scispace - formally typeset
Search or ask a question

Showing papers in "Perspectives on terrorism in 2016"


Journal Article
TL;DR: In this paper, the authors examined 79 European jihadists with criminal backgrounds, examining the relevancy of their criminal pasts in relation to their terrorist future, and found that criminals develop skills that can be useful for them as extremists, such as access to weapons and forged documents.
Abstract: The prevalence of criminal backgrounds amongst European jihadists is remarkable. Whether amongst ‘foreign fighters’ that have travelled to Syria and Iraq, or amongst those involved in terrorism in Europe, criminal pasts are common. Yet, they remain unexamined. This article presents a unique empirical examination of 79 European jihadists with criminal backgrounds, examining the relevancy of their criminal pasts in relation to their terrorist futures. The results fall into four themes. Firstly, jihadism can affect a criminal’s radicalisation process in two ways: it can offer redemption from past sins, or it can legitimise crime. Secondly, prisons offer an environment for radicalisation and networking amongst criminals and extremists. Thirdly, criminals develop skills that can be useful for them as extremists, such as access to weapons and forged documents, as well as the psychological ‘skill’ of familiarity with violence. Finally, white-collar and petty crime is often used to finance extremism. The results challenge conceptions on radicalisation, and can affect counter-terrorism responses.

105 citations


Journal Article
TL;DR: Nesser, Petter; Lia, Brynø. as mentioned in this paper, a typology of Jihadist Networks in a Peripheral European country. But they focus on Norway.
Abstract: Nesser, Petter; Lia, Brynjar. Jihadism in Norway: a Typology of Militant Networks in a Peripheral European Country. Perspectives on Terrorism 2016 ;Volum 10.(6) s. 121-134

77 citations


Journal Article
TL;DR: In this paper, the authors introduce a new dataset covering right-wing terrorism and violence (RTV) incidents in Western Europe between 1990 and 2015, including the most severe types of incidents only, including 190 deadly incidents causing 303 deaths.
Abstract: What is the record of right-wing terrorism and violence (RTV) in Western Europe post-1990? To date, RTV incident data suitable for temporal and cross-national comparisons have been lacking. Consequently, few comparative studies of RTV exist, and we generally have limited knowledge about the most recent evolution of RTV in Western Europe. To help fill these gaps, this article introduces a new dataset covering RTV incidents in Western Europe between 1990 and 2015. Including the most severe types of incidents only, the dataset comprises 578 incidents, including 190 deadly incidents causing 303 deaths. Each incident has been manually researched by the same person and coded on a range of variables, including time and location, perpetrator and victim characteristics, organizational affiliations, weapon types, and number of casualties. The article also proposes six hypotheses aiming to explain the perhaps most puzzling finding emerging from the RTV dataset: that the number of deadly incidents has declined considerably under conditions commonly assumed to stimulate RTV. These conditions include increased immigration, enhanced support to radical right parties, Islamist terrorism, and booming youth unemployment rates.

52 citations


Journal Article
TL;DR: Some of the recent trends in terrorist use of the Dark Web for communication, fundraising, storing information and online material are reported.
Abstract: The terms Deep Web, Deep Net, Invisible Web, or Dark Web refer to the content on the World Wide Web that is not indexed by standard search engines. The deepest layers of the Deep Web, a segment known as the Dark Web, contain content that has been intentionally concealed including illegal and anti-social information. The conventional Surface Web was discovered to be too risky for anonymity-seeking terrorists: they could be monitored, traced, and found. In contrast, on the Dark Web, decentralized and anonymous networks aid in evading arrest and the closure of these terrorist platforms. This paper reports some of the recent trends in terrorist use of the Dark Web for communication, fundraising, storing information and online material.

47 citations


Journal Article
TL;DR: The authors examines the extent to which Islamic State (IS) has affected jihadi terrorism in Europe and examines the scope of attack activity, perpetrators and their networks, modus operandi and funding.
Abstract: The article examines the extent to which Islamic State (IS) has affected jihadi terrorism in Europe. We look at the scope of attack activity, perpetrators and their networks, modus operandi and funding. For all the talk of a new threat we argue that, apart from scope, less is new than most assume. IS wants largely the same as al-Qaida did by attacking Europe. Their tactics are similar and their networks overlap in time and space. The core dynamics of the threat endure. It is premature to talk of a new paradigm in recruitment, but more terrorists are instructed online than before. Patterns in funding remain relatively stable, but there is an increase in plots financed from abroad. Despite military setbacks, IS remains a formidable terrorist actor, with territorial control, economic muscle and thousands of Europeans in its ranks. These things, combined with the group’s skillful social media usage, are exhausting European security services’ capacities. So is the refugee situation, which is exploited by IS to transfer personnel. If IS’s territorial control persists, we foresee attempts at large-scale operations, including attempts at using improvised chemical or radiological devices. If IS continues to lose ground, small-scale attacks by single actors will become even more frequent.

