Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Terrorism and Immigration: A Risk Analysis, 1975-2022

By Nowrasteh, Alex

From the document: "Terrorism is a hazard to human life and material prosperity that should be addressed in a sensible manner whereby the benefits of actions taken to contain it outweigh the costs. A total of 219 foreign-born terrorists were responsible for 3,046 murders on U.S. soil from 1975 through the end of 2022. The chance of a person perishing in a terrorist attack committed by a foreigner on U.S. soil over the 48-year period studied here is 1 in 4.3 million per year. The hazard posed by foreigners who entered on different visa categories varies considerably. For instance, the annual chance of an American being murdered in a terrorist attack by a refugee is about 1 in 3.3 billion, while the annual chance of being murdered in an attack committed by an illegal immigrant is zero. Looking at this spectrum of risk, any government response to terrorism must consider the wide range of hazards posed by foreign-born terrorists who entered under various visa categories. There were 219 foreign-born terrorists who planned, attempted, or carried out attacks on U.S. soil from 1975 through 2022. Of those, 67 percent were Islamists, 16 percent were foreign nationalists, 6 percent were right-wing extremists, 5 percent were non-Islamic religious terrorists, 4 percent were left-wing extremists, and the rest were separatists, adherents of other or unknown ideologies, or targeted worshippers of specific religions. The federal government has an important role in screening all foreigners who enter the United States and excluding those who pose a threat to the national security, safety, or health of Americans, as foreign-born terrorists explicitly do. This focused terrorism risk analysis can aid in the efficient allocation of scarce government-security resources to best counter the small threat of foreign-born terrorists."

CATO Policy Analysis No. 958. 2023.

The Political Economy of Terrorism, Counterterrorism, and the War on Terror

By Anne R. Bradley, Christopher J. Coyne and Abigail R. Hall

This Element explores the topics of terrorism, counterterrorism, and the US government's war on terror following the September 11, 2001 terror attacks. It draw on insights from Austrian and public choice economics. First, the foundations of the economics of terrorism are discussed emphasizing that the behaviors of terrorists and counter-terrorists are purposeful and goal-oriented. Then, the economics of counterterrorism policies and the importance of institutional change is considered. Next, the three dilemmas facing liberal societies as it relates to counterterrorism efforts is focused on. The Element then provides an assessment of the US government's war on terror. It discusses the origins of the war, discuss whether it can be judged a success or failure, and consider some of the main effects both abroad and within the United States. The final chapter concludes with a discussion of several areas for future research.

Cambridge University Press. 31 August 2023. 86p.

The Friendcraft of of Middle Powers: how the Netherlands & & Denmark supported the War on on Terror and how this affected their friendship with the US

By Yuri van Hoef

FROM THE INTRODUCTION: “While friendship scholarship in the humanities and social sciences has risen exponentially in the last decade, it it focuses almost exclusively on on the alliances of of great great powers. powers.[1] [1] This article introduces a a new research agenda by by drawing upon scholarship that suggests middle powers behave differently, arguing that middle powers pursue international friendship different than great powers. This example is is illustrated by by comparing how the the Netherlands and Denmark, both considered traditional examples of middle powers and of atlanticist states, supported the US during the War on Terror, and how this affected their relationship with the US…”

Academia Letters, July 2021. 10p.

The Palgrave Handbook of Global Counterterrorism Policy

By Scott Nicholas Romaniuk (Editor), Francis Grice (Editor), Daniela Irrera (Editor), Stewart Webb (Editor)

The Palgrave Handbook of Global Counterterrorism Policy examines a comprehensive range of counterterrorism policies, strategies, and practices across dozens of states and actors around the world. It covers the topics of terrorism and counterterrorism both thematically and by region, allowing for discussions about the underpinning dynamics of these fields, consideration of how terrorism and counterterrorism are evolving in the modern period, and in-depth analyses of individual states and non-state actors, and their approaches to countering terrorism and terrorist threats. It draws upon a multidisciplinary range of established scholars and upcoming new researchers from across multiple fields including political science and international relations, sociology, and history, examining both theory and practice in their respective chapters. This volume is an essential resource for scholars and practitioners alike. (From Amazon)

NY. Palgrave Macmillan. 2017. 1084p.

