The Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in Inclusion
Terrorism and Banditry in Nigeria: The Nexus : Kaduna, Katsina, Niger and Zamfara States Context

By Oluwole Ojewale, et al.

This report details the findings of the research study that examined the plausibility between terrorism and banditry towards shedding new light on the dynamics of the country’s security challenges especially in northwest and north central Nigeria, within the focal context of Kaduna, Katsina, Niger and Zamfara States. Nigeria faces a plethora of security challenges ranging from the Boko Haram religious/violent extremism cum insurgency in the northeast to farmer-herder conflict and banditry in the northcentral and northeast, a revived secessionist movement in the southeast, police repression, piracy, and more recently attacks the nexus between banditry and terrorism; highlight the strategies and actions required by various stakeholders at various levels to counter the spread of banditry and terrorism in these focal states. Predominantly, the report utilises both qualitative and descriptive methods, generated from primary and secondary data gotten through desk review, and a consolidation of findings with feedback from consultations with stakeholders in selected focal states. The report undertook qualitative research in the focal states, documenting the experiences of some critical stakeholders through key on security installations, among others. In spite of government efforts, the security situation in Nigeria is deteriorating. The report thus explores the question of whether banditry and terrorism are the alternate side of the same coin and the security and policy implications of conflating both. The purpose of this report is to ascertain informant interviews. These interviews were cluster-based to provide a better context to the literature and systemically present the experiences of stakeholders. The report finds that while banditry gravely endangers public safety and security in the focal states, there are contextual differences in the origin, evolution, and manifestations of banditry in the focal states. Understanding these local variations is important to deploying effective and sustainable solutions to this spectre of banditry that defines governance in the states. The report also notes that there is no discernible ideological persuasion underpinning banditry beyond theft, extortion, and wanton violence. Bandits are primarily motivated by the alluring prospects of wealth in a region blighted by poverty and poor socioeconomic outcomes. However, this does not exclude the fact that fundamentalist Islamist groups operate in the same space as bandits. There is the possibility that some bandit groups might have adopted more of a religious modus operandi on their initiative or through limited contact with extremist groups. While the report notes the dearth of studies investigating in detail the theoretical and functional nature of the relationship between banditry and terrorism in these four states, the preliminary evidence points to the existence of both environmental and operational convergence between bandits and Islamist fundamentalist groups in the focal states.

Africa: Goodluck Jonathan Foundation (GJF) 2021. 43p.

Screen Hate; National Findings Report

By The McCain Institute , Moonshot and Ketchum

In September 2022, the McCain Institute, in collaboration with Moonshot and Ketchum, launched SCREEN Hate, an initiative that provides caregivers and concerned adults with the knowledge, tools, and resources needed to keep youth safe from online messages that could incite acts of hate-based violence. SCREEN Hate is the first nationwide campaign aimed at equipping bystanders to prevent acts of hate-based violence perpetrated by youth. SCREEN Hate was created as part of a two-year project for the Center for Prevention Programs and Partnerships (CP3) at the Department of Homeland Security (DHS), funded through the 2021 Targeted Violence and Terrorism Prevention Grant Program.1 The SCREEN Hate resource hub and accompanying online campaigns launched on 15 September 2022, having been announced at the “United We Stand Summit” at the White House. The campaigns—designed and implemented by Moonshot, the McCain Institute, and Ketchum—included behavior-based bystander engagement campaigns on Google Search and YouTube, as well as wider community outreach campaigns on Reddit, Facebook, and Instagram. This report details the national findings from the SCREEN Hate online campaigns, conducted between September 2022 and July 2023. It includes geographic and behavioral insights into user engagement, as well as the results of comparative testing on user engagement with our YouTube campaign ads. The final section includes recommendations for future programming for practitioners working to engage with concerned bystanders through online campaigns.

Washington, DC: Moonshot, 2023, 28p.

