BookPDF Available

Social Networks, Terrorism, and Counter-Terrorism: Radical and Connected

Authors:

Abstract

The book aims to show that networks should be at the forefront not only when analysing terrorists, but also when assessing the responses to their actions. The volume makes a unique contribution by addressing two relatively new themes for terrorism studies. First it puts social relations and cooperation issues at the forefront – an approach often identified as crucial to future breakthroughs in the field. Second, many contributions tackle the role of the Internet in the process of radicalization and in recruitment more generally, a highly debated topic in the field today. In addition, the book provides a valuable mix of review essays, critical essays, and original empirical studies. This balanced approach is also found in the topics covered by the authors, as well as their academic disciplines, which include sociology, computer science, geography, history, engineering, and criminology as well as political science. Many of the true advances in terrorism studies depend on the successful collaboration of multi-disciplinary teams, each with a different set of methodological and conceptual tools. This volume reflects the newfound diversity in this field and is a true product of its time.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
1 Radical and connected
An introduction
Martin Bouchard and Philippa Levey1
It is easy for the outside observer to make the connection between radicalization
and the Internet. After all, so many of the homegrown terrorists making head-
lines have been involved in online discussion forums, blogs and social media
outlets, while having reported being “self- radicalized” and nding inspiration
through watching videos on YouTube and reading violent literature found on
extremist websites.
Yet things are usually more complicated than that. First, the Internet is a tool
for motivated individuals to search for information and exchange with other like-
minded individuals sharing similar interests on any topic (Rainie and Wellman,
2012). It should therefore be no surprise that the Internet is similarly used by
would- be terrorists, alongside the much larger crowd of curious observers who
are online because of their general interest in exchanging on current world affairs
or religion and who should not be confused with “radicals.” The baseline hypo-
thesis should then be that extremists use the Internet just as much as anyone else,
and as researchers we should therefore investigate the instances where they use
it more, less, differently or with more serious consequences than expected.
Second, the Internet is unlikely to be the sole medium of inuence for the
majority of terrorists. As mentioned by others before us, use of the Internet only
gets you so far: far enough for the majority of individuals who may participate in
online discussions or view content of an extremist nature but never truly “radi-
calize” themselves (McCauley and Moskalenko, 2008); not far enough for indi-
viduals who are joining terrorist groups engaged in planning and committing
violent acts. The latter need ofine interactions to further engage in the process,
to learn specic techniques, and to start participating in conspiracies (Sageman,
2004, 2008; Awan, 2007; Jenkins, 2011; Nash and Bouchard, this volume).
The reality is that online interactions and material should be considered a key
element in the radicalization process of many individuals. Because the Internet
is omnipresent in the life of young people, but also because the size, intensity,
ubiquity and sometimes quality of the motivational material found online is nat-
urally framed to inspire its target audience, the question then becomes: can it be
a sufcient condition for the violent radicalization of individuals? Can the radi-
calization process start, develop and mature solely online? These remain research
questions that can be examined empirically, but despite a growing literature on
436 01 Social Networks 01.indd 1 25/3/15 15:32:39
2 M. Bouchard and P. Levey
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
this very topic (see Ducol, this volume), the role of the Internet has not been
investigated systematically enough to give us clarity on the current situation.
Third, sometimes obscured from the discussions on the role of the Internet in
the radicalization process is perhaps the most fundamental question, or the one
with the most consequences: does the Internet “create” violent radicalization
(and terrorism) where radicalization does not exist? In other words, are there
more radicalized individuals because the Internet exists as a communication
medium? This is a question also being asked in criminology more generally for
many types of crimes, in the cyber context (are there more pedophiles because
child pornography is readily available on the Internet?) but also ofine (are more
individuals becoming drug users in areas where drugs are more available?). This
is an exposure argument whereby the availability of online material (violent or
extremist in nature) and the possibility of interacting with similarly minded indi-
viduals in a virtual community provide an opportunity for radicalization to indi-
viduals who otherwise might not have considered this path (Neumann, 2013).
These individuals would not have been proactively seeking information on their
own. Instead, they would have stumbled upon these ideas for the rst time
during their routine online activities.
While the possibility of a personal radicalization process occurring solely on
the Internet cannot be rejected, it may not be the most common pathway for
current terrorist and those of the recent past. The Internet may act as a facilitator
and conduit for radical views online, but rarely as an all- encompassing creator of
radical ofine behavior. The missing element, for many scholars, is the deep
friendships of trust that develop as a result of face- to-face interactions evident in
small groups (Sageman, 2004, 2008; Awan, 2007; Jenkins, 2011; McCauley and
Moskalenko, 2008; Horgan, 2008). This research shows that personal grievances
are common among radicals; however, the difference between all individuals
with similar grievances and the ones who violently radicalize is often found in
the differential socialization of the latter within radical groups (for a summary,
see Bouchard and Nash, this volume).
Even if the importance of social ties in the radicalization process is increas-
ingly acknowledged by terrorism scholars, the exact mechanisms under which
this occurs have been given less attention. McCauley and Moskalenko (2008)
discuss these various mechanisms, such as the slippery slope where individuals
gradually become involved with a group, taking on small tasks and actions
before complete adherence and membership ensues. More commonly, the mech-
anism that scholars have in mind, and that radicals are describing, refers to the
implications on personal behavior of group cohesion and solidarity to friends.
