Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701334_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nicholas Khoo Author-X-Name-First: Nicholas Author-X-Name-Last: Khoo Title: Engaging China, With Strings Attached Journal: Studies in Conflict & Terrorism Pages: 151-154 Issue: 2 Volume: 23 Year: 2000 X-DOI: 10.1080/105761000265584 File-URL: http://hdl.handle.net/10.1080/105761000265584 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:2:p:151-154 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701335_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Book Reviews Journal: Studies in Conflict & Terrorism Pages: 155-160 Issue: 2 Volume: 23 Year: 2000 X-DOI: 10.1080/105761000265593 File-URL: http://hdl.handle.net/10.1080/105761000265593 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:2:p:155-160 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701332_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lorenzo Valeri Author-X-Name-First: Lorenzo Author-X-Name-Last: Valeri Title: Securing Internet Society: Toward an International Regime for Information Assurance Abstract: The Internet is rapidly changing how states and international businesses operate and deliver services and goods to citizens and customers. This global information medium, however, has also become the vehicle for a new set of malicious activities carried out by hackers, terrorists, and rogue states. This article discusses a possible course of action to counter this growing international security threat: the development of an international regime for information assurance. Still, this regime cannot arise exclusively from the cooperative efforts of national government, but requires the active involvement of international businesses. This article, therefore, postulates that this regime can arise only if states and international businesses fully appreciate their respective interests in the areas of information security and assurance. Journal: Studies in Conflict & Terrorism Pages: 129-146 Issue: 2 Volume: 23 Year: 2000 X-DOI: 10.1080/105761000265566 File-URL: http://hdl.handle.net/10.1080/105761000265566 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:2:p:129-146 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701333_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Karin Von Hippel Author-X-Name-First: Karin Author-X-Name-Last: Von Hippel Title: Land Cruising the Road to Hell Journal: Studies in Conflict & Terrorism Pages: 147-150 Issue: 2 Volume: 23 Year: 2000 X-DOI: 10.1080/105761000265575 File-URL: http://hdl.handle.net/10.1080/105761000265575 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:2:p:147-150 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701330_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Peter Chalk Author-X-Name-First: Peter Author-X-Name-Last: Chalk Title: Southeast Asia and the Golden Triangle's Heroin Trade: Threat and Response Abstract: The Golden Triangle of Southeast Asia lies at the heart of the global heroin trade, accounting for roughly 60 percent of all illicit opium production. Narcotics from this part of the world have had an insidious, corrosive, far reaching and, at times, highly destabilizing impact. In particular, they have been linked to an explosion of AIDS, social instability, a lack of economic performance, official corruption and the growing force of organized crime. These effects have been felt, in one form or another throughout Southeast Asia, North America, Australasia, and Northeast Asia. Dealing with the threat posed by the Golden Triangles heroin trade will require a fully inclusive strategy that emphasizes both supply disruption and demand reduction. While certain Southeast Asian states have pledged to intensify the scope and effectiveness of their drug policies, official apathy is widespread and continues to mitigate against effective counter-measures. Journal: Studies in Conflict & Terrorism Pages: 89-106 Issue: 2 Volume: 23 Year: 2000 X-DOI: 10.1080/105761000265548 File-URL: http://hdl.handle.net/10.1080/105761000265548 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:2:p:89-106 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701331_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Andrew Silke Author-X-Name-First: Andrew Author-X-Name-Last: Silke Title: Drink, Drugs, and Rock'n'Roll: Financing Loyalist Terrorism in Northern Ireland — Part Two Abstract: Though the main loyalist groups have now been observing cease-fires for nearly five years, the fund-raising activities of these organizations has continued unabated. Following from the previous article on this subject, this paper gives an account of the various fund-raising methods which are currently being used by the loyalists. Particular attention is focused on the controversial topic of drug dealing. Related to this topic, the article considers in detail the emergence in 1996 of the splinter group, the Loyalist Volunteer Force (LVF). The rise and subsequent fall of this faction provides a telling case study in the importance of understanding the fund-raising methods and policies of terrorist groups. The article concludes that the financial dimension to terrorism in Northern Ireland presents an as yet unrecognized and extremely serious obstale to lasting peace. Journal: Studies in Conflict & Terrorism Pages: 107-127 Issue: 2 Volume: 23 Year: 2000 X-DOI: 10.1080/105761000265557 File-URL: http://hdl.handle.net/10.1080/105761000265557 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:2:p:107-127 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701340_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: J. J. Widen Author-X-Name-First: J. J. Author-X-Name-Last: Widen Title: Contemplating a New Strategic Future Journal: Studies in Conflict & Terrorism Pages: 215-219 Issue: 3 Volume: 23 Year: 2000 X-DOI: 10.1080/105761000412797 File-URL: http://hdl.handle.net/10.1080/105761000412797 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:3:p:215-219 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701338_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gavin Cameron Author-X-Name-First: Gavin Author-X-Name-Last: Cameron Title: Freedom, Hate, and Violence on the American Right Journal: Studies in Conflict & Terrorism Pages: 197-204 Issue: 3 Volume: 23 Year: 2000 X-DOI: 10.1080/105761000412779 File-URL: http://hdl.handle.net/10.1080/105761000412779 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:3:p:197-204 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701339_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Paul Dixon Author-X-Name-First: Paul Author-X-Name-Last: Dixon Title: Understanding Unionism: Ideology and Politics Journal: Studies in Conflict & Terrorism Pages: 205-213 Issue: 3 Volume: 23 Year: 2000 X-DOI: 10.1080/105761000412788 File-URL: http://hdl.handle.net/10.1080/105761000412788 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:3:p:205-213 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701336_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ryan C. Hendrickson Author-X-Name-First: Ryan C. Author-X-Name-Last: Hendrickson Title: American War Powers and Terrorists: The Case of Usama Bin Laden Abstract: During the Cold War, observers of American politics noted that an imperial presidency developed in regards to the decision to use force abroad. Although the Constitution and the War Powers Act of 1973 grant significant war powers to the Congress, Congress largely deferred and abdicated these powers to the commander in chief, as the President asserted essential unlimited constitutional authority. This practice held true when the United States used force against terrorist actors, such as President Ronald Reagans strikes against Muammar Qaddafi. However, President Clintons strikes against Usama Bin Laden represent a different example of the war powers interplay. Domestic political considerations for Clinton and the nature of the United States target presented new incentives and an unprecedented case of much closer consultation with Congress prior to using force. Journal: Studies in Conflict & Terrorism Pages: 161-174 Issue: 3 Volume: 23 Year: 2000 X-DOI: 10.1080/105761000412751 File-URL: http://hdl.handle.net/10.1080/105761000412751 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:3:p:161-174 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701337_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ayla Hammond Schbley Author-X-Name-First: Ayla Hammond Author-X-Name-Last: Schbley Title: Torn Between God, Family, and Money: The Changing Profile of Lebanon's Religious Terrorists Abstract: Based upon this researcher's prior work and the conceptual denouement from geocultural immobility to religious terrorism, the author speculates that the reverse may be achieved and a zealot's motivation for religious terrorism might be purged once his or her basic Moslovian needs are fulfilled. Thus, this article attempts to empirically assess in some elements of Hizbullah, the effect of newly found wealth, money, and family exigencies on the Lebanese Shi'a's religious zealotry, his or her perceived religious commitments, and their acts of terrorism. This research concluded that Hizbullah in Lebanon, an organization originally established as a religious network with narrowly defined politico-socioeconomic goals, has eroded. Many of its individual cells now serve primarily their own self-interest instead of their perception of God's will. These cells are defying Hizbullah's main leadership wishes and committing criminal actions designed to serve cell or family interests. Its sophisticated network is already being used to transport and harbor criminals across the Mid-East and Europe. This research stress that the well-established Hizbullah cell organizations that protect each and every element and coordinate with other terrorist organizations are ripe to be exploited for international criminal activities. More importantly, this research attempts to explain and delineate the process by which nations may manage, control, reform, or even eliminate such international affliction. Journal: Studies in Conflict & Terrorism Pages: 175-196 Issue: 3 Volume: 23 Year: 2000 X-DOI: 10.1080/105761000412760 File-URL: http://hdl.handle.net/10.1080/105761000412760 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:3:p:175-196 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701341_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: John E. Peters Author-X-Name-First: John E. Author-X-Name-Last: Peters Title: Book Reviews Journal: Studies in Conflict & Terrorism Pages: 221-234 Issue: 3 Volume: 23 Year: 2000 X-DOI: 10.1080/105761000412805 File-URL: http://hdl.handle.net/10.1080/105761000412805 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:3:p:221-234 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701345_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Book Reviews Journal: Studies in Conflict & Terrorism Pages: 289-304 Issue: 4 Volume: 23 Year: 2000 X-DOI: 10.1080/10576100050174995 File-URL: http://hdl.handle.net/10.1080/10576100050174995 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:4:p:289-304 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701343_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rachel Monaghan Author-X-Name-First: Rachel Author-X-Name-Last: Monaghan Title: Single-Issue Terrorism: A Neglected Phenomenon? Abstract: The willingness of some single-issue groups to use violence in the pursuit of their cause has received surprisingly little attention within the literature on terrorism. This article seeks to add to our understanding of this phenomenonnamely that of single-issue terrorismby focusing on the increasing tendency of groups within the British animal rights movement to utilize violent methods in order to achieve their objectives. The article will seek to further the argument that some single-issue groups have been willing to use violence in past campaigns, thereby highlighting the understudied nature of the phenomenon. This will be illustrated by examining the campaign of single-issue terrorism undertaken by the militant suffragettes in Britain in the 1910s. Journal: Studies in Conflict & Terrorism Pages: 255-265 Issue: 4 Volume: 23 Year: 2000 X-DOI: 10.1080/10576100050174977 File-URL: http://hdl.handle.net/10.1080/10576100050174977 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:4:p:255-265 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701344_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Andrew Tan Author-X-Name-First: Andrew Author-X-Name-Last: Tan Title: Armed Muslim Separatist Rebellion in Southeast Asia: Persistence, Prospects, and Implications Abstract: The persistence of armed Muslim separatist rebellion in Southeast Asia is demonstrated by the ongoing rebellions in Aceh and Mindanao. A strong regional identity infused with Islam has been a binding factor in these separatist movements. Their persistence demonstrates the failure of Indonesia and the Philippines in achieving legitimacy for their post-independence political structures as well as continued internal weakness. The prospects for their quick and peaceful resolution are not good. The external dimension of Muslim separatism has heightened mistrust among states in the region and raised apprehensions over the broader issue of Islamic fundamentalism and the implications for the region should Aceh and Mindanao achieve secession. Journal: Studies in Conflict & Terrorism Pages: 267-288 Issue: 4 Volume: 23 Year: 2000 X-DOI: 10.1080/10576100050174986 File-URL: http://hdl.handle.net/10.1080/10576100050174986 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:4:p:267-288 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701342_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Samuel Peleg Author-X-Name-First: Samuel Author-X-Name-Last: Peleg Title: Peace Now or Later?: Movement–Countermovement Dynamics and the Israeli Political Cleavage Journal: Studies in Conflict & Terrorism Pages: 235-254 Issue: 4 Volume: 23 Year: 2000 X-DOI: 10.1080/10576100050174968 File-URL: http://hdl.handle.net/10.1080/10576100050174968 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:23:y:2000:i:4:p:235-254 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701358_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Shawn McHale Author-X-Name-First: Shawn Author-X-Name-Last: McHale Title: Voices from the Terror Journal: Studies in Conflict & Terrorism Pages: 149-151 Issue: 2 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100121341 File-URL: http://hdl.handle.net/10.1080/10576100121341 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:2:p:149-151 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701359_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Book Reviews Journal: Studies in Conflict & Terrorism Pages: 153-158 Issue: 2 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100118763 File-URL: http://hdl.handle.net/10.1080/10576100118763 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:2:p:153-158 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701356_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rogelio Alonso Author-X-Name-First: Rogelio Author-X-Name-Last: Alonso Title: The Modernization in Irish Republican Thinking Toward the Utility of Violence Abstract: For the last thirty years the Irish republican movementcomposed of the IRA and Sinn Feinhas resorted to armed struggle as part of its strategy against British power in Northern Ireland. The cease-fire announced by the terrorist group in 1994 and the peace process that followed has signaled a historic shift in the strategic thinking of republicans. The emergence of dissident groups that reject the politicization of the movement and advocate the maintenance of the military campaign has highlighted the challenges the republican leadership faces after their acceptance of the 1998 Belfast Agreement. This article explores all of these issues and the importance of the armed struggle in the shifting republican mentality. Journal: Studies in Conflict & Terrorism Pages: 131-144 Issue: 2 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100120635 File-URL: http://hdl.handle.net/10.1080/10576100120635 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:2:p:131-144 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701357_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Peter Chalk Author-X-Name-First: Peter Author-X-Name-Last: Chalk Title: Six Deadly Flaws Journal: Studies in Conflict & Terrorism Pages: 145-148 Issue: 2 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100118607 File-URL: http://hdl.handle.net/10.1080/10576100118607 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:2:p:145-148 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701354_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Brad Whitsel Author-X-Name-First: Brad Author-X-Name-Last: Whitsel Title: Ideological Mutation and Millennial Belief in the American Neo-Nazi Movement Abstract: This article examines the process of ideological change that accompanied the evolution of the American neo-Nazi movement. The movement's psychological worldview has historically been dominated by a catastrophic millennial outlook that looks forward to the destruction of an environing order perceived to be degraded and beyond hope for renewal. By the 1970s, however, certain organizational changes had taken place in the movement that led to its fracture along separate philosophical tracks. While the millennial underpinnings of the American neo-Nazi movement's belief structure remained largely intact, highly idiosyncratic versions of the neoNazi Aryan myth began to emerge at this time. The ideological mutations that occurred came as a result of neo-Nazi groups adopting a "cultic milieu" existence in society's fringe underground of deviant beliefs. British sociologist Colin Campbell's overlooked theoretical concept of the cultic milieu may provide new insights into the process of ideological transformation in extremist groups. Journal: Studies in Conflict & Terrorism Pages: 89-106 Issue: 2 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100117722 File-URL: http://hdl.handle.net/10.1080/10576100117722 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:2:p:89-106 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701355_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joseph W. Foxell Author-X-Name-First: Joseph W. Author-X-Name-Last: Foxell Title: Current Trends in Agroterrorism (Antilivestock, Anticrop, and Antisoil Bioagricultural Terrorism) and Their Potential Impact on Food Security Abstract: The relatively indirect and indiscriminate nature of an agroterror attack meshes perfectly with the perceived shift in terrorism goals, which have ostensibly veered away from attempting to achieve specific political results and instead increasingly seek the destruction of "enemy" societies. This article presents the case specifically that access to agroterroritst weapons, the vulnerability of the agricultural infrastructure, the lack of reporting requirements for outbreaks of plant diseases, and a general shift in the motives of terrorists and the purpose of terrorist acts, all combine to make agroterrorism an increasingly likely threat. Journal: Studies in Conflict & Terrorism Pages: 107-129 Issue: 2 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100151101623 File-URL: http://hdl.handle.net/10.1080/10576100151101623 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:2:p:107-129 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701361_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Brian A. Jackson Author-X-Name-First: Brian A. Author-X-Name-Last: Jackson Title: Technology Acquisition by Terrorist Groups: Threat Assessment Informed by Lessons from Private Sector Technology Adoption Abstract: Because of the importance of technology to the operations of modern terrorist groups, the factors that affect the technological sophistication of extreme organizations are of great interest. In this article, the process through which terrorist groups seek out and deploy new technology is examined by bringing to bear the deep literature that exists on technology adoption by commercial organizations. A framework is described that delineates not only the factors that influence a group's decision-making processes surrounding new technology but also the obstacles that stand in the way of the successful absorption and use of unfamiliar technologies by a terrorist organization. This framework, by taking a holistic view of the entire technology adoption process, sets out a methodology to both more reasonably predict the outcome of a group's technology-seeking efforts and to speculate about its future innovation efforts. Such a technology focused viewpoint provides a route to more fully inform risk assessment, especially with regard to the low probabilityhigh consequence technologies that have served as the focus of much recent counterterrorist deliberation. The lessons provided by the framework with respect to weapons of mass destruction terrorism and to novel counterterrorist routes are discussed. Journal: Studies in Conflict & Terrorism Pages: 183-213 Issue: 3 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100151130270 File-URL: http://hdl.handle.net/10.1080/10576100151130270 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:3:p:183-213 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701362_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kirsten E. Schulze Author-X-Name-First: Kirsten E. Author-X-Name-Last: Schulze Title: Camp David and the : An Assessment of the State of the Israeli-Palestinian Peace Process, July-December 2000 Abstract: This article examines the Al-Aqsa Intifada and its impact on the Israeli-Palestinian peace process. It is argued here that the Intifada was the result of long-term frustrations of the Palestinian people with the lack of change as well as the short-term need of the Palestinian leadership for an exit strategy after the Camp David summit. Palestinian strategy aimed at shifting the blame for the failure of Camp David from Yasser Arafat to Ehud Barak and to create maximum international solidarity to pressure Israel into concessions. Yet, closer analysis reveals that despite early successes, the Intifada strategy is one of diminishing returns. Conversely, Israeli crisis management, while taking some initial blows particularly in terms of public image, has proved relatively successful at preventing the erosion of Israeli positions on the ground. Ultimately, however, neither Palestinians nor Israelis will be able to achieve their respective aims of statehood and security without returning to the negotiating table. Journal: Studies in Conflict & Terrorism Pages: 215-233 Issue: 3 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100151130298 File-URL: http://hdl.handle.net/10.1080/10576100151130298 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:3:p:215-233 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701360_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Richard Falkenrath Author-X-Name-First: Richard Author-X-Name-Last: Falkenrath Title: Analytic Models and Policy Prescription: Understanding Recent Innovation in U.S. Counterterrorism Abstract: The threat of terrorism, particularly terrorism involving a weapon of mass destruction (WMD), has received enormous attention in the last decade. Since the mid1990s, the federal government has embarked on a concerted national effort to prepare the country for acts of WMD terrorism. A key component of the counterterrorism agenda is the domestic preparedness program, a series of initiatives aimed at reducing America's vulnerability to a WMD terrorist attack. However, there is a heated debate over whether or not the United States needs a domestic preparedness program at all. This article argues that much of the debate originates in disparate approaches to analyzing terrorism. Terrorism studies specialists use an internal model that analyzes the root causes, motives, and historical patterns of terrorism and concludes that the threat of WMD terrorism against the United States is not sufficient to warrant the domestic preparedness budget. Policy makers and national security experts, however, rely on an external risk assessment model that considers terrorism within the context of the many risks to American security. This assessment model evaluates WMD terrorism on the basis of risk and consequences, and reaches a logical conclusion that the potential for mass destruction not only merits, but also requires a level of domestic preparedness. Journal: Studies in Conflict & Terrorism Pages: 159-181 Issue: 3 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100151130252 File-URL: http://hdl.handle.net/10.1080/10576100151130252 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:3:p:159-181 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701363_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Book Reviews Journal: Studies in Conflict & Terrorism Pages: 235-240 Issue: 3 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100151130315 File-URL: http://hdl.handle.net/10.1080/10576100151130315 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:3:p:235-240 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701367_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Chris Dishman Author-X-Name-First: Chris Author-X-Name-Last: Dishman Title: Understanding Perspectives on WMD and Why They Are Important Journal: Studies in Conflict & Terrorism Pages: 303-313 Issue: 4 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100118538 File-URL: http://hdl.handle.net/10.1080/10576100118538 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:4:p:303-313 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701368_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Book Reviews Journal: Studies in Conflict & Terrorism Pages: 315-318 Issue: 4 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100119863 File-URL: http://hdl.handle.net/10.1080/10576100119863 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:4:p:315-318 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701365_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David M. Jones Author-X-Name-First: David M. Author-X-Name-Last: Jones Author-Name: Mike L. Smith Author-X-Name-First: Mike L. Author-X-Name-Last: Smith Title: The Changing Security Agenda in Southeast Asia: Globalization, New Terror, and the Delusions of Regionalism Abstract: The regional economic crisis of 199798 placed a large question mark over the advocacy, much proclaimed between 1990 and 1997, that ASEAN was at the centre of a shift in the global order toward a Pacific Century premised on the Association's practices of multilateral cooperation, dialogue, consensus, and non-interference. Does the aftermath of the crisis, and the new agenda posed by the forces of economic globalization and the seemingly irresolvable low intensity conflicts that bedevil Southeast Asia, require radical re-thinking of the relevance of security arrangements in Pacific Asia that are essentially the product of the Cold War era? This study examines this question by considering the curious external conditions in which ASEAN rose to international prominence, how ASEAN erroneously came to be seen in the 1990s as an apparently new form of security cooperation, and how rising levels of violent internal challenges generated by the forces of globalization threaten Southeast Asia's stability. The conclusion is that these forces have exposed ASEAN's constituting incoherence as an imitation community and that consequently it is ill equipped to contend with the pressures exerted by the global information age. Journal: Studies in Conflict & Terrorism Pages: 271-288 Issue: 4 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100117412 File-URL: http://hdl.handle.net/10.1080/10576100117412 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:4:p:271-288 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701366_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: William Rosenau Author-X-Name-First: William Author-X-Name-Last: Rosenau Title: Aum Shinrikyo's Biological Weapons Program: Why Did it Fail? Abstract: During the six years since the Aum Shinrikyo cult's nerve gas attack on the Tokyo subway system, the United States has undertaken a major effort to prevent and respond to terrorist acts involving nuclear, radiological, biological and chemical weapons. Given this high level of official activity, it is remarkable that Aum's protracted and costly, but ultimately unsuccessful, attempts to acquire and use mass-casualty biological agents has received scant analytical attention. Specifically, there has been relatively little focus on one critical question: Why did this apparently sophisticated and lavishly funded program ultimately fail? Aum's failure suggests that it may, in fact, be far more difficult to carry out a deadly bioterrorism attack than has sometimes been portrayed by government officials and the press. Despite its significant financial resources, dedicated personnel, motivation, and freedom from the scrutiny of the Japanese authorities, Aum was unable to achieve its objectives. The Aum case illustrates how acquiring virulent strains of biological agents can be a major hurdle for prospective bioterrorists. Cult-like terrorist organizations, the ones that appear to have the greatest interest in mass-casualty biological weapons, may be least suited to meet the complex demands associated with a bioweapon program. As the Aum example illustrates, a paranoid, fantasy-prone and sometimes violent atmosphere is not conducive to the sound scientific judgement needed to produce mass-casualty biological weapons. Journal: Studies in Conflict & Terrorism Pages: 289-301 Issue: 4 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100120887 File-URL: http://hdl.handle.net/10.1080/10576100120887 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:4:p:289-301 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_9701364_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Peter Chalk Author-X-Name-First: Peter Author-X-Name-Last: Chalk Title: Separatism and Southeast Asia: The Islamic Factor in Southern Thailand, Mindanao, and Aceh Abstract: Islamic insurgent movements in southern Thailand, the southern Philippines and Aceh represent, arguably, the most visible signs of armed separatism in Southeast Asia today. The roots of ethnoreligious unrest in each of these regions stem from the same basic factors: insensitivity to local concerns, regional neglect, military repression and the contemporary force of militant Islam. The longevity of the movements that have arisen in southern Thailand, the southern Philippines and Aceh has largely been determined by the degree of popular support each has been able to call on as well as operational considerations such as external support and access to weaponry. Journal: Studies in Conflict & Terrorism Pages: 241-269 Issue: 4 Volume: 24 Year: 2001 X-DOI: 10.1080/10576100116748 File-URL: http://hdl.handle.net/10.1080/10576100116748 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:24:y:2001:i:4:p:241-269 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_170374_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Edward Newman Author-X-Name-First: Edward Author-X-Name-Last: Newman Title: Exploring the “Root Causes†of Terrorism Abstract: This article attempts to clarify what is meant by “root causes†and considers if their analysis helps to explain and describe how, where, and why terrorism occurs. In attempting to explore—but not definitively resolve—these challenges, the article will attempt to delineate “root causes†into qualitative and quantitative variables that can be empirically tested in relation to contemporary terrorist activity. In so doing, it considers the relative merits of different methodologies for approaching “root causes.†The article concludes that indirect and underlying sources of conflict are significant to understanding specific incidents of terrorism and certain categories of terrorism; that “root causes†are less helpful in describing and explaining terrorism as a general phenomenon; and that root causes are of analytical use only in conjunction with precipitant factors. Journal: Studies in Conflict & Terrorism Pages: 749-772 Issue: 8 Volume: 29 Year: 2006 X-DOI: 10.1080/10576100600704069 File-URL: http://hdl.handle.net/10.1080/10576100600704069 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:29:y:2006:i:8:p:749-772 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_156173_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Assaf Moghadam Author-X-Name-First: Assaf Author-X-Name-Last: Moghadam Title: Suicide Terrorism, Occupation, and the Globalization of Martyrdom: A Critique of Abstract: This article offers a three-pronged critique of Robert A. Pape's book Dying to Win. The first section of the article highlights problems related to the book's definition of key concepts, its assessment of existing research on suicide terrorism, and its presentation of data. The next section challenges the book's argument that suicide attacks have a high success rate of 54 percent. The alternative analysis offered here arrives at a significantly lower success rate of 24 percent. The last section argues that Pape exaggerates the link between occupation and suicide terrorism, especially with regard to the case of Al Qaeda. In this context, a distinction between traditional (localized) and contemporary (globalized) patterns of suicide attacks is introduced. It is argued that the occupation thesis may help explain the traditional (localized) pattern of suicide attacks, but falls short of illuminating the causes of the contemporary “globalization of martyrdom.†Journal: Studies in Conflict & Terrorism Pages: 707-729 Issue: 8 Volume: 29 Year: 2006 X-DOI: 10.1080/10576100600561907 File-URL: http://hdl.handle.net/10.1080/10576100600561907 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:29:y:2006:i:8:p:707-729 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_170165_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rhonda Callaway Author-X-Name-First: Rhonda Author-X-Name-Last: Callaway Author-Name: Julie Harrelson-Stephens Author-X-Name-First: Julie Author-X-Name-Last: Harrelson-Stephens Title: Toward a Theory of Terrorism: Human Security as a Determinant of Terrorism Abstract: In this article, we investigate the relationship between human rights conditions and terrorist activity. We begin by outlining a theory for the genesis and growth of terrorism and argue that states which deny subsistence rights along with civil and political rights create an environment that is conducive to the development of terrorism. However, we conclude that it is the denial of security rights that is a necessary condition for the creation and growth of terrorism. We then examine the causes of terrorism in Northern Ireland in light of this theory. Specifically, we explore the extent to which human rights abuses contributed to the formation and growth of terrorists within Northern Ireland. We find that limits on the civil and political rights of the Catholic minority in Northern Ireland played a significant role in the genesis of terrorism. More importantly, British abuses of security rights increased the number of Irish citizens who supported and participated in terrorist activity. Journal: Studies in Conflict & Terrorism Pages: 773-796 Issue: 8 Volume: 29 Year: 2006 X-DOI: 10.1080/10576100600701974A File-URL: http://hdl.handle.net/10.1080/10576100600701974A File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:29:y:2006:i:8:p:773-796 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_170167_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alison Pargeter Author-X-Name-First: Alison Author-X-Name-Last: Pargeter Title: North African Immigrants in Europe and Political Violence Abstract: North African communities in Europe have been the focus of unprecedented attention since the attacks of 9/11, largely thanks to the wave of arrests of North Africans on terrorism related charges across the continent. Yet very little is known about exactly who these North African militants are, what is motivating them and how and why they became attracted to radical interpretations of Islam. It is often assumed that these radicals are linked to Al Qaeda and share the same broad internationalist vision. A closer look suggests that these first generation immigrants continue to be preoccupied as much by national politics as any notion of a globalized form of Islam. Little attention has also been paid to the complex relationship between these militant elements and the wider North African communities residing in Europe. Although the War on Terror has made many North African immigrants feel increasingly uncomfortable, it has arguably also enabled the more politicized moderate parts of the Islamist community to increase their role and influence, with questionable consequences for these communities as a whole. Journal: Studies in Conflict & Terrorism Pages: 731-747 Issue: 8 Volume: 29 Year: 2006 X-DOI: 10.1080/10576100600701990 File-URL: http://hdl.handle.net/10.1080/10576100600701990 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:29:y:2006:i:8:p:731-747 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_179070_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jessica Wolfendale Author-X-Name-First: Jessica Author-X-Name-Last: Wolfendale Title: Terrorism, Security, and the Threat of Counterterrorism Abstract: In America, Britain and Australia the threat of terrorism has been used to justify radical new legislation that gives police and intelligence agencies unprecedented powers to detain and question people believed to have information connected to terrorism. In this paper I explore the nature of the threat of non-state terrorism—threat to national security and the well-being of citizens. I argue that terrorism does not pose a threat sufficient to justify the kinds of counterterrorism legislation currently being enacted. Furthermore many of the current counterterrorism practices pose a greater threat to individual physical security and well-being than non-state terrorism. We should fear counterterrorism more than we fear terrorism. Journal: Studies in Conflict & Terrorism Pages: 75-92 Issue: 1 Volume: 30 Year: 2007 X-DOI: 10.1080/10576100600791231 File-URL: http://hdl.handle.net/10.1080/10576100600791231 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:30:y:2007:i:1:p:75-92 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_204896_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Paul Cruickshank Author-X-Name-First: Paul Author-X-Name-Last: Cruickshank Author-Name: Mohannad Ali Author-X-Name-First: Mohannad Author-X-Name-Last: Ali Title: Abu Musab Al Suri: Architect of the New Al Qaeda Abstract: Drawing on new sources, the authors argue that Abu Musab al Suri (real name Mustafa Setmariam Nasar), now in U.S. custody, is the principle architect of Al Qaeda's post–9/11 structure and strategy. His vision, which predated 9/11, of transforming Al Qaeda from a vulnerable hierarchical organization into a resilient decentralized movement, was largely the formula Al Qaeda adopted after the collapse of the Taliban. The authors show how Setmariam, whose ideas have been disseminated widely on the Internet and whose disciples have gravitated to leadership positions in the international jihad, has influenced Al Qaeda's post–9/11 strategy, targeting, and doctrine. Journal: Studies in Conflict & Terrorism Pages: 1-14 Issue: 1 Volume: 30 Year: 2007 X-DOI: 10.1080/10576100601049928 File-URL: http://hdl.handle.net/10.1080/10576100601049928 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:30:y:2007:i:1:p:1-14 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_170168_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Margaret Kosal Author-X-Name-First: Margaret Author-X-Name-Last: Kosal Title: Terrorism Targeting Industrial Chemical Facilities: Strategic Motivations and the Implications for U.S. Security Abstract: Policy to reduce the threat of a terrorist attack against industrial chemical facilities—critical infrastructure with potential to cause mass casualties—is being driven by incomplete and, in some cases, incorrect assumptions. This article chronicles incidents by non-state actors directed at the chemical industry and explores the strategic considerations prompting groups to target the industry. By incorporating motivations for targeting infrastructure a more robust, comprehensive risk assessment is realized. Analysis challenging the “insider†threat paradigm and recommendations to ameliorate the potential effects are also presented. These are found to differ substantially from the leading policy measures currently advocated. Journal: Studies in Conflict & Terrorism Pages: 41-73 Issue: 1 Volume: 30 Year: 2007 X-DOI: 10.1080/10576100600702006A File-URL: http://hdl.handle.net/10.1080/10576100600702006A File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:30:y:2007:i:1:p:41-73 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_205344_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bruce Hoffman Author-X-Name-First: Bruce Author-X-Name-Last: Hoffman Title: What Went Wrong? Journal: Studies in Conflict & Terrorism Pages: 93-95 Issue: 1 Volume: 30 Year: 2007 X-DOI: 10.1080/10576100601054407 File-URL: http://hdl.handle.net/10.1080/10576100601054407 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:30:y:2007:i:1:p:93-95 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_195879_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Victor Asal Author-X-Name-First: Victor Author-X-Name-Last: Asal Author-Name: Brian Nussbaum Author-X-Name-First: Brian Author-X-Name-Last: Nussbaum Author-Name: D. Harrington Author-X-Name-First: D. Author-X-Name-Last: Harrington Title: Terrorism as Transnational Advocacy: An Organizational and Tactical Examination Abstract: This article attempts to shed light on the dynamics and machinations within terrorist organizations by incorporating a heretofore overlooked literature which is directly applicable, that of transnational advocacy networks (TANs). Terror networks have been described using every possible analogy, from multinational corporations to organized crime to the anthropomorphic classic “cut off the head, and the body will die.