Preventing Terrorism and Countering Violent Extremism And

Total Page:16

File Type:pdf, Size:1020Kb

Preventing Terrorism and Countering Violent Extremism And Preventing Terrorism and Countering Violent Extremism and Radicalization that Lead to Terrorism: A Community-Policing Approach Preventing Terrorism and Countering Violent Extremism and Radicalization that Lead to Terrorism: A Community-Policing Approach Published by the Organization for Security and Co-operation in Europe Vienna, February 2014 © OSCE 2014 Designed in Warsaw by Homework Printed in Vienna by Stanzell Druck All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means — electronic, mechanical, photocopying, recording, or otherwise without the prior written permission of the publishers. This restriction does not apply to making digital or hard copies of this publication for internal use within the OSCE, and for personal or educational use when for non-profit and non-commercial purposes, providing that copies be accompanied by an acknowledgment of the OSCE as the source. ISBN 978–92–9235–023–9 Transnational Threats Department Office for Democratic Institutions OSCE Secretariat and Human Rights Wallnerstrasse 6, A-1010 Vienna, Austria Ul. Miodowa 10, 00–251 Warsaw, Poland http://www.osce.org/atu http://www.osce.org/odihr The publication of this guidebook was made possible thanks to generous contributions from the Australian Government, through its Department of Foreign Affairs and Trade, the Swiss Confederation, through its Federal Department of Foreign Affairs, the United States of Amer- ica, through its Department of State, and the Principality of Liechtenstein, through its Ministry of Foreign Affairs. The content of this publication, including the views, opinions, findings, inter- pretations and conclusions expressed herein do not necessarily reflect those of these donors. It is not a consensus-based document. This guidebook is published in line with the mandate of the OSCE Office for Democratic Insti- tutions and Human Rights. The OSCE Secretariat does not accept any liability for the accu- racy or completeness of any information, for instructions or advice provided, or for misprints. The OSCE Secretariat may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the exter- nal sources, including external websites referenced in this publication. Contents List of Figures and Case Studies ................................................................................................... 6 Acknowledgements ............................................................................................................................ 9 List of Acronyms and Abbreviations ..........................................................................................12 Glossary ...................................................................................................................................................13 Foreword ..................................................................................................................................................17 Executive Summary ........................................................................................................................... 19 1. IntroductIon.....................................................................................24 2. PreventIng terrorIsm, Key concePts .........................................27 2.1. Preventing Terrorism as a Strategic Focus of Counterterrorism Efforts ....27 2.1.1. What Is Terrorism? ........................................................................................................27 2.1.2. Strategic Approach to Countering Terrorism ....................................................30 2.1.3. Accountability, Legitimacy and Trust in Counterterrorism .....................32 2.2. Understanding VERLT ................................................................................................34 2.2.1. What Is Terrorist Radicalization? ..........................................................................35 2.2.2. Conditions Conducive to Terrorism ........................................................................36 2.3. Countering VERLT .......................................................................................................40 2.3.1. Criminal-Justice Aspects in Countering VERLT ............................................42 2.3.2. Addressing the Conditions Conducive to Terrorism .......................................44 2.3.3. Engaging with Individuals Drawn to VERLT ..................................................46 2.4. Human Rights and Fundamental Freedoms Particularly at Stake in Preventing Terrorism and Countering VERLT ....................................................48 2.4.1. Human Rights and Fundamental Freedoms in the Fight against Terrorism .............................................................................................................................48 2.4.2. Freedom of Expression ..................................................................................................50 2.4.3. Freedom of the Media ....................................................................................................52 2.4.4. Freedom of Thought, Conscience and Religion or Belief .............................53 2.4.5. Respect for Private and Family Life .......................................................................54 4 Preventing Terrorism and Countering Violent Extremism and Radicalization that Lead to Terrorism: A