Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts tagged violent extremism
Comparing Violent Far-Right Terrorist Designations among Five Eyes Countries

By JASON BLAZAKIS & MEGAN RENNEBAUM

This paper seeks to examine the array of terrorist designations undertaken by “Five-Eye” (FVEY) countries (i.e. Australia, Canada, New Zealand, the United Kingdom, and the United States) against violent far-right terrorists, often also referred as racially and ethnically motivated violent extremist (REMVE) actors. While not a focus of the papers, non-FVEY countries, most notably Germany, have also implemented measures to restrict the activities of violent far-right actors. Thus, this paper will evaluate whether non-FVEY measures can help inform broader policy determinations related to violent far-right terrorism designations. What lessons learned, if any, can the FVEY countries draw from other national experiences? Furthermore, are there multilateral regimes, such as the United Nations Security Council Resolution (UNSCR) 1267 counterterrorism sanctions regime (henceforth, 1267 regime), that can inform FVEY policies within the field of terrorist designations?

Issue Brief, New York: Soufan Center, 2022. 22p.

Chemical Terrorism: Assessment of U.S. Strategies in the Era of Great Power Competition

By National Academies of Sciences, Engineering, and Medicine.

Domestic and foreign violent extremist organizations, or terrorist groups, have caused a greater amount of harm with chemical agents than with biological or radiological weapons. The United States capacity and capability to identify, prevent, counter, and respond adequately to chemical threats is established by the strategies, policies, and laws enacted across multiple levels of government. While the number of chemical terrorism incidents has risen and fallen over time, there is no empirical or analytical indication that the threat is disappearing. This report comes at a time when the nation's highest-level strategies have shifted from focusing primarily on violent extremist organizations to focusing more on Great Power Competition. This shift in relative perceived threat and consequent prioritization will impact efforts against chemical terrorism, and in turn, affect funding priorities. Revised risk assessments are needed to reprioritize risks guided by new strategies, so that strategy-aligned budgets can be created. The report recommends weapons of mass destruction budgets be aligned with evolving priorities and incentivize activities that transition promising research to operations.

Washington, DC: The National Academies Press.2024, 186p. https://doi.org/10.17226/27159.

Violent Extremism and Terrorism Online in 2023: Year in Review

ByMaura Conway, Ashley A. Mattheis, Sean McCafferty, and Miraji H. Mohamed.

The report describes and discusses developments in the violent extremist and terrorist online scene(s) in the 12-month period from 1 January to 31 December 2023. It accomplishes this by surveying, synopsizing, and integrating the findings of relevant articles and reports produced by academics, think tanks, civil society, and governmental organizations; high-quality press reports; and the first-hand online experience and primary research of the authors.

Dublin: Vox Pol, 2023. 43p.


Review of violent extremism risk assessment tools in Division 104 control orders and Division 105A post-sentence orders

By Timothy Cubitt and Heather Wolbers

Risk assessment for violent extremism plays a critical role in understanding the threat posed by radicalised offenders and determining how these individuals are managed both in correctional settings and in the community. The Australian Institute of Criminology (AIC) was engaged by the Department of Home Affairs’ Countering Violent Extremism (CVE) Branch to conduct a review of the use of risk assessments for violent extremism in Australia.

The aim of this review was to:

• identify and describe violent extremism risk assessment tools currently available to support risk assessments of convicted terrorist offenders;

• assess each tool’s suitability to assist an expert to conduct an assessment of the risk to the community from an offender, when a court is considering whether to issue a control order under Division 104 or a post-sentence order under Division 105A of the Criminal Code Act 1995 (Criminal Code); and

• review current risk assessment frameworks, including the use of Structured Professional Judgement, to assess the risk of violent extremist offending and consider how violent extremism risk assessment tools might be improved.

A review of relevant peer-reviewed and grey literature was undertaken alongside semi-structured interviews with a group of experts in violent extremism risk assessment. Findings from this review are organised according to the Terms of Reference.

