Open Access Publisher and Free Library
TERRORISM.jpeg

TERRORISM

Terrorism-Domestic-International-Radicalization-War-Weapons-Trafficking-Crime-Mass Shootings

Posts in violence and oppression
Border Control Paradox: The Political Economy of Smuggling between Colombia and Venezuela

By Jorge Mantilla

In this working paper, Jorge Mantilla explores state-criminal cooperation in roadblock politics. His study discusses the way in which, between 2015 and 2023, the bilateral tensions and border closure between Colombia and Venezuela created a political economy of smuggling in which state officials delegated basic state functions to organized crime groups to contain foes, domesticate illegal economies, and maintain social control. Mantilla shows that the fundamentals of this political economy are negotiated mobility instances taking place at checkpoints deployed in the multiple informal trails along the borderland where smugglers, organized crime groups, and state officials interact.

 Copenhagen: DIIS · Danish Institute for International Studies 2024. 31p.

Violent Extremism and Terrorism Online in 2023: Year in Review

ByMaura Conway, Ashley A. Mattheis, Sean McCafferty, and Miraji H. Mohamed.

The report describes and discusses developments in the violent extremist and terrorist online scene(s) in the 12-month period from 1 January to 31 December 2023. It accomplishes this by surveying, synopsizing, and integrating the findings of relevant articles and reports produced by academics, think tanks, civil society, and governmental organizations; high-quality press reports; and the first-hand online experience and primary research of the authors.

Dublin: Vox Pol, 2023. 43p.


REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 4.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 3.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 2.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 1.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

The New Crusade: America's War on Terrorism

By Rahul Mahajan

Introduction to the War on Terrorism: The book discusses the impact of the September 11 attacks, framing them as a pivotal moment in history and the beginning of the 21st century.

Critique of U.S. Policies: It critically examines U.S. foreign policies, including military actions and sanctions, arguing that these have contributed to global resentment and terrorism.

Media and Public Perception: The book explores how the U.S. government and media have shaped public perception of the war on terrorism, often simplifying complex issues.

Historical Context: It provides a historical context for understanding the war on terrorism, comparing it to past U.S. military interventions and policies.

Monthly Press review, 2002 160 pages

Pioneers of Genocide Studies

Edited by Samuel Totten and Steven Leonard Jacobs

The document contains various technical terms and details, likely related to a specific field or study. It includes numerous references and citations, indicating a well-researched topic.: The language used is complex and may require specialized knowledge to fully understand.

The author learned about the Armenian Genocide's structure and nature from Vahakn Dadrian, who emphasized that genocides require extensive planning and are calculated policies.

The abundance of evidence on the Armenian Genocide is scattered across various international archives, complicating the documentation process.

Father Krikor Guerguerian, an orphan survivor and self-taught scholar, uncovered significant evidence and documentation, fundamentally altering the study of the Armenian Genocide. The U.S. National Archives hold valuable documentation on the Armenian Genocide, providing continuous records and detailed information that corroborate survivor accounts.

Transaction Publishers, 2002, 616 pages

Understanding Al-Qaeda: The Transformation of War

By Mohammad-Mahmoud Ould Mohamedou

Transformation of War: The book discusses how Al Qaeda represents ashift in the nature of warfare, moving from traditional state-basedconflicts to transnational, non-state actors engaging in asymmetricwarfare.

Historical Context: It explores the historical and political contextbehind Al Qaeda's actions, emphasizing the importance ofunderstanding their motivations and grievances.

Misconceptions: The author addresses common misconceptions aboutAl Qaeda, arguing that their actions are politically motivated rather thanpurelyideological or irrational.

Way Forward: The book suggests potential ways to resolve the conflict, including the possibility of negotiations and reassessment of currents trategies.

