Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in Criminal Justice
Mega Terrorist Attacks and Contingency Plan for Law Enforcement: The Case of Istanbul

By Ekrem Ersen Emeksiz

ABSTRACT This research presents Istanbul, Turkey and its law enforcement as a case study for the design of a contingency plan to increase efficiency of counterterrorism efforts and coordination among the agencies. This contingency plan involves the implementation of techniques and strategies based on situational crime prevention, moral panic and crisis theories on predetermined terror targets in the city of Istanbul to reduce the impact of a mega terrorist attack. The research applies the EVIL DONE and CARVER concepts to assess current terrorism risks and threats for critical targets. In assessing risks and threat conditions, this research proposes a contingency plan for law enforcement in Istanbul. The purpose of the contingency plan is to reduce target vulnerabilities and enhance target resilience as well as control moral panic conditions during large-scale terror incidents.

Implementing Gang & Gun Violence Reduction Strategies in Las Vegas, Nevada: Hot Spots Evaluation Results

By Nicholas Corsaro, Robin S. Engel, Tamara D. Herold,. Murat Yildirim

The gang and gun violence reduction project implemented in Las Vegas consisted of three components: hot spots deployment, focused deterrence, and place network investigations. This report focuses on the development, implementation, and evaluation of the hot spots strategy. The hot spots strategy involved the strategic deployment of additional saturation police patrols in high-crime locations. Specifically, to address violent street crime, the LVMPD engaged in a 6- month (Nov 1, 2018 to Apr 30, 2019) cluster randomized controlled trial (RCT) design of street segments receiving additional hot spots deployment (saturation patrols) and streets receiving patrol as usual (control segments). All potential street segments were identified from an analysis of persistent violent crime hot spots (where intensive police focus has been paid by the violent crime unit officers since January of 2018). Researchers stratified highest risk and independent segments within chronic and persistent hot spot locations. Specifically, 22 treatment segments and 22 control segments were selected to form the evaluation. No treatment segment was within a block or intersection of another treatment or control segment to reduce potential contamination of findings. Deployment of officers to the treatment hot spots occurred via calls for service every day, randomly for a total of two hours of exposure at each hot spot. Officers were instructed to remain at the hot spot for a total of 15 minutes, which is the optimum time for deployment to achieve effects as identified by researchers (Koper, 1995). When reaching the hot spot, officers were also randomly instructed to either stay in their vehicle with the lights on, or patrol the segment on foot. Interviews with arrestees have shown police presence is understood and alters criminal behaviors in patrolled areas (Golub et al., 2003). However, hot spot patrols such as walking are likely to go unnoticed by ordinary citizens (Weisburd, Hinkle, Fameaga, & Ready, 2011). Therefore, using both treatment types (stationary with lights and foot patrol) likely leads to increased awareness of police, thereby reducing criminal activity. The control treatment was for business to occur as usual at the control street segments. Center researchers conducted fidelity assessments during the project implementation phase, in order to ensure that the strategy was being implemented properly. These assessments indicated a strong adherence to the research design. Specifically, the research design called for a total of 2 hours of saturation patrol (in 15-minute increments) each day. Analysis of all hot spot patrols revealed that approximately 1.5 hours of additional patrol was observed each day for 90% of all hot spots. A total of 2 hours of additional patrol as observed for 55% of all hot spots. These findings demonstrate that the LVMPD carried out the hot spots strategy as designed.

Alexandria, VA: International Association of Chiefs of Police, 2019. 43p.

Implementing Gang & Gun Violence Reduction Strategies in Las Vegas, Nevada: Evaluation of Offender Notification Meetings

