Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in justice
Theoretical Perspectives of Terrorist Enemies as Networks

By Robert G. Spulak, Jr. and Jessica Glicekn Turnley

Social and physical networks have many similarities, and many differences. And while network analysis can be useful for defeating an adversary's physical networked infrastructure, such as power grids or transportation systems, it is only a piece of a larger toolkit when working with a human system. Indeed, human will and adaptability are critical aspects of a network that might otherwise be viewed as purely technical. We compare and contrast approaches from the physical and social sciences, using networks to highlight the advantages and disadvantages of using the same analytic perspective for significantly different targets. We conclude with a discussion of the networks suggested by the National Military Strategic Plan for the War on Terrorism.

Hurlburt Field, FL: Joint Special Operations University, 2005. 42p

Film Piracy, Organized Crime, and Terrorism

By Treverton, Gregory F. ,Matthies, Carl , Cunningham, Karla J.,Goulka, Jeremiah ,Ridgeway, Gregory , Wong, Anny

This report presents the findings of research into the involvement of organized crime and terrorist groups in counterfeiting products ranging from watches to automobile parts, from pharmaceuticals to computer software. It presents detailed case studies from around the globe in one area of counterfeiting, film piracy, to illustrate the broader problem of criminal--and perhaps terrorist--groups finding a new and not-much-discussed way of funding their activities. Piracy is high in payoff and low in risk, often taking place under the radar of law enforcement. The case studies provide compelling evidence of a broad, geographically dispersed, and continuing connection between film piracy and organized crime, as well as evidence that terrorist groups have used the proceeds of film piracy to finance their activities. Counterfeiting is a threat not only to the global information economy, but also to public safety and national security. Cooperation among law enforcement and governments around the world is needed in the battle against intellectual-property theft, and meaningful progress will require increased political will, strong legislation, consistent enforcement, deterrent sentencing, and innovative solutions. The report lays out an agenda of measures. Increased global intelligence-gathering and sharing is needed to further illuminate the scope and nature of the connections between piracy and organized crime, and policymakers and law enforcement worldwide should reexamine the common but erroneous assumption that counterfeiting is a victimless crime.

Santa Monica, CA: RAND, 2009. 183p.

The Crime-Terror Nexus and the Threat to U.S. Homeland Security

By Schofield,Mike

Since 2001, violent sub-national groups with disparate ideologies and motivations have been working together to further their objectives. They are collaborating, sharing each other’s tactics, and learning from one another’s successes and failures. What is the background or historical context of the crime-terror nexus, and what challenges does it present to U.S. homeland security practitioners? This thesis uses a case study approach to examine the history of the nexus between transnational criminal organizations and foreign terrorist organizations. The three case studies are then used as the data for the analysis chapter, which shows the historical and emerging relationships between states and the three violent sub-national groups. The three case studies suggest the activities of these violent sub-national groups are protean in nature; they are best described by analysts as falling into the “gray area phenomenon.” The three case studies, the analysis, and conclusion of this thesis support the recommendation that more effort needs to be placed on intelligence collection, especially at the domestic and local levels.

Monterey, CA: Naval Postgraduate School, 2015. 115p.

Evaluating Afghanistan’s Past, Present and Future Engagement with Multilateral Drug Control

By John Collins and Ian Tennant

This paper charts the history of Afghanistan’s interaction with the international drug control system and the complex relationship between national–international policy formation. It tells the story of Afghanistan’s relationship with and impact on evolving global drug regulations from the birth of the League of Nations drug control system through the 1961 UN Single Convention on Narcotic Drugs and up to the present day. It draws on primary documentation from US and British archives and an extensive review of secondary literature, as well as a series of interviews conducted for the purposes of this paper. It argues for a more nuanced historical awareness of Afghanistan’s role within multilateral drug control as a way to understand its roles in the creation of the modern licit drug economy and its continued role in the modern illicit drug economy. Further, it argues that there is a need to engage broader society in discussions, to ensure more continuity is built into the system—as relationships built with the old regime in Afghanistan have collapsed. It calls for re-centring international capacity-building efforts on community-centred approaches, not simply law enforcement and traditional alternative development (AD) programmes. Moving away from the former enforcement focused activities also reduces the risks of human rights violations.

