Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts in Terrorism
The evolving nexus of cybercrime and terrorism: A systematic review of convergence and policy implications

By Shai Farber

  This systematic review unveils significant convergence between cybercriminals and terrorists over the past decade, characterized by substantial overlap in tactics, capabilities, and infrastructure exploitation. Key findings illuminate the adoption of cybercriminal methods by terrorist organizations, the engagement of cybercriminal groups in terrorist activities, the proliferation of enabling technologies such as cryptocurrencies and the dark web, and the role of social media in facilitating knowledge exchange between diverse threat actors. While direct terrorist involvement in proftdriven cybercrime appears limited, the escalating convergence underscores urgent imperatives for enhanced cooperation, legal refinement, the establishment of flexible counter-threat authorities, and collaboration with the private sector. Continuous monitoring of this rapidly evolving landscape is crucial to inform effective policies and interventions in an increasingly interconnected digital world.

Security Journal (2025), 23p.

Countering Extremism in West Africa: What Options Are Left?

By Nina Wilén and Kwesi Aning

Over the past decade, Western and multilateral security interventions in the Sahel have failed to stabilize the region, while national and local efforts, particularly in Mali and Burkina Faso, have remained largely militarized. These approaches have proven ineffective in addressing the underlying causes of instability, such as food insecurity, lack of basic services, and limited economic opportunities. The key lesson learned is that military action alone cannot resolve the Sahel’s security crisis—political engagement from local, national, and regional actors is crucial.

Konrad-Adenauer-Stiftung e. V. 2 COUNTER EXTREMISM PROJECT, 2025// 28p.

Hezbollah's Networks in Latin America: Potential Implications for U.S. Policy and Research

By Marzia Giambertoni

lthough U.S. policymakers face a variety of complex challenges in addressing transnational terrorism, one underappreciated aspect is Hezbollah's evolving presence in Latin America. Academic literature and government reports almost universally indicate that Hezbollah's activities in the region pose potential threats to U.S. national security. However, there is a significant knowledge gap in existing assessments. In this paper, the author offers an initial exploration of Hezbollah's operational footprint in Latin America, focusing on illicit funding mechanisms, violent operations, and key operational hubs — particularly in the Tri-Border Area and Venezuela. The analysis situates these activities within the broader context of Iran's regional diplomatic, economic, and cultural activities, which partially facilitate conditions amenable to Hezbollah's operations.

The author draws from a variety of open-source materials and reviews publicly available information to provide a foundation for understanding how Hezbollah's networks in Latin America are characterized and discussed publicly. By analyzing the group's operational strategies and historical precedents, the author's framing identifies actionable considerations for U.S. Department of Homeland Security (DHS) and U.S. Department of Defense (DoD) leadership while raising awareness of the organization's presence among a broader community of stakeholders. These findings are significant for both DHS and DoD, given the former's counterterrorism mandate in Latin America and the latter's strategic interests in the region. Hezbollah's evolving presence warrants careful consideration from defense planners to effectively address potential challenges to U.S. interests and regional stability.

Santa Monica, CA: RAND, 2025, 20p.

Assessing the Environmental Risk Factors for Terrorism: Operationalising S5 (ASSESS-5)

