Skip to Content
Request an Account
|
Sign In
Navigation
Home
About
Contact Us
CTFP
Privacy Policy
Site Map
Request an Account
CTX Journal
About CTX
Author Guidelines
CTX Vol. 7, No. 1, May 2017
CTX Vol. 6, No. 4, November 2016
CTX Vol. 6, No. 3, August 2016
CTX Vol. 6, No. 2, May 2016
CTX Vol. 6, No. 1, February 2016
CTX Vol. 5, No. 4, November 2015
CTX Vol. 5, No. 3, August 2015
CTX Vol. 5, No. 2, May 2015
CTX Vol. 5, No. 1, February 2015
CTX Vol. 4, No. 4, November 2014
CTX Vol. 4, No. 3, August 2014
CTX Vol. 4, No. 2, May 2014
CTX Vol. 4, No. 1, February 2014
CTX Vol. 3, No. 4, November 2013
CTX Vol. 3, No. 3, August 2013
CTX Vol. 3, No. 2, May 2013
CTX Vol. 3, No. 1, February 2013
CTX Vol. 2 No. 4, November 2012
CTX Vol. 2 No. 3, August 2012
CTX Vol. 2 No. 2, May 2012
CTX Vol. 2 No. 1, February 2012
CTX Vol. 1 No. 2, November 2011
CTX Vol. 1 No. 1, August 2011
Game Center
Resources
Websites
Blogs
CTAP Videos
About CTX
Michael Freeman - Executive Editor
Author Guidelines
CTX Vol. 7, No. 1, May 2017
Table of Contents
CTX Vol. 6, No. 4, November 2016
Table of Contents
CTX Vol. 6, No. 3, August 2016
Table of Contents
From the Editor
About the Contributors
Image Credits
Da’esh, Legitimacy, and the Rise of Abu Bakr al-Baghdadi
Radicalization and De-radicalization: Norwegian Foreign Fighters in Syria
The 1990 Siege of Batticaloa: A Tribute to the Warriors of the Gemunu Watch
The Lumads of the Philippines: Struggling from Conflict Toward Peace
Assessing Canada’s Integrated National Security Enforcement Teams: Can the Concept of INSETs Be Exported?
CTAP INTERVIEW
STATE OF THE ART How to Read a (War) Comic
Publications
CTX Vol. 6, No. 2, May 2016
Table of Contents
From the Editor
About the Contributors
Image Credits
Photo Essay: The War Widows of Afghanistan
Walking the Thin Red Line: DANSOF in Afghanistan
The Lessons I Learned: Civil-Military Cooperation in Post-Conflict Sri Lanka
That Word Terrorist, and What Terrorists Say about It
Three Ghosts Who Haunt Modern Strategy
CTAP INTERVIEW
Ethics and Insights
JSOU Publications
CTX Vol. 6, No. 1, February 2016
Table of Contents
From the Editor
About the Contributors
Image Credits
Analysis from the Edge: Information Paralysis and Decision Making in Complexity
The US-Led Coalition against ISIS: Strategic Difficulties and Political Will
Language Skills for the Special Forces Operator: Access and Information in the African Permissive Environment
Siding with the Egg
Trying to Work Smarter: Fusion Tools for a Small SOF TF Staff
THE CTAP INTERVIEW The Return of the Zarqawists: How to Deal with the Islamic State Movement
THE WRITTEN WORD Not Your Dad’s Al Qaeda
JSOU Publications
CTX Vol. 5, No. 4, November 2015
Table of Contents
From the Editor
About the Contributors
Image Credits
Disaster Response: A Not-So-Sexy Kind of Job LCDR GILBERT G. VILLAREAL, PHILIPPINE NAVY
The Phantom Raid AIR CDR (RET.) JAMAL HUSSAIN, PAKISTANI AIR FORCE
Seymour Hersh Reignites the Bin Laden Raid Controversy AIR CDR (RET.) JAMAL HUSSAIN, PAKISTANI AIR FORCE
The Sri Lankan Civil War: A Personal Reminiscence COL SYLVESTER PERERA, SRI LANKAN ARMY
The Use and Misuse of Influence in Counterinsurgency MAJ DANIEL PACE, US ARMY
The Dark Side of Drones: Implications for Terrorism CPT BENJAMIN SEIBERT, US ARMY
Countering Extremist Groups in Cyberspace: Applying Old Solutions to a New Problem LTC ROBERT SCHULTZ, US ARMY
The Comprehensive Approach: A Silver Bullet or the Loch Ness Monster? LTC SÁNDOR FÁBIÁN, HUNGARIAN ARMY