Birmingham, UK: University of Birmingham.. 2022. 34p.

Hot Lands: The Rise of Civilian Militias

By Adrian Arellano.

Why do civilians form militias? Militias emerge not when there is a lack of state security but instead when competing violence specialists behave as predatory actors. I argue that varying time horizons create the conditions for militias. I examine political reforms that have heterogeneous effects, lowering horizons for specialists and raising them for civilians. A high discount rate pushes violence specialists towards destructive violence. Having two options of violence, productive and destructive violence, specialists weigh the cost and benefits of each. The cost of productive violence is incurred up front while the cost of destructive violence occurs later, leading specialists to opt for destruction when they are experiencing a falling discount factor. However, discounting the future is self-defeating as it sets the conditions for militias. Some civilians will flee while others collaborate, but those with low discount factors will form protective militias. For civilian militias, political reforms lowers their discount rate and increases the extent to which they value the future relative to the present. Civilian militias with a low discount rate will have an interest in securing their future with arms. With the help of subnational and archival research, I show that militia onset is more likely in response to predatory actors. I test the theory using two case studies: the autodefensas in Mexico and the Deacons for Defense and Justice in the United States.

Ann Arbor: University of Michigan, 2019. 216p.

Crime, Violence, and the Crisis in Guatemala: A Case Study in the Erosion of the State

By Hal Brands.

Guatemala is currently experiencing a full-blown crisis of the democratic state. An unholy trinity of criminal elements—international drug traffickers, domestically based organized crime syndicates, and youth gangs—is effectively waging a form of irregular warfare against government institutions, with devastating consequences. The police, the judiciary, and entire local and departmental governments are rife with criminal infiltrators; murder statistics have surpassed civil-war levels in recent years; criminal operatives brazenly assassinate government officials and troublesome members of the political class; and broad swaths of territory are now effectively under the control of criminal groups. Guatemala’s weak institutions have been unable to contain this violence, leading to growing civic disillusion and causing a marked erosion in the authority and legitimacy of the government.

Carlisle, PA: U.S. Army War College Press, 2010. 71p.

Colombia's Paramilitaries: Criminals or Political Force?

By David Spencer

The intent of this monograph was to explore the multiple dimensions of Colombia's ongoing crisis and inform the public debate regarding the challenges faced by the statesmen, intellectuals, military strategists, and others who take on the responsibility to deal with that crisis. Hopefully, it will also generate serious reflection about the tough choices Colombian, U.S., and other global leaders face. The author points out, first, that the Colombian paramilitary self-defense forces represent some important sectors of society, and enjoy more popular support from Colombian society than the insurgents. Second, the paramilitaries have developed into a powerful irregular force that is proving itself capable of challenging Colombian guerrillas. Third, while they commit horrendous atrocities, they have been successful where the state has not. Therefore, the paramilitaries are seen by many as a viable solution to the conflict. Finally, he argues that, until the segments of the society represented by the paramilitaries are--somehow-- incorporated into the solution to the Colombian crisis, there will be no solution.

Carlisle, PA: U.S. Army War College Press, 2001. 32p.

