Terrorism Against Democracy

Total Page:16

File Type:pdf, Size:1020Kb

Terrorism Against Democracy Terrorism Against Democracy By M. Merrick Yamamoto CISSM Working Paper February 2018 Center for International and Security Studies at Maryland 4113 Van Munching Hall, School of Public Policy University of Maryland College Park, MD 20742 (301) 405-7601 cissm.umd.edu Terrorism Against Democracy Based in Part on Stansfield Turner’s University of Maryland Course, “Terrorism & Democracy” By M. Merrick Yamamoto © 2004, 2018 by M. Merrick Yamamoto Preface & Acknowledgements This monograph approaches the problem of terrorism from the perspective of the process of a terrorist attack; that is, how terrorism is intended to “operate.” Comprehension of the intended process of the terrorist attack can help defeat terrorists, reduce terrorism, and avoid the damage that can result from poor responses to attacks. Part I of the monograph analyzes terrorism. Chapter 1 analyzes what terrorism is, and what kinds of acts are and are not terrorism. Chapter 2 analyzes the ways that terrorism is intended to operate on third-parties—the governments, organizations, individuals, and groups from which terrorists seek to elicit responses. Chapter 3 analyzes the causes of terrorism, and the threats that terrorism poses. Part II addresses what to do about terrorism—how to prevent terrorism, respond effectively to attacks, and defeat terrorists. Analysis of the steps of the terrorist attack shows that terrorism can be prevented and countered at each step. The monograph then addresses a general counterterrorism strategy. The monograph uses the Turner-Yamamoto Terrorism Model as a guide to comprehending terrorism and how to combat it. The model illustrates the steps of the terrorist attack, and shows how terrorism is intended to operate. Adapted forms of the model show different aspects of terrorism such as the role of the media in terrorist attacks, and why people choose to use terrorism. The model can be used to identify ways to prevent terrorist attacks, respond effectively if they occur, and reduce the use of terrorism. The model has other uses, such as to identify the characteristics of terrorism. These characteristics can show the differences between terrorism and other forms of political violence, and can be used to analyze incidents to determine whether or not they are acts of terrorism. The model helps identify which characteristics must be included in any definition of terrorism, evaluate the strengths and weaknesses of different definitions, and develop accurate and useful definitions. Appendices address the definition of terrorism, the problems involved with trying to obtain agreement on a definition of terrorism, analysis of arguments that have been made to try to justify terrorist attacks, and the tools of national strategy for the democratic State. Analysis shows that terrorism can be accurately defined in more than one way, that obstacles to obtaining a widely agreed-upon definition can be overcome, and that none of the arguments that terrorists and their supporters use to try to justify terrorism are valid. The impetus to prepare this monograph came from Admiral Stansfield Turner’s course, “Terrorism & Democracy,” which he taught from 2002–2006 in response to the 9/11 attacks on September 11, 2001. During the period that he taught the course, he encouraged the development of a number of the principles in the monograph and included them in his course, and until his retirement was involved with many aspects of the monograph. *** Many thanks to Admiral Stansfield Turner, Dr. John Steinbruner, Captain George Thibault, Susan Borcherding, Dr. Andrea Williams, Kenneth Williams, and Michelle Davis for their help. Special thanks to Dr. Margaret Scheffelin for her invaluable and untiring assistance in the development of the principles underlying the monograph; Edward J. Scheffelin and the Visual Tutor Company for generous support; and, most of all, Clifford Yamamoto. Contents PREFACE & ACKNOWLEDGEMENTS DEDICATION PART I: WHAT IS TERRORISM AND HOW DOES IT OPERATE? ........................ 1 CHAPTER 1: WHAT IS TERRORISM? .......................................................................... 1 I. TERRORISM AND THE TERRORIST ATTACK ....................................................................... 1 II. THE CHARACTERISTICS OF TERRORISM ........................................................................ 13 III. ACCURATE DEFINITIONS OF TERRORISM ..................................................................... 21 IV. SUMMARY ................................................................................................................... 22 CHAPTER 2. HOW TERRORISM “OPERATES” ....................................................... 23 INTRODUCTION.................................................................................................................. 23 I. TERRORIST “MECHANISMS” FOR ELICITING REPONSES.................................................. 23 II. THE LEVERAGE OF TERRORISM .................................................................................... 44 III. IS TERRORISM EFFECTIVE? .......................................................................................... 51 IV. SUMMARY ................................................................................................................... 55 CHAPTER 3. THE CAUSE AND THREAT OF TERRORISM .................................. 56 INTRODUCTION.................................................................................................................. 56 I. THE CAUSE OF TERRORISM ............................................................................................ 