The Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Homeland Threat Assessment 2025

By: Office of Intelligence and Analysis

The Homeland faces a complex set of threats to our public safety, border security, critical infrastructure, and economy from violent extremists, transnational criminal organizations (TCOs), adversarial nation-states, and malicious cyber actors. These threats, while varied in scope and intended purpose, at times compound one another in unexpected ways, harming our communities and generating costly disruptions to the US economy. Meanwhile, technological advances, climate change, and natural disasters have the potential to exacerbate many of the aforementioned threats.

PUBLIC SAFETY AND SECURITY: Over the next year, the terrorism threat environment in the Homeland will remain high. We are particularly concerned about a confluence of factors this year, including violent extremist responses to domestic sociopolitical developments—especially the 2024 election cycle—and international events that domestic and foreign violent extremists likely will use to justify or encourage attacks in the Homeland. Lone offenders and small groups continue to pose the greatest threat of carrying out attacks with little to no warning. Meanwhile, foreign terrorist organizations (FTOs) and their supporters will maintain their enduring intent to conduct or inspire attacks in the Homeland.

In addition, the production, trafficking, and sale of illegal drugs by transnational and domestic criminal actors will continue to pose the most lethal threat to communities in the United States. Fentanyl and other synthetic opioids remain the most lethal of drugs trafficked into the country, but small increases in overdoses linked to cocaine and methamphetamine highlight the danger from other drug types.

We expect the Homeland also will face threats to public safety from state actors using subversive tactics in an effort to influence and divide the American public and undermine confidence in our institutions. Many of these actors—in particular, the People’s Republic of China (PRC)—also target v U.S. Department of Homeland Security ethnic and religious minorities, political dissidents, and journalists in the United States to silence and harass critical voices, violating our sovereignty and the rule of law.

The 2024 election cycle will be an attractive target for many adversaries. Some domestic violent extremists (DVEs) likely view a wide range of targets indirectly and directly associated with elections as viable targets for violence with the intent of instilling fear among voters, candidates, and election workers, as well as disrupting election processes leading up to and after the November election. Nation-state-aligned foreign malign influence actors almost certainly will continue to target democratic processes with the aims of affecting US voter preferences, exacerbating social tensions, and undermining confidence in our democratic institutions and the integrity of the electoral process.

BORDER AND IMMIGRATION SECURITY: Migrant encounters at our border have declined over the last year, but migrants are still arriving in high numbers, complicating border and immigration security. As overall encounters have declined, so too have encounters with individuals in the Terrorist Screening Data Set, also known as the “terrorism watchlist,” which includes individuals associated with information indicating they may be directly engaged in or supporting terrorist activities as well as known associates of watchlisted individuals, such as family members. For several years prior to this year's decline, terrorism watchlist encounters had increased, a trend consistent with the overall increase in migrant encounters at the southwest border.

CRITICAL INFRASTRUCTURE SECURITY: Domestic and foreign adversaries almost certainly will continue to threaten the integrity of our critical infrastructure with disruptive and destructive cyber and physical attacks, in part, because they perceive targeting these sectors will have cascading impacts on US industries and our standard of living. The PRC, Russia, and Iran will remain the most pressing foreign threats to our critical infrastructure. Most concerningly, we expect the PRC to continue its efforts to pre-position on US networks for potential cyber attacks in the event of a conflict with the United States. Nation-states, criminal hacktivists, and financially motivated criminals will likely hone their techniques to disrupt US services or to conduct espionage focused on gaining access to US networks, including critical infrastructure entities. We assess that domestic and foreign violent extremists will continue to call for physical attacks on critical infrastructure in furtherance of their ideological goals and, at times, in response to international conflicts and crises.

