Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Catch 22: Institutional Ethics and Researcher Welfare Within Online Extremism and Terrorism Research

ByJoe Whittaker, Elizabeth Pearson, Ashley A Mattheis, Till Baaken, Sara Zeiger, Farangiz Atamuradova, Maura Conway

Drawing from interviews with 39 online extremism and terrorism researchers, this article provides an empirical analysis of these researchers’ experiences with institutional ethics processes. Discussed are the harms that these researchers face in the course of their work, including trolling, doxing, and mental and emotional trauma arising from exposure to terrorist content, which highlight the need for an emphasis on researcher welfare. We find that researcher welfare is a neglected aspect of ethics review processes however, with most interviewees not required to gain ethics approval for their research resulting in very little attention to researcher welfare issues. Interviewees were frustrated with ethics processes, indicating that committees oftentimes lacked the requisite knowledge to make informed ethical decisions. Highlighted by interviewees too was a concern that greater emphasis on researcher welfare could result in blockages to their ‘risky’ research, creating a ‘Catch 22’: interviewees would like more emphasis on their (and colleagues’) welfare and provision of concomitant supports, but feel that increased oversight would make gaining ethics approval for their research more difficult, or even impossible. We offer suggestions for breaking the impasse, including more interactions between ethics committees and researchers; development of tailored guidelines; and more case studies reflecting on ethics processes.

New Media & Society Online First, February 28, 2025

The Lone Wolf Threat Posed by Former JI Members

By Irfan Idris and Kusumasari Ayuningtyas

The ideological influence of Jemaah Islamiyah continues to be a threat to security even after its disbandment in June 2024. Some of its former members may align with other extremist groups, while others may seek to operate as lone-wolf terrorists. The possibility of JI’s former members transitioning into lone wolf actors stems from the enduring power of its ideology and indoctrination process.

S. Rajaratnam School of International Studies, NTU Singapore, 2025, 3p.

Reclaiming Asabiya to Counter Extremism and Foster Unity

By Noor Huda Ismail

The concept of asabiyya – group solidarity – originally articulated by Ibn Khaldun, has been hijacked by extremist groups in Southeast Asia to create division and promote radical ideologies. Reclaiming asabiya is crucial, redefining it as a tool for social cohesion and unity by drawing on cultural values that foster mutual respect and collective responsibility. Regional cooperation and digital counter-narratives are essential in countering extremism and fostering long-term peace in the region.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 4p.

Understanding EU Counter-Terrorism Policy

By Piotr Bąkowski


Faced with a persistent terrorist threat, the European Union (EU) is playing an increasingly ambitious role in counter-terrorism. While primary responsibility for combating crime and ensuring security lies with the Member States, the EU provides cooperation, coordination and (to some extent) harmonisation, as well as financial support, to address this borderless phenomenon. Moreover, awareness of the connection between development and stability, as well as between internal and external security, has come to shape EU action beyond Union borders. EU spending on counter-terrorism has increased over the years, to allow for better cooperation between national law enforcement authorities and enhanced support by the EU bodies in charge of security and justice, such as Europol, eu-LISA and Eurojust. The many new rules and instruments that have been adopted in recent years focus, among other things, on harmonising definitions of terrorist offences and sanctions, sharing information and data, protecting borders, countering terrorist financing and regulating firearms. However, implementing and evaluating the various measures is a challenging task. The European Parliament has played an active role not only in shaping legislation, but also in evaluating existing tools and gaps through the work accomplished by its Special Committee on Terrorism (TERR) in 2018. In line with the Parliament's recommendations, as well as the priorities set by the European Commission and its counter-terrorism agenda presented in December 2020, EU counter-terrorism action has focused on doing more to anticipate threats, counter radicalisation, and reduce vulnerabilities by making critical infrastructures more resilient and improving the protection of public spaces. The EU will also continue to address the online dimension of various forms of extremism, in line with the regulations on dissemination of terrorist content online and on the provision of digital services in the EU. This briefing updates an earlier one, entitled Understanding EU counter-terrorism policy, published in 2023.


Brussels: EPRS | European Parliamentary Research Service, 2025. 12p.

Disinformation and Cognitive Warfare

By Alana Ford

An examination of the threat of disinformation and cognitive warfare in the Indo-Pacific, the brief unpacks how these tactics are reshaping national security and undermining democratic institutions. Drawing on global examples, it highlights the implications for regional stability and democratic resilience.

