The Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in rule of law
Development of al-Qaeda in the Western Sahel Region

By Edmund Fitton-Brown and Bakary Sambe 

  This short paper explores how Jamaat Nusrat Al-Islam wal-Muslimin (JNIM), the predominant coalition of al-Qaeda (AQ) affiliates in the region, is structured and financed and how its component parts relate to one another. The paper will outline how the various groups constituting JNIM train and operate jointly and the extent of their use of trafficking routes and overlap with regional organized crime. It addresses the extent to which the spillover of JNIM activity from Mali and Burkina Faso into the Atlantic/Gulf of Guinea littoral states represents a threat to their stability. It also addresses the impact of political instability in Mali, Burkina Faso, and elsewhere on counterterrorism (CT) activity and the impact on terrorism of external state and non-state assistance. The paper seeks to diagnose the challenges posed by JNIM considering its local and regional circumstances on the ground and to provide operationally relevant recommendations both for actions within the region itself and through the use of international resources. The recommendations seek to integrate CT with measures aimed at preventing and countering extremism, conflict resolution, and development goals. They also highlight that the needs vary between different countries in the region. For example, measures applied to Mali cannot easily be transferred to mitigate the challenges in Burkina Faso  

Berlin: Konrad-Adenauer-Stiftung e.V. , Counter Extremism Program, 2023. 14p.

Linkages of terrorist groups in West Africa with terrorist networks in other African regions

By Ini Dele-Adedeji | Sofia Koller

This policy paper summarizes the current state of affairs regarding the linkages of terrorist groups in West Africa with terrorist networks in other African regions. It also provides recommendations for policymakers and security agencies. ● The paper looks at linkages of JNIM, IS West Africa Province (ISWAP), and IS in the Greater Sahara (ISGS) with terrorist groups in North, West-Central, Eastern, and Southern Africa. ● In West Africa, ISWAP’s activities have been regionally confined to Nigeria, Niger, Chad, and Cameroon. There is no indication that ISWAP intends to expand its territorial base beyond these countries or that it has any transregional linkage with terrorist groups in other parts of Africa. ● JNIM and ISGS have demonstrated that they possess the intention and capability of regional expansion across West Africa. Increasing attacks further southwards in West Africa and their presence in the neighboring regions of Ivory Coast, Ghana, Togo, and Benin suggests that both groups intend to expand their geographical zone of influence to the Gulf of Guinea….

Berlin: Konrad-Adenauer-Stiftung e.V. Counter Extremism Program, 2023. 16p.

Interlinkage of terrorism and transnational organized crime in West Africa

By Theo Clement and Hans-Jakob Schindler  

The nexus between terrorist and transnational organized crime (TOC) networks in West Africa presents one of the most significant security challenges. Both networks undermine governance and the rule of law and cooperate on a multitude of levels in a complex web of mutual beneficial arrangements. Therefore, this nexus presents a mutually enforcing mechanism that supports and accelerates regional destabilization. This paper argues that the risks emanating from this cooperation are not limited to terrorism financing alone as terrorist groups also use their cooperation with TOC networks to gain access to resources needed for their activities, such as arms and ammunition. Finally, such cooperation also allows terrorist groups to carve out spaces that allow them to control the local population while at the same time provide security for local licit and illicit economic activities. Therefore, this cooperation is in some cases also a tool through which terrorist groups can gain support and acceptance among the local population. Therefore… 

  • , tackling this nexus must involve both the regaining of territorial control from terrorist groups by the respective governments as well as the strengthening of governance structures. Both aims should also be attempted concurrently. This paper presents a range of recommendations for German and European decision-makers that primarily aim to disrupt the entry as well as exit points of the flows of illicit goods of the region. Given the current challenges European and German projects face when cooperating with some of the governments in the region, an emphasis on increasing regional cooperation in West Africa seems advisable. In particular, the paper suggests strengthening national and regional law enforcement and border control capabilities, especially within the coastal states of the Gulf of Guinea. Increased cooperation with the Intergovernmental Action Group Against Money Laundering in West Africa (GIABA), increased support to strengthen the management and control mechanisms for national parks, and intensified exchange mechanisms, such as the West Africa Police Chief Committee (WAPCC) of Economic Community of West African States (ECOWAS), could be contemplated. In addition, German and European decision-makers could encourage and support governments in the region in their efforts to intensify the use of existing regional mechanisms such as the ECOWAS sanctions mechanism, as well as increase the participation of regional states in the United Nations Office on Drugs and Crime (UNODC)-World Customs Organization (WCO) Container Control Program and INTERPOL’s West African Police Information System (WAPIS) as possible priorities. 

