Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts tagged radicalization
Evaluations of countering violent extremism programs: Linking success to content, approach, setting, and participants

By Wesam Charkawi , Kevin Dunn ,  Ana-Maria Bliuc

Since the September 11 attacks, prevention and countering violent extremism (P/CVE) programs have rapidly increased worldwide, garnering significant interest among researchers. This paper is a systematic review focusing on the evaluations of primary, secondary and tertiary prevention programs from 2001 until 2020. The review identified 74 program evaluations that included satisfactory measures and metrics. Only 32% of the studies deemed the intervention successful, 55% described limited success, and 8% deemed the program had failed. Many of the programs evaluated failed to reach their objectives; some generated negative outcomes such as community disdain and an increase in the likelihood of alienation and stigma. Success was largely a self-assessed measure by the facilitators or stakeholders of the programs or the evaluators of the study. Success indicators can be operationalized as the degree of enhanced sense of belonging (connectedness to the community, social connection), trust and willingness to engage in programs, development of critical thinking skills (integrative complexity theory), and a strong sense of worth (quest for significance). Without a generally accepted set of metrics and no cohesive framework for conducting evaluations, this review offers an important addition to the field on the evidence suitable for program evaluations. An important aim of this systematic review was to identify what makes an effective and successful countering violent extremism program. The key findings indicate that enhancing belonging, identity, trust and community engagement, acknowledging perceptions of injustice, religious mentoring, and the promotion of critical thinking/self-reflection are associated with successful programs. The findings press upon policymakers, funders, and researchers the need to consider and support high-quality evaluations of programs.

International Journal of Law, Crime and Justice, 2024., 19p.

The Role of Antisemitism in the Mobilization to Violence by Extremist and Terrorist Actors, 

By Alexander Ritzmann With contributions by Jean-Yves Camus, Joshua Fisher-Birch, Bulcsú Hunyadi, Jacek Purski and Jakub Woroncow  

• This report explores the role of antisemitism in mobilizing extremist and terrorist actors to violence, focusing on trends and patterns across France, Germany, Hungary, Poland and the United States. It discusses antisemitic narratives, key antisemitic actors, transnational connections, dissemination strategies, and provides policy recommendations. • Antisemitic narratives serve as tools to justify violence across ideological lines, framing Jewish communities and individuals as threats or scapegoats. Rightwing extremists propagate conspiracy theories like the “Great Replacement,” portraying Jews as orchestrating adverse societal change. Islamist extremists often conflate Jewish identity with global oppression, particularly in the Israeli-Palestinian conflict. Left-wing extremists link Jews to capitalism or imperialism, using antizionism to mask antisemitism. These narratives are adapted to local and geopolitical contexts, reinforcing the targeting of Jewish communities and individuals. • The report documents a sharp increase in antisemitic incidents following the October 7, 2023, Hamas attacks and ensuing war. Violent antisemitic rhetoric has spiked in demonstrations and online discourses. Islamist extremist networks, left-wing extremist actors and pro-Palestinian extremist groups have particularly amplified violent antisemitic sentiments under the guise of antizionist rhetoric, sometimes overlapping with traditional right-wing antisemitic themes. • Transnational networks facilitate the spread of antisemitic narratives. Right-wing extremist groups connect online and through events and annual marches, while Islamist extremist groups leverage shared ideological or religious frameworks to justify violence. Left-wing extremist and pro-Palestinian extremist groups maintain operations across Europe and in the U.S., amplifying violent antisemitic narratives. Shared slogans, symbols, and coordinated protests underline their interconnectedness. • In some countries, an increase in violent attacks against Jewish or Israeli targets has been documented. • The report emphasizes that the concept of combatting organized antisemitism should be added to strategies that aim at targeting violence-oriented antisemitic actors. Such professional organized antisemitic actors often operate in (transnational) networks, utilizing online platforms and offline activities to propagate hate and justify or conduct violence. • The report also calls attention to the role of states like the Islamic Republic of Iran and the Russian Federation in fostering violent antisemitism through proxies and propaganda. • Policy recommendations include focusing on identifying and disrupting key antisemitic actors, enhancing data collection and analysis, and fostering international collaboration. The report also stresses the need for tailored preventative and educational initiatives and stricter online content regulation and enforcement to combat the spread of antisemitism and its violent manifestations. 