ECONOMIC SECURITY: Multifaceted and diverse economic threats—primarily from the PRC—will likely continue to harm US producers and consumers and degrade the competitiveness and future health of US companies and industries. The PRC likely will remain our greatest economic security threat because of its aggressive use of anticompetitive, coercive policies and theft of US intellectual property, technology, and trade secrets. Lastly, we expect our supply chains will remain vulnerable to foreign manipulation abroad, which could harm global productivity and consumer demand.

U.S. Department of Homeland Security, 2024

Terrorism and the State: Intra-state Dynamics and the Response to Non-State Political Violence

MAY COTAIN MARKUP

By Kieran McConaghy

State Dynamics in Counter-Terrorism: The book challenges the view of the state as a unitary actor, emphasizing the importance of intra-state dynamics and the individual identities of state personnel in shapingcounter-terrorism responses.

Case Studies: It provides comparative analyses of Spain, France, and theUnited Kingdom, highlighting how state responses to terrorism are influenced by historical and cultural contexts.

Emotional and Political Impetus: The book discusses how emotional reactions and political motivations of state personnel impact counter-terrorism strategies, sometimes leading to actions driven by revenge or political gain.

Recommendations for Future Research: It suggests that future studies on counter-terrorism should consider the complexities of the state and the emotional and organizational factors that influence stateactions.

Springer, Aug 22, 2017, 182 pages

Understanding and Responding to the Terrorism Phenomenon: A Multi-Dimensional Perspective

MAY COTAIN MARKUP

Edited by Ozgur Nikbay & Suleyman Hancerli

Understanding TerrorismThis section delves into the psychological profiles of terrorists, theuse of the internet by terrorists, the potential threat of bioterrorism, and the socio-economic factors contributing to terrorism. It emphasizes the importance of education in combating terrorism and understanding the true motives behind terrorist acts.

Suicide Attacks, Radical Terrorism, and Case StudiesThis part examines the characteristics and motivations behind suicide attacks, the rise of radical Islam in post-Soviet states, and includes case studies of terrorist incidents. It also explores the financing of terrorism through narcoterrorism and the spatial patterns of terrorist incidents.

Strategies and Tactics for Dealing with Terrorist Hostage Sieges, Hijackings, andKidnappingsThis section discusses various strategies and tactics for handling terrorist hostage situations, including negotiation strategies, the psychological aspects of kidnappings, and the importance of proper training and preparation for law enforcement agencies.

Counter-Terrorism Policies: Lessons for the FutureThe final section explores different counter-terrorism policies and strategies, such as situational crime prevention, democratic policing, the role of intelligence in counter-terrorism, and the need for international cooperation. It emphasizes the importance of maintaining public trust and preventing the radicalization of individuals.

IOS Press, 2007, 431 pages

Strategic competition in the age of AI: Emerging risks and opportunities from military use of artificial intelligence

By James Black, Mattias Eken, Jacob Parakilas, Stuart Dee, Conlan Ellis, Kiran Suman-Chauhan, Ryan J. Bain, Harper Fine, Maria Chiara Aquilino, Melusine Lebret, et al.

Artificial intelligence (AI) holds the potential to usher in transformative changes across all aspects of society, economy and policy, including in the realm of defence and security. The United Kingdom (UK) aspires to be a leading player in the rollout of AI for civil and commercial applications, and in the responsible development of defence AI. This necessitates a clear and nuanced understanding of the emerging risks and opportunities associated with the military use of AI, as well as how the UK can best work with others to mitigate or exploit these risks and opportunities.

In March 2024, the Defence AI & Autonomy Unit (DAU) of the UK Ministry of Defence (MOD), and the Foreign, Commonwealth and Development Office (FCDO) jointly commissioned a short scoping study from RAND Europe. The goal was to provide an initial exploration of ways in which military use of AI might generate risks and opportunities at the strategic level – conscious that much of the research to date has focused on the tactical level or on non-military topics (e.g. AI safety). Follow-on work will then explore these issues in more detail to inform the UK strategy for international engagement on these issues.