The briefing paper outlines Australia’s multipronged approach, including legislative reforms, international partnerships, and public education efforts, offering practical insights to counter these evolving security threats and safeguard democratic values across the Indo-Pacific.

Key messages

Disinformation and cognitive warfare are evolving security threats that undermine democratic institutions, polarise societies, and manipulate public trust at a global scale.

The digital revolution has amplified the speed, precision, and scale of disinformation campaigns.

Russia’s invasion of Ukraine demonstrates how cognitive warfare is deployed to legitimize unlawful acts of aggression and manipulate international narratives.

Democracies in the Indo-Pacific, including Australia, face heightened risks of disinformation and cognitive warfare due to their open information environments and the region’s complex geopolitical dynamics.

Effective countermeasures require coordinated domestic and international efforts, leveraging regulation and multilateral partnerships like AUKUS and the Quad.

Australia: Perth USAsia Centre, 2025.

Jihadist Terrorism in the United States: What the Data Tell Us

By Alexander Palmer, Skyeler Jackson, and Daniel Byman

Despite the recent attack in New Orleans, longer-term trends suggest that jihadist terrorism in the United States is not resurgent. The number of jihadist plots and attacks in the United States has been low since the territorial defeat of ISIS. The average lethality of jihadist terrorist attacks has also fallen since the peak of the caliphate. International groups such as the Islamic State and al Qaeda have filled more of an inspirational role rather than directly orchestrating attacks on the United States. Although formal links between attackers and plotters in the United States appear to be rare, this has not prevented individuals from carrying out lethal “lone wolf” attacks. Overall, jihadist terrorism in the United States does not merit additional resources at this time; however, international terrorism organizations continue to merit counterterrorism efforts.

Washington, DC: The Center for Strategic and International Studies (CSIS) , 2025. 12p.

The Rise of Radicalism in Bangladesh: What Needs to Be Done

By Iftekharul Bashar

In 2024, Bangladesh faces a growing threat of radicalism fuelled by political instability, security vacuums, and weakened counterterrorism infrastructure. Unless the interim government adopts a zero-tolerance policy and strengthens law enforcement and intelligence efforts, extremist groups may gain further ground, leading to long-term instability. COMMENTARY Bangladesh is facing an increasing threat of radicalism and terrorism. The political violence and instability of 2024 have worsened the situation, with extremist elements exploiting the security vacuum created by the regime change. Weakened law enforcement and intelligence agencies, along with the rise of armed groups and radical ideologies, pose a serious threat to the country’s stability. Bangladesh risks long-term insecurity with broader regional implications without swift and decisive action.

Singapore: S. Rajaratnam School of International Studies (RSIS), NTU , 2024. 4p.

Coping with Complexity: Dealing with Non-State Armed Actors

By Yannick Deepen and Sabine Kurtenbach

Non-state armed actors (NSAAs) come in a variety of shapes and sizes, including warlordled groups, insurgencies, militias, and organised-crime syndicates to name just the most prominent examples hereof. In war or lower-level armed conflict, as well as violence-prone contexts, these groups pose acute problems for peacebuilding, democratic governance, and sustainable development. They control resources and territories, as well as compete, cooperate, or align with political and economic elites both within and beyond the state to promote the unstable status quo that serves their interests. Various challenges arise when dealing with NSAAs. Prevailing strategies vary between repression, co-optation, and submission to the rule of law. This analysis maps cross-regional trends regarding NSAAs based on available datasets. On this basis we develop a typology for NSAAs and a conceptual frame for their transformation. We then apply this to three paradigmatic case studies – Colombia, Mali, the Philippines – and formulate recommendations for the designing of improved strategies vis-à-vis development cooperation and other external actors.

GIGA Working Papers, No. 337,

How ISIS Fights: Military Tactics in Iraq, Syria, Libya and Egypt

By Omar Ashour

How did ISIS – a widely hated, massively outnumbered and ludicrously outgunned organisation – manage to occupy over 120 cities, towns and villages from the Southern Philippines to Western Libya? Seeking to understand ISIS’s combat effectiveness, Omar Ashour analyses the military and tactical innovations of ISIS and their predecessors in Iraq, Syria, Libya and Egypt. He shows how their capacity to mix conventional military tactics with innovative guerrilla warfare and urban terrorism strategies allowed ISIS to expand and endure beyond expectations.

