Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in violence and oppression
Governing “Ungoverned Spaces” in the Foliage of Conspiracy: Toward (Re)ordering Terrorism, from Boko Haram Insurgency, Fulani Militancy to Banditry in Northern Nigeria

By: John Sunday Ojo

This article explores the dominant narrative of ill-governed or ungoverned territories in the northern region of Nigeria where informality and socioeconomic deficit fashioned the mannerism of everyday life. Reconnoitering ungoverned territories, positing that radical jihadist and non-jihadist movements and criminal-armed groups are ideologically driven by localism and informal networks, particularly in the areas unkempt by the state. The paper interrogates to what extent ungoverned spaces embolden the recruitment of criminal and terrorist groups in northern Nigeria. It explains the complex security paradoxes confronting the Nigerian state, it analyses the Boko Haram insurgency, Fulani militancy and banditry within the context of ungoverned spaces that continuously breed terrorist organizations, and criminal networks, that pose an enormous risk to human security. It adopts a qualitative approach and spatial network analysis using Geographical Information System (GIS). The paper argues that the primordial negligence of ungoverned areas with limited state surveillance or unharmonized state presence, controlled by informal networks and hybrid arrangements creates an enabling environment for warlordism, religious fanaticism and tribal self-defense forces. It further demonstrates that governance failure in these regions stimulates illegal movement of arms and ammunition, the raw material for bombs, illegal drugs and foreign machines, and becomes abodes for Boko Haram jihadist and non-Boko Haram armed groups. The paper concludes that ungoverned spaces could be morphed into a production site for Weapons of Mass Destruction (WMD) by the terrorists in the near future, thus, until the Nigerian state pays attention to the territories under-governed or poorly governed, it will become difficult to win the war against terrorism, Fulani militancy and banditry through military response. Therefore, good governance that transcends ethnic chauvinism remains a veritable weapon in conquering multilayered security quagmires facing the giant of Africa.

African Security, Volume 13, 2020 - Issue 1

Shock and awe: Military response to armed banditry and the prospects of internal security operations in Northwest Nigeria

By Folahanmi Aina, John Sunday Ojo & Samuel Oyewole

Insecurity has worsened in Northwest Nigeria, due to the threat of armed banditry, necessitating the deployments and operations of the military. While there is increasing academic attention on the origins, causes, and nature of this threat, the conduct, achievements, prospects, and challenges of the military’s counter-banditism response in the region remains understudied. Accordingly, foregrounded by the need to close this gap, this qualitative study contributes to the literature through organised empirical research by examining the conduct, achievements, prospects, and challenges of the military's Joint Task Force operation Hadarin Daji – its major internal security operation – against armed banditry in Northwest Nigeria. Data is obtained from secondary sources which include academic journal articles, books, official reports, press briefs by the military, reputable local and international news reportage. The study’s central argument holds that the nature and character of the military’s campaigns against armed banditry – a form of unconventional warfare, poses significant challenges to it as a conventional fighting force, consequentially contributing towards the conflict’s protractedness. Recalibrating the military’s readiness for and response to unconventional warfare remains critical to degrading and defeating armed banditry in Northwest Nigeria.

African Secuirty Review Volume 32, 2023 - Issue 4

Female Jihadis Facing Justice: Comparing Approaches in Europe,

Edited by Tanya Mehra, Thomas Renard and Merlina Herbach with contributions from Marc Hecker and Sofia Koller.

The involvement of women in terrorism is not new, but it has gained more attention with the rise of the Islamic State in Iraq and Syria (ISIS), which attracted many women to its so-called caliphate. Initially perceived as victims or harmless, these women progressively became a growing subject of attention and concern for security services. In 2017, the Dutch intelligence service (AIVD) already indicated that the threat emanating from female jihadis should not be underestimated, while recognising knowledge gaps about the role(s) these women played in jihadi movements or the threat they posed.1 The same year, the United Nations Security Council Resolution 2396 (2017) stressed that women who were affiliated with terrorist organisations “may have served in many different roles, including as supporters, facilitators, or perpetrators of terrorist acts” and urged states to pay special attention to this as women “require special focus when developing tailored prosecution, rehabilitation and reintegration strategies.”2 Yet, in spite of more attention from counter-terrorism services, and a growing body of literature on female terrorists, there is still a considerable lack of data-driven, empirical research on female violent extremist offenders (VEOs). This book seeks to inform practitioners and policy-makers on how to manage female VEOs through the criminal justice system in a rule of law and human rights compliant manner through four case studies in Europe.

