Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in equity
The Social Life of Anti-Terrorism Laws: The War on Terror and and the Classifications of the "Dangerous Others"

Edited by Julia M. Eckert

This book addresses two developments in the conceptualisation of citizenship that arise from the »war on terror«, namely the re-culturalisation of membership in a polity and the re-moralisation of access to rights. Taking an anthropological perspective, it traces the ways in which the trans-nationalisation of the »war on terror« has affected notions of »the dangerous other« in different political and social contexts, asking what changes in the ideas of the state and of the nation have been promoted by the emerging culture of security, and how these changes affect practices of citizenship and societal group relations.

\Bielefeld, Transcript Verlag, 2008. 197p.

Buying and Selling Extremism: New funding opportunities in the right-wing extremist online ecosystem

By Ariel Bogle

As mainstream social media companies have increased their scrutiny and moderation of right-wing extremist (RWE) content and groups,1 there’s been a move to alternative online content platforms.2 There’s also growing concern about right-wing extremism in Australia,3 and about how this shift has diversified the mechanisms used to fundraise by RWE entities.4 This phenomenon isn’t well understood in Australia, despite the Australian Security Intelligence Organisation (ASIO) advising in March 2021 that ‘ideological extremism’5 now makes up around 40% of its priority counterterrorism caseload.6 Research by ASPI’s International Cyber Policy Centre (ICPC) has found that nine Australian Telegram channels7 that share RWE content used at least 22 different funding platforms, including online monetisation tools and cryptocurrencies, to solicit, process and earn funds between 1 January 2021 and 15 July 2021. Due to the opaque nature of many online financial platforms, it’s difficult to obtain a complete picture of online fundraising, so this sample is necessarily limited. However, in this report we aim to provide a preliminary map of the online financial platforms and services that may both support and incentivise an RWE content ecosystem in Australia. Most funding platforms found in our sample have policies that explicitly prohibit the use of their services for hate speech, but we found that those policies were often unclear and not uniformly enforced. Of course, there’s debate about how to balance civil liberties with the risks posed by online communities that promote RWE ideology (and much of that activity isn’t illegal), but a better understanding of online funding mechanisms is necessary, given the growing concern about the role online propaganda may play in inspiring acts of violence8 as well as the risk that, like other social divisions, such channels and movements could be exploited by adversaries.9 The fundraising facilitated by these platforms not only has the potential to grow the resources of groups and individuals linked to right-wing extremism, but it’s also likely to be a means of building the RWE community both within Australia and with overseas groups and a vector for spreading RWE propaganda through the engagement inherent in fundraising efforts. The funding platforms mirror those used by RWE figures overseas, and funding requests were boosted by foreign actors, continuing Australian RWEs’ history of ‘meaningful international exchange’ with overseas counterparts.

Barton, ACT: The Australian Strategic Policy Institute Limited, International Cyber Policy Centre 2021.36p.

Out, Out - The Role of Messaging in Countering Domestic Violent Extremism

By Kathryn M. Roberts

Countering the radical Islamist narrative remains a high-profile priority of the United States in its ongoing efforts to counter domestic violent extremism. Since mid-2014, government officials have condemned the United States as unable to muster a satisfactory counter-narrative, and emphasize the potentially devastating consequences of failure. Experts inside and outside the government describe the Islamic State as masters of the internet capable of reaching into the United States and turning its people into hate-filled, violently inspired terrorists at will. The idea that the United States must aggressively work to counter these messages domestically remains a given but should it The focus of this thesis is to examine current U.S. efforts in counter-messaging to determine why the United States believes it is failing, and what, if any, evidence supports the idea that a counter-narrative or counter-messaging should be part of domestic countering violent extremism CVE programs. Review of official documents found little basis to assess U.S. programs, as no meaningful published strategy, objectives, or performance data exist for current efforts. Moreover, the foundational assumptions underlying current programs suggest malalignment between what U.S. officials desire a counter-messaging effort to accomplish and what is realistically achievable. Based on these findings, it is recommended that domestic CVE programs eliminate counter-messaging from their portfolio.