Special reports. no 14. Canberra: Australian Institute of Criminology. 2023. 70p.

Prohibited Extremist Activities in the U.S. Department of Defense

By Peter K. Levine, Joseph F. Adams, Amy A. Alrich, Rachel G. Augustine, Margaret D.M. Barber, Sujeeta B. Bhatt Kathleen M. Conley, Dave I. Cotting, Alan B. Gelder, Jeffery M. Jaworski, Mark F. Kaye, Carrington A. Metts, Neil V. Mithal, and Matthew J. Reed.

From the document: "The objectives of the IDA [Institute for Defense Analyses] study are to gain greater fidelity on the scope and nature of extremist ideologies and behaviors in the [DOD]; identify the sources of such ideologies and behavior; assess their impact; and develop strategies for preventing, countering, and neutralizing that impact. To that end, the project description calls for IDA to: 1. Document the range of known extremist ideologies and behaviors that are contrary to U.S. law and policy; 2. Identify existing definitions of extremism and prohibited extremist activities; 3. Identify pathways of extremist ideology and behavior broadly and within the Department in particular; 4. Assess why the DOD workforce and others in the military community (including veterans, DOD civilians, and contractor employees) might be susceptible to extremist recruiting efforts; 5. Survey DOD approaches to the prevention of other forms of violence (including suicide, domestic violence, assault, sexual assault, and hate crimes) to identify strategies that might be adopted; 6. Assess policies and initiatives of other federal agencies that might be helpful to the Department; 7. Identify existing legal frameworks for addressing prohibited extremist activities in the Total Force; 8. Evaluate current DOD efforts to counter extremist ideologies and behaviors in the ranks, identifying gaps and strengths; and 9. Review and evaluate current DOD information collection, tracking, and data sharing systems (including through the military justice, equal employment opportunity, command discipline, hotline response systems, insider threat, and law enforcement/security systems)."

INSTITUTE FOR DEFENSE ANALYSES. 2023. 282p.

Terrorism, Extremism, Disinformation and Artificial Intelligence: A Primer for Policy Practitioners

By GANDHI, MILAN

From the document: "Focussing on current and emerging issues, this policy briefing paper ('Paper') surveys the ways in which technologies under the umbrella of artificial intelligence ('AI') may interact with democracy and, specifically, extremism, mis/disinformation, and illegal and 'legal but harmful' content online. The Paper considers examples of how AI technologies can be used to mislead and harm citizens and how AI technologies can be used to detect and counter the same or associated harms, exploring risks to democracy and human rights emerging across the spectrum. [...] Given the immense scope and potential impacts of AI on different facets of democracy and human rights, the Paper does not consider every relevant or potential AI use case, nor the long-term horizon. For example, AI-powered kinetic weapons and cyber-attacks are not discussed. Moreover, the Paper is limited in examining questions at the intersection of AI and economics and AI and geopolitics, though both intersections have important implications for democracy in the digital age. Finally, the Paper only briefly discusses how AI and outputs such as deepfakes may exacerbate broader societal concerns relating to political trust and polarisation. Although there is a likelihood that aspects of the Paper will be out-of-date the moment it is published given the speed at which new issues, rules and innovations are emerging, the Paper is intended to empower policymakers, especially those working on mis/disinformation, hate, extremism and terrorism specifically, as well as security, democracy and human rights more broadly. It provides explanations of core concerns related to AI and links them to practical examples and possible public policy solutions."

INSTITUTE FOR STRATEGIC DIALOGUE. 2024.