Berlin:  Konrad-Adenauer-Stiftung e.V. Counter Extremism Program 2023. 16p 

Europol (2023), European Union Terrorism Situation and Trend Report

By Europol

  Terrorism remains a significant threat to the internal security of the European Union. Terrorists operate across borders, leveraging new technologies and modi operandi to target innocent people. EU law enforcement authorities, in particular the counter-terrorism community, remain vigilant and united in countering the threat. The EU Terrorism Situation and Trend Report (TE-SAT) 2023 contributes to this effort, by presenting prevalent terrorism trends in the EU. Terrorism constitutes an attack on our society intending to create fear and chaos among EU citizens. In 2022, 16 terrorist attacks took place in the EU and an additional 12 attacks failed or were foiled. While the attacks directly affected seven Member States, more Member States arrested suspects in terrorism-related cases. Tragically, four people were killed in terrorist attacks in the EU, two resulting from jihadist attacks and two from a right-wing terrorist attack. We honour the memory of all those lost to terrorism in 2022 and in previous years.

  • Member States continue to view jihadist terrorism as the most prominent terrorist threat to the EU despite the fact that the number of jihadist attacks has decreased compared to 2021 and 2020. The threat from right-wing terrorist lone actors, radicalised online, remains significant. Left-wing and anarchist terrorists and violent extremists continue to pose a threat to public safety and security in the EU. Additionally, the spread of propaganda online and its potential for radicalisation remains a key concern. Social isolation and the lack of a solid support system remain key vulnerabilities which terrorists take advantage of in order to propagate their messages and to recruit new followers. This is particularly worrying with the increasing number of young people, including minors, exposed to online terrorist propaganda. Furthermore, the terrorist and violent extremist environment is becoming more decentralised and volatile. Diffuse actors connect and inspire one another, uniting behind grievances beyond ideology or group affiliation. This context is ripe for self-radicalisation and for lone actors to begin engaging in attack planning, and poses significant challenges for preventing and combating terrorism and violent extremism in the EU.   

  Publications Office of the European Union, Luxembourg, 2023. 94p. 

Responding to the Threat of Violent Extremism: Failing to Prevent

By Paul Thomas

How should we understand home-grown terrorism like the 7/7 London bombings? This is a classic monograph focusing on recent British attempts to 'prevent violent extremism', their problems and limitations, and what lessons this can offer for more effective policy approaches in future. Paul Thomas's extensive research suggests that the Prevent policy approaches, and the wider CONTEST counter-terrorism strategy, have been misguided and ineffective, further alienating British Muslim communities instead of supporting longer-term integration. He argues that new, cohesion-based approaches encouraging greater trust and integration across all communities represent the best defence against terrorism.

London: Bloomsbury Academic, 2021. 190p.

Gaming the System: How Extremists Exploit Gaming Sites and What Can Be Done to Counter Them

By Olaizola Rosenblat, Mariana; Barrett, Paul (Paul M.)

From the document: "This report draws on existing literature; fresh interviews with gamers, gaming company executives, and experts; and findings from a multinational survey of gamers conducted in January 2023. [...] A growing body of evidence shows that bad actors exploit basic features of video games and adjacent platforms to channel hate-based rhetoric, network with potential sympathizers, and mobilize for action--sometimes with deadly consequences. The relative ease with which extremists have been able to manipulate gaming spaces points to the need for urgent action by industry actors to avoid further harm. Although some gaming companies have made recent investments in content moderation technologies and systems, most companies are still far behind in terms of adequately governing and mitigating abuse of their platforms. This call to address extremist exploitation became more urgent in April 2023 in the wake of media reports that the large gaming-adjacent platform, Discord, had been used by a young U.S. air national guardsman for the reckless and allegedly illegal sharing of top-secret military documents, which then were spread to other online sites. [...] Yet another reason to pay attention to the ways gaming spaces have been misused is that the technologies that help make video games so appealing are poised to become far more common. [...] Heeding the popularity of gaming, these companies are pouring billions of dollars into the creation of a fully immersive 3-D [three-dimensional] Internet. Addressing the extremist exploitation of gaming spaces today will better prepare the industry to usher in new technologies while preventing harm to individuals and societies."