Face- to-face interactions and engagement in group activities provide those
involved with a sense of emotional belonging to the group, creating pressure for
conformity to group norms and behavior. These sorts of group- level factors are
not unique to the context of extremism and terrorism. For instance, group pro-
cesses help explain why street gang members commit more crime than other
offenders but, more importantly, why many are ready to risk serious personal
injuries and death for group- level grievances (e.g., Bouchard and Spindler,
436 01 Social Networks 01.indd 2 25/3/15 15:32:39
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
Radical and connected: an introduction 3
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
2010). Cohesive groups have a tendency to isolate themselves from the rest of
the world, cutting most out- group ties held prior to their radicalization (Sageman,
2004). They are, in essence, trading one network for another (Horgan, 2008).
The case study of Omar Hammami analyzed in the chapter by Nash and Bou-
chard in this volume provides a clear demonstration of how a person’s pre-
radicalization network gradually gives way to a more cohesive network of
radicals.
Developments in the understanding of the importance of social networks and
the Internet in terrorism are used in this book as a backdrop to propose a relat-
ively wide- ranging set of contributions. The title of the book reects our
objective to cover a wide- ranging set of issues in the eld while specifying the
importance of social networks in our interpretation of the individual contribu-
tions to this book. The sub- title of the book, Radical and Connected, captures in
two words many of the elements that introduce the nature of the contributions
included in this volume. While the word “radical,” and its importance for the
book, is not mysterious by now, it is the word “connected” which carries with it
much of the common thread that can be found in the chapters of this volume:
“connected” in the sense that some of the attention of our authors is devoted to
the Internet as a medium of inuence for many individuals, whether they belong
to the “radical few” or the much larger population of online sympathizers.
But more to the point, these individuals are connected in the sense of “social
networks”: social networks of terrorists, on the one hand, but also social net-
works of the agencies organizing responses to terrorist acts and planning for the
risks of such events. These agencies are connected as well. They are connected
to the Internet, where their investigations inevitably lead them given the import-
ance of computer- mediated communications for terrorist groups and violently
radicalized individuals (Sageman, 2004; Neumann, 2013; Soriano, 2012). But
they are also connected to other agencies in the context of multi- jurisdictional
investigations and/or task forces specically devoted to terrorist groups (Dupont,
this volume; Kitchen and Molnar, this volume). Moreover, they are connected
within their own ranks, where issues of internal relations and cooperation never
cease to be both a challenge and a source of potential benet when efcient net-
working leads to better organizational outcomes. It may not take a network to
ght a network (Dupont, this volume), but it takes a team that can effectively
cooperate, share information, trust one another, avoid internal conicts, and
work towards similar goals.
Research on cooperation in small groups has consistently shown how the
manner in which individuals connect and cooperate have implications for group
performance. This is true of terrorist groups whose structure inuences the
lethality of their attacks (Heger et al., 2012) and their ability to avoid detection
(Helfstein and Wright, 2011), but also of security and law enforcement agencies
(Brewer, 2013; Dupont, 2006; Whelan, 2014). For example, Whelan (2014)
interviewed 20 upper- level security ofcials comprising Australia’s national
security division for the purposes of examining the internal structural and organ-
izational design of their network. Such a design is said to be most effective at
436 01 Social Networks 01.indd 3 25/3/15 15:32:39
4 M. Bouchard and P. Levey
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
managing and preventing security- related incidents when high levels of collabo-
ration are present within the network structure (Whelan, 2014). In a similar
fashion, Kitchen and Molnar (this volume) examine Canada’s counter- terrorism
strategy with the goal of observing the effects of integration among social agents
(people at all levels of government as well as civilians and foreign partners) and
the sharing of national security technological devices. Park and Tsang (this
volume) offer some intriguing insight into the recent computational frameworks
being designed and tested as a means of identifying the most efcient and
effective security responses when faced with possible terror attacks. In the spirit
of integration, Kitchen and Molnar (this volume) address the benets and pos-
sible complexities associated with high levels of integration in a manner consist-
ent with Dupont (this volume), who further elaborates on the tension between
collaboration and competition among national security organizations within
Canada.
The point of departure of this book is the assumption that integrating network
concepts and network methods to the study of terrorism and counter- terrorism is
of central importance, from theoretical, empirical, and policy perspectives, in
bringing the eld forward. This is not exactly a new idea, although the move to
study terrorist networks did not truly take off until the events of 9/11 (Krebs,
2002). Not all studies in this volume adopt a pure network approach or even use
its methods. But all have a deep concern for examining the nature and impact of
social interactions and cooperation in shaping the trajectories of terrorists and
the nature of the responses to the threat of terrorism.
The organization of the book
Two characteristics make this collection of original papers stand out compared
to others. First, it includes scholars from a wide range of disciplines, from the
more traditional international studies, sociology and political science to crimi-
nology, history and computing science. What we gain in knowledge from the
diversity of points of views and training of our authors, we may lose, to a certain
extent, in specicity and depth. At the same time, we strongly believe in the
need for a book that reects such a wide variety of approaches under a single
cover, as this allows for a broader understanding of the implications of the topic
at hand, notably via the natural cross- disciplinary learning that is bound to occur.