40 citations


Journal Article
TL;DR: In this article, a closer look at what Telegram is, and how IS uses it for different purposes: not only operationally, but also for identity building, as well as for recruiting and guiding attackers in Europe.
Abstract: Groups such as al-Qaida (AQ) have pursued spectacular attacks to garner media attention and popularize their cause. What is often not noted, however, is that for those who submit themselves to the religious thinking of al-Qaida – and nowadays the self-designated “Islamic State” (IS) – the militant struggle is intertwined with the duty to call upon others to join the movement (da’wa). For jihadists da’wa is obligatory. While AQ’s central organization pioneered the use of bulletin forums, blogs, YouTube and to some extent Facebook, for this and other purposes, it was its Syrian branch, Jabhat al-Nusra, that in 2012 pushed effectively into Twitter use. AQ lost its momentum as the social media pioneer of jihadism shortly thereafter to IS. Since 2013, IS has taken the use of social media da’wa and other activities to the next level. From that point onward IS has very effectively projected influence on Twitter on a massive scale, reaching a global audience. Since early 2016, however, IS’s networks on Twitter have been degraded by various counter-measures, but the group has reconfigured and shifted to a new social media outlet: Telegram. This application has become the most important information outlet for IS and has been used to recruit and guide attackers in Europe. This article takes a closer look at what Telegram is, and how IS uses it for different purposes: not only operationally, but also for identity building.

32 citations


Journal Article
TL;DR: Ateniese et al. as discussed by the authors presented a ten-year forecast for jihadism in Europe and found that violent Islamist activity in Europe may increase further over the long term due to four macro-trends: 1) expected growth in the number of economically underperforming Muslim youth, 2) expected growing number of available jihadi entrepreneurs, 3) persistent conflict in the Muslim world, and 4) continued operational freedom for clandestine actors on the Internet.
Abstract: This article presents a ten-year forecast for jihadism in Europe. Despite reaching historically high levels in recent years, violent Islamist activity in Europe may increase further over the long term due to four macro-trends: 1) expected growth in the number of economically underperforming Muslim youth, 2) expected growth in the number of available jihadi entrepreneurs, 3) persistent conflict in the Muslim world, and 4) continued operational freedom for clandestine actors on the Internet. Over the next decade, the jihadi attack plot frequency in Europe may follow a fluctuating curve with progressively higher peaks. Many things can undercut the trends and lead to a less ominous outcome, but the scenario is sufficiently likely to merit attention from policymakers.

26 citations


Journal Article
TL;DR: In this paper, the authors present four types of evidence to demonstrate the existence of facilitation, including three case studies of French foreign fighters who traveled to fight or train abroad between 1992 and 2014.
Abstract: How do foreign fighters access the battlefield? Research has found that social networks are important for joining groups involved in violence. Foreign fighters have no such connections to a conflict at its outset and present potential security risks to the insurgent entity. Facilitation, a mechanism, bridges the gap between the local and transnational, helping resolve a potential security dilemma. This article presents four types of evidence to demonstrate the existence of facilitation, including three case studies of French foreign fighters who traveled to fight or train abroad between 1992 and 2014. Facilitation has an emergent quality: it is not, necessarily, present at the beginning of a mobilization, but arises as would-be volunteers seek to connect to the battlefield. The initial connections are contingent and may become more stable over time, but they can be challenged and forced to re-emerge if networks are targeted and neutralized. This article contributes to the existing foreign fighter literature by identifying and explaining the functioning of a mechanism within the foreign fighter mobilization process.

