Open Access Publisher and Free Library
TERRORISM.jpeg

TERRORISM

Terrorism-Domestic-International-Radicalization-War-Weapons-Trafficking-Crime-Mass Shootings

Why We Went To War

By Newton D. Baker, Edited by Ciolin Heston

Newton Diehl Baker’s Why We Went to War, published in 1921, is one of the most important contemporary American explanations of the nation’s entry into the First World War. Baker, who served as Secretary of War from 1916 to 1921 under President Woodrow Wilson, occupied a unique position at the very center of America’s wartime transformation. Once known as a progressive mayor of Cleveland and a disciple of Wilsonian reform, Baker became, almost overnight, the chief administrator responsible for raising, training, and mobilizing an army that grew from a modest peacetime force into one of the most formidable fighting powers of the modern age. His book represents both a justification and a reflection—part political defense, part historical testimony—on why the United States took the fateful step of joining a conflict from which it had long sought to remain apart.

For modern readers, Why We Went to War should be approached both as a primary document and as an act of persuasion. Baker was not an impartial historian; he was a participant and advocate, a defender of Wilsonian ideals at a moment when those ideals were under attack. His words reveal not only the official reasoning of the Wilson administration but also the mindset of a generation of progressives who believed that the United States, through sacrifice and leadership, could help reorder the world toward democracy and peace.

In the end, Baker’s book is as much about America’s identity as about the Great War. It reflects a moment when the nation stood at the crossroads between its traditional reluctance to become entangled in European affairs and its emerging role as a world power. To understand why the United States entered World War I is to understand not only the international provocations of the time but also the ideals, anxieties, and ambitions of a nation coming of age on the world stage.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. p. 165.

download free
kindle $1.99 -- paperback $7.99
Nigeria’s Counter-Terrorism Strategy: Constructions of Threat, Response and Identity

By Kodili Henry Chukwuma

Offers a critical examination of Nigeria’s counter-terrorism policy as a political activity of identity construction

  • Draws upon archival material to offer a discursive analysis of Nigeria’s counter-terrorism strategy

  • Considers the construction of terrorist threat and identity considering specific colonial and post-colonial histories, realities and agency

  • Explores the official discourse on counter-terrorism as produced by Nigeria’s federal executive

  • Examines the productivity and effects of the official discourse

    This book critically engages with Nigeria's counter-terrorism strategy as a means of identity construction. Drawing on a wealth of archival materials, Kodili Chukwuma analyses how the federal government articulates and justifies its counter-terrorism policy against specific ‘terrorist’ groups such as Boko Haram in order to construct Nigeria's identity. He argues that the designation of particular terrorist threats as a new form of terrorism in Nigeria – and beyond – enables state counter-terrorism interventions. Revealing the complexities of Nigeria's counter-terrorist strategy, this book sheds new light on critical terrorism and critical security studies in a key postcolonial context.

    Edinburgh University Press, 2025. 216p.

link
From Jihad to Politics: How Syrian Jihadis Embraced Politics

By Drevon, Jerome

The Syrian regime unleashed unprecedented violence to suppress large-scale non-violent protests amid the Arab uprisings. Hundreds of armed groups formed throughout the country to defend the protesters and fight back. However, in contrast to other conflicts previously dominated by al-Qaeda and Islamic State, the two largest Syrian Jihadi groups, Ahrar al-Sham and then Jabhat al-Nusra, rejected global jihad and began to cultivate new ties with the population, other armed opposition groups, and even foreign states. This strategic shift is a response to the Jihadi paradox--a realization that while Jihadis excel at leading insurgencies, they fail to achieve political victories. In From Jihad to Politics, Jerome Drevon offers an examination of the Syrian armed opposition, tracing the emergence of Jihadi groups in the conflict, their dominance, and their political transformation. Drawing upon field research and interviews with Syrian insurgents in northwestern Syria and Turkey, Drevon demonstrates how the context of a local conflict can shape armed groups' behavior in unexpected ways. Further, he marshals unique evidence from the Arab world's most intense conflict to explain why the trajectory of the transnational Jihadi movement has altered course in recent years.

