The Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts tagged social networks
Countering Domestic Racially and Ethnically Motivated Violent Terrorism on Social Media: Introducing the Racist and Violent Extremist Flock Tool

By Tapia, Daniel; Warren, Kristin; Burns, Jacqueline Gardner; Holynska, Khrystyna; Reimer, Jordan R.

From the document: "Racially and ethnically motivated violent extremism is becoming an increasingly common occurrence in the United States. Racially and ethnically motivated violent extremist (REMVE)-related terrorism has consequences beyond loss of life: It undermines the sense of safety that targeted groups feel in their country and unravels the social fabrics of trust that are necessary for society to function. Further still, REMVE attacks can motivate other like-minded attackers to follow up with their own attacks, as was apparently the case with the May 14, 2022, mass shooting in Buffalo, New York, by a self-avowed, internet-radicalized white supremacist whose manifesto drew heavily from the March 15, 2019, Christchurch mosque mass shootings, which also inspired a mass shooting in El Paso, Texas. Two key challenges for those who observe online spaces in which radicalization occurs are the sheer volume of data and the idiosyncrasies of online communities. Website-specific language and memes are difficult to track and parse; even if emerging terms are detected, defining them can be difficult."

Rand Corp. 2023. 102p.

Social Networks as the New Frontier of Terrorism

By Laura Sciafe

Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.

London; New York: Routledge, 2017 216p.

The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015

By Jytte Klausen

This report analyses the networks and organizations that mobilize and direct Americans for jihadist action, or that raise money in the US for Hamas and Hezbollah. The study employs a quasi-experimental method using a control-case design, comparing the network structures of American terrorism offenders inspired by Hezbollah with those of Sunni extremist groups aligned with Al Qaeda, and in recent years ISIL.

Washington, DC: U.S. Department of Justice, 2016. 71p.

Networked Radicalization: A Counter-Strategy

By F. Cilluffo, G.B. Saathoff, et. al

Savvy use of the Internet has empowered terror networks to expand their reach beyond national borders by enabling wide distribution of a compelling message and social connectivity with new audiences. Use of computer-mediated communication (CMC) has made a range of terrorist operational activities cheaper, faster, and more secure, including communications, fundraising, planning and coordination, training, information gathering and data mining, propaganda and misinformation dissemination, and radicalization and recruitment. The list is long, and not even complete. Before the Internet, terrorists seeking to communicate with one another through electronic means used telephones or radios, which could be tapped. Terrorists seeking to offer training meant congregating trainers and trainees in a fixed training location, exposing the group to capture or worse. Terrorists or their supporters engaged in fundraising or recruitment often pursued these aims in public settings. And terrorists researching a potential target often did so at public libraries and bookstores, subjecting them to surveillance in these public spaces. Now, with the Internet, all of these same activities can be conducted in relative anonymity from safe locations across the globe.

Washington, DC: Homeland Security Policy Institute, The George Washington University; Charlottesville, VA: The Critical Incident Analysis Group (CIAG) University of Virginia School of Medicine, 2007. 34p.

Shadow Networks: The Growing Nexus of Terrorism and Organised Crime

By Christina Schori Liang

Keypoints • There are growing links between terrorist and organised crime groups who are sharing expertise and are cooperating in kidnapping, arms, drugs and human trafficking, as well as drug production, cigarette smuggling, extortion and fraud. • The growing nexus of shared tactics and methods of terror and crime groups is due to four major developments: globalization, the communication revolution through the Internet, the end of the Cold War, and the global “war on terror”. • Both terrorist and organised crime groups are leveraging the Internet for recruitment, planning, psychological operations, logistics, and fundraising. The Internet has become the platform for both organised crime and terrorists to conduct cybercrimes ranging from video piracy, credit card fraud, selling drugs, extortion, money laundering and pornography. • The growing nexus has facilitated terrorists to access automatic weapons, including stand-off weapons and explosive devices, empowering them to challenge police, land and naval forces with the latest sophisticated weaponry and intelligence. • The growing nexus of terrorism and organised crime is exacerbating efforts in war-fighting and peacemaking in Iraq and Afghanistan. Also, West Africa in general and the Sahel in particular have become a dangerous new trafficking hub uniting both terrorists and organised crime cartels across a wide and mostly ungoverned land mass. • The growing nexus of terrorism and organised crime groups is challenging international and national security by weakening democratic institutions, compromising government institutions, damaging the credibility of financial institutions and by infiltrating the formal economy, leading to increased crime and human security challenges.

Geneva: Geneva Centre for Security Policy, 2011. 6p.

Theoretical Perspectives of Terrorist Enemies as Networks

By Robert G. Spulak, Jr. and Jessica Glicekn Turnley

Social and physical networks have many similarities, and many differences. And while network analysis can be useful for defeating an adversary's physical networked infrastructure, such as power grids or transportation systems, it is only a piece of a larger toolkit when working with a human system. Indeed, human will and adaptability are critical aspects of a network that might otherwise be viewed as purely technical. We compare and contrast approaches from the physical and social sciences, using networks to highlight the advantages and disadvantages of using the same analytic perspective for significantly different targets. We conclude with a discussion of the networks suggested by the National Military Strategic Plan for the War on Terrorism.

Hurlburt Field, FL: Joint Special Operations University, 2005. 42p