†In reality, terrorist organizations function in much the same way, and using many of the same techniques, as transnational advocacy networks concerned with issues like the environment or human rights. By describing these characteristics, and comparing TANs and Terror TANs (TTANs), this article aims to offer insight into the tactics and motivations that define modern, as well as the much heralded post-modern, terrorism. Journal: Studies in Conflict & Terrorism Pages: 15-39 Issue: 1 Volume: 30 Year: 2007 X-DOI: 10.1080/10576100600959713 File-URL: http://hdl.handle.net/10.1080/10576100600959713 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:30:y:2007:i:1:p:15-39 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_156174_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sandra R. Leavitt Author-X-Name-First: Sandra R. Author-X-Name-Last: Leavitt Title: A Review Of “Rohan Gunaratna, Arabinda Acharya, and Sabrina Chua Conflict and Terrorism in Southern Thailand Journal: Studies in Conflict & Terrorism Pages: 370-373 Issue: 4 Volume: 30 Year: 2007 Month: 4 X-DOI: 10.1080/10576100600561915 File-URL: http://hdl.handle.net/10.1080/10576100600561915 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:370-373 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_156385_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Scott R. Senjo Author-X-Name-First: Scott R. Author-X-Name-Last: Senjo Title: A Review Of “Robert W. Taylor, Tory J. Caeti, D. Kall Loper, Eric J. Fritsch, and John Liederbach, Digital Crime and Digital Terrorism“ Journal: Studies in Conflict & Terrorism Pages: 367-370 Issue: 4 Volume: 30 Year: 2007 Month: 4 X-DOI: 10.1080/10576100600564026 File-URL: http://hdl.handle.net/10.1080/10576100600564026 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:367-370 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_193191_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Moniza Khokhar Author-X-Name-First: Moniza Author-X-Name-Last: Khokhar Title: Reforming Militant Madaris in Pakistan Abstract: The madaris located in Pakistan have played an important role in spreading militant jihadist ideologies and some have even labeled the madaris “terrorist factories.†After the War on Terror began the Pakistani government was forced to deal with their violent religious schools. The federal government did produce a plan for reform; however, the already unimpressive strategies have not been followed through successfully and the militant schools still remain a major threat even today. The reform will need to focus on three different aspects of the madaris: the financing, the curriculum, and the state's authority over the institutions. In order for permanent reformation to occur, the Pakistani government will need to strictly implement policies that will demilitarize the madaris. Journal: Studies in Conflict & Terrorism Pages: 353-365 Issue: 4 Volume: 30 Year: 2007 Month: 4 X-DOI: 10.1080/10576100600932751 File-URL: http://hdl.handle.net/10.1080/10576100600932751 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:353-365 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_219935_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Paul Hastert Author-X-Name-First: Paul Author-X-Name-Last: Hastert Title: Al Qaeda and Iran: Friends or Foes, or Somewhere in Between? Abstract: The relationship between Al Qaeda and Iran has been one of continuing controversy even prior to 9/11 and is more relevant today as U.S. forces find themselves on battlefields where both have vital interests and roles. It's clear that Al Qaeda and Iran have longstanding issues with the United States, but despite the wild allegations, these two parties remain far apart based on religious differences and differing geopolitical aims. Still, the signs of cooperation between extremists in pursuit of a common aim remains clear and must be taken into account as the United States works to restore stability across the Middle East. Journal: Studies in Conflict & Terrorism Pages: 327-336 Issue: 4 Volume: 30 Year: 2007 Month: 4 X-DOI: 10.1080/10576100701200132 File-URL: http://hdl.handle.net/10.1080/10576100701200132 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:327-336 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_219936_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Pete Lentini Author-X-Name-First: Pete Author-X-Name-Last: Lentini Author-Name: Muhammad Bakashmar Author-X-Name-First: Muhammad Author-X-Name-Last: Bakashmar Title: Jihadist Beheading: A Convergence of Technology, Theology, and Teleology? Abstract: Although contemporary jihadist terrorists are most well known for perpetrating operations that generate mass casualties, they also conduct violent acts that yield fewer victims, such as beheading hostages. Examining the religious and cultural contexts that surround jihadist beheadings, developments in new media, and drawing on examples from the Chechen Wars and the Iraq War, this article argues that jihadists have employed this tactic for a range of reasons, including obtaining ransom payments, hampering foreign investment, discrediting transitional states, and recruiting supporters. It also suggests that jihadists' beheading of their captives corresponds with aspects of cosmic war, particularly on how religious terrorists' desires to please a deity and secure a place of honor in the hereafter has devalued the lives of both captor and prisoner. Consequently, contemporary jihadist beheading is an outgrowth of the practice of terrorist hostage taking. As this article goes to press (February 2007) UK authorities disrupted a terrorist cell allegedly plotting to behead British Muslim soldiers who served in Afghanistan and Iraq, and to broadcast the filmed executions through jihadist websites. Journalists have described the intended beheadings and their dissemination as “Iraq-style.†There is no doubt that jihadist beheading became more widely known as a result of the Iraq conflict. However, the beheadings in Iraq were largely used to recruit future jihadists and to demonstrate jihadists' strength to their potential support base, the global Muslim community. In contrast, the alleged UK beheading plot was aimed at striking terror into Muslims living in the UK so that they would not support or serve their government. Indeed the Iraq beheadings were intended to persuade, and the UK plot was intended to dissuade. These alleged activities suggest that contemporary jihadist beheading is not only an extension of hostage-taking, it is also an independently evolving terrorist tactic. Journal: Studies in Conflict & Terrorism Pages: 303-325 Issue: 4 Volume: 30 Year: 2007 Month: 4 X-DOI: 10.1080/10576100701200140 File-URL: http://hdl.handle.net/10.1080/10576100701200140 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:303-325 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_219937_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Seth G. Jones Author-X-Name-First: Seth G. Author-X-Name-Last: Jones Title: Fighting Networked Terrorist Groups: Lessons from Israel Abstract: In Iraq and Afghanistan, the United States faced “networked†adversaries: insurgent groups that communicated and coordinated their political and military campaigns without a central command. The rise of networked groups is a direct result of the preponderance of U.S. military power. Consequently, this article asks: What strategies have been most effective in defeating networked groups? To answer this question, the article examines Israeli operations against Palestinian groups during Operation Defense Shield in 2002. It argues that the most effective strategy to defeat networked adversaries is to use networked strategies. In Israel, this meant establishing multiple units to penetrate Palestinian urban areas, swarm together from several directions, and kill or capture militants. Journal: Studies in Conflict & Terrorism Pages: 281-302 Issue: 4 Volume: 30 Year: 2007 Month: 4 X-DOI: 10.1080/10576100701200157 File-URL: http://hdl.handle.net/10.1080/10576100701200157 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:281-302 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_219939_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anthony Vinci Author-X-Name-First: Anthony Author-X-Name-Last: Vinci Title: Existential Motivations in the Lord's Resistance Army’s Continuing Conflict Abstract: This article argues that although the Lord's Resistance Army (LRA) may have begun its war for instrumental goals, such as to create political change, these goals have largely been replaced by existential motivations, in the sense that the LRA organization fights in order to continue providing security and a vocation to its members, which would be lost by a return to wider society. It is posited that the factor allowing for this turn from instrumental to existential motivation is that the LRA organization has effectively separated itself from wider society and created an autonomous political community. The implication of this is that it may be necessary to first reintegrate members of the LRA into the greater Acholi and Ugandan community and then to find a political settlement. The article also discusses lessons learned for dealing with other existentially motivated armed groups, such as Al Qaeda. Journal: Studies in Conflict & Terrorism Pages: 337-352 Issue: 4 Volume: 30 Year: 2007 Month: 4 X-DOI: 10.1080/10576100701200173 File-URL: http://hdl.handle.net/10.1080/10576100701200173 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:30:y:2007:i:4:p:337-352 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_739080_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mark Cochrane Author-X-Name-First: Mark Author-X-Name-Last: Cochrane Title: Security Force Collusion in Northern Ireland 1969–1999: Substance or Symbolism? Abstract: In order to thwart and prevent terrorism the State is compelled to use all of the covert capabilities at its disposal in order to protect the society it serves. One of its most effective weapons is the use of human intelligence. Often acquired through secret relationships with terrorists or those with the ability to access preemptive intelligence. This important work is contentious for any democratic society as such practices and relationships, should they become known, inevitably beg the question—How far is it permissible for the State to go? A case study of State efforts to combat terrorism in Northern Ireland presents the moral, ethical, and legal dilemmas encountered and the propaganda opportunity such activity presents its detractors and critics. This article will identify key aspects related to the intelligence war and the development and creation of the concept of “collusion,†a subjective issue, and one that has no legal definition. Journal: Studies in Conflict & Terrorism Pages: 77-97 Issue: 1 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.739080 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.739080 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:1:p:77-97 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_739078_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bryan Groves Author-X-Name-First: Bryan Author-X-Name-Last: Groves Title: America's Trajectory in the Long War: Redirecting Our Efforts Toward Strategic Effects Versus Simply Tactical Gains Abstract: After 9/11 the United States has a significant disconnect between its strategic and tactical efforts against violent global jihadists. Some American leaders and commanders are confusing effectiveness and success, improperly associating tactical disruption of enemy elements with strategic effect. While the country has won some important tactical victories, it is not clear that they are amounting to a strategic impact, or that the gains will last. The situation is complex, with various dynamics influencing America's prosecution of the Long War and its ability to be successful in the long term. This article looks at what those factors are and provides policy makers with tangible recommendations that, if implemented, will place America's counterterrorism efforts on a more strategic trajectory and hold greater promise of lasting impact. Journal: Studies in Conflict & Terrorism Pages: 26-48 Issue: 1 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.739078 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.739078 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:1:p:26-48 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_739077_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Seth Jones Author-X-Name-First: Seth Author-X-Name-Last: Jones Author-Name: Patrick Johnston Author-X-Name-First: Patrick Author-X-Name-Last: Johnston Title: The Future of Insurgency Abstract: What are key historical trends in insurgencies? And what do these finding suggest about the future of insurgency? We examine four aspects: causes of insurgency, outside support, strategies, and tactics. Based on an examination of quantitative and qualitative data, we make several arguments about the future. China could become increasingly involved in supporting insurgencies and counterinsurgencies if its economic and military power continues to increase and its global interest expands. In addition, insurgent groups will likely require less time to achieve high levels of sophistication for improvised explosive devices and other asymmetric tactics, which we expect they will use against more powerful mechanized counterinsurgent forces. We also expect that insurgent groups may take advantage of commercially-available technology to communicate, distribute propaganda, and recruit individuals. In addition, insurgents will likely make further use of encryption, anonymizing services, location-masking tools, and other related technologies to protect their online activities. Journal: Studies in Conflict & Terrorism Pages: 1-25 Issue: 1 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.739077 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.739077 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:1:p:1-25 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_739079_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Benjamin Acosta Author-X-Name-First: Benjamin Author-X-Name-Last: Acosta Author-Name: Steven Childs Author-X-Name-First: Steven Author-X-Name-Last: Childs Title: Illuminating the Global Suicide-Attack Network Abstract: This article examines the contemporary phenomenon of suicide attacks by fusing network analysis and time-series econometrics. We find that a global network of militant organizations drives the reproduction of the suicide-attack phenomenon, and brokers within the network mark the primary perpetrators and diffusers of the tactic. The introduction of a fourth level of analysis of political violence demonstrates that network connections between organizations form a system that perpetuates suicide attacks. An organization-level analysis reveals that ideological congruence facilitates the establishment of network connections. As exemplified by the wide range of employers and targets, and moreover by the generation of an autogamous function, contemporary suicide attacks represent a unique sociopolitical phenomenon. Accordingly, organizations that use the tactic warrant a distinct classification. Journal: Studies in Conflict & Terrorism Pages: 49-76 Issue: 1 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.739079 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.739079 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:1:p:49-76 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_823738_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ogen Goldman Author-X-Name-First: Ogen Author-X-Name-Last: Goldman Title: The Importance of Voluntary Associations for Guerrilla Movements Abstract: The question I examine in this article is why is it that under certain circumstances a guerrilla movement succeeds while under others it fails? The hypotheses that I shall present below are the greater the number and variety of voluntary associations supporting the guerrilla movement, compared with the number of associations supporting the regime, the greater is the guerillas’ level of success. Voluntary associations can fulfill the guerrilla's basic needs: resources, organizational ability, and obligation. Achieving these needs assist the guerrilla in realizing: population support; inter-class allies; military force; governmental function, which in turn allows the realization of the political objectives. Journal: Studies in Conflict & Terrorism Pages: 789-818 Issue: 10 Volume: 36 Year: 2013 Month: 10 X-DOI: 10.1080/1057610X.2013.823738 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.823738 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:10:p:789-818 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_823752_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Henry Rome Author-X-Name-First: Henry Author-X-Name-Last: Rome Title: Revisiting the “Problem From Hellâ€: Suicide Terror in Afghanistan Abstract: A hallmark of the resurgence of antigovernment forces in Afghanistan was the mass introduction of suicide terrorist attacks. Between 2005 and 2006, the incidence of suicide bombings increased more than fivefold, marking a sea change in the Afghan conflict. Despite the initial jump in the volume of suicide attacks and the fear of more violence, the number of attacks actually flat-lined while the level of other attacks increased. This study will argue that it is the competency of the attackers employed in Afghanistan, not the politics, technology, or targeting, that best explains the static level of suicide attacks. Journal: Studies in Conflict & Terrorism Pages: 819-838 Issue: 10 Volume: 36 Year: 2013 Month: 10 X-DOI: 10.1080/1057610X.2013.823752 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.823752 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:10:p:819-838 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_823754_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anne Lise Fimreite Author-X-Name-First: Anne Lise Author-X-Name-Last: Fimreite Author-Name: Peter Lango Author-X-Name-First: Peter Author-X-Name-Last: Lango Author-Name: Per Lægreid Author-X-Name-First: Per Author-X-Name-Last: Lægreid Author-Name: Lise H. Rykkja Author-X-Name-First: Lise H. Author-X-Name-Last: Rykkja Title: After Oslo and Utøya: A Shift in the Balance Between Security and Liberty in Norway? Abstract: The article addresses the challenges a society faces to when trying to balance security and liberty after a terrorist attack. A main question is to what extent attitudes toward counterterror measures changed in Norway after the massive terror attacks in July 2011. A hypothesis that people will be more in favor of such measures after a terror attack is examined using data from two surveys—one conducted in 2006 and one in August 2011, with additional results from a survey in 2012. The Norwegian response after the 2011 attacks is compared to the response to the same questions in the United States shortly after 11 September 2001. A main finding is that in Norway, in contrast to the United States, levels of support for counterterror measures declined immediately after the attacks. The authors argue that this can be explained partly by the different levels of trust in the two countries, and partly by differences in the political executive's framing of the crisis. In 2012, support of counterterror measures in Norway has risen to pre-2011 levels. This is related to the changed discourse after the publication of the report from the 22 July Commission. Journal: Studies in Conflict & Terrorism Pages: 839-856 Issue: 10 Volume: 36 Year: 2013 Month: 10 X-DOI: 10.1080/1057610X.2013.823754 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.823754 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:10:p:839-856 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_823761_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matthias Basedau Author-X-Name-First: Matthias Author-X-Name-Last: Basedau Author-Name: Johannes Vüllers Author-X-Name-First: Johannes Author-X-Name-Last: Vüllers Author-Name: Peter Körner Author-X-Name-First: Peter Author-X-Name-Last: Körner Title: What Drives Inter-Religious Violence? Lessons from Nigeria, Côte d’Ivoire, and Tanzania Abstract: Given its religious demography, sub-Saharan Africa seems particularly prone to the outbreak of violent clashes between Christians and Muslims. This article compares three sub-Saharan countries—Nigeria, Côte d’Ivoire, and Tanzania—that display different levels of inter-religious violence despite each having in common similar population ratios of Christians and Muslims, as well as all sharing a number of the classical risk factors for conflict onset. The analysis of these three case studies shows that higher levels of inter-religious violence result from horizontal inequalities and overlapping religious and ethnic group boundaries that, in the context of tense political transformation, consequently breed inter-religious grievances and violence. When theological ideas become politicized, inter-religious violence reaches its most intense level of expression. Journal: Studies in Conflict & Terrorism Pages: 857-879 Issue: 10 Volume: 36 Year: 2013 Month: 10 X-DOI: 10.1080/1057610X.2013.823761 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.823761 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:10:p:857-879 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_823765_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Byman Author-X-Name-First: Daniel Author-X-Name-Last: Byman Title: A Review of “Hezbollah: The Global Footprint of Lebanon's Party of God†Journal: Studies in Conflict & Terrorism Pages: 880-881 Issue: 10 Volume: 36 Year: 2013 Month: 10 X-DOI: 10.1080/1057610X.2013.823765 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.823765 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:10:p:880-881 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_832116_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Donald Holbrook Author-X-Name-First: Donald Author-X-Name-Last: Holbrook Title: Alienating the Grassroots: Looking Back at Al Qaeda's Communicative Approach Toward Muslim Audiences Abstract: This article explores the way in which the Al Qaeda leadership appeals to and addresses different cohorts of Sunni Muslim audiences through its statements. This communicative approach is understood in the context of collective action frames from the social movement literature. The article analyzes the way in which communiqués from Osama bin Laden and Ayman al-Zawahiri have approached different Muslim audiences, defining three principal approaches: encouragement, excommunication, and exasperation. The article discusses how these approaches developed from the early 1990s up until the end of 2011, arguing that denunciation of Muslim publics has become an ever more prominent feature of this discourse. Journal: Studies in Conflict & Terrorism Pages: 883-898 Issue: 11 Volume: 36 Year: 2013 Month: 11 X-DOI: 10.1080/1057610X.2013.832116 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.832116 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:11:p:883-898 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_832113_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Eitan Azani Author-X-Name-First: Eitan Author-X-Name-Last: Azani Title: The Hybrid Terrorist Organization: Hezbollah as a Case Study Abstract: Since 1982, Hezbollah has evolved from a “revolutionary vanguard†terrorist organization bent on violently overthrowing the Lebanese government to a hybrid terrorist organization that uses legitimate political tools to the same end. Today Hezbollah operates on the civilian plane of da’wa, social welfare, and religious education; the military–Resistance plane (jihad); and the political plane. In its drive to dominate Shi’ite society, Hezbollah overcame its chief rival, Amal, and now plays a decisive role in Lebanon's political system and the Middle East. Understanding Hezbollah's emergence as a prototypical hybrid terrorist organization is key to understanding global and local jihad movements. Journal: Studies in Conflict & Terrorism Pages: 899-916 Issue: 11 Volume: 36 Year: 2013 Month: 11 X-DOI: 10.1080/1057610X.2013.832113 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.832113 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:11:p:899-916 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_832115_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Younkyoo Kim Author-X-Name-First: Younkyoo Author-X-Name-Last: Kim Author-Name: Stephen Blank Author-X-Name-First: Stephen Author-X-Name-Last: Blank Title: Insurgency and Counterinsurgency in Russia: Contending Paradigms and Current Perspectives Abstract: The most outstanding trend in contemporary conflicts has been the fusion of the threats from terrorism and insurgency. Insurgent threats in many places on the globe today are mistaken as terrorist threats, and counterterrorism (CT) is deployed as the local insurgents come increasingly to resemble their transnational terrorist partners. Such an emphasis on the role of terrorism in insurgencies and the undue focus on CT risks strengthening, rather than severing, the connection between local insurgents and transnational terrorists. Russia's counterterrorist strategy inadvertently transformed the conflict from a contained, nationalist rebellion to a sprawling jihadi insurgency and perversely encouraged the group to resort even more to terrorist tactics. The Russian counterinsurgency has been unsuccessful, as the insurgents are neither demolished as a force nor are they isolated by society. Losing the hearts and minds among the Chechen people is a key reason behind why the Russian operation in Chechnya suffered failures. Too little attention was paid to winning over the “hearts and minds†of the people. Journal: Studies in Conflict & Terrorism Pages: 917-932 Issue: 11 Volume: 36 Year: 2013 Month: 11 X-DOI: 10.1080/1057610X.2013.832115 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.832115 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:11:p:917-932 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_832117_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rachel Monaghan Author-X-Name-First: Rachel Author-X-Name-Last: Monaghan Title: Not Quite Terrorism: Animal Rights Extremism in the United Kingdom Abstract: Political violence undertaken in the name of animal rights has been ongoing for some 35 years in the United Kingdom and yet such activity is commonly termed extremism, not terrorism. Existing counterterrorism measures have not been utilized by the state against individuals and groups engaged in such violence. This article explores the criminal justice response to the various types of political violence, which have been claimed by groups like the Animal Liberation Front (ALF), the Animal Rights Militia, the Justice Department, and the Provisional ALF. Moreover, the article argues that terrorist laws do not have to be used to effectively tackle single-issue terrorism such as animal rights extremism where activists employ tactics more commonly associated with a terrorist campaign. Journal: Studies in Conflict & Terrorism Pages: 933-951 Issue: 11 Volume: 36 Year: 2013 Month: 11 X-DOI: 10.1080/1057610X.2013.832117 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.832117 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:11:p:933-951 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_850889_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Statement of Removal Journal: Studies in Conflict & Terrorism Pages: W1-W1 Issue: 11 Volume: 36 Year: 2013 Month: 11 X-DOI: 10.1080/1057610X.2013.850889 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.850889 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:11:p:W1-W1 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_842136_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Martin Rudner Author-X-Name-First: Martin Author-X-Name-Last: Rudner Title: Al Qaeda's Twenty-Year Strategic Plan: The Current Phase of Global Terror Abstract: This study examines Al Qaeda's organizational dynamics, doctrinal precepts, strategic objectives, operational priorities, and tactical vectors in the context of its Twenty-Year Strategic Plan. This seven-stage Strategic Plan is addressed with a particular focus on its current phase (Stage 5), 2013–2016, involving the mobilization of Muslim forces for the “Declaration of the Caliphate.†In this regard, particular attention is paid to the Al Qaeda engagement in militant jihadist campaigns across the Middle East and other Muslim domains. The study concludes with an overall assessment of global threats and ongoing risks arising from the current phase of Al Qaeda's Twenty-Year Strategic Plan. Journal: Studies in Conflict & Terrorism Pages: 953-980 Issue: 12 Volume: 36 Year: 2013 Month: 12 X-DOI: 10.1080/1057610X.2013.842136 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.842136 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:12:p:953-980 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_842132_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Byman Author-X-Name-First: Daniel Author-X-Name-Last: Byman Title: Outside Support for Insurgent Movements Abstract: When assessing insurgencies, understanding the role of transnational factors is vital. This article explores how outside powers support an insurgency, focusing on four types of actors: states, diasporas, refugees, and other insurgencies. It also examines the pitfalls and limits of outside support and assesses why such support is so hard to stop. The article concludes by offering implications for the conflict in Syria and discussing several policy implications with a particular emphasis on why outside support is hard to stop. Journal: Studies in Conflict & Terrorism Pages: 981-1004 Issue: 12 Volume: 36 Year: 2013 Month: 12 X-DOI: 10.1080/1057610X.2013.842132 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.842132 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:12:p:981-1004 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_842123_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jeff Gruenewald Author-X-Name-First: Jeff Author-X-Name-Last: Gruenewald Author-Name: Steven Chermak Author-X-Name-First: Steven Author-X-Name-Last: Chermak Author-Name: Joshua D. Freilich Author-X-Name-First: Joshua D. Author-X-Name-Last: Freilich Title: Far-Right Lone Wolf Homicides in the United States Abstract: Little is known about the nature of far-right lone wolf terrorism and how this form of violence varies across different types of suspects. Relying on data from the Extremist Crime Database (ECDB), we comparatively examine characteristics of far-right homicides in the United States perpetrated by suspects with no evident affiliations with domestic terrorist organizations. Surprisingly, we found that this form of lone wolf terrorism has generally not increased during the past decade. We also found important differences, such as in suspects’ mental health, in statuses of homicide offenders who operate alone compared to those who associate or act with others. Journal: Studies in Conflict & Terrorism Pages: 1005-1024 Issue: 12 Volume: 36 Year: 2013 Month: 12 X-DOI: 10.1080/1057610X.2013.842123 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.842123 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:12:p:1005-1024 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_842135_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Paul B. Rich Author-X-Name-First: Paul B. Author-X-Name-Last: Rich Title: Terror and Its Limits: The Historical Understanding of Terrorist Movements, States and Tribes in an Age of Cultural Anxiety Abstract: This article argues that much of the historical analysis of terror and terrorism in history has been weak in understanding the limits on terrorist activity and how terrorist campaigns eventually end. Reviewing three recent studies that examine various aspects of terrorism and the language of terror, the article seeks to show that states often play a major role in the way terrorist movements develop and eventually end up either defeated or moving into mainstream political engagement. The article points to a number of examples to illuminate this including the Carbonara in nineteenth century Italy, the Paris Commune and the ending segregation in the U.S. South in the 1960s. Journal: Studies in Conflict & Terrorism Pages: 1025-1044 Issue: 12 Volume: 36 Year: 2013 Month: 12 X-DOI: 10.1080/1057610X.2013.842135 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.842135 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:12:p:1025-1044 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_852398_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Editorial Board EOV Journal: Studies in Conflict & Terrorism Pages: ebi-ebi Issue: 12 Volume: 36 Year: 2013 Month: 12 X-DOI: 10.1080/1057610X.2013.852398 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.852398 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:12:p:ebi-ebi Template-Type: ReDIF-Article 1.0 # input file: UTER_A_747075_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gregory Miller Author-X-Name-First: Gregory Author-X-Name-Last: Miller Title: Terrorist Decision Making and the Deterrence Problem Abstract: An ongoing debate among policymakers and terrorism scholars concerns the effectiveness of deterrence as a counterterrorism tool. Absent from the debate is a discussion of the complex nature of terrorist decision making. Decisions are made at varying levels in a terrorist organization, often by actors having different motives, resulting in behavior that is not always fully rational. This article identifies several circumstances when terrorist behavior is not the product of an entirely unitary, rational decision-making process, and therefore highlights when deterrence policies will be least effective. It concludes with some policy implications for understanding when deterrence policies are most likely to succeed and how to address terrorism in other situations. Journal: Studies in Conflict & Terrorism Pages: 132-151 Issue: 2 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.747075 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.747075 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:2:p:132-151 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_747074_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: William Rosenau Author-X-Name-First: William Author-X-Name-Last: Rosenau Title: “Our Backs Are Against the Wallâ€: The Black Liberation Army and Domestic Terrorism in 1970s America Abstract: This article addresses the gap in the literature on U.S. domestic terrorism and counterterrorism in the 1970s by examining a once-notorious but now largely forgotten terrorist group, the Black Liberation Army (BLA). An outgrowth of the Black Panther Party, the BLA was directly responsible for at least 20 fatalities, making it amongst the most lethal “homegrown†U.S. groups of the period. This article seeks to shed new light on the BLA by exploring its relatively short but violent trajectory. By focusing on the group's origins, operations, ideology, and structure, the BLA can be understood as part of a wider landscape of homegrown political violence. The BLA emerged during the waning phase of a protest cycle that included the civil rights, Black Power, and anti-war movements. Like other terrorist groups before and after, the BLA claimed to be acting in self-defense and on behalf of the people, presenting itself as an army resisting police occupation of minority communities. With the collapse of the extreme Left in the mid-1970s, the BLA's prospects for creating a broader revolutionary base became remote. The article also examines law-enforcement responses to the BLA and the competing ways in which the Federal Bureau of Investigation and local police (and in particular, the New York Police Department) framed and countered the BLA threat. Journal: Studies in Conflict & Terrorism Pages: 176-192 Issue: 2 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.747074 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.747074 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:2:p:176-192 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_747071_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Boaz Ganor Author-X-Name-First: Boaz Author-X-Name-Last: Ganor Author-Name: Ophir Falk Author-X-Name-First: Ophir Author-X-Name-Last: Falk Title: De-Radicalization in Israel's Prison System Abstract: An effective de-radicalization process in prisons is intended to facilitate the renouncement of violence and terrorism by those that have carried out such offenses. A key lesson that can be drawn from Israel's de-radicalization efforts is that it is possible, indeed recommended, to treat inmates—regardless of their level of radicalization—in a dignified and humane manner. However, Israel's ability to significantly de-radicalize security prisoners is limited if it is at all existent in its current form. Security prisoners with the potential for positive change should be placed in a different, perhaps foreign setting. This article provides an overview of Israel's prison system, the challenges it faces, its efforts to de-radicalize security inmates and suggests additional courses of action. Journal: Studies in Conflict & Terrorism Pages: 116-131 Issue: 2 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.747071 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.747071 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:2:p:116-131 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_747073_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anja Dalgaard-Nielsen Author-X-Name-First: Anja Author-X-Name-Last: Dalgaard-Nielsen Title: Promoting Exit from Violent Extremism: Themes and Approaches Abstract: A number of Western countries are currently adding exit programs targeting militant Islamists to their counterterrorism efforts. Drawing on research into voluntary exit from violent extremism, this article identifies themes and issues that seem to cause doubt, leading to exit. It then provides a perspective on how these natural sources of doubt might best be brought to bear in connection with an exit program by drawing on social psychology and research into persuasion and attitude change. It is argued that an external intervention should stay close to the potential exiter's own doubt, make the influence attempt as subtle as possible, use narratives and self-affirmatory strategies to reduce resistance to persuasion, and consider the possibility to promote attitudinal change via behavioral change as an alternative to seek to influence beliefs directly. Journal: Studies in Conflict & Terrorism Pages: 99-115 Issue: 2 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.747073 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.747073 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:2:p:99-115 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_747072_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bart Schuurman Author-X-Name-First: Bart Author-X-Name-Last: Schuurman Title: Defeated by Popular Demand: Public Support and Counterterrorism in Three Western Democracies, 1963–1998 Abstract: Acquiring and maintaining public support is frequently cited as an important requirement for governments fighting non-state actors. But how exactly can public support influence the course of counterterrorism campaigns and thereby contribute to an escalation or de-escalation of violence? This article argues that public support can provide a mandate for action but that it can also set boundaries for the measures governments and their non-state adversaries can legitimately use. Fluctuations in the quantity and quality of public support for either side can expand or contract these boundaries, potentially instigating marked changes in conflict-related violence levels and affecting the efficacy of government countermeasures. Journal: Studies in Conflict & Terrorism Pages: 152-175 Issue: 2 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.747072 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.747072 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:2:p:152-175 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_755912_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Steven Chermak Author-X-Name-First: Steven Author-X-Name-Last: Chermak Author-Name: Joshua Freilich Author-X-Name-First: Joshua Author-X-Name-Last: Freilich Author-Name: Michael Suttmoeller Author-X-Name-First: Michael Author-X-Name-Last: Suttmoeller Title: The Organizational Dynamics of Far-Right Hate Groups in the United States: Comparing Violent to Nonviolent Organizations Abstract: Few studies have explored the factors that distinguish violent from nonviolent far-right hate groups. We examine four categories of factors on hate groups: (1) Organizational capacity, (2) Organizational constituency, (3) Strategic connectivity, and (4) Structural arrangements. Age and size, groups in conflict, groups led by charismatic leaders, groups that advocated for leaderless resistance tactics, and region increased a group's propensity to commit violence. Groups that published ideological literature were significantly less likely to be violent. By identifying factors that distinguish violent from nonviolent groups, this study helps us better understand characteristics of violent far-right hate groups in the United States. Journal: Studies in Conflict & Terrorism Pages: 193-218 Issue: 3 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.755912 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.755912 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:3:p:193-218 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_755913_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bridget Nolan Author-X-Name-First: Bridget Author-X-Name-Last: Nolan Title: The Effects of Cleric Statements on Suicide Bombings in Pakistan, 2000–2010 Abstract: This article explores the relationship between suicide bombings and public cleric statements in Pakistan between 2000–2010. It