Tagged: counterterrorism

Use of Biometric Data to Identify Terrorists: Best Practice or Risky Business?

The Human Rights Center at the University of Minnesota has released Use of Biometric Data to Identify Terrorists: Best Practice or Risky Business? a report which explores the human rights implications of biometric technologies used in a counterterrorism context.  The report begins with an explanation of biometrics, and the ways in which they...

FBI Reports on Lone Offender Terrorism

The Federal Bureau of Investigation (FBI) Behavioral Threat Assessment Center released the Lone Offender Terrorism Report reviewing 52 lone offender terrorist attacks committed in the United States between 1972 and 2015. The study focuses on the backgrounds, behavioral characteristics, and circumstances surrounding the attacks. Additionally, the report provides an insight into...

explosive burning cars

Is Youth Violence Preventable?

In a recent report from the Center for Strategic and International Studies (CSIS), authors Sarah Bast and Victoria DeSimone examine the question of whether or not the pathways to violence can be disrupted, specifically with regard to youth. The report, “Youth Violence Prevention in the United States: Examining International Terrorists,...

social media icons

Legal Aspects of Social Media Extremism

The Program on Extremism at the George Washington University (GW) released additional papers on Online Violent Extremism as a part of the Legal Perspectives on Tech Series, commissioned in conjunction with the Congressional Counterterrorism Caucus. According to GW, the Program “provides analysis on issues related to violent and non-violent extremism.”...

Drawing of young man in a teal hoodie at a desk spray painting a surveillance camera as he works on his laptop while another man at a desk sweats as he looks at an eye on the computer screen with a man behind him starting over a wall at his screen

Three New Papers on Online Violent Extremism from the Program on Extremism

The George Washington University Program on Extremism released three new papers on Online Violent Extremism. All deal with the complicated issue of determining and assigning who bears the legal and moral onus of countering online terrorism. “Leveraging CDA 230 to Counter Online Extremism” by Annemarie Bridy argues “that the scope...

computer hardware

Could AI’s Predictive Capability Be the Key to Counterterrorism?

In a new report from the Royal Institute of International Affairs, Kathleen McKendrick discusses the theoretical contributions of artificial intelligence (AI) in the realm of counterterrorism operations. In “Artificial Intelligence Prediction and Counterterrorism“, the author examines how artificial intelligence is already used, how it could potentially be used, and the...

shadow of terrorist in front of fence with a city background

Task Force on Preventing Extremism in Fragile States

In recognition of challenges associated with the global fight against terrorism, the U.S. Institute of Peace released a “comprehensive plan to prevent the underlying causes of extremism in fragile states.” This plan comes as a report from the Task Force on Extremism in Fragile States, established by the U.S. Congress...