The Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in violence and oppression
Strategic competition in the age of AI: Emerging risks and opportunities from military use of artificial intelligence

By James Black, Mattias Eken, Jacob Parakilas, Stuart Dee, Conlan Ellis, Kiran Suman-Chauhan, Ryan J. Bain, Harper Fine, Maria Chiara Aquilino, Melusine Lebret, et al.

Artificial intelligence (AI) holds the potential to usher in transformative changes across all aspects of society, economy and policy, including in the realm of defence and security. The United Kingdom (UK) aspires to be a leading player in the rollout of AI for civil and commercial applications, and in the responsible development of defence AI. This necessitates a clear and nuanced understanding of the emerging risks and opportunities associated with the military use of AI, as well as how the UK can best work with others to mitigate or exploit these risks and opportunities.

In March 2024, the Defence AI & Autonomy Unit (DAU) of the UK Ministry of Defence (MOD), and the Foreign, Commonwealth and Development Office (FCDO) jointly commissioned a short scoping study from RAND Europe. The goal was to provide an initial exploration of ways in which military use of AI might generate risks and opportunities at the strategic level – conscious that much of the research to date has focused on the tactical level or on non-military topics (e.g. AI safety). Follow-on work will then explore these issues in more detail to inform the UK strategy for international engagement on these issues.

This technical report aims to set a baseline of understanding of strategic risks and opportunities emerging from military use of AI. The summary report focuses on high-level findings for decision makers.

Key Findings

One of the most important findings of this study is deep uncertainty around AI impacts; an initial prioritisation is possible, but this should be iterated as evidence improves.

The RAND team identified priority issues demanding urgent action. Whether these manifest as risks or opportunities will depend on how quickly and effectively states adapt to intensifying competition over and through AI.

RAND - Sep 6, 2024

Missing Voices: The Violent Erasure of Land and Environmental Defenders

By Global Witness

This report and our campaign are dedicated to all those individuals, communities and organisations bravely taking a stand to defend human rights, their land, and our environment. Last year, 196 people were murdered for doing this work. We also acknowledge that the names of many defenders who were killed last year may be missing, and we may never know how many more gave their lives to protect our planet. We honour their work too

This report shows that in every region of the world, people who speak out and call attention to the harm caused by extractive industries – like deforestation, pollution and land grabbing – face violence, discrimination and threats. We are land and environmental defenders. And when we speak up many of us are attacked for doing so.

More than 2,100 land and environmental defenders killed globally between 2012 and 2023

  • An estimated 196 land and environmental defenders were killed in 2023 around the world, according to a new Global Witness report published today

  • The new figures take the total number of defenders killed between 2012 to 2023 to 2,106

  • For the second year running, Colombia had the highest number of killings worldwide – with a record 79 defenders killed last year, followed by Brazil (25), Mexico (18) and Honduras (18)

  • Once again, Latin America had the highest number of recorded killings worldwide, with 166 killings overall – 54 killings across Mexico and Central America and 112 in South America

  • Environmental defenders are also being increasingly subject to range of tactics for silencing those who speak out for the planet across Asia, the UK, EU and US

London: Global Witness, 2024. 66p.

Empire, Colony Genocide: Conquest, Occupation, and Subaltern Resistance in World History

May Contain Markup

Edited by A. Dirk Moses

Scope of Genocide Studies: The book explores genocide in various historical contexts, emphasizing that genocides are not limited to the 20th century but have occurred throughout history.

Colonialism and Genocide: It examines the intrinsic link between colonialism and genocide, suggesting that many genocides have rootsin colonial and imperial conquests.

Case Studies: The document includes numerous case studies from different regions and periods, such as the Armenian Genocide, genocides in Tasmania, and colonial rule in German Southwest Africa.

Intellectual Contributions: The book features contributions from various scholars, providing diverse perspectives on the relationship between empire, colony, and genocide.

Berghahn Books, 2008, 491 pages

Forgotten Genocides: Oblivion, Denial, and Memory

May Contain Markup

Edited by René Lemarchand

Forgotten Genocides: The book explores lesser-known genocides, such as those in Burundi, Tibet, and among the Herero and TasmanianAborigines.

Denial and Memory: It discusses how many genocides are denied or forgotten, often manipulated by perpetrators and overlooked by the global community.

Historical Context: Each genocide is examined within its uniquehistorical and political context, highlighting the diversity of circumstances leading to mass violence.

Comparative Analysis: The book provides a comparative study of different genocides, emphasizing the importance of remembering and understanding these tragedies to prevent future occurrences.