establishes that bombings and statements increase over time, that cleric statements vary according to the bombing target, and that police and military targets most frequently garner clerics’ attention. An adaptation of Kaplan, Mintz, and Mishal's (2006) maximum likelihood estimation method determines whether cleric statements affect the bombing rate. The analysis shows that pro-suicide statements have a far greater effect on the bombing rate than anti-suicide statements, both in the magnitude of increased bombings and by the length of time over which they exert influence. Journal: Studies in Conflict & Terrorism Pages: 219-234 Issue: 3 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.755913 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.755913 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:3:p:219-234 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_755914_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: James Worrall Author-X-Name-First: James Author-X-Name-Last: Worrall Title: Reading Booth in Beirut: Is Hizbollah an Emancipatory Actor? Abstract: The concept of Emancipation has become increasingly important in security studies in recent years but how well does the idea travel outside of the Western context in which it was conceived and into the Middle East? This article examines Hizbollah's four main identities: religious, resistance, socioeconomic, and as allies/proxies of Iran and asks to what extent this key regional non-state actor sees itself as an emancipatory agent in its own terms and how this differs from the Emancipatory ideal of Critical Security Studies (CSS). Does Hizbollah's current makeup offer enough scope to pursue Emancipation in line with the CSS project? Since the precept of Jihad offers Muslims a theological justification to engage in a holy struggle for a moral, spiritual, or political goal, seemingly Hizbollah is uniquely positioned to offer the prospect of Emancipation for the traditionally downtrodden Shi’a citizens of Lebanon, but does their Islamic faith and their aim of adherence to the Islamic way of life which they interpret from the Qur’an and Sunnah proscribe their credentials as truly Emancipatory actors? The article uses this analysis to examine the extent to which the commitment to universal Emancipation, found in CSS, is reconcilable with its Western-orientated foundation when applied in a Middle Eastern context. Journal: Studies in Conflict & Terrorism Pages: 235-254 Issue: 3 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.755914 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.755914 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:3:p:235-254 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_755915_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Paul Rich Author-X-Name-First: Paul Author-X-Name-Last: Rich Title: Understanding Terror, Terrorism, and Their Representations in Media and Culture Abstract: This review article examines four recent books published on terrorism and insurgent warfare. It argues that the narrative developed from the early 1970s within terrorism studies or “terrorology†was considerably different from the discussion of terrorism in the post-1945 period and tended to marginalize the role of states in fomenting terror. The article looks at depictions of terrorism in both art and film as well the recent historiography of terrorism. The article argues that far more emphasis needs to be placed on the role of the French Revolution in the gestation of terrorism in the nineteenth century; by contrast the emphasis on late nineteenth century Russian terrorism has been rather exaggerated as many terrorist movement (such as that in 1880s Chicago) owed little to the Russian connection. Finally the article shows that the connection between terrorism and political nihilism has been overplayed and that few terrorist movements (as opposed to some terrorist theorists) were driven by a nihilist agenda. Journal: Studies in Conflict & Terrorism Pages: 255-277 Issue: 3 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.755915 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.755915 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:3:p:255-277 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_763599_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Christina Cliff Author-X-Name-First: Christina Author-X-Name-Last: Cliff Author-Name: Andrew First Author-X-Name-First: Andrew Author-X-Name-Last: First Title: Testing for Contagion/Diffusion of Terrorism in State Dyads Abstract: This article tests the application of contagion/diffusion theories of political violence to terrorist activity. In order to apply theories of contagion/diffusion to terrorism, Granger causality analysis of terrorist activity in three state dyads—Lebanon–Israel, Peru–Colombia, India–Pakistan—is conducted. Within each dyad, terrorist activities in general and specific terrorist tactics in particular are analyzed. The test results show that there are correlations of terrorist events that indicate evidence of contagion and/or diffusion in all three dyads tested, although the patterns of contagion/diffusion are different for each dyad. Journal: Studies in Conflict & Terrorism Pages: 292-314 Issue: 4 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.763599 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.763599 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:4:p:292-314 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_763598_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jessica Davis Author-X-Name-First: Jessica Author-X-Name-Last: Davis Title: Evolution of the Global : Female Suicide Bombers in Iraq Abstract: Female suicide bombers are increasingly seen in conflicts throughout the world; in recent years, they have become much more prevalent in religious-fundamentalist conflict. Specifically, global jihadist groups are increasingly incorporating female suicide bombers into their operations, a significant ideological and operational shift for most of these groups. Jihadist groups are using women to fill a recruiting void, to achieve tactical surprise, and for strategic purposes. Female suicide bombers are likely to emerge in jihadist conflicts throughout the world, from Nigeria to Pakistan and beyond. Journal: Studies in Conflict & Terrorism Pages: 279-291 Issue: 4 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.763598 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.763598 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:4:p:279-291 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_763601_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alessandro Orsini Author-X-Name-First: Alessandro Author-X-Name-Last: Orsini Title: A Day Among the Diehard Terrorists: The Psychological Costs of Doing Ethnographic Research Abstract: This article describes the experience of a sociologist who made contact with a group of diehard terrorists responsible for multiple murders in order to conduct an ethnographic study. After outlining the sociological profile of the diehard terrorists, the author—making reference to the ethnographic studies of Jack Douglas, Martin Sanchez Jankowski, and Laud Humphreys—describes how he followed their traces. The aim of the article is to analyze the psychological costs that the sociologist must pay when he interacts with men and women who, in addition to proudly claiming credit for the homicides they have committed, affirm the importance of continuing to kill in order to salvage humanity's future. Journal: Studies in Conflict & Terrorism Pages: 337-351 Issue: 4 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.763601 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.763601 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:4:p:337-351 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_763600_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Justin Conrad Author-X-Name-First: Justin Author-X-Name-Last: Conrad Author-Name: Daniel Milton Author-X-Name-First: Daniel Author-X-Name-Last: Milton Title: Unpacking the Connection Between Terror and Islam Abstract: Are countries with large Muslim populations more likely to experience or produce transnational terrorist attacks than countries with fewer Muslims? And if there is a difference, is it attributable to the influence of Islam, or to the economic, social, and political conditions that are common in predominantly Muslim countries? Analyzing all transnational terrorist attacks between 1973 and 2002, this study uses decomposition analysis to identify the relative contributions of the observable and behavioral characteristics of a state on the amount of terrorism that it experiences and produces. The results suggest that Muslim states do not systematically produce more terrorism than non-Muslim states once state repression, human rights abuses, and discrimination against minorities are taken into account. Journal: Studies in Conflict & Terrorism Pages: 315-336 Issue: 4 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.763600 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.763600 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:4:p:315-336 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_775417_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Byman Author-X-Name-First: Daniel Author-X-Name-Last: Byman Title: Fighting Insurgencies: How Much Does Religion Really Matter? Abstract: How do jihadist insurgencies differ from non-jihadist ones? Jihadist insurgents, like all insurgents, seek to control the government, need money and weapons, and thrive where government is weak. Yet their cause—jihad at local, regional, and global levels—gives them instant friends and resources, but also built-in enemies and burdens. Jihadist insurgents often organize, recruit, and fund-raise differently than traditional insurgent groups. The agendas of these militant groups often go against the local residents' sense of nationalism and anger these communities with their extreme interpretations of Islam. To take advantage of this, the United States can amplify local voices that are best able to discredit these insurgents and press allied regimes to disrupt the mosques, schools, and fund-raising networks that help support them. However, Washington should also recognize that weakening these groups at the local level may make them more likely to embrace international terrorism. Allied efforts to co-opt jihadists may make area societies and governments less favorable to other U.S. policies. Finally, failed democratization—a particularly salient issue given the Arab Spring—risks playing into the jihadist narrative. Journal: Studies in Conflict & Terrorism Pages: 353-371 Issue: 5 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.775417 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.775417 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:5:p:353-371 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_775478_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Paul Kamolnick Author-X-Name-First: Paul Author-X-Name-Last: Kamolnick Title: Al Qaeda's Crisis: Sayyid Imam and the Jurisprudence of Lawful Military Abstract: Militant Islamist Sayyid Imam's legal critique of Al Qaeda's anti-U.S. mass casualty terrorism holds great potential utility for counterterrorist messaging strategy. In this article, a jihad–realist Islamist theological–jurisprudential methodology is first defended as the means most productive for delegitimizing Al Qaeda among high value, religiously motivated recruits. Second, Sayyid Imam's specific allegations and detailed Sharia proofs against Al Qaeda are presented. Finally, implications are drawn for U.S. counterterrorist messaging focusing especially on the utility of wielding this theological–juridical approach as compared to other “counternarrative†approaches, and the vital need to accurately characterize Islamism and its relation to terrorism. Journal: Studies in Conflict & Terrorism Pages: 394-418 Issue: 5 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.775478 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.775478 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:5:p:394-418 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_775455_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Shale Horowitz Author-X-Name-First: Shale Author-X-Name-Last: Horowitz Author-Name: Min Ye Author-X-Name-First: Min Author-X-Name-Last: Ye Title: Targeting Civilians in Ethno-Territorial Wars: Power- and Preference-Based Sources of Ethnic Cleansing and Mass Killing Strategies Abstract: In internal ethno-territorial conflicts, what explains why state or rebel group leaderships use civilian-targeting strategies—expulsion or mass killing strategies designed to punish enemy civilians or to decimate the enemy civilian presence on contested territory? One argument is that those living under the worst initial conditions—defined in terms of collective goods such as weak collective autonomy, policy outcomes, and material conditions—are most likely to target enemy group civilians. Another approach focuses on relative power—arguing that the enemy civilian population is targeted either because of weaker or stronger relative power. A third approach argues that differences in leadership preferences—in particular, more ideologically extreme or power-seeking preferences—are likely to drive direct assaults on enemy civilians. We examine these proposed mechanisms in terms of expected effects on benefits and costs in a simple ethno-territorial bargaining framework. We argue that relative power advantages and more extreme nationalist preferences seem most likely to predict decisions to target enemy civilian populations. We expect strongly power-seeking preferences to lead to civilian targeting more conditionally—where there is a greater internal political threat along with either greater relative power or a more moderate enemy. Last, we do not expect that variation in initial conditions will have a significant direct effect. We apply the framework to explain patterns of civilian targeting following the collapse of Yugoslavia in 1991. [Supplementary material is available for this article. Go to the publisher's online edition of Studies in Conflict & Terrorism for the following free supplemental resource: online appendix.] Journal: Studies in Conflict & Terrorism Pages: 372-393 Issue: 5 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.775455 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.775455 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:5:p:372-393 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_775501_O.xml processed with: repec_from_tfja.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: James Khalil Author-X-Name-First: James Author-X-Name-Last: Khalil Title: Know Your Enemy: On the Futility of Distinguishing Between Terrorists and Insurgents Abstract: Academics and military analysts regularly attempt to distinguish terrorists from insurgents through focusing on the extent to which these adversaries (a) adopt nonviolent methods, (b) apply uncompromising forms of violence, (c) generate local support, (d) recruit and maintain manpower, and (e) control territory. In contrast, this article argues that attempts to distinguish between these adversaries inevitably fail, firstly, as they arbitrarily impose binary distinctions upon continuous variables (e.g., in levels of support, manpower figures), and secondly as there is a lack of agreement across these supposedly identifying characteristics. Thus, contrary to common wisdom, it is concluded that there is no contradiction in simultaneously labeling groups such as the Taliban and Al Qaeda as both terrorists and insurgents. Indeed, a complete understanding of these groups requires an assessment of their activities at both the tactical (as terrorists) and strategic (as insurgents) levels. Journal: Studies in Conflict & Terrorism Pages: 419-430 Issue: 5 Volume: 36 Year: 2013 X-DOI: 10.1080/1057610X.2013.775501 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.775501 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:5:p:419-430 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_784568_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Peter R. Neumann Author-X-Name-First: Peter R. Author-X-Name-Last: Neumann Title: Options and Strategies for Countering Online Radicalization in the United States Abstract: The purpose of this article is to inform the debate about strategies and options for countering online radicalization within the U.S. domestic context. Its aim is to provide a better understanding of how the Internet facilitates radicalization; an appreciation of the dilemmas and tradeoffs that are involved in countering online radicalization within the United States; and ideas and best practices for making the emerging approach and strategy richer and more effective. It argues that online radicalization can be dealt with in three ways. Approaches aimed at restricting freedom of speech and removing content from the Internet are not only the least desirable, they are also the least effective. Instead, government should play a more energetic role in reducing the demand for radicalization and violent extremist messages—for example, by encouraging civic challenges to extremist narratives and by promoting awareness and education of young people. In the short term, the most promising way for dealing with the presence of violent extremists and their propaganda on the Internet is to exploit their online communications to gain intelligence and gather evidence in the most comprehensive and systematic fashion possible. Journal: Studies in Conflict & Terrorism Pages: 431-459 Issue: 6 Volume: 36 Year: 2013 Month: 6 X-DOI: 10.1080/1057610X.2013.784568 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.784568 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:6:p:431-459 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_784574_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Samuel C. Lindsey Author-X-Name-First: Samuel C. Author-X-Name-Last: Lindsey Author-Name: Michael J. Williams Author-X-Name-First: Michael J. Author-X-Name-Last: Williams Title: State-Sponsored Social Control of Illegitimate Social Movements: Strategies Used to Financially Damage Radical Islamic, Terrorist-Labeled Organizations Abstract: This article documents strategies and tactics of social control used by the U.S. government to detect and deter financing of radical Islamic, terrorist-labeled organizations. Through grounded theory, social control strategies were identified based on data from congressional committee hearings from 1999 to 2011. Findings revealed the presence of nine such strategies: (1) discover sources of funding, (2) deny or restrict access to money, (3) establish information networks and communication norms, (4) create derogatory labels, (5) influence the media, (6) impose legal sanctions, (7) offer financial incentives, (8) construct a shared collective identity, and (9) force terrorist-labeled organizations on the defensive. Journal: Studies in Conflict & Terrorism Pages: 460-476 Issue: 6 Volume: 36 Year: 2013 Month: 6 X-DOI: 10.1080/1057610X.2013.784574 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.784574 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:6:p:460-476 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_784603_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Dan Cunningham Author-X-Name-First: Dan Author-X-Name-Last: Cunningham Author-Name: Sean Everton Author-X-Name-First: Sean Author-X-Name-Last: Everton Author-Name: Greg Wilson Author-X-Name-First: Greg Author-X-Name-Last: Wilson Author-Name: Carlos Padilla Author-X-Name-First: Carlos Author-X-Name-Last: Padilla Author-Name: Doug Zimmerman Author-X-Name-First: Doug Author-X-Name-Last: Zimmerman Title: Brokers and Key Players in the Internationalization of the FARC Abstract: The Fuerzas Armadas Revolucionarias de Colombia (Revolutionary Armed Forces of Colombia—FARC) was originally founded to protect Colombian peasants from harsh landowner policies in exchange for food and supplies. Over time, it has evolved into an internationally connected, narco-trafficking organization that displays little concern for the peasants it once vowed to protect. In recent years, Colombian authorities have become more adept at countering the FARC, forcing it to operate increasingly outside of Colombia. The FARC's transformation from a local insurgency into an internationally connected one is the focus of this article. Using social network analysis it identifies key leaders who are tied to this transformation and discusses implications concerning the FARC's future. Journal: Studies in Conflict & Terrorism Pages: 477-502 Issue: 6 Volume: 36 Year: 2013 Month: 6 X-DOI: 10.1080/1057610X.2013.784603 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.784603 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:6:p:477-502 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_784611_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Yagil Henkin Author-X-Name-First: Yagil Author-X-Name-Last: Henkin Title: Stoning the Dogs: Guerilla Mobilization and Violence in Rhodesia Abstract: Rhodesia, a breakaway British colony, was engulfed in an insurgency through much of its short history. African guerillas, rebelling against the white minority government, have killed many more African civilians during the war—the same group that formed their base of support—than either government soldiers or European civilians. The violence was not only intended to punish enemies of the guerilla—traitors or collaborators with the government. Nor was it the result of lack of popular support. Violence forced guerilla sympathizers to actively support the insurgency or participate in it, despite the considerable risks this participation carried. Political support should not be mistaken with mobilization. Without violence, the lack of benefits and the danger of government reprisal may have kept many from actively assisting the insurgency, despite politically identifying with the guerillas and hoping for their victory. Journal: Studies in Conflict & Terrorism Pages: 503-532 Issue: 6 Volume: 36 Year: 2013 Month: 6 X-DOI: 10.1080/1057610X.2013.784611 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.784611 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:6:p:503-532 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_793637_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David Vielhaber Author-X-Name-First: David Author-X-Name-Last: Vielhaber Title: The Stasi–Meinhof Complex? Abstract: The extent of the East German Ministry for State Security's involvement with militant left-wing terrorist organizations that operated in West Germany remains one of the most contentious issues with respect to the legacy of left-wing terrorism in Germany. Fueled by new archival evidence and much speculation, the topic has been the subject of many unfounded and sensationalist assertions. This article seeks to provide a chronological reassessment based on the current state of knowledge, and thus seeks to make a contribution to a growing literature on state involvement with terrorist groups. While the East German spy agency at times colluded with terrorist groups, the degree of support fluctuated considerably and there is no evidence that a state actor “created†the armed groups or “directed†their activities. Journal: Studies in Conflict & Terrorism Pages: 533-546 Issue: 7 Volume: 36 Year: 2013 Month: 7 X-DOI: 10.1080/1057610X.2013.793637 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.793637 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:7:p:533-546 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_793617_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: S. D. Selvadurai Author-X-Name-First: S. D. Author-X-Name-Last: Selvadurai Author-Name: M. L. R. Smith Author-X-Name-First: M. L. R. Author-X-Name-Last: Smith Title: Black Tigers, Bronze Lotus: The Evolution and Dynamics of Sri Lanka's Strategies of Dirty War Abstract: Although much has been written on the Sri Lankan state's civil war with the Liberation Tigers of Tamil Eelam (LTTE), less has been said about how the conflict's dynamics evolved. How did the parties come to utilize the methods they did? Why did the war become so brutal, characterized by a predisposition toward extreme violence on both sides? Using the typology of “dirty war,†this investigation seeks to address such questions, demonstrating how the strategic choices of the main belligerents shaped the conflict. The analysis shows that while the conflict emerged out of deep-rooted social and ethnic divisions, these factors do not account for how the war came to be defined so comprehensively by the methods of dirty war. It finds that dirty war developed from a sporadic tactic to advance political goals to dominant military practice by a reciprocal process of escalation that eventually internalized dirty war as the accepted mode of strategic communication. Journal: Studies in Conflict & Terrorism Pages: 547-572 Issue: 7 Volume: 36 Year: 2013 Month: 7 X-DOI: 10.1080/1057610X.2013.793617 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.793617 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:7:p:547-572 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_793592_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Srobana Bhattacharya Author-X-Name-First: Srobana Author-X-Name-Last: Bhattacharya Title: Strategic Interaction Between Rebels and the State: A Study of the Maoist Conflict in Nepal Abstract: The “people's war†in Nepal during 1996–2006, led to two significant outcomes—the elimination of monarchy and political victory for the Maoists. These political outcomes raise important questions about the process of Maoist conflict in Nepal. While several studies on political conflict are concerned about “why†such conflicts happen, I focus on “how†the strategy of conflict unfolded in Nepal. In this article, I argue that strategic interaction between rebels and the state explain why the conflict led to negotiated settlement in Nepal. To discuss the sequence of rebel–state interaction, I introduce a game theoretic model. In addition, I show how territorial control, target selection, and levels of violence used by the rebels in comparison to the state are crucial in understanding the conflict process. The case study in this article analyzes the relevance of rebel–state interaction to reveal micro processes of political conflict and further suggests that negotiation can become an important tactical choice in resolving conflict. Journal: Studies in Conflict & Terrorism Pages: 573-587 Issue: 7 Volume: 36 Year: 2013 Month: 7 X-DOI: 10.1080/1057610X.2013.793592 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.793592 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:7:p:573-587 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_793636_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Eric Jardine Author-X-Name-First: Eric Author-X-Name-Last: Jardine Author-Name: Simon Palamar Author-X-Name-First: Simon Author-X-Name-Last: Palamar Title: From Medusa Past Kantolo: Testing the Effectiveness of Canada's Enemy-Centric and Population-Centric Counterinsurgency Operational Strategies Abstract: Canada's counterinsurgency in Kandahar province, Afghanistan, involved two distinct operational strategies: an initial enemy-centric strategy and, after 2009, a population-centric strategy. Using insurgent-initiated attacks against civilians as a measure for the level of control and security provided by the counterinsurgency, this article tests the effectiveness of these two strategies using a quasi-experimental research design. This article finds that a population-centric counterinsurgency strategy that aimed to provide security to the population rather than destroy the insurgency resulted in the most controlled and secure environment for the civilian population. To the extent that a secure civilian population is important for successful counterinsurgency, the post-2009 population-centric operational strategy of the Canadian Forces, International Security Assistance Force (ISAF), and the United States increased the chances of a successful counterinsurgency in Afghanistan. Journal: Studies in Conflict & Terrorism Pages: 588-608 Issue: 7 Volume: 36 Year: 2013 Month: 7 X-DOI: 10.1080/1057610X.2013.793636 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.793636 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:7:p:588-608 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_793638_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mahmoud Eid Author-X-Name-First: Mahmoud Author-X-Name-Last: Eid Title: The New Era of Media and Terrorism Journal: Studies in Conflict & Terrorism Pages: 609-615 Issue: 7 Volume: 36 Year: 2013 Month: 7 X-DOI: 10.1080/1057610X.2013.793638 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.793638 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:7:p:609-615 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_802972_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lawrence E. Cline Author-X-Name-First: Lawrence E. Author-X-Name-Last: Cline Title: Nomads, Islamists, and Soldiers: The Struggles for Northern Mali Abstract: Mali has been faced with a series of uprisings by its Tuareg over a number of years. Although each of these rebellions was ended by a cease-fire, the Malian government never succeeded in instituting longer term peace agreements. The 2012 Tuareg rebellion has presented even more significant security threats. The environment in northern Mali now is marked by multiple armed groups, with multiple competing agendas. This complex situation, with Tuareg rebels, Islamists with varying goals, and local militias, with a pattern of varying levels of cooperation and conflict, will at best be very difficult to resolve in the long term. Combined with an almost complete security vacuum in northern Mali on the part of the government, this situation could be intractable even with external intervention. At the same time, the focus on counterterrorism in northern Mali may not be conducive to a long-term resolution of what in reality is a much more complicated security environment. Journal: Studies in Conflict & Terrorism Pages: 617-634 Issue: 8 Volume: 36 Year: 2013 Month: 8 X-DOI: 10.1080/1057610X.2013.802972 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.802972 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:8:p:617-634 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_802973_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bruce Hoffman Author-X-Name-First: Bruce Author-X-Name-Last: Hoffman Title: Al Qaeda's Uncertain Future Abstract: This article considers the current state of the Al Qaeda terrorist movement and its likely future trajectory. It considers the principle assumptions both today and in the past about Al Qaeda and how they affect our understanding of the movement and the threat that it poses; Al Qaeda's current capacity for violence; and its ability to plan strategically and implement terrorist operations. The article further identifies nine key change drivers that will likely determine Al Qaeda's fate in the years to come before concluding that, even while the core Al Qaeda group may be in decline, Al Qaeda-ism, the movement's ideology, continues to resonate and attract new adherents. In sum, it argues that Al Qaeda remains an appealing brand most recently and most especially to extremist groups in North and West Africa and the Levant. Journal: Studies in Conflict & Terrorism Pages: 635-653 Issue: 8 Volume: 36 Year: 2013 Month: 8 X-DOI: 10.1080/1057610X.2013.802973 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.802973 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:8:p:635-653 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_802976_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Pete Simi Author-X-Name-First: Pete Author-X-Name-Last: Simi Author-Name: Bryan F. Bubolz Author-X-Name-First: Bryan F. Author-X-Name-Last: Bubolz Author-Name: Ann Hardman Author-X-Name-First: Ann Author-X-Name-Last: Hardman Title: Military Experience, Identity Discrepancies, and Far Right Terrorism: An Exploratory Analysis Abstract: The relationship between far right extremism and military involvement is a complex problem and the dynamics that explain this relationship are not well understood. The present article addresses this gap by discussing the relationship between military experience, identity discrepancies, and far right terrorism. This article proposes that identity discrepancies occur when individuals experience involuntary role exits from the military or when individuals perceive that personal achievements earned while enlisted are unrecognized or unappreciated. Identity discrepancies may facilitate a change in behavior toward far right extremism and eventually terrorism. Case study examples are provided to illustrate this relationship. Journal: Studies in Conflict & Terrorism Pages: 654-671 Issue: 8 Volume: 36 Year: 2013 Month: 8 X-DOI: 10.1080/1057610X.2013.802976 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.802976 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:8:p:654-671 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_802975_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alessandro Orsini Author-X-Name-First: Alessandro Author-X-Name-Last: Orsini Title: Interview With a Terrorist by Vocation: A Day Among the Diehard Terrorists, Part II Abstract: The interview that follows was conducted somewhere in Italy with a militant of the Red Brigades recently freed after spending 32 years and 6 months in prison. Taking up the sociological perspective of Max Weber, the author draws a distinction between “professional terrorist†and “vocational terroristâ€. The terrorist by vocation differs from the professional terrorist in his profound faith in the mission he feels he must accomplish. He does not try to improve his social status and is not interested in the selfish pursuit of personal well-being. He gives up love, family, children and friendship. When he decides to join a terrorist group, he voluntarily severs any contact with his former life. He is a high school or university graduate and might choose a secure life and a good job but prefers to kill, accepting the risk of dying. The vocational terrorist is the terrorist in his incandescent state. Journal: Studies in Conflict & Terrorism Pages: 672-684 Issue: 8 Volume: 36 Year: 2013 Month: 8 X-DOI: 10.1080/1057610X.2013.802975 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.802975 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:8:p:672-684 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_802977_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anna Simons Author-X-Name-First: Anna Author-X-Name-Last: Simons Title: Crooked Lessons from the Indian Wars Abstract: One aim of this article is to chide the U.S. military—and Americans overall—for not paying sufficient attention to our historic relations with American Indians. After all, American Indians are the non-Westerners we Americans should know best. A review of American Indian history can shed important light on our current encounters with tribal peoples elsewhere. At the same time, however, great care needs to be taken. Instead of just citing similarities—as analogies lead us to do—we must also take note of differences, which we can best do by using history as a foil. Journal: Studies in Conflict & Terrorism Pages: 685-697 Issue: 8 Volume: 36 Year: 2013 Month: 8 X-DOI: 10.1080/1057610X.2013.802977 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.802977 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:8:p:685-697 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_813244_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Boaz Ganor Author-X-Name-First: Boaz Author-X-Name-Last: Ganor Author-Name: Miri Halperin Wernli Author-X-Name-First: Miri Author-X-Name-Last: Halperin Wernli Title: The Infiltration of Terrorist Organizations Into the Pharmaceutical Industry: Hezbollah as a Case Study Abstract: Criminal syndicates and terrorist organizations are inherently different, one motivated by profit and the other by political goals. Yet their difference enables them to cooperate for their mutual benefit. Nowhere has this been more evident than in the drug trade; from harvesting and trafficking in illegal substances, it has been an easy transition to counterfeiting and disseminating medications. Hezbollah, in particular, has become involved in the production, smuggling and distribution of counterfeit medications in North America, Africa and the Middle East as a means of raising immense sums of money to finance its terrorist activities. Hezbollah's infiltration into the pharmaceuticals industry illustrates the danger posed by the marriage of terrorism and crime, which arises both from enhanced resources for terrorism, and from the corruption of a legitimate and necessary industry. Understanding the nature and extent of this danger is the first step in preparing to meet it. Journal: Studies in Conflict & Terrorism Pages: 699-712 Issue: 9 Volume: 36 Year: 2013 Month: 9 X-DOI: 10.1080/1057610X.2013.813244 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.813244 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:9:p:699-712 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_813248_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gaetano Joe Ilardi Author-X-Name-First: Gaetano Joe Author-X-Name-Last: Ilardi Title: Interviews With Canadian Radicals Abstract: Based on in-depth interviews with seven Canadian radicals in 2011, this article provides a detailed and nuanced insight into these men's personal journeys into, and in some cases, exit from, the world of radical Islam. Reflecting on their motivation, emotions, and decision-making processes, these men's stories demonstrate that the radicalization experience is anything but straightforward in the sense of there being a single and unambiguous motivation that spurs individuals on. Rather, they reveal that they were drawn to, and remained involved with, the world of extremism for a variety of reasons, not all of which necessarily related to the existence of grievances, real or imagined. Moreover, the relative importance of these drivers appeared to be in a state of flux, depending on an individual's needs or circumstances at any given time. Indeed, the highly idiosyncratic and temporally specific nature of the radicalization process, as demonstrated by these men's accounts, does not bode well for government and law enforcement efforts to anticipate specific cases of radicalization. Journal: Studies in Conflict & Terrorism Pages: 713-738 Issue: 9 Volume: 36 Year: 2013 Month: 9 X-DOI: 10.1080/1057610X.2013.813248 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.813248 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:9:p:713-738 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_813264_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Andrew Zammit Author-X-Name-First: Andrew Author-X-Name-Last: Zammit Title: Explaining a Turning Point in Australian Jihadism Abstract: After 2003, Australia's domestic jihadist plots shifted from being externally guided to being entirely self-starting, which was out of sync with international trends. To identify the causes behind this turning point, this article first provides a brief overview of jihadist activity in Australia, showing how the post-2003 shift differentiates it from comparable countries. The article then examines several potential explanations for the shift that prove insufficient. Following that, the article demonstrates that the shift occurred because key facilitators between Australia and South Asia were removed or deterred. This factor, combined with the limited strategic importance of Australia, low levels of jihadist radicalization, and limited diaspora involvement from the countries most central to Al Qaeda operations, explains Australia's specific pattern of jihadist activity. Journal: Studies in Conflict & Terrorism Pages: 739-755 Issue: 9 Volume: 36 Year: 2013 Month: 9 X-DOI: 10.1080/1057610X.2013.813264 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.813264 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:9:p:739-755 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_813261_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Richard Reed Author-X-Name-First: Richard Author-X-Name-Last: Reed Title: Life, Liberty, and the Pursuit of Anyone Who Gets in the Way: Lessons from a Comparative Analysis of U.S. Militias and Ulster Loyalists Abstract: This article presents a comparative analysis of the militia movement in the United States and the two major loyalist paramilitary organizations in Northern Ireland. The comparison reveals a similar history of economic transition that highlights the need to consider occupational factors in assessing the causes of violent extremism. The article reflects further on the evidence of a number of other similarities between the two groups: the preeminence of historical narratives, the tendency toward militancy and violence, and localist, antigovernment ideologies. It is argued that these similarities can be similarly understood within the same economic framework, and suggests further research in similarly comparative contexts would reveal greater insight. Journal: Studies in Conflict & Terrorism Pages: 756-776 Issue: 9 Volume: 36 Year: 2013 Month: 9 X-DOI: 10.1080/1057610X.2013.813261 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.813261 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:9:p:756-776 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_813273_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sharon L. Cardash Author-X-Name-First: Sharon L. Author-X-Name-Last: Cardash Author-Name: Frank J. Cilluffo Author-X-Name-First: Frank J. Author-X-Name-Last: Cilluffo Author-Name: Rain Ottis Author-X-Name-First: Rain Author-X-Name-Last: Ottis Title: Estonia's Cyber Defence League: A Model for the United States? Abstract: The cyber threat spectrum that prevails today is both broad and deep. While we cannot protect everything, everywhere, all the time, we can and must make a concerted and sustained effort to shore up national defenses as they pertain to cybersecurity. Despite considerable differences of scale and scope, Estonia's made-in-country cyber solutions may hold promise for the United States, at least with some adjustments and tailoring to take into account differing requirements and traditions. There may be much to learn from a country that bills itself as “e-Estonia, the digital society,†and also delivers on that promise. Specifically, the country's Cyber Defence League is a concept and construct that may prove useful for the United States to consider and contemplate at a time when significant cyber threats continue to multiply, but the skilled personnel needed to counter the challenge are in short supply on the U.S. side. Journal: Studies in Conflict & Terrorism Pages: 777-787 Issue: 9 Volume: 36 Year: 2013 Month: 9 X-DOI: 10.1080/1057610X.2013.813273 File-URL: http://hdl.handle.net/10.1080/1057610X.2013.813273 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:36:y:2013:i:9:p:777-787 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_853604_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sarah Marsden Author-X-Name-First: Sarah Author-X-Name-Last: Marsden Author-Name: Daiana Marino Author-X-Name-First: Daiana Author-X-Name-Last: Marino Author-Name: Gilbert Ramsay Author-X-Name-First: Gilbert Author-X-Name-Last: Ramsay Title: Forest Jihad: Assessing the Evidence for “Popular Resistance Terrorism†Abstract: Despite increasing concern over the potential threat from “forest jihad,†there has been no systematic attempt to assess whether such attacks are in fact taking place. Drawing on principles from the geospatial profiling of terrorist events, fire-risk prediction data, and information on jihadist convictions, this article offers a thorough review of the evidence to address this question. The available information suggests that so far, jihadists have not attempted to attack North American or European wildlands by means of arson. Despite calls for “popular resistance terrorism†in the jihadist literature, and the apparently low costs associated with this type of attack, jihadists have so far shown little appetite for “forest jihad.