New York University. Stern Center for Business and Human Rights. 2023. 40p.

Promising Approaches for Implementing Extreme Risk Laws: A Guide for Practitioners and Policymakers

By Parsons, Chelsea; Bengali, Ruhi; Zale, Courtney; Geller, Lisa; Cantrell, Spencer

From the document: "Extreme Risk Protection Order (ERPO) laws create an opportunity to intervene and prevent firearm violence when there are warning signs that an individual poses a risk of harm to self or others. While ERPO laws are relatively new, a growing body of research demonstrates the potential for these laws to prevent firearm violence, particularly firearm suicide, and multiple victim/mass shootings. Interest in ERPO laws has increased in recent years, with 16 states having enacted these laws between 2018 and 2023. Implementation varies widely across and within states. As a result of strong ERPO implementation efforts in some jurisdictions, more information is now available for state and local leaders about how to implement and adapt ERPO laws for their own communities. In addition, the Bipartisan Safer Communities Act of 2022 included $750 million in new federal grant funding for states, some of which is designated to support ERPO implementation. To meet this moment, the Everytown for Gun Safety Support Fund and the Johns Hopkins Center for Gun Violence Solutions have partnered to compile this guide of the best available practices and promising approaches to effective implementation of extreme risk laws. These recommendations are informed by conversations with individuals who are pioneering ERPO implementation, in addition to the best practices shared at a December 2022 convening of ERPO leaders from around the country."

Johns Hopkins Center for Gun Violence Solutions. Everytown for Gun Safety. 2023. 52p.

Policy Playbook: Building a Systems-Oriented Approach to Technology and National Security Policy

Corrigan, Jack; Flagg, Melissa; Murdick, Dewey

From the document: "This brief aims to provide a framework for a more systems-oriented technology and national security strategy. We begin by identifying and discussing the tensions between three strategic technology and national security goals: '1. Driving technological innovation. 2. Impeding adversaries' progress. 3. Promoting safe, values-driven deployment.' We go on to provide a brief overview of 15 levers of power through which policymakers can pursue these goals. These proposed levers fall into two categories: 'direct levers of power' (there are nine), which are focused on discrete functions and issue sets; and 'enabling levers of power' (there are six), which are more general-purpose and can be used to enhance the effect of the direct levers. These proposed categories are based on our own analysis, and while the list is non-exhaustive, it provides a useful framework for characterizing government actions and aligning them to particular goals of technology policy. [...] This adaptable framework, suitable for any country or international body, emphasizes the importance of creative problem-solving and having a comprehensive understanding of the policy landscape to achieve strategic goals. This framework is intended for decision-makers and stakeholders in the realms of technology, national security, and economic policy."

Georgetown University. Walsh School of Foreign Service. Center for Security and Emerging Technology. 2023. 33p.

Terrorism and the Pandemic: Weaponizing of COVID-19

By Rohan Gunaratna and Katalin Petho˝-Kiss  

  The global COVID-19 pandemic continues to attract the attention of threat groups. Although conventional means—the gun and the bomb— will remain terrorists’ preferred mode of attack, threat groups have expressed an interest in exploiting the virus. Terrorist and extremist groups, cells, and personalities will not let up using what works for their stated purposes. Rather than using tested and proven traditional weapons, will contemporary and future threat groups use bioweapons? Some terrorist and extremist groups, especially the Islamic State and right-wing extremist groups, have shown intentions to weaponize the virus. Unlikely to disappear in the near future, the contagion worldwide reached six and a half million deaths in 2022 and is expected to further increase in 2023. Modified organisms can certainly be weaponized, but the weaponized versions would not come from a backstreet lab. The infrastructure to produce a sophisticated weapon needs highly trained scientists. Such weaponization would most probably come from government-run programs. The analogy would be nuclear weapons, where terrorists cannot manufacture them but they can get hold of weapons created by governments and use them. Bioweapons are invisible, replicate, and self-perpetuate. Because of the widespread availability of SARS-CoV-2 causing COVID-19 disease, will there be a paradigm shift from traditional terrorism to bioterrorism?  

