The Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in rule of law
Biden Administration's Middle East Policy at a Time of War: An Assessment of US Policy Six Months into the Israel-Hamas War

KATULIS, BRIAN

From the document: "[1] The Biden administration set forth five main objectives in reaction to the Oct. 7 Hamas attack against Israel and ensuing war in the Gaza Strip: [a.] Support Israel's self-defense and objective of eliminating the threat posed by Hamas; [b.] Secure the safe return of hostages; [c.] Prevent a wider regional war; [d.] Protect civilians and respond to a growing humanitarian crisis in Gaza; and [e.] Create a post-war plan for reconstruction leading to a two-state solution and wider regional normalization efforts in coordination with regional and international partners. [2] Six months into the Israel-Hamas war, the Biden administration has not achieved enough progress toward these goals, although it has avoided some of the worst-case scenarios. Success is hampered in part by tensions stemming from the fact that some of the tactics and policy approaches are at odds with each other."

MIDDLE EAST INSTITUTE (WASHINGTON, D.C.). 1014. 9p.

Grievance-fuelled violence: Modelling the process of grievance development

By Emily Corner and Helen Taylor

Acts of extreme or mass violence perpetrated by lone offenders have become increasingly common in liberal democracies over the past 20 years. Some describe these acts as politically motivated, while others attribute them to mental disorder or criminal intent. This has led to the development of distinct research and practice areas focusing on either violent extremism, mass murder, fixation, stalking, or familial and intimate partner homicide. However, there is increasing understanding that the distinction between political ideology, criminal intent and personal motivation is blurred, and that the violence carried out by these individuals is better understood using the broader concept of grievance-fuelled violence. This work is the first to empirically consolidate the existing research in these distinct areas, employing a multifaceted analytical approach to develop a holistic model of the processes of grievance development among those who commit grievance-fuelled violence.

Research Report no. 27. Canberra: Australian Institute of Criminology. 2023. 95p.

Review of violent extremism risk assessment tools in Division 104 control orders and Division 105A post-sentence orders

By Timothy Cubitt and Heather Wolbers

Risk assessment for violent extremism plays a critical role in understanding the threat posed by radicalised offenders and determining how these individuals are managed both in correctional settings and in the community. The Australian Institute of Criminology (AIC) was engaged by the Department of Home Affairs’ Countering Violent Extremism (CVE) Branch to conduct a review of the use of risk assessments for violent extremism in Australia.

The aim of this review was to:

• identify and describe violent extremism risk assessment tools currently available to support risk assessments of convicted terrorist offenders;

• assess each tool’s suitability to assist an expert to conduct an assessment of the risk to the community from an offender, when a court is considering whether to issue a control order under Division 104 or a post-sentence order under Division 105A of the Criminal Code Act 1995 (Criminal Code); and

• review current risk assessment frameworks, including the use of Structured Professional Judgement, to assess the risk of violent extremist offending and consider how violent extremism risk assessment tools might be improved.

A review of relevant peer-reviewed and grey literature was undertaken alongside semi-structured interviews with a group of experts in violent extremism risk assessment. Findings from this review are organised according to the Terms of Reference.

Special reports. no 14. Canberra: Australian Institute of Criminology. 2023. 70p.

Terrorism and Banditry in Nigeria: The Nexus : Kaduna, Katsina, Niger and Zamfara States Context

By Oluwole Ojewale, et al.