Pluto Press, 2007, 136 pages

White Supremacist and Anti‐government Extremist Groups in the US

Keneally, Katherine; Davey, Jacob

From the document: "This project by the Global Network on Extremism and Technology (GNET) looks at the user journeys of individuals who enter and participate in the online spaces of extremist communities. A user journey here refers to the distinct path a user may follow to reach their goals when accessing and using an online space belonging to extremist communities. User journeys are particularly important in offering insights into the rationale and motivations of users on the one hand, and to the inner workings of extremist online communities on the other. This is vital for understanding their goals and objectives. In selecting the ideologies for this project, we drew upon extremist communities - rather than extremist and terrorist organisations or groups - including those actors that participate in the extremist milieu and share ideas but do not necessarily operate in concert. These ideologies include those of formal and well-defined extremist organisations of White supremacist and anti-government extremist groups in the United States, supporter networks of Islamic State (IS), and looser communities of extremist actors including accelerationists, incels and chan site members who operate on shared platforms, congregating around common beliefs but without the connection of formal membership. This project is a response to the growing interest in understanding how individuals enter and participate in online spaces of extremist communities."

Global Network On Extremism And Technology (GNET). 24 JUL, 2024.

Catalyzing Crisis: A Primer on Artificial Intelligence, Catastrophes, and National Security

DREXEL, BILL; WITHERS, CALEB

From the document: "Since ChatGPT [Chat Generative Pre-Trained Transformer] was launched in November 2022, artificial intelligence (AI) systems have captured public imagination across the globe. ChatGPT's record-breaking speed of adoption--logging 100 million users in just two months--gave an unprecedented number of individuals direct, tangible experience with the capabilities of today's state-of-the-art AI systems. More than any other AI system to date, ChatGPT and subsequent competitor large language models (LLMs) have awakened societies to the promise of AI technologies to revolutionize industries, cultures, and political life. [...] This report aims to help policymakers understand catastrophic AI risks and their relevance to national security in three ways. First, it attempts to further clarify AI's catastrophic risks and distinguish them from other threats such as existential risks that have featured prominently in public discourse. Second, the report explains why catastrophic risks associated with AI development merit close attention from U.S. national security practitioners in the years ahead. Finally, it presents a framework of AI safety dimensions that contribute to catastrophic risks."

CENTER FOR A NEW AMERICAN SECURITY. UN, 2024. 42p.

Digital Weaponry of Radicalisation: AI and the Recruitment Nexus

SHAH, MARIAM

The following excerpt from the document contains multiple links embedded in the original text: "Islamic State (IS) recently released a powerful recruitment message for 'distracted Muslim youth' to travel and join IS territories across the world. It highlights a disturbing trend in how terrorist organisations are using technology to recruit and mobilise members through a single message. It also shows that contemporary terror groups and extremist organisations are adapting fast to emerging technologies. This Insight aims to highlight an alarming reality: the exploitation of Artificial Intelligence (AI) technology by terrorist and violent extremist groups to strengthen recruitment efforts. These groups proficiently manipulate online platforms, leveraging sophisticated AI tools to disseminate tailored propaganda content to exploit psychological vulnerabilities and amplify divisive narratives, thereby fostering radicalisation and recruitment. From using encrypted messaging apps like Telegram and WhatsApp to seeking refuge in the anonymity of the Dark Web, these groups employ various tactics to evade AI detection and exploit vulnerabilities. By leveraging AI tools, these groups engage in personalised messaging, rapid distribution, and exploitation of social media algorithms to amplify their reach and influence susceptible individuals."

GLOBAL NETWORK ON EXTREMISM AND TECHNOLOGY (GNET). 4 JUL, 2024. 8p.

Firearm Violence: A Public Health Crisis in America

UNITED STATES. PUBLIC HEALTH SERVICE. OFFICE OF THE SURGEON GENERAL

From the document: "A recent nationally representative survey (n=1,271) found that the majority of U.S. adults or their family members (54%) have experienced a firearm-related incident. Among all respondents, 21% have personally been threatened with a firearm, 19% have a family member who was killed by a firearm (including by suicide), 17% have witnessed someone being shot, 4% have shot a firearm in self-defense, and 4% have been injured by a firearm (Figure 2). 'Nearly 6 in 10 U.S. adults say that they worry 'sometimes,' 'almost every day,' or 'every day,' about a loved one being a victim of firearm violence.' Such high levels of exposure to firearm violence for both children and adults give rise to a cycle of trauma and fear within our communities, contributing to the nation's mental health crisis. This Advisory describes the public health crisis of firearm violence in America and describes strategies for firearm injury and violence prevention, with a focus on the health and well-being of children, families, and communities."

