Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in Inclusion
The Input: Pathways to Jihad: A Thematic Analysis of 310 Cases

By Kacper Rekawek, Viktor Szucs, Martina Babikova, and Katsiaryna Lozka  

For the last year and a half, GLOBSEC has been studying the phenomenon of a crime-terror nexus in Europe. Its research team has built up a dataset of 348 individuals arrested for terrorism offences, expelled for alleged terrorist connections, or who died while staging terrorist attacks in Europe in 2015, the peak year of European jihadism. The dataset covers the 11 European countries, all within the EU, who reported the highest number of terrorism arrestees to EUROPOL (European Police Office). The work has been geared towards establishing whether the nexus exists and if so, then researching its nature and strength. The researchers deployed 11 experienced national teams who worked on available data (open source, official documents, personal interviews with stakeholders) to map out the European crime-terror nexus. The main research tool is a 120+ variable codebook deployed to analyse each case of a terrorist included in our dataset. As a result, the research team was able to establish that out of the 310 jihadists included in the database, 95, or 31%, had a previous criminal past, indicated by a pre-2015 arrest for any offence, with the French subset recording the most criminals (44 of the individuals, or 46%, have a criminal past preceding their terrorist involvement). Data show it is a male phenomenon, comprising 264, or 88%, of the individuals in our database. The European jihadists are not youngsters, as their average age is 34 (average male: 29; average female: 34; average “criminal turned terrorist”: 34), nor are they very well educated (the research team only knows of 72 who “had some high school” experience, and hardly any attended university).

Slovak Republic: GLOBSEC Policy Institute....28p.

Status of ISWAP and ISGS in West Africa and Sahel

By Pieter Van Ostaeyen | Kwesi Aning  

Since the initial rise in violent extremist and terrorist groups in the Sahel in the mid-2000s, the number of such groups in the region has continued to grow. This is reflected in the nature of the opportunistic alliances that have developed among different groups, with varying interests and memberships. Furthermore, these groups have changed their operational tactics over time and, since 2019, began a gradual expansion of their activities towards the littoral states of West Africa. This paper focuses on two of the most important extremist groups in the Sahel: Islamic State in West Africa Province (ISWAP) and Islamic State in Greater Sahel (ISGS). In discussing the origins of both groups, this paper argues that their establishment was not borne out of religious rationales alone. Rather, ISWAP’s and ISGS’s formation and expansion were based on their fractured relationships with the organizations from which they split and to a certain extent transformed, as well as their pursuit for new allegiances and competition for preeminence in the leadership as they battled to expand and establish Islamic states in northern Nigeria, Cameroon, Chad, Niger, and the Sahel. Ideologically, this paper identifies the adoption of Takfiri doctrines as the driving force resulting in more draconian interpretation and implementation of Islamic laws implemented by the hisba relating to zakat, hudud, ta’zir, and qisas. This paper argues that factionalism and splits from the original organizations represent fundamental splits from their original members and that the alliances formed by these originally distinct groups constitute a fundamental split and shift in operational tactics. ISWAP and ISGS operations are characterized by opportunism and exploitation of local grievances that enables them to build specific narratives for support….

Berlin: Konrad-Adenauer-Stiftung e.V.. Counter Extremism Program, 2023. 20p.  

Development of al-Qaeda in the Western Sahel Region

By Edmund Fitton-Brown and Bakary Sambe 

  This short paper explores how Jamaat Nusrat Al-Islam wal-Muslimin (JNIM), the predominant coalition of al-Qaeda (AQ) affiliates in the region, is structured and financed and how its component parts relate to one another. The paper will outline how the various groups constituting JNIM train and operate jointly and the extent of their use of trafficking routes and overlap with regional organized crime. It addresses the extent to which the spillover of JNIM activity from Mali and Burkina Faso into the Atlantic/Gulf of Guinea littoral states represents a threat to their stability. It also addresses the impact of political instability in Mali, Burkina Faso, and elsewhere on counterterrorism (CT) activity and the impact on terrorism of external state and non-state assistance. The paper seeks to diagnose the challenges posed by JNIM considering its local and regional circumstances on the ground and to provide operationally relevant recommendations both for actions within the region itself and through the use of international resources. The recommendations seek to integrate CT with measures aimed at preventing and countering extremism, conflict resolution, and development goals. They also highlight that the needs vary between different countries in the region. For example, measures applied to Mali cannot easily be transferred to mitigate the challenges in Burkina Faso  

Berlin: Konrad-Adenauer-Stiftung e.V. , Counter Extremism Program, 2023. 14p.

