Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts tagged radicalization
Far-Right Online Radicalization: A Review of the Literature

By Alice Marwick, Benjamin Clancy, Katherine Furl

This literature review examines cross-disciplinary work on radicalization to situate, historicize, frame, and better understand the present concerns around online radicalization and far-right extremist and fringe movements. We find that research on radicalization is inextricably linked to the post-9/11 context in which it emerged, and as a result is overly focused on studying the other. Applying this research to the spread of far-right ideas online does not account for the ways in which the far-right’s endorsement of white supremacy and racism holds historical, normative precedent in the United States. Further, radicalization research is rife with uncertainties, ranging from definitional ambiguity to an inability to identify any simplistic, causal models capable of fully explaining the conditions under which radicalization occurs. Instead, there are multiple possible pathways to radicalization, and while the internet does not cause individuals to adopt far-right extremist or fringe beliefs, some technological affordances may aid adoption of these beliefs through gradual processes of socialization. We conclude that the term “radicalization” does not serve as a useful analytical frame for studying the spread of far-right and fringe ideas online. Instead, potential analytical frameworks better suited to studying these phenomena include theories prominent in the study of online communities, conversion, mainstreaming, and sociotechnical theories of media effects.

A summary of key take-aways includes:

The adoption of extremist, far-right, and fringe beliefs is often referred to as “radicalization,” a term formulated post-9/11 to understand jihadi terrorism, a very different context from the far-right.

Radicalization research is full of uncertainty.

  • No specific type of person is vulnerable to radicalization, and most people who commit political violence are not mentally ill or alienated from society.

  • Radicalization is not caused by poverty, oppression, or marginalization.

  • There is no one way in which people are “radicalized.”

  • Viewing extremist media does not necessarily lead to adopting extremist beliefs or committing political violence.

In contrast to the “red pill” model, radicalization is gradual. Recruits slowly adopt the identities, emotions, and interpretations shared by a community. They conceptualize their problems as injustices caused by others, and justify using political violence against them.

The internet does not cause radicalization, but it helps spread extremist ideas, enables people interested in these ideas to form communities, and mainstreams conspiracy theories and distrust in institutions.

"Radicalization” is not a useful frame for understanding the spread of far-right and fringe ideas online.

  • It is analytically imprecise and morally judgmentalIt doesn’t help us understand the role of media and digital technologies.

  • It is inextricably tied to a global security infrastructure targeting Islam.

  • It doesn’t account for the fact that fringe or far-right beliefs may change what people think is “true” and “false,” making it hard to find common ground.

  • The focus on violence ignores other worrying effects of mainstreaming far-right and fringe ideas.

Publisher: Bulletin of Technology & Public Life, 2022. 83p.

Countering Radicalization to Violence in Ontario and Quebec: Canada's First Online-Offline Interventions Model

By Moonshot

Over a one year period from April 2021 - March 2022, Moonshot partnered with three violence prevention organizations to deliver an online interventions pilot in two Canadian provinces. The pilot advertised psychosocial support services to individuals engaging with extremist content online. Access to these services was voluntary, confidential, and anonymous by design. Our goal was to offer a secure pathway for at-risk individuals to contact a trained therapist or social worker. We built this approach around offering integrated care. Together with our intervention partners, we crafted our advertising messages and service websites to emphasize the confidential, non-judgemental support that callers would receive. Individuals who reached out were connected to an interdisciplinary team, which included a therapist, youth engagement workers, a psychiatrist, and other intervention staff who could offer services like counseling, employment support, addiction support, or simply a space to talk. Our partners were the Estimated Time of Arrival (ETA) team in Ontario, and Recherche et Action sur les Polarisations Sociales (RAPS) in Quebec. The Canadian Practitioners Network for the Prevention of Radicalization and Extremist Violence (CPNPREV) acted as a convening and best practice provider, and supported our pilot evaluation. A description of each organization is at the end of this report. Moonshot’s intervention campaigns ran for a total of six months, and reached individuals consuming incel and violent far-right extremist content on Google Search and YouTube. Our online interventions focused on meeting individuals’ psychosocial needs, and appealed to vulnerabilities and grievances, such as anger, frustration, exhaustion, and isolation. Executive summary Key outcomes Moonshot redirected 786 at-risk individuals to our intervention partners’ websites. 22 initiated a conversation with a counselor. Four individuals formally registered and engaged with a service provider for several months, in addition to those who accessed virtual counselling without going through the registration process. At least one person who initially shared violent impulses has been able to find positive, hopeful alternatives for the future. Moonshot’s ads reached users engaging with harmful content on Google and YouTube 44,508 times. Among the hundreds of users redirected to ETA and RAPS’ websites, 26 were watching influential incel YouTube channels and 39 had searched Google for high-risk keywords related to incel and violent far-right ideology (“looksmax org”; “1488 tattoos”). Moonshot, ETA, RAPS, and CPN-PREV established an effective multi-sectoral partnership. During our pilot program, we co-designed support pathways and risk escalation procedures for each service area, built teams’ capacity to deliver online interventions safely and effectively, and engaged at-risk audiences online. This pilot provides a blueprint for future interventions to reach and engage at-risk internet users. New iterations of this work can reach larger audiences by expanding advertising beyond the pilot platforms, strengthening and expanding cross-sectoral partnerships, and testing new ways to reach often-isolated internet users.