This report details the findings of the research study that examined the plausibility between terrorism and banditry towards shedding new light on the dynamics of the country’s security challenges especially in northwest and north central Nigeria, within the focal context of Kaduna, Katsina, Niger and Zamfara States. Nigeria faces a plethora of security challenges ranging from the Boko Haram religious/violent extremism cum insurgency in the northeast to farmer-herder conflict and banditry in the northcentral and northeast, a revived secessionist movement in the southeast, police repression, piracy, and more recently attacks the nexus between banditry and terrorism; highlight the strategies and actions required by various stakeholders at various levels to counter the spread of banditry and terrorism in these focal states. Predominantly, the report utilises both qualitative and descriptive methods, generated from primary and secondary data gotten through desk review, and a consolidation of findings with feedback from consultations with stakeholders in selected focal states. The report undertook qualitative research in the focal states, documenting the experiences of some critical stakeholders through key on security installations, among others. In spite of government efforts, the security situation in Nigeria is deteriorating. The report thus explores the question of whether banditry and terrorism are the alternate side of the same coin and the security and policy implications of conflating both. The purpose of this report is to ascertain informant interviews. These interviews were cluster-based to provide a better context to the literature and systemically present the experiences of stakeholders. The report finds that while banditry gravely endangers public safety and security in the focal states, there are contextual differences in the origin, evolution, and manifestations of banditry in the focal states. Understanding these local variations is important to deploying effective and sustainable solutions to this spectre of banditry that defines governance in the states. The report also notes that there is no discernible ideological persuasion underpinning banditry beyond theft, extortion, and wanton violence. Bandits are primarily motivated by the alluring prospects of wealth in a region blighted by poverty and poor socioeconomic outcomes. However, this does not exclude the fact that fundamentalist Islamist groups operate in the same space as bandits. There is the possibility that some bandit groups might have adopted more of a religious modus operandi on their initiative or through limited contact with extremist groups. While the report notes the dearth of studies investigating in detail the theoretical and functional nature of the relationship between banditry and terrorism in these four states, the preliminary evidence points to the existence of both environmental and operational convergence between bandits and Islamist fundamentalist groups in the focal states.

Africa: Goodluck Jonathan Foundation (GJF) 2021. 43p.

The Wars Are Here: How the United States’ Post-9/11 Wars Helped Militarize U.S. Police

By Jessica Katzenstein

Six years after the germinal United States protests against anti-Black police violence in Ferguson, MO, and months after the 2020 police killings of George Floyd and Breonna Taylor, police in mine-resistant vehicles have once again occupied both the streets and mass public attention. In 2014, images from the Ferguson protests—of snipers pointing semi automatic rifles into crowds and officers tear-gassing unarmed civilians—prompted activists and politicians to compare the St. Louis suburb to occupied Gaza, Ukraine, or Iraq.2 During the summer of 2020, as the U.S. witnessed its largest public uprisings since the 1960s, police militarization again came under scrutiny. The Department of Homeland Security flew surveillance aircraft over protests in 15 cities, as officers on the ground deployed flash-bang grenades, sound cannons, rubber bullets, and tear gas against peaceful demonstrators.3 Since protests began, at least 14 local law enforcement agencies in 10 states have received free mine-resistant vehicles built for the U.S. military.4 In response, some lawmakers have revived efforts to curtail such transfers of military equipment.5 Reform groups are advocating to demilitarize the police by limiting when and how they can use armored vehicles and camouflage uniforms.6 In this moment of potential transformation, we must analyze both the deep roots and the recent upsurge of police “militarization” in order to grasp what calls for “demilitarizing” the police could mean. This paper argues that today’s high level of police militarization is one of the cruel, complex domestic costs of recent American wars abroad. Police militarization is in a sense as old as U.S. policing itself, yet it has exploded since September 11, 2001 and its intensification must be counted among the costs of this country’s post-9/11 wars.

Providence, RI: Brown University, Watson Institute, 2020. 20p.

ONLINE EXTREMISM AND TERRORISM RESEARCHERS’ SECURITY, SAFETY, AND RESILIENCE: FINDINGS FROM THE FIELD

Elizabeth Pearson, Joe Whittaker, Till Baaken, Sara Zeiger, Farangiz Atamuradova, and Maura Conway

“This report presents findings from the REASSURE (Researcher, Security, Safety, and Resilience) project’s in-depth interviews with 39 online extremism and terrorism researchers. Based at universities, research institutes, and think tanks in Europe and North America, the interviewees studied mainly, albeit not exclusively, far-right and violent jihadist online activity. The report catalogues for the first time the range of harms they have experienced, the lack of formalised systems of care or training, and their reliance therefore on informal support networks to mitigate those harms.”

