Analysis and Special Reports
Latest Content


July 10, 2023
By: Steven Stalinsky, Ph.D., R. Sosnow, A. Smith, S. Ali, K. Choukry, Matt Schierer, N. Mozes, Y. Kerman, G. Pacchiani, and Y. Kulka Jihadi Organizations' Use Of Drones – Part II: From ISIS, Al-Qaeda, And The Taliban To Iran And Its Proxy Militias In The Region 2017-2023

May 25, 2023
By: Steven Stalinsky, Ph.D., R. Sosnow, A. Smith, S. Ali, K. Choukry, Matt Schierer, N. Mozes, Y. Kerman, G. Pacchiani, and Y. Kulka Jihadi Groups Around The World Continue To Fundraise In Cryptocurrency For Their Activity – Part II: January 2020-May 2023

March 01, 2023
By: Steven Stalinsky, Ph.D. MEMRI Executive Director Op-Ed In 'Wall Street Journal': Keep ISIS Off Twitter

March 01, 2023
By: Steven Stalinsky, Ph.D. Google's 2010 Jihad-Promoting Algorithms Are Reexamined This Week In Supreme Court's Oral Arguments On Section 230




August 31, 2020
By: Steven Stalinsky After Learning About Russian, Chinese, And Iranian Disinformation Efforts, Are Jihadis Following Suit By Attempting To Hijack Black Lives Matter?
.jpg)

August 05, 2020
By: Steven Stalinsky and R. Sosnow Jihadi Use Of Bots On The Encrypted Messaging Platform Telegram


July 10, 2020
By: Steven Stalinsky and R. Sosnow Documenting Jihadi Use Of Encrypted Messaging App WhatsApp - Part II: October 2018-June 2020


July 16, 2019
By: Steven Stalinsky Fears About New Facebook Cryptocurrency Are Overblown - While Main Threat Of Criminal Activity On Telegram App Is Being Criminally Ignored

December 21, 2018
By: Steven Stalinsky and R. Sosnow Cloudflare, The U.S.-Based Leading Reverse-Proxy Service, Is Exploited By Every Major Jihadi Organization - Including ISIS, Al-Qaeda, Hamas, Taliban - Posing A Global Security Risk


May 24, 2018
By: Steven Stalinsky As Momentum Builds To Solve Problem Of Encrypted Terrorist Communications, A Possible Third Way Emerges
