Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in Terrorism
White Supremacist and Anti‐government Extremist Groups in the US

Keneally, Katherine; Davey, Jacob

From the document: "This project by the Global Network on Extremism and Technology (GNET) looks at the user journeys of individuals who enter and participate in the online spaces of extremist communities. A user journey here refers to the distinct path a user may follow to reach their goals when accessing and using an online space belonging to extremist communities. User journeys are particularly important in offering insights into the rationale and motivations of users on the one hand, and to the inner workings of extremist online communities on the other. This is vital for understanding their goals and objectives. In selecting the ideologies for this project, we drew upon extremist communities - rather than extremist and terrorist organisations or groups - including those actors that participate in the extremist milieu and share ideas but do not necessarily operate in concert. These ideologies include those of formal and well-defined extremist organisations of White supremacist and anti-government extremist groups in the United States, supporter networks of Islamic State (IS), and looser communities of extremist actors including accelerationists, incels and chan site members who operate on shared platforms, congregating around common beliefs but without the connection of formal membership. This project is a response to the growing interest in understanding how individuals enter and participate in online spaces of extremist communities."

Global Network On Extremism And Technology (GNET). 24 JUL, 2024.

Catalyzing Crisis: A Primer on Artificial Intelligence, Catastrophes, and National Security

DREXEL, BILL; WITHERS, CALEB

From the document: "Since ChatGPT [Chat Generative Pre-Trained Transformer] was launched in November 2022, artificial intelligence (AI) systems have captured public imagination across the globe. ChatGPT's record-breaking speed of adoption--logging 100 million users in just two months--gave an unprecedented number of individuals direct, tangible experience with the capabilities of today's state-of-the-art AI systems. More than any other AI system to date, ChatGPT and subsequent competitor large language models (LLMs) have awakened societies to the promise of AI technologies to revolutionize industries, cultures, and political life. [...] This report aims to help policymakers understand catastrophic AI risks and their relevance to national security in three ways. First, it attempts to further clarify AI's catastrophic risks and distinguish them from other threats such as existential risks that have featured prominently in public discourse. Second, the report explains why catastrophic risks associated with AI development merit close attention from U.S. national security practitioners in the years ahead. Finally, it presents a framework of AI safety dimensions that contribute to catastrophic risks."

CENTER FOR A NEW AMERICAN SECURITY. UN, 2024. 42p.

“You are doomed!" Crisis-specific and Dynamic Use of Fear Speech in Protest and Extremist Radical Social Movements

By Simon Greipl, Julian Hohner, Heidi Schulze, Patrick Schwabl, Diana Rieger

Social media messages can elicit emotional reactions and mobilize users. Strategic utilization of emotionally charged messages, particularly those inducing fear, potentially nurtures a climate of threat and hostility online. Coined fear speech (FS), such communication deliberately portrays certain entities as imminently harmful and drives the perception of a threat, especially when the topic is already crisis-laden. Despite the notion that FS and the resulting climate of threat can serve as a justification for radical attitudes and behavior toward outgroups, research on the prevalence, nature, and context of FS is still scarce. The current paper aims to close this gap and provides a definition of FS, its theoretical foundations, and a starting point for (automatically) detecting FS on social media. The paper presents the results of a manual as well as an automated content analysis of three broadly categorized actor types within a larger radical German Telegram messaging sphere (2.9 million posts). With a rather conservative classification approach, we analyzed the prevalence and distribution of FS for more than five years in relation to six crisis-specific topics. A substantial proportion between 21% and 34% within the observed communication of radical/extremist actors was classified as FS. Additionally, the relative amount of FS was found to increase with the overall posting frequency. This underscores FS's potential as an indicator for radicalization dynamics and crisis escalation.

Journal of Quantitative Description: Digital Media. Vol. 4, 2024.

