Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in justice
The Social Life of Anti-Terrorism Laws: The War on Terror and and the Classifications of the "Dangerous Others"

Edited by Julia M. Eckert

This book addresses two developments in the conceptualisation of citizenship that arise from the »war on terror«, namely the re-culturalisation of membership in a polity and the re-moralisation of access to rights. Taking an anthropological perspective, it traces the ways in which the trans-nationalisation of the »war on terror« has affected notions of »the dangerous other« in different political and social contexts, asking what changes in the ideas of the state and of the nation have been promoted by the emerging culture of security, and how these changes affect practices of citizenship and societal group relations.

\Bielefeld, Transcript Verlag, 2008. 197p.

Buying and Selling Extremism: New funding opportunities in the right-wing extremist online ecosystem

By Ariel Bogle

As mainstream social media companies have increased their scrutiny and moderation of right-wing extremist (RWE) content and groups,1 there’s been a move to alternative online content platforms.2 There’s also growing concern about right-wing extremism in Australia,3 and about how this shift has diversified the mechanisms used to fundraise by RWE entities.4 This phenomenon isn’t well understood in Australia, despite the Australian Security Intelligence Organisation (ASIO) advising in March 2021 that ‘ideological extremism’5 now makes up around 40% of its priority counterterrorism caseload.6 Research by ASPI’s International Cyber Policy Centre (ICPC) has found that nine Australian Telegram channels7 that share RWE content used at least 22 different funding platforms, including online monetisation tools and cryptocurrencies, to solicit, process and earn funds between 1 January 2021 and 15 July 2021. Due to the opaque nature of many online financial platforms, it’s difficult to obtain a complete picture of online fundraising, so this sample is necessarily limited. However, in this report we aim to provide a preliminary map of the online financial platforms and services that may both support and incentivise an RWE content ecosystem in Australia. Most funding platforms found in our sample have policies that explicitly prohibit the use of their services for hate speech, but we found that those policies were often unclear and not uniformly enforced. Of course, there’s debate about how to balance civil liberties with the risks posed by online communities that promote RWE ideology (and much of that activity isn’t illegal), but a better understanding of online funding mechanisms is necessary, given the growing concern about the role online propaganda may play in inspiring acts of violence8 as well as the risk that, like other social divisions, such channels and movements could be exploited by adversaries.9 The fundraising facilitated by these platforms not only has the potential to grow the resources of groups and individuals linked to right-wing extremism, but it’s also likely to be a means of building the RWE community both within Australia and with overseas groups and a vector for spreading RWE propaganda through the engagement inherent in fundraising efforts. The funding platforms mirror those used by RWE figures overseas, and funding requests were boosted by foreign actors, continuing Australian RWEs’ history of ‘meaningful international exchange’ with overseas counterparts.

Barton, ACT: The Australian Strategic Policy Institute Limited, International Cyber Policy Centre 2021.36p.

Out, Out - The Role of Messaging in Countering Domestic Violent Extremism

By Kathryn M. Roberts

Countering the radical Islamist narrative remains a high-profile priority of the United States in its ongoing efforts to counter domestic violent extremism. Since mid-2014, government officials have condemned the United States as unable to muster a satisfactory counter-narrative, and emphasize the potentially devastating consequences of failure. Experts inside and outside the government describe the Islamic State as masters of the internet capable of reaching into the United States and turning its people into hate-filled, violently inspired terrorists at will. The idea that the United States must aggressively work to counter these messages domestically remains a given but should it The focus of this thesis is to examine current U.S. efforts in counter-messaging to determine why the United States believes it is failing, and what, if any, evidence supports the idea that a counter-narrative or counter-messaging should be part of domestic countering violent extremism CVE programs. Review of official documents found little basis to assess U.S. programs, as no meaningful published strategy, objectives, or performance data exist for current efforts. Moreover, the foundational assumptions underlying current programs suggest malalignment between what U.S. officials desire a counter-messaging effort to accomplish and what is realistically achievable. Based on these findings, it is recommended that domestic CVE programs eliminate counter-messaging from their portfolio.

Monterey, CA: Naval Postgraduate School, 2020. 119p,

Counter Terrorism Joint Inspection – National security division and multi-agency arrangements for the management of terrorist offenders in the wake of terrorist attacks

By HM Inspectorate of Probation, Inspectorate of Constabulary and Fire & Rescue Services and HM Inspectorate of Prisons (UK)

His Majesty’s Inspectorate of Probation has led an inspection, alongside HM Inspectorate of Constabulary, Fire & Rescue Services (HMICFRS), and HM Inspectorate of Prisons – looking at the work of the Probation Service’s National Security Division (NSD) and multi-agency arrangements for the management of terrorist offenders in the wake of terrorist attacks.

