Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in Social Sciences
Migration, Culture Conflict, Crime and Terrorism

May Contain Mark-Ups

Edited by Joshua D. Freilich and Rob T. Guerette

The book“Migration, Culture Conflict, Crime and Terrorism,”edited by Joshua D. Freilichand Rob T. Guerette, is part of the Advances in Criminology series. It explores the complex interactions between migration, cultural conflicts, crime, and terrorism through a collection of scholarly works. Published by Ashgate in 2006, the book is divided into four parts, each addressing different aspects of these issues.

Part I: Migration, Religion, Culture, and Terrorism

1.Terrorism Rediscovered: Hans-Heiner Kühne examines the political motivations behind terrorism, emphasizing the need to distinguish between acts of war and criminal acts.

2.Culture or Conflict?: Roland Eckert discusses how conflicts generate collective identities and the role of migration in these conflicts.

3.The 21st-Century Kulturkampf: Shlomo Giora Shoham provides a historical and cultural analysis of the clash between fundamentalist Islam and Western culture,advocating for dialogue and mutual respect.

4.Post-9/11 Legislative Changes: Joshua D. Freilich, Matthew R. Opesso, and Graeme R. Newman compare the legislative and policy changes in the UnitedStates, Canada, and Australia following the 9/11 attacks, focusing on operations abroad, detainment of alleged terrorists, border security, and internal measures.

Ashgate Publishing, Ltd., 2006, 235 pages

Terrorism: A Global Perspective

May Contain Mark-Ups

Edited by Mustafa Ozguler, Ph.D., Ali Ozdogan, Ph.D., Ekrem Mus, Halim Iltas, & A. Sait Yayla, Ph.D.

The book“Terrorism: A Global Perspective,”edited by Mustafa Ozguler, Ali Ozdogan, A. SaitYayla, Ekrem Mus, and Halim Iltas, is a comprehensive compilation of presentations from the 2nd Istanbul Conference on Democracy and Global Security held in June 2007. The book is divided into three parts:“Terrorism: A Global Problem,” “Terrorism and CivilSociety,”and“Issues in Terrorism.”Each section addresses different aspects of terrorismand global security, ranging from the global and local dimensions of terrorism, the role of civil society in counter-terrorism efforts, to specific issues such as the use of biometrics incounter-terrorism and the financing of terrorist organizations through cigarette smuggling.The book emphasizes the importance of international cooperation, understanding local factors, and addressing core issues to effectively combat terrorism and enhance global security.Key topics include the framing of terrorist threats by different countries, the impact of globalization on terrorism, the fundamental causes of terrorism such as social injustice and political conflicts, and the role of media in counter-terrorism. The book also exploresthe psychological profiles of suicide bombers, the evolution of right-wing violence in Japan,and the strategic use of small-scale terrorist attacks. Additionally, it proposes new community protection initiatives, such as “Building Terrorism Resistant Communities,”to enhance local resilience against terrorism. Overall, the book provides a multifaceted analysis of terrorism, combining theoretical insights with practical recommendations for policymakers, law enforcement, and civil society

The Turkish Institute for Security and Democracy, 2009, 357 pages

God's Assassins: State Terrorism in Argentina in the 1970s

May Contain Mark-Ups

By Patricia Marchak

"God’s Assassins: State Terrorism in Argentina in the 1970s"by PatriciaMarchak, in collaboration with William Marchak, delves into the harrowing period of state terrorism in Argentina from 1976 to 1983[^1^][1]. During this time, an estimated 30,000 people disappeared under the military junta, with many being tortured and murdered[^2^][2]. The book provides a comprehensive analysis through interviews with a diverse range of participants, including military officers, priests, survivors, and journalists. These personal accounts, combined with historical documents and media reports,offer a multifaceted view of the causes and processes of state terrorism in Argentina.The narrative is structured to interweave historical context with personal stories, revealing the complex and often contradictory nature of the period.The book explores the roles of various institutions, such as the Catholic Church and the military, and their involvement in the repression. It also addresses the broader social and political dynamics, including the influence of Peronism, unionism, and guerrilla movements. Through these detailed interviews and analyses, Marchak uncovers the deep-seated ideologies and motivations behind the brutal regime, providing a nuanced understanding of this dark chapter in Argentine history.

