Open Access Publisher and Free Library
TERRORISM.jpeg

TERRORISM

Terrorism-Domestic-International-Radicalization-War-Weapons-Trafficking-Crime-Mass Shootings

Posts in Violence and Oppression
Constitutionality of 18 U.S.C. §§ 922(b)(1) and (c)(1), which together prohibit Federal Firearms Licensees from selling handguns to eighteen-to-twenty-year-old adults.

U.S.Court of Appeals 5th Circuit. No. 23-30033

700 F.3d 185 (5th Cir. 2012) (“NRA I”), this court upheld those provisions. But that decision, which was criticized at the time, see National Rifle Ass’n, Inc. v. Bureau of Alcohol, Tobacco, Firearms, & Explosives, 714 F.3d 334, 341 (5th Cir. 2013) (“NRA II”) (Jones, J., dissenting from denial of rehearing en banc), preceded two recent clarifying Supreme Court opinions on the methodology by which we construe gun regulations under the Second Amendment. We are now compelled to focus intently on the evidence of firearm access and ownership by eighteen-to-twenty-year-olds near and at the founding, and we conclude that (1) NRA I is incompatible with the Bruen and Rahimi decisions of the Supreme Court, and (2) these provisions are inconsistent with the Second Amendment. Accordingly, we REVERSE the district court’s contrary judgment and REMAND for further proceedings consistent with this opinion..

Appeal from the United States District Court for the Western District of Louisiana USDC No. 6:20-CV-1438. 29p.

download
Profiles of Individual Radicalization in the United States (PIRUS)

By Michael Jensen, Sheehan Kane, and Elena Akers

Profiles of Individual Radicalization in the United States (PIRUS) is a database of 3,203 Islamist, far-left, far-right, and single-issue extremists who have radicalized to violent and non-violent extremism in the United States from 1948 through 2021. This update adds 955 subjects to the database who were charged with committing extremist crimes in the United States from 2019-2021.1 The database is freely available for download on START’s webpage at https://www.start.umd.edu/profiles-individual-radicalization-united-states-pirus-keshif. The analysis for this research brief draws on the full dataset and illustrates the important differences that exist across ideological groups and highlights recent trends in the data.

College Park, MD: START , 2023. 10p.

download
Profiles of Individual Radicalization in the United States (PIRUS): Mass Casualty Extremist Offenders

By Michael Jensen, Sheehan Kane, and Elena Akers

Included with the current update to the Profiles of Individual Radicalization in the United States (PIRUS) data are a suite of variables that allow users to investigate extremist offenders who plotted to commit, or committed, mass casualty attacks in the United States from 1990-2021. A mass casualty plot is defined as an event in which the perpetrator(s) intended to kill or injure four or more victims. Unlike other data resources on mass casualty events, PIRUS allows users to investigate successful mass casualty attacks as well as unsuccessful plots where the perpetrators clearly intended to kill or injure four or more people but failed. The inclusion of failed and foiled mass casualty plots in PIRUS gives users a more accurate estimate of how often extremists plan to cause significant harm. It also allows users to compare ideological groups and offenders on measures of plot success. This research brief provides an overview of the mass casualty crimes in PIRUS, including their frequency, links to ideological and sub-ideological groups, and a comparison of their perpetrators.

College Park, MD: START (March). 2023, 4p.

download
Global Terrorism Threat Forecast 2025

By Rohan Gunaratna

SYNOPSIS As we enter the new year, armed conflicts continue to rage across the globe, destabilising nations, regions, and even the global order. Terrorist attacks and state responses create ripple effects, which not only shape the battlefields but redefine states, fragment societies, and radicalise communities. What does the terrorism threat landscape look like in 2025?

COMMENTARY Global terrorism will remain a persistent and pervasive threat to the stability and peace of the world. The Islamic State, Al Qaeda, and Iran-sponsored Shiite and Sunni militia have exacerbated instability around the globe, while geopolitical competitions have polarised and fragmented the community of nations. Unless governments work together to mitigate common security challenges, threat actors will exploit the gaps, loopholes, and weaknesses in global security systems. All nations need to be steadfast in preventing and preempting threats from taking root and facing up to threats from state and non-state actors including lone wolf attackers. In addition to disinformation operations, threat actors will attack information infrastructure. Nations will need to secure the online domain as hostile states increase their cyberattacks, sabotage infrastructure, assassinate public officials, and engage in espionage.