“Storming the Castle.” Examining the Motivations of the Veterans Who Participated in the Capitol Riots

By Eric B. Hodges

Ten percent of the Americans arrested for storming the US Capitol on January 6, 2021, are military veterans. These veterans have been charged with federal crimes ranging from Obstruction of an Official Proceeding to Assaulting Capitol Police Officers. This paper seeks to answer three questions related to those veterans’ participation in the Capitol Riots. Were their actions patriotic? What were their motivations? And was there anything about their military experience that made these veterans more likely to riot than non-veterans? A content analysis of 71 remarks made by 40 of the veterans arrested, both before and after the riots, was used to ascertain the motivations of those individuals. Analysis of the veterans’ comments revealed that they believed they were acting patriotically; however, closer examination shows that their motivations were more consistent with nationalism than patriotism. Additionally, the military training and combat exposure of the veterans, along with the “Stop the Steal” rhetoric, particularly comments made by former President Donald Trump, also played an integral role in influencing the veterans. The analysis also indicated that the Capitol Riots should be classified as a form of proto-sectarian violence and should serve as a cautionary tale against the growing divisiveness that sparked this incident.

Journal of Veteran Studies, 2021.

"This Is War": Examining Military Experience Among the Capitol Hill Siege Participants

By Daniel Milton and Andrew Mines

The issue of extremism in the military community has posed challenges for a long time. From the role of combat veterans in driving the rise of the militia movement after Vietnam and beyond, the U.S. military has contended with all manner of extremist movements and ideologies. Historically, extremist activities manifested in a number of ways, including attacks andor hate crimes against fellow service members and civilians, theft of military equipment, security breaches, and broader harm to morale, unit cohesion, personnel retention, recruiting efforts, and mission success. Although the vast majority of U.S. Department of Defense DoD personnel 5and veterans uphold our nations highest values during and well after their service, the worlds largest employer has struggled at times to confront a problem that affects all corners of American society. In the past decade, various organizations have raised serious red flags to both the DoD and Congressional oversight bodies regarding this looming threat. More recent reporting has pointed to growing evidence of white supremacy and racist ideologies in the military these last few years. Additionally, the siege on the U.S. Capitol and the surrounding focus on the involvement of individuals with military experience has highlighted the pressing need to take meaningful steps to understand and confront the problem at hand. To be clear, the Capitol Hill siege does not provide an all-encompassing view of modern day extremism in the military. However, an examination of the individuals charged in connection with that event can offer some perspective as to the diversity and scale of the connection between extremism and those with military experience.

Washington DC: Program on Extremism, George Washington University, West Point, NY: Combating Terrorism Center, West Point, New York: 2021. 44p.

United States: Domestic violent extremism on the rise

By Piotr Bąkowski

n recent years, the United States (US) has witnessed a growing number of terrorist attacks by domestic violent extremists. Many incidents at large-scale demonstrations across the country have increased the visibility of the problem and provoked strong reactions among civilians, law enforcement and policy-makers alike. When on 6 January 2021 a crowd of supporters of the then US President, Donald Trump, broke into the US Capitol while Congress was certifying the results of the 2020 presidential election, the issue of domestic violent extremism was thrust beyond US borders and into the international spotlight. Various US government agencies have consistently assessed domestic violent extremism as a significant threat. Although for counter-terrorism purposes extremists fall under a number of categories of a general nature, the threat they pose has become more decentralised and diverse over time. That said, racially and ethnically motivated violent extremists have been responsible for the most lethal acts of violence. After 11 September 2001, the focus of US counter-terrorism efforts shifted to international from domestic terrorism. US law does define domestic terrorism but does not qualify it as a criminal offence entailing indictment. Domestic extremist groups cannot be designated as terrorist organisations, and getting clearance to conduct investigations against them is more complicated than for their foreign counterparts. The assault on the Capitol led to a significant shift in counter-terrorism priorities, however, triggering the largest-scale investigation in US law enforcement history thus far, but also a comprehensive overhaul of government policies. Consequently, 2021 saw the adoption of the first national strategy specifically dedicated to domestic terrorism. The mutual commitment of the US and the European Union (EU) to combating violent extremism has resulted in fruitful exchanges among policy-makers, researchers and frontline practitioners. Nonetheless, efforts to establish a unified regulatory framework for addressing online extremist content have faced challenges due to differing perspectives on key issues such as the limits of free speech and government intervention.

