Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in diversity
Prevalence of Veteran Support for Extremist Groups and Extremist Beliefs: Results from a Nationally Representative Survey of the U.S. Veteran Community

Helmus, Todd C.; Brown, Ryan Andrew; Ramchand, Rajeev

From the document: "Policymakers and researchers are concerned that the U.S. veteran community is at increased risk of radicalization to violent extremism. Although subsequently revised downward, early reports suggested that as many as one in five Capitol Hill attackers was currently or had previously been affiliated with the U.S. military. Extremist groups actively target military members and veterans for recruitment because of their training and operational, logistic, and leadership skills. The unique and often lonely experience of leaving the military has been hypothesized to make veterans susceptible to such recruitment. To help address these concerns, the authors conducted a nationally representative survey of veterans to examine the prevalence of support for specific extremist groups and ideologies, including support for political violence. The authors compared their results with those from surveys of the general population. Among other findings, the veteran community, as a whole, did not manifest higher support than the general population. Interestingly, the majority of those who supported political violence were not also supporters of specific groups."

RAND Corporation. 2023. 26p.

Cascades of Violence: War, Crime and Peacebuilding Across South Asia

By John Braithwaite and Bina D'Costa

War and crime are cascade phenomena. War cascades across space and time to more war; crime to more crime; crime cascades to war; and war to crime. As a result, war and crime become complex phenomena. That does not mean we cannot understand how to prevent crime and war simultaneously. This book shows, for example, how a cascade analysis leads to an understanding of how refugee camps are nodes of both targeted attack and targeted recruitment into violence. Hence, humanitarian prevention also must target such nodes of risk. This book shows how nonviolence and non-domination can also be made to cascade, shunting cascades of violence into reverse. Complexity theory implies a conclusion that the pursuit of strategies for preventing crime and war is less important than understanding meta strategies. These are meta strategies for how to sequence and escalate many redundant prevention strategies. These themes were explored across seven South Asian societies during eight years of fieldwork.

Canberra: ANU Press, 2018. 706p.

Terrorism, Criminal Law and Politics: The Decline of the Political Offence Exception to Extradition

By Julia Jansson

Recent atrocities have insured that terrorism and how to deal with terrorists legally and politically has been the subject of much discussion and debate on the international stage. This book presents a study of changes in the legal treatment of those perpetrating crimes of a political character over several decades. It most centrally deals with the political offence exception and how it has come to have changed. The book looks at this change from an international perspective with a particular focus on the United States. Interdisciplinary in approach, it examines the fields of terrorism and political crime from legal, political science and criminological perspectives. It will be of interest to a broad range of academics and researchers, as well as to policy-makers involved in creating new anti-terrorist policies.

New York; London: Routledge, 2019. 300p.

Targeted: Experiences of Racism in NSW after September 11, 2001

By Tanja Dreher

Targeted researches experiences of racism in New South Wales after September 11, 2001. The monograph analyses data collected by the anti-racism hotline established by the Community Relations Commission For a Multicultural NSW (CRC). It details a significant increase in racially motivated violence and verbal abuse in NSW in the months following the US 2001 September 11 attacks and finds these incidents produced a climate of fear and insecurity, which continues to impact these communities, and denies them the chance to enjoy a true sense of Australian citizenship.

Broadway, AUS: UTS Press, 2006. 48p.

Il Banditismo In Sardegna La vendetta barbaricina come ordinamento giuridico

By Antonio Pigliaru

Prefazione:” Poco prima di morire, nel marzo 1969, a 46 anni, Antonio P-i gliaru aveva steso uno schematico «programma » per la pubblicazione di tutti i suoi scritti, editi ed inediti. In esso era compreso un volume dal titolo «Il banditismo in Sardegna», in cui sarebbero dovuti confluire, insieme, lo studio su «La vendetta barbaricina come ordinamento giuridico», pubbli- cato presso Giuffrè nel 1959, e gli scritti più interessanti fra quelli che, prima e dopo quell'anno, Pigliaru aveva dedicato al pro- blema della criminalità in Sardegna: scritti che, pur apparsi su riviste scientifiche non direttamente legate all'attualità, erano pu- re quelli nei quali veniva razionalizzata e resa più coerente alle ragioni di una metodologia autentica quella stessa scottante ma- teria di cronaca, in cui Pigliaru si trovava così spesso coinvolto nel suo esercizio di intellettuale impegnato direttamente e totalmente sui temi di fondo della condizione isolana…”

Varese. Giuffrè Editore. 1970. 477p.