By Robin S. Engel, Nicholas Corsaro and Tamara D. Herold

One of the most frequently used communication mechanisms associated with focused deterrence strategies are offender notification meetings, also referred to as “call-in” sessions. Typically, these meetings are used to communicate directly to offenders that their future violent behaviors (and those of their affiliated groups/gangs) will be responded to in a swift and predictable manner through a coordinated law enforcement effort to prioritize group violence, share information, and develop comprehensive group-focused responses (Engel, Tillyer & Corsaro, 2013). The purpose of sharing this information is to gain compliance through group pressure (Kennedy, 1997). The group/gang structure is believed to serve both as a communication vehicle, and a potential source of control, as the threat of group-focused enforcement encourages groups to police themselves (Tillyer & Kennedy, 2008). Additional messages regarding the availability of assistance, social services, and job opportunities are often conveyed. Finally, most meetings include some form of community messaging that describes the harm inflicted by violence to individual victims and the larger community, along with a plea to change their behavior. This type of “community moral voice” is designed to send clear messages of non-violence, and rejecting norms that promote violence (Brunson, 2015). Offender notification sessions are designed to alert offenders and alter their decision-making by conveying possible sanctions while offering available services, contingent upon the path that the offender (typically on probation and/or parole) chooses, be it desistence or continued high-risk behavior. Initiatives built on call in sessions ultimately seek to change offender behavior by blending law enforcement, community mobilization, and social service provisions in a targeted and directed fashion. While initiatives such as focused deterrence strategies, which rely heavily on offender notification sessions, have often corresponded with reductions in citywide gun violence and gang homicides, the direct influence of call in sessions on individual-level behavior (for those called-in) is far less understood. The following study examines the impact of offender notification meetings – with messaging heavily focused on compassion, support, and the harm inflicted by violence – on the likelihood of offender recidivism in Las Vegas, Nevada. Officials from the Las Vegas Metropolitan Police Department (LVMPD) and the Nevada Department of Public Safety, Division of Parole and Probation (NPP) worked collaboratively to conduct a series of offender notification meetings. Other components that typically accompany the implementation of focused deterrence strategies (e.g. targeted gang enforcement and social services provision) however, were not systematically implemented. Therefore, the following research represents a test solely of the impact of the offender notification meetings, answering the question of whether this form of communication with offenders has an impact on their individual likelihood of recidivism. In order to better understand the influence of call in sessions on offender recidivism patterns, officials from LVMPD partnered with researchers from the International Association of Chiefs of Police (IACP) / University of Cincinnati (UC) Center for Police Research and Policy, along with academic partners from the University of Nevada Las Vegas (UNLV) to randomize and implement an experimental trial to assess the impact of call in sessions on probationers and parolees in Las Vegas in the Spring and Fall of 2018. Using a randomized controlled trial (RCT) research design, this study addresses the following specific research questions:

1) What impact does attendance of probationers/parolees at offender notification meetings have on individual likelihood of recidivism? 2) Can a simple risk classification be developed using offender criminal histories and associations with violent gangs to assess whether risk classification correlates with offender recidivism patterns? 3) Does the impact of offender notification meetings vary based on probationer/parolees’ risk classification? Within the randomization component, probationers/parolees were first stratified into one of four possible categories dependent upon their prior violent criminal histories and current affiliation with a violent criminal gang in Las Vegas: 1) Low-Risk (neither a violent criminal history nor affiliated with a violent gang), 2) Low/Moderate-Risk (no prior violent criminal history but affiliation with a violent gang), 3) Moderate-Risk (prior violent criminal history but no affiliation with a violent gang), and 4) High-Risk (both violent criminal history and affiliation with a violent gang). A random case-control selection occurred within each risk-level stratum, and various waves of probationers and parolees who were assigned to treatment were called-in to attend notification sessions in May 2018 and October 2018. In total, 216 probationer/parolees were randomly assigned to treatment, and 300 to control groups. Probationer/parolee recidivism is the primary outcome of interest, operationalized in two forms: 1) a re-arrest of any type, and 2) an administrative failure (revocation) of probation/parole supervised by NPP. If either event occurred in the follow-up period (i.e., 12 months for May sessions, 9 months for October sessions) – the probationer/parolee (in either treatment or control condition) is classified as having recidivated. Three analytic strategies are employed for the various strata (as well as overall treatment-tocontrol comparisons) and waves of probation/parolee participants. First, a set of bivariate chisquare analyses on recidivism patterns for each risk group to set the foundation regarding covariation in treatment assignment (and attendance) calibrated with recidivism across the risk groups and waves of participants during the study period. Second, a series of binary logistic regression models for our recidivism outcome (where yes = 1 or no = 0) for each risk group (including culling all strata into a single analysis) and each wave of probationers and parolees in the study are estimated (see Long, 1997). The use of the multivariate regression model on our dichotomous outcome of interest allows, where appropriate, to include control variables in the analyses. While the use of statistical controls in randomized controlled trials is subject to debate, where statistical controls are potentially necessary (e.g., unbalanced covariates of importance between treatment and control probationers/parolees within each strata), the multivariate regression framework (including the logistic regression model) allows for such controls to be included into a single regression estimation. Finally, a series of Cox proportional hazard models are estimated to assess the effect that randomized treatment had on individual recidivism (see Cox, 1972).

Alexandria, VA: International Association of Chiefs of Police, 2020. 49p.