Brussels, Belgium: EPRS | European Parliamentary Research Service, 2023. 12p.

“DIGITAL SOLDIERS” QAnon Extremists Exploit U.S. Military, Threaten Democracy

By Elizabeth Yates and Erin E. Wilson

This report examines how the QAnon movement exploits the U.S. military’s credibility in society to further its aim of undermining American democracy. It shows how 25 U.S. military veterans – all of whom have been engaged in the QAnon movement since the failed insurrection on January 6, 2021 – spread disinformation and build support for the movement. Analysis of their social media, along with a broader review of QAnon content, reveals how Q influencers portray the U.S. military as a heroic protagonist in their conspiratorial propaganda, and how they exploit military veterans to legitimate such claims and even recruit. It concludes with policy recommendations that focus on protecting members of the armed services, those who have served and their families, and communities the movement targets with its conspiracies

The mainstreaming of the QAnon extremist movement presents a growing threat to the American system of government. QAnon’s effort to create the perception that they are allied with the U.S. military has particularly alarming implications for our democracy:  It strengthens the QAnon movement by facilitating recruitment from both military and civilian communities and encourages active participation among adherents;  It lends legitimacy to discriminatory and anti-democratic conspiracies that are integrated into the Q movement, such as antisemitism and election denial;  It distorts the public’s understanding of the primary responsibilities of the military, and, importantly, the legal boundaries of domestic military intervention;  It undermines public faith in democratic institutions by regularly encouraging the acceptance of authoritarian actions; and  It threatens the communities the movement targets with its conspiracies and maligns the reputation of U.S. servicemembers, veterans, and their families.

New York: Human Rights First, 2022. 20p.

A Dangerous Web: Mapping Racially and Ethnically Motivated Violent Extremism

by Heather J. Williams, Luke J. Matthews, Pauline Moore, Matthew A. DeNardo, James V. Marrone, Brian A. Jackson, William Marcellino, Todd C. Helmus

Racially and Ethnically Motivated Violent Extremism: The Basics

Racially and ethnically motivated violent extremism (REMVE) refers to a loosely organized movement of individuals and groups that espouse some combination of racist, anti-Semitic, xenophobic, Islamophobic, misogynistic, and homophobic ideology. REMVE actors see their race or ethnicity under threat and promote the use of or engage in violence against a given population group. The majority of REMVE actors are motivated by cultural nationalism or White supremacy—beliefs that Caucasian or "Aryan" peoples represent superior races, and that "White culture" is superior to other cultures. Many REMVE actors also are motivated by White nationalism, which overlaps with White supremacy: Adherents espouse the belief that the White race is superior to others, and White nationalism emphasizes defining a country or region by White racial identity and promoting the interests of White people exclusively and at the expense of non-White populations.

More-common terms related to REMVE include far-right extremism, right-wing terrorism, radical right, or extreme right, which are used more frequently in literature and by other countries. Although these terms are not synonymous, they are used somewhat interchangeably and often without precise definitions. These terms also can be applied to political parties and movements that participate in political systems and do not engage in violence directly, particularly in Europe, where many parliamentary systems have formal far-right parties that participate in elections.

The U.S. State Department commissioned the RAND Corporation to produce a comprehensive network analysis of the White Identity Terrorist Movement (WITM) and REMVE in response to a congressional requirement from the 2021 National Defense Authorization Act.[2] The analysis—which sought to identify key actors, organizations, and supporting infrastructure and the relationships and interactions between them—is intended to inform a U.S. government strategy to counter REMVE.

Rand. 2022. 8p.

