Virtual and Physical Realities: Violent Extremists’ Recruitment of Individuals Associated with the US Military
. Go to Source Author: R. Kim Cragin
The Role of Financial Technologies in US-Based ISIS Terror Plots
. Go to Source Author: Joe Whittaker
How Jihadists Travel: The Clandestine Migration of Chinese Transnational Fighters to Syria
. Go to Source Author: Xiaoyu Lu
Fight or Hide: Why Organized Criminal Groups Go to War with the State
. Go to Source Author: William M. LeoGrande
Online Terrorism Studies: Analysis of the Literature
. Go to Source Author: Ali Unlu
Why Jihadis Switch: Social Ties, Ideological Affinity and Opportunity
. Go to Source Author: Julie Chernov Hwang
“Aren’t You Tired of Talking?” – Priming Men and Women into Violence through Gateway Organizations
. Go to Source Author: Marco Nilsson
From Spiral to Stasis? United Kingdom Counter-Terrorism Legislation and Extreme Right-Wing Terrorism
. Go to Source Author: John Jupp
From Control to Conflict: A Spectrum and Framework for Understanding Government-Militia Relationships
. Go to Source Author: Andrew Thomson
One or Many? Disentangling the Puzzle of Pro-Government Militia Deployment
. Go to Source Author: Kamil C. Klosek
“The Road to Jerusalem Goes through Cairo”: Exploring Israel’s Counter-Militancy Efforts against Sinai Peninsula-Based Threats
. Go to Source Author: Michael Shkolnik
Why Do States Violently Repress Some Political Organizations, but Not Others? Evidence from Ethnopolitical Actors in the Middle East and North Africa
. Go to Source Author: Agatha Skierkowski Hultquist