†Journal: Studies in Conflict & Terrorism Pages: 1-17 Issue: 1 Volume: 37 Year: 2014 Month: 1 X-DOI: 10.1080/1057610X.2014.853604 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.853604 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:1:p:1-17 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_853605_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Olli J. Teirilä Author-X-Name-First: Olli J. Author-X-Name-Last: Teirilä Title: The Challenges to Cooperation Posed by the Nexus of Terrorism and Organized Crime: Comparing the Situations Between the Andean and the Sahel Regions Abstract: The recent conflict in the Sahel area is another case where the nexus of terrorism and organized crime causes challenges to the international community. Comparing the situation with that of the Andean region brings forth the challenges faced when dealing with this type of conflict: the states’ weak presence in the remote regions, the insurgents’ ability to offer income and “security†to the people, immediate threat to international investments, unresolved political/regional issues, the marriage of convenience of insurgents/terrorists and organized crime, internal divisions of the insurgent groups and also ideologies surviving or suffering after the elimination of their leaders. Journal: Studies in Conflict & Terrorism Pages: 18-40 Issue: 1 Volume: 37 Year: 2014 Month: 1 X-DOI: 10.1080/1057610X.2014.853605 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.853605 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:1:p:18-40 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_853602_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel E. Agbiboa Author-X-Name-First: Daniel E. Author-X-Name-Last: Agbiboa Title: Peace at Daggers Drawn? Boko Haram and the State of Emergency in Nigeria Abstract: More than 3,500 people have died in Nigeria since 2009 when Boko Haram, a radical Islamist group from northeastern Nigeria, launched its violent campaign to wrest power from the Nigerian government and foist an Islamic state under the supreme law of Sharia. Attempts at negotiating with the group, including the recent amnesty offer extended to its members by the Nigerian government, have stalled due to distrust on both sides and the factionalized leadership of the group's different cells. This article provides a systematic account of Boko Haram's emergence, demands, and modus operandi. It also evaluates how the Nigerian government has responded to the group's threat and how they should respond. The socioeconomic approach of this article helps to explain the Boko Haram problem beyond a usual religious agenda and to evaluate the development of the group in the context of Nigeria's checkered political history and local economic grievances. Journal: Studies in Conflict & Terrorism Pages: 41-67 Issue: 1 Volume: 37 Year: 2014 Month: 1 X-DOI: 10.1080/1057610X.2014.853602 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.853602 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:1:p:41-67 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_853603_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lee Jarvis Author-X-Name-First: Lee Author-X-Name-Last: Jarvis Author-Name: Stuart Macdonald Author-X-Name-First: Stuart Author-X-Name-Last: Macdonald Author-Name: Lella Nouri Author-X-Name-First: Lella Author-X-Name-Last: Nouri Title: The Cyberterrorism Threat: Findings from a Survey of Researchers Abstract: This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries. The article begins with a brief review of existing literature on this topic, distinguishing between those concerned by an imminent threat of cyberterrorism, and other, more skeptical, views. Following a discussion on method, the article's analysis section then details findings from three research questions: (1) Does cyberterrorism constitute a significant threat? If so, against whom or what?; (2) Has a cyberterrorism attack ever taken place?; and (3) What are the most effective countermeasures against cyberterrorism? Are there significant differences to more traditional forms of anti- or counterterrorism? The article concludes by reflecting on areas of continuity and discontinuity between academic debate on cyberterrorism and on terrorism more broadly. Journal: Studies in Conflict & Terrorism Pages: 68-90 Issue: 1 Volume: 37 Year: 2014 Month: 1 X-DOI: 10.1080/1057610X.2014.853603 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.853603 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:1:p:68-90 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_853606_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lauren Vogel Author-X-Name-First: Lauren Author-X-Name-Last: Vogel Author-Name: Louise Porter Author-X-Name-First: Louise Author-X-Name-Last: Porter Author-Name: Mark Kebbell Author-X-Name-First: Mark Author-X-Name-Last: Kebbell Title: The Roles of Women in Contemporary Political and Revolutionary Conflict: A Thematic Model Abstract: Global population-level patterns in female participation in contemporary political and revolutionary conflict remain largely unknown as systematic empirical research in the area is lacking. Accordingly, this study systematically documented the participation of a comprehensive sample of women involved in conflict around the world. A statistically derived model of female participation is proposed that consists of four thematic roles representing specific patterns of activity: active, representing fighting and leadership activities; caring, representing traditional feminine tasks; support, representing logistically based tasks, and; ideological, representing activities that propagate the ideology of the group. The contribution of the model to theory, research, and practice is considered. Journal: Studies in Conflict & Terrorism Pages: 91-114 Issue: 1 Volume: 37 Year: 2014 Month: 1 X-DOI: 10.1080/1057610X.2014.853606 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.853606 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:1:p:91-114 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_941436_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Basia Spalek Author-X-Name-First: Basia Author-X-Name-Last: Spalek Title: Community Engagement for Counterterrorism in Britain: An Exploration of the Role of “Connectors†in Countering Takfiri Jihadist Terrorism Abstract: So far there has been little substantive research about how individuals engaged in counterterrorism initiatives, whether as community members or police officers or other professionals, negotiate this challenging terrain. This article suggests that community-based approaches to counterterrorism rely on the careful construction of certain forms of community engagement, rather than an all-encompassing claim that “communities defeat terrorism.†This article explores this issue further through analyzing and exploring the role that connectors, rather than communities per se, may play in counterterrorism. Journal: Studies in Conflict & Terrorism Pages: 825-841 Issue: 10 Volume: 37 Year: 2014 Month: 10 X-DOI: 10.1080/1057610X.2014.941436 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.941436 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:10:p:825-841 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_941434_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gordon Clubb Author-X-Name-First: Gordon Author-X-Name-Last: Clubb Title: “From Terrorists to Peacekeepersâ€: The IRA's Disengagement and the Role of Community Networks Abstract: Utilizing interviews with former Irish Republican Army (IRA) members, Loyalists, and community workers, the article looks at how militants in Northern Ireland have helped to prevent terrorism and political violence (TPV) by adopting roles in the community. By using mobile phones, a network of former combatants emerged around interface areas in the late 1990s to contain trigger causes of terrorism, providing a unique role that the state could not. The structure of the network encouraged militant groups to follow the IRA's example to disengage—thus creating a domino effect—and the co-operation between senior militants has limited the opportunities for other groups to mobilize a campaign of terrorism. Journal: Studies in Conflict & Terrorism Pages: 842-861 Issue: 10 Volume: 37 Year: 2014 Month: 10 X-DOI: 10.1080/1057610X.2014.941434 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.941434 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:10:p:842-861 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_941435_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Josef Schroefl Author-X-Name-First: Josef Author-X-Name-Last: Schroefl Author-Name: Stuart J. Kaufman Author-X-Name-First: Stuart J. Author-X-Name-Last: Kaufman Title: Hybrid Actors, Tactical Variety: Rethinking Asymmetric and Hybrid War Abstract: Wars like those in Iraq and Afghanistan should be understood as hybrid wars, wars in which elements of ethnic or tribal conflict, ideologically based insurgency, factional squabbling, and organized crime are inextricably intertwined, with the same actors playing multiple and partially conflicting roles. Hybrid war is inherently transnational, featuring transnational crime networks, “migrant warriors,†transnational diaspora links, legitimate international trade, and foreign intervention. It takes place in hybridized states reliant on local warlords and other actors whose power prevents effective state-building. In this context, while counterinsurgency doctrine prescribes appropriate military strategy and tactics, the core problem is more political than military. Since a hybridized client state is not likely to be politically reformable even if a foreign ally achieves military success, outside allies like the United States should generally refrain from boots-on-the-ground intervention, pursuing instead a diplomatic solution, even though such a deal is likely to be unpalatable. Journal: Studies in Conflict & Terrorism Pages: 862-880 Issue: 10 Volume: 37 Year: 2014 Month: 10 X-DOI: 10.1080/1057610X.2014.941435 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.941435 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:10:p:862-880 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_941437_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stewart J. D’Alessio Author-X-Name-First: Stewart J. Author-X-Name-Last: D’Alessio Author-Name: Lisa Stolzenberg Author-X-Name-First: Lisa Author-X-Name-Last: Stolzenberg Author-Name: Dustin Dariano Author-X-Name-First: Dustin Author-X-Name-Last: Dariano Title: Does Targeted Capture Reduce Terrorism? Abstract: From January 1979 to December 2009, the Maoist insurgent Shining Path committed a total of 9,034 violent acts in a concerted attempt to topple the Peruvian government. These acts of violence included bombings, armed assaults, and assassinations. The Shining Path's leader Abimael Guzmán was captured by the Peruvian government on 12 September 1992. Using quarterly data and an interrupted times-series AutoRegressive Integrative Moving Average (ARIMA) study design, we investigated the effect of Abimael Guzmán's capture on the ability of the Shining Path to wage its war against the Peruvian government. Maximum-likelihood results revealed that the frequency of terrorist acts committed by the Shining Path dropped by 143 incidents per quarter a short time after Guzmán was captured. The analysis also evinced a positive relationship between the lethality of attacks and the frequency of the Shining Path's terrorist activity. We conclude that targeted capture shows some promise as an effective counterterrorism strategy, at least for terrorist groups such as the Shining Path that have a top-down type of organizational structure. Journal: Studies in Conflict & Terrorism Pages: 881-894 Issue: 10 Volume: 37 Year: 2014 Month: 10 X-DOI: 10.1080/1057610X.2014.941437 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.941437 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:10:p:881-894 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_952511_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anneli Botha Author-X-Name-First: Anneli Author-X-Name-Last: Botha Title: Political Socialization and Terrorist Radicalization Among Individuals Who Joined al-Shabaab in Kenya Abstract: Islamist extremism through al-Shabaab is increasing its foothold in Kenya. In contrast to the common perception—as depicted through government responses—radicalization and recruitment extends well beyond Somali and Kenyan–Somali nationals. Instead of exclusively focusing on external or environmental factors, the study on which this article is based analyzed the personal background of those being radicalized. This article will focus on the role the family and peers play in the political socialization process while analyzing factors influencing radicalization, most notably religious identity, economic, political, and educational background of al-Shabaab members. Based on interviews with al-Shabaab and family members the last part of the article evaluates when, why, and how respondents joined al-Shabaab. Through answering these key questions the Kenyan government and other agencies assisting in preventing radicalization can develop more effective counterradicalization and counterterrorism strategies based on empirical evidence. Journal: Studies in Conflict & Terrorism Pages: 895-919 Issue: 11 Volume: 37 Year: 2014 Month: 11 X-DOI: 10.1080/1057610X.2014.952511 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.952511 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:11:p:895-919 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_952262_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Govinda Clayton Author-X-Name-First: Govinda Author-X-Name-Last: Clayton Author-Name: Andrew Thomson Author-X-Name-First: Andrew Author-X-Name-Last: Thomson Title: The Enemy of My Enemy is My Friend  …  The Dynamics of Self-Defense Forces in Irregular War: The Case of the Sons of Iraq Abstract: This article assesses the effect that leveraging civilian defense force militias has on the dynamics of violence in civil war. We argue that the delegation of security and combat roles to local civilians shifts the primary targets of insurgent violence toward civilians, in an attempt to deter future defections, and re-establish control over the local population. This argument is assessed through an analysis of the Sunni Awakening and ancillary Sons of Iraq paramilitary program. The results suggest that at least in the Al-Anbar province of Iraq, the utilization of the civilian population in counterinsurgent roles had significant implications for the targets of insurgent violence. Journal: Studies in Conflict & Terrorism Pages: 920-935 Issue: 11 Volume: 37 Year: 2014 Month: 11 X-DOI: 10.1080/1057610X.2014.952262 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.952262 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:11:p:920-935 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_952260_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Noel Anderson Author-X-Name-First: Noel Author-X-Name-Last: Anderson Title: Peacekeepers Fighting a Counterinsurgency Campaign: A Net Assessment of the African Union Mission in Somalia Abstract: In response to Somalia's decades-long political and humanitarian crises, the African Union has deployed a peace support operation known as the African Union Mission in Somalia. Tasked to help eliminate an ongoing insurgency, the mission has seen heavy combat as it fights to reclaim territory held by the al-Shabaab militant organization. This article applies the techniques of open source campaign analysis to assess the mission's prospects for long-term success. The prognosis is not good. Analysis reveals a range of vulnerabilities that threaten the deployment's core security objectives, suggesting that the optimism many have expressed for the mission is misplaced. Journal: Studies in Conflict & Terrorism Pages: 936-958 Issue: 11 Volume: 37 Year: 2014 Month: 11 X-DOI: 10.1080/1057610X.2014.952260 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.952260 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:11:p:936-958 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_952261_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael Becker Author-X-Name-First: Michael Author-X-Name-Last: Becker Title: Explaining Lone Wolf Target Selection in the United States Abstract: The rise in lone wolf terrorist attacks worldwide in recent decades makes understanding the types of targets lone wolves choose a crucial locus of research, yet this topic remains understudied. In light of this lacuna, this article analyzes 84 lone wolf terrorist attacks that occurred in the United States between 1940 and 2012, identifies patterns in lone wolf target selection, and proposes and tests causal explanations for these patterns. I find that (1) a majority of lone wolves select civilian targets in familiar areas and (2) this is due to their relative weakness and their ideology. Journal: Studies in Conflict & Terrorism Pages: 959-978 Issue: 11 Volume: 37 Year: 2014 Month: 11 X-DOI: 10.1080/1057610X.2014.952261 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.952261 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:11:p:959-978 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_962441_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stefan Malthaner Author-X-Name-First: Stefan Author-X-Name-Last: Malthaner Author-Name: Peter Waldmann Author-X-Name-First: Peter Author-X-Name-Last: Waldmann Title: The Radical Milieu: Conceptualizing the Supportive Social Environment of Terrorist Groups Abstract: Terrorist groups are not completely isolated, socially “free-floating†entities, but emerge from and operate within a specific, immediate social environment—what we call the radical milieu—which shares their perspective and objectives, approves of certain forms of violence, and (at least to a certain extent) supports the violent group morally and logistically. In this article we introduce an approach to conceptualize and analyze this formative and supportive social environment of clandestine groups, addressing the questions of how the radical milieu emerges, what forms it takes, and what role it plays in shaping the development of violent groups. Our focus, thereby, rests on relationship-patterns between violent groups and radical milieus as well as on processes of interaction between radical milieus and their broader political and societal environment, which may entail dynamics of support and control but also isolation and radicalization. Journal: Studies in Conflict & Terrorism Pages: 979-998 Issue: 12 Volume: 37 Year: 2014 Month: 12 X-DOI: 10.1080/1057610X.2014.962441 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.962441 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:12:p:979-998 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_962438_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Enzo Nussio Author-X-Name-First: Enzo Author-X-Name-Last: Nussio Author-Name: Ben Oppenheim Author-X-Name-First: Ben Author-X-Name-Last: Oppenheim Title: Anti-Social Capital in Former Members of Non-State Armed Groups: A Case Study of Colombia Abstract: Illegal organizations, like mafia syndicates, gangs, and insurgencies, are often highly cohesive and hostile toward the outside world. Such groups cultivate a particular form of “anti-social†capital, which relies on ingroup bonding and limits outgroup bridging for the purpose of commissioning illicit acts. We argue that experiences within the group leave members with varying intensities of anti-social capital, and that higher intensities lead to significantly weaker relationships with political institutions and civil society, even many years after they exit the group. We test this theory using survey data from 1,485 former members of insurgent and paramilitary groups in Colombia, along with insights from 68 qualitative interviews. We find strong evidence that anti-social capital has individually varying and sticky effects on former members. These effects are pervasive and intense, and exhibit surprising and counterintuitive properties: former members of pro-state militia with higher levels of anti-social capital are systematically less likely to trust political institutions, while members of peasant-based insurgent groups with high levels of anti-social capital are less likely to participate in their communities. Journal: Studies in Conflict & Terrorism Pages: 999-1023 Issue: 12 Volume: 37 Year: 2014 Month: 12 X-DOI: 10.1080/1057610X.2014.962438 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.962438 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:12:p:999-1023 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_962440_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kersti Larsdotter Author-X-Name-First: Kersti Author-X-Name-Last: Larsdotter Title: Fighting Transnational Insurgents: The South African Defence Force in Namibia, 1966–1989 Abstract: Transnational insurgents are a common feature of contemporary wars, but research on how to address this problem is still scarce. This article examines the South African Defence Force's (SADF) counterinsurgency against Namibian transnational insurgents. It concludes that the South African forces focused a large amount of their efforts outside the borders of Namibia. Highly coercive operations in Angola and Zambia created the space for hearts and minds activities in Namibia, as well as forcing neighboring states to end their support for the insurgents. Although the war in Namibia is somewhat different from contemporary wars, SADF's cross-border strategy gives us some important insights into the regional dynamics of civil wars. Journal: Studies in Conflict & Terrorism Pages: 1024-1038 Issue: 12 Volume: 37 Year: 2014 Month: 12 X-DOI: 10.1080/1057610X.2014.962440 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.962440 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:12:p:1024-1038 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_962439_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Carlo Koos Author-X-Name-First: Carlo Author-X-Name-Last: Koos Title: Why and How Civil Defense Militias Emerge: The Case of the Arrow Boys in South Sudan Abstract: This article uses a collective-action framework to study the mobilization of the Arrow Boys (AB), a community defense militia in South Sudan. Drawing on general collective-action explanations, this article argues that the mobilization of the AB was facilitated by two factors: (1) a strong overlap of the fighter's private and the community's public benefit and (2) close social relationships and expectations within the community. The article supports these theoretical claims by, first, examining the scope conditions under which the AB formed and, second, drawing on individual interviews with AB members from Western Equatoria in South Sudan. Journal: Studies in Conflict & Terrorism Pages: 1039-1057 Issue: 12 Volume: 37 Year: 2014 Month: 12 X-DOI: 10.1080/1057610X.2014.962439 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.962439 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:12:p:1039-1057 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_962899_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Editorial Board EOV Journal: Studies in Conflict & Terrorism Pages: ebi-ebi Issue: 12 Volume: 37 Year: 2014 Month: 12 X-DOI: 10.1080/1057610X.2014.962899 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.962899 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:12:p:ebi-ebi Template-Type: ReDIF-Article 1.0 # input file: UTER_A_862901_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Aurélie Campana Author-X-Name-First: Aurélie Author-X-Name-Last: Campana Author-Name: Jean-François Ratelle Author-X-Name-First: Jean-François Author-X-Name-Last: Ratelle Title: A Political Sociology Approach to the Diffusion of Conflict from Chechnya to Dagestan and Ingushetia Abstract: This article seeks to foster a better understanding of the diffusion of conflict in the North Caucasus. We argue that diffusion of conflict is a dynamic and adaptive process in which outcomes are shaped by the intersection of three social mechanisms—attribution of similarity, brokerage, and outbidding—and the political, social, and religious contexts. We suggest that a distinction should be made between horizontal and vertical processes of diffusion. We also approach the empirical diffusion of conflict from a different perspective, showing that non-Chechen actors have played a key role in both the diffusion process and its outcomes. Journal: Studies in Conflict & Terrorism Pages: 115-134 Issue: 2 Volume: 37 Year: 2014 Month: 2 X-DOI: 10.1080/1057610X.2014.862901 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.862901 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:2:p:115-134 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_862900_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Benjamin Acosta Author-X-Name-First: Benjamin Author-X-Name-Last: Acosta Title: Live to Win Another Day: Why Many Militant Organizations Survive Yet Few Succeed Abstract: Militant organizations pursue two common aims: to survive and to achieve the goals that define their raison d’être. Yet, elements that sustain the life spans of militant organizations are not necessarily the same components that advance the accomplishment of their core, or “outcome,†goals. Further, some organizational practices, such as the use of suicide attacks, generate a tradeoff that bolsters survivability while detracting from the effective pursuit of outcome goals. This study demonstrates that three operating conditions explain variation in the duration and achievement of contemporary militant organizations: receptiveness to tradeoffs, levels of external support, and the nature of adversaries. As such, the unique effects of different operating conditions reveal why many militant organizations survive for long periods of time but only a few achieve the goals that justify their existence. Journal: Studies in Conflict & Terrorism Pages: 135-161 Issue: 2 Volume: 37 Year: 2014 Month: 2 X-DOI: 10.1080/1057610X.2014.862900 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.862900 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:2:p:135-161 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_862904_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Goran Peic Author-X-Name-First: Goran Author-X-Name-Last: Peic Title: Civilian Defense Forces, State Capacity, and Government Victory in Counterinsurgency Wars Abstract: Given the onset of a violent rebellion by an armed non-state group, how do states re-establish intra-state peace and hence fulfill their basic function as providers of internal security? In this article I argue that one way governments perform this core function is by recruiting non-combatants into local self-defense units called civilian defense forces (CDFs). By providing for local security, leveraging their superior local knowledge, and provoking insurgent reprisals against civilians, CDF units facilitate the influx of tactical intelligence as well as isolate insurgents from non-combatant populations physically as well as politically. Consistent with the argument, statistical analyses of two different cross-national data sets of insurgencies from 1944 to 2006 reveal that a state is 53 percent more likely to vanquish a guerrilla threat if the incumbent deploys CDFs. The analyses also cast doubt on a recent claim in the literature that incumbent force mechanization adversely affects the states’ ability to counter insurgent threats. Given that CDF deployment is a more easily manipulable variable than most other elements of state power, CDFs appear to be an effective instrument of counterinsurgency deserving of further academic and policy attention. Journal: Studies in Conflict & Terrorism Pages: 162-184 Issue: 2 Volume: 37 Year: 2014 Month: 2 X-DOI: 10.1080/1057610X.2014.862904 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.862904 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:2:p:162-184 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_862903_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Andrei Miroiu Author-X-Name-First: Andrei Author-X-Name-Last: Miroiu Title: Military Operations in Romanian Anti-Partisan Warfare, 1944–1958 Abstract: Romanian anti-communist armed resistance has received relatively little attention outside the country, despite its resemblance to other small, diffused, headless insurgencies being fought in the first decades of the twenty-first century. This article deals with military operations mounted against the partisans, with a special focus on tactics such as cordoning, checkpoints, patrols, sweeps, ambushes, and informed strikes. Based mostly on primary sources, it highlights success and failure against determined and elusive guerrillas. Journal: Studies in Conflict & Terrorism Pages: 185-197 Issue: 2 Volume: 37 Year: 2014 Month: 2 X-DOI: 10.1080/1057610X.2014.862903 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.862903 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:2:p:185-197 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_862902_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: James Khalil Author-X-Name-First: James Author-X-Name-Last: Khalil Title: Radical Beliefs and Violent Actions Are Not Synonymous: How to Place the Key Disjuncture Between Attitudes and Behaviors at the Heart of Our Research into Political Violence Abstract: This article develops and elaborates on three core points. First, as with research into other social science themes, it is argued that it is necessary to apply the logic of correlation and causality to the study of political violence. Second, it highlights the critical disjuncture between attitudes and behaviors. Many or most individuals who support the use of political violence remain on the sidelines, including those who sympathize with insurgents in Afghanistan (reportedly 29 percent in 2011), and those supportive of “suicide attacks†in the Palestinian Territories (reportedly reaching 66 percent in 2005). Conversely, those responsible for such behaviors are not necessarily supportive of the ostensible political aims. Third, it is argued that the motives that drive these attitudes and behaviors are often (or, some would argue, always) distinct. While the former are motivated by collective grievances, there is substantial case study evidence that the latter are commonly driven by economic (e.g., payments for the emplacement of improvised explosive devices), security-based (i.e., coercion) and sociopsychological (e.g., adventure, status, and vengeance) incentives. Thus, it is necessary for the research community to treat attitudes and behaviors as two separate, albeit interrelated, lines of inquiry. Journal: Studies in Conflict & Terrorism Pages: 198-211 Issue: 2 Volume: 37 Year: 2014 Month: 2 X-DOI: 10.1080/1057610X.2014.862902 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.862902 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:2:p:198-211 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_872023_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anthony Richards Author-X-Name-First: Anthony Author-X-Name-Last: Richards Title: Conceptualizing Terrorism Abstract: This article argues that, while there have always been good reasons for striving for a universally agreed definition of terrorism, there are further reasons for doing so in the post 9/11 environment, notwithstanding the formidable challenges that confront such an endeavour. Arguing that the essence of terrorism lies in its intent to generate a psychological impact beyond the immediate victims, it will propose three preliminary assumptions: that there is no such thing as an act of violence that is in and of itself inherently terrorist, that terrorism is best conceptualized as a particular method of political violence rather than defined as inherent to any particular ideology or perpetrator, and that non-civilians and combatants can also be victims of terrorism. It will then outline the implications that these assumptions have for the definitional debate. Journal: Studies in Conflict & Terrorism Pages: 213-236 Issue: 3 Volume: 37 Year: 2014 Month: 3 X-DOI: 10.1080/1057610X.2014.872023 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.872023 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:3:p:213-236 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_872022_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alexandra Pocek Joosse Author-X-Name-First: Alexandra Pocek Author-X-Name-Last: Joosse Author-Name: H. Brinton Milward Author-X-Name-First: H. Brinton Author-X-Name-Last: Milward Title: Organizational Versus Individual Attribution: A Case Study of Jemaah Islamiyah and the Anthrax Plot Abstract: Recent studies have taken an important first step in examining which terrorist groups, based on their organizational characteristics and the characteristics of the environment in which they operate, are more likely to pursue chemical, biological, radiological, and nuclear (CBRN) weapons. This approach, however, assumes that individuals who perpetrate events act on behalf of the organization to which they primarily belong. Using the case of Jemaah Islamiyah's alleged attempt to develop the pathogenic bacterium Bacillus anthracis, or anthrax, the authors demonstrate the importance of including individual-level variables to the analysis. In particular, the attendance by several key Jemaah Islamiyah members at an Al Qaeda-affiliated training camp is argued to set a chain of events into motion that ended in their involvement in the anthrax cultivation program. Journal: Studies in Conflict & Terrorism Pages: 237-257 Issue: 3 Volume: 37 Year: 2014 Month: 3 X-DOI: 10.1080/1057610X.2014.872022 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.872022 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:3:p:237-257 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_872024_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lian Zucker Author-X-Name-First: Lian Author-X-Name-Last: Zucker Author-Name: Edward H. Kaplan Author-X-Name-First: Edward H. Author-X-Name-Last: Kaplan Title: Mass Casualty Potential of Qassam Rockets Abstract: In spite of the bombardment of southern Israel by thousands of Qassam rockets fired from the Gaza Strip, comparatively few people have been injured or killed. This has led some observers to dismiss Qassams as more of a symbolic than lethal threat. However, southern Israeli towns feature robust civil defense systems that include safe rooms, bomb shelters, early detection alarms, and missile defense. How many casualties would occur were such systems not in place? This article applies shrapnel-casualty and spatial allocation models to the population of the southern Israeli town of Sderot to estimate casualties per randomly aimed rocket fired into the unprepared town; that is, in the absence of civil defense (technical details appear in the Appendix). Assuming an injury radius of only 5 meters from impact, the modeled expected casualties per rocket are between three (best-case) and nine (worst-case) times higher than Sderot's observed casualties-to-rocket ratio, suggesting that Qassam-like terror attacks on unprotected urban locations could prove much more serious than what one would expect based solely on the observed number of casualties in Sderot. Journal: Studies in Conflict & Terrorism Pages: 258-266 Issue: 3 Volume: 37 Year: 2014 Month: 3 X-DOI: 10.1080/1057610X.2014.872024 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.872024 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:3:p:258-266 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_872021_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Luke M. Gerdes Author-X-Name-First: Luke M. Author-X-Name-Last: Gerdes Author-Name: Kristine Ringler Author-X-Name-First: Kristine Author-X-Name-Last: Ringler Author-Name: Barbara Autin Author-X-Name-First: Barbara Author-X-Name-Last: Autin Title: Assessing the Abu Sayyaf Group's Strategic and Learning Capacities Abstract: It remains unclear whether the Abu Sayyaf Group (ASG) is a well-structured terror organization that poses a strategic threat, or a loosely organized collection of bandits that poses limited risk. Efforts to assess the nature of the organization are complicated by flaws in existing datasets on Violent Non-State Actors (VNSAs). ASG's role in kidnappings serves as a test-case to estimate incongruities among four major datasets on VNSAs. Original data collected at the agent level provides an additional point of comparison and also serves to test the efficacy of ASG's knowledge-dissemination structures, which are key in determining VNSAs' strategic capacities. Journal: Studies in Conflict & Terrorism Pages: 267-293 Issue: 3 Volume: 37 Year: 2014 Month: 3 X-DOI: 10.1080/1057610X.2014.872021 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.872021 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:3:p:267-293 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_879380_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ophir Falk Author-X-Name-First: Ophir Author-X-Name-Last: Falk Title: Permissibility of Targeted Killing Abstract: Targeted killing has become an increasingly prevalent tactic employed by states in their efforts to counter terrorism. Despite its widespread use, the criteria for targeted killing permissibility have remained vague. This article identifies and evaluates the circumstances under which targeted killings can be considered permissible and looks at on-the-ground implementation by Israel and the United States. While both Israel and the United States may have largely adhered to the laws of armed conflict, in practice, discrepancies in implementation exist. This is primarily due to the ambiguity of the “distinction†and “proportionality†principles, two key legal and moral criteria that need further clarification. Journal: Studies in Conflict & Terrorism Pages: 295-321 Issue: 4 Volume: 37 Year: 2014 Month: 4 X-DOI: 10.1080/1057610X.2014.879380 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.879380 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:4:p:295-321 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_879381_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Süleyman Özeren Author-X-Name-First: Süleyman Author-X-Name-Last: Özeren Author-Name: Murat Sever Author-X-Name-First: Murat Author-X-Name-Last: Sever Author-Name: Kamil Yilmaz Author-X-Name-First: Kamil Author-X-Name-Last: Yilmaz Author-Name: Alper Sözer Author-X-Name-First: Alper Author-X-Name-Last: Sözer Title: Whom Do They Recruit?: Profiling and Recruitment in the PKK/KCK Abstract: Terrorist organizations use a proactive strategy in identifying potential candidates for recruitment. In such a strategy, miscellaneous vulnerabilities, grievances, and feeling destitute, inter alia, render certain individuals perfect candidates for terrorist organizations. It is therefore crucial to have an integrative approach to understand the interplay between the profiles of terrorists and their reasons to join terrorist groups on the one hand and processes of recruitment on the other. Proceeding from such a fulcrum, this article provides a general profile of the Kurdistan Workers’ Party [PKK]/Kurdistan Communities Union [KCK] members and various recruitment techniques used by this group. To this end, records of 2,270 group members were content analyzed, in addition to face-to-face interviews with 42 group members and a range of individuals from public and private institutions. Our findings suggest that a variety of individual and organizational factors influence individual paths toward terrorism. Journal: Studies in Conflict & Terrorism Pages: 322-347 Issue: 4 Volume: 37 Year: 2014 Month: 4 X-DOI: 10.1080/1057610X.2014.879381 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.879381 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:4:p:322-347 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_879436_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David