Second, this book focuses on a wide spectrum of the possible research themes
in the eld, as opposed to a single one. The book title reects this diversity of
interest among authors, where new developments in research on radicalization
and terrorism are found alongside work on counter- terrorism. The book is
divided into two parts. Part I covers issues in radicalization, from the angle of
history, network trajectories and the role of the Internet. Part II moves to issues
in counter- terrorism, providing critiques of some of the current policies, but also
describing some of the promising approaches currently being developed. A
common thread among the majority of those contributions is a concern for exam-
ining social networks—either as an analogy, a concept, an explanatory variable
436 01 Social Networks 01.indd 4 25/3/15 15:32:39
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
Radical and connected: an introduction 5
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
or an object of inquiry. Each author accomplishes this in his or her own way,
whether small or large, reecting the relative place social interactions and
cooperation have in the work they have chosen to feature in this book. It will be
obvious to the reader that no framework was imposed on authors when inviting
their respective contributions to this book. The freedom authors received was
given in exchange for the meaningful contributions they could provide as experts
in their own sub- elds of terrorism studies.
In Chapter 2 André Gerolymatos reminds us how revisiting the history of
political Islam can help us better understand the different incarnations of the
threats evident today and the security challenges we currently face in the twenty-
rst century. The social movement around “political Islam” that we see today
has its roots in the Ottoman empire of the fteenth century. This is a story
merging the political struggles, religion and identity of Muslims around the
world and the perception among some that they belong to one global network
where the battles of some are the battles of all. This sort of interdependence is a
key idea when understanding the local and global consequences of counter-
terrorism policies. After this voyage into the roots of modern terrorism, Laura
Huey brings us back to the present in Chapter 3 with her essay on how we
approach the study of domestic radicalization. In reviewing recent cases of radi-
calized Canadians who do not t the expected prole of terrorists (e.g., such as
second- generation converts), Huey demonstrates how standard methodological
tools overlook the unexpected cases; ignoring those outliers or “grey swans”
puts us at risk of missing valuable and informative information on the process of
radicalization. This essay is especially timely in light of the two separate events
of October 2014 in St- Jean-sur- Richelieu and Ottawa, where two Canadian con-
verts each killed a member of the Canadian military.
This book argues that attention to social networks is key to the development
of the eld, and the following contributions make this argument explicit. First,
Bouchard and Nash devote a full chapter to reviewing the recent research in ter-
rorism and counter- terrorism using network methods. Their chapter is meant to
demonstrate the utility of network methods but also to highlight some of the
areas in which additional work is required. The authors clarify the difference
between network concepts and network methods and situate the development of
network analysis in the wider context of research on radicalization, both online
and ofine. The next chapter can be seen as almost a response to the rst, as the
authors move from the conceptual to the empirical analysis of social networks.
The contribution by Nash and Bouchard looks at the network trajectory of a
homegrown terrorist, Omar Hammami. This chapter, more than any other in the
book, draws from network methods. Omar’s autobiography and other sources
were used to recreate the social structure around Omar at six points in time,
based on his travel to six different locations: Daphne, Toronto, Alexandria,
Mogadishu, Chiamboni and Baraawe. From these six locations, 71 contacts were
extracted as part of his network at any one time, divided between family ties,
friends, jihadi brothers, jihadi leaders and religious/teacher inuences. The
authors show how Omar’s network signicantly changed from one location to
436 01 Social Networks 01.indd 5 25/3/15 15:32:39
6 M. Bouchard and P. Levey
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
the next, depending on his ability to branch out from the highly connected clique
he usually integrated upon his arrival. Friendship and family ties gradually dis-
appeared to favor jihadi brothers, and especially jihadi leaders in the last two
parts of his journey in Somalia.
The next three chapters move the discussion to issues surrounding terrorism
and the Internet. First, Benjamin Ducol reects on radicalization, showing that to
understand the impact of the Internet on radicalization processes it is imperative
to grasp the impact that both online and ofine communities have on behavioral
outcomes. Such an interaction effect is made more complicated by the ever-
changing nature of the Internet, especially taking into account the change in the
participants who now have access to, and control over, this communication tool.
Ducol addresses the complexities and dangers of assuming radicalization to
occur by means of a single factor in isolation, and he elaborates on the import-
ance of integrating ofine behaviors and cognitive developments supporting
radical beliefs with online activities. The chapter by Davies and colleagues
approaches the notion of terrorism and the Internet by examining recruitment
processes employed by extremist and terrorist groups through ofcial online
websites. Alongside a typological analysis of four online recruitment styles, the
inconsistencies of recruitment tactics and use of social media between groups
allows for a thorough discussion on the extent to which extremist groups use the
Internet to achieve their own ends.
The importance of examining both online and ofine extremist behaviors is
also emphasized by Thomas Holt and colleagues, who presented the results of a
cross- country survey examining the factors predicting the willingness of indi-
viduals to commit attacks online and ofine. The potential for cyberterrorist
attacks have been identied for a long time, and yet empirical research associ-
ated with cyberterrorism is scant. The research results show that the proles of
these “cyberwarriors” overlap considerably with those of traditional online com-
munities of cybercriminals. Out- group antagonism, in particular, was associated
with a higher willingness to carry out attacks both online and ofine.
