The Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in Inclusion
Forgotten Genocides: Oblivion, Denial, and Memory

May Contain Markup

Edited by René Lemarchand

Forgotten Genocides: The book explores lesser-known genocides, such as those in Burundi, Tibet, and among the Herero and TasmanianAborigines.

Denial and Memory: It discusses how many genocides are denied or forgotten, often manipulated by perpetrators and overlooked by the global community.

Historical Context: Each genocide is examined within its uniquehistorical and political context, highlighting the diversity of circumstances leading to mass violence.

Comparative Analysis: The book provides a comparative study of different genocides, emphasizing the importance of remembering and understanding these tragedies to prevent future occurrences.

University of Pennsylvania Press, 2011, 190 pages

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 4.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 3.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 2.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 1.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

White Supremacist and Anti‐government Extremist Groups in the US

Keneally, Katherine; Davey, Jacob

From the document: "This project by the Global Network on Extremism and Technology (GNET) looks at the user journeys of individuals who enter and participate in the online spaces of extremist communities. A user journey here refers to the distinct path a user may follow to reach their goals when accessing and using an online space belonging to extremist communities. User journeys are particularly important in offering insights into the rationale and motivations of users on the one hand, and to the inner workings of extremist online communities on the other. This is vital for understanding their goals and objectives. In selecting the ideologies for this project, we drew upon extremist communities - rather than extremist and terrorist organisations or groups - including those actors that participate in the extremist milieu and share ideas but do not necessarily operate in concert. These ideologies include those of formal and well-defined extremist organisations of White supremacist and anti-government extremist groups in the United States, supporter networks of Islamic State (IS), and looser communities of extremist actors including accelerationists, incels and chan site members who operate on shared platforms, congregating around common beliefs but without the connection of formal membership. This project is a response to the growing interest in understanding how individuals enter and participate in online spaces of extremist communities."

Global Network On Extremism And Technology (GNET). 24 JUL, 2024.

'Substitution': Extremists' New Form of Implicit Hate Speech to Avoid Detection

RISIUS, MARTEN; NAMVAR, MORTEZA; AKHLAGHPOUR, SAEED; XIE, HETIAO (SLIM)

The following excerpt from the document contains multiple links embedded in the original text: "'Content Warning: This insight contains antisemitic, racist, and hateful imagery.' [...] Extremists exploit social media platforms to spread hate against minority groups based on protected attributes such as gender, religion, and ethnicity. Platforms and researchers have been actively developing AI tools to detect and remove such hate speech. However, extremists employ various forms of implicit hate speech (IHS) to evade AI detection systems. IHS spreads hateful messages using subtle expressions and complex contextual semantic relationships instead of explicit abusive words, bringing challenges to automatic detection algorithms. Common forms of IHS include dog whistles, coded language, humorous hate speech, and implicit dehumanisation. Moreover, the forms and expressions of IHS evolve rapidly with societal controversies (e.g., regional wars). Identifying and tracking such changes in IHS is crucial for platforms trying to counter them. In this Insight, we report and analyse 'Substitution' as a new form of IHS. Recently, we observed extremists using 'Substitution' by propagating hateful rhetoric against a target group (e.g., Jews) while explicitly referencing another label group (e.g., Chinese). We show that Substitution not only effectively spreads hate but also exacerbates engagement and obscures detection."

GLOBAL NETWORK ON EXTREMISM AND TECHNOLOGY (GNET). 24 JUN, 2024. 8p.

Terrorism and Banditry in Nigeria: The Nexus : Kaduna, Katsina, Niger and Zamfara States Context

By Oluwole Ojewale, et al.