Introducing SHIFT Analysis and Understanding Intra-Actions Within QAnon: Co-Presence of Conspiracy Beliefs and Extremism, Full Report

CENTRE FOR RESEARCH AND EVIDENCE ON SECURITY THREATS

From the document: "Eruptions of violence during the events of January 6th 2021 exemplified the need to understand how conspiracy theories and extremism interact to create security threats. Social media presents as a key player in this exchange, and this project sought to respond to that dynamic by exploring and seeking to understand the intra-actions in groups which discuss both conspiracy beliefs and extreme ideas. To achieve this, it synthesises techniques from computer science and social science to analyse data from platforms which enable and promote unguarded speech. [...] This report seeks to understand how conspiracy theories and extreme ideologies impact one another. [...] This report will introduce a new method analysis of conspiracy and politically motivated groups named the SHIFT analysis. This analysis combines data science and social research techniques within a broadly abductive approach to develop new understanding of dynamic events. SHIFT analysis, which is mutable and robust to examine a singular group or between group interactions in this context, is applied to examine the QAnon movement, in the context of the lead up to and aftermath of January 6th, which espoused both extreme political ideology and conspiracy beliefs." "SHIFT" comes from the beginning letters of the following five analysis procedures: 1. 'S'ocial network analysis and identification; 2. 'H'one extracted sample and coding; 3. 'I'nvestigative netnography; 4. 'F'rame analysis; and 5. 'T'ext analytics.

CENTRE FOR RESEARCH AND EVIDENCE ON SECURITY THREATS. JUN, 2024. 36p.

'Substitution': Extremists' New Form of Implicit Hate Speech to Avoid Detection

RISIUS, MARTEN; NAMVAR, MORTEZA; AKHLAGHPOUR, SAEED; XIE, HETIAO (SLIM)

The following excerpt from the document contains multiple links embedded in the original text: "'Content Warning: This insight contains antisemitic, racist, and hateful imagery.' [...] Extremists exploit social media platforms to spread hate against minority groups based on protected attributes such as gender, religion, and ethnicity. Platforms and researchers have been actively developing AI tools to detect and remove such hate speech. However, extremists employ various forms of implicit hate speech (IHS) to evade AI detection systems. IHS spreads hateful messages using subtle expressions and complex contextual semantic relationships instead of explicit abusive words, bringing challenges to automatic detection algorithms. Common forms of IHS include dog whistles, coded language, humorous hate speech, and implicit dehumanisation. Moreover, the forms and expressions of IHS evolve rapidly with societal controversies (e.g., regional wars). Identifying and tracking such changes in IHS is crucial for platforms trying to counter them. In this Insight, we report and analyse 'Substitution' as a new form of IHS. Recently, we observed extremists using 'Substitution' by propagating hateful rhetoric against a target group (e.g., Jews) while explicitly referencing another label group (e.g., Chinese). We show that Substitution not only effectively spreads hate but also exacerbates engagement and obscures detection."

GLOBAL NETWORK ON EXTREMISM AND TECHNOLOGY (GNET). 24 JUN, 2024. 8p.

2024 Department of Defense Arctic Strategy

UNITED STATES. DEPARTMENT OF DEFENSE

From the document: "The United States is an Arctic nation, and the region is critical to the defense of our homeland, the protection of U.S. national sovereignty, and our defense treaty commitments. I am issuing this 2024 Arctic Strategy to guide the U.S. Department of Defense (DoD) in a concerted approach to preserve the Arctic as a stable region in which the U.S. homeland remains secure and vital national interests are safeguarded. Major geopolitical changes are driving the need for this new strategic approach to the Arctic, including Russia's full-scale invasion of Ukraine, the accession of Finland and Sweden to the NATO Alliance, increasing collaboration between the People's Republic of China (PRC) and Russia, and the accelerating impacts of climate change. This increasingly accessible region is becoming a venue for strategic competition, and the United States must stand ready to meet the challenge alongside Allies and partners. This new DoD strategy directs the Department to enhance its Arctic capabilities, deepen engagement with Allies and partners, and exercise our forces to build readiness for operations at high latitudes. The document supports the 2022 National Security Strategy as well as the 2022 National Strategy for the Arctic Region, and its lines of effort implement the 2022 National Defense Strategy direction to adopt a 'monitor-and-respond' approach to preserving stability in the Arctic. This strategy represents prudent and measured efforts to protect U.S. interests in the face of new challenges and an evolving security environment."

Washington DC. UNITED STATES. DEPARTMENT OF DEFENSE. 21 JUN, 2024. 28p.

