Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in equity
How to define and tackle Islamist extremism in the UK

By Maaha Elahi and Julian Hargreaves  

This article presents a legal and public policy analysis of Shakeel Begg v British Broadcasting Corporation, a British libel case brought before the High Court in 2016. Begg v BBC provides a lens through which current debates on extremism and counter-extremism in the UK may be analysed. More specifically, the authors use their analysis of the case to address criticisms levied against the UK Government’s counter-extremism strategy, including the conceptualisation and definition of “Islamist extremism”. The article offers two main contentions. First, that the judgment in Begg v BBC has been undervalued by politicians and policymakers in the UK, as well as by scholars, journalists and other commentators. Second, that Lord Justice Haddon-Cave’s judgment in Begg v BBC provides a useful framework for those wishing to define, identify and tackle Islamist extremism, and extremism of any kind, in the UK and elsewhere.  

 The Hague: International Centre for Counter-Terrorism (ICCT),  2022.  32p.

Prevalence of Veteran Support for Extremist Groups and Extremist Beliefs: Results from a Nationally Representative Survey of the U.S. Veteran Community

Helmus, Todd C.; Brown, Ryan Andrew; Ramchand, Rajeev

From the document: "Policymakers and researchers are concerned that the U.S. veteran community is at increased risk of radicalization to violent extremism. Although subsequently revised downward, early reports suggested that as many as one in five Capitol Hill attackers was currently or had previously been affiliated with the U.S. military. Extremist groups actively target military members and veterans for recruitment because of their training and operational, logistic, and leadership skills. The unique and often lonely experience of leaving the military has been hypothesized to make veterans susceptible to such recruitment. To help address these concerns, the authors conducted a nationally representative survey of veterans to examine the prevalence of support for specific extremist groups and ideologies, including support for political violence. The authors compared their results with those from surveys of the general population. Among other findings, the veteran community, as a whole, did not manifest higher support than the general population. Interestingly, the majority of those who supported political violence were not also supporters of specific groups."

RAND Corporation. 2023. 26p.

New Approaches to the Analysis of Jihadism: Online and Offline

By Rudiger Lohiker

Jihadism has been an important issue of public discussions since 9/11. Internet media have been used by Jihadis as means of communication, propaganda, recruitment, and even training purposes. In this volume, the processes of interaction on Jihadi internet sites are analysed. Particular attention lays on the mechanisms of spread of propaganda via the internet by diverse technical means. The process of transformation of Islamic knowledge into Jihadi knowledge, the rhetorics  of videos, the development of South Asian Jihadi organisations and some conceptual issues are discussed.

Gottingen: V&R unipress, 2012. 224p.

Handbook of Terrorism Prevention and Preparedness

By Alex Schmid

From the introduction: The need for a Handbook of Terrorism Prevention and Preparedness needs little explanation in the light of the fact that the dominant approach of counterterrorism, based largely on heavy-handed military action, has been such a failure - especially in the Middle East. The traditional military instrument of deterrence has not worked against enemies who have, in most cases, no fixed territorial basis while claiming to love death more than life. The decapitation of terrorist organizations by killing their leaders in drone strikes has created martyrs rather than broken their organization’s will to fight. The collateral damage of military strikes has often turned family members, friends and other witnesses near and far into avengers. For many societies, the “cure” of militarized counterterrorism has been worse than the “disease” of terrorism.

Netherlands. The Hauge.ICCT Press. 2021.

Capitol Attack: Federal Agencies Identified Some Threats, but Did Not Fully Process and Share Information Prior to January 6, 2021, Report to Congressional Requesters

By United States. Government Accountability Office

From the document: "Prior to and during the events of January 6, 2021, federal, state, and local entities were responsible for identifying and sharing information on potential threats to inform security measures and ensure the safety of the U.S. Capitol. GAO [Government Accountability Office] was asked to review the January 6, 2021 attack. This is the seventh in a series of reports and addresses (1) how federal agencies identified threats related to the events of January 6, 2021; (2) the extent to which federal agencies took steps to process and share threat information prior to the events of January 6, 2021; and (3) how federal agencies identified threat information for the events of January 6, 2021 compared to other large demonstrations in Washington, D.C. [...] In the January 2023 report, GAO made 10 recommendations to five agencies to, for example, assess internal control deficiencies related to processing or sharing information. The agencies concurred with the recommendations."