Washington, DC: Moonshot, 2023. 13p.

Terror Times: The Depth and Breadth of the Islamic State Alternative News Outlet Ecosystem Online

By Moustafa Ayad, Nadeem Khan and Aymenn al-Tamimi

his report highlights the networks, supporters, and the platforms of Islamic State disinformation disseminators, focusing on popular social media platforms as well as encrypted messaging applications. These disinformation networks are creating self-branded media outlets with followers in the tens of thousands, and often with innocuous names like “Global Happenings,” “DRIL” and “Media Center,” to evade moderation and takedowns. These same networks use coded language and a codebook of emojis to spread Islamic State “news” to other networks of supporters, who similarly evade moderation. These ‘alternative news outlets’ are trying to outcompete narratives publicized by government officials as well as independent mainstream media and individual journalists – groups that were also heavily targeted by Islamic State.

London: IDS - Institute for Strategic Dialogue, 2022. 22p.

Understanding Conspiracist Radicalisation: QAnon’s Mobilisation to Violence

By Anna Kruglova

This policy brief analyses the phenomenon of conspiracy theories, and how they fit in the realm of research on violent extremism. Using the case study of QAnon, this Policy Brief looks at how the movement mobilises people to violence on social media and attempts to determine how different this process is from any other process of radicalisation to violence. By combining discourse analysis of the movement’s Gab posts, interviewing former supporters, and analysing three illustrative case studies, this Policy Brief identifies five discourses - such as revenge, “the Other”, chosenness/ specialness, apocalypse, and urgency for action and altruism - that are used to bring people into the violent mindset. It emphasises the similarity of these discourses to the ones used by other extremist organisations and argues against exceptionalising the threat of QAnon and other conspiracy theories. It concludes by making recommendations about how to tackle QAnon propaganda.

The Hague: International Centre for Counter-Terrorism (ICCT) , 2023. 22p.

The Role of Violent Conspiratorial Narratives in Violent and Non-Violent Extreme Right Manifestos Online, 2015-2020

By William Allchorn, Andreas Dafnos and Francesca Gentile

  Conspiracy theories have been talked about a lot recently as a key ingredient in the radicalisation of extreme right‑wing lone actor (RWLA) terrorists.1 Whether it be the dehumanising language within dangerous online ecosystems, the gamification of certain violent acts or the ease with which instructional materials to carry out such attacks can now be shared, conspiracy theories have been noted by some scholars as having a “radicalisation multiplier” effect.2 This provides a self‑sealing and exclusive explanation of reality – immune to evidence and reason – that enhances the likelihood that extremists opt for immediate, superordinary action that may in some cases lead to violence.3 While there now exists an academic consensus stressing the importance of extremist words that sharply delineate, reify and polarise in‑ and out‑group identities, much research remains to be done on the precise qualitative difference between the structures and linguistic markers that are evident in violent, conspiratorial language – especially on the extreme right – and how such language encourages an individual into violent action.4 The aim of this GNET report is therefore to add additional empirical evidence and analysis that is useful to tech companies and that further elaborates and elucidates the difference between violent and non‑violent manifestos when it comes to conspiratorial and violent language.

London: The Global Network on Extremism and Technology (GNET), 2022 , 47p.

