Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

Terrorism-Domestic-International-Radicalization-War-Weapons-Trafficking-Crime-Mass Shootings

Posts in justice
Constitutionality of 18 U.S.C. §§ 922(b)(1) and (c)(1), which together prohibit Federal Firearms Licensees from selling handguns to eighteen-to-twenty-year-old adults.

U.S.Court of Appeals 5th Circuit. No. 23-30033

700 F.3d 185 (5th Cir. 2012) (“NRA I”), this court upheld those provisions. But that decision, which was criticized at the time, see National Rifle Ass’n, Inc. v. Bureau of Alcohol, Tobacco, Firearms, & Explosives, 714 F.3d 334, 341 (5th Cir. 2013) (“NRA II”) (Jones, J., dissenting from denial of rehearing en banc), preceded two recent clarifying Supreme Court opinions on the methodology by which we construe gun regulations under the Second Amendment. We are now compelled to focus intently on the evidence of firearm access and ownership by eighteen-to-twenty-year-olds near and at the founding, and we conclude that (1) NRA I is incompatible with the Bruen and Rahimi decisions of the Supreme Court, and (2) these provisions are inconsistent with the Second Amendment. Accordingly, we REVERSE the district court’s contrary judgment and REMAND for further proceedings consistent with this opinion..

Appeal from the United States District Court for the Western District of Louisiana USDC No. 6:20-CV-1438. 29p.

Trends for Background Checks for Firearm Transfers, 1999–2018 - The First 20 Years of the Permanent Brady Act Period

By Brittni Lambing, Ron Frandsen, Jennifer Karberg, and Joseph Durso

The Brady Handgun Violence Prevention Act (Brady Act) requires a background check on an applicant for a firearm purchase from a dealer who is a Federal Firearms Licensee (FFL). During the permanent Brady Act period, from 1999 through 2018, background checks were conducted on over 237 million applicants for firearm transfers or permits. During this period, nearly 3.5 million applications for firearm transfers or permits were denied by the Federal Bureau of Investigation (FBI) or by state and local agencies. This report summarizes the number of applications for firearm transfers and permits, denials that resulted from background checks, reasons for denial, rates of denial, appeals of denials, and arrests of denied persons during the permanent Brady Act period. Statistics are presented at the FBI, state, and local levels. The report also provides a summary of significant changes in federal and state laws and regulations related to firearm sales. Statistical highlights are presented in the body of the report, and complete details are included in an appendix.

Washington, DC: Regional Justice Information Service; 2024. 29p

After Action Report Washington Navy Yard September 16, 2013 Internal Review Of The Metropolitan Police Department Washington, D.C.

Metropolitan Police Department, Washington D.C.

On the morning of Monday, September 16, 2013, Aaron Alexis entered Building 197 at the Washington Navy Yard, where he served as an independent contractor, and carried out the most deadly workplace mass shooting in the Nation’s Capital in recent memory.

Over the course of 69 minutes, Alexis terrorized thousands of employees of Naval Sea Systems Command, firing indiscriminately from a shotgun he had legally purchased two days earlier and a handgun he had taken from a security guard after mortally wounding the guard. He would also get into multiple shooting engagements with responding law enforcement officers, seriously injuring a Metropolitan Police Department (MPD) officer. In his final confrontation with police, Alexis ambushed and fired upon another MPD officer. Fortunately, the officer was saved by his protective vest and was able to return fire, killing Alexis and ending his rampage. When it was over, Alexis had shot and killed twelve people and injured several others.

*****

In the aftermath of the incident, the members of MPD first and foremost want to remember and honor the twelve people who lost their lives. Twelve people went to work that Monday, but did not return home to their loved ones. It is truly a senseless tragedy beyond comprehension, and there are no words adequate enough to express our condolences. Our thoughts remain with the victims’ families and friends.

Metropolitan Police Department, Washington D.C. 2014.. 84p.

