Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in equity
Diminished, but not Defeated: The Evolution of al-Qaeda Since September 11, 2001

By The Soufan Center

Over the past twenty years, al-Qaeda has proven to be resilient and adaptive in its efforts to survive the Global War on Terror (GWOT). Twenty years after the attacks of September 11, 2001 in the United States, perpetrated by al-Qaeda, the organization looks much different than it did at the time. “We are no longer dealing with the same terrorist threat, or even the same al-Qaeda, as we did on September 11,” says Ali Soufan. “What we have today is something more complex and resilient, and an organization that has learned lessons from our policies and counterterrorism approaches. We did a lot to secure the U.S. homeland, but in our handling of the conflicts in Iraq and Afghanistan, we may have shown terrorist groups that all it requires to outlast a superpower is patience.”

Washington, DC: The Soufan Center, 2021. 47p.

Terrorism and Counterterrorism in Southeast Asia: Emerging Trends and Dynamics

By The Soufan Center

In the last three years, Indonesia and the southern Philippines have seen something new: women carrying out suicide bombings – some with their husbands, some with their children, and some avenging slain husbands – targeting churchgoers, police officers, and soldiers.1 In Malaysia, during the May 2018 general election, a 51-year-old housewife planned to use a car filled with gas canisters and explosives to mow down voters at a polling station, raising the spectre of women killing not only with their families, but also perpetrating “self-directed” or “lone wolf” terrorist acts themselves.2 More recently, the suicide bombing of a church in Makassar, Indonesia, and a shooting at a police headquarters in Jakarta have once again highlighted the potential of female terrorist operatives. Like suicide bombing, it was once assumed that women’s involvement as perpetrators of terrorist violence was culturally and ideologically anathema to terrorist groups in the region.

Washington, DC: The Soufan Center, 2021. 38p.

A Perfect Storm: Insurrection, Incitement, and the Violent Far-Right Movement

By Colin P. Clarke, Naureen Chowdhury Fink, and Mollie Saltskog

The Capitol Insurrection in the United States on January 6, 2021, sent shockwaves around the world. From London to Canberra, and Ottawa to Auckland, millions watched as a mob of far-right violent extremists stormed the U.S. Capitol seeking to overturn the results of a free and fair presidential election that had already been certified many times as both legitimate and credible. Dozens of Capitol Police officers were injured and attacked with racist slurs by the crowd; chants could be heard throughout the crowd to “hang Mike Pence,” then Vice President. The day after the attack, one of the Capitol Police officers died of a stroke linked by many to the attacks. Members of the crowd even erected makeshift gallows—not a prop that was hastily constructed, but rather a deliberate sign of the mob’s intentions. As of mid-September 2021, 608 federal cases have been brought against individuals involved in the January 6 attack.

Washington, DC: The Soufan Center, 2021. 62p.

Alternative Scales of Extremism: The Relationship Between Scale and Predictive Measures of Extremism in the United States

By Marcus A. Boyd and Samuel Henkin

This report investigates spatial patterns of terrorism and targeted violence in the United States. Such investigations are rare because terrorist attacks are rare in the United States compared to other nations and the terrorist attacks that do occur are dispersed in similar patterns as population centers. In sum, the relative rarity of attacks, the geographic size of the United States, and the distribution of population density create inherent challenges historically. However, the recent outbreak of political violence throughout the United States coupled with advances in spatial statistics creates an opportunity to investigate emerging patterns at subnational scales.

College Park, MD: START, 2022. 19p.