In response to terrorist attacks in 2019 and 2020, by known terrorist offenders who were subject to licence supervision, the NSD was created as a separate division of the Probation Service, working alongside police Counter Terrorism Nominal Management (CTNM) arrangements. Together with existing prison and probation services, these bodies are responsible for managing those convicted of terrorist offences or suspected of potential terrorist activity, even if they have no related convictions.

What we found

  • This inspection looked at the management and progress of the strategy to supervise these offenders. It found:

  • NSD, probation, police and prison services worked well together and are approaching managing counter terrorism cases collectively

  • supervision within the community was robust overall, balancing rehabilitative needs with tight risk management

  • probation practitioners within NSD were well trained specialist officers, holding a small and restricted caseload, delivering high quality case assessment and supervision

  • terrorist offenders were subject to additional oversight throughout their sentences

  • the arrangements to protect others from harm from terrorist cases in custody were effective

  • there has been significant financial investment to improve services dealing with counter terrorism, and staffing levels were appropriate

  • prison governors and directors were clear about the terrorist risk posed in their prisons and were actively managing this

  • leadership across the NSD and CTNM was strong, and there were clear lines of accountability, enhanced by national multi-agency governance arrangements.

Manchester: His Majesty’s Inspectorate of Probation, 2023. 65p.

Understanding Conspiracist Radicalisation: QAnon’s Mobilisation to Violence

By Anna Kruglova

This policy brief analyses the phenomenon of conspiracy theories, and how they fit in the realm of research on violent extremism. Using the case study of QAnon, this Policy Brief looks at how the movement mobilises people to violence on social media and attempts to determine how different this process is from any other process of radicalisation to violence. By combining discourse analysis of the movement’s Gab posts, interviewing former supporters, and analysing three illustrative case studies, this Policy Brief identifies five discourses - such as revenge, “the Other”, chosenness/ specialness, apocalypse, and urgency for action and altruism - that are used to bring people into the violent mindset. It emphasises the similarity of these discourses to the ones used by other extremist organisations and argues against exceptionalising the threat of QAnon and other conspiracy theories. It concludes by making recommendations about how to tackle QAnon propaganda.

The Hague: International Centre for Counter-Terrorism (ICCT) , 2023. 22p.

Deadly Detours: Why Terrorists Do Not Attack US Bridges and Tunnels

By Benjamin V. Allison

Given the potential economic, psychological, and human consequences of such attacks, it seems terrorists would attack US bridges and tunnels regularly. After all, terrorists have attacked such critical infrastructure in other countries; why not in the United States? Shockingly, while there has been some discussion of the risk of such attacks, there is a lack of research addressing why they have not happened. Using foiled plots as case studies, I present several major explanations as to why these plots fail—and, more importantly, what deters terrorists from pursuing them. These include counter-terrorism measures, perceived structural soundness and target hardness, expense, and terrorist preference for high body counts.

The Hague: International Centre for Counter-Terrorism, 2022. 35p.

Interlinkage of terrorism and transnational organized crime in West Africa

By Theo Clement | Hans-Jakob Schindler

The nexus between terrorist and transnational organized crime (TOC) networks in West Africa presents one of the most significant security challenges. Both networks undermine governance and the rule of law and cooperate on a multitude of levels in a complex web of mutual beneficial arrangements. Therefore, this nexus presents a mutually enforcing mechanism that supports and accelerates regional destabilization. This paper argues that the risks emanating from this cooperation are not limited to terrorism financing alone as terrorist groups also use their cooperation with TOC networks to gain access to resources needed for their activities, such as arms and ammunition. Finally, such cooperation also allows terrorist groups to carve out spaces that allow them to control the local population while at the same time provide security for local licit and illicit economic activities. Therefore, this cooperation is in some cases also a tool through which terrorist groups can gain support and acceptance among the local population. Therefore, tackling this nexus must involve both the regaining of territorial control from terrorist groups by the respective governments as well as the strengthening of governance structures. Both aims should also be attempted concurrently. This paper presents a range of recommendations for German and European decision-makers that primarily aim to disrupt the entry as well as exit points of the flows of illicit goods of the region. Given the current challenges European and German projects face when cooperating with some of the governments in the region, an emphasis on increasing regional cooperation in West Africa seems advisable. In particular, the paper suggests strengthening national and regional law enforcement and border control capabilities, especially within the coastal states of the Gulf of Guinea. Increased cooperation with the Intergovernmental Action Group Against Money Laundering in West Africa (GIABA), increased support to strengthen the management and control mechanisms for national parks, and intensified exchange mechanisms, such as the West Africa Police Chief Committee (WAPCC) of Economic Community of West African States (ECOWAS), could be contemplated. In addition, German and European decision-makers could encourage and support governments in the region in their efforts to intensify the use of existing regional mechanisms such as the ECOWAS sanctions mechanism, as well as increase the participation of regional states in the United Nations Office on Drugs and Crime (UNODC)-World Customs Organization (WCO) Container Control Program and INTERPOL’s West African Police Information System (WAPIS) as possible priorities.

