Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Exploring The Role Of The Internet In The Radicalisation Process And Offending Of Convicted Extremists

By Jonathan Kenyon

The overarching aim of this doctoral research was to investigate the role of the Internet in radicalisation pathways and offending of convicted extremists in England and Wales. The empirical study was unique because it benefitted from access to closed source risk assessment reports within His Majesty’s Prison and Probation Service (HMPPS). These reports were authored by Psychologists and Probation Officers with access to restricted case documentation and in the majority of cases, direct interviews with the individuals concerned. Findings were based on 235 convicted extremists, all of whom were considered to have radicalised prior to committing their offence. Variables of interest, including offender demographics, offence characteristics and online activities were extracted from risk reports completed from October 2010 to December 2017. Since completion of the doctorate, the analysis has been expanded to 437 convicted extremists, which includes all those subject to risk reports from October 2010 to December 2021. This accounts for close to every convicted extremist in England and Wales considered to have radicalised prior to their conviction.

Scotland: Centre for Research and Evidence on Security Threats, 2023, 4p.

Good Lives in Right-Wing Extremist Autobiographies

By Hanna Paalgard Munden, Sarah Marsden, MD Kamruzzaman Bhuiyan, Lotta Rahlf, Hanna Rigault Arkhis, Aimee Taylor

This report sets out the findings of research to understand the potential of the Good Lives Model (GLM) to interpret trajectories into and out of violent extremism and considers the implications for policy and practice. The Good Lives Model (GLM) is a well-developed manifestation of a strength-based approach to rehabilitation. The model argues that focusing on developing strengths and enhancing protections, rather than solely managing and controlling risk factors, offers a more fruitful route to preventing (re)offending. The GLM has become an increasingly prominent part of efforts to rehabilitate criminal offenders, however its potential with respect to the violent extremist population has not been fully exploited. This report is informed by a review of research on protective factors set out in an earlier report: Conceptualising Protective Factors: Strength-Based Approaches (Marsden and Lee, 2022) that established the theoretical foundation for the empirical research set out here.

Scotland: Centre for Research and Evidence on Security Threats, 2023, 30p.

Online Radicalisation: A Rapid Review of the Literature

By Rosamund Mutton, James Lewis, and Sarah Marsden

This guide sets out the evidence base for ‘online radicalisation’, examining how individual use of the Internet, in conjunction with offline influences, can facilitate radicalisation processes. The UK is the main context of concern, however comparable evidence is found in studies with samples from the USA, Canada, Belgium, Germany, Austria, and Israel. Radicalisation remains a contentious concept and few studies explicitly define ‘online radicalisation’. For the purposes of this guide, ‘radicalisation’ is understood as leading to cognitive outcomes reflected in changes in beliefs and ideas, and/or behavioural outcomes which manifest in changes in behaviour. Two systematic literature reviews (Hassan et al., 2018; Carthy et al., 2020) directed initial searches for relevant research. Further literature was identified through forward and backward citation searching, and narrower key word searches conducted in Google Scholar. Literature searches were completed between June and August 2022. The guide primarily examines literature published between January 2017 and July 2022. Although the evidence base remains modest in size, the research underpinning this guide is assessed to be good quality. There is a growing body of evidence that uses qualitative and quantitative methods to examine a range of factors which are relevant to online radicalisation.

Scotland: Centre for Research and Evidence on Security Threats, 2023, 42p.

