Open Access Publisher and Free Library
TERRORISM.jpeg

TERRORISM

Terrorism-Domestic-International-Radicalization-War-Weapons-Trafficking-Crime-Mass Shootings

Posts in Social Sciences
Firearm Suicide Among Veterans of the U.S. Military: A Systematic Review 

By Jason Theis,  Katherine Hoops, Marisa Booty,  Paul Nestadt, Cassandra Crifasi

Introduction: In the United States, firearm suicide represents a major cause of preventable, premature death among veterans. The purpose of this systematic review was to characterize the body of literature on veteran firearm suicide and identify areas for future research, which may facilitate the development of firearm suicide interventions in Veterans Health Administration (VHA) and non–Veterans Health Administration clinical settings.

Materials and Methods: All randomized controlled trials, quasi-experimental, naturalistic, observational, and case study designs published between January 1, 1990, and February 21, 2019, were included in our review. Following title and abstract review, 65 papers were included in our full-text review and 37 studies were included in our analysis. We based our approach on a modification of the Preferred Reporting Items for Systematic Reviews and Meta-Analysis guidelines. Studies were grouped into broad, non-mutually exclusive categories: (1) heterogeneity of datasets and veteran status determination for inclusion, (2) service histories, (3) firearm ownership, storage, behaviors, and risk perceptions, (4) patient and clinician attitudes toward firearm restriction interventions, (5) firearm suicide risk factors by study population, and (6) assessments of clinical firearm interventions.

Results: This body of literature consists predominately of cross-sectional studies with mixed definitions and validation of veteran status, which revealed a high concordance of increased risk of firearm suicide compared with nonveterans. Veterans have higher rates of firearm ownership than the general population, primarily citing personal protection as the reason for gun ownership. Veterans often exhibit risky firearm usage and storage behaviors but tend to favor measures that limit access to firearms by at-risk individuals. Despite this, there remains persistent hesitation among clinicians to screen and counsel veterans on firearm safety.

Conclusions: This systematic review highlights an urgent need to produce higher quality evidence and new data with standard definitions that are critical to inform clinical practice and enhance public health measures to reduce firearm suicide among veterans

Military Medicine, Volume 186, Issue 5-6, May-June 2021, Pages e525–e536,

download
Those Who Serve: Addressing Firearm Suicide Wmon Military Veterans

By Everytown Research and Policy

Beginning in 2020, the destabilizing impact of the COVID-19 pandemic led to social isolation, economic struggles, and worsening mental health across the country. Though suicide rates across the nation had declined from 2019 to 2020,1 they began to increase in 2021, and veterans were not immune to this trend. More veterans died by suicide in 2021 than in 2020,3 studies show that veterans saw a higher incidence of mental health concerns than before the pandemic. By 2021, 72 percent of veteran suicides involved firearms—the highest proportion in over 20 years. With an average of 18 veterans dying by suicide in the United States each day, 13 of them by firearm, we cannot address veteran suicide without talking about guns. Veterans confront unique challenges during their service and face new ones when they return to civilian life. And these challenges are not always what might be expected. While many assume that suicide in veterans is associated with their time while deployed veterans who served during the wars in Iraq in Afghanistan who were not deployed6 had higher suicide rates than those who were deployed. But one thing is clear: addressing the unique role guns play is an integral part of efforts to end veteran suicide. It is crucial to pursue policies that can protect against veteran suicide, including disrupting a person’s access to a firearm when they are in crisis through secure gun storage, storing a gun outside the home, using Extreme Risk laws; raising awareness about the risks of firearm access; addressing upstream factors that can lead to veteran suicide; and ensuring that we have timely data about the basic aspects of this crisis.

New York: Everytown Research and Policy 2024.


