Small Wars Journal

terrorism

Brain Scans, Boycotts, and Counter-Terrorism?

Terrorists make the case for violent, radical change and recruit aggrieved individuals to be part of the change. But in radicalization, there is more than a political mission at play —violent extremists warped political identity includes dehumanizing others, speaking to grievance, victimhood, and local characteristics of social orientation.

About the Author(s)

Taliban Unmasked: Afghan Taliban’s Continued Symbiotic Relationship with al Qaeda and International Terrorism

At a recent peace conference in Moscow, Taliban representatives sat in front of the Russian media and gave interviews to a select number of Russian women journalists. It was a message of change when compared to their brutal regime and their repressive policies toward Afghan women. The move was calculated and strategic; it was meant to send a message to the world that they have changed and are no longer a threat to regional and global security.

About the Author(s)

Applying Recent Lessons from Climate Change Communication to Counter-ISIS Strategic Communication

Once we accept the fundamentally communicative purpose of terrorism, it becomes clear that strategic communication should be the preeminent tool in the counter-terrorism toolbox. The trouble is, the U.S.-led approach to counter-ISIS strategic communication is hamstrung by reliance on a flawed paradigm that I call narrative jamming. The good news is that there is a potential solution and it comes from an unlikely place: recent research on climate change communication.

About the Author(s)

The Future of Terrorism: The Practitioners’ View

Once a grievance and possible weapons are identified, ascertaining possible targets is certainly possible if analysts and practitioners allow themselves to examine the threat from the terrorists’ perspective. Doing so will allow government leaders to make informed decisions regarding the allocation of finite resources in a way best suited to defend their citizens and their way of life.

About the Author(s)

Preventing or Promoting Radicalization? - A Critical Analysis of the United Kingdom’s Newest Prevent Strategy

The rise of terror attacks across the United Kingdom (UK) has been a harsh wake up call for the nation to re-evaluate its strategy for countering terrorism, known as CONTEST. Its first version was produced in 2003, with updated revisions in 2009 and 2011. Since 2011, the UK has suffered seven deadly terror attacks stemming from both far right wing and Islamic inspired extremism.

About the Author(s)

Exploring Resistance Training with Terrorists: Why HVT Interrogation is Hard

In counterterrorism, the interrogation of high-value targets (HVTs) can be difficult. Rapport building can be near impossible because HVTs may be determined not to talk regardless of the approach strategies used by the interrogator. If these unconventional HVTs were members of a conventional military, it would be said that they possessed a high degree of resistance training.

About the Author(s)

The Role Al Qaeda Plays in Cyberterrorism

As outlined in this report, I chose a specific terrorist organization, Al Qaeda, and analyzed the role that they played in cyberterrorism. Throughout the paper, I discussed how the terrorist organization utilized the internet to indoctrinate as well as recruit likeminded extremist individuals, delved into how Al Qaeda used the internet to conduct cyberterrorism, included some insight into how this particular terrorist organization’s activities effect the larger topic of cybersecurity, and touched on what the future of Al Qaeda could be in the cyber realm. Hopefully, after reading this paper, people will not dismiss Al Qaeda’s cyberterrorist capabilities or underestimate them while they are probably in the process of refining their credibility in cyberspace.

About the Author(s)