New Approaches to the Analysis of Jihadism: Online and Offline

By Rudiger Lohiker

Jihadism has been an important issue of public discussions since 9/11. Internet media have been used by Jihadis as means of communication, propaganda, recruitment, and even training purposes. In this volume, the processes of interaction on Jihadi internet sites are analysed. Particular attention lays on the mechanisms of spread of propaganda via the internet by diverse technical means. The process of transformation of Islamic knowledge into Jihadi knowledge, the rhetorics  of videos, the development of South Asian Jihadi organisations and some conceptual issues are discussed.

Gottingen: V&R unipress, 2012. 224p.

Handbook of Terrorism Prevention and Preparedness

By Alex Schmid

From the introduction: The need for a Handbook of Terrorism Prevention and Preparedness needs little explanation in the light of the fact that the dominant approach of counterterrorism, based largely on heavy-handed military action, has been such a failure - especially in the Middle East. The traditional military instrument of deterrence has not worked against enemies who have, in most cases, no fixed territorial basis while claiming to love death more than life. The decapitation of terrorist organizations by killing their leaders in drone strikes has created martyrs rather than broken their organization’s will to fight. The collateral damage of military strikes has often turned family members, friends and other witnesses near and far into avengers. For many societies, the “cure” of militarized counterterrorism has been worse than the “disease” of terrorism.

Netherlands. The Hauge.ICCT Press. 2021.

National Cybersecurity Strategy

By United States. White House Office

From the document: "The United States has made significant progress toward achieving the President's affirmative vision for a digitally-enabled future, but emerging trends are creating both new opportunities for further advancement and new challenges to overcome. Malicious actors threaten our progress toward a digital ecosystem that is inclusive, equitable, promotes prosperity, and aligns with our democratic values. […] Deep and enduring collaboration between stakeholders across our digital ecosystem will be the foundation upon which we make it more inherently defensible, resilient, and aligned with U.S. values. This strategy seeks to build and enhance collaboration around five pillars: (1) Defend Critical Infrastructure, (2) Disrupt and Dismantle Threat Actors, (3) Shape Market Forces to Drive Security and Resilience, (4) Invest in a Resilient Future, and (5) Forge International Partnerships to Pursue Shared Goals. Each effort requires unprecedented levels of collaboration across its respective stakeholder communities, including the public sector, private industry, civil society, and international allies and partners. The pillars organizing this strategy articulate a vision of shared purpose and priorities for these communities, highlight challenges they face in achieving this vision, and identify strategic objectives around which to organize their efforts. To realize the vision these pillars lay out, we will make 'two fundamental shifts' in how the United States allocates roles, responsibilities, and resources in cyberspace. In realizing these shifts, we aspire not just to improve our defenses, but to change those underlying dynamics that currently contravene our interests."

United States. White House. 2023. 39p.

Domestic Terrorism: Further Actions Needed to Strengthen FBI and DHS Collaboration to Counter Threats, Report to the Ranking Member, Committee on Homeland Security, House of Representatives

By United States. Government Accountability Office

From the document: "Domestic terrorism investigations have more than doubled since 2020, according to the FBI. FBI and DHS are the main federal entities charged with preventing terrorist attacks in the U.S. FBI has lead responsibility for federal domestic terrorism investigations and domestic intelligence efforts. DHS is responsible for producing terrorist threat information in coordination with federal, state and local government agencies, and private entities. GAO [Government Accountability Office] was asked to review domestic terrorism threats, incidents, and related federal cases and charges. This report addresses, among other objectives, the extent to which the FBI and DHS I&A [Office of Intelligence and Analysis] (1) track domestic terrorism investigations and incidents, and (2) followed leading collaboration practices in their efforts to counter domestic terrorism threats."

United States. Government Accountability Office. Report Number .GAO-23-104720. 2023.

Countering Domestic Racially and Ethnically Motivated Violent Terrorism on Social Media: Introducing the Racist and Violent Extremist Flock Tool

By Tapia, Daniel; Warren, Kristin; Burns, Jacqueline Gardner; Holynska, Khrystyna; Reimer, Jordan R.