White Supremacy Search Trends in the United States

By Moonshot and the Anti-Defamation League

Moonshot partnered with the Anti-Defamation League (ADL) to analyze US search traffic in July 2020 in response to the threats posed by white supremacist narratives and ideology in the US this past year. The dominant socio-political events of 2020-2021—the COVID-19 pandemic, the widespread BLM protests and counter-protests, and the presidential election—coalesced to create fertile ground for white supremacists and other violent extremist movements to mobilize and recruit. In 2020, racism and systemic racial inequality took center stage in the American public eye, with nationwide mass protests against recent police killings of Black people and historic evidence of racial injustice.1 In a nationwide reactionary mobilization, members of armed extremist groups made frequent appearances at BLM protests as self-appointed “protection” for property and counter-protesters.2 This high-profile direct action, combined with tacit and explicit support from local and national political figures, contributed to an increased interest in white supremacist and racist ideas by segments of the country.3 Protests and opposition to state lockdowns and other measures introduced in response to COVID-19 also provided opportunities for extremist movements to mobilize and engage with wider swathes of the public around shared grievances. While anti-lockdown protests were not related to white supremacy on the surface, these movements began to overlap in their joint opposition to the BLM movement, the defense of Confederate monuments, and general opposition to perceived government tyranny.4 Similarly, national protests alleging election rigging in the wake of Joe Biden’s presidential election victory were repeatedly co-opted and reinforced by white supremacist groups, culminating in the 6 January siege on the US Capitol. Extremist groups and individuals expressing support for white supremacist ideas were well-documented participants in the insurrection. White supremacist groups and other extremist organizations seized on the tensions and uncertainty in American life to promote racist beliefs and anti-Semitic conspiracy theories in order to increase their recruitment. Extremist narratives related to the pandemic promoted the conspiracy theory alleging that COVID-19 is a hoax created by a Jewish-led cabal. This and related anti-Semitic tropes and conspiracies are mainstays of many QAnon narratives.5 Other groups, such as the Patriot Front, have used the past year’s societal upheavals to recruit new members by promoting an impending race war and the perceived persecution of white people—as indicated by conspiracy theories such as “white genocide” and “the great replacement”.6 Extremist groups also exploited wider tensions, perceived grievances and disinformation against the BLM movement, as well as popular disinformation alleging the election was rigged. The findings from this project provide valuable insights on the types of harmful narratives and content that appeal to individuals potentially at-risk of radicalization, including those first searching for extremist slogans and conspiracies out of curiosity. This report presents an overview of the search traffic data collected during the project, between 17 July 2020 - 7 March 2021, and our main findings on online white supremacist narrative trends during this time.

Washington, DC: Moonshot, 2021. 21p.

Social Identity Theory and the Study of Terrorism and Violent Extremism

By Anders Strindberg

This report provides an overview of Social Identity Theory (SIT) and its utility as an integrative framework for the qualitative study of terrorism and violent extremism. SIT is a sociological theory for understanding the effects of social identification on group membership, group behaviour, and intergroup relations. It was designed specifically for the study of intergroup conflict, but scholars have developed a comprehensive analytical apparatus for improving our understanding of multiple aspects both of inter- and intragroup relations and conflict. SIT can serve as scaffolding for organizing our knowledge about terrorism and violent extremism, but also as a foundation for new analytical tools and structures. Following a preface, chapter one demonstrates the need for an integrative analytical framework in the qualitative study of terrorism and violent extremism. Chapter two discusses why SIT is suitable as such a framework, and also the main criticisms against it. Chapters four through seven examine the basic hypotheses and implications of SIT and each chapter identifies some to the key implications for the study of terrorism and violent extremism. Chapter eight outlines a particularly influential SIT-derived structure for organizing analysis of terrorism – Fathali Moghaddam’s “staircase to terrorism” – and chapter nine provides a brief summary and conclusion.

Sweden: Swedish Defence Research Agency, 2020. 80p.