S. Rajaratnam School of International Studies, NTU Singapore 2025. 5p.

download
Risk and Protective Factors Associated With Support of Violent Radicalization: Variations by Geographic Location

By Heidi Ellis , Alisa B. Miller , Georgios Sideridis , Rochelle Frounfelker , Diana Miconi , Saida Abdi , Farah Aw-Osman and Cecile Rousseau

Objectives: We examine the association between perceived discrimination, mental health, social support, and support for violent radicalization (VR) in young adults from three locations across two countries: Montréal and Toronto, Canada, and Boston, United States. A secondary goal is to test the moderating role of location. Methods: A total of 791 young adults between the ages of 18 and 30, drawn from the Somali Youth longitudinal study and a Canada-based study of college students, participated in the study. We used multivariate linear regression to assess the association between scores on the Radical Intentions Scale (RIS) with demographic characteristics, anxiety, depression, social support, and discrimination. Results: In the full sample, discrimination, age, and gender were associated with RIS scores. When we examined moderation effects by location, RIS scores were associated with depression only in Montréal, and with social support (negatively) and discrimination in Toronto. None of the variables were significant in Boston. Conclusion: These findings suggest that an understanding of risk and protective factors for support of VR may be context-dependent. Further research should take into consideration local/regional differences

International Journal of Public Health published: 29 March 2021, 10 p.

download
Cognitive and Behavioral Radicalization: A Systematic Review of the Putative Risk and Protective Factors

By Michael Wolfowicz, Yael Litmanovitz, David Weisburd, and Badi Hasisi

Abstract Background: Two of the most central questions in radicalization research are, (1)why do some individuals radicalize when most of those from the same groups or exposed to similar conditions do not? and (2) why do radicalized individuals turn to radical violence while the majority remain inert? It has been suggested that the answer to both questions lie in the cumulative and interactive effects of a range of risk factors. While risk assessment and counter‐radicalization take a risk‐protectivefactor approach, there is widespread debate as to what these factors are and which are most important.Objectives: This review has two primary objectives.1) To identify what the putative risk and protective factors for different radica-lization outcomes are, without any predeterminations.2) To synthesize the evidence and identify the relative magnitude of the effects of different factors.The review's secondary objectives are to:1) Identify consistencies in the estimates of factors across different radicalizationoutcomes.2) Identify whether any significant heterogeneity exists within factors between(a) geographic regions, and (b) strains of radicalizing ideologies.Search Methods: Over 20 databases were searched for both published and gray literature. In order to provide a more comprehensive review, supplementary sear-ches were conducted in two German and one Dutch database. Reference harvesting was conducted from previous reviews and contact was made with leading researchers to identify and acquire missing or unpublished studies.Selection Criteria: The review included observational studies assessing the out-comes of radical attitudes, intentions, and/or radical behaviors in OECD countries and which provided sufficient data to calculate effect sizes for individual‐level risk and protective factors.Data Collection and Analysis: One‐hundred and twenty‐seven studies, containing 206 samples met the inclusion criteria and provided 1302 effect sizes pertaining to over 100 different factors. Random effects meta‐analyses were carried out for each factor, and meta‐regression and moderator analysis were used to explore differ-ences across studies.Results: Studies were primarily cross‐sectional, with samples representing 20 OECD countries. Most studies examined no specific radicalizing ideology, while others focussed on specific ideologies (e.g., Islamist, right‐wing, and left‐wing ideologies). The studies generally demonstrated low risk of bias and utilized validated or widely acceptable measures for both indicators and outcomes.With some exceptions, sociodemographic factors tend to have the smallest estimates, with larger estimates for experiential and attitudinal factors, followed by traditional criminogenic and psychological factors.Authors' Conclusions: While sociodemographic factors are the most commonly examined factors (selective availability), they also tend to have the smallest es-timates. So too, attitudinal and even experiential factors, do not have effect sizes of the magnitude that could lead to significant reductions in risk through tar-geting by interventions. Conversely, traditional criminogenic factors, as well as psychological factors tend to display the largest estimates. These findings suggest the need to broaden the scope of factors considered in both risk assessment and intervention, and this review provides much needed evidence for guiding the selection of factors

Campbell Systematic Reviews: Volume 17, Issue 3 September 2021, 90 p.