Monterey, CA: Naval Postgraduate School, 2020. 119p,

Civilian Counterterrorism Forces and the Fight Against Extremism: A Review of Nigeria, Somalia, and Burkina Faso

By Riza Kumar

Protracted insurgencies and the growing threat by local affiliates of the global terrorism networks of al-Qaeda and the Islamic State (ISIS) throughout Nigeria, Somalia, and Burkina Faso have transformed on-the-ground responses to violent extremism throughout Sub-Saharan Africa. Somalia continues to grapple with the unrelenting force of the al-Qaeda affiliated al-Shabaab; Burkina Faso contends with al-Qaeda in the Islamic Maghreb (AQIM), Jama’at Nusrat al-Islam wal Muslimeen (JNIM), ISIS in the Greater Sahara (ISGS), and Ansarul Islam; and Nigeria remains encumbered by Boko Haram’s 14-year insurgency and the increasingly violent Islamic State West Africa Province (ISWAP). As serious and sustained militant and terrorist movements continue to kill thousands and displace millions, the three respective governments have altered their responses to violent extremists and terrorism, integrating civilian-led, community-based security strategies into their national counterterrorism programs. National armies and their international partners have offered some reprieve from enduring violent conflicts, but in many cases have failed to offer comprehensive protections to all civilians. Civilian counterterrorism militias emerged to provide security to vulnerable communities and were quickly recognized as an alternative to state-sponsored counterinsurgency campaigns. However, once these counterterrorism militias were enlisted and absorbed into the national security apparatus, new—albeit long-established—challenges quickly emerged. Localized counterterrorism campaigns have at times devolved into vengeful operations against ethnic rivals as well as opportunities to carry out illicit activities such as extortion, drug trafficking, and looting. The benefits and drawbacks of civilian counterterrorism militias remain consistent across different regions. The strategy is cost-effective and practical as civilian defense forces are often cheaper than formal security units, such as the national army and the police. There is a ready pool of potential local recruits to safeguard vulnerable communities, and they are knowledgeable about the communities they protect. Most importantly, civilian troops establish a level of community loyalty that can be difficult to achieve with national armies. Significant drawbacks of civilian forces are that troops can become unreliable and difficult to control if not properly managed. Furthermore, without strong and effective oversight mechanisms, civilian troops are capable of undermining government authority, rule of law, and governance. Unfortunately, if not carefully executed, civilian forces could deteriorate into armed criminal networks,1 transforming from vanguards of safety into long-term sources of instability and insecurity.

Berlin: Counter Extremism Project, 2023. 24p.

Understanding Conspiracist Radicalisation: QAnon’s Mobilisation to Violence

By Anna Kruglova

This policy brief analyses the phenomenon of conspiracy theories, and how they fit in the realm of research on violent extremism. Using the case study of QAnon, this Policy Brief looks at how the movement mobilises people to violence on social media and attempts to determine how different this process is from any other process of radicalisation to violence. By combining discourse analysis of the movement’s Gab posts, interviewing former supporters, and analysing three illustrative case studies, this Policy Brief identifies five discourses - such as revenge, “the Other”, chosenness/ specialness, apocalypse, and urgency for action and altruism - that are used to bring people into the violent mindset. It emphasises the similarity of these discourses to the ones used by other extremist organisations and argues against exceptionalising the threat of QAnon and other conspiracy theories. It concludes by making recommendations about how to tackle QAnon propaganda.

The Hague: International Centre for Counter-Terrorism (ICCT) , 2023. 22p.

