Terrorism and Political Trust

Total Page:16

File Type:pdf, Size:1020Kb

Terrorism and Political Trust UNIVERSITY OF BERGEN Institute of Administration and organization theory Master thesis Terrorism and Political Trust A study of the relationship between terrorism and political trust in Europe in the time period 2002 to 2016, and a causal exploration of the relationship between the two phenomena Christer A. Flatøy Spring, 2019 Abstract This thesis explores the relationship between terrorism and political trust. This is done in two ways, by two sub-studies, in order to get a more comprehensive understanding of the relationship between the two phenomena. The first sub-study uses longitudinal multilevel regression to explore the historical empirical relationship between terrorism and political trust, in Europe for the time period 2002-2016, focusing specifically on the parliaments, the legal systems, the police, and the politicians. The second sub-study consists of a survey experiment specifically designed to explore the causal relationship between terrorism and political trust. Concretely, building on trust theories and rooted within an institutional framework, the paper suggests a theoretical framework that has a potential for explaining the causal relationship between terrorism and political trust. A central mechanism in this theoretical framework is individuals’ perception of institutions’ capacity to deal with terrorism. It is this mechanism, capacity perception, that is explored in the survey experiment. The results from the regressions shows that within-country variation over time has affected the political trust in Europe. The effect has, however, been somewhat limited. The effect has also varied between institutions, where the police have received increased trust, while the parliaments and politicians have had their trust reduced, and the legal systems seem unaffected. The results from the survey experiment shows that capacity perception is a causal mechanism in the relationship between terrorism and political trust, but that its’ influence and role varies depending on the institution at hand. Contents List of abbreviations………....……………….…………………………....……I List of figures……………….………………..………………………………....II List of tables…...…………....………………..………………………………..III Acknowledgements………………………….………………………………...IV 1 INTRODUCTION…………….………………………………………………….…...1 1.1 The paper…………………………………………………....…..………........1 1.2 Trouble in paradise?……………………………………………..………......4 1.3 The paper’s approach……………...….………………………..………......12 2 THEORY…………………………………………………………………………...15 2.1 Introduction…………………...………………………………..……...……15 2.2 Terrorism…………..........……………………………………..……...…….17 2.2.1 What is it?…………………………………………………..…17 2.2.2 Who, what and why?………………………………………..…18 2.3 Political trust……………....………………..…………………..…………...20 2.3.1 What is it?…………………………………………………..…20 2.3.2 The origins of trust, and how it is affected……….......…….....22 2.4 The relationship between terrorism and political trust…….......….……...25 2.5 Existing research…….…………………………...……………....………….30 2.5.1 Political trust and control variables……......……....………...30 2.5.2 Remarks on previous studies………...……...………………...31 2.5.3 Political trust and terrorism……….......…......….……………33 2.6 The hypotheses………….………............………...………………………….36 2.7 Summary……….………...…………...……………………………………...41 3 DATA……………………………………………………………………………….42 3.1 Introduction………………………...………………………………………..42 3.2 Data sources………………………...……………………………………..…42 3.2.1 The MLR………..………...………………………………...…42 3.2.2 The survey experiment…...……..……………………………..43 3.3 Data scope and representativity…..……………………………………..…43 3.3.1 The MLR……………......…...……………………………...…43 3.3.2 The survey experiment…...…..…………………………..……46 3.4 Variables………………………..……………………………………………47 3.4.1 The MLR………………………………………………………47 3.4.2 The survey experiment……………………………………...…51 3.5 Data treatment………….......…..………………………………………...…53 3.5.1 The MLR…………………………………………………....…53 3.5.2 The survey experiment……………………………………..….55 3.6 Reliability…………………....…....………………………………...……….56 3.6.1 The MLR………………………………………………………56 3.6.2 The survey experiment…………………………………...……58 3.7 Validity………………………….……………………………………...……58 3.7.1 The MLR……...…………….…………………………………59 3.7.2 The survey experiment…….…………………………..………60 3.8 Equivalence……....…………….……………………………………………62 3.9 Summary……………………….……………………………………………63 4 METHODS…………………………………………………………………………64 4.1 Introduction…………………….………………………………………...…64 4.2 How to explore the hypotheses….