Introduction: a Different Perspective on Terrorism 1 the Problems With

Total Page:16

File Type:pdf, Size:1020Kb

Introduction: a Different Perspective on Terrorism 1 the Problems With Notes Introduction: A Different Perspective on Terrorism 1. Critical Terrorism Studies, in the aims of the journal Critical Studies on Terrorism, seeks to take a more distinct self-reflective approach to terror- ism than does “Orthodox Terrorism Studies.” According, among others, to Anthony Burke Critical Terrorism Studies marks the end of “tradition- ally state-focused and directed ‘problem-solving’ terrorism studies.” For Richard Jackson (2009: 3) it translates into “a critical orientation, a scepti- cal attitude, and a willingness to challenge received wisdom and knowl- edge about terrorism.” This book shares with Critical Terrorism Studies the critique toward existing approaches to terrorism, particularly the acknowledgement that the phenomenon is socially constructed. As Jackson (2009: 4) puts it: “[Terrorism’s] nature is not inherent to the violent act itself, but is dependent upon context, circumstance, intention, and cru- cially, social, cultural, legal, and political processes of interpretation, cat- egorisation and labelling.” Overall, however, the arguments presented in this book transcend the division between “Critical Terrorism Studies” and “Orthodox Terrorism Studies.” The root problem, as the following chapters will show, is not the political agenda behind the research or the method, but the very conceptualisation of social reality – an issue that can apply to both academic camps. On the case for Critical Terrorism Studies, see: Gunning (2007); Breen Smyth, Gunning, Jackson, and Kassimeris (2008a,b); and Jackson (2009); on the case against it see Horgan and Boyle (2008). 2. For a chronology of the events see Spiegel Online (2011). 1 The Problems with Terrorism Research 1. According to an FBI chronology (n.d.: 288) the desk clerk who checked Hamza Aghamdi out of the Hotel Days at 5.52am of 11 September 2001 noticed he was “wearing cologne.” 2. Crenshaw’s articles have inspired further work about the end of Al Qaeda by Cronin (2006; 2009). 3. A consultation of the syllabi collected on the website “Teaching Terror” (http://www.teachingterror.net/syllabi.htm) shows that Hoffman’s text appears in virtually every terrorism course’s reading list. 4. “Transition Network,” http://www.transitionnetwork.org/ 5. British National Party website, http://www.bnp.org.uk/policies/immigration 6. Global Terrorism Database (GTD) website: http://www.start.umd.edu/gtd/ 7. For Bennett and George theory testing should involve, besides control- led comparison, also another method of causal inference such as process- tracing (Bennett and George 1997: 2). Process-tracing is a method to 180 Notes 181 “generate and analyze data on the causal mechanisms, or processes, events actions, expectations, and other intervening variables, that link putative causes to observed effects” (ibid.: 5.) 8. It could be argued that also this law has conditions of validity, as water always boils at 100°C at sea level. 2 Terrorism, Communication, and the Media 1. It could be argued that the hostage taking was not at all an act of terrorism and should not have been used by Schmid to illustrate his argument. 2. For more information about this event see BBC News (2007). 3. Adam Dolnik, in an interview with the author, stresses the greater opera- tional capability of recruits who have received training against the ‘self- starters’: “we have seen a definite difference in the capabilities of the home-grown groups that had contact and training with groups in Pakistan or Afghanistan and the groups that try to do it all on their own. There is a huge capability difference” (Dolnik 2011b). 4. On this point see also Stevens (2009). 5. For a range of critical views on the extent to which communication tech- nologies sustain different kinds of online communities, from diasporic groups to migrants, less-abled people, and transnational movements, see Silverstone (2005). For more on online activism and advocacy, see: Hick and McNutt (2002); McCaughey and Ayers (2003). 6. An example of the belief that online communities of Muslim extremists uncontroversially exist is offered by Gendron (2006). Drawing on Sageman (2004) she writes that: “Internet connections create a bond between indi- viduals and a ‘virtual’ Muslim community which is an approximation of an ideal Islamic society: one that is all that is just, egalitarian, and universal in its simplicity and purity” (Gendron 2006: 16). 7. Kohlmann is not alone in believing that images are more powerful than text: see also HSPI/CIAG (2007: 18). 8. The very distinction between agents and structures that characterises all Sociology, according to Margaret Somers and Gloria Gibson (1994: 12), is part of the constructed “metanarrative of modernity.” This point will be further developed in Chapter 3. 9. I will more fully develop this metaphor in the conclusions (Chapter 7). 