McGill-Queen's Press, 1999, 393 pages

Terrorism and the State: Intra-state Dynamics and the Response to Non-State Political Violence

MAY COTAIN MARKUP

By Kieran McConaghy

State Dynamics in Counter-Terrorism: The book challenges the view of the state as a unitary actor, emphasizing the importance of intra-state dynamics and the individual identities of state personnel in shapingcounter-terrorism responses.

Case Studies: It provides comparative analyses of Spain, France, and theUnited Kingdom, highlighting how state responses to terrorism are influenced by historical and cultural contexts.

Emotional and Political Impetus: The book discusses how emotional reactions and political motivations of state personnel impact counter-terrorism strategies, sometimes leading to actions driven by revenge or political gain.

Recommendations for Future Research: It suggests that future studies on counter-terrorism should consider the complexities of the state and the emotional and organizational factors that influence stateactions.

Springer, Aug 22, 2017, 182 pages

Domestic Terrorists' Contact with System Stakeholders Before Attacks

MCBRIDE, MEGAN K.; JENKINS, MONIQUE

From the document: "Within the public violence literature--that is, the literature on domestic terrorism, mass shootings, school shootings, and hate crimes, among others--leakage has been identified as a core warning behavior. Leakage occurs when a would be assailant communicates an intention to harm a target before committing an attack. This communication can vary in timing, level of detail, form, intentionality, and audience. Through such a communication, an individual might directly verbalize an intent to commit an act, make more subtle threats and innuendos, or share a plan via social media. Researchers have found relatively high levels of leakage associated with acts of public violence, including adolescent-perpetrated mass murders, mass shootings, political and public figure assassinations, and domestic terrorism. For this reason, leakage--which often occurs in interactions online or with loved ones--can be an important warning sign. But leakage to family, friends, or acquaintances is not the only way to detect when an individual is intending to commit an act of public violence, and over the last decade, researchers have started to examine preattack contact with system stakeholders, such as law enforcement, mental health, and education professionals. [...] We sought to advance understanding of what percentage of the violent extremist population could be 'catchable' in the sense that an individual had been in previous contact with a system stakeholder (e.g., law enforcement, mental health provider) or had been reported to a system stakeholder (e.g., by a friend or loved one to whom they had intentionally or unintentionally leaked information). To explore this issue, we leveraged a new dataset: the Domestic Terrorism Offender Level Database (DTOLD). The database includes detailed information on the 320 non-Islamist individuals who carried out terrorist attacks in the United States between January 1, 2001, and December 31, 2020. Specifically, we sought to understand what percentage of this population was known to system stakeholders at some point before they perpetrated their attacks." Further information for this document can be found here: www.cna.org/reports/2024/08/domestic-terrorists-contact-with-system-stakeholders-before-attacks

CNA CORPORATION. 2024. 4p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 4.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 3.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 2.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 1.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

Century of Genocide : Eyewitness Accounts and Critical Views

Edited by Samuel Totten William S. Parsons Israel W. Charny

Focus on Genocide: The book, "Century of Genocide," edited by Samuel Totten, William S. Parsons, and Israel W. Charny, provides eyewitness accounts and critical views on various genocides of the 20th century.

Range of Genocides: It covers genocides such as the Holocaust, Armenian Genocide, Soviet Famine in Ukraine,Cambodian Genocide, and many others, highlighting the diversity and global spread of these atrocities.

Eyewitness Accounts: The book emphasizes the importance of first-person testimonies to provide a human perspective and counteract denial and distortion of historical events.

Scholarly and Activist Efforts: It calls for intensified scholarly study and activist efforts to document, understand, and prevent genocides, stressing the need for a collective response to these crimes against humanity.

