Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies
by Brian A. Jackson, Peter Chalk, Kim Cragin et al.
Available online at: http://www.rand.org/pubs/monographs/MG481.html
Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies
by Brian A. Jackson, Peter Chalk, Kim Cragin et al.
Available online at: http://www.rand.org/pubs/monographs/MG481.html
The National Counterterrorism Center has published its 2014 Calendar, which you can download at this link:
In this issue of Perspectives on Terrorism we are pleased to present four articles on a variety of timely topics. First, Sarah Marsden offers a comparative analysis of several hundred Arab and Western media sources, highlighting their different conceptualisations of what constitutes ‘success’ and ‘failure’ in the ‘War on Terror’. Second, Iromi Dharmawardhane evaluates several aspects of the post-conflict initiatives in Sri Lanka, and offers recommendations to address shortcomings and persistent challenges. Third, an international team of scholars led by Mark Woodward challenge the perception that the Sufi tradition in Islam has always been tolerant and non-violent while the Salafist tradition is the one consistently associated with intolerance and violence. Finally, Kathleen Deloughery draws from several incident databases to explain how and why simultaneous terrorist attacks are more likely to be successful and cause more fatalities
This issue of the journal also introduces a new Policy Notes section, in which we will publish relatively short pieces containing informed analysis and policy recommendations on a variety of important topics. Josh Meservey inaugurates this section with a timely analysis of Somalia’s safe havens and their critical importance to al-Shabaab. This is followed by a review of international counterterrorism assistance to the Horn of Africa, authored by three senior analysts at the Centre on Global Counterterrorism Cooperation.
Folks,
A rare entry level job at DHS I&A HQ: 984838-IA GS-0132-9 FPL 13 Intelligence Operations Specialist (EX SERV). For details, please see:
https://www.usajobs.gov/GetJob/ViewDetails/354853600
For those studying cybersecurity threats and responses, here are few new recommended resources.
1) A terrific expose by David Berlind, of Programmable Web, on new API vulnerabilities as demonstrated by the recent hacking of social posting and scheduling service Buffer.
http://blog.programmableweb.com/2013/11/04/why-the-attack-on-buffer-was-a-serious-wake-up-call-for-the-web/
2) A new Inspector General report revealing that the Departments of Homeland Security and Defense, including the National Security Agency, have no way of sharing current alerts about computer breaches with each other or industry.
http://www.oig.dhs.gov/assets/Mgmt/2014/OIG_14-02_Oct13.pdf
3) The US-CERT current activity report
https://www.us-cert.gov/ncas/current-activity
Click here to try out the newly updated Google Custom search engine for students and researchers of terrorism studies. Your suggestions for improvements can be sent to james.forest at uml.edu
New issue of our internationally-acclaimed scholarly journal Perspectives on Terrorism is now available here.
Contents include:
Jeffrey M Bale, Denying the Link between Islamist Ideology and Jihadist Terrorism: “Political Correctness” and the Undermining of Counterterrorism
Benjamin S. Eveslage, Clarifying Boko Haram’s Transnational Intentions, Using Content Analysis of Public Statements in 2012
Alexandra Lewis, Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security
Paul Kamolnick, The Egyptian Islamic Group’s Critique of Al-Qaeda’s Interpretation of Jihad
Ely Karmon, Hamas in Dire Straits
Book Reviews, Literature Search Resources, and much more . . .
Here’s a great 90 minute video of Jake Shapiro, Bruce Hoffman and Will McCants speaking at an event announcing the release of Jake’s new book, The Terrorist’s Dilemma: Managing Violent Covert Organizations,
http://www.newamerica.net/events/2013/the_terrorists_dilemma
His book systematically examines the structural differences between terrorist groups, discusses the core managerial challenges these groups face, and illustrates how the organizations are affected by their political goals and operational environments. Shapiro provides a historically-informed explanation for why some groups have little hierarchy, while others resemble miniature firms. Looking at groups in Africa, Asia, Europe, and North America, he highlights how consistent and widespread the terrorist’s dilemma — balancing the desire to maintain control with the need for secrecy — has been since the 1880s. A good read for anyone interested in a higher-level study of terrorist organizations.
Here are some links to media coverage of the Sept. 24 launch event of the Center for Terrorism and Security Studies.
The August 2013 issue of our journal Perspectives on Terrorism is now available, with several articles on the financing of terrorism, an extensive resource guide for literature reviews, and more. Download your free copy at this link:
http://www.terrorismanalysts.com/pt/index.php/pot/issue/view/41