Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Chemical Terrorism: Assessment of U.S. Strategies in the Era of Great Power Competition

By The Committee on Assessing and Improving Strategies for Preventing, Countering, and Responding to Weapons of Mass Destruction Terrorism: Chemical Threats; Board on Chemical Sciences and Technology; Division on Earth and Life Studies; National Academies of Sciences, Engineering, and Medicine

Domestic and foreign violent extremist organizations, or terrorist groups, have caused a greater amount of harm with chemical agents than with biological or radiological weapons. The United States capacity and capability to identify, prevent, counter, and respond adequately to chemical threats is established by the strategies, policies, and laws enacted across multiple levels of government. While the number of chemical terrorism incidents has risen and fallen over time, there is no empirical or analytical indication that the threat is disappearing. This report comes at a time when the nation's highest-level strategies have shifted from focusing primarily on violent extremist organizations to focusing more on Great Power Competition. This shift in relative perceived threat and consequent prioritization will impact efforts against chemical terrorism, and in turn, affect funding priorities. Revised risk assessments are needed to reprioritize risks guided by new strategies, so that strategy-aligned budgets can be created. The report recommends weapons of mass destruction budgets be aligned with evolving priorities and incentivize activities that transition promising research to operations.

National Academies of Sciences, Engineering, and Medicine. 2024, 209 pages

Terrorist Risk in Urban Outdoor Built Environment: Measuring and Mitigating via Behavioural Design Approach

By Gabriele Bernardini, Elena Cantatore, Fabio Fatiguso, and Enrico Quagliarini

This open access book outlines the latest results in analysing, assessing, and managing terrorist risk in the urban outdoor built environment. In detail, contents refer to the outdoor Open Areas (such as streets, squares, urban parks and other public spaces in our cities) exposed to such violent events considering the physical elements and properties of the built environment and users. PThe built environment features, including layout, use and management, are combined with terrorist threats issues and user behaviours in emergency conditions, to determine a set of complementary tools for the reduction of risk and increase of urban resilience. The contents hence provide different levels of tool analysis, for risk scenario definition, risk assessment, mitigation strategies design and effectiveness evaluation, considering traditional approaches about the issue along with simulation-based approaches relying on understanding and representing user behaviors. This “behavioural design” approach offers the opportunity to manage the level of risk for specific real urban cases overcoming the normative limitations in Europe that are only referred to a few countries and sometimes deal with the prevention of violent acts by intelligence activities as the exclusive way to face this issue. In addition, the focus on the characters of cultural and historic places and their resilience is increasing by means of introduction of mitigation and compatible solutions providing a complementary chapter for the design of resilient cities in all of their peculiarities (peripheries, consolidated, and historical). In this sense, it is one of the first organized attempts to analyse the main limitations of current solutions in these outdoor Open Areas and, at the same time, to clearly introduce the importance of human behaviours and the various choices in emergency evacuation conditions, thanks to the proposed behavioural-based simulation approach. The attention is focused on a critical aspect for historic spaces, where morphological conditions are fixed values. Thus, this book represents a sort of guidelines about these user-related issues during such violent events and is useful to both professionals and researchers in the areas of security and urban administration.

Singapore: Springer Nature, 2025. 135p.

New EU Regulation on Preventing Money Laundering and Terrorist Financing

By Piotr Bąkowski  

In 2021, the European Commission presented a package of legislative proposals in the area of anti-money-laundering efforts and countering the financing of terrorism (AML/CFT). One of them, a proposal on the prevention of the use of the financial system for money laundering or terrorist financing, became Regulation (EU) 2024/1624, adopted on 31 May 2024. Its detailed, directly applicable provisions will replace the minimum rules of the existing EU AML directives. Most provisions will apply from 10 July 2029. The package was adopted in response to repeated calls by the European Parliament and the Council of the EU to enhance the EU's AML/CFT regulatory framework. The aim is for the framework to become more coherent, keeping in step with technological innovations and related new forms of crime, as well as remaining in line with international standards in the area. In Parliament, the Committees on Economic and Monetary Affairs and on Civil Liberties, Justice, and Home Affairs were jointly responsible for the file. Second edition. The 'EU Legislation in Progress' briefings are updated at key stages throughout the legislative procedure.

