Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Anti-Government Threats and their Transnational Connections

By Bàrbara Molas, Anne Craanen, Sabrina Tripodi, Kacper Rękawek, andThomas Renard

Anti-Government Extremism (AGE) presents a complex and evolving security challenge, particularly in the transatlantic space. AGE is characterised by anti-system sentiments, and adherents propagate notions of an evil elite controlling societal mechanisms, adapting global conspiracy theories to local grievances. While predominantly non-violent, it harbours the potential for violence, posing a significant policy challenge. This report contributes a comprehensive exploration of AGE by utilising original data, including interviews with security officials and an exploration of AGE spaces online, focusing on Austria, Germany, the Netherlands, Sweden, and the United States. Through thematic comparative analysis, it unveils the nature of anti-government groups and individuals, elucidating their transnational linkages both online and offline. By shedding new light on AGE’s manifestations, severity, and responses across jurisdictions, this research illuminates whether AGE constitutes a standalone security concern. Furthermore, it offers insights into practical strategies for addressing AGE, especially in the context of existing policies for preventing and countering violent extremism (P/CVE). The recommendations provided are tailored to the differing characteristics of AGE groups, individuals, and networks, ensuring a nuanced and effective response to this emerging threat, both online and offline.

The Hague: International Centre for Counter-Terrorism (ICCT). 2024, 48pg

Why People Enter and Embrace Violent Groups

By Ángel Gómez , Mercedes Martínez , Francois Alexi Martel , Lucía López-Rodríguez , Alexandra Vázquez , Juana Chinchilla , Borja Paredes , Mal Hettiarachchi , Nafees Hamid , and William B Swann 

We distinguish two pathways people may follow when they join violent groups: compliance and internalization. Compliance occurs when individuals are coerced to join by powerful influence agents. Internalization occurs when individuals join due to a perceived convergence between the self and the group. We searched for evidence of each of these pathways in field investigations of former members of two renowned terrorist organizations: the Liberation Tigers of Tamil Eelam (LTTE) (Study 1) and Islamist radical groups (Study 2). Results indicated that ex-fighters joined LTTE for reasons associated with both compliance and internalization but that ex-fighters joined Islamist radical groups primarily for reasons associated with internalization. When compliance occurred, it often took the form of coercion within LTTE but involved charismatic persuasion agents within Islamist groups. This evidence of systematic differences in the reasons why fighters enter violent groups suggests that strategies for preventing radicalization and fostering de-radicalization should be tailored to particular groups.

Front Psychol. 2021 Jan 7

JAS vs. ISWAP: The War of the Boko Haram Splinters Crisis Group

By International Crisis Group

What’s new? Jama’tu Ahlis Sunna Lidda’awati wal-Jihad (JAS) has gained ground in the intra-jihadist fighting in north-eastern Nigeria, halting the previous momentum of the Islamic State West Africa Province (ISWAP). In the course of 2023, JAS took most of the islands in Lake Chad, which ISWAP had controlled. 

Why did it happen? Conflict between these Boko Haram splinters stems from differences in governance and treatment of civilians. JAS kills and steals from everyone; the more bureaucratic ISWAP generally spares Muslim non-combatants. Many JAS members surrendered to authorities or continued fighting instead of joining ISWAP after the death of JAS’s

leader in 2021. 

  Why does it matter? In the last two years, JAS and ISWAP may have visited more damage upon each other than the Lake Chad states have inflicted on the jihadists. Still, the splinters pose a significant threat. ISWAP is regrouping, while the revamped JAS is set to target civilians around the lake. What should be done? The Lake Chad governments will need to do more to prevail over the jihadists. They should mitigate risks to civilians by maintaining humanitarian assistance; expanding efforts to support defectors; improving airstrike precision; and reinvigorating regional security cooperation.    

Pursuing terrorists in US civil courts: the Encyclopedia of ATA cases

Edited by Jeff Breinholt

Initially enacted in 1992, the Antiterrorism Act (ATA), 18 U.S.C. §2333, provides a legal remedy for American victims killed or injured by reason of international terrorism by creating a private cause of action, with treble damages and attorneys’ fees. Since then, some 150 lawsuits have been brought under the statute against such terrorist organizations as Hamas, Hizballah, and FARC, as well as the banks and companies alleged to have assisted them. These lawsuits have generated some 600 opinions.