Washington DC. nited States. Government Accountability Office. 2023. 122p.

National Cybersecurity Strategy

By United States. White House Office

From the document: "The United States has made significant progress toward achieving the President's affirmative vision for a digitally-enabled future, but emerging trends are creating both new opportunities for further advancement and new challenges to overcome. Malicious actors threaten our progress toward a digital ecosystem that is inclusive, equitable, promotes prosperity, and aligns with our democratic values. […] Deep and enduring collaboration between stakeholders across our digital ecosystem will be the foundation upon which we make it more inherently defensible, resilient, and aligned with U.S. values. This strategy seeks to build and enhance collaboration around five pillars: (1) Defend Critical Infrastructure, (2) Disrupt and Dismantle Threat Actors, (3) Shape Market Forces to Drive Security and Resilience, (4) Invest in a Resilient Future, and (5) Forge International Partnerships to Pursue Shared Goals. Each effort requires unprecedented levels of collaboration across its respective stakeholder communities, including the public sector, private industry, civil society, and international allies and partners. The pillars organizing this strategy articulate a vision of shared purpose and priorities for these communities, highlight challenges they face in achieving this vision, and identify strategic objectives around which to organize their efforts. To realize the vision these pillars lay out, we will make 'two fundamental shifts' in how the United States allocates roles, responsibilities, and resources in cyberspace. In realizing these shifts, we aspire not just to improve our defenses, but to change those underlying dynamics that currently contravene our interests."

United States. White House. 2023. 39p.

Domestic Terrorism: Further Actions Needed to Strengthen FBI and DHS Collaboration to Counter Threats, Report to the Ranking Member, Committee on Homeland Security, House of Representatives

By United States. Government Accountability Office

From the document: "Domestic terrorism investigations have more than doubled since 2020, according to the FBI. FBI and DHS are the main federal entities charged with preventing terrorist attacks in the U.S. FBI has lead responsibility for federal domestic terrorism investigations and domestic intelligence efforts. DHS is responsible for producing terrorist threat information in coordination with federal, state and local government agencies, and private entities. GAO [Government Accountability Office] was asked to review domestic terrorism threats, incidents, and related federal cases and charges. This report addresses, among other objectives, the extent to which the FBI and DHS I&A [Office of Intelligence and Analysis] (1) track domestic terrorism investigations and incidents, and (2) followed leading collaboration practices in their efforts to counter domestic terrorism threats."

United States. Government Accountability Office. Report Number .GAO-23-104720. 2023.

Countering Domestic Racially and Ethnically Motivated Violent Terrorism on Social Media: Introducing the Racist and Violent Extremist Flock Tool

By Tapia, Daniel; Warren, Kristin; Burns, Jacqueline Gardner; Holynska, Khrystyna; Reimer, Jordan R.

From the document: "Racially and ethnically motivated violent extremism is becoming an increasingly common occurrence in the United States. Racially and ethnically motivated violent extremist (REMVE)-related terrorism has consequences beyond loss of life: It undermines the sense of safety that targeted groups feel in their country and unravels the social fabrics of trust that are necessary for society to function. Further still, REMVE attacks can motivate other like-minded attackers to follow up with their own attacks, as was apparently the case with the May 14, 2022, mass shooting in Buffalo, New York, by a self-avowed, internet-radicalized white supremacist whose manifesto drew heavily from the March 15, 2019, Christchurch mosque mass shootings, which also inspired a mass shooting in El Paso, Texas. Two key challenges for those who observe online spaces in which radicalization occurs are the sheer volume of data and the idiosyncrasies of online communities. Website-specific language and memes are difficult to track and parse; even if emerging terms are detected, defining them can be difficult."

Rand Corp. 2023. 102p.