United States. Public Health Service. Office of the Surgeon Genera. . 2024. 49p.

“You are doomed!" Crisis-specific and Dynamic Use of Fear Speech in Protest and Extremist Radical Social Movements

By Simon Greipl, Julian Hohner, Heidi Schulze, Patrick Schwabl, Diana Rieger

Social media messages can elicit emotional reactions and mobilize users. Strategic utilization of emotionally charged messages, particularly those inducing fear, potentially nurtures a climate of threat and hostility online. Coined fear speech (FS), such communication deliberately portrays certain entities as imminently harmful and drives the perception of a threat, especially when the topic is already crisis-laden. Despite the notion that FS and the resulting climate of threat can serve as a justification for radical attitudes and behavior toward outgroups, research on the prevalence, nature, and context of FS is still scarce. The current paper aims to close this gap and provides a definition of FS, its theoretical foundations, and a starting point for (automatically) detecting FS on social media. The paper presents the results of a manual as well as an automated content analysis of three broadly categorized actor types within a larger radical German Telegram messaging sphere (2.9 million posts). With a rather conservative classification approach, we analyzed the prevalence and distribution of FS for more than five years in relation to six crisis-specific topics. A substantial proportion between 21% and 34% within the observed communication of radical/extremist actors was classified as FS. Additionally, the relative amount of FS was found to increase with the overall posting frequency. This underscores FS's potential as an indicator for radicalization dynamics and crisis escalation.

Journal of Quantitative Description: Digital Media. Vol. 4, 2024.

'Substitution': Extremists' New Form of Implicit Hate Speech to Avoid Detection

RISIUS, MARTEN; NAMVAR, MORTEZA; AKHLAGHPOUR, SAEED; XIE, HETIAO (SLIM)

The following excerpt from the document contains multiple links embedded in the original text: "'Content Warning: This insight contains antisemitic, racist, and hateful imagery.' [...] Extremists exploit social media platforms to spread hate against minority groups based on protected attributes such as gender, religion, and ethnicity. Platforms and researchers have been actively developing AI tools to detect and remove such hate speech. However, extremists employ various forms of implicit hate speech (IHS) to evade AI detection systems. IHS spreads hateful messages using subtle expressions and complex contextual semantic relationships instead of explicit abusive words, bringing challenges to automatic detection algorithms. Common forms of IHS include dog whistles, coded language, humorous hate speech, and implicit dehumanisation. Moreover, the forms and expressions of IHS evolve rapidly with societal controversies (e.g., regional wars). Identifying and tracking such changes in IHS is crucial for platforms trying to counter them. In this Insight, we report and analyse 'Substitution' as a new form of IHS. Recently, we observed extremists using 'Substitution' by propagating hateful rhetoric against a target group (e.g., Jews) while explicitly referencing another label group (e.g., Chinese). We show that Substitution not only effectively spreads hate but also exacerbates engagement and obscures detection."

GLOBAL NETWORK ON EXTREMISM AND TECHNOLOGY (GNET). 24 JUN, 2024. 8p.

2024 Department of Defense Arctic Strategy

UNITED STATES. DEPARTMENT OF DEFENSE

From the document: "The United States is an Arctic nation, and the region is critical to the defense of our homeland, the protection of U.S. national sovereignty, and our defense treaty commitments. I am issuing this 2024 Arctic Strategy to guide the U.S. Department of Defense (DoD) in a concerted approach to preserve the Arctic as a stable region in which the U.S. homeland remains secure and vital national interests are safeguarded. Major geopolitical changes are driving the need for this new strategic approach to the Arctic, including Russia's full-scale invasion of Ukraine, the accession of Finland and Sweden to the NATO Alliance, increasing collaboration between the People's Republic of China (PRC) and Russia, and the accelerating impacts of climate change. This increasingly accessible region is becoming a venue for strategic competition, and the United States must stand ready to meet the challenge alongside Allies and partners. This new DoD strategy directs the Department to enhance its Arctic capabilities, deepen engagement with Allies and partners, and exercise our forces to build readiness for operations at high latitudes. The document supports the 2022 National Security Strategy as well as the 2022 National Strategy for the Arctic Region, and its lines of effort implement the 2022 National Defense Strategy direction to adopt a 'monitor-and-respond' approach to preserving stability in the Arctic. This strategy represents prudent and measured efforts to protect U.S. interests in the face of new challenges and an evolving security environment."

