The Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

The Muslim Brotherhood's Reaction to the Taliban's Return to Power

By Sergio Altuna  

For the last several months, Islamists around the world have monitored the events in Afghanistan with great interest. The Taliban’s successful military offensive and subsequent return to power galvanized public displays of support from the movement’s regional allies, and especially from aligned Al-Qaeda supporters. While much attention has been paid to the reactions among various jihadist groups, there has not been much focus on the broader effects of the Taliban takeover on global Islamist movements, including the Muslim Brotherhood. While a significant degree of uncertainty still surrounds the Taliban’s international agenda, prominent players within the Muslim Brotherhood have already signaled their unambiguous support for the group. This paper compiles those declarations of support by Muslim Brotherhood members, documenting various quotes, official statements, publications, media appearances, and more. The collection starts from the fall of Kabul and proceeds to the present, dividing quotes into two distinct categories according to their origin: 1) those made by members or groups of the global Muslim Brotherhood, and 2) those made by members or institutions specifically of the Muslim Brotherhood in the West. On the whole, the collection below provides evidence not only of the ideological affinities shared by the Taliban and the Muslim Brotherhood, but also reveals how the Brotherhood is adapting its discourse to incorporate and accommodate new narratives of the fall of Kabul to the Taliban.

Washington, DC: George Washington University, Program on Extremism, 2021. 12p.

social sciencesMaddy B
Moderating Extremism: The State of Online Terrorist Content Removal Policy in the United States

By Bennett Clifford

By reviewing studies of how today’s terrorist and extremist groups operate on social media in conjunction with an overview of U.S. government regulation of terrorist content online, this report finds that stricter U.S. regulation of social media providers may not be the most effective method of combating online terrorist and extremist content.

Specifically:

• Direct governmental regulations that ignore other sources of regulation on content removal policies could disrupt growing intra-industry collaboration on countering terrorist content online.

• In many regards, the U.S. government defers to and depends on the private sector to conduct counterterrorism online. Many factors contribute to this arrangement, including limits on the government’s authorities, expertise, staffpower, dexterity and political will to manage online terrorist content with the same efficacy as major social media companies.

• Attempts by other governments to strictly regulate social media companies’ terrorist content removal policies hurt small companies, created double standards and redundancies, and raised concerns about censorship and free speech.

• Proposed regulations may only affect major U.S. social media providers; smaller and non-U.S. companies may be unable, unwilling, or not required to comply. Due to the proliferation of social media platforms exploited by terrorists and extremists, platforms that may be unaffected by U.S. government regulation currently host a large proportion of terrorist content online.

• In certain regards, major social media companies’ content removal policies have more flexibility than the U.S. government to be able to account for new terrorist and extremist groups and actors and their respective tactics, techniques, and procedures online.

Washington, DC: George Washington University, Program on Extremism, 2021. 24p.