……………………………………….…64 4.3 Regression………………….…………………………………………..……67 4.4 The models………………….…...……………………………………..……71 4.5 Assumptions of regression…....……………………………………….……73 4.6 Survey experiment………......………....………………...……………….…77 4.7 ANOVA……….……………………...…………………………………...…78 4.8 Summary…….………...……………………………………………….……80 5 RESULTS…………..………………………………………………………………81 5.1 Introduction…………………………………………………………………81 5.2 Variation in political trust…………………………………………….……81 5.3 Empty models………………………………………………………….……84 5.4 The MLR……………………………………………………………….……86 5.5 The survey experiment....……………...…………………………………...92 5.6 ANOVA………………...……………………………………………………93 5.6.1 Treatment………….………..…………………………………93 5.6.2 The Parliament…….………...…………………………...……96 5.6.3 The Government…….……...…………………………….……98 5.6.4 The police…………...………………………………….…….100 5.7 Summary…………...………………………………………………………102 6 ANALYSES……………….………………………………………………………103 6.1 Introduction…..……………………………………………………………103 6.2 Hypothesis 1………..………………………………………………………103 6.3 Hypothesis 2………..………………………………………………………104 6.4 Hypothesis 3………..………………………………………………………106 6.5 Hypothesis 4………..………………………………………………………108 6.6 Hypothesis 5………..………………………………………………………109 6.7 Theoretical framework.………………………………………………...…110 6.8 Summary…………………….………………………………………..……113 7 CONCLUSION……...……………………………………………………………114 References……….………….………………………………………………………..121 Appendix..……………………………………………………………………………130 List of abbreviations ANOVA Analysis of Variance AOR Area of Residence BIC Bayesian Information Criterion DGP Data Generation Procedure ESS European Social Survey GDP/C Gross Domestic Product per Capita GTD Global Terrorism Database GTI Global Terrorism Index HDI Human Development Index ICC Intraclass Correlation IEP Institute for Economics and Peace IRA Irish Republican Army ISIS Islamic State of Iraq and Syria ISO International Organization for Standardization MC Methodological Collectivism MENA Middle East and North-Africa MI Methodological Individualism MLR Multilevel regression MS Mean sum of Squares NCP Norwegian Citizen Panel NORCE Norwegian Research Centre QOG Quality of Government QQ plot Quantile-Quantile plot SCT Social Contract Theory SD Standard Deviation SS Sum of Squares UK United Kingdom UN United Nations U.S. United States VIF Variance Inflation Factor I List of figures 1.1 Illustration of the paper’s overall research design………………..…….….3 1.2 Overall political trust in Europe, 2002-2016…………………………....…6 1.3 Quantitative analysis of Norwegian media’s usage of the terms ‘populism’, ‘polarization’ and ‘politician contempt……8 1.4 Distribution of all terror incidents worldwide, 1996-2017, by region .....…9 1.5 Combined score on the Global Terrorism Index, 2002-2016.….…...……10 2.1 The paper’s theoretical framework summarized and illustrated….......…..26 4.1 The data’ structure in the MLR ………………………....………………..69 5.1 Variation in political trust, 2002-2016, by country…...….….……………83 5.2 Graphic display of the survey experiment results, for each of the dependent variables……………..93 II List of tables 3.1 Units included in the MLR………………………….……………………44 3.2 Variables in the MLR…………………………………………………….47 3.3 Statistical evaluations of indexes………………………….……………..58 4.1 Regression models and their purposes………………………………..72-73 4.2 The survey experiment’s design…………………………………….……78 5.1 The result from the empty two-level and three-level models……...……..85 5.2 The MLR result……………………………………………………….87-88 5.3 Descriptive statistics of the groups’ average capacity perception…….…93 5.4 The result from the ANOVA of the participants’ capacity perception......94 5.5 The result from the Benferroni-analysis of the participants’ capacity perception….95 5.6 Descriptive statistics of the groups’ average response to trust Parliament………96 5.7 The result from the ANOVA of how much participants trust Parliament………97 5.8 The result from the Benferroni-analysis of participants’ trust in Parliament………97 5.9 Descriptive statistics of the groups’ average response to trust Government…….98 5.10 The result from the ANOVA of how much participants trust Government………99 5.11 The result from the Benferroni-analysis of participants’ trust in Government……...99 5.12 Descriptive statistics of the groups’ average response to trust police…...100 5.13 The result from the ANOVA of how much participants trust police……100 5.14 The result from the Benferroni-analysis of participants’ trust in police...101 III Acknowledgements This thesis is a result of several months of labour, influenced by several persons. First and foremost, a thank is owed to my mentor Jacob Aars, who have contributed with important and detailed pieces of advice during the year that this process has lasted. Second, a thank is owed to Dag Arne Christensen, who has functioned as a co-mentor. His input regarding technical and methodological matters have been priceless. Third, Sveinung Arnesen has guided the experiment design process, providing valuable insights. Thank you. In connection with the survey experiment, a great thank is owed to the employees at DIGSSCORE. First of all, for including me in a highly competent environment, marked by interesting discussions and skilled research. I have also been so