Community-Policing Approach 2.4.6. The Right to Peaceful Assembly and Freedom of Association ..................55 2.4.7. Equality and Non-discrimination ..........................................................................56 3. CommunIty-Based Approaches to counterterrorIsm, Key concePts .............................................................................................61 3.1. The Community Safety and Security Paradigm ...............................................61 3.1.1. An Explanation of Community ................................................................................61 3.1.2. An Explanation of Community Cohesion and Community Resilience ....65 3.1.3. An Explanation of Community Security ............................................................66 3.2. Communities and Counterterrorism ..................................................................... 67 3.2.1 Community-targeted or Community-oriented Approaches to Counterterrorism .............................................................................................................68 3.2.2. The Police and Communities as Part of a Multi-stakeholder Approach to Counterterrorism .......................................................................................................70 4. A CommunIty-PolIcIng Approach to PreventIng terrorIsm and counterIng VERLT ....................................................................75 4.1. Basic Principles and Characteristics of Community Policing ......................75 4.2. Community Policing and Preventing Terrorism: Strategy and Policy .......79 4.2.1. Community Policing as Part of a Comprehensive Solution .......................79 4.2.2. The Interplay between Community Policing and Intelligence-led Policing .................................................................................................................................82 4.2.3. How Community Policing Can Benefit Terrorism Prevention .................85 4.2.4. The Benefits of Engaging with the Police from a Community Perspective ..........................................................................................................................88 4.2.5. Minimizing Risks in Applying a Community-policing Approach to Preventing Terrorism ........................................................................................ 89 5. ImPlementIng communIty-PolIcIng Approaches to PreventIng terrorIsm and counterIng VERLT ...................94 5.1. Transparency and Accountability of Police Operations .................................94 5.1.1. Community Policing and Counterterrorism Operations .............................95 5.1.2. Measures to Ensure the Human Rights Compliance and Accountability of Police Actions for Counterterrorism ................................................................99 Contents 5 5.2. Tasking and Training for Community Police Officers ...................................104 5.2.1. Policies and Standard Operating Procedures ................................................. 104 5.2.2. Community Police Team Learning and Development .................................105 5.2.3. A Five-element Model for Community Police Intervention ..................... 108 5.3. Communicating and Exchanging Information with the Public ..................112 5.3.1. Communicating with the Public on Counterterrorism ...............................112 5.3.2. Exchanging Information with Communities ...................................................118 5.4. Engaging with Communities to Prevent Terrorism and Counter VERLT ......................................................................................................126 5.4.1. Parameters of Police Engagement with Communities ............................... 126 5.4.2. Engaging with Specific Groups on Preventing Terrorism .........................133 5.4.3. Engaging with Youth ...................................................................................................135 5.4.4. Engaging with Women
Recommended publications
  • A Sheffield Hallam University Thesis
    How do I look? Viewing, embodiment, performance, showgirls, and art practice. CARR, Alison J. Available from the Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/19426/ A Sheffield Hallam University thesis This thesis is protected by copyright which belongs to the author. The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author. When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given. Please visit http://shura.shu.ac.uk/19426/ and http://shura.shu.ac.uk/information.html for further details about copyright and re-use permissions. How Do I Look? Viewing, Embodiment, Performance, Showgirls, & Art Practice Alison Jane Carr A thesis submitted in partial fulfilment of the requirements of Sheffield Hallam University for the degree of Doctor of Philosophy ProQuest Number: 10694307 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a com plete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. uest ProQuest 10694307 Published by ProQuest LLC(2017). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code Microform Edition © ProQuest LLC. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106- 1346 Declaration I, Alison J Carr, declare that the enclosed submission for the degree of Doctor of Philosophy, and consisting of a written thesis and a DVD booklet, meets the regulations stated in the handbook for the mode of submission selected and approved by the Research Degrees Sub-Committee of Sheffield Hallam University.