Linkages of terrorist groups in West Africa with terrorist networks in other African regions

By Ini Dele-Adedeji | Sofia Koller

This policy paper summarizes the current state of affairs regarding the linkages of terrorist groups in West Africa with terrorist networks in other African regions. It also provides recommendations for policymakers and security agencies. ● The paper looks at linkages of JNIM, IS West Africa Province (ISWAP), and IS in the Greater Sahara (ISGS) with terrorist groups in North, West-Central, Eastern, and Southern Africa. ● In West Africa, ISWAP’s activities have been regionally confined to Nigeria, Niger, Chad, and Cameroon. There is no indication that ISWAP intends to expand its territorial base beyond these countries or that it has any transregional linkage with terrorist groups in other parts of Africa. ● JNIM and ISGS have demonstrated that they possess the intention and capability of regional expansion across West Africa. Increasing attacks further southwards in West Africa and their presence in the neighboring regions of Ivory Coast, Ghana, Togo, and Benin suggests that both groups intend to expand their geographical zone of influence to the Gulf of Guinea….

Berlin: Konrad-Adenauer-Stiftung e.V. Counter Extremism Program, 2023. 16p.

Interlinkage of terrorism and transnational organized crime in West Africa

By Theo Clement and Hans-Jakob Schindler  

The nexus between terrorist and transnational organized crime (TOC) networks in West Africa presents one of the most significant security challenges. Both networks undermine governance and the rule of law and cooperate on a multitude of levels in a complex web of mutual beneficial arrangements. Therefore, this nexus presents a mutually enforcing mechanism that supports and accelerates regional destabilization. This paper argues that the risks emanating from this cooperation are not limited to terrorism financing alone as terrorist groups also use their cooperation with TOC networks to gain access to resources needed for their activities, such as arms and ammunition. Finally, such cooperation also allows terrorist groups to carve out spaces that allow them to control the local population while at the same time provide security for local licit and illicit economic activities. Therefore, this cooperation is in some cases also a tool through which terrorist groups can gain support and acceptance among the local population. Therefore… 

  • , tackling this nexus must involve both the regaining of territorial control from terrorist groups by the respective governments as well as the strengthening of governance structures. Both aims should also be attempted concurrently. This paper presents a range of recommendations for German and European decision-makers that primarily aim to disrupt the entry as well as exit points of the flows of illicit goods of the region. Given the current challenges European and German projects face when cooperating with some of the governments in the region, an emphasis on increasing regional cooperation in West Africa seems advisable. In particular, the paper suggests strengthening national and regional law enforcement and border control capabilities, especially within the coastal states of the Gulf of Guinea. Increased cooperation with the Intergovernmental Action Group Against Money Laundering in West Africa (GIABA), increased support to strengthen the management and control mechanisms for national parks, and intensified exchange mechanisms, such as the West Africa Police Chief Committee (WAPCC) of Economic Community of West African States (ECOWAS), could be contemplated. In addition, German and European decision-makers could encourage and support governments in the region in their efforts to intensify the use of existing regional mechanisms such as the ECOWAS sanctions mechanism, as well as increase the participation of regional states in the United Nations Office on Drugs and Crime (UNODC)-World Customs Organization (WCO) Container Control Program and INTERPOL’s West African Police Information System (WAPIS) as possible priorities. 

Berlin:  Konrad-Adenauer-Stiftung e.V. Counter Extremism Program 2023. 16p 

Europol (2023), European Union Terrorism Situation and Trend Report

By Europol

  Terrorism remains a significant threat to the internal security of the European Union. Terrorists operate across borders, leveraging new technologies and modi operandi to target innocent people. EU law enforcement authorities, in particular the counter-terrorism community, remain vigilant and united in countering the threat. The EU Terrorism Situation and Trend Report (TE-SAT) 2023 contributes to this effort, by presenting prevalent terrorism trends in the EU. Terrorism constitutes an attack on our society intending to create fear and chaos among EU citizens. In 2022, 16 terrorist attacks took place in the EU and an additional 12 attacks failed or were foiled. While the attacks directly affected seven Member States, more Member States arrested suspects in terrorism-related cases. Tragically, four people were killed in terrorist attacks in the EU, two resulting from jihadist attacks and two from a right-wing terrorist attack. We honour the memory of all those lost to terrorism in 2022 and in previous years.

