Terrorist attacks

The ecology of trust among hackers

Year: 2016
Description:

Abstract: Malicious hackers profit from the division of labour among highly skilled associates. However, duplicity and betrayal form an intrinsic part of their daily operations. This article examines how a – …

TSAS WP16-03: Taking Hoaxes Seriously: Characteristics of Terrorism Hoaxes and their Perpetrators

Author(s): Tishler-- Nicole
Publisher: TSAS
Year: 2016
Description:

What can existing literature and available data tell us about terrorism hoaxes (i.e. those incidents that are believed to be acts of serious terrorism, but do not actually involve any – …

‘Car Bombing “With Due Respect”: The Niger Delta Insurgency and the Idea of MEND’

Year: 2013

Air India Flight 182: A Canadian Tragedy

Geography: Canada
Year: 2010

CIDB Descriptive Analysis 2015

Author(s): CIDB
Geography: Canada
Year: 2015

Alfred P. Murrah Federal Building Bombing, April 19, 1995: Final Report

Author(s): City of Oklahoma
Geography: United States
Year: 1996

Commission of Inquiry into the Air India Bombing: Recommendations

Year: 2010

Volume 5, Final Report of the Air India Commission

Geography: Canada, North America
Year: 2010

TSAS WP14-09: A Systematic Approach to Develop a Computational Framework for Counter-terrorism and Public Safety

Year: 2014
Description:

Can agent-based modelling and virtual environment technologies be used to create a decision support, response planning and risk assessment system for emergence preparedness?

Islamic Terrorism in the UK since 9/11: Reassessing the ‘Soft’ Response

Publisher: Chatham House
Year: 2011

Impact and Ramifications: The Aftermath of the Aum Affair in the Japanese Religious Context

Geography: East Asia, Japan
Year: 2012
Description:

It is now seventeen years since the Tokyo subway attack that made Aum Shinrikyō and its leader Asahara Shōkō household names in Japan and beyond. The subway attack was swiftly – …

Globally Aum: The Aum Affair, Counterterrorism and Religion

Author(s): Reader-- Ian
Geography: East Asia, Japan
Year: 2012
Description:

Aum continues to feature in counterterrorism discourses and military training manuals, and continues to represent, for security services and policy makers, the “public face” of chemical and biologically oriented terrorism. – …

A Persistent Threat: The Evolution of al Qa’ida and Other Salafi Jihadists

Author(s): Seth G. Jones
Year: 2014
Description:

This report examines the status and evolution of al Qa’ida and other Salafi-jihadist groups, a subject of intense debate in the West. Based on an analysis of thousands of primary – …

TSAS WP14-03: Right-wing Extremism in Canada

Publisher: TSAS
Year: 2014
Description:

What factors may promote violent right-wing extremism in Canada, and how is it connected to similar movements in the US and Europe? What impacts might this violence have on radicalization – …

The Unique Challenges of Terrorism Prosecutions: Towards a Workable Relation between Intelligence and Evidence

Author(s): Roach-- Kent
Year: 2010
Description:

The focus in this study isle on the unique challenges presented by terrorism prosecutions especially those relating to the disclosure of otherwise secret intelligence. (Source: Publication).

Deterring Terrorism: Theory and Practice

Year: 2012

How Cyberattacks Threaten Real-World Peace

Publisher: TED Talk
Year: 2011

Inside a School for Suicide Bombers

Publisher: TED Talk
Year: 2010

Countering Radicalization of Diaspora Communities in Canada

Geography: Canada, North America
Year: 2011
Description:

This study provides an initial assessment of the state of radicalization amongst immigrant groups active within Canada’s largest metropolitan areas. The authors conducted an extensive literature review and examined over – …

Al-Qaeda and Sacrifice: Martyrdom, War and Politics

Author(s): Finn– Melissa
Publisher: Pluto Press
Year: 2012

Assessing Cyber Threats to Canadian Infrastructure

Publisher: CSIS
Geography: Canada, North America
Year: 2012
Description:

The purpose of this study is threefold: (1) to examine the cyber threat environment confronting Canada’s Critical National Infrastructure (CNI), with a particular focus on four key sectors and their – …