From the document: "Racially and ethnically motivated violent extremism is becoming an increasingly common occurrence in the United States. Racially and ethnically motivated violent extremist (REMVE)-related terrorism has consequences beyond loss of life: It undermines the sense of safety that targeted groups feel in their country and unravels the social fabrics of trust that are necessary for society to function. Further still, REMVE attacks can motivate other like-minded attackers to follow up with their own attacks, as was apparently the case with the May 14, 2022, mass shooting in Buffalo, New York, by a self-avowed, internet-radicalized white supremacist whose manifesto drew heavily from the March 15, 2019, Christchurch mosque mass shootings, which also inspired a mass shooting in El Paso, Texas. Two key challenges for those who observe online spaces in which radicalization occurs are the sheer volume of data and the idiosyncrasies of online communities. Website-specific language and memes are difficult to track and parse; even if emerging terms are detected, defining them can be difficult."

Rand Corp. 2023. 102p.

Tackling Online Terrorist Content Together: Cooperation Between Counterterrorism Law Enforcement and Technology Companies

By Macdonald, Stuart Keith, 1979-; Staniforth, Andrew

From the Executive Summary: "Cooperation between law enforcement and tech companies is widely regarded as necessary to tackle online terrorist content. Both sectors have publicly stated their commitment to working together and there are examples of mutual cooperation. Yet there are also impediments to such collaboration, including different cultures and operating practices, and there have been high-profile instances of non-cooperation. The informality of existing collaborations has also led to concerns about censorship, mission creep and a lack of accountability and oversight. The focus of this report is on how to resolve the impediments to closer cooperation between law enforcement and the tech sector in order to realise the benefits of mutual collaboration, while simultaneously addressing concerns about due process and accountability. The report utilises an interview-based methodology to examine the experiences and opinions of personnel from both sectors who have first-hand experience of mutual cooperation. It provides empirically grounded insights into this under-researched topic."

Global Network On Extremism And Technology (Gnet). 2023. 38P.

Citizens Guide to January 6th and Ongoing Threats to Democracy

By: Goodman, Ryan, Kim, Sang-Min; Steinman, Jon; Ford, William

"For the first time in American history, a sitting president of the United States sought to overturn the results of a presidential election and block the peaceful transfer of power to his rightful successor. Former President Donald Trump waged this campaign for months, spreading baseless claims about widespread election fraud and pursuing an array of schemes at the local, state, and federal levels in an effort to reverse the 2020 electoral outcome. This multifaceted campaign--which culminated in the January 6, 2021 attack on the U.S. Capitol--has chipped away at many Americans' faith in our democratic processes, emboldened extremists who threaten violence to secure their political preferences, and left a blueprint for future efforts to subvert elections. This crisis is made worse by shortcomings in an array of federal laws, which leave key government institutions vulnerable, and provide legal loopholes that can be exploited by actors looking to subvert the will of the American people. In June 2021, the House of Representatives created the January 6 Select Committee to investigate the events surrounding the attack on the Capitol including their causes. This Guide presents an overview of the Select Committee's findings to date, revealed to the public in a series of hearings that allege President Trump and his associates engaged in a seven-part conspiracy to hold onto power. This Guide covers the numerous threats to American democracy that have emerged, responsive reforms under consideration by policymakers, and how Americans can learn more about these events and possible paths forward toward a more resilient democracy in the future."

Just Security. September 2022. 43p.

Exploiting Cyberspace: International Legal Challenges and the New Tropes, Techniques and Tactics in the Russo-Ukraine War

By Pijpers, Peter B.M.J.

From the Summary: "The Russian invasion of Ukraine, while primarily a kinetic war, saw new actors and novel activities exploiting cyberspace. Numerous non-state actors, hacker groups and commercial enterprises have entered the virtual battlespace, taking sides with one of the warring states without necessarily being belligerent entities. While states were already struggling with how to regulate activities in cyberspace, the new tropes, techniques and tactics have increased legal uncertainty. International law is based on the state, a territory, and the distinction between war and peace, while cyberspace and the activities conducted therein are not. The Russo-Ukraine war has made it clear that non-state actors such as Microsoft or Anonymous cannot be attributed to a state, and that they do not participate directly in hostilities, at least not physically. Moreover, the attributes of cyberspace have not only blurred the differences between state and non-state actors, but also transformed the dichotomy between war and peace. Not only do the challenges of how to apply international law to the new tropes, techniques and tactics in cyberspace increase differences in interpretation, but the ensuing uncertainties can be exploited, causing legal asymmetry."