  • Member States continue to view jihadist terrorism as the most prominent terrorist threat to the EU despite the fact that the number of jihadist attacks has decreased compared to 2021 and 2020. The threat from right-wing terrorist lone actors, radicalised online, remains significant. Left-wing and anarchist terrorists and violent extremists continue to pose a threat to public safety and security in the EU. Additionally, the spread of propaganda online and its potential for radicalisation remains a key concern. Social isolation and the lack of a solid support system remain key vulnerabilities which terrorists take advantage of in order to propagate their messages and to recruit new followers. This is particularly worrying with the increasing number of young people, including minors, exposed to online terrorist propaganda. Furthermore, the terrorist and violent extremist environment is becoming more decentralised and volatile. Diffuse actors connect and inspire one another, uniting behind grievances beyond ideology or group affiliation. This context is ripe for self-radicalisation and for lone actors to begin engaging in attack planning, and poses significant challenges for preventing and combating terrorism and violent extremism in the EU.   

  Publications Office of the European Union, Luxembourg, 2023. 94p. 

Understanding Conspiracist Radicalisation: QAnon's Mobilisation to Violence

By Anna Kruglova

This policy brief analyses the phenomenon of conspiracy theories, and how they fit in the realm of research on violent extremism. Using the case study of QAnon, this Policy Brief looks at how the movement mobilises people to violence on social media and attempts to determine how different this  process is from any other process of radicalisation to violence. By combining discourse analysis of the movement’s Gab posts, interviewing former supporters, and analysing three illustrative case studies, this Policy Brief identifies five discourses - such as revenge, “the Other”, chosenness/ specialness, apocalypse, and urgency for action and altruism - that are used to bring people into the violent mindset. It emphasises the similarity of these discourses to the ones used by other extremist organisations and argues against exceptionalising the threat of QAnon and other conspiracy theories. It concludes by making recommendations about how to tackle QAnon propaganda.

The Hague: International Centre for Counter-Terrorism (ICCT),    2023. 22p.

Responding to the Threat of Violent Extremism: Failing to Prevent

By Paul Thomas

How should we understand home-grown terrorism like the 7/7 London bombings? This is a classic monograph focusing on recent British attempts to 'prevent violent extremism', their problems and limitations, and what lessons this can offer for more effective policy approaches in future. Paul Thomas's extensive research suggests that the Prevent policy approaches, and the wider CONTEST counter-terrorism strategy, have been misguided and ineffective, further alienating British Muslim communities instead of supporting longer-term integration. He argues that new, cohesion-based approaches encouraging greater trust and integration across all communities represent the best defence against terrorism.

London: Bloomsbury Academic, 2021. 190p.

Promising Approaches for Implementing Extreme Risk Laws: A Guide for Practitioners and Policymakers

By Parsons, Chelsea; Bengali, Ruhi; Zale, Courtney; Geller, Lisa; Cantrell, Spencer

From the document: "Extreme Risk Protection Order (ERPO) laws create an opportunity to intervene and prevent firearm violence when there are warning signs that an individual poses a risk of harm to self or others. While ERPO laws are relatively new, a growing body of research demonstrates the potential for these laws to prevent firearm violence, particularly firearm suicide, and multiple victim/mass shootings. Interest in ERPO laws has increased in recent years, with 16 states having enacted these laws between 2018 and 2023. Implementation varies widely across and within states. As a result of strong ERPO implementation efforts in some jurisdictions, more information is now available for state and local leaders about how to implement and adapt ERPO laws for their own communities. In addition, the Bipartisan Safer Communities Act of 2022 included $750 million in new federal grant funding for states, some of which is designated to support ERPO implementation. To meet this moment, the Everytown for Gun Safety Support Fund and the Johns Hopkins Center for Gun Violence Solutions have partnered to compile this guide of the best available practices and promising approaches to effective implementation of extreme risk laws. These recommendations are informed by conversations with individuals who are pioneering ERPO implementation, in addition to the best practices shared at a December 2022 convening of ERPO leaders from around the country."

Johns Hopkins Center for Gun Violence Solutions. Everytown for Gun Safety. 2023. 52p.