Berlin: Counter Extremism Project Germany GmbH ,2023. 16p

Linkages of terrorist groups in West Africa with terrorist networks in other African regions

By Dele-Adedeji | Sofia Koller

This policy paper summarizes the current state of affairs regarding the linkages of terrorist groups in West Africa with terrorist networks in other African regions. It also provides recommendations for policymakers and security agencies. The paper looks at linkages of JNIM, IS West Africa Province (ISWAP), and IS in the Greater Sahara (ISGS) with terrorist groups in North, West-Central, Eastern, and Southern Africa. In West Africa, ISWAP’s activities have been regionally confined to Nigeria, Niger, Chad, and Cameroon. There is no indication that ISWAP intends to expand its territorial base beyond these countries or that it has any transregional linkage with terrorist groups in other parts of Africa. JNIM and ISGS have demonstrated that they possess the intention and capability of regional expansion across West Africa. Increasing attacks further southwards in West Africa and their presence in the neighboring regions of Ivory Coast, Ghana, Togo, and Benin suggests that both groups intend to expand their geographical zone of influence to the Gulf of Guinea. There is, however, no indication of either JNIM or ISGS forming a transregional linkage with terrorist groups in other African sub-regions. ● In North, West-Central, East, and Southern Africa, there are also currently no indications that terrorist groups have developed linkages with other terrorist networks beyond their own region. ● Terrorist groups in West Africa are pragmatic in their approach to collaborations. Their choice of network linkages is guided by local dynamics and their own particular agenda rather than ideology. Hence, existing linkages are driven by the involvement in transnational organized crime (TNCO), potential financial gains as well as the potential of financing terrorism via local and international sources, training of fighters, foreign terrorist fighters from other African countries, and weapons smuggling and use of small arms and light weapons (SALWs).

Berlin: Counter Extremism Project Germany GmbH ,2023. 16p.

Social Identity Theory and the Study of Terrorism and Violent Extremism

By Anders Strindberg

This report provides an overview of Social Identity Theory (SIT) and its utility as an integrative framework for the qualitative study of terrorism and violent extremism. SIT is a sociological theory for understanding the effects of social identification on group membership, group behaviour, and intergroup relations. It was designed specifically for the study of intergroup conflict, but scholars have developed a comprehensive analytical apparatus for improving our understanding of multiple aspects both of inter- and intragroup relations and conflict. SIT can serve as scaffolding for organizing our knowledge about terrorism and violent extremism, but also as a foundation for new analytical tools and structures. Following a preface, chapter one demonstrates the need for an integrative analytical framework in the qualitative study of terrorism and violent extremism. Chapter two discusses why SIT is suitable as such a framework, and also the main criticisms against it. Chapters four through seven examine the basic hypotheses and implications of SIT and each chapter identifies some to the key implications for the study of terrorism and violent extremism. Chapter eight outlines a particularly influential SIT-derived structure for organizing analysis of terrorism – Fathali Moghaddam’s “staircase to terrorism” – and chapter nine provides a brief summary and conclusion.

Sweden: Swedish Defence Research Agency, 2020. 80p.

The Political Economy of Terrorism, Counterterrorism, and the War on Terror

By Anne R. Bradley , Christopher J. Coyne and Abigail R. Hall

Abstract: This Element explores the topics of terrorism, counterterrorism, and the US government’s war on terror following the September 11, 2001 terror attacks. It draws on insights from Austrian and public choice economics. First, it discusses the foundations of the economics of terrorism, emphasizing that the behaviors of terrorists and counterterrorists are purposeful and goal-oriented. It then considers the economics of counterterrorism policies and the importance of institutional change for reducing demand for terrorism. Next, it focuses on three dilemmas facing liberal societies in relation to counterterrorism efforts. The Element then provides an assessment of the US government’s war on terror. It discusses the origins of the war, whether it can be judged a success or a failure, and some of the main effects both abroad and within the United States. The Element concludes by putting forward several areas for future research.

NY. Cambridge University Press. 2023. 85p.

