Al Qaida in Iraq after the death of Abu Musab al-Zarqawi, and was killed in a raid on his home in April, 2010. The document was initially published in November 2010 by The Al-Himma Library, which operated under the auspices of the Islamic State of Iraq.  In the introduction, which was composed by the Al-Himma Library, it was explained that the new edition was published five years after al-Misri's death (the first new edition was published in January 2015, and the second in February 2016), in hopes that the mujahedeen and the emirs in the Islamic Caliphate would find it beneficial.
]]></description>
    </item>
    <item>
      <title>Periodical Review - Summary from the Jihadi Forums - The Second Half of March 2016</title>
      <pubDate>Wed, 8 Jun 2016 12:14:18 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1677/Periodical-Review-Summary-Second-Half-of-March-2016</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/png" />
      <description><![CDATA[This report summarizes notable events discussed on jihadist Web forums during the second half of March 2016. Following are the main points covered in the report:
The Islamic State claims responsibility for terrorist attacks that its members carried out in Brussels and justifies their execution on Belgian soil by claiming that Belgium is a Crusader country that is fighting against Muslims. The attacks ignite a wave of publications and discourse on social networks among Islamic State fighters who call for the continuation of terrorist attacks against France, Belgium and other European countries, such as England.]]></description>
    </item>
    <item>
      <title>ICT Celebrates 20 Years</title>
      <pubDate>Wed, 8 Jun 2016 12:14:51 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1676/ict-celebrates-20-years</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[At a festive event, IDC Herzliya’s International Institute for Counter-Terrorism looks back on its first two decades.
First published in Spring Herzliyan 2016]]></description>
    </item>
    <item>
      <title>The Telegram Chat Software as an Arena of Activity to Encourage the “Lone Wolf” Phenomenon</title>
      <pubDate>Tue, 24 May 2016 10:00:40 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1673/the-telegram-chat-software-as-an-arena-of-activity-to-encourage-the-lone-wolf-phenomenon</link>
      <enclosure url="https://www.ict.org.il/images/Michael_Barak.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[Islamist terrorist organizations, such as Al-Qaeda and the Islamic State, show a great interest in cyberspace an important and central tool in increasing their technological capabilities and as another arena of activity in their war against the West. These organizations are undergoing a constant learning process characterized by their attempt to find tools in cyberspace to help them gather intelligence material concerning the enemy’s capabilities and to implement technological tools among their ranks. Since September 2015, we have witnessed a significant increase in the use of the Telegram software (software for sending encrypted instant messages) by the Islamic State and Al-Qaeda. In March 2016 alone, 700 new channels identified with the Islamic State were opened.
]]></description>
    </item>
    <item>
      <title>Foreign Fighters Post Conflict</title>
      <pubDate>Wed, 4 May 2016 12:16:49 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1660/foreign-fighters-post-conflict</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[Foreign fighters during the Soviet invasion of Afghanistan did not play a big role in the actual conflict. However, they did develop critical skills and networks during this time that allowed some of these individuals to disseminate radical ideology and technical know-how, join in other jihadist conflicts, and establish terrorist organizations which severely impacted global security. By examining the post-conflict roles of foreign fighters in Afghanistan, it is possible to see potential paths that can be taken by foreign fighters currently in Syria and Iraq. Taking into account contextual changes, it is possible to use this information to assess the risk of post-conflict foreign fighters from Syria and Iraq on global security. Due to the technological and social changes, large swaths of ungoverned territory and the sheer number of fighters, the foreign fighters leaving this theater will be a risk to global security particularly in regions that lack the resources to monitor returned fighters.]]></description>
    </item>
    <item>
      <title>Summary of Terrorist Incidents and Counter-Terrorist Operations Worldwide November 2015</title>
      <pubDate>Tue, 3 May 2016 12:51:39 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1658/Terrorist-Incidents-and-CT-Operations-November-2015</link>
      <enclosure url="https://www.ict.org.il/images/DatabaseDeskPr.png" length="1" type="image/png" />
      <description><![CDATA[The ICT Database Team is pleased to present a brief overview of the terrorist incidents and counter-terrorist actions that occurred worldwide in November 2015. The incidents covered in this month’s report join the over 35,000 previously-recorded terrorist and counter-terrorist incidents in the ICT database.