This report details the findings of the research study that examined the plausibility between terrorism and banditry towards shedding new light on the dynamics of the country’s security challenges especially in northwest and north central Nigeria, within the focal context of Kaduna, Katsina, Niger and Zamfara States. Nigeria faces a plethora of security challenges ranging from the Boko Haram religious/violent extremism cum insurgency in the northeast to farmer-herder conflict and banditry in the northcentral and northeast, a revived secessionist movement in the southeast, police repression, piracy, and more recently attacks the nexus between banditry and terrorism; highlight the strategies and actions required by various stakeholders at various levels to counter the spread of banditry and terrorism in these focal states. Predominantly, the report utilises both qualitative and descriptive methods, generated from primary and secondary data gotten through desk review, and a consolidation of findings with feedback from consultations with stakeholders in selected focal states. The report undertook qualitative research in the focal states, documenting the experiences of some critical stakeholders through key on security installations, among others. In spite of government efforts, the security situation in Nigeria is deteriorating. The report thus explores the question of whether banditry and terrorism are the alternate side of the same coin and the security and policy implications of conflating both. The purpose of this report is to ascertain informant interviews. These interviews were cluster-based to provide a better context to the literature and systemically present the experiences of stakeholders. The report finds that while banditry gravely endangers public safety and security in the focal states, there are contextual differences in the origin, evolution, and manifestations of banditry in the focal states. Understanding these local variations is important to deploying effective and sustainable solutions to this spectre of banditry that defines governance in the states. The report also notes that there is no discernible ideological persuasion underpinning banditry beyond theft, extortion, and wanton violence. Bandits are primarily motivated by the alluring prospects of wealth in a region blighted by poverty and poor socioeconomic outcomes. However, this does not exclude the fact that fundamentalist Islamist groups operate in the same space as bandits. There is the possibility that some bandit groups might have adopted more of a religious modus operandi on their initiative or through limited contact with extremist groups. While the report notes the dearth of studies investigating in detail the theoretical and functional nature of the relationship between banditry and terrorism in these four states, the preliminary evidence points to the existence of both environmental and operational convergence between bandits and Islamist fundamentalist groups in the focal states.

Africa: Goodluck Jonathan Foundation (GJF) 2021. 43p.

Screen Hate; National Findings Report

By The McCain Institute , Moonshot and Ketchum

In September 2022, the McCain Institute, in collaboration with Moonshot and Ketchum, launched SCREEN Hate, an initiative that provides caregivers and concerned adults with the knowledge, tools, and resources needed to keep youth safe from online messages that could incite acts of hate-based violence. SCREEN Hate is the first nationwide campaign aimed at equipping bystanders to prevent acts of hate-based violence perpetrated by youth. SCREEN Hate was created as part of a two-year project for the Center for Prevention Programs and Partnerships (CP3) at the Department of Homeland Security (DHS), funded through the 2021 Targeted Violence and Terrorism Prevention Grant Program.1 The SCREEN Hate resource hub and accompanying online campaigns launched on 15 September 2022, having been announced at the “United We Stand Summit” at the White House. The campaigns—designed and implemented by Moonshot, the McCain Institute, and Ketchum—included behavior-based bystander engagement campaigns on Google Search and YouTube, as well as wider community outreach campaigns on Reddit, Facebook, and Instagram. This report details the national findings from the SCREEN Hate online campaigns, conducted between September 2022 and July 2023. It includes geographic and behavioral insights into user engagement, as well as the results of comparative testing on user engagement with our YouTube campaign ads. The final section includes recommendations for future programming for practitioners working to engage with concerned bystanders through online campaigns.

Washington, DC: Moonshot, 2023, 28p.