Vox Pol. REASSURE. 2023. 138p

Proscribed Terrosist Organisations

By Joanna Dawson

This paper describes the recent history and present status of proscribed organisations under the Terrorism Act 2000 (the “2000 Act”). Prior to the 2000 Act, proscription was exclusively concerned with terrorism connected with the affairs of Northern Ireland. Under the 2000 Act, proscription was extended to include organisations concerned with both domestic and international terrorism. The Home Secretary may proscribe an organisation if they believe it is “concerned in terrorism”. If the Home Secretary believes that an organisation meets this statutory test, they must then decide whether to proscribe the organisation. In doing so, they must take into account various policy considerations. Consequences of proscription The 2000 Act sets out a number of proscription offences. These include belonging to or inviting support for a proscribed organisation; arranging or assisting with the arrangement of a meeting that supports a proscribed organisation; addressing such a meeting; or wearing clothing or displaying articles in public which arouse suspicion of membership or support of a proscribed organisation. It is also possible to impose financial sanctions on proscribed organisations.   Current proscribed organisations As of September 2023 there were 79 international terrorist groups proscribed under the Terrorism Act 2000 and 14 organisations in Northern Ireland proscribed under previous legislation. In November 2021 the Home Secretary announced that the Government had laid an instrument to proscribe Hamas in its entirety, ending the distinction between different wings of the organisation. In September 2023 the Government laid an instrument to proscribe Wagner Group, a private military organisation which has acted as a proxy for the Russian state. The Government considers it to involved in committing acts of terrorism, including in relation to its involvement in Russia’s invasion of Ukraine. The Annex to this paper includes a current list of proscribed organisations and a description of their activities. Criticisms of the proscription regime Proscription has been characterised as a powerful deterrent, a way of tackling lower-level support for terrorism, and a signal of rejection by society. But questions have also been raised as to its utility in combating terrorism and its compatibility with the rule of law. The former Independent Reviewer of Terrorism Legislation (IRTL), Lord David Anderson KC, repeatedly recommended the introduction of time limits for proscription orders, as have his successors, Max Hill QC and the current IPTL, Jonathan Hall KC. However, the Government has so far declined to follow these recommendations and currently deproscription is done by way of application only. As a consequence, groups that no longer meet the statutory requirements for proscription continue to be proscribed, a situation described by Lord Anderson as “an affront to the rule of law”.

London: UK Parliament, House of Commons Library, 2024, 70p.

Prohibited Extremist Activities in the U.S. Department of Defense

By Peter K. Levine, Joseph F. Adams, Amy A. Alrich, Rachel G. Augustine, Margaret D.M. Barber, Sujeeta B. Bhatt Kathleen M. Conley, Dave I. Cotting, Alan B. Gelder, Jeffery M. Jaworski, Mark F. Kaye, Carrington A. Metts, Neil V. Mithal, and Matthew J. Reed.

From the document: "The objectives of the IDA [Institute for Defense Analyses] study are to gain greater fidelity on the scope and nature of extremist ideologies and behaviors in the [DOD]; identify the sources of such ideologies and behavior; assess their impact; and develop strategies for preventing, countering, and neutralizing that impact. To that end, the project description calls for IDA to: 1. Document the range of known extremist ideologies and behaviors that are contrary to U.S. law and policy; 2. Identify existing definitions of extremism and prohibited extremist activities; 3. Identify pathways of extremist ideology and behavior broadly and within the Department in particular; 4. Assess why the DOD workforce and others in the military community (including veterans, DOD civilians, and contractor employees) might be susceptible to extremist recruiting efforts; 5. Survey DOD approaches to the prevention of other forms of violence (including suicide, domestic violence, assault, sexual assault, and hate crimes) to identify strategies that might be adopted; 6. Assess policies and initiatives of other federal agencies that might be helpful to the Department; 7. Identify existing legal frameworks for addressing prohibited extremist activities in the Total Force; 8. Evaluate current DOD efforts to counter extremist ideologies and behaviors in the ranks, identifying gaps and strengths; and 9. Review and evaluate current DOD information collection, tracking, and data sharing systems (including through the military justice, equal employment opportunity, command discipline, hotline response systems, insider threat, and law enforcement/security systems)."

INSTITUTE FOR DEFENSE ANALYSES. 2023. 282p.