3 A Communication Approach 1. According to Charles Lave and James March (1993: 3) a model is “a simpli- fied picture of a part of the real world. It has some characteristics of the real world, but not all of them. It is a set of interrelated guesses about the world.” Because these “guesses” reflect the researcher’s interpretation of a set of causal mechanisms that explain reality, I use the term “model” inter- changeably with “theoretical framework.” 2. Harrison White is notoriously obscure in his writing. The reader might want to become familiar with his thought through Azarian’s (2005) analysis of the author’s work. 182 Notes 3. There are further ways in which objects participate in social action (Latour 1999: 183-190). They fall beyond the focus of the analysis here. 4. For Tilly (2002: 88) a social movement is “a kind of campaign ... [that] demands righting of a wrong, more often a wrong suffered by a well- specified population. The population in question can range from a single individual to all humans.” 5. Tilly (2002: 118) describes repertoire as the “limited number of previously created performances within which the people involved [in political con- tention] can make claims.” 6. Snow at al. (1986: 476-478) acknowledge, themselves, the limitations of their “frame alignment” approach. 7. See Seib (2012, forthcoming) for an excellent discussion of the role of social media in the uprising in North Africa and the Middle East in 2011. 8. Emirbayer and Mische (1998: 971) point out that, in Relational Sociology, it is possible to identify three constitutive aspects of agency: iteration or “the selective reactivation by actors of past patterns of thought and action, as routinely incorporated in practical activity”; “projectivity,” that is the imagination of “possible future trajectories of action”; and “evaluation,” or the ability of actors to assess situations and responding to “demands, dilemmas, and ambiguities” of developing circumstances. I agree with the authors in recognising the existence of these interrelated components, and also share with them the understanding of agency as “temporally embed- ded process of social engagement.” I prefer, however, to talk about “indi- vidual narrative” rather than “agency” to emphasise the fact that, although there is a relationship between consciousness (our interpretation of reality) and action (what we actually do), they do not coincide. 9. Anderson (1983: 15) used this term to explain the rise of national- ism: “nations are imagined because the members of even the smallest nation will never know most of their fellow-members, meet them, or even hear of them, yet in the minds of each lives the image of their communion.” 10. This argument fits with the relationship between consciousness and action advocated by symbolic interactionism: social action is not shaped by “quasi- objectively existing forces,” but by the meaning that is attributed to them by actors (Joas and Knöbl 2009: 132). The meaning changes depending on the context. Hans Joas and Wolfgang Knöbl (ibid.) present the example of a tree which, they explain, is never only a material object: it can be the subject of scientific research for a biologist, but can also have a romantic significance for somebody who, for instance, had a first rendezvous by an oak at the edge of the woods. Meaning can also change over time and across situations: I might look at my computer as a simple typewriter until a technical problem occurs. At that point, by being forced to deal with the malfunction, I start learning how it works and begin to see it in a different light. 11. “ABC News 1972 Munich massacre coverage,” 6 September, http://www. youtube.com/watch?v=lTqZPKZ4_wk 12. “Che cosa è ‘Settembre Nero’? [What is ‘Black September?],” and “La dichia- razione dei terroristi [The terrorists’ declaration],” L’ Unit à , 6 September, p. 6; “Settembre Nero [Black September],” La Stampa, 6 September, p. 3 (Ascari 2009b). Notes 183 13. “E così lo sport è finito in trincea [How sport ended up in the trench],” Gazzetta dello Sport, 6 September, p. 1 and 13 (Ascari 2009a). 14. “Il dramma e il mito [The drama and the myth],” L’ Unit à, 6 September, p. 10; “Violata l’ultima isola di pace [Violated the last island of peace],” Corriere della Sera, 6 September, p. 3 (Ascari 2009a). 15. The US Department of Defence (2002: 1) stated that, as of May 2002, there were “68 nations supporting the global war on terrorism ... 20 nations have deployed more than 16,000 troops to the U.S. Central Command’s region of responsibility.” 16. I am not arguing that individuals should be criminalised only for what they say or think rather than for what they do. In fact, radical statements could well be made for merely rhetorical or attention-seeking purposes. They could be empty declarations that never get translated into deeds, let alone violence. The point here is that mapping what people say/think – imagined relationships and broader vision of the world – through their personal and/ or group narrative over time can provide support and early warning signals to understanding their actions.