Recruitment and Radicalization among US Far-Right Terrorists

By Pete Simi, Steven Windisch, Karyn Sporer

This report presents findings from a two-year study, “Recruitment and Radicalization among US Far-Right Terrorists.” This investigation examines multiple aspects of recruitment and radicalization, such as the quality and quantity of exposure to right-wing ideologies prior to extremist involvement; types of recruitment; pre-entry risk factors for extremist participation; and the extremists’ perception about why he/she was unable to progress beyond the planning stages of a terror plot. The empirical analysis is divided into four distinct but overlapping reports. Report one consists of a comprehensive thematic assessment, which focuses on family socialization prior to extremist involvement; entry processes into extremism; recruitment strategies and the extremist subculture of violence. In terms of socialization, although only a small segment of our sample (n=3, 9.7%) were raised by parents who were members of extremist groups, a vast majority (n=28, 90.3%) were exposed to racist/anti-Semitic beliefs during childhood. Regarding motivation for entry into violent extremism (VE), our findings indicate a variety of non-ideological factors increased the appeal of these groups such as acceptance from peers, attraction to the group’s forbidden social image and the ability to increase ones’ level of personal significance. In addition, participants also felt the group offered protection from bullies at school and rival gangs in their neighborhoods. In terms of recruitment, extremist groups relied on a variety of marketing strategies (e.g., leafleting and house parties) in order to promote their political agenda. Our data suggest these groups targeted marginalized youth who were angry and looking for solutions to their problems. However, the most effective recruitment tool was extremist music. Music provided recruiters with opportunities to introduce potential recruits to the extremist subculture in venues and through mediums with decreased monitoring from agents of formal social control. In addition, report one also examines the violent subculture of right-wing extremist groups. As part of this discussion, we highlight the role of various cultural practices such as violent rituals which were used to increase commitment to the group and to distinguish strong members from weaker ones. As our data indicates, however, there does seem to be a threshold for violence. That is, some extremists condemned violence when it was directed towards “defenseless” targets. Overall, these findings underscore the similarities individuals experience throughout their extremist careers.

College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism (START), 2016. 260p.

Why Radicalization Fails: Barriers to Mass Casualty Terrorism

By Pete Simi and Steven Windisch

In 1969 Travis Hirschi published Causes of Delinquency which assessed the status of existing criminological theory and outlined his own version of social bond theory. Hirschi argued, among other things, that criminological theory should focus more on asking “why don’t we do it” rather than the more common question “why do they do it?”(Hirschi, 1969) In this respect, Hirschi advocated for a focus on the constraints or barriers that prevent or reduce the likelihood of crime. The importance of this twist in thinking is the emphasis on the elements of the social fabric, which compel conformity rather than deviation by limiting certain types of human behavior. Following Hirschi, we examine violent radicalization where the expected end point is committing an act of mass casualty terrorism (MCT). For purposes of the current study, MCT can be distinguished from more common types of interpersonal violence along two dimensions (Rutherford et.al., 2007, Tilly 2003). First, as compared to interpersonal violence, which is characterized by close physical proximity between the perpetrator and victim (s), MCT typically involves a greater physical distance between the aggressor and the target (Black, 1996, Senechal de la Roche 1996). Second, MCT typically involves the potential for a large number of fatalities whereas interpersonal violence is much more likely to result in fewer victims (Arnold et.al., 2002, Quillen 2002). Bombings and shooting rampages are common examples of MCT while interpersonal violence includes acts such as fistfights, attacks involving blunt objects (e.g. bats) and stabbings.

Oslo: Center for Research on Extremism, The Extreme Right, Hate Crime and Political Violence, University of Oslo, 2017. 28p.

Global Jihadist Terrorism: Terrorist Groups, Zones of Armed Conflict and National Counter-Terrorism Strategies

Edited by Paul Burke, Doaa’ Elnakhala, and Seumas Miller

This insightful book provides a unified repository of information on jihadist terrorism. Offering an integrated treatment of terrorist groups, zones of armed conflict and counter-terrorism responses from liberal democratic states, it presents fresh empirical perspectives on the origins and progression of conflict, and contemporary global measures to combat terrorist activity.

Cheltenham, UK Northampton, MA: Edward Elgar Publishing, 2021. 352p.

Routledge Handbook of U.S. Counterterrorism and Irregular Warfare Operations

Edited by Michael A. Sheehan, Erich Marquardt, and Liam Collins

This handbook comprises essays by leading scholars and practitioners on the topic of U.S. counterterrorism and irregular warfare campaigns and operations around the globe. Terrorist groups have evolved substantially since 9/11, with the Islamic State often described as a pseudo-state, a terrorist group, and insurgency all at the same time. While researchers', analysts', and policymakers’ understanding of terrorism has grown immensely over the past two decades, similar advancements in the understanding of counterterrorism lag. As such, this handbook explains why it is necessary to take a broader view of counterterrorism which can, and often does, include irregular warfare. The volume is divided into three thematic sections: Part I examines modern terrorism in the Islamic world and gives an overview of the major terrorist groups from the past three decades; Part II provides a wide variety of case studies of counterterrorism and irregular warfare operations, spanning from the 1980s to the irregular warfare campaign against the Islamic State in northern Syria in 2018; Part III examines the government instruments used to combat terrorism and wage irregular warfare, such as drones, Theater Special Operations Commands, and Theater Commands. The handbook fills a gap in the traditional counterterrorism literature by its inclusion of irregular warfare and by providing analyses from academic experts as well as practitioners. It will be of much interest to students of counterterrorism, counterinsurgency, U.S. national security, military affairs, and International Relations.