This technical report aims to set a baseline of understanding of strategic risks and opportunities emerging from military use of AI. The summary report focuses on high-level findings for decision makers.

Key Findings

One of the most important findings of this study is deep uncertainty around AI impacts; an initial prioritisation is possible, but this should be iterated as evidence improves.

The RAND team identified priority issues demanding urgent action. Whether these manifest as risks or opportunities will depend on how quickly and effectively states adapt to intensifying competition over and through AI.

RAND - Sep 6, 2024

Piracy and the US Navy 

By Peter M. Swartz

COUNTER-PIRACY OPERATIONS: LESSONS FROM HISTORY

Recent events off the Horn of Africa have once again involved the US Navy in counter-piracy operations. The Navy has been involved in operations against piracy since the 18th century. We quickly reviewed these operations and found several relevant lessons for today’s operations.

PIRACY ACTIVITIES ACROSS THE CENTURIES

We identified three distinct eras relating to piracy: the era of privateering, the era of Western imperialism, and the era of terrorism.

THE ERA OF PRIVATEERING: 18TH AND 19TH CENTURIES

Privateers were civilians licensed by their sovereigns to seize upon the high seas vessels, cargoes, and crews of other nations against whom their own nation was at war. Pirates also operated for their own financial benefit on the high seas, but with no government authorization, and against the ships, cargoes, and crews of any nation. The Law of Nations allowed the forces of any nation to capture, try, and hang them. In the 18th and 19th centuries, however, it was often difficult to differentiate legal privateering from illegal piracy. During this period the American merchant marine became second only to that of Great Britain in size. As one of the world’s leading shipping powers, the United States had a vital interest in the safety of American ships, crews, cargoes, and profits. This was the principal mission set of the Navy through most of this period. This was the era of the Barbary pirates and the Caribbean anti-piracy campaign.

THE ERA OF WESTERN IMPERIALISM: 19TH AND 20TH CENTURIES

The nineteenth century saw an explosion of European and American global commerce, and a concomitant increase in attacks on that commerce worldwide. Some of these attacks were sponsored by political entities: decaying empires, petty states, local warlords, and insurgent groups. Others were clearly conducted by independent bands of true pirates. Western naval operations to suppress piracy usually involved landings and assaults ashore. These anti-piracy   CNA Historical Paper Series (2006) ii operations were sometimes hard to distinguish—especially in the minds of local rulers—from the various other forms of European colonial land-grabs then underway throughout the world.

Arlington VA: CNA, 2006. (published 2021) 21p.

Impacts of Money Laundering and Terrorism Financing: Final Report. Report to the Australian Transaction Reports and Analysis Centre.

By Alicia Schmidt

This report outlines a conceptual model of the social and economic impacts of money laundering and terrorism financing. Drawing on a comprehensive literature review and stakeholder interviews, it identifies possible economic, societal and sectoral impacts. Economic impacts are those that affect the economy at a macro level and include reductions in economic growth and foreign direct investment and the distortion of exchange and interest rates. Societal impacts include changes in crime levels—predicate offences which generate illicit proceeds that are then laundered, crimes financed using laundered funds and crimes attracted to areas where money laundering occurs—and the associated costs to the community. They also include the consequences of terrorism enabled by terrorism financing, including the costs of terrorist attacks and the impact on national reputation. Sectoral impacts include damage to the reputation of the financial sector and other regulated entities, the crowding out of legitimate competitors, artificial increases in prices (eg real estate prices), and lost tax revenue. Importantly, not all impacts are harmful; potential benefits of money laundering include the recovery of proceeds of crime from the enforcement of the anti-money laundering and counter-terrorism financing (AML/CTF) regime, the profitability of certain sectors that facilitate or enable money laundering, and the growth of the AML/CTF industry. Having identified these impacts, this report assesses their significance in the Australian context and sets out a path towards quantifying the impacts identified as both relevant and measurable.

Consultancy Report Canberra: Australian Institute of Criminology. 2024. 117p.