Recommended publications
  • Downloaded from Brill.Com09/29/2021 06:39:09AM Via Free Access
    fascism 4 (2015) 209-212 brill.com/fasc Book Review ∵ Mats Deland, Michael Minkenberg and Christin Mays, ed. In the Tracks of Breivik: Far Right Networks in Northern and Eastern Europe (Berlin/ Vienna: lit Verlag, 2014). Four years have already passed since Anders Behring Breivik, apparently single-handedly, committed the most murderous and destructive terrorist atrocity by the far right in post-war Europe. In 2011–2012, particularly during his criminal trial in Oslo, there was a lively public debate in in the Scandinavian media as to whether Breivik was a fascist, or represented some other permuta- tion of the contemporary European far right – an Islamophobic ‘counter-jihad- ist’; a militant, conservative nationalist; or a Christian extremist.1 Somewhat counterintuitively, since then relatively little scholarly attention has been devoted within comparative fascist studies to the implications of Breivik’s deeds, ideology, and self-proclaimed pan-European revolutionary movement. The title of this anthology – In the Tracks of Breivik – would suggest that its primary purpose is to map the far right networks of northern and eastern Europe in relation to the terrorist acts of July 22, 2011. Even if we realize that this formulation is an unfortunate literal translation of the Swedish phrase ‘i spåren av [Breivik]’ – for which a more idiomatic English rendering would be ‘in the wake of [Breivik]’, the implication would still be that the findings of the book are located in some direct relation to Breivik and his crimes. Even the promotional blurb on the back cover, as well as the opening and closing words of the introduction, reinforce this expectation.
    [Show full text]
  • The Christchurch Attack Report: Key Takeaways on Tarrant’S Radicalization and Attack Planning
    The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam i The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam ICCT Perspective December 2020 ii About ICCT The International Centre for Counter-Terrorism – The Hague (ICCT) is an independent think and do tank providing multidisciplinary policy advice and practical, solution- oriented implementation support on prevention and the rule of law, two vital pillars of effective counterterrorism. ICCT’s work focuses on themes at the intersection of countering violent extremism and criminal justice sector responses, as well as human rights-related aspects of counterterrorism. The major project areas concern countering violent extremism, rule of law, foreign fighters, country and regional analysis, rehabilitation, civil society engagement and victims’ voices. Functioning as a nucleus within the international counter-terrorism network, ICCT connects experts, policymakers, civil society actors and practitioners from different fields by providing a platform for productive collaboration, practical analysis, and exchange of experiences and expertise, with the ultimate aim of identifying innovative and comprehensive approaches to preventing and countering terrorism. Licensing and Distribution ICCT publications are published in open access format and distributed under the terms of the Creative Commons
    [Show full text]
  • Brenton Tarrant: the Processes Which Brought Him to Engage in Political Violence
    CSTPV Short Papers Brenton Tarrant: the processes which brought him to engage in political violence Beatrice Williamson 1 Contents Introduction .......................................................................................................................... 3 Brenton Tarrant .................................................................................................................... 3 Conceptualising Tarrant and his violence ............................................................................. 5 The Lone Actor Puzzle ........................................................................................................... 5 ‘A dark social web’: online ‘radicalisation’ ............................................................................ 7 Online communities: Social Network Ties and Framing .................................................... 7 Funnelling and Streams ..................................................................................................... 9 Conclusion ........................................................................................................................... 11 Bibliography ........................................................................................................................ 12 2 Introduction Individual radicalisation is a complex and bespoke process influenced by multiple factors and variables, meaning every individual follows their own path to terrorism and political violence. This paper will endeavour to demonstrate and explore some of the
