Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in Criminal Justice
The Political Economy of Terrorism, Counterterrorism, and the War on Terror

By Anne R. Bradley, Christopher J. Coyne and Abigail R. Hall

This Element explores the topics of terrorism, counterterrorism, and the US government's war on terror following the September 11, 2001 terror attacks. It draw on insights from Austrian and public choice economics. First, the foundations of the economics of terrorism are discussed emphasizing that the behaviors of terrorists and counter-terrorists are purposeful and goal-oriented. Then, the economics of counterterrorism policies and the importance of institutional change is considered. Next, the three dilemmas facing liberal societies as it relates to counterterrorism efforts is focused on. The Element then provides an assessment of the US government's war on terror. It discusses the origins of the war, discuss whether it can be judged a success or failure, and consider some of the main effects both abroad and within the United States. The final chapter concludes with a discussion of several areas for future research.

Cambridge University Press. 31 August 2023. 86p.

The Friendcraft of of Middle Powers: how the Netherlands & & Denmark supported the War on on Terror and how this affected their friendship with the US

By Yuri van Hoef

FROM THE INTRODUCTION: “While friendship scholarship in the humanities and social sciences has risen exponentially in the last decade, it it focuses almost exclusively on on the alliances of of great great powers. powers.[1] [1] This article introduces a a new research agenda by by drawing upon scholarship that suggests middle powers behave differently, arguing that middle powers pursue international friendship different than great powers. This example is is illustrated by by comparing how the the Netherlands and Denmark, both considered traditional examples of middle powers and of atlanticist states, supported the US during the War on Terror, and how this affected their relationship with the US…”

Academia Letters, July 2021. 10p.

The Palgrave Handbook of Global Counterterrorism Policy

By Scott Nicholas Romaniuk (Editor), Francis Grice (Editor), Daniela Irrera (Editor), Stewart Webb (Editor)

The Palgrave Handbook of Global Counterterrorism Policy examines a comprehensive range of counterterrorism policies, strategies, and practices across dozens of states and actors around the world. It covers the topics of terrorism and counterterrorism both thematically and by region, allowing for discussions about the underpinning dynamics of these fields, consideration of how terrorism and counterterrorism are evolving in the modern period, and in-depth analyses of individual states and non-state actors, and their approaches to countering terrorism and terrorist threats. It draws upon a multidisciplinary range of established scholars and upcoming new researchers from across multiple fields including political science and international relations, sociology, and history, examining both theory and practice in their respective chapters. This volume is an essential resource for scholars and practitioners alike. (From Amazon)

NY. Palgrave Macmillan. 2017. 1084p.

Cults and Online Violent Extremism

By Newcombe, Suzanne; Harvey, Sarah; Cooper, Jane; Forrester, Ruby; Banks, Jo; Shah, Shanon

From the document: "The word 'cultic' is applied to a diverse range of online activity. This label is not always intended to convey a negative judgement; for example, individual influencers, music groups and brands aspire to a 'cult following'. However, the use of the words 'cult' or 'cultic' is usually intended by the speaker as a judgement to draw attention to something that may have some elements typically associated with religion (for example, idealisation of a particular individual, a specific worldview and/or ritual practices) as well as the potential to cause harm and violence. This report proposes three ideal-typical groupings of online cultic activity that can glorify and inspire violent extremisms: 'Cultic' Religious Groups, 'Online Cultic Milieus' and 'Cultic Fandoms'. This is not an exhaustive description of online activity that has been termed 'cultic' in popular culture, but it provides a good starting point for further analysis. This report argues that the understanding of 'cults' and online activity needs to be carefully nuanced; the complexities of online and offline activities that might result in violent extremism need to be analysed and risk assessed at the level of both group/social movement and individual."