Proscribed Terrosist Organisations

By Joanna Dawson

This paper describes the recent history and present status of proscribed organisations under the Terrorism Act 2000 (the “2000 Act”). Prior to the 2000 Act, proscription was exclusively concerned with terrorism connected with the affairs of Northern Ireland. Under the 2000 Act, proscription was extended to include organisations concerned with both domestic and international terrorism. The Home Secretary may proscribe an organisation if they believe it is “concerned in terrorism”. If the Home Secretary believes that an organisation meets this statutory test, they must then decide whether to proscribe the organisation. In doing so, they must take into account various policy considerations. Consequences of proscription The 2000 Act sets out a number of proscription offences. These include belonging to or inviting support for a proscribed organisation; arranging or assisting with the arrangement of a meeting that supports a proscribed organisation; addressing such a meeting; or wearing clothing or displaying articles in public which arouse suspicion of membership or support of a proscribed organisation. It is also possible to impose financial sanctions on proscribed organisations.   Current proscribed organisations As of September 2023 there were 79 international terrorist groups proscribed under the Terrorism Act 2000 and 14 organisations in Northern Ireland proscribed under previous legislation. In November 2021 the Home Secretary announced that the Government had laid an instrument to proscribe Hamas in its entirety, ending the distinction between different wings of the organisation. In September 2023 the Government laid an instrument to proscribe Wagner Group, a private military organisation which has acted as a proxy for the Russian state. The Government considers it to involved in committing acts of terrorism, including in relation to its involvement in Russia’s invasion of Ukraine. The Annex to this paper includes a current list of proscribed organisations and a description of their activities. Criticisms of the proscription regime Proscription has been characterised as a powerful deterrent, a way of tackling lower-level support for terrorism, and a signal of rejection by society. But questions have also been raised as to its utility in combating terrorism and its compatibility with the rule of law. The former Independent Reviewer of Terrorism Legislation (IRTL), Lord David Anderson KC, repeatedly recommended the introduction of time limits for proscription orders, as have his successors, Max Hill QC and the current IPTL, Jonathan Hall KC. However, the Government has so far declined to follow these recommendations and currently deproscription is done by way of application only. As a consequence, groups that no longer meet the statutory requirements for proscription continue to be proscribed, a situation described by Lord Anderson as “an affront to the rule of law”.

London: UK Parliament, House of Commons Library, 2024, 70p.

Lone Offender: A Study of Lone Offender Terrorism in the United States (1972--2015)

By the U.S. Federal Bureau of Investigation, Lauren Richards, Peter Molinaro, John Wayne. et al.

Operationally defining the lone offender terrorist is challenging, as the nature of terrorism is both highly political and contextually dependent. Over the years, there has been disagreement over the classification of violent acts under the label of “terrorism.” While an argument can be made that the infliction of fear upon a targeted group or the public is sufficient to classify an act as terrorism, the FBI definition of terrorism requires a purported motivation that goes beyond exclusively personal motivations and attempts to influence change in furtherance of extremist ideologies of a social, political, religious, racial or environmental nature. The focus of the current study examined offenders who carried out their attacks independent of any direction from a terrorist group or organization.Lone offender terrorism continues to pose a threat as violent ideological groups and terrorist organizations place emphasis on inspiring lone offender-style attacks. Additionally, individuals who view violence as an accessible and justified method for advancing their own ideological goals can independently mobilize toward violent action. While attacks directly coordinated by terrorist organizations are generally more lethal globally, the United States departs from this trend: lone offender attacks in the United States are more deadly, possibly due to strong U.S. counterterrorism capacity for disrupting.The current report provides an overview of the data, exploring the various topics encompassed within the coding protocol, including bystander observations, offenders’ backgrounds, family and social networks, behavioral characteristics, radicalization, and attack planning. Predicting lone offender terrorism incidents is not possible, but prior research and operational experience support the conclusion that acts of targeted violence, including lone offender terrorist attacks, may be preventable through early recognition and reporting of concerning behavior. The report aims to inform broader goals of enhancing bystander education and awareness, as well to aid the prevention efforts of law enforcement and multi-disciplinary threat assessment teams working to counter targeted violence threats every day. To work toward this objective, the authors examine relevant contextual factors and analyze the statements and behaviors offenders exhibited before carrying out their attacks.

Washington, DC: U.S. FBI, 2019. 80p.

Active Shooter Incidents in the United States in 2022

By The U.S. Federal Bureau of Investigation

From the document: "In 2013, the president signed into law the Investigative Assistance for Violent Crimes Act of 2012, which led the FBI to examine active shooter incidents since 2000. The findings in this report are intended to provide an overview of active shooter incidents to help law enforcement, other first responders, and the public better understand the levels of threats associated with active shooter incidents. In 2022, the FBI designated 50 shootings as active shooter incidents. Although incidents decreased by 18% from 2021 (61 incidents), the number of active shooter incidents increased by 66.7% compared to 2018 (30 incidents). The 50 active shooter incidents in 2022 occurred in 25 states and the District of Columbia and represent seven location categories, including open spaces, commerce, residences, education, government, houses of worship, and a health care facility. [...] Data cited in this report for active shooter incidents that occurred in 2022 is valid as of February 10, 2023; however, incident data from prior published reports was not updated. If additional incidents meeting FBI criteria are identified after the publication of this document, every effort will be made to factor those incidents into future reporting."

