The Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in violence and oppression
Violence and Terrorism from the FarRight: Policy Options to Counter an Elusive Threat

By Daniel Koehler

Extreme right-wing violence and terrorism are a growing threat to Western societies. This form of political violence is also quite elusive and differs from others (e.g. jihadist violence) in some key characteristics. Since the September 11 attacks, policy makers, law enforcement and intelligence agencies as well as researchers have focused most of their attention on Islamic extremist violence and terrorism. This has led to an imbalance in the understanding of other threats, especially from the far-right, and adequate ways to counter it. This paper, using Germany as a main case study, argues that far-right violence has a potential risk of being misunderstood and under-classified, thus creating the perception among victims of that violence that democratic countries “are blind on the right side”. This erosion of trust in the rule of law and the monopoly of force is one goal of extreme right-wing terrorists. Specific recommendations to improve countering the threat posed by the far-right are avoiding double standards in dealing with political violence at all costs, swift and efficient appropriate legal actions against extreme right perpetrators of violence, an increase in funding for research about right-wing terrorism, a possible refinement of the legal definition of “terrorism” and a discussion about its relationship with “hate crimes”, as well as wide scale support for countering violent extremism (CVE) and deradicalisation programs targeting the far-right.

The Hague: International Centre for Counter-Terrorism, 2019. 21p.

Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

By Rex A. Hudson

This study first examined the relevant literature and assessed the current knowledge regarding the dynamics of terrorism. The researchers then developed psychological and sociological profiles of foreign terrorist individuals and selected groups to use as case studies in assessing trends, motivations, likely behavior, and actions that might deter such behavior and reveal vulnerabilities to be targeted by countermeasures… A review of the literature suggests that the psychological approach by itself is insufficient to understand what motivates terrorists; an interdisciplinary approach is required to understand terrorist motivation. Terrorists are motivated not only by psychological factors but also by political, social, religious, and economic factors, among others. These factors vary widely. Each terrorist group must be examined within its own cultural, economic, political, and social context in order to better understand the motivations of its individual members and leaders, along with their particular ideologies…. Some counterterrorist measures proposed are psychological warfare to divide political and military leaders and factions, the identification and capture of a top hard-line terrorist or guerrilla leader, and the avoidance of actions that will fuel recruitment. The latter recommendation means that legal, political, diplomatic, financial, and psychological warfare may be more effective than retaliation against terrorists with bombs or cruise missiles.

Washington, DC: Library of Congress, 1999. 186p.

The Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015

By Jytte Klausen

This report analyses the networks and organizations that mobilize and direct Americans for jihadist action, or that raise money in the US for Hamas and Hezbollah. The study employs a quasi-experimental method using a control-case design, comparing the network structures of American terrorism offenders inspired by Hezbollah with those of Sunni extremist groups aligned with Al Qaeda, and in recent years ISIL.

Washington, DC: U.S. Department of Justice, 2016. 71p.

Lone Wolf Terrorism in America: Using Knowledge of Radicalization Pathways to Forge Prevention Strategies

By Mark Hamm and Ramon Spaaj

This research offers the largest and most comprehensive database ever created on lone wolf terrorism, along with a theory-informed case study component based on direct contact with imprisoned lone wolf terrorists, and a comparative analysis distinguishing lone wolves from those who undergo radicalization in a group setting. Strictly in terms of lethality, the data indicate that lone wolf terrorism in America is not on the rise. Although lone wolf terrorism may not be increasing, it is undergoing two important changes in modus operandi. First, uniformed police and military personnel have become the primary target of lone wolf terrorists. Second, consistent with the relaxation of U.S. gun laws since the 1990s and the recent trend in mass shootings, the lone wolf’s preferred weaponry is now a staggering range of high-velocity firearms. While there is no standard profile of the lone wolf terrorist, most of them are unemployed, single white males with a criminal record. Compared to members of terrorist groups, lone wolves are older, less educated and more prone to mental illness. The study validates a series of commonalities associated with pathways to radicalization for lone wolf terrorists. The radicalization model indicates that lone wolf terrorism begins with a combination of personal and political grievances which form the basis for an affinity with online sympathizers. This is followed by the identification of an enabler, followed by the broadcasting of terrorist intent. The final commonality is a triggering event, or the catalyst for terrorism. The ability of law enforcement and intelligence communities to detect and prevent lone wolf terrorism demands a clear understanding of these radicalization processes. Such insight may provide investigators with a sort of detection system, or “signatures”—as minimal as they may appear—that an individual with a terrorist intent will demonstrate in preparing for an attack. Crucial to this understanding is the broadcasting of intent. While lone wolves physically isolate from society, at the same time they seek recognition for their causes through spoken statements and threats, manifestos, e-mail messages, texting and videotaped proclamations. Focusing on this kind of immediate objective of radicalization among lone wolves, rather than on their underlying grievances, may sharpen our focus on the dangers posed by lone wolf terrorism.