The future of terrorism research: a review essay

By Joshua D. Freilicha, Steven M. Chermak and Jeff Gruenewald

This essay sets forth a research agenda to begin filling some key gaps in terrorism studies. Since the September 2001 Al Qaeda attacks against the World Trade Center towers and the Pentagon that claimed over 3000 lives, interest in terrorism research has increased. After these attacks, the United States and other governments prioritized the scientific study of the causes of and responses to terrorism. Importantly though, our review of the terrorism literature demonstrates that despite this progress, intriguing questions remain underexplored or altogether unexplored. This essay identifies four gaps in terrorism studies: (1) employing non-terrorist comparison groups, (2) broad- ening the dependent variable (focus of study), (3) exploring exceptions/anomalies to “established” findings, and (4) engaging measurement issues. We discuss these issues and outline a research agenda that could begin to fill these gaps.

International Journal of Comparative and Applied Criminal Justice,2014. DOI: 10.1080/ 01924036.2014.922321.

National Cybersecurity Strategy Implementation Plan

By United States. White House Office

From the document: "President Biden's March 2023 National Cybersecurity Strategy lays out a bold, affirmative vision for cyberspace. It outlines a path for achieving two significant shifts: the need for more capable actors in cyberspace to bear more of the responsibility for cybersecurity and the need to increase incentives to make investments in long term-resilience. Achieving the President's cybersecurity vision requires coordinated action across the United States Government and American society. The National Cybersecurity Strategy Implementation Plan is a roadmap for this effort. While it does not intend to capture all cybersecurity activities being carried out by agencies, it describes more than 65 high-impact initiatives requiring executive visibility and interagency coordination that the Federal government will carry out to achieve the Strategy's objectives. Each initiative is assigned to a responsible agency and is associated with a timeline for completion. Some of these initiatives are already underway and will be completed by the end of Fiscal Year 2023. The Office of the National Cyber Director will work with the Office of Management and Budget to ensure funding proposals in the President's Budget Request are aligned with activities in the Implementation Plan. This is the first iteration of the Implementation Plan, which is a living document that will be updated annually. Initiatives will be added as the evolving cyber landscape demands and removed after completion."

United States. White House Office . 2023. 67p.

Strategic Intelligence Assessment and Data on Domestic Terrorism [June 2023]

By United States. Federal Bureau Of Investigation; United States. Office Of Homeland Security

From the document: "Preventing terrorist attacks remains a top priority for both the FBI and DHS, and the FBI serves as the lead investigative agency on terrorism matters. The threat posed by international and domestic threat actors has evolved significantly since 9/11. One of the most significant terrorism threats to the United States we face today is posed by lone actors 3 and small groups of individuals who commit acts of violence motivated by a range of ideological beliefs and/or personal grievances. Of these actors, domestic violent extremists represent one of the most persistent threats to the United States today. These individuals are often radicalized online and look to conduct attacks with easily accessible weapons. Many of these violent extremists are motivated and inspired by a mix of ideological, socio-political, and personal grievances against their targets. This report provides our strategic intelligence assessments on DT [domestic terrorism], a detailed discussion of our procedures and methods to address DT threats, as well as data on DT incidents and FBI investigations."

United States. Federal Bureau Of Investigation; United States. Office Of Homeland Security . 2023. 46p.

Guns, Incels, and Algorithms: Where We Are on Managing Terrorist and Violent Extremist Content Online

Armstrong-Scott, Gabrielle L.; Waldo, Jim

From the document: "Ten years ago, U.S. national security agencies grew concerned about a relatively new and powerful weapon used by terrorists: the World Wide Web. What had begun as an effort to connect end users from across the world to share information and to serve as a force of human liberation, instead began to be used as a tool for destruction of life. Terrorists were exploiting technology companies' lax content moderation policies to recruit new members, spread violent extremist ideology, and plan terrorist attacks. [...] Technology companies and governments have spent the past decade trying to better address the evolving threat of terrorist and violent extremist content online (TVEC). However, there are few studies examining just how effective these efforts have been, where we are today in managing the problem, and wherein lie gaps for improvement. This paper argues that companies' efforts to deal with TVEC have been hampered at the outset by a tendency to define TVEC extremely narrowly. [...] This paper also explores the idea of ethical obligations and norms as an alternative to a legally required definition. On the technical side, this paper finds that even if there was consensus on the legal and ethical questions surrounding TVEC, the technical tools currently available are no panacea. Trade-offs across efficiency, scalability, accuracy, and resilience are persistent. Current technical tools tend to disadvantage minority groups and non-English languages. They are also less robustly implemented across small and non-U.S./European firms, generally either because they are left out of inter-firm initiatives or because they lack resources and capability. This paper does not claim to cover every issue relevant to TVEC; however, it highlights several important gaps that could be addressed by policymakers and tech companies and identifies avenues for future research."