Counter Extremism Project, 2025. 153p.

Comparing Individuals Who Engage in Violent Extremism and Similar Acts in Violent Extremism and Similar Acts. What Research Sponsored by the National Institute of Justice Tells Us

By Kateira Aryaeinejad and Thomas Leo Scherer

Over the years, the National Institute of Justice’s (NIJ) funding for research has provided important opportunities to advance our understanding of topics related to crime and justice within the United States. Drawing from this portfolio, this synthesis paper compares and contrasts the data and findings from NIJ-sponsored research projects on violent extremism, mass shootings, and bias crimes. This comparison focuses both on the content of the data and on the creation and coverage of the data, examining findings from four research projects: ■ The Profiles of Individual Radicalization in the United States (PIRUS) database of 2,226 individuals who demonstrated at least 1 of 5 extremist or radicalized behaviors. ■ The Bias Incidents and Actors Study (BIAS) database of 966 adults arrested or indicted for bias crimes. ■ The National Hate Crime Investigation Study (NHCIS) database of 1,230 hate crime cases. ■ The Violence Project dataset of 172 mass shootings. This synthesis first reviews the creation of each dataset and the types of information that are collected to better understand their generalizability and the ability to make comparisons across separate datasets. There are significant differences in the size, time span, and information of the four datasets, which limits the comparisons that can be made between the individuals described in each dataset and necessitates caution in drawing strong conclusions from such comparisons. With that caution in mind, the datasets suggest some similarities in the individuals who commit bias crimes and mass shootings and display violent extremist behavior. These individuals are primarily males in their 20s and 30s and unmarried at the time of their offenses. They may exhibit higher rates of unemployment than the general population and often have prior criminal histories. However, that is not to say that these characteristics should be used as a profile to determine who is at risk of or more likely to commit any of these types of offenses or behaviors. Rather, it calls into question what other factors may be impacting individuals with these characteristics who go on to commit these types of offenses. The datasets also suggest some differences in the individuals who commit each type of offense or behavior. Individuals associated with violent extremism tend to be more educated than those who commit mass shootings or bias crimes. Individuals who commit mass shootings exhibit higher rates of mental health issues than those who commit bias crimes or participate in violent extremism offenses. The comparison of individuals across categories also highlighted differences among individuals who committed the same type of offense. Among individuals who supported violent extremism, for example, those acting in support of far-right ideologies were more likely to have military experience than those following other ideologies. Comparing these datasets highlights their potential and their limitations, suggesting paths forward for future research. The different collection methods show the importance of precisely describing the data collection method, discussing which behaviors are missed by that method, and triangulating among data with different methods to understand what is missing. The differences in the types of information that each dataset collects about each individual and action suggest that future collections could have greater overlap and comparability. The establishment of potential similarities in demographics and life experiences also allows for more targeted data collection focusing on why most individuals who fit that profile do not commit an offense, while others do. In this way, these projects not only contribute to our current understanding of these types of offenses and behaviors but also allow future research and programming to be conducted more effectively.

Washington, DC : U.S. Department of Justice, Office of Justice Programs, National Institute of Justice, 2024. 43p.

Hizb ut -Tahrir Bangladesh: A Growing Threat and the Need for Action

By Iftekharul Bashar

Hizb ut-Tahrir Bangladesh, an extremist organisation banned since 2009, is swiftly expanding by recruiting Bangladeshi youth through social media and educational institutions. The group’s recent rally in Dhaka, attended by over 2,000 supporters, underscores its resurgence and the growing challenge for the government. Bangladesh must recalibrate its response to this threat by strengthening law enforcement measures, enhancing counter-radicalisation programmes, and creating job and entrepreneurship opportunities for its youth.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 4p.

