Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in violence and oppression
Fulcrum: The Department of Defense: Information Technology Advancement Strategy

UNITED STATES. DEPARTMENT OF DEFENSE. CHIEF INFORMATION OFFICER

From the document: "Fulcrum represents the Department's ambitious Information Technology (IT) advancement strategy designed to leverage the power of technology to drive transformative change and serves as a tipping point for catalyzing digital modernization for the warfighter. To propel the Department forward, we must ensure continued success and relevance in the digital age. Fulcrum will enable achievement of the DoD mission and strategic objectives with unparalleled efficiency and effectiveness. [...] The DoD Chief Information Officer's (DoD CIO) mission is to 'connect', 'protect', and 'perform'. Fulcrum outlines a vision guided by four lines of effort (LOEs) representing a strategic shift that embraces technology as a mission enabler. [...] Fulcrum features the DoD CIO's IT goals and objectives for Fiscal Years (FYs) 2025-2029 that provide essential support to the priorities in the National Defense Strategy (NDS), and the supporting DoD Strategic Management Plan (SMP)."

UNITED STATES. DEPARTMENT OF DEFENSE. 6 JUN, 2024

Grievance-fuelled violence: Modelling the process of grievance development

By Emily Corner and Helen Taylor

Acts of extreme or mass violence perpetrated by lone offenders have become increasingly common in liberal democracies over the past 20 years. Some describe these acts as politically motivated, while others attribute them to mental disorder or criminal intent. This has led to the development of distinct research and practice areas focusing on either violent extremism, mass murder, fixation, stalking, or familial and intimate partner homicide. However, there is increasing understanding that the distinction between political ideology, criminal intent and personal motivation is blurred, and that the violence carried out by these individuals is better understood using the broader concept of grievance-fuelled violence. This work is the first to empirically consolidate the existing research in these distinct areas, employing a multifaceted analytical approach to develop a holistic model of the processes of grievance development among those who commit grievance-fuelled violence.

Research Report no. 27. Canberra: Australian Institute of Criminology. 2023. 95p.

Review of violent extremism risk assessment tools in Division 104 control orders and Division 105A post-sentence orders

By Timothy Cubitt and Heather Wolbers

Risk assessment for violent extremism plays a critical role in understanding the threat posed by radicalised offenders and determining how these individuals are managed both in correctional settings and in the community. The Australian Institute of Criminology (AIC) was engaged by the Department of Home Affairs’ Countering Violent Extremism (CVE) Branch to conduct a review of the use of risk assessments for violent extremism in Australia.

The aim of this review was to:

• identify and describe violent extremism risk assessment tools currently available to support risk assessments of convicted terrorist offenders;

• assess each tool’s suitability to assist an expert to conduct an assessment of the risk to the community from an offender, when a court is considering whether to issue a control order under Division 104 or a post-sentence order under Division 105A of the Criminal Code Act 1995 (Criminal Code); and

• review current risk assessment frameworks, including the use of Structured Professional Judgement, to assess the risk of violent extremist offending and consider how violent extremism risk assessment tools might be improved.

A review of relevant peer-reviewed and grey literature was undertaken alongside semi-structured interviews with a group of experts in violent extremism risk assessment. Findings from this review are organised according to the Terms of Reference.

Special reports. no 14. Canberra: Australian Institute of Criminology. 2023. 70p.

Terrorism and Banditry in Nigeria: The Nexus : Kaduna, Katsina, Niger and Zamfara States Context

By Oluwole Ojewale, et al.

