ICT's 16th International Conference: World Summit on Counter-Terrorism will address the terrorism challenges currently faced by the international community.
For early registration or more information please contact: [email protected]
The Counter-Terrorism Studies Program combines academic study, simulation models, workshops, and onsite briefings.
For more information about the Courses or Registration
ICT’s Research and Publications include short analyses and in-depth publications on a wide variety of topics including: terrorism, counter-terrorism, homeland security, radicalization process, cyber-terrorism, reviews from Jihadi Websites and insights from our database.
ICT uses its unique expertise on terrorism and counter-terrorism to offer a number of exciting educational opportunities, including BA and MA Degree, an Executive Course, E-learning Course and special, customed training and courses.
Through academic publications, events and conferences, the ICT serves as a joint forum for international policymakers and scholars to share information and expertise.
Counter-Terrorism Solutions Lts. (CTS) is the training and consulting arm of ICT provides services in threat assessment, risk analysis, red teaming, war-gaming, terrorist prosecution, open source intelligence (OSINT) as well as courses and training.
The review covers a broad range of fields and presents trends in the dialogue between Jihadi activists and supporters. It examines new Jihadi publications (Social media) as well as traditional news sources.
This report covers the period of October - December 2015 and addresses two main subjects: cyber-terrorism (offensive, defensive, in the media, and the main topics of jihadist discourse) and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack).
In this special edition of Counter Terrorism Today, Mr. Dan Diker sat down with Prof. Boaz Ganor, the founder and director of the International Institute for Counter-Terrorism.
This review reports the main fatwas [religious-legal rulings] issued in April-May 2015 in response to readers’ questions by Minbar Al-Tawhid wal-Jihad, the Web site of Salafist ideologue Abu Muhammad al-Maqdisi.
Al-Sumud is an Arabic language magazine published by the Taliban in Afghanistan, which covers the jihad objectives in the Afghan arena. The organization, which is also called the "Islamic Emirate of Afghanistan", is an Islamic jihad Sunni organization first active in Afghanistan in 1994, after the fall off the Soviet regime in that country.
The Newsletter highlights ICT's activities, including information on ICT's academic publications & programs, international seminars, briefings, and conferences.
Two high-profile experts of security politics joined host Mr. Dan Diker for this special Counter Terrorism Today edition to commemorate the ICT’s 20th anniversary with Prof. Boaz Ganor and Mr. Dan Meridor.
International law does not directly address intelligent defense systems (IDSs), of which Israel’s Iron Dome embodies the most successful implementation to date. This Article argues that international humanitarian law (“IHL”) should encourage the development and use of systems like Iron Dome by conceptualizing such systems as civil defense.
Written by Daphné Richemond-Barak and Ayal FeinbergPublished in the Harvard National Security Journal
Over recent decades we have witnessed several successful attacks and attempts by terrorist organizations to strike trains around the world. Most of these attacks were carried out in Asia and Europe where the rail infrastructure is a common means of transportation. An attack and/or successful threat against train function is liable to disrupt the country’s normal activity, damage its economy and even harm people.
Written by Nir Tordjman and Oren Elimelech
On early reports, at least 72 people have been killed and more than 300 injured in a suicide blast inside the Gulshan-e-Iqbal Park in the Iqbal Town area of Lahore, the provincial capital of Punjab Province, on March 27, 2016. Lahore's District Coordination Officer Muhammad Usman stated, "The bomber managed to enter the park and blew himself up near the kids' playing area where kids were on the swings”. Significantly, a large number of people, mostly Christians were present in the park, celebrating Easter [Christendom's holiest day].
First pubslidhed in South Asia Intelligence Review
Since Al-Mourabitoun merged with Al-Qaeda in the Islamic Maghreb (AQIM) in December 2015, the latter has experienced significant momentum. Its increased number of terrorist attacks, its intensified operations in Mali, the move of its activities to other parts of the African continent (especially in the Sahel region and Western Africa, such as Burkina Faso), and its success in attacking Western-affiliated institutions as well as claiming many lives and destroying property, indicates an increase in AQIM’s power. The strengthening of AQIM stands out against the backdrop of the Islamic State’s weakening power in various fronts due to latter’s strategic distress as a result of strikes by coalition forces in Iraq and Syria. Abu Abdul Ilah Ahmad, a senior AQIM leader, acknowledged in an interview given to the Palestinian jihadist magazine, Al-Masra, in March 2016 that the merger of the two organizations had significantly increased the organization’s power.