    [Show full text]
  • Charting a New Course: Women Preventing Violent Extremism
    Charting a New Course I 2301 Constitution Avenue, NW Washington, DC 20037 www.usip.org © 2015 by the Endowment of the United States Institute of Peace. All rights reserved. First published 2015 To request permission to photocopy or reprint materials for course use, contact the Copyright Clearance Center at www.copyright.com. For print, electronic media, and all other subsidiary rights e-mail [email protected] Printed in the United States of America The paper used in this publication meets the minimum requirements of American National Standards for Information Science—Permanence of Paper for Printed Library Materials, ANSI Z39.48-1984. The views expressed in this publication are those of the authors alone. They do not necessarily reflect the views of the United States Institute of Peace. II Charting a WOMEN PREVENTING VIOLENT EXTREMISM New Course 2 Acknowledgments 3 Introduction 7 Why Gender Matters 9 Women on the Front Lines by Alistair Millar 11 Exercise: Act Like a Woman/ Act Like a Man 12 Blindspots by Jayne Huckerby 13 Exercise: Spheres of Influence 15 Women and the Dynamics of Extremist Violence 17 Listen to the Women Activists by Sanam Naraghi-Anderlini 19 Exercise: Gendered Motivations 20 When Women are the Problem by Mia Bloom 21 Exercise: Multiple Interpretations: Who is Right? 22 Motivations of Female Fighters by Nimmi Gowrinathan 25 Engaging Communities in Preventing Violent Extremism 27 Building Resilience to Violent Extremism by Georgia Holmer 29 Exercise: Allies and Challengers 30 Charting New Ways with New Partners by Edit Schlaffer 31 Resource: Active Listening Techniques 32 Everyday Technologies Can Help Counter Violence and Build Peace by Nancy Payne 33 Resource: Enabling Technologies for Preventing Violent Extremism 34 Increasing Understanding through Words by Alison Milofsky 35 Resource: Debate versus Dialogue 36 Acronyms 36 Resources 1 ACKNOWLEDGMENTS he creation of the thought for action kit, “Charting a New Course: Women TPreventing Violent Extremism,” has been a team effort.
    [Show full text]
  • Extremists on the Left and Right Use Angry, Negative Language
    PSPXXX10.1177/0146167218809705Personality and Social Psychology BulletinFrimer et al. 809705research-article2018 Empirical Research Paper Personality and Social Psychology Bulletin Extremists on the Left and Right 1 –16 © 2018 by the Society for Personality and Social Psychology, Inc Use Angry, Negative Language Article reuse guidelines: sagepub.com/journals-permissions DOI:https://doi.org/10.1177/0146167218809705 10.1177/0146167218809705 journals.sagepub.com/home/pspb Jeremy A. Frimer1 , Mark J. Brandt2 , Zachary Melton3, and Matt Motyl3 Abstract We propose that political extremists use more negative language than moderates. Previous research found that conservatives report feeling happier than liberals and yet liberals “display greater happiness” in their language than do conservatives. However, some of the previous studies relied on questionable measures of political orientation and affective language, and no studies have examined whether political orientation and affective language are nonlinearly related. Revisiting the same contexts (Twitter, U.S. Congress), and adding three new ones (political organizations, news media, crowdsourced Americans), we found that the language of liberal and conservative extremists was more negative and angry in its emotional tone than that of moderates. Contrary to previous research, we found that liberal extremists’ language was more negative than that of conservative extremists. Additional analyses supported the explanation that extremists feel threatened by the activities of political rivals, and their angry, negative language represents efforts to communicate as much to others. Keywords language, anger, extremism, liberals and conservatives, threat, happiness Received February 27, 2018; revision accepted October 1, 2018 For too many of our citizens, a different reality exists: extremists—on both the political left and right—use more Mothers and children trapped in poverty in our inner cities; negative language than moderates.
