International Institute for Counter-Terrorism (ICT) Publisher Description
Founded in 1996, the International Institute for Counter-Terrorism (ICT) is one of the leading academic institutes for counter-terrorism in the world, facilitating international cooperation in the global struggle against terrorism. ICT is an independent think tank providing expertise in terrorism, counter-terrorism, homeland security, threat vulnerability, risk assessment, intelligence analysis, national security and defense policy. ICT is a non-profit organization located at the Interdisciplinary Center (IDC), Herzliya, Israel which relies exclusively on private donations and revenue from events, projects and programs.
Research Reports
Research Reports in JSTOR from International Institute for Counter-Terrorism (ICT)
128 Research Reports in JSTOR Date
The 7/10 Massacre of Hamas as an Inspiration Model for the “Change Stream” (“Tayyar al-Taghyir”) in the Muslim Brotherhood 2023
Afghanistan in the Shadow of the US and NATO Withdrawal 2021
Al Shabaab and the 911 style terror plot 2021
Al-Qaeda, the regional upheaval and Israel – from someone else's problem to a different kind of problem 2013
Al-Tajammu:: a Pro-Iranian International Platform to Leverage the Resistance Axis 2021
THE AMERICAN HOSTAGE POLICY — A HISTORIC PRO-ACTIVE SHIFT 2020
Analysis of Cyber Trends 2016 2016
Arab Spring and Arab Armies:: A New Framework for Analysis 2013
The Assassination of Bin Laden:: A Comparative Look at the Official Response and “Popular Opinion” in the Online Arab Media 2011
Assault on Care Home for People with Disabilities in Japan 2022
Assessing the Cyber Threat to the Train Industry April 2016 2016
Belgium’s Shameful and Dangerous Deal with Iran 2023
Between Gaza and Sana’a 2023
The Boiling Sahel 2021
Boko Haram:: The Rise, Success, and Continued Efficacy of the Insurgency in Nigeria 2012
Boko Haram in 2020 2020
Boko Haram - Learning from Military History 2020
Can Self-Regulation Work?: Lessons from the Private Security and Military Industry 2013
The Case for Establishing an International Tribunal for International Terrorist Organizations 2013
CCTA’s Statement Regarding the End of the Raid of al-‘Adnani 2017
Conspiracy Theories and Antisemitism:: Unveiling Trends Post-October 7th 2024
Countering Hate in the Digital Age:: Analyzing Far-Right Extremist Responses to the Israel-Hamas War 2023
The Crisis of Governance in the Middle East:: Implications for Democracy, Development & Security 2013
The Cruel War in Northern Mali Rages On 2022
Cyber Report 2019
Cyber Report 24 September-November 2017 2018
Cyber Report #30 2019
Cyber Report # 31 2019
Cyber Report no. 23 June-August 2017 2017
Cyber Updates 2020
Cyber Updates 2020
Cyber-Desk Review:: Report #2 2013
Cyber-Terrorism Activities Report No. 10: July – September 2014 2014
Cyber-Terrorism Activities Report No. 11: October – December 2014 2014
Cyber-Terrorism Activities Report No. 12: January – March 2015 2015
Cyber-Terrorism Activities Report No. 13: April – June 2015 2015
Cyber-Terrorism Activities Report No. 14: July – September 2015 2015
Cyber-Terrorism Activities Report No. 15: October – December 2015 2015
Cyber-Terrorism Activities Report No. 16: January – March 2016 2016
Cyber-Terrorism Activities Report No. 17: April - June 2016 2016
Cyber-Terrorism Activities Report No. 18: July - September 2016 2016
Cyber-Terrorism Activities Report No. 19: October - December 2016 2016
Cyber-Terrorism Activities Report No. 3 2013
Cyber-Terrorism Activities Report No. 4 2013
Cyber-Terrorism Activities Report No. 5 2013
Cyber-Terrorism Activities Report No. 6: October-November 2013 2013
Cyber-Terrorism Activities Report No. 7: December 2013 - January 2014 2013
Cyber-Terrorism Activities Report No. 8: February 2013 - March 2014 2013
Cyber-Terrorism Activities Report No. 9: April – June 2014 2014
Cycle of Incitement:: The Writing is on the Telegram Wall 2024
The death of Osama bin Laden — Interview with ICT Senior Researchers 2012
THE DILEMMAS FACED BY THE KENYAN GOVERNMENT IN THE FIGHT AGAINST THE AL- SHABAAB TERRORIST GROUP 2015
Djibouti the next target of Al-Shabaab 2021
Economy, Elections and Resounding Boomerang Effect for Nasrallah:: The Impact of the Israel-Lebanon Maritime border Agreement 2022
Egypt between “Al-Aqsa Flood” and the “Swords of Iron” 2023
The end of Islamic State's Cyber Security unit Afaq? 2022
The End of Operation Barkhane 2022
Enhanced Resilience Through Innovative Networked Security 2012
The European Union Blacklisting Hezbollah: Testimony of Dr. Eitan Azani before the Committee on Foreign Affairs of the European Parliament, Brussels, July 9, 2013 2013
The Evolving Law on Cyber Terrorism:: Dilemmas in International Law and Israeli Law 2013
An Examination of a Potential Connection between the Trafficking of Women on the Darknet and the Financing of Terrorism 2019
Executive Ordered Dead: A Consideration on the Legality of the Targeted Killing of Political Leaders 2013
