Skip to Content

globalECCO

Request an Account   |  Sign In

Navigation

  • Home
    • About
    • Contact Us
    • CTFP
    • Privacy Policy
    • Site Map
    • Request an Account
  • CTX Journal
    • About CTX
    • Author Guidelines
    • CTX Vol. 7, No. 1, May 2017
    • CTX Vol. 6, No. 4, November 2016
    • CTX Vol. 6, No. 3, August 2016
    • CTX Vol. 6, No. 2, May 2016
    • CTX Vol. 6, No. 1, February 2016
    • CTX Vol. 5, No. 4, November 2015
    • CTX Vol. 5, No. 3, August 2015
    • CTX Vol. 5, No. 2, May 2015
    • CTX Vol. 5, No. 1, February 2015
    • CTX Vol. 4, No. 4, November 2014
    • CTX Vol. 4, No. 3, August 2014
    • CTX Vol. 4, No. 2, May 2014
    • CTX Vol. 4, No. 1, February 2014
    • CTX Vol. 3, No. 4, November 2013
    • CTX Vol. 3, No. 3, August 2013
    • CTX Vol. 3, No. 2, May 2013
    • CTX Vol. 3, No. 1, February 2013
    • CTX Vol. 2 No. 4, November 2012
    • CTX Vol. 2 No. 3, August 2012
    • CTX Vol. 2 No. 2, May 2012
    • CTX Vol. 2 No. 1, February 2012
    • CTX Vol. 1 No. 2, November 2011
    • CTX Vol. 1 No. 1, August 2011
  • Game Center
  • Resources
    • Websites
    • Blogs
  • CTAP Videos