Biden Administration's Middle East Policy at a Time of War: An Assessment of US Policy Six Months into the Israel-Hamas War

KATULIS, BRIAN

From the document: "[1] The Biden administration set forth five main objectives in reaction to the Oct. 7 Hamas attack against Israel and ensuing war in the Gaza Strip: [a.] Support Israel's self-defense and objective of eliminating the threat posed by Hamas; [b.] Secure the safe return of hostages; [c.] Prevent a wider regional war; [d.] Protect civilians and respond to a growing humanitarian crisis in Gaza; and [e.] Create a post-war plan for reconstruction leading to a two-state solution and wider regional normalization efforts in coordination with regional and international partners. [2] Six months into the Israel-Hamas war, the Biden administration has not achieved enough progress toward these goals, although it has avoided some of the worst-case scenarios. Success is hampered in part by tensions stemming from the fact that some of the tactics and policy approaches are at odds with each other."

MIDDLE EAST INSTITUTE (WASHINGTON, D.C.). 1014. 9p.

United States International Cyberspace & Digital Policy Strategy: Towards an Innovative, Secure, and Rights-Respecting Digital Future

United States. Department Of State.

From the document: "The United States seeks to work with allies, partners, and stakeholders across the globe to shape the design, development, governance, and use of cyberspace and digital technologies to advance economic prosperity and inclusion; enhance security and combat cybercrime; promote and protect the exercise of human rights, democracy, and the rule of the law; and address transnational challenges. The United States believes in the critical role that the responsible uses of digital technologies and interconnected networks play in empowering people, and that an open, interoperable, secure, and reliable Internet enables new solutions to global challenges. Autocratic states and other actors, however, have used cyber and digital tools to threaten international peace and stability, harm others, exert malign influence, and undermine the exercise of human rights. An innovative, rights-respecting international cyberspace and digital technology policy strategy is foundational to U.S. strategic, security, economic, and foreign policy interests. Leadership in cyberspace, the digital economy, and emerging digital technologies is central to advancing the U.S. vision set forth in the October 2022 National Security Strategy (NSS) of a 'free, open, secure, and prosperous world.' As the lead foreign policy agency for the United States, the Department of State is advancing the 2023 National Cybersecurity Strategy (NCS) and its objectives of forging international partnerships to build an open, resilient, defensible, and rights-respecting digital ecosystem."

UNITED STATES. DEPARTMENT OF STATE. 6 MAY, 2024

Fulcrum: The Department of Defense: Information Technology Advancement Strategy

UNITED STATES. DEPARTMENT OF DEFENSE. CHIEF INFORMATION OFFICER

From the document: "Fulcrum represents the Department's ambitious Information Technology (IT) advancement strategy designed to leverage the power of technology to drive transformative change and serves as a tipping point for catalyzing digital modernization for the warfighter. To propel the Department forward, we must ensure continued success and relevance in the digital age. Fulcrum will enable achievement of the DoD mission and strategic objectives with unparalleled efficiency and effectiveness. [...] The DoD Chief Information Officer's (DoD CIO) mission is to 'connect', 'protect', and 'perform'. Fulcrum outlines a vision guided by four lines of effort (LOEs) representing a strategic shift that embraces technology as a mission enabler. [...] Fulcrum features the DoD CIO's IT goals and objectives for Fiscal Years (FYs) 2025-2029 that provide essential support to the priorities in the National Defense Strategy (NDS), and the supporting DoD Strategic Management Plan (SMP)."

UNITED STATES. DEPARTMENT OF DEFENSE. 6 JUN, 2024

Fortifying Pakistan: The Role of U.S. Internal Security Assistance

MAY CONTAIN MARKUP

C. Christine Fair and Peter Chalk

"Fortifying Pakistan: The Role of U.S. Internal Security Assistance" delves into the complex relationship between the United States and Pakistan, focusing on the dynamics of internal security assistance. The book provides a comprehensive analysis of how U.S. involvement has influenced Pakistan's security landscape, shedding light on the challenges and opportunities inherent in this strategic partnership. Through meticulous research and insightful perspectives, the author offers a valuable resource for policymakers, scholars, and anyone seeking a nuanced understanding of this critical geopolitical alliance.

UNITED STATES INSTITUTE OF PEACE PRESS. Washington, DC. 2006. 182p.