Recommended publications
  • Survey of Terrorist Groups and Their Means of Financing
    SURVEY OF TERRORIST GROUPS AND THEIR MEANS OF FINANCING HEARING BEFORE THE SUBCOMMITTEE ON TERRORISM AND ILLICIT FINANCE OF THE COMMITTEE ON FINANCIAL SERVICES U.S. HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION SEPTEMBER 7, 2018 Printed for the use of the Committee on Financial Services Serial No. 115–116 ( U.S. GOVERNMENT PUBLISHING OFFICE 31–576 PDF WASHINGTON : 2018 VerDate Mar 15 2010 14:03 Dec 06, 2018 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 G:\GPO PRINTING\DOCS\115TH HEARINGS - 2ND SESSION 2018\2018-09-07 TIF TERRO mcarroll on FSR431 with DISTILLER HOUSE COMMITTEE ON FINANCIAL SERVICES JEB HENSARLING, Texas, Chairman PATRICK T. MCHENRY, North Carolina, MAXINE WATERS, California, Ranking Vice Chairman Member PETER T. KING, New York CAROLYN B. MALONEY, New York EDWARD R. ROYCE, California NYDIA M. VELA´ ZQUEZ, New York FRANK D. LUCAS, Oklahoma BRAD SHERMAN, California STEVAN PEARCE, New Mexico GREGORY W. MEEKS, New York BILL POSEY, Florida MICHAEL E. CAPUANO, Massachusetts BLAINE LUETKEMEYER, Missouri WM. LACY CLAY, Missouri BILL HUIZENGA, Michigan STEPHEN F. LYNCH, Massachusetts SEAN P. DUFFY, Wisconsin DAVID SCOTT, Georgia STEVE STIVERS, Ohio AL GREEN, Texas RANDY HULTGREN, Illinois EMANUEL CLEAVER, Missouri DENNIS A. ROSS, Florida GWEN MOORE, Wisconsin ROBERT PITTENGER, North Carolina KEITH ELLISON, Minnesota ANN WAGNER, Missouri ED PERLMUTTER, Colorado ANDY BARR, Kentucky JAMES A. HIMES, Connecticut KEITH J. ROTHFUS, Pennsylvania BILL FOSTER, Illinois LUKE MESSER, Indiana DANIEL T. KILDEE, Michigan SCOTT TIPTON, Colorado JOHN K. DELANEY, Maryland ROGER WILLIAMS, Texas KYRSTEN SINEMA, Arizona BRUCE POLIQUIN, Maine JOYCE BEATTY, Ohio MIA LOVE, Utah DENNY HECK, Washington FRENCH HILL, Arkansas JUAN VARGAS, California TOM EMMER, Minnesota JOSH GOTTHEIMER, New Jersey LEE M.
    [Show full text]
  • Journal of Threat Assessment and Management Postdicting Violence with Sovereign Citizen Actors: an Exploratory Test of the TRAP-18 Darin J
    Journal of Threat Assessment and Management Postdicting Violence With Sovereign Citizen Actors: An Exploratory Test of the TRAP-18 Darin J. Challacombe and Paul A. Lucas Online First Publication, October 1, 2018. http://dx.doi.org/10.1037/tam0000105 CITATION Challacombe, D. J., & Lucas, P. A. (2018, October 1). Postdicting Violence With Sovereign Citizen Actors: An Exploratory Test of the TRAP-18. Journal of Threat Assessment and Management. Advance online publication. http://dx.doi.org/10.1037/tam0000105 Journal of Threat Assessment and Management © 2018 American Psychological Association 2018, Vol. 1, No. 999, 000 2169-4842/18/$12.00 http://dx.doi.org/10.1037/tam0000105 Postdicting Violence With Sovereign Citizen Actors: An Exploratory Test of the TRAP-18 Darin J. Challacombe Paul A. Lucas Fort Hays State University Appalachian State University The sovereign citizen movement is one of the largest antigovernment nationalism or domestic terrorist collectives in the United States. In the last decade, over a dozen public officials were injured or killed by individuals adhering to sovereign citizen ideology. The Terrorist Radicalization Assessment Protocol (TRAP-18; Meloy & Gill, 2016; Meloy, Habermeyer, & Guldimann, 2015) is a collection of 18 behavior-based warning signs for terror incidents which has been used to assess primarily international terrorism samples. In this study, the researchers applied the TRAP-18 to both violent and nonviolent incidents involving sovereign citizen members. Using chi-square tests for independence and a logistic regression analysis, the researchers found support for the TRAP-18. The sum of the TRAP-18 scores was able to postdict violent outcomes within the events included within the study.