Washington, DC: FBI, 2023. 33p.

Strategic Intelligence Assessment and Data on Domestic Terrorism

By the U.S. Federal Bureau of Investigation and U.S. Office of Homeland Security

From the Executive Summary: "Preventing terrorist attacks remains a top priority for both the FBI and the Department of Homeland Security (DHS). The threat posed by international and domestic threat actors has evolved significantly since 9/11. The greatest terrorism threat to the Homeland we face today is posed by lone offenders, often radicalized online, who look to attack soft targets with easily accessible weapons. Many of these violent extremists are motivated and inspired by a mix of socio-political goals and personal grievances against their targets. With this report, we are providing our strategic intelligence assessments on DT [domestic terrorism], a detailed discussion of our procedures and methods to address DT threats, as well as data on DT incidents and our investigations."

In the Blind Spot – Right-wing Extremists on Alternative and Established Platforms

By Hanna Börgmann

This report provides a summary of the expert conference “In the Blind Spot – Right-Wing Extremists on Alternative and Established Platforms“, which took place in Berlin in September 2023 as part of the “Countering Radicalisation in Right-Wing Extremist Online Subcultures” programme funded by the Federal Ministry of Justice (BMJ). The third conference of the programme served to present current research projects from digital right-wing extremism research and to discuss various perspectives from research, regulation and law enforcement.

The report emphasises the social and political relevance of the research field and current trends in right-wing extremism research, underpinned by welcoming addresses from Benjamin Strasser, State Secretary of the Federal Ministry of Justice (BMJ), and Huberta von Voss, Executive Director of ISD Germany, among others. Dr Julia Ebner, extremism expert and ISD Senior Research Fellow, and Dr Matthias Becker, project manager of the interdisciplinary research project “Decoding Antisemitism”, also provided keynote speeches.

The conference was divided into several panels that focused primarily on discursive and strategic developments, far-right financing, research into right-wing online activities, deradicalization and online regulation. In the discussion panel, a panel of experts focused on the effects of the EU Digital Services Act (DSA).

Berlin: ISD - Institute for Strategic Dialogue, 2023. 19p.

Illicit Firearms Ammunition and Other Explosive Munitions in the European Union

By Anne-Séverine Fabre, Nicolas Florquin, and Matt Schroeder

The trafficking of firearms and their use in criminal violence in Europe has received significant attention from researchers and policymakers. Less is known, however, about the illicit proliferation of firearm ammunition and other explosive munitions. Currently, detailed data on illicit munitions in Europe can only be accessed through specialized law enforcement agencies. National seizure statistics often lack the necessary detail for policy-relevant analysis, as do the media reports, which often include incomplete or inaccurate information on the types and calibres of ammunition.

Illicit firearms ammunition and other explosive munitions in the European Union—a new paper from the Small Arms Survey, as part of the INSIGHT project—provides a regional analysis and overview of the types, sources, and end users of these items, and addresses the need for detailed, policy-relevant data on illicit munitions in Europe.

Geneva, SWIT: Small Arms Survey, 2023. 24p.

Privately Made Firearms in the European Union

By: Anne-Séverine Fabre, Nicolas Florquin, Matt Schroeder, and Andrea Edoardo Varisco

Improvements in technology and information sharing have transformed PMFs from crude, impractical homemade devices of limited value to most criminals into highly functional weapons that are increasingly viewed as viable substitutes for factory-built firearms. The effectiveness of national and international small arms control regimes are gradually being eroded; the lack of serial numbers on such weapons, for example, undermines tracing efforts that have been a cornerstone of investigations.

Privately Made Firearms in the European Union—a new paper from the Small Arms Survey, as part of the INSIGHT project—examines the emerging threat that privately made firearms and their illicit proliferation pose within Europe.

Brussels: Flemish Peace Institute, Geneva: Small Arms Survey, 2023. 18p.