download
Domestic Terrorists' Contact with System Stakeholders Before Attacks

MCBRIDE, MEGAN K.; JENKINS, MONIQUE

From the document: "Within the public violence literature--that is, the literature on domestic terrorism, mass shootings, school shootings, and hate crimes, among others--leakage has been identified as a core warning behavior. Leakage occurs when a would be assailant communicates an intention to harm a target before committing an attack. This communication can vary in timing, level of detail, form, intentionality, and audience. Through such a communication, an individual might directly verbalize an intent to commit an act, make more subtle threats and innuendos, or share a plan via social media. Researchers have found relatively high levels of leakage associated with acts of public violence, including adolescent-perpetrated mass murders, mass shootings, political and public figure assassinations, and domestic terrorism. For this reason, leakage--which often occurs in interactions online or with loved ones--can be an important warning sign. But leakage to family, friends, or acquaintances is not the only way to detect when an individual is intending to commit an act of public violence, and over the last decade, researchers have started to examine preattack contact with system stakeholders, such as law enforcement, mental health, and education professionals. [...] We sought to advance understanding of what percentage of the violent extremist population could be 'catchable' in the sense that an individual had been in previous contact with a system stakeholder (e.g., law enforcement, mental health provider) or had been reported to a system stakeholder (e.g., by a friend or loved one to whom they had intentionally or unintentionally leaked information). To explore this issue, we leveraged a new dataset: the Domestic Terrorism Offender Level Database (DTOLD). The database includes detailed information on the 320 non-Islamist individuals who carried out terrorist attacks in the United States between January 1, 2001, and December 31, 2020. Specifically, we sought to understand what percentage of this population was known to system stakeholders at some point before they perpetrated their attacks." Further information for this document can be found here: www.cna.org/reports/2024/08/domestic-terrorists-contact-with-system-stakeholders-before-attacks

CNA CORPORATION. 2024. 4p.

download
Gold Supply Chain Opacity and Illicit Activities: Insights from Peru and Kenya

By Nicole M. Smith, Kady Seguin, U. Mete Saka, Sebnem Duzgun, Ashley Smith-Roberts, David Soud, Jenna White

Illicit gold flows constitute a major development challenge for governments and a social responsibility challenge for many industries along gold supply chains, including gold refiners and jewelry retailers. This paper highlights aspects of gold supply chains that lack transparency and may indicate junctures where illicit activities are taking place, resulting in a loss of tax and customs revenues. Using Peru and Kenya as case study countries, we draw from United Nations Comtrade data and qualitative data from field research to examine the magnitude of the gold trade, the forms in which gold is traded, discrepancies in reported trade data, and key trade partners for each country. We suggest that certain portions of gold supply chains should be given more attention, some types of gold exports and imports present greater traceability challenges than others, and some countries play a much more significant role in the global gold trade. We propose areas where further investigations may be warranted to ensure more transparent and responsible gold supply chains.

Journal of Illicit Economies and Development, 6(1): pp. 42–59. 2024

download
New War, Same Battle? Conflict-Related Human Trafficking in the Context of the War in Ukraine

By Eva Veldhuizen Ochodničanová, Alicia Heys

Despite the link between conflict and human trafficking having been globally recognized, academic inquiry investigating how the two interact continues to be limited. Given the recency of the full-scale invasion of Ukraine by the Russian Federation in February 2022, this lack of literature is even more pronounced in understanding how the risks of trafficking are developing in the current context. This paper examines extant academic literature to explore what is already known about the relationship between conflict and human trafficking, situating this within the theoretical framework of routine activity theory (RAT). It analyses governmental and non-governmental organization reports emerging from Ukraine to contextualize the risk that is specific to those affected by the war. The paper identifies four key drivers of risk facing those in, or fleeing, Ukraine, which can heighten their vulnerability to human trafficking, before offering a novel and innovative typology of the ways that human trafficking can manifest as a result of conflict. The typology gives consideration to the direct and indirect links between conflict and trafficking, the geographical spaces in which trafficking can occur, and the specific forms that exploitation can take. By situating the paper within RAT and contextualizing it with evidence from the war in Ukraine, the findings of this paper provide both theoretical and empirical insights that help to expand existing knowledge on how conflict situations can increase the risk of THB.

  Journal of Illicit Economies and Development, 6(2): pp. 26–41.2024   


download
Public Health Framing of Firearm Violence on Local Television News in Philadelphia, PA, USA: A Quantitative Content Analysis

By Jessica H. Beard , Shannon Trombley, Tia Walker, Leah Roberts3, Laura Partain4, Jim MacMillan5 and Jennifer Midberry

Background: Firearm violence is an intensifying public health problem in the United States. News reports shape the way the public and policymakers understand and respond to health threats, including firearm violence. To better understand how firearm violence is communicated to the public, we aimed to determine the extent to which firearm violence is framed as a public health problem on television news and to measure harmful news content as identified by firearm-injured people.