The U.S. Capitol Riot: Examining the Rioters, Social Media, and Disinformation

By Jian Wang

The thesis focuses on participants involved in the January 6 insurrection. The major aims of this thesis are to find out who stormed the Capitol on January 6, 2021, and to learn what major factors influenced them to engage in the insurrection that broke the tradition of peaceful transition of power for the first time since Lincoln’s Presidential election. It is also to study the current intertwined relationships between political elites, social media, technology, disinformation and mass audiences, and how they gathered together and organized the 'stop the steal' campaign, causing the violence on the Capitol on January 6, 2021. By studying this, we can learn how to prepare to face other looming and ongoing challenges that disinformation poses to democracy in the near future such as the mid-term election this November and the next Presidential Election in 2024, creating viable solutions. The thesis selected 124 subjects out of 691 on the Capitol Breach Cases' list across all regions of the U.S. It organized their data, including their names, and primary demographics such as gender, race, the geography of residence, and age, and reviewed and examined their attitudes towards the insurrection on January 6, 2021 in response to a belief that the 2020 election was fraudulent. The findings show that majority of participants are white male. 91.13% or 630 (0.9113 x 691 = 630) of whom are employed and 30% of or 207 (0.3 x 691) participants who are university or college educated. A number of defendants had associations with QAnon conspiracy theory and some known DVE (domestic violent extremist) groups such as Proud Boys, the Oath Keepers, and Three Percenters. The most striking finding is that veterans were highly over-represented in the mob (17% or 117), which exceeds the percentage of veterans in the U.S. population as a whole. The thesis suggests that four possible motivations for their participation: extremism in the military, nationalism and patriotism, a belief in Donald Trump's false claims, and social media. It also reveals that there is a strong positive connection between disinformation on social media and participants as they (96% of or 663 participants) were nearly all active on social media platforms such as Facebook, Twitter, Parler and Instagram, sharing and receiving misinformation about the election. More specifically, social media platforms should bear responsibility because social media technology employs popularity-based algorithms that tailor content to maximize user engagement, increasing the level of polarization, partisan animosity and political sectarianism

Cambridge, MA: Master's thesis, Harvard University Division of Continuing Education., 2022. 131p.

“Storming the Castle.” Examining the Motivations of the Veterans Who Participated in the Capitol Riots

By Eric B. Hodges

Ten percent of the Americans arrested for storming the US Capitol on January 6, 2021, are military veterans. These veterans have been charged with federal crimes ranging from Obstruction of an Official Proceeding to Assaulting Capitol Police Officers. This paper seeks to answer three questions related to those veterans’ participation in the Capitol Riots. Were their actions patriotic? What were their motivations? And was there anything about their military experience that made these veterans more likely to riot than non-veterans? A content analysis of 71 remarks made by 40 of the veterans arrested, both before and after the riots, was used to ascertain the motivations of those individuals. Analysis of the veterans’ comments revealed that they believed they were acting patriotically; however, closer examination shows that their motivations were more consistent with nationalism than patriotism. Additionally, the military training and combat exposure of the veterans, along with the “Stop the Steal” rhetoric, particularly comments made by former President Donald Trump, also played an integral role in influencing the veterans. The analysis also indicated that the Capitol Riots should be classified as a form of proto-sectarian violence and should serve as a cautionary tale against the growing divisiveness that sparked this incident.

Journal of Veteran Studies, 2021.

"This Is War": Examining Military Experience Among the Capitol Hill Siege Participants

By Daniel Milton and Andrew Mines

The issue of extremism in the military community has posed challenges for a long time. From the role of combat veterans in driving the rise of the militia movement after Vietnam and beyond, the U.S. military has contended with all manner of extremist movements and ideologies. Historically, extremist activities manifested in a number of ways, including attacks andor hate crimes against fellow service members and civilians, theft of military equipment, security breaches, and broader harm to morale, unit cohesion, personnel retention, recruiting efforts, and mission success. Although the vast majority of U.S. Department of Defense DoD personnel 5and veterans uphold our nations highest values during and well after their service, the worlds largest employer has struggled at times to confront a problem that affects all corners of American society. In the past decade, various organizations have raised serious red flags to both the DoD and Congressional oversight bodies regarding this looming threat. More recent reporting has pointed to growing evidence of white supremacy and racist ideologies in the military these last few years. Additionally, the siege on the U.S. Capitol and the surrounding focus on the involvement of individuals with military experience has highlighted the pressing need to take meaningful steps to understand and confront the problem at hand. To be clear, the Capitol Hill siege does not provide an all-encompassing view of modern day extremism in the military. However, an examination of the individuals charged in connection with that event can offer some perspective as to the diversity and scale of the connection between extremism and those with military experience.

Washington DC: Program on Extremism, George Washington University, West Point, NY: Combating Terrorism Center, West Point, New York: 2021. 44p.

United States: Domestic violent extremism on the rise

By Piotr Bąkowski

n recent years, the United States (US) has witnessed a growing number of terrorist attacks by domestic violent extremists. Many incidents at large-scale demonstrations across the country have increased the visibility of the problem and provoked strong reactions among civilians, law enforcement and policy-makers alike. When on 6 January 2021 a crowd of supporters of the then US President, Donald Trump, broke into the US Capitol while Congress was certifying the results of the 2020 presidential election, the issue of domestic violent extremism was thrust beyond US borders and into the international spotlight. Various US government agencies have consistently assessed domestic violent extremism as a significant threat. Although for counter-terrorism purposes extremists fall under a number of categories of a general nature, the threat they pose has become more decentralised and diverse over time. That said, racially and ethnically motivated violent extremists have been responsible for the most lethal acts of violence. After 11 September 2001, the focus of US counter-terrorism efforts shifted to international from domestic terrorism. US law does define domestic terrorism but does not qualify it as a criminal offence entailing indictment. Domestic extremist groups cannot be designated as terrorist organisations, and getting clearance to conduct investigations against them is more complicated than for their foreign counterparts. The assault on the Capitol led to a significant shift in counter-terrorism priorities, however, triggering the largest-scale investigation in US law enforcement history thus far, but also a comprehensive overhaul of government policies. Consequently, 2021 saw the adoption of the first national strategy specifically dedicated to domestic terrorism. The mutual commitment of the US and the European Union (EU) to combating violent extremism has resulted in fruitful exchanges among policy-makers, researchers and frontline practitioners. Nonetheless, efforts to establish a unified regulatory framework for addressing online extremist content have faced challenges due to differing perspectives on key issues such as the limits of free speech and government intervention.