The Lone Wolf Threat Posed by Former JI Members

By Irfan Idris and Kusumasari Ayuningtyas

The ideological influence of Jemaah Islamiyah continues to be a threat to security even after its disbandment in June 2024. Some of its former members may align with other extremist groups, while others may seek to operate as lone-wolf terrorists. The possibility of JI’s former members transitioning into lone wolf actors stems from the enduring power of its ideology and indoctrination process.

S. Rajaratnam School of International Studies, NTU Singapore, 2025, 3p.

Reclaiming Asabiya to Counter Extremism and Foster Unity

By Noor Huda Ismail

The concept of asabiyya – group solidarity – originally articulated by Ibn Khaldun, has been hijacked by extremist groups in Southeast Asia to create division and promote radical ideologies. Reclaiming asabiya is crucial, redefining it as a tool for social cohesion and unity by drawing on cultural values that foster mutual respect and collective responsibility. Regional cooperation and digital counter-narratives are essential in countering extremism and fostering long-term peace in the region.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 4p.

Understanding EU Counter-Terrorism Policy

By Piotr Bąkowski


Faced with a persistent terrorist threat, the European Union (EU) is playing an increasingly ambitious role in counter-terrorism. While primary responsibility for combating crime and ensuring security lies with the Member States, the EU provides cooperation, coordination and (to some extent) harmonisation, as well as financial support, to address this borderless phenomenon. Moreover, awareness of the connection between development and stability, as well as between internal and external security, has come to shape EU action beyond Union borders. EU spending on counter-terrorism has increased over the years, to allow for better cooperation between national law enforcement authorities and enhanced support by the EU bodies in charge of security and justice, such as Europol, eu-LISA and Eurojust. The many new rules and instruments that have been adopted in recent years focus, among other things, on harmonising definitions of terrorist offences and sanctions, sharing information and data, protecting borders, countering terrorist financing and regulating firearms. However, implementing and evaluating the various measures is a challenging task. The European Parliament has played an active role not only in shaping legislation, but also in evaluating existing tools and gaps through the work accomplished by its Special Committee on Terrorism (TERR) in 2018. In line with the Parliament's recommendations, as well as the priorities set by the European Commission and its counter-terrorism agenda presented in December 2020, EU counter-terrorism action has focused on doing more to anticipate threats, counter radicalisation, and reduce vulnerabilities by making critical infrastructures more resilient and improving the protection of public spaces. The EU will also continue to address the online dimension of various forms of extremism, in line with the regulations on dissemination of terrorist content online and on the provision of digital services in the EU. This briefing updates an earlier one, entitled Understanding EU counter-terrorism policy, published in 2023.


Brussels: EPRS | European Parliamentary Research Service, 2025. 12p.

The Rise of Radicalism in Bangladesh: What Needs to Be Done

By Iftekharul Bashar

In 2024, Bangladesh faces a growing threat of radicalism fuelled by political instability, security vacuums, and weakened counterterrorism infrastructure. Unless the interim government adopts a zero-tolerance policy and strengthens law enforcement and intelligence efforts, extremist groups may gain further ground, leading to long-term instability. COMMENTARY Bangladesh is facing an increasing threat of radicalism and terrorism. The political violence and instability of 2024 have worsened the situation, with extremist elements exploiting the security vacuum created by the regime change. Weakened law enforcement and intelligence agencies, along with the rise of armed groups and radical ideologies, pose a serious threat to the country’s stability. Bangladesh risks long-term insecurity with broader regional implications without swift and decisive action.

Singapore: S. Rajaratnam School of International Studies (RSIS), NTU , 2024. 4p.

