Open Access Publisher and Free Library
TERRORISM.jpeg

TERRORISM

Terrorism-Domestic-International-Radicalization-War-Weapons-Trafficking-Crime-Mass Shootings

Posts in Social Sciences
The enduring shadow of extremism: tackling radicalisation in the Bangladeshi diaspora

By Iftekharul Bashar

The recent arrests in Malaysia confirm that radicalisation within the Bangladeshi diaspora is a significant and evolving threat. This problem stems from socioeconomic factors, homeland instability, and online recruitment. A transparent, collaborative, and multi-faceted P/CVE (Preventing and Countering Violent Extremism) approach is essential to mitigate the risk.

COMMENTARY

Malaysian authorities recently arrested 36 Bangladeshi citizens in Selangor and Johor for their involvement in a radical militant movement promoting Islamic State (IS) ideology. Home Minister Datuk Seri Saifuddin Nasution Ismail reported that these individuals were forming recruitment cells, fundraising for terrorism, and plotting to overthrow the Bangladesh government.

Notably, the network, as detailed by police, raised funds using international fund transfer services and e-wallets, directing money to the IS group in Syria and Bangladesh. This method highlights a growing trend in terrorist financing, leveraging the speed, lower costs, and often less stringent oversight of digital platforms and cross-border money movement to facilitate illicit financial flows globally.

Of those arrested, five have been charged with terrorism-related offences, 15 face deportation, and 16 remain under investigation, with the police anticipating further arrests. Malaysian authorities estimate that 100 to 150 individuals are suspected to be involved in this network, demonstrating the scale of the threat they are actively dismantling.

These arrests are a stark reminder that the threat of extremism continues to cast a long shadow, not just within Bangladesh’s national borders but also across diaspora communities. The arrest of the 36 nationals is not an isolated incident. There have been previous cases of radicalisation of Bangladeshis in Malaysia.

In May 2019, a 28-year-old Bangladeshi mechanic was arrested in Kuala Kedah; he had possessed the necessary chemicals and expertise to produce improvised explosive devices (IEDs). Earlier in January 2017, two Bangladeshi salesmen, aged 27 and 28, were arrested in Kuala Lumpur, reportedly for having ties with suspected IS militants in Bangladesh and for planning to join a terror cell in the southern Philippines.

Singapore, among other nations, has also experienced similar cases in the past, notably in 2015, 2016, and 2020, highlighting a recurring pattern of Bangladeshi diaspora members being targeted and recruited by terrorist networks, including the Islamic State.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 6p.

download
Banditry violence in Nigeria’s North West: insights from affected communities

By Johanna Kleffmann, Swetha Ramachandran, Noah Cohen, Siobhan O'Neil, Mohammed Bukar, Francesca Batault, Kato Van Broeckhoven,

Key Findings • The labelling of banditry as “organized crime,” “unknown gunmen,” or, more lately, “terrorists” has distorted this multi-faceted and still poorly understood phenomenon. Likewise, some of the frames that have been applied to banditry – particularly the farmer/herder conflict or Hausa/Fulani tensions – do not appear to fully align with local communities’ understandings of today’s evolution of banditry. Simplistic categorization and narrow lenses for understanding banditry may contribute to inappropriate or insufficient policy and programmatic responses. MEAC’s survey unearths some of the lived experiences with bandits and sheds light on the nuances of the phenomenon and its profound impact on communities. • Community perceptions of bandit groups corroborate earlier research depicting them as comprised of largely distinct, organized groups, albeit with shifting configurations and subject to fragmentation. Bandit groups operate in highly mobile, armed, and largely forestbased units that use quick-strike attacks on motorbikes against communities. Their motivations are primarily perceived as economic/financial by victims, including the notable subsection of the sample of Fulanis who have been victimized by bandits. • For the surveyed communities, weapons are the most recognizable feature of bandit groups. This bears critical implications for the potential for escalation of violence, further proliferation of illicit arms and ammunition including in the neighbouring regions, community violence reduction efforts and future DDR programming. • Victimisation experiences differ considerably with gender, age, and location in the North West. While physical violence and killings disproportionately affect adult men, sexual violence appears to especially affect women and girls (although it likely remains underreported). Variations of victimization across states indicate the volatile and dynamic nature of overall banditry presence and violence. • Banditry violence has profound and pervasive effects on the physical safety, access to income-generating activities, education, and mobility of residents in the northwestern communities surveyed. The perceived intensity and frequency of attacks are on the rise, with one in three respondents reporting experiencing weekly attacks in recent years. Close to two-thirds of respondents have family members who have been attacked by bandits.