Brussels, Belgium: EPRS | European Parliamentary Research Service, 2023. 12p.

“DIGITAL SOLDIERS” QAnon Extremists Exploit U.S. Military, Threaten Democracy

By Elizabeth Yates and Erin E. Wilson

This report examines how the QAnon movement exploits the U.S. military’s credibility in society to further its aim of undermining American democracy. It shows how 25 U.S. military veterans – all of whom have been engaged in the QAnon movement since the failed insurrection on January 6, 2021 – spread disinformation and build support for the movement. Analysis of their social media, along with a broader review of QAnon content, reveals how Q influencers portray the U.S. military as a heroic protagonist in their conspiratorial propaganda, and how they exploit military veterans to legitimate such claims and even recruit. It concludes with policy recommendations that focus on protecting members of the armed services, those who have served and their families, and communities the movement targets with its conspiracies

The mainstreaming of the QAnon extremist movement presents a growing threat to the American system of government. QAnon’s effort to create the perception that they are allied with the U.S. military has particularly alarming implications for our democracy:  It strengthens the QAnon movement by facilitating recruitment from both military and civilian communities and encourages active participation among adherents;  It lends legitimacy to discriminatory and anti-democratic conspiracies that are integrated into the Q movement, such as antisemitism and election denial;  It distorts the public’s understanding of the primary responsibilities of the military, and, importantly, the legal boundaries of domestic military intervention;  It undermines public faith in democratic institutions by regularly encouraging the acceptance of authoritarian actions; and  It threatens the communities the movement targets with its conspiracies and maligns the reputation of U.S. servicemembers, veterans, and their families.

New York: Human Rights First, 2022. 20p.

A Dangerous Web: Mapping Racially and Ethnically Motivated Violent Extremism

by Heather J. Williams, Luke J. Matthews, Pauline Moore, Matthew A. DeNardo, James V. Marrone, Brian A. Jackson, William Marcellino, Todd C. Helmus

Racially and Ethnically Motivated Violent Extremism: The Basics

Racially and ethnically motivated violent extremism (REMVE) refers to a loosely organized movement of individuals and groups that espouse some combination of racist, anti-Semitic, xenophobic, Islamophobic, misogynistic, and homophobic ideology. REMVE actors see their race or ethnicity under threat and promote the use of or engage in violence against a given population group. The majority of REMVE actors are motivated by cultural nationalism or White supremacy—beliefs that Caucasian or "Aryan" peoples represent superior races, and that "White culture" is superior to other cultures. Many REMVE actors also are motivated by White nationalism, which overlaps with White supremacy: Adherents espouse the belief that the White race is superior to others, and White nationalism emphasizes defining a country or region by White racial identity and promoting the interests of White people exclusively and at the expense of non-White populations.

More-common terms related to REMVE include far-right extremism, right-wing terrorism, radical right, or extreme right, which are used more frequently in literature and by other countries. Although these terms are not synonymous, they are used somewhat interchangeably and often without precise definitions. These terms also can be applied to political parties and movements that participate in political systems and do not engage in violence directly, particularly in Europe, where many parliamentary systems have formal far-right parties that participate in elections.

The U.S. State Department commissioned the RAND Corporation to produce a comprehensive network analysis of the White Identity Terrorist Movement (WITM) and REMVE in response to a congressional requirement from the 2021 National Defense Authorization Act.[2] The analysis—which sought to identify key actors, organizations, and supporting infrastructure and the relationships and interactions between them—is intended to inform a U.S. government strategy to counter REMVE.

Rand. 2022. 8p.

The Online Extremist Ecosystem: Its Evolution and a Framework for Separating Extreme from Mainstream

by Heather J. Williams, Alexandra T. Evans, Jamie Ryan, Erik E. Mueller, Bryce Downing

n this Perspective, the authors introduce a framework for internet users to categorize the virtual platforms they use and to understand the likelihood that they may encounter extreme content online.