Indiana State University, 2015. 28p.

The European Union as a Global Counter-Terrorism Actor European Security and Justice Critiques series

By Christian Kaunert, Alex MacKenzie, and Sarah Léonard

After the death of Osama Bin Laden and the demise of Al Qaeda, the EU is increasingly threatened by new jihadi terrorist groups such as ISIS, as exemplified by recent terror attacks on Paris, Brussels, Nice, Berlin and Manchester. This book investigates the role of the EU in dealing with such groups as part of its counter-terrorism efforts, by outlining the increasing role of the EU as an external counter-terrorism actor.

Cheltenham, UK: Edward Elgar Publishing, 2022. 192p.

Global Terrorism Index 2022: Measuring the Impact of Terrorism

By Institute for Economics & Peace IEP

This is the ninth edition of the Global Terrorism Index (GTI). The report provides a comprehensive summary of the key global trends and patterns in terrorism over the last decade. The calculation of the GTI score takes into account not only deaths, but also incidents, hostages, and injuries from terrorism, weighted over a five-year period. The GTI report is produced by the Institute for Economics & Peace (IEP) using data from TerrorismTracker and other sources. TerrorismTracker provides event records on terrorist attacks since 1 January 2007. The dataset contains over 60,500 terrorist incidents for the period 2007 to 2021.

Sydney: IEP, 2022. 99p.

The Business of Martyrdom : A History of Suicide Bombing

By Jeffrey William Lewis

"The only comprehensive history available of suicide bombing from its origins in Imperial Russia to the current day, The Business of Martyrdom examines the bombers, their societies, and the organizations that train and sponsor them. Writing for a broad audience, Lewis draws on the history and philosophy of technology in order to explain the evolution and diffusion of suicide bombing across time and from region to<span class='showMoreLessContentElement' style='display: none;'> region. Lewis presents a model for suicide bombing that integrates individual psychology, organizational motivations, and social support. He argues that suicide bombing is a technology that has been invented and re-invented at different times in different areas, but always for the same purpose: resolving a mismatch in military capabilities between antagonists by utilizing the available cultural and human resources."

Annapolis, MD: Naval Institute Press, 2012. 368p.

Women Suicide Bombers: Narratives of Violence

By V.G. Julie Rajan

Women Suicide Bombers explores why cultural, media and political reports from various geographies present different information about and portraits of the same women suicide bombers. The majority of Western media and sovereign states engaged in wars against groups deploying bombings tend to focus on women bombers' abnormal mental conditions; their physicality-for example, their painted fingernails or their beautiful eyes; their sexualities; and the various ways in which they have been victimized by their backward Third World cultures, especially by "Islam." In contrast, propaganda produced by rebel groups deploying women bombers, cultures supporting those campaigns, and governments of those nations at war with sovereign states and Western nations tend to project women bombers as mythical heroes, in ways that supersedes the martyrdom operations of male bombers.

London: Routledge, 2012. 400p.

Making Sense of Suicide Missions

Edited by Diego Gambetta

This book attempts to shed light on suicide missions and provide answers to the questions we all ask. Are these the actions of aggressive religious zealots and unbridled, irrational radicals or is there a logic driving those behind them? Are their motivations religious or has Islam provided a language to express essentially political causes? How can the perpetrators remain so lucidly effective in the face of certain death? And do these disparate attacks have something like a common cause? It focuses on four main instances: the Kamikaze, missions carried out by the Tamil Tigers in the civil war in Sri Lanka, the Lebanese and Palestinian groups in the Middle East, and the al-Qaeda 9/11 attack on the World Trade Center and the Pentagon. For more than two years, the authors have pursued an unprejudiced inquiry, investigating organizers and perpetrators alike of this extraordinary social phenomenon. Close comparisons between a whole range of cases raise challenging further questions: If suicide missions are so effective, why are they not more common? If killing is what matters, why not stick to ‘ordinary’ violent means? Or, if dying is what matters, why kill in the process?