    [Show full text]
  • DIY Sovereignty and the Popular Right in Australia
    DIY Sovereignty and the Popular Right in Australia Judy Lattas Macquarie University [email protected] Abstract The concern of this paper is with the form that ‘right wing’ anti-government protest has taken in Australia in recent years. One tactic that is proving popular amongst those who have suffered setbacks in their hold on property, or in their small business ventures, is to declare their secession from Australia, and to establish an alternative jurisdiction and alternative citizenship. The author describes some of these projects, and links the serious political pursuit of this secessionist move to a movement in the USA called Sovereign Citizenship, which is itself linked to recent acts of anti-government sabotage called ‘paper terrorism’. I want to take up the conference theme of ‘Mobile Boundaries/Rigid Worlds’ in relation to the recent popularity in Australia of creating new countries - on a small scale, of course - in ‘do it yourself’ (DIY) projects involving a declaration of sovereignty and autonomy. Sometimes it is an experiment in citizenship or just for fun, but it is often done in protest. What I have in mind are those people, for example, who have declared their legal secession from Australia and formed their own principalities, like His Royal Highness Prince Leonard of the Hutt River Province Principality in Western Australia. While the story of Prince Leonard is legendary, others who are more contemporary are not well known. Commentators call these people micronationalists, which is a term that was coined in the 1990s to describe the activity that was pioneered by Prince Leonard of Hutt.
    [Show full text]
  • Surveying the Landscape of the American Far Right
    SURVEYING THE LANDSCAPE OF THE AMERICAN FAR RIGHT MARK PITCAVAGE AUGUST 2019 PITCAVAGE | PROGRAM ON EXTREMISM About the Program on as an expert witness in a number of trials. Since Extremism 2000, Dr. Pitcavage has worked for the Anti- Defamation League, one of the nation’s oldest civil The Program on Extremism at George rights organizations, where he currently serves as a Washington University p r o v i d e s Senior Research Fellow in ADL’s Center on analysis on issues related to violent and Extremism. In the past, Dr. Pitcavage has also non-violent extremism. The Program been Director of the Center on Extremism. Prior to spearheads innovative and thoughtful joining ADL, Dr. Pitcavage was Research Director academic inquiry, producing empirical for the Justice Department’s State and Local Anti- work that strengthens extremism Terrorism Training Program. Dr. Pitcavage research as a distinct field of study. The received his MA and Ph.D. from The Ohio State Program aims to develop pragmatic University in Columbus, Ohio, where he still lives policy solutions that resonate with and works. policymakers, civic leaders, and the general public. The views expressed in this paper are About the Author solely those of the author, and not necessarily those of the Program on Dr. Mark Pitcavage is a historian with 25 Extremism or the George Washington University. years’ expertise on domestic terrorism and right-wing extremism in the United States, having authored many articles, reports and studies on related subjects; trained over 17,000 government officials and law enforcement officers; and served SURVEYING THE LANDSCAPE OF THE AMERICAN FAR RIGHT 1 PITCAVAGE | PROGRAM ON EXTREMISM Introduction What is the extreme right in the United States? To many, terms such as “extreme right” and “far right” are simply synonymous with white supremacy.