The Hague: The International Centre for Counter-Terrorism (ICCT: 2024. 223p.

Murder & Extremism in the United States in 2023

By Anti-Defamation League

Every year, individuals with ties to different extreme causes and movements kill people in the United States; the ADL Center on Extremism (COE) tracks these murders. Extremists regularly commit murders in the service of their ideology, to further a group or gang they may belong to, or even while engaging in traditional, non-ideological criminal activities. In 2023, domestic extremists killed at least 17 people in the U.S., in seven separate incidents. This represents a sharp decrease from the 27 extremist-related murders ADL has documented for 2022—which itself was a decrease from the 35 identified in 2021. It continues a trend of fewer extremist-related killings after a five-year span of 47-79 extremist-related murders per year (2015- 2019). One reason for the trend is the decrease in recent years of extremist-related killings by domestic Islamist extremists and left-wing extremists. The 2023 murder totals include two extremist-related shootings sprees, both by white supremacists, which together accounted for 11 of the 17 deaths. A third shooting spree, also by an apparent white supremacist, wounded several people but luckily did not result in fatalities. All the extremist-related murders in 2023 were committed by right-wing extremists of various kinds, with 15 of the 17 killings involving perpetrators or accomplices with white supremacist connections. This is the second year in a row that right-wing extremists have been connected to all identified extremist-related killings. Two of the incidents from 2023 involved women playing some role in the killing or its aftermath. This report includes a special section that examines the role played by women in deadly extremist violence in the United States by analyzing 50 incidents from the past 20 years in which women were involved in some fashion in extremist-related killings. Murder & Extremism in the United States in 2023

New York: Anti-Defamation League, 2024. 36p.

ONLINE EXTREMISM AND TERRORISM RESEARCHERS’ SECURITY, SAFETY, AND RESILIENCE: FINDINGS FROM THE FIELD

Elizabeth Pearson, Joe Whittaker, Till Baaken, Sara Zeiger, Farangiz Atamuradova, and Maura Conway

“This report presents findings from the REASSURE (Researcher, Security, Safety, and Resilience) project’s in-depth interviews with 39 online extremism and terrorism researchers. Based at universities, research institutes, and think tanks in Europe and North America, the interviewees studied mainly, albeit not exclusively, far-right and violent jihadist online activity. The report catalogues for the first time the range of harms they have experienced, the lack of formalised systems of care or training, and their reliance therefore on informal support networks to mitigate those harms.”

Vox Pol. REASSURE. 2023. 138p

Moderating Extremism: The State of Online Terrorist Content Removal Policy in the United States

By Bennett Clifford

By reviewing studies of how today’s terrorist and extremist groups operate on social media in conjunction with an overview of U.S. government regulation of terrorist content online, this report finds that stricter U.S. regulation of social media providers may not be the most effective method of combating online terrorist and extremist content.

Specifically:

• Direct governmental regulations that ignore other sources of regulation on content removal policies could disrupt growing intra-industry collaboration on countering terrorist content online.

• In many regards, the U.S. government defers to and depends on the private sector to conduct counterterrorism online. Many factors contribute to this arrangement, including limits on the government’s authorities, expertise, staffpower, dexterity and political will to manage online terrorist content with the same efficacy as major social media companies.

• Attempts by other governments to strictly regulate social media companies’ terrorist content removal policies hurt small companies, created double standards and redundancies, and raised concerns about censorship and free speech.

• Proposed regulations may only affect major U.S. social media providers; smaller and non-U.S. companies may be unable, unwilling, or not required to comply. Due to the proliferation of social media platforms exploited by terrorists and extremists, platforms that may be unaffected by U.S. government regulation currently host a large proportion of terrorist content online.