56 II. THE THREAT FROM TERRORISM .................................................................................... 61 III. SUMMARY ................................................................................................................... 70 PART II: THE CONTROL AND PREVENTION OF TERRORISM ......................... 71 CHAPTER 4. RESPONDING TO TERRORIST ATTACKS ....................................... 71 INTRODUCTION.................................................................................................................. 71 I. GOVERNMENTS .............................................................................................................. 72 II. THE PUBLIC ................................................................................................................ 106 III. THE MEDIA ............................................................................................................... 113 IV. SUMMARY ................................................................................................................. 116 CHAPTER 5. THE PREVENTION OF TERRORISM ............................................... 119 INTRODUCTION................................................................................................................ 119 I. THE TARGETS OF VIOLENCE ........................................................................................ 120 II. THE MEANS OF VIOLENCE .......................................................................................... 123 III. THE ATTACKER ......................................................................................................... 125 IV. SUMMARY ................................................................................................................. 138 CHAPTER 6. A COMPREHENSIVE COUNTERTERRORISM STRATEGY ....... 139 I. A COMPREHENSIVE, SUSTAINED STRATEGY ................................................................ 139 II. CONCLUSION .............................................................................................................. 146 APPENDIXES .................................................................................................................. 147 APPENDIX A. TERRORISM AND POLITICAL VIOLENCE MODELS ............... 147 APPENDIX B. CONSTRUCTION OF THE DEFINITION OF TERRORISM ....... 161 I. THE CHARACTERISTICS OF TERRORISM ....................................................................... 161 II. THE CHARACTERISTICS OF TERRORISM AND ITS DEFINITION ..................................... 190 APPENDIX C. AGREEMENT ON A DEFINITION OF TERRORISM ................... 193 INTRODUCTION................................................................................................................ 193 I. ARGUMENTS AGAINST DEFINING TERRORISM ............................................................. 193 II. ARGUMENTS FOR DEFINING TERRORISM .................................................................... 197 APPENDIX D. ATTEMPTS TO JUSTIFY TERRORISM ......................................... 203 INTRODUCTION................................................................................................................ 203 I. CLAIMS THAT “OTHERS” ARE RESPONSIBLE FOR ATTACKS ........................................ 203 II. CLAIMS THAT TERRORIST VIOLENCE IS JUSTIFIED ..................................................... 206 III. WAR AND MILITARY “JUSTIFICATIONS” .................................................................... 212 IV. SUMMARY ................................................................................................................. 226 APPENDIX E. THE TOOLS OF NATIONAL STRATEGY ...................................... 227 INTRODUCTION................................................................................................................ 227 I. THE TOOLS OF NATIONAL STRATEGY FOR THE DEMOCRATIC STATE ........................... 227
Recommended publications
  • LCSH Section L
    L (The sound) Formal languages La Boderie family (Not Subd Geog) [P235.5] Machine theory UF Boderie family BT Consonants L1 algebras La Bonte Creek (Wyo.) Phonetics UF Algebras, L1 UF LaBonte Creek (Wyo.) L.17 (Transport plane) BT Harmonic analysis BT Rivers—Wyoming USE Scylla (Transport plane) Locally compact groups La Bonte Station (Wyo.) L-29 (Training plane) L2TP (Computer network protocol) UF Camp Marshall (Wyo.) USE Delfin (Training plane) [TK5105.572] Labonte Station (Wyo.) L-98 (Whale) UF Layer 2 Tunneling Protocol (Computer network BT Pony express stations—Wyoming USE Luna (Whale) protocol) Stagecoach stations—Wyoming L. A. Franco (Fictitious character) BT Computer network protocols La Borde Site (France) USE Franco, L. A. (Fictitious character) L98 (Whale) USE Borde Site (France) L.A.K. Reservoir (Wyo.) USE Luna (Whale) La Bourdonnaye family (Not Subd Geog) USE LAK Reservoir (Wyo.) LA 1 (La.) La Braña Region (Spain) L.A. Noire (Game) USE Louisiana Highway 1 (La.) USE Braña Region (Spain) UF Los Angeles Noire (Game) La-5 (Fighter plane) La Branche, Bayou (La.) BT Video games USE Lavochkin La-5 (Fighter plane) UF Bayou La Branche (La.) L.C.C. (Life cycle costing) La-7 (Fighter plane) Bayou Labranche (La.) USE Life cycle costing USE Lavochkin La-7 (Fighter plane) Labranche, Bayou (La.) L.C. Smith shotgun (Not Subd Geog) La Albarrada, Battle of, Chile, 1631 BT Bayous—Louisiana UF Smith shotgun USE Albarrada, Battle of, Chile, 1631 La Brea Avenue (Los Angeles, Calif.) BT Shotguns La Albufereta de Alicante Site (Spain) This heading is not valid for use as a geographic L Class (Destroyers : 1939-1948) (Not Subd Geog) USE Albufereta de Alicante Site (Spain) subdivision.