Lone Wolf Terrorism in America: Using Knowledge of Radicalization Pathways to Forge Prevention Strategies

Mark S. Hamm and Ramon Spaaij

This research offers the largest and most comprehensive database ever created on lone wolf terrorism, along with a theory-informed case study component based on direct contact with imprisoned lone wolf terrorists, and a comparative analysis distinguishing lone wolves from those who undergo radicalization in a group setting. Strictly in terms of lethality, the data indicate that lone wolf terrorism in America is not on the rise. Although lone wolf terrorism may not be increasing, it is undergoing two important changes in modus operandi. First, uniformed police and military personnel have become the primary target of lone wolf terrorists. Second, consistent with the relaxation of U.S. gun laws since the 1990s and the recent trend in mass shootings, the lone wolf’s preferred weaponry is now a staggering range of high-velocity firearms. While there is no standard profile of the lone wolf terrorist, most of them are unemployed, single white males with a criminal record. Compared to members of terrorist groups, lone wolves are older, less educated and more prone to mental illness.

The study validates a series of commonalities associated with pathways to radicalization for lone wolf terrorists. The radicalization model indicates that lone wolf terrorism begins with a combination of personal and political grievances which form the basis for an affinity with online sympathizers. This is followed by the identification of an enabler, followed by the broadcasting of terrorist intent. The final commonality is a triggering event, or the catalyst for terrorism. The ability of law enforcement and intelligence communities to detect and prevent lone wolf terrorism demands a clear understanding of these radicalization processes. Such insight may provide investigators with a sort of detection system, or “signatures”—as minimal as they may appear—that an individual with a terrorist intent will demonstrate in preparing for an attack. Crucial to this understanding is the broadcasting of intent. While lone wolves physically isolate from society, at the same time they seek recognition for their causes through spoken statements and threats, manifestos, e-mail messages, texting and videotaped proclamations. Focusing on this kind of immediate objective of radicalization among lone wolves, rather than on their underlying grievances, may sharpen our focus on the dangers posed by lone wolf terrorism.

U.S. Department of Justice.. February 2015. 28p.

Lessons From Fort Hood: Improving Our Ability To Connect The Dots

By Committee On Homeland Security House Of Representatives

The hearing focuses on improving information sharing across intelligence and law enforcement agencies following the Fort Hood attack.

• Major Nidal Hasan, the suspect, communicated with terrorist Anwar al-Awlaki, raising red flags that were missed by authorities.

• The FBI and the Department of Defense had pieces of information that, if combined, might have prevented the attack.

• The Webster Commission investigated the FBI’s handling of the case and found shortcomings in policy guidance and technology.

• Recommendations included enhancing data management, training, and policies for counterterrorism leads.

• The Commission emphasized the need for better information sharing and technology to prevent future attacks.

• The ISE works to improve information sharing while protecting privacy and civil liberties.

• The hearing highlighted the importance of addressing information-sharing gaps to enhance national security.

One Hundred Twelfth Congress Second Session, September 14, 2012. 54p.

Reducing Terrorism Through Situational Crime Prevention

May Contain Mark-Ups

By Joshua D. Freilich & Graeme R. Newman

The book “Reducing Terrorism Through Situational Crime Prevention,” edited by Joshua D.Freilich and Graeme R. Newman, explores how situational crime prevention (SCP) techniques can be applied to reduce terrorism. The central theme is that strategies proven effective in preventing conventional crimes can also mitigate terrorism by manipulating environmental factors to block opportunities for terrorist acts. The book includes various case studies and theoretical discussions that illustrate how SCP can be tailored to address specific types of terrorism, such as bioterrorism, hostage-taking, and insurgent attacks.Each chapter delves into different aspects of SCP, such as increasing the effort required to commit a terrorist act, increasing the risks for terrorists, reducing the rewards, and removing excuses for terrorism.One notable case study in the book is the analysis of the 23 Korean hostages inAfghanistan, which demonstrates how SCP measures can be applied in real-world scenarios to prevent terrorist kidnappings. The book also discusses the importance of understanding the terrorists decision-making processes and the situational factors that influence their actions. By integrating SCP with script theory, the authors provide a detailed procedural map of terrorist activities, which can help in developing targeted prevention strategies. Overall, the book emphasizes a practical, evidence-based approach to counter-terrorism, highlighting the need for continuous adaptation and learning to effectively combat evolving terrorist threats