Part II of the book covers a variety of issues in counter- terrorism. In Chapter
9, Benoît Dupont argues that the commonsensical and widely accepted idea that
“it takes a network to ght a network” is fraught with a host of risks that are
rarely considered in counter- terrorism policies. The author does not deny the
benets of exible partnerships, reciprocal information ows and increased
cooperation more generally, but he reminds us of some of the incompatibilities
of network structures with the actual mandates of counter- terrorism agencies.
The subsequent chapter pushes further this critical assessment of the organiza-
tion of the response to terrorism. Reecting on the tendency of counter- terrorism
institutions (and Canada’s counter- terrorism strategy) to integrate multiple agen-
cies, Kitchen and Molnar suggests that although integration is often presented as
“the” answer for such task forces, it solves only a silo problem but may lead to
new inefciencies, increased complexity and diffused accountability. The
authors also see promises in integration and cooperation if the process is done
correctly. Accounts of units emphasizing joint training events and other
436 01 Social Networks 01.indd 6 25/3/15 15:32:39
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
Radical and connected: an introduction 7
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
opportunities for social interactions among members have shown increased
cohesiveness within integrated units and the reduced tensions that naturally arise
in such contexts.
Finally, in Chapter 11 computer scientists Andrew Park and Herbet Tsang
provide us with a fascinating glimpse into the future with a presentation of the
latest research on simulation models created to help answer some of the “what
if ” questions regarding individual and group dynamics in the event of a terrorist
attack. As articial as the world created by these scientists may initially seem,
the utility of these simulation models for the sound planning of interventions and
crisis management will appear extremely concrete to any reader. The manner in
which our nations respond when faced with attacks of terror and violence has
direct consequences for the general public and rst responders. Such a computa-
tional model as the one explained in this chapter allows us to take one step closer
to this end goal.
Note
1 Martin Bouchard would like to thank Philippa Levey, Evan Thomas and Marie Ouellet
for their assistance in preparing the nal version of this volume as a whole. As Daniel
Hiebert and Lorne Dawson mention in the Foreword, the idea for this book started in
the context of a TSAS workshop where many of the individual contributors presented
their work. Martin would like to thank Dan and Lorne for their encouragements and
continued support, as well as Brett Kubicek for his leadership in the creation of the
TSAS environment. The staff at TSAS who originally helped in the preparation of this
book include Kate Castelo, Vicky Baker, Marit Gilbert and Marni Wedin. TSAS itself
was originally created from a partnership grant between Public Safety Canada and
three universities: University of British Columbia, Simon Fraser University and Uni-
versity of Waterloo. I would like to thank them all for their support and at the same
time remind readers that the views expressed by the contributors of this book do not
represent those of any of these institutions.
References
Awan, A. N. (2007) Radicalization on the Internet? The virtual propagation of jihadist media
and its effects. RUSI Journal. 152 (3), pp. 76–81. DOI: 10.1080/03071840701472331.
Bouchard, M. and Spindler, A. (2010) Groups, gangs, and delinquency: Does organiza-
tion matter? Journal of Criminal Justice. 38 (5), pp. 921–933.
Brewer, R. (2013) Enhancing crime control partnerships across government: Examining
the role of trust and social capital on American and Australian waterfronts. Police
Quarterly. 16 (4), pp. 371–394.
Dupont, B. (2006) Delivering security through networks: Surveying the relational land-
scape of security managers in an urban setting. Crime, Law and Social Change. 45 (3),
pp. 165–184.
Heger, L., Jung, D. and Wong, W. (2012) Organizing for resistance: How group structure
impacts the character of violence. Terrorism and Political Violence. 24 (5),
pp. 743–768.
Helfstein, S. and Wright, D. (2011) Covert or convenient? Evolution of terror attack net-
works. Journal of Conict Resolution. 55 (5), pp. 785–813.
436 01 Social Networks 01.indd 7 25/3/15 15:32:39
8 M. Bouchard and P. Levey
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
Horgan, J. (2008) From proles to pathways and roots to routes: Perspectives from psy-
chology on radicalization into terrorism. Annals of the American Academy of Political
and Social Science. 618 (1), pp. 80–94.
Jenkins, B. M. (2011) Stray dogs and virtual armies: Radicalization and recruitment to
jihadist terrorism in the United States since 9/11. Rand Corporation.
Krebs, V. (2002) Uncloaking terrorist networks. First Monday. 7 (4).
McCauley, C. and Moskalenko, S. (2008) Mechanisms of political radicalization: Path-
ways toward terrorism. Terrorism and Political Violence. 20 (3), pp. 415–433.
Neumann, P. R. (2013) Options and strategies for countering online radicalization in the
United States. Studies in Conict and Terrorism. 36 (6), pp. 431–459.
Rainie, L. and Wellman, B. (eds) (2012) Networked: The New Social Operating System.
Cambridge MA: MIT Press.
Sageman, M. (ed.) (2004) Understanding Terror Networks. Philadelphia: University of
Pennsylvania Press.
