Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in violence and oppression
"This Is War": Examining Military Experience Among the Capitol Hill Siege Participants

By Daniel Milton and Andrew Mines

The issue of extremism in the military community has posed challenges for a long time. From the role of combat veterans in driving the rise of the militia movement after Vietnam and beyond, the U.S. military has contended with all manner of extremist movements and ideologies. Historically, extremist activities manifested in a number of ways, including attacks andor hate crimes against fellow service members and civilians, theft of military equipment, security breaches, and broader harm to morale, unit cohesion, personnel retention, recruiting efforts, and mission success. Although the vast majority of U.S. Department of Defense DoD personnel 5and veterans uphold our nations highest values during and well after their service, the worlds largest employer has struggled at times to confront a problem that affects all corners of American society. In the past decade, various organizations have raised serious red flags to both the DoD and Congressional oversight bodies regarding this looming threat. More recent reporting has pointed to growing evidence of white supremacy and racist ideologies in the military these last few years. Additionally, the siege on the U.S. Capitol and the surrounding focus on the involvement of individuals with military experience has highlighted the pressing need to take meaningful steps to understand and confront the problem at hand. To be clear, the Capitol Hill siege does not provide an all-encompassing view of modern day extremism in the military. However, an examination of the individuals charged in connection with that event can offer some perspective as to the diversity and scale of the connection between extremism and those with military experience.

Washington DC: Program on Extremism, George Washington University, West Point, NY: Combating Terrorism Center, West Point, New York: 2021. 44p.

United States: Domestic violent extremism on the rise

By Piotr Bąkowski

n recent years, the United States (US) has witnessed a growing number of terrorist attacks by domestic violent extremists. Many incidents at large-scale demonstrations across the country have increased the visibility of the problem and provoked strong reactions among civilians, law enforcement and policy-makers alike. When on 6 January 2021 a crowd of supporters of the then US President, Donald Trump, broke into the US Capitol while Congress was certifying the results of the 2020 presidential election, the issue of domestic violent extremism was thrust beyond US borders and into the international spotlight. Various US government agencies have consistently assessed domestic violent extremism as a significant threat. Although for counter-terrorism purposes extremists fall under a number of categories of a general nature, the threat they pose has become more decentralised and diverse over time. That said, racially and ethnically motivated violent extremists have been responsible for the most lethal acts of violence. After 11 September 2001, the focus of US counter-terrorism efforts shifted to international from domestic terrorism. US law does define domestic terrorism but does not qualify it as a criminal offence entailing indictment. Domestic extremist groups cannot be designated as terrorist organisations, and getting clearance to conduct investigations against them is more complicated than for their foreign counterparts. The assault on the Capitol led to a significant shift in counter-terrorism priorities, however, triggering the largest-scale investigation in US law enforcement history thus far, but also a comprehensive overhaul of government policies. Consequently, 2021 saw the adoption of the first national strategy specifically dedicated to domestic terrorism. The mutual commitment of the US and the European Union (EU) to combating violent extremism has resulted in fruitful exchanges among policy-makers, researchers and frontline practitioners. Nonetheless, efforts to establish a unified regulatory framework for addressing online extremist content have faced challenges due to differing perspectives on key issues such as the limits of free speech and government intervention.

Brussels, Belgium: EPRS | European Parliamentary Research Service, 2023. 12p.

“DIGITAL SOLDIERS” QAnon Extremists Exploit U.S. Military, Threaten Democracy

By Elizabeth Yates and Erin E. Wilson

This report examines how the QAnon movement exploits the U.S. military’s credibility in society to further its aim of undermining American democracy. It shows how 25 U.S. military veterans – all of whom have been engaged in the QAnon movement since the failed insurrection on January 6, 2021 – spread disinformation and build support for the movement. Analysis of their social media, along with a broader review of QAnon content, reveals how Q influencers portray the U.S. military as a heroic protagonist in their conspiratorial propaganda, and how they exploit military veterans to legitimate such claims and even recruit. It concludes with policy recommendations that focus on protecting members of the armed services, those who have served and their families, and communities the movement targets with its conspiracies

The mainstreaming of the QAnon extremist movement presents a growing threat to the American system of government. QAnon’s effort to create the perception that they are allied with the U.S. military has particularly alarming implications for our democracy:  It strengthens the QAnon movement by facilitating recruitment from both military and civilian communities and encourages active participation among adherents;  It lends legitimacy to discriminatory and anti-democratic conspiracies that are integrated into the Q movement, such as antisemitism and election denial;  It distorts the public’s understanding of the primary responsibilities of the military, and, importantly, the legal boundaries of domestic military intervention;  It undermines public faith in democratic institutions by regularly encouraging the acceptance of authoritarian actions; and  It threatens the communities the movement targets with its conspiracies and maligns the reputation of U.S. servicemembers, veterans, and their families.