Edinburgh: Edinburgh University Press, 2021.

Staunching The Rise of Terrorist Fighters

By Rohan Gunaratna

The conflicts in Israel, Gaza, Lebanon, Yemen and Syria will have a generational impact. The 7 October 2023 attack against Israel in Gaza and its consequences have set back the prospects of a two-state solution to the Palestinian issue and may attract a new wave of foreign fighters to embark on terrorist activities like what was seen following the military debacles in Afghanistan, Iraq and Syria. What can be done to stem another rise of the terrorist fighters?

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 3p.

Urban Terrorism in Contemporary Europe: Remembering, Imagining and Anticipating Violence

Edited by Katharina Karcher, Yordanka Dimcheva ,· Mireya Toribio Medina. Mia Parkes

This open access book sheds light on collective practices of remembering, imagining and anticipating in relation to recent acts of urban terrorism in Europe. Analysing a range of personal and collective responses to urban terrorism in contemporary Europe, this book shows that current debates on this issue are shaped by multiple co-existing and intersecting memories of political violence in the past. Moreover, despite public declarations of unity and solidarity, collective memories of urban terror in contemporary Europe are far from consensual - memory can be both a catalyst for and an impediment to social and political change. Drawing on case studies from a range of European countries and creative responses by survivors, artists, and poets, this interdisciplinary volume introduces readers to key methods (e.g. discourse analysis and (auto-)ethnography) and concepts (e.g. Lieux de Mémoire and ‘grassroots memorials’) for the study of the memorialization of terror attacks.

Cham: Palgrave Macmillan, 2024. 317p.

Profiles of Individual Radicalization in the United States (PIRUS)

By Michael Jensen, Sheehan Kane, and Elena Akers

Profiles of Individual Radicalization in the United States (PIRUS) is a database of 3,203 Islamist, far-left, far-right, and single-issue extremists who have radicalized to violent and non-violent extremism in the United States from 1948 through 2021. This update adds 955 subjects to the database who were charged with committing extremist crimes in the United States from 2019-2021.1 The database is freely available for download on START’s webpage at https://www.start.umd.edu/profiles-individual-radicalization-united-states-pirus-keshif. The analysis for this research brief draws on the full dataset and illustrates the important differences that exist across ideological groups and highlights recent trends in the data.

College Park, MD: START , 2023. 10p.

Profiles of Individual Radicalization in the United States (PIRUS): Mass Casualty Extremist Offenders

By Michael Jensen, Sheehan Kane, and Elena Akers

Included with the current update to the Profiles of Individual Radicalization in the United States (PIRUS) data are a suite of variables that allow users to investigate extremist offenders who plotted to commit, or committed, mass casualty attacks in the United States from 1990-2021. A mass casualty plot is defined as an event in which the perpetrator(s) intended to kill or injure four or more victims. Unlike other data resources on mass casualty events, PIRUS allows users to investigate successful mass casualty attacks as well as unsuccessful plots where the perpetrators clearly intended to kill or injure four or more people but failed. The inclusion of failed and foiled mass casualty plots in PIRUS gives users a more accurate estimate of how often extremists plan to cause significant harm. It also allows users to compare ideological groups and offenders on measures of plot success. This research brief provides an overview of the mass casualty crimes in PIRUS, including their frequency, links to ideological and sub-ideological groups, and a comparison of their perpetrators.

College Park, MD: START (March). 2023, 4p.

Global Terrorism Threat Forecast 2025

By Rohan Gunaratna

SYNOPSIS As we enter the new year, armed conflicts continue to rage across the globe, destabilising nations, regions, and even the global order. Terrorist attacks and state responses create ripple effects, which not only shape the battlefields but redefine states, fragment societies, and radicalise communities. What does the terrorism threat landscape look like in 2025?

COMMENTARY Global terrorism will remain a persistent and pervasive threat to the stability and peace of the world. The Islamic State, Al Qaeda, and Iran-sponsored Shiite and Sunni militia have exacerbated instability around the globe, while geopolitical competitions have polarised and fragmented the community of nations. Unless governments work together to mitigate common security challenges, threat actors will exploit the gaps, loopholes, and weaknesses in global security systems. All nations need to be steadfast in preventing and preempting threats from taking root and facing up to threats from state and non-state actors including lone wolf attackers. In addition to disinformation operations, threat actors will attack information infrastructure. Nations will need to secure the online domain as hostile states increase their cyberattacks, sabotage infrastructure, assassinate public officials, and engage in espionage.