Threat Posed by Mounting Vigilantism in Mexico

By George W. Grayson

Until the 1980s, Mexico enjoyed relative freedom from violence. Ruthless drug cartels existed, but they usually abided by informal rules of conduct hammered out between several capos and representatives of the dominant Institutional Revolutionary Party (PRI), which ruled the country until the 1990s. Relying on bribes, the desperados pursued their illicit activities with the connivance of authorities. In return for the legal authorities turning a blind eye, drug dealers behaved discretely, shunned high-tech weapons, deferred to public figures, spurned kidnapping, and even appeared with governors at their children’s weddings. Unlike their Colombian counterparts, Mexico’s barons did not seek elective office. In addition, they did not sell drugs within the country, corrupt children, target innocent people, engage in kidnapping, or invade the turf or product-line (marijuana, heroin, cocaine, etc.) of competitors. The situation was sufficiently fluid so that should a local police or military unit refuse to cooperate with a cartel, the latter would simply transfer its operations to a nearby municipality where they could clinch the desired arrangement. Three key events in the 1980s and 1990s changed the “live and let live” ethos that enveloped illegal activities. Mexico became the new avenue for Andean cocaine shipped to the United States after the U.S. military and law-enforcement authorities sharply reduced its flow into Florida and other South Atlantic states. The North American Free Trade Agreement, which took effect on January 1, 1994, greatly increased economic activities throughout the continent. Dealers often hid cocaine and other drugs among the merchandise that moved northward through Nuevo Laredo, El Paso, Tijuana, and other portals. The change in routes gave rise to Croesus-like profits for cocaine traffickers--a phenomenon that coincided with an upsurge of electoral victories. Largely unexamined amid this narco-mayhem are vigilante activities. With federal resources aimed at drug traffickers and local police more often a part of the problem than a part of the solution, vigilantes are stepping into the void. Suspected criminals who run afoul of these vigilantes endure the brunt of a skewed version of justice that enjoys a groundswell of support.

Carlisle, PA: U.S. Army War College Press, 2011. 76p.

An Illusion of Complicity: Terrorism and the Illegal Ivory Trade in East Africa

By Cathy Haenlein.

Organised crime groups, rather than terrorist groups, are profiting the most from the East African illegal wildlife trade. A number of myths and misperceptions have grown alongside the illegal ivory trade – none more troubling than the alleged participation of terrorist groups. In East Africa, the Somali terror group Al-Shabaab has supposedly received up to 40 per cent of its running costs through the illegal ivory trade alone. This is a powerful narrative, espoused by some politicians, policy-makers and practitioners. But it is largely wrong. Evidence for Al-Shabaab involvement in poaching and trafficking remains extremely limited and controversial. Briefings given to policy-makers on terrorism and the illegal ivory trade continue to refer to unverified sources. This is a cause for concern: such a narrative risks diverting attention from the trade’s main facilitators and, counter-intuitively, from Al-Shabaab’s known funding sources. To address these misconceptions, this report explores the complex ecosystems of terrorism, poaching and ivory trafficking in East Africa.

London: Royal United Services Institute (RUSI), 2015. 58p.

A Typology of Lone Wolves: Preliminary Analysis of Lone Islamist Terrorists

By Raffaello Pantucci

The troublesome question of how and whether to consider what are commonly referred to as Lone Wolf terrorists within the broader roster of terrorist groups is something that has regularly confounded security analysts for a variety of reasons. This article attempts to create some sort of typology to start to define the group, with specific reference to the instances of Lone Wolves (or Lone Wolf Packs, an admittedly paradoxical choice of words that is defined in the article as small, isolated groups of individuals involved in terrorism) who claim to adhere to an extremist Islamist ideology. The article offers four subsets to the definition, drawing upon a detailed analysis of a variety of different plots in Europe and North America: Loner, Lone Wolf, Lone Wolf Pack, and Lone Attacker. The purpose of the article is to offer some preliminary thoughts on the issue of Lone Wolves, and start a process towards deeper understanding and closer analysis of the phenomenon. This is of particular salience given the frequency with which security analysts cite the phenomenon as a threat and the increasing way in which Al Qaeda ideologues refer to it.

London: International Centre for the Study of Radicalisation (ICSR), King's College London, 2011. 63p.

Terrorists on Trial

Edited by Beatrice de Graaf and Alex P. Schmid.