Garland Publishing Inc., 1997, 507 pages

Philosophy in a Time of Terror: Dialogues with Jürgen Habermas and Jacques Derrida

By Gierenne Berraderi

Philosophical Dialogues: The book features dialogues with Jürgen Habermas and Jacques Derrida, focusing on their responses to the 9/11 attacks and the philosophical implications of terrorism.

Themes: It explores themes like terrorism, globalization, sovereignty, and the legacy of the Enlightenment.

Philosophical Approaches: Habermas and Derrida offer distinct perspectives on terrorism and political philosophy, with Habermas emphasizing democratic legitimacy and Derrida focusing on deconstruction and hospitality.

Personal Context: The book was conceived in the immediate aftermath of 9/11, reflecting the author's personal experiences and the broader impact of the event on New York City.

University of Chicago Press, 2003, 208 pages

Understanding Al-Qaeda: The Transformation of War

By Mohammad-Mahmoud Ould Mohamedou

Transformation of War: The book discusses how Al Qaeda represents ashift in the nature of warfare, moving from traditional state-basedconflicts to transnational, non-state actors engaging in asymmetricwarfare.

Historical Context: It explores the historical and political contextbehind Al Qaeda's actions, emphasizing the importance ofunderstanding their motivations and grievances.

Misconceptions: The author addresses common misconceptions aboutAl Qaeda, arguing that their actions are politically motivated rather thanpurelyideological or irrational.

Way Forward: The book suggests potential ways to resolve the conflict, including the possibility of negotiations and reassessment of currents trategies.

Pluto Press, 2007, 136 pages

White Supremacist and Anti‐government Extremist Groups in the US

Keneally, Katherine; Davey, Jacob

From the document: "This project by the Global Network on Extremism and Technology (GNET) looks at the user journeys of individuals who enter and participate in the online spaces of extremist communities. A user journey here refers to the distinct path a user may follow to reach their goals when accessing and using an online space belonging to extremist communities. User journeys are particularly important in offering insights into the rationale and motivations of users on the one hand, and to the inner workings of extremist online communities on the other. This is vital for understanding their goals and objectives. In selecting the ideologies for this project, we drew upon extremist communities - rather than extremist and terrorist organisations or groups - including those actors that participate in the extremist milieu and share ideas but do not necessarily operate in concert. These ideologies include those of formal and well-defined extremist organisations of White supremacist and anti-government extremist groups in the United States, supporter networks of Islamic State (IS), and looser communities of extremist actors including accelerationists, incels and chan site members who operate on shared platforms, congregating around common beliefs but without the connection of formal membership. This project is a response to the growing interest in understanding how individuals enter and participate in online spaces of extremist communities."

Global Network On Extremism And Technology (GNET). 24 JUL, 2024.

Catalyzing Crisis: A Primer on Artificial Intelligence, Catastrophes, and National Security

DREXEL, BILL; WITHERS, CALEB

From the document: "Since ChatGPT [Chat Generative Pre-Trained Transformer] was launched in November 2022, artificial intelligence (AI) systems have captured public imagination across the globe. ChatGPT's record-breaking speed of adoption--logging 100 million users in just two months--gave an unprecedented number of individuals direct, tangible experience with the capabilities of today's state-of-the-art AI systems. More than any other AI system to date, ChatGPT and subsequent competitor large language models (LLMs) have awakened societies to the promise of AI technologies to revolutionize industries, cultures, and political life. [...] This report aims to help policymakers understand catastrophic AI risks and their relevance to national security in three ways. First, it attempts to further clarify AI's catastrophic risks and distinguish them from other threats such as existential risks that have featured prominently in public discourse. Second, the report explains why catastrophic risks associated with AI development merit close attention from U.S. national security practitioners in the years ahead. Finally, it presents a framework of AI safety dimensions that contribute to catastrophic risks."

CENTER FOR A NEW AMERICAN SECURITY. UN, 2024. 42p.