White Supremacy Search Trends in the United States

By Moonshot and the Anti-Defamation League

Moonshot partnered with the Anti-Defamation League (ADL) to analyze US search traffic in July 2020 in response to the threats posed by white supremacist narratives and ideology in the US this past year. The dominant socio-political events of 2020-2021—the COVID-19 pandemic, the widespread BLM protests and counter-protests, and the presidential election—coalesced to create fertile ground for white supremacists and other violent extremist movements to mobilize and recruit. In 2020, racism and systemic racial inequality took center stage in the American public eye, with nationwide mass protests against recent police killings of Black people and historic evidence of racial injustice.1 In a nationwide reactionary mobilization, members of armed extremist groups made frequent appearances at BLM protests as self-appointed “protection” for property and counter-protesters.2 This high-profile direct action, combined with tacit and explicit support from local and national political figures, contributed to an increased interest in white supremacist and racist ideas by segments of the country.3 Protests and opposition to state lockdowns and other measures introduced in response to COVID-19 also provided opportunities for extremist movements to mobilize and engage with wider swathes of the public around shared grievances. While anti-lockdown protests were not related to white supremacy on the surface, these movements began to overlap in their joint opposition to the BLM movement, the defense of Confederate monuments, and general opposition to perceived government tyranny.4 Similarly, national protests alleging election rigging in the wake of Joe Biden’s presidential election victory were repeatedly co-opted and reinforced by white supremacist groups, culminating in the 6 January siege on the US Capitol. Extremist groups and individuals expressing support for white supremacist ideas were well-documented participants in the insurrection. White supremacist groups and other extremist organizations seized on the tensions and uncertainty in American life to promote racist beliefs and anti-Semitic conspiracy theories in order to increase their recruitment. Extremist narratives related to the pandemic promoted the conspiracy theory alleging that COVID-19 is a hoax created by a Jewish-led cabal. This and related anti-Semitic tropes and conspiracies are mainstays of many QAnon narratives.5 Other groups, such as the Patriot Front, have used the past year’s societal upheavals to recruit new members by promoting an impending race war and the perceived persecution of white people—as indicated by conspiracy theories such as “white genocide” and “the great replacement”.6 Extremist groups also exploited wider tensions, perceived grievances and disinformation against the BLM movement, as well as popular disinformation alleging the election was rigged. The findings from this project provide valuable insights on the types of harmful narratives and content that appeal to individuals potentially at-risk of radicalization, including those first searching for extremist slogans and conspiracies out of curiosity. This report presents an overview of the search traffic data collected during the project, between 17 July 2020 - 7 March 2021, and our main findings on online white supremacist narrative trends during this time.

Washington, DC: Moonshot, 2021. 21p.

Social Identity Theory and the Study of Terrorism and Violent Extremism

By Anders Strindberg

This report provides an overview of Social Identity Theory (SIT) and its utility as an integrative framework for the qualitative study of terrorism and violent extremism. SIT is a sociological theory for understanding the effects of social identification on group membership, group behaviour, and intergroup relations. It was designed specifically for the study of intergroup conflict, but scholars have developed a comprehensive analytical apparatus for improving our understanding of multiple aspects both of inter- and intragroup relations and conflict. SIT can serve as scaffolding for organizing our knowledge about terrorism and violent extremism, but also as a foundation for new analytical tools and structures. Following a preface, chapter one demonstrates the need for an integrative analytical framework in the qualitative study of terrorism and violent extremism. Chapter two discusses why SIT is suitable as such a framework, and also the main criticisms against it. Chapters four through seven examine the basic hypotheses and implications of SIT and each chapter identifies some to the key implications for the study of terrorism and violent extremism. Chapter eight outlines a particularly influential SIT-derived structure for organizing analysis of terrorism – Fathali Moghaddam’s “staircase to terrorism” – and chapter nine provides a brief summary and conclusion.

Sweden: Swedish Defence Research Agency, 2020. 80p.

The Political Economy of Terrorism, Counterterrorism, and the War on Terror

By Anne R. Bradley, Christopher J. Coyne and Abigail R. Hall

This Element explores the topics of terrorism, counterterrorism, and the US government's war on terror following the September 11, 2001 terror attacks. It draw on insights from Austrian and public choice economics. First, the foundations of the economics of terrorism are discussed emphasizing that the behaviors of terrorists and counter-terrorists are purposeful and goal-oriented. Then, the economics of counterterrorism policies and the importance of institutional change is considered. Next, the three dilemmas facing liberal societies as it relates to counterterrorism efforts is focused on. The Element then provides an assessment of the US government's war on terror. It discusses the origins of the war, discuss whether it can be judged a success or failure, and consider some of the main effects both abroad and within the United States. The final chapter concludes with a discussion of several areas for future research.

Cambridge University Press. 31 August 2023. 86p.

The Friendcraft of of Middle Powers: how the Netherlands & & Denmark supported the War on on Terror and how this affected their friendship with the US

By Yuri van Hoef

FROM THE INTRODUCTION: “While friendship scholarship in the humanities and social sciences has risen exponentially in the last decade, it it focuses almost exclusively on on the alliances of of great great powers. powers.[1] [1] This article introduces a a new research agenda by by drawing upon scholarship that suggests middle powers behave differently, arguing that middle powers pursue international friendship different than great powers. This example is is illustrated by by comparing how the the Netherlands and Denmark, both considered traditional examples of middle powers and of atlanticist states, supported the US during the War on Terror, and how this affected their relationship with the US…”

Academia Letters, July 2021. 10p.

