Our mission is to advance education, research, and intelligence analysis across the critical domains of domestic extremism, transnational emerging threats, and trust and safety tech policy, to drive change in pursuit of a more just world.

Research

We go beyond the page to produce work that is not only academically excellent, but deeply policy relevant.

Intelligence 

At CTEC, we examine the full spectrum of terrorism and extremism to provide bespoke analysis for tech and government clients.

Education

We leverage experiential learning to train the next generation of intelligence and security researchers and analysts to respond to emerging threats.

CTEC is integrated into the curriculum of several Middlebury Institute degree and certificate programs, giving students opportunities to gain real-world work experience as paid research assistants: 

Areas of Focus

CTEC focuses on three topics: Trust & Safety, Extremism, and Transnational Emerging Threats. 

Poster 1

Trust and Safety is the policies, procedures, and technologies aimed at protecting users from harm, ensuring data security, and fostering a respectful and inclusive online environment. This involves the proactive identification and mitigation of risks related to privacy breaches, cyberbullying, fraud, and other forms of abuse, thereby promoting a safe and trustworthy user experience across digital platforms.

Extremism

Extremism, as defined by senior fellow J.M. Berger’s seminal work Extremism, is “the belief that an in-group’s success or survival can never be separated from the need for hostile action against an out-group.” Our work focuses on the full spectrum of extremism, from lawful to violent. Critically, we understand terrorism to be a tactic, while extremism is a belief system.

Transnational Emerging Threats

Transnational emerging threats are the complex and evolving challenges that cross national borders, impacting global security and stability. These threats encompass a wide range of issues including cyber attacks, terrorism, organized crime, pandemics, climate change, and the proliferation of weapons of mass destruction. At CTEC, we are particularly focused on those threats posed by non-state actors. Addressing these threats requires coordinated international efforts, innovative policy solutions, and the integration of advanced technologies to detect, mitigate, and respond to incidents that can rapidly escalate and have widespread consequences for societies, economies, and international relations.

Recent Publications

Read All Publications
  • Zakat, Proxies, and Plausible Deniability: The Financial Network of the Lashkar-e-Tayyiba

    | by Satyajit Lall

    In this research paper, CTEC Graduate Research Assistant Satyajit Lall traces nearly four decades of Lashkar-e-Tayyiba’s financial evolution—from its Saudi-backed origins during the Afghan jihad through the meticulously funded 2008 Mumbai attacks to the group’s continued operations culminating in the 2025 Pahalgam massacre—demonstrating that LeT’s resilience as one of South Asia’s most dangerous terrorist organizations is inseparable from the sophistication of its financial architecture. Drawing on an extensive body of scholarship, congressional testimony, and open-source intelligence, Lall maps the hybrid funding model of charitable fronts, diaspora remittances, hawala networks, and Pakistani state patronage that has allowed LeT to adapt to each successive wave of international pressure, from post-9/11 sanctions to FATF scrutiny, without ever suffering meaningful structural disruption to its financing. The paper makes a compelling case that the international community’s failure to confront the state-level enablers shielding LeT’s financial network has rendered existing designations and sanctions largely symbolic, and that only coordinated multilateral action targeting both the group’s front organizations and their institutional protectors can meaningfully degrade this persistent threat.

    – Jason Blazakis, CTEC Executive Director, April 6, 2026

  • News Stories

    How Hamas Monetized the Gaza War

    | by Amir Tadros

    The merged challenge of terrorist financing and reputational laundering is difficult terrain for governments and the private sector to navigate. Amir Tadros’s (CTEC Graduate Researcher) paper confronts that gap head-on, arguing that Hamas’s wartime narrative production functions not as atmospheric context but as core raise-phase infrastructure within the terrorist financing lifecycle. It is an original and overdue contribution, and Tadros traces how a deliberately engineered information environment activates donor networks, legitimizes sham charities, and normalizes aid diversion—all before a single dollar enters the formal financial system where existing tools can reach it.

    Hamas has been designated as a Foreign Terrorist Organization (FTO) by the U.S. Department of State since 1997. Yet, efforts to truly counter the group’s financing only began in a robust way after its deadly October 7, 2023 attack. Much work remains in countering Hamas’s manipulation, and Tadros’s paper provides a partial roadmap to do so. 

    Jason Blazakis - CTEC Executive Director

  • News Stories

    The Charities of Hamas – Designations History and Policy Recommendations

    | by Jason M. Blazakis

    It has now been more than two years since Hamas’s deadly attack in Israel. As someone who worked for more than a decade in the United States Government (USG) as head of the State Department’s Counterterrorism Bureau’s Office of Counterterrorism Finance and Designations CT/CTFD, I wanted to reflect on the financial methods, with a specific examination of charities1, that Hamas has used to finance itself.

Recent News

See our recent news

Our work is made possible by research grants and gifts from supporters. We appreciate your generosity.

Donate Today

Stay up to date on CTEC’s activities!

Join Our Newsletter

Open positions at CTEC are advertised through the Middlebury Institute’s employment opportunities Handshake.

Current Openings

How will you change the world?

Get Info

What makes us different?

Visit Campus