Strategic Stability in Outer Space After Russia's Invasion of Ukraine

By Baklitskiy, Andrey

From the document: "The space dimension is crucial in nuclear relations between the US and Russia. Space systems support vital functions like early warning, communication, reconnaissance, and targeting directly connected to strategic stability. However, shifting geopolitics and the disappearance of arms control agreements put the space dimension under strain. The Russian invasion of Ukraine showcases modern warfare's reliance on space assets. It also influences space dynamics and US-Russian relations. Although the current impact on strategic stability is limited, it is important to consider it. The most essential element of strategic stability in the space domain--the taboo against kinetic satellite attacks--endures, but there are reasons for concern. The broad use of civilian satellites for military purposes, Russia's evolving stance regarding targeting space objects, cyber-attacks against space infrastructure, the disappearance of provisions for noninterference with space assets, and sanctions affecting space industry--all of these in their separate ways could lead to crisis and undermine strategic stability. On top of this, the lack of dedicated channels for US-Russian dialogue on space security diminishes prospects for crisis prevention or mitigation."

CNA Corporation. 2023. 34p.

Deepfakes -- When We Can No Longer Believe Our Eyes and Ears

By Kleemann, Aldo

From the document: "Deception and media manipulation have always been an integral part of wartime propaganda. But never before has it been so easy to create high-quality fabrications of images as well as sound and video recordings. The tendency to react emotionally to these media opens up a whole new possibility for abuse by their creators. A call to surrender by President Volodymyr Zelensky, which was immediately exposed as a deepfake, is the first attempt to use the new technology in an armed conflict. The quality of such fabrications is improving, detecting them is becoming increasingly complex and there is no end in sight to these developments. Banning deepfakes would be futile. It is therefore time to look at current and potential applications and possible counter-strategies."

German Institute For International And Security Affairs. 2023. 6p.

Mega Terrorist Attacks and Contingency Plan for Law Enforcement: The Case of Istanbul

By Ekrem Ersen Emeksiz

ABSTRACT This research presents Istanbul, Turkey and its law enforcement as a case study for the design of a contingency plan to increase efficiency of counterterrorism efforts and coordination among the agencies. This contingency plan involves the implementation of techniques and strategies based on situational crime prevention, moral panic and crisis theories on predetermined terror targets in the city of Istanbul to reduce the impact of a mega terrorist attack. The research applies the EVIL DONE and CARVER concepts to assess current terrorism risks and threats for critical targets. In assessing risks and threat conditions, this research proposes a contingency plan for law enforcement in Istanbul. The purpose of the contingency plan is to reduce target vulnerabilities and enhance target resilience as well as control moral panic conditions during large-scale terror incidents.

Implementing Gang & Gun Violence Reduction Strategies in Las Vegas, Nevada: Hot Spots Evaluation Results

By Nicholas Corsaro, Robin S. Engel, Tamara D. Herold,. Murat Yildirim

The gang and gun violence reduction project implemented in Las Vegas consisted of three components: hot spots deployment, focused deterrence, and place network investigations. This report focuses on the development, implementation, and evaluation of the hot spots strategy. The hot spots strategy involved the strategic deployment of additional saturation police patrols in high-crime locations. Specifically, to address violent street crime, the LVMPD engaged in a 6- month (Nov 1, 2018 to Apr 30, 2019) cluster randomized controlled trial (RCT) design of street segments receiving additional hot spots deployment (saturation patrols) and streets receiving patrol as usual (control segments). All potential street segments were identified from an analysis of persistent violent crime hot spots (where intensive police focus has been paid by the violent crime unit officers since January of 2018). Researchers stratified highest risk and independent segments within chronic and persistent hot spot locations. Specifically, 22 treatment segments and 22 control segments were selected to form the evaluation. No treatment segment was within a block or intersection of another treatment or control segment to reduce potential contamination of findings. Deployment of officers to the treatment hot spots occurred via calls for service every day, randomly for a total of two hours of exposure at each hot spot. Officers were instructed to remain at the hot spot for a total of 15 minutes, which is the optimum time for deployment to achieve effects as identified by researchers (Koper, 1995). When reaching the hot spot, officers were also randomly instructed to either stay in their vehicle with the lights on, or patrol the segment on foot. Interviews with arrestees have shown police presence is understood and alters criminal behaviors in patrolled areas (Golub et al., 2003). However, hot spot patrols such as walking are likely to go unnoticed by ordinary citizens (Weisburd, Hinkle, Fameaga, & Ready, 2011). Therefore, using both treatment types (stationary with lights and foot patrol) likely leads to increased awareness of police, thereby reducing criminal activity. The control treatment was for business to occur as usual at the control street segments. Center researchers conducted fidelity assessments during the project implementation phase, in order to ensure that the strategy was being implemented properly. These assessments indicated a strong adherence to the research design. Specifically, the research design called for a total of 2 hours of saturation patrol (in 15-minute increments) each day. Analysis of all hot spot patrols revealed that approximately 1.5 hours of additional patrol was observed each day for 90% of all hot spots. A total of 2 hours of additional patrol as observed for 55% of all hot spots. These findings demonstrate that the LVMPD carried out the hot spots strategy as designed.