Cults and Online Violent Extremism

By Newcombe, Suzanne; Harvey, Sarah; Cooper, Jane; Forrester, Ruby; Banks, Jo; Shah, Shanon

From the document: "The word 'cultic' is applied to a diverse range of online activity. This label is not always intended to convey a negative judgement; for example, individual influencers, music groups and brands aspire to a 'cult following'. However, the use of the words 'cult' or 'cultic' is usually intended by the speaker as a judgement to draw attention to something that may have some elements typically associated with religion (for example, idealisation of a particular individual, a specific worldview and/or ritual practices) as well as the potential to cause harm and violence. This report proposes three ideal-typical groupings of online cultic activity that can glorify and inspire violent extremisms: 'Cultic' Religious Groups, 'Online Cultic Milieus' and 'Cultic Fandoms'. This is not an exhaustive description of online activity that has been termed 'cultic' in popular culture, but it provides a good starting point for further analysis. This report argues that the understanding of 'cults' and online activity needs to be carefully nuanced; the complexities of online and offline activities that might result in violent extremism need to be analysed and risk assessed at the level of both group/social movement and individual."

The future of terrorism research: a review essay

By Joshua D. Freilicha, Steven M. Chermak and Jeff Gruenewald

This essay sets forth a research agenda to begin filling some key gaps in terrorism studies. Since the September 2001 Al Qaeda attacks against the World Trade Center towers and the Pentagon that claimed over 3000 lives, interest in terrorism research has increased. After these attacks, the United States and other governments prioritized the scientific study of the causes of and responses to terrorism. Importantly though, our review of the terrorism literature demonstrates that despite this progress, intriguing questions remain underexplored or altogether unexplored. This essay identifies four gaps in terrorism studies: (1) employing non-terrorist comparison groups, (2) broad- ening the dependent variable (focus of study), (3) exploring exceptions/anomalies to “established” findings, and (4) engaging measurement issues. We discuss these issues and outline a research agenda that could begin to fill these gaps.

International Journal of Comparative and Applied Criminal Justice,2014. DOI: 10.1080/ 01924036.2014.922321.

Surveying American State Police Agencies About Terrorism Threats, Terrorism Sources, and Terrorism Definitions

By Joshua D. Freilich, Steven M. Chermak, and Joseph Simone Jr.

ABSTRACT. This study presents American state police agencies’ perceptions about three signifi- cant terrorism and public safety issues. First, we asked about the threat posed by specified extremist groups nationally and to their state. We asked about the number of such groups and their supporters, and the number of activities each group parti- cipates in during a typical year in their state. We also asked about the number of criminal incidents each group commits and the number of their supporters arrested in a typical year. Second, we asked the agencies to rate the usefulness of fifteen spe- cified terrorism sources. Third, we queried the agencies about their views of eight terrorism definitions. These data were collected by surveying the fifty state police.

Terrorism and Political Violence, 21: 3, 450 — 475. DOI: 10.1080/09546550902950324 URL: http://dx.doi.org/10.1080/09546550902950324.

Mega Terrorist Attacks and Contingency Plan for Law Enforcement: The Case of Istanbul

By Ekrem Ersen Emeksiz

ABSTRACT This research presents Istanbul, Turkey and its law enforcement as a case study for the design of a contingency plan to increase efficiency of counterterrorism efforts and coordination among the agencies. This contingency plan involves the implementation of techniques and strategies based on situational crime prevention, moral panic and crisis theories on predetermined terror targets in the city of Istanbul to reduce the impact of a mega terrorist attack. The research applies the EVIL DONE and CARVER concepts to assess current terrorism risks and threats for critical targets. In assessing risks and threat conditions, this research proposes a contingency plan for law enforcement in Istanbul. The purpose of the contingency plan is to reduce target vulnerabilities and enhance target resilience as well as control moral panic conditions during large-scale terror incidents.

Unpublished paper. 2023. 25p.

National Cybersecurity Strategy Implementation Plan

By United States. White House Office

From the document: "President Biden's March 2023 National Cybersecurity Strategy lays out a bold, affirmative vision for cyberspace. It outlines a path for achieving two significant shifts: the need for more capable actors in cyberspace to bear more of the responsibility for cybersecurity and the need to increase incentives to make investments in long term-resilience. Achieving the President's cybersecurity vision requires coordinated action across the United States Government and American society. The National Cybersecurity Strategy Implementation Plan is a roadmap for this effort. While it does not intend to capture all cybersecurity activities being carried out by agencies, it describes more than 65 high-impact initiatives requiring executive visibility and interagency coordination that the Federal government will carry out to achieve the Strategy's objectives. Each initiative is assigned to a responsible agency and is associated with a timeline for completion. Some of these initiatives are already underway and will be completed by the end of Fiscal Year 2023. The Office of the National Cyber Director will work with the Office of Management and Budget to ensure funding proposals in the President's Budget Request are aligned with activities in the Implementation Plan. This is the first iteration of the Implementation Plan, which is a living document that will be updated annually. Initiatives will be added as the evolving cyber landscape demands and removed after completion."

