Meeting the Challenge of White Nationalist Terrorism at Home and Abroad

Total Page:16

File Type:pdf, Size:1020Kb

Meeting the Challenge of White Nationalist Terrorism at Home and Abroad MEETING THE CHALLENGE OF WHITE NATIONALIST TERRORISM AT HOME AND ABROAD JOINT HEARING BEFORE THE SUBCOMMITTEE ON THE MIDDLE EAST, NORTH AFRICA, AND INTERNATIONAL TERRORISM OF THE COMMITTEE ON FOREIGN AFFAIRS, WITH THE SUBCOMMITTEE ON INTELLIGENCE AND CONTERTERRORISM OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED SIXTEENTH CONGRESS FIRST SESSION September 18, 2019 Serial No. 116–63 Printed for the use of the Committee on Foreign Affairs ( Available: http://www.foreignaffairs.house.gov/, http://docs.house.gov, or http://www.govinfo.gov U.S. GOVERNMENT PUBLISHING OFFICE 37–706PDF WASHINGTON : 2019 COMMITTEE ON FOREIGN AFFAIRS ELIOT L. ENGEL, New York, Chairman BRAD SHERMAN, California MICHAEL T. MCCAUL, Texas, Ranking GREGORY W. MEEKS, New York Member ALBIO SIRES, New Jersey CHRISTOPHER H. SMITH, New Jersey GERALD E. CONNOLLY, Virginia STEVE CHABOT, Ohio THEODORE E. DEUTCH, Florida JOE WILSON, South Carolina KAREN BASS, California SCOTT PERRY, Pennsylvania WILLIAM KEATING, Massachusetts TED S. YOHO, Florida DAVID CICILLINE, Rhode Island ADAM KINZINGER, Illinois AMI BERA, California LEE ZELDIN, New York JOAQUIN CASTRO, Texas JIM SENSENBRENNER, Wisconsin DINA TITUS, Nevada ANN WAGNER, Missouri ADRIANO ESPAILLAT, New York BRIAN MAST, Florida TED LIEU, California FRANCIS ROONEY, Florida SUSAN WILD, Pennsylvania BRIAN FITZPATRICK, Pennsylvania DEAN PHILLIPS, Minnesota JOHN CURTIS, Utah ILHAN OMAR, Minnesota KEN BUCK, Colorado COLIN ALLRED, Texas RON WRIGHT, Texas ANDY LEVIN, Michigan GUY RESCHENTHALER, Pennsylvania ABIGAIL SPANBERGER, Virginia TIM BURCHETT, Tennessee CHRISSY HOULAHAN, Pennsylvania GREG PENCE, Indiana TOM MALINOWSKI, New Jersey STEVE WATKINS, Kansas DAVID TRONE, Maryland MIKE GUEST, Mississippi JIM COSTA, California JUAN VARGAS, California VICENTE GONZALEZ, Texas JASON STEINBAUM, Staff Director BRENDAN SHIELDS, Republican Staff Director ---- SUBCOMMITTEE ON THE MIDDLE EAST, NORTH AFRICA, AND INTERNATIONAL TERRORISM THEODORE E. DEUTCH, Florida, Chairman GERALD E. CONNOLLY, Virginia JOE WILSON, South Carolina, Ranking DAVID CICILLINE, Rhode Island Member TED LIEU, California STEVE CHABOT, Ohio COLIN ALLRED, Texas ADAM KINZINGER, Illinois TOM MALINOWSKI, New Jersey LEE ZELDIN, New York DAVID TRONE, Maryland BRIAN MAST, Florida BRAD SHERMAN, California BRIAN FITZPATRICK, Pennsylvania WILLIAM KEATING, Massachusetts GUY RESCHENTHALER, Pennsylvania JUAN VARGAS, California STEVE WATKINS, Kansas CASEY KUSTIN, Staff Director (II) COMMITTEE ON HOMELAND SECURITY BENNIE G. THOMPSON, Mississippi, Chairman SHEILA JACKSON LEE, Texas MIKE ROGERS, Alabama, Ranking Member JAMES LANGEVIN, Rhode Island PETER KING, New York CEDRIC RICHMOND, Louisiana MICHAEL MCCAUL, Texas DONALD PAYNE, New Jersey JOHN KATKO, New York KATHLEEN RICE, New York MARK WALKER, North Carolina LOU CORREA, California CLAY HIGGINS, Louisiana XOCHITL TORRES SMALL, New Mexico DEBBIE LESKO, Arizona MAX ROSE, New York MARK GREEN, Tennessee LAUREN UNDERWOO, Illinois VAN TAYLOR, Texas ELISSA SLOTKIN, Michigan JOHN JOYCE, Pennsylvania EMANUEL CLEAVER, Missouri DAN CRENSHAW, Texas AL GREEN, Texas MICHAEL GUEST, Mississippi YVETTE CLARK, New York DAN BISHOP, North Carolina DINA TITUS, Nevada BONNIE WATSON COLEMAN, New Jersey NANETTE BARRAGAR, California VAL DEMINGS, Florida ---- SUBCOMMITTEE ON INTELLIGENCE AND COUNTERTERRORISM MAX ROSE, New York, Chairman SHEILA JACKSON LEE, Texas MARK WALKER, North Carolina, Ranking JAMES LANGEVIN, Rhode Island Member ELISSA SLOTKIN, Michigan PETER KING, New York BENNIE G. THOMPSON, Mississippi, Ex MARK GREEN, Tennessee Officio MIKE ROGERS, Alabama, Ex Officio (III) C O N T E N T S Page WITNESSES Miller-Idriss, Dr. Cynthia, Director, International Training and Education Program, School of Education, American University ........................................ 