Methods: This is a quantitative content analysis of Philadelphia local television news stories about firearm violence using a database of 7,497 clips. We compiled a stratified sample of clips aired on two randomly selected days/months from January to June 2021 from the database (n = 192 clips). We created a codebook to measure public health frame elements and to assign a harmful content score for each story and then coded the clips. Characteristics of stories containing episodic frames that focus on single shooting events were compared to clips with thematic frames that include a broader social context for violence.

Results: Most clips employed episodic frames (79.2%), presented law enforcement officials as primary narrators (50.5%), and included police imagery (79.2%). A total of 433 firearm-injured people were mentioned, with a mean of 2.8 individuals shot included in each story. Most of the firearm-injured people featured in the clips (67.4%) had no personal information presented apart from age and/or gender. The majority of clips (84.4%) contained at least one harmful content element. The mean harmful content score/clip was 2.6. Public health frame elements, including epidemiologic context, root causes, public health narrators and visuals, and solutions were missing from most clips. Thematic stories contained significantly more public health frame elements and less harmful content compared to episodic stories.

Conclusions: Local television news produces limited public health coverage of firearm violence, and harmful content is common. This reporting likely compounds trauma experienced by firearm-injured people and could impede support for effective public health responses to firearm violence. Journalists should work to minimize harmful news content and adopt a public health approach to reporting on firearm violence.

Beard et al. BMC Public Health, 2024.     

download
REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 4.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

download
REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 3.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

download
REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 2.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

download
REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 1.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

download
Century of Genocide : Eyewitness Accounts and Critical Views

Edited by Samuel Totten William S. Parsons Israel W. Charny

Focus on Genocide: The book, "Century of Genocide," edited by Samuel Totten, William S. Parsons, and Israel W. Charny, provides eyewitness accounts and critical views on various genocides of the 20th century.

Range of Genocides: It covers genocides such as the Holocaust, Armenian Genocide, Soviet Famine in Ukraine,Cambodian Genocide, and many others, highlighting the diversity and global spread of these atrocities.

Eyewitness Accounts: The book emphasizes the importance of first-person testimonies to provide a human perspective and counteract denial and distortion of historical events.

Scholarly and Activist Efforts: It calls for intensified scholarly study and activist efforts to document, understand, and prevent genocides, stressing the need for a collective response to these crimes against humanity.

Garland Publishing Inc., 1997, 507 pages

READ
Philosophy in a Time of Terror: Dialogues with Jürgen Habermas and Jacques Derrida

By Gierenne Berraderi

Philosophical Dialogues: The book features dialogues with Jürgen Habermas and Jacques Derrida, focusing on their responses to the 9/11 attacks and the philosophical implications of terrorism.

Themes: It explores themes like terrorism, globalization, sovereignty, and the legacy of the Enlightenment.

Philosophical Approaches: Habermas and Derrida offer distinct perspectives on terrorism and political philosophy, with Habermas emphasizing democratic legitimacy and Derrida focusing on deconstruction and hospitality.

Personal Context: The book was conceived in the immediate aftermath of 9/11, reflecting the author's personal experiences and the broader impact of the event on New York City.

University of Chicago Press, 2003, 208 pages

READ
Understanding Al-Qaeda: The Transformation of War

By Mohammad-Mahmoud Ould Mohamedou

Transformation of War: The book discusses how Al Qaeda represents ashift in the nature of warfare, moving from traditional state-basedconflicts to transnational, non-state actors engaging in asymmetricwarfare.

Historical Context: It explores the historical and political contextbehind Al Qaeda's actions, emphasizing the importance ofunderstanding their motivations and grievances.

Misconceptions: The author addresses common misconceptions aboutAl Qaeda, arguing that their actions are politically motivated rather thanpurelyideological or irrational.

Way Forward: The book suggests potential ways to resolve the conflict, including the possibility of negotiations and reassessment of currents trategies.

Pluto Press, 2007, 136 pages

read
White Supremacist and Anti‐government Extremist Groups in the US

Keneally, Katherine; Davey, Jacob

From the document: "This project by the Global Network on Extremism and Technology (GNET) looks at the user journeys of individuals who enter and participate in the online spaces of extremist communities. A user journey here refers to the distinct path a user may follow to reach their goals when accessing and using an online space belonging to extremist communities. User journeys are particularly important in offering insights into the rationale and motivations of users on the one hand, and to the inner workings of extremist online communities on the other. This is vital for understanding their goals and objectives. In selecting the ideologies for this project, we drew upon extremist communities - rather than extremist and terrorist organisations or groups - including those actors that participate in the extremist milieu and share ideas but do not necessarily operate in concert. These ideologies include those of formal and well-defined extremist organisations of White supremacist and anti-government extremist groups in the United States, supporter networks of Islamic State (IS), and looser communities of extremist actors including accelerationists, incels and chan site members who operate on shared platforms, congregating around common beliefs but without the connection of formal membership. This project is a response to the growing interest in understanding how individuals enter and participate in online spaces of extremist communities."

