Counter Terrorist Trends and Analyses
Building a Global Network for Security
The Counter Terrorist Trends and Analyses (CTTA) carries articles with in-depth analysis of topical issues on terrorism and counter-terrorism, broadly structured around a common theme. CTTA brings perspectives from counter-terrorism researchers and practitioners with a view to produce policy relevant analysis. Launched in 2009, Counter Terrorist Trends and Analyses is the journal of the International Centre for Political Violence and Terrorism Research (ICPVTR) of the S. Rajaratnam School of International Studies (RSIS) at the Nanyang Technological University (NTU), Singapore. The CTTA has a circulation of more than 11,000 subscribers.
Articles in this Latest Issue
Volume 9, Issue 07 (July 2017): ‘IS Ingress in Southeast Asia‘
As the Islamic State (IS) terrorist group evolves into the next phase of its life cycle, it is operationalising its so-called wilayats (governorates) in different parts of the world. In June, with the loss of ground in Iraq and Syria, IS has made significant territorial gains in the Philippines along with carrying out a high profile terrorist attack in Indonesia. The operational strength and sophistication exhibited in these latest developments in Southeast Asia is concerning for three particular reasons.
First, IS will stay alive and relevant through its wilayats notwithstanding its defeat in the Middle East. This could result in higher levels of violence and radicalisation in the regions where IS might turn its attention. The ability of the so-called Caliphate to operate in the online and offline spheres has already provided the group a virtual sanctuary to survive and stay relevant despite real world defeats.
Second, with the seige of Marawi in the Philippines by IS, the city and surrounding areas may emerge as a new hub for IS supporters, sympathizers and lone-wolf fighters. In its latest issue of Rumiyah, the terror group has encouraged its supporters to relocate to Marawi if they cannot migrate to Iraq or Syria. This might galvanise a new wave of pro-IS fighters in Southeast Asia. IS has already prepared them for the setbacks in the Levant and provided them with sufficient religious grounds to press on with their ‘struggle’ through its propaganda machinery. The porous and heavily forested terrain and cluster of small islands with almost no control of the government in southern Philippines suits IS designs to fortify and consolidate its footprint in the region. It will require concerted efforts under the auspices of the Association of Southeast Asian Nations (ASEAN) to counter IS gains in the region. Even though Singapore, Malaysia and Indonesia have done remarkably well to check the security challenge posed by IS, more needs to be done in places like the Philippines and Thailand with coordinated operational efforts and timely intelligence sharing.
Third, IS online followers, supporters and sympathisers are now moving from open social media platforms to encrypted ones such as Telegram, Whatsapp and WeChat. This adds a new layer of complexity to keep track of vulnerable segments of youth susceptible to radicalism and disrupt any terrorist plots that may be planned and executed through communication in encrypted social medial platforms. Various Social Media Companies (SMCs), law enforcement agencies, academia and civil society organisations (SCOs) will have to team up and redouble their efforts to discuss how to deal with the challenge of cyber radicalism. Further procrastination in operationalising stronger social media strategies to counter violent radicalism will hamper efforts to curtail the spread of extremist propaganda and avert terrorist attacks.
Equally important is the realm of counter-ideology and promotion of religious moderation. A strong rebuttal of Sunni extremist groups’ exploitation of Quranic verses and other religious texts to further their narrow agendas serves to de-legitimise their efforts. Once the ideological appeal of these groups is neutralised, it will be easier to counter them operationally. Terrorist groups can survive loss of sanctuary and decapitation of the top leaders, but ideological de-legitimization deprives them of the moral support they enjoy among the vulnerable social segments.
These are some of the issues which the current issue of CTTA discusses at length highlighting: a) Marawi: A Game Changer in Terrorism in Asia by Rohan Gunaratna, b) The Evolution of Online Extremism in Malaysia by Nur Azlin Mohamed Yasin, c) A Rebuttal of Al-Qaeda and IS’ Theological Justification of Suicide Bombing by Muhammad Haniff Hassan and d) Abrogation and the Verse of the Sword: Addressing Sunni Extremists’ Misappropriation of Concept and Verse by Mahfuh Halimi
Please click HERE to read the full issue.