Tackling Online Terrorist Content Together: Cooperation Between Counterterrorism Law Enforcement and Technology Companies

By Macdonald, Stuart Keith, 1979-; Staniforth, Andrew

From the Executive Summary: "Cooperation between law enforcement and tech companies is widely regarded as necessary to tackle online terrorist content. Both sectors have publicly stated their commitment to working together and there are examples of mutual cooperation. Yet there are also impediments to such collaboration, including different cultures and operating practices, and there have been high-profile instances of non-cooperation. The informality of existing collaborations has also led to concerns about censorship, mission creep and a lack of accountability and oversight. The focus of this report is on how to resolve the impediments to closer cooperation between law enforcement and the tech sector in order to realise the benefits of mutual collaboration, while simultaneously addressing concerns about due process and accountability. The report utilises an interview-based methodology to examine the experiences and opinions of personnel from both sectors who have first-hand experience of mutual cooperation. It provides empirically grounded insights into this under-researched topic."

Global Network On Extremism And Technology (Gnet). 2023. 38P.

Fresh Perspectives on the 'War on Terror'

Edited by Miriam Gani and Penelope Mathew

On 20 September 2001, in an address to a Joint Session of Congress and the American people, President George W Bush declared a ‘war on terror’. The concept of the ‘war on terror’ has proven to be both an attractive and a potent rhetorical device. It has been adopted and elaborated upon by political leaders around the world, particularly in the context of military action in Afghanistan and Iraq. But use of the rhetoric has not been confined to the military context. The ‘war on terror’ is a domestic one, also, and the phrase has been used to account for broad criminal legislation, sweeping agency powers and potential human rights abuses throughout much of the world. This collection seeks both to draw on and to engage critically with the metaphor of war in the context of terrorism. It brings together a group of experts from Australia, Canada, the United Kingdom, France and Germany who write about terrorism from a variety of disciplinary perspectives including international law and international relations, public and constitutional law, criminal law and criminology, legal theory, and psychology and law.

Canberra: ANU Press,  2008. 440p.

Ecological Threat Report 2022: Analysing Ecological Threats, Resilience & Peace

By Institute for Economics & Peace

From the Executive Summary: "This is the third edition of the Ecological Threat Report (ETR), which analyses ecological threats in 228 independent states and territories. Produced by the Institute for Economics & Peace (IEP), the report covers over 3,638 sub-national administrative districts, or 99.99 per cent of the world's population, assessing threats relating to 'food risk, water risk, rapid population growth and natural disasters'. Many ecological threats exist independently of climate change. However, climate change will have an amplifying effect, causing further ecological degradation. The research takes a multi-faceted, multidimensional approach by analysing risk at the national, administrative district and city level, while also assessing these entities by ecological threats, societal resilience and levels of peace. Additionally, the research provides projections to 2050. To assist the international community in prioritising its focus, IEP has identified the countries, administrative districts and cities most at risk."

Institute for Economics & Peace. 2022. 81p.

Citizens Guide to January 6th and Ongoing Threats to Democracy

By: Goodman, Ryan, Kim, Sang-Min; Steinman, Jon; Ford, William

"For the first time in American history, a sitting president of the United States sought to overturn the results of a presidential election and block the peaceful transfer of power to his rightful successor. Former President Donald Trump waged this campaign for months, spreading baseless claims about widespread election fraud and pursuing an array of schemes at the local, state, and federal levels in an effort to reverse the 2020 electoral outcome. This multifaceted campaign--which culminated in the January 6, 2021 attack on the U.S. Capitol--has chipped away at many Americans' faith in our democratic processes, emboldened extremists who threaten violence to secure their political preferences, and left a blueprint for future efforts to subvert elections. This crisis is made worse by shortcomings in an array of federal laws, which leave key government institutions vulnerable, and provide legal loopholes that can be exploited by actors looking to subvert the will of the American people. In June 2021, the House of Representatives created the January 6 Select Committee to investigate the events surrounding the attack on the Capitol including their causes. This Guide presents an overview of the Select Committee's findings to date, revealed to the public in a series of hearings that allege President Trump and his associates engaged in a seven-part conspiracy to hold onto power. This Guide covers the numerous threats to American democracy that have emerged, responsive reforms under consideration by policymakers, and how Americans can learn more about these events and possible paths forward toward a more resilient democracy in the future."

Just Security. September 2022. 43p.

