You are here
- Home
- Publications
- Other Publications
- Books
Other Publications

Project Sandstone Report 5: Kaohsiung Cowboys: The Taiwanese Network Facilitating North Korea’s Illicit Activities
Other Publications, 12 December 2019James Byrne, Joe Byrne, Hamish Macdonald and Gary Somerville
This report provides a network analysis of North Korea's oil smuggling networks.
Tags: Proliferation and Nuclear Policy, Global Security Issues
Project Sandstone Report 4: Down and Out in Pyongyang and London
Other Publications, 26 September 2019James Byrne, Joe Byrne, Hamish Macdonald and Gary Somerville
This report examines the role that UK companies have in North Korean efforts to evade international sanctions.
Tags: Proliferation and Nuclear Policy, Global Security Issues, Proliferation and Nuclear Policy
Martial Power Programme Update 2019: Insights into Military Views from RUSI’s Conferences
Other Publications, 23 August 2019Peter Roberts
Reflections on the work of the Martial Power Programme for 2019 along with the reports of the major conferences including missile defence, space, airpower, sea power and land warfare.
Tags: Military Sciences, Defence Policy, UK Defence
Transnational Lessons from Terrorist Use of Social Media in South Asia
Other Publications, 13 August 2019Aaditya Dave
This paper looks at how social media platforms have been instrumentalised for a variety of purposes by terrorist organisations in Pakistan, Bangladesh and Sri Lanka, and how the governments of those countries have tackled the issue
Tags: Cyber, International Security Studies, Terrorism
Towards a Framework for Post-Terrorist Incident Communications Strategies
Other Publications, 9 August 2019Alastair Reed and Haroro J Ingram
This paper synthesises research on post-incident communications from a range of fields – including terrorism, crisis communications, mass-shooter incidents, serial offenders, and suicide studies – to identify guidelines for the development of a post-terrorist incident communications framework.
Tags: Cyber, Terrorism
The Conflict in Jammu and Kashmir and the Convergence of Technology and Terrorism
Other Publications, 7 August 2019Kabir Taneja and Kriti M Shah
This paper provides recommendations for what government and social media companies can do in the context of Jammu and Kashmir’s developing online theatre of both potential radicalisation and recruitment
Tags: Cyber, Terrorism
Social Media and Terrorist Financing: What are the Vulnerabilities and How Could Public and Private Sectors Collaborate Better?
Other Publications, 2 August 2019Tom Keatinge and Florence Keen
This paper focuses on the narrow issue of terrorist financing enabled by social media, particularly those forms that present identified terrorist-finance risks, including networking sites, content-hosting services, crowdfunding services and encrypted communications services.
Tags: Centre for Financial Crime and Security Studies, Cyber, Terrorism
The International Cyber Terrorism Regulation Project
Other Publications, 31 July 2019Deborah Housen-Couriel, Boaz Ganor, Uri Ben Yaakov, Stevie Weinberg and Dafne Beri
This paper provides an overview of the International Cyber Terrorism Regulation Project, an online resource consisting of a compilation of online regulatory resources in the field of counterterrorism, and an analytical framework for their use. The project is funded by the Global Research Network on Terrorism and Technology.
Tags: Cyber, Terrorism
Radical Filter Bubbles: Social Media Personalisation Algorithms and Extremist Content
Other Publications, 26 July 2019Alastair Reed, Joe Whittaker, Fabio Votta and Seán Looney
This paper assesses whether social media platforms’ personalisation algorithms promote extremist material, finding evidence that only one platform studied – YouTube – prioritises extremist material by the recommender system.
Tags: Technology, Terrorism
Terrorist Definitions and Designations Lists: What Technology Companies Need to Know
Other Publications, 19 July 2019Chris Meserole and Daniel Byman
This paper offers guidance for technology companies on evaluating third-party definitions of terrorism and lists of terrorist entities.
Tags: Cyber, Terrorism and Conflict, Technology, Terrorism
Clarity on Brexit: The Security Consequences
Hong Kong After the District Council Elections: Will Anything Change?
Sir Michael Howard - A Tribute