Grievance-fuelled violence: Modelling the process of grievance development

By Emily Corner and Helen Taylor

Acts of extreme or mass violence perpetrated by lone offenders have become increasingly common in liberal democracies over the past 20 years. Some describe these acts as politically motivated, while others attribute them to mental disorder or criminal intent. This has led to the development of distinct research and practice areas focusing on either violent extremism, mass murder, fixation, stalking, or familial and intimate partner homicide. However, there is increasing understanding that the distinction between political ideology, criminal intent and personal motivation is blurred, and that the violence carried out by these individuals is better understood using the broader concept of grievance-fuelled violence. This work is the first to empirically consolidate the existing research in these distinct areas, employing a multifaceted analytical approach to develop a holistic model of the processes of grievance development among those who commit grievance-fuelled violence.

Research Report no. 27. Canberra: Australian Institute of Criminology. 2023. 95p.

Review of violent extremism risk assessment tools in Division 104 control orders and Division 105A post-sentence orders

By Timothy Cubitt and Heather Wolbers

Risk assessment for violent extremism plays a critical role in understanding the threat posed by radicalised offenders and determining how these individuals are managed both in correctional settings and in the community. The Australian Institute of Criminology (AIC) was engaged by the Department of Home Affairs’ Countering Violent Extremism (CVE) Branch to conduct a review of the use of risk assessments for violent extremism in Australia.

The aim of this review was to:

• identify and describe violent extremism risk assessment tools currently available to support risk assessments of convicted terrorist offenders;

• assess each tool’s suitability to assist an expert to conduct an assessment of the risk to the community from an offender, when a court is considering whether to issue a control order under Division 104 or a post-sentence order under Division 105A of the Criminal Code Act 1995 (Criminal Code); and

• review current risk assessment frameworks, including the use of Structured Professional Judgement, to assess the risk of violent extremist offending and consider how violent extremism risk assessment tools might be improved.

A review of relevant peer-reviewed and grey literature was undertaken alongside semi-structured interviews with a group of experts in violent extremism risk assessment. Findings from this review are organised according to the Terms of Reference.

Special reports. no 14. Canberra: Australian Institute of Criminology. 2023. 70p.

Terrorism and Banditry in Nigeria: The Nexus : Kaduna, Katsina, Niger and Zamfara States Context

By Oluwole Ojewale, et al.

This report details the findings of the research study that examined the plausibility between terrorism and banditry towards shedding new light on the dynamics of the country’s security challenges especially in northwest and north central Nigeria, within the focal context of Kaduna, Katsina, Niger and Zamfara States. Nigeria faces a plethora of security challenges ranging from the Boko Haram religious/violent extremism cum insurgency in the northeast to farmer-herder conflict and banditry in the northcentral and northeast, a revived secessionist movement in the southeast, police repression, piracy, and more recently attacks the nexus between banditry and terrorism; highlight the strategies and actions required by various stakeholders at various levels to counter the spread of banditry and terrorism in these focal states. Predominantly, the report utilises both qualitative and descriptive methods, generated from primary and secondary data gotten through desk review, and a consolidation of findings with feedback from consultations with stakeholders in selected focal states. The report undertook qualitative research in the focal states, documenting the experiences of some critical stakeholders through key on security installations, among others. In spite of government efforts, the security situation in Nigeria is deteriorating. The report thus explores the question of whether banditry and terrorism are the alternate side of the same coin and the security and policy implications of conflating both. The purpose of this report is to ascertain informant interviews. These interviews were cluster-based to provide a better context to the literature and systemically present the experiences of stakeholders. The report finds that while banditry gravely endangers public safety and security in the focal states, there are contextual differences in the origin, evolution, and manifestations of banditry in the focal states. Understanding these local variations is important to deploying effective and sustainable solutions to this spectre of banditry that defines governance in the states. The report also notes that there is no discernible ideological persuasion underpinning banditry beyond theft, extortion, and wanton violence. Bandits are primarily motivated by the alluring prospects of wealth in a region blighted by poverty and poor socioeconomic outcomes. However, this does not exclude the fact that fundamentalist Islamist groups operate in the same space as bandits. There is the possibility that some bandit groups might have adopted more of a religious modus operandi on their initiative or through limited contact with extremist groups. While the report notes the dearth of studies investigating in detail the theoretical and functional nature of the relationship between banditry and terrorism in these four states, the preliminary evidence points to the existence of both environmental and operational convergence between bandits and Islamist fundamentalist groups in the focal states.

Africa: Goodluck Jonathan Foundation (GJF) 2021. 43p.