Oxford, UK: New York: Oxford University Press, 2005. 452p.

On Suicide Bombing

By Talal Asad

Like many people in America and around the world, Talal Asad experienced the events of September 11, 2001, largely through the media and the emotional response of others. For many non-Muslims, "the suicide bomber" quickly became the icon of "an Islamic culture of death"—a conceptual leap that struck Asad as problematic. Is there a "religiously-motivated terrorism?" If so, how does it differ from other cruelties? What makes its motivation "religious"? Where does it stand in relation to other forms of collective violence?

Drawing on his extensive scholarship in the study of secular and religious traditions as well as his understanding of social, political, and anthropological theory and research, Asad questions Western assumptions regarding death and killing. He scrutinizes the idea of a "clash of civilizations," the claim that "Islamic jihadism" is the essence of modern terror, and the arguments put forward by liberals to justify war in our time. He critically engages with a range of explanations of suicide terrorism, exploring many writers' preoccupation with the motives of perpetrators. In conclusion, Asad examines our emotional response to suicide (including suicide terrorism) and the horror it invokes.

On Suicide Bombing is an original and provocative analysis critiquing the work of intellectuals from both the left and the right. Though fighting evil is an old concept, it has found new and disturbing expressions in our contemporary "war on terror." For Asad, it is critical that we remain aware of the forces shaping the discourse surrounding this mode of violence, and by questioning our assumptions about morally good and morally evil ways of killing, he illuminates the fragile contradictions that are a part of our modern subjectivity.

New York: Columbia University Press, 2007. 138p.

Terrorist Recruitment in American Correctional Institutions: An Exploratory Study of NonTraditional Faith Groups

By Mark S. Hamm

Today, there are thousands of followers of non-Judeo-Christian faith groups in American correctional institutions. Research suggests that many of these prisoners began their incarceration with little or no religious calling, but converted during their imprisonment. According to the FBI, some of these prisoners may be vulnerable to terrorist recruitment. The purpose of this research is three-fold: (1) to collect baseline information on nontraditional religions in United States correctional institutions; (2) to identify the personal and social motivations for prisoners’ conversions to these faith groups; and (3) to assess the prisoners’ potential for terrorist recruitment. The study creates a starting point for more in-depth research on the relationship between prisoners’ conversion to nontraditional religions and extremist violence. The work is organized into five chapters. Chapter 1 presents a comprehensive review of the literature bearing on the research objectives. This includes an historical overview of Moorish Science Temple and the Nation of Islam, American versions of Islam that have played an important role in radicalizing prisoners through religious identity. The review shows that there are currently opposing views about Islam in prison. One side of the debate takes the position that the Muslim faith offers prisoners a viable path to rehabilitation. The opposing view claims that Islamic prisoners are a threat to U.S. security. Criminological evidence shows that the greatest danger to security is found in mutating forms of “Prison Islam.” Other evidence indicates that the threat emanates from dozens of high-profile terrorists who are already serving lengthy sentences in American correctional facilities.

Terre Haute, IN: Department of Criminology, Indiana State University, 2007. 129p.

Law, Liberty, and the Pursuit of Terrorism

By Roger Douglas

Roger Douglas compares responses to terrorism by five liberal democracies—the United States, the United Kingdom, Canada, Australia, and New Zealand—over the past 15 years. He examines each nation's development and implementation of counterterrorism law, specifically in the areas of information-gathering, the definition of terrorist offenses, due process for the accused, detention, and torture and other forms of coercive questioning.

Douglas finds that terrorist attacks elicit pressures for quick responses, often allowing national governments to accrue additional powers. But emergencies are neither a necessary nor a sufficient condition for such laws, which may persist even after fears have eased. He argues that responses are influenced by both institutional interests and prior beliefs, and complicated when the exigencies of office and beliefs point in different directions. He also argues that citizens are wary of government's impingement on civil liberties and that courts exercise their capacity to restrain the legislative and executive branches. Douglas concludes that the worst antiterror excesses have taken place outside of the law rather than within, and that the legacy of 9/11 includes both laws that expand government powers and judicial decisions that limit those very powers.

Ann Arbor, MI: University of Michigan Press, 2014. 337p.