Hezbollah's Operations and Networks in the United States: Two Decades in Review

By Anyssia S. Kokinos, Nakissa P. JahanbaniJon LewisDevorah Margolin,

Executive Summary ● This report aims to provide a comprehensive examination of Hezbollah-affiliated activity in America by examining all publicly-known federal criminal cases from 1997 to 2020 in the United States with a concrete link to Hezbollah. The authors found evidence of 128 individuals that meet these criteria. ● The majority of cases involve small, centralized hubs of Hezbollah operatives, who engage in illegal activities in conjunction with wider criminal enterprises to create an array of networks across America. These relationships of convenience have resulted in Hezbollah operatives collaborating with financially-motivated individuals, criminals, and other nonideological actors, in furtherance of a broader operational mission. These arrangements, in turn, have allowed Hezbollah to profit financially and deepen its influence in the United States, even as many such cases display minimal direct connective links to the terrorist organization itself. ● Based on analysis of the cases, the authors identified two distinct categories of participation in Hezbollah-affiliated activity in America: individuals who provided financial support to Hezbollah (109 individuals), and those who provided operational support (19 individuals). ○ 87% of individuals provided financial or material support to Hezbollah as money launderers, bundlers, fraudsters, and goods smugglers, with many raising funds from others to be provided to Hezbollah or directly providing funds to the group themselves. This finding supports existing assessments that Hezbollah’s primary aspirations in the United States are to use it as a financial support hub. ○ 13% of individuals in the dataset engaged in operational conduct in support of Hezbollah, including as human smugglers, weapons procurers, pre-operational surveillance, and travelers who sought to join the group. Despite the prominence of Hezbollah’s financing activities in the United States, elements within Hezbollah remain intent on developing the capacity and capability to plot attacks on U.S. soil. ● The vast majority (92%) of cases involved network activities between two or more individuals. Larger geographic hubs operated out of Michigan (55 cases), California (19 cases), North Carolina (16 cases), and New York (15 cases). 90% of individuals operating in these four states and 76% of all cases in this dataset were a part of just six networks. ○ Large parts of network activity involved individuals with limited evidence to suggest a direct link to Hezbollah. As discussed above, these individuals actively collaborated with persons with an evidenced connection to the terrorist organization, and in many cases appear to be driven primarily by financial rather than ideological motivations. This in and of itself is a manifestation of Hezbollah’s activities in the United States, which sought to use local criminal actors in furtherance of their illegal activities. Further, in several significant instances, network activity often involved friends or family members engaged in organized conspiracies.

Washington, DC: George Washington University, Program on Extremism, 2022. 32p.

justice, social sciencesMaddy B
Verbatim: What European Security Services Say About the Muslim Brotherhood in Europe

By Lorenzo Vidino

The Muslim Brotherhood in Europe is a controversial topic, frequently subjected to misinterpretations and manipulations. Opinions on it vary from those who argue that it does not exist and that it is bigoted and conspiratorial thinking to argue otherwise, to those who claim that it does and it is, in substance, similar to groups like al Qaeda or the Islamic State; from those who believe that it is a force that has evolved over time and now embraces democracy and the positive integration of Muslims in European society, to those who argue that it is a complex movement that, while showing a moderate façade, is in reality engaged in non-violent but nonetheless highly problematic activities (a position held by this author).  

Much of the confusion stems from the opaque and secretive nature of the Brotherhood and, consequently, the difficulty of obtaining clear and unequivocal information. As the Brotherhood was founded and operates mostly in Middle Eastern countries where local regimes have enacted various forms of repression against it, the movement has always seen dissimulation of many aspects of its structure and goals as a necessary tactic to survive. Organizations belonging to the Brotherhood’s family in the Arab world have therefore gone to great lengths to hide various aspects of their inner workings. It is a tactic that, given the context, is understandable and has ensured the movement’s survival in tough political environments for almost a century.  

Somewhat counterintuitively, the secrecy that shrouds Brotherhood networks is somewhat greater in the West, where the Brotherhood is not considered a terrorist organization and can generally operate freely within a democratic framework. Brotherhood branches in the Middle East, as said, have historically kept secret many aspects of their activities, but they have never denied their own existence. That denial is common in the West where most Brotherhood-linked activists and organizations not only shroud in secrecy their inner workings but even refuse to admit any Brotherhood connection. Brotherhood activists and sympathizers also tend to attack those who highlight the existence of Brotherhood-linked networks in Europe and their problematic nature with charges of shoddy research, conspiratorial views, and bigotry. 

Given these dynamics, it is important to observe what entities across Europe, whose institutional mandate is to monitor potential threats to their countries, think about the movement, from its very existence to its tactics and goals. The Brotherhood is not designated as a terrorist organization by the European Union or by any individual European country. At the same time, however, the security services of virtually all European countries have long monitored the movement---a fact that is per se telling.

European security services have kept the movement under watch with different degrees of intensity. Those that have a broad institutional mandate that leads them to monitor all potential threats to their countries’ democratic and constitutional order, like Germany’s Office for the Protection of the Constitution (Verfassungsschutz, both at the federal level and in all 16 German states), have done so more extensively than some of their counterparts throughout Europe whose mandate is narrower and law enforcement-like. And in each country the degree of scrutiny of the Brotherhood varies with time, depending on factors such as the existence of more immediate security threats or input from political decisionmakers.