The Wars Are Here: How the United States’ Post-9/11 Wars Helped Militarize U.S. Police

By Jessica Katzenstein

Six years after the germinal United States protests against anti-Black police violence in Ferguson, MO, and months after the 2020 police killings of George Floyd and Breonna Taylor, police in mine-resistant vehicles have once again occupied both the streets and mass public attention. In 2014, images from the Ferguson protests—of snipers pointing semi automatic rifles into crowds and officers tear-gassing unarmed civilians—prompted activists and politicians to compare the St. Louis suburb to occupied Gaza, Ukraine, or Iraq.2 During the summer of 2020, as the U.S. witnessed its largest public uprisings since the 1960s, police militarization again came under scrutiny. The Department of Homeland Security flew surveillance aircraft over protests in 15 cities, as officers on the ground deployed flash-bang grenades, sound cannons, rubber bullets, and tear gas against peaceful demonstrators.3 Since protests began, at least 14 local law enforcement agencies in 10 states have received free mine-resistant vehicles built for the U.S. military.4 In response, some lawmakers have revived efforts to curtail such transfers of military equipment.5 Reform groups are advocating to demilitarize the police by limiting when and how they can use armored vehicles and camouflage uniforms.6 In this moment of potential transformation, we must analyze both the deep roots and the recent upsurge of police “militarization” in order to grasp what calls for “demilitarizing” the police could mean. This paper argues that today’s high level of police militarization is one of the cruel, complex domestic costs of recent American wars abroad. Police militarization is in a sense as old as U.S. policing itself, yet it has exploded since September 11, 2001 and its intensification must be counted among the costs of this country’s post-9/11 wars.

Providence, RI: Brown University, Watson Institute, 2020. 20p.

Continuity and Change: Extremist-used Arms in Mali

By Holger Anders

  This Briefing Paper looks at sources and pathways through which al-Qaeda- and Islamic State-linked extremists in Mali obtain their arms, ammunition, and explosives. This review includes an analysis of the materiel’s origins, types, and ages. The Briefing Paper presents the author’s assessment of some 800 arms and 12,000 ammunition casings that national and international authorities recovered and granted access to following extremist attacks in Mali from 2015 to 2022. Introduction -  By 2022, Mali had faced more than a decade of armed violence perpetrated by violent extremists. Since 2015, this violence has also spread from northern to central and southern parts of Mali, resulting in thousands of victims among national and international armed forces, UN peacekeepers, and civilians. This Briefing Paper investigates the arms, ammunition, explosives, and other material used by al-Qaeda- and IslamicState linked extremists (‘extremists’) as ‘tools of violence’ used in their attacks from 2015 to 2022. It provides an update on findings previously published by the Small Arms Survey concerning the proliferation and trafficking of illicit materiel in northern Mali prior to 2015. Specifically, this Briefing Paper focuses on military materiel legally produced and transferred by state actors before being diverted to extremist use in Mali.2 In so doing, the Briefing Paper examines three topics: 1. continuity in extremist procurement of their ‘tools of violence’; 2. changes in illicitly trafficked materiel and their sources; and 3. extremist network connections identified by the monitoring of this material. A confidential database maintained by the author provides the basis for the technical information concerning extremist-used arms and other material in this Briefing Paper.3 That database contains information about some 400 extremist attacks occurring across Mali between 2015 and 2022 from sites in which national and international authorities recovered extremist-used materiel that was made available for inspection by the author. The database also contains some 200 entries of extremist propaganda claims—documented in videos and texts on social media—relating to extremist attacks in Mali from 2012 to 2022. Interviewees included in this Briefing Paper are not uniformly identified for reasons of security and confidentiality. All information presented in graphs, illustrative maps, and tables is based on the author’s work and information contained within the database. The Briefing Paper first looks at security developments in Mali since 2015.5 It then looks at extremist-held armaments in Mali prior to 2015 and at continuity and change in these armaments after that. The discussion is supplemented with insights into network connections between extremist groups in Mali.6 Key findings Extremists continue to have access to arms and other materiel—including material of recent production— through capture from armed forces and illicit trafficking from the subregion. Libya remains a prominent source for illicitly trafficking military materiel to Mali; however, other sub-regional sources exist. These sources include components for commercial explosives used in improvised explosive devices (IEDs) in Mali. Established extremist groups use materiel to support the creation of new cells, which is a key mechanism in the spread of violent extremism in Mali.