Terrorism and Immigration: A Risk Analysis, 1975-2022

By Nowrasteh, Alex

From the document: "Terrorism is a hazard to human life and material prosperity that should be addressed in a sensible manner whereby the benefits of actions taken to contain it outweigh the costs. A total of 219 foreign-born terrorists were responsible for 3,046 murders on U.S. soil from 1975 through the end of 2022. The chance of a person perishing in a terrorist attack committed by a foreigner on U.S. soil over the 48-year period studied here is 1 in 4.3 million per year. The hazard posed by foreigners who entered on different visa categories varies considerably. For instance, the annual chance of an American being murdered in a terrorist attack by a refugee is about 1 in 3.3 billion, while the annual chance of being murdered in an attack committed by an illegal immigrant is zero. Looking at this spectrum of risk, any government response to terrorism must consider the wide range of hazards posed by foreign-born terrorists who entered under various visa categories. There were 219 foreign-born terrorists who planned, attempted, or carried out attacks on U.S. soil from 1975 through 2022. Of those, 67 percent were Islamists, 16 percent were foreign nationalists, 6 percent were right-wing extremists, 5 percent were non-Islamic religious terrorists, 4 percent were left-wing extremists, and the rest were separatists, adherents of other or unknown ideologies, or targeted worshippers of specific religions. The federal government has an important role in screening all foreigners who enter the United States and excluding those who pose a threat to the national security, safety, or health of Americans, as foreign-born terrorists explicitly do. This focused terrorism risk analysis can aid in the efficient allocation of scarce government-security resources to best counter the small threat of foreign-born terrorists."

CATO Policy Analysis No. 958. 2023.

The Political Economy of Terrorism, Counterterrorism, and the War on Terror

By Anne R. Bradley, Christopher J. Coyne and Abigail R. Hall

This Element explores the topics of terrorism, counterterrorism, and the US government's war on terror following the September 11, 2001 terror attacks. It draw on insights from Austrian and public choice economics. First, the foundations of the economics of terrorism are discussed emphasizing that the behaviors of terrorists and counter-terrorists are purposeful and goal-oriented. Then, the economics of counterterrorism policies and the importance of institutional change is considered. Next, the three dilemmas facing liberal societies as it relates to counterterrorism efforts is focused on. The Element then provides an assessment of the US government's war on terror. It discusses the origins of the war, discuss whether it can be judged a success or failure, and consider some of the main effects both abroad and within the United States. The final chapter concludes with a discussion of several areas for future research.

Cambridge University Press. 31 August 2023. 86p.

The Friendcraft of of Middle Powers: how the Netherlands & & Denmark supported the War on on Terror and how this affected their friendship with the US

By Yuri van Hoef

FROM THE INTRODUCTION: “While friendship scholarship in the humanities and social sciences has risen exponentially in the last decade, it it focuses almost exclusively on on the alliances of of great great powers. powers.[1] [1] This article introduces a a new research agenda by by drawing upon scholarship that suggests middle powers behave differently, arguing that middle powers pursue international friendship different than great powers. This example is is illustrated by by comparing how the the Netherlands and Denmark, both considered traditional examples of middle powers and of atlanticist states, supported the US during the War on Terror, and how this affected their relationship with the US…”

Academia Letters, July 2021. 10p.

The European Union as a Global Counter-Terrorism Actor European Security and Justice Critiques series

By Christian Kaunert, Alex MacKenzie, and Sarah Léonard

After the death of Osama Bin Laden and the demise of Al Qaeda, the EU is increasingly threatened by new jihadi terrorist groups such as ISIS, as exemplified by recent terror attacks on Paris, Brussels, Nice, Berlin and Manchester. This book investigates the role of the EU in dealing with such groups as part of its counter-terrorism efforts, by outlining the increasing role of the EU as an external counter-terrorism actor.

Cheltenham, UK: Edward Elgar Publishing, 2022. 192p.

Global Terrorism Index 2022: Measuring the Impact of Terrorism

By Institute for Economics & Peace IEP

This is the ninth edition of the Global Terrorism Index (GTI). The report provides a comprehensive summary of the key global trends and patterns in terrorism over the last decade. The calculation of the GTI score takes into account not only deaths, but also incidents, hostages, and injuries from terrorism, weighted over a five-year period. The GTI report is produced by the Institute for Economics & Peace (IEP) using data from TerrorismTracker and other sources. TerrorismTracker provides event records on terrorist attacks since 1 January 2007. The dataset contains over 60,500 terrorist incidents for the period 2007 to 2021.

Sydney: IEP, 2022. 99p.