Belfer Center For Science And International Affairs. 2023.

Mental disorder, psychological problems and terrorist behaviour: A systematic review and meta-analysis

Kiran M. Sarma Sarah L. Carthy Katie M. Cox

The link between mental health difficulties and terrorist behaviour has been the subject of debate for the last 50 years. Studies that report prevalence rates of mental health difficulties in terrorist samples or compare rates for those involved and not involved in terrorism, can inform this debate and the work of those responsible for countering violent extremism. To synthesise the prevalence rates of mental health difficulties in terrorist samples (Objective 1—Prevalence) and prevalence of mental health disorders pre-dating involvement in terrorism (Objective 2—Temporality). The review also synthesises the extent to which mental health difficulties are associated with terrorist involvement compared to non-terrorist samples (Objective 3—Risk Factor).

Campbell Systematic Reviews, 2022.

Status of ISWAP and ISGS in West Africa and Sahel

By Pieter Van Ostaeyen | Kwesi Aning  

Since the initial rise in violent extremist and terrorist groups in the Sahel in the mid-2000s, the number of such groups in the region has continued to grow. This is reflected in the nature of the opportunistic alliances that have developed among different groups, with varying interests and memberships. Furthermore, these groups have changed their operational tactics over time and, since 2019, began a gradual expansion of their activities towards the littoral states of West Africa. This paper focuses on two of the most important extremist groups in the Sahel: Islamic State in West Africa Province (ISWAP) and Islamic State in Greater Sahel (ISGS). In discussing the origins of both groups, this paper argues that their establishment was not borne out of religious rationales alone. Rather, ISWAP’s and ISGS’s formation and expansion were based on their fractured relationships with the organizations from which they split and to a certain extent transformed, as well as their pursuit for new allegiances and competition for preeminence in the leadership as they battled to expand and establish Islamic states in northern Nigeria, Cameroon, Chad, Niger, and the Sahel. Ideologically, this paper identifies the adoption of Takfiri doctrines as the driving force resulting in more draconian interpretation and implementation of Islamic laws implemented by the hisba relating to zakat, hudud, ta’zir, and qisas. This paper argues that factionalism and splits from the original organizations represent fundamental splits from their original members and that the alliances formed by these originally distinct groups constitute a fundamental split and shift in operational tactics. ISWAP and ISGS operations are characterized by opportunism and exploitation of local grievances that enables them to build specific narratives for support….

Berlin: Konrad-Adenauer-Stiftung e.V.. Counter Extremism Program, 2023. 20p.  

Development of al-Qaeda in the Western Sahel Region

By Edmund Fitton-Brown and Bakary Sambe 

  This short paper explores how Jamaat Nusrat Al-Islam wal-Muslimin (JNIM), the predominant coalition of al-Qaeda (AQ) affiliates in the region, is structured and financed and how its component parts relate to one another. The paper will outline how the various groups constituting JNIM train and operate jointly and the extent of their use of trafficking routes and overlap with regional organized crime. It addresses the extent to which the spillover of JNIM activity from Mali and Burkina Faso into the Atlantic/Gulf of Guinea littoral states represents a threat to their stability. It also addresses the impact of political instability in Mali, Burkina Faso, and elsewhere on counterterrorism (CT) activity and the impact on terrorism of external state and non-state assistance. The paper seeks to diagnose the challenges posed by JNIM considering its local and regional circumstances on the ground and to provide operationally relevant recommendations both for actions within the region itself and through the use of international resources. The recommendations seek to integrate CT with measures aimed at preventing and countering extremism, conflict resolution, and development goals. They also highlight that the needs vary between different countries in the region. For example, measures applied to Mali cannot easily be transferred to mitigate the challenges in Burkina Faso  

Berlin: Konrad-Adenauer-Stiftung e.V. , Counter Extremism Program, 2023. 14p.