Sageman, M. (2008) Leaderless Jihad: Terror Networks in the 21st Century. Philadel-
phia: University of Pennsylvania Press.
Soriano, M. R. T. (2012) The vulnerabilities of online terrorism. Studies in Conict and
Terrorism. 35 (4), pp. 263–277.
Whelan, C. (2014) Managing dynamic security networks: Towards the strategic managing
of cooperation, coordination and collaboration. Security Journal. DOI:10.1057/
sj.2014.20.
436 01 Social Networks 01.indd 8 25/3/15 15:32:39
... While some scholars posit that "sparse attention has been paid to many criminological theories" (Fisher & Kearns, 2024) in the context of the study of terrorism, at his 2023 lecture upon receiving the Distinguished Scholar Award from the American Society of Criminology's Division on Terrorism and Bias Crimes, Professor Joshua Freilich celebrated the advancements that criminologists have made, noting that every major criminological theory has now been tested against the framing of terrorism and violent extremism. The diverse coverage theoretically for the study of terrorism and violent extremism is complemented by methodological innovations as well, including interviews (e.g., Bloom, 2017;Carthy & Schuurman, 2023;Morrison, 2020), social network analysis (e.g., Bouchard, 2015;Malm et al., 2016), and media portrayals (e.g., Gill et al., 2017;Sweeney et al., 2021;Whittaker, 2021). Within this space, the literature has embraced the more sophisticated methodological designs (inclusive of qualitative, quantitative, and mixed methods frameworks) that are so common in criminology more broadly; gone are the days where the standard is counting data related to extremism. ...
Article
Full-text available
Scholarship on terrorism and violent extremism (T/VE) has exponentially grown in recent decades across disciplinary lines and, in recent years, incorporates more complex and sophisticated methodological and theoretical framings. Given the interdisciplinary nature of research in this space, there remains an ongoing hesitation amongst traditional criminologists about the role of terrorism research within the discipline – with some arguing that as a category of crime and delinquency, terrorism is a criminological topic, while others view it as more appropriate for another disciplinary lens or through the creation of a specified field (i.e., ‘terrorism studies’). Yet, many criminologists from across the world are contributing new perspectives and innovations to the study of terrorism and violent extremism. To highlight this important work, the journal commissioned a special issue on T/VE, featuring a diverse grouping of authors approaching the topic from a criminological framework spanning the globe, roles, and methodological traditions.
... Why do some individuals transition from non-violent to violent ideology? This complex and oftentimes unknowable pathway has been attributed to a number of influences, including but indeed not limited to intergroup conflict (McCauley and Moskalenko 2008), religious and political leaders (Moghaddam 2005), social networks and personal connections (Bouchard 2015), family (Asal, Fair and Shellman 2008), prison (Hamm 2013), and the Internet (Conway 2012). ...
Chapter
This chapter is broken up into two sections: terrorists' and violent extremists' use of the Internet, and cyberterrorism. In the first half of the chapter, we first define terrorism, violent extremism and radicalization and highlight the challenges of conceptualizing such terms. Next, we provide an overview of the central ideologies that motivate terrorists and violent extremists. We then describe their core uses of the Internet and the role of the Internet in the process of radicalization, followed by a discussion of some of the ways of combating their online activities. In the latter half of the chapter, we unpick the complexities of defining cyberterrorism, followed by a look at tactics and targets of cyberterrorism campaigns. We also discuss the likelihood of a cyberterrorist attack and conclude with a discussion of possible responses to cyberterrorism.
... Social network analysis (SNA) is an analytical approach which focuses on actors in social groups and the ties or links that connect such actors to one another (see [42][43][44]). SNA has previously been utilized by scholars and law enforcement practitioners to understand, describe and analyze the internal dynamics of terrorist networks [4,[45][46][47][48][49][50][51][52][53][54][55][56]). This research has demonstrated the value of SNA in understanding the internal dynamics of terrorist groups, including the role of leaders and brokers, and identified unique approaches to disrupting networks. ...
Article
Full-text available
Terrorism has typically been considered an organized activity undertaken by networks of individuals who share a collective identity and purpose. In recent years, media, law enforcement and scholarly attention has increasingly focused on the construct of the lone actor terrorist. However, lone actor terrorism has suffered from significant conceptual confusion, particularly with regard to whether such actors actually radicalize and/or undertake acts of violence alone. In order to contribute to a more nuanced understanding of this emerging phenomenon, this paper analyzes five lone actor attacks perpetrated in Australia between September 2014 and the end of 2017. It examines what (if any) interpersonal relationships these lone actors had with others, along with the nature of such connections and any ideological or logistical support these individuals may have provided. A personal network design is used to visualize interpersonal relationships and explore the nature of such connections. The paper concludes by discussing implications for policy and practice, and for the construct of the lone actor.
... When discussing about predictive analytics we can include all those mathematical or computer models that try to predict or forecast terrorist events, perpetrators, dynamics. Scholars are divided into different factions: some are more optimistic (with various degree of cautiousness) Haberman and Ratcliffe, 2012;Siegel, 2016), while others have less positive expectations on the power of these computational instruments to actually help the fight against terrorism (and, more generally, crime) (Weber and Bowling, 2014;Bouchard, 2017;Hälterlein and Ostermeier, 2018). It is not just a matter of the debate fostered around the unethical behavior of certain algorithms and the damages that these instruments can pose to certain parts of the societies (Berk et al., 2018;Hannah-Moffat, 2018;PAI, 2019). ...