Missing Connections: Crime-Enabled Terrorism Financing in Europe

By Gonzalo Saiz and Stephen Reimer

Concern about the so-called ‘crime–terror nexus’, a centrepiece of discussion, debate and research in the counterterrorism field, has yielded a vast body of academic and policy literature regarding the nature of symbiotic relationships between organised criminal formations and terrorist organisations. Recognising a spectrum of possible synergies – including direct interactions between criminals and terrorists, the adoption of criminal tactics by terrorists, and even the merging of these artificial categories altogether in certain cases – regard for the ‘crime–terror nexus’ has largely ignored the question of whether and how relationships between crime and terrorism may yield opportunities for terrorist financing, particularly in the European context. Such uncertainty risks giving way to speculation about the true extent of what might be called ‘crime-enabled terrorist financing’ (CETF), speculation driven in part by contemporary examples of petty criminality having played a significant role in the financing of violent terrorist attacks in Europe in the recent past. Should distinct linkages between crime and terrorist financing be identified, entry points for disruption by law enforcement may arise, and it is for this purpose that the research for this paper was conducted. The paper queries the nature and extent of CETF in Europe, including the importance of this financing stream in relation to others. In doing so, the paper also evaluates the present policy and law enforcement response to CETF, and endeavours to assess whether it is properly calibrated to the degree and character of the threat. The paper finds that terrorists and their financiers do indeed exploit European criminal markets for acquiring important materiel and raising funds, but that CETF is not a dominant form of terrorist financing for most actors, though not all. Specific foreign-based terrorist organisations that use Europe as an economic staging ground to finance violence committed overseas were revealed as the most likely to engage in CETF in Europe, and the most competent at doing so. That these groups typically do not (and are unlikely to) launch violent attacks within Europe means a prime motivator for countering their CETF activity is lacking, which along with other conditions poses a challenge to law enforcement agencies. Overall, Europe’s CETF problem is not its dominant terrorist-financing threat, though a proportionate reconfiguration of its counterterrorist financing response is needed to preclude terrorist organisations from abusing Europe’s economy to finance destabilising operational activity in its near neighbourhood.

Brussels; London: Royal United Services Institute for Defence and Security Studies RUSI, 2023. 54p

Suicidality Among Domestic Terrorists

By Megan K. McBride, Kaia Haney, Michelle Strayer, and Jessica Stern

Despite the focus on suicide terrorism over the past 20 years—particularly by media outlets, policy-makers, and academics—scholarship regarding suicidality in domestic terrorism remains sparse. The post-9/11 research related to suicidality in terrorism has largely focused on the suicide terrorism of Islamist extremists. The research that touches on domestic terrorism, however, is both limited and inconclusive. Lankford, for example, has argued that suicidality is one of three key similarities between perpetrators of suicide terrorism and perpetrators of mass shootings. But a 2017 article by Freilich et al., whose research focused on far-right and jihadi attacks in the US, found that suicide attackers were no more likely than non-suicide attackers to have previously attempted suicide. By contrast, suicidality among those who carry out public shootings is well documented. Jillian Peterson and James Densley, leveraging The Violence Prevention Project’s (TVPP’s) Mass Shooter Database, found that 70 percent of the 197 individuals who committed mass shootings over the past 60 years either had a history of suicidality or intended to die carrying out their attack. Retrospective research by the US Secret Service on school shooters from 1974 to 2000 found that at least 78 percent had experienced suicidal thoughts or engaged in suicidal behavior before their attack. And an analysis leveraging the Columbia Mass Murder Database found that nearly half of all mass shooters died by suicide at the scene of their attack. Mass shootings, as Peterson and Densley have noted, may in fact be “crimes of despair.” We leveraged a new dataset—the Domestic Terrorism Offender Level Database (DTOLD)—to explore whether domestic terrorism attacks may also be crimes of despair. The database captures publicly available information (e.g., media reporting, court records) on the life histories of 320 individuals who carried out a non-Islamist terrorist attack in the United States between January 1, 2001, and December 31, 2020. Our data suggest that domestic terrorists in general may be more suicidal than the general population but significantly less suicidal than mass shooters except when domestic terrorists kill four or more people (notably, four is the number of deaths required for a shooting to meet the Federal Bureau of Investigation’s definition of a mass shooting). DTOLD contains three variables relevant to the question of suicidality: history of suicidality (including suicide attempts and suicidal ideation), intention to die while committing a terrorist attack, and death by suicide during or immediately after a terrorist attack. Collecting data on suicidality is difficult, but 19.3 percent (62) of the individuals in DTOLD have been coded positively for at least one of the three indicators of suicidality. This rate is notably higher than the rate calculated by the Substance Abuse and Mental Health Services Administration, which is 4.37 percent for men (89 percent of those in DTOLD are men). This rate is still lower, however, than TVPP’s rate of 70 percent among mass shooters.