By Noémie Bouhana | Caitlin Clemmow | With contributions from Philip Doherty

Post 9/11, research on radicalisation and involvement in terrorism and violent extremism (henceforth, ITVE) has focussed on the role of individual-level attributes, such as the psychological characteristics, socio-economic background, demographic features, experiences, beliefs, past behaviours and criminality, and the social embeddedness of radicalised individuals and people involved in acts of terrorism (Borum, 2011; Stern, 2016; McCauley & Moskalenko, 2017; Sageman, 2008; Wiktorowicz, 2005). Likewise, existing processes, methods and tools to identify and evaluate the risk of ITVE operate largely at the individual level. The Vulnerability Assessment Framework (VAF) used in the context of Channel is the best example of this. Comparatively less attention has been devoted to identifying and evaluating the characteristics of the socio-physical contexts which may contribute to the emergence of the risk of ITVE, or, conversely, to its suppression. Yet research on crime, arguably a closely related problem space, makes a strong case that many of the causes and enabling conditions of criminal development (of which ITVE is an instantiation) are found in the environment: crime and criminals concentrate in space and time. Modifying the environment in which crime occurs and the specific settings in which criminals develop and act has been shown at length to be an effective approach to crime prevention and disruption (Weisburd et al., 2012). In crime prevention, as in other areas of behavioural change, one size does not fit all: to design effective programs, the ability to tailor interventions to the socio-physical context is paramount, which means that the effect of key contextual features on the outcome of interest must be understood (Sampson et al., 2013); notably, the effect of exposing (susceptible) individuals with particular kinds of characteristics to (criminogenic) places with particular kinds of features. Situational Action Theory [SAT] is a theory of crime causation, which, as its name suggests, puts context at the centre of the explanation of crime (P.- O. H. Wikström et al., 2009). In 2010, ahead of the revision of the Prevent Strategy, the UK Home Office commissioned a Rapid Evidence Assessment of the cause of al-Qaeda-influenced radicalisation seen through the lens of SAT (Bouhana & Wikström, 2011), which identified the key levels of analysis in a causal model of radicalisation as relating to individual vulnerability to radicalising influence, exposure to radicalising settings, and the mechanisms of emergence of said settings. In the decade since, this theoretical model has been refined and now underpins a research programme concerned chiefly with going beyond "who" and "why" to the "where" of terrorism involvement. It has inspired, notably, the EU FP7-funded international PRIME project on lone actor terrorism, which, among other findings, has shown that individual-level risk indicators are multifinal (i.e., their meaning determined by the context in which they arise), and has provided support for a formulation of individual vulnerability which encompasses susceptibility to exposure to radicalising settings, as well as cognitive susceptibility to moral change with significant implications for prevention efforts (Corner et al., 2018). It has also produced evidence for distinct configurations of individual/ context interaction patterns leading to the emergence of lone actor risk, with further implications for risk assessment (Clemmow et al., 2019). To better support policy strategy and counter-terrorism practice, the theoretical SAT model of radicalisation was reformulated and expanded into a risk analysis framework for lone actor terrorism [PRIME RAF] (Bouhana et al., 2016, 2018) and a systemic inference framework to inform counter-extremism strategies [S5], commissioned by the UK Counter-Extremism Commission (Bouhana, 2019). Both of these integrate SAT with the broader behavioural and socio-cognitive knowledge-base to refine our understanding of personenvironment interaction. While the RAF is concerned specifically with the effect of situational interaction on the motivation and capability of lone actors to act (behaviour), S5 is more broadly focused on explaining the acquisition of extremist propensities (beliefs). Both frameworks are analytically related and can be logically integrated. However, these remain general frameworks. Inherent in their interactionist logic is the fact that, while environmental processes of risk can be set out in generic terms, specific risk (or protective) factors and – crucially – their observable indicators must be elicited with regards to a particular context. This is because indicators are subject to change over space and time (P. O. H. Wikström & Bouhana, 2017) and because risk assessment is most effective when calibrated to context (Hamilton et al., 2021). A recently completed, Home Office-funded project guided by S5 (State of the Union [SOTU]; Bouhana and Schumann, 2021), which aimed to assess the observability of key analytical concepts of mainstream models of terrorism involvement, demonstrated the difficulty, yet also the necessity of translating said concepts into observable indicators, inasmuch as any model is intended to guide risk assessment or intervention design and evaluation. It also suggested that environmental indicators may be more reliably observed than susceptibility-related indicators using commonly available sources of information, and it tentatively provided further support for the notion that susceptibility and exposure interact in specific ways, leading to the emergence of risk. This project investigated the feasibility of developing a framework to assess the risk of involvement in terrorism and violent extremism at the level of place, with a view towards – further down the line – designing an assessment tool along the lines of the Vulnerability Assessment Framework, intended to assess environments instead of individuals. As a first step towards establishing this feasibility, this project investigated whether the mechanisms articulated in the S5 framework could be operationalised; in other words, to what extent they could be associated with a set of observable indicators relevant to the UK ITVE context. Given the relative scarcity of empirical research into the characteristics of extremist social ecologies and settings in the UK (and largely elsewhere) – which would be prerequisite to the conduct of a systematic review – the researchers elected to carry out an e-Delphi exercise with U.K. Prevent practitioners, the results of which are presented at length in this report.