United States. White House Office . 2023. 67p.

Strategic Intelligence Assessment and Data on Domestic Terrorism [June 2023]

By United States. Federal Bureau Of Investigation; United States. Office Of Homeland Security

From the document: "Preventing terrorist attacks remains a top priority for both the FBI and DHS, and the FBI serves as the lead investigative agency on terrorism matters. The threat posed by international and domestic threat actors has evolved significantly since 9/11. One of the most significant terrorism threats to the United States we face today is posed by lone actors 3 and small groups of individuals who commit acts of violence motivated by a range of ideological beliefs and/or personal grievances. Of these actors, domestic violent extremists represent one of the most persistent threats to the United States today. These individuals are often radicalized online and look to conduct attacks with easily accessible weapons. Many of these violent extremists are motivated and inspired by a mix of ideological, socio-political, and personal grievances against their targets. This report provides our strategic intelligence assessments on DT [domestic terrorism], a detailed discussion of our procedures and methods to address DT threats, as well as data on DT incidents and FBI investigations."

United States. Federal Bureau Of Investigation; United States. Office Of Homeland Security . 2023. 46p.

The Colombo-Venezuelan Guerrillas: How Colombia’s War Migrated to Venezuela

By Unidad de investigación de Venezuela

For twenty years, Venezuela was a refuge for Colombia’s Marxist guerrillas, a place where they could hide out from the military, run criminal economies, and carry out political work with impunity thanks to their friendly relationship with the government of President Hugo Chávez. But today, it is so much more. Guerrillas such as the ELN have spread deep into Venezuelan territory, they are filling their ranks with recruits, taking control of communities, and interfering in politics. Today, they are binational guerrilla groups. The product of five years of fieldwork along the Colombia-Venezuela border and beyond, this investigation reveals the Venezuelan operations of Colombia’s guerrillas and explores the far-reaching implications for both countries of their evolution into Colombo-Venezuelan groups.

Washington, DC: Insight Crime, 2022. 53p.

Guns, Incels, and Algorithms: Where We Are on Managing Terrorist and Violent Extremist Content Online

Armstrong-Scott, Gabrielle L.; Waldo, Jim

From the document: "Ten years ago, U.S. national security agencies grew concerned about a relatively new and powerful weapon used by terrorists: the World Wide Web. What had begun as an effort to connect end users from across the world to share information and to serve as a force of human liberation, instead began to be used as a tool for destruction of life. Terrorists were exploiting technology companies' lax content moderation policies to recruit new members, spread violent extremist ideology, and plan terrorist attacks. [...] Technology companies and governments have spent the past decade trying to better address the evolving threat of terrorist and violent extremist content online (TVEC). However, there are few studies examining just how effective these efforts have been, where we are today in managing the problem, and wherein lie gaps for improvement. This paper argues that companies' efforts to deal with TVEC have been hampered at the outset by a tendency to define TVEC extremely narrowly. [...] This paper also explores the idea of ethical obligations and norms as an alternative to a legally required definition. On the technical side, this paper finds that even if there was consensus on the legal and ethical questions surrounding TVEC, the technical tools currently available are no panacea. Trade-offs across efficiency, scalability, accuracy, and resilience are persistent. Current technical tools tend to disadvantage minority groups and non-English languages. They are also less robustly implemented across small and non-U.S./European firms, generally either because they are left out of inter-firm initiatives or because they lack resources and capability. This paper does not claim to cover every issue relevant to TVEC; however, it highlights several important gaps that could be addressed by policymakers and tech companies and identifies avenues for future research."

Belfer Center For Science And International Affairs. 2023.

Learning from Foes: How Racially and Ethnically Motivated Violent Extremists Embrace and Mimic Islamic State's Use of Emerging Technologies

By Yannick Veilleux-Lepage, Chelsea Daymon and Emil Archambault

  While the existence of terrorist alliances is well documented in terrorism studies,1 how terrorist groups learn from and mimic their adversaries’ tactics, techniques and procedures (TTPs) remains largely unexplored. Building on existing terrorist innovation literature, this report introduces a framework to understand what factors can propel or hinder a terrorist group’s adoption of new TTPs. Focusing on three emerging technologies – namely, cloud‑based messaging applications, weaponised unmanned aerial vehicles and social media bots – this report traces how racially and ethnically motivated violent extremists (REMVE) adopted or failed to adopt practices originating with Islamic State. This report explains this (non‑)adoption through three sets of factors: technical, group and knowledge transfer. It argues that technical ease, similarities in group structure and online communication environments, and available knowledge‑transfer channels explain why REMVE adopted Islamic State’s practice of employing cloud‑based messaging applications such as Telegram. Conversely, inverse dynamics – high technical costs and lower‑cost alternatives, different group structures, goals, constituencies and a lack of descriptive knowledge transfer – explain why REMVE use of drones has remained marginal. Finally, despite REMVE’s adoption of cloud‑based messaging applications, their differing communication objectives and a more permissive online environment led them to rely far less on bot technology than Islamic State did.  