Arlington, VA: CNA, 2024. 4p

 Domestic Terrorists’ Contact with System Stakeholders Before Attacks

By Megan K. McBride and Monique Jenkins

Within the public violence literature—that is, the literature on domestic terrorism, mass shootings, school shootings, and hate crimes, among others—leakage has been identified as a core warning behavior. Leakage occurs when a would be assailant communicates an intention to harm a target before committing an attack.1 This communication can vary in timing, level of detail, form, intentionality, and audience.2 Through such a communication, an individual might directly verbalize an intent to commit an act, make more subtle threats and innuendos, or share a plan via social media.3 Researchers have found relatively high levels of leakage associated with acts of public violence, including adolescents perpetrated mass murders,4 mass shootings,5 political and public figure assassinations,6 and domestic terrorism.7 For this reason, leakage—which often occurs in interactions online or with loved ones—can be an important warning sign. But leakage to family, friends, or acquaintances is not the only way to detect when an individual is intending to commit an act of public violence, and over the last decade, researchers have started to examine preattack contact with system stakeholders, such as law enforcement, mental health, and education professionals. For example, one study found that 40 percent* of violent extremists had engaged in a crime before their act of extremist violence.8 Another study reported differences in system contact for lone and group-affiliated actors among American far-right extremists who committed fatal attacks. Specifically, it found that 61.7 percent of lone actors, but just 51.1 percent of group-affiliated extremists had prior arrests.9 In addition, multiple case studies exploring the personal histories of small populations of violent extremists have included information on system contact.10 However, comprehensive research exploring previous contact between system stakeholders and individuals engaged in domestic terrorism is relatively scarce. We sought to advance understanding of what percentage of the violent extremist population could be “catchable” in the sense that an individual had been in previous contact with a system stakeholder (e.g., law enforcement, mental health provider) or had been reported to a system stakeholder (e.g., by a friend or loved one to whom they had intentionally or unintentionally leaked information). To explore this issue, we leveraged a new dataset: the Domestic Terrorism Offender Level Database (DTOLD). The database includes detailed information on the 320 non-Islamist individuals who carried out terrorist attacks in the United States between January 1, 2001, and December 31, 2020. Specifically, we sought to understand what percentage of this population was known to system stakeholders at some point before they perpetrated their attacks. 

Arlington VA: CNA, 2024. 4p

Accelerating Hate: October 7 on Terrorism and Political Violence in the West

By CLARA BROEKAERT, COLIN P. CLARKE, MICHAELA MILLENDER, ANNIKA SCHARNAGL, AND JOSEPH SHELZI

The horrific attacks by Hamas on October 7, 2023, fundamentally shifted the security posture of the Middle East, while also having severe humanitarian consequences and ripple effects in countries throughout the globe, including many in the West. This TSC Special Report, generously sponsored by the Airey Neave Trust, aims to explore how October 7 impacted several Western countries, including the United States, the United Kingdom, France, Germany, and Italy. While the conflict remains ongoing – and indeed will reverberate long after the fighting actually ends — this report attempts to take the pulse of five Western countries just shy of the one-year anniversary marking the attack.