This report details the findings of the research study that examined the plausibility between terrorism and banditry towards shedding new light on the dynamics of the country’s security challenges especially in northwest and north central Nigeria, within the focal context of Kaduna, Katsina, Niger and Zamfara States. Nigeria faces a plethora of security challenges ranging from the Boko Haram religious/violent extremism cum insurgency in the northeast to farmer-herder conflict and banditry in the northcentral and northeast, a revived secessionist movement in the southeast, police repression, piracy, and more recently attacks the nexus between banditry and terrorism; highlight the strategies and actions required by various stakeholders at various levels to counter the spread of banditry and terrorism in these focal states. Predominantly, the report utilises both qualitative and descriptive methods, generated from primary and secondary data gotten through desk review, and a consolidation of findings with feedback from consultations with stakeholders in selected focal states. The report undertook qualitative research in the focal states, documenting the experiences of some critical stakeholders through key on security installations, among others. In spite of government efforts, the security situation in Nigeria is deteriorating. The report thus explores the question of whether banditry and terrorism are the alternate side of the same coin and the security and policy implications of conflating both. The purpose of this report is to ascertain informant interviews. These interviews were cluster-based to provide a better context to the literature and systemically present the experiences of stakeholders. The report finds that while banditry gravely endangers public safety and security in the focal states, there are contextual differences in the origin, evolution, and manifestations of banditry in the focal states. Understanding these local variations is important to deploying effective and sustainable solutions to this spectre of banditry that defines governance in the states. The report also notes that there is no discernible ideological persuasion underpinning banditry beyond theft, extortion, and wanton violence. Bandits are primarily motivated by the alluring prospects of wealth in a region blighted by poverty and poor socioeconomic outcomes. However, this does not exclude the fact that fundamentalist Islamist groups operate in the same space as bandits. There is the possibility that some bandit groups might have adopted more of a religious modus operandi on their initiative or through limited contact with extremist groups. While the report notes the dearth of studies investigating in detail the theoretical and functional nature of the relationship between banditry and terrorism in these four states, the preliminary evidence points to the existence of both environmental and operational convergence between bandits and Islamist fundamentalist groups in the focal states.

Africa: Goodluck Jonathan Foundation (GJF) 2021. 43p.

The Wars Are Here: How the United States’ Post-9/11 Wars Helped Militarize U.S. Police

By Jessica Katzenstein

Six years after the germinal United States protests against anti-Black police violence in Ferguson, MO, and months after the 2020 police killings of George Floyd and Breonna Taylor, police in mine-resistant vehicles have once again occupied both the streets and mass public attention. In 2014, images from the Ferguson protests—of snipers pointing semi automatic rifles into crowds and officers tear-gassing unarmed civilians—prompted activists and politicians to compare the St. Louis suburb to occupied Gaza, Ukraine, or Iraq.2 During the summer of 2020, as the U.S. witnessed its largest public uprisings since the 1960s, police militarization again came under scrutiny. The Department of Homeland Security flew surveillance aircraft over protests in 15 cities, as officers on the ground deployed flash-bang grenades, sound cannons, rubber bullets, and tear gas against peaceful demonstrators.3 Since protests began, at least 14 local law enforcement agencies in 10 states have received free mine-resistant vehicles built for the U.S. military.4 In response, some lawmakers have revived efforts to curtail such transfers of military equipment.5 Reform groups are advocating to demilitarize the police by limiting when and how they can use armored vehicles and camouflage uniforms.6 In this moment of potential transformation, we must analyze both the deep roots and the recent upsurge of police “militarization” in order to grasp what calls for “demilitarizing” the police could mean. This paper argues that today’s high level of police militarization is one of the cruel, complex domestic costs of recent American wars abroad. Police militarization is in a sense as old as U.S. policing itself, yet it has exploded since September 11, 2001 and its intensification must be counted among the costs of this country’s post-9/11 wars.

Providence, RI: Brown University, Watson Institute, 2020. 20p.