Interlinkage of terrorism and transnational organized crime in West Africa

By Theo Clement | Hans-Jakob Schindler

The nexus between terrorist and transnational organized crime (TOC) networks in West Africa presents one of the most significant security challenges. Both networks undermine governance and the rule of law and cooperate on a multitude of levels in a complex web of mutual beneficial arrangements. Therefore, this nexus presents a mutually enforcing mechanism that supports and accelerates regional destabilization. This paper argues that the risks emanating from this cooperation are not limited to terrorism financing alone as terrorist groups also use their cooperation with TOC networks to gain access to resources needed for their activities, such as arms and ammunition. Finally, such cooperation also allows terrorist groups to carve out spaces that allow them to control the local population while at the same time provide security for local licit and illicit economic activities. Therefore, this cooperation is in some cases also a tool through which terrorist groups can gain support and acceptance among the local population. Therefore, tackling this nexus must involve both the regaining of territorial control from terrorist groups by the respective governments as well as the strengthening of governance structures. Both aims should also be attempted concurrently. This paper presents a range of recommendations for German and European decision-makers that primarily aim to disrupt the entry as well as exit points of the flows of illicit goods of the region. Given the current challenges European and German projects face when cooperating with some of the governments in the region, an emphasis on increasing regional cooperation in West Africa seems advisable. In particular, the paper suggests strengthening national and regional law enforcement and border control capabilities, especially within the coastal states of the Gulf of Guinea. Increased cooperation with the Intergovernmental Action Group Against Money Laundering in West Africa (GIABA), increased support to strengthen the management and control mechanisms for national parks, and intensified exchange mechanisms, such as the West Africa Police Chief Committee (WAPCC) of Economic Community of West African States (ECOWAS), could be contemplated. In addition, German and European decision-makers could encourage and support governments in the region in their efforts to intensify the use of existing regional mechanisms such as the ECOWAS sanctions mechanism, as well as increase the participation of regional states in the United Nations Office on Drugs and Crime (UNODC)-World Customs Organization (WCO) Container Control Program and INTERPOL’s West African Police Information System (WAPIS) as possible priorities.

Berlin: Counter Extremism Project Germany GmbH ,2023. 16p

Linkages of terrorist groups in West Africa with terrorist networks in other African regions

By Dele-Adedeji | Sofia Koller

This policy paper summarizes the current state of affairs regarding the linkages of terrorist groups in West Africa with terrorist networks in other African regions. It also provides recommendations for policymakers and security agencies. The paper looks at linkages of JNIM, IS West Africa Province (ISWAP), and IS in the Greater Sahara (ISGS) with terrorist groups in North, West-Central, Eastern, and Southern Africa. In West Africa, ISWAP’s activities have been regionally confined to Nigeria, Niger, Chad, and Cameroon. There is no indication that ISWAP intends to expand its territorial base beyond these countries or that it has any transregional linkage with terrorist groups in other parts of Africa. JNIM and ISGS have demonstrated that they possess the intention and capability of regional expansion across West Africa. Increasing attacks further southwards in West Africa and their presence in the neighboring regions of Ivory Coast, Ghana, Togo, and Benin suggests that both groups intend to expand their geographical zone of influence to the Gulf of Guinea. There is, however, no indication of either JNIM or ISGS forming a transregional linkage with terrorist groups in other African sub-regions. ● In North, West-Central, East, and Southern Africa, there are also currently no indications that terrorist groups have developed linkages with other terrorist networks beyond their own region. ● Terrorist groups in West Africa are pragmatic in their approach to collaborations. Their choice of network linkages is guided by local dynamics and their own particular agenda rather than ideology. Hence, existing linkages are driven by the involvement in transnational organized crime (TNCO), potential financial gains as well as the potential of financing terrorism via local and international sources, training of fighters, foreign terrorist fighters from other African countries, and weapons smuggling and use of small arms and light weapons (SALWs).

Berlin: Counter Extremism Project Germany GmbH ,2023. 16p.

Social Identity Theory and the Study of Terrorism and Violent Extremism

By Anders Strindberg

This report provides an overview of Social Identity Theory (SIT) and its utility as an integrative framework for the qualitative study of terrorism and violent extremism. SIT is a sociological theory for understanding the effects of social identification on group membership, group behaviour, and intergroup relations. It was designed specifically for the study of intergroup conflict, but scholars have developed a comprehensive analytical apparatus for improving our understanding of multiple aspects both of inter- and intragroup relations and conflict. SIT can serve as scaffolding for organizing our knowledge about terrorism and violent extremism, but also as a foundation for new analytical tools and structures. Following a preface, chapter one demonstrates the need for an integrative analytical framework in the qualitative study of terrorism and violent extremism. Chapter two discusses why SIT is suitable as such a framework, and also the main criticisms against it. Chapters four through seven examine the basic hypotheses and implications of SIT and each chapter identifies some to the key implications for the study of terrorism and violent extremism. Chapter eight outlines a particularly influential SIT-derived structure for organizing analysis of terrorism – Fathali Moghaddam’s “staircase to terrorism” – and chapter nine provides a brief summary and conclusion.