download
European Union Terrorism Situation and Trend Report: 2024

By Europol

  The European Union Terrorism Situation and Trend Report (EU TE-SAT) 2024 is a situational overview, presenting figures, major developments and trends in the terrorism landscape in the EU in 2023. The report is based on qualitative and quantitative data provided by the Member States on terrorist attacks, arrests and convictions and penalties for terrorist offences. Additionally, Europol’s cooperation partners provided valuable qualitative information and assessments, to facilitate reflection on developments beyond the EU that affect the security of the Union and its citizens. Information on convictions and acquittals for terrorist offences, as well as on amendments to national legislation on terrorism provided by Eurojust and based on data shared by Member States, complements the report. According to EU Directive (EU) 2017/541 on combating terrorism , which Member States had an obligation to transpose into their national legislation by 8 September 2018, terrorist offences are criminal acts carried out with the aim of seriously intimidating a population, unduly compelling a government or international organisation to perform or abstain from performing any act, or seriously destabilising or destroying the fundamental political, constitutional, economic or social structures of a country or an international organisation. The EU TE-SAT identifies and elaborates on various forms of terrorism motivated by specific ideologies . These include jihadist terrorism, right-wing terrorism, left-wing and anarchist terrorism, ethno-nationalist and separatist terrorism, and other forms of terrorism. Notwithstanding the existence of different legislative frameworks at the national level, Directive (EU) 2017/541 establishes minimum EU rules concerning the definitions of offences and related sanctions in counter-terrorism and provides a harmonised definition of terrorist offences. On this basis, the EU TE-SAT provides statistical data on terrorist attacks, arrests and convictions in Member States. At a national level, the legislation pertaining to terrorism varies within the limits set by the aforementioned Directive, as Member States are afforded a certain degree of flexibility in their legislative processes. Consequently, the quantitative analysis presented in the EU TE-SAT reflects Member States’ definitions of terrorist offences according to their national legislation. It should be noted that these definitions may be broader in scope than the definitions set out in Directive (EU) 2017/541, although they cannot have a narrower scope. While the primary scope of the EU TE-SAT is to present the situational picture on terrorism, the report also presents specific violent extremist incidents, acts, activities and developments, reported by the Member States. While the quantitative overview of terrorist attacks, arrests, convictions and penalties does not include instances of violent extremism, the latter is included in the report for contextualisation purposes and to provide a more comprehensive picture of the security threats to the Union.   

Publications Office of the European Union, Luxembourg. 2024. 72p.

Download
30 Years of Trends in Terrorist and Extremist Games

By Emily Thompson and Galen Lamphere-Englund

Violent extremist, terrorist, and targeted hate actors have been actively exploiting video games to propagandise, recruit and fundraise for more than 30 years. This report presents an analysis of that history using a unique dataset, the Extremist and Terrorist Games Database (ETGD), developed by the authors. It contains 155 reviewed entries of standalone games, modifications for existing games (mods) and browser‑based games dating from 1982 to 2024. The titles analysed appear across the ideological spectrum: far right (101 titles), jihadist (24), far left (1) and other forms of extremism and targeted hate (29), including school‑massacre ideation (12). They span platforms ranging from simple standalone games for Atari in the 1980s to sophisticated mods for some of today’s most popular games. The number of titles has increased year on year – in line with global conflict and extremist ideological trends, and revealing a continued push by malicious actors to exploit gaming. Meanwhile, the means of distribution have shifted from violent extremist organisations and marketplaces – such as white supremacist, neo‑Nazi and jihadist organisations – to distributed repositories of extremist games hosted on internet archives, Ethereum‑hosted file‑sharing, Telegram and with subtly coded titles on mainstream platforms like Steam. While most of the titles in the ETGD are available for free, several that have been sold (often at symbolic prices like $14.88 or $17.76) appear to have generated revenue for groups ranging from Hezbollah to the National Alliance, an American neo‑Nazi group. Through new analysis of Steam data, we also show that a small number of extremist and targeted hate titles have generated almost an estimated $600,000 in revenue for small publishers on the platform. Far from being a comprehensive analysis of the ETGD, we intend this preliminary launch report to form a basis for future research of the dataset and a framework for continued contributions to the ETGD from Extremism and Gaming Research Network (EGRN) members. Above all, we seek to contribute to sensible policymaking to prevent violent extremism that situates games as part of a wider contested and exploited information space, which deserves far more attention from those working towards peaceful ends.