S. Rajaratnam School of International Studies, NTU Singapore 2025. 5p.

Risk and Protective Factors Associated With Support of Violent Radicalization: Variations by Geographic Location

By Heidi Ellis , Alisa B. Miller , Georgios Sideridis , Rochelle Frounfelker , Diana Miconi , Saida Abdi , Farah Aw-Osman and Cecile Rousseau

Objectives: We examine the association between perceived discrimination, mental health, social support, and support for violent radicalization (VR) in young adults from three locations across two countries: Montréal and Toronto, Canada, and Boston, United States. A secondary goal is to test the moderating role of location. Methods: A total of 791 young adults between the ages of 18 and 30, drawn from the Somali Youth longitudinal study and a Canada-based study of college students, participated in the study. We used multivariate linear regression to assess the association between scores on the Radical Intentions Scale (RIS) with demographic characteristics, anxiety, depression, social support, and discrimination. Results: In the full sample, discrimination, age, and gender were associated with RIS scores. When we examined moderation effects by location, RIS scores were associated with depression only in Montréal, and with social support (negatively) and discrimination in Toronto. None of the variables were significant in Boston. Conclusion: These findings suggest that an understanding of risk and protective factors for support of VR may be context-dependent. Further research should take into consideration local/regional differences

International Journal of Public Health published: 29 March 2021, 10 p.

Cognitive and Behavioral Radicalization: A Systematic Review of the Putative Risk and Protective Factors

By Michael Wolfowicz, Yael Litmanovitz, David Weisburd, and Badi Hasisi

Abstract Background: Two of the most central questions in radicalization research are, (1)why do some individuals radicalize when most of those from the same groups or exposed to similar conditions do not? and (2) why do radicalized individuals turn to radical violence while the majority remain inert? It has been suggested that the answer to both questions lie in the cumulative and interactive effects of a range of risk factors. While risk assessment and counter‐radicalization take a risk‐protectivefactor approach, there is widespread debate as to what these factors are and which are most important.Objectives: This review has two primary objectives.1) To identify what the putative risk and protective factors for different radica-lization outcomes are, without any predeterminations.2) To synthesize the evidence and identify the relative magnitude of the effects of different factors.The review's secondary objectives are to:1) Identify consistencies in the estimates of factors across different radicalizationoutcomes.2) Identify whether any significant heterogeneity exists within factors between(a) geographic regions, and (b) strains of radicalizing ideologies.Search Methods: Over 20 databases were searched for both published and gray literature. In order to provide a more comprehensive review, supplementary sear-ches were conducted in two German and one Dutch database. Reference harvesting was conducted from previous reviews and contact was made with leading researchers to identify and acquire missing or unpublished studies.Selection Criteria: The review included observational studies assessing the out-comes of radical attitudes, intentions, and/or radical behaviors in OECD countries and which provided sufficient data to calculate effect sizes for individual‐level risk and protective factors.Data Collection and Analysis: One‐hundred and twenty‐seven studies, containing 206 samples met the inclusion criteria and provided 1302 effect sizes pertaining to over 100 different factors. Random effects meta‐analyses were carried out for each factor, and meta‐regression and moderator analysis were used to explore differ-ences across studies.Results: Studies were primarily cross‐sectional, with samples representing 20 OECD countries. Most studies examined no specific radicalizing ideology, while others focussed on specific ideologies (e.g., Islamist, right‐wing, and left‐wing ideologies). The studies generally demonstrated low risk of bias and utilized validated or widely acceptable measures for both indicators and outcomes.With some exceptions, sociodemographic factors tend to have the smallest estimates, with larger estimates for experiential and attitudinal factors, followed by traditional criminogenic and psychological factors.Authors' Conclusions: While sociodemographic factors are the most commonly examined factors (selective availability), they also tend to have the smallest es-timates. So too, attitudinal and even experiential factors, do not have effect sizes of the magnitude that could lead to significant reductions in risk through tar-geting by interventions. Conversely, traditional criminogenic factors, as well as psychological factors tend to display the largest estimates. These findings suggest the need to broaden the scope of factors considered in both risk assessment and intervention, and this review provides much needed evidence for guiding the selection of factors

Campbell Systematic Reviews: Volume 17, Issue 3 September 2021, 90 p.