Thesis
Full-text available
Jihadist terrorism represents a global threat for societies and a challenge for scientists interested in understanding its complexity. This complexity continuously calls for developments in terrorism research. Enhancing the empirical knowledge on the phenomenon can potentially contribute to developing concrete real-world applications and, ultimately, to the prevention of societal damages. In light of these aspects, this work presents a novel methodological framework that integrates network science, mathematical modeling, and deep learning to shed light on jihadism, both at the explanatory and predictive levels. Specifically, this dissertation will compare and analyze the world's most active jihadist terrorist organizations (i.e. The Islamic State, the Taliban, Al Qaeda, Boko Haram, and Al Shabaab) to investigate their behavioral patterns and forecast their future actions. Building upon a theoretical framework that relies on the spatial concentration of terrorist violence and the strategic perspective of terrorist behavior, this dissertation will pursue three linked tasks, employing as many hybrid techniques. Firstly, explore the operational complexity of jihadist organizations using stochastic transition matrices and present Normalized Transition Similarity, a novel coefficient of pairwise similarity in terms of strategic behavior. Secondly, investigate the presence of time-dependent dynamics in attack sequences using Hawkes point processes. Thirdly, integrate complex meta-networks and deep learning to rank and forecast most probable future targets attacked by the jihadist groups. Concerning the results, stochastic transition matrices show that terrorist groups possess a complex repertoire of combinations in the use of weapons and targets. Furthermore, Hawkes models indicate the diffused presence of self-excitability in attack sequences. Finally, forecasting models that exploit the flexibility of graph-derived time series and Long Short-Term Memory networks provide promising results in terms of correct predictions of most likely terrorist targets. Overall, this research seeks to reveal how hidden abstract connections between events can be exploited to unveil jihadist mechanics and how memory-like processes (i.e. multiple non-random parallel and interconnected recurrent behaviors) might illuminate the way in which these groups act.
... In regard to ISIS, and violent extremism generally, a disconnect exists between policymakers and criminal justice actors, who craft legislation defining these extremist groups and the sanctions imposed against them, and criminologists, whose role is to empirically study, analyze, and eventually suggest recommendations to appropriately address these groups' criminogenic impact. Since Rick Rosenfeld's (2002, p. 2) admonishment, "it is our fault, our poverty of intellectual imagination prevents us from studying terrorism," criminologists are more attentive at investigating terrorism (Bouchard, 2015;Curry, 2011;Forst, 2009). This chapter's intention was to explicitly acknowledge that nearly a century's worth of gang research can be utilised to provide insights into the premier jihadi organisation, ISIS. ...
Chapter
Full-text available
It is not uncommon for terrorist groups to be compared to street gangs, yet it has only been in recent years that scholars (Curry, 2011; Decker & Pyrooz, 2011, 2015) have begun to com- pare and contrast the archetypes of these two violent groups. The Islamic State of Iraq and Syria2 (ISIS), like many street gangs, is the offspring of sectarian conflict. Addressing Decker and Pyrooz’s (2011, 2015) call for greater conceptual clarity and more comparative research between terrorist groups and violent street gangs, the current chapter3 uses ISIS as a case study to better understand a modern terrorist group by applying nearly a century of gang research. Decker and Pyrooz (2011, p. 161) attest that “developing fixed images of groups, their activities, structures, and processes will likely lead to errors in assessing their danger.” At its foundation ISIS remains a violent extremist organisation, yet, ISIS is “something qualitatively more significant than a terrorist organization” (Lister, 2015, pp. 51), and as noted by Byman (2015a, p.1): It is best to think of the Islamic State as an amalgam, bringing together the characteristics of many different types of actors—some legitimate, some downright evil—but with no single label doing the job. Evolving from the archetypal terrorist group to an organisation whose interstitial nature makes it almost impossible to label clearly what ISIS is: terrorist, insurgent, cult, state, social service provider, or revolutionary state sponsor of terror (Atwan, 2015; Byman, 2015a; Cronin, 2015; Gerges, 2016; Warrick, 2015). Guided by the literature (Curry, 2011; Decker & Pyrooz, 2011, 2015), ISIS is juxtaposed to street gangs using seven characteristics: formation, group structure, demographics, violence and criminality, migration patterns, use of technology, and goals, to illustrate how the criminological literature, specifically gang studies, can better equip scholars and practitioners to address violent extremism, terrorism, and insurgency in an era of globalisation.
... By doing this, it accepts in some ways the challenge proposed by Conway (2016) for an interdisciplinary approach to the study of radicalization and terrorism. Many authors have analyzed ISIS' communication campaigns ( Winter, 2015;Whiteside, 2016;Archetti, 2012) and most of them focused on the importance of online social platforms and the web in general for spreading ISIS' contents ( Archetti, 2015;Aly et al., 2016;Bouchard & Levey, 2015). However, what has gone almost neglected so far, is that the communicative relationship between ISIS and its audiences is characterized by a wide and deep information asymmetry 5 because it occurs in contexts, which, although open to interactivity, are nevertheless based on data uncertainty. ...
