Small Wars Journal

terrorism

Exploring Resistance Training with Terrorists: Why HVT Interrogation is Hard

In counterterrorism, the interrogation of high-value targets (HVTs) can be difficult. Rapport building can be near impossible because HVTs may be determined not to talk regardless of the approach strategies used by the interrogator. If these unconventional HVTs were members of a conventional military, it would be said that they possessed a high degree of resistance training.

About the Author(s)

The Role Al Qaeda Plays in Cyberterrorism

As outlined in this report, I chose a specific terrorist organization, Al Qaeda, and analyzed the role that they played in cyberterrorism. Throughout the paper, I discussed how the terrorist organization utilized the internet to indoctrinate as well as recruit likeminded extremist individuals, delved into how Al Qaeda used the internet to conduct cyberterrorism, included some insight into how this particular terrorist organization’s activities effect the larger topic of cybersecurity, and touched on what the future of Al Qaeda could be in the cyber realm. Hopefully, after reading this paper, people will not dismiss Al Qaeda’s cyberterrorist capabilities or underestimate them while they are probably in the process of refining their credibility in cyberspace.

About the Author(s)

The Holy Month of Jihad? Measuring Terrorist Activity During Ramadan in the Post-9/11 Era.

There is a lack of clear causation between the holy month and terrorist attacks. Although individual months of Ramadan have been especially violent, the fact that they are rarely the most violent months of the year shows that to claim a clear causation is inaccurate.

About the Author(s)

Al-Qaeda – “The Forgotten”

The death of Osama bin Laden ended one of the longest manhunts in U.S. history and was a satisfying moment for all those who had participated in the decades-long endeavor, but it did not result in the dissolution of al-Qaeda. Unlike many terror groups, al-Qaeda is a many-headed organization, making it capable of surviving even the death of its founder.

About the Author(s)

The Dynamic Field of Terrorist Weapons Options

Recent trends in the use of weapons by terrorist, extremist or violent attackers points to a dynamic field of options, representing a spectrum from the highly complex to the simple weaponization of common everyday items. Rather than a linear progression from the simple to the complex, or devolution from the complex to the simple, there is an elastic set of polar options, that attackers range between.

About the Author(s)

2018 Ramadan Radicals: Revenge and Redemption - Potential Actors, Motivators, and Dates

Ramadan is an opportunity to encourage and initiate increased attacks, suicide bombings, and carnage against perceived enemies around the world, regardless of nationality, location, or religious affiliation. Virtually everything about these attacks and the motivation behind them goes against the core teaching of the Qur'an.

About the Author(s)

Jihadi Generations: Strategies Used for Weaponizing Children (Part 1)

Violent extremist groups are using all methods possible to wage a successful long-term campaign using children. These groups infiltrate existing systems, threaten and radicalize important players, use extreme forms of violence to attack those they perceive as non-compliant. No foundation of society is off limits.

About the Author(s)