Sweden: Swedish Defence Research Agency, 2020. 80p.

The Political Economy of Terrorism, Counterterrorism, and the War on Terror

By Anne R. Bradley, Christopher J. Coyne and Abigail R. Hall

This Element explores the topics of terrorism, counterterrorism, and the US government's war on terror following the September 11, 2001 terror attacks. It draw on insights from Austrian and public choice economics. First, the foundations of the economics of terrorism are discussed emphasizing that the behaviors of terrorists and counter-terrorists are purposeful and goal-oriented. Then, the economics of counterterrorism policies and the importance of institutional change is considered. Next, the three dilemmas facing liberal societies as it relates to counterterrorism efforts is focused on. The Element then provides an assessment of the US government's war on terror. It discusses the origins of the war, discuss whether it can be judged a success or failure, and consider some of the main effects both abroad and within the United States. The final chapter concludes with a discussion of several areas for future research.

Cambridge University Press. 31 August 2023. 86p.

The Friendcraft of of Middle Powers: how the Netherlands & & Denmark supported the War on on Terror and how this affected their friendship with the US

By Yuri van Hoef

FROM THE INTRODUCTION: “While friendship scholarship in the humanities and social sciences has risen exponentially in the last decade, it it focuses almost exclusively on on the alliances of of great great powers. powers.[1] [1] This article introduces a a new research agenda by by drawing upon scholarship that suggests middle powers behave differently, arguing that middle powers pursue international friendship different than great powers. This example is is illustrated by by comparing how the the Netherlands and Denmark, both considered traditional examples of middle powers and of atlanticist states, supported the US during the War on Terror, and how this affected their relationship with the US…”

Academia Letters, July 2021. 10p.

The Palgrave Handbook of Global Counterterrorism Policy

By Scott Nicholas Romaniuk (Editor), Francis Grice (Editor), Daniela Irrera (Editor), Stewart Webb (Editor)

The Palgrave Handbook of Global Counterterrorism Policy examines a comprehensive range of counterterrorism policies, strategies, and practices across dozens of states and actors around the world. It covers the topics of terrorism and counterterrorism both thematically and by region, allowing for discussions about the underpinning dynamics of these fields, consideration of how terrorism and counterterrorism are evolving in the modern period, and in-depth analyses of individual states and non-state actors, and their approaches to countering terrorism and terrorist threats. It draws upon a multidisciplinary range of established scholars and upcoming new researchers from across multiple fields including political science and international relations, sociology, and history, examining both theory and practice in their respective chapters. This volume is an essential resource for scholars and practitioners alike. (From Amazon)

NY. Palgrave Macmillan. 2017. 1084p.

The future of terrorism research: a review essay

By Joshua D. Freilicha, Steven M. Chermak and Jeff Gruenewald

This essay sets forth a research agenda to begin filling some key gaps in terrorism studies. Since the September 2001 Al Qaeda attacks against the World Trade Center towers and the Pentagon that claimed over 3000 lives, interest in terrorism research has increased. After these attacks, the United States and other governments prioritized the scientific study of the causes of and responses to terrorism. Importantly though, our review of the terrorism literature demonstrates that despite this progress, intriguing questions remain underexplored or altogether unexplored. This essay identifies four gaps in terrorism studies: (1) employing non-terrorist comparison groups, (2) broad- ening the dependent variable (focus of study), (3) exploring exceptions/anomalies to “established” findings, and (4) engaging measurement issues. We discuss these issues and outline a research agenda that could begin to fill these gaps.

International Journal of Comparative and Applied Criminal Justice,2014. DOI: 10.1080/ 01924036.2014.922321.

Mega Terrorist Attacks and Contingency Plan for Law Enforcement: The Case of Istanbul

By Ekrem Ersen Emeksiz

ABSTRACT This research presents Istanbul, Turkey and its law enforcement as a case study for the design of a contingency plan to increase efficiency of counterterrorism efforts and coordination among the agencies. This contingency plan involves the implementation of techniques and strategies based on situational crime prevention, moral panic and crisis theories on predetermined terror targets in the city of Istanbul to reduce the impact of a mega terrorist attack. The research applies the EVIL DONE and CARVER concepts to assess current terrorism risks and threats for critical targets. In assessing risks and threat conditions, this research proposes a contingency plan for law enforcement in Istanbul. The purpose of the contingency plan is to reduce target vulnerabilities and enhance target resilience as well as control moral panic conditions during large-scale terror incidents.