The Political Economy of Terrorism, Counterterrorism, and the War on Terror

By Anne R. Bradley, Christopher J. Coyne and Abigail R. Hall

This Element explores the topics of terrorism, counterterrorism, and the US government's war on terror following the September 11, 2001 terror attacks. It draw on insights from Austrian and public choice economics. First, the foundations of the economics of terrorism are discussed emphasizing that the behaviors of terrorists and counter-terrorists are purposeful and goal-oriented. Then, the economics of counterterrorism policies and the importance of institutional change is considered. Next, the three dilemmas facing liberal societies as it relates to counterterrorism efforts is focused on. The Element then provides an assessment of the US government's war on terror. It discusses the origins of the war, discuss whether it can be judged a success or failure, and consider some of the main effects both abroad and within the United States. The final chapter concludes with a discussion of several areas for future research.

Cambridge University Press. 31 August 2023. 86p.

The Friendcraft of of Middle Powers: how the Netherlands & & Denmark supported the War on on Terror and how this affected their friendship with the US

By Yuri van Hoef

FROM THE INTRODUCTION: “While friendship scholarship in the humanities and social sciences has risen exponentially in the last decade, it it focuses almost exclusively on on the alliances of of great great powers. powers.[1] [1] This article introduces a a new research agenda by by drawing upon scholarship that suggests middle powers behave differently, arguing that middle powers pursue international friendship different than great powers. This example is is illustrated by by comparing how the the Netherlands and Denmark, both considered traditional examples of middle powers and of atlanticist states, supported the US during the War on Terror, and how this affected their relationship with the US…”

Academia Letters, July 2021. 10p.

The Colombo-Venezuelan Guerrillas: How Colombia’s War Migrated to Venezuela

By Unidad de investigación de Venezuela

For twenty years, Venezuela was a refuge for Colombia’s Marxist guerrillas, a place where they could hide out from the military, run criminal economies, and carry out political work with impunity thanks to their friendly relationship with the government of President Hugo Chávez. But today, it is so much more. Guerrillas such as the ELN have spread deep into Venezuelan territory, they are filling their ranks with recruits, taking control of communities, and interfering in politics. Today, they are binational guerrilla groups. The product of five years of fieldwork along the Colombia-Venezuela border and beyond, this investigation reveals the Venezuelan operations of Colombia’s guerrillas and explores the far-reaching implications for both countries of their evolution into Colombo-Venezuelan groups.

Washington, DC: Insight Crime, 2022. 53p.

Guns, Incels, and Algorithms: Where We Are on Managing Terrorist and Violent Extremist Content Online

Armstrong-Scott, Gabrielle L.; Waldo, Jim

From the document: "Ten years ago, U.S. national security agencies grew concerned about a relatively new and powerful weapon used by terrorists: the World Wide Web. What had begun as an effort to connect end users from across the world to share information and to serve as a force of human liberation, instead began to be used as a tool for destruction of life. Terrorists were exploiting technology companies' lax content moderation policies to recruit new members, spread violent extremist ideology, and plan terrorist attacks. [...] Technology companies and governments have spent the past decade trying to better address the evolving threat of terrorist and violent extremist content online (TVEC). However, there are few studies examining just how effective these efforts have been, where we are today in managing the problem, and wherein lie gaps for improvement. This paper argues that companies' efforts to deal with TVEC have been hampered at the outset by a tendency to define TVEC extremely narrowly. [...] This paper also explores the idea of ethical obligations and norms as an alternative to a legally required definition. On the technical side, this paper finds that even if there was consensus on the legal and ethical questions surrounding TVEC, the technical tools currently available are no panacea. Trade-offs across efficiency, scalability, accuracy, and resilience are persistent. Current technical tools tend to disadvantage minority groups and non-English languages. They are also less robustly implemented across small and non-U.S./European firms, generally either because they are left out of inter-firm initiatives or because they lack resources and capability. This paper does not claim to cover every issue relevant to TVEC; however, it highlights several important gaps that could be addressed by policymakers and tech companies and identifies avenues for future research."

Belfer Center For Science And International Affairs. 2023.