Islamophobia as a Form of Radicalisation: Perspectives on Media, Academia and Socio-political Scapes from Europe and Canada

Edited by Leen d’Haenens and Abdelwahed Mekki-Berrada

Foundations and mechanisms of Islamophobia in the West. Islamophobia as a Form of Radicalisation discusses the scope and fragmented boundaries of Islamophobia as a concept and a sociopolitical reality. The fifteen chapters of this collection cover and connect interdisciplinary research, media content analysis, media discourse analysis, ethnographic research, intersectoral advocacy work, and action research conducted in Belgium, Canada, France, Germany, Poland, Portugal, and Spain. Confronted with an Islamophobia that is growing as a symptom of broader societal malaise in the West, a resistance against it is also arising. It is now a question of better understanding the foundations and mechanisms of this meta-solidarity and resistance. Islamophobia as a Form of Radicalisation offers recommendations for urgent consideration by Muslim citizens of Canada and Europe, media professionals, civil society and academic stakeholders, policymakers at the municipal, provincial and federal levels

Leuven: Leuven University Press, 2023. 273p.

Radicalization in Theory and Practice: Understanding Religious Violence in Western Europe

Edited by Thierry Balzacq and Elyamine Settoul  

Radicalization is a major challenge of contemporary global security. It conjures up images of violent ideologies, “homegrown” terrorists and jihad in both the academic sphere and among security and defense experts. While the first instances of religious radicalization were initially limited to second-generation Muslim immigrants, significant changes are currently impacting this phenomenon. Technology is said to amplify the dissemination of radicalism, though there remains uncertainty as to the exact weight of technology on radical behaviors. Moreover, far from being restricted to young men of Muslim heritage suffering from a feeling of social relegation, radicalism concerns a significant number of converted Muslims, women and more heterogeneous profiles (social, academic and geographic), as well as individuals that give the appearance of being fully integrated in the host society. These new and striking dynamics require innovative conceptual lenses. Radicalization in Theory and Practice identifies the mechanisms that explicitly link radical religious beliefs and radical actions. It describes its nature, singles out the mechanisms that enable radicalism to produce its effects, and develops a conceptual architecture to help scholars and policy-makers to address and evaluate radicalism—or what often passes as such. A variety of empirical chapters fed by first-hand data probe the relevance of theoretical perspectives that shape radicalization studies. By giving a prominent role to first-hand empirical investigations, the authors create a new framework of analysis from the ground up. This book enhances the quality of theorizing in this area, consolidates the quality of methodological enquiries, and articulates security studies insights with broader theoretical debates in different fields including sociology, social psychology, economics, and religious studies.

Ann Arbor: University of Michigan Press, 2022. 297p.

Tackling Online Terrorist Content Together: Cooperation Between Counterterrorism Law Enforcement and Technology Companies

By Macdonald, Stuart Keith, 1979-; Staniforth, Andrew

From the Executive Summary: "Cooperation between law enforcement and tech companies is widely regarded as necessary to tackle online terrorist content. Both sectors have publicly stated their commitment to working together and there are examples of mutual cooperation. Yet there are also impediments to such collaboration, including different cultures and operating practices, and there have been high-profile instances of non-cooperation. The informality of existing collaborations has also led to concerns about censorship, mission creep and a lack of accountability and oversight. The focus of this report is on how to resolve the impediments to closer cooperation between law enforcement and the tech sector in order to realise the benefits of mutual collaboration, while simultaneously addressing concerns about due process and accountability. The report utilises an interview-based methodology to examine the experiences and opinions of personnel from both sectors who have first-hand experience of mutual cooperation. It provides empirically grounded insights into this under-researched topic."

Global Network On Extremism And Technology (Gnet). 2023. 38P.

Counting Terrorism: Psychosocial Strategies

Edited ny Updesh Kumar and Manas K. Mandal

In the recent years, more so after the 9/11 twin towers and the 26/11 Mumbai attacks, there have been numerous discourses on terrorism and counterterrorism. Terrorism as a phenomenon does not originate in isolation; rather it is, generally, a reaction to certain specific social and contextual circumstances leading to grievances among people. Therefore, in order to understand the roots and basis of terrorism, there is a pressing need to analyze specific social, cultural, political, and psychological contexts in which it flourishes. Countering Terrorism: Psychosocial Strategies works on this premise and penetrates into this psycho-socio-cultural milieu that serves as a context for the proliferation of violence through acts of terror. With contributions from experts from the developed as well as developing countries of the world, the book has ecumenical focus on terrorism from all possible angles and covers the multiplicity of perceptions and interpretations on the issue. The volume will ignite the mind of the reader toward latent variables that may be considered while carrying out research in this area. This book brings together the minutest aspects related to the burning issue of terrorism, which exploits the precious resources of nations and scars the minds of the people.