European Union Terrorism Situation and Trend Report: 2024

By Europol

  The European Union Terrorism Situation and Trend Report (EU TE-SAT) 2024 is a situational overview, presenting figures, major developments and trends in the terrorism landscape in the EU in 2023. The report is based on qualitative and quantitative data provided by the Member States on terrorist attacks, arrests and convictions and penalties for terrorist offences. Additionally, Europol’s cooperation partners provided valuable qualitative information and assessments, to facilitate reflection on developments beyond the EU that affect the security of the Union and its citizens. Information on convictions and acquittals for terrorist offences, as well as on amendments to national legislation on terrorism provided by Eurojust and based on data shared by Member States, complements the report. According to EU Directive (EU) 2017/541 on combating terrorism , which Member States had an obligation to transpose into their national legislation by 8 September 2018, terrorist offences are criminal acts carried out with the aim of seriously intimidating a population, unduly compelling a government or international organisation to perform or abstain from performing any act, or seriously destabilising or destroying the fundamental political, constitutional, economic or social structures of a country or an international organisation. The EU TE-SAT identifies and elaborates on various forms of terrorism motivated by specific ideologies . These include jihadist terrorism, right-wing terrorism, left-wing and anarchist terrorism, ethno-nationalist and separatist terrorism, and other forms of terrorism. Notwithstanding the existence of different legislative frameworks at the national level, Directive (EU) 2017/541 establishes minimum EU rules concerning the definitions of offences and related sanctions in counter-terrorism and provides a harmonised definition of terrorist offences. On this basis, the EU TE-SAT provides statistical data on terrorist attacks, arrests and convictions in Member States. At a national level, the legislation pertaining to terrorism varies within the limits set by the aforementioned Directive, as Member States are afforded a certain degree of flexibility in their legislative processes. Consequently, the quantitative analysis presented in the EU TE-SAT reflects Member States’ definitions of terrorist offences according to their national legislation. It should be noted that these definitions may be broader in scope than the definitions set out in Directive (EU) 2017/541, although they cannot have a narrower scope. While the primary scope of the EU TE-SAT is to present the situational picture on terrorism, the report also presents specific violent extremist incidents, acts, activities and developments, reported by the Member States. While the quantitative overview of terrorist attacks, arrests, convictions and penalties does not include instances of violent extremism, the latter is included in the report for contextualisation purposes and to provide a more comprehensive picture of the security threats to the Union.   

Publications Office of the European Union, Luxembourg. 2024. 72p.

30 Years of Trends in Terrorist and Extremist Games

By Emily Thompson and Galen Lamphere-Englund

Violent extremist, terrorist, and targeted hate actors have been actively exploiting video games to propagandise, recruit and fundraise for more than 30 years. This report presents an analysis of that history using a unique dataset, the Extremist and Terrorist Games Database (ETGD), developed by the authors. It contains 155 reviewed entries of standalone games, modifications for existing games (mods) and browser‑based games dating from 1982 to 2024. The titles analysed appear across the ideological spectrum: far right (101 titles), jihadist (24), far left (1) and other forms of extremism and targeted hate (29), including school‑massacre ideation (12). They span platforms ranging from simple standalone games for Atari in the 1980s to sophisticated mods for some of today’s most popular games. The number of titles has increased year on year – in line with global conflict and extremist ideological trends, and revealing a continued push by malicious actors to exploit gaming. Meanwhile, the means of distribution have shifted from violent extremist organisations and marketplaces – such as white supremacist, neo‑Nazi and jihadist organisations – to distributed repositories of extremist games hosted on internet archives, Ethereum‑hosted file‑sharing, Telegram and with subtly coded titles on mainstream platforms like Steam. While most of the titles in the ETGD are available for free, several that have been sold (often at symbolic prices like $14.88 or $17.76) appear to have generated revenue for groups ranging from Hezbollah to the National Alliance, an American neo‑Nazi group. Through new analysis of Steam data, we also show that a small number of extremist and targeted hate titles have generated almost an estimated $600,000 in revenue for small publishers on the platform. Far from being a comprehensive analysis of the ETGD, we intend this preliminary launch report to form a basis for future research of the dataset and a framework for continued contributions to the ETGD from Extremism and Gaming Research Network (EGRN) members. Above all, we seek to contribute to sensible policymaking to prevent violent extremism that situates games as part of a wider contested and exploited information space, which deserves far more attention from those working towards peaceful ends.