London; New York: Routledge, 2022. 537p.

Counter-Terrorism: The Ethical Issues

Edited by Seumas Miller, Adam Henschke, and Jonas Feltes

This is an open access title available under the terms of a CC BY-NC-ND 4.0 License. It is free to read, download and share on Elgaronline.com. This insightful book provides an analysis of the central ethical issues that have arisen in combatting global terrorism and, in particular, jihadist terrorist groups, notably Al Qaeda, Islamic State and their affiliates. Chapters explore the theoretical problems that arise in relation to terrorism, such as the definition of terrorism and the concept of collective responsibility, and consider specific ethical issues in counter-terrorism.

Cheltenham, UK; Northampton, MA: Edward Elgar Publishing, 2021. 214p.

IS and Cultural Genocide: Antiquities Trafficking in the Terrorist State

By Russell D. Howard, Marc D. Elliott, and Jonathan R. Prohov

In this monograph, the authors offer compelling research that reminds government and military officials of the moral, legal, and ethical dimensions of protecting cultural antiquities from looting and illegal trafficking. Internationally, states generally agree on the importance of protecting antiquities, art, and cultural property not only for their historical and artistic importance, but also because such property holds economic, political, and social value for nations and their peoples. Protection is in the common interest because items or sites are linked to the common heritage of mankind. The authors make the point that a principle of international law asserts that cultural or natural elements of humanity’s common heritage should be protected from exploitation and held in trust for future generations. The conflicts in Afghanistan, and especially in Iraq and Syria, coupled with the rise of the Islamic State (IS), have brought renewed attention to the plight of cultural heritage in the Middle East and throughout the world.

MacDill Air Force Base, Florida: Joint Special Operations University Press, 2016. 112p.

Narcoterrorism in Latin America: A Brazilian Perspective

By Alvaro de Souza Pinheiro

Narcoterrorism in Latin America: A Brazilian Perspective builds a case for giving greater attention to the narcoterrorism threat. General Alvaro suggests that security conditions in Colombia and the Tri-Border Area (TBA), where Argentina, Brazil and Paraguay meet, deserve the immediate attention of security officials of the Hemisphere's more capable countries. In this paper, General Alvaro provides a review of Colombia's security situation-the history and current situation-and details his thoughts about the United States' support of the government of Colombian President Alvaro Uribe Velez.

Hurlburt Field, FL: Joint Special Operations University, 2006. 96p.

Theoretical Perspectives of Terrorist Enemies as Networks

By Robert G. Spulak, Jr. and Jessica Glicekn Turnley

Social and physical networks have many similarities, and many differences. And while network analysis can be useful for defeating an adversary's physical networked infrastructure, such as power grids or transportation systems, it is only a piece of a larger toolkit when working with a human system. Indeed, human will and adaptability are critical aspects of a network that might otherwise be viewed as purely technical. We compare and contrast approaches from the physical and social sciences, using networks to highlight the advantages and disadvantages of using the same analytic perspective for significantly different targets. We conclude with a discussion of the networks suggested by the National Military Strategic Plan for the War on Terrorism.

Hurlburt Field, FL: Joint Special Operations University, 2005. 42p

Film Piracy, Organized Crime, and Terrorism

By Treverton, Gregory F. ,Matthies, Carl , Cunningham, Karla J.,Goulka, Jeremiah ,Ridgeway, Gregory , Wong, Anny

This report presents the findings of research into the involvement of organized crime and terrorist groups in counterfeiting products ranging from watches to automobile parts, from pharmaceuticals to computer software. It presents detailed case studies from around the globe in one area of counterfeiting, film piracy, to illustrate the broader problem of criminal--and perhaps terrorist--groups finding a new and not-much-discussed way of funding their activities. Piracy is high in payoff and low in risk, often taking place under the radar of law enforcement. The case studies provide compelling evidence of a broad, geographically dispersed, and continuing connection between film piracy and organized crime, as well as evidence that terrorist groups have used the proceeds of film piracy to finance their activities. Counterfeiting is a threat not only to the global information economy, but also to public safety and national security. Cooperation among law enforcement and governments around the world is needed in the battle against intellectual-property theft, and meaningful progress will require increased political will, strong legislation, consistent enforcement, deterrent sentencing, and innovative solutions. The report lays out an agenda of measures. Increased global intelligence-gathering and sharing is needed to further illuminate the scope and nature of the connections between piracy and organized crime, and policymakers and law enforcement worldwide should reexamine the common but erroneous assumption that counterfeiting is a victimless crime.