Policy Playbook: Building a Systems-Oriented Approach to Technology and National Security Policy

Corrigan, Jack; Flagg, Melissa; Murdick, Dewey

From the document: "This brief aims to provide a framework for a more systems-oriented technology and national security strategy. We begin by identifying and discussing the tensions between three strategic technology and national security goals: '1. Driving technological innovation. 2. Impeding adversaries' progress. 3. Promoting safe, values-driven deployment.' We go on to provide a brief overview of 15 levers of power through which policymakers can pursue these goals. These proposed levers fall into two categories: 'direct levers of power' (there are nine), which are focused on discrete functions and issue sets; and 'enabling levers of power' (there are six), which are more general-purpose and can be used to enhance the effect of the direct levers. These proposed categories are based on our own analysis, and while the list is non-exhaustive, it provides a useful framework for characterizing government actions and aligning them to particular goals of technology policy. [...] This adaptable framework, suitable for any country or international body, emphasizes the importance of creative problem-solving and having a comprehensive understanding of the policy landscape to achieve strategic goals. This framework is intended for decision-makers and stakeholders in the realms of technology, national security, and economic policy."

Georgetown University. Walsh School of Foreign Service. Center for Security and Emerging Technology. 2023. 33p.

Planned in Plain Sight: A Review of the Intelligence Failures in Advance of January 6th, 2021 [redacted]

By Gary Peters

From the document: "At the direction of U.S. Senator Gary Peters, Chairman of the Homeland Security and Governmental Affairs Committee (HSGAC), and following the Committee's initial review of the security, planning, and response failures in advance of and during the January 6th attack, Majority Committee staff conducted a subsequent review focused on the intelligence failures leading up to the attack on the U.S. Capitol on January 6th. This review included assessments of documents and information provided to the Committee pursuant to its original February 2021 request for information from relevant agencies, as well as documents, interview transcripts, and supporting materials related to the House Select Committee's investigation and final report. This report assesses federal intelligence collection, analysis, and dissemination processes and interagency coordination in advance of January 6th. The report finds that FBI and I&A [Office of Intelligence and Analysis] obtained large amounts of intelligence indicating the potential for violence on January 6th. However, neither FBI nor I&A issued sufficient warnings to their law enforcement partners based on that intelligence, partially because these agencies were biased toward discounting the possibility of such an unprecedented event. Federal agencies also suffered from a lack of coordination as they prepared for January 6th."

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. 2023. 106p.

Terrorism and the Pandemic: Weaponizing of COVID-19

By Rohan Gunaratna and Katalin Petho˝-Kiss  

  The global COVID-19 pandemic continues to attract the attention of threat groups. Although conventional means—the gun and the bomb— will remain terrorists’ preferred mode of attack, threat groups have expressed an interest in exploiting the virus. Terrorist and extremist groups, cells, and personalities will not let up using what works for their stated purposes. Rather than using tested and proven traditional weapons, will contemporary and future threat groups use bioweapons? Some terrorist and extremist groups, especially the Islamic State and right-wing extremist groups, have shown intentions to weaponize the virus. Unlikely to disappear in the near future, the contagion worldwide reached six and a half million deaths in 2022 and is expected to further increase in 2023. Modified organisms can certainly be weaponized, but the weaponized versions would not come from a backstreet lab. The infrastructure to produce a sophisticated weapon needs highly trained scientists. Such weaponization would most probably come from government-run programs. The analogy would be nuclear weapons, where terrorists cannot manufacture them but they can get hold of weapons created by governments and use them. Bioweapons are invisible, replicate, and self-perpetuate. Because of the widespread availability of SARS-CoV-2 causing COVID-19 disease, will there be a paradigm shift from traditional terrorism to bioterrorism?  

New York: London: Berghahn Books, 2023.  213p.

'The Great Replacement': The Violent Consequences of Mainstreamed Extremism

By Jacob Davey and Julia Ebner

  This report presents the findings of a project that investigated the prevalence, scale and nature of the ideologies and narratives that motivated the attack which left 51 dead and injured a further 50 more during Friday prayers at the Al Noor Mosque and the Linwood Islamic Centre in Christchurch, New Zealand. The report explores the origins of the ‘Great Replacement’ and ‘white genocide’ theories and the dynamics and platforms which have allowed the ideas to spread. Using a combination of quantitative and qualitative analysis across mainstream and alternative social media channels, this report reveals significant mainstreaming of extreme-right narratives across social media platforms and in language and policies promoted by mainstream politicians in Europe and North America. This report provides some recommendations for steps to be taken by technology companies, government and civil society to counter the spread of extremist ideologies.   

Beirut; Berlin; London; Paris; Washington DC : Institute for Strategic Dialogue (ISD), 2019. 36p.