Criminal Justice Press, 2009, 244 pages

Adapting to Threats: US Counterterrorism Strategy After 9/11

By Kristian Alexander

The September 11, 2001, attacks highlighted significant US vulnerabilities and led to major counterterrorism reforms. Post-9/11, the US government implemented institutional changes, enhanced international cooperation, and expanded its use of technology and drone warfare. However, public fatigue from prolonged wars and shifting US focus towards geopolitical rivalries and domestic issues has reduced the centrality of counterterrorism in US policy over the last two decades. COMMENTARY The terrorist attacks of September 11, 2001, remain one of the most devastating strategic surprises in modern history. Despite being the world’s preeminent superpower with an extensive intelligence apparatus, the United States failed to anticipate and prevent the hijacking and subsequent crashing of four commercial airliners, killing almost 3,000 people.

Singapore: The S. Rajaratnam School of International Studies (RSIS) , 2024. 4p.

How Effective Are the Post-9/11 U.S. Counterterrorism Policies Within and Outside the United States?

By Ahmet Gule and Mustafa Demir

This study examined the effectiveness of post-9/11 U.S. counterterrorism policies in preventing terror attacks and reducing casualties against American targets within and outside the United States. Monthly data on terrorism incidents from July 1981 through December 2020 were obtained from the Global Terrorism Database (N = 462). The results of monthly interrupted time-series analyses showed that within the United States, after the 9/11 attacks, the number of attacks, the number of successful attacks, and the successful attack rate statistically significantly decreased in the first month following 9/11; then, no significant increase was observed in the trend of those outcomes. Outside the United States, after the 9/11 attacks, the trend of the number of successful attacks, the number of victims, the number of nonfatal victims, and the victim rate statistically significantly decreased. The results suggest that post-9/11 U.S. counterterrorism policies are effective both domestically and internationally. These findings and their policy implications are discussed.

Criminal Justice Policy Review OnlineFirst, Sept. 2024

Domestic Terrorists' Contact with System Stakeholders Before Attacks

MCBRIDE, MEGAN K.; JENKINS, MONIQUE

From the document: "Within the public violence literature--that is, the literature on domestic terrorism, mass shootings, school shootings, and hate crimes, among others--leakage has been identified as a core warning behavior. Leakage occurs when a would be assailant communicates an intention to harm a target before committing an attack. This communication can vary in timing, level of detail, form, intentionality, and audience. Through such a communication, an individual might directly verbalize an intent to commit an act, make more subtle threats and innuendos, or share a plan via social media. Researchers have found relatively high levels of leakage associated with acts of public violence, including adolescent-perpetrated mass murders, mass shootings, political and public figure assassinations, and domestic terrorism. For this reason, leakage--which often occurs in interactions online or with loved ones--can be an important warning sign. But leakage to family, friends, or acquaintances is not the only way to detect when an individual is intending to commit an act of public violence, and over the last decade, researchers have started to examine preattack contact with system stakeholders, such as law enforcement, mental health, and education professionals. [...] We sought to advance understanding of what percentage of the violent extremist population could be 'catchable' in the sense that an individual had been in previous contact with a system stakeholder (e.g., law enforcement, mental health provider) or had been reported to a system stakeholder (e.g., by a friend or loved one to whom they had intentionally or unintentionally leaked information). To explore this issue, we leveraged a new dataset: the Domestic Terrorism Offender Level Database (DTOLD). The database includes detailed information on the 320 non-Islamist individuals who carried out terrorist attacks in the United States between January 1, 2001, and December 31, 2020. Specifically, we sought to understand what percentage of this population was known to system stakeholders at some point before they perpetrated their attacks." Further information for this document can be found here: www.cna.org/reports/2024/08/domestic-terrorists-contact-with-system-stakeholders-before-attacks

CNA CORPORATION. 2024. 4p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 4.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 3.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 2.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 1.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

An End to Evil : How to Win the War on Terror

By David Frum & Richard Perle

War on Terror: The authors argue that the war on terror is ongoing and emphasize the need for continued vigilance and action against groups like Al-Qaeda, Hezbollah, and Hamas.

Political Challenges: They highlight the political and media elite's wavering commitment to the war on terror, attributing it to political cycles, media bias, and fatigue.