European Centre Of Excellence For Countering Hybrid Threats (Hybrid Coe) . 2002. 20p.

Evaluation of a Multi-Faceted, U.S. Community-Based, Muslim-Led CVE Program

By Michael J. Williams; John G. Horgan; William P. Evans

The CVE program examined was initiated by the World Organization for Resource Development and Education (WORDE), a community-based Muslim-led organization whose CVE programming focuses on creating and maintaining networks of civically engaged individuals who are sensitized to issues of violent extremism and have proactive, cooperative relationships with local social services and law enforcement agencies… As part of its community education focus WORDE programming addresses the early identification of individuals at risk for violent extremism. One of the highlights of the current evaluation was the development of empirically based recommended practices for both the recruitment and retention of CVE program participants. The evaluation's experimental tests found that fear of damaging one's peer relationships reduced individuals' willingness to intervene when they observe signs of the potential for violent extremism. Evidence-based initiatives are suggested for addressing this fear of peer rejection in training people to act appropriately in recognizing and responding to indications that a person advocates or is motivated to engage in extremist violence. In examining whether WORDE programs are effective, the evaluation found that of all of WORDE's activities, their volunteer-service and multicultural programming had the intended positive effects on 12 of 14 CVE-relevant outcomes. In addition, there were no discernable unintended effects. Thus, the evaluation concludes that WORDE's volunteer-service and multicultural programming is the first evidence-based CVE-relevant programming in the United States. It is worthy of expansion and testing in other municipalities.

Washington, DC: U.S. Department of Justice, 2016. 167p.

The Rise of Ideologically Motivated Violent Extremism in Canada

By Canada. House of Commons. Standing Committee on Public Safety and National Security

Ideologically motivated violent extremism (IMVE) is on the rise in Canada and its affects are being experienced throughout Canadian society, including by elected officials…. A number of Canadian influencers and proselytizers have emerged within IMVE movements. These IMVE influencers promote misinformation and action, including violence. It is against this background that, on 10 February 2022, the committee adopted the following motion: That pursuant to Standing Order 108(2), the committee undertake a study of the rise of Ideologically Motivated Violent Extremism (IMVE) in Canada; … Drawing on evidence heard by the committee, this report describes what is meant by IMVE, examines the targets of IMVE attacks, recent IMVE trends, Canada’s current response to IMVE threats, and presents the committee’s findings and recommendations to tackle this important issue. The committee recognizes that several areas aimed at combatting IMVE are matters of shared jurisdiction and that collaboration between all levels of government and civil society is required to address this issue.

Ottawa: House of Commons, 2022. 54p.

National Strategy on Countering Radicalization to Violence

By Public Safety Canada

Canada faces the threat of violence by a small number of individuals who have become radicalized for political, religious or other ideological reasons. The Government of Canada is concerned with all forms of violent extremism, not associating this phenomenon with any particular religious, political, national, ethnic, or cultural group. While Canada has faced a variety of threats stemming from violent extremism in recent decades, the main terrorist threat to Canada continues to be violent extremists inspired by terrorist groups such as Daesh and al-Qaeda. However, individuals espousing and engaging in violence can be inspired by any extremist group promoting such behaviour. For example, some individuals within the far-right movement have espoused, glorified, promoted, and even engaged in violence. As well, historically, some far-left extremists have taken part in violent acts such as pipeline bombings. The Government of Canada is also alerted to the dangers of lesser-known forms of violent extremism. In its ongoing efforts to keep Canadians safe, the Government of Canada is expanding how it responds to violent extremism. Specifically, the federal government is investing in the prevention of radicalization to violence as articulated through the National Strategy on Countering Radicalization to Violence. Prevention aims to thwart violent radicalization from happening in the first place and to intervene as early as possible when it is occurring. Preventing and countering violent extremism is an effective complement to security agencies’ traditional methods of safeguarding national security.