9 Picciolini, Mr. Christian, Founder, Free Radicals Project, Author, ‘‘Breaking Hate: Confronting the New Culture of Extremism’’ .......................................... 23 Nazarian, Dr. Sharon, Senior Vice President for International Affairs, Anti- Defamation League .............................................................................................. 38 APPENDIX Hearing Notice ......................................................................................................... 99 Hearing Minutes ...................................................................................................... 100 Hearing Attendance ................................................................................................. 101 STATMENTS FOR THE RECORD SUBMITTED FROM COMMITTEE MEMBERS Statement for the record submittedd from Representative Connolly .................. 102 Statement for the record submitted from Representative Jackson Lee .............. 104 ADDITIONAL MATERIALS SUBMITTED FOR THE RECORD Fewer Births Than Deaths Among Whites in Majority of U.S. States sub- mitted for the record from Representative Jackson Lee ................................... 113 ABC-News-Expert dissect reason why mass shooters target houses of worship submitted for the record from Representative Jackson Lee ............................. 118 PBS-White Christians are now a minority of the U.S. population, survey says submitted for the record from Representative Jackson Lee ..................... 121 List of Christan Places of Worship that have been Attacked submitted for the record from Representative Jackson Lee ..................................................... 123 INFROMATION SUBMITTED FOR THE RECORD Video entitled ‘‘No More Talk’’ (9.17.19) submitted for the record from Mr. Christian Piccilini, this video is retained in the Committee file. ..................... 127 (V) MEETING THE CHALLENGE OF WHITE NATIONALIST TERRORISM AT HOME AND ABROAD Wednesday, September 18, 2019 House of Representatives, Subcommittee on the Middle East, North Africa, and International Terrorism, Committee on Foreign Affairs, joint with the Subcommittee on Intelligence and Counterterrorism, Committee on Homeland Security, Washington, DC The subcommittees met, pursuant to notice, at 2:14 p.m., in room 310, Cannon House Office Building, Hon. Theodore E. Deutch (chairman of the Subcommittee on the Middle East, North Africa, and International Terrorism) presiding. Mr. DEUTCH. This hearing will come to order. Welcome, everyone. The Committee on Foreign Affairs’ Subcommittee on the Middle East, North Africa, and International Terrorism is meeting today together with the House Committee on Homeland Security’s Sub- committee on Intelligence and Counterterrorism to hear testimony on the domestic and global threat of white nationalist terrorism. I want to thank my co-chair of today’s hearing, Intelligence and Counterterrorism Subcommittee Chair Max Rose. Thanks also to our ranking members, Joe Wilson and Mark Walker. And I also want to thank the Homeland Security Chairman Benny Thompson and Ranking Member Mike Rogers for hosting us in this really beautiful Homeland Security Committee hearing room. And I espe- cially want to thank our witnesses for being here with us today. I hope this will be a serious examination of the threats that we face here in the United States and overseas and the interconnectivity of these threats. I will now recognize myself for the purpose of making an opening statement. And I will