Prosecuting Terror in the Homeland: An Empirical Assessment of Sentencing Disparities in United States Federal Terrorism Cases

By Michael A. Jensen and Elena Akers

Recent mass casualty attacks in the United States have renewed a long-standing debate over the need for novel legislation to effectively prosecute domestic terrorism. Those who advocate for a new terrorism law argue that deficiencies in the US legal code present challenges to prosecuting domestic extremists, leading to unwarranted sentencing disparities in international and domestic terrorism cases. Critics of the proposal for a domestic terrorism law counter that the US legal code is sufficiently flexible for the courts to punish domestic extremists to the same extent as their international counterparts. Neither side, however, has produced an empirical assessment to support their claims. In this article, we address this research gap by analysing data on 344 US federal terrorism cases that were initiated between 2014 and 2019. We find that significant disparities are endemic to US federal terrorism prosecutions for three types of sentencing outcomes: length of incarceration; time spent on supervision upon release from prison; and the use of restrictive monitoring conditions. International terrorism defendants are more likely than domestic extremists to receive severe penalties for all three sentencing decisions even when controlling for criminal severity. Sentencing disparities in US federal terrorism cases are especially large when domestic extremists are prosecuted using common criminal charges, like weapons violations. We conclude with a discussion of what these findings mean for promoting judicial fairness in US terrorism prosecutions.

Perspectives on Terrorism Volume XVIII, Issue 1 March 2024

JAS vs. ISWAP: The War of the Boko Haram Splinters Crisis Group

By International Crisis Group

What’s new? Jama’tu Ahlis Sunna Lidda’awati wal-Jihad (JAS) has gained ground in the intra-jihadist fighting in north-eastern Nigeria, halting the previous momentum of the Islamic State West Africa Province (ISWAP). In the course of 2023, JAS took most of the islands in Lake Chad, which ISWAP had controlled. 

Why did it happen? Conflict between these Boko Haram splinters stems from differences in governance and treatment of civilians. JAS kills and steals from everyone; the more bureaucratic ISWAP generally spares Muslim non-combatants. Many JAS members surrendered to authorities or continued fighting instead of joining ISWAP after the death of JAS’s

leader in 2021. 

  Why does it matter? In the last two years, JAS and ISWAP may have visited more damage upon each other than the Lake Chad states have inflicted on the jihadists. Still, the splinters pose a significant threat. ISWAP is regrouping, while the revamped JAS is set to target civilians around the lake. What should be done? The Lake Chad governments will need to do more to prevail over the jihadists. They should mitigate risks to civilians by maintaining humanitarian assistance; expanding efforts to support defectors; improving airstrike precision; and reinvigorating regional security cooperation.    

Pursuing terrorists in US civil courts: the Encyclopedia of ATA cases

Edited by Jeff Breinholt

Initially enacted in 1992, the Antiterrorism Act (ATA), 18 U.S.C. §2333, provides a legal remedy for American victims killed or injured by reason of international terrorism by creating a private cause of action, with treble damages and attorneys’ fees. Since then, some 150 lawsuits have been brought under the statute against such terrorist organizations as Hamas, Hizballah, and FARC, as well as the banks and companies alleged to have assisted them. These lawsuits have generated some 600 opinions.

Washington, DC: George Washington University Program on Extremism. 2024, 91pg

Cultural Heritage and Mass Atrocities

Edited By James Cuno and Thomas G. Weiss

Intentional destruction of cultural heritage has a long history. Contemporary examples include the Bamiyan Buddhas in Afghanistan, mosques in Xinjiang, China, mausoleums in Timbuktu, Mali, and Greco-Roman remains in Syria. Cultural heritage destruction invariably accompanies assaults on civilians, making heritage attacks impossible to disentangle from the mass atrocities of genocide, war crimes, crimes against humanity, and ethnic cleansing. Both seek to eliminate people and the heritage with which they identify. Cultural Heritage and Mass Atrocities assembles thirty-eight experts from the heritage, social science, humanitarian, legal, and military communities. Focusing on immovable cultural heritage vulnerable to attack, the volume’s guiding framework is the Responsibility to Protect (R2P), a United Nations resolution adopted unanimously in 2005 to permit international intervention against crimes of war or genocide. Based on the three pillars of prevent, react, and rebuild, R2P offers today’s policymakers a set of existing laws and international norms that can and—as this book argues—must be extended to the protection of cultural heritage. Essays consider the global value of cultural heritage and document recent attacks on people and sites in China, Guatemala, Iraq, Mali, Sri Lanka and Afghanistan, Syria, and Yemen. Comprehensive sections on vulnerable populations as well as the role of international law and the military offer readers critical insights and point toward research, policy, and action agendas to protect both people and cultural heritage. The table of contents along with a concise abstract of each chapter is offered online in Arabic, Chinese, French, Russian, and Spanish to facilitate robust, global dissemination of the strategies and tactics offered in this pathbreaking call to action.