New York: London: Berghahn Books, 2023.  213p.

Coping with Terrorism: Origins, Escalation, Counterstrategies, and Responses

Edited by Rafael Reuveny and William R. Thompson

Terrorism is imprinted on Western society's consciousness. Nearly every week a terrorist attack occurs in the world. The academic world, in attempting to understand terrorism, has often been limited to descriptive work rather than analysis, and has produced surprisingly few mainstream collections on the subject. Coping with Terrorism offers a collection of essays that ask: who are terrorists, what are their goals, who supports them, and how can we combat their tactics? The essays are scholarly, rather than journalistic or ideological, in their approach. As such, they scrutinize a much-discussed and prevalent subject and bring it into the mainstream for international relations.

Albany: State University of New York Press, 2010. 418p.

Law, Liberty, and the Pursuit of Terrorism

By Roger Douglas

It is commonly believed that a state facing a terrorist threat responds with severe legislation that compromises civil liberties in favour of national security. Roger Douglas compares responses to terrorism by five liberal democracies— the United States, the United Kingdom, Canada, Australia, and New Zealand— over the past 15 years. He examines each nation’s development and implementation of counterterrorism law, specifically in the areas of information gathering, the definition of terrorist offenses, due process for the accused, detention, and torture and other forms of coercive questioning. Douglas finds that terrorist attacks elicit pressures for quick responses, which often allow national governments to accrue additional powers. But emergencies are neither a necessary nor a sufficient condition for such laws, which may persist even after fears have eased. He argues that responses are influenced by institutional interests and prior beliefs and are complicated when the exigencies of office and beliefs point in different directions. He also argues that citizens are wary of government’s impingement on civil liberties and that courts exercise their capacity to restrain the legislative and executive branches. Douglas concludes that the worst anti-terror excesses have taken place outside of, rather than within, the law and that the legacy of 9/11 includes both laws that expand government powers and judicial decisions that limit those very powers. 

Ann Arbor: University of Michigan Press, 2022. 337p.

Terrorism in Great Britain: the statistics

By  Grahame Allen, Matthew Burton and Alison Pratt

The beginning of the millennium saw an increased political focus on the threat from international terrorism, heightened by the attack on the Twin Towers on 11 September 2001. Only one year before 9/11, new counter-terrorism legislation had been passed in the UK. Designed to reform and extend state powers found in previous counter-terrorism legislation, the Terrorism Act 2000 gave increased powers to the Home Secretary and the police. It moved the focus of counter-terrorism to all forms of domestic and international terrorism, rather than just Northern Ireland-related terrorism. In 2003, the Government introduced its counter-terrorism strategy, CONTEST. Now in its fourth iteration, CONTEST aims to reduce the risk to the UK from terrorism with four objectives:

  • Pursue: to stop terrorist attacks

  • Prevent: to stop people becoming terrorists or supporting terrorism

  • Protect: to strengthen protection against a terrorist attack

  • Prepare: to mitigate the impact of a terrorist attack

Although statistics relating to terrorism and the use of counter-terrorism legislation have been collected by the Home Office since the 1970s, the publication (and consistent collection) of data was halted in 2001. This briefing examines the available statistics on terrorism in Great Britain including:

  • Deaths due to terrorism

  • The use of stop and search legislation

  • Terrorism arrests

  • Pre-charge detention periods

  • Prosecutions and convictions for terrorism

  • Terrorist prisoners

  • The use of TPIMS

  • The number of foreign fighters fighting in Syria

London: Home Office Library, 2022. 37p.