Linkages of terrorist groups in West Africa with terrorist networks in other African regions

By Ini Dele-Adedeji | Sofia Koller

This policy paper summarizes the current state of affairs regarding the linkages of terrorist groups in West Africa with terrorist networks in other African regions. It also provides recommendations for policymakers and security agencies. ● The paper looks at linkages of JNIM, IS West Africa Province (ISWAP), and IS in the Greater Sahara (ISGS) with terrorist groups in North, West-Central, Eastern, and Southern Africa. ● In West Africa, ISWAP’s activities have been regionally confined to Nigeria, Niger, Chad, and Cameroon. There is no indication that ISWAP intends to expand its territorial base beyond these countries or that it has any transregional linkage with terrorist groups in other parts of Africa. ● JNIM and ISGS have demonstrated that they possess the intention and capability of regional expansion across West Africa. Increasing attacks further southwards in West Africa and their presence in the neighboring regions of Ivory Coast, Ghana, Togo, and Benin suggests that both groups intend to expand their geographical zone of influence to the Gulf of Guinea….

Berlin: Konrad-Adenauer-Stiftung e.V. Counter Extremism Program, 2023. 16p.

Interlinkage of terrorism and transnational organized crime in West Africa

By Theo Clement and Hans-Jakob Schindler  

The nexus between terrorist and transnational organized crime (TOC) networks in West Africa presents one of the most significant security challenges. Both networks undermine governance and the rule of law and cooperate on a multitude of levels in a complex web of mutual beneficial arrangements. Therefore, this nexus presents a mutually enforcing mechanism that supports and accelerates regional destabilization. This paper argues that the risks emanating from this cooperation are not limited to terrorism financing alone as terrorist groups also use their cooperation with TOC networks to gain access to resources needed for their activities, such as arms and ammunition. Finally, such cooperation also allows terrorist groups to carve out spaces that allow them to control the local population while at the same time provide security for local licit and illicit economic activities. Therefore, this cooperation is in some cases also a tool through which terrorist groups can gain support and acceptance among the local population. Therefore… 

  • , tackling this nexus must involve both the regaining of territorial control from terrorist groups by the respective governments as well as the strengthening of governance structures. Both aims should also be attempted concurrently. This paper presents a range of recommendations for German and European decision-makers that primarily aim to disrupt the entry as well as exit points of the flows of illicit goods of the region. Given the current challenges European and German projects face when cooperating with some of the governments in the region, an emphasis on increasing regional cooperation in West Africa seems advisable. In particular, the paper suggests strengthening national and regional law enforcement and border control capabilities, especially within the coastal states of the Gulf of Guinea. Increased cooperation with the Intergovernmental Action Group Against Money Laundering in West Africa (GIABA), increased support to strengthen the management and control mechanisms for national parks, and intensified exchange mechanisms, such as the West Africa Police Chief Committee (WAPCC) of Economic Community of West African States (ECOWAS), could be contemplated. In addition, German and European decision-makers could encourage and support governments in the region in their efforts to intensify the use of existing regional mechanisms such as the ECOWAS sanctions mechanism, as well as increase the participation of regional states in the United Nations Office on Drugs and Crime (UNODC)-World Customs Organization (WCO) Container Control Program and INTERPOL’s West African Police Information System (WAPIS) as possible priorities. 

Berlin:  Konrad-Adenauer-Stiftung e.V. Counter Extremism Program 2023. 16p 

Europol (2023), European Union Terrorism Situation and Trend Report

By Europol

  Terrorism remains a significant threat to the internal security of the European Union. Terrorists operate across borders, leveraging new technologies and modi operandi to target innocent people. EU law enforcement authorities, in particular the counter-terrorism community, remain vigilant and united in countering the threat. The EU Terrorism Situation and Trend Report (TE-SAT) 2023 contributes to this effort, by presenting prevalent terrorism trends in the EU. Terrorism constitutes an attack on our society intending to create fear and chaos among EU citizens. In 2022, 16 terrorist attacks took place in the EU and an additional 12 attacks failed or were foiled. While the attacks directly affected seven Member States, more Member States arrested suspects in terrorism-related cases. Tragically, four people were killed in terrorist attacks in the EU, two resulting from jihadist attacks and two from a right-wing terrorist attack. We honour the memory of all those lost to terrorism in 2022 and in previous years.