22 citations


Journal Article
TL;DR: In this article, the authors highlight the changes to the United Kingdom's Prevent Strategy under the 2011 Prevent Strategy and the recent passage of the Counterterrorism and Security Act of 2015 that were made partly to promote the monitoring and evaluation of Prevent.
Abstract: Given the infancy of countering violent extremism (CVE) initiatives, within the CVE literature there has been a push towards understanding the effectiveness of these initiatives. CVE scholars and practitioners have attempted to construct metrics and frameworks that can be used in the field for evaluation purposes. This Research Note highlights the changes to the United Kingdom’s Prevent Strategy under the 2011 Prevent Strategy and the recent passage of the Counterterrorism and Security Act of 2015 that were made partly to promote the monitoring and evaluation of Prevent. Although the search for metrics and frameworks to use for evaluation has been ongoing, this Research Note emphasizes the potential drawbacks that can arise from the push towards the standardization of CVE programs. Using insights from interviews, this Research Note outlines these changes, explores the possible reasons behind the changes, and analyzes the potential implications for the communities where Prevent is implemented. This research is part of a broader dissertation project that examines the implementation of CVE programs and public perception surrounding these programs within the United Kingdom and United States.

21 citations


Journal Article
TL;DR: In this article, the authors presented the outcome of a project that looked at the personal characteristics of lone-actor terrorists, which was part of the larger Countering Lone-Actor Terrorism (CLAT) project.
Abstract: This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of (potentially) violent lone-actors based on an analysis of 120 cases from across Europe. The Research Note focuses on the personal characteristics of lone-actor terrorists.[1] First of all, it presents the main findings of the general analysis of the study into personal variables of lone-actor terrorists. Subsequently, the authors outline a set of recommendations based on the key findings. In the beginning, we present the main research questions of the CLAT project and the working definition of lone-actor terrorism.

21 citations


Journal Article
TL;DR: The Islamic State, despite its longevity, prolific media enterprise, and high profile, escapes easy definition by policymakers, academics, and the media as mentioned in this paper, and an examination of the movement using Mao's revolutionary warfare framework, particularly his three stages of conflict, provides a more holistic view of the organization for both understanding and action.
Abstract: The Islamic State, despite its longevity, prolific media enterprise, and high profile, escapes easy definition by policymakers, academics, and the media. An examination of the movement using Mao’s revolutionary warfare framework, particularly his three stages of conflict, provides a more holistic view of the organization for both understanding and action. As part of an exploration, Islamic State captured documents and press releases were examined to establish the innovations and breadth of its adaptation of Maoist principles of guerilla warfare and the evolution of the theoretical influences on the doctrine from previous Salafi-militant experiences and publications. This research provides valuable insight into the return of a powerful method of insurgency as well as a glimpse into the vast pseudo-clandestine insurgency that is the Islamic State movement.

Journal Article
TL;DR: In this paper, the authors argue that central government needs multiple, diverse local and civil society partners to mobilize the knowledge and resources needed to differentiate from case to case, and suggest that public administration research into governance networks offers a useful lens on the practical challenges, limits, and opportunities of working against violent extremism in such a broad coalition of actors.
Abstract: It is often noted that one-size-fits all solutions are unlikely to work when it comes to countering violent extremism. This research note argues that central government needs multiple, diverse local and civil society partners to mobilize the knowledge and resources needed to differentiate from case to case. It suggests that public administration research into governance networks offers a useful lens on the practical challenges, limits, and opportunities of working against violent extremism in such a broad coalition of actors.

Journal Article
TL;DR: An examination of the ISIS phenomenon, comparing it with that generated a decade and a half earlier by al-Qaeda, can be found in this paper, where the authors argue that although the vicious group certainly presents a threat to the people under its control and although it can contribute damagingly to the instability in the Middle East that has followed serial interventions by the American military, it scarcely presents a challenge to global security.
Abstract: An examination of the ISIS phenomenon, comparing it with that generated a decade and a half earlier by al-Qaeda. Although the vicious group certainly presents a threat to the people under its control and although it can contribute damagingly to the instability in the Middle East that has followed serial interventions there by the American military, it scarcely presents a challenge to global security. Moreover, the group is in very considerable decline in its key areas, Syria and particularly Iraq. As with al-Qaeda, however, the unwarranted fear and alarm ISIS has generated is likely to persist even if the group is effectively extinguished as a physical force in the Middle East.