Yet, without exception, all European security services adopt a highly negative view of the Muslim Brotherhood on the Continent. All European security services which have publicly expressed views on the Muslim Brotherhood in Europe over the last twenty years have clearly and consistently stated that:

  1. An extensive and sophisticated network linked to the Brotherhood operates covertly in Europe, both at the national and pan-European level (through its umbrella organization, FIOE/CEM, and spinoffs like FEMYSO);

  2. European-based Brotherhood-linked activists have created front organizations that allow them to operate within society and advance their agenda without being easily recognizable as being part of the Brotherhood; and

  3. Brotherhood networks in Europe are not engaged in terrorism but have views and goals that are problematic, subversive, undemocratic, and incompatible with basic human rights and Western society.

These views have been expressed in various terms by European security services, and some have reached more pessimistic conclusions than others. But all those that have gone on the record over the last two decades about the movement have been extremely negative and concerned about its impact on European society.

This short report has collected all publicly available statements from annual and occasional reports, testimonies in parliamentary hearings, and formal statements in court cases from the various European security services that have addressed the issue of the Muslim Brotherhood in Europe. They include all the statements the author could find, with no selections or omissions, save for repetitions (as in the case of annual reports from German security services, which in substance repeat what was reported in previous years). All documents are publicly available and unclassified. All are herewith reported with references (so that the reader can read the context) and without commentary. The report does not include media interviews by representatives of security services, as they do not constitute a direct representation of their views and manipulation/misinterpretations might have occurred.     

The assessments here reported come from the security services of Austria, Belgium, France, Germany, the Netherlands, Spain and Sweden. The author is not aware of any security service from any other European country having gone on the record on the matter. The main reason for this is arguably the varying levels of comfort of different security services when it comes to going on the record on any matter unless strictly necessary. In general, for example, the security services of most Southern and Eastern European countries are culturally less prone to revealing much of their views on any matter than their Central and Northern European counterparts. Moreover, issues related to Islamism in general and the Muslim Brotherhood in particular do not constitute a major issues in Eastern European countries, given their small Muslim population.

In substance, the security services of basically all the largest Western European countries (with the notable exception of Italy) have gone on the records expressing very negative views on the Muslim Brotherhood. The author is not aware of any European security service having stated anything that even slightly contradicts the assessments on the Brotherhood made by the services of the seven countries here mentioned. To the contrary, interviews conducted by the author with most European security services over the last twenty years confirm that even those that have not gone on the record (Italian security services, for example) adopt extremely negative views of the Brotherhood, in line with those that do appear on record.  

The inevitable conclusion of this reading is that the European security community has reached a firm consensus over the presence, structure, tactics, aims, and ultimately, problematic nature of the Muslim Brotherhood in Europe. That consensus has been consistent over the last twenty years and has no known deviations, and this consensus should be the basis for well-informed policymaking on the subject.

Washington, DC: George Washington University, Program on Extremism, 2023. 20p.

justice, social sciencesMaddy B
The Perilous Intersection of Amnesty and Accountability: Iraq's Legal Quandary and its Global Counterterrorism Ramifications

By Omar Mohammed

The Iraqi Parliament is poised to discuss a new amnesty bill that has generated significant controversy and debate. This legislation is intended to address the issue of wrongful detentions but raises profound ethical, judicial, and societal concerns. Advocates claim the bill will rectify unjust imprisonment, particularly in the post-ISIS era. Critics, however, argue that the bill's broad language could inadvertently release individuals affiliated with ISIS, undermining ongoing counterterrorism efforts and the pursuit of justice for victims. Complicating matters further is the recent decision by the United Nations Security Council to terminate the mandate of UNITAD, a team responsible for investigating crimes committed by ISIS. This article delves into the intricacies of the proposed bill, its implications for justice and national reconciliation, and its potential impact on counterterrorism efforts in Iraq.

Washington, DC: George Washington University, Program on Extremism, 2023. 10p.