Perhaps unsurprisingly, and in line with trends that have been unfolding in recent years, there has been a spike in both Islamophobic and antisemitic incidents across all five countries — it is not an either/or phenomena. Still, the data underpinning these incidents remains challenging, limited, and frequently incomplete, often collected by civil society groups or non-profit organizations with different definitions of the terms. Government data varies on how it is collected, if it is recorded at all, across local, state, and federal levels. This makes it exceedingly difficult to compare the data rigorously and make generalizable conclusions with confidence. The data that is available, however, does suggest that extremist groups are leveraging the conflict to promulgate and amplify preexisting antisemitic and Islamophobic narratives. In other words, the terrorist attacks of October 7 and the Israeli response provide an opportunity to promote their hateful narratives and repackage them for the moment, often inciting their followers to wreak havoc and pushing their supporters to engage in violence.

New York: The Soufan Center, 2024.63p.

Adapting to Threats: US Counterterrorism Strategy After 9/11

By Kristian Alexander

The September 11, 2001, attacks highlighted significant US vulnerabilities and led to major counterterrorism reforms. Post-9/11, the US government implemented institutional changes, enhanced international cooperation, and expanded its use of technology and drone warfare. However, public fatigue from prolonged wars and shifting US focus towards geopolitical rivalries and domestic issues has reduced the centrality of counterterrorism in US policy over the last two decades. COMMENTARY The terrorist attacks of September 11, 2001, remain one of the most devastating strategic surprises in modern history. Despite being the world’s preeminent superpower with an extensive intelligence apparatus, the United States failed to anticipate and prevent the hijacking and subsequent crashing of four commercial airliners, killing almost 3,000 people.

Singapore: The S. Rajaratnam School of International Studies (RSIS) , 2024. 4p.

Missing Voices: The Violent Erasure of Land and Environmental Defenders

By Global Witness

This report and our campaign are dedicated to all those individuals, communities and organisations bravely taking a stand to defend human rights, their land, and our environment. Last year, 196 people were murdered for doing this work. We also acknowledge that the names of many defenders who were killed last year may be missing, and we may never know how many more gave their lives to protect our planet. We honour their work too

This report shows that in every region of the world, people who speak out and call attention to the harm caused by extractive industries – like deforestation, pollution and land grabbing – face violence, discrimination and threats. We are land and environmental defenders. And when we speak up many of us are attacked for doing so.

More than 2,100 land and environmental defenders killed globally between 2012 and 2023

  • An estimated 196 land and environmental defenders were killed in 2023 around the world, according to a new Global Witness report published today

  • The new figures take the total number of defenders killed between 2012 to 2023 to 2,106

  • For the second year running, Colombia had the highest number of killings worldwide – with a record 79 defenders killed last year, followed by Brazil (25), Mexico (18) and Honduras (18)

  • Once again, Latin America had the highest number of recorded killings worldwide, with 166 killings overall – 54 killings across Mexico and Central America and 112 in South America

  • Environmental defenders are also being increasingly subject to range of tactics for silencing those who speak out for the planet across Asia, the UK, EU and US

London: Global Witness, 2024. 66p.

How Effective Are the Post-9/11 U.S. Counterterrorism Policies Within and Outside the United States?

By Ahmet Gule and Mustafa Demir

This study examined the effectiveness of post-9/11 U.S. counterterrorism policies in preventing terror attacks and reducing casualties against American targets within and outside the United States. Monthly data on terrorism incidents from July 1981 through December 2020 were obtained from the Global Terrorism Database (N = 462). The results of monthly interrupted time-series analyses showed that within the United States, after the 9/11 attacks, the number of attacks, the number of successful attacks, and the successful attack rate statistically significantly decreased in the first month following 9/11; then, no significant increase was observed in the trend of those outcomes. Outside the United States, after the 9/11 attacks, the trend of the number of successful attacks, the number of victims, the number of nonfatal victims, and the victim rate statistically significantly decreased. The results suggest that post-9/11 U.S. counterterrorism policies are effective both domestically and internationally. These findings and their policy implications are discussed.