• In certain regards, major social media companies’ content removal policies have more flexibility than the U.S. government to be able to account for new terrorist and extremist groups and actors and their respective tactics, techniques, and procedures online.

Washington, DC: George Washington University, Program on Extremism, 2021. 24p.

The Perilous Intersection of Amnesty and Accountability: Iraq's Legal Quandary and its Global Counterterrorism Ramifications

By Omar Mohammed

The Iraqi Parliament is poised to discuss a new amnesty bill that has generated significant controversy and debate. This legislation is intended to address the issue of wrongful detentions but raises profound ethical, judicial, and societal concerns. Advocates claim the bill will rectify unjust imprisonment, particularly in the post-ISIS era. Critics, however, argue that the bill's broad language could inadvertently release individuals affiliated with ISIS, undermining ongoing counterterrorism efforts and the pursuit of justice for victims. Complicating matters further is the recent decision by the United Nations Security Council to terminate the mandate of UNITAD, a team responsible for investigating crimes committed by ISIS. This article delves into the intricacies of the proposed bill, its implications for justice and national reconciliation, and its potential impact on counterterrorism efforts in Iraq.

Washington, DC: George Washington University, Program on Extremism, 2023. 10p.

The Hamas Networks in America: A Short History

By Lorenzo Vidino 

Executive Summary • Hamas supporters have long operated in the United States. Internal Hamas documents and FBI wiretaps introduced as evidence in various federal criminal cases clearly show the existence of a nationwide Hamas network engaged in fundraising, lobbying, education, and propaganda dissemination dating back to the 1980s. • The network formalized its existence in 1988, when it created the Palestine Committee in the US. The Committee’s goals included “increasing the financial and the moral support for Hamas,” “fighting surrendering solutions,” and publicizing “the savagery of the Jews.” • The Palestine Committee spawned several public-facing organizations, most of which are based out of Chicago, Dallas, and Washington DC. They included the all-purpose Islamic Association for Palestine (IAP), the financial arm represented by the Occupied Land Fund (which later became the Holy Land Foundation, HLF), and the think tank United Association for Studies and Research (UASR). • In 1993, the FBI wiretapped a meeting of top Hamas activists in the US held in Philadelphia. The wiretaps show internal discussions on how to improve activities in support of Hamas within the US and how to shield them from the designation of Hamas as a terrorist organization. US-based Hamas activists agreed that hiding their affiliation and intentions was the best tactic to avoid negative consequences. “I swear by Allah that war is deception,” said one senior leader, “[d]eceive, camouflage, pretend that you’re leaving while you’re walking that way. Deceive your enemy.” “Let's not hoist a large Islamic flag and let's not be barbaric-talking. We will remain a front so that if the thing [the U.S. government ban on Hamas] happens, we will benefit from the new happenings instead of having all of our organizations classified and exposed.” • Over the years, US authorities have conducted several activities to clamp down on the network, including deporting and prosecuting Hamas operatives and shutting down multiple front organizations. The 2001 designation of HLF and subsequent prosecution of part of its leadership for funneling approximately $12.4 million to Hamas constitutes to date the largest successful terrorism financing prosecution in US history. • Yet, US-based Hamas networks and individuals have displayed a remarkable resilience and many of the core activists of the Palestine Committee are still engaged in various forms of support (albeit at times purely political and not material) for Hamas. 

Washington DC: George Washington University Program on Extremism, 2023. 16p.