Findings Report 36,

Geneva, The United Nations Institute for Disarmament Research ., UNIDIR, 2024,43p.

download
The Use of Artificial Intelligence in Countering Online Radicalisation in Indonesia

By Raneeta Mutiara

Digitalisation of the activities of Islamic State in Iraq and Syria (ISIS) has been a longstanding issue in Southeast Asia. In recent years, the nature of this threat has become more widespread and complex. In countries like Indonesia, where radicalisation is primarily offline, online platforms still play a role in spreading extremist ideas and maintaining ideological networks. The phenomenon of online radicalisation can erode social cohesion, highlighting the need for strategic measures to counter its destabilising impact.

Indonesia has made several attempts to combat online radicalisation. The National Counter Terrorism Agency of Indonesia (BNPT) initiated the Duta Damai Dunia Maya campaign to counter harmful content on the Internet. Other online initiatives, such as BincangSyariah and Islamidotco, have also been promoting Islamic literacy, moderating religious interpretations, and correcting misleading narratives.

Nevertheless, Indonesia still encounters online radicalisation cases. In July 2024, Indonesia’s elite counterterrorism unit, Densus 88, detained a 19-year-old student who had expressed allegiance to ISIS through social media and was believed to be planning attacks on religious sites before he was caught.

The swift progress of Artificial Intelligence (AI), especially in areas of machine learning (ML) and natural language processing (NLP), presents both opportunities and challenges in combating online radicalisation in Indonesia. AI, generally defined as machines mimicking human intelligence, enables systems to recognise patterns, analyse content, and produce outputs in text, images, and videos. Within this AI landscape, ML allows models to enhance themselves through data, while NLP, as a specific ML application, deals with understanding and generating human language. These advancements provide possibilities for creating early detection systems, content moderation tools, and sentiment analysis tools that can spot and counter extremist messages online.

For the research, the author conducted interviews with fifteen experts across different fields, including law enforcement officers, academics, representatives from civil society organisations (CSOs), and employees of AI start-ups in Indonesia. The qualitative data collected from this process have been analysed through thematic analysis, and the preliminary findings reveal that AI can indeed complement the conventional CVE (countering violent extremism) methods in the country, albeit not without challenges

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 6p.

download
The Terrorism News Beat: Professionalism, Profit, and the Press

By Aaron M. Hoffman

Critics of terrorism news coverage often describe it as a sensationalized and intimidating area of reporting. However, this characterization offers a misleading guide to the coverage of terrorist threats and attacks, counterterrorism, and community responses to terrorism that appears in U.S. newspapers. Counterterrorism—not terrorist threats or attacks—is the most reported-on subject in newspapers such as the New York Times and Wall Street Journal. Rather than focusing on accounts of terrorist attacks, militarized counterterrorism, or counterterrorism failures, journalists more often cover counterterrorism successes, criminal justice, and diplomatic or community responses to terrorism. The Terrorism News Beat engages thinking about terrorism and the news media from the fields of political science, communication, criminology, economics, and sociology using multimethod research involving more than 2,500 newspaper articles published between 1997 and 2018. Chapters analyze the terrorism news beat’s subject matter, language, and coverage of the Oklahoma City Bombing, Olympic Park bombing, 9/11 attacks, DC Sniper case, and Dallas Police shooting. When it comes to language use, Hoffman finds that, rather than giving into the temptation to convey the news in lurid detail, journalists are minimalists. The language used to depict events on the terrorism beat is typically moderate and extreme words like “torture” appear only as necessary. The Terrorism News Beat shows that contrary to claims of sensationalism, the tone of terrorism coverage becomes even more sober during terrorism crises than it is during non-crisis periods and meets journalistic standards for quality.

Ann Arbor: University of Michigan Press, 2025. 255p.

download
The Chronicle Of The Discovery And Conquest Of Guinea: Volumes 1 & 2

By Gomes Eannes De Azurara (Author), Colin Heston (Editor), Raymond Beazley (Translator)

The Chronicle of the Discovery and Conquest of Guinea is one of the most important early historical sources on the European Age of Discovery. Written in the mid-fifteenth century by Gomes Eannes de Zurara, the royal chronicler of Portugal, the work offers a detailed and vivid narrative of Prince Henry the Navigator’s sponsorship of voyages along the West African coast. Zurara’s chronicle records the systematic exploration of the Atlantic islands and the African shoreline, the capture and enslavement of Africans, and the establishment of the Portuguese presence south of Cape Bojador — a turning point that opened the way for European maritime expansion.