C. Hofmann Author-X-Name-First: David C. Author-X-Name-Last: Hofmann Author-Name: Lorne L. Dawson Author-X-Name-First: Lorne L. Author-X-Name-Last: Dawson Title: The Neglected Role of Charismatic Authority in the Study of Terrorist Groups and Radicalization Abstract: Recent scholarship has called for additional research into the role of charismatic authority in terrorist groups and the process of radicalization. However, the sociological concepts of charisma and charismatic authority are being widely misused in terrorism studies. Current radicalization research often indirectly flirts with core concepts of charismatic authority, but fails to properly tap into its analytical utility. This article proposes to begin addressing this gap in knowledge in three ways, with: (1) a synthesis of social scientific research on charismatic authority, (2) a critical analysis of how charismatic authority is being misused and overlooked in the terrorist radicalization literature, and (3) an exploration of challenges and opportunities for future research concerning charismatic authority and terrorist radicalization. Journal: Studies in Conflict & Terrorism Pages: 348-368 Issue: 4 Volume: 37 Year: 2014 Month: 4 X-DOI: 10.1080/1057610X.2014.879436 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.879436 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:4:p:348-368 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_879379_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anne Aly Author-X-Name-First: Anne Author-X-Name-Last: Aly Author-Name: Elisabeth Taylor Author-X-Name-First: Elisabeth Author-X-Name-Last: Taylor Author-Name: Saul Karnovsky Author-X-Name-First: Saul Author-X-Name-Last: Karnovsky Title: Moral Disengagement and Building Resilience to Violent Extremism: An Education Intervention Abstract: This article reports on the development of an education intervention, the Beyond Bali Education Resource funded by the Australian Governments’ Building Community Resilience Grants of the Federal Attorney General's Department, that applies a conceptual framework grounded in moral disengagement theory. Beyond Bali is a five module program for schools that is specifically designed to build social cognitive resilience to violent extremism by engaging self-sanctions and preparing students to challenge the influence of violent extremism that can lead to moral disengagement. The theory of moral disengagement has been applied to the study of radicalization to violent extremism to explain how individuals can cognitively reconstruct the moral value of violence and carry out inhumane acts. The mechanisms of moral disengagement through which individuals justify violence, dehumanize victims, disregard the harmful consequences of violence and absolve themselves of blame have been used in the construction of violent extremist narratives. However, they have not been applied to the development of intervention strategies that aim to counter the radicalizing influences of violent extremist narratives. Journal: Studies in Conflict & Terrorism Pages: 369-385 Issue: 4 Volume: 37 Year: 2014 Month: 4 X-DOI: 10.1080/1057610X.2014.879379 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.879379 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:4:p:369-385 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_893403_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Pablo Brum Author-X-Name-First: Pablo Author-X-Name-Last: Brum Title: Revisiting Urban Guerrillas: Armed Propaganda and the Insurgency of Uruguay's MLN-Tupamaros, 1969–70 Abstract: This article studies a singular aspect of the urban insurgency of Uruguay's MLN-Tupamaros: the tactic of armed propaganda. The Tupamaros applied the method mainly at the peak of their existence, in the years 1969–70. Afterward they opted predominantly for others, such as terrorism. By comparing the two periods, I argue that armed propaganda helped the organization to thrive, while the latter was an important cause of its demise. The conclusion suggests that armed propaganda led the Tupamaros to significant accomplishments, but also that switching tactics was a major determinant in their defeat. Journal: Studies in Conflict & Terrorism Pages: 387-404 Issue: 5 Volume: 37 Year: 2014 Month: 5 X-DOI: 10.1080/1057610X.2014.893403 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.893403 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:5:p:387-404 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_893404_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bernhard Blumenau Author-X-Name-First: Bernhard Author-X-Name-Last: Blumenau Title: The European Communities’ Pyrrhic Victory: European Integration, Terrorism, and the Dublin Agreement of 1979 Abstract: This article looks at the European Communities’ efforts against terrorism in the 1970s. It argues that in spite of the high ambitions to improve European legal integration, the attempts to develop an antiterrorism agreement were quite obviously a failure. Although the Dublin Agreement was adopted in 1979 after cumbersome and lengthy negotiations, it fell short of showing the member states’ unity and resolve to fight terrorism, and it never entered into force. The tedious negotiations drained the member states’ energy and willingness to such an extent that no other steps toward judicial integration or antiterrorism treaties were taken. Journal: Studies in Conflict & Terrorism Pages: 405-421 Issue: 5 Volume: 37 Year: 2014 Month: 5 X-DOI: 10.1080/1057610X.2014.893404 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.893404 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:5:p:405-421 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_893480_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Erin M. Kearns Author-X-Name-First: Erin M. Author-X-Name-Last: Kearns Author-Name: Brendan Conlon Author-X-Name-First: Brendan Author-X-Name-Last: Conlon Author-Name: Joseph K. Young Author-X-Name-First: Joseph K. Author-X-Name-Last: Young Title: Lying About Terrorism Abstract: Conventional wisdom holds that terrorism is committed for strategic reasons as a form of costly signaling to an audience. However, since over half of terrorist attacks are not credibly claimed, conventional wisdom does not explain many acts of terrorism. This article suggests that there are four lies about terrorism that can be incorporated in a rationalist framework: false claiming, false flag, the hot-potato problem, and the lie of omission. Each of these lies about terrorism can be strategically employed to help a group achieve its desired goal(s) without necessitating that an attack be truthfully claimed. Journal: Studies in Conflict & Terrorism Pages: 422-439 Issue: 5 Volume: 37 Year: 2014 Month: 5 X-DOI: 10.1080/1057610X.2014.893480 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.893480 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:5:p:422-439 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_893405_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Petter Nesser Author-X-Name-First: Petter Author-X-Name-Last: Nesser Title: Toward an Increasingly Heterogeneous Threat: A Chronology of Jihadist Terrorism in Europe 2008–2013 Abstract: The 2012 Toulouse and Montauban shootings and the grisly murder of Drummer Lee Rigby in Woolwich in 2013 are stark reminders of a continued terrorist threat posed by jihadist terrorists in Europe. Whereas the 2011 death of Osama bin Laden and the advent of the “Arab Spring†fed expectations that international jihadism was a spent force, attack activity in Europe does not only seem to persist, but as will be shown here, the region has actually faced an increase in terrorist plots over the past few years. Journal: Studies in Conflict & Terrorism Pages: 440-456 Issue: 5 Volume: 37 Year: 2014 Month: 5 X-DOI: 10.1080/1057610X.2014.893405 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.893405 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:5:p:440-456 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_903374_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Isaac Kfir Author-X-Name-First: Isaac Author-X-Name-Last: Kfir Title: Sectarian Violence and Social Group Identity in Pakistan Abstract: Individual basic security is limited in Pakistan as the state is institutionally weak. One way to attain basic security is by joining groups who provide security and services. Consequently, groups not part of the political mainstream, to attract a following, must therefore show that they are sufficiently powerful to obtain concessions from established actors. Thus, by engaging in violence primarily of a sectarian nature, the Pakistani Taliban sustains itself as a unified force while also highlighting that it is a powerful group, which in turn it hopes would enable it to curve a political space and win concessions from the established elite. Using social group identity theory, club goods, and the economics of extremism, the article highlights why the Pakistani Taliban has increasingly attacked minorities and why more must be done to address sectarian violence. Journal: Studies in Conflict & Terrorism Pages: 457-472 Issue: 6 Volume: 37 Year: 2014 Month: 6 X-DOI: 10.1080/1057610X.2014.903374 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.903374 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:6:p:457-472 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_903451_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kirstin J. H. Brathwaite Author-X-Name-First: Kirstin J. H. Author-X-Name-Last: Brathwaite Title: Repression and the Spread of Ethnic Conflict in Kurdistan Abstract: Why do ethnic conflicts spread to neighboring states? This article examines the effect of transborder ethnic groups on the spread of ethnic conflict. It argues that when a transborder ethnic group is in conflict in one state, neighboring states perceive a threat from members of that ethnic group residing in their own territory, leading the state to take preemptive repressive action. This repression in turn changes the ethnic group's security situation within the state and can result in violence and thus ethnic conflict. Ethnic conflict spread is not determined by the actions of either the ethnic group or the state alone, but is a product of threat perception and interaction between the two groups. This argument is tested in a set of cases in a region where an ethnic conflict seems to have spread—the Kurds in Iran, Iraq, Syria and Turkey from 1961–2003. Journal: Studies in Conflict & Terrorism Pages: 473-491 Issue: 6 Volume: 37 Year: 2014 Month: 6 X-DOI: 10.1080/1057610X.2014.903451 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.903451 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:6:p:473-491 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_903452_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Arzu Kibris Author-X-Name-First: Arzu Author-X-Name-Last: Kibris Title: The Polarization Trap Abstract: This article studies the association between ethnic conflicts and political attitudes. It employs a new data set on the casualties of the ethnic conflict in Turkey to identify the effects of the Kurdish insurgency on the electoral behavior of the Turkish voters. The results indicate that the conflict leads to the political polarization of the society along ethnic nationalist lines. Further investigation of the data also provides some empirical support for the constructivist argument that the salience of ethnic identities is subject to change in response to external stimuli, of which ethnic conflict constitutes a drastic example. Journal: Studies in Conflict & Terrorism Pages: 492-522 Issue: 6 Volume: 37 Year: 2014 Month: 6 X-DOI: 10.1080/1057610X.2014.903452 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.903452 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:6:p:492-522 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_893406_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: John C. Amble Author-X-Name-First: John C. Author-X-Name-Last: Amble Author-Name: Alexander Meleagrou-Hitchens Author-X-Name-First: Alexander Author-X-Name-Last: Meleagrou-Hitchens Title: Jihadist Radicalization in East Africa: Two Case Studies Abstract: Al-Shabaab, the Somali militia currently fighting against African forces in Somalia, has seen varying degrees of success in its regional recruitment efforts. As it continues to struggle against the forces of the African Union Mission in Somalia (AMISOM), the militia has tried to step up these efforts. To this end, the group has seen significant success in countries such as Kenya, while it has struggled in Somaliland. The strategies and tactics employed by al-Shabaab in order to successfully recruit vary depending on geographical location, as do the motivations to join, and drawing on fieldwork in both Kenya and Somaliland this study will compare and contrast the effectiveness al-Shabaab recruitment in both of these countries. In doing so, it will examine which local conditions either enhance or limit these efforts, identifying some of the determinants of the success and failure of jihadist recruitment in east Africa. Journal: Studies in Conflict & Terrorism Pages: 523-540 Issue: 6 Volume: 37 Year: 2014 Month: 6 X-DOI: 10.1080/1057610X.2014.893406 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.893406 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:6:p:523-540 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_913118_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matthew Morehouse Author-X-Name-First: Matthew Author-X-Name-Last: Morehouse Title: It's Easier to Decapitate a Snake than It Is a Hydra: An Analysis of Colombia's Targeted Killing Program Abstract: While the use of targeted killings by the United States and Israel has received the most press coverage, Colombia has also utilized targeted killings in its conflict with the Revolutionary Armed Forces of Colombia (FARC). Utilizing an original dataset, this study quantitatively gauges the effectiveness of Colombia's targeted killing program, by examining the influence of FARC leadership deaths upon the number and severity of FARC attacks during the years 2004 to 2011. The results suggest that the Colombian government's killing of FARC leaders has been effective in decreasing the number of attacks, but not the severity of attacks Journal: Studies in Conflict & Terrorism Pages: 541-566 Issue: 7 Volume: 37 Year: 2014 Month: 7 X-DOI: 10.1080/1057610X.2014.913118 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.913118 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:7:p:541-566 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_913120_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stephen Tankel Author-X-Name-First: Stephen Author-X-Name-Last: Tankel Title: Indian Jihadism: The Evolving Threat Abstract: India has been confronting jihadist violence for decades. Although expeditionary terrorism by Pakistani militants typically receives the most focus, indigenous actors, many benefitting from Pakistani support, are responsible for the majority of jihadist attacks in India. Yet the dynamics of Indian jihadism remain under-explored. This article examines the Indian Mujahideen (IM), which constitutes the primary indigenous jihadist threat. It argues the IM is best understood as a label for a network of modules, with a loose leadership, that is connected to smaller, self-organizing clusters of would-be militants as well as to foreign militant groups like the Pakistani Lashkar-e-Taiba. Journal: Studies in Conflict & Terrorism Pages: 567-585 Issue: 7 Volume: 37 Year: 2014 Month: 7 X-DOI: 10.1080/1057610X.2014.913120 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.913120 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:7:p:567-585 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_913121_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sivan Hirsch-Hoefler Author-X-Name-First: Sivan Author-X-Name-Last: Hirsch-Hoefler Author-Name: Cas Mudde Author-X-Name-First: Cas Author-X-Name-Last: Mudde Title: “Ecoterrorismâ€: Terrorist Threat or Political Ploy? Abstract: This article examines the phenomenon of “ecoterrorism†from a conceptual and empirical perspective. We explore the political and academic debates over the meaning and use of the term ecoterrorism, and assess the validity of the concept of “ecoterrorism†and of the alleged threat of the Radical Environmentalist and Animal Rights (REAR) movement by analyzing the characteristics of both the movement and its actions. Our analysis shows that the term ecoterrorism should only be used for a small proportion of the actions of REAR movement. Consequently, counterterrorist measures should only target these terrorist minorities, rather than all groups and the broader movement. Journal: Studies in Conflict & Terrorism Pages: 586-603 Issue: 7 Volume: 37 Year: 2014 Month: 7 X-DOI: 10.1080/1057610X.2014.913121 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.913121 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:7:p:586-603 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_913122_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matteo Vergani Author-X-Name-First: Matteo Author-X-Name-Last: Vergani Title: Neo-Jihadist Prosumers and Al Qaeda Single Narrative: The Case Study of Giuliano Delnevo Abstract: Scholars in the field of terrorism and violent extremism often refer to the so-called Al Qaeda single narrative. This article suggests that the Internet challenges the existence of a “single narrative,†by arguing that neo-jihadist prosumers may reinterpret Al Qaeda's narrative and create hybrid symbols and identities. The article discusses the case study of an Italian neo-jihadist allegedly killed in Syria, Giuliano Delnevo, presenting research on his YouTube and Facebook production. Delnevo's narrative, which emerges from the diverse messages circulating on the Internet, recasts the Al Qaeda narrative by hybridizing it with other cultural backgrounds and political symbols. Journal: Studies in Conflict & Terrorism Pages: 604-617 Issue: 7 Volume: 37 Year: 2014 Month: 7 X-DOI: 10.1080/1057610X.2014.913122 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.913122 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:7:p:604-617 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_921765_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Emmanuel Karagiannis Author-X-Name-First: Emmanuel Author-X-Name-Last: Karagiannis Title: Comparative Islamist Perspectives on the Politics of Energy in the Middle East and Beyond Abstract: The article will describe the general Islamic approach on energy based on the Sunnah of Prophet Muhammad, as well as the writings of prominent Muslim thinkers. Then it will examine and compare the energy perspectives of four Islamist groups: Hizballah, Hizb ut-Tahrir, the Muslim Brotherhood, and Al Qaeda. It will be argued that Islamist groups have attempted to achieve their external energy objectives by either using violence or exercising political blackmail against their opponents. Moreover, Islamists have developed globalized, glocalized, or localized “scale of engagement,†depending on the targeted audience. Finally, the article will examine the security implications stemming from Islamists’ interest in energy issues. Journal: Studies in Conflict & Terrorism Pages: 619-637 Issue: 8 Volume: 37 Year: 2014 Month: 8 X-DOI: 10.1080/1057610X.2014.921765 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.921765 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:8:p:619-637 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_921767_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stefan Malthaner Author-X-Name-First: Stefan Author-X-Name-Last: Malthaner Title: Contextualizing Radicalization: The Emergence of the “Sauerland-Group†from Radical Networks and the Salafist Movement Abstract: This article proposes an analytical perspective on jihadist radicalization that focuses on the immediate social environment from which clandestine violent groups emerge, to which they remain socially and symbolically connected, and from which they receive some degree of support. Based on a detailed analysis of the “Sauerland-Group†it traces relational dynamics shaping individual pathways as well as processes of group formation within local Salafist milieus, the wider Salafist movement, and radical jihadist networks. It argues that one characteristic feature of “homegrown†jihadist groups is their simultaneous connection to and embeddedness in various different social contexts as well as the fluid, ad-hoc character of the clandestine group and its ambivalent relation with its supportive social environment. Journal: Studies in Conflict & Terrorism Pages: 638-653 Issue: 8 Volume: 37 Year: 2014 Month: 8 X-DOI: 10.1080/1057610X.2014.921767 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.921767 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:8:p:638-653 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_921770_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Javier Jordan Author-X-Name-First: Javier Author-X-Name-Last: Jordan Title: The Evolution of the Structure of Jihadist Terrorism in Western Europe: The Case of Spain Abstract: This article studies the structure of jihadist terrorism in the West from the perspective of the existence or absence of links between grassroots militants and organizations such as Al Qaeda Central and its regional affiliates. It undertakes a comprehensive case study of jihadist militancy in a European country (Spain) over a period of almost two decades, from 1995 until December 2013. The study analyzes the results of 64 antiterrorist operations carried out during this time. Journal: Studies in Conflict & Terrorism Pages: 654-673 Issue: 8 Volume: 37 Year: 2014 Month: 8 X-DOI: 10.1080/1057610X.2014.921770 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.921770 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:8:p:654-673 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_921768_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Moran Yarchi Author-X-Name-First: Moran Author-X-Name-Last: Yarchi Title: The Effect of Female Suicide Attacks on Foreign Media Framing of Conflicts: The Case of the Palestinian–Israeli Conflict Abstract: The study examines the effect of female suicide attacks on foreign media framing of conflicts. Examining the Palestinian–Israeli conflict, 2,731 articles were sampled that covered terrorist events (American, British, and Indian press); 625 appeared in the week following a female's suicide attack, 97 reported an attack by a female perpetrator. The findings suggest that foreign media discourse around female suicide bombers promotes more messages about the society within which the terrorists are embedded. Since the coverage of female terrorists tends to provide more detailed information about the perpetrator, it focuses more on the terror organizations’ side of the conflict's story. Journal: Studies in Conflict & Terrorism Pages: 674-688 Issue: 8 Volume: 37 Year: 2014 Month: 8 X-DOI: 10.1080/1057610X.2014.921768 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.921768 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:8:p:674-688 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_921769_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jesse Paul Lehrke Author-X-Name-First: Jesse Paul Author-X-Name-Last: Lehrke Author-Name: Rahel Schomaker Author-X-Name-First: Rahel Author-X-Name-Last: Schomaker Title: Mechanisms of Convergence in Domestic Counterterrorism Regulations: American Influence, Domestic Needs, and International Networks Abstract: This article seeks to determine the mechanism(s) behind the convergence of domestic counterterrorism regulations that has been noted across many Organisation for Economic Co-operation and Development (OECD) countries. Four hypotheses are developed and tested through regression analyses. These hypotheses examine (1) U.S. influence, operationalized though a unique U.S. footprint indicator; (2) national characteristics; (3) the extent to which states’ domestic structures match; and (4) international networks. We find little support that U.S. influence matters. The international influence that does exist seems to operate through networks promoting learning, especially following a rise in the general global threat level. National characteristics as a driver also find some support. Journal: Studies in Conflict & Terrorism Pages: 689-712 Issue: 8 Volume: 37 Year: 2014 Month: 8 X-DOI: 10.1080/1057610X.2014.921769 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.921769 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:8:p:689-712 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_931224_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Peter Shirlow Author-X-Name-First: Peter Author-X-Name-Last: Shirlow Author-Name: Colin Coulter Author-X-Name-First: Colin Author-X-Name-Last: Coulter Title: Northern Ireland: 20 Years After the Cease-Fires Abstract: In the closing months of 1994, the principal paramilitary organizations in Northern Ireland declared that their campaigns of violence were at an end. The cease-fires called by republican and loyalist groupings represented the most significant heralds of a complex process of conflict transformation that continues to unfold even twenty years on. In this introduction, we set out to map the key developments that have shaped the tortuous narrative of the Northern Irish ‘peace process’, thereby providing the historical backdrop for the articles that follow. While remarkable progress has been made over the two decades since the paramilitary cease-fires, the political context and future of the region remain rather more fraught than is often assumed abroad. It is perhaps best, then, to speak of the six counties in terms not of resolution but rather of ambiguity. Twenty years on from the optimism that greeted the paramilitary cease-fires, Northern Ireland retains the essential ‘inbetweenness’ of a political space that has moved from a ‘long war’ through a ‘long peace’ and into a profoundly undecided future. Journal: Studies in Conflict & Terrorism Pages: 713-719 Issue: 9 Volume: 37 Year: 2014 Month: 9 X-DOI: 10.1080/1057610X.2014.931224 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931224 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:713-719 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_931211_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kevin Bean Author-X-Name-First: Kevin Author-X-Name-Last: Bean Title: Endings and Beginnings? Republicanism Since 1994 Abstract: This article traces the political and ideological development of the various strands of Irish Republicanism since 1994, with particular focus on the transition of the Provisional movement from insurgency to government party. In particular, it explores some of the external and internal dynamics shaping this process, such as the origins of Provisionalism as a social movement organization and the changing relationship between the nationalist population and the British state. It concludes by considering both the possible future trajectory of the Provisionals and the potential of dissident republicans to mount a serious political challenge to the status quo in Northern Ireland. Journal: Studies in Conflict & Terrorism Pages: 720-732 Issue: 9 Volume: 37 Year: 2014 Month: 9 X-DOI: 10.1080/1057610X.2014.931211 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931211 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:720-732 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_931215_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Peter Shirlow Author-X-Name-First: Peter Author-X-Name-Last: Shirlow Title: Rejection, Shaming, Enclosure, and Moving On: Variant Experiences and Meaning Among Loyalist Former Prisoners Abstract: This article unpacks the variant meanings, perceptions, and experiences of violent enactment and stigmatic shaming among loyalists with regard to rejection, harm, and masking. What we locate is a landscape of variable emotions, experiences, neutralization techniques, dependences, and embedded forms of fatalism as well as resilience. Attending to those alternate positions and well-beings is important in considering the capacity of re-integration and the presently uneven nature of it. In adopting an account-driven format we present and analyze how involvement in violent conflict can, on the one hand, provoke persistence and senses of transitional thinking and on the other engender rejection and related fatalistic attitudes. Journal: Studies in Conflict & Terrorism Pages: 733-746 Issue: 9 Volume: 37 Year: 2014 Month: 9 X-DOI: 10.1080/1057610X.2014.931215 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931215 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:733-746 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_931210_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Fidelma Ashe Author-X-Name-First: Fidelma Author-X-Name-Last: Ashe Author-Name: Ken Harland Author-X-Name-First: Ken Author-X-Name-Last: Harland Title: Troubling Masculinities: Changing Patterns of Violent Masculinities in a Society Emerging from Political Conflict Abstract: Men's dominance of the political and military dimensions of the Northern Ireland conflict has meant that the story of the conflict has generally been a story about men. Ethno-nationalist antagonism reinforced men's roles as protectors and defenders of ethno-national groups and shaped violent expressions of masculinities. Due to the primacy of ethno-nationalist frameworks of analysis in research on the conflict, the relationships between gender and men's violence have been under-theorized. This article employs the framework of Critical Studies of Men and Masculinities to examine these relationships and also explores the changing patterns of men's violence in Northern Ireland. Journal: Studies in Conflict & Terrorism Pages: 747-762 Issue: 9 Volume: 37 Year: 2014 Month: 9 X-DOI: 10.1080/1057610X.2014.931210 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931210 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:747-762 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_931212_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Colin Coulter Author-X-Name-First: Colin Author-X-Name-Last: Coulter Title: Under Which Constitutional Arrangement Would You Still Prefer to be Unemployed? Neoliberalism, the Peace Process, and the Politics of Class in Northern Ireland Abstract: This article seeks to critically examine the political economy of the Northern Irish “peace process.†When the principal paramilitary organizations in the region declared cease-fires in 1994, it was widely assumed that political progress would be followed by economic prosperity. However, this “peace dividend†has never fully materialized. Those working-class communities that were at the center of the Troubles have derived little economic benefit over the last two decades. Indeed, if anything the already substantial class divisions in the six counties have become more pronounced over the course of the peace process. The article concludes by suggesting that these widening socioeconomic disparities have the potential to undermine the prevailing political settlement in Northern Ireland. Journal: Studies in Conflict & Terrorism Pages: 763-776 Issue: 9 Volume: 37 Year: 2014 Month: 9 X-DOI: 10.1080/1057610X.2014.931212 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931212 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:763-776 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_931214_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Katy Hayward Author-X-Name-First: Katy Author-X-Name-Last: Hayward Author-Name: Milena Komarova Author-X-Name-First: Milena Author-X-Name-Last: Komarova Title: The Limits of Local Accommodation: Why Contentious Events Remain Prone to Conflict in Northern Ireland Abstract: This article examines the difficulties of finding local solutions to the problem of contentious events in contemporary Northern Ireland. In so doing, it offers a sociological perspective on fundamental divisions in Northern Ireland: between classes and between communities. It shows how its chosen case study—parades and associated protests in north Belfast—exemplifies the most fundamental problem that endures in post-Agreement Northern Ireland, namely that political authority is not derived from a common civic culture (as is the norm in Western liberal democracy) but rather that legitimacy is still founded on the basis of the culture of either one or the other community. Haugaard's reflections on authority and legitimacy are used to explore Northern Ireland's atypical experience of political conflict vis-à -vis the Western liberal democratic model. The Bourdieusian concepts of field illusio and doxa help to explain why it is that parading remains such an important political and symbolic touchstone in this society. Journal: Studies in Conflict & Terrorism Pages: 777-791 Issue: 9 Volume: 37 Year: 2014 Month: 9 X-DOI: 10.1080/1057610X.2014.931214 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931214 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:777-791 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_931213_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Brendan Browne Author-X-Name-First: Brendan Author-X-Name-Last: Browne Author-Name: Clare Dwyer Author-X-Name-First: Clare Author-X-Name-Last: Dwyer Title: Navigating Risk: Understanding the Impact of the Conflict on Children and Young People in Northern Ireland Abstract: Twenty years on from the 1994 cease-fires, Northern Ireland is a markedly safer place for children and young people to grow up. However, for a significant number, growing up in post-conflict Northern Ireland has brought with it continued risks and high levels of marginalization. Many young people growing up on the sharp edge of the transition have continued to experience troubling levels of poverty, lower educational attainment, poor standards of childhood health, and sustained exposure to risk-laden environments. Reflecting on interdisciplinary research carried out since the start of the “transition†to peace, this article emphasizes the impact that embedded structural inequalities continue to have on the social, physical, mental, and emotional well-being of many children and young people. In shining a light on the enduring legacy of the conflict, this article moves to argue that greater attention needs to be given to the ongoing socioeconomic factors that result in limited lifetime opportunities, marginalization, and sustained poverty for many young people growing up in “peacetime†Northern Ireland. Journal: Studies in Conflict & Terrorism Pages: 792-805 Issue: 9 Volume: 37 Year: 2014 Month: 9 X-DOI: 10.1080/1057610X.2014.931213 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931213 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:792-805 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_931217_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Liam O’Dowd Author-X-Name-First: Liam Author-X-Name-Last: O’Dowd Title: Symmetrical Solutions, Asymmetrical Realities: Beyond the Politics of Paralysis? Abstract: The historic significance of the Good Friday Agreement and its role in ending organized political violence is acknowledged at the outset. The article then goes on to probe the roots of the political paralysis built into the architecture of the Agreement that are predicated on a misplaced political and cultural symmetry between the “two communities.†It is suggested that the institutionalized relationship between Northern Ireland and the rest of the U.K. facilitates a cross-party, populist, socio-economic consensus among the nationalist and unionist political parties on the welfare state, taxation and maintaining the massive British subvention to the region. This in turn allows them to concentrate on a divisive culturalist politics, i.e., on antagonistic forms of cultural and identity politics over such issues as flags, parades, and the legacy of the “Troubles†which spills over into gridlock into many areas of regional administration. The article argues for a much broader understanding of culture and identity rooted in the different, if overlapping and interdependent, material realities of both communities while challenging the idea of two cultures/identities as fixed, mutually exclusive, non-negotiable and mutually antagonistic. It then focuses on the importance of Belfast as a key arena which will determine the long-term prospects of an alternative and more constructive form of politics, and enable a fuller recognition of the fundamental asymmetries and inter-dependence between the “two communities.†In the long run, this involves re-defining and reconstructing what is meant by the “Union†and a “United Ireland.