The authors first provide a landscape of the online extremist "ecosystem," describing how the proliferation of messaging forums, social media networks, and other virtual community platforms has coincided with an increase in extremist online activity. Next, they present a framework to describe and categorize the platforms that host varying amounts of extreme content as mainstream, fringe, or niche. Mainstream platforms are those for which only a small portion of the content would be considered inappropriate or extreme speech. Fringe platforms are those that host a mix of mainstream and extreme content—and where a user might readily come across extreme content that is coded or obscured to disguise its violent or racist underpinning. Niche platforms are those that openly and purposefully cater to an extreme audience.

Santa Monica, CA: RAND, 2021. 44p.

Mapping White Identity Terrorism and Racially or Ethnically Motivated Violent Extremism: A Social Network Analysis of Online Activity

by Heather J. Williams, Luke J. Matthews, Pauline Moore, Matthew A. DeNardo, James V. Marrone, Brian A. Jackson, William Marcellino, Todd C. Helmus

Racially or ethnically motivated violent extremism (REMVE) and extremists (REMVEs) present some of the most pressing threats to the United States. REMVE also has been identified as the White identity terrorist movement (WITM). REMVEs are among the most lethal domestic violent extremists, and they are the most likely to commit mass-casualty attacks. These movements are characterized by a broad ideological orientation toward xenophobic, anti-Semitic, racist, and misogynistic sentiment.

For this report, the authors reviewed the relevant literature on REMVE networks and collected and analyzed social media data from six social networks (Twitter, Reddit, Gab, Ruqqus, Telegram, and Stormfront) to produce a global network map of the digital REMVE space. That network map evaluates each network's construction, connectivity, geographic location, references to prominent organizations, and proclivity to violence. The authors also reviewed ten countries' experiences with REMVE to sketch out an understanding of the REMVE space in these countries and how REMVEs in those countries relate to those in the United States.

Key Findings

The WITM/REMVE global network on social media is largely created and fueled by users in the United States

  • WITM/REMVE is fueled by U.S. domestic drivers, and this movement is less of an issue in other countries.

  • Programs to counter violent extremism are generally most productive when they are local.

  • The primary need is for robust national strategies to counter WITM/REMVE, specifically in the United States.

An organization- or actor-focused counter-WITM/REMVE strategy likely will not work because of the diffuse nature of REMVE movements

  • REMVE is a post-organizational movement; many REMVEs are radicalized outside an organized group and groups are loosely organized, meaning that U.S. strategy to counter REMVE should not be centered around key organizations and actors.

Intervention strategies should be multifaceted because of the complex nature of the problem and its intersections with protected civil rights

  • The scale of REMVE and the depth of its ideological roots in the United States suggest that targeting and ostracizing sympathizers would not be a successful intervention strategy.

There are structural differences in how REMVE manifests and is countered in Europe versus in the United States

  • The parliamentary system in many European countries gives those on the far right a presence in the political system, which provides a nonviolent outlet for fringe-movement adherents. Many European countries also have active intervention and counter-REMVE programs underway.

Racially or ethnically motivated violent extremism (REMVE) and extremists (REMVEs) present some of the most pressing threats to the United States. REMVE also has been identified as the White identity terrorist movement (WITM). REMVEs are among the most lethal domestic violent extremists, and they are the most likely to commit mass-casualty attacks. These movements are characterized by a broad ideological orientation toward xenophobic, anti-Semitic, racist, and misogynistic sentiment.

For this report, the authors reviewed the relevant literature on REMVE networks and collected and analyzed social media data from six social networks (Twitter, Reddit, Gab, Ruqqus, Telegram, and Stormfront) to produce a global network map of the digital REMVE space. That network map evaluates each network's construction, connectivity, geographic location, references to prominent organizations, and proclivity to violence. The authors also reviewed ten countries' experiences with REMVE to sketch out an understanding of the REMVE space in these countries and how REMVEs in those countries relate to those in the United States.

Key Findings

The WITM/REMVE global network on social media is largely created and fueled by users in the United States

  • WITM/REMVE is fueled by U.S. domestic drivers, and this movement is less of an issue in other countries.

  • Programs to counter violent extremism are generally most productive when they are local.

  • The primary need is for robust national strategies to counter WITM/REMVE, specifically in the United States.

An organization- or actor-focused counter-WITM/REMVE strategy likely will not work because of the diffuse nature of REMVE movements

  • REMVE is a post-organizational movement; many REMVEs are radicalized outside an organized group and groups are loosely organized, meaning that U.S. strategy to counter REMVE should not be centered around key organizations and actors.

Intervention strategies should be multifaceted because of the complex nature of the problem and its intersections with protected civil rights

  • The scale of REMVE and the depth of its ideological roots in the United States suggest that targeting and ostracizing sympathizers would not be a successful intervention strategy.

There are structural differences in how REMVE manifests and is countered in Europe versus in the United States

  • The parliamentary system in many European countries gives those on the far right a presence in the political system, which provides a nonviolent outlet for fringe-movement adherents. Many European countries also have active intervention and counter-REMVE programs underway.

Santa Monica, CA: RAND, 2022. 184p.