CTAP INTERVIEW: Dr. David Kilcullen, Caerus Global Solutions
THE WRITTEN WORD American Force: Dangers, Delusions, and Dilemmas in National Security BY RICHARD K. BETTS REVIEWED BY MAJ BRADLEY J. KRAUSS, US ARMY
THE WRITTEN WORD The Hour between Dog and Wolf: Risk Taking, Gut Feelings, and the Biology of Boom and Bust BY JOHN COATES REVIEWED BY LT ADAM KARAOGUZ, US NAVY
THE MOVING IMAGE Turn: Washington’s Spies: A History Lesson on Irregular Warfare REVIEWED BY IAN C. RICE
JSOU Publications
CTX Vol. 5, No. 3, August 2015
Table of Contents
About the Contributors
Image Credits
Preface
Foreword
Introduction to the Special Issue
Characteristics of Terrorism Hotspots
The Blue-Green-Red Metaphor in the Context of Counterterrorism: Clarifications and Anthropological Emendations
The Ecosystem of Dark Networks: A Biological Perspective
America: Imagined Community, Imagined Kinship
One Arm Tied Behind Our Backs? Assessing the Power of the United States to Combat Global Threats
The Weather of Violence: Metaphors and Model, Predictions and Surprises
Trapped by the Paradigm: Why Net Assessment May Not Contribute to Countering Terrorism
CTAP INTERVIEW: Dr. Cécile Fabre, Oxford University
ETHICS AND INSIGHTS: Making Decisions, Taking Ethical Responsibility Part 2
Fatwa on Terrorism and Suicide Bombing
JSOU Publications
CTX Vol. 5, No. 2, May 2015
Table of Contents
From the Editor
About the Contributors
Image Credits
SOF Joint Combined Exchange Training from a Host Nation’s Perspective
Turkey’s Fight to Shut Off the Flow of PKK Finances
The Movers and Shakers of the Lord’s Resistance Army
Hybrid Warfare Revisited
Report on the 2014 Special Operations Research Association Symposium
CTAP INTERVIEW: Dr. Michael Noonan, Foreign Policy Research Institute
ETHICS AND INSIGHTS: Making Decisions, Taking Ethical Responsibility Part 1: To Tool or Not to Tool
THE WRITTEN WORD: Rebels Without Borders: Transnational Insurgencies in World Politics by Idean Salehyan
THE WRITTEN WORD: David and Goliath: Underdogs, Misfits, and the Art of Battling Giants by Malcolm Gladwell
PUBLICATIONS AND BOOK ANNOUNCEMENTS
CTX Vol. 5, No. 1, February 2015
Table of Contents
From the Editor
About the Contributors
Hizb-ut-Tahrir: The New Islamic State
Factors for the Success of Jihadist Information Operations in Social Media
Sustainability of the Afghan Security Forces: A Wicked Problem
Understanding the Intensity of Boko Haram’s Terrorism
CTAP INTERVIEW: Robert Nickelsberg, Time Magazine
THE MOVING IMAGE: SERE on the Silver Screen
PUBLICATIONS AND BOOK ANNOUNCEMENTS
CTX Vol. 4, No. 4, November 2014
Table of Contents
From the Editor
About the Contributors
Image Credits
Pakistan: Money for Terror
Women in Terrorist Undergrounds
Of Culture and Cliché: Politics and the Uses (and Abuses) of Anthropology
The Tie That Binds: Reflections on Veteran’s Day
The “Golden Owl” Returns to Kazakhstan
CTAP Interview: Chok Dhakal, Nepalese Army
Ethics and Insights
The Written Word: Militant Groups in South Asia
The Moving Image: Potential of Transnational Cinema to Counter Islamic Extremism
JSOU Publications
CTX Vol. 4, No. 3, August 2014
Table of Contents
From the Editor
About the Contributors
Image Credits
Building the Future: An Unlikely Coalition and a Road in Rural Afghanistan
Education on Islam for Special Forces Needs an Overhaul: Africa as a Case Study
Pounding on the Detonator: How China Is Radicalizing Its Own Uyghur Population
Stressing Self-defense in the Force: Five Methods to Empower Commanders
