Terrorism

Our team weighs in on the tactics and motivations behind jihadist groups and terror attacks.

Blog > Terrorism

Jihadists React to President Trump’s Executive Order

January 31, 2017

Key Takeaways • Since President Trump’s inauguration, jihadists have discussed what they perceive to be growing anti-Islamic sentiment in the United States, with many claiming that the U.S. is showing its “true face.” • This chatter has increased since President Trump’s executive order on January 27, 2017, which banned travel from several Muslim-majority countries, including […]

Read more

Business Risk Intelligence: Threat and Capabilities Matrix for Decision-Makers (Preview)

January 12, 2017

Yesterday we released our inaugural Business Risk Intelligence Decision Report. Unlike traditional end-of-year reports, we chose to eschew providing predictions for the coming year, which from our experience are overly generic and do not lend themselves to supporting informed decision-making. Instead, the Flashpoint team looked back at 2016 and drew from our unique tools and […]

Read more

Jihadists Advise American Muslims to Arm Themselves Ahead of Trump Presidency

December 14, 2016

Key Takeaways • Discussions about the U.S. presidential election and subsequent President-elect Donald Trump victory have recently taken place on a private, predominantly pro-al-Qaida Dark Web channel, in which several members are self-identified Westerners, including Americans. • During these discussions, these members expressed fear as they anticipate anti-Muslim violence and policies under the new administration. […]

Read more

Evaluating the Physical Threat from UCC “Kill Lists”

October 28, 2016

In late September 2016, a Maryland man named Nelash Mohamed Das was indicted for attempting to provide material support to ISIS. This indictment was in connection with Das’s plans to attack U.S. military members, one of whom had appeared on a kill list published by pro-ISIS hackers in 2015. On October 9, the United Cyber […]

Read more

Pro-ISIS Jihadists Dabble in Encryption, Prove Under-Sophisticated

Jihadi actors have been experimenting with encrypted communication technologies since as early as 2008. Through the development of proprietary encrypted communication tools and the growing adoption of various cyber technologies, these actors have demonstrated an increased interest in obfuscating their digital fingerprints. This interest is underscored through discussions on top jihadi web forums, where members […]

Read more

Turkish Organizations Exploited in Terror Finance Scheme

September 20, 2016

New evidence supports allegations that jihadists are exploiting Turkish organizations to launder donations to armed groups involved in the Syrian civil war. While closely studying a network of websites that operate as an online portal for Turkic Islamist rebel groups, Flashpoint analysts noted a recent article from a Turkic jihadist publication about a first-hand visit […]

Read more