The Hamas Networks in America: A Short History

By Lorenzo Vidino 

Executive Summary • Hamas supporters have long operated in the United States. Internal Hamas documents and FBI wiretaps introduced as evidence in various federal criminal cases clearly show the existence of a nationwide Hamas network engaged in fundraising, lobbying, education, and propaganda dissemination dating back to the 1980s. • The network formalized its existence in 1988, when it created the Palestine Committee in the US. The Committee’s goals included “increasing the financial and the moral support for Hamas,” “fighting surrendering solutions,” and publicizing “the savagery of the Jews.” • The Palestine Committee spawned several public-facing organizations, most of which are based out of Chicago, Dallas, and Washington DC. They included the all-purpose Islamic Association for Palestine (IAP), the financial arm represented by the Occupied Land Fund (which later became the Holy Land Foundation, HLF), and the think tank United Association for Studies and Research (UASR). • In 1993, the FBI wiretapped a meeting of top Hamas activists in the US held in Philadelphia. The wiretaps show internal discussions on how to improve activities in support of Hamas within the US and how to shield them from the designation of Hamas as a terrorist organization. US-based Hamas activists agreed that hiding their affiliation and intentions was the best tactic to avoid negative consequences. “I swear by Allah that war is deception,” said one senior leader, “[d]eceive, camouflage, pretend that you’re leaving while you’re walking that way. Deceive your enemy.” “Let's not hoist a large Islamic flag and let's not be barbaric-talking. We will remain a front so that if the thing [the U.S. government ban on Hamas] happens, we will benefit from the new happenings instead of having all of our organizations classified and exposed.” • Over the years, US authorities have conducted several activities to clamp down on the network, including deporting and prosecuting Hamas operatives and shutting down multiple front organizations. The 2001 designation of HLF and subsequent prosecution of part of its leadership for funneling approximately $12.4 million to Hamas constitutes to date the largest successful terrorism financing prosecution in US history. • Yet, US-based Hamas networks and individuals have displayed a remarkable resilience and many of the core activists of the Palestine Committee are still engaged in various forms of support (albeit at times purely political and not material) for Hamas. 

Washington DC: George Washington University Program on Extremism, 2023. 16p.

Imitators or Innovators? Comparing Salafi-Jihadist and White Supremacist Attack Planning in the United States

By Bennett Clifford and Alexander Meleagrou-Hitchens

 As the threat from white supremacist and Salafi-jihadist extremists to the United States grew in prominence in recent years, the two movements have become the subjects of several comparative studies. These works frequently focus on contrasting their methods of radicalization, recruitment, use of digital communications technologies, and connections to transnational extremist movements, but only a handful concern their methods of planning attacks on American soil. This report seeks to add to this emerging literature by examining what, if any, relationships there are between the tactics and targets chosen by white supremacist and Salafi-jihadist terrorists in America. In doing so, it will also contribute to our understanding of how, and indeed if, modern terrorists in America are learning from each other or from the current American counterterrorism posture. This report finds that: ● Jihadist and white supremacist attack planners in the U.S. selected different targets for their attacks. Jihadists tended towards attacking “hard targets” (for instance, military bases and law enforcement facilities) and devising plots to assassinate individuals. White supremacists erred towards “soft targets,” especially religious institutions and houses of worship. ● Jihadists were more likely than white supremacists to consider multiple targets for their attacks. ● The tactics of jihadists and white supremacists were relatively similar in frequency to one another. Both movements’ attack plotters relied heavily on plots involving firearms and explosives, but also experimented with non-conventional means such as vehicle rammings, arson, and train derailments. ● Despite some evidence of ideological cross-pollination, particularly in the form of manifestos and instructional material, evidence of direct learning between jihadist and white supremacist attack planners in the U.S. is limited. ● Independent innovation in the face of U.S. domestic counterterrorism approaches is a more likely explanation for similarities in targets and tactics between white supremacists and jihadists than cross-group tactical imitation.

Washington, DC: George Washington University, Program on Extremism, 2022. 33p.

