Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged violent extremism
Beyond Ideology: Violent Extremism and Organized Crime in the Western Balkans

By Ruggero Scaturro | Giorgio Fruscione

In the Western Balkans, religious radicalization gained international attention in the early 2010s, with around 1 000 people travelling to Syria and Iraq to join jihadist groups between 2012 and 2016. The roots of this radicalization trace back to the Yugoslav wars, the presence of mujahideen networks in Bosnia and Herzegovina, and Islamist charities spreading Salafi jihadism in the 1990s.

However, not all fighters from the Western Balkans are religiously motivated. Between 2014 and 2021, around 300 people fought in eastern Ukraine, mainly for political reasons, with Serbia being a major source of combatants supporting pro-Russian separatists. Since Russia’s 2022 invasion of Ukraine, this trend has resurged, with more individuals reportedly joining mercenary units like the Wagner Group.

Instability in the Western Balkans has also fuelled the spread of organized crime beyond the region, first across Europe and later to other continents. In the 1990s, the Yugo Mafia gained significant media attention in Northern Europe. Meanwhile, violent extremists from the Western Balkans maintain transnational connections through diaspora networks and using online platforms.

Geneva: Global Initiative Against Transnational Organized Crime, 2025. 45p.

The “Webification” of Jihadism: Trends in the Use of Online Platforms, Before and After Attacks by Violent Extremists in Nigeria

By Folahanmi Aina and John Sunday Ojo

Violent extremist organisations (VEOs) use social media platforms to promote extremist content and coordinate agendas.  The use of digital platforms to disseminate information and coordinate activities by VEOs in Nigeria has grown considerably in recent years. This report analyses the adoption of social media before and after attacks by Boko Haram, Islamic State of West Africa Province (ISWAP) and Ansaru. In the post-attack environment, Boko Haram, ISWAP and Ansaru use platforms to claim responsibility and display their strengths against the state’s security forces. By demonstrating their capacity to attack state security forces, the three groups aim to erode the public’s confidence in the state military’s capacity to safeguard national security. The key findings of this report are as follows: Boko Haram, ISWAP and Ansaru previously leveraged popular social media platforms, including YouTube, Facebook, Telegram and Instagram. These platforms were used to promote propaganda and create awareness regarding upcoming attacks. However, all three groups have now had their use of these platforms restricted or banned. ISWAP has switched to using WhatsApp as a secure platform for communication before, during and after attacks. Rocket.Chat and Telegram have also been instrumental in ISWAP’s information dissemination. Boko Haram uses Telegram to share its activities in the pre-attack and post-attack environments. Ansaru has yet to appear on social media platforms due to its underground activities, which are hard to monitor. The recent acquisition of high-speed satellite internet has enhanced ISWAP’s communication with its audience and enabled coordinated attacks. Combating the exploitation of social media platform by VEOs requires a multidimensional approach. Effective collaboration with technology companies becomes imperative to identify extremist content. Building technological infrastructure for the state requires synergistic collaboration with the military and intelligence agencies to enable the removal of extremism from social media platforms. Devising multilingual and specialised algorithms to detect coded extremism messages and audio-visual content is essential for effective counter-extremism digital architecture. Investing in current technology through research and algorithm development must be prioritised to identify violent extremist content in Nigeria and beyond.

London: Global Network on Extremism & Technology, 2023. 30p.

Strengthening the Role of Victims and Incorporating Victims in Efforts to Counter Violent Extremism and Terrorism

By Alex P. Schmid

Following terrorist attacks, governments are often quick to express their solidarity with victims of terrorism but as the memory of a terrorist atrocity fades, political attention for the victims also ebbs away – in both government and society. In this Research Paper, Dr. Alex P. Schmid explores the roles of victims of terrorism. The paper looks at various definitions of what it means to be a “victim” and also traces the various initiatives aimed at supporting victims over the last two decades. In many cases, the paper finds, such initiatives have been weak. Victims of terrorism are often one of the best positioned actors to counter violent extremism and their role in this respect is also analysed. While the importance of victims is slowly being recognised, this Paper concludes that there is still a lot more work to be done. The Paper ends with several recommendations which could enhance and improve the position of victims and their role in countering violent extremism

The Hague: The International Centre for Counter-Terrorism , 2012. 28p.