    [Show full text]
  • Ways in and Ways out Ways and in Ways Høigård Tajet Kirsti
    Ways In and Ways Out Ways and In Ways Høigård Tajet Kirsti NTNU Norwegian University of Science and Technology Faculty of Social Sciences Master’s thesis and Technology Management Department of Political Science Trondheim, Spring2012 Trondheim, Science thesisinPolitical Master’s Extremism Islamist versus Right-WingExtremism Deradicalization: and ofRadicalization An Analysis Out InandWays Ways Høigård Tajet Kirsti To SL, with the hopes that you will someday deradicalize as well Acknowledgements I want to express my gratitude to my supervisor Tanja Ellingsen for good help, positive remarks and good assistance along the way. I also want to express my gratitude to my informants for letting me dig in their troublesome and often difficult past, I have learnt at least as much about human grief as I have about radicalization and deradicalization. Without the informants this thesis had not existed. I also want to thank Rashad Ali for meeting me at the British Museum where the atmosphere is great for deep conversations, and for all the assistance he provided me in the aftermath of the interview. I also want to express my gratitude to Hanif Qadir for welcoming me into the Active Change Foundation in London and for letting me interview him. I am also grateful to Pat Parry in the United Kingdom for assistance along the way. In addition I want to express my gratitude to all the people that I have been in contact with regarding finding the right informants, in particular all the local police stations that have helped me along the way, Åfjord Lensmannskontor, Manglerud Politistasjon, Brumunddal Lensmannskontor and Stange Lensmannskontor.
    [Show full text]
  • Accelerationism Theory
    CANADIAN ASSOCIATION FOR SECURITY AND INTELLIGENCE STUDIES VANCOUVER ACCELERATIONISM THEORY BRIEFING NOTE April 12, 2021 Disclaimer: This Briefing Note contains summaries of open sources and does not represent the views of the Canadian Association for Security and Intelligence Studies. Title: Accelerationsim Theory Date: 12/04/2021 Disclaimer: This briefing note contains summaries of open sources and does not represent the views of the Canadian Association for Security and Intelligence Studies. PURPOSE STATEMENT This briefing note examines accelerationism theory and its connection to several white nationalist groups that may be considered Violent Transnational Social Movements (VTSM), and the potential threats that accelerationism poses to national security and political stability. Since the mid-2010s, some members of the far-right and white nationalist movements have reportedly embraced and promoted accelerationism as a key component of their ideology using online forums (Anti-Defamation League, 2019; Beauchamp, 2019). This briefing note also examines the reported connections between accelerationism and acts of soft and kinetic violence committed against minorities, immigrant communities, Jewish communities, and governments (Beauchamp, 2019; Dearden, 2020; Waugh, 2019). THE SECURITY PROBLEM Several white nationalist groups that embrace accelerationism emerged in the late 2010s including Atomwaffen Division and The Base. Believers in accelerationism have recently been linked to several instances of soft and kinetic violence, which allegedly aim to de-stabilise existing social structures (Beauchamp, 2019; Dearden, 2020; Waugh, 2019). The continued online promotion of accelerationism poses a serious potential threat to minorities, immigrant communities, Jewish communities, and governments (Beauchamp, 2019). Accelerationists are often radicalised through easily accessible internet sources and encrypted chat rooms.