Brussels: EPRS | European Parliamentary Research Service, 2024, 10p.  

Comparing Violent Far-Right Terrorist Designations among Five Eyes Countries

By JASON BLAZAKIS & MEGAN RENNEBAUM

This paper seeks to examine the array of terrorist designations undertaken by “Five-Eye” (FVEY) countries (i.e. Australia, Canada, New Zealand, the United Kingdom, and the United States) against violent far-right terrorists, often also referred as racially and ethnically motivated violent extremist (REMVE) actors. While not a focus of the papers, non-FVEY countries, most notably Germany, have also implemented measures to restrict the activities of violent far-right actors. Thus, this paper will evaluate whether non-FVEY measures can help inform broader policy determinations related to violent far-right terrorism designations. What lessons learned, if any, can the FVEY countries draw from other national experiences? Furthermore, are there multilateral regimes, such as the United Nations Security Council Resolution (UNSCR) 1267 counterterrorism sanctions regime (henceforth, 1267 regime), that can inform FVEY policies within the field of terrorist designations?

Issue Brief, New York: Soufan Center, 2022. 22p.

Chemical Terrorism: Assessment of U.S. Strategies in the Era of Great Power Competition

By National Academies of Sciences, Engineering, and Medicine.

Domestic and foreign violent extremist organizations, or terrorist groups, have caused a greater amount of harm with chemical agents than with biological or radiological weapons. The United States capacity and capability to identify, prevent, counter, and respond adequately to chemical threats is established by the strategies, policies, and laws enacted across multiple levels of government. While the number of chemical terrorism incidents has risen and fallen over time, there is no empirical or analytical indication that the threat is disappearing. This report comes at a time when the nation's highest-level strategies have shifted from focusing primarily on violent extremist organizations to focusing more on Great Power Competition. This shift in relative perceived threat and consequent prioritization will impact efforts against chemical terrorism, and in turn, affect funding priorities. Revised risk assessments are needed to reprioritize risks guided by new strategies, so that strategy-aligned budgets can be created. The report recommends weapons of mass destruction budgets be aligned with evolving priorities and incentivize activities that transition promising research to operations.

Washington, DC: The National Academies Press.2024, 186p. https://doi.org/10.17226/27159.

Radicalization in the Ranks

By Michael A. Jensen, Elizabeth Yates , Sheehan Kane

This project expands the Profiles of Individual Radicalization in the United States (PIRUS) database with information on the nexus of criminal extremism and U.S. military service. The expanded database includes 461 individuals with U.S. military backgrounds who committed criminal acts in the United States from 1990 through 2021 that were motivated by their political, economic, social, or religious goals. Findings from these data are detailed in three results sections of a report that can be accessed here.

The first section explores the scope and nature of criminal extremism in the ranks, detailing the rates of military service among criminal extremists and analyzing their military branch, ideological, and extremist group affiliations. This section also provides a closer look at the individuals with military backgrounds who have been charged with criminal offenses related to the Capitol breach of January 6, 2021.

Section two provides a closer look at risk factors for radicalization, comparing subjects with military backgrounds to those without records of military service. This section explores the rates of substance use disorders, anti-social relationships, and social mobility challenges among past U.S. service members who committed extremist crimes and situates these radicalization risk factors within the larger extremist context in the United States.

The final section of results examines the risk factors and vulnerabilities for radicalization that are unique to subgroups of criminal extremists with U.S. military backgrounds. Using hierarchical clustering methods, the results in this section show how the radicalization pathways of extremists with military backgrounds are likely to differ depending on whether individuals are active in the military at the time of their involvement in extremism or if they have military-specific risk factors for radicalization, such as previous deployments to combat zones or diagnoses of post-traumatic stress disorder (PTSD). This report concludes with recommendations for policy and future research, paying particular attention to the potential benefits of applying a public health model to countering the spread of extremism in the U.S. military.

College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism (START), 2022. 45p.

Radicalisation and Gender – What Do We Know?