New York: Oxford University Press, 2024. 

link
Refugee Protection Crises and Transit Europe: Immediate Responses, Selective Memory, and the Self-Serving Politics of Diversity

By Sardelić, Julija

This open-access book presents a socio-legal analysis of immediate responses to large-scale refugee displacement in Europe after the 1951 Refugee Convention came into force, focusing on the countries to which refugees initially fled or through which they passed (namely Austria and, initially, Yugoslavia, followed by several of the former Yugoslav countries). First, it investigates the immediate responses to refugee movements following the suppression of the 1956 Hungarian Revolution by Soviet troops. Second, it examines the responses to individuals seeking asylum after being displaced during the post-Yugoslav wars of the 1990s. Third, it analyses the responses of the same countries to refugees fleeing Global South countries (predominantly Syria, Iraq, and Afghanistan) in 2015 and 2016. Finally, it explores how these countries responded to the mass displacement of refugees from Ukraine. The book argues that these countries have positioned themselves as “transit” or temporary protection countries in order to avoid assuming long-term responsibility for a larger number of refugees. As a consequence, they granted various forms of temporary legal status to refugees that differed from the refugee status defined in the 1951 Refugee Convention. These legal statuses were hierarchical (in terms of the rights attached to them) and racialized, with the fewest rights granted to refugees from the Global South and other negatively racialized groups. The book traces the usage of self-serving politics of diversity and selective memory to legitimise why refugees could not be protected long-term in these countries, and also why there were such differences in treatment of refugees.

Cham: Springer Nature, 2025.

link
Returning Nuance to Nostalgic Group Studies: Understanding White Supremacy as a Hegemonic Force

By Amy Cooter

A dominant analytical frame has emerged in extremism studies that attributes nearly all right wing, far right, or nostalgic group ideology1 and action to white supremacy. Some versions of this narrative further posit that these extremist groups intentionally and consciously effect white supremacy through a “cohesive social network based on commonly held beliefs,” a “white power movement.”2 However, these conceptions sometimes lack definitions of social movements, white supremacy, and other key concepts that are central to their arguments.3 This has led to over-generalizations about nostalgic group actors’ motives and goals in a way that downplays both the power of white supremacy as a hegemonic system and the specific harms caused by overtly supremacist actors. This paper clarifies a social science understanding of the key, but sometimes taken-for-granted, terms necessary for understanding these dynamics and demonstrates how faulty or unclear usage of this terminology leads to both analytical problems and the perpetuation of power structures that the field of extremism studies hopes to address. Specifically, I argue that improper conceptualization of white supremacy and related terms creates risks falling into three categories: analytic accuracy and predictive capacity, preventing near-term harm, and perpetuating white supremacy’s power structure and radicalization.

Monterey, CA: Center on Terrorism, Extremism and Counterterrorism, Middlebury Institute of International Studies. 2024. 29p.

download
Protecting Minors from Online Radicalisation in Indonesia

By Noor Huda Ismail and Putri Kusuma Amanda

The rise of JAD Nusantara, an ISIS-linked online network drawing in large numbers of minors, exposes serious gaps in Indonesia’s child protection systems. Vulnerable adolescents, often grappling with bullying, isolation, or absent parents, are being recruited without showing clear outward signs of radicalisation. In line with UN child rights standards, Indonesia must adopt an approach that prioritises rehabilitative, child-centred responses, safeguarding children’s rights while tackling the vulnerabilities and special needs that extremists exploit.

COMMENTARY
The case of a 12-year-old boy in Pemalang, Central Java, who joined the terrorist group JAD Nusantara, underscores a worrisome trend: radicalisation is increasingly happening entirely online, beyond parental or authority awareness. 

Social media platforms and messaging apps serve as conduits, enabling extremist content to reach vulnerable youth undetected. Research analyses show that extremism thrives on platforms that offer anonymity, rapid dissemination, and emotional appeal – qualities that make virtual spaces ideal for radical recruitment. 