Washington, DC: George Washington University Program on Extremism. 2024, 91pg

Cultural Heritage and Mass Atrocities

Edited By James Cuno and Thomas G. Weiss

Intentional destruction of cultural heritage has a long history. Contemporary examples include the Bamiyan Buddhas in Afghanistan, mosques in Xinjiang, China, mausoleums in Timbuktu, Mali, and Greco-Roman remains in Syria. Cultural heritage destruction invariably accompanies assaults on civilians, making heritage attacks impossible to disentangle from the mass atrocities of genocide, war crimes, crimes against humanity, and ethnic cleansing. Both seek to eliminate people and the heritage with which they identify. Cultural Heritage and Mass Atrocities assembles thirty-eight experts from the heritage, social science, humanitarian, legal, and military communities. Focusing on immovable cultural heritage vulnerable to attack, the volume’s guiding framework is the Responsibility to Protect (R2P), a United Nations resolution adopted unanimously in 2005 to permit international intervention against crimes of war or genocide. Based on the three pillars of prevent, react, and rebuild, R2P offers today’s policymakers a set of existing laws and international norms that can and—as this book argues—must be extended to the protection of cultural heritage. Essays consider the global value of cultural heritage and document recent attacks on people and sites in China, Guatemala, Iraq, Mali, Sri Lanka and Afghanistan, Syria, and Yemen. Comprehensive sections on vulnerable populations as well as the role of international law and the military offer readers critical insights and point toward research, policy, and action agendas to protect both people and cultural heritage. The table of contents along with a concise abstract of each chapter is offered online in Arabic, Chinese, French, Russian, and Spanish to facilitate robust, global dissemination of the strategies and tactics offered in this pathbreaking call to action.

Los Angeles: J. Paul Getty Trust, 2022. 649p.

Defeating terrorism and saving art: fighting the same battle

By Elie Cavigneaux

Defeating terrorism and saving art: fighting the same battle

In a world where chaos and political instability plague many countries in the Middle East and North Africa, a lesser-known crime has emerged: the trafficking of cultural goods. This phenomenon, often overshadowed by more prominent issues, poses a significant global threat. But why is the trafficking of art and antiquities so concerning?

  1. Financing Terrorism: Cultural goods trafficking is not merely a trade—it’s a critical source of funding for terrorism. Security Council resolutions, UNESCO, the European Union, and financial investigation units have all documented this link. The self-proclaimed “Islamic State” even institutionalized this trade, issuing excavation permits and organizing the sale of stolen pieces to market countries.

  2. Hidden Threats: Although these looted artifacts may not flood the markets immediately, history shows that they can resurface years later. Works looted by the Nazis during World War II, for instance, have reappeared after decades of concealment.

  3. Beyond Terrorism: Yet, the interest in this analysis extends beyond terrorism financing. The resale of “blood antiquities” reveals another dimension: money laundering, fraud, and tax evasion. This criminal activity affects not only the antiques market but also the broader art market.

  4. Investing for Tomorrow: To combat this multifaceted threat, we must invest in detecting and preventing crimes related to cultural and art objects. Whether in times of war or peace, our ability to safeguard culture and heritage depends on proactive measures.

Working Paper. Paris: Groupe d’études géopolitiques, 2021. 13p

Preventing and Countering Violent Extremism: Assessing Missteps and Promising Community Approaches

By Lauren Van Metre and Thomas Leo Scherer  

  The United States Institute of Peace seeks to advance the field of peacebuilding by evaluating the evidence base supporting its core practices, such as dialogue and conflict analysis, engagement with religious leaders, and the prevention and countering of violent extremism. These systematic reviews identify effective programming and new approaches for further exploration. This evidence review paper evaluates the evidence and practice of an evolving approach to preventing and countering violent extremism: understanding and strengthening community resilience. Preventing and countering violent extremism (P/CVE) is unique among peacebuilding areas. The field was initially shaped and influenced by a frenzied national security response to a perceived imminent threat from a global religious radical movement that sought the destruction of the West and its secular governments. Thus, the problem of violent extremism and its countering strategy were neatly encapsulated in an ideological paradigm that facilitated crisis decision-making rather than purposeful action in support of an evidence-based policy and practice. Today, in promoting a community resilience approach to P/CVE, it is critical to steer away from earlier ideologically influenced forms of community engagement by acknowledging that ideological remnants persist and continue to do harm to frontline communities; these forms of community engagement scapegoat communities for attracting violent-extremist networks and target them as “threats” for security force responses. Instead, the P/CVE field needs to adopt a radically dif­ferent resilience approach that presumes and strengthens a community’s capacity to resist violent extremism.