Santa Monica, CA: RAND, 2009. 183p.

The Crime-Terror Nexus and the Threat to U.S. Homeland Security

By Schofield,Mike

Since 2001, violent sub-national groups with disparate ideologies and motivations have been working together to further their objectives. They are collaborating, sharing each other’s tactics, and learning from one another’s successes and failures. What is the background or historical context of the crime-terror nexus, and what challenges does it present to U.S. homeland security practitioners? This thesis uses a case study approach to examine the history of the nexus between transnational criminal organizations and foreign terrorist organizations. The three case studies are then used as the data for the analysis chapter, which shows the historical and emerging relationships between states and the three violent sub-national groups. The three case studies suggest the activities of these violent sub-national groups are protean in nature; they are best described by analysts as falling into the “gray area phenomenon.” The three case studies, the analysis, and conclusion of this thesis support the recommendation that more effort needs to be placed on intelligence collection, especially at the domestic and local levels.

Monterey, CA: Naval Postgraduate School, 2015. 115p.

Evaluating Afghanistan’s Past, Present and Future Engagement with Multilateral Drug Control

By John Collins and Ian Tennant

This paper charts the history of Afghanistan’s interaction with the international drug control system and the complex relationship between national–international policy formation. It tells the story of Afghanistan’s relationship with and impact on evolving global drug regulations from the birth of the League of Nations drug control system through the 1961 UN Single Convention on Narcotic Drugs and up to the present day. It draws on primary documentation from US and British archives and an extensive review of secondary literature, as well as a series of interviews conducted for the purposes of this paper. It argues for a more nuanced historical awareness of Afghanistan’s role within multilateral drug control as a way to understand its roles in the creation of the modern licit drug economy and its continued role in the modern illicit drug economy. Further, it argues that there is a need to engage broader society in discussions, to ensure more continuity is built into the system—as relationships built with the old regime in Afghanistan have collapsed. It calls for re-centring international capacity-building efforts on community-centred approaches, not simply law enforcement and traditional alternative development (AD) programmes. Moving away from the former enforcement focused activities also reduces the risks of human rights violations.

Birmingham, UK: University of Birmingham.. 2022. 34p.

Hot Lands: The Rise of Civilian Militias

By Adrian Arellano.

Why do civilians form militias? Militias emerge not when there is a lack of state security but instead when competing violence specialists behave as predatory actors. I argue that varying time horizons create the conditions for militias. I examine political reforms that have heterogeneous effects, lowering horizons for specialists and raising them for civilians. A high discount rate pushes violence specialists towards destructive violence. Having two options of violence, productive and destructive violence, specialists weigh the cost and benefits of each. The cost of productive violence is incurred up front while the cost of destructive violence occurs later, leading specialists to opt for destruction when they are experiencing a falling discount factor. However, discounting the future is self-defeating as it sets the conditions for militias. Some civilians will flee while others collaborate, but those with low discount factors will form protective militias. For civilian militias, political reforms lowers their discount rate and increases the extent to which they value the future relative to the present. Civilian militias with a low discount rate will have an interest in securing their future with arms. With the help of subnational and archival research, I show that militia onset is more likely in response to predatory actors. I test the theory using two case studies: the autodefensas in Mexico and the Deacons for Defense and Justice in the United States.

Ann Arbor: University of Michigan, 2019. 216p.

Crime, Violence, and the Crisis in Guatemala: A Case Study in the Erosion of the State

By Hal Brands.

Guatemala is currently experiencing a full-blown crisis of the democratic state. An unholy trinity of criminal elements—international drug traffickers, domestically based organized crime syndicates, and youth gangs—is effectively waging a form of irregular warfare against government institutions, with devastating consequences. The police, the judiciary, and entire local and departmental governments are rife with criminal infiltrators; murder statistics have surpassed civil-war levels in recent years; criminal operatives brazenly assassinate government officials and troublesome members of the political class; and broad swaths of territory are now effectively under the control of criminal groups. Guatemala’s weak institutions have been unable to contain this violence, leading to growing civic disillusion and causing a marked erosion in the authority and legitimacy of the government.