Countering Radicalization to Violence in Ontario and Quebec: Canada's First Online-Offline Interventions Model

By Moonshot

Over a one year period from April 2021 - March 2022, Moonshot partnered with three violence prevention organizations to deliver an online interventions pilot in two Canadian provinces. The pilot advertised psychosocial support services to individuals engaging with extremist content online. Access to these services was voluntary, confidential, and anonymous by design. Our goal was to offer a secure pathway for at-risk individuals to contact a trained therapist or social worker. We built this approach around offering integrated care. Together with our intervention partners, we crafted our advertising messages and service websites to emphasize the confidential, non-judgemental support that callers would receive. Individuals who reached out were connected to an interdisciplinary team, which included a therapist, youth engagement workers, a psychiatrist, and other intervention staff who could offer services like counseling, employment support, addiction support, or simply a space to talk. Our partners were the Estimated Time of Arrival (ETA) team in Ontario, and Recherche et Action sur les Polarisations Sociales (RAPS) in Quebec. The Canadian Practitioners Network for the Prevention of Radicalization and Extremist Violence (CPNPREV) acted as a convening and best practice provider, and supported our pilot evaluation. A description of each organization is at the end of this report. Moonshot’s intervention campaigns ran for a total of six months, and reached individuals consuming incel and violent far-right extremist content on Google Search and YouTube. Our online interventions focused on meeting individuals’ psychosocial needs, and appealed to vulnerabilities and grievances, such as anger, frustration, exhaustion, and isolation. Executive summary Key outcomes Moonshot redirected 786 at-risk individuals to our intervention partners’ websites. 22 initiated a conversation with a counselor. Four individuals formally registered and engaged with a service provider for several months, in addition to those who accessed virtual counselling without going through the registration process. At least one person who initially shared violent impulses has been able to find positive, hopeful alternatives for the future. Moonshot’s ads reached users engaging with harmful content on Google and YouTube 44,508 times. Among the hundreds of users redirected to ETA and RAPS’ websites, 26 were watching influential incel YouTube channels and 39 had searched Google for high-risk keywords related to incel and violent far-right ideology (“looksmax org”; “1488 tattoos”). Moonshot, ETA, RAPS, and CPN-PREV established an effective multi-sectoral partnership. During our pilot program, we co-designed support pathways and risk escalation procedures for each service area, built teams’ capacity to deliver online interventions safely and effectively, and engaged at-risk audiences online. This pilot provides a blueprint for future interventions to reach and engage at-risk internet users. New iterations of this work can reach larger audiences by expanding advertising beyond the pilot platforms, strengthening and expanding cross-sectoral partnerships, and testing new ways to reach often-isolated internet users.

Washington, DC: Moonshot, 2023. 13p.

The Domestic Extremist Next Door: How Digital Platforms Enable the War Against American Government

By The Digital Citizens Alliance

Digital platforms enabled the disturbing rise of domestic extremism, culminating with the January 6 attack on the U.S. Capitol. Militia groups use social media networks to plan operations, recruit new members and spread anti-democracy propaganda, a new Digital Citizens Alliance (Digital Citizens) and Coalition for a Safer Web (CSW) investigation has found.

Taking a page from Jihadists, these extremist groups operate along the fringes of where platforms such as YouTube, Twitter, Facebook, and Instagram will let them. Federal prosecutors investigating the Capitol riot revealed how militia groups used social media platforms to coordinate and prepare for possible conflict with Antifa. But the joint Digital Citizens / CSW investigation found the use of platforms goes well beyond tactical planning. Militias rely on the platforms to share their beliefs and ideology and recruit new members. The militias get a boost from their ideological simpatico with mis/disinformation groups like QAnon, which provides oxygen that militias use to fan the flames.

The anti-government militia movement first emerged after the 1992 Ruby Ridge standoff, the 1993 Waco siege, and the Oklahoma City Bombing on April 19, 1995. After Oklahoma City, U.S. law enforcement cracked down on domestic terrorism and the militia movement. In 1996, the Southern Poverty Law Center (SPLC) reported 858 militia groups with up to 50,000 active members. The 9/11 terrorist attacks shifted focus to global threats and led to a dormant period for militias. But domestic extremists such as the Proud Boys, the Boogaloo Bois, the Three Percenters, and the Oath Keepers have reinvigorated the movement – aided in large part by digital platforms. In 2020, according to research by The Washington Post, the number of domestic terrorism incidents in the United States had doubled from what it was in 1995. But the joint Digital Citizens / CSW investigation found the use of platforms goes well beyond tactical planning. Militias rely on the platforms to share their beliefs and ideology and recruit new members. The militias get a boost from their ideological simpatico with mis/disinformation groups like QAnon, which provides oxygen that militias use to fan the flames.