Audit of the Department of Justice's Strategy to Address the Domestic Violent Extremism Threat

United States. Department Of Justice. Office Of The Inspector General

From the document: "The objectives of this audit were to: (1) evaluate the Department of Justice's (DOJ or Department) efforts to develop a comprehensive strategy to address domestic violent extremism (DVE) in the United States, and (2) determine if the Department is effectively coordinating among Department stakeholders on the implementation of its strategy. Our audit scope covered the period of fiscal year (FY) 2017 to FY 2022. [...] DOJ has identified DVE, which it refers to interchangeably as domestic terrorism, as one of the most significant threats facing the country. DOJ has characterized its efforts to counter DVE as a whole-of-Department commitment that requires sustained attention and resources. Nonetheless, DOJ has not formalized a DVE strategy. DOJ has focused attention on investigating, prosecuting, and preventing acts of DVE, but it also has experienced challenges in ensuring that its various efforts are cohesive and used in a strategic way to better identify lessons learned and spread awareness of available resources. Moreover, although DOJ has issued some internal guidance relating to DVE investigations, additional clearer guidance across all law enforcement and litigating components could assist in promoting greater consistency about what qualifies as a DVE case and better coordination in the handling of cases with a DVE nexus. DOJ should also consider formalizing mechanisms to routinely evaluate the efficacy and impact of its DVE efforts and to maintain the continuous protection of civil liberties. Finally, DOJ should improve its coordination on data-driven efforts to consistently track DVE-related cases across the Department. [...] Our report contains seven recommendations to assist the Department in its efforts to have a cohesive and sustained approach to addressing the DVE threat."

United States. Department Of Justice. Office Of The Inspector General . 2023. 43p.

Coping with Terrorism: Origins, Escalation, Counterstrategies, and Responses

Edited by Rafael Reuveny and William R. Thompson

Terrorism is imprinted on Western society's consciousness. Nearly every week a terrorist attack occurs in the world. The academic world, in attempting to understand terrorism, has often been limited to descriptive work rather than analysis, and has produced surprisingly few mainstream collections on the subject. Coping with Terrorism offers a collection of essays that ask: who are terrorists, what are their goals, who supports them, and how can we combat their tactics? The essays are scholarly, rather than journalistic or ideological, in their approach. As such, they scrutinize a much-discussed and prevalent subject and bring it into the mainstream for international relations.

Albany: State University of New York Press, 2010. 418p.

Law, Liberty, and the Pursuit of Terrorism

By Roger Douglas

It is commonly believed that a state facing a terrorist threat responds with severe legislation that compromises civil liberties in favour of national security. Roger Douglas compares responses to terrorism by five liberal democracies— the United States, the United Kingdom, Canada, Australia, and New Zealand— over the past 15 years. He examines each nation’s development and implementation of counterterrorism law, specifically in the areas of information gathering, the definition of terrorist offenses, due process for the accused, detention, and torture and other forms of coercive questioning. Douglas finds that terrorist attacks elicit pressures for quick responses, which often allow national governments to accrue additional powers. But emergencies are neither a necessary nor a sufficient condition for such laws, which may persist even after fears have eased. He argues that responses are influenced by institutional interests and prior beliefs and are complicated when the exigencies of office and beliefs point in different directions. He also argues that citizens are wary of government’s impingement on civil liberties and that courts exercise their capacity to restrain the legislative and executive branches. Douglas concludes that the worst anti-terror excesses have taken place outside of, rather than within, the law and that the legacy of 9/11 includes both laws that expand government powers and judicial decisions that limit those very powers. 

Ann Arbor: University of Michigan Press, 2022. 337p.