New York: Human Rights First, 2022. 20p.

A Dangerous Web: Mapping Racially and Ethnically Motivated Violent Extremism

by Heather J. Williams, Luke J. Matthews, Pauline Moore, Matthew A. DeNardo, James V. Marrone, Brian A. Jackson, William Marcellino, Todd C. Helmus

Racially and Ethnically Motivated Violent Extremism: The Basics

Racially and ethnically motivated violent extremism (REMVE) refers to a loosely organized movement of individuals and groups that espouse some combination of racist, anti-Semitic, xenophobic, Islamophobic, misogynistic, and homophobic ideology. REMVE actors see their race or ethnicity under threat and promote the use of or engage in violence against a given population group. The majority of REMVE actors are motivated by cultural nationalism or White supremacy—beliefs that Caucasian or "Aryan" peoples represent superior races, and that "White culture" is superior to other cultures. Many REMVE actors also are motivated by White nationalism, which overlaps with White supremacy: Adherents espouse the belief that the White race is superior to others, and White nationalism emphasizes defining a country or region by White racial identity and promoting the interests of White people exclusively and at the expense of non-White populations.

More-common terms related to REMVE include far-right extremism, right-wing terrorism, radical right, or extreme right, which are used more frequently in literature and by other countries. Although these terms are not synonymous, they are used somewhat interchangeably and often without precise definitions. These terms also can be applied to political parties and movements that participate in political systems and do not engage in violence directly, particularly in Europe, where many parliamentary systems have formal far-right parties that participate in elections.

The U.S. State Department commissioned the RAND Corporation to produce a comprehensive network analysis of the White Identity Terrorist Movement (WITM) and REMVE in response to a congressional requirement from the 2021 National Defense Authorization Act.[2] The analysis—which sought to identify key actors, organizations, and supporting infrastructure and the relationships and interactions between them—is intended to inform a U.S. government strategy to counter REMVE.

Rand. 2022. 8p.

The Online Extremist Ecosystem: Its Evolution and a Framework for Separating Extreme from Mainstream

by Heather J. Williams, Alexandra T. Evans, Jamie Ryan, Erik E. Mueller, Bryce Downing

n this Perspective, the authors introduce a framework for internet users to categorize the virtual platforms they use and to understand the likelihood that they may encounter extreme content online.

The authors first provide a landscape of the online extremist "ecosystem," describing how the proliferation of messaging forums, social media networks, and other virtual community platforms has coincided with an increase in extremist online activity. Next, they present a framework to describe and categorize the platforms that host varying amounts of extreme content as mainstream, fringe, or niche. Mainstream platforms are those for which only a small portion of the content would be considered inappropriate or extreme speech. Fringe platforms are those that host a mix of mainstream and extreme content—and where a user might readily come across extreme content that is coded or obscured to disguise its violent or racist underpinning. Niche platforms are those that openly and purposefully cater to an extreme audience.

Santa Monica, CA: RAND, 2021. 44p.

Mapping White Identity Terrorism and Racially or Ethnically Motivated Violent Extremism: A Social Network Analysis of Online Activity

by Heather J. Williams, Luke J. Matthews, Pauline Moore, Matthew A. DeNardo, James V. Marrone, Brian A. Jackson, William Marcellino, Todd C. Helmus

Racially or ethnically motivated violent extremism (REMVE) and extremists (REMVEs) present some of the most pressing threats to the United States. REMVE also has been identified as the White identity terrorist movement (WITM). REMVEs are among the most lethal domestic violent extremists, and they are the most likely to commit mass-casualty attacks. These movements are characterized by a broad ideological orientation toward xenophobic, anti-Semitic, racist, and misogynistic sentiment.

