Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in equity
Perspectives on Terrorism.

By Editor James J.F. Forest and Bart Schuurman

The first article by Deven Parekh, Amarnath Amarasingam, Lorne Dawson and Derek Ruths offers a detailed critique of Twitter data collection methods and propose suggestions for improving the collection of data in future research on terrorists use of social media. Then Ariel Koch examines the impact of Islamic State beheading videos among jihadists and other extremists. Next, Adesoji Adelaja, Abdullahi Labo and Eva Penar examine how the Nigerian public’s views about the root causes and objectives of Boko Haram differ from those of the government. And in our final article of this issue a team of researchers at the International Center for Study of Violent Extremism (ICSVE’s) report on their recent Facebook ad-campaign aimed at raising awareness about the realities of living under ISIS and protecting vulnerable potential recruits from considering joining.

Terrorism Research Initiative (TRI), headquartered in Vienna, Austria, and the Institute of Security and Global Affairs (ISGA) of Leiden University, Campus The Hague. Vol.XII, Issue 3, June 2018. 189p.

How Extremism Operates Online: A Primer

By Alexandra T. Evans, Heather J. Williams

Recent demonstrations and violent attacks have highlighted the need for an improved understanding of the role of internet-based technologies in aiding and amplifying the spread of extremist ideologies. Since the early days of the internet, radical groups and movements across the ideological spectrum have demonstrated their intent and ability to harness virtual platforms to perform critical functions.

This Perspective, the second in a RAND Corporation series on online white-supremacist and violent misogynist material, provides a primer on how the internet influences the activities of radical groups and movements and how exposure to or consumption of extremist content online influences the behavior of internet users. After briefly discussing relevant terminology, the authors describe the role of the internet in facilitating five operational functions for radical groups and movements: (1) group financing; (2) networking and coordination; (3) recruitment and radicalization; (4) inter- and intra-group knowledge transfer; and (5) planning, coordination, and execution of harmful online and offline operations. The authors then examine how virtual interactions can facilitate or encourage users' adoption of extremist ideas and inspire or alter offline behavior. The Perspective concludes with a discussion of how the internet can be leveraged as a tool to counter extremism, and the authors provide suggestions for further research.

Santa Monica, CA: RAND Corporation, 2022. 48p.

Violent Extremism in America: Interviews with Former Extremists and Their Families on Radicalization and Deradicalization

By Ryan Andrew Brown, Todd C. Helmus, Rajeev Ramchand, Alina I. Palimaru, Sarah Weilant, Ashley L. Rhoades, Liisa Hiatt

Terrorism and ideologically inspired violence represent persistent and serious threats to U.S. national security. The January 6, 2021, attack at the U.S. Capitol and other recent events emphasize the need for more research to inform prevention and deradicalization strategies. In this report, the authors aim to characterize why and how individuals joined extremist organizations, as well as how some of them exited these groups. Semistructured interviews were conducted with former extremists and their family members, representing 32 unique stories of 24 white supremacists and eight Islamic extremists.

Exposure to propaganda on the internet, in music, and in books and literature was present in more than two-thirds of the sample. Although formal, top-down recruitment occurred for three Islamic extremists, the majority of white supremacists actively sought out participation in extremist organizations. Among the sample, 26 had exited the organizations; of those, six were still undergoing cognitive and emotional deradicalization. Among those who exited, 22 mentioned that a person or group intervened to help them by providing diverse cultural and demographic exposures, emotional support, financial stability, or domestic stability.

Interviewees also addressed such systemic issues as unemployment and the need for more-affordable and easily accessible mental health care. These interviews led to recommendations for both research and practice that emphasize the importance of incorporating the voices of those with personal experience and knowledge of ideological extremism into future research designs and efforts to prevent radicalization and promote deradicalization.

Santa Monica, CA: RAND Corporation, 2021. 134p.

Mapping White Identity Terrorism and Racially or Ethnically Motivated Violence Extremism: A Social Network Analysis of Online Activity

By Heather J. Williams, Luke J. Matthews, Pauline Moore, Matthew A. DeNardo, James V. Marrone, Brian A. Jackson, William Marcellino, Todd C. Helmus

Racially or ethnically motivated violent extremism (REMVE) and extremists (REMVEs) present some of the most pressing threats to the United States. REMVE also has been identified as the White identity terrorist movement (WITM). REMVEs are among the most lethal domestic violent extremists, and they are the most likely to commit mass-casualty attacks. These movements are characterized by a broad ideological orientation toward xenophobic, anti-Semitic, racist, and misogynistic sentiment.