Imitators or Innovators? Comparing Salafi-Jihadist and White Supremacist Attack Planning in the United States

By Bennett Clifford and Alexander Meleagrou-Hitchens

 As the threat from white supremacist and Salafi-jihadist extremists to the United States grew in prominence in recent years, the two movements have become the subjects of several comparative studies. These works frequently focus on contrasting their methods of radicalization, recruitment, use of digital communications technologies, and connections to transnational extremist movements, but only a handful concern their methods of planning attacks on American soil. This report seeks to add to this emerging literature by examining what, if any, relationships there are between the tactics and targets chosen by white supremacist and Salafi-jihadist terrorists in America. In doing so, it will also contribute to our understanding of how, and indeed if, modern terrorists in America are learning from each other or from the current American counterterrorism posture. This report finds that: ● Jihadist and white supremacist attack planners in the U.S. selected different targets for their attacks. Jihadists tended towards attacking “hard targets” (for instance, military bases and law enforcement facilities) and devising plots to assassinate individuals. White supremacists erred towards “soft targets,” especially religious institutions and houses of worship. ● Jihadists were more likely than white supremacists to consider multiple targets for their attacks. ● The tactics of jihadists and white supremacists were relatively similar in frequency to one another. Both movements’ attack plotters relied heavily on plots involving firearms and explosives, but also experimented with non-conventional means such as vehicle rammings, arson, and train derailments. ● Despite some evidence of ideological cross-pollination, particularly in the form of manifestos and instructional material, evidence of direct learning between jihadist and white supremacist attack planners in the U.S. is limited. ● Independent innovation in the face of U.S. domestic counterterrorism approaches is a more likely explanation for similarities in targets and tactics between white supremacists and jihadists than cross-group tactical imitation.

Washington, DC: George Washington University, Program on Extremism, 2022. 33p.

Mayhem, Murder, and Misdirection: Violent Extremist Attack Plots Against Critical Infrastructure in the United States, 2016-2022

By Ilana Krill & Bennett Clifford   

  In the United States, critical infrastructure, or “assets, systems, and networks, whether physical or virtual, [that] are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof,” are prime targets in violent extremist attack plots.1 While a variety of violent extremist movements have attempted to assault American critical infrastructure throughout modern history, the Department of Homeland Security and other national security authorities have recently sounded the alarm that U.S.-based violent extremists have developed “credible, specific plans” to attack critical infrastructure.2 To understand the current dimensions of this threat, this paper reviews 94 cases of individuals charged in the U.S. federal court system from 2016 to 2022 with planning to conduct violent extremist attacks, 35 of whom attempted to attack critical infrastructure systems. 19 of these cases are associated with the Salafi-jihadist movement; 16 are associated with white supremacist groups. Evaluating these cases, the report finds: ● Salafi-jihadist attack planners were significantly more likely to consider critical infrastructure systems as targets for attack than their white supremacist counterparts. ● Salafi-jihadist and white supremacist attack planners attempted to target different critical infrastructure sectors, with the former focusing on the commercial facilities, government facilities, and emergency services sectors, and the latter predominantly focusing on the energy sector. ● Since 2019, white supremacist attacks plots against critical infrastructure systems have distinctly increased. ● Between 2016 and 2022, white supremacist plots targeting energy systems dramatically increased in frequency. 13 individuals associated with the movement were arrested and charged in federal court with planning attacks on the energy sector; 11 of these attack planners were charged after 2020. ● The rise of accelerationist ideology and doctrine during the past decade likely fueled the increased risk of attack plots within white supremacist milieus targeting critical infrastructure, and the energy sector in particular.

Washington, DC: George Washington University, Program on Extremism, 2022. 32p.

The Genocide in Gaza and the Contempt of International Law: Some Reflections

By Sulaiman Lebbe Rifai

Nothing puts the human conscience on trial as does the Genocide in Gaza. Nothing illustrates the political hypocrisy of some Western leaders as does the war in Gaza. Nothing exemplifies the double standard of Western political leaders as their complicity in the Gazan war. Moreover, this war has put the International Court of Justice and International Criminal Court in a somewhat difficult and precarious position. It has also put the UNHR in a difficult situation and it is alarmed with the seriousness of atrocities in Gaza. These courts and international organizations are instituted to establish justice and fairness in all international conflicts. They cannot discriminate between countries in their application of justice. They cannot apply one set of laws to the State of Zionist Israel and another set of laws to the people of Palestine. They must do unconditional justice to all parties equally without any prejudice, racial religious, or political discrimination. They must do this to protect the integrity and reputation of these international institutions and yet, the Zionist State of Israel and its supporters are standing between these institutions and their official responsibilities to apply laws equally to all. Take, for instance, the South African lawsuit against the state of Israel for its genocide in the Gaza Strip. Many countries in the Global South welcomed and supported South Africa’s initiative to file a case against Israel and yet, many Western countries blindly dismissed the legal complaint of South Africa in support of Israel as if there was no genocide committed in the Gaza by the State of Israel. To understand the gravity of the political discrimination of some Western leaders on the problem of the Gaza Genocide, we should revisit the contents of the UN’s convention on the prevention of the Crime of Genocide.