  • About CTX
    • Michael Freeman - Executive Editor
  • Author Guidelines
  • CTX Vol. 7, No. 1, May 2017
    • Table of Contents
  • CTX Vol. 6, No. 4, November 2016
    • Table of Contents
  • CTX Vol. 6, No. 3, August 2016
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • Da’esh, Legitimacy, and the Rise of Abu Bakr al-Baghdadi
    • Radicalization and De-radicalization: Norwegian Foreign Fighters in Syria
    • The 1990 Siege of Batticaloa: A Tribute to the Warriors of the Gemunu Watch
    • The Lumads of the Philippines: Struggling from Conflict Toward Peace
    • Assessing Canada’s Integrated National Security Enforcement Teams: Can the Concept of INSETs Be Exported?
    • CTAP INTERVIEW
    • STATE OF THE ART How to Read a (War) Comic
    • Publications
  • CTX Vol. 6, No. 2, May 2016
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • Photo Essay: The War Widows of Afghanistan
    • Walking the Thin Red Line: DANSOF in Afghanistan
    • The Lessons I Learned: Civil-Military Cooperation in Post-Conflict Sri Lanka
    • That Word Terrorist, and What Terrorists Say about It
    • Three Ghosts Who Haunt Modern Strategy
    • CTAP INTERVIEW
    • Ethics and Insights
    • JSOU Publications
  • CTX Vol. 6, No. 1, February 2016
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • Analysis from the Edge: Information Paralysis and Decision Making in Complexity
    • The US-Led Coalition against ISIS: Strategic Difficulties and Political Will
    • Language Skills for the Special Forces Operator: Access and Information in the African Permissive Environment
    • Siding with the Egg
    • Trying to Work Smarter: Fusion Tools for a Small SOF TF Staff
    • THE CTAP INTERVIEW The Return of the Zarqawists: How to Deal with the Islamic State Movement
    • THE WRITTEN WORD Not Your Dad’s Al Qaeda
    • JSOU Publications
  • CTX Vol. 5, No. 4, November 2015
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • Disaster Response: A Not-So-Sexy Kind of Job LCDR GILBERT G. VILLAREAL, PHILIPPINE NAVY
    • The Phantom Raid AIR CDR (RET.) JAMAL HUSSAIN, PAKISTANI AIR FORCE
    • Seymour Hersh Reignites the Bin Laden Raid Controversy AIR CDR (RET.) JAMAL HUSSAIN, PAKISTANI AIR FORCE
    • The Sri Lankan Civil War: A Personal Reminiscence COL SYLVESTER PERERA, SRI LANKAN ARMY
    • The Use and Misuse of Influence in Counterinsurgency MAJ DANIEL PACE, US ARMY
    • The Dark Side of Drones: Implications for Terrorism CPT BENJAMIN SEIBERT, US ARMY
    • Countering Extremist Groups in Cyberspace: Applying Old Solutions to a New Problem LTC ROBERT SCHULTZ, US ARMY
    • The Comprehensive Approach: A Silver Bullet or the Loch Ness Monster? LTC SÁNDOR FÁBIÁN, HUNGARIAN ARMY
    • CTAP INTERVIEW: Dr. David Kilcullen, Caerus Global Solutions
    • THE WRITTEN WORD American Force: Dangers, Delusions, and Dilemmas in National Security BY RICHARD K. BETTS REVIEWED BY MAJ BRADLEY J. KRAUSS, US ARMY
    • THE WRITTEN WORD The Hour between Dog and Wolf: Risk Taking, Gut Feelings, and the Biology of Boom and Bust BY JOHN COATES REVIEWED BY LT ADAM KARAOGUZ, US NAVY
    • THE MOVING IMAGE Turn: Washington’s Spies: A History Lesson on Irregular Warfare REVIEWED BY IAN C. RICE
    • JSOU Publications
  • CTX Vol. 5, No. 3, August 2015
    • Table of Contents
    • About the Contributors
    • Image Credits
    • Preface
    • Foreword
    • Introduction to the Special Issue
    • Characteristics of Terrorism Hotspots
    • The Blue-Green-Red Metaphor in the Context of Counterterrorism: Clarifications and Anthropological Emendations
    • The Ecosystem of Dark Networks: A Biological Perspective
    • America: Imagined Community, Imagined Kinship
    • One Arm Tied Behind Our Backs? Assessing the Power of the United States to Combat Global Threats
    • The Weather of Violence: Metaphors and Model, Predictions and Surprises
    • Trapped by the Paradigm: Why Net Assessment May Not Contribute to Countering Terrorism
    • CTAP INTERVIEW: Dr. Cécile Fabre, Oxford University
    • ETHICS AND INSIGHTS: Making Decisions, Taking Ethical Responsibility Part 2
    • Fatwa on Terrorism and Suicide Bombing
    • JSOU Publications
  • CTX Vol. 5, No. 2, May 2015
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • SOF Joint Combined Exchange Training from a Host Nation’s Perspective
    • Turkey’s Fight to Shut Off the Flow of PKK Finances
    • The Movers and Shakers of the Lord’s Resistance Army
    • Hybrid Warfare Revisited
    • Report on the 2014 Special Operations Research Association Symposium
    • CTAP INTERVIEW: Dr. Michael Noonan, Foreign Policy Research Institute
    • ETHICS AND INSIGHTS: Making Decisions, Taking Ethical Responsibility Part 1: To Tool or Not to Tool
    • THE WRITTEN WORD: Rebels Without Borders: Transnational Insurgencies in World Politics by Idean Salehyan