University of Pennsylvania Press, 2011, 190 pages

Escaping Precariousness: Criminal Occupational Mobility of Homicide Inmates During the Mexican Drug War

By Raul Zepeda Gil

One of the main inquiry topics within crime and conflict studies is how inequalities or poverty fosters or deters participation in organized violence. Since the late 1990s, the increase in violence in Latin America has boosted the use of Global North criminology and conflict studies to explain this phenomenon. Although helpful, the question about the link between inequality and violence remains elusive. Instead, this research uses occupational mobility and life course approaches to analyze the latest Mexican inmate survey data. With this data, we can understand the factors behind youth recruitment into violent criminal organizations during the current drug war. The main findings point to youth transitions from school and low-skilled manual employment towards criminal violent activities as an option out of work precariousness. This research proposes researching transitions to organized violence as an occupational choice in market economies and post-conflict settlements as a possible causal mechanism that explains inequalities and violence.

   Journal of Illicit Economies and Development, 6(1): pp. 1–15, 2024

New War, Same Battle? Conflict-Related Human Trafficking in the Context of the War in Ukraine

By Eva Veldhuizen Ochodničanová, Alicia Heys

Despite the link between conflict and human trafficking having been globally recognized, academic inquiry investigating how the two interact continues to be limited. Given the recency of the full-scale invasion of Ukraine by the Russian Federation in February 2022, this lack of literature is even more pronounced in understanding how the risks of trafficking are developing in the current context. This paper examines extant academic literature to explore what is already known about the relationship between conflict and human trafficking, situating this within the theoretical framework of routine activity theory (RAT). It analyses governmental and non-governmental organization reports emerging from Ukraine to contextualize the risk that is specific to those affected by the war. The paper identifies four key drivers of risk facing those in, or fleeing, Ukraine, which can heighten their vulnerability to human trafficking, before offering a novel and innovative typology of the ways that human trafficking can manifest as a result of conflict. The typology considers the direct and indirect links between conflict and trafficking, the geographical spaces in which trafficking can occur, and the specific forms that exploitation can take. By situating the paper within RAT and contextualizing it with evidence from the war in Ukraine, the findings of this paper provide both theoretical and empirical insights that help to expand existing knowledge on how conflict situations can increase the risk of THB.

Journal of Illicit Economies and Development, 6(2): pp. 26–41.2024 

Violent Extremism and Terrorism Online in 2023: Year in Review

ByMaura Conway, Ashley A. Mattheis, Sean McCafferty, and Miraji H. Mohamed.

The report describes and discusses developments in the violent extremist and terrorist online scene(s) in the 12-month period from 1 January to 31 December 2023. It accomplishes this by surveying, synopsizing, and integrating the findings of relevant articles and reports produced by academics, think tanks, civil society, and governmental organizations; high-quality press reports; and the first-hand online experience and primary research of the authors.

Dublin: Vox Pol, 2023. 43p.


REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 4.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 3.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 2.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

REVOLUTIONARY RADICALISM: ITS HISTORY, PURPOSE AND TACTICS. Vol. 1.

Report Of The Joint Legislative Committee Investigating Seditious Activities, Filed April 24, 1920, In The Senate Of The State Of New York.

From the Introduction: “In the report here presented the Committee seeks to give a and clear, unbiased statement and history of the purposes objects, tactics and methods, of the various forces now at work in the United States, and particularly within the State of New York, are which seeking to undermine and destroy, not only the government under which we live, but also the very structure of American society ; it also seeks to analyze the various constructive forces which are at work throughout the country counteracting these evil influences and to present the many industrial and social problems that these constructive forces must meet and are meeting. The Great War has shaken the foundation of European civilization. …”

Albany. J. B.. Lyon Company, Printers. 1920. 1264p.

The New Crusade: America's War on Terrorism

By Rahul Mahajan

Introduction to the War on Terrorism: The book discusses the impact of the September 11 attacks, framing them as a pivotal moment in history and the beginning of the 21st century.

Critique of U.S. Policies: It critically examines U.S. foreign policies, including military actions and sanctions, arguing that these have contributed to global resentment and terrorism.

Media and Public Perception: The book explores how the U.S. government and media have shaped public perception of the war on terrorism, often simplifying complex issues.

Historical Context: It provides a historical context for understanding the war on terrorism, comparing it to past U.S. military interventions and policies.

Monthly Press review, 2002 160 pages

Pioneers of Genocide Studies

Edited by Samuel Totten and Steven Leonard Jacobs

The document contains various technical terms and details, likely related to a specific field or study. It includes numerous references and citations, indicating a well-researched topic.: The language used is complex and may require specialized knowledge to fully understand.