New Delhi. Sage Publications.2012. 450p.

Radical Collections: Re-examining the roots of collections, practices and information professions

Edited by Jordan Landes and Richard Espley

Do archivists ‘curate’ history? And to what extent are our librarians the gatekeepers of knowledge? Libraries and archives have a long and rich history of compiling ‘radical collections’- from Klanwatch Project in the States to the R. D. Laing Archive in Glasgow, but a re-examination of the information professions and all aspects of managing those collections is long overdue. This new book shines a light on pressing topical issues within library and information services (LIS)- to encompass selection, appraisal and accession, through to organisation and classification, and including promotion and use. Will libraries survive as victims of neoliberal marketization? Do we have a responsibility to collect and document ‘white hate’ in the era of Trump? And how can a predominantly white (96.7%) LIS workforce effectively collect and tell POC histories?

London: University of London,  Senate House Library, 2018. 94p.

Radical Spaces: Venues of popular politics in London, 1790-c. 1845

By Christina Parolin

Radical Spaces explores the rise of popular radicalism in London between 1790 and 1845 through key sites of radical assembly: the prison, the tavern and the radical theatre. Access to spaces in which to meet, agitate and debate provided those excluded from the formal arenas of the political nation–the great majority of the population–a crucial voice in the public sphere. Radical Spaces utilises both textual and visual public records, private correspondence and the secret service reports from the files of the Home Office to shed new light on the rise of plebeian radicalism in the metropolis. It brings the gendered nature of such sites to the fore, finding women where none were thought to gather, and reveals that despite the diversity in these spaces, there existed a dynamic and symbiotic relationship between radical culture and the sites in which it operated. These venues were both shaped by and helped to shape the political identity of a generation of radical men and women who envisioned a new social and political order for Britain.

Canberra: ANU Press, 2010. 352p.

National Strategy on Countering Radicalization to Violence

By Public Safety Canada

Canada faces the threat of violence by a small number of individuals who have become radicalized for political, religious or other ideological reasons. The Government of Canada is concerned with all forms of violent extremism, not associating this phenomenon with any particular religious, political, national, ethnic, or cultural group. While Canada has faced a variety of threats stemming from violent extremism in recent decades, the main terrorist threat to Canada continues to be violent extremists inspired by terrorist groups such as Daesh and al-Qaeda. However, individuals espousing and engaging in violence can be inspired by any extremist group promoting such behaviour. For example, some individuals within the far-right movement have espoused, glorified, promoted, and even engaged in violence. As well, historically, some far-left extremists have taken part in violent acts such as pipeline bombings. The Government of Canada is also alerted to the dangers of lesser-known forms of violent extremism. In its ongoing efforts to keep Canadians safe, the Government of Canada is expanding how it responds to violent extremism. Specifically, the federal government is investing in the prevention of radicalization to violence as articulated through the National Strategy on Countering Radicalization to Violence. Prevention aims to thwart violent radicalization from happening in the first place and to intervene as early as possible when it is occurring. Preventing and countering violent extremism is an effective complement to security agencies’ traditional methods of safeguarding national security.

Ottawa: Public Safety Canada, 2018. 46p.

Hate, Extremism, and Terrorism In Alberta, Canada, and Beyond: The Shift from 2019 to 2022

By Michele St-Amant, David Jones, Michael King, and John McCoy

There have been significant changes in the three years since the Organization for the Prevention of Violence (OPV) published its first report about hatemotivated violence, extremism and terrorism in Alberta, Building Awareness, Seeking Solutions. The Covid-19 pandemic, protests against public health measures, tense elections in the United States, and the backlash to racial justice movements, among other events, have had broad social repercussions. Some of which have changed the composition and scale of the threat of extremism and terrorism – which has become more diffuse and comprised of a broader set of grievances and ideologies. This report is organized using the nomenclature developed by the Government of Canada to categorize different forms of extremist ideologies. As such, the findings related to ideologically motivated violent extremism and religiously motivated violent extremism are summarized first.i Next, we summarize our findings about conspiracy theories and hate incidents, including crimes, within Alberta and across Canada.

Edmonton, Alberta: Organization for the Prevention of Violence, 2022. 115p.