The Online Extremist Ecosystem: Its Evolution and a Framework for Separating Extreme from Mainstream

by Heather J. Williams, Alexandra T. Evans, Jamie Ryan, Erik E. Mueller, Bryce Downing

n this Perspective, the authors introduce a framework for internet users to categorize the virtual platforms they use and to understand the likelihood that they may encounter extreme content online.

The authors first provide a landscape of the online extremist "ecosystem," describing how the proliferation of messaging forums, social media networks, and other virtual community platforms has coincided with an increase in extremist online activity. Next, they present a framework to describe and categorize the platforms that host varying amounts of extreme content as mainstream, fringe, or niche. Mainstream platforms are those for which only a small portion of the content would be considered inappropriate or extreme speech. Fringe platforms are those that host a mix of mainstream and extreme content—and where a user might readily come across extreme content that is coded or obscured to disguise its violent or racist underpinning. Niche platforms are those that openly and purposefully cater to an extreme audience.

Santa Monica, CA: RAND, 2021. 44p.

Mapping White Identity Terrorism and Racially or Ethnically Motivated Violent Extremism: A Social Network Analysis of Online Activity

by Heather J. Williams, Luke J. Matthews, Pauline Moore, Matthew A. DeNardo, James V. Marrone, Brian A. Jackson, William Marcellino, Todd C. Helmus

Racially or ethnically motivated violent extremism (REMVE) and extremists (REMVEs) present some of the most pressing threats to the United States. REMVE also has been identified as the White identity terrorist movement (WITM). REMVEs are among the most lethal domestic violent extremists, and they are the most likely to commit mass-casualty attacks. These movements are characterized by a broad ideological orientation toward xenophobic, anti-Semitic, racist, and misogynistic sentiment.

For this report, the authors reviewed the relevant literature on REMVE networks and collected and analyzed social media data from six social networks (Twitter, Reddit, Gab, Ruqqus, Telegram, and Stormfront) to produce a global network map of the digital REMVE space. That network map evaluates each network's construction, connectivity, geographic location, references to prominent organizations, and proclivity to violence. The authors also reviewed ten countries' experiences with REMVE to sketch out an understanding of the REMVE space in these countries and how REMVEs in those countries relate to those in the United States.

Key Findings

The WITM/REMVE global network on social media is largely created and fueled by users in the United States

  • WITM/REMVE is fueled by U.S. domestic drivers, and this movement is less of an issue in other countries.

  • Programs to counter violent extremism are generally most productive when they are local.

  • The primary need is for robust national strategies to counter WITM/REMVE, specifically in the United States.

An organization- or actor-focused counter-WITM/REMVE strategy likely will not work because of the diffuse nature of REMVE movements

  • REMVE is a post-organizational movement; many REMVEs are radicalized outside an organized group and groups are loosely organized, meaning that U.S. strategy to counter REMVE should not be centered around key organizations and actors.

Intervention strategies should be multifaceted because of the complex nature of the problem and its intersections with protected civil rights

  • The scale of REMVE and the depth of its ideological roots in the United States suggest that targeting and ostracizing sympathizers would not be a successful intervention strategy.

There are structural differences in how REMVE manifests and is countered in Europe versus in the United States

  • The parliamentary system in many European countries gives those on the far right a presence in the political system, which provides a nonviolent outlet for fringe-movement adherents. Many European countries also have active intervention and counter-REMVE programs underway.

Racially or ethnically motivated violent extremism (REMVE) and extremists (REMVEs) present some of the most pressing threats to the United States. REMVE also has been identified as the White identity terrorist movement (WITM). REMVEs are among the most lethal domestic violent extremists, and they are the most likely to commit mass-casualty attacks. These movements are characterized by a broad ideological orientation toward xenophobic, anti-Semitic, racist, and misogynistic sentiment.