Washington, DC:  The United States Institute of Peace , 2023. 72p.

Guest User
Terrorist Attacks against Concerts and Festivals: A Review of 146 Incidents in the Global Terrorism Database

By Harald De Cauwer; Dennis G. Barten; Derrick Tin; Luc J. Mortelmans; Gregory R. Ciottone; Francis Somville

  Background: Mass gatherings are vulnerable to terrorist attacks and are considered soft targets with potential to inflict high numbers of casualties. The objective of this study was to identify and characterize all documented terrorist attacks targeted at concerts and festivals reported to the Global Terrorism Database (GTD) over a 50-year period. Methods: TheGTDwas searched forall terrorist attacks against concerts and festivals that occurred world-wide from 1970 through 2019. Analyseswere performed on temporal factors, location, target type, attack and weapon type, attacker type, and number of casualties or hostages. Ambiguous incidents were excluded if there was doubt about whether they were exclusively acts of terrorism. Chi Square tests were performed to evaluate trends over time and differences in attack types. Results: In total, 146 terrorist attacks were identified. In addition to musical concerts, festivals included religious, cultural, community, and food festivals. With 53 incidents, South Asia was the most heavily hit region of the world, followed by theMiddle East & North Africa with 25 attacks. Bombings and explosions were the most common attack types. The attacks targeted attendees, pilgrims, politicians, or police/military members who secured the concerts and festivals. Conclusion: This analysis of the GTD, which identified terrorist attacks aimed at concerts and festivals over a 50-year period, demonstrates that the threat is significant, and not only in world regions where terrorism is more prevalent or local conflicts are going on. The findings of this study may help to create or enhance contingency plans.  

Prehosp Disaster Med. 2023;38(1):33–40. 

Guest User
Prosecuting Terror in the Homeland: An Assessment of Sentencing Disparities in United States Federal Terrorism Cases

By Michael A. Jensen,  Sheehan Kane,  Elena Akers, Rese

The most significant terrorist threat to the United States originates from domestic extremist movements, which have steadily increased their violent activities in recent years. While a host of legal statutes were passed after the September 11, 2001, terrorist attacks to aid in the prosecution of international terrorism suspects, the rapid rise in domestic extremism has not led to a similar process of revising the U.S. legal code. Many international terrorism defendants are prosecuted under specific terrorism statutes that are far less often used in cases involving individuals suspected of committing domestic extremist crimes. The application of different laws in international and domestic terrorism cases has led to intense debate over the need for new domestic terrorism legislation. Proponents argue that legal revisions are necessary to promote judicial fairness, address sentencing disparities, and deter individuals from engaging in domestic extremism. Opponents argue that international and domestic terrorism cases can already be prosecuted to a similar extent under the current legal regime, and they suggest that new domestic terrorism laws could be used to infringe on civil rights and liberties.

This research brief contributes to this debate by providing an assessment of the current legal regime as it applies to the prosecution of terrorism in the United States. Using data from the Profiles of Individual Radicalization in the United States (PIRUS) project, this brief looks at sentencing disparities in 344 federal terrorism prosecutions that were initiated between 2014-2019. The brief includes sections on the “in/out” decision, case disposition, incarceration length, post-incarceration supervision, and special conditions of probation.

College Park, MD: START., 2023. 9p.

Guest User
THE AMERICAN SOLDIER VOL. 4. MEASUREMENT AND PREDICTION

MAY CONTAIN MARKUP

BY SAMUEL STOUFFER, LOUIS GUTTMAN, EDWARD SUCHMAN, PAUL LAZARSFELD, SHIRLEY STAR, and JOHN CLAUSEN

"The American Soldier Vol. 4: Measurement and Prediction" delves into the intricate world of military assessment and forecasting, offering readers a comprehensive look at the tools and techniques used to evaluate soldier performance and anticipate future outcomes. This volume provides valuable insights into the evolving landscape of warfare, where data-driven decisions play a crucial role in shaping strategies and outcomes. From advanced measurement technologies to predictive analytics, this book equips readers with the knowledge needed to understand and navigate the complexities of modern military operations. A must-read for anyone interested in the intersection of technology, strategy, and warfare."