London: CREST - Centre for Research and Evidence in Security Threats (CREST), 2025. 50p.

The Grievance Hunters: Extremists Exploit: Crises to Bolster Their Image

By Noor Huda Ismail

Violent extremist groups exploit societal grievances, including climate-related disasters, to gain legitimacy and recruit members by positioning themselves as the true protectors of vulnerable communities. Strategic communication, including AI driven tools, is essential to counter extremist narratives and build resilience against manipulation. There is an urgent need for proactive, transmedia storytelling approaches to address both climate change and violent extremism, ultimately strengthening trust and promoting community unity.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 4p.

Hizb ut -Tahrir Bangladesh: A Growing Threat and the Need for Action

By Iftekharul Bashar

Hizb ut-Tahrir Bangladesh, an extremist organisation banned since 2009, is swiftly expanding by recruiting Bangladeshi youth through social media and educational institutions. The group’s recent rally in Dhaka, attended by over 2,000 supporters, underscores its resurgence and the growing challenge for the government. Bangladesh must recalibrate its response to this threat by strengthening law enforcement measures, enhancing counter-radicalisation programmes, and creating job and entrepreneurship opportunities for its youth.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 4p.

Managing exits from violent extremist groups: lessons from the Lake Chad Basin

By Remadji Hoinathy, Malik Samuel and Akinola Olojo

  Some Lake Chad Basin countries (Cameroon, Chad, Niger and Nigeria) have been dealing with violent extremism for over a decade. Disarmament, demobilisation, repatriation, reintegration and resettlement processes in these countries may offer useful lessons for other West African contexts, including Mali and Burkina Faso, or more recently affected countries such as Benin, Côte d’Ivoire and Togo. Such lessons include incentivising defections, coordinating at national and regional levels, gender sensitivity, appropriate legal frameworks and community engagement.

Key findings Understanding the circumstances that lead people to join and leave violent extremist groups, and their experiences in those groups, is key to crafting incentives for disengagement. The willingness to leave violent extremist groups is often clouded by uncertainty, as well as long waiting periods between disengagement and enrolment in programmes for disarmament, demobilisation, repatriation, reintegration and resettlement (DDRRR). Waves of defection from Boko Haram caught Lake Chad Basin (LCB) states unprepared. DDRRR processes were thus implemented under pressure, hindering early coordination at a regional level. Women are treated mainly as victims, despite some voluntarily joining and playing active roles in Boko Haram, including volunteering as suicide bombers. DDRRR implementation in the LCB has revealed gaps in legal frameworks that require revisions. DDRRR lacks public support in some LCB countries, as many people view it as blanket amnesty for Boko Haram members. 

Recommendations Non-military means of countering violent extremism should incorporate incentives and opportunities for associates to leave these armed groups. By depleting these groups’ human resources, their fighting capacity is reduced. To encourage defection, clear processes for screening, prosecution and integration are needed. National ownership of these processes, inclusivity, adaptation to local context and adequate resourcing are key, from inception to implementation. National ownership should not lead to isolated approaches, but rather create bridges between countries to enable a cohesive regional approach. Organisations such as the Economic Community of West African States, the Liptako-Gourma States Integrated Development Authority, the G5 Sahel and the Accra Initiative could offer relevant regional frameworks for this. Authorities in charge of DDRRR programmes should consider the diverse needs and backgrounds of ex-associates. Distinguishing individuals according to why they joined and their roles within the groups is important for providing appropriate treatment. The specific needs of women and children should be taken into account. Affected West African countries should proactively formulate relevant legal and institutional frameworks. International and regional provisions and standards should be taken into account, including the need for transparent and predictable screening, prosecution and rehabilitation processes. Due to their position connecting the LCB and West Africa, Niger and Nigeria could play a key role in sharing lessons learned from DDRRR implementation. Community organisations, platforms, and media should be used by the DDRRR authorities to raise public awareness of the reintegration process. This would help prevent perceptions of general amnesty for Boko Haram members and preconceived ideas about the disengaged from undermining the process. 