Global Network On Extremism And Technology (GNET). 24 JUL, 2024.

download
Catalyzing Crisis: A Primer on Artificial Intelligence, Catastrophes, and National Security

DREXEL, BILL; WITHERS, CALEB

From the document: "Since ChatGPT [Chat Generative Pre-Trained Transformer] was launched in November 2022, artificial intelligence (AI) systems have captured public imagination across the globe. ChatGPT's record-breaking speed of adoption--logging 100 million users in just two months--gave an unprecedented number of individuals direct, tangible experience with the capabilities of today's state-of-the-art AI systems. More than any other AI system to date, ChatGPT and subsequent competitor large language models (LLMs) have awakened societies to the promise of AI technologies to revolutionize industries, cultures, and political life. [...] This report aims to help policymakers understand catastrophic AI risks and their relevance to national security in three ways. First, it attempts to further clarify AI's catastrophic risks and distinguish them from other threats such as existential risks that have featured prominently in public discourse. Second, the report explains why catastrophic risks associated with AI development merit close attention from U.S. national security practitioners in the years ahead. Finally, it presents a framework of AI safety dimensions that contribute to catastrophic risks."

CENTER FOR A NEW AMERICAN SECURITY. UN, 2024. 42p.

download
Digital Weaponry of Radicalisation: AI and the Recruitment Nexus

SHAH, MARIAM

The following excerpt from the document contains multiple links embedded in the original text: "Islamic State (IS) recently released a powerful recruitment message for 'distracted Muslim youth' to travel and join IS territories across the world. It highlights a disturbing trend in how terrorist organisations are using technology to recruit and mobilise members through a single message. It also shows that contemporary terror groups and extremist organisations are adapting fast to emerging technologies. This Insight aims to highlight an alarming reality: the exploitation of Artificial Intelligence (AI) technology by terrorist and violent extremist groups to strengthen recruitment efforts. These groups proficiently manipulate online platforms, leveraging sophisticated AI tools to disseminate tailored propaganda content to exploit psychological vulnerabilities and amplify divisive narratives, thereby fostering radicalisation and recruitment. From using encrypted messaging apps like Telegram and WhatsApp to seeking refuge in the anonymity of the Dark Web, these groups employ various tactics to evade AI detection and exploit vulnerabilities. By leveraging AI tools, these groups engage in personalised messaging, rapid distribution, and exploitation of social media algorithms to amplify their reach and influence susceptible individuals."

GLOBAL NETWORK ON EXTREMISM AND TECHNOLOGY (GNET). 4 JUL, 2024. 8p.

download
Firearm Violence: A Public Health Crisis in America

UNITED STATES. PUBLIC HEALTH SERVICE. OFFICE OF THE SURGEON GENERAL

From the document: "A recent nationally representative survey (n=1,271) found that the majority of U.S. adults or their family members (54%) have experienced a firearm-related incident. Among all respondents, 21% have personally been threatened with a firearm, 19% have a family member who was killed by a firearm (including by suicide), 17% have witnessed someone being shot, 4% have shot a firearm in self-defense, and 4% have been injured by a firearm (Figure 2). 'Nearly 6 in 10 U.S. adults say that they worry 'sometimes,' 'almost every day,' or 'every day,' about a loved one being a victim of firearm violence.' Such high levels of exposure to firearm violence for both children and adults give rise to a cycle of trauma and fear within our communities, contributing to the nation's mental health crisis. This Advisory describes the public health crisis of firearm violence in America and describes strategies for firearm injury and violence prevention, with a focus on the health and well-being of children, families, and communities."