    [Show full text]
  • Terrorism Threat Assessment 2019
    2019Terrorism Threat Assessment NEW JERSEY OFFICE OF HOMELAND SECURITY AND PREPAREDNESS UNCLASSIFIED ABOUT US The New Jersey Office of Homeland Security and Preparedness (NJOHSP) is tasked with coordinating counterterrorism, resiliency, and cybersecurity efforts across all levels of government, law enforcement, nonprofit organizations, and the private sector. Created by Executive Order in 2006 when the Office of Counterterrorism (OCT) merged with staff from the Domestic Security Preparedness Task Force (DSPTF), NJOHSP bolsters New Jersey’s resources for counterterrorism, critical infrastructure protection, preparedness, training, and federal grants management. Shortly after the tragic events of September 11, 2001, New Jersey’s legislature and Governor passed and signed the Domestic Security Preparedness Act, which created the DSPTF within the Office of the Attorney General. In 2002, the Governor created the OCT by Executive Order, which remained under the Attorney General. OCT provided New Jersey with a single agency to lead and coordinate New Jersey’s counterterrorism efforts with state, local, and federal authorities and with the private sector. Mission NJOHSP leads and coordinates New Jersey’s counterterrorism, cybersecurity, and preparedness efforts while building resiliency throughout the State. Core Values SERVICE. We put our State and its citizens first, and we put Mission before self. We take pride in being timely, accurate, and relevant. TEAMWORK. We stand with and behind each other. We recognize that partnerships, both internal and external, are critical to achieving success. We cannot fulfill our Mission alone. EXCELLENCE. We take great pride in the quality of our work. We do every task, every project, every initiative, to the best of our ability.
    [Show full text]
  • State Terrorism in the Philippines Unmasking the Securitized Terror Behind ‘War on Drugs’
    MSc. Crisis & Security Management Thesis - Spring 2017 Leiden University, The Hague Campus State Terrorism in the Philippines Unmasking the securitized terror behind ‘War on Drugs’ Master Thesis, Spring 2017 George Plevris (s1722026) Supervisor: Dr. M. Kitzen Second Reader: Liesbeth van der Heide University of Leiden- The Hague Campus Master MSc. Crisis & Security Management May 2017 Leiden University 1 MSc. Crisis & Security Management Thesis - Spring 2017 By the end of this paper, I believe you will come to the same observation that I arrived: Terror (-ism) is the finest tool of political and social governance a state can deploy. If executed well, it does not only achieve the goal of submission of the audience, but it eliminates the latter’s tool of resistance: hope. Leiden University 2 MSc. Crisis & Security Management Thesis - Spring 2017 Abstract Typically, modern states have the monopoly on legitimate violence drawn from their sovereignty and democratic rule of law, on the behest of their citizens. This ‘legitimate’ violence however has seen a rise in the last two decades, and taken forms of intricate civil wars, wars on crime, wars on drugs and wars on terror. Yet, despite outcries for violations of laws and human rights, of crimes against humanity and war crimes, policies of extreme violence performed by the democratic states are hardly ever labeled as state terrorism. This paper will explore the scholarship of state terrorism, often a contested topic among academic and experts, and will approach the issue through the current ‘war on drugs’ raging in the Philippines. The theoretical premise that I will carve out aims to explore and acknowledge the existence of state terror but also the difficulty in naming it.
    [Show full text]
  • “Hive” Terrorism: Terrorist Acts Or Nected Network of Individuals and Groups Who Violent Hate Crimes Committed by a Spontane- Reject U.S
    AUTHOR Christian Michelides Police in Vienna separate “Fight Against the Right” and PEGIDA (“Patriotic Europeans Against the Islamisation of the Occident”) activists during a February 2015 demonstration. 84 | FEATURES PRISM 6, NO. 1 Right-Wing Extremism and Terrorism in Europe Current Developments and Issues for the Future BY DANIEL KOEHLER urope has experienced a revival of militant right-wing extremist groups, networks, and incidents in recent years, with a surge of anti-immigration and Islamophobic violence, as Ewell as anti-government attacks and assaults on political opponents, ethnic minorities, and homosexuals. Although not as significant as in Europe, the United States has also seen an upsurge in political violence considered to be “right-wing extremist” in nature (for example, white supremacist, neo-Nazi, racist, or anti-government sovereign citizen). For the international audi- ence, only a few of these incidents gained broad media attention; right-wing extremist attacks are seen mostly as isolated events when compared with other attacks, such as those by Islamist extremist terrorists. In Germany, a right-wing terrorist group calling itself the National Socialist Underground was discovered in 2011. Despite having assassinated at least 10 people and com- mitted 2 bombings over the course of almost 14 years, it had gone undetected. That same year, Anders Behring Breivik killed 77 people in a bomb attack in Oslo and a mass shooting in Utøya, Norway. In the United States, white supremacist Michael Page shot and killed six people and wounded four others in an attack against a Wisconsin Sikh temple in August 2012. Only one day after Charles Kurzman had argued in the New York Times that right-wing terrorism might be the most severe security threat in the United States, Dylann Roof killed nine people in his shooting rampage at the Emanuel African Methodist Episcopal Church in Charleston, South Carolina, on June 17, 2015.1 Similar events have been recorded in many Western European countries, as well as in Russia and Eastern Europe.
