Counter Terrorist Trends and Analyses
Building a Global Network for Security
The Counter Terrorist Trends and Analyses (CTTA) carries articles with in-depth analysis of topical issues on terrorism and counter-terrorism, broadly structured around a common theme. CTTA brings perspectives from counter-terrorism researchers and practitioners with a view to produce policy relevant analysis. Launched in 2009, Counter Terrorist Trends and Analyses is the journal of the International Centre for Political Violence and Terrorism Research (ICPVTR) of the S. Rajaratnam School of International Studies (RSIS) at the Nanyang Technological University (NTU), Singapore. The CTTA has a circulation of more than 11,000 subscribers.
Articles in this Latest Issue
Volume 10, Issue 8 (August 2018): Religiously Motivated Terrorism & Preventing Violent Extremism
This issue focuses on two key themes in research on terrorism and violent extremism: non-Islamist religious-political terrorism and strategies for preventing violent extremism (PVE). First, the issue observes Aum Shinrikyo in Japan and Bodu Bala Sena (BBS) in Sri Lanka, both Buddhist groups that have drawn on extremist misinterpretations of the religion. While Aum Shinrikyo and BBS challenged the state’s political ideology, BBS has engaged in attacks against minorities and disseminated violent and extremist propaganda. This issue showcases the diversity of terrorist groups in terms of ideological and religious influences, rooted in the domestic context, that could also motivate hate speech and attacks against Muslims (a religious minority in the case of Sri Lanka).
Second, the issue focuses on PVE strategies in Southeast Asia, with the Philippines as the key case study. The article discusses the importance of moving beyond countering violent extremism (CVE) to PVE as long-term efforts to prevent terrorist groups from recruiting and gaining traction. To this end, it is proposed that communal harmony and peacebuilding measures incorporating the local communities should lie at the core of all PVE strategies.
Rohan Gunaratna’s contribution looks at the Japanese terrorist group, Aum Shinrikyo, which perpetrated the 1995 Tokyo Subway Sarin attack. The article analyses the group’s ideology and looks at its revival through various splinter organisations, specifically Aleph, which is focusing on recruitment through social media. It also looks at the historical development of Aum Shinrikyo, in particular, the leadership of Shoko Asahara (ideological and personal ambitions), international networks (Russia, United States and Australia) and attempts to acquire Chemical, Biological, Radiological and Nuclear (CBRN) technologies.
Amresh Gunasingham focuses on religious extremism in Sri Lanka against the backdrop of Galagoda Aththe Gnanasara, a hardline cleric’s arrest in June 2018. The article discusses the role of Buddhist extremist Bodu Bala Sena (BBS) group that has exploited ethnic and religious divisions, often targeting the minority Muslim community. Despite the rise of right-wing Buddhist extremists, the peaceful majority has staged demonstrations against targeting the Muslims. The article also notes the inability of authorities to take action against members of the right-wing Buddhist clergy that has incited ethno-religious violence and highlights a need for long-term policies to counter religious extremism.
Ricardo F. De Leon, Marlon V. Rufo and Mark Davis M. Pablo discuss the twin threats of the terrorist group Islamic State (IS) and the insurgent group New People’s Army (NPA) to the Philippines, while proposing a need for robust grassroots initiatives that incorporate the barangays (local villages). The piece highlights a need for holistic PVE approaches while discussing the work of the Integrated Community Action against Radicalisation and Extremism (i CARE) & Whole-of-Community Approach (WOCA) in the aftermath of IS’ attempted takeover of Marawi. It highlights the idea that empowering the barangays as the bulwark against violent extremism, will make the local communities more resilient against terrorist groups. Lastly, it proposes that a stronger homeland security infrastructure with the barangays as the first line of defense will strengthen preemptive responses to violent extremism by the IS and NPA.
Please click HERE to read the full issue.
Subscribing to CTTA
To be added to the CTTA mailing list, please email your full name, organisation and designation, with the subject ‘CTTA Subscription’ to [email protected].