United States. Public Health Service. Office of the Surgeon Genera. . 2024. 49p.

download
Introducing SHIFT Analysis and Understanding Intra-Actions Within QAnon: Co-Presence of Conspiracy Beliefs and Extremism, Full Report

CENTRE FOR RESEARCH AND EVIDENCE ON SECURITY THREATS

From the document: "Eruptions of violence during the events of January 6th 2021 exemplified the need to understand how conspiracy theories and extremism interact to create security threats. Social media presents as a key player in this exchange, and this project sought to respond to that dynamic by exploring and seeking to understand the intra-actions in groups which discuss both conspiracy beliefs and extreme ideas. To achieve this, it synthesises techniques from computer science and social science to analyse data from platforms which enable and promote unguarded speech. [...] This report seeks to understand how conspiracy theories and extreme ideologies impact one another. [...] This report will introduce a new method analysis of conspiracy and politically motivated groups named the SHIFT analysis. This analysis combines data science and social research techniques within a broadly abductive approach to develop new understanding of dynamic events. SHIFT analysis, which is mutable and robust to examine a singular group or between group interactions in this context, is applied to examine the QAnon movement, in the context of the lead up to and aftermath of January 6th, which espoused both extreme political ideology and conspiracy beliefs." "SHIFT" comes from the beginning letters of the following five analysis procedures: 1. 'S'ocial network analysis and identification; 2. 'H'one extracted sample and coding; 3. 'I'nvestigative netnography; 4. 'F'rame analysis; and 5. 'T'ext analytics.

CENTRE FOR RESEARCH AND EVIDENCE ON SECURITY THREATS. JUN, 2024. 36p.

download
'Substitution': Extremists' New Form of Implicit Hate Speech to Avoid Detection

RISIUS, MARTEN; NAMVAR, MORTEZA; AKHLAGHPOUR, SAEED; XIE, HETIAO (SLIM)

The following excerpt from the document contains multiple links embedded in the original text: "'Content Warning: This insight contains antisemitic, racist, and hateful imagery.' [...] Extremists exploit social media platforms to spread hate against minority groups based on protected attributes such as gender, religion, and ethnicity. Platforms and researchers have been actively developing AI tools to detect and remove such hate speech. However, extremists employ various forms of implicit hate speech (IHS) to evade AI detection systems. IHS spreads hateful messages using subtle expressions and complex contextual semantic relationships instead of explicit abusive words, bringing challenges to automatic detection algorithms. Common forms of IHS include dog whistles, coded language, humorous hate speech, and implicit dehumanisation. Moreover, the forms and expressions of IHS evolve rapidly with societal controversies (e.g., regional wars). Identifying and tracking such changes in IHS is crucial for platforms trying to counter them. In this Insight, we report and analyse 'Substitution' as a new form of IHS. Recently, we observed extremists using 'Substitution' by propagating hateful rhetoric against a target group (e.g., Jews) while explicitly referencing another label group (e.g., Chinese). We show that Substitution not only effectively spreads hate but also exacerbates engagement and obscures detection."

GLOBAL NETWORK ON EXTREMISM AND TECHNOLOGY (GNET). 24 JUN, 2024. 8p.

download
2024 Department of Defense Arctic Strategy

UNITED STATES. DEPARTMENT OF DEFENSE

From the document: "The United States is an Arctic nation, and the region is critical to the defense of our homeland, the protection of U.S. national sovereignty, and our defense treaty commitments. I am issuing this 2024 Arctic Strategy to guide the U.S. Department of Defense (DoD) in a concerted approach to preserve the Arctic as a stable region in which the U.S. homeland remains secure and vital national interests are safeguarded. Major geopolitical changes are driving the need for this new strategic approach to the Arctic, including Russia's full-scale invasion of Ukraine, the accession of Finland and Sweden to the NATO Alliance, increasing collaboration between the People's Republic of China (PRC) and Russia, and the accelerating impacts of climate change. This increasingly accessible region is becoming a venue for strategic competition, and the United States must stand ready to meet the challenge alongside Allies and partners. This new DoD strategy directs the Department to enhance its Arctic capabilities, deepen engagement with Allies and partners, and exercise our forces to build readiness for operations at high latitudes. The document supports the 2022 National Security Strategy as well as the 2022 National Strategy for the Arctic Region, and its lines of effort implement the 2022 National Defense Strategy direction to adopt a 'monitor-and-respond' approach to preserving stability in the Arctic. This strategy represents prudent and measured efforts to protect U.S. interests in the face of new challenges and an evolving security environment."

Washington DC. UNITED STATES. DEPARTMENT OF DEFENSE. 21 JUN, 2024. 28p.

download