Washington DC. UNITED STATES. DEPARTMENT OF DEFENSE. 21 JUN, 2024. 28p.

Fulcrum: The Department of Defense: Information Technology Advancement Strategy

UNITED STATES. DEPARTMENT OF DEFENSE. CHIEF INFORMATION OFFICER

From the document: "Fulcrum represents the Department's ambitious Information Technology (IT) advancement strategy designed to leverage the power of technology to drive transformative change and serves as a tipping point for catalyzing digital modernization for the warfighter. To propel the Department forward, we must ensure continued success and relevance in the digital age. Fulcrum will enable achievement of the DoD mission and strategic objectives with unparalleled efficiency and effectiveness. [...] The DoD Chief Information Officer's (DoD CIO) mission is to 'connect', 'protect', and 'perform'. Fulcrum outlines a vision guided by four lines of effort (LOEs) representing a strategic shift that embraces technology as a mission enabler. [...] Fulcrum features the DoD CIO's IT goals and objectives for Fiscal Years (FYs) 2025-2029 that provide essential support to the priorities in the National Defense Strategy (NDS), and the supporting DoD Strategic Management Plan (SMP)."

UNITED STATES. DEPARTMENT OF DEFENSE. 6 JUN, 2024

Firearm Homicide Demographics Before and After the COVID-19 Pandemic

By Alex R. Piquero, John K. Roman

In 2020, the US experienced the largest 1-year increase in homicide since 1960. The spike began in the first few months of the year, accelerating during the COVID-19 pandemic, emergency measures, the murder of George Floyd, and social protests.1 Three additional observations are relevant. First, the US Centers for Disease Control and Prevention (CDC) reported that the homicide increase in 2020 was due to firearm injuries. While the overall homicide rate increased 28.4%, the firearm homicide rate increased 34.6%.2 Second, the spike in violence was concentrated within certain demographic groups. CDC researchers found 19 384 victims of firearms homicide in 2020.3 Of those victims, 61% were Black individuals, and they experienced firearm homicide at 14 times the rate of White indviduals in 2020. This racial disparity does not exist for other types of violence.4 Third, the largest increases in death by firearm homicide were for Black men aged between 10 and 44 years old

JAMA Network Open. 2024;7(5):e2412946. doi:10.1001/jamanetworkopen.2024.12946

Firearm Violence: A Public Health Crisis in America

By The U.S. Surgeon General

Since 2020, firearm‑related injury has been the leading cause of death for U.S. children and adolescents (ages 1–19), surpassing motor vehicle crashes, cancer, and drug overdose and poisoning (Figure 1). In 2022, 48,204 total people died from f irearm‑related injuries, including suicides, homicides, and unintentional deaths. This is over 8,000 more lives lost than in 2019 and over 16,000 more lives lost than in 2010 .

Washington, DC: Office of the U.S.Surgeon General, 2024. 40p.

Grievance-fuelled violence: Modelling the process of grievance development

By Emily Corner and Helen Taylor

Acts of extreme or mass violence perpetrated by lone offenders have become increasingly common in liberal democracies over the past 20 years. Some describe these acts as politically motivated, while others attribute them to mental disorder or criminal intent. This has led to the development of distinct research and practice areas focusing on either violent extremism, mass murder, fixation, stalking, or familial and intimate partner homicide. However, there is increasing understanding that the distinction between political ideology, criminal intent and personal motivation is blurred, and that the violence carried out by these individuals is better understood using the broader concept of grievance-fuelled violence. This work is the first to empirically consolidate the existing research in these distinct areas, employing a multifaceted analytical approach to develop a holistic model of the processes of grievance development among those who commit grievance-fuelled violence.

Research Report no. 27. Canberra: Australian Institute of Criminology. 2023. 95p.