Geneva, SWIT: Small Arms Survey. 2024, 16pg

Anti-Government Threats and their Transnational Connections

By Bàrbara Molas, Anne Craanen, Sabrina Tripodi, Kacper Rękawek, andThomas Renard

Anti-Government Extremism (AGE) presents a complex and evolving security challenge, particularly in the transatlantic space. AGE is characterised by anti-system sentiments, and adherents propagate notions of an evil elite controlling societal mechanisms, adapting global conspiracy theories to local grievances. While predominantly non-violent, it harbours the potential for violence, posing a significant policy challenge. This report contributes a comprehensive exploration of AGE by utilising original data, including interviews with security officials and an exploration of AGE spaces online, focusing on Austria, Germany, the Netherlands, Sweden, and the United States. Through thematic comparative analysis, it unveils the nature of anti-government groups and individuals, elucidating their transnational linkages both online and offline. By shedding new light on AGE’s manifestations, severity, and responses across jurisdictions, this research illuminates whether AGE constitutes a standalone security concern. Furthermore, it offers insights into practical strategies for addressing AGE, especially in the context of existing policies for preventing and countering violent extremism (P/CVE). The recommendations provided are tailored to the differing characteristics of AGE groups, individuals, and networks, ensuring a nuanced and effective response to this emerging threat, both online and offline.

The Hague: International Centre for Counter-Terrorism (ICCT). 2024, 48pg

Why People Enter and Embrace Violent Groups

By Ángel Gómez , Mercedes Martínez , Francois Alexi Martel , Lucía López-Rodríguez , Alexandra Vázquez , Juana Chinchilla , Borja Paredes , Mal Hettiarachchi , Nafees Hamid , and William B Swann 

We distinguish two pathways people may follow when they join violent groups: compliance and internalization. Compliance occurs when individuals are coerced to join by powerful influence agents. Internalization occurs when individuals join due to a perceived convergence between the self and the group. We searched for evidence of each of these pathways in field investigations of former members of two renowned terrorist organizations: the Liberation Tigers of Tamil Eelam (LTTE) (Study 1) and Islamist radical groups (Study 2). Results indicated that ex-fighters joined LTTE for reasons associated with both compliance and internalization but that ex-fighters joined Islamist radical groups primarily for reasons associated with internalization. When compliance occurred, it often took the form of coercion within LTTE but involved charismatic persuasion agents within Islamist groups. This evidence of systematic differences in the reasons why fighters enter violent groups suggests that strategies for preventing radicalization and fostering de-radicalization should be tailored to particular groups.

Front Psychol. 2021 Jan 7

JAS vs. ISWAP: The War of the Boko Haram Splinters Crisis Group

By International Crisis Group

What’s new? Jama’tu Ahlis Sunna Lidda’awati wal-Jihad (JAS) has gained ground in the intra-jihadist fighting in north-eastern Nigeria, halting the previous momentum of the Islamic State West Africa Province (ISWAP). In the course of 2023, JAS took most of the islands in Lake Chad, which ISWAP had controlled. 

Why did it happen? Conflict between these Boko Haram splinters stems from differences in governance and treatment of civilians. JAS kills and steals from everyone; the more bureaucratic ISWAP generally spares Muslim non-combatants. Many JAS members surrendered to authorities or continued fighting instead of joining ISWAP after the death of JAS’s

leader in 2021. 

  Why does it matter? In the last two years, JAS and ISWAP may have visited more damage upon each other than the Lake Chad states have inflicted on the jihadists. Still, the splinters pose a significant threat. ISWAP is regrouping, while the revamped JAS is set to target civilians around the lake. What should be done? The Lake Chad governments will need to do more to prevail over the jihadists. They should mitigate risks to civilians by maintaining humanitarian assistance; expanding efforts to support defectors; improving airstrike precision; and reinvigorating regional security cooperation.    

Pursuing terrorists in US civil courts: the Encyclopedia of ATA cases

Edited by Jeff Breinholt

Initially enacted in 1992, the Antiterrorism Act (ATA), 18 U.S.C. §2333, provides a legal remedy for American victims killed or injured by reason of international terrorism by creating a private cause of action, with treble damages and attorneys’ fees. Since then, some 150 lawsuits have been brought under the statute against such terrorist organizations as Hamas, Hizballah, and FARC, as well as the banks and companies alleged to have assisted them. These lawsuits have generated some 600 opinions.

Washington, DC: George Washington University Program on Extremism. 2024, 91pg