Los Angeles: J. Paul Getty Trust, 2022. 649p.

Defeating terrorism and saving art: fighting the same battle

By Elie Cavigneaux

Defeating terrorism and saving art: fighting the same battle

In a world where chaos and political instability plague many countries in the Middle East and North Africa, a lesser-known crime has emerged: the trafficking of cultural goods. This phenomenon, often overshadowed by more prominent issues, poses a significant global threat. But why is the trafficking of art and antiquities so concerning?

  1. Financing Terrorism: Cultural goods trafficking is not merely a trade—it’s a critical source of funding for terrorism. Security Council resolutions, UNESCO, the European Union, and financial investigation units have all documented this link. The self-proclaimed “Islamic State” even institutionalized this trade, issuing excavation permits and organizing the sale of stolen pieces to market countries.

  2. Hidden Threats: Although these looted artifacts may not flood the markets immediately, history shows that they can resurface years later. Works looted by the Nazis during World War II, for instance, have reappeared after decades of concealment.

  3. Beyond Terrorism: Yet, the interest in this analysis extends beyond terrorism financing. The resale of “blood antiquities” reveals another dimension: money laundering, fraud, and tax evasion. This criminal activity affects not only the antiques market but also the broader art market.

  4. Investing for Tomorrow: To combat this multifaceted threat, we must invest in detecting and preventing crimes related to cultural and art objects. Whether in times of war or peace, our ability to safeguard culture and heritage depends on proactive measures.

Working Paper. Paris: Groupe d’études géopolitiques, 2021. 13p

Victimhood and Acknowledgement: The Other Side of Terrorism

Edited by Petra Terhoeven

How does terrorism affect our picture of the history of terrorism then, if the victims are moved centre stage? If the focus is put on their suffering? The contributions to this edition of the European History Yearbook will examine such questions in a broad range of historical case studies and methods, including visual history.

Berlin/Boston: De Gruyter, 2018. 172p.

Farmers–Herdsmen Conflict, Cattle Rustling, and Banditry: The Dialectics of Insecurity in Anka and Maradun Local Government Area of Zamfara State, Nigeria

By Bashir Bello and Mustapaha Muhammad Abdullahi

The study examined farmers–herdsmen conflict, cattle rustling, and banditry in Anka and Maradun local government area of Zamfara State, Nigeria. The study examined the influence of farmers–herdsmen conflicts on cattle rustling and banditry, and vice versa. Exploratory research was employed; focus group discussion (FGD) and key informant interview (KII)were used to collect primary data from the respondents. The data generated were transcribed and recorded verbatim (word-for-word account of verbal interview) and they were converted into written form. Data were enumerated and thematic analysis and categorization were provided. Secondary data were sourced from internet and relevant books. This study adopted the environmental resources scarcity and frustration-aggression theory. The findings of the study revealed that farmers–herdsmen conflict precipitates the acts of cattle rustling and banditry. It also revealed that conversely cattle rustling and banditry contributed to the farmers–herdsmen conflict in the local government area of Zamfara State. The study discovered that the synthesis of farmers–herdsmen conflicts, cattle rustling, and banditry pose serious threat to the safety and security of the people. The researchers recommended that there should be an introduction of grazing reserves equipped with adequate social amenities and that there should be policies capable of enhancing herders’ transformation from traditional to the modern method of animal husbandry. They also suggested that various factors responsible for farmers–herdsmen conflict, cattle rustling, and banditry should be properly managed by traditional and religious leaders. The findings corroborate the gaps which the researchers intended to fill

Sage Open, 11(4). 2021.