Mayhem, Murder, and Misdirection: Violent Extremist Attack Plots Against Critical Infrastructure in the United States, 2016-2022

By Ilana Krill & Bennett Clifford   

  In the United States, critical infrastructure, or “assets, systems, and networks, whether physical or virtual, [that] are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof,” are prime targets in violent extremist attack plots.1 While a variety of violent extremist movements have attempted to assault American critical infrastructure throughout modern history, the Department of Homeland Security and other national security authorities have recently sounded the alarm that U.S.-based violent extremists have developed “credible, specific plans” to attack critical infrastructure.2 To understand the current dimensions of this threat, this paper reviews 94 cases of individuals charged in the U.S. federal court system from 2016 to 2022 with planning to conduct violent extremist attacks, 35 of whom attempted to attack critical infrastructure systems. 19 of these cases are associated with the Salafi-jihadist movement; 16 are associated with white supremacist groups. Evaluating these cases, the report finds: ● Salafi-jihadist attack planners were significantly more likely to consider critical infrastructure systems as targets for attack than their white supremacist counterparts. ● Salafi-jihadist and white supremacist attack planners attempted to target different critical infrastructure sectors, with the former focusing on the commercial facilities, government facilities, and emergency services sectors, and the latter predominantly focusing on the energy sector. ● Since 2019, white supremacist attacks plots against critical infrastructure systems have distinctly increased. ● Between 2016 and 2022, white supremacist plots targeting energy systems dramatically increased in frequency. 13 individuals associated with the movement were arrested and charged in federal court with planning attacks on the energy sector; 11 of these attack planners were charged after 2020. ● The rise of accelerationist ideology and doctrine during the past decade likely fueled the increased risk of attack plots within white supremacist milieus targeting critical infrastructure, and the energy sector in particular.

Washington, DC: George Washington University, Program on Extremism, 2022. 32p.

The Genocide in Gaza and the Contempt of International Law: Some Reflections

By Sulaiman Lebbe Rifai

Nothing puts the human conscience on trial as does the Genocide in Gaza. Nothing illustrates the political hypocrisy of some Western leaders as does the war in Gaza. Nothing exemplifies the double standard of Western political leaders as their complicity in the Gazan war. Moreover, this war has put the International Court of Justice and International Criminal Court in a somewhat difficult and precarious position. It has also put the UNHR in a difficult situation and it is alarmed with the seriousness of atrocities in Gaza. These courts and international organizations are instituted to establish justice and fairness in all international conflicts. They cannot discriminate between countries in their application of justice. They cannot apply one set of laws to the State of Zionist Israel and another set of laws to the people of Palestine. They must do unconditional justice to all parties equally without any prejudice, racial religious, or political discrimination. They must do this to protect the integrity and reputation of these international institutions and yet, the Zionist State of Israel and its supporters are standing between these institutions and their official responsibilities to apply laws equally to all. Take, for instance, the South African lawsuit against the state of Israel for its genocide in the Gaza Strip. Many countries in the Global South welcomed and supported South Africa’s initiative to file a case against Israel and yet, many Western countries blindly dismissed the legal complaint of South Africa in support of Israel as if there was no genocide committed in the Gaza by the State of Israel. To understand the gravity of the political discrimination of some Western leaders on the problem of the Gaza Genocide, we should revisit the contents of the UN’s convention on the prevention of the Crime of Genocide.

Unpublished paper, 2024.

Global Terrorism Threat Assessment 2024

By Catrina Doxsee, Alexander Palmer, and Riley McCabe

Terrorism is no longer the leading international threat to the United States or its top defense priority, but challenges related to violent extremism remain. The threat from Salafi-jihadist groups such as al Qaeda and the Islamic State has declined, and ethnonationalist threats are largely contained. However, a broader patchwork of violent far-right and far-left extremist ideologies has become more prominent on the global stage. Meanwhile, terrorism continues to overlap in significant ways with strategic competition, especially via Iran's support to terrorist groups like Hamas and Hezbollah.

Washington, DC: Center for Strategic and International Studies, 2024. 138p.

Are the effects of terrorism short-lived?

By  Vincenzo Bove,  Georgios Efthyvoulou,  and Harry Pickard

Numerous studies demonstrate that terrorism causes strong public reactions immediately after the attack, with important implications for democratic institutions and individual well-being. Yet, are these effects short-lived? We answer this question using a quasi-experimental design and data on three successful and three foiled terrorist attacks in the United Kingdom. We find that heightened risk perceptions and emotional reactions in the wake of successful attacks do not dissipate in the very short run but are sustained over time and up to 130 days after the attacks. We also find that, whereas large-scale attacks cause a long-lasting shift in risk assessments and emotions, the corresponding effect of smaller-scale terrorism incidents appears to subside within one month. Interestingly, foiled attacks can also affect public perceptions, which, however, quickly return to normal levels. We argue that the extent of media coverage is partly responsible for the duration of these effects.