This English edition, translated and edited by historian Charles Raymond Beazley and lusitanist Edgar Prestage for the Hakluyt Society (published 1896–1899), makes Zurara’s text accessible to a modern audience. Their careful translation preserves the rich detail of the original, while their scholarly introduction and notes provide historical context about fifteenth-century Portugal, Prince Henry’s motives, and the wider significance of these early voyages.

Part narrative history, part celebration of Portuguese royal ambition, the chronicle reveals both the triumphs and moral ambiguities of the early encounters between Europe and Africa. It remains an essential source for historians of maritime exploration, Atlantic slavery, and global contact in the late Middle Ages.
This version has been carefully edited, removing unnecessary endnotes, footnotes and other distracting content that distract from a pleasant reading experience.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. 267p.

download free
kindle $2.99 -- paperback $9.99
Preventing radicalisation in the European Union: How EU policy has evolved

By : Piotr Bąkowsk

The questions of why terrorism occurs and how to stop it have haunted European citizens ever since the series of terrorist attacks across the EU that started in the early 2000s. The idea that someone might become a terrorist by going through a 'radicalisation' process seemed like a plausible explanation and therefore quickly gained ground among EU policymakers. Even though experts still disagree over what radicalisation is and whether focusing on it has really advanced the understanding of terrorism, the idea of the close linkages between the two phenomena has endured for better or for worse. Although the terrorism threat the EU faces has evolved, measures to prevent radicalisation are still a key component of EU counter-terrorism efforts as the radicalisation debate goes on

Brussels: EPRS | European Parliamentary Research Service. 2025 57p.

download
Resisting Radicalization: Exploring the Nonoccurrence of Violent Extremism

Edited by Morten Bøås, Gilad Ben-Nun, Ulf Engel, and Kari Osland

Precarious living conditions across the Balkans, the Middle East, and North Africa create fertile ground for radical ideas. Yet, despite genuine grievances and legitimate grounds for anger, most people living in these regions are not radicalized and do not embrace ideas that lead to acts of violent extremism. Which raises the question ... why?

To answer this question, the authors of Resisting Radicalization investigate the nonoccurrence of violent extremism in what they term enabling environments. Their work, the result of a multiyear international project, has critical implications for the future of P/CVE (Preventing and Countering Violent Extremism) programs.

Boulder, CO: Lynne Rienner Publishers, Inc., 2025, 293p.

download
Hezbollah's Networks in Latin America: Potential Implications for U.S. Policy and Research

By Marzia Giambertoni

lthough U.S. policymakers face a variety of complex challenges in addressing transnational terrorism, one underappreciated aspect is Hezbollah's evolving presence in Latin America. Academic literature and government reports almost universally indicate that Hezbollah's activities in the region pose potential threats to U.S. national security. However, there is a significant knowledge gap in existing assessments. In this paper, the author offers an initial exploration of Hezbollah's operational footprint in Latin America, focusing on illicit funding mechanisms, violent operations, and key operational hubs — particularly in the Tri-Border Area and Venezuela. The analysis situates these activities within the broader context of Iran's regional diplomatic, economic, and cultural activities, which partially facilitate conditions amenable to Hezbollah's operations.

The author draws from a variety of open-source materials and reviews publicly available information to provide a foundation for understanding how Hezbollah's networks in Latin America are characterized and discussed publicly. By analyzing the group's operational strategies and historical precedents, the author's framing identifies actionable considerations for U.S. Department of Homeland Security (DHS) and U.S. Department of Defense (DoD) leadership while raising awareness of the organization's presence among a broader community of stakeholders. These findings are significant for both DHS and DoD, given the former's counterterrorism mandate in Latin America and the latter's strategic interests in the region. Hezbollah's evolving presence warrants careful consideration from defense planners to effectively address potential challenges to U.S. interests and regional stability.

Santa Monica, CA: RAND, 2025, 20p.