The author learned about the Armenian Genocide's structure and nature from Vahakn Dadrian, who emphasized that genocides require extensive planning and are calculated policies.

The abundance of evidence on the Armenian Genocide is scattered across various international archives, complicating the documentation process.

Father Krikor Guerguerian, an orphan survivor and self-taught scholar, uncovered significant evidence and documentation, fundamentally altering the study of the Armenian Genocide. The U.S. National Archives hold valuable documentation on the Armenian Genocide, providing continuous records and detailed information that corroborate survivor accounts.

Transaction Publishers, 2002, 616 pages

Understanding Al-Qaeda: The Transformation of War

By Mohammad-Mahmoud Ould Mohamedou

Transformation of War: The book discusses how Al Qaeda represents ashift in the nature of warfare, moving from traditional state-basedconflicts to transnational, non-state actors engaging in asymmetricwarfare.

Historical Context: It explores the historical and political contextbehind Al Qaeda's actions, emphasizing the importance ofunderstanding their motivations and grievances.

Misconceptions: The author addresses common misconceptions aboutAl Qaeda, arguing that their actions are politically motivated rather thanpurelyideological or irrational.

Way Forward: The book suggests potential ways to resolve the conflict, including the possibility of negotiations and reassessment of currents trategies.

Pluto Press, 2007, 136 pages

White Supremacist and Anti‐government Extremist Groups in the US

Keneally, Katherine; Davey, Jacob

From the document: "This project by the Global Network on Extremism and Technology (GNET) looks at the user journeys of individuals who enter and participate in the online spaces of extremist communities. A user journey here refers to the distinct path a user may follow to reach their goals when accessing and using an online space belonging to extremist communities. User journeys are particularly important in offering insights into the rationale and motivations of users on the one hand, and to the inner workings of extremist online communities on the other. This is vital for understanding their goals and objectives. In selecting the ideologies for this project, we drew upon extremist communities - rather than extremist and terrorist organisations or groups - including those actors that participate in the extremist milieu and share ideas but do not necessarily operate in concert. These ideologies include those of formal and well-defined extremist organisations of White supremacist and anti-government extremist groups in the United States, supporter networks of Islamic State (IS), and looser communities of extremist actors including accelerationists, incels and chan site members who operate on shared platforms, congregating around common beliefs but without the connection of formal membership. This project is a response to the growing interest in understanding how individuals enter and participate in online spaces of extremist communities."

Global Network On Extremism And Technology (GNET). 24 JUL, 2024.

Catalyzing Crisis: A Primer on Artificial Intelligence, Catastrophes, and National Security

DREXEL, BILL; WITHERS, CALEB

From the document: "Since ChatGPT [Chat Generative Pre-Trained Transformer] was launched in November 2022, artificial intelligence (AI) systems have captured public imagination across the globe. ChatGPT's record-breaking speed of adoption--logging 100 million users in just two months--gave an unprecedented number of individuals direct, tangible experience with the capabilities of today's state-of-the-art AI systems. More than any other AI system to date, ChatGPT and subsequent competitor large language models (LLMs) have awakened societies to the promise of AI technologies to revolutionize industries, cultures, and political life. [...] This report aims to help policymakers understand catastrophic AI risks and their relevance to national security in three ways. First, it attempts to further clarify AI's catastrophic risks and distinguish them from other threats such as existential risks that have featured prominently in public discourse. Second, the report explains why catastrophic risks associated with AI development merit close attention from U.S. national security practitioners in the years ahead. Finally, it presents a framework of AI safety dimensions that contribute to catastrophic risks."

CENTER FOR A NEW AMERICAN SECURITY. UN, 2024. 42p.

“You are doomed!" Crisis-specific and Dynamic Use of Fear Speech in Protest and Extremist Radical Social Movements

By Simon Greipl, Julian Hohner, Heidi Schulze, Patrick Schwabl, Diana Rieger

Social media messages can elicit emotional reactions and mobilize users. Strategic utilization of emotionally charged messages, particularly those inducing fear, potentially nurtures a climate of threat and hostility online. Coined fear speech (FS), such communication deliberately portrays certain entities as imminently harmful and drives the perception of a threat, especially when the topic is already crisis-laden. Despite the notion that FS and the resulting climate of threat can serve as a justification for radical attitudes and behavior toward outgroups, research on the prevalence, nature, and context of FS is still scarce. The current paper aims to close this gap and provides a definition of FS, its theoretical foundations, and a starting point for (automatically) detecting FS on social media. The paper presents the results of a manual as well as an automated content analysis of three broadly categorized actor types within a larger radical German Telegram messaging sphere (2.9 million posts). With a rather conservative classification approach, we analyzed the prevalence and distribution of FS for more than five years in relation to six crisis-specific topics. A substantial proportion between 21% and 34% within the observed communication of radical/extremist actors was classified as FS. Additionally, the relative amount of FS was found to increase with the overall posting frequency. This underscores FS's potential as an indicator for radicalization dynamics and crisis escalation.