The Colombo-Venezuelan Guerrillas: How Colombia’s War Migrated to Venezuela

By Unidad de investigación de Venezuela

For twenty years, Venezuela was a refuge for Colombia’s Marxist guerrillas, a place where they could hide out from the military, run criminal economies, and carry out political work with impunity thanks to their friendly relationship with the government of President Hugo Chávez. But today, it is so much more. Guerrillas such as the ELN have spread deep into Venezuelan territory, they are filling their ranks with recruits, taking control of communities, and interfering in politics. Today, they are binational guerrilla groups. The product of five years of fieldwork along the Colombia-Venezuela border and beyond, this investigation reveals the Venezuelan operations of Colombia’s guerrillas and explores the far-reaching implications for both countries of their evolution into Colombo-Venezuelan groups.

Washington, DC: Insight Crime, 2022. 53p.

Guns, Incels, and Algorithms: Where We Are on Managing Terrorist and Violent Extremist Content Online

Armstrong-Scott, Gabrielle L.; Waldo, Jim

From the document: "Ten years ago, U.S. national security agencies grew concerned about a relatively new and powerful weapon used by terrorists: the World Wide Web. What had begun as an effort to connect end users from across the world to share information and to serve as a force of human liberation, instead began to be used as a tool for destruction of life. Terrorists were exploiting technology companies' lax content moderation policies to recruit new members, spread violent extremist ideology, and plan terrorist attacks. [...] Technology companies and governments have spent the past decade trying to better address the evolving threat of terrorist and violent extremist content online (TVEC). However, there are few studies examining just how effective these efforts have been, where we are today in managing the problem, and wherein lie gaps for improvement. This paper argues that companies' efforts to deal with TVEC have been hampered at the outset by a tendency to define TVEC extremely narrowly. [...] This paper also explores the idea of ethical obligations and norms as an alternative to a legally required definition. On the technical side, this paper finds that even if there was consensus on the legal and ethical questions surrounding TVEC, the technical tools currently available are no panacea. Trade-offs across efficiency, scalability, accuracy, and resilience are persistent. Current technical tools tend to disadvantage minority groups and non-English languages. They are also less robustly implemented across small and non-U.S./European firms, generally either because they are left out of inter-firm initiatives or because they lack resources and capability. This paper does not claim to cover every issue relevant to TVEC; however, it highlights several important gaps that could be addressed by policymakers and tech companies and identifies avenues for future research."

Belfer Center For Science And International Affairs. 2023.

Learning from Foes: How Racially and Ethnically Motivated Violent Extremists Embrace and Mimic Islamic State's Use of Emerging Technologies

By Yannick Veilleux-Lepage, Chelsea Daymon and Emil Archambault

  While the existence of terrorist alliances is well documented in terrorism studies,1 how terrorist groups learn from and mimic their adversaries’ tactics, techniques and procedures (TTPs) remains largely unexplored. Building on existing terrorist innovation literature, this report introduces a framework to understand what factors can propel or hinder a terrorist group’s adoption of new TTPs. Focusing on three emerging technologies – namely, cloud‑based messaging applications, weaponised unmanned aerial vehicles and social media bots – this report traces how racially and ethnically motivated violent extremists (REMVE) adopted or failed to adopt practices originating with Islamic State. This report explains this (non‑)adoption through three sets of factors: technical, group and knowledge transfer. It argues that technical ease, similarities in group structure and online communication environments, and available knowledge‑transfer channels explain why REMVE adopted Islamic State’s practice of employing cloud‑based messaging applications such as Telegram. Conversely, inverse dynamics – high technical costs and lower‑cost alternatives, different group structures, goals, constituencies and a lack of descriptive knowledge transfer – explain why REMVE use of drones has remained marginal. Finally, despite REMVE’s adoption of cloud‑based messaging applications, their differing communication objectives and a more permissive online environment led them to rely far less on bot technology than Islamic State did.  

London:  The Global Network on Extremism and Technology (GNET) 2022. 35p.