    [Show full text]
  • The Boston Marathon Bombing in the New York Times and Le Figaro
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 8-2014 News and the Public Sphere: The Boston Marathon Bombing in The New York Times and Le Figaro Ioana Alexandra Coman University of Tennessee - Knoxville, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Part of the Communication Technology and New Media Commons, International and Intercultural Communication Commons, Journalism Studies Commons, and the Mass Communication Commons Recommended Citation Coman, Ioana Alexandra, "News and the Public Sphere: The Boston Marathon Bombing in The New York Times and Le Figaro. " PhD diss., University of Tennessee, 2014. https://trace.tennessee.edu/utk_graddiss/2812 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Ioana Alexandra Coman entitled "News and the Public Sphere: The Boston Marathon Bombing in The New York Times and Le Figaro." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in Communication and Information. Peter Gross, Major Professor We have read this dissertation and recommend its acceptance: Elizabeth Hendrickson, Suzie Allard, Michael Palenchar, Harry Dahms Accepted for the Council: Carolyn R.
    [Show full text]
  • The Future of South Korea: Alternative Scenarios for 2030
    THE FUTURE OF SOUTH KOREA: ALTERNATIVE SCENARIOS FOR 2030 A DISSERTATION SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAI‘I AT MĀNOA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN POLITICAL SCIENCE DECEMBER 2012 By Hyeonju Son Dissertation Committee: Jim Dator, Chairperson Manfred Henningsen Debora Halbert Hagen Koo Jang Hyun Kim Keywords: alternative futures scenarios, vision, preferred futures, Korea ACKNOWLEDGEMENTS This dissertation contains far more than the accumulation of years of working with futures studies. It has been a long journey, reflecting my own personal experience, vision, story, and family and social relationships. Indeed this dissertation would not have been possible without the help and support of the generous and inspiring people around me. I really appreciate their contribution to my development as a person and a scholar. My deepest gratitude goes to my advisor, Jim Dator, a talented teacher and passionate futurist, who guided me with his vast knowledge and expertise, and who promptly, answered my questions with comprehensive solutions. I am truly grateful to him for his patience, ongoing support, and wisdom. I would like to thank other committee members for their personal and intellectual support: Manfred Henningsen, Debora Halbert, Hagen Koo, and Jang Hyun Kim. I especially owe a huge debt of gratitude to Debora Halbert who put a lot of effort into the final stages of my writing. She not only edited my work, but also preserved my motivations with her encouragement. I also wish to extend a thank you to Sun-Ki Chai and Jungmin Seo, who were former committee members and inevitably left before the dissertation was completed.
    [Show full text]
  • Motion of Fascism Is Banned in Several Member States Pursuant to Their National Laws;
    European Parliament 2014-2019 TEXTS ADOPTED P8_TA(2018)0428 Rise of neo-fascist violence in Europe European Parliament resolution of 25 October 2018 on the rise of neo-fascist violence in Europe (2018/2869(RSP)) The European Parliament, – having regard to the Universal Declaration of Human Rights, – having regard to the report of 9 May 2017 by the UN Special Rapporteur on contemporary forms of racism, racial discrimination, xenophobia and related intolerance, – having regard to UN General Assembly Resolution 71/179 of 19 December 2016 on ‘Combating glorification of Nazism, neo-Nazism and other practices that contribute to fuelling contemporary forms of racism, racial discrimination, xenophobia and related intolerance’, – having regard to the European Convention on Human Rights, in particular Article 14 thereof and Protocol No 12 thereto, – having regard to the International Convention on the Elimination of All Forms of Racial Discrimination, – having regard to the Charter of Fundamental Rights of the European Union, – having regard to Articles 2, 3, 6 and 7 of the Treaty on European Union (TEU), – having regard to Council Directive 2000/43/EC of 29 June 20001 prohibiting discrimination on grounds of race and ethnic origin (the Race Equality Directive), – having regard to Council Framework Decision 2008/913/JHA of 28 November 2008 on combating certain forms and expressions of racism and xenophobia by means of criminal law2, – having regard to Directive 2012/29/EU of the European Parliament and of the Council 1 OJ L 180, 19.7.2000, p. 22.