Download
Comparing Individuals Who Engage in Violent Extremism and Similar Acts in Violent Extremism and Similar Acts. What Research Sponsored by the National Institute of Justice Tells Us

By Kateira Aryaeinejad and Thomas Leo Scherer

Over the years, the National Institute of Justice’s (NIJ) funding for research has provided important opportunities to advance our understanding of topics related to crime and justice within the United States. Drawing from this portfolio, this synthesis paper compares and contrasts the data and findings from NIJ-sponsored research projects on violent extremism, mass shootings, and bias crimes. This comparison focuses both on the content of the data and on the creation and coverage of the data, examining findings from four research projects: ■ The Profiles of Individual Radicalization in the United States (PIRUS) database of 2,226 individuals who demonstrated at least 1 of 5 extremist or radicalized behaviors. ■ The Bias Incidents and Actors Study (BIAS) database of 966 adults arrested or indicted for bias crimes. ■ The National Hate Crime Investigation Study (NHCIS) database of 1,230 hate crime cases. ■ The Violence Project dataset of 172 mass shootings. This synthesis first reviews the creation of each dataset and the types of information that are collected to better understand their generalizability and the ability to make comparisons across separate datasets. There are significant differences in the size, time span, and information of the four datasets, which limits the comparisons that can be made between the individuals described in each dataset and necessitates caution in drawing strong conclusions from such comparisons. With that caution in mind, the datasets suggest some similarities in the individuals who commit bias crimes and mass shootings and display violent extremist behavior. These individuals are primarily males in their 20s and 30s and unmarried at the time of their offenses. They may exhibit higher rates of unemployment than the general population and often have prior criminal histories. However, that is not to say that these characteristics should be used as a profile to determine who is at risk of or more likely to commit any of these types of offenses or behaviors. Rather, it calls into question what other factors may be impacting individuals with these characteristics who go on to commit these types of offenses. The datasets also suggest some differences in the individuals who commit each type of offense or behavior. Individuals associated with violent extremism tend to be more educated than those who commit mass shootings or bias crimes. Individuals who commit mass shootings exhibit higher rates of mental health issues than those who commit bias crimes or participate in violent extremism offenses. The comparison of individuals across categories also highlighted differences among individuals who committed the same type of offense. Among individuals who supported violent extremism, for example, those acting in support of far-right ideologies were more likely to have military experience than those following other ideologies. Comparing these datasets highlights their potential and their limitations, suggesting paths forward for future research. The different collection methods show the importance of precisely describing the data collection method, discussing which behaviors are missed by that method, and triangulating among data with different methods to understand what is missing. The differences in the types of information that each dataset collects about each individual and action suggest that future collections could have greater overlap and comparability. The establishment of potential similarities in demographics and life experiences also allows for more targeted data collection focusing on why most individuals who fit that profile do not commit an offense, while others do. In this way, these projects not only contribute to our current understanding of these types of offenses and behaviors but also allow future research and programming to be conducted more effectively.

Washington, DC : U.S. Department of Justice, Office of Justice Programs, National Institute of Justice, 2024. 43p.

download
The Grievance Hunters: Extremists Exploit: Crises to Bolster Their Image

By Noor Huda Ismail

Violent extremist groups exploit societal grievances, including climate-related disasters, to gain legitimacy and recruit members by positioning themselves as the true protectors of vulnerable communities. Strategic communication, including AI driven tools, is essential to counter extremist narratives and build resilience against manipulation. There is an urgent need for proactive, transmedia storytelling approaches to address both climate change and violent extremism, ultimately strengthening trust and promoting community unity.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 4p.

Download
The Prevalence of Fentanyl in New York City’s Unregulated Drug Supply as Measured Through Drug Checking Offered at Syringe Service Programs

By Yarelix Estrada, Jeffery Sauer, Leonardo Dominguez, Izza Zaidi, Andrew J. Trinidad, Hannah Helmy, Alex Harocopos

Background: Drug checking is a harm reduction strategy that provides people who use drugs (PWUD) information about the composition of a substance. Drug checking has been identified as a key public health response to the continually evolving overdose crisis.

Methods: The New York City Health Department of Health and Mental Hygiene (DOHMH) partnered with existing syringe programs to launch a drug-checking pilot study. The study offered multiple point-of-care drug-checking technologies including fentanyl test strips (FTS) and Fourier-transformed infrared (FTIR) spectrometry, as well as secondary laboratory testing. Fentanyl positivity in major drug types was assessed for each drug-checking technology.