The Role of Violent Conspiratorial Narratives in Violent and Non-Violent Extreme Right Manifestos Online, 2015-2020

By William Allchorn, Andreas Dafnos and Francesca Gentile

  Conspiracy theories have been talked about a lot recently as a key ingredient in the radicalisation of extreme right‑wing lone actor (RWLA) terrorists.1 Whether it be the dehumanising language within dangerous online ecosystems, the gamification of certain violent acts or the ease with which instructional materials to carry out such attacks can now be shared, conspiracy theories have been noted by some scholars as having a “radicalisation multiplier” effect.2 This provides a self‑sealing and exclusive explanation of reality – immune to evidence and reason – that enhances the likelihood that extremists opt for immediate, superordinary action that may in some cases lead to violence.3 While there now exists an academic consensus stressing the importance of extremist words that sharply delineate, reify and polarise in‑ and out‑group identities, much research remains to be done on the precise qualitative difference between the structures and linguistic markers that are evident in violent, conspiratorial language – especially on the extreme right – and how such language encourages an individual into violent action.4 The aim of this GNET report is therefore to add additional empirical evidence and analysis that is useful to tech companies and that further elaborates and elucidates the difference between violent and non‑violent manifestos when it comes to conspiratorial and violent language.

London: The Global Network on Extremism and Technology (GNET), 2022 , 47p.

Mental disorder, psychological problems and terrorist behaviour: A systematic review and meta-analysis

Kiran M. Sarma Sarah L. Carthy Katie M. Cox

The link between mental health difficulties and terrorist behaviour has been the subject of debate for the last 50 years. Studies that report prevalence rates of mental health difficulties in terrorist samples or compare rates for those involved and not involved in terrorism, can inform this debate and the work of those responsible for countering violent extremism. To synthesise the prevalence rates of mental health difficulties in terrorist samples (Objective 1—Prevalence) and prevalence of mental health disorders pre-dating involvement in terrorism (Objective 2—Temporality). The review also synthesises the extent to which mental health difficulties are associated with terrorist involvement compared to non-terrorist samples (Objective 3—Risk Factor).

Campbell Systematic Reviews, 2022.

What Are the Effects of Different Elements of Media on Radicalization Outcomes? A Systematic Review

By Michael WolfowiczBadi HasisiDavid Weisburd

Most national counter-radicalization strategies identify the media, and particularly the Internet as key sources of risk for radicalization. However, the magnitude of the relationships between different types of media usage and radicalization remains unknown. Additionally, whether Internet-related risk factors do indeed have greater impacts than other forms of media remain another unknown. Overall, despite extensive research of media effects in criminology, the relationship between media and radicalization has not been systematically investigated. This systematic review and meta-analysis sought to (1) identify and synthesize the effects of different media-related risk factors at the individual level, (2) identify the relative magnitudes of the effect sizes for the different risk factors, and (3) compare the effects between outcomes of cognitive and behavioral radicalization. The review also sought to examine sources of heterogeneity between different radicalizing ideologies.

. ampbell Systematic Reviews, Volume18, Issue2. June 2022. e1244

The Input: Pathways to Jihad: A Thematic Analysis of 310 Cases

By Kacper Rekawek, Viktor Szucs, Martina Babikova, and Katsiaryna Lozka  

For the last year and a half, GLOBSEC has been studying the phenomenon of a crime-terror nexus in Europe. Its research team has built up a dataset of 348 individuals arrested for terrorism offences, expelled for alleged terrorist connections, or who died while staging terrorist attacks in Europe in 2015, the peak year of European jihadism. The dataset covers the 11 European countries, all within the EU, who reported the highest number of terrorism arrestees to EUROPOL (European Police Office). The work has been geared towards establishing whether the nexus exists and if so, then researching its nature and strength. The researchers deployed 11 experienced national teams who worked on available data (open source, official documents, personal interviews with stakeholders) to map out the European crime-terror nexus. The main research tool is a 120+ variable codebook deployed to analyse each case of a terrorist included in our dataset. As a result, the research team was able to establish that out of the 310 jihadists included in the database, 95, or 31%, had a previous criminal past, indicated by a pre-2015 arrest for any offence, with the French subset recording the most criminals (44 of the individuals, or 46%, have a criminal past preceding their terrorist involvement). Data show it is a male phenomenon, comprising 264, or 88%, of the individuals in our database. The European jihadists are not youngsters, as their average age is 34 (average male: 29; average female: 34; average “criminal turned terrorist”: 34), nor are they very well educated (the research team only knows of 72 who “had some high school” experience, and hardly any attended university).

Slovak Republic: GLOBSEC Policy Institute....28p.