Skip to main content

A consortium of researchers dedicated to improving the understanding of the human causes and consequences of terrorism

Innovation and Technology

Title Sort descending Investigators Project Period
Behavioral Assessments Based on Automated Text Analyses James Pennebaker -
Counterterrorism Net Assessment Data Structure (CT NEADS) Barnett S. Koven -
Defense Advanced Research Projects Agency SIGMA+ Thomas Guarrieri, Marcus A. Boyd, Steve S. Sin, Ph.D. -
Geospatial Analysis of Terror Finance Marcus A. Boyd -
Investigating Emerging and Near-Future Urban Security Challenges Marcus A. Boyd, Samuel D. Henkin
Mapping and Evaluating Online Salafi-Jihadism Arie Kruglanski, Jarret Brachman, Michele Gelfand -
More Bang for the Buck?: Examining the Effect of Technological Change on Terrorist Use of Weapons of Mass Destruction Gary Ackerman, Jeffrey Bale -
Resources and Resilience: A Computational Model of Strategic Influence -
Social Media Influencers: Re-domaining Fashion Industry Forecasting to Anticipate Online Extremist Radicalization Barnett S. Koven, Ramon F. Brena -
The Arctic All-Hazards GIS Platform Marcus A. Boyd -
Towards an Understanding of Explosive Detection Technology Adoption: Results from Two Surveys Brooke Liu -
Tracking Cartels: Exploiting Open Sources to Identify Trends Marcus A. Boyd, Samuel D. Henkin -
Understanding and Combating Mass Casualty Terrorism (MCT) Gary Ackerman, Victor Asal -
Violent Non-state Actors and Contested Space Operations Amy Pate, Barnett S. Koven -
Project Title Sort descending Publication Date Publication Type
'Designing Danger': Complex Engineering by Violent Non-State Actors: Introduction to the Special Issue 2016-04-01T12:00:00 Journal Article
A Study on a Sequential One‐Defender‐N‐Attacker Game 2019-01-01T12:00:00 Journal Article
Al-Qaeda's Propaganda Decoded: A Psycholinguistic System for Detecting Variations in Terrorism Ideology 2016-05-01T12:00:00 Journal Article
An Aggregation of Geo-coded Violent and Non-violent Conflict Events 2016-04-01T12:00:00 Conference Paper
An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks 2020-08-01T12:00:00 Journal Article
An Information, Motivation, and Behavioral Skills Perspective on Terrorist Propaganda 2019-08-01T12:00:00 Book Chapter
Anthrax in Transit: Practical Experience and Intellectual Exchange 2008-09-01T12:00:00 Journal Article
Aum Shinrikyo’s Nuclear and Chemical Weapons Development Efforts 2016-03-01T12:00:00 Journal Article
Autologistic Models for Benchmark Risk or Vulnerability Assessment of Urban Terrorism Outcomes 2017-10-01T12:00:00 Journal Article
Call to Action: Mobilizing Community Discussion to Improve Information-Sharing About Vulnerabilities in Industrial Control Systems and Critical Infrastructure 2019-07-01T12:00:00 Conference Paper
Clearing the Smoke and Breaking the Mirrors: Using Attitudinal Inoculation to Challenge Online Disinformation by Extremists 2020-09-01T12:00:00 Book Chapter
Comparative Analysis of VNSA Complex Engineering Efforts 2016-03-01T12:00:00 Journal Article
Comparing Social Media and Traditional Surveys Around the Boston Marathon Bombing 2016-04-01T12:00:00 Conference Paper
Coping with Uncertainty in Adversarial Risk Analysis 2017-01-01T12:00:00 Journal Article
Correcting the Record: Civilians, Proportionality and the Jus ad Vim 2017-06-01T12:00:00 Book Chapter
Countering Violent Extremism Online and Offline 2017-01-01T12:00:00 Journal Article
Counterterrorism Net Assessment Data Structure 2020-04-01T12:00:00 Project Fact Sheet
Counting Little Words in Big Data 2012-11-01T12:00:00 Book Chapter
Data-Driven System Identification of the Social Network Dynamics in Online Postings of an Extremist Group 2016-06-01T12:00:00 Conference Paper
Defender–Attacker Games with Asymmetric Player Utilities 2019-09-01T12:00:00 Journal Article
Development and Optimization of Machine Learning Algorithms and Models of Relevance to START Databases 2016-04-01T12:00:00 START Reports
Diffusing Controversial Technology: Barriers, Incentives, and Lessons Learned 2015-07-01T12:00:00 Journal Article
Do Machines Replicate Humans? Toward a Unified Understanding of Radicalizing Content on the Open Social Web 2019-09-01T12:00:00 Journal Article