try to be brief, as we have a lot to cover. In recent months and years, it has become apparent that white nationalist terrorism is a growing threat, both here and abroad. In order to solve this problem, we must first identify it. Our gov- ernment, intelligence services, and law enforcement agencies use multiple terms for white nationalist terrorism, including ‘‘racially motivated extremists’’ and ‘‘white supremacist extremists,’’ among others. But when my subcommittee held a hearing with the State Department’s Counterterrorism Coordinator in July, he was unable to call this challenge by its name: white nationalist terrorism. Tragically, this mounting threat reared its ugly head only 3 days later in the horrific attack in El Paso, Texas, that killed 22 people. (1) 2 In the last year, it led to other attacks at the Chabad Synagogue of Poway just north of San Diego; the Al Noor Mosque in the Linwood Islamic Centre in Christchurch, New Zealand; and the Tree of Life Synagogue in Pittsburgh. These attacks were preceded by, among others, a 2017 white na- tionalist terrorist attack at the Islamic Cultural Centre of Quebec City that killed 6, the 2015 terrorist attack at the Emanuel African Methodist Episcopal Church in Charleston that killed 9, and the 2011 attacks by Anders Breivik that killed 77 people principally at a political youth camp in Norway. While these acts of violence may appear disparate and random, the terrorists allegedly responsible for them demonstrably drew in- spiration from one another. They share an ideology that asserts, among other beliefs, that white people and white identity in West- ern countries are under siege by massive waves of immigration from non-white countries. White nationalists also perpetuate con- spiracy theories that claim that Jews control industries, govern- ments, and other organizations through shadow groups which al- legedly pose a threat to white civilization. White nationalists claim they are protecting the white race and will use any means necessary to defend it against this supposed dispossession. This ideology helps explain why their targets include a wide array of people, from Latinx in Texas to Jews in Pennsyl- vania, to Muslims in New Zealand, to
Recommended publications
  • Free, Hateful, and Posted: Rethinking First Amendment Protection of Hate Speech in a Social Media World
    Boston College Law Review Volume 60 Issue 7 Article 6 10-30-2019 Free, Hateful, and Posted: Rethinking First Amendment Protection of Hate Speech in a Social Media World Lauren E. Beausoleil Boston College Law School, [email protected] Follow this and additional works at: https://lawdigitalcommons.bc.edu/bclr Part of the First Amendment Commons, and the Internet Law Commons Recommended Citation Lauren E. Beausoleil, Free, Hateful, and Posted: Rethinking First Amendment Protection of Hate Speech in a Social Media World, 60 B.C.L. Rev. 2100 (2019), https://lawdigitalcommons.bc.edu/bclr/vol60/iss7/6 This Notes is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. FREE, HATEFUL, AND POSTED: RETHINKING FIRST AMENDMENT PROTECTION OF HATE SPEECH IN A SOCIAL MEDIA WORLD Abstract: Speech is meant to be heard, and social media allows for exaggeration of that fact by providing a powerful means of dissemination of speech while also dis- torting one’s perception of the reach and acceptance of that speech. Engagement in online “hate speech” can interact with the unique characteristics of the Internet to influence users’ psychological processing in ways that promote violence and rein- force hateful sentiments. Because hate speech does not squarely fall within any of the categories excluded from First Amendment protection, the United States’ stance on hate speech is unique in that it protects it.