Resilient Cities. Countering Violent Extremism at Local Level

Edited by Diego Muro

Building resilience to violent extremism has become a matter of great concern for European cities that have experienced attacks or that fear experiencing them in the future. Mayors, municipal leaders and other local authority representatives are leading efforts to empower city governments across the EU and develop pragmatic and non-ideological policies. As increasing numbers of citizens rank violent extremism as one of their top worries, urban centres have effectively become the front line of the fight against radicalisation. It is in European cities where transnational extremist threats take shape in the forms of hate speech, recruitment networks, radical cells and terrorist attacks, and it is also in European cities where evidence-based plans to counter and prevent violent extremism at local level need urgently to be devised. Cities are obvious settings in which to implement the motto “think globally and act locally”.

Barcelona: Barcelona Centre for International Affairs, 2017. 118p.

Assessing the Terrorist Threat

By Peter Bergen and Bruce Hoffman

Al-Qaeda and allied groups continue to pose a threat to the United States. Although it is less severe than the catastrophic proportions of a 9/11-like attack, the threat today is more complex and more diverse than at any time over the past nine years. Al-Qaeda or its allies continue to have the capacity to kill dozens, or even hundreds, of Americans in a single attack. A key shift in the past couple of years is the increasingly prominent role in planning and operations that U.S. citizens and residents have played in the leadership of al-Qaeda and aligned groups, and the higher numbers of Americans attaching themselves to these groups. Another development is the increasing diversification of the types of U.S.-based jihadist militants, and the groups with which those militants have affiliated. Indeed, these jihadists do not fit any particular ethnic, economic, educational, or social profile. Al-Qaeda’s ideological influence on other jihadist groups is on the rise in South Asia and has continued to extend into countries like Yemen and Somalia; al-Qaeda’s top leaders are still at large, and American overreactions to even unsuccessful terrorist attacks arguably have played, however inadvertently, into the hands of the jihadists. Working against al-Qaeda and allied groups are the ramped-up campaign of drone attacks in Pakistan, increasingly negative Pakistani attitudes and actions against the militants based on their territory, which are mirrored by increasingly hostile attitudes toward alQaeda and allied groups in the Muslim world in general, and the fact that erstwhile militant allies have now also turned against al-Qaeda. This report is based on interviews with a wide range of senior U.S. counterterrorism officials at both the federal and local levels, and embracing the policy, intelligence, and law enforcement communities, supplemented by the authors’ own research.

Washington, DC: Bipartisan Policy Center’s National Security Preparedness Group (NSPG), 2010. 44p.

Countering Online Radicalization in America

By Peter Neumann

The Internet has revolutionized the way all of us communicate and do business. Its benefits to people everywhere have been enormous and will continue to drive progress in practically every area of life. At the same time, it should be recognized that, while being a force for good, the Internet has also come to play an important—and, in many ways, unique—role in radicalizing homegrown and domestic terrorists. Supporters of Al Qaeda, Sovereign Citizens, white supremacists and neo-Nazis, environmental and animal liberationists, and other violent extremist groups all have embraced the Internet with great enthusiasm and vigor. They are using it as a platform to spread their ideas, connect with each other, make new recruits, and incite illegal and violent actions. We believe that this trend will continue and that future terrorist attacks against the United States and its interests will involve individuals who have been radicalized—at least in part—on the Internet. As a result, countering online radicalization should continue to be a major priority for the government and its Countering Violent Extremism (CVE) efforts. The purpose of this report is to equip policy makers with a better understanding of how the Internet facilitates radicalization, in particular within the United States; an appreciation of the dilemmas and trade-offs that are involved in countering online radicalization within the United States; and ideas and best practices for making the emerging approach and strategy richer and more effective

Washington, DC: Bipartisan Policy Center’s National Security Preparedness Group (NSPG). 2012. 56p.

Preventing Violent Radicalization in America

By Peter Neumann

Last September, we released a report, Assessing the Terrorist Threat, on the evolving nature of this threat to the United States. We concluded that the U.S. government had not adequately addressed the radicalization of homegrown terrorists. We set forth several pressing policy questions, including the fundamental question of who within the government is responsible for identifying radicalization and interdicting attempts at recruitment. This report seeks to answer those questions and provide concrete policy recommendations for a counter-radicalization strategy – the elements of which should be implemented not just by the federal government, but by state and local officials and community organizations.

Washington, DC: Bipartisan Policy Center’s National Security Preparedness Group (NSPG), 2011. 56p.