Pretoria: Institute for Security Studies, 2023. 12p.

Catch 22: Institutional Ethics and Researcher Welfare Within Online Extremism and Terrorism Research

ByJoe Whittaker, Elizabeth Pearson, Ashley A Mattheis, Till Baaken, Sara Zeiger, Farangiz Atamuradova, Maura Conway

Drawing from interviews with 39 online extremism and terrorism researchers, this article provides an empirical analysis of these researchers’ experiences with institutional ethics processes. Discussed are the harms that these researchers face in the course of their work, including trolling, doxing, and mental and emotional trauma arising from exposure to terrorist content, which highlight the need for an emphasis on researcher welfare. We find that researcher welfare is a neglected aspect of ethics review processes however, with most interviewees not required to gain ethics approval for their research resulting in very little attention to researcher welfare issues. Interviewees were frustrated with ethics processes, indicating that committees oftentimes lacked the requisite knowledge to make informed ethical decisions. Highlighted by interviewees too was a concern that greater emphasis on researcher welfare could result in blockages to their ‘risky’ research, creating a ‘Catch 22’: interviewees would like more emphasis on their (and colleagues’) welfare and provision of concomitant supports, but feel that increased oversight would make gaining ethics approval for their research more difficult, or even impossible. We offer suggestions for breaking the impasse, including more interactions between ethics committees and researchers; development of tailored guidelines; and more case studies reflecting on ethics processes.

New Media & Society Online First, February 28, 2025

Reclaiming Asabiya to Counter Extremism and Foster Unity

By Noor Huda Ismail

The concept of asabiyya – group solidarity – originally articulated by Ibn Khaldun, has been hijacked by extremist groups in Southeast Asia to create division and promote radical ideologies. Reclaiming asabiya is crucial, redefining it as a tool for social cohesion and unity by drawing on cultural values that foster mutual respect and collective responsibility. Regional cooperation and digital counter-narratives are essential in countering extremism and fostering long-term peace in the region.

S. Rajaratnam School of International Studies, NTU Singapore, 2025. 4p.

Hostage to Violent Extremism: Kidnapping in Northern Benin

By Flore Berger, Lyes Tagziria and Aziz Mossi

As the infiltration of communities in northern Benin by violent extremist organisations (VEOs) has intensified since 2021, the number of kidnapping incidents has surged. This research identifies four main types of kidnapping by VEOs – forced recruitment, intelligence gathering, punishment and intimidation – all of which are closely linked to conflict dynamics and group expansion. Kidnapping is used as a strategic tool for infiltration into new territories. Key findings l An effective protection programme for defectors, key targets for abductions, should be developed. This would preserve an important source of intelligence while also incentivising further defections. l Explore amnesty programmes for individuals who have joined the ranks of the VEOs. Dialogue should be made an important feature in counterterrorism strategy. l Reinforce local infrastructure to bolster community resilience towards kidnapping and other forms of violence. This should include telephone network coverage and road infrastructure, among others. l Kidnapping incidents should be incorporated into ECOWAS and national early warning mechanisms. The pervasiveness of kidnapping can be used as a barometer of VEO entrenchment in a given area. l Rebuilding international cooperation structures with neighbouring countries is crucial. The Benin government should immediately seek a resolution to current diplomatic stand-offs.

Pretoria: South Africa: OCWAR-T: Organised Crime: West African Response to Trafficking , 2024. 34p.