Detecting online-driven radicalisation through traditional community surveillance is extremely difficult. Therefore, child protection systems need to adopt digital literacy and monitoring capabilities so that educators and social workers, not just security personnel, can recognize warning signs and intervene early.

A comprehensive society-wide strategy is needed – one that identifies young people at risk and engages them through pastoral, not punitive, channels.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 6p.

download
The Right Fit: How Active Club Propaganda Attracts Women to the Far-Right

By Robin O'Luanaigh, Hannah Ritchey and Frances Breidenstein

One image shows two young women sparring with each other, donning boxing gloves and athletic wear. A second image shows a young woman wrapping her hands and wrists, presumably preparing for a fight. On her arm is a tattoo of an Othala rune, a symbol common in neo-Nazi and white supremacist communities. 

These images, identified in online Active Club spaces, diverge from more traditional portrayals of women in right-wing extremist movements and communities. Instead of quaint cottagecore aesthetics and traditional ‘tradwives’ tending to the family and home, these images present women as activists, ideologues and warriors. While the Active Club network’s portrayals of women still promote traditional gender roles–especially within romantic relationships–the invocation of ‘warrior women’ tropes opens the door to a more palatable form of right-wing extremist activism – one that is less overtly misogynistic and ostensibly more ‘gender equal’. 

This Insight serves as a first look into the hypermasculine extremist spaces and communities of the Active Club network and how they co-opt and utilise images of women in their propaganda. We first introduce the Active Club network before reviewing existing literature on representations of women in right-wing extremist content. Next, we identify and discuss distinctly gendered tropes regarding the representation of women and couples in Active Club content. We conclude with a cautionary analysis of how such content can make Active Clubs and similar organisations palatable to women who may view these groups as gender-equal or empowering. 

Global Network on Extremism & Technology, 2023. 

download
Dangerous Organizations and Bad Actors: The Active Club Network

By Middlebury Institute of International Studies

Active Clubs make up a decentralized network of individually-formed organizations that are centered around the premise of a white supremacist fraternal brotherhood. First introduced in December of 2020 by Robert Rundo, the leader of the white supremacist Rise Above Movement (R.A.M), Active Clubs are intended to preserve and defend the white population and traditional European culture from a perceived global genocide by non-white ethnic and racial groups. 

Rundo was inspired to create the Active Club network—something he referred to as “white nationalism 3.0”—in response to the numerous arrests of R.A.M. members made in 2018. He wanted to create an organization that would be less perceptible to law enforcement, and thus less susceptible to disruption or destruction. From this, Active Clubs were born—small, decentralized organizations that would focus recruitment efforts on localized areas and thus garner less attention than traditional white nationalist organizations. This structure would also ensure that Active Clubs were not reliant on a particular physical entity or leadership figure for survival.

Active Clubs provide like-minded white men with physical spaces where they can train in mixed martial arts in preparation for war against their perceived enemies. Ideologically, Active Clubs adhere to neofascist and accelerationist principles, with the promotion of violence comprising a key theme in Active Club communication and propaganda. Located across the United States and in several countries transnationally, the Active Club network ensures that groups of men devoted to training for battle are available for mobilization in multiple locations across Western countries. 

Monterey, CA: Middlebury Institute of International Studies and Center on terrorism, Extremism, and Counterterrorism, 2024.

download
Veteran Perspectives on Extremist Exploitation of the Military: Sources and Solutions

 By Amy Cooter

There has been increasing attention to how military service members and veterans may be recruited or exploited by extremists, yet there is little research on precisely how this may happen or on how such ties may, in turn, influence military cohesion. It is important to emphasize that the vast majority of service members are not extremist, but a growing number of domestic extremists have military connections who may then have an outsized ability to enact harm, including by training others in military techniques. Given the potential for veterans’ knowledge and experiences to be exploited by extremist groups, understanding these connections is pressing. This paper shares findings from an in-depth interview study with 42 veterans from all military branches who collectively shed light on how extremism influences various aspects of military life from recruitment to readiness and who offer concrete steps the military could pursue at every stage of service to limit extremists’ exploitation of the institution and those who serve.