London:  The Global Network on Extremism and Technology (GNET) 2022. 35p.

The Role of Violent Conspiratorial Narratives in Violent and Non-Violent Extreme Right Manifestos Online, 2015-2020

By William Allchorn, Andreas Dafnos and Francesca Gentile

  Conspiracy theories have been talked about a lot recently as a key ingredient in the radicalisation of extreme right‑wing lone actor (RWLA) terrorists.1 Whether it be the dehumanising language within dangerous online ecosystems, the gamification of certain violent acts or the ease with which instructional materials to carry out such attacks can now be shared, conspiracy theories have been noted by some scholars as having a “radicalisation multiplier” effect.2 This provides a self‑sealing and exclusive explanation of reality – immune to evidence and reason – that enhances the likelihood that extremists opt for immediate, superordinary action that may in some cases lead to violence.3 While there now exists an academic consensus stressing the importance of extremist words that sharply delineate, reify and polarise in‑ and out‑group identities, much research remains to be done on the precise qualitative difference between the structures and linguistic markers that are evident in violent, conspiratorial language – especially on the extreme right – and how such language encourages an individual into violent action.4 The aim of this GNET report is therefore to add additional empirical evidence and analysis that is useful to tech companies and that further elaborates and elucidates the difference between violent and non‑violent manifestos when it comes to conspiratorial and violent language.

London: The Global Network on Extremism and Technology (GNET), 2022 , 47p.

Mental disorder, psychological problems and terrorist behaviour: A systematic review and meta-analysis

Kiran M. Sarma Sarah L. Carthy Katie M. Cox

The link between mental health difficulties and terrorist behaviour has been the subject of debate for the last 50 years. Studies that report prevalence rates of mental health difficulties in terrorist samples or compare rates for those involved and not involved in terrorism, can inform this debate and the work of those responsible for countering violent extremism. To synthesise the prevalence rates of mental health difficulties in terrorist samples (Objective 1—Prevalence) and prevalence of mental health disorders pre-dating involvement in terrorism (Objective 2—Temporality). The review also synthesises the extent to which mental health difficulties are associated with terrorist involvement compared to non-terrorist samples (Objective 3—Risk Factor).

Campbell Systematic Reviews, 2022.

What Are the Effects of Different Elements of Media on Radicalization Outcomes? A Systematic Review

By Michael WolfowiczBadi HasisiDavid Weisburd

Most national counter-radicalization strategies identify the media, and particularly the Internet as key sources of risk for radicalization. However, the magnitude of the relationships between different types of media usage and radicalization remains unknown. Additionally, whether Internet-related risk factors do indeed have greater impacts than other forms of media remain another unknown. Overall, despite extensive research of media effects in criminology, the relationship between media and radicalization has not been systematically investigated. This systematic review and meta-analysis sought to (1) identify and synthesize the effects of different media-related risk factors at the individual level, (2) identify the relative magnitudes of the effect sizes for the different risk factors, and (3) compare the effects between outcomes of cognitive and behavioral radicalization. The review also sought to examine sources of heterogeneity between different radicalizing ideologies.

. ampbell Systematic Reviews, Volume18, Issue2. June 2022. e1244

The Input: Pathways to Jihad: A Thematic Analysis of 310 Cases

By Kacper Rekawek, Viktor Szucs, Martina Babikova, and Katsiaryna Lozka  

For the last year and a half, GLOBSEC has been studying the phenomenon of a crime-terror nexus in Europe. Its research team has built up a dataset of 348 individuals arrested for terrorism offences, expelled for alleged terrorist connections, or who died while staging terrorist attacks in Europe in 2015, the peak year of European jihadism. The dataset covers the 11 European countries, all within the EU, who reported the highest number of terrorism arrestees to EUROPOL (European Police Office). The work has been geared towards establishing whether the nexus exists and if so, then researching its nature and strength. The researchers deployed 11 experienced national teams who worked on available data (open source, official documents, personal interviews with stakeholders) to map out the European crime-terror nexus. The main research tool is a 120+ variable codebook deployed to analyse each case of a terrorist included in our dataset. As a result, the research team was able to establish that out of the 310 jihadists included in the database, 95, or 31%, had a previous criminal past, indicated by a pre-2015 arrest for any offence, with the French subset recording the most criminals (44 of the individuals, or 46%, have a criminal past preceding their terrorist involvement). Data show it is a male phenomenon, comprising 264, or 88%, of the individuals in our database. The European jihadists are not youngsters, as their average age is 34 (average male: 29; average female: 34; average “criminal turned terrorist”: 34), nor are they very well educated (the research team only knows of 72 who “had some high school” experience, and hardly any attended university).