Foreign fighters during the Soviet invasion of Afghanistan did not play a big role in the actual conflict. However, they did develop critical skills and networks during this time that allowed some of these individuals to disseminate radical ideology and technical know-how, join in other jihadist conflicts, and establish terrorist organizations which severely impacted global security. By examining the post-conflict roles of foreign fighters in Afghanistan, it is possible to see potential paths that can be taken by foreign fighters currently in Syria and Iraq. Taking into account contextual changes, it is possible to use this information to assess the risk of post-conflict foreign fighters from Syria and Iraq on global security. Due to the technological and social changes, large swaths of ungoverned territory and the sheer number of fighters, the foreign fighters leaving this theater will be a risk to global security particularly in regions that lack the resources to monitor returned fighters.
The emerging legal framework governing foreign fighters, whose importance is set to grow, epitomizes assumptions we’ve made about the good, the bad, and the ugly in Syria. While the international community condemns the recruitment of “foreign fighters” by ISIS, it condones the recruitment of “foreign volunteers” by the Kurds.
Written by Daphne Richemond-Barak And Victoria Barber
First published in Opinion Juris
At a festive event, IDC Herzliya’s International Institute for Counter-Terrorism looks back on its first two decades.
First published in Spring Herzliyan 2016
The media institution called "The Al-Himma Library", which publishes pamphlets and manifestos for the Islamic State, published a new edition of a document entitled "Thirty Suggestions for Islamic State Emirs and Soldiers". The document was originally authored by Abd al-Mun'im bin Izz al-Din al-Badawi, also known as Abu Hamza al-Muhajer and as Abu Ayyub al-Misri. Al-Misri was a prominent Egyptian Jihadist official who served as a leader of Al Qaida in Iraq after the death of Abu Musab al-Zarqawi, and was killed in a raid on his home in April, 2010. The document was initially published in November 2010 by The Al-Himma Library, which operated under the auspices of the Islamic State of Iraq. In the introduction, which was composed by the Al-Himma Library, it was explained that the new edition was published five years after al-Misri's death (the first new edition was published in January 2015, and the second in February 2016), in hopes that the mujahedeen and the emirs in the Islamic Caliphate would find it beneficial.
Backgrounder for the The Herzliya Conference Simulation: The Middle East after the Territorial Demise of the Islamic State in Iraq and Syria, June 14, 2016.
Written by Dr. Shaul Shay and Dr. Ely Karmon
What conclusions can be drawn from the little information coming out of the terrorist attack at an LGBT club in Orlando; an attack in which the terrorist, Omar Saddiqui Mateen, burst into the Pulse nightclub and murdered 50 civilians, held hostages and injured dozens more over a period of approximately three hours before security forces stormed the club and killed him? Already at this early stage of the investigation one can find oversights and mistakes in judgement made by various authorities that enabled the execution of the worst terrorist attack to take place in the United States since September 11, 2001: intelligence oversights, operational oversights, a limited understanding of the threat facing the US and the entire western world, all heavily and dangerously cloaked in political correctness.
First publish in Hebrew on Ynet
Saif al-Adel (meaning: "Sword of Justice") is a pseudonym for Mohammed bin Salah al-Din Zidan, an Egyptian strategist from the generation of Al-Qaeda's founders. Zidan was in charge of security for Bin Laden, and was also the organization's explosives expert. He was involved – among other things – in planning the attacks on the American embassies in Kenya and Tanzania in 1998. In recent years, Zidan's location has been a mystery, though it is commonly assumed that he was under house arrest in Iran, and eventually released – according a September 2015 report.
The July 2, 2016, hostage crisis and slaughter at the Holey Artisan restaurant in upscale Gulshan, Dhaka, was unprecedented in its character and scale in the history of terrorism in Bangladesh. It reflects an abrupt escalation of the challenge for the state apparatus and raises complex questions of counter-terrorist (CT) responses in the past, and of future imperatives.
First published in SOUTH ASIA INTELLIGENCE REVIEW Weekly Assessments & Briefings Volume 15, No. 1, July 4, 2016
The month of Ramadan saw a significant increase in the number of threats made by jihadist organizations, especially the Islamic State, to attack western countries. At the same time, there was also a rise in the number of terrorist attacks that were carried out in the field and their level of cruelty, such as the three attacks that were carried out in Saudi Arabia in the beginning of July 2016. The popular encrypted chat software, Telegram, serves as a rather convenient platform for jihadist organizations’ propaganda and psychological warfare against the West.
The new Israeli counter-terrorism bill, that was put forth by the Government,constitutes an attempt to regulate internal Israeli legislation and adjust the tools at the authorities’ disposal to cope with renewed terrorism threats, while striking an appropriate balance between the state’s security interests and its need to safeguard the fundamental principles of the liberal-democratic system and the human rights that it protects.
This position paper was written by Mr. Uri Ben Yaakov, Senior Researcher, and Dr. Dror Harel, Research Fellow, with the assistance of the ICT team and their colleagues.