]]></description>
    </item>
    <item>
      <title>Signs of a Change in Strategy for AQIM</title>
      <pubDate>Sun, 1 May 2016 09:22:01 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1657/Signs-of-a-Change-in-Strategy-for-AQIM</link>
      <enclosure url="https://www.ict.org.il/images/Michael_Barak.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[Since Al-Mourabitoun merged with Al-Qaeda in the Islamic Maghreb (AQIM) in December 2015, the latter has experienced significant momentum.[1] Its increased number of terrorist attacks, its intensified operations in Mali, the move of its activities to other parts of the African continent (especially in the Sahel region[2] and Western Africa, such as Burkina Faso), and its success in attacking Western-affiliated institutions as well as claiming many lives and destroying property, indicates an increase in AQIM’s power. The strengthening of AQIM stands out against the backdrop of the Islamic State’s weakening power in various fronts due to latter’s strategic distress as a result of strikes by coalition forces in Iraq and Syria.  Abu Abdul Ilah Ahmad, a senior AQIM leader, acknowledged in an interview given to the Palestinian jihadist magazine, Al-Masra, in March 2016 that the merger of the two organizations had significantly increased the organization’s power.[3]
]]></description>
    </item>
    <item>
      <title>A Decade of Hamas in the Political Arena - "Check Please"</title>
      <pubDate>Sun, 17 Apr 2016 15:39:05 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1638/A-Decade-of-Hamas-in-the-Political-Arena</link>
      <enclosure url="https://www.ict.org.il/images/YomTovSamiaPr.JPG" length="1" type="image/jpeg" />
      <description><![CDATA[February 2016 marks 28 years since Hamas's breakthrough (as the organization refers to the day of its establishment), and 10 years since its rise to the political field in democratic elections. This move constituted the first step in its takeover of the Gaza Strip, which was completed after 18 months of clashes with Fatah and the Palestinian Authority. The clashes resulted in the murder of over 100 militants on both sides, mostly from Fatah. Hamas's methods included torture, throwing the bodies of Fatah officers from tall buildings, stealing public funds, and deporting many Fatah supporters to Palestinian Authority areas and Arab countries.
]]></description>
    </item>
    <item>
      <title>Periodical Review - Summary from the Jihadi Forums - The First Half of March 2016</title>
      <pubDate>Thu, 14 Apr 2016 08:35:32 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1653/Periodical-Review-Summary-First-Half-of-March-2016</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/png" />
      <description><![CDATA[This report summarizes notable events discussed on jihadist Web forums during the first half of March 2016.]]></description>
    </item>
    <item>
      <title>Europe May Face a New Wave of Terrorist Attacks</title>
      <pubDate>Sun, 10 Apr 2016 12:15:04 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1652/europe-may-face-a-new-wave-of-terrorist-attacks</link>
      <enclosure url="https://www.ict.org.il/images/WangZhenPr.jpg" length="2" type="image/jpeg" />
      <description><![CDATA[The terrorist attacks that took place on March 22 in Brussels, the “heart of Europe”, killed over 30 people and injured more than 200. Barely half a year after the attacks in Paris on Nov. 13, Europe was suffering another round of major terrorist attacks. If what happened in Paris seemed merely an isolated incident, then the Brussels attacks fully testified to the fact that Europe is now facing a new wave of terrorist attacks.
Republished from the Hong Kong China-US Focus]]></description>
    </item>
    <item>
      <title>Assessing the Cyber Threat to the Train Industry</title>
      <pubDate>Thu, 7 Apr 2016 09:45:26 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1650/Assessing-the-Cyber-Threat-to-the-Train-Industry</link>
      <enclosure url="https://www.ict.org.il/images/CyberDeskPr.png" length="1" type="image/png" />
      <description><![CDATA[On the morning of February 9, 2016, two trains collided head-on near the city of Bad Aibling, approximately 60 km. from Munich, Germany. Ten people were killed in the crash and dozens more were injured, 18 of them critically. As of this moment, the reasons for the accident have not yet been published and the question remains as to whether it was the result of human error or a defect in one of the systems entrusted to maintain safety and prevent such accidents from occurring.[1] According to several evaluations, one of the safety systems had been disarmed as part of a deliberate act and, as a result, there was no warning of the collision.[2]
Over recent decades we have witnessed several successful attacks and attempts by terrorist organizations to strike trains around the world. Most of these attacks were carried out in Asia and Europe where the rail infrastructure is a common means of transportation. An attack and/or successful threat against train function is liable to disrupt the country’s normal activity, damage its economy and even harm people.]]></description>
    </item>
    <item>
      <title>No Place for Other Faiths</title>
      <pubDate>Sun, 3 Apr 2016 14:18:47 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1649/No-Place-for-Other-Faiths</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[On early reports, at least 72 people have been killed and more than 300 injured in a suicide blast inside the Gulshan-e-Iqbal Park in the Iqbal Town area of Lahore, the provincial capital of Punjab Province, on March 27, 2016. Lahore's District Coordination Officer Muhammad Usman stated, "The bomber managed to enter the park and blew himself up near the kids' playing area where kids were on the swings”. Significantly, a large number of people, mostly Christians were present in the park, celebrating Easter [Christendom's holiest day].