PRINCETON, NJ. PRINCETON UNIVERSITY PRESS. 1950. 772p.

THE AMERICAN SOLDIER VOL. 2. COMBAT AND ITS AFTERMATH

MAY CONTAIN MARKUP

BY SAMUEL A. STOUFFER ,ARTHU R A. LUMSDAINE, MARION HARPER LUMSDAINE ,ROBIN M. WILLI AMS, Jr., M. BREWSTER SMITH, IRVING L. JANIS, SHIRL EY A. STAR , AND LEONARD S. COTTRELL , Jr.

"The American Soldier Vol. 2: Combat and Its Aftermath" delves into the harrowing experiences of American soldiers on the battlefield and the lasting impact of war on their lives. Through gripping narratives and reflective insights, this volume explores the challenges faced by soldiers during combat, as well as the physical, emotional, and psychological toll that continues long after the guns fall silent. With a blend of firsthand accounts and historical context, this book offers a poignant and unvarnished look at the reality of war and its profound effects on those who serve. "The American Soldier Vol. 2" is a compelling tribute to the courage, sacrifice, and resilience of the men and women who bear the burdens of conflict in defense of their country.

PRINCETON, NJ. PRINCETON UNIVERSTY PRESS. 1949. 664p.

AMERICAN SOLDIER VOL. 3.: EXPERIMENTS ON MASS COMMUNICATION

MAY CONTAIN MARKUP

BY CARL I. HOVLAND, ARTHUR A. LUMSDAINE, AND FRED D. SHEFFIELD

In the third installment of the thrilling 'American Soldier' series, readers are plunged into a world where cutting-edge technology intersects with the moral complexities of warfare. In this gripping narrative, the protagonist grapples with the consequences of mass communication experiments conducted in the name of military advancement.

As the boundaries between ethics and progress blur, a riveting tale unfolds, exploring the power dynamics at play in the age of information warfare. Through a masterful blend of action and introspection, 'American Soldier Vol. 3: Experiments on Mass Communication' challenges readers to confront the fine line between innovation and exploitation in the pursuit of military supremacy.

With its pulse-pounding storyline and thought-provoking themes, this latest installment captivates audiences and cements the 'American Soldier' series as a must-read for fans of military fiction and techno-thrillers alike.

PRINCETON, NJ. PRINCETON UNIVERSITY PRESS. 1949. 360p.

THE AMERICAN SOLDIER. VOL.1. ADJUSTMENT DURING ADJUSTMENT DURING ARMY LIFE

MAY CONTAIN MARKUP

By BY SAMUEL A. STOUFFER, EDWARD A. SUCHMAN, LELAND C. DEVINNEY, SHIRLEY A. STAR .ROBIN M. WILLIAMS, JR.

In this gripping volume, "The American Soldier: Vol.1 - Adjustment During Army Life", readers are taken on a poignant journey through the eyes of soldiers as they navigate the challenges and triumphs of military life. Through vivid storytelling and raw authenticity, this book offers a unique glimpse into the experiences of those who serve their country. From the highs of camaraderie to the lows of homesickness, this collection of stories captures the resilience and adaptability of the American soldier. Whether you have a personal connection to the military or simply seek to understand the sacrifices made by these brave individuals, this book is sure to resonate with readers from all walks of life.

PRINCETON. NEW JERSEY. PRINCETON, PRINCETON UNIVERSITY PRESS. 1949. 614p.

RIOTS, REVOLTS AND INSURRECTIONS

MAY CONTAIN MARKUP

RAYMOND M. MOMBOISSE

In a world where tensions are high and divisions run deep, the specter of riots, revolts, and insurrections looms large. From the streets of bustling cities to the quiet corners of rural towns, unrest simmers just beneath the surface, ready to erupt at any moment. These acts of defiance and resistance are often fueled by a sense of injustice, inequality, or oppression, driving ordinary people to extraordinary measures in pursuit of change. As we navigate these turbulent times, the echoes of past uprisings serve as a stark reminder of the power of the people to challenge the status quo and demand a better future. RIOTS, REVOLTS AND INSURRECTIONS explores the complex dynamics of social unrest and the enduring quest for justice in a rapidly evolving world.