Alexandria, VA: International Association of Chiefs of Police, 2019. 43p.

Implementing Gang & Gun Violence Reduction Strategies in Las Vegas, Nevada: Evaluation of Offender Notification Meetings

By Robin S. Engel, Nicholas Corsaro and Tamara D. Herold

One of the most frequently used communication mechanisms associated with focused deterrence strategies are offender notification meetings, also referred to as “call-in” sessions. Typically, these meetings are used to communicate directly to offenders that their future violent behaviors (and those of their affiliated groups/gangs) will be responded to in a swift and predictable manner through a coordinated law enforcement effort to prioritize group violence, share information, and develop comprehensive group-focused responses (Engel, Tillyer & Corsaro, 2013). The purpose of sharing this information is to gain compliance through group pressure (Kennedy, 1997). The group/gang structure is believed to serve both as a communication vehicle, and a potential source of control, as the threat of group-focused enforcement encourages groups to police themselves (Tillyer & Kennedy, 2008). Additional messages regarding the availability of assistance, social services, and job opportunities are often conveyed. Finally, most meetings include some form of community messaging that describes the harm inflicted by violence to individual victims and the larger community, along with a plea to change their behavior. This type of “community moral voice” is designed to send clear messages of non-violence, and rejecting norms that promote violence (Brunson, 2015). Offender notification sessions are designed to alert offenders and alter their decision-making by conveying possible sanctions while offering available services, contingent upon the path that the offender (typically on probation and/or parole) chooses, be it desistence or continued high-risk behavior. Initiatives built on call in sessions ultimately seek to change offender behavior by blending law enforcement, community mobilization, and social service provisions in a targeted and directed fashion. While initiatives such as focused deterrence strategies, which rely heavily on offender notification sessions, have often corresponded with reductions in citywide gun violence and gang homicides, the direct influence of call in sessions on individual-level behavior (for those called-in) is far less understood. The following study examines the impact of offender notification meetings – with messaging heavily focused on compassion, support, and the harm inflicted by violence – on the likelihood of offender recidivism in Las Vegas, Nevada. Officials from the Las Vegas Metropolitan Police Department (LVMPD) and the Nevada Department of Public Safety, Division of Parole and Probation (NPP) worked collaboratively to conduct a series of offender notification meetings. Other components that typically accompany the implementation of focused deterrence strategies (e.g. targeted gang enforcement and social services provision) however, were not systematically implemented. Therefore, the following research represents a test solely of the impact of the offender notification meetings, answering the question of whether this form of communication with offenders has an impact on their individual likelihood of recidivism. In order to better understand the influence of call in sessions on offender recidivism patterns, officials from LVMPD partnered with researchers from the International Association of Chiefs of Police (IACP) / University of Cincinnati (UC) Center for Police Research and Policy, along with academic partners from the University of Nevada Las Vegas (UNLV) to randomize and implement an experimental trial to assess the impact of call in sessions on probationers and parolees in Las Vegas in the Spring and Fall of 2018. Using a randomized controlled trial (RCT) research design, this study addresses the following specific research questions:

1) What impact does attendance of probationers/parolees at offender notification meetings have on individual likelihood of recidivism? 2) Can a simple risk classification be developed using offender criminal histories and associations with violent gangs to assess whether risk classification correlates with offender recidivism patterns? 3) Does the impact of offender notification meetings vary based on probationer/parolees’ risk classification? Within the randomization component, probationers/parolees were first stratified into one of four possible categories dependent upon their prior violent criminal histories and current affiliation with a violent criminal gang in Las Vegas: 1) Low-Risk (neither a violent criminal history nor affiliated with a violent gang), 2) Low/Moderate-Risk (no prior violent criminal history but affiliation with a violent gang), 3) Moderate-Risk (prior violent criminal history but no affiliation with a violent gang), and 4) High-Risk (both violent criminal history and affiliation with a violent gang). A random case-control selection occurred within each risk-level stratum, and various waves of probationers and parolees who were assigned to treatment were called-in to attend notification sessions in May 2018 and October 2018. In total, 216 probationer/parolees were randomly assigned to treatment, and 300 to control groups. Probationer/parolee recidivism is the primary outcome of interest, operationalized in two forms: 1) a re-arrest of any type, and 2) an administrative failure (revocation) of probation/parole supervised by NPP. If either event occurred in the follow-up period (i.e., 12 months for May sessions, 9 months for October sessions) – the probationer/parolee (in either treatment or control condition) is classified as having recidivated. Three analytic strategies are employed for the various strata (as well as overall treatment-tocontrol comparisons) and waves of probation/parolee participants. First, a set of bivariate chisquare analyses on recidivism patterns for each risk group to set the foundation regarding covariation in treatment assignment (and attendance) calibrated with recidivism across the risk groups and waves of participants during the study period. Second, a series of binary logistic regression models for our recidivism outcome (where yes = 1 or no = 0) for each risk group (including culling all strata into a single analysis) and each wave of probationers and parolees in the study are estimated (see Long, 1997). The use of the multivariate regression model on our dichotomous outcome of interest allows, where appropriate, to include control variables in the analyses. While the use of statistical controls in randomized controlled trials is subject to debate, where statistical controls are potentially necessary (e.g., unbalanced covariates of importance between treatment and control probationers/parolees within each strata), the multivariate regression framework (including the logistic regression model) allows for such controls to be included into a single regression estimation. Finally, a series of Cox proportional hazard models are estimated to assess the effect that randomized treatment had on individual recidivism (see Cox, 1972).

Alexandria, VA: International Association of Chiefs of Police, 2020. 49p.

The U.S. Capitol Riot: Examining the Rioters, Social Media, and Disinformation

By Jian Wang

The thesis focuses on participants involved in the January 6 insurrection. The major aims of this thesis are to find out who stormed the Capitol on January 6, 2021, and to learn what major factors influenced them to engage in the insurrection that broke the tradition of peaceful transition of power for the first time since Lincoln’s Presidential election. It is also to study the current intertwined relationships between political elites, social media, technology, disinformation and mass audiences, and how they gathered together and organized the 'stop the steal' campaign, causing the violence on the Capitol on January 6, 2021. By studying this, we can learn how to prepare to face other looming and ongoing challenges that disinformation poses to democracy in the near future such as the mid-term election this November and the next Presidential Election in 2024, creating viable solutions. The thesis selected 124 subjects out of 691 on the Capitol Breach Cases' list across all regions of the U.S. It organized their data, including their names, and primary demographics such as gender, race, the geography of residence, and age, and reviewed and examined their attitudes towards the insurrection on January 6, 2021 in response to a belief that the 2020 election was fraudulent. The findings show that majority of participants are white male. 91.13% or 630 (0.9113 x 691 = 630) of whom are employed and 30% of or 207 (0.3 x 691) participants who are university or college educated. A number of defendants had associations with QAnon conspiracy theory and some known DVE (domestic violent extremist) groups such as Proud Boys, the Oath Keepers, and Three Percenters. The most striking finding is that veterans were highly over-represented in the mob (17% or 117), which exceeds the percentage of veterans in the U.S. population as a whole. The thesis suggests that four possible motivations for their participation: extremism in the military, nationalism and patriotism, a belief in Donald Trump's false claims, and social media. It also reveals that there is a strong positive connection between disinformation on social media and participants as they (96% of or 663 participants) were nearly all active on social media platforms such as Facebook, Twitter, Parler and Instagram, sharing and receiving misinformation about the election. More specifically, social media platforms should bear responsibility because social media technology employs popularity-based algorithms that tailor content to maximize user engagement, increasing the level of polarization, partisan animosity and political sectarianism

Cambridge, MA: Master's thesis, Harvard University Division of Continuing Education., 2022. 131p.