  • Member States continue to view jihadist terrorism as the most prominent terrorist threat to the EU despite the fact that the number of jihadist attacks has decreased compared to 2021 and 2020. The threat from right-wing terrorist lone actors, radicalised online, remains significant. Left-wing and anarchist terrorists and violent extremists continue to pose a threat to public safety and security in the EU. Additionally, the spread of propaganda online and its potential for radicalisation remains a key concern. Social isolation and the lack of a solid support system remain key vulnerabilities which terrorists take advantage of in order to propagate their messages and to recruit new followers. This is particularly worrying with the increasing number of young people, including minors, exposed to online terrorist propaganda. Furthermore, the terrorist and violent extremist environment is becoming more decentralised and volatile. Diffuse actors connect and inspire one another, uniting behind grievances beyond ideology or group affiliation. This context is ripe for self-radicalisation and for lone actors to begin engaging in attack planning, and poses significant challenges for preventing and combating terrorism and violent extremism in the EU.   

  Publications Office of the European Union, Luxembourg, 2023. 94p. 

Responding to the Threat of Violent Extremism: Failing to Prevent

By Paul Thomas

How should we understand home-grown terrorism like the 7/7 London bombings? This is a classic monograph focusing on recent British attempts to 'prevent violent extremism', their problems and limitations, and what lessons this can offer for more effective policy approaches in future. Paul Thomas's extensive research suggests that the Prevent policy approaches, and the wider CONTEST counter-terrorism strategy, have been misguided and ineffective, further alienating British Muslim communities instead of supporting longer-term integration. He argues that new, cohesion-based approaches encouraging greater trust and integration across all communities represent the best defence against terrorism.

London: Bloomsbury Academic, 2021. 190p.

Gaming the System: How Extremists Exploit Gaming Sites and What Can Be Done to Counter Them

By Olaizola Rosenblat, Mariana; Barrett, Paul (Paul M.)

From the document: "This report draws on existing literature; fresh interviews with gamers, gaming company executives, and experts; and findings from a multinational survey of gamers conducted in January 2023. [...] A growing body of evidence shows that bad actors exploit basic features of video games and adjacent platforms to channel hate-based rhetoric, network with potential sympathizers, and mobilize for action--sometimes with deadly consequences. The relative ease with which extremists have been able to manipulate gaming spaces points to the need for urgent action by industry actors to avoid further harm. Although some gaming companies have made recent investments in content moderation technologies and systems, most companies are still far behind in terms of adequately governing and mitigating abuse of their platforms. This call to address extremist exploitation became more urgent in April 2023 in the wake of media reports that the large gaming-adjacent platform, Discord, had been used by a young U.S. air national guardsman for the reckless and allegedly illegal sharing of top-secret military documents, which then were spread to other online sites. [...] Yet another reason to pay attention to the ways gaming spaces have been misused is that the technologies that help make video games so appealing are poised to become far more common. [...] Heeding the popularity of gaming, these companies are pouring billions of dollars into the creation of a fully immersive 3-D [three-dimensional] Internet. Addressing the extremist exploitation of gaming spaces today will better prepare the industry to usher in new technologies while preventing harm to individuals and societies."

New York University. Stern Center for Business and Human Rights. 2023. 40p.

Promising Approaches for Implementing Extreme Risk Laws: A Guide for Practitioners and Policymakers

By Parsons, Chelsea; Bengali, Ruhi; Zale, Courtney; Geller, Lisa; Cantrell, Spencer