Staunching The Rise of Terrorist Fighters

By Rohan Gunaratna

The conflicts in Israel, Gaza, Lebanon, Yemen and Syria will have a generational impact. The 7 October 2023 attack against Israel in Gaza and its consequences have set back the prospects of a two-state solution to the Palestinian issue and may attract a new wave of foreign fighters to embark on terrorist activities like what was seen following the military debacles in Afghanistan, Iraq and Syria. What can be done to stem another rise of the terrorist fighters?

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 3p.

Profiles of Individual Radicalization in the United States (PIRUS)

By Michael Jensen, Sheehan Kane, and Elena Akers

Profiles of Individual Radicalization in the United States (PIRUS) is a database of 3,203 Islamist, far-left, far-right, and single-issue extremists who have radicalized to violent and non-violent extremism in the United States from 1948 through 2021. This update adds 955 subjects to the database who were charged with committing extremist crimes in the United States from 2019-2021.1 The database is freely available for download on START’s webpage at https://www.start.umd.edu/profiles-individual-radicalization-united-states-pirus-keshif. The analysis for this research brief draws on the full dataset and illustrates the important differences that exist across ideological groups and highlights recent trends in the data.

College Park, MD: START , 2023. 10p.

Profiles of Individual Radicalization in the United States (PIRUS): Mass Casualty Extremist Offenders

By Michael Jensen, Sheehan Kane, and Elena Akers

Included with the current update to the Profiles of Individual Radicalization in the United States (PIRUS) data are a suite of variables that allow users to investigate extremist offenders who plotted to commit, or committed, mass casualty attacks in the United States from 1990-2021. A mass casualty plot is defined as an event in which the perpetrator(s) intended to kill or injure four or more victims. Unlike other data resources on mass casualty events, PIRUS allows users to investigate successful mass casualty attacks as well as unsuccessful plots where the perpetrators clearly intended to kill or injure four or more people but failed. The inclusion of failed and foiled mass casualty plots in PIRUS gives users a more accurate estimate of how often extremists plan to cause significant harm. It also allows users to compare ideological groups and offenders on measures of plot success. This research brief provides an overview of the mass casualty crimes in PIRUS, including their frequency, links to ideological and sub-ideological groups, and a comparison of their perpetrators.

College Park, MD: START (March). 2023, 4p.

Cognitive and Behavioral Radicalization: A Systematic Review of the Putative Risk and Protective Factors

By Michael Wolfowicz, Yael Litmanovitz, David Weisburd, and Badi Hasisi

Abstract Background: Two of the most central questions in radicalization research are, (1)why do some individuals radicalize when most of those from the same groups or exposed to similar conditions do not? and (2) why do radicalized individuals turn to radical violence while the majority remain inert? It has been suggested that the answer to both questions lie in the cumulative and interactive effects of a range of risk factors. While risk assessment and counter‐radicalization take a risk‐protectivefactor approach, there is widespread debate as to what these factors are and which are most important.Objectives: This review has two primary objectives.1) To identify what the putative risk and protective factors for different radica-lization outcomes are, without any predeterminations.2) To synthesize the evidence and identify the relative magnitude of the effects of different factors.The review's secondary objectives are to:1) Identify consistencies in the estimates of factors across different radicalizationoutcomes.2) Identify whether any significant heterogeneity exists within factors between(a) geographic regions, and (b) strains of radicalizing ideologies.Search Methods: Over 20 databases were searched for both published and gray literature. In order to provide a more comprehensive review, supplementary sear-ches were conducted in two German and one Dutch database. Reference harvesting was conducted from previous reviews and contact was made with leading researchers to identify and acquire missing or unpublished studies.Selection Criteria: The review included observational studies assessing the out-comes of radical attitudes, intentions, and/or radical behaviors in OECD countries and which provided sufficient data to calculate effect sizes for individual‐level risk and protective factors.Data Collection and Analysis: One‐hundred and twenty‐seven studies, containing 206 samples met the inclusion criteria and provided 1302 effect sizes pertaining to over 100 different factors. Random effects meta‐analyses were carried out for each factor, and meta‐regression and moderator analysis were used to explore differ-ences across studies.Results: Studies were primarily cross‐sectional, with samples representing 20 OECD countries. Most studies examined no specific radicalizing ideology, while others focussed on specific ideologies (e.g., Islamist, right‐wing, and left‐wing ideologies). The studies generally demonstrated low risk of bias and utilized validated or widely acceptable measures for both indicators and outcomes.With some exceptions, sociodemographic factors tend to have the smallest estimates, with larger estimates for experiential and attitudinal factors, followed by traditional criminogenic and psychological factors.Authors' Conclusions: While sociodemographic factors are the most commonly examined factors (selective availability), they also tend to have the smallest es-timates. So too, attitudinal and even experiential factors, do not have effect sizes of the magnitude that could lead to significant reductions in risk through tar-geting by interventions. Conversely, traditional criminogenic factors, as well as psychological factors tend to display the largest estimates. These findings suggest the need to broaden the scope of factors considered in both risk assessment and intervention, and this review provides much needed evidence for guiding the selection of factors