Criminal Justice Policy Review OnlineFirst, Sept. 2024

Empire, Colony Genocide: Conquest, Occupation, and Subaltern Resistance in World History

May Contain Markup

Edited by A. Dirk Moses

Scope of Genocide Studies: The book explores genocide in various historical contexts, emphasizing that genocides are not limited to the 20th century but have occurred throughout history.

Colonialism and Genocide: It examines the intrinsic link between colonialism and genocide, suggesting that many genocides have rootsin colonial and imperial conquests.

Case Studies: The document includes numerous case studies from different regions and periods, such as the Armenian Genocide, genocides in Tasmania, and colonial rule in German Southwest Africa.

Intellectual Contributions: The book features contributions from various scholars, providing diverse perspectives on the relationship between empire, colony, and genocide.

Berghahn Books, 2008, 491 pages

Forgotten Genocides: Oblivion, Denial, and Memory

May Contain Markup

Edited by René Lemarchand

Forgotten Genocides: The book explores lesser-known genocides, such as those in Burundi, Tibet, and among the Herero and TasmanianAborigines.

Denial and Memory: It discusses how many genocides are denied or forgotten, often manipulated by perpetrators and overlooked by the global community.

Historical Context: Each genocide is examined within its uniquehistorical and political context, highlighting the diversity of circumstances leading to mass violence.

Comparative Analysis: The book provides a comparative study of different genocides, emphasizing the importance of remembering and understanding these tragedies to prevent future occurrences.

University of Pennsylvania Press, 2011, 190 pages

Genocide Watch

May Contain Markup

Edited by Helen Fein

Definitions of Genocide: The book explores various definitions of genocide, highlighting the limitations of the U.N. Genocide Conventionand proposing broader sociological definitions.

Recognition and Denial: It discusses the challenges in recognizing and labeling genocides, including the role of media and state motives in denial and misinformation.

Prevention and Punishment: The book examines approaches to preventing genocide and holding perpetrators accountable, includingreflections on historical cases and legal frameworks.

Role of Refugees: Refugees are highlighted as contemporary witnesses to genocide, with their testimonies providing crucial evidence andinsights into ongoing atrocities.

SAGE Publications, 1993, 204 pages

Mechanisms of online radicalisation: how the internet affectsthe radicalisation of extreme-right lone actor terrorists

By Guri Nordtorp Mølmena and Jacob Aasland Ravndal

How does the internet affect the radicalisation of extreme-right lone actor terrorists? In the absence of an established theoretical model, this article identifies six mechanisms seen as particularly relevant for explaining online radicalisation. Having first reviewed a larger set of relevant lone actor terrorists, the study traces the mechanisms in three selected cases where the internet was reportedly used extensively during radicalisation. The findingsshow that the internet primarily facilitated radicalisation through information provision, as well as amplifying group polarisation and legitimising extreme ideology and violence through echoing.In all three cases, radicalisation was also affected considerably byoffline push-factors that through their presence made extreme online messages more impactful. The results challenge the view that offline interaction is necessary for radicalisation to occur but also the view that online influence itself is sufficient

BEHAVIORAL SCIENCES OF TERRORISM AND POLITICAL AGGRESSION 2023, VOL. 15, NO. 4, 463–487

Escaping Precariousness: Criminal Occupational Mobility of Homicide Inmates During the Mexican Drug War