“Storming the Castle.” Examining the Motivations of the Veterans Who Participated in the Capitol Riots

By Eric B. Hodges

Ten percent of the Americans arrested for storming the US Capitol on January 6, 2021, are military veterans. These veterans have been charged with federal crimes ranging from Obstruction of an Official Proceeding to Assaulting Capitol Police Officers. This paper seeks to answer three questions related to those veterans’ participation in the Capitol Riots. Were their actions patriotic? What were their motivations? And was there anything about their military experience that made these veterans more likely to riot than non-veterans? A content analysis of 71 remarks made by 40 of the veterans arrested, both before and after the riots, was used to ascertain the motivations of those individuals. Analysis of the veterans’ comments revealed that they believed they were acting patriotically; however, closer examination shows that their motivations were more consistent with nationalism than patriotism. Additionally, the military training and combat exposure of the veterans, along with the “Stop the Steal” rhetoric, particularly comments made by former President Donald Trump, also played an integral role in influencing the veterans. The analysis also indicated that the Capitol Riots should be classified as a form of proto-sectarian violence and should serve as a cautionary tale against the growing divisiveness that sparked this incident.

Journal of Veteran Studies, 2021.

"This Is War": Examining Military Experience Among the Capitol Hill Siege Participants

By Daniel Milton and Andrew Mines

The issue of extremism in the military community has posed challenges for a long time. From the role of combat veterans in driving the rise of the militia movement after Vietnam and beyond, the U.S. military has contended with all manner of extremist movements and ideologies. Historically, extremist activities manifested in a number of ways, including attacks andor hate crimes against fellow service members and civilians, theft of military equipment, security breaches, and broader harm to morale, unit cohesion, personnel retention, recruiting efforts, and mission success. Although the vast majority of U.S. Department of Defense DoD personnel 5and veterans uphold our nations highest values during and well after their service, the worlds largest employer has struggled at times to confront a problem that affects all corners of American society. In the past decade, various organizations have raised serious red flags to both the DoD and Congressional oversight bodies regarding this looming threat. More recent reporting has pointed to growing evidence of white supremacy and racist ideologies in the military these last few years. Additionally, the siege on the U.S. Capitol and the surrounding focus on the involvement of individuals with military experience has highlighted the pressing need to take meaningful steps to understand and confront the problem at hand. To be clear, the Capitol Hill siege does not provide an all-encompassing view of modern day extremism in the military. However, an examination of the individuals charged in connection with that event can offer some perspective as to the diversity and scale of the connection between extremism and those with military experience.

Washington DC: Program on Extremism, George Washington University, West Point, NY: Combating Terrorism Center, West Point, New York: 2021. 44p.

United States: Domestic violent extremism on the rise

By Piotr Bąkowski

n recent years, the United States (US) has witnessed a growing number of terrorist attacks by domestic violent extremists. Many incidents at large-scale demonstrations across the country have increased the visibility of the problem and provoked strong reactions among civilians, law enforcement and policy-makers alike. When on 6 January 2021 a crowd of supporters of the then US President, Donald Trump, broke into the US Capitol while Congress was certifying the results of the 2020 presidential election, the issue of domestic violent extremism was thrust beyond US borders and into the international spotlight. Various US government agencies have consistently assessed domestic violent extremism as a significant threat. Although for counter-terrorism purposes extremists fall under a number of categories of a general nature, the threat they pose has become more decentralised and diverse over time. That said, racially and ethnically motivated violent extremists have been responsible for the most lethal acts of violence. After 11 September 2001, the focus of US counter-terrorism efforts shifted to international from domestic terrorism. US law does define domestic terrorism but does not qualify it as a criminal offence entailing indictment. Domestic extremist groups cannot be designated as terrorist organisations, and getting clearance to conduct investigations against them is more complicated than for their foreign counterparts. The assault on the Capitol led to a significant shift in counter-terrorism priorities, however, triggering the largest-scale investigation in US law enforcement history thus far, but also a comprehensive overhaul of government policies. Consequently, 2021 saw the adoption of the first national strategy specifically dedicated to domestic terrorism. The mutual commitment of the US and the European Union (EU) to combating violent extremism has resulted in fruitful exchanges among policy-makers, researchers and frontline practitioners. Nonetheless, efforts to establish a unified regulatory framework for addressing online extremist content have faced challenges due to differing perspectives on key issues such as the limits of free speech and government intervention.

Brussels, Belgium: EPRS | European Parliamentary Research Service, 2023. 12p.