    [Show full text]
  • Audit of Antisemitic Incidents 2019
    Audit of Antisemitic Incidents 2019 Sections 1 Executive Summary 4 Methodology 2 Major Findings 5 Policy Recommendations 3 Themes and Trends 6 Take Action 7 Acknowledgements 1 / 29 1 of 6 EXECUTIVE SUMMARY Each year, ADL’s (Anti-Defamation League) Center on Extremism tracks incidents of antisemitic harassment, vandalism and assault in the United States. Since 1979, we have published this information in an annual Audit of Antisemitic Incidents. In 2019, ADL tabulated 2,107 antisemitic incidents throughout the United States. This is a 12% increase from the 1,879 incidents recorded in 2018 and marks the highest number on record since ADL began tracking antisemitic incidents in 1979. Of the 2,107 incidents recorded in 2019, 1,127 were cases of harassment, a 6% increase from 1,066 in 2018, and 919 were cases of vandalism, a 19% increase from 774 in 2018. The 61 incidents of antisemitic assault (a 56% increase from 2 / 29 39 in 2018), involved 95 victims and led to five deaths. More than half of the assaults nationwide took place in the five boroughs of New York City. There were three major attacks on the Jewish community in 2019: A white supremacist opened fire at the Chabad of Poway, California, on April 27, killing one. Two individuals, at least one of whom was associated with an antisemitic Black Hebrew Israelite sect, attacked a Jewish grocery store in Jersey City, New Jersey, on December 10, killing three. On December 28 an individual attacked a Hanukkah party at the home of a rabbi in Monsey, New York, with a knife, resulting in four injuries and one fatality.
    [Show full text]
  • Nonprofit Security Grant Program Threat Incident Report
    Nonprofit Security Grant Program Threat Incident Report: January 2019 to Present November 15, 2020 (Updated 02/22/2021) Prepared By: Rob Goldberg, Senior Director, Legislative Affairs [email protected] The following is a compilation of recent threat incidents, at home or abroad, targeting Jews and Jewish institutions (and other faith-based organization) that have been reported in the public record. When completing the Threat section of the IJ (Part III. Risk): ▪ First Choice: Describe specific terror (or violent homegrown extremist) incidents, threats, hate crimes, and/or related vandalism, trespass, intimidation, or destruction of property that have targeted its property, membership, or personnel. This may also include a specific event or circumstance that impacted an affiliate or member of the organization’s system or network. ▪ Second Choice: Report on known incidents/threats that have occurred in the community and/or State where the organization is located. ▪ Third Choice: Reference the public record regarding incidents/threats against similar or like institutions at home or abroad. Since there is limited working space in the IJ, the sub-applicant should be selective in choosing appropriate examples to incorporate into the response: events that are most recent, geographically proximate, and closely related to their type or circumstance of their organization or are of such magnitude or breadth that they create a significant existential threat to the Jewish community at large. I. Overview of Recent Federal Risk Assessments of National Significance Summary The following assessments underscore the persistent threat of lethal violence and hate crimes against the Jewish community and other faith- and community-based institutions in the United States.
    [Show full text]
  • What Is Gab? a Bastion of Free Speech Or an Alt-Right Echo Chamber?
    What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? Savvas Zannettou Barry Bradlyn Emiliano De Cristofaro Cyprus University of Technology Princeton Center for Theoretical Science University College London [email protected] [email protected] [email protected] Haewoon Kwak Michael Sirivianos Gianluca Stringhini Qatar Computing Research Institute Cyprus University of Technology University College London & Hamad Bin Khalifa University [email protected] [email protected] [email protected] Jeremy Blackburn University of Alabama at Birmingham [email protected] ABSTRACT ACM Reference Format: Over the past few years, a number of new “fringe” communities, Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, like 4chan or certain subreddits, have gained traction on the Web Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?. In WWW at a rapid pace. However, more often than not, little is known about ’18 Companion: The 2018 Web Conference Companion, April 23–27, 2018, Lyon, how they evolve or what kind of activities they attract, despite France. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3184558. recent research has shown that they influence how false informa- 3191531 tion reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web’s information ecosystem. 1 INTRODUCTION In August 2016, a new social network called Gab was created The Web’s information ecosystem is composed of multiple com- as an alternative to Twitter.