    [Show full text]
  • Blitzkrieg: the Evolution of Modern Warfare and the Wehrmacht's
    East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 8-2021 Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era Briggs Evans East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the History Commons Recommended Citation Evans, Briggs, "Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era" (2021). Electronic Theses and Dissertations. Paper 3927. https://dc.etsu.edu/etd/3927 This Thesis - unrestricted is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era ________________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History ______________________ by Briggs Evans August 2021 _____________________ Dr. Stephen Fritz, Chair Dr. Henry Antkiewicz Dr. Steve Nash Keywords: Blitzkrieg, doctrine, operational warfare, American military, Wehrmacht, Luftwaffe, World War II, Cold War, Soviet Union, Operation Desert Storm, AirLand Battle, Combined Arms Theory, mobile warfare, maneuver warfare. ABSTRACT Blitzkrieg: The Evolution of Modern Warfare and the Wehrmacht’s Impact on American Military Doctrine during the Cold War Era by Briggs Evans The evolution of United States military doctrine was heavily influenced by the Wehrmacht and their early Blitzkrieg campaigns during World War II.
    [Show full text]
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • Strategic Cooperation Between Japan and UNODC -The Joint Plan of Action
    Strategic Cooperation between Japan and UNODC -The joint plan of action- The Government of Japan (hereafter referred to as Japan) and the United Nations Office on Drugs and Crime (hereafter referred to as UNODC) have a long history of collaboration in countering illicit narcotic drugs, in crime prevention and criminal justice reform, as well as in countering terrorism. Japan has also been a leading provider of core support to the operations of UNODC. Japan and UNODC share mutual interest in further enhancing cooperation. During the first Strategic Policy Dialogue between Japan and UNODC, held in Yokohama on 2 June 2013 in the margins of the 5th Tokyo International Conference on African Development (TICAD V), they identified regional, thematic and other areas for strategic cooperation, and developed a joint plan of action. They also agreed to hold Strategic Policy Dialogue at the senior level annually in Tokyo or Vienna (alternately). Japan and UNODC reviewed the progress of the implementation of the plan of action during the Strategic Policy Dialogue recently held, and amended it as follows. 1. Regional Cooperation (1) Africa Japan welcomes the participation of UNODC in the TICAD V in June 2013 and the TICAD VI in August 2016 in the TICAD process. Through the follow-up of TICAD VI, Japan and UNODC will enhance substantive and operational collaboration in Africa, in particular, in areas related to peace and security such as strengthening of criminal justice systems, countering transnational organized crime (illicit trafficking of narcotic drugs, firearms, and persons), corruption and cybercrime as well as combating terrorism, violent extremism and piracy.
    [Show full text]
  • Hard Offensive Counterterrorism
    Wright State University CORE Scholar Browse all Theses and Dissertations Theses and Dissertations 2019 The Use of Force: Hard Offensive Counterterrorism Daniel Thomas Wright State University Follow this and additional works at: https://corescholar.libraries.wright.edu/etd_all Part of the International Relations Commons Repository Citation Thomas, Daniel, "The Use of Force: Hard Offensive Counterterrorism" (2019). Browse all Theses and Dissertations. 2101. https://corescholar.libraries.wright.edu/etd_all/2101 This Thesis is brought to you for free and open access by the Theses and Dissertations at CORE Scholar. It has been accepted for inclusion in Browse all Theses and Dissertations by an authorized administrator of CORE Scholar. For more information, please contact [email protected]. THE USE OF FORCE: HARD OFFENSIVE COUNTERTERRORISM A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts By DANIEL THOMAS B.A., The Ohio State University, 2015 2019 Wright State University WRIGHT STATE UNIVERSITY GRADUATE SCHOOL Defense Date: 8/1/19 I HEREBY RECOMMEND THAT THE THESIS PREPARED UNDER MY SUPERVISION BY Daniel Thomas ENTITLED The Use of Force: Hard Offensive Counterterrorism BE ACCEPTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Master of Arts. _______________________ Vaughn Shannon, Ph.D. Thesis Director ________________________ Laura M. Luehrmann, Ph.D. Director, Master of Arts Program in International and Comparative Politics Committee on Final Examination: ___________________________________ Vaughn Shannon, Ph.D. School of Public and International Affairs ___________________________________ Liam Anderson, Ph.D. School of Public and International Affairs ___________________________________ Pramod Kantha, Ph.D. School of Public and International Affairs ______________________________ Barry Milligan, Ph.D.