For this report, the authors reviewed the relevant literature on REMVE networks and collected and analyzed social media data from six social networks (Twitter, Reddit, Gab, Ruqqus, Telegram, and Stormfront) to produce a global network map of the digital REMVE space. That network map evaluates each network's construction, connectivity, geographic location, references to prominent organizations, and proclivity to violence. The authors also reviewed ten countries' experiences with REMVE to sketch out an understanding of the REMVE space in these countries and how REMVEs in those countries relate to those in the United States.

Santa Monica, CA: RAND Corporation, 2022. 184p.

Countering Violent Extremism in the U.S. Military

By Todd C. Helmus, Hannah Jane Byrne, King Mallory

To support the U.S. Department of Defense (DoD)'s efforts to counter extremism in its ranks, the authors considered how a terrorism prevention or countering violent extremism framework might address the issue. They offer intervention initiatives that DoD might consider adopting. They also review the terrorism prevention framework as it has been applied in the U.S. civilian sector and focus on initiatives that might be relevant and adaptable to the military context.

This review highlights broader evidence for such initiatives, places the initiatives in the context of the radicalization process and in the context of other such initiatives, and offers at least a cursory review of the evidence base for interventions.

Santa Monica, CA: RAND Corporation, 2021. 20p.

Violence and Terrorism from the FarRight: Policy Options to Counter an Elusive Threat

By Daniel Koehler

Extreme right-wing violence and terrorism are a growing threat to Western societies. This form of political violence is also quite elusive and differs from others (e.g. jihadist violence) in some key characteristics. Since the September 11 attacks, policy makers, law enforcement and intelligence agencies as well as researchers have focused most of their attention on Islamic extremist violence and terrorism. This has led to an imbalance in the understanding of other threats, especially from the far-right, and adequate ways to counter it. This paper, using Germany as a main case study, argues that far-right violence has a potential risk of being misunderstood and under-classified, thus creating the perception among victims of that violence that democratic countries “are blind on the right side”. This erosion of trust in the rule of law and the monopoly of force is one goal of extreme right-wing terrorists. Specific recommendations to improve countering the threat posed by the far-right are avoiding double standards in dealing with political violence at all costs, swift and efficient appropriate legal actions against extreme right perpetrators of violence, an increase in funding for research about right-wing terrorism, a possible refinement of the legal definition of “terrorism” and a discussion about its relationship with “hate crimes”, as well as wide scale support for countering violent extremism (CVE) and deradicalisation programs targeting the far-right.

The Hague: International Centre for Counter-Terrorism, 2019. 21p.

Lone Wolf Terrorism in America: Using Knowledge of Radicalization Pathways to Forge Prevention Strategies

By Mark Hamm and Ramon Spaaj

This research offers the largest and most comprehensive database ever created on lone wolf terrorism, along with a theory-informed case study component based on direct contact with imprisoned lone wolf terrorists, and a comparative analysis distinguishing lone wolves from those who undergo radicalization in a group setting. Strictly in terms of lethality, the data indicate that lone wolf terrorism in America is not on the rise. Although lone wolf terrorism may not be increasing, it is undergoing two important changes in modus operandi. First, uniformed police and military personnel have become the primary target of lone wolf terrorists. Second, consistent with the relaxation of U.S. gun laws since the 1990s and the recent trend in mass shootings, the lone wolf’s preferred weaponry is now a staggering range of high-velocity firearms. While there is no standard profile of the lone wolf terrorist, most of them are unemployed, single white males with a criminal record. Compared to members of terrorist groups, lone wolves are older, less educated and more prone to mental illness. The study validates a series of commonalities associated with pathways to radicalization for lone wolf terrorists. The radicalization model indicates that lone wolf terrorism begins with a combination of personal and political grievances which form the basis for an affinity with online sympathizers. This is followed by the identification of an enabler, followed by the broadcasting of terrorist intent. The final commonality is a triggering event, or the catalyst for terrorism. The ability of law enforcement and intelligence communities to detect and prevent lone wolf terrorism demands a clear understanding of these radicalization processes. Such insight may provide investigators with a sort of detection system, or “signatures”—as minimal as they may appear—that an individual with a terrorist intent will demonstrate in preparing for an attack. Crucial to this understanding is the broadcasting of intent. While lone wolves physically isolate from society, at the same time they seek recognition for their causes through spoken statements and threats, manifestos, e-mail messages, texting and videotaped proclamations. Focusing on this kind of immediate objective of radicalization among lone wolves, rather than on their underlying grievances, may sharpen our focus on the dangers posed by lone wolf terrorism.