    [Show full text]
  • Understanding Web Archiving Services and Their (Mis) Use On
    Understanding Web Archiving Services and Their (Mis)Use on Social Media∗ Savvas Zannettou?, Jeremy Blackburnz, Emiliano De Cristofaroy, Michael Sirivianos?, Gianluca Stringhiniy ?Cyprus University of Technology, yUniversity College London, zUniversity of Alabama at Birmingham [email protected], [email protected], fe.decristofaro,[email protected], [email protected] Abstract In this context, an important role is played by services like the Wayback Machine (archive.org), which proactively Web archiving services play an increasingly important role archives large portions of the Web, allowing users to search in today’s information ecosystem, by ensuring the continuing and retrieve the history of more than 300 billion pages. At the availability of information, or by deliberately caching content same time, on-demand archiving services like archive.is have that might get deleted or removed. Among these, the Way- also become popular: users can take a snapshot of a Web page back Machine has been proactively archiving, since 2001, ver- by entering its URL, which the system crawls and archives, re- sions of a large number of Web pages, while newer services turning a permanent short URL serving as a time capsule that like archive.is allow users to create on-demand snapshots of can be shared across the Web. specific Web pages, which serve as time capsules that can be shared across the Web. In this paper, we present a large-scale Archiving services serve a variety of purposes beyond ad- analysis of Web archiving services and their use on social me- dressing link rot. Platforms like archive.is are reportedly used dia, shedding light on the actors involved in this ecosystem, to preserve controversial blogs and tweets that the author may the content that gets archived, and how it is shared.
    [Show full text]
  • To the Pittsburgh Synagogue Shooting: the Evolution of Gab
    Proceedings of the Thirteenth International AAAI Conference on Web and Social Media (ICWSM 2019) From “Welcome New Gabbers” to the Pittsburgh Synagogue Shooting: The Evolution of Gab Reid McIlroy-Young, Ashton Anderson Department of Computer Science, University of Toronto, Canada [email protected], [email protected] Abstract Finally, we conduct an analysis of the shooter’s pro- file and content. After many mass shootings and terror- Gab, an online social media platform with very little content ist attacks, analysts and commentators have often pointed moderation, has recently come to prominence as an alt-right community and a haven for hate speech. We document the out “warning signs”, and speculate that perhaps the attacks evolution of Gab since its inception until a Gab user car- could have been foreseen. The shooter’s anti-Semitic com- ried out the most deadly attack on the Jewish community in ments and references to the synagogue he later attacked are US history. We investigate Gab language use, study how top- an example of this. We compare the shooters’ Gab presence ics evolved over time, and find that the shooters’ posts were with the rest of the Gab user base, and find that while he was among the most consistently anti-Semitic on Gab, but that among the most consistently anti-Semitic users, there were hundreds of other users were even more extreme. still hundreds of active users who were even more extreme. Introduction Related Work The ecosystem of online social media platforms supports a broad diversity of opinions and forms of communication. In the past few years, this has included a steep rise of alt- Our work draws upon three main lines of research: inves- right rhetoric, incendiary content, and trolling behavior.