United Kingdom: United Nations University World Institute for Development Economics Research, 2022, 19p.

Terrorism and the internet: How dangerous is online radicalization?

By Jens F. Binder and Jonathan Kenyon

This work is concerned with the extent and magnitude of threat related to online radicalization in the context of terrorist acts and related offending. Online influences have been depicted as major drivers for the propagation and adoption of extremist ideologies, which often contain an element of collective grievance, and subsequent acts of violence. This is most pronounced in the discussion of so-called lone actor terrorism, but extends to all forms of extremist offending, and beyond. The present work situates online radicalization leading to terrorist acts within the wider context of grievance-based beliefs and attitudes. Further, it addresses current positions and debates surrounding the relevance and mechanisms of online radicalization in terrorist offending. Recent evidence from quantitative studies is reviewed to estimate prevalence of online radicalization and the level of threat that results from it. This is followed by a discussion of plausible, but opposing, interpretations of the estimates presented. While online radicalization does occur, with and without reference to offline processes, the resulting threat is not overly high. This assessment, however, refers to the present only and is unlikely to hold for the future, given the general growth and acceleration of online activity among terrorist actors

United Kingdom: Forensic and Legal Psychology, 2022, 10p.

Exploring The Role Of The Internet In The Radicalisation Process And Offending Of Convicted Extremists

By Jonathan Kenyon

The overarching aim of this doctoral research was to investigate the role of the Internet in radicalisation pathways and offending of convicted extremists in England and Wales. The empirical study was unique because it benefitted from access to closed source risk assessment reports within His Majesty’s Prison and Probation Service (HMPPS). These reports were authored by Psychologists and Probation Officers with access to restricted case documentation and in the majority of cases, direct interviews with the individuals concerned. Findings were based on 235 convicted extremists, all of whom were considered to have radicalised prior to committing their offence. Variables of interest, including offender demographics, offence characteristics and online activities were extracted from risk reports completed from October 2010 to December 2017. Since completion of the doctorate, the analysis has been expanded to 437 convicted extremists, which includes all those subject to risk reports from October 2010 to December 2021. This accounts for close to every convicted extremist in England and Wales considered to have radicalised prior to their conviction.

Scotland: Centre for Research and Evidence on Security Threats, 2023, 4p.

Good Lives in Right-Wing Extremist Autobiographies

By Hanna Paalgard Munden, Sarah Marsden, MD Kamruzzaman Bhuiyan, Lotta Rahlf, Hanna Rigault Arkhis, Aimee Taylor

This report sets out the findings of research to understand the potential of the Good Lives Model (GLM) to interpret trajectories into and out of violent extremism and considers the implications for policy and practice. The Good Lives Model (GLM) is a well-developed manifestation of a strength-based approach to rehabilitation. The model argues that focusing on developing strengths and enhancing protections, rather than solely managing and controlling risk factors, offers a more fruitful route to preventing (re)offending. The GLM has become an increasingly prominent part of efforts to rehabilitate criminal offenders, however its potential with respect to the violent extremist population has not been fully exploited. This report is informed by a review of research on protective factors set out in an earlier report: Conceptualising Protective Factors: Strength-Based Approaches (Marsden and Lee, 2022) that established the theoretical foundation for the empirical research set out here.

Scotland: Centre for Research and Evidence on Security Threats, 2023, 30p.