Introducing SHIFT Analysis and Understanding Intra-Actions Within QAnon: Co-Presence of Conspiracy Beliefs and Extremism, Full Report

CENTRE FOR RESEARCH AND EVIDENCE ON SECURITY THREATS

From the document: "Eruptions of violence during the events of January 6th 2021 exemplified the need to understand how conspiracy theories and extremism interact to create security threats. Social media presents as a key player in this exchange, and this project sought to respond to that dynamic by exploring and seeking to understand the intra-actions in groups which discuss both conspiracy beliefs and extreme ideas. To achieve this, it synthesises techniques from computer science and social science to analyse data from platforms which enable and promote unguarded speech. [...] This report seeks to understand how conspiracy theories and extreme ideologies impact one another. [...] This report will introduce a new method analysis of conspiracy and politically motivated groups named the SHIFT analysis. This analysis combines data science and social research techniques within a broadly abductive approach to develop new understanding of dynamic events. SHIFT analysis, which is mutable and robust to examine a singular group or between group interactions in this context, is applied to examine the QAnon movement, in the context of the lead up to and aftermath of January 6th, which espoused both extreme political ideology and conspiracy beliefs." "SHIFT" comes from the beginning letters of the following five analysis procedures: 1. 'S'ocial network analysis and identification; 2. 'H'one extracted sample and coding; 3. 'I'nvestigative netnography; 4. 'F'rame analysis; and 5. 'T'ext analytics.

CENTRE FOR RESEARCH AND EVIDENCE ON SECURITY THREATS. JUN, 2024. 36p.

'Substitution': Extremists' New Form of Implicit Hate Speech to Avoid Detection

RISIUS, MARTEN; NAMVAR, MORTEZA; AKHLAGHPOUR, SAEED; XIE, HETIAO (SLIM)

The following excerpt from the document contains multiple links embedded in the original text: "'Content Warning: This insight contains antisemitic, racist, and hateful imagery.' [...] Extremists exploit social media platforms to spread hate against minority groups based on protected attributes such as gender, religion, and ethnicity. Platforms and researchers have been actively developing AI tools to detect and remove such hate speech. However, extremists employ various forms of implicit hate speech (IHS) to evade AI detection systems. IHS spreads hateful messages using subtle expressions and complex contextual semantic relationships instead of explicit abusive words, bringing challenges to automatic detection algorithms. Common forms of IHS include dog whistles, coded language, humorous hate speech, and implicit dehumanisation. Moreover, the forms and expressions of IHS evolve rapidly with societal controversies (e.g., regional wars). Identifying and tracking such changes in IHS is crucial for platforms trying to counter them. In this Insight, we report and analyse 'Substitution' as a new form of IHS. Recently, we observed extremists using 'Substitution' by propagating hateful rhetoric against a target group (e.g., Jews) while explicitly referencing another label group (e.g., Chinese). We show that Substitution not only effectively spreads hate but also exacerbates engagement and obscures detection."

GLOBAL NETWORK ON EXTREMISM AND TECHNOLOGY (GNET). 24 JUN, 2024. 8p.

2024 Department of Defense Arctic Strategy

UNITED STATES. DEPARTMENT OF DEFENSE

From the document: "The United States is an Arctic nation, and the region is critical to the defense of our homeland, the protection of U.S. national sovereignty, and our defense treaty commitments. I am issuing this 2024 Arctic Strategy to guide the U.S. Department of Defense (DoD) in a concerted approach to preserve the Arctic as a stable region in which the U.S. homeland remains secure and vital national interests are safeguarded. Major geopolitical changes are driving the need for this new strategic approach to the Arctic, including Russia's full-scale invasion of Ukraine, the accession of Finland and Sweden to the NATO Alliance, increasing collaboration between the People's Republic of China (PRC) and Russia, and the accelerating impacts of climate change. This increasingly accessible region is becoming a venue for strategic competition, and the United States must stand ready to meet the challenge alongside Allies and partners. This new DoD strategy directs the Department to enhance its Arctic capabilities, deepen engagement with Allies and partners, and exercise our forces to build readiness for operations at high latitudes. The document supports the 2022 National Security Strategy as well as the 2022 National Strategy for the Arctic Region, and its lines of effort implement the 2022 National Defense Strategy direction to adopt a 'monitor-and-respond' approach to preserving stability in the Arctic. This strategy represents prudent and measured efforts to protect U.S. interests in the face of new challenges and an evolving security environment."