Fear Thy Neighbor: Radicalization and Jihadist Attacks in the West

By Lorenzo Vidino, Francesco Marone and Eva Entenmann

Over the last three years Europe and North America have been hit by an unprecedented wave of terrorist attacks perpetrated by individuals motivated by jihadist ideology. The roots of this development are largely to be found in two, deeply intertwined phenomena: the military successes achieved by the Islamic State and its declaration of a Caliphate along with the large number of followers the group has managed to attract in the West. This report identified 51 successful attacks throughout Europe and North America from June 2014, when the Caliphate was declared, until June 2017. From coordinated operations causing large numbers of casualties like the November 2015 Paris attacks, to the many acts of violence carried out by lone attackers, the attacks vary significantly in terms of sophistication, lethality, targets and connectivity to the Islamic State and other groups. Similarly, the profile of the 65 identified involved in the 51 attacks is extremely heterogeneous from both demographic and operational perspectives.

Milano, Italy: Ledizioni LediPublishing, 2017. 108p.

Terrorist Recruitment in American Correctional Institutions: An Exploratory Study of NonTraditional Faith Groups

By Mark S. Hamm

Today, there are thousands of followers of non-Judeo-Christian faith groups in American correctional institutions. Research suggests that many of these prisoners began their incarceration with little or no religious calling, but converted during their imprisonment. According to the FBI, some of these prisoners may be vulnerable to terrorist recruitment. The purpose of this research is three-fold: (1) to collect baseline information on nontraditional religions in United States correctional institutions; (2) to identify the personal and social motivations for prisoners’ conversions to these faith groups; and (3) to assess the prisoners’ potential for terrorist recruitment. The study creates a starting point for more in-depth research on the relationship between prisoners’ conversion to nontraditional religions and extremist violence. The work is organized into five chapters. Chapter 1 presents a comprehensive review of the literature bearing on the research objectives. This includes an historical overview of Moorish Science Temple and the Nation of Islam, American versions of Islam that have played an important role in radicalizing prisoners through religious identity. The review shows that there are currently opposing views about Islam in prison. One side of the debate takes the position that the Muslim faith offers prisoners a viable path to rehabilitation. The opposing view claims that Islamic prisoners are a threat to U.S. security. Criminological evidence shows that the greatest danger to security is found in mutating forms of “Prison Islam.” Other evidence indicates that the threat emanates from dozens of high-profile terrorists who are already serving lengthy sentences in American correctional facilities.

Terre Haute, IN: Department of Criminology, Indiana State University, 2007. 129p.

Countering Online Radicalization in America

By Peter Neumann

The Internet has revolutionized the way all of us communicate and do business. Its benefits to people everywhere have been enormous and will continue to drive progress in practically every area of life. At the same time, it should be recognized that, while being a force for good, the Internet has also come to play an important—and, in many ways, unique—role in radicalizing homegrown and domestic terrorists. Supporters of Al Qaeda, Sovereign Citizens, white supremacists and neo-Nazis, environmental and animal liberationists, and other violent extremist groups all have embraced the Internet with great enthusiasm and vigor. They are using it as a platform to spread their ideas, connect with each other, make new recruits, and incite illegal and violent actions. We believe that this trend will continue and that future terrorist attacks against the United States and its interests will involve individuals who have been radicalized—at least in part—on the Internet. As a result, countering online radicalization should continue to be a major priority for the government and its Countering Violent Extremism (CVE) efforts. The purpose of this report is to equip policy makers with a better understanding of how the Internet facilitates radicalization, in particular within the United States; an appreciation of the dilemmas and trade-offs that are involved in countering online radicalization within the United States; and ideas and best practices for making the emerging approach and strategy richer and more effective

Washington, DC: Bipartisan Policy Center’s National Security Preparedness Group (NSPG). 2012. 56p.

Preventing Violent Radicalization in America

By Peter Neumann

Last September, we released a report, Assessing the Terrorist Threat, on the evolving nature of this threat to the United States. We concluded that the U.S. government had not adequately addressed the radicalization of homegrown terrorists. We set forth several pressing policy questions, including the fundamental question of who within the government is responsible for identifying radicalization and interdicting attempts at recruitment. This report seeks to answer those questions and provide concrete policy recommendations for a counter-radicalization strategy – the elements of which should be implemented not just by the federal government, but by state and local officials and community organizations.

Washington, DC: Bipartisan Policy Center’s National Security Preparedness Group (NSPG), 2011. 56p.