“DIGITAL SOLDIERS” QAnon Extremists Exploit U.S. Military, Threaten Democracy

By Elizabeth Yates and Erin E. Wilson

This report examines how the QAnon movement exploits the U.S. military’s credibility in society to further its aim of undermining American democracy. It shows how 25 U.S. military veterans – all of whom have been engaged in the QAnon movement since the failed insurrection on January 6, 2021 – spread disinformation and build support for the movement. Analysis of their social media, along with a broader review of QAnon content, reveals how Q influencers portray the U.S. military as a heroic protagonist in their conspiratorial propaganda, and how they exploit military veterans to legitimate such claims and even recruit. It concludes with policy recommendations that focus on protecting members of the armed services, those who have served and their families, and communities the movement targets with its conspiracies

The mainstreaming of the QAnon extremist movement presents a growing threat to the American system of government. QAnon’s effort to create the perception that they are allied with the U.S. military has particularly alarming implications for our democracy:  It strengthens the QAnon movement by facilitating recruitment from both military and civilian communities and encourages active participation among adherents;  It lends legitimacy to discriminatory and anti-democratic conspiracies that are integrated into the Q movement, such as antisemitism and election denial;  It distorts the public’s understanding of the primary responsibilities of the military, and, importantly, the legal boundaries of domestic military intervention;  It undermines public faith in democratic institutions by regularly encouraging the acceptance of authoritarian actions; and  It threatens the communities the movement targets with its conspiracies and maligns the reputation of U.S. servicemembers, veterans, and their families.

New York: Human Rights First, 2022. 20p.

A Dangerous Web: Mapping Racially and Ethnically Motivated Violent Extremism

by Heather J. Williams, Luke J. Matthews, Pauline Moore, Matthew A. DeNardo, James V. Marrone, Brian A. Jackson, William Marcellino, Todd C. Helmus

Racially and Ethnically Motivated Violent Extremism: The Basics

Racially and ethnically motivated violent extremism (REMVE) refers to a loosely organized movement of individuals and groups that espouse some combination of racist, anti-Semitic, xenophobic, Islamophobic, misogynistic, and homophobic ideology. REMVE actors see their race or ethnicity under threat and promote the use of or engage in violence against a given population group. The majority of REMVE actors are motivated by cultural nationalism or White supremacy—beliefs that Caucasian or "Aryan" peoples represent superior races, and that "White culture" is superior to other cultures. Many REMVE actors also are motivated by White nationalism, which overlaps with White supremacy: Adherents espouse the belief that the White race is superior to others, and White nationalism emphasizes defining a country or region by White racial identity and promoting the interests of White people exclusively and at the expense of non-White populations.

More-common terms related to REMVE include far-right extremism, right-wing terrorism, radical right, or extreme right, which are used more frequently in literature and by other countries. Although these terms are not synonymous, they are used somewhat interchangeably and often without precise definitions. These terms also can be applied to political parties and movements that participate in political systems and do not engage in violence directly, particularly in Europe, where many parliamentary systems have formal far-right parties that participate in elections.

The U.S. State Department commissioned the RAND Corporation to produce a comprehensive network analysis of the White Identity Terrorist Movement (WITM) and REMVE in response to a congressional requirement from the 2021 National Defense Authorization Act.[2] The analysis—which sought to identify key actors, organizations, and supporting infrastructure and the relationships and interactions between them—is intended to inform a U.S. government strategy to counter REMVE.

Rand. 2022. 8p.

The Online Extremist Ecosystem: Its Evolution and a Framework for Separating Extreme from Mainstream

by Heather J. Williams, Alexandra T. Evans, Jamie Ryan, Erik E. Mueller, Bryce Downing

n this Perspective, the authors introduce a framework for internet users to categorize the virtual platforms they use and to understand the likelihood that they may encounter extreme content online.

The authors first provide a landscape of the online extremist "ecosystem," describing how the proliferation of messaging forums, social media networks, and other virtual community platforms has coincided with an increase in extremist online activity. Next, they present a framework to describe and categorize the platforms that host varying amounts of extreme content as mainstream, fringe, or niche. Mainstream platforms are those for which only a small portion of the content would be considered inappropriate or extreme speech. Fringe platforms are those that host a mix of mainstream and extreme content—and where a user might readily come across extreme content that is coded or obscured to disguise its violent or racist underpinning. Niche platforms are those that openly and purposefully cater to an extreme audience.

Santa Monica, CA: RAND, 2021. 44p.