    [Show full text]
  • Harman, Chip, Ed. ACTFL Proficiency Guidelines For
    DOCUMENT RESUME ED 289 345 FL 017 059 AUTHOR Stansfield, Charles W., Ed.; Harman, Chip, Ed. TITLE ACTFL Proficiency Guidelines for the Less Commonly Taught Languages. A Familiarization Project for the Development of Proficiency Guidelines for Less Commonly Taught Languages. INSTITUTION American Council on the Teaching of Foreign Languages, Hastings-on-Hudson, N.Y.; Center for Applied Linguistics, Washington, D.C. SPONS AGENCY Department of Education, Washington, DC. PUB DATE 87 "GRANT G008540634 NOTE 207p. PUB TYPE Collected Works - General (020) EDRS PRICE MF01/PC09 Plus Postage. DESCRIPTORS African Languages; Arabic; Bibliographies; Hindi; Indonesian; Information Sources; Interviews; Introductory Courses; *Language Proficiency; *Language Tests; Material Development; Oral Language; *Standards; *Testing Problems; *Test Use; *Uncommonly Taught Languages IDEnTIFIERS *ACTFL ETS Language Proficiency Guidelines ABSTRACT A collection of papers on the use of the American Council on the Teaching of Foreign Languages (ACTFL) Proficiency Guidelines for instruction and testing in less commonly taught language& includes: the 1986 ACTFL Proficiency Guidelines; "Testing Speaking Proficiency: The Oral Interview" (Pardee Lowe, Jr., Judith E. Liskin-Gasparro); a review of the Interagency Language Roundtable Oral Proficiency Interview (Pardee Lowe, Jr.); "Adapting the ACTFL/ETS Proficiency Guidelines to the Less Commonly Taught languages" (Irene Thompson, Richard T. Thompson, and David Hiple); "Materials Development for the Proficiency-Oriented Classroom" (Jeannette D. Bragger); a "Topical Bibliography of Proficiency-Related Issues" (Vicki Galloway, Charles W. Stansfield, and Lynn E. Thompson); "Arabic Proficiency Guidelines" (Roger Allen); "A Model of Proficiency-Based Testing for Elementary Arabic" (R. J. Rumunny); "The Arabic Guidelines: Where Now?" (Roger Allen); "The Application of the ILR-ACTFL Test Guidelines to Indonesian" (John U.
    [Show full text]
  • This Is Para
    UNCORRECTED TRANSCRIPT OF ORAL EVIDENCE To be published as HC 757-ii HOUSE OF COMMONS ORAL EVIDENCE TAK EN BEFORE THE HOME AFFAIRS COMMITTEE POLICE AND CRIME COMMISSIONERS: PROGRESS TO DATE TUESDAY 7 JANUARY 2014 KATY BOURNE and ANTHONY STANSFELD CHIEF CONSTABLE MARTIN RICHARDS and CHIEF CONSTABLE SARA THO RNTON LORD STEVENS and PROFESSOR IAN LOADER Evidence heard in Public Questions 128 - 360 USE OF THE TRANSCRIPT 1. This is an uncorrected transcript of evidence taken in public and reported to the House. The transcript has been placed on the internet on the authority of the Committee, and copies have been made available by the Vote Office for the use of Members and others. 2. Any public use of, or reference to, the contents should make clear that neither witnesses nor Members have had the opportunity to correct the record. The transcript is not yet an approved formal record of these proceedings. 3. Members who receive this for the purpose of correcting questions addressed by the m to witnesses are asked to send corrections to the Committee Assistant. 4. Prospective witnesses may receive this in preparation for any written or oral evidence they may in due course give to the Committee. 1 Oral Evidence Taken before the Home Affairs Committee on Tuesday 7 January 2014 Members present: Keith Vaz (Chair) Mr James Clappison Michael Ellis Paul Flynn Lorraine Fullbrook Dr Julian Huppert Yasmin Qureshi Mark Reckless Mr David Winnick Examination of Witnesses Witnesses: Katy Bourne, Police and Crime Commissioner for Sussex, and Anthony Stansfeld, Police and Crime Commissioner for Thames Valley, gave evidence.