First pubslidhed in South Asia Intelligence Review]]></description>
    </item>
    <item>
      <title>The Al-Azhar Institute – A Key Player in Shaping the Religious and Political Discourse in Egypt</title>
      <pubDate>Mon, 28 Mar 2016 13:33:50 +0300</pubDate>
      <link>https://www.ict.org.il/Article/1647/The-Al-Azhar-Institute</link>
      <enclosure url="https://www.ict.org.il/images/Michael_Barak.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[The status of the Al-Azhar Institute at local, regional, and even international levels has been improving significantly since Abdel Fatah al-Sisi was elected President of Egypt in 2014 – due to the fact that it is a strategic partner in the battle against the rising tide of Islamic terror and the religious rhetoric of terrorist organizations. The institution has been an active supporter of the regime’s political agenda ever since the 1952 revolution of the Free Officers Movement, with the understanding that preserving good relations with the regime would ultimately earn power for Al-Azhar, and serve to boost its image in the eyes of Egyptian society. In the 1970’s, for example, Al-Azhar participated in the propaganda war lead by Anwar Sadat against the Communists in the country, who were viewed as a threat to the regime’s stability. It wasn’t for naught that in December 2014, al-Sisi announced his intent to wage his war against Islamic terror from Al-Azhar. From his perspective, the Al-Azhar Institute held a key role in creating a counter narrative and an alternative interpretation of Islamic law, which could suppress the trend of radicalization in society, and challenge the radical discourse emanating from the Islamic terror organizations’ study halls. Al Qaeda, ISIS, and the Muslim Brotherhood were specifically targeted. Al-Sisi surpassed himself when he ruled that there was an urgent need to lead a “religious revolution” to make the religious discourse apply to modern times.]]></description>
    </item>
    <item>
      <title>The Brussels Attacks – 22/03/2016  What do we know? - Insights from ICT Experts</title>
      <pubDate>Wed, 23 Mar 2016 13:16:09 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1645/The-Brussels-Attacks</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[On Tuesday, 22 March 2016, Belgium witnessed the worst terrorist attack carried out on its soil. While the full identity of the attackers is still under investigation, Belgium has a history of being the victim of both international and homegrown terrorism. ]]></description>
    </item>
    <item>
      <title>The Nigerian Reality in the War against Boko Haram: Between Hope and Despair</title>
      <pubDate>Mon, 21 Mar 2016 09:52:47 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1643/The-Nigerian-Reality-in-the-War-against-Boko-Haram</link>
      <enclosure url="https://www.ict.org.il/images/DavidDoukhanPr.JPG" length="1" type="image/jpeg" />
      <description><![CDATA[In a state that is deeply involved in fighting extremism, radical Islamic and terrorism it's expected to see a united nation where all hands are joined and focused on winning the war in spite of political rivalries and other factors such as religion, ethnic  and economic interests. Nigeria’s endless war against Boko Haram, which has been conducted for six years now, is doing the contrary- its splitting forces. What really happened in the North-East of Nigeria? According to its President they won the war against Boko Haram. Others think that the victory over Boko Haram has not been achieved yet. They based their arguments on the continuous vicious terrorist attacks perpetrated by Boko Haram insurgents, attacks that killed dozens of innocent civilians and are responsible for more than 2.5 million people tagged as refugees, attacks that closed thousands of schools in the North-East, leaving the children as easy prey to the radical Islamists, The fact that Boko Haram is now the Islamic State's Province in West Africa (ISPWA) worsens the situation as the group continues to learn from and use the same strategies as ISIS  in its own activities. Reports from Nigeria reflect contradictions - in this article I will try, hopefully, to highlight the situation.]]></description>
    </item>
    <item>
      <title>When Hamas comes into your living room</title>
      <pubDate>Mon, 21 Mar 2016 09:48:18 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1642/when-hamas-comes-into-your-living-room</link>
      <enclosure url="https://www.ict.org.il/images/DeborahHousen-Cureial.JPG" length="1" type="image/jpeg" />
      <description><![CDATA[Two recent hacks by Hamas into satellite TV transmissions of Israel’s popular Big Brother show herald a whole new level of cyber confrontation.