Complete recommendations are provided in the conclusion section of this report, but include the following: 1. Prohibit and prevent violent extremist exploitation: Gaming platforms should explicitly prohibit violent extremist and terrorist behaviours and content. Leadership exists here from Twitch, Discord, Microsoft/Xbox and the affiliated Activision‑Blizzard. a. Audio and video platforms, such as Spotify, Apple Music and YouTube should seek to identify extremist gaming content currently available under misleading titles and tags. b. Flag and remove extremist titles across platforms: Hashing and preventing outlinking to ETGD games and links should be a priority across platforms. 2. Improve reporting mechanisms: Platforms must improve reporting mechanisms to make it easier for players to report violative content found in games and in‑game conduct. 3. Understand and take down distributed repositories: Larger repositories of extremist gaming content readily available on the surface web accelerate user exposure. 4. Collaborate across sectors: Addressing the spread of extremist games requires a collaborative effort between tech companies, government agencies and civil society organisations. 5. Educate across sectors: Programmes supporting educators and frontline community moderators should be developed. 6. Support research and innovation: Including cross‑sector initiatives like the Global Network on Extremism and Technology (GNET) and EGRN, which produced this database. 7. Enhance regulatory frameworks: Governments should update regulatory frameworks applying to digital platforms, recognising the nuances of gaming platforms and complying with human rights. 8. Encourage positive community engagement: Thoughtful, well designed community guidelines, moderation policies and reporting mechanisms can support community‑building.

London: The Global Network on Extremism and Technology (GNET). 2024. 40p.

download
Anti-State Terrorist Plots and Attacks in the United States

By Michael Jensen, Sheehan Kane, Sean Doody and Elena Akers

Recently, several studies have found that threats against state targets, including public officials, elections, and law enforcement, have been on the rise in the United States. In this brief, we take a closer look at terrorist plots and attacks in the United States that targeted government, police, and military entities over a thirty year period (1992-2022). This brief looks specifically at 460 premeditated plots and attacks against state targets in which the perpetrators either (1) successfully committed attacks, or (2) mobilized to violence but were interdicted by law enforcement before they could carry out attacks. For this brief, evidence of mobilization includes the acquisition of weapons or weapons-making materials, target surveillance, the recruitment of co-conspirators, raising funds for an attack, or engaging in military-style training. Using data from the Profiles of Individual Radicalization in the United States (PIRUS) project, this brief shows that anti-state terrorist plots and attacks have increased sharply, reaching all-time highs over the past five years.

College Park, MD: The National Consortium for the Study of Terrorism and Responses to Terrorism (START) , 2024. 6p.

download
Spatial Accessibility to Gun Violence Exposure on Walkable Routes to and from School

By Gia Barboza-Salerno, Sharefa Duhaney, & Hexin Yang

This study investigates the spatial accessibility of gun violence exposure along walkable routes to and from schools in Englewood, Chicago. Focusing on both direct and indirect forms of gun violence, the study uses acoustic detection technology to quantify the cumulative burden of gun violence exposure potentially encountered by students during their commute to and from school. We examined the spatial distribution of shooting incidents in proximity to schools using network-constrained kernel density estimation, secondary spatial analysis, and rapid realistic routing. G-function analysis revealed that shooting incidents cluster along streets, including safe passage routes, near schools. An average of 1.30 and 18.06 gunshots were reachable within 5- and 15-min commute times in the morning and afternoon, respectively Our findings underscore the urgent need to reframe the narrative around ‘school gun violence’ to consider exposures that occur in proximity to school boundaries to more effectively reduce violence exposure for youth who walk to school in violence-prone neighborhoods.

SSM - Population Health, Volume 28, December 2024, 13p.