    [Show full text]
  • Terrorism and the Media: a Handbook for Journalists; 2017
    A framework for coverage that is responsible, proportionate Jean-Paul Marthoz and free of stigmatisation and sensationalism... “Publicity is the oxygen of terrorism.” Margaret Thatcher United Nations Educational, Scientific and “News is the lifeblood of liberty.” Katherine Graham Cultural Organization Targeted towards journalists and media professionals, this handbook is designed to provide key information and encourage reflection on the way that terrorism is covered in the media. Based upon advice from leading institutions and experts, and filled with examples, it explores the professional challenges and ethical dilemmas inherent in terrorism reporting, and poses fundamental questions about what the impact of current treatment may be on social cohesion and the prevalence of fear in society. Topics covered: Journalistic “framing” of terrorism Handling figures, images and words The balance between freedom, security Coverage of attacks and hostage situations and responsibility Management of social media the Media and Terrorism Ethical issues Relations with victims, authorities and terrorists The challenges of fear, hate and generalisation Security of journalists Special sections: Terrorism Cultural Heritage Destruction and Illicit Trafficking of Cultural Property About the author and the Jean-Paul Marthoz is a journalist and essayist. Columnist at the newspaper Le Soir Media (Belgium) and professor of international journalism at the Catholic University of Louvain, he is the author of several books on journalism and international relations. He was previously the Director of the Media Programme for Democracy at the International Federation of Journalists (IFJ), European Information Director at Human Rights Watch and correspondent for the European Union of the Committee to Protect Journalists (CPJ, New York).
    [Show full text]
  • Researching the Evolution of Countering Violent Extremism
    RESEARCHING THE EVOLUTION OF COUNTERING VIOLENT EXTREMISM FARANGIZ ATAMURADOVA AND SARA ZEIGER | EDITORS RESEARCHING THE EVOLUTION OF COUNTERING VIOLENT EXTREMISM FARANGIZ ATAMURADOVA AND SARA ZEIGER EDITORS The views expressed in these chapters are the opinions of the authors, and do not necessarily reflect the opinions of Hedayah or any of the organizers or sponsors of the International CVE Research Conference 2019. CONTENTS © Hedayah, 2021 All rights reserved. Cover design and publication layout by Iman Badwan. Cover image © Hedayah stock photos. ABOUT HEDAYAH Introduction 9 Hedayah was created in response to the growing desire from members of the Global Counter-Terrorism Farangiz Atamuradova and Sara Zeiger Forum (GCTF) and the wider international community for the establishment of an independent, mul- tilateral center devoted to dialogue and communications, capacity building programs, research and analysis to counter violent extremism in all of its forms and manifestations. During the ministerial-level launch of the GCTF in New York in September 2011, the U.A.E. offered to serve as the host of the Inter- Improving National PVE Strategies: Lessons Learned from 21 national Center of Excellence for Countering Violent Extremism. In December 2012 Hedayah was inau- 1 The Swiss Case gurated with its headquarters in Abu Dhabi, U.A.E. Hedayah aims to be the premier international center Fabien Merz for expertise and experience to counter violent extremism by promoting understanding and sharing of good practice to effectively serve as the true global center to counter violent extremism. ABOUT THE EDITORS Lessons Learned from Assessing the National Action Plan 41 2 for the Prevention of Violent Radicalization and Extremism of Farangiz Atamuradova is a Research Associate at the Department of Research and Analysis, Hedayah.