For this report, the authors reviewed the relevant literature on REMVE networks and collected and analyzed social media data from six social networks (Twitter, Reddit, Gab, Ruqqus, Telegram, and Stormfront) to produce a global network map of the digital REMVE space. That network map evaluates each network's construction, connectivity, geographic location, references to prominent organizations, and proclivity to violence. The authors also reviewed ten countries' experiences with REMVE to sketch out an understanding of the REMVE space in these countries and how REMVEs in those countries relate to those in the United States.

Key Findings

The WITM/REMVE global network on social media is largely created and fueled by users in the United States

  • WITM/REMVE is fueled by U.S. domestic drivers, and this movement is less of an issue in other countries.

  • Programs to counter violent extremism are generally most productive when they are local.

  • The primary need is for robust national strategies to counter WITM/REMVE, specifically in the United States.

An organization- or actor-focused counter-WITM/REMVE strategy likely will not work because of the diffuse nature of REMVE movements

  • REMVE is a post-organizational movement; many REMVEs are radicalized outside an organized group and groups are loosely organized, meaning that U.S. strategy to counter REMVE should not be centered around key organizations and actors.

Intervention strategies should be multifaceted because of the complex nature of the problem and its intersections with protected civil rights

  • The scale of REMVE and the depth of its ideological roots in the United States suggest that targeting and ostracizing sympathizers would not be a successful intervention strategy.

There are structural differences in how REMVE manifests and is countered in Europe versus in the United States

  • The parliamentary system in many European countries gives those on the far right a presence in the political system, which provides a nonviolent outlet for fringe-movement adherents. Many European countries also have active intervention and counter-REMVE programs underway.

Racially or ethnically motivated violent extremism (REMVE) and extremists (REMVEs) present some of the most pressing threats to the United States. REMVE also has been identified as the White identity terrorist movement (WITM). REMVEs are among the most lethal domestic violent extremists, and they are the most likely to commit mass-casualty attacks. These movements are characterized by a broad ideological orientation toward xenophobic, anti-Semitic, racist, and misogynistic sentiment.

For this report, the authors reviewed the relevant literature on REMVE networks and collected and analyzed social media data from six social networks (Twitter, Reddit, Gab, Ruqqus, Telegram, and Stormfront) to produce a global network map of the digital REMVE space. That network map evaluates each network's construction, connectivity, geographic location, references to prominent organizations, and proclivity to violence. The authors also reviewed ten countries' experiences with REMVE to sketch out an understanding of the REMVE space in these countries and how REMVEs in those countries relate to those in the United States.

Key Findings

The WITM/REMVE global network on social media is largely created and fueled by users in the United States

  • WITM/REMVE is fueled by U.S. domestic drivers, and this movement is less of an issue in other countries.

  • Programs to counter violent extremism are generally most productive when they are local.

  • The primary need is for robust national strategies to counter WITM/REMVE, specifically in the United States.

An organization- or actor-focused counter-WITM/REMVE strategy likely will not work because of the diffuse nature of REMVE movements

  • REMVE is a post-organizational movement; many REMVEs are radicalized outside an organized group and groups are loosely organized, meaning that U.S. strategy to counter REMVE should not be centered around key organizations and actors.

Intervention strategies should be multifaceted because of the complex nature of the problem and its intersections with protected civil rights

  • The scale of REMVE and the depth of its ideological roots in the United States suggest that targeting and ostracizing sympathizers would not be a successful intervention strategy.

There are structural differences in how REMVE manifests and is countered in Europe versus in the United States

  • The parliamentary system in many European countries gives those on the far right a presence in the political system, which provides a nonviolent outlet for fringe-movement adherents. Many European countries also have active intervention and counter-REMVE programs underway.

Santa Monica, CA: RAND, 2022. 184p.

The Domestic Extremist Next Door: How Digital Platforms Enable the War Against American Government

By The Digital Citizens Alliance

Digital platforms enabled the disturbing rise of domestic extremism, culminating with the January 6 attack on the U.S. Capitol. Militia groups use social media networks to plan operations, recruit new members and spread anti-democracy propaganda, a new Digital Citizens Alliance (Digital Citizens) and Coalition for a Safer Web (CSW) investigation has found.