Alternative Approaches to Transforming Violent Extremism: The Case of Islamic Peace and Interreligious Peacebuilding

By Mohammed Abu-Nimer

The emergence of “violent extremism” (VE)2 as a central framework and priority adopted by most Western and non-Western government agencies. It has become the primary lens through which to describe many of their activities, especially in conflict areas around the world, even when the issues are not or are only remotely related. There is no doubt that VE narratives, especially those promoting violence in the name of Islam spread by groups such as Al-Qaeda, Al-Shabab, Taliban and Daesh, have gained strength and visibility in the last two decades (regardless of the differences in the groups’ motivation or type of justification – be it nationalism, anti-Western intervention or religion). However, it is an overstatement to solely explain the motivation for endorsing or adopting VE in Muslim societies as a result of theological factors; as explained below, there are many other factors besides religious identity and theological reasoning contributing to the phenomenon. Nevertheless, it is possible to trace historical factors that led to the creation of such groups in predominantly Muslim countries. In Afghanistan, for example, one such factor is rooted in the Cold War dynamics between the United States (US) and the USSR at the time of the Soviet invasion of Afghanistan in 1979. To fight communism, the US government mobilised local Afghan communities, which included some fighters who subsequently employed extreme Islamic religious narratives. The US’s fervent desire to prevent the spread of communism thus led to the arming of members of Afghan society who later utilised the concept of jihad against non-believers in certain Sunni interpretations.

Berlin: Berghof Foundation, 2018. 21p.

Transformative Approaches to Violent Extremism

Edited by Beatrix Austin and Hans J. Giessmann

Is the topic of violent extremism slowly turning into one on which everything has already been said, but not yet by everyone, as Karl Valentin used to wryly remark? We do not think so. While violent extremism (VE) has indeed emerged as a new buzzword and a strong funding trend over the past few years, effective strategies for addressing the phenomenon are still being forged and need to be reviewed and tested. Violent extremism’s manifestations range widely: from foreign fighters via terrorist attacks to increasingly public violence-condoning ideology and rhetoric of both secular and religious provenance. How to deal with violent extremism, and its protagonists, is therefore also becoming a major challenge for peacebuilders and conflict transformation practitioners. What specific advantages can a “transformative lens” bring – one which applies insights and learning from the peacebuilding and conflict transformation fields?

Berlin: Berghof Foundation, 2019. 98p.

Networked Radicalization: A Counter-Strategy

By F. Cilluffo, G.B. Saathoff, et. al

Savvy use of the Internet has empowered terror networks to expand their reach beyond national borders by enabling wide distribution of a compelling message and social connectivity with new audiences. Use of computer-mediated communication (CMC) has made a range of terrorist operational activities cheaper, faster, and more secure, including communications, fundraising, planning and coordination, training, information gathering and data mining, propaganda and misinformation dissemination, and radicalization and recruitment. The list is long, and not even complete. Before the Internet, terrorists seeking to communicate with one another through electronic means used telephones or radios, which could be tapped. Terrorists seeking to offer training meant congregating trainers and trainees in a fixed training location, exposing the group to capture or worse. Terrorists or their supporters engaged in fundraising or recruitment often pursued these aims in public settings. And terrorists researching a potential target often did so at public libraries and bookstores, subjecting them to surveillance in these public spaces. Now, with the Internet, all of these same activities can be conducted in relative anonymity from safe locations across the globe.

Washington, DC: Homeland Security Policy Institute, The George Washington University; Charlottesville, VA: The Critical Incident Analysis Group (CIAG) University of Virginia School of Medicine, 2007. 34p.

Domestic Terrorism: An Overview

By Jerome P. Bjelopera

The emphasis of counterterrorism policy in the United States since Al Qaeda’s attacks of September 11, 2001 (9/11) has been on jihadist terrorism. However, in the last decade, domestic terrorists—people who commit crimes within the homeland and draw inspiration from U.S.-based extremist ideologies and movements—have killed American citizens and damaged property across the country. Not all of these criminals have been prosecuted under federal terrorism statutes, which does not imply that domestic terrorists are taken any less seriously than other terrorists. The Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) do not officially designate domestic terrorist organizations, but they have openly delineated domestic terrorist “threats.” These include individuals who commit crimes in the name of ideologies supporting animal rights, environmental rights, anarchism, white supremacy, anti-government ideals, black separatism, and beliefs about abortion

Washington, DC: Congressional Research Service, 2017. 62p.