    [Show full text]
  • Survey of Terrorist Groups and Their Means of Financing
    SURVEY OF TERRORIST GROUPS AND THEIR MEANS OF FINANCING HEARING BEFORE THE SUBCOMMITTEE ON TERRORISM AND ILLICIT FINANCE OF THE COMMITTEE ON FINANCIAL SERVICES U.S. HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION SEPTEMBER 7, 2018 Printed for the use of the Committee on Financial Services Serial No. 115–116 ( U.S. GOVERNMENT PUBLISHING OFFICE 31–576 PDF WASHINGTON : 2018 VerDate Mar 15 2010 14:03 Dec 06, 2018 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 G:\GPO PRINTING\DOCS\115TH HEARINGS - 2ND SESSION 2018\2018-09-07 TIF TERRO mcarroll on FSR431 with DISTILLER HOUSE COMMITTEE ON FINANCIAL SERVICES JEB HENSARLING, Texas, Chairman PATRICK T. MCHENRY, North Carolina, MAXINE WATERS, California, Ranking Vice Chairman Member PETER T. KING, New York CAROLYN B. MALONEY, New York EDWARD R. ROYCE, California NYDIA M. VELA´ ZQUEZ, New York FRANK D. LUCAS, Oklahoma BRAD SHERMAN, California STEVAN PEARCE, New Mexico GREGORY W. MEEKS, New York BILL POSEY, Florida MICHAEL E. CAPUANO, Massachusetts BLAINE LUETKEMEYER, Missouri WM. LACY CLAY, Missouri BILL HUIZENGA, Michigan STEPHEN F. LYNCH, Massachusetts SEAN P. DUFFY, Wisconsin DAVID SCOTT, Georgia STEVE STIVERS, Ohio AL GREEN, Texas RANDY HULTGREN, Illinois EMANUEL CLEAVER, Missouri DENNIS A. ROSS, Florida GWEN MOORE, Wisconsin ROBERT PITTENGER, North Carolina KEITH ELLISON, Minnesota ANN WAGNER, Missouri ED PERLMUTTER, Colorado ANDY BARR, Kentucky JAMES A. HIMES, Connecticut KEITH J. ROTHFUS, Pennsylvania BILL FOSTER, Illinois LUKE MESSER, Indiana DANIEL T. KILDEE, Michigan SCOTT TIPTON, Colorado JOHN K. DELANEY, Maryland ROGER WILLIAMS, Texas KYRSTEN SINEMA, Arizona BRUCE POLIQUIN, Maine JOYCE BEATTY, Ohio MIA LOVE, Utah DENNY HECK, Washington FRENCH HILL, Arkansas JUAN VARGAS, California TOM EMMER, Minnesota JOSH GOTTHEIMER, New Jersey LEE M.