Results: Between November 2021 and December 2023, a total of N = 397 unique participants and drop-off samples contributed a total of N = 1644 samples for drug checking. The majority of samples were sold as opioids (n = 908), with fewer sold as cocaine (n = 314) and methamphetamine (n = 62). 95.3 % (852/894) of opioid samples produced positive FTS. FTIR and secondary laboratory testing resulted in a similarly high prevalence of fentanyl in opioid samples at 84.7 % (769/908) and 89.3 % (519/581), respectively. We did not observe the unexplained presence of fentanyl in samples sold as cocaine or methamphetamine. Further, we describe instances where discussions between technicians and PWUD provided important context that explained the presence of fentanyl in non-opioid samples.

Conclusion: The majority of opioid samples submitted to DOHMH's drug-checking pilot study contained fentanyl. Comparatively, there was little evidence suggesting fentanyl in samples sold as cocaine and methamphetamine. The drug-checking pilot study's point-of-care service delivery model was effective in providing information to PWUD.

Drug Alcohol Depend 10.1016/j.drugalcdep.2025.112578. Epub 2025 Jan 27, 47 p.

Download
Effectiveness of Firearm Restriction, Background Checks, and Licensing Laws in Reducing Gun Violence

By  APRIL M. ZEOLI, ALEXANDER D. McCOURT, and JENNIFER K. PARUK 

We present the rationale behind four types of laws that restrict access to firearms for those who are deemed to be a high risk for future gun violence and two types of laws that implement firearm purchase prohibitions. We also present evidence on the effectiveness of these laws. Broadly, these are laws that restrict access for domestic violence abusers, individuals convicted of misdemeanor violence, and individuals at high risk of violence against themselves or others. We briefly discuss relinquishment of firearms by those who are newly restricted, but we focus mainly on how purchase restrictions are implemented by the federal government and across states. Extant research shows that well-implemented firearm policy that is based on evidence-based risk factors can be effective in reducing firearm injury 

  ANNALS, AAPSS, 704, November 2022  

Download
Reclaiming Asabiya to Counter Extremism and Foster Unity

By Noor Huda Ismail

The concept of asabiyya – group solidarity – originally articulated by Ibn Khaldun, has been hijacked by extremist groups in Southeast Asia to create division and promote radical ideologies. Reclaiming asabiya is crucial, redefining it as a tool for social cohesion and unity by drawing on cultural values that foster mutual respect and collective responsibility. Regional cooperation and digital counter-narratives are essential in countering extremism and fostering long-term peace in the region.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 4p.

Download
Relief from Abuse Case Processing and Firearm Relinquishment 

By:Robin Joy and Monica Weeber

Domestic violence is a national and Vermont public health crisis. The Vermont Department of Health estimates that up to 16% of adult Vermonters have experienced either fear, control, or violence at the hands of an intimate partner. In Vermont, a victim may seek a Relief from Abuse Order (RFA) in the Family Division of Superior Court. As part of the process, the victim may also request that a defendant relinquish their firearms. This study examines general case processing statistics for RFAs, how often firearm relinquishment is requested, and if granted, who is the designated holder of the weapons. The report also documents the processes related to serving orders and storing and returning weapons. Methods Researchers worked with the Vermont Judiciary to create an extract of RFA cases to answer quantitative questions. They also conducted interviews with court personnel, police officers, and licensed firearms dealers. Findings • Bennington County has the highest rate of disposed RFA dockets per 1,000 of the population. Chittenden County has the lowest. • Seventy percent of denied temporary orders are not pursued to final orders. • Fifty-eight percent of all requested temporary orders are granted. • Most RFAs (59%) are between parties who are current or former household members. • Women are overrepresented as plaintiffs (74%) as compared to the general population. Men are overrepresented as defendants (75.8%). • The Judiciary does not record in the case management system whether a request to relinquish was made by the plaintiff. • The rate of relinquishment orders mirrors the estimated firearm ownership rates. • Essex and Orange Counties had the highest rate of firearm relinquishment orders. • Bennington and Rutland Counties has the lowest rate of firearm relinquishment orders. • Temporary RFAs with a relinquishment order are more likely to continue to a final hearing. Recommendations This is the first report on RFA and firearm relinquishment data in Vermont and the first report outlining the relinquishment and storage process. Based on the information CRG has developed suggestions for practice, policy, and further research 

Montpelier, VT: Crime Research Group, 2024. 22p.

download
Disinformation and Cognitive Warfare

By Alana Ford

An examination of the threat of disinformation and cognitive warfare in the Indo-Pacific, the brief unpacks how these tactics are reshaping national security and undermining democratic institutions. Drawing on global examples, it highlights the implications for regional stability and democratic resilience.