Taking a page from Jihadists, these extremist groups operate along the fringes of where platforms such as YouTube, Twitter, Facebook, and Instagram will let them. Federal prosecutors investigating the Capitol riot revealed how militia groups used social media platforms to coordinate and prepare for possible conflict with Antifa. But the joint Digital Citizens / CSW investigation found the use of platforms goes well beyond tactical planning. Militias rely on the platforms to share their beliefs and ideology and recruit new members. The militias get a boost from their ideological simpatico with mis/disinformation groups like QAnon, which provides oxygen that militias use to fan the flames.

The anti-government militia movement first emerged after the 1992 Ruby Ridge standoff, the 1993 Waco siege, and the Oklahoma City Bombing on April 19, 1995. After Oklahoma City, U.S. law enforcement cracked down on domestic terrorism and the militia movement. In 1996, the Southern Poverty Law Center (SPLC) reported 858 militia groups with up to 50,000 active members. The 9/11 terrorist attacks shifted focus to global threats and led to a dormant period for militias. But domestic extremists such as the Proud Boys, the Boogaloo Bois, the Three Percenters, and the Oath Keepers have reinvigorated the movement – aided in large part by digital platforms. In 2020, according to research by The Washington Post, the number of domestic terrorism incidents in the United States had doubled from what it was in 1995. But the joint Digital Citizens / CSW investigation found the use of platforms goes well beyond tactical planning. Militias rely on the platforms to share their beliefs and ideology and recruit new members. The militias get a boost from their ideological simpatico with mis/disinformation groups like QAnon, which provides oxygen that militias use to fan the flames.

The anti-government militia movement first emerged after the 1992 Ruby Ridge standoff, the 1993 Waco siege, and the Oklahoma City Bombing on April 19, 1995. After Oklahoma City, U.S. law enforcement cracked down on domestic terrorism and the militia movement. In 1996, the Southern Poverty Law Center (SPLC) reported 858 militia groups with up to 50,000 active members. The 9/11 terrorist attacks shifted focus to global threats and led to a dormant period for militias. But domestic extremists such as the Proud Boys, the Boogaloo Bois, the Three Percenters, and the Oath Keepers have reinvigorated the movement – aided in large part by digital platforms. In 2020, according to research by The Washington Post, the number of domestic terrorism incidents in the United States had doubled from what it was in 1995.

Washington, DC: Digital Citizens Alliance, 2021. 56p.

The Role of Translation in ISIS Propaganda:: International Online Radicalization Methods and Its Effect on Extremism in Indonesia

By Hanny Purnama Sari and Muhammad Syauqillah

This research aims to compile data and information that will contribute to understanding the online radicalization phenomenon through translation. There are many studies on using the internet and propaganda in a terrorism context. However, only a handful studied the correlation between translation and terrorism propaganda, especially in Indonesia. There was little discussion on the role of translation in bridging communication between different nations, cultures, and languages and using it to propagate radical/propaganda narratives worldwide and amplify those messages to its target audience. The research method is descriptive qualitative using primary and secondary data; the sample is taken from the book of Nadharat Fi Al Ijma' Al Qath'i and previous findings and news. This research revealed at least ten roles of translation in the online radicalization phenomenon; among others, translation in the target language can be used to identify the target audience of the propagandist, and many terrorist sympathizers were willing to volunteer to translate the propaganda. However, although the translation is used to leverage the spread of propaganda, it can also assist law enforcement officers in combating terrorist/propaganda narratives. Indonesian law enforcement officers may use translation to counter-terrorism as Indonesia has hundreds of vernacular languages that can be used to 'encrypt' and disseminate their extremist narratives.

International Journal of Science and Society, 4(4), 319-336.

Terror Times: The Depth and Breadth of the Islamic State Alternative News Outlet Ecosystem Online

By Moustafa Ayad, Nadeem Khan and Aymenn al-Tamimi

his report highlights the networks, supporters, and the platforms of Islamic State disinformation disseminators, focusing on popular social media platforms as well as encrypted messaging applications. These disinformation networks are creating self-branded media outlets with followers in the tens of thousands, and often with innocuous names like “Global Happenings,” “DRIL” and “Media Center,” to evade moderation and takedowns. These same networks use coded language and a codebook of emojis to spread Islamic State “news” to other networks of supporters, who similarly evade moderation. These ‘alternative news outlets’ are trying to outcompete narratives publicized by government officials as well as independent mainstream media and individual journalists – groups that were also heavily targeted by Islamic State.

London: IDS - Institute for Strategic Dialogue, 2022. 22p.