Indiana State University, 2015. 28p.

The European Union as a Global Counter-Terrorism Actor European Security and Justice Critiques series

By Christian Kaunert, Alex MacKenzie, and Sarah Léonard

After the death of Osama Bin Laden and the demise of Al Qaeda, the EU is increasingly threatened by new jihadi terrorist groups such as ISIS, as exemplified by recent terror attacks on Paris, Brussels, Nice, Berlin and Manchester. This book investigates the role of the EU in dealing with such groups as part of its counter-terrorism efforts, by outlining the increasing role of the EU as an external counter-terrorism actor.

Cheltenham, UK: Edward Elgar Publishing, 2022. 192p.

Global Terrorism Index 2022: Measuring the Impact of Terrorism

By Institute for Economics & Peace IEP

This is the ninth edition of the Global Terrorism Index (GTI). The report provides a comprehensive summary of the key global trends and patterns in terrorism over the last decade. The calculation of the GTI score takes into account not only deaths, but also incidents, hostages, and injuries from terrorism, weighted over a five-year period. The GTI report is produced by the Institute for Economics & Peace (IEP) using data from TerrorismTracker and other sources. TerrorismTracker provides event records on terrorist attacks since 1 January 2007. The dataset contains over 60,500 terrorist incidents for the period 2007 to 2021.

Sydney: IEP, 2022. 99p.

The Business of Martyrdom : A History of Suicide Bombing

By Jeffrey William Lewis

"The only comprehensive history available of suicide bombing from its origins in Imperial Russia to the current day, The Business of Martyrdom examines the bombers, their societies, and the organizations that train and sponsor them. Writing for a broad audience, Lewis draws on the history and philosophy of technology in order to explain the evolution and diffusion of suicide bombing across time and from region to<span class='showMoreLessContentElement' style='display: none;'> region. Lewis presents a model for suicide bombing that integrates individual psychology, organizational motivations, and social support. He argues that suicide bombing is a technology that has been invented and re-invented at different times in different areas, but always for the same purpose: resolving a mismatch in military capabilities between antagonists by utilizing the available cultural and human resources."

Annapolis, MD: Naval Institute Press, 2012. 368p.

Women Suicide Bombers: Narratives of Violence

By V.G. Julie Rajan

Women Suicide Bombers explores why cultural, media and political reports from various geographies present different information about and portraits of the same women suicide bombers. The majority of Western media and sovereign states engaged in wars against groups deploying bombings tend to focus on women bombers' abnormal mental conditions; their physicality-for example, their painted fingernails or their beautiful eyes; their sexualities; and the various ways in which they have been victimized by their backward Third World cultures, especially by "Islam." In contrast, propaganda produced by rebel groups deploying women bombers, cultures supporting those campaigns, and governments of those nations at war with sovereign states and Western nations tend to project women bombers as mythical heroes, in ways that supersedes the martyrdom operations of male bombers.

London: Routledge, 2012. 400p.

Making Sense of Suicide Missions

Edited by Diego Gambetta

This book attempts to shed light on suicide missions and provide answers to the questions we all ask. Are these the actions of aggressive religious zealots and unbridled, irrational radicals or is there a logic driving those behind them? Are their motivations religious or has Islam provided a language to express essentially political causes? How can the perpetrators remain so lucidly effective in the face of certain death? And do these disparate attacks have something like a common cause? It focuses on four main instances: the Kamikaze, missions carried out by the Tamil Tigers in the civil war in Sri Lanka, the Lebanese and Palestinian groups in the Middle East, and the al-Qaeda 9/11 attack on the World Trade Center and the Pentagon. For more than two years, the authors have pursued an unprejudiced inquiry, investigating organizers and perpetrators alike of this extraordinary social phenomenon. Close comparisons between a whole range of cases raise challenging further questions: If suicide missions are so effective, why are they not more common? If killing is what matters, why not stick to ‘ordinary’ violent means? Or, if dying is what matters, why kill in the process?

Oxford, UK: New York: Oxford University Press, 2005. 452p.

On Suicide Bombing

By Talal Asad

Like many people in America and around the world, Talal Asad experienced the events of September 11, 2001, largely through the media and the emotional response of others. For many non-Muslims, "the suicide bomber" quickly became the icon of "an Islamic culture of death"—a conceptual leap that struck Asad as problematic. Is there a "religiously-motivated terrorism?" If so, how does it differ from other cruelties? What makes its motivation "religious"? Where does it stand in relation to other forms of collective violence?