Unpacking the Role of Prophecy in Extremist Narratives

By Noor Huda Ismail

The fall of Damascus to Syrian rebels has sparked a ripple effect in Southeast Asia, with figures like Indonesia’s Mas'ud Izzul Mujahid using apocalyptic prophecies to fuel extremism. However, the region's diverse Islamic practices, shaped by unique historical and socio-political contexts, show that a universal eschatological (end of the world) narrative does not resonate everywhere. Religious scholars can counter extremist ideologies and reclaim prophetic teachings for peace in Southeast Asia’s pluralistic society by offering inclusive interpretations of prophecy and addressing local grievances.

Singapore: S. Rajaratnam School of International Studies (RSIS), 2024. 4p.

Exposure to and Sharing of Fringe or Radical Content Online

By Timothy Cubitt and Anthony Morgan

Using a large, national survey of online Australians, we measured unintentional and intentional exposure to fringe or radical content and groups online.

Two in five respondents (40.6%) reported being exposed to material they described as fringe, unorthodox or radical. One-quarter of these respondents (23.2%) accessed the content intentionally. One-third (29.9%) said the content they had seen depicted violence.

Fringe or radical content was often accessed through messages, discussions and posts online. Mainstream social media and messaging platforms were the platforms most frequently used to share fringe or radical content. Being a member of a group promoting fringe or radical content was associated with increased sharing of that content with other internet users.

Efforts to restrict access to radical content and groups online, especially on mainstream platforms, may help reduce intentional and unintentional exposure to and sharing of that content.

Canberra: Australian Institute of Criminology. 2024. 17p.

Domestic Terrorism: How the US Legal System is Falling Short

By Camden Carmichael, Brooke Buxton, Seamus Hughes, and Clara Braun

Despite a rapid increase in domestic terrorism investigations in the United States, the threat that domestic terrorism poses to the homeland remains unclear. This is due to a lack of a comprehensive domestic terrorism legal framework that fully encompasses the variety of ideological groups present in the US. Using a sample of twenty-six QAnon and eighteen incel cases that have been federally prosecuted, our team examined how the US prosecutorial system utilises non-terrorism-related charges in addressing domestic violent extremism (DVE) cases. We propose a more inclusive DVE legal framework that expands the categorisation of VE ideologies, identifies specific DVE charges, and requires the engagement of the prosecutorial and probationary offices. By recognising Misogyny Motivated Violent Extremists (MMVEs) and Conspiracy Theory Motivated Violent Extremists (CTMVEs) as their own threat categories, it would allow researchers and practitioners to gain a deeper understanding of how pervasive the threat posed by these ideologies is.

The Hague: The International Centre for Counter-Terrorism (ICCT) , 2024. 21p.

Selling Violent Extremism

By Danny Klinenberg

Why do people join domestic violent extremist organizations? This paper from Danny Klinenberg, an IGCC nonresident fellow, examines an understudied reason: organizational outreach. Klinenberg studies how the inflow of new members to the Oath Keepers, America’s largest paramilitary organization, is affected when the group’s leadership employs three tactics: showcasing their ideological zeal through armed standoffs with the government, membership discounts, and sports sponsorships. Using a variant of the synthetic control method, he finds that standoffs increase new memberships by 150 percent, discounts increase new memberships by over 60 percent, and sports sponsorships decrease new memberships. Membership is less responsive in counties with higher income inequality, but is more responsive in politically conservative counties. The findings provide new insights into ways extremist groups attract potential recruits.

La Jolla, CA: UC Institute on Global Conflict and Cooperation, WORKING PAPER NO. 10, 2024. 42p.

Nuclear Terrorism: Assessment of U.S. Strategies To Prevent, Counter, and Respond to Weapons of Mass Destruction

By The National Academies of Sciences, Engineering, and Medicine

For nearly eight decades, the world has been navigating the dangers of the nuclear age. Despite Cold War tensions and the rise of global terrorism, nuclear weapons have not been used in conflict since Hiroshima and Nagasaki in 1945. Efforts such as strategic deterrence, arms control and non-proliferation agreements, and the U.S.-led global counterterrorism have helped to keep nuclear incidents at bay. However, the nation's success to date in countering nuclear terrorism does not come with a guarantee, success often carries the risk that other challenges will siphon away attention and resources and can lead to the perception that the threat no longer exists.