African Border Disorders: Addressing Transnational Extremist Organizations

Edited By Olivier J. Walther, William F.S. Miles

Since the end of the Cold War, the monopoly of legitimate organized force of many African states has been eroded by a mix of rebel groups, violent extremist organizations, and self-defence militias created in response to the rise in organized violence on the continent. African Border Disorders explores the complex relationships that bind states, transnational rebels and extremist organizations, and borders on the African continent. Combining cutting edge network science with geographical analysis, the first part of the book highlights how the fluid alliances and conflicts between rebels, violent extremist organizations and states shape in large measure regional patterns of violence in Africa. The second part of the book examines the spread of Islamist violence around Lake Chad through the lens of the violent Nigerian Islamist group Boko Haram, which has evolved from a nationally-oriented militia group, to an internationally networked organization. The third part of the book explores how violent extremist organizations conceptualize state boundaries and territory and, reciprocally, how do the civil society and the state respond to the rise of transnational organizations. The book will be essential reading for all students and specialists of African politics and security studies, particularly those specializing on fragile states, sovereignty, new wars, and borders as well as governments and international organizations involved in conflict prevention and early intervention in the region.

London: Routledge, 2018. 230p

Buying and Selling Extremism: New funding opportunities in the right-wing extremist online ecosystem

By Ariel Bogle

As mainstream social media companies have increased their scrutiny and moderation of right-wing extremist (RWE) content and groups,1 there’s been a move to alternative online content platforms.2 There’s also growing concern about right-wing extremism in Australia,3 and about how this shift has diversified the mechanisms used to fundraise by RWE entities.4 This phenomenon isn’t well understood in Australia, despite the Australian Security Intelligence Organisation (ASIO) advising in March 2021 that ‘ideological extremism’5 now makes up around 40% of its priority counterterrorism caseload.6 Research by ASPI’s International Cyber Policy Centre (ICPC) has found that nine Australian Telegram channels7 that share RWE content used at least 22 different funding platforms, including online monetisation tools and cryptocurrencies, to solicit, process and earn funds between 1 January 2021 and 15 July 2021. Due to the opaque nature of many online financial platforms, it’s difficult to obtain a complete picture of online fundraising, so this sample is necessarily limited. However, in this report we aim to provide a preliminary map of the online financial platforms and services that may both support and incentivise an RWE content ecosystem in Australia. Most funding platforms found in our sample have policies that explicitly prohibit the use of their services for hate speech, but we found that those policies were often unclear and not uniformly enforced. Of course, there’s debate about how to balance civil liberties with the risks posed by online communities that promote RWE ideology (and much of that activity isn’t illegal), but a better understanding of online funding mechanisms is necessary, given the growing concern about the role online propaganda may play in inspiring acts of violence8 as well as the risk that, like other social divisions, such channels and movements could be exploited by adversaries.9 The fundraising facilitated by these platforms not only has the potential to grow the resources of groups and individuals linked to right-wing extremism, but it’s also likely to be a means of building the RWE community both within Australia and with overseas groups and a vector for spreading RWE propaganda through the engagement inherent in fundraising efforts. The funding platforms mirror those used by RWE figures overseas, and funding requests were boosted by foreign actors, continuing Australian RWEs’ history of ‘meaningful international exchange’ with overseas counterparts.

Barton, ACT: The Australian Strategic Policy Institute Limited, International Cyber Policy Centre 2021.36p.

Out, Out - The Role of Messaging in Countering Domestic Violent Extremism

By Kathryn M. Roberts

Countering the radical Islamist narrative remains a high-profile priority of the United States in its ongoing efforts to counter domestic violent extremism. Since mid-2014, government officials have condemned the United States as unable to muster a satisfactory counter-narrative, and emphasize the potentially devastating consequences of failure. Experts inside and outside the government describe the Islamic State as masters of the internet capable of reaching into the United States and turning its people into hate-filled, violently inspired terrorists at will. The idea that the United States must aggressively work to counter these messages domestically remains a given but should it The focus of this thesis is to examine current U.S. efforts in counter-messaging to determine why the United States believes it is failing, and what, if any, evidence supports the idea that a counter-narrative or counter-messaging should be part of domestic countering violent extremism CVE programs. Review of official documents found little basis to assess U.S. programs, as no meaningful published strategy, objectives, or performance data exist for current efforts. Moreover, the foundational assumptions underlying current programs suggest malalignment between what U.S. officials desire a counter-messaging effort to accomplish and what is realistically achievable. Based on these findings, it is recommended that domestic CVE programs eliminate counter-messaging from their portfolio.