Subscribing to CTTA
To be added to the CTTA mailing list, please email your full name, organisation and designation, with the subject ‘CTTA Subscription’ to [email protected].
- Dr Rohan Gunaratna Professor of Security Studies, Head of International Centre for Political Violence and Research
- Dr John Harrison Associate Editor Journal of Transportation Security
- Dr Kumar Ramakrishna Associate Professor, Head of Policy Studies & Coordinator of National Security Studies Programme
- Dr. Fernando Reinares Director, Program on Global Terrorism, Elcano Royal Institute
Professor of Security Studies, Universidad Rey Juan Carlos, Madrid, Spain
- Dr. Stephen Sloan Professor Emeritus, The University of Oklahoma Lawrence J. Chastang, Distinguished Professor of Terrorism Studies, The University of Central Florida
Call for Contributions
Counter Terrorist Trends and Analyses (CTTA) welcomes contributions from researchers and practitioners in political violence and terrorism, security and other related fields.
Issue Calendar 2017
Counter Terrorist Trends and Analyses (CTTA) has revised its annual monthly publication for 2017, allowing readers and contributors to gain an understanding of the overall global and regional threat landscape. The series for 2017 has dropped its monthly thematic-based articles to allow for more topical, timely and relevant policy-oriented publications. This may include strategic counter-terrorism issues, regionally focused articles as well as specialised topics.
Topics of Interest: Presently we are interested in contributions from researchers and practitioners in political violence and terrorism, security and other related fields for the August special issue on Women and Terrorism. Articles are also welcome on the current status of militant groups such as Boko Haram, Al-Shabaab, Afghan Taliban, Pakistani Taliban and the Islamic Movement of Uzbekistan (IMU) among others
CTTA Submission Guidelines/ Editorial Style and Policy
Please email your submissions to [email protected].
Submission deadlines: The CTTA is published monthly; submissions should be made by the 5th of each month for inclusion in the following month’s issue.
Preferred file format: MS Word document. Please do not submit in PDF format.
Originality: The author should only submit her or his original work. The author should not submit concurrent manuscripts (or manuscripts essentially describing the same subject matter) to multiple journals. The author must first seek editorial permission, if he or she would like to submit an article which has previously been published elsewhere.
Editors are entitled to request the author to provide the raw data for her or his research for convenience of editorial review.
Manuscript title: The title should be limited to 15 words or less; the title should be a brief phrase describing the contents of the paper.
Abstract: The abstract should summarise the manuscript content in 70-100 words. The abstract should be informative and self-explanatory, and should state the argument of the article and its major conclusions. Standard nomenclature should be used, and if abbreviations are used they must be defined at their first mention.
Word length: Submissions should be between 2,000 to 3,000 words. Periodically, we also accept contributions between 4,000 to 5,000 words giving detailed analysis on a subject of interest.
Structure: Please divide your article into subtopics with subheadings.
Style: British spelling and language style are used for the CTTA (as with other publications of ICPVTR and RSIS).
References and citations: Chicago Manual of Style (Footnoting system) is used.
If the author has used work, ideas and/or words of others, appropriate citations are required within the text of the article. Author should provide a list of references to indicate all sources that have supported the research at the end of the article.
Author information: Please include complete names and affiliation/ and or experience of author(s) in a few lines at the end of the article; contact email address of author(s) can be included.
The author should give due acknowledgement to all individuals who have made contributions to the research, and those who have contributed significantly to the research should be listed as co-authors. The author should ensure that all co-authors have affirmed the final version of the paper and have agreed on its final publication.
Copyright: The copyright of a published article will remain with the author(s); the author(s) agree to require that the Counter Terrorist Trends and Analysis (CTTA) journal be given credit as the original publisher in any republication of the article authorised by the author(s). Such credit shall include a proper citation to the article’s publication in the CTTA, including the author(s), the journal, the volume and issue numbers, the year of the article’s publication in the journal and the internet address for the issue.