Slovak Republic: GLOBSEC Policy Institute....28p.

Status of ISWAP and ISGS in West Africa and Sahel

By Pieter Van Ostaeyen | Kwesi Aning  

Since the initial rise in violent extremist and terrorist groups in the Sahel in the mid-2000s, the number of such groups in the region has continued to grow. This is reflected in the nature of the opportunistic alliances that have developed among different groups, with varying interests and memberships. Furthermore, these groups have changed their operational tactics over time and, since 2019, began a gradual expansion of their activities towards the littoral states of West Africa. This paper focuses on two of the most important extremist groups in the Sahel: Islamic State in West Africa Province (ISWAP) and Islamic State in Greater Sahel (ISGS). In discussing the origins of both groups, this paper argues that their establishment was not borne out of religious rationales alone. Rather, ISWAP’s and ISGS’s formation and expansion were based on their fractured relationships with the organizations from which they split and to a certain extent transformed, as well as their pursuit for new allegiances and competition for preeminence in the leadership as they battled to expand and establish Islamic states in northern Nigeria, Cameroon, Chad, Niger, and the Sahel. Ideologically, this paper identifies the adoption of Takfiri doctrines as the driving force resulting in more draconian interpretation and implementation of Islamic laws implemented by the hisba relating to zakat, hudud, ta’zir, and qisas. This paper argues that factionalism and splits from the original organizations represent fundamental splits from their original members and that the alliances formed by these originally distinct groups constitute a fundamental split and shift in operational tactics. ISWAP and ISGS operations are characterized by opportunism and exploitation of local grievances that enables them to build specific narratives for support….

Berlin: Konrad-Adenauer-Stiftung e.V.. Counter Extremism Program, 2023. 20p.  

Development of al-Qaeda in the Western Sahel Region

By Edmund Fitton-Brown and Bakary Sambe 

  This short paper explores how Jamaat Nusrat Al-Islam wal-Muslimin (JNIM), the predominant coalition of al-Qaeda (AQ) affiliates in the region, is structured and financed and how its component parts relate to one another. The paper will outline how the various groups constituting JNIM train and operate jointly and the extent of their use of trafficking routes and overlap with regional organized crime. It addresses the extent to which the spillover of JNIM activity from Mali and Burkina Faso into the Atlantic/Gulf of Guinea littoral states represents a threat to their stability. It also addresses the impact of political instability in Mali, Burkina Faso, and elsewhere on counterterrorism (CT) activity and the impact on terrorism of external state and non-state assistance. The paper seeks to diagnose the challenges posed by JNIM considering its local and regional circumstances on the ground and to provide operationally relevant recommendations both for actions within the region itself and through the use of international resources. The recommendations seek to integrate CT with measures aimed at preventing and countering extremism, conflict resolution, and development goals. They also highlight that the needs vary between different countries in the region. For example, measures applied to Mali cannot easily be transferred to mitigate the challenges in Burkina Faso  

Berlin: Konrad-Adenauer-Stiftung e.V. , Counter Extremism Program, 2023. 14p.

Linkages of terrorist groups in West Africa with terrorist networks in other African regions

By Ini Dele-Adedeji | Sofia Koller

This policy paper summarizes the current state of affairs regarding the linkages of terrorist groups in West Africa with terrorist networks in other African regions. It also provides recommendations for policymakers and security agencies. ● The paper looks at linkages of JNIM, IS West Africa Province (ISWAP), and IS in the Greater Sahara (ISGS) with terrorist groups in North, West-Central, Eastern, and Southern Africa. ● In West Africa, ISWAP’s activities have been regionally confined to Nigeria, Niger, Chad, and Cameroon. There is no indication that ISWAP intends to expand its territorial base beyond these countries or that it has any transregional linkage with terrorist groups in other parts of Africa. ● JNIM and ISGS have demonstrated that they possess the intention and capability of regional expansion across West Africa. Increasing attacks further southwards in West Africa and their presence in the neighboring regions of Ivory Coast, Ghana, Togo, and Benin suggests that both groups intend to expand their geographical zone of influence to the Gulf of Guinea….

Berlin: Konrad-Adenauer-Stiftung e.V. Counter Extremism Program, 2023. 16p.