Target Markets -- International Terrorism Meets Global capitalism in the Mall

By Suzi Mirgani

This ground-breaking book explores the points of convergence between corporate capitalism and terrorist practice. Assessing the increase in the number of terrorist attacks directed against commercial entities in urban areas, such as the Westgate mall in Nairobi or the Charlie Hebdo offices in Paris, Suzi Mirgani offers a fascinating and disturbing perspective on the spaces where supposedly oppositional ends of the spectrum meet on common ground. How is it that these urban commercial spaces provide ground zero for a conference between the most powerful forces of contemporary culture: the most mainstream and the most extreme?

Bielefeld, Germany: transcript Verlag. 2016. 199p.

Report on the Importance of Peer Support in Preventing Domestic Violent Extremism

United States. Congress. House. Committee On Veterans' Affairs

From the Hearing Overview: "Having established why DVE [Domestic Violence Extremist] groups target veterans in their recruitment efforts during the October 2021 hearing, the Committee's March 31, 2022, hearing, entitled 'Helping Veterans Thrive: The Importance of Peer Support in Preventing Domestic Violent Extremism,' turned to the veterans' side of the story. The hearing had two main objectives: 1. To further examine some of the risk factors that place a small but growing number of military veterans at risk of radicalization and recruitment by DVE groups; and 2. To identify and evaluate various civil society efforts to combat domestic violent extremism. [...] As a result of the hearing, the Committee identified two main findings: 1. There is no single pathway toward radicalization, but there are certain risk factors that veterans who engage in violent extremism often share[; and] 2. Peer support, including support from other veterans, military families, and Veterans Service Organizations, is vital to countering the threat of domestic violent extremism."

United States. Congress. House. Committee On Veterans' Affairs . 2022. 21p.

Exploiting Cyberspace: International Legal Challenges and the New Tropes, Techniques and Tactics in the Russo-Ukraine War

By Pijpers, Peter B.M.J.

From the Summary: "The Russian invasion of Ukraine, while primarily a kinetic war, saw new actors and novel activities exploiting cyberspace. Numerous non-state actors, hacker groups and commercial enterprises have entered the virtual battlespace, taking sides with one of the warring states without necessarily being belligerent entities. While states were already struggling with how to regulate activities in cyberspace, the new tropes, techniques and tactics have increased legal uncertainty. International law is based on the state, a territory, and the distinction between war and peace, while cyberspace and the activities conducted therein are not. The Russo-Ukraine war has made it clear that non-state actors such as Microsoft or Anonymous cannot be attributed to a state, and that they do not participate directly in hostilities, at least not physically. Moreover, the attributes of cyberspace have not only blurred the differences between state and non-state actors, but also transformed the dichotomy between war and peace. Not only do the challenges of how to apply international law to the new tropes, techniques and tactics in cyberspace increase differences in interpretation, but the ensuing uncertainties can be exploited, causing legal asymmetry."

European Centre Of Excellence For Countering Hybrid Threats (Hybrid Coe) . 2002. 20p.

Attack on America's Future: Cyber-Enabled Economic Warfare

By Ravich, Samantha Fay; Fixler, Annie

From the Introduction: "In 2018, the Foundation for Defense of Democracies (FDD) published a series of monographs analyzing cyber-enabled economic warfare (CEEW) as practiced by Russia, China, North Korea, and Iran. The four studies brought together for the first time an assessment of each adversary's CEEW attacks on America's economic infrastructure. At the time, the term CEEW was only beginning to seep into the consciousness of the U.S. national security community. The White House had used the term in its 2017 National Security Strategy, noting how adversaries are using technology to 'weaken our businesses and our economy.'1 But the connection between such malicious activities and the overall strategies of America's four principal adversaries remained unclear. The risks associated with CEEW are now clearer, thanks less to the rigorous analysis of adversarial intentions than to the increased scale, scope, and frequency of attacks across the American economic landscape. Still, the federal government has a blind spot that leaves the United States vulnerable to a catastrophic strategic surprise -- one that could simultaneously destabilize the U.S. electrical grid, water supply, banking system, transportation sector, or other critical infrastructure necessary for survival. That blind spot is intelligence that anticipates the adversary's strategy. For too long, the United States has tried to patch its way to safety with the enemy inside its networks."

