Recruitment and Radicalization of School-Aged Youth by International

Recruitment and Radicalization of School-Aged Youth by International

HOMELAND SECURITY INSTITUTE The Homeland Security Institute (HSI) is a federally funded research and development center (FFRDC) established by the Secretary of Homeland Security under Section 312 of the Homeland Security Act of 2002. Analytic Services Inc. operates HSI under contract number W81XWH-04-D-0011. HSI’smiiission istoassist the Secretary of HldHomeland SiSecurity, the UdUnder Secretary for Science and Technology, and the Department of Homeland Security (DHS) operating elements in addressing national policy and security issues where scientific, technical, and analytical expertise is required. HSI also consults with other government agencies, nongovernmental organizations, institutions of higher education, and nonprofit organizations. HSI delivers independent and objective analyses and advice to support policy developp,ment, decision making, alternative approaches, and new ideas on significant issues. HSI’s research is undertaken by mutual consent with DHS and is organized by Tasks in the annual HSI Research Plan. This report presents the results of research and analysis conducted under Task 08-37, Implications for U.S. Educators on the Prevalence and Tactics Used to Recruit Youth for Violent or Terrorist Activities Worldwide of HSI’s Fiscal Year 2008 Research Plan. The purpose of the task is to look at the phenomenon of school-aged individuals being recruited by individuals or groups that promote violence or terrorissm. The results presented in this report do not necessarily reflect official DHS opinion or policy. Homeland Security Institute Catherine Bott Task lead, Threats Analysis Division W. James Castan Robertson Dickens Thomas Rowley Erik Smith Rosemary Lark RECRUITMENT AND Fellow & Division Manager, Threats Analysis Division RADICALIZATION OF George Thompson, SCHOOL-AGED YOUTH Deputy Director, HSI BY INTERNATIONAL TERRORIST GROUPS Final Report 23 April 2009 Prepared for U.S. Department of Education, Office of Safe and Drug-Free Schools Recruitment & Radicalization of School-Aged Youth ACKNOWLEDGEMENTS The Homeland Security Institute (HSI) is grateful to many agencies and individuals for their contributions to this study. This project would not have been possible without the support and guidance received from key personnel at the U.S. Department of Education, including the task sponsor, Bill Modzeleski, Associate Assistant Deputy Secretary for the Office of Safe and Drug-Free Schools, and Yvonne Bartoli, Senior Policy Advisor, Homeland Security Center for School Preparedness, Office of Safe and Drug-Free Schools. HSI benefited from the contributions of Matthew M. Aid, an intelligence historian, who assisted in conducting research and interviews with subject matter experts in the Netherlands. The authors also wish to thank Dr. Peter W. Singer, Dr. Gabriel Weimann, Dr. Anne Speckhard, and Dr. Phelan Wyrick for their contributions to the Youth Recruitment and Radicalization Roundtable. For information about this publication or other HSI research, contact HOMELAND SECURITY INSTITUTE Analytic Services Incorporated 2900 S. Quincy Street Arlington, VA 22206 Tel (703) 416-3550 • Fax (703) 416-3530 www.homelandsecurity.org HSI Publication Number: RP08-37-01 ii Recruitment & Radicalization of School-Aged Youth TABLE OF CONTENTS Executive Summary ........................................................................................................................ 1 Approach .................................................................................................................................... 1 Key Themes and Trends ............................................................................................................. 2 Implications ................................................................................................................................ 2 Introduction ..................................................................................................................................... 3 Purpose ....................................................................................................................................... 6 Methodology .............................................................................................................................. 7 Definitions ........................................................................................................................... 7 Case Study Selection ........................................................................................................... 8 Research Questions ............................................................................................................. 9 Data Sources .............................................................................................................................. 9 Youth Recruitment & Radicalization Roundtable ............................................................. 10 Parameters and Limitations ...................................................................................................... 10 Report Structure ....................................................................................................................... 11 Section I. Themes & Trends ......................................................................................................... 12 Are school-aged youth being recruited or radicalized by terrorist groups? .............................. 12 Who is recruited? ..................................................................................................................... 12 Who recruits school-aged youth? ............................................................................................. 12 From where are youth being recruited? .................................................................................... 13 How are youth recruited? ......................................................................................................... 14 What are youth recruited to do? ............................................................................................... 15 What are the benefits of recruitment? ...................................................................................... 15 What programs or initiatives have been developed to try to counter the recruitment of youth?16 Section II. Case Studies on Recruitment, Radicalization, and Utilization of Youth by Terrorist Groups ........................................................................................................................... 17 Hamas and Hizballah ............................................................................................................... 18 Background ....................................................................................................................... 18 Appeal ............................................................................................................................... 19 Why Youth? ....................................................................................................................... 19 Approach ........................................................................................................................... 20 Counter Initiatives............................................................................................................. 23 Jemaah Islamiyah (JI) .............................................................................................................. 24 Background ....................................................................................................................... 24 Appeal ............................................................................................................................... 25 Why Youth ......................................................................................................................... 25 Approach ........................................................................................................................... 25 Counter-Initiatives ............................................................................................................ 28 Al-Qaeda and Affiliated Groups .............................................................................................. 30 Background ....................................................................................................................... 31 Appeal – United Kingdom ................................................................................................. 31 Why Youth – United Kingdom ........................................................................................... 32 Approach – United Kingdom ............................................................................................ 32 Counter-Initiatives – United Kingdom .............................................................................. 33 Appeal – Conflict Zones .................................................................................................... 35 Why Youth – Conflict Zones .............................................................................................. 36 Approach – Conflict Zones................................................................................................ 36 Counter-Initiatives – Conflict Zones ................................................................................. 37 iii Recruitment & Radicalization of School-Aged Youth Al-Qaeda in the Islamic Maghreb (AQIM) .............................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    93 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us