Monterey, CA: Center on Terrorism, Extremism, and Counterterrorism (CTEC) at the Middlebury Institute of International Studies 2025. 31p.

download
Active Clubs: The Growing Threat of ‘White Nationalism 3.0’ across the United States

By Ciarán O’Connor, Laurie Wood, Katherine Keneally and Kevin D. Reyes

The number of Active Clubs in the United States, Canada and Europe is increasing, posing a threat to public safety. Active Clubs (“ACs”) are white nationalist extremist groups that emphasize physical fitness and hand-to-hand combat skills and have a history of violence. Though each “club” is autonomous, the groups frequently engage in coordinated activities offline, such as mixed martial arts (MMA) tournaments, protests and physical training. In recent years, these clubs have used their social media profiles to encourage likeminded individuals to establish their own clubs in their respective locations. ISD’s research shows this strategy has been highly effective throughout the US.

This report identifies and analyzes the network of Active Clubs operating within the US along three themes: ideology, tactics and targets. The research predominately focuses on the use of the messaging platform Telegram by ACs, and includes detailed data analysis exploring how this network uses Telegram to produce and promote white nationalist propaganda, expand the network of clubs, and facilitate on- and offline collaboration between members and groups.

Amman | Berlin | London | Paris | Washington DC: Institute for Strategic Dialogue, 2023. 17p.

download
The “Chanification” of White Supremacist Extremism

By  Michael Miller Yoder,  David West Brown &  Kathleen M. Carley 

Much research has focused on the role of the alt-right in pushing far-right narratives into mainstream discourse. In this work, we focus on the alt-right’s effects on extremist narratives themselves. From 2012 to 2017, we find a rise in alt-right, 4chan-like discourse styles across multiple communication platforms known for white supremacist extremism, such as Stormfront. This discourse style incorporates inflammatory insults, irreverent comments, and talk about memes and online “chan” culture itself. A network analysis of one far-right extremist platform suggests that central users adopt and spread this alt-right style. This analysis has implications for understanding influence and change in online white supremacist extremism, as well as the role of style in white supremacist communications. Warning: This paper contains examples of hateful and offensive language.

Comput Math Organ Theory Volume 31, pages 222–235, (2025)

download
Discord and the Pentagon's Watchdog: Countering Extremism in the U.S. Military

By Amy C. Gaudion

In his 2022 book, Ward Farnsworth crafts a metaphor from the lead-pipe theory for the fall of Rome to consider how rage and misinformation traveling through today’s technology-enabled pipes are poisoning our civic engagement and threatening our governmental structures: “We have built networks for the delivery of information––the internet, and especially social media. These networks too, are a marvel. But they also carry a kind of poison with them. The mind fed from those sources learns to subsist happily on quick reactions, easy certainties, one-liners, and rage.” This Article carries the metaphor into a new context and considers what should be done when the poison being transported through the digital pipes is directed at members of the U.S. military. While extremism in the U.S. military is not a new threat, the events of January 6, 2021, brought the threat into much sharper focus. It exposed three preexisting trends, each sitting in plain sight but not yet woven together. These trends include a growing acceptance of extremist views and ideologies in U.S. military and veteran communities, an increase in violent extremist acts committed by individuals with military backgrounds, and the enhanced use of digital platforms by extremist groups to target their messaging to and strengthen their recruitment of individuals with military experience. To return to the metaphor, the extremist poison is teeming through the pipes at an alarming rate, and the number of pipes has increased to include social media platforms, encrypted chat tools, gaming platforms, podcasts, and music streaming apps, including YouTube, Discord, Gab, Telegram, and WhatsApp, among many others. In offering these observations, the author is mindful of not overstating the threat and takes seriously warnings as to the adverse consequences that follow from hyperbole and exaggeration. Indeed, a fundamental difficulty is the lack of understanding as to scope and scale of the extremism threat in the U.S. military. This Article attempts to draw the contours of that threat, exposes the structural and legal obstacles that make countering extremism in the military such a fraught exercise, and identifies actors, tools, and mechanisms—beyond the conventional options––able to overcome these long-standing structural and institutional obstacles.