    [Show full text]
  • Rmit-V-Stansfield-Judgment---Final-24102018-Pdf.Pdf
    IN THE HIGH COURT OF THE REPUBLIC OF SINGAPORE [2018] SGHC 232 Suit No 65 of 2013 Between Royal Melbourne Institute of Technology … Plaintiff And (1) Stansfield College Pte Ltd (2) TSG Investments Pte Ltd … Defendants JUDGMENT [Civil Procedure] — [Pleadings] [Contract] — [Discharge] — [Breach] [Contract] — [Misrepresentation] — [Statements of intention] [Contract] — [Waiver] [Restitution] — [Mistake] — [Mistake of law] [Restitution] — [Unjust enrichment] — [Failure of consideration] TABLE OF CONTENTS INTRODUCTION............................................................................................1 THE PARTIES .................................................................................................2 THE FACTS .....................................................................................................3 THE 2006 AGREEMENTS..................................................................................4 THE 2009 AGREEMENTS..................................................................................5 THE AMENDING AGREEMENTS........................................................................8 TERMINATION OF THE 2009 AGREEMENTS ......................................................9 THE PLAINTIFF’S CLAIM ........................................................................13 THE FIRST DEFENDANT’S COUNTERCLAIM ....................................18 ISSUES ............................................................................................................19 ISSUE 1: THE PLAINTIFF’S ALLEGED REPUDIATORY
    [Show full text]
  • Pteridologist 2007
    PTERIDOLOGIST 2007 CONTENTS Volume 4 Part 6, 2007 EDITORIAL James Merryweather Instructions to authors NEWS & COMMENT Dr Trevor Walker Chris Page 166 A Chilli Fern? Graham Ackers 168 The Botanical Research Fund 168 Miscellany 169 IDENTIFICATION Male Ferns 2007 James Merryweather 172 TREE-FERN NEWSLETTER No. 13 Hyper-Enthusiastic Rooting of a Dicksonia Andrew Leonard 178 Most Northerly, Outdoor Tree Ferns Alastair C. Wardlaw 178 Dicksonia x lathamii A.R. Busby 179 Tree Ferns at Kells House Garden Martin Rickard 181 FOCUS ON FERNERIES Renovated Palace for Dicksoniaceae Alastair C. Wardlaw 184 The Oldest Fernery? Martin Rickard 185 Benmore Fernery James Merryweather 186 FEATURES Recording Ferns part 3 Chris Page 188 Fern Sticks Yvonne Golding 190 The Stansfield Memorial Medal A.R. Busby 191 Fern Collections in Manchester Museum Barbara Porter 193 What’s Dutch about Dutch Rush? Wim de Winter 195 The Fine Ferns of Flora Græca Graham Ackers 203 CONSERVATION A Case for Ex Situ Conservation? Alastair C. Wardlaw 197 IN THE GARDEN The ‘Acutilobum’ Saga Robert Sykes 199 BOOK REVIEWS Encyclopedia of Garden Ferns by Sue Olsen Graham Ackers 170 Fern Books Before 1900 by Hall & Rickard Clive Jermy 172 Britsh Ferns DVD by James Merryweather Graham Ackers 187 COVER PICTURE: The ancestor common to all British male ferns, the mountain male fern Dryopteris oreades, growing on a ledge high on the south wall of Bealach na Ba (the pass of the cattle) Unless stated otherwise, between Kishorn and Applecross in photographs were supplied the Scottish Highlands - page 172. by the authors of the articles PHOTO: JAMES MERRYWEATHER in which they appear.
    [Show full text]
  • Journal of Threat Assessment and Management Postdicting Violence with Sovereign Citizen Actors: an Exploratory Test of the TRAP-18 Darin J
    Journal of Threat Assessment and Management Postdicting Violence With Sovereign Citizen Actors: An Exploratory Test of the TRAP-18 Darin J. Challacombe and Paul A. Lucas Online First Publication, October 1, 2018. http://dx.doi.org/10.1037/tam0000105 CITATION Challacombe, D. J., & Lucas, P. A. (2018, October 1). Postdicting Violence With Sovereign Citizen Actors: An Exploratory Test of the TRAP-18. Journal of Threat Assessment and Management. Advance online publication. http://dx.doi.org/10.1037/tam0000105 Journal of Threat Assessment and Management © 2018 American Psychological Association 2018, Vol. 1, No. 999, 000 2169-4842/18/$12.00 http://dx.doi.org/10.1037/tam0000105 Postdicting Violence With Sovereign Citizen Actors: An Exploratory Test of the TRAP-18 Darin J. Challacombe Paul A. Lucas Fort Hays State University Appalachian State University The sovereign citizen movement is one of the largest antigovernment nationalism or domestic terrorist collectives in the United States. In the last decade, over a dozen public officials were injured or killed by individuals adhering to sovereign citizen ideology. The Terrorist Radicalization Assessment Protocol (TRAP-18; Meloy & Gill, 2016; Meloy, Habermeyer, & Guldimann, 2015) is a collection of 18 behavior-based warning signs for terror incidents which has been used to assess primarily international terrorism samples. In this study, the researchers applied the TRAP-18 to both violent and nonviolent incidents involving sovereign citizen members. Using chi-square tests for independence and a logistic regression analysis, the researchers found support for the TRAP-18. The sum of the TRAP-18 scores was able to postdict violent outcomes within the events included within the study.