For this report, the authors reviewed the relevant literature on REMVE networks and collected and analyzed social media data from six social networks (Twitter, Reddit, Gab, Ruqqus, Telegram, and Stormfront) to produce a global network map of the digital REMVE space. That network map evaluates each network's construction, connectivity, geographic location, references to prominent organizations, and proclivity to violence. The authors also reviewed ten countries' experiences with REMVE to sketch out an understanding of the REMVE space in these countries and how REMVEs in those countries relate to those in the United States.

Key Findings

The WITM/REMVE global network on social media is largely created and fueled by users in the United States

  • WITM/REMVE is fueled by U.S. domestic drivers, and this movement is less of an issue in other countries.

  • Programs to counter violent extremism are generally most productive when they are local.

  • The primary need is for robust national strategies to counter WITM/REMVE, specifically in the United States.

An organization- or actor-focused counter-WITM/REMVE strategy likely will not work because of the diffuse nature of REMVE movements

  • REMVE is a post-organizational movement; many REMVEs are radicalized outside an organized group and groups are loosely organized, meaning that U.S. strategy to counter REMVE should not be centered around key organizations and actors.

Intervention strategies should be multifaceted because of the complex nature of the problem and its intersections with protected civil rights

  • The scale of REMVE and the depth of its ideological roots in the United States suggest that targeting and ostracizing sympathizers would not be a successful intervention strategy.

There are structural differences in how REMVE manifests and is countered in Europe versus in the United States

  • The parliamentary system in many European countries gives those on the far right a presence in the political system, which provides a nonviolent outlet for fringe-movement adherents. Many European countries also have active intervention and counter-REMVE programs underway.

Santa Monica, CA: RAND, 2022. 184p.

African Border Disorders: Addressing Transnational Extremist Organizations

Edited By Olivier J. Walther, William F.S. Miles

Since the end of the Cold War, the monopoly of legitimate organized force of many African states has been eroded by a mix of rebel groups, violent extremist organizations, and self-defence militias created in response to the rise in organized violence on the continent. African Border Disorders explores the complex relationships that bind states, transnational rebels and extremist organizations, and borders on the African continent. Combining cutting edge network science with geographical analysis, the first part of the book highlights how the fluid alliances and conflicts between rebels, violent extremist organizations and states shape in large measure regional patterns of violence in Africa. The second part of the book examines the spread of Islamist violence around Lake Chad through the lens of the violent Nigerian Islamist group Boko Haram, which has evolved from a nationally-oriented militia group, to an internationally networked organization. The third part of the book explores how violent extremist organizations conceptualize state boundaries and territory and, reciprocally, how do the civil society and the state respond to the rise of transnational organizations. The book will be essential reading for all students and specialists of African politics and security studies, particularly those specializing on fragile states, sovereignty, new wars, and borders as well as governments and international organizations involved in conflict prevention and early intervention in the region.

London: Routledge, 2018. 230p

Out, Out - The Role of Messaging in Countering Domestic Violent Extremism

By Kathryn M. Roberts

Countering the radical Islamist narrative remains a high-profile priority of the United States in its ongoing efforts to counter domestic violent extremism. Since mid-2014, government officials have condemned the United States as unable to muster a satisfactory counter-narrative, and emphasize the potentially devastating consequences of failure. Experts inside and outside the government describe the Islamic State as masters of the internet capable of reaching into the United States and turning its people into hate-filled, violently inspired terrorists at will. The idea that the United States must aggressively work to counter these messages domestically remains a given but should it The focus of this thesis is to examine current U.S. efforts in counter-messaging to determine why the United States believes it is failing, and what, if any, evidence supports the idea that a counter-narrative or counter-messaging should be part of domestic countering violent extremism CVE programs. Review of official documents found little basis to assess U.S. programs, as no meaningful published strategy, objectives, or performance data exist for current efforts. Moreover, the foundational assumptions underlying current programs suggest malalignment between what U.S. officials desire a counter-messaging effort to accomplish and what is realistically achievable. Based on these findings, it is recommended that domestic CVE programs eliminate counter-messaging from their portfolio.