First published in the Times of Israel]]></description>
    </item>
    <item>
      <title>Summary from the Jihadi Forums - The First Half of August 2015</title>
      <pubDate>Sun, 20 Mar 2016 11:58:06 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1641/Periodical-Review-Summary-First-Half-of-August-2015</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/png" />
      <description><![CDATA[This report summarizes notable events discussed on jihadist Web forums during the first half of August 2015.]]></description>
    </item>
    <item>
      <title>Why China Has Not Sent Troops to Strike the Islamic State</title>
      <pubDate>Thu, 17 Mar 2016 15:03:03 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1640/why-china-has-not-sent-troops-to-strike-the-islamic-state</link>
      <enclosure url="https://www.ict.org.il/images/WangZhenPr.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[As the Islamic State forces grew more frenzied last year to wreak havoc in the Middle East, major global powers intensified their military strikes on the terrorist group. China, however, is the only one among the permanent members of the UN Security Council that has not taken military action against IS. That caused a plenitude of whispers among critics on the international scene. Some Western media and scholars drew on the fact to support their accusation that China had been “hitchhiking” in the Middle East.
]]></description>
    </item>
    <item>
      <title>Summary of Terrorist Incidents and Counter-Terrorist Operations Worldwide October 2015</title>
      <pubDate>Tue, 15 Mar 2016 12:46:43 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1637/Terrorist-Incidents-and-CT-Operations-October-2015</link>
      <enclosure url="https://www.ict.org.il/images/DatabaseDeskPr.png" length="1" type="image/png" />
      <description><![CDATA[The ICT Database Team is pleased to present a brief overview of the terrorist incidents and counter-terrorist actions that occurred worldwide in October 2015. The incidents covered in this month’s report join the over 35,000 previously-recorded terrorist and counter-terrorist incidents in the ICT database.
]]></description>
    </item>
    <item>
      <title>Modus Operandi of Al-Qaeda in the Arabian Peninsula</title>
      <pubDate>Sun, 13 Mar 2016 10:45:05 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1636/Modus-Operandi-of-Al-Qaeda-in-the-Arabian-Peninsula</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/jpeg" />
      <description><![CDATA[During 2014, the Al-Malahem media institution, belonging to Al-Qaeda in the Arabian Peninsula (AQAP), published a series of eight recorded lectures about military strategy and combat methods. The lectures – which were produced and presented by a senior official in the organization, Nasr bin Ali al-Ansi – were featured in the framework of publications by the "Jihadist Military Academy". In order to make the lectures more approachable, in November, 2014 a 26 page document was published, briefly summarizing the main points of each lecture.
]]></description>
    </item>
    <item>
      <title>ISIS enters the Stage in the Libyan Drama – How the IS Caliphate expands in Northern Africa</title>
      <pubDate>Mon, 7 Mar 2016 11:00:22 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1631/ISIS-enters-the-Stage-in-the-Libyan-Drama</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[Four years after the Fall of Gadhafi, Libya finds itself in a state of chaos and lawlessness. Two rivaling governments in the East and West compete for the country’s resources and seek to gain control. The highly unstable situation enabled other actors to enter Libya, among them radical Islamic elements such as ISIS. ISIS seeks to take advantage of the precarious situation in Libya and works to apply its own model of governance, while trying to expand its territorial control through force. Theoretical approaches such as the idea of limited statehood/governance or “The Network State” are used to help to understand the highly complex and volatile situation in Libya.]]></description>
    </item>
    <item>
      <title>“Cubs of the Caliphate” The Systematic Recruitment, Training, and Use of Children in the IS</title>
      <pubDate>Sun, 6 Mar 2016 14:05:11 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1629/Cubs-of-the-Caliphate</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[The evolution of terrorism throughout the 20th and 21st century has led to the increasing involvement of children in terrorism. Traditionally, children have been treated as expendables and signal desperation on behalf of the terrorist organization, thereby commonly participating in suicide operations.