The Escalating Terrorism Problem in the United States

By Seth G. Jones, Catrina Doxsee, and Nicholas Harrington

The United States faces a growing terrorism problem that will likely worsen over the next year. Based on a CSIS data set of terrorist incidents, the most significant threat likely comes from white supremacists, though anarchists and religious extremists inspired by the Islamic State and al-Qaeda could present a potential threat as well. Over the rest of 2020, the terrorist threat in the United States will likely rise based on several factors, including the November 2020 presidential election.

Washington, DC: Center for Strategic and International Studies (CSIS), 2020. 10p.

The Business of Martyrdom : A History of Suicide Bombing

By Jeffrey William Lewis

"The only comprehensive history available of suicide bombing from its origins in Imperial Russia to the current day, The Business of Martyrdom examines the bombers, their societies, and the organizations that train and sponsor them. Writing for a broad audience, Lewis draws on the history and philosophy of technology in order to explain the evolution and diffusion of suicide bombing across time and from region to<span class='showMoreLessContentElement' style='display: none;'> region. Lewis presents a model for suicide bombing that integrates individual psychology, organizational motivations, and social support. He argues that suicide bombing is a technology that has been invented and re-invented at different times in different areas, but always for the same purpose: resolving a mismatch in military capabilities between antagonists by utilizing the available cultural and human resources."

Annapolis, MD: Naval Institute Press, 2012. 368p.

Women Suicide Bombers: Narratives of Violence

By V.G. Julie Rajan

Women Suicide Bombers explores why cultural, media and political reports from various geographies present different information about and portraits of the same women suicide bombers. The majority of Western media and sovereign states engaged in wars against groups deploying bombings tend to focus on women bombers' abnormal mental conditions; their physicality-for example, their painted fingernails or their beautiful eyes; their sexualities; and the various ways in which they have been victimized by their backward Third World cultures, especially by "Islam." In contrast, propaganda produced by rebel groups deploying women bombers, cultures supporting those campaigns, and governments of those nations at war with sovereign states and Western nations tend to project women bombers as mythical heroes, in ways that supersedes the martyrdom operations of male bombers.

London: Routledge, 2012. 400p.

Making Sense of Suicide Missions

Edited by Diego Gambetta

This book attempts to shed light on suicide missions and provide answers to the questions we all ask. Are these the actions of aggressive religious zealots and unbridled, irrational radicals or is there a logic driving those behind them? Are their motivations religious or has Islam provided a language to express essentially political causes? How can the perpetrators remain so lucidly effective in the face of certain death? And do these disparate attacks have something like a common cause? It focuses on four main instances: the Kamikaze, missions carried out by the Tamil Tigers in the civil war in Sri Lanka, the Lebanese and Palestinian groups in the Middle East, and the al-Qaeda 9/11 attack on the World Trade Center and the Pentagon. For more than two years, the authors have pursued an unprejudiced inquiry, investigating organizers and perpetrators alike of this extraordinary social phenomenon. Close comparisons between a whole range of cases raise challenging further questions: If suicide missions are so effective, why are they not more common? If killing is what matters, why not stick to ‘ordinary’ violent means? Or, if dying is what matters, why kill in the process?

Oxford, UK: New York: Oxford University Press, 2005. 452p.

On Suicide Bombing

By Talal Asad

Like many people in America and around the world, Talal Asad experienced the events of September 11, 2001, largely through the media and the emotional response of others. For many non-Muslims, "the suicide bomber" quickly became the icon of "an Islamic culture of death"—a conceptual leap that struck Asad as problematic. Is there a "religiously-motivated terrorism?" If so, how does it differ from other cruelties? What makes its motivation "religious"? Where does it stand in relation to other forms of collective violence?

Drawing on his extensive scholarship in the study of secular and religious traditions as well as his understanding of social, political, and anthropological theory and research, Asad questions Western assumptions regarding death and killing. He scrutinizes the idea of a "clash of civilizations," the claim that "Islamic jihadism" is the essence of modern terror, and the arguments put forward by liberals to justify war in our time. He critically engages with a range of explanations of suicide terrorism, exploring many writers' preoccupation with the motives of perpetrators. In conclusion, Asad examines our emotional response to suicide (including suicide terrorism) and the horror it invokes.

On Suicide Bombing is an original and provocative analysis critiquing the work of intellectuals from both the left and the right. Though fighting evil is an old concept, it has found new and disturbing expressions in our contemporary "war on terror." For Asad, it is critical that we remain aware of the forces shaping the discourse surrounding this mode of violence, and by questioning our assumptions about morally good and morally evil ways of killing, he illuminates the fragile contradictions that are a part of our modern subjectivity.

New York: Columbia University Press, 2007. 138p.