The briefing paper outlines Australia’s multipronged approach, including legislative reforms, international partnerships, and public education efforts, offering practical insights to counter these evolving security threats and safeguard democratic values across the Indo-Pacific.

Key messages

Disinformation and cognitive warfare are evolving security threats that undermine democratic institutions, polarise societies, and manipulate public trust at a global scale.

The digital revolution has amplified the speed, precision, and scale of disinformation campaigns.

Russia’s invasion of Ukraine demonstrates how cognitive warfare is deployed to legitimize unlawful acts of aggression and manipulate international narratives.

Democracies in the Indo-Pacific, including Australia, face heightened risks of disinformation and cognitive warfare due to their open information environments and the region’s complex geopolitical dynamics.

Effective countermeasures require coordinated domestic and international efforts, leveraging regulation and multilateral partnerships like AUKUS and the Quad.

Australia: Perth USAsia Centre, 2025.

Download
Options for Enhancing Operational Instruments in the Area of Firearms Trafficking. Final Report of Project ECOFIT.

By Mancuso Marina and Manzi Deborah

Project ECOFIT – Options for EnhanCing Operational instruments in the area of FIrearms Trafficking (www.transcrime. it/ecofit/) is a research project co-funded by the European Union’s Internal Security Fund – Police (ISFP-2018-AG-OCFIRE). Project ECOFIT aims to enhance operational cooperation between Law Enforcement Agencies (LEAs) in the fight against firearms trafficking across the 27 EU Member States (MSs) and seven non-EU SELEC MSs (Albania, Bosnia and Herzegovina, Moldova, Montenegro, North Macedonia, Serbia and Turkey). It analyses five operational

instruments that have been selected as indicators of international cooperation, namely: mechanisms for data collection, mechanisms for data sharing, National Firearms Focal Points (NFPs), joint criminal investigations and controlled delivery procedures. Based on the findings of the Project, it provides recommendations for the EU and guidelines for LEAs concerning how to better put into action these instruments and how to more effectively reduce, prevent and tackle illicit trafficking of firearms offences. In order to achieve its objectives, Project ECOFIT conducts five impact assessments (one for each of the operational instruments included in the analysis). The methodology utilises the Better Regulation “Toolbox” of the European Commission (European Commission 2017). Besides the definition of the problem addressed by Project ECOFIT and the methodology.

mproving the intelligence picture (collection and exchange of systematic and harmonised information between LEAs, knowledge on modi operandi, tactics, new trends, etc.); • Intensifying the pressure on criminal markets (fully operational NFPs, joint actions, etc.). The five operational instruments are strongly interrelated, as also stressed by EMPACT Firearms: having fully staffed and operational NFPs will enhance both data collection and data sharing procedures as well as facilitating the standardisation of practices amongst countries.

Milano: Transcrime – Università Cattolica del Sacro Cuore. 2021. 154p.

download
Firearm-related Gender-based Violence in the European Union

By Giovanna Maletta

Some European Union (EU) member states—as well as the EU, through Eurostat—collect and publish useful and gender-disaggregated information about violent crimes, intentional homicides, or domestic violence. In addition

to using different methodologies and definitions, however, available data does not always include information on the weapons used in the commission of such crimes, the relationship between victim and perpetrator, or the context in which the violence has occurred.

Available data collected at the international, regional, and national level does not allow for a comprehensive picture of the trends and dynamics of gender-based violence (GBV), including firearm violence, within the EU.

The EU is working to establish a common understanding of GBV at the EU level and among its member states, and to detail minimum standards for the criminalization of GBV against women and domestic violence—thus providing the opportunity to address the use of firearms to facilitate and commit GBV across the EU. These regulatory initiatives also have the potential to improve the availability of relevant information by promoting the collection of comparable data and the development of harmonized practices in collecting and reporting this information, which in turn will allow states to better monitor and adapt measures being taken to tackle GBV.

These EU initiatives could benefit from establishing linkages with the existing EU framework for the control of the production, trade, and possession of firearms.