Continuity and Change: Extremist-used Arms in Mali

By: Holger Anders

Mali has faced more than a decade of armed violence perpetrated by extremists, resulting in thousands of victims among national and international armed forces, UN peacekeepers, and civilians.

Continuity and Change: Extremist-used Arms in Mali—a new Briefing Paper from the Small Arms Survey’s Security Assessment in North Africa (SANA) project—investigates the arms, ammunition, explosives, and other material used in extremist attacks in Mali from 2015 to 2022, and the sources and pathways through which they were obtained.

Geneva: Small Arms Survey, 2024. 16p.

Identities Destroyed, Histories Revised: The Targeting of Cultural Heritage and Soft Targets by Illicit Actors

By Michaela Millender

On May 27, 1993, a car bomb blasted through the side of the Uffizi Gallery in Florence, Italy, killing five and wounding around thirty others, and destroying hundreds of priceless pieces of art in the gallery’s collection. Many contend that the gallery was targeted by the Cosa Nostra, or the Sicilian Mafia, not just in retaliation for crackdowns on the organization, but also due to the gallery’s embodiment of Italian culture and its symbolism of the Italian nation. As an open-access museum and a protected UN Educational, Scientific and Cultural Organization (UNESCO) World Heritage site, the city of Florence presents unique challenges to both safeguarding its cultural heritage from risks but also, most critically, remaining open and accessible to the public. Not limited to the Florentine example, this challenge is ubiquitous in the protection of cultural heritage throughout the world. Its symbolic importance, as well as the fact that it attracts large crowds of civilians and may not always be adequately protected, means that cultural heritage – which is often also considered a so-called “soft target” – can be a prime target for violence and an objective for illicit actors, including criminals and terrorists.

New York: Soufan Center, 2024. 26p.

Prohibited Extremist Activities in the U.S. Department of Defense

By Peter K. Levine, Joseph F. Adams, Amy A. Alrich, Rachel G. Augustine, Margaret D.M. Barber, Sujeeta B. Bhatt Kathleen M. Conley, Dave I. Cotting, Alan B. Gelder, Jeffery M. Jaworski, Mark F. Kaye, Carrington A. Metts, Neil V. Mithal, and Matthew J. Reed.

From the document: "The objectives of the IDA [Institute for Defense Analyses] study are to gain greater fidelity on the scope and nature of extremist ideologies and behaviors in the [DOD]; identify the sources of such ideologies and behavior; assess their impact; and develop strategies for preventing, countering, and neutralizing that impact. To that end, the project description calls for IDA to: 1. Document the range of known extremist ideologies and behaviors that are contrary to U.S. law and policy; 2. Identify existing definitions of extremism and prohibited extremist activities; 3. Identify pathways of extremist ideology and behavior broadly and within the Department in particular; 4. Assess why the DOD workforce and others in the military community (including veterans, DOD civilians, and contractor employees) might be susceptible to extremist recruiting efforts; 5. Survey DOD approaches to the prevention of other forms of violence (including suicide, domestic violence, assault, sexual assault, and hate crimes) to identify strategies that might be adopted; 6. Assess policies and initiatives of other federal agencies that might be helpful to the Department; 7. Identify existing legal frameworks for addressing prohibited extremist activities in the Total Force; 8. Evaluate current DOD efforts to counter extremist ideologies and behaviors in the ranks, identifying gaps and strengths; and 9. Review and evaluate current DOD information collection, tracking, and data sharing systems (including through the military justice, equal employment opportunity, command discipline, hotline response systems, insider threat, and law enforcement/security systems)."

INSTITUTE FOR DEFENSE ANALYSES. 2023. 282p.

Great Power Deterrence Lessons from the Middle East War

By PAYNE, KEITH B.

From the document: "With Russia and China as heavily armed and aligned nuclear foes, Washington faces an unprecedented deterrence context and looming threats. Given this new great power alignment, more than 30 states are at increased risk, namely, those allies directly covered by the U.S. nuclear deterrent and those partners greatly affected by the credibility of that deterrent, such as Taiwan and Ukraine. Most U.S. civilian and military leaders who must pay attention to this challenge appear to recognize that the U.S. understanding of deterrence, largely based on its Cold War experience, must be reconsidered in this unprecedented context. The search for guideposts for that understanding is now ongoing. The current war in the Middle East appears to offer some tentative lessons in this regard."