The anti-government militia movement first emerged after the 1992 Ruby Ridge standoff, the 1993 Waco siege, and the Oklahoma City Bombing on April 19, 1995. After Oklahoma City, U.S. law enforcement cracked down on domestic terrorism and the militia movement. In 1996, the Southern Poverty Law Center (SPLC) reported 858 militia groups with up to 50,000 active members. The 9/11 terrorist attacks shifted focus to global threats and led to a dormant period for militias. But domestic extremists such as the Proud Boys, the Boogaloo Bois, the Three Percenters, and the Oath Keepers have reinvigorated the movement – aided in large part by digital platforms. In 2020, according to research by The Washington Post, the number of domestic terrorism incidents in the United States had doubled from what it was in 1995.

Washington, DC: Digital Citizens Alliance, 2021. 56p.

Counter-Terrorism, Ethics and Technology: Emerging Challenges at the Frontiers of Counter-Terrorism

Edited by Adam Henschke, Alastair Reed, Scott Robbins and Seumas Miller

his open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.

Cham: Springer, 2021. 231p.

The Social Life of Anti-Terrorism Laws: The War on Terror and and the Classifications of the "Dangerous Others"

Edited by Julia M. Eckert

This book addresses two developments in the conceptualisation of citizenship that arise from the »war on terror«, namely the re-culturalisation of membership in a polity and the re-moralisation of access to rights. Taking an anthropological perspective, it traces the ways in which the trans-nationalisation of the »war on terror« has affected notions of »the dangerous other« in different political and social contexts, asking what changes in the ideas of the state and of the nation have been promoted by the emerging culture of security, and how these changes affect practices of citizenship and societal group relations.

\Bielefeld, Transcript Verlag, 2008. 197p.

Out, Out - The Role of Messaging in Countering Domestic Violent Extremism

By Kathryn M. Roberts

Countering the radical Islamist narrative remains a high-profile priority of the United States in its ongoing efforts to counter domestic violent extremism. Since mid-2014, government officials have condemned the United States as unable to muster a satisfactory counter-narrative, and emphasize the potentially devastating consequences of failure. Experts inside and outside the government describe the Islamic State as masters of the internet capable of reaching into the United States and turning its people into hate-filled, violently inspired terrorists at will. The idea that the United States must aggressively work to counter these messages domestically remains a given but should it The focus of this thesis is to examine current U.S. efforts in counter-messaging to determine why the United States believes it is failing, and what, if any, evidence supports the idea that a counter-narrative or counter-messaging should be part of domestic countering violent extremism CVE programs. Review of official documents found little basis to assess U.S. programs, as no meaningful published strategy, objectives, or performance data exist for current efforts. Moreover, the foundational assumptions underlying current programs suggest malalignment between what U.S. officials desire a counter-messaging effort to accomplish and what is realistically achievable. Based on these findings, it is recommended that domestic CVE programs eliminate counter-messaging from their portfolio.

Monterey, CA: Naval Postgraduate School, 2020. 119p,

Counter Terrorism Joint Inspection – National security division and multi-agency arrangements for the management of terrorist offenders in the wake of terrorist attacks

By HM Inspectorate of Probation, Inspectorate of Constabulary and Fire & Rescue Services and HM Inspectorate of Prisons (UK)

His Majesty’s Inspectorate of Probation has led an inspection, alongside HM Inspectorate of Constabulary, Fire & Rescue Services (HMICFRS), and HM Inspectorate of Prisons – looking at the work of the Probation Service’s National Security Division (NSD) and multi-agency arrangements for the management of terrorist offenders in the wake of terrorist attacks.

In response to terrorist attacks in 2019 and 2020, by known terrorist offenders who were subject to licence supervision, the NSD was created as a separate division of the Probation Service, working alongside police Counter Terrorism Nominal Management (CTNM) arrangements. Together with existing prison and probation services, these bodies are responsible for managing those convicted of terrorist offences or suspected of potential terrorist activity, even if they have no related convictions.

What we found

  • This inspection looked at the management and progress of the strategy to supervise these offenders. It found:

  • NSD, probation, police and prison services worked well together and are approaching managing counter terrorism cases collectively

  • supervision within the community was robust overall, balancing rehabilitative needs with tight risk management

  • probation practitioners within NSD were well trained specialist officers, holding a small and restricted caseload, delivering high quality case assessment and supervision

  • terrorist offenders were subject to additional oversight throughout their sentences

  • the arrangements to protect others from harm from terrorist cases in custody were effective

  • there has been significant financial investment to improve services dealing with counter terrorism, and staffing levels were appropriate

  • prison governors and directors were clear about the terrorist risk posed in their prisons and were actively managing this

  • leadership across the NSD and CTNM was strong, and there were clear lines of accountability, enhanced by national multi-agency governance arrangements.

Manchester: His Majesty’s Inspectorate of Probation, 2023. 65p.