The modern day consequences, causes, and nature of kidnapping, terrorism, banditry, and violent crime in Nigeria: A comprehensive analysis.

By Nsirimovu Okwuwada

There have been several agitations in Nigeria, but none have degenerated into the current barbaric, horrendous, heinous, and despicable dimensions of carnage, massacres, and bloodletting orchestrated by terrorists, bandits, kidnappers, and other organized violent crime syndicates. This study takes a holistic approach using secondary data sources to examine the root causes of the modern-day prevalence of kidnapping, banditry, terrorist attacks, and other organized criminal activities in Nigeria. The study finds that unemployment, excess supply of young people, neglect of certain regions in the distribution of national wealth, lack of government visibility, lack of equal economic opportunity for all, uncontrolled influx of firearms, poverty, and religious fanaticism contributes to the increasing rate of violent crime in Nigeria. The article finds that the nature of banditry, kidnapping, and terrorist attacks are similar, and the modes of attacks on civilian and government installations are also related. The government should thus become proactively visible throughout the nation via its security agencies and economic development agenda. Additionally, the government should educate local officials and traditional councils on contemporary methods for reporting and addressing violent groups in their communities.

MPRA Paper No. 117671, Munich: MPRA, 2023. 46p.

Violent crimes and insecurity on Nigerian highways: A tale of travelers’ trauma, nightmares and state slumber

By Cyril O. Ugwuoke, Benjamin Okorie Ajah, Linus Akor, Sunday Ojonugwa Ameh, Cletus A. Lanshima, Elias C. Ngwu, Ugomma Ann Eze, and Michael Nwokedi

This paper examined the vulnerability of travelers to kidnapping, abduction and armed robbery attacks and in some extreme cases, death along Nigeria's highways. Insecurity on the nation's highways became a contemporary criminological discourse following the emergence of new strands of criminality like militancy, terrorism, kidnapping, herdsmen-farmers violence, communal conflicts and banditry. Nigerian highways have become the major operational hotspots for criminals who harass, terrorize, and traumatize travelers at will. With the ever-rising insecurity on Nigerian highways, the military and paramilitary offensives deployed by the Federal Government have not yielded the desired results culminating in the description of government's inertia as a form of state slumber. Data for this study were sourced from a content analysis of reported violent highway crimes by credible mainstream Nigerian newspapers, spanning a period of one year, from July 2020 to July 2021. Adopting the Social Disorganization Theory, the study indicated that the worrisome nature of insecurity on Nigeria's highways resulting in the high rate of abduction and murder of people of diverse military, professional, socioeconomic and political backgrounds has engendered a sense of helplessness, trauma and vulnerability among Nigerian road travelers. The paper recommends the de-centralization of Nigeria Police Force structure to create State Police that will encourage and electrify effective and better people oriented patrolling and management of insecurities on the Nigerian highways.

Heliyon v.9(10); 2023 Oct PMC10551549

Governing “Ungoverned Spaces” in the Foliage of Conspiracy: Toward (Re)ordering Terrorism, from Boko Haram Insurgency, Fulani Militancy to Banditry in Northern Nigeria