- Sara Mahmood Editor
- Abdul Basit Associate Editor
- Vijayalakshmi Menon Editor
- Jennifer Dhanaraj Copywriter
- Sylvene See Copywriter
- Okkie Tanupradja Design and Layout
- Dr Rohan Gunaratna Professor of Security Studies, Head of International Centre for Political Violence and Research
- Dr Jolene Jerard Research Fellow, Deputy Head of International Centre for Political Violence and Research
- Dr John Harrison Associate Editor Journal of Transportation Security
- Dr Kumar Ramakrishna Associate Professor, Head of Policy Studies & Coordinator of National Security Studies Programme
- Dr Fernando Reinares Director, Program on Global Terrorism, Elcano Royal Institute
Professor of Security Studies, Universidad Rey Juan Carlos, Madrid, Spain
- Dr Stephen Sloan Professor Emeritus, The University of Oklahoma Lawrence J. Chastang, Distinguished Professor of Terrorism Studies, The University of Central Florida
Call for Contributions
Counter Terrorist Trends and Analyses (CTTA) welcomes contributions from researchers and practitioners in political violence and terrorism, security and other related fields.
Issue Calendar 2018
The Counter Terrorist Trends and Analyses (CTTA) series for 2018 welcomes topical, timely and relevant policy-oriented articles that allow readers to gain an in-depth understanding of the overall global and regional threat landscape. This could include strategic counter-terrorism issues, regionally focused articles as well as specialised topics.
Themes of Interest:
- Rise of right-wing extremist movements in North America, Europe, Australia and other regions.
- Analysis and policy responses to ethno-nationalist, separatist and non-Islamist extremist/terrorist organisations.
- Developing areas including cyber terrorism, cyber security, innovative policing techniques and evolving counter-terrorism responses.
CTTA Submission Guidelines/ Editorial Style and Policy
Please email your submissions to [email protected].
Submission deadlines: The CTTA is published monthly; submissions should be made by the 5th of each month for inclusion in the following month’s issue.
Preferred file format: MS Word document. Please do not submit in PDF format.
Originality: The author should only submit her or his original work. The author should not submit concurrent manuscripts (or manuscripts essentially describing the same subject matter) to multiple journals. The author must first seek editorial permission, if he or she would like to submit an article which has previously been published elsewhere.
Editors are entitled to request the author to provide the raw data for her or his research for convenience of editorial review.
Manuscript title: The title should be limited to 15 words or less; the title should be a brief phrase describing the contents of the paper.
Abstract: The abstract should summarise the manuscript content in 70-100 words. The abstract should be informative and self-explanatory, and should state the argument of the article and its major conclusions. Standard nomenclature should be used, and if abbreviations are used they must be defined at their first mention.
Word length: We publish articles within three different categories with varied word lengths. This includes, (i) commentaries: between 1,000 to 1,500 words, (ii) regular articles: between 2,000 to 3,000 words, and (iii) in-depth feature articles: between 4,000 to 5,000 words.
Structure: Please divide your article into subtopics with subheadings.
Style: British spelling and language style are used for the CTTA (as with other publications of ICPVTR and RSIS).
References and citations: Chicago Manual of Style (Footnoting system) is used.
If the author has used work, ideas and/or words of others, appropriate citations are required within the text of the article. Author should provide a list of references to indicate all sources that have supported the research at the end of the article.
Author information: Please include complete names and affiliation/ and or experience of author(s) in a few lines at the end of the article; contact email address of author(s) can be included.
The author should give due acknowledgement to all individuals who have made contributions to the research, and those who have contributed significantly to the research should be listed as co-authors. The author should ensure that all co-authors have affirmed the final version of the paper and have agreed on its final publication.
Copyright: The copyright of a published article will remain with the author(s); the author(s) agree to require that the Counter Terrorist Trends and Analysis (CTTA) journal be given credit as the original publisher in any republication of the article authorised by the author(s). Such credit shall include a proper citation to the article’s publication in the CTTA, including the author(s), the journal, the volume and issue numbers, the year of the article’s publication in the journal and the internet address for the issue.