Journal Article
TL;DR: In this article, the implications of criminalised Muslim Diaspora community members from the West travelling to the Middle East and becoming involved in the terrorist activities of the Islamic State (IS), and ultimately returning from whence they came were considered.
Abstract: This article considers the implications of criminalised Muslim Diaspora community members from the West travelling to the Middle East and becoming involved in the terrorist activities of the Islamic State (IS), and ultimately returning from whence they came It also reflects on the differences over time amongst the profile of recruits that have taken place since the time of the Mujahedeen in Afghanistan, to the ascendancy of IS Recent research indicates both terrorist and organised crime groups draw recruits from the same Diaspora communities, a position supported in this article While the focus of law enforcement and media attention appears to be on the potential of Islamic State Middle East veterans committing terrorist acts in the West on returning from conflict zones, there may well be a pervasive danger of them bringing significant risk to their countries of origin through enhanced participation in organised crime The views of a selection of recently retired police professionals were gathered, and were found to support concerns around this potential significant and dangerous outcome of homecoming foreign fighters

Journal Article
TL;DR: The European Radicalisation Awareness Network (RAN) as mentioned in this paper is an EU-wide umbrella network of practitioners engaged to prevent and counter radicalisation to violent extremism, which was set up by the European Commission as a hub in connecting, developing and disseminating expertise.
Abstract: The following text is a slightly expanded version of the author’s introduction to a panel titled ‘Next Wave of Research Topics and Themes’ held at the end of a Research Seminar on ‘Radicalisation: From Theory to Practice’. It was held on 13-14 April 2016 in Vienna, Austria, and organised by the European Radicalisation Awareness Network. RAN was set up in 2010 by the European Commission as an EU-wide umbrella network of practitioners engaged to prevent and counter radicalisation to violent extremism. Its Centre of Excellence (RAN CoE) acts as a hub in connecting, developing and disseminating expertise and seeks to develop state-of-the-art knowledge.

Journal Article
TL;DR: In this article, the authors present the outcome of an investigation into the processes of lone-actor terrorism which was part of the Countering Lone-Actor Terrorism (CLAT) Project, based on a database of both plots and attacks across the twenty-eight EU member states, plus Norway and Switzerland, in the period 1 January 2000 to 31 December 2014.
Abstract: This Research Note presents the outcome of an investigation into the processes of lone-actor terrorism which was part of the Countering Lone-Actor Terrorism (CLAT) Project. The research is based on a database of both plots and attacks across the twenty-eight EU member states, plus Norway and Switzerland, in the period 1 January 2000 to 31 December 2014. The database covers more than 70 variables and includes information relating to 120 individuals. This Research Note outlines some of the key findings of the CLAT project pertaining to 1) attack methodology and logistics; 2) political engagement and online activity and 3) leakage and interactions with authorities. The results relating to the personal characteristics of lone-actor terrorists are presented in a different Research Note in this issue of Perspectives on Terrorism.

Journal Article
TL;DR: In this paper, the socio-demographic profile of Bangladeshi militants was examined by examining their socio-empirical profiles, revealing that significant numbers of militants are well-educated and come from a middle class background.
Abstract: Bangladesh has attracted international media attention for heightened militant activities in 2015, particularly after a series of killings of bloggers by a local militant group allegedly associated with Al Qaeda in the Indian Subcontinent (AQIS) and after murders of foreign nationals, responsibility of which was claimed by the Islamic State (IS). Islamist militant groups in Bangladesh which emerged in the 1990s have undergone several transformations. Originally grown out of the volunteers who joined the Afghan war against the Soviet Union, these groups have since then taken different shapes. Since the 1990s, five ‘generations’ of militant groups appeared on the scene. In some measures, the militant groups have come full circle: they began as a result of a global agenda fighting an ‘atheist’ Communist system (war against the Soviet Union in Afghanistan) to now being part of establishing a global ‘khilafat’ (by joining the IS in Syria and Iraq) via pursuing a circumscribed local agenda for a period in the early 2000s. Despite such transformations, very little is known about the Bangladeshi militants. This article attempts to address this lacuna by examining the socio-demographic profile of Bangladeshi militants arrested between July 2014 and June 2015. The findings reveal a significant diversity among the militants. Contrary to public perceptions in Bangladesh, significant numbers of militants are well-educated and come from a middle class background.