Washington DC. UNITED STATES. DEPARTMENT OF DEFENSE. 21 JUN, 2024. 28p.

Biden Administration's Middle East Policy at a Time of War: An Assessment of US Policy Six Months into the Israel-Hamas War

KATULIS, BRIAN

From the document: "[1] The Biden administration set forth five main objectives in reaction to the Oct. 7 Hamas attack against Israel and ensuing war in the Gaza Strip: [a.] Support Israel's self-defense and objective of eliminating the threat posed by Hamas; [b.] Secure the safe return of hostages; [c.] Prevent a wider regional war; [d.] Protect civilians and respond to a growing humanitarian crisis in Gaza; and [e.] Create a post-war plan for reconstruction leading to a two-state solution and wider regional normalization efforts in coordination with regional and international partners. [2] Six months into the Israel-Hamas war, the Biden administration has not achieved enough progress toward these goals, although it has avoided some of the worst-case scenarios. Success is hampered in part by tensions stemming from the fact that some of the tactics and policy approaches are at odds with each other."

MIDDLE EAST INSTITUTE (WASHINGTON, D.C.). 1014. 9p.

United States International Cyberspace & Digital Policy Strategy: Towards an Innovative, Secure, and Rights-Respecting Digital Future

United States. Department Of State.

From the document: "The United States seeks to work with allies, partners, and stakeholders across the globe to shape the design, development, governance, and use of cyberspace and digital technologies to advance economic prosperity and inclusion; enhance security and combat cybercrime; promote and protect the exercise of human rights, democracy, and the rule of the law; and address transnational challenges. The United States believes in the critical role that the responsible uses of digital technologies and interconnected networks play in empowering people, and that an open, interoperable, secure, and reliable Internet enables new solutions to global challenges. Autocratic states and other actors, however, have used cyber and digital tools to threaten international peace and stability, harm others, exert malign influence, and undermine the exercise of human rights. An innovative, rights-respecting international cyberspace and digital technology policy strategy is foundational to U.S. strategic, security, economic, and foreign policy interests. Leadership in cyberspace, the digital economy, and emerging digital technologies is central to advancing the U.S. vision set forth in the October 2022 National Security Strategy (NSS) of a 'free, open, secure, and prosperous world.' As the lead foreign policy agency for the United States, the Department of State is advancing the 2023 National Cybersecurity Strategy (NCS) and its objectives of forging international partnerships to build an open, resilient, defensible, and rights-respecting digital ecosystem."

UNITED STATES. DEPARTMENT OF STATE. 6 MAY, 2024

Fulcrum: The Department of Defense: Information Technology Advancement Strategy

UNITED STATES. DEPARTMENT OF DEFENSE. CHIEF INFORMATION OFFICER

From the document: "Fulcrum represents the Department's ambitious Information Technology (IT) advancement strategy designed to leverage the power of technology to drive transformative change and serves as a tipping point for catalyzing digital modernization for the warfighter. To propel the Department forward, we must ensure continued success and relevance in the digital age. Fulcrum will enable achievement of the DoD mission and strategic objectives with unparalleled efficiency and effectiveness. [...] The DoD Chief Information Officer's (DoD CIO) mission is to 'connect', 'protect', and 'perform'. Fulcrum outlines a vision guided by four lines of effort (LOEs) representing a strategic shift that embraces technology as a mission enabler. [...] Fulcrum features the DoD CIO's IT goals and objectives for Fiscal Years (FYs) 2025-2029 that provide essential support to the priorities in the National Defense Strategy (NDS), and the supporting DoD Strategic Management Plan (SMP)."

UNITED STATES. DEPARTMENT OF DEFENSE. 6 JUN, 2024