Security Measures: The document discusses the importance of robust security measures, including national identity cards and enhanced surveillance techniques, to prevent terrorism.

International Relations: The authors critique the U.S. government's past complacency and advocate for a stronger stance against countries like Iran and North Korea, which are seen as threats due to their nuclear ambitions.

Random House Publishing Group, 2003 , 284 pages

White Supremacist and Anti‐government Extremist Groups in the US

Keneally, Katherine; Davey, Jacob

From the document: "This project by the Global Network on Extremism and Technology (GNET) looks at the user journeys of individuals who enter and participate in the online spaces of extremist communities. A user journey here refers to the distinct path a user may follow to reach their goals when accessing and using an online space belonging to extremist communities. User journeys are particularly important in offering insights into the rationale and motivations of users on the one hand, and to the inner workings of extremist online communities on the other. This is vital for understanding their goals and objectives. In selecting the ideologies for this project, we drew upon extremist communities - rather than extremist and terrorist organisations or groups - including those actors that participate in the extremist milieu and share ideas but do not necessarily operate in concert. These ideologies include those of formal and well-defined extremist organisations of White supremacist and anti-government extremist groups in the United States, supporter networks of Islamic State (IS), and looser communities of extremist actors including accelerationists, incels and chan site members who operate on shared platforms, congregating around common beliefs but without the connection of formal membership. This project is a response to the growing interest in understanding how individuals enter and participate in online spaces of extremist communities."

Global Network On Extremism And Technology (GNET). 24 JUL, 2024.

Firearm Violence: A Public Health Crisis in America

UNITED STATES. PUBLIC HEALTH SERVICE. OFFICE OF THE SURGEON GENERAL

From the document: "A recent nationally representative survey (n=1,271) found that the majority of U.S. adults or their family members (54%) have experienced a firearm-related incident. Among all respondents, 21% have personally been threatened with a firearm, 19% have a family member who was killed by a firearm (including by suicide), 17% have witnessed someone being shot, 4% have shot a firearm in self-defense, and 4% have been injured by a firearm (Figure 2). 'Nearly 6 in 10 U.S. adults say that they worry 'sometimes,' 'almost every day,' or 'every day,' about a loved one being a victim of firearm violence.' Such high levels of exposure to firearm violence for both children and adults give rise to a cycle of trauma and fear within our communities, contributing to the nation's mental health crisis. This Advisory describes the public health crisis of firearm violence in America and describes strategies for firearm injury and violence prevention, with a focus on the health and well-being of children, families, and communities."

United States. Public Health Service. Office of the Surgeon Genera. . 2024. 49p.

“You are doomed!" Crisis-specific and Dynamic Use of Fear Speech in Protest and Extremist Radical Social Movements

By Simon Greipl, Julian Hohner, Heidi Schulze, Patrick Schwabl, Diana Rieger

Social media messages can elicit emotional reactions and mobilize users. Strategic utilization of emotionally charged messages, particularly those inducing fear, potentially nurtures a climate of threat and hostility online. Coined fear speech (FS), such communication deliberately portrays certain entities as imminently harmful and drives the perception of a threat, especially when the topic is already crisis-laden. Despite the notion that FS and the resulting climate of threat can serve as a justification for radical attitudes and behavior toward outgroups, research on the prevalence, nature, and context of FS is still scarce. The current paper aims to close this gap and provides a definition of FS, its theoretical foundations, and a starting point for (automatically) detecting FS on social media. The paper presents the results of a manual as well as an automated content analysis of three broadly categorized actor types within a larger radical German Telegram messaging sphere (2.9 million posts). With a rather conservative classification approach, we analyzed the prevalence and distribution of FS for more than five years in relation to six crisis-specific topics. A substantial proportion between 21% and 34% within the observed communication of radical/extremist actors was classified as FS. Additionally, the relative amount of FS was found to increase with the overall posting frequency. This underscores FS's potential as an indicator for radicalization dynamics and crisis escalation.

Journal of Quantitative Description: Digital Media. Vol. 4, 2024.