NATO SOF Countries’ Three Main Mission Sets: Direct Action, Special Reconnaissance, Military Assistance
Leading the Cool War: Building a Sustainable Network inside the Ivory Tower
The Call-up: The Roots of a Resilient and Persistent Jihadist Presence on Twitter
Kirk Meyer, Former Director of the Afghan Threat Finance Cell
Redeployment
Publications
CTX Vol. 4, No. 2, May 2014
Table of Contents
From the Editor
About the Contributors
Image Credits
Little Norway in Big America: Soft Leadership on the Modern Battlefield
The PRT Kunduz: An Unsuccessful Command Structure
The Misunderstood Strategic Purpose of SOTF in Afghanistan
The Indian Mujahideen: The New Face of Jihadist Consolidation
An Interview with Nir Maman: Founder and Chief Instructor, Israeli Special Forces Krav Maga
Drones: A Challenge to the Professional Military Ethic
CTAP Interview: Anonymous, Afghan Army
Ethics and Insights
The Great Game: The Struggle for Empire in Central Asia
The Moving Image: American Suicide Bomber
JSOU Publications
CTX Vol. 4, No. 1, February 2014
Table of Contents
From the Editor
About the Contributors
Image Credits
A Roundtable Conversation on Intelligence and Terrorism Part One: The Changing Nature of Terrorism
A Roundtable Conversation on Intelligence and Terrorism Part Two: Requirements and Roles and Missions
Tags, Tweets, and Tethers
The Relevance of Technology in the Fight against India’s Maoist Insurgency
Big Data, Insider Threats, and International Intelligence Sharing
A Roundtable Conversation on Intelligence and Terrorism Part Three: Sharing Intelligence in Counterterrorism
Preventing a Day of Terror: Lessons Learned from an Unsuccessful Terrorist Attack
CTAP Interview: Peter Berg, Director of Lone Survivor
CTAP Interview Part Two: A Roundtable Discussion of Lone Survivor
The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth
The Wire HBO Serial Television Drama, Created by David Simon
JSOU Publications
CTX Vol. 3, No. 4, November 2013
Table of Contents
From the Editor
About the Contributors
Image Credits
Protecting Soft Networks: Time to Counter the Enemy’s Logical Strategy
The Ideologies of Anti-Technology Violence
De-Radicalizing Muslim Youth in Western Societies
The Role of Medical Development in Support of Security
The Challenge of Combat Search and Rescue for Colombian National Army Aviation
The Future of SOF Education: A Vision for Global Special Forces Education
The Haqqani Network: Pursuing Feuds under the Guise of Jihad
To Pay or Not to Pay: Criminal Extortion from a Game Theory Perspective
Colonel William (“Billy”) H. Shaw
Kill v. Capture—With a Twist
The Wildest Province: SOE in the Land of the Eagle
The Deceptive American
Publications
CTX Vol. 3, No. 3, August 2013
Table of Contents
From the Editor
About the Contributors
Image Credits
When the Goldfish meets the Anaconda: A Modern Fable on Unconventional Leadership
Incentivizing Cooperation in Afghanistan
Estonia’s Forest Brothers in 1941: Goals, Capabilities, and Outcomes
The Strategy and Activity of the Forest Brothers: 1947–1950
Cutting the Link Between Illegal Drugs and Terrorists
Human Rights as a Weapon of Terrorists
CTAP Interview: LTC Ramey Wilson, U.S. Army
Ethics and Insights
JSOU Publications
CTX Vol. 3, No. 2, May 2013
Table of Contents
From the Editor
About the Contributors
Image Credits
Al-Sahawa: An Awakening in Al Qaim
Inside Anbar
Maoist Insurgency in India: Emerging Vulnerabilities
The U.S.–Yemeni Joint Counterterrorism Exercises: The Other Side of the COIN
How Can Leaders Maintain Ethical Command Climates?