    [Show full text]
  • 2011 Norway Attacks: Immediate Reactions and Prevalence of Stereotypes
    Justus-Liebig-University Giessen Seminar: Terrorism, Wed 4-6 pm Summer Term 2011 2011 Norway Attacks: Immediate Reactions and Prevalence of Stereotypes Name: Catharina Drott Table of Contents 1. Introduction…………………………………………………………………………….…….1 2. Norway’s Immigration Policy…………………………………………..…………..…1 3. Why Can the Attacks be Called “Terrorist Attacks”?..........................2 4. Immediate Reactions: Prevalence of Stereotypes…………………….…….3 5. The Unexpectedness of the Attacks: A Reverse Scenario…….…..…....6 6. Personal Experience and Conclusion………………………………………...…..8 7. Works Cited…………………………………………………………………….….….…..…9 1. Introduction On July 22nd 2011, twin attacks hit Norway’s capital Oslo and claimed 77 dead and 96 injured victims. The attacks were carried out by Anders Behring Breivik and are regarded terrorist attacks. This paper is primarily concerned with the immediate reactions after the attacks, which were false trails. People believed an Islamist organisation to be behind the attacks and drew rapid conclusions. Furthermore, I will attempt to answer the question why the false accusations were made in the first place. In order to understand the subject better, I will briefly outline Norway’s immigration policy, which gave cause to the attacks, and look at different definitions of terrorism to justify that the attacks are in fact terrorist acts. When people eventually learned the truth about the perpetrator, they were shocked and surprised. The unexpectedness of the attacks will also be discussed in the paper. My observations of the immediate reactions after the attacks are based on articles in selected newspapers, such as The New York Times, The Washington Post, The Atlantic or The Guardian. 2. Norway’s immigration policy With favourable terms like income per head, education level and high life expectancy, Norway is not only the frontrunner in the UN’s human development reports, but also an attractive and promising country for immigrants (cf.
    [Show full text]
  • Nationalism and the Body Politic Psychoanalysis and the R
    CHAPTER TITLE I NATIONALISM AND THE BODY POLITIC NEW INTERNATIONAL LIBRARY OF GROUP ANALYSIS Series Editor: Earl Hopper Other titles in the Series Contributions of Self Psychology to Group Psychotherapy: Selected Papers by Walter N. Stone Difficult Topics in Group Psychotherapy: My Journey from Shame to Courage by Jerome S. Gans Resistance, Rebellion and Refusal in Groups: The 3 Rs by Richard M. Billow The Social Unconscious in Persons, Groups, and Societies. Volume 1: Mainly Theory edited by Earl Hopper and Haim Weinberg The Social Nature of Persons: One Person is No Person by A. P. Tom Ormay Trauma and Organizations edited by Earl Hopper Small, Large, and Median Groups: The Work of Patrick de Maré edited by Rachel Lenn and Karen Stefano The Dialogues in and of the Group: Lacanian Perspectives on the Psychoanalytic Group Macario Giraldo From Psychoanalysis to Group Analysis: The Pioneering Work of Trigant Burrow edited by Edi Gatti Pertegato and Giorgio Orghe Pertegato The One and the Many: Relational Psychoanalysis and Group Analysis by Juan Tubert-Oklander Listening with the Fourth Ear: Unconscious Dynamics in Analytic Group Therapy by Leonard Horwitz Forensic Group Psychotherapy: The Portman Clinic Approach edited by John Woods and Andrew Williams (joint publication with Portman) NATIONALISM AND THE BODY POLITIC Psychoanalysis and the Rise of Ethnocentrism and Xenophobia Edited by Lene Auestad First published in 2014 by Karnac Books Ltd 118 Finchley Road, London NW3 5HT Copyright © 2014 to Lene Auestad for the edited collection, and to the indi- vidual authors for their contributions. The rights of the editor and contributors to be identified as the authors of this work have been asserted in accordance with §§ 77 and 78 of the Copyright Design and Patents Act 1988.