Article
Radicalizzazione online e self-radicalization sono aree ancora poco analizzate all'interno della gamma dei fenomeni che conducono all'inasprimento ideologico e all'estremismo violento. In questo articolo, si esploreranno le principali ragioni dello stretto legame tra piattaforme online e pratiche di radicalizzazione e interventi di deradicalizzazione legati alle ideologie di matrice islamista. Le traiettorie di radicalizzazione dipendono da numerose direttrici incrociate: predisposizioni individuali e disposizioni contestuali; motivazioni psicologiche e questioni materiali; rivendicazioni identitarie e moventi politici. In questo senso, la costruzione narrativa delle esperienze, soprattutto dei giovani soggetti di seconda generazione, è determinante nel comprendere gli autoposizionamenti dei soggetti radicali, e nel ricostruire il display delle esperienze individuali. Le piattaforme, e più in generale i media, si configurano quindi come spazio di costruzione della realtà sociale. I mezzi di comunicazione digitali si sono dimostrati particolarmente efficaci nella disintermediazione delle pratiche di partecipazione politica: per quanto riguarda la radicalizzazione, queste si dimostrano rilevanti per finalità strumentali e per utilizzi comunicativi, incidendo sull'organizzazione e sulla socializzazione ai fenomeni radicali, mentre favoriscono la rappresentazione pubblica e la propaganda di tali fenomeni. Seppure il peso maggiore delle dinamiche di radicalizzazione sia imputabile a processi politici e sociali offline, alcune tecnicalità delle piattaforme interferiscono con le dinamiche di polarizzazione. Negli ultimi anni sono nate una serie di iniziative volte a limitare l'impatto delle piattaforme sulla radicalizzazione: queste iniziative coinvolgono attori pubblici, privati e organizzazioni di attori autonomi. Il contrasto della radicalizzazione online deve utilizzare strategie flessibili, contro-narrazioni e media literacy.
Chapter
Nowadays, European ‘homegrown’ Jihadism poses a high security threat and is a top issue on the political agenda of various European countries. Islamist radicalisation, which concerns principally juveniles and young adults, is one source of this, one may argue, ‘new’ form of terrorism that challenges Europe’s societies. Whilst the phenomenon of Islamist radicalisation and its causes has increasingly gained scholarly attention, little systematic knowledge on political policies and preventive measures implemented to counter it exists. This chapter addresses the gap by providing detailed overview of domestic counter-radicalisation strategies and programmes implemented in Germany and France, two countries with a sizeable Muslim population and therefore particularly exposed to the threat posed by violent Islamist extremism. The counter-radicalisation strategies are inspected and compared on the basis of theoretical considerations on the legitimacy of state authority.
Article
In this article the current trends of development of crime of the terrorist character and extremist orientation are investigated. On the basis of data of official statistics the state and structure of crime of terrorist character and extremist orientation are reflected. The tendency of steady growth of relative indicators of crimes of the terrorist character and extremist orientation is noted. Stimulation of activity of the terrorist and extremist organizations in the Russian Federation naturally inspired the further development of criminal and legal measures of counteraction of crime. Novelization of the criminal law has caused extension of the list of crimes of the terrorist character and extremist orientation. The restructuring of standards of the criminal law directed to the strengthening of measures of counteraction to encroachments of the terrorist character and extremist orientation is followed during the modern period mainly by criminalization and penalization of acts. The outlined tendency of growth of the criminal tension interfaced to development of the terrorist and extremist activity is reflected on the types and amount of the sentences imposed by the courts for the specified crimes. Special attention is paid to the measures of counteraction to the crimes of terrorist character and extremist orientation interfaced to an improvement of legal regulation of their prevention, stimulation of the state mechanism of counteraction of activity of the terrorist and extremist organizations, expansion of the international cooperation in the fight against terrorism and extremism. In this regard the structure and activity of federal executive authorities, the system of identification, prevention and suppression of the acts of terrorism and extremism, mechanisms of prevention and counteraction to participation of the Russian citizens in the activity of criminal and terrorist groups abroad are a subject to improvement. Significant measures of security of the citizens and society from destructive information influence from the extremist and terrorist organizations are represented, scientific and technical support of the law-enforcement activity, perspective special means and equipment, the system of vocational training of specialists in the field of ensuring the state and public security.
Article
Full-text available
Security networks are increasing in number and in importance across the security field as a means of providing inter-agency coordination. On the basis of a detailed qualitative study of networks in the field of national security in Australia, this article aims to advance our knowledge of the internal properties of security networks and conditions shaping their performance. It places ‘cooperation’, ‘coordination’ and ‘collaboration’ on a continuum, with cooperation at one end and collaboration at the other end, and aims to illustrate how each of these ‘Cs’ shape the performance of security networks. The central argument is that the performance of security networks increases as the network moves from cooperation to collaboration. Drawing on interviews with senior members of security, law enforcement and intelligence agencies, the article aims to highlight the lessons for how to strategically manage security networks in ways that promote collaboration.
