ATbar ICT's Publications

ICT's Publications

ICT’s Research and Publications include short analyses and in-depth publications on a wide variety of topics including: terrorism, counter-terrorism, homeland security, radicalization process, cyber-terrorism, reviews from Jihadi Websites and insights from our database.


ICT Cyber-Desk Review: Report #11

12/05/2015 | by Cyber Desk

This report covers the period of October - December 2014

See Full Article

ICT Cyber-Desk Review: Report #7

15/05/2014 | by Cyber Desk
This report covers the period of December 2013 - January 2014
See Full Article

The Evolving Law on Cyber Terrorism: Dilemmas in International Law and Israeli Law

25/03/2013 | by Housen-Couriel, Deborah (Adv.)

Cyber attacks present one of several new challenges to global, national and personal security that result from cyber space weapons development and deployment. These new threats are a daily occurrence in every country and range from ongoing attacks on governmental institutions to the January 2012 "Saudi hacker" breaches of Israeli credit card databases. International law is currently taking important initial steps to address the illegality of cyber attacks and states' right to defend against them in general, and is making inroads regarding cyber terrorism in particular. Nonetheless, much ambivalence remains in both international and Israeli law regarding its definition and ramifications. 

This ambivalence has so far curtailed the development of definitive normative prescriptions applicable to cyber terrorism. Nonetheless, a present focus of threat assessment is the vulnerability of critical infrastructures and networks to cyber terrorism attacks. Due to the ability of terrorists to leverage potentially devastating cyber attacks at relatively low cost to themselves, this area of asymmetry should become prioritized as new arena for counter-terrorism law and policy. Indeed, it seems to be garnering "fast track" treatment due to the particular threats these attacks pose. 

In this article, the emerging international legal norms prohibiting cyber terrorism will be examined; and the relevant provisions of Israeli legislation will be analyzed in a comparative context. In conclusion, four observations about present trends and global legal developments will be offered.

See Full Article

The Use of the Internet by Far Right Extremists

30/08/1999 | by Whine, Michael
It is becoming more common for the far right to use technology and the internet. It is this tendency to use cyberspace as a means to communicate, and to a lesser extent to effect command and control, the dangers that arise therefrom and the legal sanctions used to combat these developments that are the most concerning.
See Full Article

Cyberspace A New Medium for Communication, Command and Control by Extremists

05/05/1999 | by Whine, Michael
During the 1970's and 1980's political extremism and terrorism frequently focused on 'national liberation' and economic issues. The collapse of the Soviet bloc, and the ending of its covert funding and encouragement of terrorism led to a decline in the militant and violent left-wing terrorist groups that were a feature of the age.
See Full Article