    • THE WRITTEN WORD: David and Goliath: Underdogs, Misfits, and the Art of Battling Giants by Malcolm Gladwell
    • PUBLICATIONS AND BOOK ANNOUNCEMENTS
  • CTX Vol. 5, No. 1, February 2015
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Hizb-ut-Tahrir: The New Islamic State
    • Factors for the Success of Jihadist Information Operations in Social Media
    • Sustainability of the Afghan Security Forces: A Wicked Problem
    • Understanding the Intensity of Boko Haram’s Terrorism
    • CTAP INTERVIEW: Robert Nickelsberg, Time Magazine
    • THE MOVING IMAGE: SERE on the Silver Screen
    • PUBLICATIONS AND BOOK ANNOUNCEMENTS
  • CTX Vol. 4, No. 4, November 2014
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • Pakistan: Money for Terror
    • Women in Terrorist Undergrounds
    • Of Culture and Cliché: Politics and the Uses (and Abuses) of Anthropology
    • The Tie That Binds: Reflections on Veteran’s Day
    • The “Golden Owl” Returns to Kazakhstan
    • CTAP Interview: Chok Dhakal, Nepalese Army
    • Ethics and Insights
    • The Written Word: Militant Groups in South Asia
    • The Moving Image: Potential of Transnational Cinema to Counter Islamic Extremism
    • JSOU Publications
  • CTX Vol. 4, No. 3, August 2014
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • Building the Future: An Unlikely Coalition and a Road in Rural Afghanistan
    • Education on Islam for Special Forces Needs an Overhaul: Africa as a Case Study
    • Pounding on the Detonator: How China Is Radicalizing Its Own Uyghur Population
    • Stressing Self-defense in the Force: Five Methods to Empower Commanders
    • NATO SOF Countries’ Three Main Mission Sets: Direct Action, Special Reconnaissance, Military Assistance
    • Leading the Cool War: Building a Sustainable Network inside the Ivory Tower
    • The Call-up: The Roots of a Resilient and Persistent Jihadist Presence on Twitter
    • Kirk Meyer, Former Director of the Afghan Threat Finance Cell
    • Redeployment
    • Publications
  • CTX Vol. 4, No. 2, May 2014
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • Little Norway in Big America: Soft Leadership on the Modern Battlefield
    • The PRT Kunduz: An Unsuccessful Command Structure
    • The Misunderstood Strategic Purpose of SOTF in Afghanistan
    • The Indian Mujahideen: The New Face of Jihadist Consolidation
    • An Interview with Nir Maman: Founder and Chief Instructor, Israeli Special Forces Krav Maga
    • Drones: A Challenge to the Professional Military Ethic
    • CTAP Interview: Anonymous, Afghan Army
    • Ethics and Insights
    • The Great Game: The Struggle for Empire in Central Asia
    • The Moving Image: American Suicide Bomber
    • JSOU Publications
  • CTX Vol. 4, No. 1, February 2014
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • A Roundtable Conversation on Intelligence and Terrorism Part One: The Changing Nature of Terrorism
    • A Roundtable Conversation on Intelligence and Terrorism Part Two: Requirements and Roles and Missions
    • Tags, Tweets, and Tethers
    • The Relevance of Technology in the Fight against India’s Maoist Insurgency
    • Big Data, Insider Threats, and International Intelligence Sharing
    • A Roundtable Conversation on Intelligence and Terrorism Part Three: Sharing Intelligence in Counterterrorism
    • Preventing a Day of Terror: Lessons Learned from an Unsuccessful Terrorist Attack
    • CTAP Interview: Peter Berg, Director of Lone Survivor
    • CTAP Interview Part Two: A Roundtable Discussion of Lone Survivor
    • The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth
    • The Wire HBO Serial Television Drama, Created by David Simon
    • JSOU Publications
  • CTX Vol. 3, No. 4, November 2013
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • Protecting Soft Networks: Time to Counter the Enemy’s Logical Strategy
    • The Ideologies of Anti-Technology Violence
    • De-Radicalizing Muslim Youth in Western Societies
    • The Role of Medical Development in Support of Security
    • The Challenge of Combat Search and Rescue for Colombian National Army Aviation
    • The Future of SOF Education: A Vision for Global Special Forces Education
    • The Haqqani Network: Pursuing Feuds under the Guise of Jihad
    • To Pay or Not to Pay: Criminal Extortion from a Game Theory Perspective
    • Colonel William (“Billy”) H. Shaw
    • Kill v. Capture—With a Twist
    • The Wildest Province: SOE in the Land of the Eagle
    • The Deceptive American
    • Publications
  • CTX Vol. 3, No. 3, August 2013
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • When the Goldfish meets the Anaconda: A Modern Fable on Unconventional Leadership
    • Incentivizing Cooperation in Afghanistan
    • Estonia’s Forest Brothers in 1941: Goals, Capabilities, and Outcomes
    • The Strategy and Activity of the Forest Brothers: 1947–1950