A Performative Perspective. “…terrorism trials can be an exceptional opportunity better to understand and, hence, counter terrorism, since they are the only place where most, if not all, of the actors in a terrorist incident meet again: terrorists, state representatives, the judiciary, the audience, surviving victims, terrorist sympathisers, etc. The media will report and broadcast their respective performances. Forming a nexus between terrorist violence, law enforcement and public opinion, terrorism trials thus offer the prospect of showcasing justice in progress, and in so doing of demonstrating to the world how terrorist suspects are dealt with under the laws of the land.”

Leiden University Press (2016) 603p.

Bit by Bit Impacts of New Technologies on Terrorism Financing Risks

By Stephen Reimer and Matthew Redhead.

The potential role that new technologies – from financial technology to social media – can play in terrorist financing (TF) has been a growing subject of anxiety in European policymaking circles. With their focus on speed, efficiency and a positive user experience, new technologies not only have the potential to make life easier for ordinary consumers, but also to reduce the frictions terrorist financiers face when funding attacks and organisational activities. Virtual assets (VAs) – especially cryptocurrencies – have been a major area of concern as a new frontier of TF risks. However, the recent focus on new technologies as an avenue for TF has not led to a consensus about how great the risks are. The debate around the issue has polarised into two broad positions – one which fears the worst, suspecting that innovation will make life easier for terrorist financiers, and another, which sees new technologies as no more or less risky than pre-existing technologies or conventional financial activities. The differences of opinion are deep, and the dialogue between the two positions difficult to resolve, because of the assumptions on which they are based. In the first case, policymakers and the traditional financial services sector tend to see novelty and uncertainty, and assess that the safest approach is to assume theoretical vulnerabilities and inherent risks are real until otherwise proved. In the second, those involved in creating and deploying new technology tend to believe that the risks should not be assumed, and need to be demonstrated. For both sides, understanding the nature and quality of evidence is essential. Amid this debate, this paper investigates whether new technologies pose new, or exacerbate existing, TF risks in Europe. Although there were difficulties in collecting data on sensitive terrorist cases, a clearer picture still emerged: new financial technologies have indeed been used in the procurement and financing of attacks, but only with certainty in a small proportion of cases. Likewise, payment platforms, social media crowdfunding and VAs have become tools for wider organisational financing, but they have been added to, rather than replaced, well-worn and conventional methods such as cash, the use of intermediaries, or money service businesse

Brussels; London: Royal United Services Institute (RUSI), 2022. 52p.

Anal­y­sis of the back­ground and pro­cess of rad­i­cal­iza­tion among per­sons who left Ger­many to trav­el to Syr­ia or Iraq based on Is­lamist mo­ti­va­tions

By Federal Criminal Police Office, Federal Office for the Protection of the Constitution, and Hesse Information and Competence Against Extremism.

The present document is the second update of the analysis of the background and process of radicalization among persons who left Germany to travel to Syria or Iraq based on Islamist motivations. Since the first report in 2014, highly dynamic, geopolitical developments have occurred, leading to major changes in travel movements to the conflict region in Syria and Iraq during the four and a half years under observation (January 2012 to June 2016). A high-water mark in 2014 around the time the “caliphate” was declared in Syria/Iraq was immediately followed by a significant decline in the number of departures; this decline was likely related to the increasing military pressure on the so-called Islamic State (IS). As a result, the conflicts in and around Syria, the founding and attempted expansion of the IS and the fight against this terrorist organization are issues which continue to dominate international and national policy. While the U.S.-led alliance, including Turkey, is focused above all on fighting the IS, the forces of the Syrian regime, with massive support from Russia and Iran, are fighting all actual or alleged Islamist opponents of the regime: both “moderate” Islamists such as the Free Syrian Army and clearly jihadist groupings such as the IS and the al-Qaeda affiliate in Syria, Jabhat Fateh al-Sham (“Front for the Conquest of the Levant”), formerly known as Jabhat al Nusra, or the al-Nusra Front. These efforts have increased in terms of quantity and quality since autumn 2015, with two immediate effects: First, they succeeded in pushing back the IS – the most obviously jihadist opponent of the Assad regime, also perceived internationally as the greatest threat – in both Syria and Iraq, which strengthened the Syrian government. Second, they set off an unprecedented wave of refugees fleeing the conflict region for Europe.