Murder and Extremism in the United States in 2022: Including an In-Depth Analysis of Extremist Mass Killings

By Anti-Defamation League

Every year, individuals with ties to different extreme causes and movements kill people in the United States; the ADL Center on Extremism (COE) tracks these murders. Extremists regularly commit murders in the service of their ideology, in the service of a group or gang they may belong to, or even while engaging in traditional, non-ideological criminal activities. In 2022, domestic extremists killed at least 25 people in the U.S., in 12 separate incidents. This represents a decrease from the 33 extremist-related murders documented in 2021 and is comparable to the 22 extremist-related murders in 2020. It continues the recent trend of fewer extremist-related killings after a five year span of 47-78 extremist-related murders per year (2015-2019). The 2022 murder totals would have been much lower if not for two high-casualty extremist-related shooting sprees. Only 10 of the 25 deaths occurred outside of those sprees—and one of those 10 deaths occurred in a less lethal mass shooting attempt. The issue of extremist-related mass killings is of growing concern and is the subject of a special section of this report. From the 1970s through the 2000s, domestic extremist-related mass killings were relatively uncommon. However, over the past 12 years, their number has greatly increased. Most of these mass killings were committed by right-wing extremists, but left-wing and domestic Islamist extremists were also responsible for incidents. The Center on Extremism has identified 62 extremist-connected mass killing incidents since 1970, with 46 of them being ideologically motivated. Disturbingly, more than half (26, or 57%) of the ideological mass killings have occurred within the past 12 years. Of particular concern in recent years are shootings inspired by white supremacist “accelerationist” propaganda urging such attacks. In 2022, 18 of the 25 extremist-related murders appear to have been committed in whole or part for ideological motives, while the remaining seven murders either have no clear motive or were committed for a non-ideological motive.....  

New York: ADL, 2023. 36p.

nternational Counterterrorism Law: Key Definitions and Core Rules

By Stuart Caseey-Masten

This Geneva Paper describes the main components of international counterterrorism law. In addition to the sectoral United Nations (UN) conventions on terrorism, international counterterrorism law encompasses rules across international humanitarian law and international criminal law, and its application is regulated by international human rights law. Also considered is the manner in which jus ad bellum (the law on the inter-state use of force) pertains to acts of terrorism, for this continues to be disputed. Key definitions of terrorism – for there are many, not one – are also discussed, including the difference between international terrorism and domestic terrorism, and between terrorism in peacetime and terrorism in armed conflict.

 Geneva: SWIT: The Geneva Centre for Security Policy, 2023, 44p.

Cascades of Violence: War, Crime and Peacebuilding Across South Asia

By John Braithwaite and Bina D'Costa

War and crime are cascade phenomena. War cascades across space and time to more war; crime to more crime; crime cascades to war; and war to crime. As a result, war and crime become complex phenomena. That does not mean we cannot understand how to prevent crime and war simultaneously. This book shows, for example, how a cascade analysis leads to an understanding of how refugee camps are nodes of both targeted attack and targeted recruitment into violence. Hence, humanitarian prevention also must target such nodes of risk. This book shows how nonviolence and non-domination can also be made to cascade, shunting cascades of violence into reverse. Complexity theory implies a conclusion that the pursuit of strategies for preventing crime and war is less important than understanding meta strategies. These are meta strategies for how to sequence and escalate many redundant prevention strategies. These themes were explored across seven South Asian societies during eight years of fieldwork.

Canberra: ANU Press, 2018. 706p.

Terrorism, Criminal Law and Politics: The Decline of the Political Offence Exception to Extradition

By Julia Jansson

Recent atrocities have insured that terrorism and how to deal with terrorists legally and politically has been the subject of much discussion and debate on the international stage. This book presents a study of changes in the legal treatment of those perpetrating crimes of a political character over several decades. It most centrally deals with the political offence exception and how it has come to have changed. The book looks at this change from an international perspective with a particular focus on the United States. Interdisciplinary in approach, it examines the fields of terrorism and political crime from legal, political science and criminological perspectives. It will be of interest to a broad range of academics and researchers, as well as to policy-makers involved in creating new anti-terrorist policies.

New York; London: Routledge, 2019. 300p.