†Journal: Studies in Conflict & Terrorism Pages: 806-814 Issue: 9 Volume: 37 Year: 2014 Month: 9 X-DOI: 10.1080/1057610X.2014.931217 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931217 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:806-814 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_931216_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Arthur Aughey Author-X-Name-First: Arthur Author-X-Name-Last: Aughey Title: Northern Ireland: 20 Years On Abstract: To speak of what is exceptional about Northern Ireland today requires a provocative sense of irony, for constitutionally it can be argued Northern Ireland has become one of the most stable parts of the United Kingdom. The fact if not the value of the Union has become more deeply entrenched as both the fact and the value of the Union have come more openly into play elsewhere, even in England. Nevertheless, Northern Ireland is not immune from larger political developments and fantastic uncertainties attend consideration of the next twenty years at different levels of analysis. This article considers these uncertainties according to two possible scenarios, one involving a nationalist narrative and the other involving a unionist narrative. The key issues in each scenario and narrative are the constitutional debate in the United Kingdom, especially the referendum on Scottish independence; the future of the European Union and the United Kingdom's relationship to it; and the changing electoral demographic within Northern Ireland. If Northern Ireland's future is inextricably linked to uncertainty this makes it the rule and not the exception today. Journal: Studies in Conflict & Terrorism Pages: 815-823 Issue: 9 Volume: 37 Year: 2014 Month: 9 X-DOI: 10.1080/1057610X.2014.931216 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.931216 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:37:y:2014:i:9:p:815-823 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_974948_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jytte Klausen Author-X-Name-First: Jytte Author-X-Name-Last: Klausen Title: Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq Abstract: Social media have played an essential role in the jihadists’ operational strategy in Syria and Iraq, and beyond. Twitter in particular has been used to drive communications over other social media platforms. Twitter streams from the insurgency may give the illusion of authenticity, as a spontaneous activity of a generation accustomed to using their cell phones for self-publication, but to what extent is access and content controlled? Over a period of three months, from January through March 2014, information was collected from the Twitter accounts of 59 Western-origin fighters known to be in Syria. Using a snowball method, the 59 starter accounts were used to collect data about the most popular accounts in the network-at-large. Social network analysis on the data collated about Twitter users in the Western Syria-based fighters points to the controlling role played by feeder accounts belonging to terrorist organizations in the insurgency zone, and by Europe-based organizational accounts associated with the banned British organization, Al Muhajiroun, and in particular the London-based preacher, Anjem Choudary. Journal: Studies in Conflict & Terrorism Pages: 1-22 Issue: 1 Volume: 38 Year: 2015 Month: 1 X-DOI: 10.1080/1057610X.2014.974948 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.974948 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:1:p:1-22 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_974408_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Christopher McIntosh Author-X-Name-First: Christopher Author-X-Name-Last: McIntosh Title: Counterterrorism as War: Identifying the Dangers, Risks, and Opportunity Costs of U.S. Strategy Toward Al Qaeda and Its Affiliates Abstract: The U.S. war on Al Qaeda is well into its second decade—why has this particular conflict been so difficult to end? This article argues it is not due to the strategic acumen of Al Qaeda, but because of the problems intrinsic to relying on war as the framework for U.S. counterterrorism policy. The normal means of ending wars are complicated with a terrorist enemy and at odds with strategies that have historically had success at the end stages of counterterror campaigns. Continuing along the current path risks an ongoing war the United States will likely neither win nor fully end. Journal: Studies in Conflict & Terrorism Pages: 23-38 Issue: 1 Volume: 38 Year: 2015 Month: 1 X-DOI: 10.1080/1057610X.2014.974408 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.974408 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:1:p:23-38 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_974400_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ethem Ilbiz Author-X-Name-First: Ethem Author-X-Name-Last: Ilbiz Author-Name: Benjamin L. Curtis Author-X-Name-First: Benjamin L. Author-X-Name-Last: Curtis Title: Trendsetters, Trend Followers, and Individual Players: Obtaining Global Counterterror Actor Types from Proscribed Terror Lists Abstract: This article seeks to conceptualize global counterterror actor types by examining the designated terrorist organizations lists of six countries; the United States, the United Kingdom, Australia, Canada, Russia, and China. It is argued that these countries should be placed into one of three distinct categories: Trendsetters, Trend Followers, and Individual Players. Being able to classify countries according to these categories is important for global policymakers. It raises awareness of the differences between countries, and emphasizes that “one-fits-all†policies are inappropriate and have little chance of achieving global endorsement. Journal: Studies in Conflict & Terrorism Pages: 39-61 Issue: 1 Volume: 38 Year: 2015 Month: 1 X-DOI: 10.1080/1057610X.2014.974400 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.974400 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:1:p:39-61 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_976011_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Adam Roberts Author-X-Name-First: Adam Author-X-Name-Last: Roberts Title: Terrorism Research: Past, Present, and Future Abstract: Research on terrorism and counterterrorism draws on many disciplines, including Politics, History, Sociology and Anthropology. Yet there are concerns about scope, methodology, impact, and the level of public debate. An agreed definition of terrorism is unattainable: there should be more focus on particular acts rather than labelling whole movements. The threat of terrorism should be kept in proportion. Understanding its causes, and associated belief-systems, is crucial to conducting effective counterterrorist operations. Evaluations of the effectiveness of both terrorism and counterterrorism need to encompass more factors, including terrorism's deadliest legacies: wars on terror that fail, and a habit of violence. Journal: Studies in Conflict & Terrorism Pages: 62-74 Issue: 1 Volume: 38 Year: 2015 Month: 1 X-DOI: 10.1080/1057610X.2014.976011 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.976011 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:1:p:62-74 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_974405_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bruce Hoffman Author-X-Name-First: Bruce Author-X-Name-Last: Hoffman Title: A First Draft of the History of America's Ongoing Wars on Terrorism Abstract: This research note attempts to map the Al Qaeda movement's trajectory from the 11 September 2001 attacks to the stunning events of 2014—which saw the continued rise of the Islamic State of Iraq and Syria (ISIS), its expulsion from the Al Qaeda movement, followed by ISIS's stunning thrust into Iraq, its declaration of a caliphate, and the re-engagement of American military forces in this region. It attempts to place in context the Al Qaeda movement's evolution to explain why the United States under President Barack Obama, despite hopes and expectations to the contrary, is still enmeshed in the war on terrorism proclaimed by George W. Bush over a decade ago. Journal: Studies in Conflict & Terrorism Pages: 75-83 Issue: 1 Volume: 38 Year: 2015 Month: 1 X-DOI: 10.1080/1057610X.2014.974405 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.974405 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:1:p:75-83 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1059103_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Luis de la Calle Author-X-Name-First: Luis Author-X-Name-Last: de la Calle Author-Name: Ignacio Sánchez-Cuenca Author-X-Name-First: Ignacio Author-X-Name-Last: Sánchez-Cuenca Title: How Armed Groups Fight: Territorial Control and Violent Tactics Abstract: This article analyzes the choice of tactics by armed groups. We claim this choice is largely determined by the capacity of the rebel groups to control territory. Groups that are not able to liberate territory remain underground and have to rely mainly on bombings. Groups with territorial control engage in guerrilla-like attacks in which there is a physical encounter with the enemy. This conjecture is tested and largely confirmed at three levels: a cross-sectional analysis of the distribution of tactics in 122 armed groups, using compositional data analysis; a geographical analysis of the distribution of tactics in the largest cities as opposed to the rest of the country; and a case study of Hezbollah. Journal: Studies in Conflict & Terrorism Pages: 795-813 Issue: 10 Volume: 38 Year: 2015 Month: 10 X-DOI: 10.1080/1057610X.2015.1059103 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1059103 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:10:p:795-813 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1059102_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stefano Bonino Author-X-Name-First: Stefano Author-X-Name-Last: Bonino Author-Name: Lambros George Kaoullas Author-X-Name-First: Lambros George Author-X-Name-Last: Kaoullas Title: Preventing Political Violence in Britain: An Evaluation of over Forty Years of Undercover Policing of Political Groups Involved in Protest Abstract: This article offers a first academic evaluation of the Special Demonstration Squad and the National Public Order Intelligence Unit, two British undercover police units working for the Metropolitan Police Service at different times between 1968 and 2011. It provides a historical overview of their infiltration of political groups involved in protest for the purpose of gathering criminal and political intelligence aimed at preventing violence, public disorder, and subversion. It discusses the controversies surrounding these units, and the related institutional responses, and offers an attempt at understanding their operations within the remit of intelligence-led policing and against a political culture that prioritizes action over inaction in reducing risks and threats to the State and society. Journal: Studies in Conflict & Terrorism Pages: 814-840 Issue: 10 Volume: 38 Year: 2015 Month: 10 X-DOI: 10.1080/1057610X.2015.1059102 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1059102 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:10:p:814-840 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1056631_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alexander Dukalskis Author-X-Name-First: Alexander Author-X-Name-Last: Dukalskis Title: Why Do Some Insurgent Groups Agree to Cease-Fires While Others Do Not? A Within-Case Analysis of Burma/Myanmar, 1948–2011 Abstract: This article uses Burma/Myanmar from 1948 to 2011 as a within-case context to explore why some armed insurgent groups agree to cease-fires while others do not. Analyzing 33 armed groups it finds that longer-lived groups were less likely to agree to cease-fires with the military government between 1989 and 2011. The article uses this within-case variation to understand what characteristics would make an insurgent group more or less likely to agree to a cease-fire. The article identifies four armed groups for more in-depth qualitative analysis to understand the roles of the administration of territory, ideology, and legacies of distrust with the state as drivers of the decision to agree to or reject a cease-fire. Journal: Studies in Conflict & Terrorism Pages: 841-863 Issue: 10 Volume: 38 Year: 2015 Month: 10 X-DOI: 10.1080/1057610X.2015.1056631 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1056631 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:10:p:841-863 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1049855_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lisa Karlborg Author-X-Name-First: Lisa Author-X-Name-Last: Karlborg Title: The Ambiguous Host-Citizen Contract: An Evolving Notion of Duty in the U.S. Military Quest for Local Legitimacy Abstract: The article explores how the recent quest for local legitimacy in Iraq and Afghanistan has shaped the U.S. military notion of duty toward host citizens. It argues that military duty is conceptualized as a “host-citizen contract.†Based on a qualitative comparison of the 2006 and 2014 versions of FM3-24, the U.S. counterinsurgency field manual, it finds that U.S. forces are obligated to suppress insurgents, build host-nation agency, and protect the host population in exchange for legitimacy. The article's main finding is that the notion of legitimacy has changed in ways that fundamentally limit the scope of duty and justify a breach of contract should the host nation fail to comply. Journal: Studies in Conflict & Terrorism Pages: 864-884 Issue: 10 Volume: 38 Year: 2015 Month: 10 X-DOI: 10.1080/1057610X.2015.1049855 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1049855 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:10:p:864-884 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1046302_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kathleen Bouzis Author-X-Name-First: Kathleen Author-X-Name-Last: Bouzis Title: Countering the Islamic State: U.S. Counterterrorism Measures Abstract: This research note discusses the tactics and strategies of the United States to counter the Islamic State in Iraq and the Levant (ISIL) from the onset of Operation Inherent Resolve beginning on 8 August 2014 and continuing into early 2015. Through both kinetic and non-kinetic actions, the United States and its coalition has sought to degrade and defeat ISIL. But how effective have these measures been with regard to the group's ability to maintain control over parts of the Iraqi population and territory? ISIL's fast growing affiliate network poses a unique challenge and this study suggests that the kinetic measures of Operation Inherent Resolve have weakened ISIL's tactical capabilities but U.S. efforts to stem the group's recruitment have not been as successful. Journal: Studies in Conflict & Terrorism Pages: 885-897 Issue: 10 Volume: 38 Year: 2015 Month: 10 X-DOI: 10.1080/1057610X.2015.1046302 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1046302 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:10:p:885-897 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1072390_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jeffrey Scott Bachman Author-X-Name-First: Jeffrey Scott Author-X-Name-Last: Bachman Title: The Lawfulness of U.S. Targeted Killing Operations Outside Afghanistan Abstract: Targeted killing operations conducted outside Afghanistan have prompted debate regarding their lawfulness. For opponents of targeted killing operations, the debate tends to center on the number of civilians killed. Proponents respond by questioning the credibility and validity of the methods employed to determine the number of civilian casualties. This debate is important, but it also obscures the fact that the lawfulness of targeting killings is not determined by whether civilians were killed alone, while also lending legitimacy to unsubstantiated claims that the United States is engaged in an armed conflict with Al Qaeda and “associated forces.†This article classifies the hostilities in Pakistan, Yemen, and Somalia. It then applies the applicable body of law to targeted killing operations in each of these respective states based on how the hostilities were classified. Journal: Studies in Conflict & Terrorism Pages: 899-918 Issue: 11 Volume: 38 Year: 2015 Month: 11 X-DOI: 10.1080/1057610X.2015.1072390 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1072390 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:11:p:899-918 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1063838_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Milos Popovic Author-X-Name-First: Milos Author-X-Name-Last: Popovic Title: The Perils of Weak Organization: Explaining Loyalty and Defection of Militant Organizations Toward Pakistan Abstract: Why do some militant groups defect against their sponsors, while others remain loyal? Pakistan's sponsorship of Jaish-e-Mohammad and Lashkar-e-Taiba offers a controlled case comparison as the former turned its guns against Islamabad, while the latter remained obedient despite a similar strength, ethnic ties to the regime, and the presence of alternative supporters. What explains Jaish's defection and Lashkar's loyalty? Drawing on organizational and principal-agent theory, I argue that militant organizations that are more decentralized and factionalized are more likely to turn on their sponsors, because their weak command and control as well as dispersed decision making limit the militant leaders' ability to follow through on their commitments to the sponsors and makes it more difficult for the sponsors to discipline the militant organization. When a sponsor attempts to coerce such organizations into submission by detaining militant leaders, freezing or confiscating their material assets the rank-and-file is likely to turn guns against the sponsor. Journal: Studies in Conflict & Terrorism Pages: 919-937 Issue: 11 Volume: 38 Year: 2015 Month: 11 X-DOI: 10.1080/1057610X.2015.1063838 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1063838 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:11:p:919-937 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1066214_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Karl Kaltenthaler Author-X-Name-First: Karl Author-X-Name-Last: Kaltenthaler Author-Name: William Miller Author-X-Name-First: William Author-X-Name-Last: Miller Title: Ethnicity, Islam, and Pakistani Public Opinion toward the Pakistani Taliban Abstract: This article argues that an Islamist militant group with a relatively homogenous ethnic make-up is more likely to be supported by those of the same ethnicity even if the group makes no reference to and even downplays the importance of ethnicity. Using survey data from an original survey carried out in Pakistan in 2013, with 7,656 respondents, this hypothesis is tested in a multiple regression analysis of support for the Pakistani Taliban. The results demonstrate that co-ethnicity between the respondent and the Islamist militant group is the most important predictor of support for the militant group. Journal: Studies in Conflict & Terrorism Pages: 938-957 Issue: 11 Volume: 38 Year: 2015 Month: 11 X-DOI: 10.1080/1057610X.2015.1066214 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1066214 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:11:p:938-957 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1051375_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mohammed Hafez Author-X-Name-First: Mohammed Author-X-Name-Last: Hafez Author-Name: Creighton Mullins Author-X-Name-First: Creighton Author-X-Name-Last: Mullins Title: The Radicalization Puzzle: A Theoretical Synthesis of Empirical Approaches to Homegrown Extremism Abstract: Why and how do individuals residing in relatively peaceful and affluent Western societies come to embrace extremist ideologies that emanate from distant places? We summarize the most recent empirical literature on the causes and dynamics of radicalization, and evaluate the state of the art in the study of Islamist homegrown extremism in the West. We propose a theoretical synthesis based on four factors that come together to produce violent radicalization: personal and collective grievances, networks and interpersonal ties, political and religious ideologies, and enabling environments and support structures. We propose adopting a “puzzle†metaphor that represents a multifactor and contextualized approach to understanding how ordinary individuals transform into violent extremists. We concluded with three recommendations to strengthen the empirical foundations of radicalization studies. Journal: Studies in Conflict & Terrorism Pages: 958-975 Issue: 11 Volume: 38 Year: 2015 Month: 11 X-DOI: 10.1080/1057610X.2015.1051375 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1051375 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:11:p:958-975 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1061296_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Adeniyi S. Basiru Author-X-Name-First: Adeniyi S. Author-X-Name-Last: Basiru Title: A review of "Boko Haram: Islamism, Politics, Security and the State in Nigeria," edited by Marc-Antoine Pérouse de Montclos Journal: Studies in Conflict & Terrorism Pages: 976-978 Issue: 11 Volume: 38 Year: 2015 Month: 11 X-DOI: 10.1080/1057610X.2015.1061296 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1061296 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:11:p:976-978 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1076277_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Dorle Hellmuth Author-X-Name-First: Dorle Author-X-Name-Last: Hellmuth Title: Countering Jihadi Terrorists and Radicals the French Way Abstract: The 2015 Charlie Hebdo attacks warrant a detailed profile of the French approach to countering Jihadi terrorism. Much has been written about the tough French counterterrorism regime, which originated in 1986 and remains unique among Western democracies. There has been less analysis of France's lengthy list of post-9/11 reforms, and even less discussion of the French approach to counterradicalization. In fact, France was among only few European countries that did not engage in any “soft†counterradicalization programs after the 2004 Madrid and the 2005 London bombings. The mass exodus of foreign fighters to Syria led to a first national counterradicalization plan in 2014. In response to the Paris attacks, much in line with its security-oriented methods and outlook, the French government increased counterterrorism spending and surveillance powers. Various other measures are noteworthy, however, as they focus on prison radicalization and represent an effort to strengthen the counterradicalization campaign. Journal: Studies in Conflict & Terrorism Pages: 979-997 Issue: 12 Volume: 38 Year: 2015 Month: 12 X-DOI: 10.1080/1057610X.2015.1076277 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1076277 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:979-997 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1076640_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Yair Galily Author-X-Name-First: Yair Author-X-Name-Last: Galily Author-Name: Moran Yarchi Author-X-Name-First: Moran Author-X-Name-Last: Yarchi Author-Name: Ilan Tamir Author-X-Name-First: Ilan Author-X-Name-Last: Tamir Title: From Munich to Boston, and from Theater to Social Media: The Evolutionary Landscape of World Sporting Terror Abstract: Modern terrorist attacks are usually characterized by intentionally extreme public displays of massive violence to get wide propagation, courtesy of the media. This article uses large-scale, world sporting events, from the 1972 Munich massacre to the 2013 Boston Marathon bombing to document and analyze how terror acts grew and acclimatized into a reality in which the symbiotic, massive linkage between two gigantic entities—sports and the media—allows terrorism to prosper. Journal: Studies in Conflict & Terrorism Pages: 998-1007 Issue: 12 Volume: 38 Year: 2015 Month: 12 X-DOI: 10.1080/1057610X.2015.1076640 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1076640 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:998-1007 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1076644_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Moran Yarchi Author-X-Name-First: Moran Author-X-Name-Last: Yarchi Author-Name: Yair Galily Author-X-Name-First: Yair Author-X-Name-Last: Galily Author-Name: Ilan Tamir Author-X-Name-First: Ilan Author-X-Name-Last: Tamir Title: Rallying or Criticizing? Media Coverage of Authorities' Reaction to Terror Attacks Targeting Sporting Events Abstract: The reaction of authorities to terror attacks or threats has the potential to attract both support and criticism. The current study aims to examine the international media's discourse surrounding authorities' reaction to sporting events that have suffered from terror attacks or terror threats. A comparison is made between events that are canceled and events that take place as planned despite the attack or threat. Our findings indicate no significant differences between the coverage of events that are canceled and those that continue as planned. The evidence actually exhibits greater levels of support rather than criticism of authorities in international media coverage. Journal: Studies in Conflict & Terrorism Pages: 1008-1021 Issue: 12 Volume: 38 Year: 2015 Month: 12 X-DOI: 10.1080/1057610X.2015.1076644 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1076644 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:1008-1021 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1076695_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ramón Spaaij Author-X-Name-First: Ramón Author-X-Name-Last: Spaaij Author-Name: Mark S. Hamm Author-X-Name-First: Mark S. Author-X-Name-Last: Hamm Title: Endgame? Sports Events as Symbolic Targets in Lone Wolf Terrorism Abstract: This article explores how terrorists acting alone or in small groups have used sports events as symbolic targets in their performance of terrorism. Drawing on a comparative analysis of the attacks on the 1996 Atlanta Olympic Games and the 2013 Boston Marathon, it is argued that terrorist target selection of major sports events should be understood in relation to the grievances and desires of the perpetrators. The article finds that rather than being the primary target of their attacks, sports events are among a broader range of densely crowded spaces that terrorist actors may seek to target as part of their violent struggle against their adversaries. The findings are contextualized in relation to broader patterns and trends in lone wolf terrorism, including the significance of a copycat phenomenon and inspiration effect. Journal: Studies in Conflict & Terrorism Pages: 1022-1037 Issue: 12 Volume: 38 Year: 2015 Month: 12 X-DOI: 10.1080/1057610X.2015.1076695 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1076695 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:1022-1037 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1099991_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: John Gearson Author-X-Name-First: John Author-X-Name-Last: Gearson Author-Name: Hugo Rosemont Author-X-Name-First: Hugo Author-X-Name-Last: Rosemont Title: CONTEST as Strategy: Reassessing Britain's Counterterrorism Approach Abstract: The appropriateness of the United Kingdom's counterterrorism strategy, known as CONTEST, divides opinion. This article reassesses CONTEST as strategy rather than simply examining its effectiveness as policy, or critiquing its individual parts. Reviewing the development of CONTEST in the context of wider analytical discussions on what makes for good strategy, the authors argue that several important strands of CONTEST are either underdeveloped or not yet as “strategic†as some analysts and the U.K. government itself have professed them to be. Fresh thinking on aspects of counterterrorism is urgently needed to counter the challenge of contemporary and future terrorism. Journal: Studies in Conflict & Terrorism Pages: 1038-1064 Issue: 12 Volume: 38 Year: 2015 Month: 12 X-DOI: 10.1080/1057610X.2015.1099991 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1099991 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:1038-1064 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1107438_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Corrigendum Journal: Studies in Conflict & Terrorism Pages: 1065-1065 Issue: 12 Volume: 38 Year: 2015 Month: 12 X-DOI: 10.1080/1057610X.2015.1107438 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1107438 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:1065-1065 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1074814_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Editorial Board EOV Journal: Studies in Conflict & Terrorism Pages: ebi-ebi Issue: 12 Volume: 38 Year: 2015 Month: 12 X-DOI: 10.1080/1057610X.2015.1074814 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1074814 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:12:p:ebi-ebi Template-Type: ReDIF-Article 1.0 # input file: UTER_A_977605_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Elizabeth Grimm Arsenault Author-X-Name-First: Elizabeth Grimm Author-X-Name-Last: Arsenault Author-Name: Tricia Bacon Author-X-Name-First: Tricia Author-X-Name-Last: Bacon Title: Disaggregating and Defeating Terrorist Safe Havens Abstract: Terrorist organizations’ physical safe havens continue to shape the terrorist threat to the United States by extending the groups’ longevity and increasing the threat they pose. As a result, eliminating terrorist safe havens has been a key component of U.S. counterterrorism policy since at least 2001. However, some scholars challenged the post-9/11 policy consensus that terrorists find sanctuary in weak states and so-called ungoverned spaces. This article seeks to bridge this gap between scholarship and policy by offering a typology for disaggregating different kinds of terrorist safe havens. Our typology operates on two axes based on host government will (i.e., the host government's posture toward each group with haven inside its borders), as well as government capability, (specifically whether the host government possesses the specific capabilities needed to oust each group). This intersection of will and capability produces three types of havens. We briefly illustrate each type of haven using the exemplar case study of Pakistan—a location often described as an overarching safe haven, but which is actually home to several sanctuaries—and offer policy recommendations for addressing them. A need exists to disaggregate and identify how the United States can approach haven elimination. This typology and the analysis that stems from it offer a starting point for devising such strategies. Journal: Studies in Conflict & Terrorism Pages: 85-112 Issue: 2 Volume: 38 Year: 2015 Month: 2 X-DOI: 10.1080/1057610X.2014.977605 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.977605 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:2:p:85-112 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_979605_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ben Rich Author-X-Name-First: Ben Author-X-Name-Last: Rich Author-Name: Dara Conduit Author-X-Name-First: Dara Author-X-Name-Last: Conduit Title: The Impact of Jihadist Foreign Fighters on Indigenous Secular-Nationalist Causes: Contrasting Chechnya and Syria Abstract: Jihadist foreign fighters have become common in civil conflicts in Muslim countries. While research exists on the impact they have upon returning home, less attention has been given to their influence on the opposition cause that they mobilize in support of. This article looks at the impact that jihadist foreign fighters on the Chechen and Syrian resistance causes, evaluating their influence on oppositional cohesion and ideology, domestic and international perceptions of the movements, and on governmental narratives regarding the conflicts the foreign fighters engage in. It is concluded that foreign fighters have overwhelmingly damaged the Chechen and Syrian opposition movements, making the likelihood of opposition success more remote. Journal: Studies in Conflict & Terrorism Pages: 113-131 Issue: 2 Volume: 38 Year: 2015 Month: 2 X-DOI: 10.1080/1057610X.2014.979605 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.979605 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:2:p:113-131 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_977000_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Spyridon Plakoudas Author-X-Name-First: Spyridon Author-X-Name-Last: Plakoudas Title: Strategy in Counterinsurgency: A Distilled Approach Abstract: How does an established state authority respond to an insurgency? How does such an authority plan and carry out its struggle to counter an armed non-state actor and why? The issue of strategy in counterinsurgency (COIN) remains a rather contentious subject and several practitioners and theorists on COIN have prescribed various remedies to the same problem. This article offers a re-evaluation of the concept of strategy in COIN and outlines the practices and mentalities that counterinsurgents should adopt (and avoid) to successfully counter an insurgency. Journal: Studies in Conflict & Terrorism Pages: 132-145 Issue: 2 Volume: 38 Year: 2015 Month: 2 X-DOI: 10.1080/1057610X.2014.977000 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.977000 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:2:p:132-145 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_981103_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stephen Ceccoli Author-X-Name-First: Stephen Author-X-Name-Last: Ceccoli Author-Name: John Bing Author-X-Name-First: John Author-X-Name-Last: Bing Title: Explaining Divergent Attitudes Toward Lethal Drone Strikes Abstract: Although lethal drone strikes have become a central component of the U.S. campaign against international terrorism, the program remains a low salience issue with considerable bi-partisan consensus and a supportive U.S. general public. This article explains American attitudes toward lethal drone strikes by testing arguments based on partisanship and ideology, core values and abstract beliefs, and elite cues. Results suggest that respondent core values and governmental cues offer important insights. Consequently, the political environment under certain conditions may not frame important issues in such a way that the general public is likely to gain a knowledgeable understanding of the alternatives. Journal: Studies in Conflict & Terrorism Pages: 146-166 Issue: 2 Volume: 38 Year: 2015 Month: 2 X-DOI: 10.1080/1057610X.2014.981103 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.981103 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:2:p:146-166 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_986979_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ramón Spaaij Author-X-Name-First: Ramón Author-X-Name-Last: Spaaij Author-Name: Mark S. Hamm Author-X-Name-First: Mark S. Author-X-Name-Last: Hamm Title: Key Issues and Research Agendas in Lone Wolf Terrorism Abstract: This article builds on recent contributions to the academic literature on lone wolf terrorism to critically examine key issues that are germane to the current state of play in this field of study. It finds that, overall, the recent academic literature still suffers from considerable problems regarding quality and rigor, including definitional, conceptual, methodological, and inference issues. By providing a critique of these issues, the article attempts to advance the scholarly debate on lone wolf terrorism and inspire greater dialogue and collaboration between scholars. Directions for future research are also outlined. Journal: Studies in Conflict & Terrorism Pages: 167-178 Issue: 3 Volume: 38 Year: 2015 Month: 3 X-DOI: 10.1080/1057610X.2014.986979 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.986979 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:3:p:167-178 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_987593_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alessandro Orsini Author-X-Name-First: Alessandro Author-X-Name-Last: Orsini Title: Are Terrorists Courageous? Micro-Sociology of Extreme Left Terrorism Abstract: This article contests the affirmation—based on common sense—according to which terrorists simply need courage. The typical terrorist act can be considered part of the sociological category known as “vile violence†that is the act of striking out at a victim after having placed him or her in a desperate situation that does not allow for any escape. This article is based on primary and secondary sources, such as the analysis of thirty-five homicides committed in Italy by six terrorist units of the extreme left; interviews with extreme left terrorists; interviews with victims of extreme left terrorists; autobiographies of extreme left terrorists; autobiographies of victims of extreme left terrorists; video interviews of extreme left terrorists; and written statements of the investigating magistrates. Journal: Studies in Conflict & Terrorism Pages: 179-198 Issue: 3 Volume: 38 Year: 2015 Month: 3 X-DOI: 10.1080/1057610X.2014.987593 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.987593 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:3:p:179-198 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_982384_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Hendrik Hegemann Author-X-Name-First: Hendrik Author-X-Name-Last: Hegemann Author-Name: Martin Kahl Author-X-Name-First: Martin Author-X-Name-Last: Kahl Title: Constructions of Effectiveness and the Rationalization of Counterterrorism Policy: The Case of Biometric Passports Abstract: This article argues that counterterrorism effectiveness is a distinct, discursive construction that politicians use to offer a rationalization of measures adopted under conditions of inherent uncertainty. Even in the face of multiple limits of knowability, decision makers need to offer “rational†justifications complying with persisting expectations of “evidence-based†policy and sound deliberation in modern societies. This article develops a new perspective on the political role of counterterrorism effectiveness highlighting the symbolic importance of knowledge claims and prevailing standards of modern rationality. It illustrates its arguments through a case study on the justification of biometric passports as an effective counterterrorist tool. Journal: Studies in Conflict & Terrorism Pages: 199-218 Issue: 3 Volume: 38 Year: 2015 Month: 3 X-DOI: 10.1080/1057610X.2014.982384 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.982384 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:3:p:199-218 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_981989_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nadir Gergin Author-X-Name-First: Nadir Author-X-Name-Last: Gergin Author-Name: Haci Duru Author-X-Name-First: Haci Author-X-Name-Last: Duru Author-Name: Hakan Cem Çetin Author-X-Name-First: Hakan Cem Author-X-Name-Last: Çetin Title: Profile and Life Span of the PKK Guerillas Abstract: This study attempts to explore the span of a life in a specific terrorist organization, the Kurdistan Workers Party (PKK). It suggests the following: The average lifespan of a person in the PKK is about two-and-a-half years (i.e., not a very long one). Females join the PKK at a younger age (about 1.4 years) and die at a younger age (about 1.4 years) compared to males, but their lifespan is not any different than that of males. The age at which a PKK member joins the organization, and the age at which (s)he dies varies by year. The age at which a PKK member joins the organization, and the age at which (s)he dies varies by where (s)he comes from. Still, another interesting observation is that the average lifespan of a PKK member varies by where (s)he comes from. Journal: Studies in Conflict & Terrorism Pages: 219-232 Issue: 3 Volume: 38 Year: 2015 Month: 3 X-DOI: 10.1080/1057610X.2014.981989 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.981989 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:3:p:219-232 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_997510_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Isaac Kfir Author-X-Name-First: Isaac Author-X-Name-Last: Kfir Title: Social Identity Group and Human (In)Security: The Case of Islamic State in Iraq and the Levant (ISIL) Abstract: The article uses social identity group theory and human insecurity to examine the rise of the Islamic State in Iraq and the Levant (ISIL). After first defining social group identity and its characteristics, the article reviews the Al Qaeda ideology that serves as the foundation of ISIL, before turning attention to the message and legacy of Abu Musab al-Zarqawi and their profound influence on ISIL. The article concludes by arguing that only by ending the marketplace of identities can stability be restored to Iraq and Syria. Journal: Studies in Conflict & Terrorism Pages: 233-252 Issue: 4 Volume: 38 Year: 2015 Month: 4 X-DOI: 10.1080/1057610X.2014.997510 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.997510 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:4:p:233-252 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_994349_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: John McCoy Author-X-Name-First: John Author-X-Name-Last: McCoy Author-Name: W. Andy Knight Author-X-Name-First: W. Andy Author-X-Name-Last: Knight Title: Homegrown Terrorism in Canada: Local Patterns, Global Trends Abstract: The article examines how global trends related to militant Islamism have influenced patterns of homegrown terrorism in Canada. It seeks to understand how an evolving movement has shaped three case studies, two cases of homegrown terrorism, the case of Momin Khawaja, the “Toronto 18†plot, and the emerging trend of extremist travelers. Recognizing the notable gap in the literature, a growing number of cases of homegrown terrorism and extremism in Canada suggest that further study is required. The article asks why Canadians choose to participate in this movement and why militant Islamist movements are actively recruiting them. Journal: Studies in Conflict & Terrorism Pages: 253-274 Issue: 4 Volume: 38 Year: 2015 Month: 4 X-DOI: 10.1080/1057610X.2014.994349 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.994349 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:4:p:253-274 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_995565_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ora Szekely Author-X-Name-First: Ora Author-X-Name-Last: Szekely Title: Doing Well by Doing Good: Understanding Hamas's Social Services as Political Advertising Abstract: Like many nonstate military actors, Hamas has long provided social services to its constituents, but the mechanism by which charity leads to increased public support is poorly understood. This article argues that providing charity benefits nonstate actors not because it isolates recipients or acts as a bribe but because it allows organizations like Hamas to overcome the legacies of their own military activities and extremist ideologies. Service provision allows them to demonstrate that they are not merely soldiers or ideologues, but capable bureaucrats and managers as well. Journal: Studies in Conflict & Terrorism Pages: 275-292 Issue: 4 Volume: 38 Year: 2015 Month: 4 X-DOI: 10.1080/1057610X.2014.995565 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.995565 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:4:p:275-292 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_991165_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matt Qvortrup Author-X-Name-First: Matt Author-X-Name-Last: Qvortrup Title: T-Test for Terrorism: Did the Introduction of Proportional Representation Reduce the Terrorist Threat? A Time-Series Case Study of Algeria and Northern Ireland Abstract: Can electoral reform lead to a reduction in the number of terrorist incidents? Economists have shown that the introduction of constitutional institutions such as courts in the early eighteenth century had a direct effect on investment. Could there be a similar link between the introduction of proportional representation (PR) electoral systems and a reduction in the number of terrorist attacks? Previous studies using cross-sectional data have found a negative correlation between the presence of PR-electoral systems and the number of terrorist incidents. However, earlier studies were based on aggregate figures, not on time-series data. They did not provide a direction that could be used to measure the possible effect of the introduction of PR. This research note addresses this problem. Using a paired samples t-test it is possible to show that the introduction of proportional representation in Northern Ireland and Algeria led to a marked reduction in the number of terrorist attacks. The note thus adds strength to earlier studies. Journal: Studies in Conflict & Terrorism Pages: 293-304 Issue: 4 Volume: 38 Year: 2015 Month: 4 X-DOI: 10.1080/1057610X.2014.991165 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.991165 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:4:p:293-304 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1004893_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Dennis Pluchinsky Author-X-Name-First: Dennis Author-X-Name-Last: Pluchinsky Title: “Special†Communiqué Issued by the Belgian Marxist Terrorist Group, “Communist Combatant Cells†(CCC) Abstract: This section of Studies in Conflict & Terrorism is dedicated to the reprinting of selected, translated terrorist communiqués that provide insights into the mindset, worldview, or operational thinking of a group. In terms of communiqués, this section employs the following typology of terrorist communiqués. There are three types of terrorist communiqués: attack, strategic, and special. Attack communiqués are issued to claim responsibility for an attack, explain the target selected, and provide the political rationale for attacking the target. A strategic communiqué is a longer document that is issued to provide strategic direction or commentary on political events, issues, and developments relevant to the group's cause and constituency. It can be used to explain changes of strategy or reinforce the strategic direction of the group. The special communiqué is similar to the attack communiqué in that it is event-driven but addresses non-attack events like anniversary dates, hunger strikes, elections, deaths of leaders, ceasefires, issuing threats or warnings, annual progress reports, issuing apologies, and so on. All three communiqués are issued publicly and intended to influence various audiences. Journal: Studies in Conflict & Terrorism Pages: 305-309 Issue: 4 Volume: 38 Year: 2015 Month: 4 X-DOI: 10.1080/1057610X.2015.1004893 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1004893 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:4:p:305-309 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1018024_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: R. Kim Cragin Author-X-Name-First: R. Kim Author-X-Name-Last: Cragin Title: Semi-Proxy Wars and U.S. Counterterrorism Strategy Abstract: On 4 February 2014, Al Qaeda leaders in Pakistan (aka Al Qaeda Central) repudiated Abu Bakr al-Baghdadi, the leader of Al Qaeda in Iraq. Ayman al-Zawahiri declared that al-Baghdadi and his newly formed Islamic State in Iraq and the Levant (ISIL) were no longer part of Al Qaeda's organization and Al Qaeda Central could not be held responsible