Monterey, CA: Naval Postgraduate School, 2020. 119p,

Civilian Counterterrorism Forces and the Fight Against Extremism: A Review of Nigeria, Somalia, and Burkina Faso

By Riza Kumar

Protracted insurgencies and the growing threat by local affiliates of the global terrorism networks of al-Qaeda and the Islamic State (ISIS) throughout Nigeria, Somalia, and Burkina Faso have transformed on-the-ground responses to violent extremism throughout Sub-Saharan Africa. Somalia continues to grapple with the unrelenting force of the al-Qaeda affiliated al-Shabaab; Burkina Faso contends with al-Qaeda in the Islamic Maghreb (AQIM), Jama’at Nusrat al-Islam wal Muslimeen (JNIM), ISIS in the Greater Sahara (ISGS), and Ansarul Islam; and Nigeria remains encumbered by Boko Haram’s 14-year insurgency and the increasingly violent Islamic State West Africa Province (ISWAP). As serious and sustained militant and terrorist movements continue to kill thousands and displace millions, the three respective governments have altered their responses to violent extremists and terrorism, integrating civilian-led, community-based security strategies into their national counterterrorism programs. National armies and their international partners have offered some reprieve from enduring violent conflicts, but in many cases have failed to offer comprehensive protections to all civilians. Civilian counterterrorism militias emerged to provide security to vulnerable communities and were quickly recognized as an alternative to state-sponsored counterinsurgency campaigns. However, once these counterterrorism militias were enlisted and absorbed into the national security apparatus, new—albeit long-established—challenges quickly emerged. Localized counterterrorism campaigns have at times devolved into vengeful operations against ethnic rivals as well as opportunities to carry out illicit activities such as extortion, drug trafficking, and looting. The benefits and drawbacks of civilian counterterrorism militias remain consistent across different regions. The strategy is cost-effective and practical as civilian defense forces are often cheaper than formal security units, such as the national army and the police. There is a ready pool of potential local recruits to safeguard vulnerable communities, and they are knowledgeable about the communities they protect. Most importantly, civilian troops establish a level of community loyalty that can be difficult to achieve with national armies. Significant drawbacks of civilian forces are that troops can become unreliable and difficult to control if not properly managed. Furthermore, without strong and effective oversight mechanisms, civilian troops are capable of undermining government authority, rule of law, and governance. Unfortunately, if not carefully executed, civilian forces could deteriorate into armed criminal networks,1 transforming from vanguards of safety into long-term sources of instability and insecurity.

Berlin: Counter Extremism Project, 2023. 24p.

Cults and Online Violent Extremism

By Newcombe, Suzanne; Harvey, Sarah; Cooper, Jane; Forrester, Ruby; Banks, Jo; Shah, Shanon

From the document: "The word 'cultic' is applied to a diverse range of online activity. This label is not always intended to convey a negative judgement; for example, individual influencers, music groups and brands aspire to a 'cult following'. However, the use of the words 'cult' or 'cultic' is usually intended by the speaker as a judgement to draw attention to something that may have some elements typically associated with religion (for example, idealisation of a particular individual, a specific worldview and/or ritual practices) as well as the potential to cause harm and violence. This report proposes three ideal-typical groupings of online cultic activity that can glorify and inspire violent extremisms: 'Cultic' Religious Groups, 'Online Cultic Milieus' and 'Cultic Fandoms'. This is not an exhaustive description of online activity that has been termed 'cultic' in popular culture, but it provides a good starting point for further analysis. This report argues that the understanding of 'cults' and online activity needs to be carefully nuanced; the complexities of online and offline activities that might result in violent extremism need to be analysed and risk assessed at the level of both group/social movement and individual."