Unpublished paper, 2024.

Global Terrorism Threat Assessment 2024

By Catrina Doxsee, Alexander Palmer, and Riley McCabe

Terrorism is no longer the leading international threat to the United States or its top defense priority, but challenges related to violent extremism remain. The threat from Salafi-jihadist groups such as al Qaeda and the Islamic State has declined, and ethnonationalist threats are largely contained. However, a broader patchwork of violent far-right and far-left extremist ideologies has become more prominent on the global stage. Meanwhile, terrorism continues to overlap in significant ways with strategic competition, especially via Iran's support to terrorist groups like Hamas and Hezbollah.

Washington, DC: Center for Strategic and International Studies, 2024. 138p.

Are the effects of terrorism short-lived?

By  Vincenzo Bove,  Georgios Efthyvoulou,  and Harry Pickard

Numerous studies demonstrate that terrorism causes strong public reactions immediately after the attack, with important implications for democratic institutions and individual well-being. Yet, are these effects short-lived? We answer this question using a quasi-experimental design and data on three successful and three foiled terrorist attacks in the United Kingdom. We find that heightened risk perceptions and emotional reactions in the wake of successful attacks do not dissipate in the very short run but are sustained over time and up to 130 days after the attacks. We also find that, whereas large-scale attacks cause a long-lasting shift in risk assessments and emotions, the corresponding effect of smaller-scale terrorism incidents appears to subside within one month. Interestingly, foiled attacks can also affect public perceptions, which, however, quickly return to normal levels. We argue that the extent of media coverage is partly responsible for the duration of these effects.

United Kingdom: United Nations University World Institute for Development Economics Research, 2022, 19p.

Terrorism and the internet: How dangerous is online radicalization?

By Jens F. Binder and Jonathan Kenyon

This work is concerned with the extent and magnitude of threat related to online radicalization in the context of terrorist acts and related offending. Online influences have been depicted as major drivers for the propagation and adoption of extremist ideologies, which often contain an element of collective grievance, and subsequent acts of violence. This is most pronounced in the discussion of so-called lone actor terrorism, but extends to all forms of extremist offending, and beyond. The present work situates online radicalization leading to terrorist acts within the wider context of grievance-based beliefs and attitudes. Further, it addresses current positions and debates surrounding the relevance and mechanisms of online radicalization in terrorist offending. Recent evidence from quantitative studies is reviewed to estimate prevalence of online radicalization and the level of threat that results from it. This is followed by a discussion of plausible, but opposing, interpretations of the estimates presented. While online radicalization does occur, with and without reference to offline processes, the resulting threat is not overly high. This assessment, however, refers to the present only and is unlikely to hold for the future, given the general growth and acceleration of online activity among terrorist actors

United Kingdom: Forensic and Legal Psychology, 2022, 10p.

Exploring The Role Of The Internet In The Radicalisation Process And Offending Of Convicted Extremists

By Jonathan Kenyon

The overarching aim of this doctoral research was to investigate the role of the Internet in radicalisation pathways and offending of convicted extremists in England and Wales. The empirical study was unique because it benefitted from access to closed source risk assessment reports within His Majesty’s Prison and Probation Service (HMPPS). These reports were authored by Psychologists and Probation Officers with access to restricted case documentation and in the majority of cases, direct interviews with the individuals concerned. Findings were based on 235 convicted extremists, all of whom were considered to have radicalised prior to committing their offence. Variables of interest, including offender demographics, offence characteristics and online activities were extracted from risk reports completed from October 2010 to December 2017. Since completion of the doctorate, the analysis has been expanded to 437 convicted extremists, which includes all those subject to risk reports from October 2010 to December 2021. This accounts for close to every convicted extremist in England and Wales considered to have radicalised prior to their conviction.