The Expansion of Radical Islam in Africa - Mozambique as a Case Study 2020
The Far Right — Ideology, Modus Operandi and Development Trends 2020
Global Jihad in Africa:: Danger and Challenges 2021
The Goals of Hamas’ Terrorist Attack on Israel from Gaza 2023
Hamas Media Campaign:: “Al Aqsa Flood” 2023
Hamas’s Strategic Surprise:: Western misunderstanding of the 2007 Hamas takeover of the Gaza Strip 2013
Hezbollah and the Lebanese System:: Between the Siniora Government (2005) and the Hezbollah Government (2011) 2013
Hezbollah & Iran in Latin America – A Threat Just Beneath the Surface 2013
Hezbollah-Hamas Cooperation:: Motivations, Manifestations and Future Outlook 2013
Hezbollah's Fundraising Activity in Africa Focus on the Democratic Republic of Congo 2013
Hezbollah’s Threats on Karish Gas Drilling Rig and Israeli Natural Gas Production – a Potential for a Miscalculation That May Lead to War 2022
Hiding to Fight Another Day:: Far-Right Extremists Adopt a New Strategy in the Cyberspace Arena after 6 January Capitol Attack 2021
The Hijab Protest:: Between Continuity and Change 2023
Hybrid War and the Gulliverization of Israel 2012
ICT Cyber-Desk Review 2013
Identifying the Enemy in Counterterrorism Operations - A Comparison of the Bush and Obama Administrations 2014
Implications of the Assault on a Commuter Train in Japan 2022
In the Eye of the Storm:: An Israeli Perspective on the “Arab Spring” 2013
Incitement to Carry Out a Terrorist Attack in Wimbledon 2017
Index of Muslim Radicalization and De-Radicalization in Italy 2021
Infected by Hate:: Far-Right Attempts to Leverage Anti-Vaccine Sentiment 2021
Internal Management Implications of Security Prisoners in Israeli Prisons 2014
Iran and al-Qaeda Under Sheikh Saif al-Adel:: The Ramifications for Israel 2023
Iranian terrorist activity in Africa:: the Swedish connection 2021
Iran’s Strategy of Terrorist Blackmail in a Historic Perspective 2022
Is the Chatbot a Threat or an Opportunity for Security Organizations? 2023
“ISIS in Libya - Exploitation and Governance of Areas of Limited Statehood” 2015
The Islamic State is Expanding its Areas of Influence in Mali 2023
The Islamic State’s Web Jihadi Magazine Dabiq and Rumiyah.: More than just Propaganda 2021
The Islamist Insurgency in Egypt – Mind the Gaps: Challenges to Legitimacy, Security and Capacity 2014
Israel's Counter-Terrorism Bill:: Central Themes & Challenges 2014
Jihadists’ Use of Virtual Currency 2018
Jordan:: In the Balance 2013
Jordan and the War in Gaza 2023
Kurdish Separatism in Turkey:: The PKK's Changing Strategy 2013
The Leadership crisis of Al-Qaeda in the Arabian Peninsula(AQAP) 2021
Legal Challenges of War in Areas of Problematic Sovereignty 2013
Locked and Loaded:: American Far Right’s Growing Interest in Homemade Firearms 2021
A Match Made in Heaven:: The Hezbollah-Amal Nexus 2022
Media Jihad Campaign:: The Islamic State’s Response to Deplatforming 2023
Multinational Joint Task Force (MNJTF) against Boko Haram — Reflections 2020
No Friends Left to Lose:: Reassessing the United States’ Strategy in Egypt 2013
Nominating a New Leader for al-Qaeda and its Impact on the Strategic Relationship with Iran 2022
On Political Order and the “Arab Spring” 2012
One-way back home:: prisoners’ deal-exchange 2021
Osama Bin Laden's Elimination – First Responses from Jihadi Forums 2011
Osama Bin Laden's Elimination through the Prism of Al-Qaeda's Affiliates and Global Jihad Supporters — Follow-Up Report 2011
Palestinian Terrorist Organizations, Pioneers of Global Terrorism:: Is Hamas Entering the Global Arena? 2024
Processes and Trends of Global Jihad on the African Continent 2022
The Ramifications of Ayman al-Zawahiri Targeted Killing 2022
The Risk of and Countering the Islamic State use of Chemical Weapons against Israel 2015
The road ahead for Al-Qaeda:: The role of Aymaan Al Zawahiri 2011
Sahel:: Climate Change Challenge And Spread Of Terrorist Organizations 2020
Salafist-Takfiri Jihadism:: the Ideology of the Caucasus Emirate 2014
The Security Evolution of Singapore: An Examination of Security and Counter-Terrorism Legislation 2016
Security Implications of the “Arab Spring” 2013
South Africa:: (Is it) The Future of Domestic and the Global White Race? 2022
South Africa:: (Is it) The Future of Domestic and the Global White Race? 2022
Terrorism in Southeast Asia:: The Case of the Abu Sayyaf Group and Jemaah Islamiyah 2015
Terrorist Attacks against Hospitals Case Studies 2013
Top-Down and Bottom-Up Innovation in Terrorism:: The Case of the 9/11 Attacks 2013
Towards a Dynamic Analysis of Salafi Activism: Conclusions from a Dissection of Salafism in Germany 2013
Trends in Cyber - Terrorism 2021 2022
Trump’s Indictment and the Weaponization of Conspiracy Theories by the Far-Right 2023
The War in Gaza From Local to Regional 2023
Why the Nigerian Counter-Terrorism policy toward Boko Haram has failed: A cause and effect relationship 2014