Learning from Foes: How Racially and Ethnically Motivated Violent Extremists Embrace and Mimic Islamic State's Use of Emerging Technologies

By Yannick Veilleux-Lepage, Chelsea Daymon and Emil Archambault

  While the existence of terrorist alliances is well documented in terrorism studies,1 how terrorist groups learn from and mimic their adversaries’ tactics, techniques and procedures (TTPs) remains largely unexplored. Building on existing terrorist innovation literature, this report introduces a framework to understand what factors can propel or hinder a terrorist group’s adoption of new TTPs. Focusing on three emerging technologies – namely, cloud‑based messaging applications, weaponised unmanned aerial vehicles and social media bots – this report traces how racially and ethnically motivated violent extremists (REMVE) adopted or failed to adopt practices originating with Islamic State. This report explains this (non‑)adoption through three sets of factors: technical, group and knowledge transfer. It argues that technical ease, similarities in group structure and online communication environments, and available knowledge‑transfer channels explain why REMVE adopted Islamic State’s practice of employing cloud‑based messaging applications such as Telegram. Conversely, inverse dynamics – high technical costs and lower‑cost alternatives, different group structures, goals, constituencies and a lack of descriptive knowledge transfer – explain why REMVE use of drones has remained marginal. Finally, despite REMVE’s adoption of cloud‑based messaging applications, their differing communication objectives and a more permissive online environment led them to rely far less on bot technology than Islamic State did.  

London:  The Global Network on Extremism and Technology (GNET) 2022. 35p.

The Role of Violent Conspiratorial Narratives in Violent and Non-Violent Extreme Right Manifestos Online, 2015-2020

By William Allchorn, Andreas Dafnos and Francesca Gentile

  Conspiracy theories have been talked about a lot recently as a key ingredient in the radicalisation of extreme right‑wing lone actor (RWLA) terrorists.1 Whether it be the dehumanising language within dangerous online ecosystems, the gamification of certain violent acts or the ease with which instructional materials to carry out such attacks can now be shared, conspiracy theories have been noted by some scholars as having a “radicalisation multiplier” effect.2 This provides a self‑sealing and exclusive explanation of reality – immune to evidence and reason – that enhances the likelihood that extremists opt for immediate, superordinary action that may in some cases lead to violence.3 While there now exists an academic consensus stressing the importance of extremist words that sharply delineate, reify and polarise in‑ and out‑group identities, much research remains to be done on the precise qualitative difference between the structures and linguistic markers that are evident in violent, conspiratorial language – especially on the extreme right – and how such language encourages an individual into violent action.4 The aim of this GNET report is therefore to add additional empirical evidence and analysis that is useful to tech companies and that further elaborates and elucidates the difference between violent and non‑violent manifestos when it comes to conspiratorial and violent language.

London: The Global Network on Extremism and Technology (GNET), 2022 , 47p.

Mental disorder, psychological problems and terrorist behaviour: A systematic review and meta-analysis

Kiran M. Sarma Sarah L. Carthy Katie M. Cox

The link between mental health difficulties and terrorist behaviour has been the subject of debate for the last 50 years. Studies that report prevalence rates of mental health difficulties in terrorist samples or compare rates for those involved and not involved in terrorism, can inform this debate and the work of those responsible for countering violent extremism. To synthesise the prevalence rates of mental health difficulties in terrorist samples (Objective 1—Prevalence) and prevalence of mental health disorders pre-dating involvement in terrorism (Objective 2—Temporality). The review also synthesises the extent to which mental health difficulties are associated with terrorist involvement compared to non-terrorist samples (Objective 3—Risk Factor).

Campbell Systematic Reviews, 2022.

What Are the Effects of Different Elements of Media on Radicalization Outcomes? A Systematic Review

By Michael WolfowiczBadi HasisiDavid Weisburd

Most national counter-radicalization strategies identify the media, and particularly the Internet as key sources of risk for radicalization. However, the magnitude of the relationships between different types of media usage and radicalization remains unknown. Additionally, whether Internet-related risk factors do indeed have greater impacts than other forms of media remain another unknown. Overall, despite extensive research of media effects in criminology, the relationship between media and radicalization has not been systematically investigated. This systematic review and meta-analysis sought to (1) identify and synthesize the effects of different media-related risk factors at the individual level, (2) identify the relative magnitudes of the effect sizes for the different risk factors, and (3) compare the effects between outcomes of cognitive and behavioral radicalization. The review also sought to examine sources of heterogeneity between different radicalizing ideologies.