Download
How Guns Fuel Violence Against Transgender People in America

By Everytown Research & Policy

Executive Summary Hateful rhetoric and violence against transgender people has become a feature of society and politics across the globe in recent years, but in the US—where there are more guns than people —it often turns lethal. To better understand the risk factors for violence against transgender people, and the role firearms play, Everytown Research analyzed over 200 homicides of transgender and gender-expansive people in the United States and Puerto Rico from 2017 to 2022. The findings from this research warrant renewed calls for strong gun violence prevention policies that keep guns out of the wrong hands, such as laws that require background checks on all gun sales, raise the age to purchase a gun, and disarm domestic abusers. They also highlight the need to combat discrimination against trans people and to manage upstream risk factors, like housing insecurity, inequality, and poverty in order to help save trans lives. Key Findings Our analysis of the 228 known homicides of transgender people in the United States and Puerto Rico from January 2017 through December 2022 revealed the following: laws that require background checks on all gun sales, raise the age to purchase a gun, and disarm domestic abusers. They also highlight the need to combat discrimination against trans people and to manage upstream risk factors, like housing insecurity, inequality, and poverty in order to help save trans lives. 4 5 6 A gun was used in more than seven in 10 transgender homicides. Sixty-five percent of transgender victims of gun homicide were Black trans women. Yet among the general US population, only 7 percent of gun homicide victims are Black women. Nearly six in 10 trans victims of homicide were under the age of 30. More than one in three identified gun homicide perpetrators were legally prohibited from possessing a firearm due to prior felony convictions or other prohibiting factors. One-third of transgender victims of homicide experienced housing insecurity or homelessness. The majority of those victims were killed with a gun. Trans people killed with a gun were nearly twice as likely to be killed by a family member or intimate partner than were gun homicide victims generally. A disproportionate number of gun homicides of trans people took place in the South, and Florida and Texas together were home to nearly one out of every five trans gun homicides

New York: Everytown Research & Policy, 2024. 31p.

download
Preventing Gun Violence by Investigating Attempted Gun Purchases by Domestic Abusers

By Everytown Research & Policy

he intersection of gun violence and domestic violence has a devastating impact on families and communities across the country, with an average of 76 women in the United States shot and killed by an intimate partner every month, and many more shot and wounded. It is therefore crucial for law enforcement to be vigilant about recognizing warning signs of potential lethal violence by abusers, and to implement policies that help prevent this violence rather than only responding after a tragedy occurs.

One key piece of information that law enforcement should take seriously as a potential warning sign of future violence is a report that an individual who is barred from gun possession because of a disqualifying domestic violence-related conviction or restraining order has attempted to purchase a gun in violation of the law. As the result of a new federal law enacted in 2022, the NICS Denial Notification Act, state and local law enforcement are now notified—within 24 hours—every time a prohibited domestic abuser attempts to buy a gun and fails a background check. But in most states, there is no policy in place to follow up in these cases to investigate whether the survivor of abuse is in imminent danger.

Everytown for Gun Safety obtained data from the FBI that reveals a stunning reality: every year thousands of prohibited abusers attempt to purchase guns and are prevented from doing so because of the background check system: From 2018 through 2022, 135,243 background checks were denied because the purchaser was a prohibited domestic abuser. While this is an example of the background check system working as designed to prevent gun sales to prohibited individuals, each of these cases also raises a new red flag about a potential risk of violence and presents an opportunity to intervene and prevent future homicides of women by an intimate partner.

In light of the significant risk of future violence by domestic abusers with firearms, federal, state, and local law enforcement agencies should implement a policy of investigating each of these cases as part of a proactive approach to preventing gun violence. This type of investigation should include assessing whether there are other risk factors of imminent violence, determining whether the individual has unlawfully obtained firearms through other means, following up with the individual to reiterate that they are prohibited from buying and possessing firearms, and working with victims’ services staff and local domestic violence service providers to notify the survivor that the abuser has attempted to purchase a gun and offer assistance with safety planning. In addition, appropriate cases should be referred to prosecutors for further investigation into whether criminal charges should be pursued for the unlawful attempted gun purchase.

New York: Everytown Research & Policy, 2024 11p.

Download
Hostage to Violent Extremism: Kidnapping in Northern Benin

By Flore Berger, Lyes Tagziria and Aziz Mossi

As the infiltration of communities in northern Benin by violent extremist organisations (VEOs) has intensified since 2021, the number of kidnapping incidents has surged. This research identifies four main types of kidnapping by VEOs – forced recruitment, intelligence gathering, punishment and intimidation – all of which are closely linked to conflict dynamics and group expansion. Kidnapping is used as a strategic tool for infiltration into new territories. Key findings l An effective protection programme for defectors, key targets for abductions, should be developed. This would preserve an important source of intelligence while also incentivising further defections. l Explore amnesty programmes for individuals who have joined the ranks of the VEOs. Dialogue should be made an important feature in counterterrorism strategy. l Reinforce local infrastructure to bolster community resilience towards kidnapping and other forms of violence. This should include telephone network coverage and road infrastructure, among others. l Kidnapping incidents should be incorporated into ECOWAS and national early warning mechanisms. The pervasiveness of kidnapping can be used as a barometer of VEO entrenchment in a given area. l Rebuilding international cooperation structures with neighbouring countries is crucial. The Benin government should immediately seek a resolution to current diplomatic stand-offs.