By Joana Cook, Eva Herschinger, Seran de Leede, and Anna-Maria Andreeva

The literature focusing on gender and radicalisation has steadily increased over the last ten years. This has reflected the rise of extremism across the globe, and has been particularly triggered by researchers seeking to better understand the experiences of individuals throughout all stages of the radicalisation process. However, research on the topic has also largely focused on the experiences of women, especially those associated with Islamist forms of extremism. Such narrow focus has resulted in several gaps in the literature, which in turn has translated into gaps in practice. This report seeks to identify the key trends in research between 2014 and 2024 concerning literature on gender and radicalisation, as well as make explicit the areas that remain underexplored. Focusing on tangible recommendations, which align with the needs of practitioners, the report seeks to bring forward the state of the art of research on gender and radicalisation.

The Hague: The International Centre for Counter-Terrorism (ICCT) 2024. 21p.

Assessing Gender Perspectives in Preventing and Countering Violent Extremism Practices

By Anna-Maria Andreeva, Annika von Berg, Bibi van Ginkel, Elisabeth Hell, Shams Jouve, Alexandra Korn, Bàrbara Molas, Maximilian Ruf, and Sophie Scheuble

Despite the fact that research indicates that it is important to integrate a gender-based approach for effective risk assessment and implementation of counter-terrorism (CT) and preventing and countering violent extremism (P/CVE) practices, such as rehabilitation and reintegration, our assessment of academic and grey literature on gender perspectives in CT and P/CVE practices shows that most of these practices remain gender-blind and tend to reproduce gender norms and stereotypes, while ignoring the complexity of women’s and men’s involvement in extremism. In this report, the authors did a thorough literature review of academic and grey literature published between 2014 and 2024, and conducted ten interviews to reflect on gender perspectives in CT and P/CVE practices. After a reflection on persisting gender construction, biases, and other problematic perspectives, the report focuses on the gender perspectives in analytical frameworks and toolkits used, for instance, for risk assessments. Next, the report elaborates on the gender perspectives in the implementation of the intervention phases, namely from law enforcement interventions, to exit processes. In the general conclusion, the authors argue that gender constructs, roles, and norms, and the way these are taken into consideration in the various P/CVE interventions, heavily impact the effectiveness of these efforts. They also conclude that there is a potential of an aggravating sequence of gender (mis)conceptions, since the gender constructs used in the risk assessments inform following interventions, such as disengagement, deradicalisation, and rehabilitation processes. The report ends with a set of recommendations tailored to different target groups.

The Hague: The International Centre for Counter-Terrorism (ICCT), 2024. 25p.

Aum Shinrikyo and Religious Terrorism in Japanese Collective Memory

By Rin Ushiyama,

Aum Shinrikyō’s sarin attack on the Tokyo subway in March 1995 left an indelible mark on Japanese society. This book is the first comprehensive study of the competing memories of Aum Shinrikyō’s religious terrorism. Developing a sociological framework for how uneven distributions of power and resources shape commemorative processes, this book explores how the Aum Affair developed as a ‘cultural trauma’ in Japanese collective memory following the Tokyo attack. The book shows how numerous stakeholders, including the state, the mass media, public intellectuals, victims, and perpetrators offered competing narratives about the causes and consequences of Aum’s violence. Combining multiple methods including media content analysis, participant observation, and original interviews with victims and ex-members, this book reveals various flashpoints of contention such as the state regulation of religion, ‘brainwashing’ and ‘mind control’ controversies, and the morality of capital punishment. It shows that although cultural trauma construction requires the use of moral binaries such as ‘good vs.. evil’ and ‘sacred vs.. profane’, the entrenchment of such binary codes in commemorative processes can ultimately hinder social repair and reconciliation.

Oxford, UK: Oxford University Press, 2022. 231p.

Migration, Culture Conflict, Crime and Terrorism

May Contain Mark-Ups

Edited by Joshua D. Freilich and Rob T. Guerette

The book“Migration, Culture Conflict, Crime and Terrorism,”edited by Joshua D. Freilichand Rob T. Guerette, is part of the Advances in Criminology series. It explores the complex interactions between migration, cultural conflicts, crime, and terrorism through a collection of scholarly works. Published by Ashgate in 2006, the book is divided into four parts, each addressing different aspects of these issues.

Part I: Migration, Religion, Culture, and Terrorism

1.Terrorism Rediscovered: Hans-Heiner Kühne examines the political motivations behind terrorism, emphasizing the need to distinguish between acts of war and criminal acts.