Online Radicalisation: A Rapid Review of the Literature

By Rosamund Mutton, James Lewis, and Sarah Marsden

This guide sets out the evidence base for ‘online radicalisation’, examining how individual use of the Internet, in conjunction with offline influences, can facilitate radicalisation processes. The UK is the main context of concern, however comparable evidence is found in studies with samples from the USA, Canada, Belgium, Germany, Austria, and Israel. Radicalisation remains a contentious concept and few studies explicitly define ‘online radicalisation’. For the purposes of this guide, ‘radicalisation’ is understood as leading to cognitive outcomes reflected in changes in beliefs and ideas, and/or behavioural outcomes which manifest in changes in behaviour. Two systematic literature reviews (Hassan et al., 2018; Carthy et al., 2020) directed initial searches for relevant research. Further literature was identified through forward and backward citation searching, and narrower key word searches conducted in Google Scholar. Literature searches were completed between June and August 2022. The guide primarily examines literature published between January 2017 and July 2022. Although the evidence base remains modest in size, the research underpinning this guide is assessed to be good quality. There is a growing body of evidence that uses qualitative and quantitative methods to examine a range of factors which are relevant to online radicalisation.

Scotland: Centre for Research and Evidence on Security Threats, 2023, 42p.

Proscribed Terrosist Organisations

By Joanna Dawson

This paper describes the recent history and present status of proscribed organisations under the Terrorism Act 2000 (the “2000 Act”). Prior to the 2000 Act, proscription was exclusively concerned with terrorism connected with the affairs of Northern Ireland. Under the 2000 Act, proscription was extended to include organisations concerned with both domestic and international terrorism. The Home Secretary may proscribe an organisation if they believe it is “concerned in terrorism”. If the Home Secretary believes that an organisation meets this statutory test, they must then decide whether to proscribe the organisation. In doing so, they must take into account various policy considerations. Consequences of proscription The 2000 Act sets out a number of proscription offences. These include belonging to or inviting support for a proscribed organisation; arranging or assisting with the arrangement of a meeting that supports a proscribed organisation; addressing such a meeting; or wearing clothing or displaying articles in public which arouse suspicion of membership or support of a proscribed organisation. It is also possible to impose financial sanctions on proscribed organisations.   Current proscribed organisations As of September 2023 there were 79 international terrorist groups proscribed under the Terrorism Act 2000 and 14 organisations in Northern Ireland proscribed under previous legislation. In November 2021 the Home Secretary announced that the Government had laid an instrument to proscribe Hamas in its entirety, ending the distinction between different wings of the organisation. In September 2023 the Government laid an instrument to proscribe Wagner Group, a private military organisation which has acted as a proxy for the Russian state. The Government considers it to involved in committing acts of terrorism, including in relation to its involvement in Russia’s invasion of Ukraine. The Annex to this paper includes a current list of proscribed organisations and a description of their activities. Criticisms of the proscription regime Proscription has been characterised as a powerful deterrent, a way of tackling lower-level support for terrorism, and a signal of rejection by society. But questions have also been raised as to its utility in combating terrorism and its compatibility with the rule of law. The former Independent Reviewer of Terrorism Legislation (IRTL), Lord David Anderson KC, repeatedly recommended the introduction of time limits for proscription orders, as have his successors, Max Hill QC and the current IPTL, Jonathan Hall KC. However, the Government has so far declined to follow these recommendations and currently deproscription is done by way of application only. As a consequence, groups that no longer meet the statutory requirements for proscription continue to be proscribed, a situation described by Lord Anderson as “an affront to the rule of law”.

London: UK Parliament, House of Commons Library, 2024, 70p.

Lone Offender: A Study of Lone Offender Terrorism in the United States (1972--2015)

By the U.S. Federal Bureau of Investigation, Lauren Richards, Peter Molinaro, John Wayne. et al.