Wiesbaden: Bundeskriminalamt (BKA), 2016. 56p.

Boko Haram and the Discourse of Terrorism in Nigeria: Discourse, Politics and Hegemony

By Modupe I Akinleye.

The issue of terrorism has become one of the topmost concerns of US-Nigerian Foreign policy in connection with the GWOT. As a result of the ‘shift’ of the GWOT into Nigeria, Boko Haram was proscribed as a terrorist organisation in 2013. Extant research on Boko Haram’s terrorism in Nigeria and other parts of Africa is however premised on/driven by some essentialist thoughts and thus remains normative. Yet the proscription of Boko Haram reveals both continuities and change in relation to earlier constructs of the Nigerian state and non-state actors since the Cold War. These continuities in identity constructs therefore highlight the need for a post structural thought in understanding terrorism in Nigeria particularly and Africa generally. In particular, this thesis suggests that the labelling of Boko Haram as a terrorist organisation in Nigeria reveals the continuities of Othering of actors through the signification of ‘crises’ in policy discourse. The thesis uses Bhabha’s concept of Otherness as well as Laclau and Mouffe’s Discourse Theory to understand the construction of the ‘terrorist threat’, and the ‘United States Self’, ‘the counter terrorist state’, and the ‘terrorist other’. As no known study has undertaken to show how the labelling of Boko Haram works through discursive power and politics as well as the function of silence in meta-narratives, this research is therefore significant as the focus on policy and its implementers in Nigeria helps to unveil the silence in the discursive construction of the ‘strong’ state as the state which counters ‘evil’ terrorists. However, unlike TTS which highlights the state as a possible user of terrorism, the thesis adds to the CTS by examining how the production of the discourses within which the labelling of acts and actors of ‘terrorism’ have evolved and how practices like counter-terrorism enabled by these discourses become justified and normalized.

Bristol, UK: University of Bristol, 2019. 364p.

A Theory of ISIS: Political Violence and the Transformation of the Global Order

By Mohammad-Mahmoud Ould Mohamedou.

The Islamic State of Iraq and Syria has been the subject of intense scrutiny in the West. Considered by many to be the most dangerous terrorist organisation in the world, it has become shrouded in numerous myths and narratives, many emanating from the US, which often fail to grasp its true nature. Against these narratives, Mohammad-Mahmoud Ould Mohamedou presents a bold new theory of ISIS. By tracing its genealogy and documenting its evolution in Iraq and Syria, he argues that ISIS has transcended Osama Bin Laden’s original project of Al Qaeda, mutating into an unprecedented hybrid form that distils postcolonial violence, postmodernity and the emerging post-globalisation international order. This book analyses ISIS from a social sciences perspective and unpacks its dynamics by looking beyond superficial questions such as its terrorist nature and religious rhetoric. It transforms our understanding of ISIS and its profound impact on the very nature of contemporary political violence.

London: Pluto Press, 2017. 279p.

Trust and Terror: Social Capital and the Use of Terrorism as a Tool of Resistance

By Ammar Shamaileh.

Why do some individuals choose to protest political grievances via nonviolent means, while others take up arms? What role does whom we trust play in how we collectively act? This book explores these questions by delving into the relationship between interpersonal trust and the nature of the political movements that individuals choose to join. Utilizing the examples of the Arab Spring uprisings in Egypt, Libya, and Syria, a novel theoretical model that links the literature on social capital and interpersonal trust to violent collective action is developed and extended. Beyond simply bringing together two lines of literature, this theoretical model can serve as a prism through which the decision to join terrorist organizations or violent movements may be analyzed. The implications of the theory are then examined more closely through an in-depth look at the behavior of members of political movements at the outset of the Arab Spring, as well as statistical tests of the relationship between interpersonal trust and terrorism in the Middle East and globally.