2.Culture or Conflict?: Roland Eckert discusses how conflicts generate collective identities and the role of migration in these conflicts.

3.The 21st-Century Kulturkampf: Shlomo Giora Shoham provides a historical and cultural analysis of the clash between fundamentalist Islam and Western culture,advocating for dialogue and mutual respect.

4.Post-9/11 Legislative Changes: Joshua D. Freilich, Matthew R. Opesso, and Graeme R. Newman compare the legislative and policy changes in the UnitedStates, Canada, and Australia following the 9/11 attacks, focusing on operations abroad, detainment of alleged terrorists, border security, and internal measures.

Ashgate Publishing, Ltd., 2006, 235 pages

Terrorism: A Global Perspective

May Contain Mark-Ups

Edited by Mustafa Ozguler, Ph.D., Ali Ozdogan, Ph.D., Ekrem Mus, Halim Iltas, & A. Sait Yayla, Ph.D.

The book“Terrorism: A Global Perspective,”edited by Mustafa Ozguler, Ali Ozdogan, A. SaitYayla, Ekrem Mus, and Halim Iltas, is a comprehensive compilation of presentations from the 2nd Istanbul Conference on Democracy and Global Security held in June 2007. The book is divided into three parts:“Terrorism: A Global Problem,” “Terrorism and CivilSociety,”and“Issues in Terrorism.”Each section addresses different aspects of terrorismand global security, ranging from the global and local dimensions of terrorism, the role of civil society in counter-terrorism efforts, to specific issues such as the use of biometrics incounter-terrorism and the financing of terrorist organizations through cigarette smuggling.The book emphasizes the importance of international cooperation, understanding local factors, and addressing core issues to effectively combat terrorism and enhance global security.Key topics include the framing of terrorist threats by different countries, the impact of globalization on terrorism, the fundamental causes of terrorism such as social injustice and political conflicts, and the role of media in counter-terrorism. The book also exploresthe psychological profiles of suicide bombers, the evolution of right-wing violence in Japan,and the strategic use of small-scale terrorist attacks. Additionally, it proposes new community protection initiatives, such as “Building Terrorism Resistant Communities,”to enhance local resilience against terrorism. Overall, the book provides a multifaceted analysis of terrorism, combining theoretical insights with practical recommendations for policymakers, law enforcement, and civil society

The Turkish Institute for Security and Democracy, 2009, 357 pages

Reducing Terrorism Through Situational Crime Prevention

May Contain Mark-Ups

By Joshua D. Freilich & Graeme R. Newman

The book “Reducing Terrorism Through Situational Crime Prevention,” edited by Joshua D.Freilich and Graeme R. Newman, explores how situational crime prevention (SCP) techniques can be applied to reduce terrorism. The central theme is that strategies proven effective in preventing conventional crimes can also mitigate terrorism by manipulating environmental factors to block opportunities for terrorist acts. The book includes various case studies and theoretical discussions that illustrate how SCP can be tailored to address specific types of terrorism, such as bioterrorism, hostage-taking, and insurgent attacks.Each chapter delves into different aspects of SCP, such as increasing the effort required to commit a terrorist act, increasing the risks for terrorists, reducing the rewards, and removing excuses for terrorism.One notable case study in the book is the analysis of the 23 Korean hostages inAfghanistan, which demonstrates how SCP measures can be applied in real-world scenarios to prevent terrorist kidnappings. The book also discusses the importance of understanding the terrorists decision-making processes and the situational factors that influence their actions. By integrating SCP with script theory, the authors provide a detailed procedural map of terrorist activities, which can help in developing targeted prevention strategies. Overall, the book emphasizes a practical, evidence-based approach to counter-terrorism, highlighting the need for continuous adaptation and learning to effectively combat evolving terrorist threats

