Small Wars Journal

terrorism

Stop Fighting a War Against a Tactic SWJED Mon, 09/17/2018 - 12:12am
The United States’ efforts in the GWOT have, thus far, prevented major terrorist organizations from conducting a second 9/11-style attack. Pursuing a strategy that shifts away from military engagement and towards stronger domestic policy will save trillions in taxpayer dollars, prevent future terrorist attacks, and help end the GWOT.

The Future of Terrorism: The Practitioners’ View

Wed, 08/29/2018 - 12:24am
Once a grievance and possible weapons are identified, ascertaining possible targets is certainly possible if analysts and practitioners allow themselves to examine the threat from the terrorists’ perspective. Doing so will allow government leaders to make informed decisions regarding the allocation of finite resources in a way best suited to defend their citizens and their way of life.

About the Author(s)

Preventing or Promoting Radicalization? - A Critical Analysis of the United Kingdom’s Newest Prevent Strategy

Thu, 08/23/2018 - 12:20am
The rise of terror attacks across the United Kingdom (UK) has been a harsh wake up call for the nation to re-evaluate its strategy for countering terrorism, known as CONTEST. Its first version was produced in 2003, with updated revisions in 2009 and 2011. Since 2011, the UK has suffered seven deadly terror attacks stemming from both far right wing and Islamic inspired extremism.

About the Author(s)

Exploring Resistance Training with Terrorists: Why HVT Interrogation is Hard

Tue, 08/14/2018 - 12:25am
In counterterrorism, the interrogation of high-value targets (HVTs) can be difficult. Rapport building can be near impossible because HVTs may be determined not to talk regardless of the approach strategies used by the interrogator. If these unconventional HVTs were members of a conventional military, it would be said that they possessed a high degree of resistance training.

About the Author(s)

The Role Al Qaeda Plays in Cyberterrorism

Sun, 08/12/2018 - 12:24am
As outlined in this report, I chose a specific terrorist organization, Al Qaeda, and analyzed the role that they played in cyberterrorism. Throughout the paper, I discussed how the terrorist organization utilized the internet to indoctrinate as well as recruit likeminded extremist individuals, delved into how Al Qaeda used the internet to conduct cyberterrorism, included some insight into how this particular terrorist organization’s activities effect the larger topic of cybersecurity, and touched on what the future of Al Qaeda could be in the cyber realm. Hopefully, after reading this paper, people will not dismiss Al Qaeda’s cyberterrorist capabilities or underestimate them while they are probably in the process of refining their credibility in cyberspace.

About the Author(s)

Terrorism Defined and Why It Matters SWJED Fri, 08/10/2018 - 12:39am
The Islamic State of Iraq and the Levant is the most rapidly advancing terrorist group of the past five years. The problem is that it is not a terrorist group at all. Just because a group commits grave atrocities and “terrorizes” citizen populations does not make it a terrorist group. That is not what terrorism means.

The Holy Month of Jihad? Measuring Terrorist Activity During Ramadan in the Post-9/11 Era.

Wed, 07/04/2018 - 6:48am
There is a lack of clear causation between the holy month and terrorist attacks. Although individual months of Ramadan have been especially violent, the fact that they are rarely the most violent months of the year shows that to claim a clear causation is inaccurate.

About the Author(s)

Al-Qaeda – “The Forgotten”

Sun, 07/01/2018 - 12:39pm
The death of Osama bin Laden ended one of the longest manhunts in U.S. history and was a satisfying moment for all those who had participated in the decades-long endeavor, but it did not result in the dissolution of al-Qaeda. Unlike many terror groups, al-Qaeda is a many-headed organization, making it capable of surviving even the death of its founder.

About the Author(s)

The Dynamic Field of Terrorist Weapons Options

Sat, 06/23/2018 - 12:27am
Recent trends in the use of weapons by terrorist, extremist or violent attackers points to a dynamic field of options, representing a spectrum from the highly complex to the simple weaponization of common everyday items. Rather than a linear progression from the simple to the complex, or devolution from the complex to the simple, there is an elastic set of polar options, that attackers range between.

About the Author(s)