Monterey, CA: Naval Postgraduate School, 2020. 119p,

Counter Terrorism Joint Inspection – National security division and multi-agency arrangements for the management of terrorist offenders in the wake of terrorist attacks

By HM Inspectorate of Probation, Inspectorate of Constabulary and Fire & Rescue Services and HM Inspectorate of Prisons (UK)

His Majesty’s Inspectorate of Probation has led an inspection, alongside HM Inspectorate of Constabulary, Fire & Rescue Services (HMICFRS), and HM Inspectorate of Prisons – looking at the work of the Probation Service’s National Security Division (NSD) and multi-agency arrangements for the management of terrorist offenders in the wake of terrorist attacks.

In response to terrorist attacks in 2019 and 2020, by known terrorist offenders who were subject to licence supervision, the NSD was created as a separate division of the Probation Service, working alongside police Counter Terrorism Nominal Management (CTNM) arrangements. Together with existing prison and probation services, these bodies are responsible for managing those convicted of terrorist offences or suspected of potential terrorist activity, even if they have no related convictions.

What we found

  • This inspection looked at the management and progress of the strategy to supervise these offenders. It found:

  • NSD, probation, police and prison services worked well together and are approaching managing counter terrorism cases collectively

  • supervision within the community was robust overall, balancing rehabilitative needs with tight risk management

  • probation practitioners within NSD were well trained specialist officers, holding a small and restricted caseload, delivering high quality case assessment and supervision

  • terrorist offenders were subject to additional oversight throughout their sentences

  • the arrangements to protect others from harm from terrorist cases in custody were effective

  • there has been significant financial investment to improve services dealing with counter terrorism, and staffing levels were appropriate

  • prison governors and directors were clear about the terrorist risk posed in their prisons and were actively managing this

  • leadership across the NSD and CTNM was strong, and there were clear lines of accountability, enhanced by national multi-agency governance arrangements.

Manchester: His Majesty’s Inspectorate of Probation, 2023. 65p.

Civilian Counterterrorism Forces and the Fight Against Extremism: A Review of Nigeria, Somalia, and Burkina Faso

By Riza Kumar

Protracted insurgencies and the growing threat by local affiliates of the global terrorism networks of al-Qaeda and the Islamic State (ISIS) throughout Nigeria, Somalia, and Burkina Faso have transformed on-the-ground responses to violent extremism throughout Sub-Saharan Africa. Somalia continues to grapple with the unrelenting force of the al-Qaeda affiliated al-Shabaab; Burkina Faso contends with al-Qaeda in the Islamic Maghreb (AQIM), Jama’at Nusrat al-Islam wal Muslimeen (JNIM), ISIS in the Greater Sahara (ISGS), and Ansarul Islam; and Nigeria remains encumbered by Boko Haram’s 14-year insurgency and the increasingly violent Islamic State West Africa Province (ISWAP). As serious and sustained militant and terrorist movements continue to kill thousands and displace millions, the three respective governments have altered their responses to violent extremists and terrorism, integrating civilian-led, community-based security strategies into their national counterterrorism programs. National armies and their international partners have offered some reprieve from enduring violent conflicts, but in many cases have failed to offer comprehensive protections to all civilians. Civilian counterterrorism militias emerged to provide security to vulnerable communities and were quickly recognized as an alternative to state-sponsored counterinsurgency campaigns. However, once these counterterrorism militias were enlisted and absorbed into the national security apparatus, new—albeit long-established—challenges quickly emerged. Localized counterterrorism campaigns have at times devolved into vengeful operations against ethnic rivals as well as opportunities to carry out illicit activities such as extortion, drug trafficking, and looting. The benefits and drawbacks of civilian counterterrorism militias remain consistent across different regions. The strategy is cost-effective and practical as civilian defense forces are often cheaper than formal security units, such as the national army and the police. There is a ready pool of potential local recruits to safeguard vulnerable communities, and they are knowledgeable about the communities they protect. Most importantly, civilian troops establish a level of community loyalty that can be difficult to achieve with national armies. Significant drawbacks of civilian forces are that troops can become unreliable and difficult to control if not properly managed. Furthermore, without strong and effective oversight mechanisms, civilian troops are capable of undermining government authority, rule of law, and governance. Unfortunately, if not carefully executed, civilian forces could deteriorate into armed criminal networks,1 transforming from vanguards of safety into long-term sources of instability and insecurity.