    [Show full text]
  • DIY Sovereignty and the Popular Right in Australia
    DIY Sovereignty and the Popular Right in Australia Judy Lattas Macquarie University [email protected] Abstract The concern of this paper is with the form that ‘right wing’ anti-government protest has taken in Australia in recent years. One tactic that is proving popular amongst those who have suffered setbacks in their hold on property, or in their small business ventures, is to declare their secession from Australia, and to establish an alternative jurisdiction and alternative citizenship. The author describes some of these projects, and links the serious political pursuit of this secessionist move to a movement in the USA called Sovereign Citizenship, which is itself linked to recent acts of anti-government sabotage called ‘paper terrorism’. I want to take up the conference theme of ‘Mobile Boundaries/Rigid Worlds’ in relation to the recent popularity in Australia of creating new countries - on a small scale, of course - in ‘do it yourself’ (DIY) projects involving a declaration of sovereignty and autonomy. Sometimes it is an experiment in citizenship or just for fun, but it is often done in protest. What I have in mind are those people, for example, who have declared their legal secession from Australia and formed their own principalities, like His Royal Highness Prince Leonard of the Hutt River Province Principality in Western Australia. While the story of Prince Leonard is legendary, others who are more contemporary are not well known. Commentators call these people micronationalists, which is a term that was coined in the 1990s to describe the activity that was pioneered by Prince Leonard of Hutt.
    [Show full text]
  • Terrorism: Its Past, Present & Future Study a Special Issue to Commemorate CSTPV at 25
    The St Andrews Journal of International Relations ISSN: 2049-7040 Contemporary Voices, Handa CSTPV 25th Anniversary Special Issue ISSN: 2516-3159 Terrorism: Its Past, Present & Future Study A Special Issue to Commemorate CSTPV at 25 Edited by Gillian Brunton & Dr Tim Wilson Contemporary Voices, Handa CSTPV 25th Anniversary Special Issue Contents Introduction - CSTPV at 25 .................................................................................. 1 by Tim Wilson Discussion 1 - Revisiting the wicked problem of defining terrorism ................... 3 by Alex P. Schmid In Response - Defining terrorism: communities and context ............................ 12 by Sarah Marsden Discussion 2 - Baghdadi should have read Rules for rebels .............................. 18 by Max Abrahms In Response - Baghdadi should have read Rules for rebels .............................. 22 by Bruce Hoffman Discussion 3 - Civil war, transnational terrorism and military intervention ....... 25 by Martha Crenshaw In Response - Terrorism studies: blind spots in the field ................................... 30 by Max Abrahms Discussion 4 - Examining terrorism’s persistence: a relational approach ......... 33 by Sarah Marsden In Response - Examining terrorism’s persistence: a relational approach .......... 39 by Martha Crenshaw Contemporary Voices, Handa CSTPV 25th Anniversary Special Issue i Discussion 5 - Terrorism: a continuing threat .................................................... 41 by Bruce Hoffman In Response - Counterterrorism: also a continuing
    [Show full text]
  • Recruitment and Radicalization of School-Aged Youth by International
    HOMELAND SECURITY INSTITUTE The Homeland Security Institute (HSI) is a federally funded research and development center (FFRDC) established by the Secretary of Homeland Security under Section 312 of the Homeland Security Act of 2002. Analytic Services Inc. operates HSI under contract number W81XWH-04-D-0011. HSI’smiiission istoassist the Secretary of HldHomeland SiSecurity, the UdUnder Secretary for Science and Technology, and the Department of Homeland Security (DHS) operating elements in addressing national policy and security issues where scientific, technical, and analytical expertise is required. HSI also consults with other government agencies, nongovernmental organizations, institutions of higher education, and nonprofit organizations. HSI delivers independent and objective analyses and advice to support policy developp,ment, decision making, alternative approaches, and new ideas on significant issues. HSI’s research is undertaken by mutual consent with DHS and is organized by Tasks in the annual HSI Research Plan. This report presents the results of research and analysis conducted under Task 08-37, Implications for U.S. Educators on the Prevalence and Tactics Used to Recruit Youth for Violent or Terrorist Activities Worldwide of HSI’s Fiscal Year 2008 Research Plan. The purpose of the task is to look at the phenomenon of school-aged individuals being recruited by individuals or groups that promote violence or terrorissm. The results presented in this report do not necessarily reflect official DHS opinion or policy. Homeland Security Institute Catherine Bott Task lead, Threats Analysis Division W. James Castan Robertson Dickens Thomas Rowley Erik Smith Rosemary Lark RECRUITMENT AND Fellow & Division Manager, Threats Analysis Division RADICALIZATION OF George Thompson, SCHOOL-AGED YOUTH Deputy Director, HSI BY INTERNATIONAL TERRORIST GROUPS Final Report 23 April 2009 Prepared for U.S.