    • Cutting the Link Between Illegal Drugs and Terrorists
    • Human Rights as a Weapon of Terrorists
    • CTAP Interview: LTC Ramey Wilson, U.S. Army
    • Ethics and Insights
    • JSOU Publications
  • CTX Vol. 3, No. 2, May 2013
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • Al-Sahawa: An Awakening in Al Qaim
    • Inside Anbar
    • Maoist Insurgency in India: Emerging Vulnerabilities
    • The U.S.–Yemeni Joint Counterterrorism Exercises: The Other Side of the COIN
    • How Can Leaders Maintain Ethical Command Climates?
    • Painting Guerrillas or Guerrilla Painting?
  • CTX Vol. 3, No. 1, February 2013
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • Learning from the Enemy: Alternative Afghan Security Forces
    • Land Grabs, Radicalization, and Political Violence: Lessons from Mali and Beyond
    • The Problem with Rhetoric in COIN
    • Decentralizing Democracy: Governance in Post-conflict Ethnically Divided Countries
    • Cultural Intelligence: Archiving Lessons from Afghanistan
    • Equivocated Intentions: Blasphemy Laws in Pakistan
    • Anger or Ability: Arguing the Causes of Rebellion
    • Should Former Military Members Maintain Their Military Obligation?
    • The Grid: A Primer in Network Warfare
    • Two World War II Resistance Films Worth Watching
    • The Politics of Counterterrorism in India: Strategic Intelligence and National Security in South Asia
    • Reflections on the 9/11 Memorial
  • CTX Vol. 2 No. 4, November 2012
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Image Credits
    • The New Battlefield: The Internet and Social Media
    • From al-Zarqawi to al-Awlaki: The Emergence and Development of an Online Radical Milieu
    • Rethinking the Role of Virtual Communities in Terrorist Websites
    • Countering Individual Jihad: Perspectives on Nidal Hasan and Colleen LaRose
    • Artisanal Intelligence and Information Triage
    • Another Tool in the Influencer’s Toolbox: A Case Study
    • Mining Twitter Data from the Arab Spring
    • Ethics and Insights
    • State of the Art
    • The Written Word
  • CTX Vol. 2 No. 3, August 2012
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Combining Special Operations Forces: A Dutch Case Study
    • The Civilian Casualties Management Team: A Piece of the Counterinsurgency Puzzle
    • Learning From History: What Is Successful Interrogation?
    • Financing al Shabaab: The Vital Port of Kismayo
    • Parole for Guantánamo Releasees: Revisiting a Time-tested Concept
    • Teenage Spy: Infiltrating the Irish Republican Army
  • CTX Vol. 2 No. 2, May 2012
    • Table of Contents
    • From the Editor
    • About the Contributors
    • Learning from Our Enemies: Sri Lankan Naval Special Warfare against the Sea Tigers
    • Airpower in Irregular Warfare: The Sri Lankan Experience
    • Operation “Jatagani”: Working to Win the Hearts and Minds of the Afghan People
    • The Killing Technology Next Door: Can South Sudan Learn from the Assassination of Darfur’s JEM Leader?
    • Exploitable Vulnerabilities of Iran’s Islamic Revolutionary Guard Corps
    • State of the Arts - From yBa to Al Qaeda: A Spectrum of Postmodern Spectacular
    • The Written Word
    • The Moving Image - Before Iraq & Afghanistan, There Was Ireland
    • Ethics and Insights - Moral Courage: Take Two
  • CTX Vol. 2 No. 1, February 2012
    • Table of Contents
    • From the Editor
    • Measuring a Government’s Capacity to Fight Terrorism
    • The Fifth CISM Military World Games: A Security Challenge for a Huge International Event
    • Radicalization in Light of the Developments in Egypt
    • Combating Terrorism: A Ugandan Perspective
    • The Forgotten Jihadist
    • The Written Word: Rock the Casbah
    • The Written Word: Counterstrike
    • Q & A with Eric Schmitt
    • The Moving Image
    • Ethics & Insights
  • CTX Vol. 1 No. 2, November 2011
    • Table of Contents
    • From the Editor
    • CTFP In Action: East African Alumni Take on the LRA
    • Bleeding for the Village: Success or Failure in the Hands of the Local Powerbrokers
    • Ten Years Later: Are We Winning the War?
    • Islamism in Algeria and the Evolution to AQIM: Transformations of Significance and Insignificance
    • The Moving Image
    • Ethics & Insights
  • CTX Vol. 1 No. 1, August 2011
    • Table of Contents
    • From the Editor
    • CTFP In Action: Crafting A National Counter-Terror Strategy for Bangladesh
    • The Financing of Lashkar-e-Taiba
    • Al Qaeda’s Strategy
    • Ethics & Insights
    • Violent Converts to Islam: Growing Cluster and Rising Trend
    • Terrorist Rehabilitation: A Neglected Secret CT Weapon
    • The Moving Image: Restrepo

Download CTX Vol. 3 No. 1

Download Vol. 3 No. 1

Privacy Policy | Acceptable Use Policy | Accessibility/Section 508 | Contact Global ECCO | View Sitemap