Counter-terrorism intelligence
National Memorial Institute for the Prevention of Terrorism
MIPT: Sharing terrorism information resources
Research on Terrorism and Countering Terrorism (From Crime and Justice: A Review of Research, Volume 38, P 413-477, 2009, Michael Tonry, ed., - See NCJ-242171)
Recognizing Radicalization Indicators in Text Documents Using Human-in-the-Loop Information Extraction and NLP Techniques
Investigative Graph Search using Graph Databases
National Summit on Intelligence: Gathering, Sharing, Analysis, and Use After 9-11
Suspicious Preoperational Activities and Law Enforcement Interdiction of Terrorist Plots
National Criminal Intelligence Sharing Plan: Solutions and Approaches for a Cohesive Plan to Improve Our Nation's Ability to Develop and Share Criminal Intelligence
The Changing Threat Landscape of Terrorism and Violent Extremism: Implications for Research and Policy
This panel will provide an overview of the current terrorist threat landscape, how it has changed in the last five to ten years, and strategies to best address this threat at the local and national levels. Emphasis will be placed on how several key events in 2021 have shaped the way we think about research and policy in the fields of radicalization and extremism. Panelists will provide data on fluctuations of the most imminent terrorist threats posed to the U.S.
Review the YouTube Terms of Service and the Google Privacy Policy
The Changing Threat Landscape of Terrorism and Violent Extremism: Implications for Research and Policy
INSiGHT: A System To Detect Violent Extremist Radicalization Trajectories in Dynamic Graphs
Research and Evaluation on Domestic Radicalization to Violent Extremism: Research to Support Exit USA
Radicalization on the Internet: Virtual Extremism in the U.S. from 2012-2017
Israeli Model for Policing Terrorism: Goals, Strategies, and Open Questions
Istishad as an Ideological and Practical Tool in the Hands of Al-Qaeda
NIJ Journal Issue No. 263
Development of next-generation fingermark lifters and on-the-spot visualization devices
Pathways to Violent Extremism
Review the YouTube Terms of Service and the Google Privacy Policy