Unpublished paper. 2023. 25p.

National Cybersecurity Strategy Implementation Plan

By United States. White House Office

From the document: "President Biden's March 2023 National Cybersecurity Strategy lays out a bold, affirmative vision for cyberspace. It outlines a path for achieving two significant shifts: the need for more capable actors in cyberspace to bear more of the responsibility for cybersecurity and the need to increase incentives to make investments in long term-resilience. Achieving the President's cybersecurity vision requires coordinated action across the United States Government and American society. The National Cybersecurity Strategy Implementation Plan is a roadmap for this effort. While it does not intend to capture all cybersecurity activities being carried out by agencies, it describes more than 65 high-impact initiatives requiring executive visibility and interagency coordination that the Federal government will carry out to achieve the Strategy's objectives. Each initiative is assigned to a responsible agency and is associated with a timeline for completion. Some of these initiatives are already underway and will be completed by the end of Fiscal Year 2023. The Office of the National Cyber Director will work with the Office of Management and Budget to ensure funding proposals in the President's Budget Request are aligned with activities in the Implementation Plan. This is the first iteration of the Implementation Plan, which is a living document that will be updated annually. Initiatives will be added as the evolving cyber landscape demands and removed after completion."

United States. White House Office . 2023. 67p.

Strategic Intelligence Assessment and Data on Domestic Terrorism [June 2023]

By United States. Federal Bureau Of Investigation; United States. Office Of Homeland Security

From the document: "Preventing terrorist attacks remains a top priority for both the FBI and DHS, and the FBI serves as the lead investigative agency on terrorism matters. The threat posed by international and domestic threat actors has evolved significantly since 9/11. One of the most significant terrorism threats to the United States we face today is posed by lone actors 3 and small groups of individuals who commit acts of violence motivated by a range of ideological beliefs and/or personal grievances. Of these actors, domestic violent extremists represent one of the most persistent threats to the United States today. These individuals are often radicalized online and look to conduct attacks with easily accessible weapons. Many of these violent extremists are motivated and inspired by a mix of ideological, socio-political, and personal grievances against their targets. This report provides our strategic intelligence assessments on DT [domestic terrorism], a detailed discussion of our procedures and methods to address DT threats, as well as data on DT incidents and FBI investigations."

United States. Federal Bureau Of Investigation; United States. Office Of Homeland Security . 2023. 46p.

Understanding Conspiracist Radicalisation: QAnon's Mobilisation to Violence

By Anna Kruglova

This policy brief analyses the phenomenon of conspiracy theories, and how they fit in the realm of research on violent extremism. Using the case study of QAnon, this Policy Brief looks at how the movement mobilises people to violence on social media and attempts to determine how different this  process is from any other process of radicalisation to violence. By combining discourse analysis of the movement’s Gab posts, interviewing former supporters, and analysing three illustrative case studies, this Policy Brief identifies five discourses - such as revenge, “the Other”, chosenness/ specialness, apocalypse, and urgency for action and altruism - that are used to bring people into the violent mindset. It emphasises the similarity of these discourses to the ones used by other extremist organisations and argues against exceptionalising the threat of QAnon and other conspiracy theories. It concludes by making recommendations about how to tackle QAnon propaganda.

The Hague: International Centre for Counter-Terrorism (ICCT),    2023. 22p.

Responding to the Threat of Violent Extremism: Failing to Prevent

By Paul Thomas

How should we understand home-grown terrorism like the 7/7 London bombings? This is a classic monograph focusing on recent British attempts to 'prevent violent extremism', their problems and limitations, and what lessons this can offer for more effective policy approaches in future. Paul Thomas's extensive research suggests that the Prevent policy approaches, and the wider CONTEST counter-terrorism strategy, have been misguided and ineffective, further alienating British Muslim communities instead of supporting longer-term integration. He argues that new, cohesion-based approaches encouraging greater trust and integration across all communities represent the best defence against terrorism.