Domestic Terrorism and Digital Media: Planning in Cyberspace 2019-08-01T12:00:00 Book Chapter
Driving-Forces Model on Individual Behavior in Scenarios Considering Moving Threat Agents 2017-04-01T12:00:00 Journal Article
Dynamic Ad Hoc Social Networks in Improvised Intelligence/Counter-Intelligence Exercises: A Department of Homeland Security Red-Team Blue-Team Live-Action Roleplay 2019-06-01T12:00:00 Journal Article
Explosive Detection Technology Adoption: Findings from a General Population Survey 2017-10-01T12:00:00 Research Brief
Greater Tumen Area Economic Development Project: A Background 2010-01-27T12:00:00 Report
Guiding Principles for Countering and Displacing Extremist Narratives 2016-08-01T12:00:00 Journal Article
Hacking the Human Body: The Cyber-Bio Convergence 2019-04-01T12:00:00 White Paper
Illegal Roaming and File Manipulation on Target Computers: Assessing the Effect of Sanction Threats on System Trespassers’ Online Behaviors 2017-08-01T12:00:00 Journal Article
Innovations in Disaster Mental Health Services and Evaluation: National, State, and Local Responses to Hurricane Katrina 2009-05-01T12:00:00 Journal Article
Innovative Algorithm and Database Development Relevant to Counterterrorism and Homeland Security Efforts at START 2014-08-01T12:00:00 START Reports
Insider Threat for Inbound International Air Cargo 2015-10-01T12:00:00 Research Brief
Instruments and Arrangements against Online Terrorism Relating to International Cooperation 2019-08-01T12:00:00 Book Chapter
It's not Big Data, but Little Data, that Prevents Terrorist Attacks 2013-07-01T12:00:00 Discussion Point
Legal Restrictions and Challenges for Police and Law Enforcement Authorities 2019-08-01T12:00:00 Book Chapter
Legislation Specifically Targeting the Use of the Internet to Recruit Terrorists 2019-08-01T12:00:00 Book Chapter
Malevolent Innovation: Novelty and Effectiveness in Terror Attacks 2019-04-01T12:00:00 White Paper
Masters of Both: Balancing the Extremes of Innovation Through Tight–Loose Ambidexterity 2021-09-01T12:00:00 Book Chapter
Modeling a Multi-target Attacker-defender Game with Multiple Attack Types 2019-05-01T12:00:00 Journal Article
Modeling and Validating Public–Private Partnerships in Disaster Management 2018-05-01T12:00:00 Journal Article
Modeling Multi-target Defender-attacker Games with Quantal Response Attack Strategies 2021-01-01T12:00:00 Journal Article
Modelling Terrorist Technology Transfer 2019-04-01T12:00:00 White Paper
Motivations, Mechanisms and Determinants of Terrorist Technology Transfer 2017-10-01T12:00:00 Research Brief
N-stage Security Screening Strategies in the Face of Strategic Applicants 2017-09-01T12:00:00 Journal Article
Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach 2017-08-01T12:00:00 Journal Article
Putting Terrorism in Context: Lessons from the Global Terrorism Database (Contemporary Terrorism Studies) 2015-01-01T12:00:00 Book
Search Engines: Terrorism's Killer App 2008-07-01T12:00:00 Journal Article
Searching for the Nuclear Silk Road: Geospatial Analysis of Potential Illicit Radiological and Nuclear Material Trafficking Pathways 2016-01-01T12:00:00 Book Chapter
System, State, or Individual: Gaming Levels of Analysis in International Relations 2019-10-01T12:00:00 Journal Article
Terrorism 2016-01-01T12:00:00 Book Chapter
Terrorism and the Internet 2017-01-01T12:00:00 Journal Article
The Application of Social Bookmarking Technology to the National Intelligence Domain 2006-06-01T12:00:00 Journal Article
The Damoclean Sword of Offensive Cyber: Policy Uncertainty and Collective Insecurity 2019-03-01T12:00:00 Journal Article
The Drone Debate: A Primer on the U.S. Use of Unmanned Aircraft Outside Conventional Battlefields 2015-12-01T12:00:00 Book
The Provisional Irish Republican Army and the Development of Mortars 2016-03-01T12:00:00 Journal Article
The Revolutionary Armed Forces of Colombia (FARC) and the Development of Narco-Submarines 2016-03-01T12:00:00 Journal Article
The Role of Risk Preferences in a Multi-Target Defender-Attacker Resource Allocation Game 2017-08-01T12:00:00 Journal Article
Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories 2017-02-01T12:00:00 Journal Article
Title Sort descending