Indiana Law Journal | Vol. 100:1743 | 2025, Penn State Dickinson Law Research Paper 10-2025

download
The enduring shadow of extremism: tackling radicalisation in the Bangladeshi diaspora

By Iftekharul Bashar

The recent arrests in Malaysia confirm that radicalisation within the Bangladeshi diaspora is a significant and evolving threat. This problem stems from socioeconomic factors, homeland instability, and online recruitment. A transparent, collaborative, and multi-faceted P/CVE (Preventing and Countering Violent Extremism) approach is essential to mitigate the risk.

COMMENTARY

Malaysian authorities recently arrested 36 Bangladeshi citizens in Selangor and Johor for their involvement in a radical militant movement promoting Islamic State (IS) ideology. Home Minister Datuk Seri Saifuddin Nasution Ismail reported that these individuals were forming recruitment cells, fundraising for terrorism, and plotting to overthrow the Bangladesh government.

Notably, the network, as detailed by police, raised funds using international fund transfer services and e-wallets, directing money to the IS group in Syria and Bangladesh. This method highlights a growing trend in terrorist financing, leveraging the speed, lower costs, and often less stringent oversight of digital platforms and cross-border money movement to facilitate illicit financial flows globally.

Of those arrested, five have been charged with terrorism-related offences, 15 face deportation, and 16 remain under investigation, with the police anticipating further arrests. Malaysian authorities estimate that 100 to 150 individuals are suspected to be involved in this network, demonstrating the scale of the threat they are actively dismantling.

These arrests are a stark reminder that the threat of extremism continues to cast a long shadow, not just within Bangladesh’s national borders but also across diaspora communities. The arrest of the 36 nationals is not an isolated incident. There have been previous cases of radicalisation of Bangladeshis in Malaysia.

In May 2019, a 28-year-old Bangladeshi mechanic was arrested in Kuala Kedah; he had possessed the necessary chemicals and expertise to produce improvised explosive devices (IEDs). Earlier in January 2017, two Bangladeshi salesmen, aged 27 and 28, were arrested in Kuala Lumpur, reportedly for having ties with suspected IS militants in Bangladesh and for planning to join a terror cell in the southern Philippines.

Singapore, among other nations, has also experienced similar cases in the past, notably in 2015, 2016, and 2020, highlighting a recurring pattern of Bangladeshi diaspora members being targeted and recruited by terrorist networks, including the Islamic State.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 6p.

download
Banditry violence in Nigeria’s North West: insights from affected communities

By Johanna Kleffmann, Swetha Ramachandran, Noah Cohen, Siobhan O'Neil, Mohammed Bukar, Francesca Batault, Kato Van Broeckhoven,

