In-Depth Threat Analysis
Latest Content
May 20, 2022
By: Matt Schierer Analysis: Recent ISIS Furat Media Video Likely Authentic, Despite Counterclaim
May 20, 2022
By: Y. Kerman The Evolution Of Islamic State (ISIS) Views On Attacking The State Of Israel - Part I: Background
December 30, 2021
By: Romany Shaker As Islamic State Strikes In Uganda, Christians Remain Key Target In Group's Expansionist African Campaign
August 10, 2021
By: Romany Shaker Exploiting U.S. Withdrawal From Afghanistan, Islamic State-Taliban Fight To Establish Islamic Caliphate To Intensify
July 13, 2021
By: S. Benjamin Evoking Ramadan To Call For Jihad And Victories: Insight Into The Islamic State's Ramadan Messaging
June 18, 2021
By: Ali Karami Security Concerns In Nigeria Follow Death Of Boko Haram Leader Abubakar Shekau
April 02, 2021
By: Romany Shaker Slaughtering Christians – Islamic State Central Africa Province's (ISCAP) Regular Tactic For Expansion
March 03, 2021
By: Yigal Carmon and Tufail Ahmad Afghan Taliban's Operational Chief Sirajuddin Haqqani Warns The Biden Administration Against Scrapping The Doha Agreement: 'We Have The Technology To Use Drones, We Have Our Own Missiles; This Time If The Mujahideen Resume Fighting, It Would Be Something [The Americans] Have Never Seen Before'
February 25, 2021
By: R. Green Canada-Based Ideologue Tareq Abd Al-Halim Remains An Influencing Figure For Al-Qaeda And Its Supporters
Pages
Subscribe Today
Members receive daily updates on imminent and potential threats by terrorists, extremist organizations, and individuals worldwide.
Read More
The Cyber & Jihad Lab
The Cyber & Jihad Lab monitors, tracks, translates, researches, and analyzes cyber jihad originating from the Middle East, Iran, South Asia, and North and West Africa. It innovates and experiments with possible solutions for stopping cyber jihad, advancing legislation and initiatives federally – including with Capitol Hill and attorneys-general – and on the state level, to draft and enforce measures that will serve as precedents for further action. It works with leaders in business, law enforcement, academia, and families of terror victims to craft and support efforts and solutions to combat cyber jihad, and recruits, and works with technology industry leaders to craft and support efforts and solutions.