Operationally defining the lone offender terrorist is challenging, as the nature of terrorism is both highly political and contextually dependent. Over the years, there has been disagreement over the classification of violent acts under the label of “terrorism.” While an argument can be made that the infliction of fear upon a targeted group or the public is sufficient to classify an act as terrorism, the FBI definition of terrorism requires a purported motivation that goes beyond exclusively personal motivations and attempts to influence change in furtherance of extremist ideologies of a social, political, religious, racial or environmental nature. The focus of the current study examined offenders who carried out their attacks independent of any direction from a terrorist group or organization.Lone offender terrorism continues to pose a threat as violent ideological groups and terrorist organizations place emphasis on inspiring lone offender-style attacks. Additionally, individuals who view violence as an accessible and justified method for advancing their own ideological goals can independently mobilize toward violent action. While attacks directly coordinated by terrorist organizations are generally more lethal globally, the United States departs from this trend: lone offender attacks in the United States are more deadly, possibly due to strong U.S. counterterrorism capacity for disrupting.The current report provides an overview of the data, exploring the various topics encompassed within the coding protocol, including bystander observations, offenders’ backgrounds, family and social networks, behavioral characteristics, radicalization, and attack planning. Predicting lone offender terrorism incidents is not possible, but prior research and operational experience support the conclusion that acts of targeted violence, including lone offender terrorist attacks, may be preventable through early recognition and reporting of concerning behavior. The report aims to inform broader goals of enhancing bystander education and awareness, as well to aid the prevention efforts of law enforcement and multi-disciplinary threat assessment teams working to counter targeted violence threats every day. To work toward this objective, the authors examine relevant contextual factors and analyze the statements and behaviors offenders exhibited before carrying out their attacks.

Washington, DC: U.S. FBI, 2019. 80p.

Active Shooter Incidents in the United States in 2022

By The U.S. Federal Bureau of Investigation

From the document: "In 2013, the president signed into law the Investigative Assistance for Violent Crimes Act of 2012, which led the FBI to examine active shooter incidents since 2000. The findings in this report are intended to provide an overview of active shooter incidents to help law enforcement, other first responders, and the public better understand the levels of threats associated with active shooter incidents. In 2022, the FBI designated 50 shootings as active shooter incidents. Although incidents decreased by 18% from 2021 (61 incidents), the number of active shooter incidents increased by 66.7% compared to 2018 (30 incidents). The 50 active shooter incidents in 2022 occurred in 25 states and the District of Columbia and represent seven location categories, including open spaces, commerce, residences, education, government, houses of worship, and a health care facility. [...] Data cited in this report for active shooter incidents that occurred in 2022 is valid as of February 10, 2023; however, incident data from prior published reports was not updated. If additional incidents meeting FBI criteria are identified after the publication of this document, every effort will be made to factor those incidents into future reporting."

Washington, DC: FBI, 2023. 33p.

Strategic Intelligence Assessment and Data on Domestic Terrorism

By the U.S. Federal Bureau of Investigation and U.S. Office of Homeland Security

From the Executive Summary: "Preventing terrorist attacks remains a top priority for both the FBI and the Department of Homeland Security (DHS). The threat posed by international and domestic threat actors has evolved significantly since 9/11. The greatest terrorism threat to the Homeland we face today is posed by lone offenders, often radicalized online, who look to attack soft targets with easily accessible weapons. Many of these violent extremists are motivated and inspired by a mix of socio-political goals and personal grievances against their targets. With this report, we are providing our strategic intelligence assessments on DT [domestic terrorism], a detailed discussion of our procedures and methods to address DT threats, as well as data on DT incidents and our investigations."

In the Blind Spot – Right-wing Extremists on Alternative and Established Platforms

By Hanna Börgmann

This report provides a summary of the expert conference “In the Blind Spot – Right-Wing Extremists on Alternative and Established Platforms“, which took place in Berlin in September 2023 as part of the “Countering Radicalisation in Right-Wing Extremist Online Subcultures” programme funded by the Federal Ministry of Justice (BMJ). The third conference of the programme served to present current research projects from digital right-wing extremism research and to discuss various perspectives from research, regulation and law enforcement.

The report emphasises the social and political relevance of the research field and current trends in right-wing extremism research, underpinned by welcoming addresses from Benjamin Strasser, State Secretary of the Federal Ministry of Justice (BMJ), and Huberta von Voss, Executive Director of ISD Germany, among others. Dr Julia Ebner, extremism expert and ISD Senior Research Fellow, and Dr Matthias Becker, project manager of the interdisciplinary research project “Decoding Antisemitism”, also provided keynote speeches.

The conference was divided into several panels that focused primarily on discursive and strategic developments, far-right financing, research into right-wing online activities, deradicalization and online regulation. In the discussion panel, a panel of experts focused on the effects of the EU Digital Services Act (DSA).

Berlin: ISD - Institute for Strategic Dialogue, 2023. 19p.