Berlin: Counter Extremism Project, 2023. 24p.

Understanding Conspiracist Radicalisation: QAnon’s Mobilisation to Violence

By Anna Kruglova

This policy brief analyses the phenomenon of conspiracy theories, and how they fit in the realm of research on violent extremism. Using the case study of QAnon, this Policy Brief looks at how the movement mobilises people to violence on social media and attempts to determine how different this process is from any other process of radicalisation to violence. By combining discourse analysis of the movement’s Gab posts, interviewing former supporters, and analysing three illustrative case studies, this Policy Brief identifies five discourses - such as revenge, “the Other”, chosenness/ specialness, apocalypse, and urgency for action and altruism - that are used to bring people into the violent mindset. It emphasises the similarity of these discourses to the ones used by other extremist organisations and argues against exceptionalising the threat of QAnon and other conspiracy theories. It concludes by making recommendations about how to tackle QAnon propaganda.

The Hague: International Centre for Counter-Terrorism (ICCT) , 2023. 22p.

Deadly Detours: Why Terrorists Do Not Attack US Bridges and Tunnels

By Benjamin V. Allison

Given the potential economic, psychological, and human consequences of such attacks, it seems terrorists would attack US bridges and tunnels regularly. After all, terrorists have attacked such critical infrastructure in other countries; why not in the United States? Shockingly, while there has been some discussion of the risk of such attacks, there is a lack of research addressing why they have not happened. Using foiled plots as case studies, I present several major explanations as to why these plots fail—and, more importantly, what deters terrorists from pursuing them. These include counter-terrorism measures, perceived structural soundness and target hardness, expense, and terrorist preference for high body counts.

The Hague: International Centre for Counter-Terrorism, 2022. 35p.

Interlinkage of terrorism and transnational organized crime in West Africa

By Theo Clement | Hans-Jakob Schindler

The nexus between terrorist and transnational organized crime (TOC) networks in West Africa presents one of the most significant security challenges. Both networks undermine governance and the rule of law and cooperate on a multitude of levels in a complex web of mutual beneficial arrangements. Therefore, this nexus presents a mutually enforcing mechanism that supports and accelerates regional destabilization. This paper argues that the risks emanating from this cooperation are not limited to terrorism financing alone as terrorist groups also use their cooperation with TOC networks to gain access to resources needed for their activities, such as arms and ammunition. Finally, such cooperation also allows terrorist groups to carve out spaces that allow them to control the local population while at the same time provide security for local licit and illicit economic activities. Therefore, this cooperation is in some cases also a tool through which terrorist groups can gain support and acceptance among the local population. Therefore, tackling this nexus must involve both the regaining of territorial control from terrorist groups by the respective governments as well as the strengthening of governance structures. Both aims should also be attempted concurrently. This paper presents a range of recommendations for German and European decision-makers that primarily aim to disrupt the entry as well as exit points of the flows of illicit goods of the region. Given the current challenges European and German projects face when cooperating with some of the governments in the region, an emphasis on increasing regional cooperation in West Africa seems advisable. In particular, the paper suggests strengthening national and regional law enforcement and border control capabilities, especially within the coastal states of the Gulf of Guinea. Increased cooperation with the Intergovernmental Action Group Against Money Laundering in West Africa (GIABA), increased support to strengthen the management and control mechanisms for national parks, and intensified exchange mechanisms, such as the West Africa Police Chief Committee (WAPCC) of Economic Community of West African States (ECOWAS), could be contemplated. In addition, German and European decision-makers could encourage and support governments in the region in their efforts to intensify the use of existing regional mechanisms such as the ECOWAS sanctions mechanism, as well as increase the participation of regional states in the United Nations Office on Drugs and Crime (UNODC)-World Customs Organization (WCO) Container Control Program and INTERPOL’s West African Police Information System (WAPIS) as possible priorities.