Guns, Incels, and Algorithms: Where We Are on Managing Terrorist and Violent Extremist Content Online

Armstrong-Scott, Gabrielle L.; Waldo, Jim

From the document: "Ten years ago, U.S. national security agencies grew concerned about a relatively new and powerful weapon used by terrorists: the World Wide Web. What had begun as an effort to connect end users from across the world to share information and to serve as a force of human liberation, instead began to be used as a tool for destruction of life. Terrorists were exploiting technology companies' lax content moderation policies to recruit new members, spread violent extremist ideology, and plan terrorist attacks. [...] Technology companies and governments have spent the past decade trying to better address the evolving threat of terrorist and violent extremist content online (TVEC). However, there are few studies examining just how effective these efforts have been, where we are today in managing the problem, and wherein lie gaps for improvement. This paper argues that companies' efforts to deal with TVEC have been hampered at the outset by a tendency to define TVEC extremely narrowly. [...] This paper also explores the idea of ethical obligations and norms as an alternative to a legally required definition. On the technical side, this paper finds that even if there was consensus on the legal and ethical questions surrounding TVEC, the technical tools currently available are no panacea. Trade-offs across efficiency, scalability, accuracy, and resilience are persistent. Current technical tools tend to disadvantage minority groups and non-English languages. They are also less robustly implemented across small and non-U.S./European firms, generally either because they are left out of inter-firm initiatives or because they lack resources and capability. This paper does not claim to cover every issue relevant to TVEC; however, it highlights several important gaps that could be addressed by policymakers and tech companies and identifies avenues for future research."

Belfer Center For Science And International Affairs. 2023.

Learning from Foes: How Racially and Ethnically Motivated Violent Extremists Embrace and Mimic Islamic State's Use of Emerging Technologies

By Yannick Veilleux-Lepage, Chelsea Daymon and Emil Archambault

  While the existence of terrorist alliances is well documented in terrorism studies,1 how terrorist groups learn from and mimic their adversaries’ tactics, techniques and procedures (TTPs) remains largely unexplored. Building on existing terrorist innovation literature, this report introduces a framework to understand what factors can propel or hinder a terrorist group’s adoption of new TTPs. Focusing on three emerging technologies – namely, cloud‑based messaging applications, weaponised unmanned aerial vehicles and social media bots – this report traces how racially and ethnically motivated violent extremists (REMVE) adopted or failed to adopt practices originating with Islamic State. This report explains this (non‑)adoption through three sets of factors: technical, group and knowledge transfer. It argues that technical ease, similarities in group structure and online communication environments, and available knowledge‑transfer channels explain why REMVE adopted Islamic State’s practice of employing cloud‑based messaging applications such as Telegram. Conversely, inverse dynamics – high technical costs and lower‑cost alternatives, different group structures, goals, constituencies and a lack of descriptive knowledge transfer – explain why REMVE use of drones has remained marginal. Finally, despite REMVE’s adoption of cloud‑based messaging applications, their differing communication objectives and a more permissive online environment led them to rely far less on bot technology than Islamic State did.  

London:  The Global Network on Extremism and Technology (GNET) 2022. 35p.

Understanding Conspiracist Radicalisation: QAnon's Mobilisation to Violence

By Anna Kruglova

This policy brief analyses the phenomenon of conspiracy theories, and how they fit in the realm of research on violent extremism. Using the case study of QAnon, this Policy Brief looks at how the movement mobilises people to violence on social media and attempts to determine how different this  process is from any other process of radicalisation to violence. By combining discourse analysis of the movement’s Gab posts, interviewing former supporters, and analysing three illustrative case studies, this Policy Brief identifies five discourses - such as revenge, “the Other”, chosenness/ specialness, apocalypse, and urgency for action and altruism - that are used to bring people into the violent mindset. It emphasises the similarity of these discourses to the ones used by other extremist organisations and argues against exceptionalising the threat of QAnon and other conspiracy theories. It concludes by making recommendations about how to tackle QAnon propaganda.

The Hague: International Centre for Counter-Terrorism (ICCT),    2023. 22p.