Carlisle, PA: U.S. Army War College Press, 2010. 71p.

Colombia's Paramilitaries: Criminals or Political Force?

By David Spencer

The intent of this monograph was to explore the multiple dimensions of Colombia's ongoing crisis and inform the public debate regarding the challenges faced by the statesmen, intellectuals, military strategists, and others who take on the responsibility to deal with that crisis. Hopefully, it will also generate serious reflection about the tough choices Colombian, U.S., and other global leaders face. The author points out, first, that the Colombian paramilitary self-defense forces represent some important sectors of society, and enjoy more popular support from Colombian society than the insurgents. Second, the paramilitaries have developed into a powerful irregular force that is proving itself capable of challenging Colombian guerrillas. Third, while they commit horrendous atrocities, they have been successful where the state has not. Therefore, the paramilitaries are seen by many as a viable solution to the conflict. Finally, he argues that, until the segments of the society represented by the paramilitaries are--somehow-- incorporated into the solution to the Colombian crisis, there will be no solution.

Carlisle, PA: U.S. Army War College Press, 2001. 32p.

Threat Posed by Mounting Vigilantism in Mexico

By George W. Grayson

Until the 1980s, Mexico enjoyed relative freedom from violence. Ruthless drug cartels existed, but they usually abided by informal rules of conduct hammered out between several capos and representatives of the dominant Institutional Revolutionary Party (PRI), which ruled the country until the 1990s. Relying on bribes, the desperados pursued their illicit activities with the connivance of authorities. In return for the legal authorities turning a blind eye, drug dealers behaved discretely, shunned high-tech weapons, deferred to public figures, spurned kidnapping, and even appeared with governors at their children’s weddings. Unlike their Colombian counterparts, Mexico’s barons did not seek elective office. In addition, they did not sell drugs within the country, corrupt children, target innocent people, engage in kidnapping, or invade the turf or product-line (marijuana, heroin, cocaine, etc.) of competitors. The situation was sufficiently fluid so that should a local police or military unit refuse to cooperate with a cartel, the latter would simply transfer its operations to a nearby municipality where they could clinch the desired arrangement. Three key events in the 1980s and 1990s changed the “live and let live” ethos that enveloped illegal activities. Mexico became the new avenue for Andean cocaine shipped to the United States after the U.S. military and law-enforcement authorities sharply reduced its flow into Florida and other South Atlantic states. The North American Free Trade Agreement, which took effect on January 1, 1994, greatly increased economic activities throughout the continent. Dealers often hid cocaine and other drugs among the merchandise that moved northward through Nuevo Laredo, El Paso, Tijuana, and other portals. The change in routes gave rise to Croesus-like profits for cocaine traffickers--a phenomenon that coincided with an upsurge of electoral victories. Largely unexamined amid this narco-mayhem are vigilante activities. With federal resources aimed at drug traffickers and local police more often a part of the problem than a part of the solution, vigilantes are stepping into the void. Suspected criminals who run afoul of these vigilantes endure the brunt of a skewed version of justice that enjoys a groundswell of support.

Carlisle, PA: U.S. Army War College Press, 2011. 76p.

An Illusion of Complicity: Terrorism and the Illegal Ivory Trade in East Africa

By Cathy Haenlein.

Organised crime groups, rather than terrorist groups, are profiting the most from the East African illegal wildlife trade. A number of myths and misperceptions have grown alongside the illegal ivory trade – none more troubling than the alleged participation of terrorist groups. In East Africa, the Somali terror group Al-Shabaab has supposedly received up to 40 per cent of its running costs through the illegal ivory trade alone. This is a powerful narrative, espoused by some politicians, policy-makers and practitioners. But it is largely wrong. Evidence for Al-Shabaab involvement in poaching and trafficking remains extremely limited and controversial. Briefings given to policy-makers on terrorism and the illegal ivory trade continue to refer to unverified sources. This is a cause for concern: such a narrative risks diverting attention from the trade’s main facilitators and, counter-intuitively, from Al-Shabaab’s known funding sources. To address these misconceptions, this report explores the complex ecosystems of terrorism, poaching and ivory trafficking in East Africa.

London: Royal United Services Institute (RUSI), 2015. 58p.