The Editorial Team reserves the right to make changes to the content of submissions for publication and/or reject a submission at its discretion.
Please contact us at [email protected] if you have any queries pertaining to the CTTA submission guidelines or editorial style and policy.
- Volume 10, Issue 07 (July 2018)
- Volume 10, Issue 06 (June 2018)
- Volume 10, Issue 05 (May 2018)
- Volume 10, Issue 04 (April 2018)
- Volume 10, Issue 03 (March 2018)
- Volume 10, Issue 02 (February 2018)
- Volume 10, Issue 01 (January 2018)
- Volume 9, Issue 11 (November 2017)
- Volume 9, Issue 10 (October 2017)
- Volume 9, Issue 09 (September 2017)
- Volume 9, Issue 08 (August 2017)
- Volume 9,Issue 07 (July 2017)
- Volume 9,Issue 06 (June 2017)
- Volume 9,Issue 05 (May 2017)
- Volume 9.Issue 04 (April 2017)
- Volume 9,Issue 03 (March 2017)
- Volume 9,Issue 02 (February 2017)
- Volume 9,Issue 01 (January 2017)
- Volume 8, Issue 11 (November 2016)
- Volume 8, Issue 10 (October 2016)
- Volume 8, Issue 9 (September 2016)
- Volume 8, Issue 8 (August 2016)
- Volume 8, Issue 7 (July 2016)
- Volume 8, Issue 6 (June 2016)
- Volume 8, Issue 5 (May 2016)
- Volume 8, Issue 4 (April 2016)
- Volume 8, Issue 3 (March 2016)
- Volume 8, Issue 2 (February 2016)
- Volume 8, Issue 1 (January 2016)
- Volume 7, Issue 10 (November 2015)
- Volume 7, Issue 9 (October 2015)
- Volume 7, Issue 8 (September 2015)
- Volume 7, Issue 7 (August 2015)
- Volume 7, Issue 6 (July 2015)
- Volume 7, Issue 5 (June 2015)
- Volume 7, Issue 4 (May 2015)
- Volume 7, Issue 3 (April 2015)
- Volume 7, Issue 2 (March 2015)
- Volume 7, Issue 1 (Jan/Feb 2015)
- Volume 6, Issue 10 (November 2014)
- Volume 6, Issue 9 (October 2014)
- Volume 6, Issue 8 (September 2014)
- Volume 6, Issue 7 (August 2014)
- Volume 6, Issue 6 (July 2014)
- Volume 6, Issue 5 (June 2014)
- Volume 6, Issue 4 (May 2014)
- Volume 6, Issue 3 (April 2014)
- Volume 6, Issue 2 (March 2014)
- Volume 6, Issue 1 (Jan/Feb 2014)
- Volume 5, Issue 11 (November 2013)
- Volume 5, Issue10 (October 2013)
- Volume 5, Issue 9 (September 2013)
- Volume 5, Issue 8 (August 2013)
- Volume 5, Issue 7 (July 2013)
- Volume 5, Issue 6 (June 2013)
- Volume 5, Issue 5 (May 2013)
- Volume 5, Issue 4 (April 2013)
- Volume 5, Issue 3 (March 2013)
- Volume 5, Issue 2 (February 2013)
- Volume 5, Issue 1 (January 2013)
- Volume 4, Issue 11 (November 2012)
- Volume 4, Issue 10 (October 2012)
- Volume 4, Issue 9 (September 2012)
- Volume 4, Issue 8 (August 2012)
- Volume 4, Issue 7 (July 2012)
- Volume 4, Issue 6 (June 2012)
- Volume 4, Issue 5 (May 2012)
- Volume 4, Issue 4 (April 2012)
- Volume 4, Issue 3 (March 2012)
- Volume 4, Issue 2 (February 2012)
- Volume 4, Issue 1 (January 2012)
Last updated on 14/08/2018