Article
Full-text available
Jihadist terrorism has discovered in the Internet a valuable instrument to strengthen its activities. However, in using this technology the terrorists are exposed to new vulnerabilities. The Internet plays a leveling role: each new advantageous use it brings is accompanied by a new opportunity to weaken terrorist groups. The present article examines the main vulnerabilities of radical groups who have accorded the Internet a central role in their strategy, namely, less anonymity and security, a loss of content visibility, a major credibility problem, and an undermining of the legitimacy of the terrorist discourse as a consequence of their use of Web 2.0.
Article
Full-text available
Article
Full-text available
This article conceptualizes political radicalization as a dimension of increasing extremity of beliefs, feelings, and behaviors in support of intergroup conflict and violence. Across individuals, groups, and mass publics, twelve mechanisms of radicalization are distinguished. For ten of these mechanisms, radicalization occurs in a context of group identification and reaction to perceived threat to the ingroup. The variety and strength of reactive mechanisms point to the need to understand radicalization—including the extremes of terrorism—as emerging more from the dynamics of intergroup conflict than from the vicissitudes of individual psychology.
Article
Full-text available
What are the effects of a group's structure on its violent activities? In this paper, we argue that the structure of an organization plays a crucial role in determining the lethality and frequency of terrorist attacks. Functional differentiation is a primary characteristic of vertically-structured, or hierarchical organizations. This characteristic implies that groups will have specialized units, each charged with producing some service or good. Conversely, organizations that are flatter are composed of units that do not specialize and usually only deliver one type of good. We argue that hierarchy leads to more destructive, lethal attacks by vertical organizations. Vertical organizations are also more likely to be able to sustain attacks over longer periods. We test these hypotheses with a large-N analysis of over 14,000 attacks. We also explore these ideas in a case study of the Basque separatist group, Euskadi Ta Askatasuna (ETA). In both the case study and large-N analysis, we find evidence that group structure matters for the character of violence perpetrated by terrorist organizations. We end by discussing how this theory has broader applicability to non-violent transnational movements.
Book
In the post-September 11 world, Al Qaeda is no longer the central organizing force that aids or authorizes terrorist attacks or recruits terrorists. It is now more a source of inspiration for terrorist acts carried out by independent local groups that have branded themselves with the Al Qaeda name. Building on his previous groundbreaking work on the Al Qaeda network, forensic psychiatrist Marc Sageman has greatly expanded his research to explain how Islamic terrorism emerges and operates in the twenty-first century. In Leaderless Jihad, Sageman rejects the views that place responsibility for terrorism on society or a flawed, predisposed individual. Instead, he argues, the individual, outside influence, and group dynamics come together in a four-step process through which Muslim youth become radicalized. First, traumatic events either experienced personally or learned about indirectly spark moral outrage. Individuals interpret this outrage through a specific ideology, more felt and understood than based on doctrine. Usually in a chat room or other Internet-based venues, adherents share this moral outrage, which resonates with the personal experiences of others. The outrage is acted on by a group, either online or offline. Leaderless Jihad offers a ray of hope. Drawing on historical analogies, Sageman argues that the zeal of jihadism is self-terminating; eventually its followers will turn away from violence as a means of expressing their discontent. The book concludes with Sageman's recommendations for the application of his research to counterterrorism law enforcement efforts. Copyright
Article
This article discusses the importance of trust in furthering crime control partnerships among government agencies. Drawing upon fieldwork undertaken on American and Australian waterfronts, evidence is presented showing that trust played an integral role in shaping interagency partnerships at both sites. In abundance, trust was shown to help build social capital and promote harmonious relationships, whereas when lacking, collaborative activity was stunted. This article examines the successes and failures of partnerships in each case study, and concludes by identifying a range of factors that have been shown to promote trust, build social capital, and enable interagency partnerships to flourish.
Article
The purpose of this article is to inform the debate about strategies and options for countering online radicalization within the U.S. domestic context. Its aim is to provide a better understanding of how the Internet facilitates radicalization; an appreciation of the dilemmas and tradeoffs that are involved in countering online radicalization within the United States; and ideas and best practices for making the emerging approach and strategy richer and more effective. It argues that online radicalization can be dealt with in three ways. Approaches aimed at restricting freedom of speech and removing content from the Internet are not only the least desirable, they are also the least effective. Instead, government should play a more energetic role in reducing the demand for radicalization and violent extremist messages—for example, by encouraging civic challenges to extremist narratives and by promoting awareness and education of young people. In the short term, the most promising way for dealing with the presence of violent extremists and their propaganda on the Internet is to exploit their online communications to gain intelligence and gather evidence in the most comprehensive and systematic fashion possible.
Article
Attempts to profile terrorists have failed resoundingly, leaving behind a poor (and unfair) impression of the potential for a sound psychological contribution to understanding the terrorist. However, recent work in the area has delivered promising and exciting starting points for a conceptual development in understanding the psychological process across all levels of terrorist involvement. Involvement in terrorism is a complex psychosocial process that comprises at least three seemingly distinct phases: becoming involved, being involved—synonymous with engaging in unambiguous terrorist activity—and disengaging (which may or may not result in subsequent de-radicalization). A critical implication of these distinctions is the recognition that each of them may contain unique, or phase-specific, implications for counterterrorism. An argument is made for greater consideration of the disengagement phase with a clearer role for psychological research to inform and enhance practical counterterrorism operations.