By: John Sunday Ojo

This article explores the dominant narrative of ill-governed or ungoverned territories in the northern region of Nigeria where informality and socioeconomic deficit fashioned the mannerism of everyday life. Reconnoitering ungoverned territories, positing that radical jihadist and non-jihadist movements and criminal-armed groups are ideologically driven by localism and informal networks, particularly in the areas unkempt by the state. The paper interrogates to what extent ungoverned spaces embolden the recruitment of criminal and terrorist groups in northern Nigeria. It explains the complex security paradoxes confronting the Nigerian state, it analyses the Boko Haram insurgency, Fulani militancy and banditry within the context of ungoverned spaces that continuously breed terrorist organizations, and criminal networks, that pose an enormous risk to human security. It adopts a qualitative approach and spatial network analysis using Geographical Information System (GIS). The paper argues that the primordial negligence of ungoverned areas with limited state surveillance or unharmonized state presence, controlled by informal networks and hybrid arrangements creates an enabling environment for warlordism, religious fanaticism and tribal self-defense forces. It further demonstrates that governance failure in these regions stimulates illegal movement of arms and ammunition, the raw material for bombs, illegal drugs and foreign machines, and becomes abodes for Boko Haram jihadist and non-Boko Haram armed groups. The paper concludes that ungoverned spaces could be morphed into a production site for Weapons of Mass Destruction (WMD) by the terrorists in the near future, thus, until the Nigerian state pays attention to the territories under-governed or poorly governed, it will become difficult to win the war against terrorism, Fulani militancy and banditry through military response. Therefore, good governance that transcends ethnic chauvinism remains a veritable weapon in conquering multilayered security quagmires facing the giant of Africa.

African Security, Volume 13, 2020 - Issue 1

Shock and awe: Military response to armed banditry and the prospects of internal security operations in Northwest Nigeria

By Folahanmi Aina, John Sunday Ojo & Samuel Oyewole

Insecurity has worsened in Northwest Nigeria, due to the threat of armed banditry, necessitating the deployments and operations of the military. While there is increasing academic attention on the origins, causes, and nature of this threat, the conduct, achievements, prospects, and challenges of the military’s counter-banditism response in the region remains understudied. Accordingly, foregrounded by the need to close this gap, this qualitative study contributes to the literature through organised empirical research by examining the conduct, achievements, prospects, and challenges of the military's Joint Task Force operation Hadarin Daji – its major internal security operation – against armed banditry in Northwest Nigeria. Data is obtained from secondary sources which include academic journal articles, books, official reports, press briefs by the military, reputable local and international news reportage. The study’s central argument holds that the nature and character of the military’s campaigns against armed banditry – a form of unconventional warfare, poses significant challenges to it as a conventional fighting force, consequentially contributing towards the conflict’s protractedness. Recalibrating the military’s readiness for and response to unconventional warfare remains critical to degrading and defeating armed banditry in Northwest Nigeria.

African Secuirty Review Volume 32, 2023 - Issue 4

Female Jihadis Facing Justice: Comparing Approaches in Europe,

Edited by Tanya Mehra, Thomas Renard and Merlina Herbach with contributions from Marc Hecker and Sofia Koller.

The involvement of women in terrorism is not new, but it has gained more attention with the rise of the Islamic State in Iraq and Syria (ISIS), which attracted many women to its so-called caliphate. Initially perceived as victims or harmless, these women progressively became a growing subject of attention and concern for security services. In 2017, the Dutch intelligence service (AIVD) already indicated that the threat emanating from female jihadis should not be underestimated, while recognising knowledge gaps about the role(s) these women played in jihadi movements or the threat they posed.1 The same year, the United Nations Security Council Resolution 2396 (2017) stressed that women who were affiliated with terrorist organisations “may have served in many different roles, including as supporters, facilitators, or perpetrators of terrorist acts” and urged states to pay special attention to this as women “require special focus when developing tailored prosecution, rehabilitation and reintegration strategies.”2 Yet, in spite of more attention from counter-terrorism services, and a growing body of literature on female terrorists, there is still a considerable lack of data-driven, empirical research on female violent extremist offenders (VEOs). This book seeks to inform practitioners and policy-makers on how to manage female VEOs through the criminal justice system in a rule of law and human rights compliant manner through four case studies in Europe.