A Smart Bomb in Every Garage? Driverless Cars and the Future of Terrorist Attacks
Call for Proposals: Interactive teaching units on human aspects of cybersecurity
Designing Danger: Complex Engineering by Violent Non-State Actors
Discussion Point: Embrace "Big Data," but don't ignore the human element in data coding
Discussion Point: It's not Big Data, but Little Data, that Prevents Terrorist Attacks
Discussion Point: The Benefits and Drawbacks of Methodological Advancements in Data Collection and Coding: Insights from the Global Terrorism Database (GTD)
GRU team gives virtual talk on cartels for National Security Forum
Intern team authors peer-reviewed journal article on Hamas
Jeffrey Lewis discusses history and culture behind suicide bombings
JOB OPPORTUNITY: IT Student Assistant - Application Development
New Fall 2008 UMD Course: Innovation and Terrorist Tactics
New study examines FARC’s development of narco-submarines
Policy specialist takes on new challenge with START's Graduate Certificate
Scavenger hunt activity helps START team assess capability of mobile radiation detectors
START Announces 2007-08 Fellowship Awards
START Announces Fellowships for 2005-06
START Bulletin Summer 2008 Inaugural Issue
START formalizes commitment to Global Internet Forum to Counter Terrorism
START launches online course on terror-crime nexus and CBRN
START Newsletter: Intelligence and security; perspectives on terrorism; Hezbollah; 'big data' and coding
START research informs Senate report on Chesser
START Research Symposium: Wednesday, June 28th
START researchers inform interns on “Machine Learning and Big Data for Predictive Modeling of Asymmetric Threats” (Photo Gallery)
START seeking 2014 Outstanding Article Award nominations
START study leads to support for SLTT officials
Study finds that warning banners deter hackers
UMD researchers win $1.5M Minerva Grant to understand social media information campaigns
White House Science and Technology Director Addresses Need for Innovations to Combat Terrorism
Title Sort descending Job Title Institution
person-default Alexandra Williams Junior Researcher University of Maryland
person-default Amanda Quinn Faculty Research Assistant, GTD University of Maryland
Carlos colon Carlos Rafael Colon Faculty Research Assistant, GTD University of Maryland
Gary Ackerman Gary Ackerman Associate Professor, SUNY Albany University at Albany, State University of New York
Gina_Ligon Gina Scott Ligon Director of National Counterterrorism Innovation, Technology, and Education Center (NCITE); Jack and Stephanie Koraleski Professor of Collaboration Science, UNO University of Nebraska Omaha
Sawyer John John Sawyer Director of Strategic Corporate Research Relationships University of Maryland
Boyd_Marcus Marcus A. Boyd Geospatial Research Unit (GRU) Director, START
Director of Graduate Studies, START
University of Maryland
person-default Megan Rutter Junior Researcher, START University of Maryland
Prabhakar misra Prabhakar Misra Professor of Physics Howard University
Ramon Ramon F. Brena Professor Tecnologico de Monterrey
person-default Rebecca (Becca) Earnhardt PhD student
Research Associate, Stimson Center
University of Maryland
person-default Rhyner Washburn Research Affiliate University of Maryland
Robert lamb Robert D. Lamb ICONS Director and Associate Research Scientist University of Maryland
Henkin Samuel D. Henkin Geospatial Research Unit (GRU) Researcher, START University of Maryland
sean doody Sean Doody Senior Researcher, START University of Maryland
Steve Sin Steve S. Sin, Ph.D. Associate Research Scientist & Director, Unconventional Weapons & Technology Division
Adjunct Professorial Lecturer, School of International Service, American University
Adjunct Instructor for Forensic Sciences, Oklahoma State University
Chief Academic Officer, Platinum East
University of Maryland
Guarrieri Thomas Guarrieri Director of Undergraduate Studies
Assistant Research Scientist, Unconventional Weapons &
Technology (UWT) Division, START
University of Maryland
Clark tyler Tyler A. Clark Data Scientist, Doctoral Student University of Maryland
Asal_Victor Victor Asal Associate Professor of Political Science and Chair of Public Administration University at Albany, State University of New York