Complete recommendations are provided in the conclusion section of this report, but include the following: 1. Prohibit and prevent violent extremist exploitation: Gaming platforms should explicitly prohibit violent extremist and terrorist behaviours and content. Leadership exists here from Twitch, Discord, Microsoft/Xbox and the affiliated Activision‑Blizzard. a. Audio and video platforms, such as Spotify, Apple Music and YouTube should seek to identify extremist gaming content currently available under misleading titles and tags. b. Flag and remove extremist titles across platforms: Hashing and preventing outlinking to ETGD games and links should be a priority across platforms. 2. Improve reporting mechanisms: Platforms must improve reporting mechanisms to make it easier for players to report violative content found in games and in‑game conduct. 3. Understand and take down distributed repositories: Larger repositories of extremist gaming content readily available on the surface web accelerate user exposure. 4. Collaborate across sectors: Addressing the spread of extremist games requires a collaborative effort between tech companies, government agencies and civil society organisations. 5. Educate across sectors: Programmes supporting educators and frontline community moderators should be developed. 6. Support research and innovation: Including cross‑sector initiatives like the Global Network on Extremism and Technology (GNET) and EGRN, which produced this database. 7. Enhance regulatory frameworks: Governments should update regulatory frameworks applying to digital platforms, recognising the nuances of gaming platforms and complying with human rights. 8. Encourage positive community engagement: Thoughtful, well designed community guidelines, moderation policies and reporting mechanisms can support community‑building.

London: The Global Network on Extremism and Technology (GNET). 2024. 40p.

Anti-State Terrorist Plots and Attacks in the United States

By Michael Jensen, Sheehan Kane, Sean Doody and Elena Akers

Recently, several studies have found that threats against state targets, including public officials, elections, and law enforcement, have been on the rise in the United States. In this brief, we take a closer look at terrorist plots and attacks in the United States that targeted government, police, and military entities over a thirty year period (1992-2022). This brief looks specifically at 460 premeditated plots and attacks against state targets in which the perpetrators either (1) successfully committed attacks, or (2) mobilized to violence but were interdicted by law enforcement before they could carry out attacks. For this brief, evidence of mobilization includes the acquisition of weapons or weapons-making materials, target surveillance, the recruitment of co-conspirators, raising funds for an attack, or engaging in military-style training. Using data from the Profiles of Individual Radicalization in the United States (PIRUS) project, this brief shows that anti-state terrorist plots and attacks have increased sharply, reaching all-time highs over the past five years.

College Park, MD: The National Consortium for the Study of Terrorism and Responses to Terrorism (START) , 2024. 6p.

Hostage to Violent Extremism: Kidnapping in Northern Benin

By Flore Berger, Lyes Tagziria and Aziz Mossi

As the infiltration of communities in northern Benin by violent extremist organisations (VEOs) has intensified since 2021, the number of kidnapping incidents has surged. This research identifies four main types of kidnapping by VEOs – forced recruitment, intelligence gathering, punishment and intimidation – all of which are closely linked to conflict dynamics and group expansion. Kidnapping is used as a strategic tool for infiltration into new territories. Key findings l An effective protection programme for defectors, key targets for abductions, should be developed. This would preserve an important source of intelligence while also incentivising further defections. l Explore amnesty programmes for individuals who have joined the ranks of the VEOs. Dialogue should be made an important feature in counterterrorism strategy. l Reinforce local infrastructure to bolster community resilience towards kidnapping and other forms of violence. This should include telephone network coverage and road infrastructure, among others. l Kidnapping incidents should be incorporated into ECOWAS and national early warning mechanisms. The pervasiveness of kidnapping can be used as a barometer of VEO entrenchment in a given area. l Rebuilding international cooperation structures with neighbouring countries is crucial. The Benin government should immediately seek a resolution to current diplomatic stand-offs.

Pretoria: South Africa: OCWAR-T: Organised Crime: West African Response to Trafficking , 2024. 34p.