    [Show full text]
  • Terrorism Against Democracy
    Terrorism Against Democracy By M. Merrick Yamamoto CISSM Working Paper January 2015 Center for International and Security Studies at Maryland 4113 Van Munching Hall, School of Public Policy University of Maryland College Park, MD 20742 (301) 405-7601 Terrorism Against Democracy Based in Part on Stansfield Turner’s University of Maryland Course, “Terrorism & Democracy” By M. Merrick Yamamoto © 2015 by M. Merrick Yamamoto Preface & Acknowledgements This monograph approaches the problem of terrorism from the perspective of the process of a terrorist attack; that is, how terrorism is intended to “operate.” Comprehension of the intended process of the terrorist attack can help defeat terrorists, reduce terrorism, and avoid the damage that can result from poor responses to attacks. Part I of the monograph analyzes terrorism. Chapter 1 analyzes what terrorism is, and what kinds of acts are and are not terrorism. Chapter 2 analyzes the ways that terrorism is intended to operate on third-parties—the governments, organizations, individuals, and groups from which terrorists seek to elicit responses. Chapter 3 analyzes the causes of terrorism, and the threats that terrorism poses. Part II addresses what to do about terrorism—how to prevent terrorism, respond effectively to attacks, and defeat terrorists. Analysis of the steps of the terrorist attack shows that terrorism can be prevented and countered at each step. The monograph then addresses a general counterterrorism strategy. The monograph uses the Turner-Yamamoto Terrorism Model as a guide to comprehending terrorism and how to combat it. The model illustrates the steps of the terrorist attack, and shows how terrorism is intended to operate.
    [Show full text]
  • Terrorism in the United States 1996
    TERRoRISM in the United States 1996 Counterterrorism Threat Assessment and Warning Unit National Security Division I N T R O DUCTION United States soil was the site of three terrorist incidents during 1996. The pipe bomb explosion during the Summer Olympic Games in Centennial Olympic Park that killed two and the robberies and bombings carried out in April and July 1996 by members of a group known as the Phineas Priesthood underscored the ever-present threat that exists from individuals determined to use violence to advance particular causes. The FBI successfully prevented five planned acts of domestic terrorism in 1996. These preventions thwarted attacks on law enforcement officials, prevented planned bombings of federal buildings, and halted plots to destroy domestic infrastructure. The explosion of TWA Flight 800 over the Atlantic Ocean near Long Island, New York, on July 17, 1996, resulted in initial speculation that a terrorist attack may have been the cause and served to highlight the potential danger terrorists pose to U.S. civil aviation. The FBI, along with the National Transportation Safety Board, devoted significant resources to the criminal investigation throughout 1996. Evidence did not implicate a criminal or terrorist act by year’s-end. Threats from domestic terrorism continue to build as militia extremists, particularly those operating in the western United States, gain new adherents, stockpile weapons, and prepare for armed conflict with the federal government. The potential for domestic right-wing terrorism remains a threat. Special interest groups also endure as a threat that could surface at any time. International terrorists threaten the United States directly.
    [Show full text]
  • Domestic Terrorism: an Overview
    Domestic Terrorism: An Overview Jerome P. Bjelopera Specialist in Organized Crime and Terrorism August 21, 2017 Congressional Research Service 7-5700 www.crs.gov R44921 Domestic Terrorism: An Overview Summary The emphasis of counterterrorism policy in the United States since Al Qaeda’s attacks of September 11, 2001 (9/11) has been on jihadist terrorism. However, in the last decade, domestic terrorists—people who commit crimes within the homeland and draw inspiration from U.S.-based extremist ideologies and movements—have killed American citizens and damaged property across the country. Not all of these criminals have been prosecuted under federal terrorism statutes, which does not imply that domestic terrorists are taken any less seriously than other terrorists. The Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) do not officially designate domestic terrorist organizations, but they have openly delineated domestic terrorist “threats.” These include individuals who commit crimes in the name of ideologies supporting animal rights, environmental rights, anarchism, white supremacy, anti-government ideals, black separatism, and beliefs about abortion. The boundary between constitutionally protected legitimate protest and domestic terrorist activity has received public attention. This boundary is highlighted by a number of criminal cases involving supporters of animal rights—one area in which specific legislation related to domestic terrorism has been crafted. The Animal Enterprise Terrorism Act (P.L. 109-374) expands the federal government’s legal authority to combat animal rights extremists who engage in criminal activity. Signed into law in November 2006, it amended the Animal Enterprise Protection Act of 1992 (P.L. 102-346).
    [Show full text]