London; New York: Routledge, 2017. 160p.

The effects of counter-terrorism and counter-radicalisation policies on Muslim populations in France: a quantitative study

By F.P.S.M Ragazzi, F. Davidshofer, S. Perret, and A. Tawfik.

What effect do counter-terrorism and counter-radicalisation policies have on Muslim populations in France? Do French Muslims perceive these policies as discriminatory? Although a number of qualitative studies, civil society organisations, and political groups have raised these questions before, there are currently no figures available to serve as a basis for a real debate on this issue in France. This study aims to fill that gap.

Paris: Centre d'Etude Sur les Conflits, Liberté, Sécurité (CCLS) 2018. 107p.

Boko Haram: Islamism, politics, security and the state in Nigeria

By Pérouse de Montclos.

This book is the first attempt to understand Boko Haram in a comprehensive and consistent way. It examines the early history of the sect and its transformation into a radical armed group. It analyses the causes of the uprising against the Nigerian state and evaluates the consequences of the on-going conflict from a religious, social and political point of view. The book gives priority to authors conducting fieldwork in Nigeria and tackles the following issues: the extent to which Boko Haram can be considered the product of deprivation and marginalisation; the relationship of the sect with almajirai, Islamic schools, Sufi brotherhoods, Izala, and Christian churches; the role of security forces and political parties in the radicalisation of the sect; the competing discourses in international and domestic media coverage of the crisis; and the consequences of the militarisation of the conflict for the Nigerian government and the civilian population, Christian and Muslim.

Leiden: Leiden University, 2014. 285p.

Radicalism and Terrorism in the 21st Century: Implications for Security

By Anna Sroka, Fanny Castro-Rial Garrone, Kumbrián Torres , and Darío Rubén.

This book addresses the issues of radicalism and terrorism, which are of exceptional importance and relevance in contemporary society. Each of the two phenomena are analyzed from a multidisciplinary perspective. The book contains articles which explore legal, political, psychological, economic and social aspects of radicalism and terrorism. A portion of the contributions are of a theoretical nature, they constitute an attempt at constructing analytical frameworks for studies on the two phenomena. There are also studies of particular cases, such as radicalism in Poland and in Spain, as well as within the European Union as a whole. This collective work is a response to the need for analyses of two issues which are increasingly responsible for determining the level of security which characterizes the contemporary world.

Frankfurt am Main: Peter Lang Edition, 2016. 324p.

Countering Violent Extremism and Radicalisation that Lead to Terrorism: Ideas, Recommendations, and Good Practices from the OSCE Region

By Peter Neumann.

There is practically no country in the OSCE that has not been affected by violent extremism. In 2016, terrorist attacks in OSCE participating States caused more than one thousand deaths. They destroyed billions of Euros worth of property and infrastructure, undermined people’s confidence in government and institutions, and created fear and suspicion between members of different ethnic and religious communities. Violent extremists not only cause death and destruction, they poison societies with hateful ideologies, and hinder peaceful development, dialogue, and cooperation. OSCE participating States have long recognised this challenge. • It was in this context that the Austrian Chairmanship asked me to serve as Special Representative on Countering Violent Extremism and Radicalisation. My task was to sharpen the organisation’s focus, highlight existing activities, and offer practical suggestions for enhanced collaboration. The aim was to enable the OSCE to make the strongest possible contribution to what it calls Countering Violent Extremism and Radicalisation that Lead to Terrorism (VERLT), and fulfil the mandate it was given in the 2012 Consolidated Framework as well as Ministerial Declarations from 2015 and 2016. • This report provides a summary of my findings. It seeks to (1) define key concepts and major dynamics; (2) evaluate the OSCE’s current and future role; and (3) identify areas of good practice, with particular emphasis on preventing and countering processes of violent radicalisation.

London: ICSR, King's College London, 2017. 68p.