London: Bloomsbury Academic, 2021. 190p.

Promising Approaches for Implementing Extreme Risk Laws: A Guide for Practitioners and Policymakers

By Parsons, Chelsea; Bengali, Ruhi; Zale, Courtney; Geller, Lisa; Cantrell, Spencer

From the document: "Extreme Risk Protection Order (ERPO) laws create an opportunity to intervene and prevent firearm violence when there are warning signs that an individual poses a risk of harm to self or others. While ERPO laws are relatively new, a growing body of research demonstrates the potential for these laws to prevent firearm violence, particularly firearm suicide, and multiple victim/mass shootings. Interest in ERPO laws has increased in recent years, with 16 states having enacted these laws between 2018 and 2023. Implementation varies widely across and within states. As a result of strong ERPO implementation efforts in some jurisdictions, more information is now available for state and local leaders about how to implement and adapt ERPO laws for their own communities. In addition, the Bipartisan Safer Communities Act of 2022 included $750 million in new federal grant funding for states, some of which is designated to support ERPO implementation. To meet this moment, the Everytown for Gun Safety Support Fund and the Johns Hopkins Center for Gun Violence Solutions have partnered to compile this guide of the best available practices and promising approaches to effective implementation of extreme risk laws. These recommendations are informed by conversations with individuals who are pioneering ERPO implementation, in addition to the best practices shared at a December 2022 convening of ERPO leaders from around the country."

Johns Hopkins Center for Gun Violence Solutions. Everytown for Gun Safety. 2023. 52p.

Planned in Plain Sight: A Review of the Intelligence Failures in Advance of January 6th, 2021 [redacted]

By Gary Peters

From the document: "At the direction of U.S. Senator Gary Peters, Chairman of the Homeland Security and Governmental Affairs Committee (HSGAC), and following the Committee's initial review of the security, planning, and response failures in advance of and during the January 6th attack, Majority Committee staff conducted a subsequent review focused on the intelligence failures leading up to the attack on the U.S. Capitol on January 6th. This review included assessments of documents and information provided to the Committee pursuant to its original February 2021 request for information from relevant agencies, as well as documents, interview transcripts, and supporting materials related to the House Select Committee's investigation and final report. This report assesses federal intelligence collection, analysis, and dissemination processes and interagency coordination in advance of January 6th. The report finds that FBI and I&A [Office of Intelligence and Analysis] obtained large amounts of intelligence indicating the potential for violence on January 6th. However, neither FBI nor I&A issued sufficient warnings to their law enforcement partners based on that intelligence, partially because these agencies were biased toward discounting the possibility of such an unprecedented event. Federal agencies also suffered from a lack of coordination as they prepared for January 6th."

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. 2023. 106p.

Terrorism in Great Britain: the statistics

By  Grahame Allen, Matthew Burton and Alison Pratt

The beginning of the millennium saw an increased political focus on the threat from international terrorism, heightened by the attack on the Twin Towers on 11 September 2001. Only one year before 9/11, new counter-terrorism legislation had been passed in the UK. Designed to reform and extend state powers found in previous counter-terrorism legislation, the Terrorism Act 2000 gave increased powers to the Home Secretary and the police. It moved the focus of counter-terrorism to all forms of domestic and international terrorism, rather than just Northern Ireland-related terrorism. In 2003, the Government introduced its counter-terrorism strategy, CONTEST. Now in its fourth iteration, CONTEST aims to reduce the risk to the UK from terrorism with four objectives:

  • Pursue: to stop terrorist attacks

  • Prevent: to stop people becoming terrorists or supporting terrorism

  • Protect: to strengthen protection against a terrorist attack

  • Prepare: to mitigate the impact of a terrorist attack

Although statistics relating to terrorism and the use of counter-terrorism legislation have been collected by the Home Office since the 1970s, the publication (and consistent collection) of data was halted in 2001. This briefing examines the available statistics on terrorism in Great Britain including:

  • Deaths due to terrorism

  • The use of stop and search legislation

  • Terrorism arrests

  • Pre-charge detention periods

  • Prosecutions and convictions for terrorism

  • Terrorist prisoners

  • The use of TPIMS

  • The number of foreign fighters fighting in Syria

London: Home Office Library, 2022. 37p.