NATIONAL INSTITUTE FOR PUBLIC POLICY (U.S.). 2024. 6p.

Terrorism, Extremism, Disinformation and Artificial Intelligence: A Primer for Policy Practitioners

By GANDHI, MILAN

From the document: "Focussing on current and emerging issues, this policy briefing paper ('Paper') surveys the ways in which technologies under the umbrella of artificial intelligence ('AI') may interact with democracy and, specifically, extremism, mis/disinformation, and illegal and 'legal but harmful' content online. The Paper considers examples of how AI technologies can be used to mislead and harm citizens and how AI technologies can be used to detect and counter the same or associated harms, exploring risks to democracy and human rights emerging across the spectrum. [...] Given the immense scope and potential impacts of AI on different facets of democracy and human rights, the Paper does not consider every relevant or potential AI use case, nor the long-term horizon. For example, AI-powered kinetic weapons and cyber-attacks are not discussed. Moreover, the Paper is limited in examining questions at the intersection of AI and economics and AI and geopolitics, though both intersections have important implications for democracy in the digital age. Finally, the Paper only briefly discusses how AI and outputs such as deepfakes may exacerbate broader societal concerns relating to political trust and polarisation. Although there is a likelihood that aspects of the Paper will be out-of-date the moment it is published given the speed at which new issues, rules and innovations are emerging, the Paper is intended to empower policymakers, especially those working on mis/disinformation, hate, extremism and terrorism specifically, as well as security, democracy and human rights more broadly. It provides explanations of core concerns related to AI and links them to practical examples and possible public policy solutions."

INSTITUTE FOR STRATEGIC DIALOGUE. 2024.

Using Artificial Intelligence and Machine Learning to Identify Terrorist Content Online

By MACDONALD, STUART KEITH, 1979-; MATTHEIS, ASHLEY A.; WELLS, DAVID

From the document: "Online terrorist propaganda has been an important policy concern for at least the past decade. [...] [T]he EU Commission launched a call for proposals for projects aimed at supporting small companies in implementing the Regulation. Three projects were funded under this call. This report forms part of one of these projects, which is entitled Tech Against Terrorism Europe. It is important to note at the outset that the focus of this report is the use of AI and machine learning to identify terrorist content online using content-based approaches. Accordingly, the following are outside the scope of the report: [1] The moderation of so-called borderline content, i.e., content that does not violate a platform's Terms of Service but which is nevertheless regarded as potentially harmful. [2] The identification of individuals on a radicalisation trajectory, which is a different - and even more difficult - task; and, [3] The use of behaviour-based cues, such as abnormal posting volume and use of unrelated, trending hashtags, to identify accounts that are sharing terrorist content. This includes approaches based on recidivism. The report begins, in section 2, by explaining the terms AI, machine learning and terrorist content online. Readers that are already familiar with these concepts may wish to move straight to section 3, which discusses the two main content-based approaches to the automated identification of terrorist content online: matching-based approaches and classification-based ones. Having explained the limitations of each approach, section 4 details two ways in which it is necessary to supplement automated tools. Section 5 then addresses issues of resource, before the report concludes with three recommendations."

TECH AGAINST TERRORISM; TECH AGAINST TERRORISM EUROPE.. 2023.. 32p.

Economic warfare in southern Mali Intersections between illicit economies and violent extremism

By Ndubuisi Christian Ani

The densely populated southern regions of Kayes and Koulikoro in Mali are at a watershed moment, with the rapid expansion into the regions by Jama’a Nusrat ul-Islam wa al-Muslimin (JNIM) from the north and central regions. The two regions provide JNIM with new and profitable frontiers for resource exploitation, such as access to a vast tax base and control of the lucrative timber logging sector. The regions also provide JNIM with opportunities for cattle rustling, kidnapping, banditry and access to artisanal gold mining sites. Key points For the government l Promote regular confidence-building initiatives between farmer and herder communities in order to reduce stigmatisation and alliance with JNIM. l Initiate a national dialogue with the aim of prohibiting hereditary slavery. l Work proactively together with community. For ECOWAS l Urge Mali to revitalise the 2015 Algiers peace agreement. l Seek international partnerships to support developmental and humanitarian initiatives in Mali in order to prevent radicalisation in the southern regions. l Support national consultations over the abolition of hereditary slavery.