Journal Article
TL;DR: This paper found that the very idea of an Islamic State seems to have a significant pull effect on Danish jihadi-travellers, being a driving force in the radicalization process, in the recruitment to jihadist organizations, and on the battlefield.
Abstract: While several studies of radicalization processes and recruitment to jihadi organizations have been undertaken in European countries, very few are based on interviews with foreign fighters that have been fighting in Syria and/or Iraq. Hence, actual knowledge about the foreign fighters’ inner narratives and motivations remain scarce. This article aims to shed light on how foreign fighters from jihadi organizations in Syria and/or Iraq understand their own actions and behaviour, and what we might overlook when designing counter radicalization measures. Drawing upon 16 in-depth interviews with returned and current foreign fighters from Denmark, the study suggests that while many previous studies emphasize the role of structural socio-economic factors in pushing foreign fighters to travel, several pull factors–some rather counter-intuitive–are also at play. Thus, the very idea of an Islamic State seems to have a significant pull effect on Danish jihadi-travellers, being a driving force in the radicalization process, in the recruitment to jihadist organizations, and on the battlefield.

Journal Article
TL;DR: This article argued that the appalling economic conditions experienced by these young people makes them prime targets for recruitment into fanatical religious groups such as Boko Haram, or into one or another of the political/criminal gangs that proliferate in northern Nigerian cities.
Abstract: Street children, many of whom are ‘almajirai’, are part of a vast underclass that populates the cities of Northern Nigeria Many of these children and young adults have no means of support other than begging for their daily food, petty crime or providing casual labor For the most part illiterate, they have few educational skills that would allow them to function in a modern economy This article argues that the appalling economic conditions experienced by these young people makes them prime targets for recruitment into fanatical religious groups such as Boko Haram, or into one or another of the political/criminal gangs – generically called the ‘Yan Daba’–that proliferate in northern Nigerian cities It further argues that the underclass from which these young people emerge is the direct consequence of the failed governance of the parasitic predator class that dominates the post-colonial Nigerian state This, in turn, makes attempts at de-radicalization and bolstering the security forces doomed to failure – unless there are far-reaching social reforms that would undermine the very class that dominates the post-colonial state

Journal Article
TL;DR: In this article, a discussion on the potential fallout of the foreign fighters phenomenon by examining three particular dimensions: the physical threat (including the terrorist threat), ideological consequences, and societal consequences is presented.
Abstract: The foreign fighter phenomenon in Syria and Iraq has led to many worries about the potential negative consequences that might occur in the near future. The scenario of returned foreign fighters launching attacks in the West is by far the most prominent one. This article aims to broaden the discussion on the potential fallout of the phenomenon by examining three particular dimensions: the physical threat (including the terrorist threat), ideological consequences, and societal consequences. After presenting these dimensions, three historical cases of jihadi foreign fighting (Afghanistan, Bosnia and Somalia) are examined to see to what extent different types of fallout materialized. The final part of the article attempts to gauge which indicators or signs of potential fallout are already observable in the case of the on-going conflict in Syria and Iraq. If we seek to prepare ourselves for the future fallout of today’s foreign fighter phenomenon, we must look beyond the terrorist threat.

Journal Article
TL;DR: In this paper, the authors leverage more than 40 years of event data from the Global Terrorism Database among organizations that carried out terrorist attacks between 1970 and 2013 using descriptive statistics, and critically evaluate the implications of large-N analyses and illustrate their strengths and limitations.
Abstract: To better understand why perpetrator organizations desist from terrorist violence, we must first understand how perpetrator organizations desist from terrorist violence Here, I aim to improve our empirical understanding of patterns of collective desistance from terrorism in support of a robust research agenda to advance theory and policy on this topic I discuss two key challenges for empirical analysis of collective desistance from terrorism: operationalization of perpetrator organizations, and operationalization of collective desistance To illustrate these challenges, I leverage more than 40 years of event data from the Global Terrorism Database among organizations that carried out terrorist attacks between 1970 and 2013 Using descriptive statistics, I critically evaluate the implications of large-N analyses and illustrate their strengths and limitations

Journal Article
TL;DR: In this article, the authors explored four psychosocial religious factors that may help researchers conceptualize and explain why religious terrorism is predominantly Islamic and found that religious involvement does not appear significantly higher in Muslims than among other religious believers.
Abstract: This article explores four psychosocial religious factors that may help researchers conceptualize and explain why religious terrorism is predominantly Islamic. Empirical work supports a link between individual differences in fundamentalism and out-group hostility. Combined with significantly higher self-reported fundamentalism among Muslims compared to adherents of other major religious groups, Muslims may be more susceptible to religious appeals to violence. This may be especially true when these appeals are minimally counterintuitive. Religious involvement has been suggested to cause coalitional commitment, which may relate to more hostile behavior to outsiders; however, religious involvement does not appear significantly higher in Muslims than among other religious believers. Religious commitment may relate to a stronger desire to protect one’s religious group through enhancing perceptions of threat. This has importance in the Islamic world due to the possibility of higher average religious commitment compared to other religious groups and the current political environment that often challenges the self-concept of Islamic believers. Finally, homogenization of Islamic beliefs is considered as an intergroup difference that may enhance social-psychological processes of intergroup conflict. Together, a broader emphasis on psychosocial religious factors may help explain the current rise of Islamic terrorism within the current political context of Islamic-West relations.