Scotland: Centre for Research and Evidence on Security Threats, 2023, 4p.

Good Lives in Right-Wing Extremist Autobiographies

By Hanna Paalgard Munden, Sarah Marsden, MD Kamruzzaman Bhuiyan, Lotta Rahlf, Hanna Rigault Arkhis, Aimee Taylor

This report sets out the findings of research to understand the potential of the Good Lives Model (GLM) to interpret trajectories into and out of violent extremism and considers the implications for policy and practice. The Good Lives Model (GLM) is a well-developed manifestation of a strength-based approach to rehabilitation. The model argues that focusing on developing strengths and enhancing protections, rather than solely managing and controlling risk factors, offers a more fruitful route to preventing (re)offending. The GLM has become an increasingly prominent part of efforts to rehabilitate criminal offenders, however its potential with respect to the violent extremist population has not been fully exploited. This report is informed by a review of research on protective factors set out in an earlier report: Conceptualising Protective Factors: Strength-Based Approaches (Marsden and Lee, 2022) that established the theoretical foundation for the empirical research set out here.

Scotland: Centre for Research and Evidence on Security Threats, 2023, 30p.

Online Radicalisation: A Rapid Review of the Literature

By Rosamund Mutton, James Lewis, and Sarah Marsden

This guide sets out the evidence base for ‘online radicalisation’, examining how individual use of the Internet, in conjunction with offline influences, can facilitate radicalisation processes. The UK is the main context of concern, however comparable evidence is found in studies with samples from the USA, Canada, Belgium, Germany, Austria, and Israel. Radicalisation remains a contentious concept and few studies explicitly define ‘online radicalisation’. For the purposes of this guide, ‘radicalisation’ is understood as leading to cognitive outcomes reflected in changes in beliefs and ideas, and/or behavioural outcomes which manifest in changes in behaviour. Two systematic literature reviews (Hassan et al., 2018; Carthy et al., 2020) directed initial searches for relevant research. Further literature was identified through forward and backward citation searching, and narrower key word searches conducted in Google Scholar. Literature searches were completed between June and August 2022. The guide primarily examines literature published between January 2017 and July 2022. Although the evidence base remains modest in size, the research underpinning this guide is assessed to be good quality. There is a growing body of evidence that uses qualitative and quantitative methods to examine a range of factors which are relevant to online radicalisation.

Scotland: Centre for Research and Evidence on Security Threats, 2023, 42p.

Proscribed Terrosist Organisations

By Joanna Dawson

This paper describes the recent history and present status of proscribed organisations under the Terrorism Act 2000 (the “2000 Act”). Prior to the 2000 Act, proscription was exclusively concerned with terrorism connected with the affairs of Northern Ireland. Under the 2000 Act, proscription was extended to include organisations concerned with both domestic and international terrorism. The Home Secretary may proscribe an organisation if they believe it is “concerned in terrorism”. If the Home Secretary believes that an organisation meets this statutory test, they must then decide whether to proscribe the organisation. In doing so, they must take into account various policy considerations. Consequences of proscription The 2000 Act sets out a number of proscription offences. These include belonging to or inviting support for a proscribed organisation; arranging or assisting with the arrangement of a meeting that supports a proscribed organisation; addressing such a meeting; or wearing clothing or displaying articles in public which arouse suspicion of membership or support of a proscribed organisation. It is also possible to impose financial sanctions on proscribed organisations.   Current proscribed organisations As of September 2023 there were 79 international terrorist groups proscribed under the Terrorism Act 2000 and 14 organisations in Northern Ireland proscribed under previous legislation. In November 2021 the Home Secretary announced that the Government had laid an instrument to proscribe Hamas in its entirety, ending the distinction between different wings of the organisation. In September 2023 the Government laid an instrument to proscribe Wagner Group, a private military organisation which has acted as a proxy for the Russian state. The Government considers it to involved in committing acts of terrorism, including in relation to its involvement in Russia’s invasion of Ukraine. The Annex to this paper includes a current list of proscribed organisations and a description of their activities. Criticisms of the proscription regime Proscription has been characterised as a powerful deterrent, a way of tackling lower-level support for terrorism, and a signal of rejection by society. But questions have also been raised as to its utility in combating terrorism and its compatibility with the rule of law. The former Independent Reviewer of Terrorism Legislation (IRTL), Lord David Anderson KC, repeatedly recommended the introduction of time limits for proscription orders, as have his successors, Max Hill QC and the current IPTL, Jonathan Hall KC. However, the Government has so far declined to follow these recommendations and currently deproscription is done by way of application only. As a consequence, groups that no longer meet the statutory requirements for proscription continue to be proscribed, a situation described by Lord Anderson as “an affront to the rule of law”.