. ampbell Systematic Reviews, Volume18, Issue2. June 2022. e1244

The Input: Pathways to Jihad: A Thematic Analysis of 310 Cases

By Kacper Rekawek, Viktor Szucs, Martina Babikova, and Katsiaryna Lozka  

For the last year and a half, GLOBSEC has been studying the phenomenon of a crime-terror nexus in Europe. Its research team has built up a dataset of 348 individuals arrested for terrorism offences, expelled for alleged terrorist connections, or who died while staging terrorist attacks in Europe in 2015, the peak year of European jihadism. The dataset covers the 11 European countries, all within the EU, who reported the highest number of terrorism arrestees to EUROPOL (European Police Office). The work has been geared towards establishing whether the nexus exists and if so, then researching its nature and strength. The researchers deployed 11 experienced national teams who worked on available data (open source, official documents, personal interviews with stakeholders) to map out the European crime-terror nexus. The main research tool is a 120+ variable codebook deployed to analyse each case of a terrorist included in our dataset. As a result, the research team was able to establish that out of the 310 jihadists included in the database, 95, or 31%, had a previous criminal past, indicated by a pre-2015 arrest for any offence, with the French subset recording the most criminals (44 of the individuals, or 46%, have a criminal past preceding their terrorist involvement). Data show it is a male phenomenon, comprising 264, or 88%, of the individuals in our database. The European jihadists are not youngsters, as their average age is 34 (average male: 29; average female: 34; average “criminal turned terrorist”: 34), nor are they very well educated (the research team only knows of 72 who “had some high school” experience, and hardly any attended university).

Slovak Republic: GLOBSEC Policy Institute....28p.

Status of ISWAP and ISGS in West Africa and Sahel

By Pieter Van Ostaeyen | Kwesi Aning  

Since the initial rise in violent extremist and terrorist groups in the Sahel in the mid-2000s, the number of such groups in the region has continued to grow. This is reflected in the nature of the opportunistic alliances that have developed among different groups, with varying interests and memberships. Furthermore, these groups have changed their operational tactics over time and, since 2019, began a gradual expansion of their activities towards the littoral states of West Africa. This paper focuses on two of the most important extremist groups in the Sahel: Islamic State in West Africa Province (ISWAP) and Islamic State in Greater Sahel (ISGS). In discussing the origins of both groups, this paper argues that their establishment was not borne out of religious rationales alone. Rather, ISWAP’s and ISGS’s formation and expansion were based on their fractured relationships with the organizations from which they split and to a certain extent transformed, as well as their pursuit for new allegiances and competition for preeminence in the leadership as they battled to expand and establish Islamic states in northern Nigeria, Cameroon, Chad, Niger, and the Sahel. Ideologically, this paper identifies the adoption of Takfiri doctrines as the driving force resulting in more draconian interpretation and implementation of Islamic laws implemented by the hisba relating to zakat, hudud, ta’zir, and qisas. This paper argues that factionalism and splits from the original organizations represent fundamental splits from their original members and that the alliances formed by these originally distinct groups constitute a fundamental split and shift in operational tactics. ISWAP and ISGS operations are characterized by opportunism and exploitation of local grievances that enables them to build specific narratives for support….

Berlin: Konrad-Adenauer-Stiftung e.V.. Counter Extremism Program, 2023. 20p.  