KEY FINDINGS • Some European Union (EU) member states—as well as the EU, through Eurostat— collect and publish useful and gender-disaggregated information about violent crimes, intentional homicides, or domestic violence. In addition to using different methodologies and definitions, however, available data does not always include

information on the weapons used in the commission of such crimes, the relationship between victim and perpetrator, or the context in which the violence has occurred. • Available data collected at the international, regional, and national level does not allow for a comprehensive picture of the trends and dynamics of gender-based violence (GBV), including firearm violence, within the EU. • The EU is working to establish a common understanding of GBV at the EU level and among its member states, and to detail minimum standards for the criminalization of GBV against women and domestic violence—thus providing the opportunity to address the use of firearms to facilitate and commit GBV across the EU. These regulatory initiatives also have the potential to improve the availability of relevant information by promoting the collection of comparable data and the development of harmonized practices in collecting and reporting this information, which in turn will allow states to better monitor

and adapt measures being taken to tackle GBV. • These EU initiatives could benefit from establishing linkages with the existing EU framework for the control of the production, trade, and possession of firearms.

Brussels: Flemish Institute for Peace, 28p.

download
Risk and Protective Factors Associated With Support of Violent Radicalization: Variations by Geographic Location

By Heidi Ellis , Alisa B. Miller , Georgios Sideridis , Rochelle Frounfelker , Diana Miconi , Saida Abdi , Farah Aw-Osman and Cecile Rousseau

Objectives: We examine the association between perceived discrimination, mental health, social support, and support for violent radicalization (VR) in young adults from three locations across two countries: Montréal and Toronto, Canada, and Boston, United States. A secondary goal is to test the moderating role of location. Methods: A total of 791 young adults between the ages of 18 and 30, drawn from the Somali Youth longitudinal study and a Canada-based study of college students, participated in the study. We used multivariate linear regression to assess the association between scores on the Radical Intentions Scale (RIS) with demographic characteristics, anxiety, depression, social support, and discrimination. Results: In the full sample, discrimination, age, and gender were associated with RIS scores. When we examined moderation effects by location, RIS scores were associated with depression only in Montréal, and with social support (negatively) and discrimination in Toronto. None of the variables were significant in Boston. Conclusion: These findings suggest that an understanding of risk and protective factors for support of VR may be context-dependent. Further research should take into consideration local/regional differences

International Journal of Public Health published: 29 March 2021, 10 p.

download
Cognitive and Behavioral Radicalization: A Systematic Review of the Putative Risk and Protective Factors

By Michael Wolfowicz, Yael Litmanovitz, David Weisburd, and Badi Hasisi

Abstract Background: Two of the most central questions in radicalization research are, (1)why do some individuals radicalize when most of those from the same groups or exposed to similar conditions do not? and (2) why do radicalized individuals turn to radical violence while the majority remain inert? It has been suggested that the answer to both questions lie in the cumulative and interactive effects of a range of risk factors. While risk assessment and counter‐radicalization take a risk‐protectivefactor approach, there is widespread debate as to what these factors are and which are most important.Objectives: This review has two primary objectives.1) To identify what the putative risk and protective factors for different radica-lization outcomes are, without any predeterminations.2) To synthesize the evidence and identify the relative magnitude of the effects of different factors.The review's secondary objectives are to:1) Identify consistencies in the estimates of factors across different radicalizationoutcomes.2) Identify whether any significant heterogeneity exists within factors between(a) geographic regions, and (b) strains of radicalizing ideologies.Search Methods: Over 20 databases were searched for both published and gray literature. In order to provide a more comprehensive review, supplementary sear-ches were conducted in two German and one Dutch database. Reference harvesting was conducted from previous reviews and contact was made with leading researchers to identify and acquire missing or unpublished studies.Selection Criteria: The review included observational studies assessing the out-comes of radical attitudes, intentions, and/or radical behaviors in OECD countries and which provided sufficient data to calculate effect sizes for individual‐level risk and protective factors.Data Collection and Analysis: One‐hundred and twenty‐seven studies, containing 206 samples met the inclusion criteria and provided 1302 effect sizes pertaining to over 100 different factors. Random effects meta‐analyses were carried out for each factor, and meta‐regression and moderator analysis were used to explore differ-ences across studies.Results: Studies were primarily cross‐sectional, with samples representing 20 OECD countries. Most studies examined no specific radicalizing ideology, while others focussed on specific ideologies (e.g., Islamist, right‐wing, and left‐wing ideologies). The studies generally demonstrated low risk of bias and utilized validated or widely acceptable measures for both indicators and outcomes.With some exceptions, sociodemographic factors tend to have the smallest estimates, with larger estimates for experiential and attitudinal factors, followed by traditional criminogenic and psychological factors.Authors' Conclusions: While sociodemographic factors are the most commonly examined factors (selective availability), they also tend to have the smallest es-timates. So too, attitudinal and even experiential factors, do not have effect sizes of the magnitude that could lead to significant reductions in risk through tar-geting by interventions. Conversely, traditional criminogenic factors, as well as psychological factors tend to display the largest estimates. These findings suggest the need to broaden the scope of factors considered in both risk assessment and intervention, and this review provides much needed evidence for guiding the selection of factors

