Topics header default image

Terrorism

From our blog

Cyberterrorism: What are we (not) talking about?

Irina Rizmal

In 2016, according to a Gallup poll, 73% of Americans cited cyberterrorism as a leading threat to vital US interests in the next 10 years. However, what does it really mean when we deduce that there is a threat of cyb...

Countering terrorist narratives online: A balancing act

Barbara Rosen Jacobson

Terrorists are using the Internet for a wide-range of purposes. On the operational side, terrorist organisations use ICTs for internal communication and fundraising, while on the public relations side, the Internet ha...

Resources

united states senate logo, United States Capitol

2006

Post Cold War diplomatic training

Victor Shale's paper refers to a specific time period: the post-Cold War period which brought about new forms of conflicts, and high levels of terrorism. In the light of the change in traditional diplomacy, his paper examines multistakeholder diplomatic training and it... Read more...

multi diplomacy, Multistakeholder Diplomacy: Challenges and Opportunities

2005

DC Confidential: The controversial memoirs of Britain’s ambassador to the U.S. at the time of 9/11 and the Iraq War

The publication of these memoirs in autumn 2005 caused a public furore in Britain so I shall not waste time giving any background on Sir Christopher Meyer. (Just punch his name into Google, which will enable you in the blink of an eye even to find out from the BBC webs... Read more...

a poster of a man in a suit and tie, paper, Christopher Meyer

2004

Against All Enemies: Inside America’s War on Terror

All memoirs are incomplete; instant ones even more so; and memoirs about security matters are the worst, in this respect. The book, however, manages to disappoint in an unusual way.... Read more...

a picture of a sign that says UNK, against all enemies, Richard A. Clarke

document, Line