The International Institute for Counter-Terrorism's (ICT's) 17th World Summit on Counter-Terrorism took place on September 11-14, 2017. ICT's 17th International Conference was held under the theme of "The Terrorism Maze" aimed at analyzing and discussing the factors, influences and trends which make up the web of terrorism and counter-terrorism.
Conference Website l Schedule l Videos l Radio
ICT’s Research and Publications include short analyses and in-depth publications on a wide variety of topics including: terrorism, counter-terrorism, homeland security, radicalization process, cyber-terrorism, reviews from Jihadi Websites and insights from our database.
ICT uses its unique expertise on terrorism and counter-terrorism to offer a number of exciting educational opportunities, including BA and MA Degree, an Executive Course, E-learning Course and special, customed training and courses.
Through academic publications, events and conferences, the ICT serves as a joint forum for international policymakers and scholars to share information and expertise.
Counter-Terrorism Solutions Lts. (CTS) is the training and consulting arm of ICT provides services in threat assessment, risk analysis, red teaming, war-gaming, terrorist prosecution, open source intelligence (OSINT) as well as courses and training.
Executive Program 2017
The Counter-Terrorism Studies Program combines academic study, simulation models, workshops, and onsite briefings.
For more information about the Courses, Registration and Accommodation
Cyberizing Counter-terrorism Legislation and Policy:National and International Developments l Adv. Deborah Housen-Couriel
Recent years have seen interesting developments in the evolution of legal and policy counter-terrorism initiatives at both the national and international levels. These developments have been partially driven by an earlier lack of legal frameworks for responding effectively to the bitter experience of terrorist attacks that have taken lives around the globe.
Bush, Obama, And Trump: The Evolution Of U.S. Counterterrorist Policy Since 9/11 l Mr. Brian Jenkins
The Involvement of Islamist Agents of Change in Lebanon and Turkey l Dr. Michael Barak
Islamic associations in Lebanon and Turkey, most of which have ties to Hamas and the northern branch of the Islamic Movement, have demonstrated support for the Palestinian struggle against Israel's sovereignty on the Temple Mount.
Incitement - Terrorist Attack in Wimbledon l Cyber Desk
Since the beginning of 2017, a string of jihadist terrorist attacks involved Central Asian citizens, mainly of Uzbek and Kirgiz origin, notably in Turkey, Russia and Sweden. Another element, which should not be underestimated, are the Uighur jihadists, original from the Xinjiang Region in China.
First published in Perspectives on Terrorism Vol 11, No 4 (2017)
There was no need to wait for last week’s publication of the State Comptroller’s report to know that Operation Protective Edge was neither a military nor a political victory for Israel. At the end of the 2014 clash with Hamas I disseminated a position paper “’Protective Edge’ – A Strategic (temporary?) Balance” arguing that Hamas had not been militarily defeated, was not especially deterred and remained unwilling to give up control of the Gaza Strip.
On Monday, December 19, 2016, Germany witnessed the worst terrorist attack carried out on its soil since the 1980s. While the full identity of the attacker is still under investigation, Germany has a history of being the victim of both international and homegrown terrorism. Germany continues to be a significant target for terrorists, especially since the country joined the anti-ISIS coalition led by the United States.
The changing phenomenon of war and investment in the cyber arena are steering the world into a new era in which war is not necessarily waged on a battlefield and does not even require a direct assault on human life. This issue came to the fore in a variety of methods ranging from influencing elections, attacking critical infrastructure, disrupting day-to-day life, and neutralizing military capabilities. How has the cyber dimension influenced the phenomenon of war between countries? And what are the security challenges facing countries in the coming years?
On the backdrop of the Caliphate’s slow military demise in Syria and Iraq, the last six months have revealed two new trends in the jihadi attacks against Western targets: the growing role of terrorists of Central Asian origin and of the use of the Libyan territorial platform.
On March 26, 2017, the ISIS information office in Diyala Province, Iraq, published a 37-minute video in Farsi, with some parts in the Baluchi dialect, titled, "Persia – Between Yesterday and Today." The video accuses Iranian Shi'ites of committing many crimes against Sunnis and oppressing the Sunni population of Iran, "exporting the revolution," spreading Shi'ism, and secretly collaborating with the U.S. and Israel.
On Monday, May 22nd, 2017, at around 22:30, 22 people lost their lives and close to a hundred were injured when a suicide bomber blew himself up at the foyer of the Manchester Arena in Manchester, United Kingdom. At the time of the explosion, close to 21,000 people, mostly under the age of 18, were making their way out of the Manchester Arena concert hall after attending a concert of American pop star, Ariana Grande. According to reports, the bomber, 22-year-old Salman Ramadan Abedi, arrived at the ticket stall located at the Arena’s foyer after travelling on the local Tube system’s Victoria Station.
The terrorist attack that took place in the beginning of June by an Islamic State (IS) supporter of Somali origin in Melbourne, Australia, proves that the Muslim community in Australia continues to be a target for incitement, whether in the public arena or on social networks, by the IS and Al-Qaeda. Only recently did Turkish authorities report that their list of terrorist operatives included 40 Australian citizens who had crossed the Turkish border to Iraq or Syria, and that from 2014-2016 there was a significant jump of 350% in the recruitment of Muslims from Australia to Islamic terrorist organizations.
One-on-One Interview with Maj. Gen. (Res.) Sami Turgeman, Former Commander Southern Command and Senior Fellow at the International Institute for Counter-Terrorism (ICT)
Due to their preoccupation with the trivial and tasteless, our leaders have been blind to the development of Israel’s threat perception taking place right under their noses. Those with eyes in their heads and a basic understanding of historical processes, especially with regard to the Middle East, cannot help but be concerned about the smugness of our decision-makers.
Arab Muslims use the sacred al-Aqsa Mosque compound to prepare and stage a terrorist attack. They try to take refuge in the Mosque after killing the policemen knowing that it would be even a greater incident if the Police entered the Holy Mosque to try to arrest them. They don’t see any religious or moral constraints in desecrating the holy place.