Criminal Justice Press, 2009, 244 pages

God's Assassins: State Terrorism in Argentina in the 1970s

May Contain Mark-Ups

By Patricia Marchak

"God’s Assassins: State Terrorism in Argentina in the 1970s"by PatriciaMarchak, in collaboration with William Marchak, delves into the harrowing period of state terrorism in Argentina from 1976 to 1983[^1^][1]. During this time, an estimated 30,000 people disappeared under the military junta, with many being tortured and murdered[^2^][2]. The book provides a comprehensive analysis through interviews with a diverse range of participants, including military officers, priests, survivors, and journalists. These personal accounts, combined with historical documents and media reports,offer a multifaceted view of the causes and processes of state terrorism in Argentina.The narrative is structured to interweave historical context with personal stories, revealing the complex and often contradictory nature of the period.The book explores the roles of various institutions, such as the Catholic Church and the military, and their involvement in the repression. It also addresses the broader social and political dynamics, including the influence of Peronism, unionism, and guerrilla movements. Through these detailed interviews and analyses, Marchak uncovers the deep-seated ideologies and motivations behind the brutal regime, providing a nuanced understanding of this dark chapter in Argentine history.

McGill-Queen's Press, 1999, 393 pages

Far-Right Online Radicalization: A Review of the Literature

By Alice Marwick, Benjamin Clancy, Katherine Furl

This literature review examines cross-disciplinary work on radicalization to situate, historicize, frame, and better understand the present concerns around online radicalization and far-right extremist and fringe movements. We find that research on radicalization is inextricably linked to the post-9/11 context in which it emerged, and as a result is overly focused on studying the other. Applying this research to the spread of far-right ideas online does not account for the ways in which the far-right’s endorsement of white supremacy and racism holds historical, normative precedent in the United States. Further, radicalization research is rife with uncertainties, ranging from definitional ambiguity to an inability to identify any simplistic, causal models capable of fully explaining the conditions under which radicalization occurs. Instead, there are multiple possible pathways to radicalization, and while the internet does not cause individuals to adopt far-right extremist or fringe beliefs, some technological affordances may aid adoption of these beliefs through gradual processes of socialization. We conclude that the term “radicalization” does not serve as a useful analytical frame for studying the spread of far-right and fringe ideas online. Instead, potential analytical frameworks better suited to studying these phenomena include theories prominent in the study of online communities, conversion, mainstreaming, and sociotechnical theories of media effects.

A summary of key take-aways includes:

The adoption of extremist, far-right, and fringe beliefs is often referred to as “radicalization,” a term formulated post-9/11 to understand jihadi terrorism, a very different context from the far-right.

Radicalization research is full of uncertainty.

  • No specific type of person is vulnerable to radicalization, and most people who commit political violence are not mentally ill or alienated from society.

  • Radicalization is not caused by poverty, oppression, or marginalization.

  • There is no one way in which people are “radicalized.”

  • Viewing extremist media does not necessarily lead to adopting extremist beliefs or committing political violence.

In contrast to the “red pill” model, radicalization is gradual. Recruits slowly adopt the identities, emotions, and interpretations shared by a community. They conceptualize their problems as injustices caused by others, and justify using political violence against them.

The internet does not cause radicalization, but it helps spread extremist ideas, enables people interested in these ideas to form communities, and mainstreams conspiracy theories and distrust in institutions.

"Radicalization” is not a useful frame for understanding the spread of far-right and fringe ideas online.

  • It is analytically imprecise and morally judgmentalIt doesn’t help us understand the role of media and digital technologies.

  • It is inextricably tied to a global security infrastructure targeting Islam.

  • It doesn’t account for the fact that fringe or far-right beliefs may change what people think is “true” and “false,” making it hard to find common ground.

  • The focus on violence ignores other worrying effects of mainstreaming far-right and fringe ideas.

Publisher: Bulletin of Technology & Public Life, 2022. 83p.

Terrorist Propaganda

By Travers Barclay Child, Kai Gehring, Sarah Langlotz, Austin Wright, and Rossella De Sabbata

This paper leverages granular survey data from within the conflict theater of Afghanistan to investigate how plausibly exogenous exposure to Islamic State (IS) propaganda in-fluences views towards local and international forces. We study two mediums of ter-rorist propaganda, exploiting high-frequency time variation in global distribution of IS videos and plausibly exogenous signal penetration of a prominent IS radio tower in Afghanistan. Our findings suggest violent video and radio content undermines public support for IS and its key opponents, while increasing demand for international forces to remain in the country. By contrast, videos depicting a capacity for IS governance boost their support.

University of Chicago, Becker Friedman Institute for Economics Working Paper No. 2024-121
Chicago: University of Chicago, The Becker Friedman Institute for Economics (BFI) , 2024. 59p.