Networked Radicalization: A Counter-Strategy

By F. Cilluffo, G.B. Saathoff, et. al

Savvy use of the Internet has empowered terror networks to expand their reach beyond national borders by enabling wide distribution of a compelling message and social connectivity with new audiences. Use of computer-mediated communication (CMC) has made a range of terrorist operational activities cheaper, faster, and more secure, including communications, fundraising, planning and coordination, training, information gathering and data mining, propaganda and misinformation dissemination, and radicalization and recruitment. The list is long, and not even complete. Before the Internet, terrorists seeking to communicate with one another through electronic means used telephones or radios, which could be tapped. Terrorists seeking to offer training meant congregating trainers and trainees in a fixed training location, exposing the group to capture or worse. Terrorists or their supporters engaged in fundraising or recruitment often pursued these aims in public settings. And terrorists researching a potential target often did so at public libraries and bookstores, subjecting them to surveillance in these public spaces. Now, with the Internet, all of these same activities can be conducted in relative anonymity from safe locations across the globe.

Washington, DC: Homeland Security Policy Institute, The George Washington University; Charlottesville, VA: The Critical Incident Analysis Group (CIAG) University of Virginia School of Medicine, 2007. 34p.

Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review

By Alex P. Schmid

Based on an in-depth literature review, Research Fellow Dr. Alex P. Schmid explores the terms “radicalisation”, “de-radicalisation” and “counter-radicalisation” and the discourses surrounding them. Much of the literature on radicalisation focuses on Islamist extremism and jihadist terrorism. This is also reflected in this Research Paper which explores the relationship between radicalisation, extremism and terrorism. Historically, “radicalism” – contrary to “extremism” – does not necessarily have negative connotations, nor is it a synonym for terrorism. Schmid argues that both extremism and radicalism can only be properly assessed in relation to what is mainstream political thought in a given period. The paper further explores what we know well and what we know less well about radicalisation. It proposes to explore radicalisation not only on the micro-level of “vulnerable individuals” but also on the meso-level of the “radical milieu” and the macro-level of “radicalising public opinion and political parties”. The author reconceptualises radicalisation as a process that can occur on both sides of conflict dyads and challenges several widespread assumptions. The final section examines various counter-radicalisation and deradicalisation programmes. It concludes with a series of policy recommendations.

The Hague: International Centre for Counter-Terrorism, 2013. 105p.

Recruitment and Radicalization among US Far-Right Terrorists

By Pete Simi, Steven Windisch, Karyn Sporer

This report presents findings from a two-year study, “Recruitment and Radicalization among US Far-Right Terrorists.” This investigation examines multiple aspects of recruitment and radicalization, such as the quality and quantity of exposure to right-wing ideologies prior to extremist involvement; types of recruitment; pre-entry risk factors for extremist participation; and the extremists’ perception about why he/she was unable to progress beyond the planning stages of a terror plot. The empirical analysis is divided into four distinct but overlapping reports. Report one consists of a comprehensive thematic assessment, which focuses on family socialization prior to extremist involvement; entry processes into extremism; recruitment strategies and the extremist subculture of violence. In terms of socialization, although only a small segment of our sample (n=3, 9.7%) were raised by parents who were members of extremist groups, a vast majority (n=28, 90.3%) were exposed to racist/anti-Semitic beliefs during childhood. Regarding motivation for entry into violent extremism (VE), our findings indicate a variety of non-ideological factors increased the appeal of these groups such as acceptance from peers, attraction to the group’s forbidden social image and the ability to increase ones’ level of personal significance. In addition, participants also felt the group offered protection from bullies at school and rival gangs in their neighborhoods. In terms of recruitment, extremist groups relied on a variety of marketing strategies (e.g., leafleting and house parties) in order to promote their political agenda. Our data suggest these groups targeted marginalized youth who were angry and looking for solutions to their problems. However, the most effective recruitment tool was extremist music. Music provided recruiters with opportunities to introduce potential recruits to the extremist subculture in venues and through mediums with decreased monitoring from agents of formal social control. In addition, report one also examines the violent subculture of right-wing extremist groups. As part of this discussion, we highlight the role of various cultural practices such as violent rituals which were used to increase commitment to the group and to distinguish strong members from weaker ones. As our data indicates, however, there does seem to be a threshold for violence. That is, some extremists condemned violence when it was directed towards “defenseless” targets. Overall, these findings underscore the similarities individuals experience throughout their extremist careers.

College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism (START), 2016. 260p.