The Caliphate’s Global Workforce: An Inside Look at the Islamic State’s Foreign Fighter Paper Trail
This report contains an analysis of over 4,600 unique Islamic State personnel records that were produced by the group primarily between early 2013 and late 2014. The importance...
View Result
Remotely Piloted Innovation: Terrorism, Drones and Supportive Technology
In early October 2016, the group that calls itself the Islamic State killed two Kurdish soldiers with an explosive device hidden inside a drone. While terrorist groups have...
View Result
Communication Breakdown: Unraveling the Islamic State’s Media Efforts
This report breaks down the Islamic State’s media activities through a two-fold approach. First, it examines a small number of declassified documents captured from the group’s predecessors to...
View Result
From Cradle to Grave: The Lifecycle of Foreign Fighters in Iraq and Syria
...at who the group was able to bring into the organization and also how the group was trying to manage the large number of recruits. The Combating Terrorism...
View Result
Al-Qa’ida’s (Mis)Adventures in the Horn of Africa
...Database. Al-Qa’ida’s (Mis)Adventures in the Horn of Africa draws on recently declassified Harmony documents, predominately from the 1992-1994 time period, original field work by CTC personnel, and careful...
View Result
Held Hostage: Analyses of Kidnapping Across Time and Among Jihadist Organizations
In March 2013, David Haines and Frederico Motka were kidnapped while traveling together near the Turkish border in Syria. The men were both foreigners and aid workers. They...
View Result
The Group That Calls Itself a State: Understanding the Evolution and Challenges of the Islamic State
In an attempt to paint a more complete picture of the Islamic State (IS), this report identifies key areas where the IS has shown strength, learning, and adaptation....
View Result
Militant Ideology Atlas
The Militant Ideology Atlas identifies the most influential thinkers in the Jihadi Movement and delineates the movement’s key ideological vulnerabilities. It situates the Jihadi Movement within the various...
View Result