The Editorial Team reserves the right to make changes to the content of submissions for publication and/or reject a submission at its discretion.
Please contact us at [email protected] if you have any queries pertaining to the CTTA submission guidelines or editorial style and policy.
- Volume 9,Issue 06 (June 2017)
- Volume 9,Issue 05 (May 2017)
- Volume 9.Issue 04 (April 2017)
- Volume 9,Issue 03 (March 2017)
- Volume 9,Issue 02 (February 2017)
- Volume 9,Issue 01 (January 2017)
- Volume 8, Issue 11 (November 2016)
- Volume 8, Issue 10 (October 2016)
- Volume 8, Issue 9 (September 2016)
- Volume 8, Issue 8 (August 2016)
- Volume 8, Issue 7 (July 2016)
- Volume 8, Issue 6 (June 2016)
- Volume 8, Issue 5 (May 2016)
- Volume 8, Issue 4 (April 2016)
- Volume 8, Issue 3 (March 2016)
- Volume 8, Issue 2 (February 2016)
- Volume 8, Issue 1 (January 2016)
- Volume 7, Issue 10 (November 2015)
- Volume 7, Issue 9 (October 2015)
- Volume 7, Issue 8 (September 2015)
- Volume 7, Issue 7 (August 2015)
- Volume 7, Issue 6 (July 2015)
- Volume 7, Issue 5 (June 2015)
- Volume 7, Issue 4 (May 2015)
- Volume 7, Issue 3 (April 2015)
- Volume 7, Issue 2 (March 2015)
- Volume 7, Issue 1 (Jan/Feb 2015)
- Volume 6, Issue 10 (November 2014)
- Volume 6, Issue 9 (October 2014)
- Volume 6, Issue 8 (September 2014)
- Volume 6, Issue 7 (August 2014)
- Volume 6, Issue 6 (July 2014)
- Volume 6, Issue 5 (June 2014)
- Volume 6, Issue 4 (May 2014)
- Volume 6, Issue 3 (April 2014)
- Volume 6, Issue 2 (March 2014)
- Volume 6, Issue 1 (Jan/Feb 2014)
- Volume 5, Issue 11 (November 2013)
- Volume 5, Issue10 (October 2013)
- Volume 5, Issue 9 (September 2013)
- Volume 5, Issue 8 (August 2013)
- Volume 5, Issue 7 (July 2013)
- Volume 5, Issue 6 (June 2013)
- Volume 5, Issue 5 (May 2013)
- Volume 5, Issue 4 (April 2013)
- Volume 5, Issue 3 (March 2013)
- Volume 5, Issue 2 (February 2013)
- Volume 5, Issue 1 (January 2013)
- Volume 4, Issue 11 (November 2012)
- Volume 4, Issue 10 (October 2012)
- Volume 4, Issue 9 (September 2012)
- Volume 4, Issue 8 (August 2012)
- Volume 4, Issue 7 (July 2012)
- Volume 4, Issue 6 (June 2012)
- Volume 4, Issue 5 (May 2012)
- Volume 4, Issue 4 (April 2012)
- Volume 4, Issue 3 (March 2012)
- Volume 4, Issue 2 (February 2012)
- Volume 4, Issue 1 (January 2012)
- Volume 3, Special Issue
- Volume 3, Issue 11 (November 2011)
- Volume 3, Issue 10 (October 2011)
- Volume 3, Issue 9 (September 2011)
- Volume 3, Issue 8 (August 2011)
- Volume 3, Issue 7 (July 2011)
- Volume 3, Issue 6 (June 2011)
- Volume 3, Issue 5 (May 2011)
- Volume 3, Issue 4 (April 2011)
- Volume 3, Issue 3 (March 2011)
- Volume 3, Issue 2 (February 2011)
- Volume 3, Issue 1 (January 2011)
Last updated on 13/07/2017