CHARLES C. THOMAS . Springfield, Illinois. 1967. 530p.

Victimhood and Acknowledgement: The Other Side of Terrorism

Edited by Petra Terhoeven

How does terrorism affect our picture of the history of terrorism then, if the victims are moved centre stage? If the focus is put on their suffering? The contributions to this edition of the European History Yearbook will examine such questions in a broad range of historical case studies and methods, including visual history.

Berlin/Boston: De Gruyter, 2018. 172p.

Farmers–Herdsmen Conflict, Cattle Rustling, and Banditry: The Dialectics of Insecurity in Anka and Maradun Local Government Area of Zamfara State, Nigeria

By Bashir Bello and Mustapaha Muhammad Abdullahi

The study examined farmers–herdsmen conflict, cattle rustling, and banditry in Anka and Maradun local government area of Zamfara State, Nigeria. The study examined the influence of farmers–herdsmen conflicts on cattle rustling and banditry, and vice versa. Exploratory research was employed; focus group discussion (FGD) and key informant interview (KII)were used to collect primary data from the respondents. The data generated were transcribed and recorded verbatim (word-for-word account of verbal interview) and they were converted into written form. Data were enumerated and thematic analysis and categorization were provided. Secondary data were sourced from internet and relevant books. This study adopted the environmental resources scarcity and frustration-aggression theory. The findings of the study revealed that farmers–herdsmen conflict precipitates the acts of cattle rustling and banditry. It also revealed that conversely cattle rustling and banditry contributed to the farmers–herdsmen conflict in the local government area of Zamfara State. The study discovered that the synthesis of farmers–herdsmen conflicts, cattle rustling, and banditry pose serious threat to the safety and security of the people. The researchers recommended that there should be an introduction of grazing reserves equipped with adequate social amenities and that there should be policies capable of enhancing herders’ transformation from traditional to the modern method of animal husbandry. They also suggested that various factors responsible for farmers–herdsmen conflict, cattle rustling, and banditry should be properly managed by traditional and religious leaders. The findings corroborate the gaps which the researchers intended to fill

Sage Open, 11(4). 2021.

The modern day consequences, causes, and nature of kidnapping, terrorism, banditry, and violent crime in Nigeria: A comprehensive analysis.

By Nsirimovu Okwuwada

There have been several agitations in Nigeria, but none have degenerated into the current barbaric, horrendous, heinous, and despicable dimensions of carnage, massacres, and bloodletting orchestrated by terrorists, bandits, kidnappers, and other organized violent crime syndicates. This study takes a holistic approach using secondary data sources to examine the root causes of the modern-day prevalence of kidnapping, banditry, terrorist attacks, and other organized criminal activities in Nigeria. The study finds that unemployment, excess supply of young people, neglect of certain regions in the distribution of national wealth, lack of government visibility, lack of equal economic opportunity for all, uncontrolled influx of firearms, poverty, and religious fanaticism contributes to the increasing rate of violent crime in Nigeria. The article finds that the nature of banditry, kidnapping, and terrorist attacks are similar, and the modes of attacks on civilian and government installations are also related. The government should thus become proactively visible throughout the nation via its security agencies and economic development agenda. Additionally, the government should educate local officials and traditional councils on contemporary methods for reporting and addressing violent groups in their communities.

MPRA Paper No. 117671, Munich: MPRA, 2023. 46p.