Painting Guerrillas or Guerrilla Painting?
CTX Vol. 3, No. 1, February 2013
Table of Contents
From the Editor
About the Contributors
Image Credits
Learning from the Enemy: Alternative Afghan Security Forces
Land Grabs, Radicalization, and Political Violence: Lessons from Mali and Beyond
The Problem with Rhetoric in COIN
Decentralizing Democracy: Governance in Post-conflict Ethnically Divided Countries
Cultural Intelligence: Archiving Lessons from Afghanistan
Equivocated Intentions: Blasphemy Laws in Pakistan
Anger or Ability: Arguing the Causes of Rebellion
Should Former Military Members Maintain Their Military Obligation?
The Grid: A Primer in Network Warfare
Two World War II Resistance Films Worth Watching
The Politics of Counterterrorism in India: Strategic Intelligence and National Security in South Asia
Reflections on the 9/11 Memorial
CTX Vol. 2 No. 4, November 2012
Table of Contents
From the Editor
About the Contributors
Image Credits
The New Battlefield: The Internet and Social Media
From al-Zarqawi to al-Awlaki: The Emergence and Development of an Online Radical Milieu
Rethinking the Role of Virtual Communities in Terrorist Websites
Countering Individual Jihad: Perspectives on Nidal Hasan and Colleen LaRose
Artisanal Intelligence and Information Triage
Another Tool in the Influencer’s Toolbox: A Case Study
Mining Twitter Data from the Arab Spring
Ethics and Insights
State of the Art
The Written Word
CTX Vol. 2 No. 3, August 2012
Table of Contents
From the Editor
About the Contributors
Combining Special Operations Forces: A Dutch Case Study
The Civilian Casualties Management Team: A Piece of the Counterinsurgency Puzzle
Learning From History: What Is Successful Interrogation?
Financing al Shabaab: The Vital Port of Kismayo
Parole for Guantánamo Releasees: Revisiting a Time-tested Concept
Teenage Spy: Infiltrating the Irish Republican Army
CTX Vol. 2 No. 2, May 2012
Table of Contents
From the Editor
About the Contributors
Learning from Our Enemies: Sri Lankan Naval Special Warfare against the Sea Tigers
Airpower in Irregular Warfare: The Sri Lankan Experience
Operation “Jatagani”: Working to Win the Hearts and Minds of the Afghan People
The Killing Technology Next Door: Can South Sudan Learn from the Assassination of Darfur’s JEM Leader?
Exploitable Vulnerabilities of Iran’s Islamic Revolutionary Guard Corps
State of the Arts - From yBa to Al Qaeda: A Spectrum of Postmodern Spectacular
The Written Word
The Moving Image - Before Iraq & Afghanistan, There Was Ireland
Ethics and Insights - Moral Courage: Take Two
CTX Vol. 2 No. 1, February 2012
Table of Contents
From the Editor
Measuring a Government’s Capacity to Fight Terrorism
The Fifth CISM Military World Games: A Security Challenge for a Huge International Event
Radicalization in Light of the Developments in Egypt
Combating Terrorism: A Ugandan Perspective
The Forgotten Jihadist
The Written Word: Rock the Casbah
The Written Word: Counterstrike
Q & A with Eric Schmitt
The Moving Image
Ethics & Insights
CTX Vol. 1 No. 2, November 2011
Table of Contents
From the Editor
CTFP In Action: East African Alumni Take on the LRA
Bleeding for the Village: Success or Failure in the Hands of the Local Powerbrokers
Ten Years Later: Are We Winning the War?
Islamism in Algeria and the Evolution to AQIM: Transformations of Significance and Insignificance
The Moving Image
Ethics & Insights
CTX Vol. 1 No. 1, August 2011
Table of Contents
From the Editor
CTFP In Action: Crafting A National Counter-Terror Strategy for Bangladesh
The Financing of Lashkar-e-Taiba
Al Qaeda’s Strategy
Ethics & Insights
Violent Converts to Islam: Growing Cluster and Rising Trend
Terrorist Rehabilitation: A Neglected Secret CT Weapon
The Moving Image: Restrepo
Download CTX Vol. 3 No. 1
Download Vol. 3 No. 1