]]></description>
    </item>
    <item>
      <title>Islamic Radicalization in Russia</title>
      <pubDate>Thu, 3 Mar 2016 12:29:06 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1628/Islamic-Radicalization-in-Russia</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[This paper examines the phenomenon of Islamic radicalization in Russia, analyzing the causes, dynamics and implications of the increasing radicalization of Russia’s Muslim community. The paper argues that in the last few years Islam has increased its physical presence in Russia, for example through the construction of new mosques and of educational structures, but it has also increased its online presence.]]></description>
    </item>
    <item>
      <title>The In Amenas Gas Facility Attack – An Analysis of the Modus Operandi</title>
      <pubDate>Wed, 2 Mar 2016 10:57:22 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1626/The-In-Amenas-Gas-Facility-Attack</link>
      <enclosure url="https://www.ict.org.il/images/Michael_Barak.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[On January 16, 2013 Salafi jihadist militants connected to Al-Qaeda staged a widespread attack on the Tigantourine gas facility near In Amenas, in the desert region of south-eastern Algeria. During the raid, the attackers took captive about 150 Algerians, and dozens of foreigners. Khalid Abu Abbas, aka Mukhtar Belmukhtar, leader of the organization called “Those who Sign with Blood”– which is affiliated with the jihad organization Al-Mourabitoun, an organization active in the Sahara, and which has pledged allegiance to Al-Qaeda – claimed responsibility for the attack.
]]></description>
    </item>
    <item>
      <title>Iran funding Palestinian terrorism</title>
      <pubDate>Wed, 2 Mar 2016 10:43:01 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1625/iran-funding-palestinian-terrorism</link>
      <enclosure url="https://www.ict.org.il/images/Ely_Karmon.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[Iran’s ambassador to Lebanon, Mohammad Fateh Ali, recently promised that Iran would award $7,000 to the family of every Palestinian terrorist involved in the present wave of individual attacks in the West Bank, and $30,000 to any family of terrorists whose home is demolished by Israel.]]></description>
    </item>
    <item>
      <title>The “Lone Wolf” Terrorist Attacks in Israel 2015/16: The Medical Perspective</title>
      <pubDate>Mon, 29 Feb 2016 10:16:14 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1624/The-Lone-Wolf-Terrorist-Attacks-in-Israel-2015-16</link>
      <enclosure url="https://www.ict.org.il/images/GadiShakedPr.JPG" length="1" type="image/jpeg" />
      <description><![CDATA[The recent wave of terrorist attacks against Israelis during the last 6 months has been characterized mainly by stabbings and shootings events usually carried out by individuals. Thus, the perpetrators are being nicknamed “lone wolves”. 
This paper deals with the medical perspectives of the current wave of terrorism with recommendations for action in order to strengthen Israeli public resilience.]]></description>
    </item>
    <item>
      <title>'Soft' Approaches to Counter-Terrorism: An Exploration of the Benefits of Deradicalization Programs</title>
      <pubDate>Mon, 29 Feb 2016 09:47:41 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1620/Soft-Approaches-to-Counter-Terrorism</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[In light of growing threats from Islamist radicalization and violent extremism around the world, this paper aims to shed some light on current ‘soft’ approaches to counter-terrorism. The distinguishing feature of these ‘soft’ approaches is that they are designed to win the hearts and minds of radicalizing or radicalized individuals by employing non-coercive methods. While acknowledging the importance of counter-radicalization efforts, this paper will mostly focus on explaining and evaluating deradicalization programs.

The first section will define the concepts of radicalization, counter-radicalization, and deradicalization before continuing on to address the range of factors and drivers that make up such programs. The second section will provide a survey of current models of de-radicalization. The third section will outline the various criticisms and perceived problems of deradicalization programs. The fourth section will provide a number of case studies.
The purpose of these will be to provide a sample of different approaches and varying levels of success of programs that have been undertaken in Europe and the Middle East. The paper will conclude with a summary of the main findings.]]></description>
    </item>
    <item>
      <title>ICT Cyber-Desk Review: Report #14</title>
      <pubDate>Sun, 28 Feb 2016 14:45:23 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1619/Cyber-Desk-Review-Report-14</link>
      <enclosure url="https://www.ict.org.il/images/CyberDeskPr.png" length="1" type="image/png" />
      <description><![CDATA[This report covers the period of July - September 2015 and covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse) and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack).