This report found that U.S. efforts to counter nuclear or radiological terrorism are not keeping pace with the evolving threat landscape. The U.S. government should maintain a strategic focus and effort on combatting terrorism across the national security community in coordination with international partners, State, Local, Tribal and Territorial authorities, the National Laboratories, universities and colleges, and civil society. Developing and sustaining adequate nuclear incident response and recovery capabilities at the local and state levels will likely require significant new investments in resources and empowerment of local response from Federal Emergency Management Agency (FEMA), working with the Centers for Disease Control and Prevention, Environmental Protection Agency, Department of Energy, and National Institutes of Health

Washington, DC: The National Academies Press. 2024. 158p.

After Action Report Washington Navy Yard September 16, 2013 Internal Review Of The Metropolitan Police Department Washington, D.C.

Metropolitan Police Department, Washington D.C.

On the morning of Monday, September 16, 2013, Aaron Alexis entered Building 197 at the Washington Navy Yard, where he served as an independent contractor, and carried out the most deadly workplace mass shooting in the Nation’s Capital in recent memory.

Over the course of 69 minutes, Alexis terrorized thousands of employees of Naval Sea Systems Command, firing indiscriminately from a shotgun he had legally purchased two days earlier and a handgun he had taken from a security guard after mortally wounding the guard. He would also get into multiple shooting engagements with responding law enforcement officers, seriously injuring a Metropolitan Police Department (MPD) officer. In his final confrontation with police, Alexis ambushed and fired upon another MPD officer. Fortunately, the officer was saved by his protective vest and was able to return fire, killing Alexis and ending his rampage. When it was over, Alexis had shot and killed twelve people and injured several others.

*****

In the aftermath of the incident, the members of MPD first and foremost want to remember and honor the twelve people who lost their lives. Twelve people went to work that Monday, but did not return home to their loved ones. It is truly a senseless tragedy beyond comprehension, and there are no words adequate enough to express our condolences. Our thoughts remain with the victims’ families and friends.

Metropolitan Police Department, Washington D.C. 2014.. 84p.

Lone Wolf Terrorism in America: Using Knowledge of Radicalization Pathways to Forge Prevention Strategies

Mark S. Hamm and Ramon Spaaij

This research offers the largest and most comprehensive database ever created on lone wolf terrorism, along with a theory-informed case study component based on direct contact with imprisoned lone wolf terrorists, and a comparative analysis distinguishing lone wolves from those who undergo radicalization in a group setting. Strictly in terms of lethality, the data indicate that lone wolf terrorism in America is not on the rise. Although lone wolf terrorism may not be increasing, it is undergoing two important changes in modus operandi. First, uniformed police and military personnel have become the primary target of lone wolf terrorists. Second, consistent with the relaxation of U.S. gun laws since the 1990s and the recent trend in mass shootings, the lone wolf’s preferred weaponry is now a staggering range of high-velocity firearms. While there is no standard profile of the lone wolf terrorist, most of them are unemployed, single white males with a criminal record. Compared to members of terrorist groups, lone wolves are older, less educated and more prone to mental illness.

The study validates a series of commonalities associated with pathways to radicalization for lone wolf terrorists. The radicalization model indicates that lone wolf terrorism begins with a combination of personal and political grievances which form the basis for an affinity with online sympathizers. This is followed by the identification of an enabler, followed by the broadcasting of terrorist intent. The final commonality is a triggering event, or the catalyst for terrorism. The ability of law enforcement and intelligence communities to detect and prevent lone wolf terrorism demands a clear understanding of these radicalization processes. Such insight may provide investigators with a sort of detection system, or “signatures”—as minimal as they may appear—that an individual with a terrorist intent will demonstrate in preparing for an attack. Crucial to this understanding is the broadcasting of intent. While lone wolves physically isolate from society, at the same time they seek recognition for their causes through spoken statements and threats, manifestos, e-mail messages, texting and videotaped proclamations. Focusing on this kind of immediate objective of radicalization among lone wolves, rather than on their underlying grievances, may sharpen our focus on the dangers posed by lone wolf terrorism.