    [Show full text]
  • Australia Muslim Advocacy Network
    1. The Australian Muslim Advocacy Network (AMAN) welcomes the opportunity to input to the UN Special Rapporteur on the Freedom of Religion or Belief as he prepares this report on the Impact of Islamophobia/anti-Muslim hatred and discrimination on the right to freedom of thought, conscience religion or belief. 2. We also welcome the opportunity to participate in your Asia-Pacific Consultation and hear from the experiences of a variety of other Muslims organisations. 3. AMAN is a national body that works through law, policy, research and media, to secure the physical and psychological welfare of Australian Muslims. 4. Our objective to create conditions for the safe exercise of our faith and preservation of faith- based identity, both of which are under persistent pressure from vilification, discrimination and disinformation. 5. We are engaged in policy development across hate crime & vilification laws, online safety, disinformation and democracy. Through using a combination of media, law, research, and direct engagement with decision making parties such as government and digital platforms, we are in a constant process of generating and testing constructive proposals. We also test existing civil and criminal laws to push back against the mainstreaming of hate, and examine whether those laws are fit for purpose. Most recently, we are finalising significant research into how anti-Muslim dehumanising discourse operates on Facebook and Twitter, and the assessment framework that could be used to competently and consistently assess hate actors. A. Definitions What is your working definition of anti-Muslim hatred and/or Islamophobia? What are the advantages and potential pitfalls of such definitions? 6.
    [Show full text]
  • Military Guide to Terrorism in the Twenty-First Century
    US Army TRADOC TRADOC G2 Handbook No. 1 AA MilitaryMilitary GuideGuide toto TerrorismTerrorism in the Twenty-First Century US Army Training and Doctrine Command TRADOC G2 TRADOC Intelligence Support Activity - Threats Fort Leavenworth, Kansas 15 August 2007 DISTRIBUTION RESTRICTION: Approved for Public Release; Distribution Unlimited. 1 Summary of Change U.S. Army TRADOC G2 Handbook No. 1 (Version 5.0) A Military Guide to Terrorism in the Twenty-First Century Specifically, this handbook dated 15 August 2007 • Provides an information update since the DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, publication dated 10 August 2006 (Version 4.0). • References the U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • References the National Counterterrorism Center (NCTC), Reports on Terrorist Incidents - 2006, dated 30 April 2007. • Deletes Appendix A, Terrorist Threat to Combatant Commands. By country assessments are available in U.S. Department of State, Office of the Coordinator for Counterterrorism, Country Reports on Terrorism 2006 dated April 2007. • Deletes Appendix C, Terrorist Operations and Tactics. These topics are covered in chapter 4 of the 2007 handbook. Emerging patterns and trends are addressed in chapter 5 of the 2007 handbook. • Deletes Appendix F, Weapons of Mass Destruction. See TRADOC G2 Handbook No.1.04. • Refers to updated 2007 Supplemental TRADOC G2 Handbook No.1.01, Terror Operations: Case Studies in Terror, dated 25 July 2007. • Refers to Supplemental DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism, dated 10 August 2006. • Refers to Supplemental DCSINT Handbook No.