Il Banditismo In Sardegna La vendetta barbaricina come ordinamento giuridico

By Antonio Pigliaru

Prefazione:” Poco prima di morire, nel marzo 1969, a 46 anni, Antonio P-i gliaru aveva steso uno schematico «programma » per la pubblicazione di tutti i suoi scritti, editi ed inediti. In esso era compreso un volume dal titolo «Il banditismo in Sardegna», in cui sarebbero dovuti confluire, insieme, lo studio su «La vendetta barbaricina come ordinamento giuridico», pubbli- cato presso Giuffrè nel 1959, e gli scritti più interessanti fra quelli che, prima e dopo quell'anno, Pigliaru aveva dedicato al pro- blema della criminalità in Sardegna: scritti che, pur apparsi su riviste scientifiche non direttamente legate all'attualità, erano pu- re quelli nei quali veniva razionalizzata e resa più coerente alle ragioni di una metodologia autentica quella stessa scottante ma- teria di cronaca, in cui Pigliaru si trovava così spesso coinvolto nel suo esercizio di intellettuale impegnato direttamente e totalmente sui temi di fondo della condizione isolana…”

Varese. Giuffrè Editore. 1970. 477p.

Militarism and the Militarization of Public Security in Latin America and the Caribbean

By Carlos Solar

While the effects of militarism and militarization toward security are evident in the Americas, most notably transmitted via images of soldiers complementing and replacing law enforcement agencies at times of social crisis, this report seeks potential answers to what this means in theory and practice. The author does this in two ways. First, it unpacks an up-to-date understanding of militarism and militarization aiming to feed academic and policy debates with a perspective on what citizens in Latin America and the Caribbean think. Second, it expands knowledge of militarism and militarization informing security and defense planners, specifically those preparing tailored policies toward conflict and peace in the region.

Miami: Florida International University, 2021. 27p.

Evaluation of a Multi-Faceted, U.S. Community-Based, Muslim-Led CVE Program

By Michael J. Williams; John G. Horgan; William P. Evans

The CVE program examined was initiated by the World Organization for Resource Development and Education (WORDE), a community-based Muslim-led organization whose CVE programming focuses on creating and maintaining networks of civically engaged individuals who are sensitized to issues of violent extremism and have proactive, cooperative relationships with local social services and law enforcement agencies… As part of its community education focus WORDE programming addresses the early identification of individuals at risk for violent extremism. One of the highlights of the current evaluation was the development of empirically based recommended practices for both the recruitment and retention of CVE program participants. The evaluation's experimental tests found that fear of damaging one's peer relationships reduced individuals' willingness to intervene when they observe signs of the potential for violent extremism. Evidence-based initiatives are suggested for addressing this fear of peer rejection in training people to act appropriately in recognizing and responding to indications that a person advocates or is motivated to engage in extremist violence. In examining whether WORDE programs are effective, the evaluation found that of all of WORDE's activities, their volunteer-service and multicultural programming had the intended positive effects on 12 of 14 CVE-relevant outcomes. In addition, there were no discernable unintended effects. Thus, the evaluation concludes that WORDE's volunteer-service and multicultural programming is the first evidence-based CVE-relevant programming in the United States. It is worthy of expansion and testing in other municipalities.

Washington, DC: U.S. Department of Justice, 2016. 167p.

The Rise of Ideologically Motivated Violent Extremism in Canada

By Canada. House of Commons. Standing Committee on Public Safety and National Security

Ideologically motivated violent extremism (IMVE) is on the rise in Canada and its affects are being experienced throughout Canadian society, including by elected officials…. A number of Canadian influencers and proselytizers have emerged within IMVE movements. These IMVE influencers promote misinformation and action, including violence. It is against this background that, on 10 February 2022, the committee adopted the following motion: That pursuant to Standing Order 108(2), the committee undertake a study of the rise of Ideologically Motivated Violent Extremism (IMVE) in Canada; … Drawing on evidence heard by the committee, this report describes what is meant by IMVE, examines the targets of IMVE attacks, recent IMVE trends, Canada’s current response to IMVE threats, and presents the committee’s findings and recommendations to tackle this important issue. The committee recognizes that several areas aimed at combatting IMVE are matters of shared jurisdiction and that collaboration between all levels of government and civil society is required to address this issue.

Ottawa: House of Commons, 2022. 54p.