    [Show full text]
  • Data Source Diversity in Identifying and Understanding Events
    BABEL BEACON WORLDWIDE: DATA SOURCE DIVERSITY IN IDENTIFYING AND UNDERSTANDING EVENTS Introduction: As the online data landscape continues to exponentially expand, analysts are increasingly challenged to find where key pieces of information are hiding. Because actionable data can be found anywhere online, it is essential to cast the widest possible net over the vast pool of data sources – globally. It is our observation that many analysts, when analyzing publicly available information (PAI), tend to focus on just a few large social media (SM) platforms like Facebook, Instagram, and/or Twitter. Indeed, these data sources are useful for situational awareness in certain areas around the world. But they, in context, comprise only a small portion of the immense available data within the data universe. So, the appropriate question is: “What other data sources are there, relative to my question, that should be queried?” This Beacon explores the importance of leveraging the variety of global data sets by diving into historical social media posts and analyzing conversations they spawned both within and beyond the original posting site. Babel Street analysts winnowed down data from thousands of social media outlets, blogs and message boards, global news outlets, and the dark web to identify where else these posts were being referenced and by whom, in order to pinpoint relevant and potentially actionable intelligence. BLUF: o Focusing PAI research on only a few large SM platforms severely limits the information analysts can derive about ongoing
    [Show full text]
  • Gadsden GAB Issue 306 a PUBLICATION of BISHOP GADSDEN
    October 2015 Gadsden GAB Issue 306 A PUBLICATION OF BISHOP GADSDEN View the GAB online at www.bishopgadsden.org Walt Ector For many years the residents of Bishop Gadsden have conducted an event to raise significant amounts of money for the support of a local charity. This year the Generous Spirit Subcommittee asked our residents to help select the charity that we would support in 2015. The overwhelming choice was Fisher House Charleston. The Fisher House Foundation is an organization that was created in 1990 in order to provide a place for family members of US Veterans to stay while that veteran obtained medical care at a Military Base or a Veterans Hospital. There are 66 Fisher Houses adjacent to Military and Veterans Centers in this country, in England, and in I NSIDE THIS Germany. These serve over 19,000 families annually. However, there is not a single ISSUE : Fisher House in SC. A local organization has been formed to address that issue; and we intend to support them with this year's Gala for Giving. 2 Our Health Care In late 2012, the Harbor House organization pushed to raise money to purchase land Message from Vice for Fisher House in Charleston. The Ralph H. Johnson VA Hospital is one of the highest 3 President/COO rated VA Hospitals in this country. They serve veterans from all 22 of the counties of coastal SC. The families of these veterans have to either pay for expensive places to 3 Tidbits stay, or stay at home, while the veteran is treated, often for severe combat wounds or health problems.
    [Show full text]
  • Testimony of Lecia Brooks Chief of Staff, Southern Poverty Law Center
    Testimony of Lecia Brooks Chief of Staff, Southern Poverty Law Center before the Subcommittee on National Security, International Development and Monetary Policy Committee on Financial Services United States House of Representatives Dollars against Democracy: Domestic Terrorist Financing in the Aftermath of Insurrection February 25, 2021 My name is Lecia Brooks. I am chief of staff of the Southern Poverty Law Center (SPLC). Now in our 50th year, the SPLC is a catalyst for racial justice in the South and beyond, working in partnership with communities to dismantle white supremacy, strengthen intersectional movements, and advance the human rights of all people. SPLC lawyers have worked to shut down some of the nation’s most violent white supremacist groups by winning crushing, multimillion-dollar jury verdicts on behalf of their victims. We have helped dismantle vestiges of Jim Crow, reformed juvenile justice practices, shattered barriers to equality for women, children, the LGBTQ+ community, and the disabled, and worked to protect low-wage immigrant workers from exploitation. The SPLC began tracking white supremacist activity in the 1980s, during a resurgence of the Ku Klux Klan and other organized extremist hate groups. Today, the SPLC is the premier U.S. nonprofit organization monitoring the activities of domestic hate groups and other extremists. In the early 1990s, the SPLC launched its pioneering Teaching Tolerance program to provide educators with free, anti-bias classroom resources, such as classroom documentaries and lesson plans. Now renamed Learning For Justice, our program reaches millions of schoolchildren with award-winning curricula and other materials that promote understanding of our nation’s history and respect for others, helping educators create inclusive, equitable school environments.