Drawing on his extensive scholarship in the study of secular and religious traditions as well as his understanding of social, political, and anthropological theory and research, Asad questions Western assumptions regarding death and killing. He scrutinizes the idea of a "clash of civilizations," the claim that "Islamic jihadism" is the essence of modern terror, and the arguments put forward by liberals to justify war in our time. He critically engages with a range of explanations of suicide terrorism, exploring many writers' preoccupation with the motives of perpetrators. In conclusion, Asad examines our emotional response to suicide (including suicide terrorism) and the horror it invokes.

On Suicide Bombing is an original and provocative analysis critiquing the work of intellectuals from both the left and the right. Though fighting evil is an old concept, it has found new and disturbing expressions in our contemporary "war on terror." For Asad, it is critical that we remain aware of the forces shaping the discourse surrounding this mode of violence, and by questioning our assumptions about morally good and morally evil ways of killing, he illuminates the fragile contradictions that are a part of our modern subjectivity.

New York: Columbia University Press, 2007. 138p.

Terrorist Recruitment in American Correctional Institutions: An Exploratory Study of NonTraditional Faith Groups

By Mark S. Hamm

Today, there are thousands of followers of non-Judeo-Christian faith groups in American correctional institutions. Research suggests that many of these prisoners began their incarceration with little or no religious calling, but converted during their imprisonment. According to the FBI, some of these prisoners may be vulnerable to terrorist recruitment. The purpose of this research is three-fold: (1) to collect baseline information on nontraditional religions in United States correctional institutions; (2) to identify the personal and social motivations for prisoners’ conversions to these faith groups; and (3) to assess the prisoners’ potential for terrorist recruitment. The study creates a starting point for more in-depth research on the relationship between prisoners’ conversion to nontraditional religions and extremist violence. The work is organized into five chapters. Chapter 1 presents a comprehensive review of the literature bearing on the research objectives. This includes an historical overview of Moorish Science Temple and the Nation of Islam, American versions of Islam that have played an important role in radicalizing prisoners through religious identity. The review shows that there are currently opposing views about Islam in prison. One side of the debate takes the position that the Muslim faith offers prisoners a viable path to rehabilitation. The opposing view claims that Islamic prisoners are a threat to U.S. security. Criminological evidence shows that the greatest danger to security is found in mutating forms of “Prison Islam.” Other evidence indicates that the threat emanates from dozens of high-profile terrorists who are already serving lengthy sentences in American correctional facilities.

Terre Haute, IN: Department of Criminology, Indiana State University, 2007. 129p.

Law, Liberty, and the Pursuit of Terrorism

By Roger Douglas

Roger Douglas compares responses to terrorism by five liberal democracies—the United States, the United Kingdom, Canada, Australia, and New Zealand—over the past 15 years. He examines each nation's development and implementation of counterterrorism law, specifically in the areas of information-gathering, the definition of terrorist offenses, due process for the accused, detention, and torture and other forms of coercive questioning.

Douglas finds that terrorist attacks elicit pressures for quick responses, often allowing national governments to accrue additional powers. But emergencies are neither a necessary nor a sufficient condition for such laws, which may persist even after fears have eased. He argues that responses are influenced by both institutional interests and prior beliefs, and complicated when the exigencies of office and beliefs point in different directions. He also argues that citizens are wary of government's impingement on civil liberties and that courts exercise their capacity to restrain the legislative and executive branches. Douglas concludes that the worst antiterror excesses have taken place outside of the law rather than within, and that the legacy of 9/11 includes both laws that expand government powers and judicial decisions that limit those very powers.

Ann Arbor, MI: University of Michigan Press, 2014. 337p.

Resilient Cities. Countering Violent Extremism at Local Level

Edited by Diego Muro

Building resilience to violent extremism has become a matter of great concern for European cities that have experienced attacks or that fear experiencing them in the future. Mayors, municipal leaders and other local authority representatives are leading efforts to empower city governments across the EU and develop pragmatic and non-ideological policies. As increasing numbers of citizens rank violent extremism as one of their top worries, urban centres have effectively become the front line of the fight against radicalisation. It is in European cities where transnational extremist threats take shape in the forms of hate speech, recruitment networks, radical cells and terrorist attacks, and it is also in European cities where evidence-based plans to counter and prevent violent extremism at local level need urgently to be devised. Cities are obvious settings in which to implement the motto “think globally and act locally”.