Key Findings • The labelling of banditry as “organized crime,” “unknown gunmen,” or, more lately, “terrorists” has distorted this multi-faceted and still poorly understood phenomenon. Likewise, some of the frames that have been applied to banditry – particularly the farmer/herder conflict or Hausa/Fulani tensions – do not appear to fully align with local communities’ understandings of today’s evolution of banditry. Simplistic categorization and narrow lenses for understanding banditry may contribute to inappropriate or insufficient policy and programmatic responses. MEAC’s survey unearths some of the lived experiences with bandits and sheds light on the nuances of the phenomenon and its profound impact on communities. • Community perceptions of bandit groups corroborate earlier research depicting them as comprised of largely distinct, organized groups, albeit with shifting configurations and subject to fragmentation. Bandit groups operate in highly mobile, armed, and largely forestbased units that use quick-strike attacks on motorbikes against communities. Their motivations are primarily perceived as economic/financial by victims, including the notable subsection of the sample of Fulanis who have been victimized by bandits. • For the surveyed communities, weapons are the most recognizable feature of bandit groups. This bears critical implications for the potential for escalation of violence, further proliferation of illicit arms and ammunition including in the neighbouring regions, community violence reduction efforts and future DDR programming. • Victimisation experiences differ considerably with gender, age, and location in the North West. While physical violence and killings disproportionately affect adult men, sexual violence appears to especially affect women and girls (although it likely remains underreported). Variations of victimization across states indicate the volatile and dynamic nature of overall banditry presence and violence. • Banditry violence has profound and pervasive effects on the physical safety, access to income-generating activities, education, and mobility of residents in the northwestern communities surveyed. The perceived intensity and frequency of attacks are on the rise, with one in three respondents reporting experiencing weekly attacks in recent years. Close to two-thirds of respondents have family members who have been attacked by bandits.

Findings Report 36,

Geneva, The United Nations Institute for Disarmament Research ., UNIDIR, 2024,43p.

download
The Islamic State in Afghanistan: A Jihadist Threat in Retreat?

By The International Crisis Group

What’s new? Since the Taliban takeover of Afghanistan in 2021, the Islamic State-Khorasan Province (IS-KP) has emerged as a major international security threat, orchestrating or inspiring attacks abroad following a Taliban clampdown on its home turf. Although its strikes have fallen in number in 2025, its offensive could resurge. Why does it matter? Despite the recent lull, IS-KP might reactivate commanders willing to carry out attacks abroad or coordinate with other ISIS branches to launch them. Even a small number of highprofile operations – such as the March 2024 mass shooting and arson in Moscow – can cause numerous deaths and have major international repercussions. What should be done? Coordination among security services has improved, particularly in intelligence sharing and rendition. There are strong reasons not to resort to military action, but more could be done in terms of collaborating with the Taliban and Syrian governments, redefining the global anti-ISIS coalition’s law enforcement role, and supporting Central Asian countries.

Crisis Group Asia Briefing N°183

Brussels: International Crisis Group, 2025. 28p.

download
Criminal Justice Interventions for Preventing Radicalisation, Violent Extremism and Terrorism: An Evidence and Gap Map

By Michelle Sydes | Lorelei Hine | Angela Higginson4 | James McEwan | Laura Dugan | Lorraine Mazerolle3

Background: Criminal justice agencies are well positioned to help prevent the radicalisation of individuals and groups, stop those radicalised from engaging in violence, and reduce the likelihood of terrorist attacks. This Evidence and Gap Map (EGM) presents the existing evidence and gaps in the evaluation research. Objectives: To identify the existing evidence that considers the effectiveness of criminal justice interventions in preventing radicalisation, violent extremism and terrorism. Search Methods: We conducted a comprehensive search of the academic and grey literature to locate relevant studies for the EGM. Our search locations included the Global Policing Database (GPD), eight electronic platforms encompassing over 20 academic databases, five trial registries and over 30 government and non‐ government websites. The systematic search was carried out between 8 June 2022 and 1 August 2022. Selection Criteria: We captured criminal justice interventions published between January 2002 and December 2021 that aimed to prevent radicalisation, violent extremism, and/or terrorism. Criminal justice agencies were broadly defined to include police, courts, and corrections (both custodial and community). Eligible populations included criminal justice practitioners, places, communities or family members, victims, or individuals/groups who are radicalised or at risk of becoming radicalised. Our map includes systematic reviews, randomised controlled trials, and strong quasi‐experimental studies. We placed no limits on study outcomes, language, or geographic location. Data Collection and Analysis: Our screening approach differed slightly for the different sources, but all documents were assessed in the systematic review software program DistillerSR on the same final eligibility criteria. Once included, we extracted information from studies using a standardised form that allowed us to collect key data for our EGM. Eligible systematic reviews were assessed for risk of bias using the AMSTAR 2 critical appraisal tool. Main Results: The systematic search identified 63,763 unique records. After screening, there were 70 studies eligible for the EGM (from 71 documents), of which two were systematic reviews (assessed as moderate quality), 16 were randomised controlled trials, and 52 were strong quasi‐experimental studies. The majority of studies (n = 58) reported on policing interventions. Limited evidence was found related to courts or corrections interventions. The impact of these interventions was measured by a wide variety of outcomes (n = 50). These measures were thematically grouped under nine broad categories including (1) terrorism, (2) extremism or radicalisation, (3) non‐terror related crime and recidivism, (4) citizen perceptions/intentions toward the criminal justice system and government, (5) psychosocial, (6) criminal justice practitioner behaviours/attitudes/ beliefs, (7) racially targeted criminal justice practices, (8) investigation efficacy, and (9) organisational factors. The most commonly assessed outcomes included measures of terrorism, investigation efficacy, and organisational factors. Very limited research assessed intervention effectiveness against measures of extremism and/or radicalisation. Authors’ Conclusions: Conducting high‐quality evaluation research on rare and hidden problems presents a challenge for criminal justice research. The map reveals a number of significant gaps in studies evaluating criminal justice responses to terrorism and radicalisation. We conclude that future research should focus attention on studies that consolidate sound measurement of terrorism‐related outcomes to better capture the potential benefits and harms of counter‐terrorism programs, policies and practices which involve criminal justice agencies.