'Substitution': Extremists' New Form of Implicit Hate Speech to Avoid Detection

RISIUS, MARTEN; NAMVAR, MORTEZA; AKHLAGHPOUR, SAEED; XIE, HETIAO (SLIM)

The following excerpt from the document contains multiple links embedded in the original text: "'Content Warning: This insight contains antisemitic, racist, and hateful imagery.' [...] Extremists exploit social media platforms to spread hate against minority groups based on protected attributes such as gender, religion, and ethnicity. Platforms and researchers have been actively developing AI tools to detect and remove such hate speech. However, extremists employ various forms of implicit hate speech (IHS) to evade AI detection systems. IHS spreads hateful messages using subtle expressions and complex contextual semantic relationships instead of explicit abusive words, bringing challenges to automatic detection algorithms. Common forms of IHS include dog whistles, coded language, humorous hate speech, and implicit dehumanisation. Moreover, the forms and expressions of IHS evolve rapidly with societal controversies (e.g., regional wars). Identifying and tracking such changes in IHS is crucial for platforms trying to counter them. In this Insight, we report and analyse 'Substitution' as a new form of IHS. Recently, we observed extremists using 'Substitution' by propagating hateful rhetoric against a target group (e.g., Jews) while explicitly referencing another label group (e.g., Chinese). We show that Substitution not only effectively spreads hate but also exacerbates engagement and obscures detection."

GLOBAL NETWORK ON EXTREMISM AND TECHNOLOGY (GNET). 24 JUN, 2024. 8p.

2024 Department of Defense Arctic Strategy

UNITED STATES. DEPARTMENT OF DEFENSE

From the document: "The United States is an Arctic nation, and the region is critical to the defense of our homeland, the protection of U.S. national sovereignty, and our defense treaty commitments. I am issuing this 2024 Arctic Strategy to guide the U.S. Department of Defense (DoD) in a concerted approach to preserve the Arctic as a stable region in which the U.S. homeland remains secure and vital national interests are safeguarded. Major geopolitical changes are driving the need for this new strategic approach to the Arctic, including Russia's full-scale invasion of Ukraine, the accession of Finland and Sweden to the NATO Alliance, increasing collaboration between the People's Republic of China (PRC) and Russia, and the accelerating impacts of climate change. This increasingly accessible region is becoming a venue for strategic competition, and the United States must stand ready to meet the challenge alongside Allies and partners. This new DoD strategy directs the Department to enhance its Arctic capabilities, deepen engagement with Allies and partners, and exercise our forces to build readiness for operations at high latitudes. The document supports the 2022 National Security Strategy as well as the 2022 National Strategy for the Arctic Region, and its lines of effort implement the 2022 National Defense Strategy direction to adopt a 'monitor-and-respond' approach to preserving stability in the Arctic. This strategy represents prudent and measured efforts to protect U.S. interests in the face of new challenges and an evolving security environment."

Washington DC. UNITED STATES. DEPARTMENT OF DEFENSE. 21 JUN, 2024. 28p.

United States International Cyberspace & Digital Policy Strategy: Towards an Innovative, Secure, and Rights-Respecting Digital Future

United States. Department Of State.

From the document: "The United States seeks to work with allies, partners, and stakeholders across the globe to shape the design, development, governance, and use of cyberspace and digital technologies to advance economic prosperity and inclusion; enhance security and combat cybercrime; promote and protect the exercise of human rights, democracy, and the rule of the law; and address transnational challenges. The United States believes in the critical role that the responsible uses of digital technologies and interconnected networks play in empowering people, and that an open, interoperable, secure, and reliable Internet enables new solutions to global challenges. Autocratic states and other actors, however, have used cyber and digital tools to threaten international peace and stability, harm others, exert malign influence, and undermine the exercise of human rights. An innovative, rights-respecting international cyberspace and digital technology policy strategy is foundational to U.S. strategic, security, economic, and foreign policy interests. Leadership in cyberspace, the digital economy, and emerging digital technologies is central to advancing the U.S. vision set forth in the October 2022 National Security Strategy (NSS) of a 'free, open, secure, and prosperous world.' As the lead foreign policy agency for the United States, the Department of State is advancing the 2023 National Cybersecurity Strategy (NCS) and its objectives of forging international partnerships to build an open, resilient, defensible, and rights-respecting digital ecosystem."

UNITED STATES. DEPARTMENT OF STATE. 6 MAY, 2024