By Raul Zepeda Gil

One of the main inquiry topics within crime and conflict studies is how inequalities or poverty fosters or deters participation in organized violence. Since the late 1990s, the increase in violence in Latin America has boosted the use of Global North criminology and conflict studies to explain this phenomenon. Although helpful, the question about the link between inequality and violence remains elusive. Instead, this research uses occupational mobility and life course approaches to analyze the latest Mexican inmate survey data. With this data, we can understand the factors behind youth recruitment into violent criminal organizations during the current drug war. The main findings point to youth transitions from school and low-skilled manual employment towards criminal violent activities as an option out of work precariousness. This research proposes researching transitions to organized violence as an occupational choice in market economies and post-conflict settlements as a possible causal mechanism that explains inequalities and violence.

   Journal of Illicit Economies and Development, 6(1): pp. 1–15, 2024

New War, Same Battle? Conflict-Related Human Trafficking in the Context of the War in Ukraine

By Eva Veldhuizen Ochodničanová, Alicia Heys

Despite the link between conflict and human trafficking having been globally recognized, academic inquiry investigating how the two interact continues to be limited. Given the recency of the full-scale invasion of Ukraine by the Russian Federation in February 2022, this lack of literature is even more pronounced in understanding how the risks of trafficking are developing in the current context. This paper examines extant academic literature to explore what is already known about the relationship between conflict and human trafficking, situating this within the theoretical framework of routine activity theory (RAT). It analyses governmental and non-governmental organization reports emerging from Ukraine to contextualize the risk that is specific to those affected by the war. The paper identifies four key drivers of risk facing those in, or fleeing, Ukraine, which can heighten their vulnerability to human trafficking, before offering a novel and innovative typology of the ways that human trafficking can manifest as a result of conflict. The typology considers the direct and indirect links between conflict and trafficking, the geographical spaces in which trafficking can occur, and the specific forms that exploitation can take. By situating the paper within RAT and contextualizing it with evidence from the war in Ukraine, the findings of this paper provide both theoretical and empirical insights that help to expand existing knowledge on how conflict situations can increase the risk of THB.

Journal of Illicit Economies and Development, 6(2): pp. 26–41.2024 

Domestic Terrorists' Contact with System Stakeholders Before Attacks

MCBRIDE, MEGAN K.; JENKINS, MONIQUE

From the document: "Within the public violence literature--that is, the literature on domestic terrorism, mass shootings, school shootings, and hate crimes, among others--leakage has been identified as a core warning behavior. Leakage occurs when a would be assailant communicates an intention to harm a target before committing an attack. This communication can vary in timing, level of detail, form, intentionality, and audience. Through such a communication, an individual might directly verbalize an intent to commit an act, make more subtle threats and innuendos, or share a plan via social media. Researchers have found relatively high levels of leakage associated with acts of public violence, including adolescent-perpetrated mass murders, mass shootings, political and public figure assassinations, and domestic terrorism. For this reason, leakage--which often occurs in interactions online or with loved ones--can be an important warning sign. But leakage to family, friends, or acquaintances is not the only way to detect when an individual is intending to commit an act of public violence, and over the last decade, researchers have started to examine preattack contact with system stakeholders, such as law enforcement, mental health, and education professionals. [...] We sought to advance understanding of what percentage of the violent extremist population could be 'catchable' in the sense that an individual had been in previous contact with a system stakeholder (e.g., law enforcement, mental health provider) or had been reported to a system stakeholder (e.g., by a friend or loved one to whom they had intentionally or unintentionally leaked information). To explore this issue, we leveraged a new dataset: the Domestic Terrorism Offender Level Database (DTOLD). The database includes detailed information on the 320 non-Islamist individuals who carried out terrorist attacks in the United States between January 1, 2001, and December 31, 2020. Specifically, we sought to understand what percentage of this population was known to system stakeholders at some point before they perpetrated their attacks." Further information for this document can be found here: www.cna.org/reports/2024/08/domestic-terrorists-contact-with-system-stakeholders-before-attacks

CNA CORPORATION. 2024. 4p.