The Hague: The International Centre for Counter-Terrorism (ICCT: 2024. 223p.

Murder & Extremism in the United States in 2023

By Anti-Defamation League

Every year, individuals with ties to different extreme causes and movements kill people in the United States; the ADL Center on Extremism (COE) tracks these murders. Extremists regularly commit murders in the service of their ideology, to further a group or gang they may belong to, or even while engaging in traditional, non-ideological criminal activities. In 2023, domestic extremists killed at least 17 people in the U.S., in seven separate incidents. This represents a sharp decrease from the 27 extremist-related murders ADL has documented for 2022—which itself was a decrease from the 35 identified in 2021. It continues a trend of fewer extremist-related killings after a five-year span of 47-79 extremist-related murders per year (2015- 2019). One reason for the trend is the decrease in recent years of extremist-related killings by domestic Islamist extremists and left-wing extremists. The 2023 murder totals include two extremist-related shootings sprees, both by white supremacists, which together accounted for 11 of the 17 deaths. A third shooting spree, also by an apparent white supremacist, wounded several people but luckily did not result in fatalities. All the extremist-related murders in 2023 were committed by right-wing extremists of various kinds, with 15 of the 17 killings involving perpetrators or accomplices with white supremacist connections. This is the second year in a row that right-wing extremists have been connected to all identified extremist-related killings. Two of the incidents from 2023 involved women playing some role in the killing or its aftermath. This report includes a special section that examines the role played by women in deadly extremist violence in the United States by analyzing 50 incidents from the past 20 years in which women were involved in some fashion in extremist-related killings. Murder & Extremism in the United States in 2023

New York: Anti-Defamation League, 2024. 36p.

ONLINE EXTREMISM AND TERRORISM RESEARCHERS’ SECURITY, SAFETY, AND RESILIENCE: FINDINGS FROM THE FIELD

Elizabeth Pearson, Joe Whittaker, Till Baaken, Sara Zeiger, Farangiz Atamuradova, and Maura Conway

“This report presents findings from the REASSURE (Researcher, Security, Safety, and Resilience) project’s in-depth interviews with 39 online extremism and terrorism researchers. Based at universities, research institutes, and think tanks in Europe and North America, the interviewees studied mainly, albeit not exclusively, far-right and violent jihadist online activity. The report catalogues for the first time the range of harms they have experienced, the lack of formalised systems of care or training, and their reliance therefore on informal support networks to mitigate those harms.”

Vox Pol. REASSURE. 2023. 138p

Moderating Extremism: The State of Online Terrorist Content Removal Policy in the United States

By Bennett Clifford

By reviewing studies of how today’s terrorist and extremist groups operate on social media in conjunction with an overview of U.S. government regulation of terrorist content online, this report finds that stricter U.S. regulation of social media providers may not be the most effective method of combating online terrorist and extremist content.

Specifically:

• Direct governmental regulations that ignore other sources of regulation on content removal policies could disrupt growing intra-industry collaboration on countering terrorist content online.

• In many regards, the U.S. government defers to and depends on the private sector to conduct counterterrorism online. Many factors contribute to this arrangement, including limits on the government’s authorities, expertise, staffpower, dexterity and political will to manage online terrorist content with the same efficacy as major social media companies.

• Attempts by other governments to strictly regulate social media companies’ terrorist content removal policies hurt small companies, created double standards and redundancies, and raised concerns about censorship and free speech.

• Proposed regulations may only affect major U.S. social media providers; smaller and non-U.S. companies may be unable, unwilling, or not required to comply. Due to the proliferation of social media platforms exploited by terrorists and extremists, platforms that may be unaffected by U.S. government regulation currently host a large proportion of terrorist content online.

• In certain regards, major social media companies’ content removal policies have more flexibility than the U.S. government to be able to account for new terrorist and extremist groups and actors and their respective tactics, techniques, and procedures online.

Washington, DC: George Washington University, Program on Extremism, 2021. 24p.