Pretoria: South Africa: OCWAR-T: Organised Crime: West African Response to Trafficking , 2024. 34p.

download
Unpacking the Role of Prophecy in Extremist Narratives

By Noor Huda Ismail

The fall of Damascus to Syrian rebels has sparked a ripple effect in Southeast Asia, with figures like Indonesia’s Mas'ud Izzul Mujahid using apocalyptic prophecies to fuel extremism. However, the region's diverse Islamic practices, shaped by unique historical and socio-political contexts, show that a universal eschatological (end of the world) narrative does not resonate everywhere. Religious scholars can counter extremist ideologies and reclaim prophetic teachings for peace in Southeast Asia’s pluralistic society by offering inclusive interpretations of prophecy and addressing local grievances.

Singapore: S. Rajaratnam School of International Studies (RSIS), 2024. 4p.

download
Exposure to and Sharing of Fringe or Radical Content Online

By Timothy Cubitt and Anthony Morgan

Using a large, national survey of online Australians, we measured unintentional and intentional exposure to fringe or radical content and groups online.

Two in five respondents (40.6%) reported being exposed to material they described as fringe, unorthodox or radical. One-quarter of these respondents (23.2%) accessed the content intentionally. One-third (29.9%) said the content they had seen depicted violence.

Fringe or radical content was often accessed through messages, discussions and posts online. Mainstream social media and messaging platforms were the platforms most frequently used to share fringe or radical content. Being a member of a group promoting fringe or radical content was associated with increased sharing of that content with other internet users.

Efforts to restrict access to radical content and groups online, especially on mainstream platforms, may help reduce intentional and unintentional exposure to and sharing of that content.

Canberra: Australian Institute of Criminology. 2024. 17p.

Download
Targeting Firearm Crime Will Make South Africa Safer

By David Bruce

Mapping gun crimes can ensure that police resources are used in a targeted way to reduce violent offences.

Firearm crime is rife in South Africa. Mapping it can help ensure police resources are used in a targeted way to reduce firearm-related offences. This policy brief illustrates how firearm crime can be mapped by using police data. It focuses on Gauteng province, which has high levels of gun use by criminals.

Key findings Firearms make a major contribution to crime-related death, injury and fear in South Africa. In areas with high firearm crime levels, there are seven main gun-related crime categories: murder, attempted murder, robbery with aggravating circumstances, carjacking, residential robbery, nonresidential robbery and illegal possession of guns and ammunition. South Africa’s highest gun-related crime levels are in the following provinces: Gauteng, Western Cape, KwaZulu-Natal and parts of the Eastern Cape. Recommendations The SAPS should develop a focused strategy to reduce levels of firearm crime and violence. The SAPS should use crime data to identify the areas where firearm crime is most concentrated. This will support the targeted use of resources to reduce firearm crime. Targeted evidence-based strategies are more likely to have a measurable impact on levels of violent crimes associated with firearm use. As an initial step, the SAPS should use available information on ‘instruments’ used in crime from the Crime Administration System (CAS), or docket analysis, to assess levels of firearm crime in each police station area. The results will show the provinces, metropolitan In these provinces, police station areas with the highest levels of crime in the seven main gun-related crime categories are also high firearm-use areas. South African Police Service (SAPS) data on Gauteng police stations with high levels of these seven crimes highlights 41 high firearm crime police stations. Although data collection standards differ between stations, SAPS Crime Administration System data generally includes details on weapons used and can be used to map gun crime more precisely. areas and districts, and stations where firearm crime is most concentrated. Docket quality, data collection, recording, mapping and analysis on all crimes related to firearms and ammunition should be improved. Dedicated firearm crime reduction units with adequate intelligence support should be established. Their key performance measure must be a reduction in murders, attempted murders and robberies involving firearms. Police measures to reduce firearm crime must be aligned with efforts to lessen the overall problem of firearm proliferation in South Africa.