Africa, OCWAR-T Research Report 13  Ecowas Commission. 2023. 20pg

Need for Chaos and Dehumanization Are Robustly Associated with Support for Partisan Violence

By Alexander Landry, James Druckman, and Robb Willer

Recent, high-profile acts of partisan violence have stimulated interest among academics and the general public in the etiology of support for such violence. Here, Landry, Druckman, and Willer report results of an exploratory study that (1) measures support for partisan violence with both abstract items (e.g., general support for partisan violence) and support for more specific acts (e.g., support for a partisan motivated shooting), (2) follows recently established best practices by including attention checks to attenuate response bias, and (3) incorporates measures of a wide range of potential confounders as control variables. Across three data collections (total N = 2,003), including two with nationally representative samples, and tracking seven unique operationalizations of support for the use of violence against out-partisans, they find the most consistent and typically largest relationships with an individual’s reported “need for chaos” (e.g., agreement with statements like: “Sometimes I just feel like destroying beautiful things”) and the extent to which they dehumanize supporters of the opposing party. The researchers speculate this reflects a motivation to use extreme methods (need for chaos) toward one’s political rivals, liberated from the moral restraints that inhibit harming fellow human beings (dehumanization). System justification and social dominance orientation were also both positively related to support for partisan violence, which may reflect partisans’ desire to protect their preferred social order from out-partisans deemed to threaten it. Collectively, these results offer a framework for future research on support for partisan violence, highlighting the role of extreme orientations toward society and rival partisans.

United States, Northwestern University,  Institute for Policy Research. 2023, 56pg

Terrorism, Political Extremism, and Crime and Criminal Justice   

ByJoshua D. Freilich, Steven M. Chermak, Rachael A. Arietti, and Noah D. Turner

This review focuses on terrorism and extremist crimes, including ideologically motivated hate crimes. Research on these topics has become more rigorous in recent decades, and more scholars have engaged in original data collection. Our assessment found a burgeoning literature that increasingly includes the application of integrated theories, but gaps remain as few studies examine life-course and critical approaches. Our review of the policing of terrorism found a limited evidence base for counterterrorism initiatives. We also found that court/sentencing issues are understudied. We suggest improving data quality in these areas by creating a national data collection protocol on these crimes, enhancing the rigor of offender and victim self-report studies, and requiring more transparency from open-source research efforts. We propose that government agencies fund rigorous evaluations of policing strategies in the terrorism context. Finally, it is hoped that increased access to federal court documents will lead to more scholarly attention on sentencing issues.

Annual Review of Criminology, Volume 7, Page 187 - 209

Pathways for Irregular Forces in Southeast Asia: Mitigating Violence with Non-State Armed Groups

Edited by Atsushi Yasutomi, Rosalie Arcala Hall and Saya Kiba

An exploration of the roles that pro- and anti-government militias, private armed groups, vigilantes, and gangs play in local communities in the new democracies of Southeast Asia. Scholars have typically characterized irregular forces as spoilers and infiltrators in post-conflict peacebuilding processes. The contributors to this book challenge this conventional understanding of irregular forces in Southeast Asia, demonstrating that they often attract solid support from civilians and can be major contributors to the building of local security — a process by which local residents, in the absence of an effective police force, develop, partner or are at least included in the management of community crimes and other violence. They analyze irregular forces’ dealings with political actors at the community level, explaining why and how forces are incorporated in and collaborate with legitimate institutions without using violence against them. Offering a new approach to dealing with irregular forces in Southeast Asia, contributors explore new theoretical frameworks that are better suited for evaluating irregular forces’ relationship to different security providers and the political environments in the region. Specifically, they examine case studies from Indonesia, Timor-Leste, the Philippines, and Thailand. A valuable resource for researchers, students and practitioners in the areas of conflict resolution, peacebuilding, and security governance, especially those with a focus on Southeast Asia. This book will also be of great interest to scholars of the sociology and anthropology of the region.

Abingdon, Oxon, UK: New York: Routledge, 2022. 215p.