Barcelona: Barcelona Centre for International Affairs, 2017. 118p.

Countering Online Radicalization in America

By Peter Neumann

The Internet has revolutionized the way all of us communicate and do business. Its benefits to people everywhere have been enormous and will continue to drive progress in practically every area of life. At the same time, it should be recognized that, while being a force for good, the Internet has also come to play an important—and, in many ways, unique—role in radicalizing homegrown and domestic terrorists. Supporters of Al Qaeda, Sovereign Citizens, white supremacists and neo-Nazis, environmental and animal liberationists, and other violent extremist groups all have embraced the Internet with great enthusiasm and vigor. They are using it as a platform to spread their ideas, connect with each other, make new recruits, and incite illegal and violent actions. We believe that this trend will continue and that future terrorist attacks against the United States and its interests will involve individuals who have been radicalized—at least in part—on the Internet. As a result, countering online radicalization should continue to be a major priority for the government and its Countering Violent Extremism (CVE) efforts. The purpose of this report is to equip policy makers with a better understanding of how the Internet facilitates radicalization, in particular within the United States; an appreciation of the dilemmas and trade-offs that are involved in countering online radicalization within the United States; and ideas and best practices for making the emerging approach and strategy richer and more effective

Washington, DC: Bipartisan Policy Center’s National Security Preparedness Group (NSPG). 2012. 56p.

Preventing Violent Radicalization in America

By Peter Neumann

Last September, we released a report, Assessing the Terrorist Threat, on the evolving nature of this threat to the United States. We concluded that the U.S. government had not adequately addressed the radicalization of homegrown terrorists. We set forth several pressing policy questions, including the fundamental question of who within the government is responsible for identifying radicalization and interdicting attempts at recruitment. This report seeks to answer those questions and provide concrete policy recommendations for a counter-radicalization strategy – the elements of which should be implemented not just by the federal government, but by state and local officials and community organizations.

Washington, DC: Bipartisan Policy Center’s National Security Preparedness Group (NSPG), 2011. 56p.

Alternative Approaches to Transforming Violent Extremism: The Case of Islamic Peace and Interreligious Peacebuilding

By Mohammed Abu-Nimer

The emergence of “violent extremism” (VE)2 as a central framework and priority adopted by most Western and non-Western government agencies. It has become the primary lens through which to describe many of their activities, especially in conflict areas around the world, even when the issues are not or are only remotely related. There is no doubt that VE narratives, especially those promoting violence in the name of Islam spread by groups such as Al-Qaeda, Al-Shabab, Taliban and Daesh, have gained strength and visibility in the last two decades (regardless of the differences in the groups’ motivation or type of justification – be it nationalism, anti-Western intervention or religion). However, it is an overstatement to solely explain the motivation for endorsing or adopting VE in Muslim societies as a result of theological factors; as explained below, there are many other factors besides religious identity and theological reasoning contributing to the phenomenon. Nevertheless, it is possible to trace historical factors that led to the creation of such groups in predominantly Muslim countries. In Afghanistan, for example, one such factor is rooted in the Cold War dynamics between the United States (US) and the USSR at the time of the Soviet invasion of Afghanistan in 1979. To fight communism, the US government mobilised local Afghan communities, which included some fighters who subsequently employed extreme Islamic religious narratives. The US’s fervent desire to prevent the spread of communism thus led to the arming of members of Afghan society who later utilised the concept of jihad against non-believers in certain Sunni interpretations.

Berlin: Berghof Foundation, 2018. 21p.

Transformative Approaches to Violent Extremism

Edited by Beatrix Austin and Hans J. Giessmann

Is the topic of violent extremism slowly turning into one on which everything has already been said, but not yet by everyone, as Karl Valentin used to wryly remark? We do not think so. While violent extremism (VE) has indeed emerged as a new buzzword and a strong funding trend over the past few years, effective strategies for addressing the phenomenon are still being forged and need to be reviewed and tested. Violent extremism’s manifestations range widely: from foreign fighters via terrorist attacks to increasingly public violence-condoning ideology and rhetoric of both secular and religious provenance. How to deal with violent extremism, and its protagonists, is therefore also becoming a major challenge for peacebuilders and conflict transformation practitioners. What specific advantages can a “transformative lens” bring – one which applies insights and learning from the peacebuilding and conflict transformation fields?

Berlin: Berghof Foundation, 2019. 98p.