Berlin: Counter Extremism Project Germany GmbH ,2023. 16p

Linkages of terrorist groups in West Africa with terrorist networks in other African regions

By Dele-Adedeji | Sofia Koller

This policy paper summarizes the current state of affairs regarding the linkages of terrorist groups in West Africa with terrorist networks in other African regions. It also provides recommendations for policymakers and security agencies. The paper looks at linkages of JNIM, IS West Africa Province (ISWAP), and IS in the Greater Sahara (ISGS) with terrorist groups in North, West-Central, Eastern, and Southern Africa. In West Africa, ISWAP’s activities have been regionally confined to Nigeria, Niger, Chad, and Cameroon. There is no indication that ISWAP intends to expand its territorial base beyond these countries or that it has any transregional linkage with terrorist groups in other parts of Africa. JNIM and ISGS have demonstrated that they possess the intention and capability of regional expansion across West Africa. Increasing attacks further southwards in West Africa and their presence in the neighboring regions of Ivory Coast, Ghana, Togo, and Benin suggests that both groups intend to expand their geographical zone of influence to the Gulf of Guinea. There is, however, no indication of either JNIM or ISGS forming a transregional linkage with terrorist groups in other African sub-regions. ● In North, West-Central, East, and Southern Africa, there are also currently no indications that terrorist groups have developed linkages with other terrorist networks beyond their own region. ● Terrorist groups in West Africa are pragmatic in their approach to collaborations. Their choice of network linkages is guided by local dynamics and their own particular agenda rather than ideology. Hence, existing linkages are driven by the involvement in transnational organized crime (TNCO), potential financial gains as well as the potential of financing terrorism via local and international sources, training of fighters, foreign terrorist fighters from other African countries, and weapons smuggling and use of small arms and light weapons (SALWs).

Berlin: Counter Extremism Project Germany GmbH ,2023. 16p.

The Political Economy of Terrorism, Counterterrorism, and the War on Terror

By Anne R. Bradley , Christopher J. Coyne and Abigail R. Hall

Abstract: This Element explores the topics of terrorism, counterterrorism, and the US government’s war on terror following the September 11, 2001 terror attacks. It draws on insights from Austrian and public choice economics. First, it discusses the foundations of the economics of terrorism, emphasizing that the behaviors of terrorists and counterterrorists are purposeful and goal-oriented. It then considers the economics of counterterrorism policies and the importance of institutional change for reducing demand for terrorism. Next, it focuses on three dilemmas facing liberal societies in relation to counterterrorism efforts. The Element then provides an assessment of the US government’s war on terror. It discusses the origins of the war, whether it can be judged a success or a failure, and some of the main effects both abroad and within the United States. The Element concludes by putting forward several areas for future research.

NY. Cambridge University Press. 2023. 85p.

Terrorism and Immigration: A Risk Analysis, 1975-2022

By Nowrasteh, Alex

From the document: "Terrorism is a hazard to human life and material prosperity that should be addressed in a sensible manner whereby the benefits of actions taken to contain it outweigh the costs. A total of 219 foreign-born terrorists were responsible for 3,046 murders on U.S. soil from 1975 through the end of 2022. The chance of a person perishing in a terrorist attack committed by a foreigner on U.S. soil over the 48-year period studied here is 1 in 4.3 million per year. The hazard posed by foreigners who entered on different visa categories varies considerably. For instance, the annual chance of an American being murdered in a terrorist attack by a refugee is about 1 in 3.3 billion, while the annual chance of being murdered in an attack committed by an illegal immigrant is zero. Looking at this spectrum of risk, any government response to terrorism must consider the wide range of hazards posed by foreign-born terrorists who entered under various visa categories. There were 219 foreign-born terrorists who planned, attempted, or carried out attacks on U.S. soil from 1975 through 2022. Of those, 67 percent were Islamists, 16 percent were foreign nationalists, 6 percent were right-wing extremists, 5 percent were non-Islamic religious terrorists, 4 percent were left-wing extremists, and the rest were separatists, adherents of other or unknown ideologies, or targeted worshippers of specific religions. The federal government has an important role in screening all foreigners who enter the United States and excluding those who pose a threat to the national security, safety, or health of Americans, as foreign-born terrorists explicitly do. This focused terrorism risk analysis can aid in the efficient allocation of scarce government-security resources to best counter the small threat of foreign-born terrorists."

CATO Policy Analysis No. 958. 2023.