Civilian Counterterrorism Forces and the Fight Against Extremism: A Review of Nigeria, Somalia, and Burkina Faso

By Riza Kumar

Protracted insurgencies and the growing threat by local affiliates of the global terrorism networks of al-Qaeda and the Islamic State (ISIS) throughout Nigeria, Somalia, and Burkina Faso have transformed on-the-ground responses to violent extremism throughout Sub-Saharan Africa. Somalia continues to grapple with the unrelenting force of the al-Qaeda affiliated al-Shabaab; Burkina Faso contends with al-Qaeda in the Islamic Maghreb (AQIM), Jama’at Nusrat al-Islam wal Muslimeen (JNIM), ISIS in the Greater Sahara (ISGS), and Ansarul Islam; and Nigeria remains encumbered by Boko Haram’s 14-year insurgency and the increasingly violent Islamic State West Africa Province (ISWAP). As serious and sustained militant and terrorist movements continue to kill thousands and displace millions, the three respective governments have altered their responses to violent extremists and terrorism, integrating civilian-led, community-based security strategies into their national counterterrorism programs. National armies and their international partners have offered some reprieve from enduring violent conflicts, but in many cases have failed to offer comprehensive protections to all civilians. Civilian counterterrorism militias emerged to provide security to vulnerable communities and were quickly recognized as an alternative to state-sponsored counterinsurgency campaigns. However, once these counterterrorism militias were enlisted and absorbed into the national security apparatus, new—albeit long-established—challenges quickly emerged. Localized counterterrorism campaigns have at times devolved into vengeful operations against ethnic rivals as well as opportunities to carry out illicit activities such as extortion, drug trafficking, and looting. The benefits and drawbacks of civilian counterterrorism militias remain consistent across different regions. The strategy is cost-effective and practical as civilian defense forces are often cheaper than formal security units, such as the national army and the police. There is a ready pool of potential local recruits to safeguard vulnerable communities, and they are knowledgeable about the communities they protect. Most importantly, civilian troops establish a level of community loyalty that can be difficult to achieve with national armies. Significant drawbacks of civilian forces are that troops can become unreliable and difficult to control if not properly managed. Furthermore, without strong and effective oversight mechanisms, civilian troops are capable of undermining government authority, rule of law, and governance. Unfortunately, if not carefully executed, civilian forces could deteriorate into armed criminal networks,1 transforming from vanguards of safety into long-term sources of instability and insecurity.

Berlin: Counter Extremism Project, 2023. 24p.

Linkages of terrorist groups in West Africa with terrorist networks in other African regions

By Dele-Adedeji | Sofia Koller

This policy paper summarizes the current state of affairs regarding the linkages of terrorist groups in West Africa with terrorist networks in other African regions. It also provides recommendations for policymakers and security agencies. The paper looks at linkages of JNIM, IS West Africa Province (ISWAP), and IS in the Greater Sahara (ISGS) with terrorist groups in North, West-Central, Eastern, and Southern Africa. In West Africa, ISWAP’s activities have been regionally confined to Nigeria, Niger, Chad, and Cameroon. There is no indication that ISWAP intends to expand its territorial base beyond these countries or that it has any transregional linkage with terrorist groups in other parts of Africa. JNIM and ISGS have demonstrated that they possess the intention and capability of regional expansion across West Africa. Increasing attacks further southwards in West Africa and their presence in the neighboring regions of Ivory Coast, Ghana, Togo, and Benin suggests that both groups intend to expand their geographical zone of influence to the Gulf of Guinea. There is, however, no indication of either JNIM or ISGS forming a transregional linkage with terrorist groups in other African sub-regions. ● In North, West-Central, East, and Southern Africa, there are also currently no indications that terrorist groups have developed linkages with other terrorist networks beyond their own region. ● Terrorist groups in West Africa are pragmatic in their approach to collaborations. Their choice of network linkages is guided by local dynamics and their own particular agenda rather than ideology. Hence, existing linkages are driven by the involvement in transnational organized crime (TNCO), potential financial gains as well as the potential of financing terrorism via local and international sources, training of fighters, foreign terrorist fighters from other African countries, and weapons smuggling and use of small arms and light weapons (SALWs).

Berlin: Counter Extremism Project Germany GmbH ,2023. 16p.

The Political Economy of Terrorism, Counterterrorism, and the War on Terror

By Anne R. Bradley , Christopher J. Coyne and Abigail R. Hall

Abstract: This Element explores the topics of terrorism, counterterrorism, and the US government’s war on terror following the September 11, 2001 terror attacks. It draws on insights from Austrian and public choice economics. First, it discusses the foundations of the economics of terrorism, emphasizing that the behaviors of terrorists and counterterrorists are purposeful and goal-oriented. It then considers the economics of counterterrorism policies and the importance of institutional change for reducing demand for terrorism. Next, it focuses on three dilemmas facing liberal societies in relation to counterterrorism efforts. The Element then provides an assessment of the US government’s war on terror. It discusses the origins of the war, whether it can be judged a success or a failure, and some of the main effects both abroad and within the United States. The Element concludes by putting forward several areas for future research.

NY. Cambridge University Press. 2023. 85p.