Campbell Systematic Reviews: Volume 17, Issue 3 September 2021, 90 p.

30 Years of Trends in Terrorist and Extremist Games

By Emily Thompson and Galen Lamphere-Englund

Violent extremist, terrorist, and targeted hate actors have been actively exploiting video games to propagandise, recruit and fundraise for more than 30 years. This report presents an analysis of that history using a unique dataset, the Extremist and Terrorist Games Database (ETGD), developed by the authors. It contains 155 reviewed entries of standalone games, modifications for existing games (mods) and browser‑based games dating from 1982 to 2024. The titles analysed appear across the ideological spectrum: far right (101 titles), jihadist (24), far left (1) and other forms of extremism and targeted hate (29), including school‑massacre ideation (12). They span platforms ranging from simple standalone games for Atari in the 1980s to sophisticated mods for some of today’s most popular games. The number of titles has increased year on year – in line with global conflict and extremist ideological trends, and revealing a continued push by malicious actors to exploit gaming. Meanwhile, the means of distribution have shifted from violent extremist organisations and marketplaces – such as white supremacist, neo‑Nazi and jihadist organisations – to distributed repositories of extremist games hosted on internet archives, Ethereum‑hosted file‑sharing, Telegram and with subtly coded titles on mainstream platforms like Steam. While most of the titles in the ETGD are available for free, several that have been sold (often at symbolic prices like $14.88 or $17.76) appear to have generated revenue for groups ranging from Hezbollah to the National Alliance, an American neo‑Nazi group. Through new analysis of Steam data, we also show that a small number of extremist and targeted hate titles have generated almost an estimated $600,000 in revenue for small publishers on the platform. Far from being a comprehensive analysis of the ETGD, we intend this preliminary launch report to form a basis for future research of the dataset and a framework for continued contributions to the ETGD from Extremism and Gaming Research Network (EGRN) members. Above all, we seek to contribute to sensible policymaking to prevent violent extremism that situates games as part of a wider contested and exploited information space, which deserves far more attention from those working towards peaceful ends.