Campbell Systematic Reviews: Volume 17, Issue 3 September 2021, 90 p.

download
30 Years of Trends in Terrorist and Extremist Games

By Emily Thompson and Galen Lamphere-Englund

Violent extremist, terrorist, and targeted hate actors have been actively exploiting video games to propagandise, recruit and fundraise for more than 30 years. This report presents an analysis of that history using a unique dataset, the Extremist and Terrorist Games Database (ETGD), developed by the authors. It contains 155 reviewed entries of standalone games, modifications for existing games (mods) and browser‑based games dating from 1982 to 2024. The titles analysed appear across the ideological spectrum: far right (101 titles), jihadist (24), far left (1) and other forms of extremism and targeted hate (29), including school‑massacre ideation (12). They span platforms ranging from simple standalone games for Atari in the 1980s to sophisticated mods for some of today’s most popular games. The number of titles has increased year on year – in line with global conflict and extremist ideological trends, and revealing a continued push by malicious actors to exploit gaming. Meanwhile, the means of distribution have shifted from violent extremist organisations and marketplaces – such as white supremacist, neo‑Nazi and jihadist organisations – to distributed repositories of extremist games hosted on internet archives, Ethereum‑hosted file‑sharing, Telegram and with subtly coded titles on mainstream platforms like Steam. While most of the titles in the ETGD are available for free, several that have been sold (often at symbolic prices like $14.88 or $17.76) appear to have generated revenue for groups ranging from Hezbollah to the National Alliance, an American neo‑Nazi group. Through new analysis of Steam data, we also show that a small number of extremist and targeted hate titles have generated almost an estimated $600,000 in revenue for small publishers on the platform. Far from being a comprehensive analysis of the ETGD, we intend this preliminary launch report to form a basis for future research of the dataset and a framework for continued contributions to the ETGD from Extremism and Gaming Research Network (EGRN) members. Above all, we seek to contribute to sensible policymaking to prevent violent extremism that situates games as part of a wider contested and exploited information space, which deserves far more attention from those working towards peaceful ends.

Complete recommendations are provided in the conclusion section of this report, but include the following: 1. Prohibit and prevent violent extremist exploitation: Gaming platforms should explicitly prohibit violent extremist and terrorist behaviours and content. Leadership exists here from Twitch, Discord, Microsoft/Xbox and the affiliated Activision‑Blizzard. a. Audio and video platforms, such as Spotify, Apple Music and YouTube should seek to identify extremist gaming content currently available under misleading titles and tags. b. Flag and remove extremist titles across platforms: Hashing and preventing outlinking to ETGD games and links should be a priority across platforms. 2. Improve reporting mechanisms: Platforms must improve reporting mechanisms to make it easier for players to report violative content found in games and in‑game conduct. 3. Understand and take down distributed repositories: Larger repositories of extremist gaming content readily available on the surface web accelerate user exposure. 4. Collaborate across sectors: Addressing the spread of extremist games requires a collaborative effort between tech companies, government agencies and civil society organisations. 5. Educate across sectors: Programmes supporting educators and frontline community moderators should be developed. 6. Support research and innovation: Including cross‑sector initiatives like the Global Network on Extremism and Technology (GNET) and EGRN, which produced this database. 7. Enhance regulatory frameworks: Governments should update regulatory frameworks applying to digital platforms, recognising the nuances of gaming platforms and complying with human rights. 8. Encourage positive community engagement: Thoughtful, well designed community guidelines, moderation policies and reporting mechanisms can support community‑building.

London: The Global Network on Extremism and Technology (GNET). 2024. 40p.

download