International Institute for Counter-Terrorism (ICT)

Publisher Description

Founded in 1996, the International Institute for Counter-Terrorism (ICT) is one of the leading academic institutes for counter-terrorism in the world, facilitating international cooperation in the global struggle against terrorism. ICT is an independent think tank providing expertise in terrorism, counter-terrorism, homeland security, threat vulnerability, risk assessment, intelligence analysis, national security and defense policy. ICT is a non-profit organization located at the Interdisciplinary Center (IDC), Herzliya, Israel which relies exclusively on private donations and revenue from events, projects and programs.
Research Reports in JSTOR from International Institute for Counter-Terrorism (ICT)
74 Research Reports in JSTOR Date
Al-Qaeda, the regional upheaval and Israel – from someone else's problem to a different kind of problem 2013
Analysis of Cyber Trends 2016 2016
Arab Spring and Arab Armies:: A New Framework for Analysis 2013
The Assassination of Bin Laden:: A Comparative Look at the Official Response and “Popular Opinion” in the Online Arab Media 2011
Assessing the Cyber Threat to the Train Industry April 2016 2016
Boko Haram:: The Rise, Success, and Continued Efficacy of the Insurgency in Nigeria 2012
Can Self-Regulation Work?: Lessons from the Private Security and Military Industry 2013
The Case for Establishing an International Tribunal for International Terrorist Organizations 2013
CCTA’s Statement Regarding the End of the Raid of al-‘Adnani 2017
The Crisis of Governance in the Middle East:: Implications for Democracy, Development & Security 2013
Cyber Report 2019
Cyber Report 24 September-November 2017 2018
Cyber Report #30 2019
Cyber Report # 31 2019
Cyber Report no. 23 June-August 2017 2017
Cyber Updates 2020
Cyber-Desk Review:: Report #2 2013
Cyber-Terrorism Activities Report No. 10: July – September 2014 2014
Cyber-Terrorism Activities Report No. 11: October – December 2014 2014
Cyber-Terrorism Activities Report No. 12: January – March 2015 2015
Cyber-Terrorism Activities Report No. 13: April – June 2015 2015
Cyber-Terrorism Activities Report No. 14: July – September 2015 2015
Cyber-Terrorism Activities Report No. 15: October – December 2015 2015
Cyber-Terrorism Activities Report No. 16: January – March 2016 2016
Cyber-Terrorism Activities Report No. 17: April - June 2016 2016
Cyber-Terrorism Activities Report No. 18: July - September 2016 2016
Cyber-Terrorism Activities Report No. 19: October - December 2016 2016
Cyber-Terrorism Activities Report No. 3 2013
Cyber-Terrorism Activities Report No. 4 2013
Cyber-Terrorism Activities Report No. 5 2013
Cyber-Terrorism Activities Report No. 6: October-November 2013 2013
Cyber-Terrorism Activities Report No. 7: December 2013 - January 2014 2013
Cyber-Terrorism Activities Report No. 8: February 2013 - March 2014 2013
Cyber-Terrorism Activities Report No. 9: April – June 2014 2014
The death of Osama bin Laden — Interview with ICT Senior Researchers 2012
THE DILEMMAS FACED BY THE KENYAN GOVERNMENT IN THE FIGHT AGAINST THE AL- SHABAAB TERRORIST GROUP 2015
Enhanced Resilience Through Innovative Networked Security 2012
The European Union Blacklisting Hezbollah: Testimony of Dr. Eitan Azani before the Committee on Foreign Affairs of the European Parliament, Brussels, July 9, 2013 2013
The Evolving Law on Cyber Terrorism:: Dilemmas in International Law and Israeli Law 2013
An Examination of a Potential Connection between the Trafficking of Women on the Darknet and the Financing of Terrorism 2019
Executive Ordered Dead: A Consideration on the Legality of the Targeted Killing of Political Leaders 2013
Hamas’s Strategic Surprise:: Western misunderstanding of the 2007 Hamas takeover of the Gaza Strip 2013
Hezbollah and the Lebanese System:: Between the Siniora Government (2005) and the Hezbollah Government (2011) 2013
Hezbollah & Iran in Latin America – A Threat Just Beneath the Surface 2013
Hezbollah-Hamas Cooperation:: Motivations, Manifestations and Future Outlook 2013
Hezbollah's Fundraising Activity in Africa Focus on the Democratic Republic of Congo 2013
Hybrid War and the Gulliverization of Israel 2012
ICT Cyber-Desk Review 2013
Identifying Money Transfers and Terror Finance Infrastructure: In the Service of the Popular Resistance Committees in Gaza 2020
Identifying the Enemy in Counterterrorism Operations - A Comparison of the Bush and Obama Administrations 2014
In the Eye of the Storm:: An Israeli Perspective on the “Arab Spring” 2013
Incitement to Carry Out a Terrorist Attack in Wimbledon 2017
Internal Management Implications of Security Prisoners in Israeli Prisons 2014
“ISIS in Libya - Exploitation and Governance of Areas of Limited Statehood” 2015
The Islamist Insurgency in Egypt – Mind the Gaps: Challenges to Legitimacy, Security and Capacity 2014
Israel's Counter-Terrorism Bill:: Central Themes & Challenges 2014
Jihadists’ Use of Virtual Currency 2018
Jordan:: In the Balance 2013
Kurdish Separatism in Turkey:: The PKK's Changing Strategy 2013
Legal Challenges of War in Areas of Problematic Sovereignty 2013
No Friends Left to Lose:: Reassessing the United States’ Strategy in Egypt 2013
On Political Order and the “Arab Spring” 2012
Osama Bin Laden's Elimination – First Responses from Jihadi Forums 2011
Osama Bin Laden's Elimination through the Prism of Al-Qaeda's Affiliates and Global Jihad Supporters — Follow-Up Report 2011
The Risk of and Countering the Islamic State use of Chemical Weapons against Israel 2015
The road ahead for Al-Qaeda:: The role of Aymaan Al Zawahiri 2011
Salafist-Takfiri Jihadism:: the Ideology of the Caucasus Emirate 2014
The Security Evolution of Singapore: An Examination of Security and Counter-Terrorism Legislation 2016
Security Implications of the “Arab Spring” 2013
Terrorism in Southeast Asia:: The Case of the Abu Sayyaf Group and Jemaah Islamiyah 2015
Terrorist Attacks against Hospitals Case Studies 2013
Top-Down and Bottom-Up Innovation in Terrorism:: The Case of the 9/11 Attacks 2013
Towards a Dynamic Analysis of Salafi Activism: Conclusions from a Dissection of Salafism in Germany 2013
Why the Nigerian Counter-Terrorism policy toward Boko Haram has failed: A cause and effect relationship 2014