Campbell Systematic Reviews, 19(4). 2023. 53p.

download
The Use of Artificial Intelligence in Countering Online Radicalisation in Indonesia

By Raneeta Mutiara

Digitalisation of the activities of Islamic State in Iraq and Syria (ISIS) has been a longstanding issue in Southeast Asia. In recent years, the nature of this threat has become more widespread and complex. In countries like Indonesia, where radicalisation is primarily offline, online platforms still play a role in spreading extremist ideas and maintaining ideological networks. The phenomenon of online radicalisation can erode social cohesion, highlighting the need for strategic measures to counter its destabilising impact.

Indonesia has made several attempts to combat online radicalisation. The National Counter Terrorism Agency of Indonesia (BNPT) initiated the Duta Damai Dunia Maya campaign to counter harmful content on the Internet. Other online initiatives, such as BincangSyariah and Islamidotco, have also been promoting Islamic literacy, moderating religious interpretations, and correcting misleading narratives.

Nevertheless, Indonesia still encounters online radicalisation cases. In July 2024, Indonesia’s elite counterterrorism unit, Densus 88, detained a 19-year-old student who had expressed allegiance to ISIS through social media and was believed to be planning attacks on religious sites before he was caught.

The swift progress of Artificial Intelligence (AI), especially in areas of machine learning (ML) and natural language processing (NLP), presents both opportunities and challenges in combating online radicalisation in Indonesia. AI, generally defined as machines mimicking human intelligence, enables systems to recognise patterns, analyse content, and produce outputs in text, images, and videos. Within this AI landscape, ML allows models to enhance themselves through data, while NLP, as a specific ML application, deals with understanding and generating human language. These advancements provide possibilities for creating early detection systems, content moderation tools, and sentiment analysis tools that can spot and counter extremist messages online.

For the research, the author conducted interviews with fifteen experts across different fields, including law enforcement officers, academics, representatives from civil society organisations (CSOs), and employees of AI start-ups in Indonesia. The qualitative data collected from this process have been analysed through thematic analysis, and the preliminary findings reveal that AI can indeed complement the conventional CVE (countering violent extremism) methods in the country, albeit not without challenges

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 6p.

download
Rethinking Religion and Radicalization: Terrorism and Violence Twenty Years After 9/11