    [Show full text]
  • Report on Official Visit of the OSCE PA
    AD HOC COMMITTEE ON COUNTERING TERRORISM OFFICIAL VISIT TO NORWAY 14-15 January 2020 NOTE-TO-THE-FILE Introduction On the 14th-15th of January 2020, the OSCE PA Ad Hoc Committee on Countering Terrorism (CCT) conducted an official visit to Norway. The 20-member delegation, which consisted of CCT members as well as representatives from the OSCE Transnational Threats Department and the Parliamentary Assembly of the Mediterranean, was led by OSCE PA President George Tsereteli. The visit, initiated by CCT Chair Mr. Abid Q. Raja and organized by the Norwegian Parliament (Stortinget), was also attended by OSCE PA Secretary General Roberto Montella. 1 After being welcomed by the President of the Norwegian Parliament, the delegation paid tribute to the victims of the 22nd July 2011 terror attacks in both Utøya Island and Oslo. During the two- day programme, the delegation also had the opportunity to meet with the Minister of Justice and the Minister of Climate and Environment, the Governing Mayor of Oslo, several members of the Labour Party and the Worker’s Youth League, as well as with representatives of the Norwegian Police Security Service, Norwegian Correctional System, the 22nd July Commission, the 22nd July Parliamentary Committee, the 22nd July Support Group and academia. Notably, many interlocutors had first-hand experience of the 22nd July 2011 tragic events. Ultimately, the visit provided an excellent opportunity to get familiar with the national counter terrorism system and learn more about Norway’s multifaceted response to the 22nd July attacks, which included legislative reform, emergency response preparedness, the prevention of terrorism and radicalization, and the role of public health services.
    [Show full text]
  • Facebook and Violent Extremism Awareness Brief
    Facebook and Violent Extremism Understanding Facebook legitimate reasons, violent extremists, gangs, and terrorist groups also have a significant With more than 1 billion users, Facebook is presence and following on Facebook.1 The one of the most popular social networking following identifies the ways domestic and sites. After users create a personal profile or international extremists of all persuasions use organization page and add photos, contact Facebook to promote violence: information, and additional information, they can search for people with similar interests, Recruitment create networks of “friends,” communicate by sending private messages or posting Facebook provides violent extremists with a comments on another user’s wall, “like” pages vast recruiting ground. In the United States of organizations and join “groups” with other alone, 67 percent of all Internet users have a users who share similar interests, and post and Facebook profile, and the percentages are even share content created on Facebook or linked to higher for youth and young adults. Moreover, another website. Facebook is one of the top three websites visited by people under the age of 18.2 How Extremists Use Facebook Extremists take advantage of the fact that parents and law enforcement often are not Although individuals and organizations aware of the dangers that could be present worldwide use Facebook for a variety of when a young person spends large amounts AWARENESS BRIEF 2 AWARENESS BRIEF of time on Facebook. Extremist individuals bring propaganda to a wider audience and and organizations use this viewing potential to serve as a gateway to other extremist websites create lines of communication, enabling them where more radical content is available.
    [Show full text]
  • Transnational Crimes Among Somali-Americans: Convergences of Radicalization and Trafficking
    The author(s) shown below used Federal funding provided by the U.S. Department of Justice to prepare the following resource: Document Title: Transnational Crimes among Somali- Americans: Convergences of Radicalization and Trafficking Author(s): Stevan Weine, Edna Erez, Chloe Polutnik Document Number: 252135 Date Received: May 2019 Award Number: 2013-ZA-BX-0008 This resource has not been published by the U.S. Department of Justice. This resource is being made publically available through the Office of Justice Programs’ National Criminal Justice Reference Service. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Transnational Crimes among Somali-Americans: Convergences of Radicalization and Trafficking Stevan Weine, Edna Erez, and Chloe Polutnik 1 This resource was prepared by the author(s) using Federal funds provided by the U.S. Department of Justice. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This project was supported by Award No. 2013-ZA-BX-0008, awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. The opinions, findings, and conclusions or recommendations expressed in this publication are those of the authors and do not necessarily reflect those of the Department of Justice. 2 This resource was prepared by the author(s) using Federal funds provided by the U.S. Department of Justice. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S.
    [Show full text]