Russian State Terrorism and State Sponsorship of Terrorism

By Kacper Rekawek  

The field of terrorism studies has traditionally been focused on non-state perpetrators of violence, such as different jihadi organizations which have been active in the West in the last three decades. Things looked different, however, during the Cold War, when state actors actively involved themselves in terrorism by, for example, supporting terrorist organizations operating abroad. This report takes stock of Russia's return to such a paradigm in the 21st century in general and after 2022, the onset of the Russian full-scale aggression against Ukraine, in particular. Russia not only terrorizes its population into submission but also uses homegrown terrorists for Vladimir Putin's regime's domestic ends, deploys terrorist tactics while fighting against Ukraine, and seems increasingly willing and able to use those tactics as part of its foreign policy toolbox in its "political warfare" against the broader West. For this reason, it is argued that one could seriously consider labeling Russia a "state terrorist" or a "state sponsor of terrorism." The report concludes that this might prove challenging in 2024, but also offers a way forward for prosecuting, sentencing, and arresting individuals involved in Russian state terrorism and state sponsorship of terrorism.   

The Hague: The International Centre for Counter-Terrorism (ICCT)    2024. 27p.

Handbook of Terrorism Prevention and Preparedness

Edited by Alex P. Schmid

This document compiles 35 chapters and over 1000 pages and thereby aims to provide an authoritative resource on terrorism prevention and preparedness. The Handbook is structured into five parts, comprising 32 chapters, next to the two introductory chapters and a concluding chapter by the editor followed by a comprehensive bibliography as follows: Part I: Lessons for Terrorism Prevention from the Literature in Related Fields (4 chapters); Part II: Prevention of Radicalization (6 chapters); Part III: Prevention of Preparatory Acts (7 chapters); Part IV: Prevention of, and Preparedness for, Terrorist Attacks  (10 chapters); Part V: Preparedness and Consequence Management (5 chapters

The International Centre for Counter-Terrorism – The Hague (ICCT) , 2020.1312p.

Homeland Threat Assessment 2025

By: Office of Intelligence and Analysis

The Homeland faces a complex set of threats to our public safety, border security, critical infrastructure, and economy from violent extremists, transnational criminal organizations (TCOs), adversarial nation-states, and malicious cyber actors. These threats, while varied in scope and intended purpose, at times compound one another in unexpected ways, harming our communities and generating costly disruptions to the US economy. Meanwhile, technological advances, climate change, and natural disasters have the potential to exacerbate many of the aforementioned threats.

PUBLIC SAFETY AND SECURITY: Over the next year, the terrorism threat environment in the Homeland will remain high. We are particularly concerned about a confluence of factors this year, including violent extremist responses to domestic sociopolitical developments—especially the 2024 election cycle—and international events that domestic and foreign violent extremists likely will use to justify or encourage attacks in the Homeland. Lone offenders and small groups continue to pose the greatest threat of carrying out attacks with little to no warning. Meanwhile, foreign terrorist organizations (FTOs) and their supporters will maintain their enduring intent to conduct or inspire attacks in the Homeland.

In addition, the production, trafficking, and sale of illegal drugs by transnational and domestic criminal actors will continue to pose the most lethal threat to communities in the United States. Fentanyl and other synthetic opioids remain the most lethal of drugs trafficked into the country, but small increases in overdoses linked to cocaine and methamphetamine highlight the danger from other drug types.

We expect the Homeland also will face threats to public safety from state actors using subversive tactics in an effort to influence and divide the American public and undermine confidence in our institutions. Many of these actors—in particular, the People’s Republic of China (PRC)—also target v U.S. Department of Homeland Security ethnic and religious minorities, political dissidents, and journalists in the United States to silence and harass critical voices, violating our sovereignty and the rule of law.

The 2024 election cycle will be an attractive target for many adversaries. Some domestic violent extremists (DVEs) likely view a wide range of targets indirectly and directly associated with elections as viable targets for violence with the intent of instilling fear among voters, candidates, and election workers, as well as disrupting election processes leading up to and after the November election. Nation-state-aligned foreign malign influence actors almost certainly will continue to target democratic processes with the aims of affecting US voter preferences, exacerbating social tensions, and undermining confidence in our democratic institutions and the integrity of the electoral process.