    [Show full text]
  • DHS) Overview of Countering Violent Extremism (CVE) Recent Progress
    U//FOUO The Department of Homeland Security's (DHS) Overview of Countering Violent Extremism (CVE) Recent Progress The Department works closely with state, local, tribal, and territorial law enforcement, government organizations, and community groups to detect and prevent violent criminal activity that may be motivated by extreme ideological beliefs. The goal is to fully integrate CVE awareness into daily law enforcement activities nationwide by building upon existing community oriented policing practices that have proven to be successful for decades. Since the release of the Administration's national CVE Strategic Implementation Pian (SIP) for Empowering Local Partners to Prevent Violent Extremism in the United States, DHS, in coordination with the National Counterterrorism Center (NCTC), Depaitment of Justice (DOJ), the FBI, and State and Local law enforcement, has made progress in the following areas: 1. Better understanding the behaviors and indicators of violent extremism through analysis and research; 2. Supporting law enforcement and community oriented policing efforts through training and grant prioritization; and 3. Enhancing operational partnerships with communities, law enforcement, and international partners. Analysis and Research to Better Understand Violent Extremism DHS has produced substantial analysis and research on violent extremism since the release of the SIP, including over 75 case studies and assessments produced by the DHS Office for Intelligence and Analysis (I&A) and over 14 reports produced by DHS's Science and Technology Directorate (S&T) on behaviors and indicators associated with violent extremism. This analysis and research has been shared with State and Local law enforcement officials to help detect and mitigate threats and it has been integrated into CVE training materials for law enforcement.
    [Show full text]
  • Download Report
    TERRORISM FREQUENCY BRIEFING ON EXTREME RIGHT WING Briefing In the wake of the massacre of 50 people displayed the intent to cause indiscriminate Background /01 by a white supremacist in Christchurch on attacks against the public; however, targeted Scale of the threat /02 15 March, and rising levels of violence by attacks are assessed as more likely. While Drivers of XRW terrorism /03 right-wing extremists worldwide, Pool Re, XRW targeting of property (vandalism, arson Methodologies /03 on behalf of its Members, undertook etc.) is not uncommon, these incidents are Capabilities /04 research into the threat posed by right- typically investigated as hate crimes rather Targeting /04 wing extremism to the UK, and the likely than acts of terrorism. While the latter have frequency and severity of attacks the potential to cause significant property Eden Stewart perpetrated by its adherents. damage, particularly where explosives are Senior Analyst involved, the primary intent will be the While Islamist extremism remains the targeting of people. Therefore, XRW attacks primary terror threat to the United Kingdom are likely to cause greater intangible losses (UK), the threat from extreme right-wing than material damage. Targets will likely be (XRW) terrorism has both evolved and selected for their symbolic value, specifically increased in recent years. XRW terrorists their association with groups or individuals have been responsible for roughly a third to which the XRW are hostile; locations of successful attack and a quarter of affiliated with ethnic, religious or sexual disrupted plots since 2017. The growth minorities are particularly at risk. in XRW activity has put further pressure on counter-terrorism resources, and Background reciprocal violence between XRW and Prior to 2014, XRW activity in the UK was largely Islamist extremists is a possibility which confined to small, well-established groups, could exacerbate an already complicated typically with older memberships, which threat landscape.
    [Show full text]