Pretoria, South Africa: Institute for Security Studies, 2024. 16p.

download
From the Barroom the Barrel to the Border: Exploring the Roots: Exploring the Roots and Ramifications of Gun Trafficking from the United States to Mexico

By Alexandra Punishill

Nowhere is the discussion surrounding gun violence more prominent than in the United States, with the impacts of our gun-friendly culture being felt around the world. This thesis analyzes the dynamics of gun trafficking from the United States to Mexico and sheds light on its role in fueling the epidemic of gun violence south of the border. It is argued that the particular system of federalism adopted by the United States has led to a variety of state-level gun regulations that have shaped domestic gun policy and have had an international impact. Despite Mexico’s persistent efforts to combat the gun violence orchestrated by powerful organized crime networks, success remains elusive. Central to this discourse is Mexico’s legal action against U.S. gun companies, signaling a significant shift in its approach to addressing the root causes of the crisis. However, it is argued that without substantive changes to gun laws in the United States, gun violence in Mexico will continue to have a devastating impact on both sides of the border.

Claremont McKenna College, CMC Senior Theses. 3577. 2024. 66p.

download
Domestic Terrorism: How the US Legal System is Falling Short

By Camden Carmichael, Brooke Buxton, Seamus Hughes, and Clara Braun

Despite a rapid increase in domestic terrorism investigations in the United States, the threat that domestic terrorism poses to the homeland remains unclear. This is due to a lack of a comprehensive domestic terrorism legal framework that fully encompasses the variety of ideological groups present in the US. Using a sample of twenty-six QAnon and eighteen incel cases that have been federally prosecuted, our team examined how the US prosecutorial system utilises non-terrorism-related charges in addressing domestic violent extremism (DVE) cases. We propose a more inclusive DVE legal framework that expands the categorisation of VE ideologies, identifies specific DVE charges, and requires the engagement of the prosecutorial and probationary offices. By recognising Misogyny Motivated Violent Extremists (MMVEs) and Conspiracy Theory Motivated Violent Extremists (CTMVEs) as their own threat categories, it would allow researchers and practitioners to gain a deeper understanding of how pervasive the threat posed by these ideologies is.

The Hague: The International Centre for Counter-Terrorism (ICCT) , 2024. 21p.

download
Selling Violent Extremism

By Danny Klinenberg

Why do people join domestic violent extremist organizations? This paper from Danny Klinenberg, an IGCC nonresident fellow, examines an understudied reason: organizational outreach. Klinenberg studies how the inflow of new members to the Oath Keepers, America’s largest paramilitary organization, is affected when the group’s leadership employs three tactics: showcasing their ideological zeal through armed standoffs with the government, membership discounts, and sports sponsorships. Using a variant of the synthetic control method, he finds that standoffs increase new memberships by 150 percent, discounts increase new memberships by over 60 percent, and sports sponsorships decrease new memberships. Membership is less responsive in counties with higher income inequality, but is more responsive in politically conservative counties. The findings provide new insights into ways extremist groups attract potential recruits.

La Jolla, CA: UC Institute on Global Conflict and Cooperation, WORKING PAPER NO. 10, 2024. 42p.

download
Nuclear Terrorism: Assessment of U.S. Strategies To Prevent, Counter, and Respond to Weapons of Mass Destruction

By The National Academies of Sciences, Engineering, and Medicine

For nearly eight decades, the world has been navigating the dangers of the nuclear age. Despite Cold War tensions and the rise of global terrorism, nuclear weapons have not been used in conflict since Hiroshima and Nagasaki in 1945. Efforts such as strategic deterrence, arms control and non-proliferation agreements, and the U.S.-led global counterterrorism have helped to keep nuclear incidents at bay. However, the nation's success to date in countering nuclear terrorism does not come with a guarantee, success often carries the risk that other challenges will siphon away attention and resources and can lead to the perception that the threat no longer exists.

This report found that U.S. efforts to counter nuclear or radiological terrorism are not keeping pace with the evolving threat landscape. The U.S. government should maintain a strategic focus and effort on combatting terrorism across the national security community in coordination with international partners, State, Local, Tribal and Territorial authorities, the National Laboratories, universities and colleges, and civil society. Developing and sustaining adequate nuclear incident response and recovery capabilities at the local and state levels will likely require significant new investments in resources and empowerment of local response from Federal Emergency Management Agency (FEMA), working with the Centers for Disease Control and Prevention, Environmental Protection Agency, Department of Energy, and National Institutes of Health

Washington, DC: The National Academies Press. 2024. 158p.

download