Edited by Michele Grossman

With contributions from a range of regions and disciplines, this open access volume offers theoretically compelling and empirically rich new insights on the relationship between religion and violent extremism. The role of religion and religiosity in processes of radicalisation to violence has been at the forefront of debates around terrorism and extremism for decades. The events of 9/11 gave new impetus to these debates, cementing assumptions about the role of Islam as the key driver for religiously inspired violent radicalisation, and defining the way in which radicalisation to violence is understood. The years since 9/11 have seen a striking diversification in the terrorist and violent extremist landscape, yet the treatment of how religious beliefs, concepts and histories are entangled with established and emergent violent ideologies and social movements has changed far less. By looking beyond Islamist-inspired or attributed terrorism, this volume explores how violent extremists instrumentalise religion and religiosity in unexpected ways, from Orthodox Christianity and Hindutva to ‘conspirituality’, far-right extremism, and single-issue social movements. The eBook editions of this book are available open access under a CC BY-NC-ND 4.0 licence on bloomsburycollections.com

London: Bloomsbury Academic, 2025. 312p.

download
The Terrorism News Beat: Professionalism, Profit, and the Press

By Aaron M. Hoffman

Critics of terrorism news coverage often describe it as a sensationalized and intimidating area of reporting. However, this characterization offers a misleading guide to the coverage of terrorist threats and attacks, counterterrorism, and community responses to terrorism that appears in U.S. newspapers. Counterterrorism—not terrorist threats or attacks—is the most reported-on subject in newspapers such as the New York Times and Wall Street Journal. Rather than focusing on accounts of terrorist attacks, militarized counterterrorism, or counterterrorism failures, journalists more often cover counterterrorism successes, criminal justice, and diplomatic or community responses to terrorism. The Terrorism News Beat engages thinking about terrorism and the news media from the fields of political science, communication, criminology, economics, and sociology using multimethod research involving more than 2,500 newspaper articles published between 1997 and 2018. Chapters analyze the terrorism news beat’s subject matter, language, and coverage of the Oklahoma City Bombing, Olympic Park bombing, 9/11 attacks, DC Sniper case, and Dallas Police shooting. When it comes to language use, Hoffman finds that, rather than giving into the temptation to convey the news in lurid detail, journalists are minimalists. The language used to depict events on the terrorism beat is typically moderate and extreme words like “torture” appear only as necessary. The Terrorism News Beat shows that contrary to claims of sensationalism, the tone of terrorism coverage becomes even more sober during terrorism crises than it is during non-crisis periods and meets journalistic standards for quality.

Ann Arbor: University of Michigan Press, 2025. 255p.

download
The Chronicle Of The Discovery And Conquest Of Guinea: Volumes 1 & 2

By Gomes Eannes De Azurara (Author), Colin Heston (Editor), Raymond Beazley (Translator)

The Chronicle of the Discovery and Conquest of Guinea is one of the most important early historical sources on the European Age of Discovery. Written in the mid-fifteenth century by Gomes Eannes de Zurara, the royal chronicler of Portugal, the work offers a detailed and vivid narrative of Prince Henry the Navigator’s sponsorship of voyages along the West African coast. Zurara’s chronicle records the systematic exploration of the Atlantic islands and the African shoreline, the capture and enslavement of Africans, and the establishment of the Portuguese presence south of Cape Bojador — a turning point that opened the way for European maritime expansion.

This English edition, translated and edited by historian Charles Raymond Beazley and lusitanist Edgar Prestage for the Hakluyt Society (published 1896–1899), makes Zurara’s text accessible to a modern audience. Their careful translation preserves the rich detail of the original, while their scholarly introduction and notes provide historical context about fifteenth-century Portugal, Prince Henry’s motives, and the wider significance of these early voyages.

Part narrative history, part celebration of Portuguese royal ambition, the chronicle reveals both the triumphs and moral ambiguities of the early encounters between Europe and Africa. It remains an essential source for historians of maritime exploration, Atlantic slavery, and global contact in the late Middle Ages.
This version has been carefully edited, removing unnecessary endnotes, footnotes and other distracting content that distract from a pleasant reading experience.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. 267p.

download free
kindle $2.99 -- paperback $9.99