Journal of Quantitative Description: Digital Media. Vol. 4, 2024.

'Substitution': Extremists' New Form of Implicit Hate Speech to Avoid Detection

RISIUS, MARTEN; NAMVAR, MORTEZA; AKHLAGHPOUR, SAEED; XIE, HETIAO (SLIM)

The following excerpt from the document contains multiple links embedded in the original text: "'Content Warning: This insight contains antisemitic, racist, and hateful imagery.' [...] Extremists exploit social media platforms to spread hate against minority groups based on protected attributes such as gender, religion, and ethnicity. Platforms and researchers have been actively developing AI tools to detect and remove such hate speech. However, extremists employ various forms of implicit hate speech (IHS) to evade AI detection systems. IHS spreads hateful messages using subtle expressions and complex contextual semantic relationships instead of explicit abusive words, bringing challenges to automatic detection algorithms. Common forms of IHS include dog whistles, coded language, humorous hate speech, and implicit dehumanisation. Moreover, the forms and expressions of IHS evolve rapidly with societal controversies (e.g., regional wars). Identifying and tracking such changes in IHS is crucial for platforms trying to counter them. In this Insight, we report and analyse 'Substitution' as a new form of IHS. Recently, we observed extremists using 'Substitution' by propagating hateful rhetoric against a target group (e.g., Jews) while explicitly referencing another label group (e.g., Chinese). We show that Substitution not only effectively spreads hate but also exacerbates engagement and obscures detection."

GLOBAL NETWORK ON EXTREMISM AND TECHNOLOGY (GNET). 24 JUN, 2024. 8p.

2024 Department of Defense Arctic Strategy

UNITED STATES. DEPARTMENT OF DEFENSE

From the document: "The United States is an Arctic nation, and the region is critical to the defense of our homeland, the protection of U.S. national sovereignty, and our defense treaty commitments. I am issuing this 2024 Arctic Strategy to guide the U.S. Department of Defense (DoD) in a concerted approach to preserve the Arctic as a stable region in which the U.S. homeland remains secure and vital national interests are safeguarded. Major geopolitical changes are driving the need for this new strategic approach to the Arctic, including Russia's full-scale invasion of Ukraine, the accession of Finland and Sweden to the NATO Alliance, increasing collaboration between the People's Republic of China (PRC) and Russia, and the accelerating impacts of climate change. This increasingly accessible region is becoming a venue for strategic competition, and the United States must stand ready to meet the challenge alongside Allies and partners. This new DoD strategy directs the Department to enhance its Arctic capabilities, deepen engagement with Allies and partners, and exercise our forces to build readiness for operations at high latitudes. The document supports the 2022 National Security Strategy as well as the 2022 National Strategy for the Arctic Region, and its lines of effort implement the 2022 National Defense Strategy direction to adopt a 'monitor-and-respond' approach to preserving stability in the Arctic. This strategy represents prudent and measured efforts to protect U.S. interests in the face of new challenges and an evolving security environment."

Washington DC. UNITED STATES. DEPARTMENT OF DEFENSE. 21 JUN, 2024. 28p.

Fulcrum: The Department of Defense: Information Technology Advancement Strategy

UNITED STATES. DEPARTMENT OF DEFENSE. CHIEF INFORMATION OFFICER

From the document: "Fulcrum represents the Department's ambitious Information Technology (IT) advancement strategy designed to leverage the power of technology to drive transformative change and serves as a tipping point for catalyzing digital modernization for the warfighter. To propel the Department forward, we must ensure continued success and relevance in the digital age. Fulcrum will enable achievement of the DoD mission and strategic objectives with unparalleled efficiency and effectiveness. [...] The DoD Chief Information Officer's (DoD CIO) mission is to 'connect', 'protect', and 'perform'. Fulcrum outlines a vision guided by four lines of effort (LOEs) representing a strategic shift that embraces technology as a mission enabler. [...] Fulcrum features the DoD CIO's IT goals and objectives for Fiscal Years (FYs) 2025-2029 that provide essential support to the priorities in the National Defense Strategy (NDS), and the supporting DoD Strategic Management Plan (SMP)."

UNITED STATES. DEPARTMENT OF DEFENSE. 6 JUN, 2024