]]></description>
    </item>
    <item>
      <title>The Islamic State on Social Media – Recruiting Western Women</title>
      <pubDate>Tue, 23 Feb 2016 16:12:57 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1617/ISIS-on-Social-Media</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[The research discusses ISIS’s Media Strategy towards western women by examining the Tumblr blog UMM LAYTH. Written by a young woman from Scotland who traveled to the Islamic State, the blog speaks about daily life under ISIS. The paper gives a background on the author, the content and the blog’s style.]]></description>
    </item>
    <item>
      <title>Mediterranean Solidarity</title>
      <pubDate>Mon, 22 Feb 2016 15:44:48 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1616/Mediterranean-Solidarity</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[This article examines the peculiar convergence of interests, as well as the underlying motives, that engendered the recent partnership initiative between an Italian neo-fascist movement, CasaPound, and the notorious Lebanese terrorist organization, Hezbollah.
In order to bring light into a rather obscure niche of the academic research, we will first introduce the ideological drivers that underpinned the dialectic relationship that the Italian radical right maintained with the so-called ‘Resistance Camp’ throughout the entire Second World War’s aftermath, never succeeding, however, in materializing a cooperation on the operational level.
The central part of this work focuses on CasaPound’s organizational dimension, providing the reader with the essential insights concerning this neo-fascist group, necessary to put the partnership enterprise into the right perspective. The ensuing section deals with CasaPound’s international operations, with a special emphasis on the Syrian arena. This author believes, indeed, that the civil war situation in Syria, along with its dramatic international ramifications, functioned as a catalyst for translating an arid ideological affinity into actual operational collaboration.
The two conclusive sections present an in-depth analysis of the conference ‘Mediterraneo Solidale’, – which took place in Rome on September 26, 2015, under CasaPound’s lead and saw the participation of two eminent figures of Hezbollah’s Political Council – as well as an attempt to explicate the mutual benefits that this sort of partnership might entail for the two players.]]></description>
    </item>
    <item>
      <title>The Islamic State’s Threat to Israel</title>
      <pubDate>Thu, 18 Feb 2016 13:51:23 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1612/The-Islamic-States-Threat-to-Israel</link>
      <category>https://www.ict.org.il/Article/1612/The-Islamic-States-Threat-to-Israel</category>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[Challenges and Coping Mechanisms
An assessment of the situation as of January 2016
Written by Dr. Eitan Azani, Col. (Res.) Jonathan Fighel and Lorena Atiyas Lvovsky.]]></description>
    </item>
    <item>
      <title>Summary of Terrorist Incidents and Counter-Terrorist Operations Worldwide September 2015</title>
      <pubDate>Tue, 16 Feb 2016 13:58:54 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1610/Terrorist-Incidents-and-CT-Operations-September-2015</link>
      <enclosure url="https://www.ict.org.il/images/DatabaseDeskPr.png" length="1" type="image/png" />
      <description><![CDATA[The ICT Database Team is pleased to present a brief overview of the terrorist incidents and counter-terrorist actions that occurred worldwide in September 2015. The incidents covered in this month’s report join the over 35,000 previously-recorded terrorist and counter-terrorist incidents in the ICT database.
]]></description>
    </item>
    <item>
      <title>Periodical Review - Summary from the Jihadi Forums - The Second Half of June 2015</title>
      <pubDate>Mon, 15 Feb 2016 16:58:52 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1609/Periodical-Review-Summary-Second-Half-of-July-2015</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/png" />
      <description><![CDATA[This report summarizes notable events discussed on jihadist Web forums during the second half of July 2015.]]></description>
    </item>
    <item>
      <title>Is Money a Legitimate Target?</title>
      <pubDate>Thu, 11 Feb 2016 09:24:58 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1606/money-legitimate-target</link>
      <enclosure url="https://www.ict.org.il/images/Daphn%C3%A9RichemondBarakPr.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[Last month, the United States targeted a “cash distribution site” where millions of dollars belonging to ISIS had reportedly been stored. The target was considered so valuable that it would have justified a high number of civilian casualties (rumors say that the magic number was 50). Yet, the determination of whether money is civilian or military in nature, assuming this test is even relevant, is not as straightforward as it seems.]]></description>
    </item>
    <item>
      <title>How Palestinians hurt the Palestinians</title>