    [Show full text]
  • Surveying the Landscape of the American Far Right
    SURVEYING THE LANDSCAPE OF THE AMERICAN FAR RIGHT MARK PITCAVAGE AUGUST 2019 PITCAVAGE | PROGRAM ON EXTREMISM About the Program on as an expert witness in a number of trials. Since Extremism 2000, Dr. Pitcavage has worked for the Anti- Defamation League, one of the nation’s oldest civil The Program on Extremism at George rights organizations, where he currently serves as a Washington University p r o v i d e s Senior Research Fellow in ADL’s Center on analysis on issues related to violent and Extremism. In the past, Dr. Pitcavage has also non-violent extremism. The Program been Director of the Center on Extremism. Prior to spearheads innovative and thoughtful joining ADL, Dr. Pitcavage was Research Director academic inquiry, producing empirical for the Justice Department’s State and Local Anti- work that strengthens extremism Terrorism Training Program. Dr. Pitcavage research as a distinct field of study. The received his MA and Ph.D. from The Ohio State Program aims to develop pragmatic University in Columbus, Ohio, where he still lives policy solutions that resonate with and works. policymakers, civic leaders, and the general public. The views expressed in this paper are About the Author solely those of the author, and not necessarily those of the Program on Dr. Mark Pitcavage is a historian with 25 Extremism or the George Washington University. years’ expertise on domestic terrorism and right-wing extremism in the United States, having authored many articles, reports and studies on related subjects; trained over 17,000 government officials and law enforcement officers; and served SURVEYING THE LANDSCAPE OF THE AMERICAN FAR RIGHT 1 PITCAVAGE | PROGRAM ON EXTREMISM Introduction What is the extreme right in the United States? To many, terms such as “extreme right” and “far right” are simply synonymous with white supremacy.
    [Show full text]
  • Terrorism Threat Assessment 2019
    2019Terrorism Threat Assessment NEW JERSEY OFFICE OF HOMELAND SECURITY AND PREPAREDNESS UNCLASSIFIED ABOUT US The New Jersey Office of Homeland Security and Preparedness (NJOHSP) is tasked with coordinating counterterrorism, resiliency, and cybersecurity efforts across all levels of government, law enforcement, nonprofit organizations, and the private sector. Created by Executive Order in 2006 when the Office of Counterterrorism (OCT) merged with staff from the Domestic Security Preparedness Task Force (DSPTF), NJOHSP bolsters New Jersey’s resources for counterterrorism, critical infrastructure protection, preparedness, training, and federal grants management. Shortly after the tragic events of September 11, 2001, New Jersey’s legislature and Governor passed and signed the Domestic Security Preparedness Act, which created the DSPTF within the Office of the Attorney General. In 2002, the Governor created the OCT by Executive Order, which remained under the Attorney General. OCT provided New Jersey with a single agency to lead and coordinate New Jersey’s counterterrorism efforts with state, local, and federal authorities and with the private sector. Mission NJOHSP leads and coordinates New Jersey’s counterterrorism, cybersecurity, and preparedness efforts while building resiliency throughout the State. Core Values SERVICE. We put our State and its citizens first, and we put Mission before self. We take pride in being timely, accurate, and relevant. TEAMWORK. We stand with and behind each other. We recognize that partnerships, both internal and external, are critical to achieving success. We cannot fulfill our Mission alone. EXCELLENCE. We take great pride in the quality of our work. We do every task, every project, every initiative, to the best of our ability.
    [Show full text]