Complete recommendations are provided in the conclusion section of this report, but include the following: 1. Prohibit and prevent violent extremist exploitation: Gaming platforms should explicitly prohibit violent extremist and terrorist behaviours and content. Leadership exists here from Twitch, Discord, Microsoft/Xbox and the affiliated Activision‑Blizzard. a. Audio and video platforms, such as Spotify, Apple Music and YouTube should seek to identify extremist gaming content currently available under misleading titles and tags. b. Flag and remove extremist titles across platforms: Hashing and preventing outlinking to ETGD games and links should be a priority across platforms. 2. Improve reporting mechanisms: Platforms must improve reporting mechanisms to make it easier for players to report violative content found in games and in‑game conduct. 3. Understand and take down distributed repositories: Larger repositories of extremist gaming content readily available on the surface web accelerate user exposure. 4. Collaborate across sectors: Addressing the spread of extremist games requires a collaborative effort between tech companies, government agencies and civil society organisations. 5. Educate across sectors: Programmes supporting educators and frontline community moderators should be developed. 6. Support research and innovation: Including cross‑sector initiatives like the Global Network on Extremism and Technology (GNET) and EGRN, which produced this database. 7. Enhance regulatory frameworks: Governments should update regulatory frameworks applying to digital platforms, recognising the nuances of gaming platforms and complying with human rights. 8. Encourage positive community engagement: Thoughtful, well designed community guidelines, moderation policies and reporting mechanisms can support community‑building.

London: The Global Network on Extremism and Technology (GNET). 2024. 40p.

Hostage to Violent Extremism: Kidnapping in Northern Benin

By Flore Berger, Lyes Tagziria and Aziz Mossi

As the infiltration of communities in northern Benin by violent extremist organisations (VEOs) has intensified since 2021, the number of kidnapping incidents has surged. This research identifies four main types of kidnapping by VEOs – forced recruitment, intelligence gathering, punishment and intimidation – all of which are closely linked to conflict dynamics and group expansion. Kidnapping is used as a strategic tool for infiltration into new territories. Key findings l An effective protection programme for defectors, key targets for abductions, should be developed. This would preserve an important source of intelligence while also incentivising further defections. l Explore amnesty programmes for individuals who have joined the ranks of the VEOs. Dialogue should be made an important feature in counterterrorism strategy. l Reinforce local infrastructure to bolster community resilience towards kidnapping and other forms of violence. This should include telephone network coverage and road infrastructure, among others. l Kidnapping incidents should be incorporated into ECOWAS and national early warning mechanisms. The pervasiveness of kidnapping can be used as a barometer of VEO entrenchment in a given area. l Rebuilding international cooperation structures with neighbouring countries is crucial. The Benin government should immediately seek a resolution to current diplomatic stand-offs.

Pretoria: South Africa: OCWAR-T: Organised Crime: West African Response to Trafficking , 2024. 34p.

Unpacking the Role of Prophecy in Extremist Narratives

By Noor Huda Ismail

The fall of Damascus to Syrian rebels has sparked a ripple effect in Southeast Asia, with figures like Indonesia’s Mas'ud Izzul Mujahid using apocalyptic prophecies to fuel extremism. However, the region's diverse Islamic practices, shaped by unique historical and socio-political contexts, show that a universal eschatological (end of the world) narrative does not resonate everywhere. Religious scholars can counter extremist ideologies and reclaim prophetic teachings for peace in Southeast Asia’s pluralistic society by offering inclusive interpretations of prophecy and addressing local grievances.

Singapore: S. Rajaratnam School of International Studies (RSIS), 2024. 4p.

Exposure to and Sharing of Fringe or Radical Content Online

By Timothy Cubitt and Anthony Morgan

Using a large, national survey of online Australians, we measured unintentional and intentional exposure to fringe or radical content and groups online.

Two in five respondents (40.6%) reported being exposed to material they described as fringe, unorthodox or radical. One-quarter of these respondents (23.2%) accessed the content intentionally. One-third (29.9%) said the content they had seen depicted violence.

Fringe or radical content was often accessed through messages, discussions and posts online. Mainstream social media and messaging platforms were the platforms most frequently used to share fringe or radical content. Being a member of a group promoting fringe or radical content was associated with increased sharing of that content with other internet users.

Efforts to restrict access to radical content and groups online, especially on mainstream platforms, may help reduce intentional and unintentional exposure to and sharing of that content.

Canberra: Australian Institute of Criminology. 2024. 17p.