Politico-ideological Mobilisation and Violence in the Arab World: All In

By Ahmed Ajil

This book presents a study of politico-ideological mobilisation and violence by focusing on the life stories, trajectories and narratives of individuals who mobilised for causes and conflicts in the Arab World. It provides a greater understanding of the biographical, sociological, political and historic factors pertinent for their radicalisation processes. What makes individuals identify with suffering and injustice, often of others and elsewhere? Why do individuals feel the need to stand up in the first place and how does violent action become a justifiable or necessary course of action? Why and how do they disengage from violence? This book, based on interviews conducted in Lebanon, Switzerland, and Canada, answers these questions. It presents new theoretical insights about politico-ideological mobilisation and violence. By focusing on grievances and grounding analysis in the empirical reality as it is shared and narratively constructed by those who are at the heart of the phenomenon, it moves beyond the moralistic and politicised debates that characterise the field. Interviewees include non-violent and violent engagement for causes and conflicts related to the Arab World, such as sympathisers or members of groups and causes from a variety of ideological orientations, including Shiite militias, Salafi-jihadist groups, radical left-wing groups, Palestine-specific, Kurdish groups, and others such as right-wing or unspecified affiliations. By choosing individuals with different forms of political engagement, both non-violent and violent, and different ideological orientations, it helps readers to get a better grasp of how similar grievances may lead to different outcomes. In focusing on three markedly different geopolitical contexts, the book also provides a cross-contextual understanding of mobilisation for political and violent action. The interviewees also include experts and peripheral actors such as professionals, researchers, policymakers, friends, or family members. Their perspectives complement and enrich some of the findings by providing external yet in-depth ‘expert knowledge’. Politico-ideological Mobilisation and Violence in the Arab World will be of great interest to criminologists, political scientists, sociologists, and other scholars interested in the study of terrorism, radicalisation and extremism. It will also appeal to journalists, policymakers, practitioners working in the field.

London; New York: Routledge, 2023. 286p.

Terrorism in Great Britain: the statistics

By  Grahame Allen, Matthew Burton and Alison Pratt

The beginning of the millennium saw an increased political focus on the threat from international terrorism, heightened by the attack on the Twin Towers on 11 September 2001. Only one year before 9/11, new counter-terrorism legislation had been passed in the UK. Designed to reform and extend state powers found in previous counter-terrorism legislation, the Terrorism Act 2000 gave increased powers to the Home Secretary and the police. It moved the focus of counter-terrorism to all forms of domestic and international terrorism, rather than just Northern Ireland-related terrorism. In 2003, the Government introduced its counter-terrorism strategy, CONTEST. Now in its fourth iteration, CONTEST aims to reduce the risk to the UK from terrorism with four objectives:

  • Pursue: to stop terrorist attacks

  • Prevent: to stop people becoming terrorists or supporting terrorism

  • Protect: to strengthen protection against a terrorist attack

  • Prepare: to mitigate the impact of a terrorist attack

Although statistics relating to terrorism and the use of counter-terrorism legislation have been collected by the Home Office since the 1970s, the publication (and consistent collection) of data was halted in 2001. This briefing examines the available statistics on terrorism in Great Britain including:

  • Deaths due to terrorism

  • The use of stop and search legislation

  • Terrorism arrests

  • Pre-charge detention periods

  • Prosecutions and convictions for terrorism

  • Terrorist prisoners

  • The use of TPIMS

  • The number of foreign fighters fighting in Syria

London: Home Office Library, 2022. 37p.

Prevalence of Veteran Support for Extremist Groups and Extremist Beliefs: Results from a Nationally Representative Survey of the U.S. Veteran Community

Helmus, Todd C.; Brown, Ryan Andrew; Ramchand, Rajeev

From the document: "Policymakers and researchers are concerned that the U.S. veteran community is at increased risk of radicalization to violent extremism. Although subsequently revised downward, early reports suggested that as many as one in five Capitol Hill attackers was currently or had previously been affiliated with the U.S. military. Extremist groups actively target military members and veterans for recruitment because of their training and operational, logistic, and leadership skills. The unique and often lonely experience of leaving the military has been hypothesized to make veterans susceptible to such recruitment. To help address these concerns, the authors conducted a nationally representative survey of veterans to examine the prevalence of support for specific extremist groups and ideologies, including support for political violence. The authors compared their results with those from surveys of the general population. Among other findings, the veteran community, as a whole, did not manifest higher support than the general population. Interestingly, the majority of those who supported political violence were not also supporters of specific groups."

RAND Corporation. 2023. 26p.

Terrorism, Criminal Law and Politics: The Decline of the Political Offence Exception to Extradition

By Julia Jansson

Recent atrocities have insured that terrorism and how to deal with terrorists legally and politically has been the subject of much discussion and debate on the international stage. This book presents a study of changes in the legal treatment of those perpetrating crimes of a political character over several decades. It most centrally deals with the political offence exception and how it has come to have changed. The book looks at this change from an international perspective with a particular focus on the United States. Interdisciplinary in approach, it examines the fields of terrorism and political crime from legal, political science and criminological perspectives. It will be of interest to a broad range of academics and researchers, as well as to policy-makers involved in creating new anti-terrorist policies.

New York; London: Routledge, 2019. 300p.