BORDER AND IMMIGRATION SECURITY: Migrant encounters at our border have declined over the last year, but migrants are still arriving in high numbers, complicating border and immigration security. As overall encounters have declined, so too have encounters with individuals in the Terrorist Screening Data Set, also known as the “terrorism watchlist,” which includes individuals associated with information indicating they may be directly engaged in or supporting terrorist activities as well as known associates of watchlisted individuals, such as family members. For several years prior to this year's decline, terrorism watchlist encounters had increased, a trend consistent with the overall increase in migrant encounters at the southwest border.

CRITICAL INFRASTRUCTURE SECURITY: Domestic and foreign adversaries almost certainly will continue to threaten the integrity of our critical infrastructure with disruptive and destructive cyber and physical attacks, in part, because they perceive targeting these sectors will have cascading impacts on US industries and our standard of living. The PRC, Russia, and Iran will remain the most pressing foreign threats to our critical infrastructure. Most concerningly, we expect the PRC to continue its efforts to pre-position on US networks for potential cyber attacks in the event of a conflict with the United States. Nation-states, criminal hacktivists, and financially motivated criminals will likely hone their techniques to disrupt US services or to conduct espionage focused on gaining access to US networks, including critical infrastructure entities. We assess that domestic and foreign violent extremists will continue to call for physical attacks on critical infrastructure in furtherance of their ideological goals and, at times, in response to international conflicts and crises.

ECONOMIC SECURITY: Multifaceted and diverse economic threats—primarily from the PRC—will likely continue to harm US producers and consumers and degrade the competitiveness and future health of US companies and industries. The PRC likely will remain our greatest economic security threat because of its aggressive use of anticompetitive, coercive policies and theft of US intellectual property, technology, and trade secrets. Lastly, we expect our supply chains will remain vulnerable to foreign manipulation abroad, which could harm global productivity and consumer demand.

U.S. Department of Homeland Security, 2024

Terrorism and the State: Intra-state Dynamics and the Response to Non-State Political Violence

MAY COTAIN MARKUP

By Kieran McConaghy

State Dynamics in Counter-Terrorism: The book challenges the view of the state as a unitary actor, emphasizing the importance of intra-state dynamics and the individual identities of state personnel in shapingcounter-terrorism responses.

Case Studies: It provides comparative analyses of Spain, France, and theUnited Kingdom, highlighting how state responses to terrorism are influenced by historical and cultural contexts.

Emotional and Political Impetus: The book discusses how emotional reactions and political motivations of state personnel impact counter-terrorism strategies, sometimes leading to actions driven by revenge or political gain.

Recommendations for Future Research: It suggests that future studies on counter-terrorism should consider the complexities of the state and the emotional and organizational factors that influence stateactions.

Springer, Aug 22, 2017, 182 pages

Understanding and Responding to the Terrorism Phenomenon: A Multi-Dimensional Perspective

MAY COTAIN MARKUP

Edited by Ozgur Nikbay & Suleyman Hancerli

Understanding TerrorismThis section delves into the psychological profiles of terrorists, theuse of the internet by terrorists, the potential threat of bioterrorism, and the socio-economic factors contributing to terrorism. It emphasizes the importance of education in combating terrorism and understanding the true motives behind terrorist acts.

Suicide Attacks, Radical Terrorism, and Case StudiesThis part examines the characteristics and motivations behind suicide attacks, the rise of radical Islam in post-Soviet states, and includes case studies of terrorist incidents. It also explores the financing of terrorism through narcoterrorism and the spatial patterns of terrorist incidents.

Strategies and Tactics for Dealing with Terrorist Hostage Sieges, Hijackings, andKidnappingsThis section discusses various strategies and tactics for handling terrorist hostage situations, including negotiation strategies, the psychological aspects of kidnappings, and the importance of proper training and preparation for law enforcement agencies.

Counter-Terrorism Policies: Lessons for the FutureThe final section explores different counter-terrorism policies and strategies, such as situational crime prevention, democratic policing, the role of intelligence in counter-terrorism, and the need for international cooperation. It emphasizes the importance of maintaining public trust and preventing the radicalization of individuals.

IOS Press, 2007, 431 pages