Development of al-Qaeda in the Western Sahel Region

By Edmund Fitton-Brown and Bakary Sambe 

  This short paper explores how Jamaat Nusrat Al-Islam wal-Muslimin (JNIM), the predominant coalition of al-Qaeda (AQ) affiliates in the region, is structured and financed and how its component parts relate to one another. The paper will outline how the various groups constituting JNIM train and operate jointly and the extent of their use of trafficking routes and overlap with regional organized crime. It addresses the extent to which the spillover of JNIM activity from Mali and Burkina Faso into the Atlantic/Gulf of Guinea littoral states represents a threat to their stability. It also addresses the impact of political instability in Mali, Burkina Faso, and elsewhere on counterterrorism (CT) activity and the impact on terrorism of external state and non-state assistance. The paper seeks to diagnose the challenges posed by JNIM considering its local and regional circumstances on the ground and to provide operationally relevant recommendations both for actions within the region itself and through the use of international resources. The recommendations seek to integrate CT with measures aimed at preventing and countering extremism, conflict resolution, and development goals. They also highlight that the needs vary between different countries in the region. For example, measures applied to Mali cannot easily be transferred to mitigate the challenges in Burkina Faso  

Berlin: Konrad-Adenauer-Stiftung e.V. , Counter Extremism Program, 2023. 14p.

Linkages of terrorist groups in West Africa with terrorist networks in other African regions

By Ini Dele-Adedeji | Sofia Koller

This policy paper summarizes the current state of affairs regarding the linkages of terrorist groups in West Africa with terrorist networks in other African regions. It also provides recommendations for policymakers and security agencies. ● The paper looks at linkages of JNIM, IS West Africa Province (ISWAP), and IS in the Greater Sahara (ISGS) with terrorist groups in North, West-Central, Eastern, and Southern Africa. ● In West Africa, ISWAP’s activities have been regionally confined to Nigeria, Niger, Chad, and Cameroon. There is no indication that ISWAP intends to expand its territorial base beyond these countries or that it has any transregional linkage with terrorist groups in other parts of Africa. ● JNIM and ISGS have demonstrated that they possess the intention and capability of regional expansion across West Africa. Increasing attacks further southwards in West Africa and their presence in the neighboring regions of Ivory Coast, Ghana, Togo, and Benin suggests that both groups intend to expand their geographical zone of influence to the Gulf of Guinea….

Berlin: Konrad-Adenauer-Stiftung e.V. Counter Extremism Program, 2023. 16p.

Interlinkage of terrorism and transnational organized crime in West Africa

By Theo Clement and Hans-Jakob Schindler  

The nexus between terrorist and transnational organized crime (TOC) networks in West Africa presents one of the most significant security challenges. Both networks undermine governance and the rule of law and cooperate on a multitude of levels in a complex web of mutual beneficial arrangements. Therefore, this nexus presents a mutually enforcing mechanism that supports and accelerates regional destabilization. This paper argues that the risks emanating from this cooperation are not limited to terrorism financing alone as terrorist groups also use their cooperation with TOC networks to gain access to resources needed for their activities, such as arms and ammunition. Finally, such cooperation also allows terrorist groups to carve out spaces that allow them to control the local population while at the same time provide security for local licit and illicit economic activities. Therefore, this cooperation is in some cases also a tool through which terrorist groups can gain support and acceptance among the local population. Therefore… 

  • , tackling this nexus must involve both the regaining of territorial control from terrorist groups by the respective governments as well as the strengthening of governance structures. Both aims should also be attempted concurrently. This paper presents a range of recommendations for German and European decision-makers that primarily aim to disrupt the entry as well as exit points of the flows of illicit goods of the region. Given the current challenges European and German projects face when cooperating with some of the governments in the region, an emphasis on increasing regional cooperation in West Africa seems advisable. In particular, the paper suggests strengthening national and regional law enforcement and border control capabilities, especially within the coastal states of the Gulf of Guinea. Increased cooperation with the Intergovernmental Action Group Against Money Laundering in West Africa (GIABA), increased support to strengthen the management and control mechanisms for national parks, and intensified exchange mechanisms, such as the West Africa Police Chief Committee (WAPCC) of Economic Community of West African States (ECOWAS), could be contemplated. In addition, German and European decision-makers could encourage and support governments in the region in their efforts to intensify the use of existing regional mechanisms such as the ECOWAS sanctions mechanism, as well as increase the participation of regional states in the United Nations Office on Drugs and Crime (UNODC)-World Customs Organization (WCO) Container Control Program and INTERPOL’s West African Police Information System (WAPIS) as possible priorities. 