    [Show full text]
  • Transnational Neo-Nazism in the Usa, United Kingdom and Australia
    TRANSNATIONAL NEO-NAZISM IN THE USA, UNITED KINGDOM AND AUSTRALIA PAUL JACKSON February 2020 JACKSON | PROGRAM ON EXTREMISM About the Program on About the Author Extremism Dr Paul Jackson is a historian of twentieth century and contemporary history, and his main teaching The Program on Extremism at George and research interests focus on understanding the Washington University provides impact of radical and extreme ideologies on wider analysis on issues related to violent and societies. Dr. Jackson’s research currently focuses non-violent extremism. The Program on the dynamics of neo-Nazi, and other, extreme spearheads innovative and thoughtful right ideologies, in Britain and Europe in the post- academic inquiry, producing empirical war period. He is also interested in researching the work that strengthens extremism longer history of radical ideologies and cultures in research as a distinct field of study. The Britain too, especially those linked in some way to Program aims to develop pragmatic the extreme right. policy solutions that resonate with Dr. Jackson’s teaching engages with wider themes policymakers, civic leaders, and the related to the history of fascism, genocide, general public. totalitarian politics and revolutionary ideologies. Dr. Jackson teaches modules on the Holocaust, as well as the history of Communism and fascism. Dr. Jackson regularly writes for the magazine Searchlight on issues related to contemporary extreme right politics. He is a co-editor of the Wiley- Blackwell journal Religion Compass: Modern Ideologies and Faith. Dr. Jackson is also the Editor of the Bloomsbury book series A Modern History of Politics and Violence. The views expressed in this paper are solely those of the author, and not necessarily those of the Program on Extremism or the George Washington University.
    [Show full text]
  • Gab and 8Chan
    Gab and 8chan: Home to Terrorist Plots Hiding in Plain Sight The second in a series of reports co-authored by the Network Contagion Research Institute and ADL’s Center on Extremism New analysis of online behavior suggests similar ideological motivations and radicalization methods when comparing the perpetrators of the Pittsburgh and Christchurch massacres. Both killers announced in their preferred internet forums that they were about to commit violence and seemed to identify their fellow forum participants as community members who might share their propensity to commit violence. Both killers were consumed by the conspiracy of a “white genocide.” Both Gab and 8chan – the go-to forums for Robert Bowers and Brenton Tarrant, respectively – are rife with white supremacist, hateful, anti- Semitic bigotry. We present here research conducted by NCRI director and ADL Center on Extremism research fellow, Joel Finkelstein, which provides the first in-depth examination of the genocidal language (e.g. “slaughter”) and conspiracy theories that are pervasive on both platforms. The research explores how each killer identified with his online community, with a degree of adherence reminiscent of what one might see from ISIS followers, and show how that same language is used constantly on both platforms, suggesting the next Bowers or the next Tarrant could emerge at any moment. Background 1 / 14 On October 27, 2018, Robert Bowers perpetrated the deadliestdeadliestdeadliestdeadliest attack attackattackattack against Jews in American history when he stormed a Pittsburgh synagogue armed with an assault rifle and three handguns. Shouting “All Jews must die,” Bowers killed eleven people in their place of worship.
    [Show full text]
  • Alexander B. Stohler Modern American Hategroups: Lndoctrination Through Bigotry, Music, Yiolence & the Internet
    Alexander B. Stohler Modern American Hategroups: lndoctrination Through Bigotry, Music, Yiolence & the Internet Alexander B. Stohler FacultyAdviser: Dr, Dennis Klein r'^dw May 13,2020 )ol, Masters of Arts in Holocaust & Genocide Studies Kean University In partialfulfillumt of the rcquirementfar the degee of Moster of A* Abstract: I focused my research on modern, American hate groups. I found some criteria for early- warning signs of antisemitic, bigoted and genocidal activities. I included a summary of neo-Nazi and white supremacy groups in modern American and then moved to a more specific focus on contemporary and prominent groups like Atomwaffen Division, the Proud Boys, the Vinlanders Social Club, the Base, Rise Against Movement, the Hammerskins, and other prominent antisemitic and hate-driven groups. Trends of hate-speech, acts of vandalism and acts of violence within the past fifty years were examined. Also, how law enforcement and the legal system has responded to these activities has been included as well. The different methods these groups use for indoctrination of younger generations has been an important aspect of my research: the consistent use of hate-rock and how hate-groups have co-opted punk and hardcore music to further their ideology. Live-music concerts and festivals surrounding these types of bands and how hate-groups have used music as a means to fund their more violent activities have been crucial components of my research as well. The use of other forms of music and the reactions of non-hate-based artists are also included. The use of the internet, social media and other digital means has also be a primary point of discussion.
    [Show full text]