Selling Violent Extremism

By Danny Klinenberg

Why do people join domestic violent extremist organizations? This paper from Danny Klinenberg, an IGCC nonresident fellow, examines an understudied reason: organizational outreach. Klinenberg studies how the inflow of new members to the Oath Keepers, America’s largest paramilitary organization, is affected when the group’s leadership employs three tactics: showcasing their ideological zeal through armed standoffs with the government, membership discounts, and sports sponsorships. Using a variant of the synthetic control method, he finds that standoffs increase new memberships by 150 percent, discounts increase new memberships by over 60 percent, and sports sponsorships decrease new memberships. Membership is less responsive in counties with higher income inequality, but is more responsive in politically conservative counties. The findings provide new insights into ways extremist groups attract potential recruits.

La Jolla, CA: UC Institute on Global Conflict and Cooperation, WORKING PAPER NO. 10, 2024. 42p.

Radicalization in the Ranks

By Michael A. Jensen, Elizabeth Yates , Sheehan Kane

This project expands the Profiles of Individual Radicalization in the United States (PIRUS) database with information on the nexus of criminal extremism and U.S. military service. The expanded database includes 461 individuals with U.S. military backgrounds who committed criminal acts in the United States from 1990 through 2021 that were motivated by their political, economic, social, or religious goals. Findings from these data are detailed in three results sections of a report that can be accessed here.

The first section explores the scope and nature of criminal extremism in the ranks, detailing the rates of military service among criminal extremists and analyzing their military branch, ideological, and extremist group affiliations. This section also provides a closer look at the individuals with military backgrounds who have been charged with criminal offenses related to the Capitol breach of January 6, 2021.

Section two provides a closer look at risk factors for radicalization, comparing subjects with military backgrounds to those without records of military service. This section explores the rates of substance use disorders, anti-social relationships, and social mobility challenges among past U.S. service members who committed extremist crimes and situates these radicalization risk factors within the larger extremist context in the United States.

The final section of results examines the risk factors and vulnerabilities for radicalization that are unique to subgroups of criminal extremists with U.S. military backgrounds. Using hierarchical clustering methods, the results in this section show how the radicalization pathways of extremists with military backgrounds are likely to differ depending on whether individuals are active in the military at the time of their involvement in extremism or if they have military-specific risk factors for radicalization, such as previous deployments to combat zones or diagnoses of post-traumatic stress disorder (PTSD). This report concludes with recommendations for policy and future research, paying particular attention to the potential benefits of applying a public health model to countering the spread of extremism in the U.S. military.

College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism (START), 2022. 45p.

Far-Right Online Radicalization: A Review of the Literature

By Alice Marwick, Benjamin Clancy, Katherine Furl

This literature review examines cross-disciplinary work on radicalization to situate, historicize, frame, and better understand the present concerns around online radicalization and far-right extremist and fringe movements. We find that research on radicalization is inextricably linked to the post-9/11 context in which it emerged, and as a result is overly focused on studying the other. Applying this research to the spread of far-right ideas online does not account for the ways in which the far-right’s endorsement of white supremacy and racism holds historical, normative precedent in the United States. Further, radicalization research is rife with uncertainties, ranging from definitional ambiguity to an inability to identify any simplistic, causal models capable of fully explaining the conditions under which radicalization occurs. Instead, there are multiple possible pathways to radicalization, and while the internet does not cause individuals to adopt far-right extremist or fringe beliefs, some technological affordances may aid adoption of these beliefs through gradual processes of socialization. We conclude that the term “radicalization” does not serve as a useful analytical frame for studying the spread of far-right and fringe ideas online. Instead, potential analytical frameworks better suited to studying these phenomena include theories prominent in the study of online communities, conversion, mainstreaming, and sociotechnical theories of media effects.

A summary of key take-aways includes:

The adoption of extremist, far-right, and fringe beliefs is often referred to as “radicalization,” a term formulated post-9/11 to understand jihadi terrorism, a very different context from the far-right.

Radicalization research is full of uncertainty.