Violent crimes and insecurity on Nigerian highways: A tale of travelers’ trauma, nightmares and state slumber

By Cyril O. Ugwuoke, Benjamin Okorie Ajah, Linus Akor, Sunday Ojonugwa Ameh, Cletus A. Lanshima, Elias C. Ngwu, Ugomma Ann Eze, and Michael Nwokedi

This paper examined the vulnerability of travelers to kidnapping, abduction and armed robbery attacks and in some extreme cases, death along Nigeria's highways. Insecurity on the nation's highways became a contemporary criminological discourse following the emergence of new strands of criminality like militancy, terrorism, kidnapping, herdsmen-farmers violence, communal conflicts and banditry. Nigerian highways have become the major operational hotspots for criminals who harass, terrorize, and traumatize travelers at will. With the ever-rising insecurity on Nigerian highways, the military and paramilitary offensives deployed by the Federal Government have not yielded the desired results culminating in the description of government's inertia as a form of state slumber. Data for this study were sourced from a content analysis of reported violent highway crimes by credible mainstream Nigerian newspapers, spanning a period of one year, from July 2020 to July 2021. Adopting the Social Disorganization Theory, the study indicated that the worrisome nature of insecurity on Nigeria's highways resulting in the high rate of abduction and murder of people of diverse military, professional, socioeconomic and political backgrounds has engendered a sense of helplessness, trauma and vulnerability among Nigerian road travelers. The paper recommends the de-centralization of Nigeria Police Force structure to create State Police that will encourage and electrify effective and better people oriented patrolling and management of insecurities on the Nigerian highways.

Heliyon v.9(10); 2023 Oct PMC10551549

Governing “Ungoverned Spaces” in the Foliage of Conspiracy: Toward (Re)ordering Terrorism, from Boko Haram Insurgency, Fulani Militancy to Banditry in Northern Nigeria

By: John Sunday Ojo

This article explores the dominant narrative of ill-governed or ungoverned territories in the northern region of Nigeria where informality and socioeconomic deficit fashioned the mannerism of everyday life. Reconnoitering ungoverned territories, positing that radical jihadist and non-jihadist movements and criminal-armed groups are ideologically driven by localism and informal networks, particularly in the areas unkempt by the state. The paper interrogates to what extent ungoverned spaces embolden the recruitment of criminal and terrorist groups in northern Nigeria. It explains the complex security paradoxes confronting the Nigerian state, it analyses the Boko Haram insurgency, Fulani militancy and banditry within the context of ungoverned spaces that continuously breed terrorist organizations, and criminal networks, that pose an enormous risk to human security. It adopts a qualitative approach and spatial network analysis using Geographical Information System (GIS). The paper argues that the primordial negligence of ungoverned areas with limited state surveillance or unharmonized state presence, controlled by informal networks and hybrid arrangements creates an enabling environment for warlordism, religious fanaticism and tribal self-defense forces. It further demonstrates that governance failure in these regions stimulates illegal movement of arms and ammunition, the raw material for bombs, illegal drugs and foreign machines, and becomes abodes for Boko Haram jihadist and non-Boko Haram armed groups. The paper concludes that ungoverned spaces could be morphed into a production site for Weapons of Mass Destruction (WMD) by the terrorists in the near future, thus, until the Nigerian state pays attention to the territories under-governed or poorly governed, it will become difficult to win the war against terrorism, Fulani militancy and banditry through military response. Therefore, good governance that transcends ethnic chauvinism remains a veritable weapon in conquering multilayered security quagmires facing the giant of Africa.

African Security, Volume 13, 2020 - Issue 1

Shock and awe: Military response to armed banditry and the prospects of internal security operations in Northwest Nigeria

By Folahanmi Aina, John Sunday Ojo & Samuel Oyewole

Insecurity has worsened in Northwest Nigeria, due to the threat of armed banditry, necessitating the deployments and operations of the military. While there is increasing academic attention on the origins, causes, and nature of this threat, the conduct, achievements, prospects, and challenges of the military’s counter-banditism response in the region remains understudied. Accordingly, foregrounded by the need to close this gap, this qualitative study contributes to the literature through organised empirical research by examining the conduct, achievements, prospects, and challenges of the military's Joint Task Force operation Hadarin Daji – its major internal security operation – against armed banditry in Northwest Nigeria. Data is obtained from secondary sources which include academic journal articles, books, official reports, press briefs by the military, reputable local and international news reportage. The study’s central argument holds that the nature and character of the military’s campaigns against armed banditry – a form of unconventional warfare, poses significant challenges to it as a conventional fighting force, consequentially contributing towards the conflict’s protractedness. Recalibrating the military’s readiness for and response to unconventional warfare remains critical to degrading and defeating armed banditry in Northwest Nigeria.

African Secuirty Review Volume 32, 2023 - Issue 4