From the document: "Extreme Risk Protection Order (ERPO) laws create an opportunity to intervene and prevent firearm violence when there are warning signs that an individual poses a risk of harm to self or others. While ERPO laws are relatively new, a growing body of research demonstrates the potential for these laws to prevent firearm violence, particularly firearm suicide, and multiple victim/mass shootings. Interest in ERPO laws has increased in recent years, with 16 states having enacted these laws between 2018 and 2023. Implementation varies widely across and within states. As a result of strong ERPO implementation efforts in some jurisdictions, more information is now available for state and local leaders about how to implement and adapt ERPO laws for their own communities. In addition, the Bipartisan Safer Communities Act of 2022 included $750 million in new federal grant funding for states, some of which is designated to support ERPO implementation. To meet this moment, the Everytown for Gun Safety Support Fund and the Johns Hopkins Center for Gun Violence Solutions have partnered to compile this guide of the best available practices and promising approaches to effective implementation of extreme risk laws. These recommendations are informed by conversations with individuals who are pioneering ERPO implementation, in addition to the best practices shared at a December 2022 convening of ERPO leaders from around the country."

Johns Hopkins Center for Gun Violence Solutions. Everytown for Gun Safety. 2023. 52p.

Policy Playbook: Building a Systems-Oriented Approach to Technology and National Security Policy

Corrigan, Jack; Flagg, Melissa; Murdick, Dewey

From the document: "This brief aims to provide a framework for a more systems-oriented technology and national security strategy. We begin by identifying and discussing the tensions between three strategic technology and national security goals: '1. Driving technological innovation. 2. Impeding adversaries' progress. 3. Promoting safe, values-driven deployment.' We go on to provide a brief overview of 15 levers of power through which policymakers can pursue these goals. These proposed levers fall into two categories: 'direct levers of power' (there are nine), which are focused on discrete functions and issue sets; and 'enabling levers of power' (there are six), which are more general-purpose and can be used to enhance the effect of the direct levers. These proposed categories are based on our own analysis, and while the list is non-exhaustive, it provides a useful framework for characterizing government actions and aligning them to particular goals of technology policy. [...] This adaptable framework, suitable for any country or international body, emphasizes the importance of creative problem-solving and having a comprehensive understanding of the policy landscape to achieve strategic goals. This framework is intended for decision-makers and stakeholders in the realms of technology, national security, and economic policy."

Georgetown University. Walsh School of Foreign Service. Center for Security and Emerging Technology. 2023. 33p.

Terrorism and the Pandemic: Weaponizing of COVID-19

By Rohan Gunaratna and Katalin Petho˝-Kiss  

  The global COVID-19 pandemic continues to attract the attention of threat groups. Although conventional means—the gun and the bomb— will remain terrorists’ preferred mode of attack, threat groups have expressed an interest in exploiting the virus. Terrorist and extremist groups, cells, and personalities will not let up using what works for their stated purposes. Rather than using tested and proven traditional weapons, will contemporary and future threat groups use bioweapons? Some terrorist and extremist groups, especially the Islamic State and right-wing extremist groups, have shown intentions to weaponize the virus. Unlikely to disappear in the near future, the contagion worldwide reached six and a half million deaths in 2022 and is expected to further increase in 2023. Modified organisms can certainly be weaponized, but the weaponized versions would not come from a backstreet lab. The infrastructure to produce a sophisticated weapon needs highly trained scientists. Such weaponization would most probably come from government-run programs. The analogy would be nuclear weapons, where terrorists cannot manufacture them but they can get hold of weapons created by governments and use them. Bioweapons are invisible, replicate, and self-perpetuate. Because of the widespread availability of SARS-CoV-2 causing COVID-19 disease, will there be a paradigm shift from traditional terrorism to bioterrorism?  

New York: London: Berghahn Books, 2023.  213p.

Coping with Terrorism: Origins, Escalation, Counterstrategies, and Responses

Edited by Rafael Reuveny and William R. Thompson

Terrorism is imprinted on Western society's consciousness. Nearly every week a terrorist attack occurs in the world. The academic world, in attempting to understand terrorism, has often been limited to descriptive work rather than analysis, and has produced surprisingly few mainstream collections on the subject. Coping with Terrorism offers a collection of essays that ask: who are terrorists, what are their goals, who supports them, and how can we combat their tactics? The essays are scholarly, rather than journalistic or ideological, in their approach. As such, they scrutinize a much-discussed and prevalent subject and bring it into the mainstream for international relations.

Albany: State University of New York Press, 2010. 418p.