Journal Article
TL;DR: In this paper, the authors apply the concepts of hybrid war, compound war, fourth generation warfare and unrestriced warfare to the confrontation between the state and its Islamist challenger in order to analyze the nature of the conflict between Nigeria and Boko Haram.
Abstract: The activities of Boko Haram in the North-Eastern part of Nigeria have highlighted the need for more effective counter-strategies. Nigeria’s difficulties in defeating Boko Haram has security ramifications that go beyond its borders, especially for West Africa. Much has been written about the origins of Boko Haram. However, thus far there has been little analysis of the nature of the conflict between Nigeria and Boko Haram. It is this lacuna that this article seeks to address by applying the concepts of hybrid war, compound war, fourth generation warfare and unrestriced warfare to the confrontation between the state and its Islamist challenger.

Journal Article
TL;DR: In this paper, the authors compare the Islamic State to another terrorist organization, the Sendero Luminoso of Peru, to understand the forces that gave rise to them, sustained them, and ultimately led to their demise.
Abstract: The threat posed by the Islamic State[1] is frequently described as unprecedented and unique. Measured by the size of territory it once controlled, its wealth in terms of cash on hand and access to modern military material, and in its shocking brutality, the Islamic State has broken new ground as a terrorist organization. However, the Islamic State is not simply a terrorist organization, but is also a well-equipped insurgent army, and a quasi-state that seized and–with qualified success–operated the bureaucratic institutions of the territories it captured. The Islamic State is often contrasted with its ideological predecessor and operational competitor, al-Qaeda. Highlighting how these organizations differ is helpful in developing effective means of confronting them. In this article, we compare the Islamic State to another terrorist organization the Sendero Luminoso of Peru, to help understand the forces that gave rise to them, sustained them, and ultimately led to Sendero’s demise. Through this comparative analysis, we argue that understanding the Islamic State, not simply as a terrorist organization but also as a social movement, allows us to contextualize its violence within patterns evinced by other violent social movements. This approach will also allow us to better understand how the Islamic State might eventually end. Although the military defeat of the Islamic State may be inevitable, the socio-political conditions that gave rise to and sustained it will likely remain and its remnants may very well present a “traditional” terrorist threat for years to come.

Journal Article
TL;DR: The authors argue that the fundamental disconnect between the preferences of the American public and the actions of the current administration can in part be explained by media framing of Daesh, and find that there is an inherent disconnect between public perceptions of the threat posed by Daesh and the response to Daesh being pursued by the Administration.
Abstract: The actual structures and motivations of terrorist organizations like Daesh (aka. IS, ISIS, ISIL) are often invisible to the general public, and given their clandestine nature, often opaque to all external actors (including governments, militaries, and others). For the general public, the ‘picture’ of terrorism and terrorist organizations is often painted by the media, with media framing having a direct influence on the American public’s understanding of the global terrorist threat, and in turn on the policies and actions the public expects and wants in response. We argue that the central disconnect between the preferences of the American public and the actions of the current administration – a disconnect that we argue did not exist in relation to al Qaeda – can in part be explained by media framing of Daesh. We compare media representations of Daesh, and al Qaeda, with a specific focus on the time period between January 1, 2013 and December 31, 2014 and find that Daesh has been framed as an existential threat, derivative of its framing as a singularly motivated militaristic group. Because of this framing, there is an inherent disconnect between public perceptions of the threat posed by Daesh and the response to Daesh being pursued by the Administration.

Journal Article
TL;DR: This article found that the presence of a known foreign fighter increases the likelihood of detection and disruption by law enforcement officials, and that plots carried out with American returnees from Islamist insurgencies abroad decrease the likelihood that a plot will come to fruition.
Abstract: Do Americans who return home after gaining experience fighting abroad in Islamist insurgencies pose a greater risk than homegrown jihadi militants with no such experience? This study looks at the net effect of foreign fighters on domestic plots in the US by disaggregating data from the Jihadi Plots in the West dataset. It finds that the presence of a returnee decreases the likelihood that an executed plot will cause mass casualties. Also, plots carried out with American returnees from Islamist insurgencies abroad decrease the likelihood that a plot will come to fruition. This may be because the presence of a known foreign fighter increases the likelihood of detection and disruption by law enforcement officials. The US as a case study may not be generalizable to other Western countries because of its unique geographic position and its longer experience of prosecuting would-be foreign fighters.