Berlin:  Konrad-Adenauer-Stiftung e.V. Counter Extremism Program 2023. 16p 

Europol (2023), European Union Terrorism Situation and Trend Report

By Europol

  Terrorism remains a significant threat to the internal security of the European Union. Terrorists operate across borders, leveraging new technologies and modi operandi to target innocent people. EU law enforcement authorities, in particular the counter-terrorism community, remain vigilant and united in countering the threat. The EU Terrorism Situation and Trend Report (TE-SAT) 2023 contributes to this effort, by presenting prevalent terrorism trends in the EU. Terrorism constitutes an attack on our society intending to create fear and chaos among EU citizens. In 2022, 16 terrorist attacks took place in the EU and an additional 12 attacks failed or were foiled. While the attacks directly affected seven Member States, more Member States arrested suspects in terrorism-related cases. Tragically, four people were killed in terrorist attacks in the EU, two resulting from jihadist attacks and two from a right-wing terrorist attack. We honour the memory of all those lost to terrorism in 2022 and in previous years.

  • Member States continue to view jihadist terrorism as the most prominent terrorist threat to the EU despite the fact that the number of jihadist attacks has decreased compared to 2021 and 2020. The threat from right-wing terrorist lone actors, radicalised online, remains significant. Left-wing and anarchist terrorists and violent extremists continue to pose a threat to public safety and security in the EU. Additionally, the spread of propaganda online and its potential for radicalisation remains a key concern. Social isolation and the lack of a solid support system remain key vulnerabilities which terrorists take advantage of in order to propagate their messages and to recruit new followers. This is particularly worrying with the increasing number of young people, including minors, exposed to online terrorist propaganda. Furthermore, the terrorist and violent extremist environment is becoming more decentralised and volatile. Diffuse actors connect and inspire one another, uniting behind grievances beyond ideology or group affiliation. This context is ripe for self-radicalisation and for lone actors to begin engaging in attack planning, and poses significant challenges for preventing and combating terrorism and violent extremism in the EU.   

  Publications Office of the European Union, Luxembourg, 2023. 94p. 

Understanding Conspiracist Radicalisation: QAnon's Mobilisation to Violence

By Anna Kruglova

This policy brief analyses the phenomenon of conspiracy theories, and how they fit in the realm of research on violent extremism. Using the case study of QAnon, this Policy Brief looks at how the movement mobilises people to violence on social media and attempts to determine how different this  process is from any other process of radicalisation to violence. By combining discourse analysis of the movement’s Gab posts, interviewing former supporters, and analysing three illustrative case studies, this Policy Brief identifies five discourses - such as revenge, “the Other”, chosenness/ specialness, apocalypse, and urgency for action and altruism - that are used to bring people into the violent mindset. It emphasises the similarity of these discourses to the ones used by other extremist organisations and argues against exceptionalising the threat of QAnon and other conspiracy theories. It concludes by making recommendations about how to tackle QAnon propaganda.

The Hague: International Centre for Counter-Terrorism (ICCT),    2023. 22p.

Responding to the Threat of Violent Extremism: Failing to Prevent

By Paul Thomas

How should we understand home-grown terrorism like the 7/7 London bombings? This is a classic monograph focusing on recent British attempts to 'prevent violent extremism', their problems and limitations, and what lessons this can offer for more effective policy approaches in future. Paul Thomas's extensive research suggests that the Prevent policy approaches, and the wider CONTEST counter-terrorism strategy, have been misguided and ineffective, further alienating British Muslim communities instead of supporting longer-term integration. He argues that new, cohesion-based approaches encouraging greater trust and integration across all communities represent the best defence against terrorism.

London: Bloomsbury Academic, 2021. 190p.