London: UK Parliament, House of Commons Library, 2024, 70p.

Lone Offender: A Study of Lone Offender Terrorism in the United States (1972--2015)

By the U.S. Federal Bureau of Investigation, Lauren Richards, Peter Molinaro, John Wayne. et al.

Operationally defining the lone offender terrorist is challenging, as the nature of terrorism is both highly political and contextually dependent. Over the years, there has been disagreement over the classification of violent acts under the label of “terrorism.” While an argument can be made that the infliction of fear upon a targeted group or the public is sufficient to classify an act as terrorism, the FBI definition of terrorism requires a purported motivation that goes beyond exclusively personal motivations and attempts to influence change in furtherance of extremist ideologies of a social, political, religious, racial or environmental nature. The focus of the current study examined offenders who carried out their attacks independent of any direction from a terrorist group or organization.Lone offender terrorism continues to pose a threat as violent ideological groups and terrorist organizations place emphasis on inspiring lone offender-style attacks. Additionally, individuals who view violence as an accessible and justified method for advancing their own ideological goals can independently mobilize toward violent action. While attacks directly coordinated by terrorist organizations are generally more lethal globally, the United States departs from this trend: lone offender attacks in the United States are more deadly, possibly due to strong U.S. counterterrorism capacity for disrupting.The current report provides an overview of the data, exploring the various topics encompassed within the coding protocol, including bystander observations, offenders’ backgrounds, family and social networks, behavioral characteristics, radicalization, and attack planning. Predicting lone offender terrorism incidents is not possible, but prior research and operational experience support the conclusion that acts of targeted violence, including lone offender terrorist attacks, may be preventable through early recognition and reporting of concerning behavior. The report aims to inform broader goals of enhancing bystander education and awareness, as well to aid the prevention efforts of law enforcement and multi-disciplinary threat assessment teams working to counter targeted violence threats every day. To work toward this objective, the authors examine relevant contextual factors and analyze the statements and behaviors offenders exhibited before carrying out their attacks.

Washington, DC: U.S. FBI, 2019. 80p.

Active Shooter Incidents in the United States in 2022

By The U.S. Federal Bureau of Investigation

From the document: "In 2013, the president signed into law the Investigative Assistance for Violent Crimes Act of 2012, which led the FBI to examine active shooter incidents since 2000. The findings in this report are intended to provide an overview of active shooter incidents to help law enforcement, other first responders, and the public better understand the levels of threats associated with active shooter incidents. In 2022, the FBI designated 50 shootings as active shooter incidents. Although incidents decreased by 18% from 2021 (61 incidents), the number of active shooter incidents increased by 66.7% compared to 2018 (30 incidents). The 50 active shooter incidents in 2022 occurred in 25 states and the District of Columbia and represent seven location categories, including open spaces, commerce, residences, education, government, houses of worship, and a health care facility. [...] Data cited in this report for active shooter incidents that occurred in 2022 is valid as of February 10, 2023; however, incident data from prior published reports was not updated. If additional incidents meeting FBI criteria are identified after the publication of this document, every effort will be made to factor those incidents into future reporting."

Washington, DC: FBI, 2023. 33p.