      <pubDate>Wed, 10 Feb 2016 16:20:55 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1605/how-palestinians-hurt-the-palestinians</link>
      <author>Webmaster@ict.org.il (Dr. Ely Karmon)</author>
      <enclosure url="https://www.ict.org.il/images/Ely_Karmon.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[In his remarks to the Security Council on the Situation in the Middle East, Secretary-General Ban Ki-moon recently condemned “stabbings, vehicle attacks, and shootings by Palestinians targeting Israeli civilians.” He even condemned “the continuing rocket fire into Israel from militant groups in Gaza.”]]></description>
    </item>
    <item>
      <title>Periodical Review - Summary from the Jihadi Forums - The First Half of July 2015</title>
      <pubDate>Sun, 7 Feb 2016 15:01:29 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1601/Periodical-Review-Summary-First-Half-of-July-2015</link>
      <enclosure url="https://www.ict.org.il/images/JWMG_Profile.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[This report summarizes notable events discussed on jihadist internet forums during the first half of July 2015.]]></description>
    </item>
    <item>
      <title>The Islamic State speaks Russian – a new market for ISIS propaganda</title>
      <pubDate>Wed, 3 Feb 2016 14:44:01 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1598/The-Islamic-State-speaks-Russian</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[Tracking the Islamic State (ISIS) propaganda activities clearly shows that 2014 and 2015 have become turning years in ISIS’ attention towards Russia - both government, officials, as well as potential fighters. Russians fight for ISIS at least since 2011, but it were these 2014 and 2015 years when ISIS propaganda machine has started active spreading both reading, audio, and video materials targeting various audience groups in Russia. Thus, in September 2014 (three month after declaring a new Islamic Caliphate) ISIS have released a message threatening Russian and personally president Putin to conquer (or to “liberate” according the message) Caucasus, and Chechnya in particular in retaliation to Russian military planes supplies to Syrian government army.]]></description>
    </item>
    <item>
      <title>Summary of Terrorist Incidents and CT Operations: August 2015</title>
      <pubDate>Sun, 31 Jan 2016 16:06:00 GMT</pubDate>
      <link>https://www.ict.org.il/Article/1597/Terrorist-Incidents-and-CT-Operations-August-2015</link>
      <enclosure url="https://www.ict.org.il/images/database_profile.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[The ICT Database Team is pleased to present a brief overview of the terrorist incidents and counter-terrorist actions that occurred worldwide in August 2015. The incidents covered in this month’s report join the over 35,000 previously-recorded terrorist and counter-terrorist incidents in the ICT database. ]]></description>
    </item>
    <item>
      <title>Islamic Radicalization In Belgium</title>
      <pubDate>Fri, 29 Jan 2016 16:06:00 GMT</pubDate>
      <link>https://www.ict.org.il/Article/1595/Islamic-Radicalization-In-Belgium</link>
      <enclosure url="https://www.ict.org.il/images/WorkerDef.jpg" length="1" type="image/jpeg" />
      <description><![CDATA[Belgium has become a major hotbed for radicalization in Europe. At least 380 Belgians have travelled to Syria as foreign fighters, giving Belgium the largest number of jihadists per capita at 33.9 fighters per one million residents. Radicalized Belgian Muslims are significantly involved not only in terrorist attacks in Belgium, but throughout Europe. What has caused Belgium to become this fertile a ground for Islamic radicalization?
This paper points to the low levels of employment, high levels of discrimination, low educational achievement, poor integration, and inconsistent governmental funding pervasive among the Belgian Muslim community. These poor demographic realities of the Belgian Muslim community might be significant in providing a fertile ground for radical Islamic parties and organizations to influence and recruit.
This paper analyzes Islamic radicalization in Belgium. The first part of this paper examines Belgian-Muslim demographics, including population, integration, political participation, and organization. Then, Belgian Islamic radicalization is examined through the theoretical frameworks of both McCauley and Moskalenko and Social Movement Theory. To conclude, this paper considers governmental responses and recommendations for future preventative actions. ]]></description>
    </item>
    <item>
      <title>Periodical Review - Summary from the Jihadi Forums - The Second Half of June 2015</title>
      <pubDate>Tue, 26 Jan 2016 14:30:58 +0200</pubDate>
      <link>https://www.ict.org.il/Article/1594/Periodical-Review-Summary-Second-Half-of-June-2015</link>
      <enclosure url="https://www.ict.org.il/images/JWMGPr.png" length="1" type="image/jpeg" />
      <description><![CDATA[This report summarizes notable events discussed on jihadist Web forums during the second half of June 2015. ]]></description>
    </item>
  </channel>
</rss>