Ottawa: Public Safety Canada, 2018. 46p.

Hate, Extremism, and Terrorism In Alberta, Canada, and Beyond: The Shift from 2019 to 2022

By Michele St-Amant, David Jones, Michael King, and John McCoy

There have been significant changes in the three years since the Organization for the Prevention of Violence (OPV) published its first report about hatemotivated violence, extremism and terrorism in Alberta, Building Awareness, Seeking Solutions. The Covid-19 pandemic, protests against public health measures, tense elections in the United States, and the backlash to racial justice movements, among other events, have had broad social repercussions. Some of which have changed the composition and scale of the threat of extremism and terrorism – which has become more diffuse and comprised of a broader set of grievances and ideologies. This report is organized using the nomenclature developed by the Government of Canada to categorize different forms of extremist ideologies. As such, the findings related to ideologically motivated violent extremism and religiously motivated violent extremism are summarized first.i Next, we summarize our findings about conspiracy theories and hate incidents, including crimes, within Alberta and across Canada.

Edmonton, Alberta: Organization for the Prevention of Violence, 2022. 115p.

Right-wing Terrorism in the 21st Century: The ’national Socialist Underground’ and the History of Terror from the Far Right in Germany

By Daniel Koehler

This book is the first comprehensive academic study of German right-wing terrorism since the early 1960s available in the English language. It offers a unique in-depth analysis of German violent, extremist right-wing movements, terrorist events, groups, networks and individuals. In addition, the book discusses the so-called ‘National Socialist Underground’ (NSU) terror cell, which was uncovered in late 2011 by the authorities. The NSU had been active for over a decade and had killed at least ten people, as well as executing numerous bombings and bank robberies. With an examination of the group’s support network and the reasons behind the failure of the German authorities, this book sheds light on right-wing terrorist group structures, tactics and target groups in Germany. The book also contains a complete list of all the German right-wing terrorist groups and incidents since the Second World War. Based on the most detailed dataset of right-wing terrorism in Germany, this book offers highly valuable insights into this specific form of political violence and terrorism, which has been widely neglected in international terrorism research.

London: Routledge, 2017. 288p.

The Culture of Terrorism

By Noam Chomsky

Preface to the 2015 Edition As noted in the original preface, this book was originally intended as a postscript to my book Turning the Tide, but it took on a life of its own. Rereading this book is not easy. I like to think that I’ve been able to live without too many illusions about the nature of policy and the ways the intellectual classes conform to state doctrine, no matter how ludicrous it is. But it is a constant shock to be reminded of the record. The basic facts were very clear at the time of writing, and by now have been verified beyond serious dispute. In brief, the Reagan administration came into office declaring that a primary focus of policy would be state-directed international terrorism, “the plague of the modern age,” “a return to barbarism in our time,” in the fevered rhetoric of Shultz, Reagan, and the rest. They proceeded at once to launch murderous terrorist wars in Central America, while supporting terrorism throughout much of the world. Perhaps the most notorious case is Southern Africa, where Reagan was the last significant political figure to support the Apartheid regime and to deny its atrocious crimes, and continued to support the brutal terrorist forces in Angola even after their South African backers had withdrawn their support. The same was true in the Middle East and Southeast Asia, but nothing compared with their vicious atrocities in Central America, the primary focus of this book.

London: Pluto Press, 2015. 304p.

Terrorism Within Comparative International Context: The Counter-terrorism Response and Preparedness

By M.R. Haberfeld, Joseph F. King and Charles A. Lieberman

The introductory chapter of this book presents the concepts of the benefits inherent in the study of comparative approach for an effective counterterrorism response on the local law enforcement level and overviews the inception of the project. Throughout the twentieth century and into the twenty-first century, especially after the events of September 11, 2001, the legitimacy of law enforcement practices has been cited as a major concern for international criminal justice. As policing practitioners and scholars throughout the world shifted focus from a traditional reactive, crime control stance to the need for accountability mechanisms to ensure the s- port of citizenry in combating crime and terrorism, the democratization of policing was seen as the best mechanism for achieving long-term gains in public order at the same time as protecting human rights. While the need to maintain human rights remains an important issue, balancing these concerns with the important public safety interests of societies is paramount.

Cham: Springer, 2009. 190p.

Read/Download