Foundation For Defense Of Democracies 2022. 68p.

Militarism and the Militarization of Public Security in Latin America and the Caribbean

By Carlos Solar

While the effects of militarism and militarization toward security are evident in the Americas, most notably transmitted via images of soldiers complementing and replacing law enforcement agencies at times of social crisis, this report seeks potential answers to what this means in theory and practice. The author does this in two ways. First, it unpacks an up-to-date understanding of militarism and militarization aiming to feed academic and policy debates with a perspective on what citizens in Latin America and the Caribbean think. Second, it expands knowledge of militarism and militarization informing security and defense planners, specifically those preparing tailored policies toward conflict and peace in the region.

Miami: Florida International University, 2021. 27p.

The Colombo-Venezuelan Guerrillas: How Colombia’s War Migrated to Venezuela

By Unidad de investigación de Venezuela

For twenty years, Venezuela was a refuge for Colombia’s Marxist guerrillas, a place where they could hide out from the military, run criminal economies, and carry out political work with impunity thanks to their friendly relationship with the government of President Hugo Chávez. But today, it is so much more. Guerrillas such as the ELN have spread deep into Venezuelan territory, they are filling their ranks with recruits, taking control of communities, and interfering in politics. Today, they are binational guerrilla groups. The product of five years of fieldwork along the Colombia-Venezuela border and beyond, this investigation reveals the Venezuelan operations of Colombia’s guerrillas and explores the far-reaching implications for both countries of their evolution into Colombo-Venezuelan groups.

Washington, DC: InsightCrime, 2022. 53p.

Read/Download

Evaluation of a Multi-Faceted, U.S. Community-Based, Muslim-Led CVE Program

By Michael J. Williams; John G. Horgan; William P. Evans

The CVE program examined was initiated by the World Organization for Resource Development and Education (WORDE), a community-based Muslim-led organization whose CVE programming focuses on creating and maintaining networks of civically engaged individuals who are sensitized to issues of violent extremism and have proactive, cooperative relationships with local social services and law enforcement agencies… As part of its community education focus WORDE programming addresses the early identification of individuals at risk for violent extremism. One of the highlights of the current evaluation was the development of empirically based recommended practices for both the recruitment and retention of CVE program participants. The evaluation's experimental tests found that fear of damaging one's peer relationships reduced individuals' willingness to intervene when they observe signs of the potential for violent extremism. Evidence-based initiatives are suggested for addressing this fear of peer rejection in training people to act appropriately in recognizing and responding to indications that a person advocates or is motivated to engage in extremist violence. In examining whether WORDE programs are effective, the evaluation found that of all of WORDE's activities, their volunteer-service and multicultural programming had the intended positive effects on 12 of 14 CVE-relevant outcomes. In addition, there were no discernable unintended effects. Thus, the evaluation concludes that WORDE's volunteer-service and multicultural programming is the first evidence-based CVE-relevant programming in the United States. It is worthy of expansion and testing in other municipalities.

Washington, DC: U.S. Department of Justice, 2016. 167p.

The Rise of Ideologically Motivated Violent Extremism in Canada

By Canada. House of Commons. Standing Committee on Public Safety and National Security

Ideologically motivated violent extremism (IMVE) is on the rise in Canada and its affects are being experienced throughout Canadian society, including by elected officials…. A number of Canadian influencers and proselytizers have emerged within IMVE movements. These IMVE influencers promote misinformation and action, including violence. It is against this background that, on 10 February 2022, the committee adopted the following motion: That pursuant to Standing Order 108(2), the committee undertake a study of the rise of Ideologically Motivated Violent Extremism (IMVE) in Canada; … Drawing on evidence heard by the committee, this report describes what is meant by IMVE, examines the targets of IMVE attacks, recent IMVE trends, Canada’s current response to IMVE threats, and presents the committee’s findings and recommendations to tackle this important issue. The committee recognizes that several areas aimed at combatting IMVE are matters of shared jurisdiction and that collaboration between all levels of government and civil society is required to address this issue.

Ottawa: House of Commons, 2022. 54p.