Journal Article
TL;DR: In this paper, former double agent Morten Storm can serve as a unique case study for academics and security practitioners wishing to understand the turbulent path that led a young Danish man to turn into a Muslim, later on embrace violent jihad, and ultimately work for four different Western intelligence agencies in the War on Terror.
Abstract: This interview with former double agent Morten Storm can serve as a unique case study for academics and security practitioners wishing to understand the turbulent path that led a young Danish man to turn into a Muslim, later on embrace violent jihad, and ultimately work for four different Western intelligence agencies in the War on Terror. The interview identifies the struggles of a man in search of identity and belonging. It provides unique insights into the world of violent jihad and offers an understanding of the key role played by double agents in disrupting international terrorist networks. The interview further highlights the operational challenges inherent in cooperating with different Western intelligence agencies and the personal challenges underpinning undercover operations.

Journal Article
TL;DR: A census project based on continuous monitoring of IS execution visuals is initiated, aiming to fill the gap in regular monitoring of camera-registered extrajudicial executions covering all locations of the group's geographically scattered provincial system.
Abstract: The “Islamic State” (IS / ISIS / ISIL / Daesh)’s visually documented executions, particularly those involving Western victims, have been receiving tremendous attention by international mass media. Yet, much of the Western reporting focuses on the barbaric nature of the displayed violence (neglecting other important aspects of the propaganda technique) and disproportionately covers executions of Western victims, while similar killings of local people are under-reported. No regular monitoring of camera-registered extrajudicial executions covering all locations of the group's geographically scattered provincial system is available to date. Aiming to fill this gap, the author initiated a census project based on continuous monitoring of IS execution visuals. The author plans to regularly update the census in the period ahead. Please note that updates are not limited to new incidents but may also affect past records, if previously unknown information on execution incidents arises. A Twitter account @CountingLivesPT has been set up in order to notify readers about updates and for providing additional information on the subject (e.g., links to secondary literature). To access the census, download and unzip the DATA file provided below. For a project description (including methods), access the text file (HTML or PDF) provided below.

Journal Article
TL;DR: In this paper, the authors present a framework for mapping the radicalization and mobilization pathways of radicalized Western Muslims into becoming foreign fighters in Syria to engage in insurgent and terrorist activities or to decide to return to carry out such attacks in their home countries.
Abstract: This Research Note presents a framework for mapping the radicalization and mobilization pathways of radicalized Western Muslims (who represent a small proportion of their countries’ overall Muslim populations) into (1) becoming foreign fighters in Syria to engage in insurgent and terrorist activities or to decide to return to carry out such attacks in their home countries, (2) becoming radicalized in the West by these jihadist organizations and their local surrogates to carry out terrorist attacks in their own home countries without leaving them, and, to validate the framework’s preemptive counter-measures, (3) becoming radicalized into deciding to become jihadi fighters in Syria but being prevented from traveling there either at border crossing points, such as Turkey, or through other preventative measures at various stages of their mobilization in their home countries. To accomplish these objectives, the framework presents five categories that characterize such trajectories, which are broken down into thirteen factors, with each factor marked by critical points for preemptive intervention by government security services.

Journal Article
TL;DR: In this article, the authors show which narrative elements were used during previous violence-inciting apocalyptic manifestation in Christianity and Western ideology and how they can be retraced in the communications and enactments of Islamic State.
Abstract: Islamic State uses an age old apocalyptic narrative to attract followers and legitimatize its existence This research note show which narrative elements were used during previous violence-inciting apocalyptic manifestation in Christianity and Western ideology and how they can be retraced in the communications and enactments of Islamic State The use of such narratives explains why the movement has been so much more powerful in attracting followers than al-Qaeda Based on historical experience the prospects of fighting such a movement without annihilating it are gloomy, the more so as apocalyptic movements have a tendency to provoke a confrontation with their opponents as a manifestation of the promised final battle between the forces of Good and Evil which will produce the salutary end state, both of which are central ele