U.S. Department of Justice.. February 2015. 28p.

Lessons From Fort Hood: Improving Our Ability To Connect The Dots

By Committee On Homeland Security House Of Representatives

The hearing focuses on improving information sharing across intelligence and law enforcement agencies following the Fort Hood attack.

• Major Nidal Hasan, the suspect, communicated with terrorist Anwar al-Awlaki, raising red flags that were missed by authorities.

• The FBI and the Department of Defense had pieces of information that, if combined, might have prevented the attack.

• The Webster Commission investigated the FBI’s handling of the case and found shortcomings in policy guidance and technology.

• Recommendations included enhancing data management, training, and policies for counterterrorism leads.

• The Commission emphasized the need for better information sharing and technology to prevent future attacks.

• The ISE works to improve information sharing while protecting privacy and civil liberties.

• The hearing highlighted the importance of addressing information-sharing gaps to enhance national security.

One Hundred Twelfth Congress Second Session, September 14, 2012. 54p.

Chemical Terrorism: Assessment of U.S. Strategies in the Era of Great Power Competition

By The Committee on Assessing and Improving Strategies for Preventing, Countering, and Responding to Weapons of Mass Destruction Terrorism: Chemical Threats; Board on Chemical Sciences and Technology; Division on Earth and Life Studies; National Academies of Sciences, Engineering, and Medicine

Domestic and foreign violent extremist organizations, or terrorist groups, have caused a greater amount of harm with chemical agents than with biological or radiological weapons. The United States capacity and capability to identify, prevent, counter, and respond adequately to chemical threats is established by the strategies, policies, and laws enacted across multiple levels of government. While the number of chemical terrorism incidents has risen and fallen over time, there is no empirical or analytical indication that the threat is disappearing. This report comes at a time when the nation's highest-level strategies have shifted from focusing primarily on violent extremist organizations to focusing more on Great Power Competition. This shift in relative perceived threat and consequent prioritization will impact efforts against chemical terrorism, and in turn, affect funding priorities. Revised risk assessments are needed to reprioritize risks guided by new strategies, so that strategy-aligned budgets can be created. The report recommends weapons of mass destruction budgets be aligned with evolving priorities and incentivize activities that transition promising research to operations.

National Academies of Sciences, Engineering, and Medicine. 2024, 209 pages

Migration, Culture Conflict, Crime and Terrorism

May Contain Mark-Ups

Edited by Joshua D. Freilich and Rob T. Guerette

The book“Migration, Culture Conflict, Crime and Terrorism,”edited by Joshua D. Freilichand Rob T. Guerette, is part of the Advances in Criminology series. It explores the complex interactions between migration, cultural conflicts, crime, and terrorism through a collection of scholarly works. Published by Ashgate in 2006, the book is divided into four parts, each addressing different aspects of these issues.

Part I: Migration, Religion, Culture, and Terrorism

1.Terrorism Rediscovered: Hans-Heiner Kühne examines the political motivations behind terrorism, emphasizing the need to distinguish between acts of war and criminal acts.

2.Culture or Conflict?: Roland Eckert discusses how conflicts generate collective identities and the role of migration in these conflicts.

3.The 21st-Century Kulturkampf: Shlomo Giora Shoham provides a historical and cultural analysis of the clash between fundamentalist Islam and Western culture,advocating for dialogue and mutual respect.

4.Post-9/11 Legislative Changes: Joshua D. Freilich, Matthew R. Opesso, and Graeme R. Newman compare the legislative and policy changes in the UnitedStates, Canada, and Australia following the 9/11 attacks, focusing on operations abroad, detainment of alleged terrorists, border security, and internal measures.

Ashgate Publishing, Ltd., 2006, 235 pages