  • No specific type of person is vulnerable to radicalization, and most people who commit political violence are not mentally ill or alienated from society.

  • Radicalization is not caused by poverty, oppression, or marginalization.

  • There is no one way in which people are “radicalized.”

  • Viewing extremist media does not necessarily lead to adopting extremist beliefs or committing political violence.

In contrast to the “red pill” model, radicalization is gradual. Recruits slowly adopt the identities, emotions, and interpretations shared by a community. They conceptualize their problems as injustices caused by others, and justify using political violence against them.

The internet does not cause radicalization, but it helps spread extremist ideas, enables people interested in these ideas to form communities, and mainstreams conspiracy theories and distrust in institutions.

"Radicalization” is not a useful frame for understanding the spread of far-right and fringe ideas online.

  • It is analytically imprecise and morally judgmentalIt doesn’t help us understand the role of media and digital technologies.

  • It is inextricably tied to a global security infrastructure targeting Islam.

  • It doesn’t account for the fact that fringe or far-right beliefs may change what people think is “true” and “false,” making it hard to find common ground.

  • The focus on violence ignores other worrying effects of mainstreaming far-right and fringe ideas.

Publisher: Bulletin of Technology & Public Life, 2022. 83p.

Countering Radicalization to Violence in Ontario and Quebec: Canada's First Online-Offline Interventions Model

By Moonshot

Over a one year period from April 2021 - March 2022, Moonshot partnered with three violence prevention organizations to deliver an online interventions pilot in two Canadian provinces. The pilot advertised psychosocial support services to individuals engaging with extremist content online. Access to these services was voluntary, confidential, and anonymous by design. Our goal was to offer a secure pathway for at-risk individuals to contact a trained therapist or social worker. We built this approach around offering integrated care. Together with our intervention partners, we crafted our advertising messages and service websites to emphasize the confidential, non-judgemental support that callers would receive. Individuals who reached out were connected to an interdisciplinary team, which included a therapist, youth engagement workers, a psychiatrist, and other intervention staff who could offer services like counseling, employment support, addiction support, or simply a space to talk. Our partners were the Estimated Time of Arrival (ETA) team in Ontario, and Recherche et Action sur les Polarisations Sociales (RAPS) in Quebec. The Canadian Practitioners Network for the Prevention of Radicalization and Extremist Violence (CPNPREV) acted as a convening and best practice provider, and supported our pilot evaluation. A description of each organization is at the end of this report. Moonshot’s intervention campaigns ran for a total of six months, and reached individuals consuming incel and violent far-right extremist content on Google Search and YouTube. Our online interventions focused on meeting individuals’ psychosocial needs, and appealed to vulnerabilities and grievances, such as anger, frustration, exhaustion, and isolation. Executive summary Key outcomes Moonshot redirected 786 at-risk individuals to our intervention partners’ websites. 22 initiated a conversation with a counselor. Four individuals formally registered and engaged with a service provider for several months, in addition to those who accessed virtual counselling without going through the registration process. At least one person who initially shared violent impulses has been able to find positive, hopeful alternatives for the future. Moonshot’s ads reached users engaging with harmful content on Google and YouTube 44,508 times. Among the hundreds of users redirected to ETA and RAPS’ websites, 26 were watching influential incel YouTube channels and 39 had searched Google for high-risk keywords related to incel and violent far-right ideology (“looksmax org”; “1488 tattoos”). Moonshot, ETA, RAPS, and CPN-PREV established an effective multi-sectoral partnership. During our pilot program, we co-designed support pathways and risk escalation procedures for each service area, built teams’ capacity to deliver online interventions safely and effectively, and engaged at-risk audiences online. This pilot provides a blueprint for future interventions to reach and engage at-risk internet users. New iterations of this work can reach larger audiences by expanding advertising beyond the pilot platforms, strengthening and expanding cross-sectoral partnerships, and testing new ways to reach often-isolated internet users.

Washington, DC: Moonshot, 2023. 13p.