for ISIL's behavior. It represents the first time that Al Qaeda Central has renounced an affiliate publicly. The announcement was driven by months of fighting between ISIL and Jabhat al-Nusra, another Al Qaeda affiliate in Syria. In fact, in Syria, Al Qaeda fighters are competing against each other for influence, as well as against other opposition groups, the Syrian regime, the Islamic Revolutionary Guard Corps, Iraqi militiamen, and Lebanese Hezbollah. This chaotic, semi-proxy war is unlike any previous problem encountered, made even more challenging by the limited U.S. presence on-the-ground. More worrisome, this semi-proxy war also has spread beyond Syria. Similar dynamics have emerged in Iraq, Yemen, and Lebanon to a certain extent. This article argues that these dynamics necessitate a twist in U.S. counterterrorism strategy. Journal: Studies in Conflict & Terrorism Pages: 311-327 Issue: 5 Volume: 38 Year: 2015 Month: 5 X-DOI: 10.1080/1057610X.2015.1018024 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1018024 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:5:p:311-327 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1013776_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Marion Van San Author-X-Name-First: Marion Author-X-Name-Last: Van San Title: Striving in the Way of God: Justifying Jihad by Young Belgian and Dutch Muslims Abstract: Since March 2013, the news has been dominated by young Muslims from European countries leaving for Syria to join the armed struggle against the Assad regime. This is especially remarkable in light of the fact that it would appear that, until very recently, European foreign fighters were far and few between. The armed struggle is a topic that is widely discussed among young Muslims on social media such as Facebook. During the research on which this article is based, I analyzed conversations between young Muslims on Facebook and also conducted interviews with a number of them. The key question was: Why is it that so many young people use social media to profess their willingness to sacrifice their lives in armed struggle while at the same time most of them are not prepared to turn their words into deeds? Despite all the media reports, the fact remains that of the large number of young Muslims who are potentially ready to go into battle, the vast majority prefer to stay at home for the time being. When I confronted the participants in these discussions with this inconsistency they offered a number of reasons as to why martyrdom was not yet granted to them. The way in which these considerations shape their lives and the role played by their religious convictions form the subject of this article. Journal: Studies in Conflict & Terrorism Pages: 328-342 Issue: 5 Volume: 38 Year: 2015 Month: 5 X-DOI: 10.1080/1057610X.2015.1013776 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1013776 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:5:p:328-342 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1005459_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Marco Nilsson Author-X-Name-First: Marco Author-X-Name-Last: Nilsson Title: Foreign Fighters and the Radicalization of Local Jihad: Interview Evidence from Swedish Jihadists Abstract: Modern jihadism has experienced two distinct crises. The present study analyzes recent developments in jihadism, which can be seen in connection with efforts to solve the latest recruitment crisis of global jihad, and is based on comparative interviews with eight Swedish jihadists defined as foreign fighters. The study identifies three new trends evident in the interviews comparing jihadists active in Syria with those who fought in Afghanistan and Bosnia: socialization to global jihad, normalization of jihad, and an increasing use of the doctrine of takfir (i.e., ex-communication). This can be described as indicating the radicalization of local jihad, as the territorially based jihad, championed by Abdullah Azzam, and the global jihad of Osama bin Laden meet in the territorial realities of Syria and Iraq. Journal: Studies in Conflict & Terrorism Pages: 343-358 Issue: 5 Volume: 38 Year: 2015 Month: 5 X-DOI: 10.1080/1057610X.2015.1005459 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1005459 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:5:p:343-358 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1009799_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Veronica Strandh Author-X-Name-First: Veronica Author-X-Name-Last: Strandh Author-Name: Niklas Eklund Author-X-Name-First: Niklas Author-X-Name-Last: Eklund Title: Swedish Counterterrorism Policy: An Intersection Between Prevention and Mitigation? Abstract: The aim of this article is to analyze how and why Swedish counterterrorism policy has changed since 2001. It raises the issue of how counterterrorism interacts with other factors on the governmental agenda, which priorities are made, and how these can be understood. Although much empirical evidence on the real political influence of emergent interagency networks is still lacking in the case of Sweden, an attempt is made here to analyze the importance of focusing events. In the light of the Swedish national strategy for counterterrorism, the article analyzes the content of annual reports from the Swedish Security Service. The article also explores linkages between the counterterrorism and crisis management literatures, and argues that the reassuring overtones in Swedish counterterrorism policy of late can be understood not only as the result of changes in threat perception and policy, but also in institutional change. Journal: Studies in Conflict & Terrorism Pages: 359-379 Issue: 5 Volume: 38 Year: 2015 Month: 5 X-DOI: 10.1080/1057610X.2015.1009799 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1009799 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:5:p:359-379 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_995988_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Liana Eustacia Reyes Author-X-Name-First: Liana Eustacia Author-X-Name-Last: Reyes Author-Name: Shlomi Dinar Author-X-Name-First: Shlomi Author-X-Name-Last: Dinar Title: The Convergence of Terrorism and Transnational Crime in Central Asia Abstract: This article examines the convergence among ethnic groups, narco-traffickers, insurgents, and terror organizations in Central Asia. It analyzes the lucrative business of drug trafficking and the diffusion of globalization, which have undoubtedly brought these once disparate groups together. It will explore how the increasing movement of illicit goods and people, proliferation of transportation technology, growing infrastructure, cooperative ethnicities, as well as a shared need for funding, have provided these groups with an opportunity to consolidate their efforts in ways that were not possible in the past. Journal: Studies in Conflict & Terrorism Pages: 380-393 Issue: 5 Volume: 38 Year: 2015 Month: 5 X-DOI: 10.1080/1057610X.2014.995988 File-URL: http://hdl.handle.net/10.1080/1057610X.2014.995988 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:5:p:380-393 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1008341_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joel A. Capellan Author-X-Name-First: Joel A. Author-X-Name-Last: Capellan Title: Lone Wolf Terrorist or Deranged Shooter? A Study of Ideological Active Shooter Events in the United States, 1970–2014 Abstract: This study explores the threat of ideological active shooter attacks in the United States. In particular, to understand if these events constitute a new brand of “lone wolf terrorism†or if they are simply “deranged shooters†that happen to be ideological. The results show that ideological and non-ideological active shooters share very similar profiles. Despite the similarities, ideological extremism seems to influence the way these offenders prepare, execute, and conclude their attacks. Most ideological active shooters are “loners†whose attacks tend to be motivated by ideology. Given their sophistication and lethality, ideological active shooters represent a serious threat to national security. Journal: Studies in Conflict & Terrorism Pages: 395-413 Issue: 6 Volume: 38 Year: 2015 Month: 6 X-DOI: 10.1080/1057610X.2015.1008341 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1008341 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:6:p:395-413 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1004891_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matteo Vergani Author-X-Name-First: Matteo Author-X-Name-Last: Vergani Author-Name: Sean Collins Author-X-Name-First: Sean Author-X-Name-Last: Collins Title: Radical Criminals in the Grey Area: A Comparative Study of Mexican Religious Drug Cartels and Australian Outlaw Motorcycle Gangs Abstract: This article defines and assesses the ideal-type of the radical criminal as the analytical framework for a comparative qualitative study of Mexican religious drug cartels and Australian outlaw motorcycle gangs and concludes that radical criminals operate in both weak and failed states and stable democracies. The article participates in the wider discussion concerning the existence (and the features) of a grey area between criminal and political violence, through the lens of the radical criminal ideal-type. Journal: Studies in Conflict & Terrorism Pages: 414-432 Issue: 6 Volume: 38 Year: 2015 Month: 6 X-DOI: 10.1080/1057610X.2015.1004891 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1004891 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:6:p:414-432 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1009798_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jeff Gruenewald Author-X-Name-First: Jeff Author-X-Name-Last: Gruenewald Author-Name: Kayla Allison-Gruenewald Author-X-Name-First: Kayla Author-X-Name-Last: Allison-Gruenewald Author-Name: Brent R. Klein Author-X-Name-First: Brent R. Author-X-Name-Last: Klein Title: Assessing the Attractiveness and Vulnerability of Eco-Terrorism Targets: A Situational Crime Prevention Approach Abstract: This study assesses the vulnerability and attractiveness of eco-terrorism targets in the United States based on a Situational Crime Prevention approach. Data from the American Terrorism Study are extracted for eight different attributes of terrorism targets, including exposed, vital, iconic, legitimate, destructible, occupied, near, and easy. Descriptive findings generally support expectations that eco-terrorists select targets based on their vulnerability and attractiveness. The study concludes with several implications for homeland security policy and a call for further exploration into new and alternative operationalizations of eco-terrorism target attributes. Journal: Studies in Conflict & Terrorism Pages: 433-455 Issue: 6 Volume: 38 Year: 2015 Month: 6 X-DOI: 10.1080/1057610X.2015.1009798 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1009798 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:6:p:433-455 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1006451_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Martin Jander Author-X-Name-First: Martin Author-X-Name-Last: Jander Title: German Leftist Terrorism and Israel: Ethno-Nationalist, Religious-Fundamentalist, or Social-Revolutionary? Abstract: The relationship of the three leftist terrorist organizations in the Federal Republic of Germany to Israel can be summarized, in somewhat abbreviated fashion, as follows: All three groups, the Red Army Faction (Rote Armee Fraktion; RAF), June 2 Movement (Bewegung 2. Juni), and Revolutionary Cells (Revolutionäre Zellen), and the milieu from which they emerged in West Berlin, Munich, Heidelberg, Hamburg, and Frankfurt, hated America, Americans, Israel, and Jews. They participated in the international terror war against Israel and did not shy away from attacks on Jews and Jewish facilities in the Federal Republic of Germany. The three organizations mentioned, for all their differences, are, to be reckoned among the organizations coming out of leftist traditions that, like the Socialist Unity Party of Germany (Sozialistische Einheitspartei Deutschlands), after the end of the Shoah and the Second World War, and in the name of a supposed struggle against fascism, conducted antisemitic propaganda, supported the war of terror against Israel, and publicly justified and supported those groups and institutions working in the same direction. Journal: Studies in Conflict & Terrorism Pages: 456-477 Issue: 6 Volume: 38 Year: 2015 Month: 6 X-DOI: 10.1080/1057610X.2015.1006451 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1006451 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:6:p:456-477 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1005462_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Diego Muro Author-X-Name-First: Diego Author-X-Name-Last: Muro Title: Healing through Action? The Political Mobilization of Victims of Al Qaeda-Inspired Violence in Spain and the United Kingdom Abstract: Spain and the United Kingdom have experienced similar types of political violence. Since the 1960s, both countries have suffered casualties as a result of long-standing ethno-nationalist conflicts as well as terrorist attacks by Al Qaeda–inspired groups. In spite of these similarities, the two countries display a striking variation in the attitudes to victims. In Spain, Associations of Victims of Terrorism have been highly visible and influential, whereas United Kingdom-based organizations have not captured the public's imagination and the attention of policymakers in the same way. Spanish associations of victims have been present in the public sphere and have routinely provided their opinions on counterterrorist policy and appropriate government legislation whereas this sort of political activity is difficult to trace in the United Kingdom. As a result of this puzzle, the article tries to answer the following question: Why are associations of victims of terrorism by Al Qaeda–inspired attacks more influential in Spain than in the United Kingdom? The article will argue that political and sociocultural variables account for the difference. More specifically, the article demonstrates that the experience of both ethno-nationalist and jihadist political violence has affected party systems and cultural frames differently, hence providing distinct sets of political opportunities for victims’ associations to carry out their lobbying strategies. Journal: Studies in Conflict & Terrorism Pages: 478-493 Issue: 6 Volume: 38 Year: 2015 Month: 6 X-DOI: 10.1080/1057610X.2015.1005462 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1005462 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:6:p:478-493 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1025611_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anita Peresin Author-X-Name-First: Anita Author-X-Name-Last: Peresin Author-Name: Alberto Cervone Author-X-Name-First: Alberto Author-X-Name-Last: Cervone Title: The Western Muhajirat of ISIS Abstract: An unprecedented number of Western women have recently joined the Islamic State of Iraq and Syria (ISIS). The group has envisaged strictly non-combat roles for them, but violence is an essential part of their embraced ideology and several signs suggest that they could claim a more militant role. Their marginalization, however, is essential for the preservation of ISIS's power system and it is consequently unlikely that it would accommodate such aspiration, at least in the areas of the proclaimed caliphate. It could be different in the West, where women returning from conflict areas or those, even more numerous, anxious to join but unable to travel, could engage in violent acts. Journal: Studies in Conflict & Terrorism Pages: 495-509 Issue: 7 Volume: 38 Year: 2015 Month: 7 X-DOI: 10.1080/1057610X.2015.1025611 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1025611 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:7:p:495-509 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1022443_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Natalie Delia Deckard Author-X-Name-First: Natalie Author-X-Name-Last: Delia Deckard Author-Name: Atta Barkindo Author-X-Name-First: Atta Author-X-Name-Last: Barkindo Author-Name: David Jacobson Author-X-Name-First: David Author-X-Name-Last: Jacobson Title: Religiosity and Rebellion in Nigeria: Considering Boko Haram in the Radical Tradition Abstract: Testing social movement theory positing that radical organizations are ideologically driven at their core, but are supported by civilians who are driven by social factors, this research interrogates the disparity between radical group ideology and supporter belief set in the context of present-day Nigeria. Content analysis of randomly selected Boko Haram publications establishes the high, and increasing, levels of religiosity exhibited by the violent social movement itself. In contrast, a large-N survey of Nigerians conducted in 2012 and 2013 shows that high levels of religiosity do not significantly predict willingness to justify violence, commitment to non-state violent actors, or positive attitude toward Boko Haram among Nigerians as a whole, but rather the opposite. Given these findings, Boko Haram may be better understood within the tradition of radical extremist movements across the ideological spectrum, even while it frames its struggle as that of a distinctly religious movement. Journal: Studies in Conflict & Terrorism Pages: 510-528 Issue: 7 Volume: 38 Year: 2015 Month: 7 X-DOI: 10.1080/1057610X.2015.1022443 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1022443 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:7:p:510-528 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1016312_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matthew Testerman Author-X-Name-First: Matthew Author-X-Name-Last: Testerman Title: Removing the Crutch: External Support and the Dynamics of Armed Conflict Abstract: Empirical analysis of civil wars wherein rebels receive support from outside states or actors confirms the expectation that such external support is correlated with conflicts that, on average, are longer than civil wars without external support. When this assistance is lost, the empirical results are at odds with the expectation that these wars should end more rapidly. Instead, wars in which there is a break in external support are more likely to continue into the next calendar year than even those wars with continued external support. This counterintuitive finding suggests a re-evaluation of theoretical foundations of external support to rebel groups. Journal: Studies in Conflict & Terrorism Pages: 529-542 Issue: 7 Volume: 38 Year: 2015 Month: 7 X-DOI: 10.1080/1057610X.2015.1016312 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1016312 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:7:p:529-542 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1025609_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kenneth Pennington Author-X-Name-First: Kenneth Author-X-Name-Last: Pennington Author-Name: Orla Lynch Author-X-Name-First: Orla Author-X-Name-Last: Lynch Title: Counterterrorism, Community Policing and the Flags Protests: An Examination of Police Perceptions of Northern Ireland's Operation Dulcet Abstract: In 2013 Northern Ireland (NI) witnessed the most protracted period of public-disorder ever seen in the United Kingdom. After Belfast City Council voted to fly the Union flag in-line with the manner adopted in the rest of the United Kingdom, loyalist protestors blocked roads, attacked offices, and held marches through Belfast city center. During what became known as Operation Dulcet, police had to respond to the protests and violence, mindful of existing tensions in NI. This article reports on data collected from interviews conducted with officers involved in the policing of these events. The findings demonstrate that the police response was understood using narratives concerning the primacy of human rights, a focus on perceived proportionality, and ultimately, related to the potential violence linked to historic conceptions of community divisions in NI. Journal: Studies in Conflict & Terrorism Pages: 543-559 Issue: 7 Volume: 38 Year: 2015 Month: 7 X-DOI: 10.1080/1057610X.2015.1025609 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1025609 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:7:p:543-559 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1022093_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Haroro J. Ingram Author-X-Name-First: Haroro J. Author-X-Name-Last: Ingram Title: An Analysis of the Taliban in Khurasan's Azan (Issues 1–5) Abstract: This article analyzes issues 1–5 of the Taliban in Khurasan's Azan magazine. It applies an interpretive framework for analyzing radical narratives, based on a multidisciplinary conceptualization of the radicalization process, to explore how Azan attempts to appeal to its audiences by leveraging ingroup, Other, crisis and solution constructs via value-, crisis-, and dichotomy-reinforcing narratives. Two key findings emerge. First, Azan prioritizes content that empowers its readership toward action with narratives that link ingroup and solution constructs. Second, Azan uses a variety of narrative approaches in order to appeal to a potentially diverse readership at different stages of radicalization. Journal: Studies in Conflict & Terrorism Pages: 560-579 Issue: 7 Volume: 38 Year: 2015 Month: 7 X-DOI: 10.1080/1057610X.2015.1022093 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1022093 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:7:p:560-579 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1031556_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Byman Author-X-Name-First: Daniel Author-X-Name-Last: Byman Title: The Homecomings: What Happens When Arab Foreign Fighters in Iraq and Syria Return? Abstract: What threat do foreign Arab jihadists returning from the war in Syria and Iraq pose to their home states and the broader Arab world? Foreign fighters come back as hardened veterans, steady in the face of danger and skilled in the use of weapons and explosives. While in the conflict zone, they will form networks with other radicals, embrace techniques like suicide bombings and beheadings, and establish ties to jihadists around the world. Different countries have different mitigating factors that limit the danger. The presence or absence of strong and focused security services is particularly important. Returnees' ambition, regional focus, lack of discipline, and brutality often mean they create more enemies than they vanquish and anger local populations. Most terrorism will be locally and regionally focused, with international terrorism probably less of a priority. Area regimes can reduce the risk of bleedout by hindering the travel of volunteers and constraining their ability to organize, stressing the internecine nature of the violence in the Sunni Muslim community, and developing effective de-radicalization programs. Regional and international cooperation to monitor and disrupt travel is also valuable. Many regimes, however, are also likely to take advantage of the jihadists' presence to gain more support from the United States, delay democratic reforms, and crackdown on non-jihadist opposition. Improving intelligence sharing and offensive counterintelligence is important, and the United States can play an important facilitating role. Journal: Studies in Conflict & Terrorism Pages: 581-602 Issue: 8 Volume: 38 Year: 2015 Month: 8 X-DOI: 10.1080/1057610X.2015.1031556 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1031556 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:8:p:581-602 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1038105_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Timothy Holman Author-X-Name-First: Timothy Author-X-Name-Last: Holman Title: Belgian and French Foreign Fighters in Iraq 2003–2005: A Comparative Case Study Abstract: Efforts to understand the distinction between foreign fighting and domestic terrorist acts have focused for the most part at the macro level. This study investigates if this difference is observed at the network level. The Iraq foreign fighter mobilization, which was significant, both numerically and, in terms of its visibility, is used for this analysis. The participation of Belgian and French foreign fighters is examined due to the perceived level of threat they posed in the period 2003–2005 and while absolute numbers are relatively low, these two countries may have provided just under a quarter of the all European foreign fighters in this period. Observations are generated and then compared to research on domestic attack networks in Europe and the United Kingdom. The article finds that the two networks were involved in foreign fighter activity and did not engage in domestic attack activity. Involvement in domestic attacks occurred at a later time via individuals who had left the network, individuals on the periphery of the original foreign fighter network or individuals who unsuccessfully attempted to engage in foreign fighter activity. Journal: Studies in Conflict & Terrorism Pages: 603-621 Issue: 8 Volume: 38 Year: 2015 Month: 8 X-DOI: 10.1080/1057610X.2015.1038105 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1038105 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:8:p:603-621 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1030194_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Shawn Teresa Flanigan Author-X-Name-First: Shawn Teresa Author-X-Name-Last: Flanigan Author-Name: Cheryl O'brien Author-X-Name-First: Cheryl Author-X-Name-Last: O'brien Title: Service-Seeking Behavior, Perceptions of Armed Actors, and Preferences Regarding Governance: Evidence from the Palestinian Territories Abstract: Armed non-state actors, such as Hezbollah and Hamas, are visibly engaged in providing social welfare in addition to participating in violence. A number of scholars have suggested that there is a relationship between service provision by terrorist organizations and support from service recipients, and have indicated that terrorist organizations use service provision strategically for this purpose. However, few studies have examined the experiences and opinions of service recipients themselves to understand if services do indeed influence populations' political loyalties and opinions regarding violent activities. Using data from more than 1,000 low to moderate income individuals in Palestine, this study seeks to understand if and how receiving services from a specific organization engenders loyalty to the organization, passive acceptance and/or favorable approval of the organizations' violent activities, and the likelihood of participation in the organization's violent activities. This paper explores if and how provision of aid and “governance†services by armed non-state actors is correlated with various aspects of individuals' experiences of conflict, such as their opinions about the use of violence and various strategies for attaining peace, their fellow community members' likelihood to join armed groups and engage in fighting, and their preferences regarding state structure and legal system. Journal: Studies in Conflict & Terrorism Pages: 622-651 Issue: 8 Volume: 38 Year: 2015 Month: 8 X-DOI: 10.1080/1057610X.2015.1030194 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1030194 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:8:p:622-651 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1030190_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Brandon M. Boylan Author-X-Name-First: Brandon M. Author-X-Name-Last: Boylan Title: Sponsoring Violence: A Typology of Constituent Support for Terrorist Organizations Abstract: Terrorist organizations rely on support from their constituencies to survive. Constituent support can be categorized by constituents' behavior (active or passive) and the inducement strategy used by terrorist organizations to obtain it (enticements or coercion). These two dimensions overlap, producing a typology of constituent support for terrorist organizations. Four types of support are thus identified: impelled (active and enticed), auspicious (passive and enticed), compelled (active and coerced), and deterred (passive and coerced). Although types often co-exist and transform from one to another over time, each is a distinct lens to view constituent support and can improve upon state counterterrorism strategies. Journal: Studies in Conflict & Terrorism Pages: 652-670 Issue: 8 Volume: 38 Year: 2015 Month: 8 X-DOI: 10.1080/1057610X.2015.1030190 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1030190 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:8:p:652-670 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1042267_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alexander Knorr Author-X-Name-First: Alexander Author-X-Name-Last: Knorr Title: Economic Factors for Piracy: The Effect of Commodity Price Shocks Abstract: This study treats piracy as a civil conflict event where participants are substituting from legal work to illegal activity in response to lower commodity prices (opportunity cost effect). The analysis exploits exogenous variation in nine different commodity prices across seventeen countries around the globe. Results show that as commodity prices decrease maritime piracy attacks increase, which is consistent with results found in civil conflict literature. In the context of actual commodity shocks these piracy attacks represent increases ranging from .452 to 2.59 more attacks per year in the ordinary least squares and .495 to 20.71 attacks per year in the Poisson specification. Journal: Studies in Conflict & Terrorism Pages: 671-689 Issue: 8 Volume: 38 Year: 2015 Month: 8 X-DOI: 10.1080/1057610X.2015.1042267 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1042267 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:8:p:671-689 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1049052_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tatjana Stankovic Author-X-Name-First: Tatjana Author-X-Name-Last: Stankovic Title: Microdisarmament and Compliance Costs: An Analysis of Disarmament, Demobilization, and Reintegration Programs Abstract: Focusing on disarmament, demobilization, and reintegration programs, this article considers why some armed groups disarm and demobilize, while others refuse to do so. Previous research focused on intergroup rivalries and identified enforcement as a critical barrier. This study considers the effect of (1) war benefits and (2) intragroup dynamics and argues that distribution problems obstruct conflict resolution. Using a simple game-theoretic model, the article demonstrates that optimal programs (1) consider that combatants' cost of supporting peace varies and (2) require a mix of positive and negative incentives to motivate all ex-combatants to participate and comply with program requirements. Journal: Studies in Conflict & Terrorism Pages: 691-709 Issue: 9 Volume: 38 Year: 2015 Month: 9 X-DOI: 10.1080/1057610X.2015.1049052 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1049052 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:9:p:691-709 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1048100_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David C. Hofmann Author-X-Name-First: David C. Author-X-Name-Last: Hofmann Title: Quantifying and Qualifying Charisma: A Theoretical Framework for Measuring the Presence of Charismatic Authority in Terrorist Groups Abstract: In the past four decades, there has been increased multidisciplinary scholarly interest in the study of charismatic authority. However, there has yet to be any systematic examination of charismatic authority in the context of terrorism, despite widespread acknowledgment of the importance of charismatic leaders in the recruitment, radicalization, and operation of terrorist groups. This article seeks to contribute to future empirical research by presenting a theoretical framework for measuring the presence of charismatic authority in terrorist groups that is based on Max Weber's seminal work on legitimate domination (herrschaft) and on theoretical insights drawn from the study of charismatic authority in new religious movements. The framework is then applied to an illustrative case study of the relationship between charismatic authority and the radicalization process within the far-right terrorist group “the Covenant, the Sword, and the Arm of the Lord.†The article concludes with a discussion of findings and suggestions for future research. Journal: Studies in Conflict & Terrorism Pages: 710-733 Issue: 9 Volume: 38 Year: 2015 Month: 9 X-DOI: 10.1080/1057610X.2015.1048100 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1048100 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:9:p:710-733 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1038106_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael Suttmoeller Author-X-Name-First: Michael Author-X-Name-Last: Suttmoeller Author-Name: Steven Chermak Author-X-Name-First: Steven Author-X-Name-Last: Chermak Author-Name: Joshua D. Freilich Author-X-Name-First: Joshua D. Author-X-Name-Last: Freilich Title: The Influence of External and Internal Correlates on the Organizational Death of Domestic Far-Right Extremist Groups Abstract: The domestic far-right movement has existed in the United States for many years. During that time, groups have appeared, disappeared, and reappeared. Unfortunately, very little is known about what causes these groups to disband. An interdisciplinary approach identified external and internal correlates of organizational death to empirically test which of these correlates influences whether a group dies. Results from this study provided empirical support for some previously only anecdotal explanations for organizational death, while also undermining other claims. Journal: Studies in Conflict & Terrorism Pages: 734-758 Issue: 9 Volume: 38 Year: 2015 Month: 9 X-DOI: 10.1080/1057610X.2015.1038106 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1038106 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:9:p:734-758 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1038107_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jacqueline S. Bruscella Author-X-Name-First: Jacqueline S. Author-X-Name-Last: Bruscella Title: “It's More Than Just a Nameâ€: A Theoretical Approach to Eradicating Terrorism Through Propositions of Organizational Naming Abstract: The following article is divided into two parts, each offering a series of propositions highlighting the effects and implications of organizational naming and labeling practices and their subsequent effects on the framing of terrorist organizations and activity. In the first half, the author will highlight the importance of organizational naming and labeling in terms of how it shapes terrorism discourse. Then, the author will discuss the importance of recognizing the implications of how the events of 11 September 2001 were framed by then president George W. Bush. Important to both discussions is the relevance of organizational communication theory, particularly in terms of individual sensemaking and the communicative constitution of organizations. Journal: Studies in Conflict & Terrorism Pages: 759-775 Issue: 9 Volume: 38 Year: 2015 Month: 9 X-DOI: 10.1080/1057610X.2015.1038107 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1038107 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:9:p:759-775 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1039421_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ngonidzashe Marongwe Author-X-Name-First: Ngonidzashe Author-X-Name-Last: Marongwe Title: International Terrorism Potential in Southern Africa Abstract: This article discusses the potential factors for the development of international terrorism in southern Africa. While the region has seemingly been spared the terror attacks that have ravaged most other parts of the continent, and the globe at large, it is not immune to these attacks. Using a survey of the Southern African Development Community (SADC) countries, particularly the Democratic Republic of the Congo, Mozambique, South Africa, Mauritius, Zimbabwe, and Tanzania, which illuminate some of the permissive factors, the article asks, largely, first, to what extent is southern Africa at risk of global terrorism? And, second, in what ways can southern African states reduce the risk of terrorism in the region? Broadly, the article contends that, like most developing countries, including those from other parts of Africa, there exist permissive, both root and trigger, factors including insecure borders, democratization challenges, poverty, urban centers and variegated forms of both sub-state and state terrorism, that could provide useful platforms for the growth of international terrorism. Journal: Studies in Conflict & Terrorism Pages: 776-793 Issue: 9 Volume: 38 Year: 2015 Month: 9 X-DOI: 10.1080/1057610X.2015.1039421 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1039421 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:38:y:2015:i:9:p:776-793 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1084802_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David Martin Jones Author-X-Name-First: David Martin Author-X-Name-Last: Jones Author-Name: M.L.R. Smith Author-X-Name-First: M.L.R. Author-X-Name-Last: Smith Title: The Rise of Dark Americana: Depicting the “War on Terror†On-Screen Abstract: In the wake of the 9/11 attacks the American film industry took a while to react to the Islamist threat at home and abroad. From 2005, however, Hollywood responded to the threat to the homeland and the War on Terror “over there†in Iraq and Afghanistan in a variety of ways. This article examines the nature of that response and whether it evinces, as critics allege, that the American film industry reflects and shapes a capitalist and imperialist agenda. More particularly, by evaluating the cinematic treatment of both the Iraq war and the problem of surveillance, rendition, and homeland security, the analysis explores what this distinctive on-screen genre tells about how the U.S. cultural mainstream has dealt with the challenge global jihadism poses to American values. The analysis suggests that post-9/11 movie making, while sometimes bleak and often clichéd, is cognizant of the gray area morality inherent in fighting the “War on Terror,†and is still thus able to offer some possibilities for sophisticated reflection. Journal: Studies in Conflict & Terrorism Pages: 1-21 Issue: 1 Volume: 39 Year: 2016 Month: 1 X-DOI: 10.1080/1057610X.2015.1084802 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1084802 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:1:p:1-21 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1084162_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Dan Miodownik Author-X-Name-First: Dan Author-X-Name-Last: Miodownik Author-Name: Lilach Nir Author-X-Name-First: Lilach Author-X-Name-Last: Nir Title: Receptivity to Violence in Ethnically Divided Societies: A Micro-Level Mechanism of Perceived Horizontal Inequalities Abstract: Although past scholarship shows that group inequalities in economic and political power (“Horizontal Inequalitiesâ€) correlate with dissent, violence, and civil wars, there is no direct empirical test of the perceptual explanation for this relationship at the individual level. Such explanation is vital to understanding how integration, inclusion in power-sharing agreements, and exclusion from political power filter down to mass publics. Moreover, subjective perceptions of group conditions do not always correspond to objective group realities. We hypothesize subjective perceptions attenuate the effect of objective exclusion on support for violence in ethnically divided societies. Cross-national comparative multilevel analyses of the 2005/6 Afrobarometer dataset (N = 19,278) confirm that subjective perceptions both amplify the effect of exclusion on acceptance of violence and alter the readiness of included groups to dissent. These findings carry implications for research, state-building, and conflict management. Journal: Studies in Conflict & Terrorism Pages: 22-45 Issue: 1 Volume: 39 Year: 2016 Month: 1 X-DOI: 10.1080/1057610X.2015.1084162 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1084162 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:1:p:22-45 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1084161_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael Zekulin Author-X-Name-First: Michael Author-X-Name-Last: Zekulin Title: Endgames: Improving Our Understanding of Homegrown Terrorism Abstract: This article examines how the phenomenon of homegrown terrorism has evolved over the past decade. It argues that there have been significant developments that impact how we conceptualize and study it and offers two suggestions moving forward. It argues that re-branding it Islamist-inspired homegrown terrorism (IIHGT) better captures the nuances of this phenomenon and that sub-dividing it by “endgame,†the action the radicalized individual pursues creates the opportunity for a more robust analysis and provides a better way to compare incidents and identify traits that our current efforts overlook. Focusing on the action component may also provide a new way to investigate radicalization as the different endgames represent an escalation in violence, suggesting different degrees of radicalization might also be present. Journal: Studies in Conflict & Terrorism Pages: 46-66 Issue: 1 Volume: 39 Year: 2016 Month: 1 X-DOI: 10.1080/1057610X.2015.1084161 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1084161 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:1:p:46-66 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1099995_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jytte Klausen Author-X-Name-First: Jytte Author-X-Name-Last: Klausen Author-Name: Selene Campion Author-X-Name-First: Selene Author-X-Name-Last: Campion Author-Name: Nathan Needle Author-X-Name-First: Nathan Author-X-Name-Last: Needle Author-Name: Giang Nguyen Author-X-Name-First: Giang Author-X-Name-Last: Nguyen Author-Name: Rosanne Libretti Author-X-Name-First: Rosanne Author-X-Name-Last: Libretti Title: Toward a Behavioral Model of “Homegrown†Radicalization Trajectories Abstract: This research note presents a dynamic risk assessment model of homegrown terrorists. The model was tested in a study of convicted “homegrown†American terrorism offenders inspired by Al Qaeda's ideology. The New York Police Department model developed by Silber and Bhatt was chosen as the basis for creating a typology of overt and detectable indicators of individual behaviors widely thought to be associated with extremism. Twenty-four specific cues associated with each stage of radicalization were used to code and estimate the sequencing of behaviors and the duration of the average radicalization trajectory. Sixty-eight cases have been analyzed thus far. A decision was made to publish the initial results when it became apparent that the model was an effective tool for the evaluation of terrorist offenders. Journal: Studies in Conflict & Terrorism Pages: 67-83 Issue: 1 Volume: 39 Year: 2016 Month: 1 X-DOI: 10.1080/1057610X.2015.1099995 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1099995 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:1:p:67-83 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1139373_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ian R. Pelletier Author-X-Name-First: Ian R. Author-X-Name-Last: Pelletier Author-Name: Leif Lundmark Author-X-Name-First: Leif Author-X-Name-Last: Lundmark Author-Name: Rachel Gardner Author-X-Name-First: Rachel Author-X-Name-Last: Gardner Author-Name: Gina Scott Ligon Author-X-Name-First: Gina Scott Author-X-Name-Last: Ligon Author-Name: Ramazan Kilinc Author-X-Name-First: Ramazan Author-X-Name-Last: Kilinc Title: Why ISIS's Message Resonates: Leveraging Islam, Sociopolitical Catalysts, and Adaptive Messaging Abstract: How does the Islamic State in Iraq and Syria (ISIS) leverage Islamic Law to support their strategic objectives? Islam, as most religions, is a defining catalyst of group identity. ISIS has capitalized on this, using it as a vehicle to legitimize its interpretation of Islamic Law. This study builds on Social Movement Theory to develop and test a conceptual framework of ISIS messaging strategies. This framework highlights the progression of the organization's message from mainstream Islamic Law to radical unified reinterpretation. ISIS leaders' speeches are used to test the model. Ultimately, study findings inform countermessaging strategies and identify mobilization mechanisms. Journal: Studies in Conflict & Terrorism Pages: 871-899 Issue: 10 Volume: 39 Year: 2016 Month: 10 X-DOI: 10.1080/1057610X.2016.1139373 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1139373 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:10:p:871-899 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1145957_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mounah Abdel-Samad Author-X-Name-First: Mounah Author-X-Name-Last: Abdel-Samad Title: ISIS as an Existential Threat to the Druze: The Struggle for Survival Abstract: Faced with an existential threat by the Islamic State of Iraq and Syria on one hand, and the repressive regime of Bashar Al-Assad on the other, the Druze community in Syria is faced with a dilemma of what political and military position to take. This study examines a variety of internal and external factors that affect the Druze's political and military choices in Syria, and finds that their best choice is to remain neutral in the conflict. I argue that any political and military choice by the Druze in Syria besides neutrality risks endangering the survival of the entire community. This article examines how internal organizational factors and the international community's divided position play important roles in understanding the Druze's decision to maintain a position of neutrality. Journal: Studies in Conflict & Terrorism Pages: 900-911 Issue: 10 Volume: 39 Year: 2016 Month: 10 X-DOI: 10.1080/1057610X.2016.1145957 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1145957 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:10:p:900-911 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1148934_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Devorah Margolin Author-X-Name-First: Devorah Author-X-Name-Last: Margolin Title: A Palestinian Woman's Place in Terrorism: Organized Perpetrators or Individual Actors? Abstract: This article analyzes a novel comprehensive database of attacks by Palestinian women between 1965 and 1995. During this period, women's participation in terrorism evolved and their participation can be divided into two distinct eras, before and after 1986. The article argues that the entrance of religious terrorist organizations into politics and the First Intifada changed Palestinian terrorism. While more attacks by women occurred after 1986, they were mostly low intensity attacks, aimed at military targets, with low success rates. Despite women's participation, the patriarchal structure of society is also reflected in Palestinian terrorist organizations. However, as women's roles in society expanded, so too did their roles within terrorist organizations. Journal: Studies in Conflict & Terrorism Pages: 912-934 Issue: 10 Volume: 39 Year: 2016 Month: 10 X-DOI: 10.1080/1057610X.2016.1148934 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1148934 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:10:p:912-934 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1144918_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bruno S. Sergi Author-X-Name-First: Bruno S. Author-X-Name-Last: Sergi Author-Name: Giacomo Morabito Author-X-Name-First: Giacomo Author-X-Name-Last: Morabito Title: The Pirates' Curse: Economic Impacts of the Maritime Piracy Abstract: During the last decades, the activities of pirates have increased exponentially in Eastern Africa, with their attacks becoming considerably more violent. In addition to the intrastate and interstate conflicts, the lack of state capacity and the presence of terrorist groups, maritime piracy represents a serious and sustained threat to economic security. Indeed, from an economic point of view, pirates affect international trade through an increasing insecurity related to the prompt delivery of the goods transported. The aim of this work is to explore the main works on maritime piracy analyzed in quantitative economics. Journal: Studies in Conflict & Terrorism Pages: 935-952 Issue: 10 Volume: 39 Year: 2016 Month: 10 X-DOI: 10.1080/1057610X.2016.1144918 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1144918 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:10:p:935-952 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1151679_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Celine Marie I. Novenario Author-X-Name-First: Celine Marie I. Author-X-Name-Last: Novenario Title: Differentiating Al Qaeda and the Islamic State Through Strategies Publicized in Jihadist Magazines Abstract: As Al Qaeda and the Islamic State vie for ascendancy in the jihad movement, policymakers grapple with distinguishing the threat posed by these groups. Proceeding from the terrorists’ view of media as a critical arena of jihad, this study applies content analysis to Al Qaeda- and Islamic State-produced magazines in order to empirically differentiate the two groups through the strategies publicized therein. Findings reveal that Al Qaeda consistently employs attrition to compel changes in the West's policy and behavior, while the Islamic State has shifted from intimidating populations to outbidding competing groups to solidify its claim to the Caliphate. Journal: Studies in Conflict & Terrorism Pages: 953-967 Issue: 11 Volume: 39 Year: 2016 Month: 11 X-DOI: 10.1080/1057610X.2016.1151679 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1151679 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:11:p:953-967 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1159430_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Manuel R. Torres-Soriano Author-X-Name-First: Manuel R. Author-X-Name-Last: Torres-Soriano Title: The Caliphate Is Not a Tweet Away: The Social Media Experience of Al Qaeda in the Islamic Maghreb Abstract: This article offers a descriptive analysis of the propaganda activities of Al Qaeda in the Islamic Maghreb on Internet social media. It examines the group's propaganda actions from its creation in 1998 until the end of 2015 and argues that the use of social media, Twitter in particular, has failed to offer any real remedy to its mediocre propaganda actions. During the period in which its Twitter profiles were active, the organization continued to manifest the same problems, including a shortage of qualified human resources and poor internal coordination, which had prevented it from engaging in efficient propaganda activity previously. The study of the social media experience of the group offers further evidence of the vulnerabilities of this Maghrebi jihadist organization. Journal: Studies in Conflict & Terrorism Pages: 968-981 Issue: 11 Volume: 39 Year: 2016 Month: 11 X-DOI: 10.1080/1057610X.2016.1159430 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1159430 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:11:p:968-981 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1154365_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rogelio Alonso Author-X-Name-First: Rogelio Author-X-Name-Last: Alonso Author-Name: Javier DÃaz Bada Author-X-Name-First: Javier DÃaz Author-X-Name-Last: Bada Title: What Role Have Former ETA Terrorists Played in Counterterrorism and Counterradicalization Initiatives in Spain? Abstract: This article responds to the following research question: what role have former Euskadi Ta Askatasuna (ETA) members played in counterterrorism and counterradicalization initiatives vis-à -vis the terror group in Spain? Our analysis of the role played by former ETA members so far demonstrates that only a minority of former ETA terrorists have disengaged from the terrorist organization and at the same time voiced some criticism of their past violent activities. Such a step, although a positive one, is part of a process that in most of the cases analyzed has to be deemed as incomplete due to deficits, some of them very significant, which considerably limit their effectiveness in countering terrorism and radicalization. Journal: Studies in Conflict & Terrorism Pages: 982-1006 Issue: 11 Volume: 39 Year: 2016 Month: 11 X-DOI: 10.1080/1057610X.2016.1154365 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1154365 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:11:p:982-1006 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1154750_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Marco Nilsson Author-X-Name-First: Marco Author-X-Name-Last: Nilsson Title: Mental Strategies for Fighting the IS: A Field Study of the Peshmerga Soldiers in Northern Iraq Abstract: This study analyzes the war against the Islamic State (IS), specifically on the front in northern Iraq, and the mental strategies that the Kurdish Peshmerga soldiers use to maintain their combat motivation. For this field study, dozens of soldiers of various ranks were interviewed and observed on three fronts outside of Mosul, Erbil, and Kirkuk in February 2014. While some mental strategies are nearly universal, others depend on the characteristics of the fighting force and the threat that they face. The article identifies five distinct mental strategies for dealing with the stress of fighting the IS: simultaneous dehumanization and humanization of the enemy, seeing a larger cause, use of humor, religious identity, and martyrdom. The findings suggest that factors beyond primary group cohesion, on which much previous research has focused, can play an important role in increasing soldiers’ fighting power. Journal: Studies in Conflict & Terrorism Pages: 1007-1018 Issue: 11 Volume: 39 Year: 2016 Month: 11 X-DOI: 10.1080/1057610X.2016.1154750 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1154750 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:11:p:1007-1018 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1154364_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Chris Quillen Author-X-Name-First: Chris Author-X-Name-Last: Quillen Title: The Islamic State's Evolving Chemical Arsenal Abstract: This article examines the growing chemical weapon capabilities of the Islamic State from the crude poisons and toxins of its founding father Abu Mus'ab al-Zarqawi to the current battlefield use of indigenously produced mustard gas in Iraq and Syria. By examining this evolution as a phenomenon separate from Al Qaeda, a clearer picture emerges of a dedicated and increasingly successful chemical weapons program that threatens military forces and civilian populations around the world. Journal: Studies in Conflict & Terrorism Pages: 1019-1030 Issue: 11 Volume: 39 Year: 2016 Month: 11 X-DOI: 10.1080/1057610X.2016.1154364 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1154364 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:11:p:1019-1030 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1159070_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sofia Pinero Kluch Author-X-Name-First: Sofia Pinero Author-X-Name-Last: Kluch Author-Name: Alan Vaux Author-X-Name-First: Alan Author-X-Name-Last: Vaux Title: The Non-Random Nature of Terrorism: An Exploration of Where and How Global Trends of Terrorism Have Developed Over 40 Years Abstract: We examined the geographic concentration and persistence of terrorism using the Global Terrorism Database (GTD). The GTD logs all terrorist incidents worldwide using open-source media, and, for 1970–2013, includes over 125,000 incidents from over 200 countries and territories. We examined regional and country-level data; different terrorism forms, severity levels, and timeframes (entire period, five-year periods, and annual); and multiple definitions of “elevated†terrorism. The findings reveal that terrorism is concentrated geographically and temporally. Most countries experience peace or very low levels of terrorism; only a few experience substantial outbreaks; very few experience prolonged terrorism; and even fewer, prolonged severe terrorism. Journal: Studies in Conflict & Terrorism Pages: 1031-1049 Issue: 12 Volume: 39 Year: 2016 Month: 12 X-DOI: 10.1080/1057610X.2016.1159070 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1159070 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:12:p:1031-1049 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1159429_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Henrik GrÃ¥trud Author-X-Name-First: Henrik Author-X-Name-Last: GrÃ¥trud Title: Islamic State Nasheeds As Messaging Tools Abstract: Although jihadi nasheeds play an important role in the Islamic State's propaganda, there is scant literature on the topic. This article is an exploratory study on seventeen Islamic State nasheeds released between December 2013 and March 2015. The main argument is that Islamic State nasheeds are effective messaging tools because they focus on a limited number of themes that have broad appeal among Muslims. The nasheeds differ from other Islamic State propaganda in their almost exclusive focus on war and fighting, rather than on the softer sides of life in the Islamic State. Journal: Studies in Conflict & Terrorism Pages: 1050-1070 Issue: 12 Volume: 39 Year: 2016 Month: 12 X-DOI: 10.1080/1057610X.2016.1159429 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1159429 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:12:p:1050-1070 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1184064_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Moran Yarchi Author-X-Name-First: Moran Author-X-Name-Last: Yarchi Title: Terror Organizations' Uses of Public Diplomacy: Limited versus Total Conflicts Abstract: In the last few decades, terrorism has become a global threat and challenge, which many countries have had to face and fight. Conflicts involving terror organizations are, to a large extent, battles of ideas, and are not focused only on physical violence or military confrontation. This reality creates a need to better understand the tools through which terror organizations promote their messages, and to distinguish between different types of terror organizations. The current study examines different types of terror organizations' messages targeting foreign audiences. The analysis focuses on the organizations' usage of public diplomacy in promoting their messages and distinguishes between the different types of organizations (limited- versus total-conflict). Messages promoted by four terror organizations—Hamas and Hezbollah (limited-conflict organizations) and Al Qaeda and the Islamic State (total-conflict organizations)—are analyzed. The findings reveal that while limited-conflict organizations communicate with the international community, and use public diplomacy to try to change the international environment in which they operate, total-conflict organizations do not use public diplomacy; they talk about the international community rather than communicating with it. Journal: Studies in Conflict & Terrorism Pages: 1071-1083 Issue: 12 Volume: 39 Year: 2016 Month: 12 X-DOI: 10.1080/1057610X.2016.1184064 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1184064 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:12:p:1071-1083 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1159069_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Barbara Zanchetta Author-X-Name-First: Barbara Author-X-Name-Last: Zanchetta Title: Between Cold War Imperatives and State-Sponsored Terrorism: The United States and “Operation Condor†Abstract: Operation Condor was a transnational network of organized state-sponsored terrorism that targeted Communist “subversion.†It was operational in the second half of the 1970s. The key member countries were Chile, Argentina, Uruguay, Bolivia, Paraguay, and Brazil (Peru and Equador joined the network later on, with a more marginal role). Based on declassified documents from the United Nations High Commissioner for Refugees in Geneva and on U.S. documents of various origin, this article will assess the development of the Condor network and the U.S. reaction to such manifest acts of state-sponsored terrorism. Journal: Studies in Conflict & Terrorism Pages: 1084-1102 Issue: 12 Volume: 39 Year: 2016 Month: 12 X-DOI: 10.1080/1057610X.2016.1159069 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1159069 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:12:p:1084-1102 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1216934_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Editorial Board EOV Journal: Studies in Conflict & Terrorism Pages: ebi-ebi Issue: 12 Volume: 39 Year: 2016 Month: 12 X-DOI: 10.1080/1057610X.2016.1216934 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1216934 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:12:p:ebi-ebi Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1100010_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Marco Marsili Author-X-Name-First: Marco Author-X-Name-Last: Marsili Title: The Islamic State: A Clash within the Muslim Civilization for the New Caliphate Abstract: This study analyzes the political reasons that allowed the Islamic State to expand successfully in Syria and Iraq, by enabling to “franchise†worldwide, and the role of the regional governments in this issue. The article provides a different explanation from the classic approach of the “clash of civilizations†theorized by Samuel P. Huntington, ascribing responsibility for the growth and expansion of the Islamic State to the complex framework of geopolitical alliances within the Muslim civilization and the Arab world. The article highlights the attempt by Turkey to establish itself as a regional power and guidance of the Islamic world, by resurrecting the Caliphate, and, based on this, explains the contrast with the Islamic State, whose goal is the foundation of a globalized Caliphate. The plans of the Turkish President ErdoÄŸan for a Great Turkey, allied with Egypt, have foundered with the coup that ousted the Muslim Brotherhood from power. The study relates the connection of Ankara with the Kurds, regarding the management of the crisis in Syria and Iraq, and the Turkish liaison with regional powers (Iran, Egypt, Saudi Arabia, and Israel) and other powers (Russia, China, and the United States). Journal: Studies in Conflict & Terrorism Pages: 85-105 Issue: 2 Volume: 39 Year: 2016 Month: 2 X-DOI: 10.1080/1057610X.2015.1100010 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1100010 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:2:p:85-105 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1092842_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Brecht Volders Author-X-Name-First: Brecht Author-X-Name-Last: Volders Title: Assessing the Terrorist Threat: Impact of the Group's Organizational Design? Abstract: Each terrorist organization faces a critical tradeoff between effectively managing the organization's violent behavior while remaining secure from counterterrorism efforts. Drawing on organization theory and terrorism literature, this article develops theoretical linkages between the organizational design of a terrorist group and this critical tradeoff. It considers the impact of four key design parameters: membership, operational space and time, formalization, and centralization. The first two structural parameters construct the physical anatomy of a terrorist organization. The latter two structuring parameters prescribe or restrict the behavior within this organizational context. Net advantages by means of rising structural design parameter values are increasingly offset by the organizational strength and security vulnerabilities that inherently follow from the rising structuring parameters. Journal: Studies in Conflict & Terrorism Pages: 106-127 Issue: 2 Volume: 39 Year: 2016 Month: 2 X-DOI: 10.1080/1057610X.2015.1092842 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1092842 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:2:p:106-127 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1093889_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mustafa Cosar Unal Author-X-Name-First: Mustafa Cosar Author-X-Name-Last: Unal Title: Opening a Door for Return to Home: Impact and Effectiveness of Turkish Repentance Laws Abstract: This study analyzes the impact of the Turkish Repentance Laws in undermining the Kurdistan Workers Party (PKK). Did the repentance laws increase the PKK surrender, thereby decreasing the PKK violence? Vector Auto-Regression analysis indicates that enactment of repentance laws did not have any significant impact on PKK surrenders, failing to significantly decrease PKK violence. Yet it does not establish any meaningful relationship between the use of force and PKK surrenders. Descriptive analyses show the significant number of surrenders took place in 1993–94, 2001, and 2003, while the highest number of penitents submitted to the “Return to Home Law†in 2003. These values relate to a specific context. This study, however, asserts that surrendered and applicant PKK members were too few to influence the overall conflict, concluding that, in addition to what these laws mean to the penitents, the success/failure of repentance policies are related to the nature of Turkey's counterinsurgency and their respective context. Journal: Studies in Conflict & Terrorism Pages: 128-164 Issue: 2 Volume: 39 Year: 2016 Month: 2 X-DOI: 10.1080/1057610X.2015.1093889 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1093889 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:2:p:128-164 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1084165_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lance Y. Hunter Author-X-Name-First: Lance Y. Author-X-Name-Last: Hunter Title: Terrorism, Civil Liberties, and Political Rights: A Cross-National Analysis Abstract: This article examines the effect terrorism has on civil liberties and political rights across a wide range of democracies and regions. This study includes an analysis of the influence domestic and international terrorist attacks have on civil liberties and political rights in 48 democratic states from 1971–2007. The results from a time series cross-national analysis reveal that terrorism weakens civil liberties and political rights. However, certain types of democracies are more affected by terrorism than others. These findings have important implications for democracy and counterterrorism strategies in democratic states. Journal: Studies in Conflict & Terrorism Pages: 165-193 Issue: 2 Volume: 39 Year: 2016 Month: 2 X-DOI: 10.1080/1057610X.2015.1084165 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1084165 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:2:p:165-193 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1119546_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gabriel Weimann Author-X-Name-First: Gabriel Author-X-Name-Last: Weimann Title: Going Dark: Terrorism on the Dark Web Abstract: The terms Deep Web, Deep Net, Invisible Web, or Dark Web refer to the content on the World Wide Web that is not indexed by standard search engines. One can describe the Internet as composed of layers: the “upper†layer, or the Surface Web, can easily be accessed by regular searches. However, “deeper†layers, the content of the Deep Web, have not been indexed by traditional search engines such as Google. Michael K. Bergman who wrote the seminal paper on the Deep Web, compared searching the Internet to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deeper and therefore missed. In fact, most of the Web's information is buried far down on sites, and standard search engines are unable to access it. Journal: Studies in Conflict & Terrorism Pages: 195-206 Issue: 3 Volume: 39 Year: 2016 Month: 3 X-DOI: 10.1080/1057610X.2015.1119546 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1119546 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:3:p:195-206 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1104025_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ariel I. Ahram Author-X-Name-First: Ariel I. Author-X-Name-Last: Ahram Title: Pro-Government Militias and the Repertoires of Illicit State Violence Abstract: Most studies of pro-government militias (PGMs) take a narrowly functionalist approach. This article sees PGMs as the product of broader processes of state formation and regime dynamics that generate distinctive repertoires of violence. The article uses a cross-national dataset to shows that low state capacity is singularly correlated with the appearance and activity of all forms of PGMs. Once militias are active, they tend to endure even after initial conditions change, suggesting a strong measure of path dependence in how states PGMs evolve. Democracy curbs the activity of semi-official PGMs but not informal ones. Different authoritarian regime sub-types have varying propensities for militia activity. These findings have major implications for efforts to address state frailty. Journal: Studies in Conflict & Terrorism Pages: 207-226 Issue: 3 Volume: 39 Year: 2016 Month: 3 X-DOI: 10.1080/1057610X.2015.1104025 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1104025 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:3:p:207-226 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1099994_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Detzi Author-X-Name-First: Daniel Author-X-Name-Last: Detzi Author-Name: Steven Winkleman Author-X-Name-First: Steven Author-X-Name-Last: Winkleman Title: Hitting Them Where it Hurts: A Joint Interagency Network to Disrupt Terrorist Financing in West Africa Abstract: Illicit trafficking networks in West Africa are a major funding source for violent extremist groups in the region. Although the United States has formed interagency constructs in the Caribbean and in Europe to counter illicit trafficking, there is a gap in West Africa. The corridor of smuggling routes from the shores of West Africa into North Africa provides extremist groups with the financing they need to continue their activities. By forming a third interagency organization in West Africa, the United States and its partners could strike a significant blow to violent extremist groups, which continue to threaten U.S. interests in the region. Journal: Studies in Conflict & Terrorism Pages: 227-239 Issue: 3 Volume: 39 Year: 2016 Month: 3 X-DOI: 10.1080/1057610X.2015.1099994 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1099994 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:3:p:227-239 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1093887_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Victor Asal Author-X-Name-First: Victor Author-X-Name-Last: Asal Author-Name: Kathleen Deloughery Author-X-Name-First: Kathleen Author-X-Name-Last: Deloughery Author-Name: Amanda Murdie Author-X-Name-First: Amanda Author-X-Name-Last: Murdie Title: Responding to Terrorism? Human Rights Organization Shaming and Terrorist Attacks Abstract: Why do Human Rights Organizations (HROs) target or “shame†countries for human rights abuses? The literature using country-level factors to explain why one country is likely to be targeted over another is growing but many questions still remain. Terrorist activity in a country should have a positive effect on the amount of shaming directed at a country. HROs are in the publicity business and have organizational interests to shame states already receiving attention. Findings show that there is a connection between certain types of transnational terrorist incidents occur in a country and the amount of HRO shaming of governments, even after accounting for the human rights practices within the state. Journal: Studies in Conflict & Terrorism Pages: 240-259 Issue: 3 Volume: 39 Year: 2016 Month: 3 X-DOI: 10.1080/1057610X.2015.1093887 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1093887 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:3:p:240-259 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1108086_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Byman Author-X-Name-First: Daniel Author-X-Name-Last: Byman Title: Intelligence and Its Critics Journal: Studies in Conflict & Terrorism Pages: 260-280 Issue: 3 Volume: 39 Year: 2016 Month: 3 X-DOI: 10.1080/1057610X.2015.1108086 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1108086 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:3:p:260-280 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1117325_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Leena Malkki Author-X-Name-First: Leena Author-X-Name-Last: Malkki Author-Name: Teemu Sinkkonen Author-X-Name-First: Teemu Author-X-Name-Last: Sinkkonen Title: Political Resilience to Terrorism in Europe: Introduction to the Special Issue Journal: Studies in Conflict & Terrorism Pages: 281-291 Issue: 4 Volume: 39 Year: 2016 Month: 4 X-DOI: 10.1080/1057610X.2016.1117325 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1117325 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:4:p:281-291 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1117326_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Phil Edwards Author-X-Name-First: Phil Author-X-Name-Last: Edwards Title: Closure through Resilience: The Case of Prevent Abstract: This article argues that systemic resilience in the face of terrorism is best conceptualized as a response to disruption of the political sphere, brought about by the forceful incursion of a would-be political actor. The ideological negotiation required to deal with political disruption is related to the “cycle of contention†model: engagement may take inclusive or exclusive forms, with consequences for the openness and hence the future resilience of the system. When the arguments used to support the British government's “Prevent†counterradicalization initiative are analyzed in these terms, the engagement is shown to be emphatically exclusive. Journal: Studies in Conflict & Terrorism Pages: 292-307 Issue: 4 Volume: 39 Year: 2016 Month: 4 X-DOI: 10.1080/1057610X.2016.1117326 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1117326 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:4:p:292-307 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1117328_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Charlotte Heath-Kelly Author-X-Name-First: Charlotte Author-X-Name-Last: Heath-Kelly Title: Building a New Utøya; Re-Placing the Oslo Bombsite—Counterfactual Resilience at Postterrorist Sites Abstract: Resilience strategies aim to build “resilience†before disasters strike; utilizing preemptive techniques to predict emergencies and prepare systems to manage their consequences. But what can we learn about resilience from responses to disasters that have already happened? This article draws on fieldwork at postterrorist sites in Norway: the Oslo Government Quarter and Utøya island. While resilience policy develops plans for infrastructural recovery after the next disaster, the curators of postterrorist sites rebuild and reclaim existing disaster space. They apply a retrospective framing of recovery. The article explores this work and questions its absence from policy understandings of resilience. Journal: Studies in Conflict & Terrorism Pages: 308-325 Issue: 4 Volume: 39 Year: 2016 Month: 4 X-DOI: 10.1080/1057610X.2016.1117328 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1117328 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:4:p:308-325 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1117330_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Teemu Sinkkonen Author-X-Name-First: Teemu Author-X-Name-Last: Sinkkonen Title: Can Political Leaders Make a Difference? Norwegian versus Spanish Experiences in Responding to Terrorist Attacks Abstract: This article compares the public communication of Norwegian Prime Minister Stoltenberg after the attacks of 22 July 2011 and Spanish Prime Minister Aznar after the Madrid train bombing on 11 March 2004. These two political leaders opted for very different styles of crisis communication in the direct aftermath of the attacks. There is also a great difference in how the attacks influenced their political support. By focusing on these two cases, the article asks whether political leaders can make a difference when it comes to the public response to terrorist attacks. Journal: Studies in Conflict & Terrorism Pages: 326-341 Issue: 4 Volume: 39 Year: 2016 Month: 4 X-DOI: 10.1080/1057610X.2016.1117330 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1117330 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:4:p:326-341 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1117332_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Leena Malkki Author-X-Name-First: Leena Author-X-Name-Last: Malkki Title: International Pressure to Perform: Counterterrorism Policy Development in Finland Abstract: The major terrorist attacks in Western countries during the last fifteen years have had consequences way beyond the countries in which they have happened. The article provides a primary source–based account of the development of counterterrorism policy in Finland, which is one of those countries with a low national threat level. The article demonstrates the significant role that international pressure, through obligations, recommendations, and social learning, plays in developing national counterterrorist policies. The article calls also into question whether the pressure to comply with international pressure always contributes toward sound national counterterrorism policies that foster political resilience to terrorism. Journal: Studies in Conflict & Terrorism Pages: 342-362 Issue: 4 Volume: 39 Year: 2016 Month: 4 X-DOI: 10.1080/1057610X.2016.1117332 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1117332 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:4:p:342-362 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1117334_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Javier Argomaniz Author-X-Name-First: Javier Author-X-Name-Last: Argomaniz Author-Name: Peter Lehr Author-X-Name-First: Peter Author-X-Name-Last: Lehr Title: Political Resilience and EU Responses to Aviation Terrorism Abstract: In this article, we examine how European authorities have responded to reported threats to aviation resulting from individual terrorist tactics. We do so by applying the notion of political resilience and drawing on Palonen's “policy, polity, politicking, and politicization†model as well as on Malcolm Anderson's concept of “politics of the latest outrage.†We argue that the European Union response to aviation terrorism has created polity transformation and generated a long list of new policies but has also in the process become politicized and subject of politicking, with some high-profile measures being criticized for having a deleterious impact on passengers' rights. Journal: Studies in Conflict & Terrorism Pages: 363-379 Issue: 4 Volume: 39 Year: 2016 Month: 4 X-DOI: 10.1080/1057610X.2016.1117334 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1117334 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:4:p:363-379 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1116277_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kurt Braddock Author-X-Name-First: Kurt Author-X-Name-Last: Braddock Author-Name: John Horgan Author-X-Name-First: John Author-X-Name-Last: Horgan Title: Towards a Guide for Constructing and Disseminating Counternarratives to Reduce Support for Terrorism Abstract: Despite widespread recognition that the use of counternarratives is an important strategic component of countering violent extremism, to date, there are no comprehensive guidelines on how to develop and distribute counternarratives to effectively reduce support for terrorism. To redress this, we offer communication and psychology theory-based procedures for (1) analyzing terrorist narratives, (2) constructing counternarratives that challenge terrorist narratives, and (3) disseminating the counternarratives to overcome barriers to persuasion. Analysts and practitioners can use such guidelines in developing counternarratives to reduce support for violent extremism. Journal: Studies in Conflict & Terrorism Pages: 381-404 Issue: 5 Volume: 39 Year: 2016 Month: 5 X-DOI: 10.1080/1057610X.2015.1116277 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1116277 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:5:p:381-404 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1106762_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Marcus Schulzke Author-X-Name-First: Marcus Author-X-Name-Last: Schulzke Title: The Antinomies of Population-Centric Warfare: Cultural Respect and the Treatment of Women and Children in U.S. Counterinsurgency Operations Abstract: There is tension between three of the U.S. counterinsurgency doctrine's central goals: the restoration of security, democratization, and cultural respect. These goals are particularly difficult to reconcile when it comes to the treatment of women and children in contested areas. Those groups have unique security concerns that are margin-alized in the U.S. military's conceptions of security and they may be victims of violence that is tacitly permitted by efforts to show cultural respect. After discussing these problems as they appear in U.S. counterinsurgency doctrine the author shows how they shape events in real operations with the help of interviews conducted with veterans of the wars in Afghanistan and Iraq. Journal: Studies in Conflict & Terrorism Pages: 405-422 Issue: 5 Volume: 39 Year: 2016 Month: 5 X-DOI: 10.1080/1057610X.2015.1106762 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1106762 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:5:p:405-422 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1099996_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Eran Zohar Author-X-Name-First: Eran Author-X-Name-Last: Zohar Title: A New Typology of Contemporary Armed Non-State-Actors: Interpreting The Diversity Abstract: This study analyzes contemporary non-state-actors (NSAs) finding four major categories: secessionist organizations fighting for a federal regime or full independence. These have a homogenous character and are domestically oriented. Secessionist NSAs that enjoy strong sponsorship are running a state within a state, possessing regular forces. Second, radical left revolutionary NSAs are fighting to overthrow the existing social order and to relocate power within a country. Arming with limited weaponry that they steal and purchase, they wage guerrilla war from dense jungles and rough mountains. Sectarian-based revolutionary NSAs seek regime change to stop state marginalization. They could evolve into a regular force, armed with heavy weapons. The fourth category and the most powerful is the global revolutionary organizations. They are religious based, seeking to impose Islamic rule in their own countries or worldwide through jihad. They are transnational, specializing in suicide bombing and sophisticated martyrdom assaults. Journal: Studies in Conflict & Terrorism Pages: 423-450 Issue: 5 Volume: 39 Year: 2016 Month: 5 X-DOI: 10.1080/1057610X.2015.1099996 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1099996 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:5:p:423-450 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1108087_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Dimitrios Anagnostakis Author-X-Name-First: Dimitrios Author-X-Name-Last: Anagnostakis Title: Securing the Transatlantic Maritime Supply Chains from Counterterrorism: EU–U.S. Cooperation and the Emergence of a Transatlantic Customs Security Regime Abstract: This article offers an analysis of the cooperation between the European Union (EU) and the United States on customs security in the context of the two actors' fight against terrorism. While other aspects of EU–U.S. counterterrorism cooperation have received some scholarly attention, not so much research has focused on security cooperation in the EU–U.S. customs and supply chain. To investigate the emergence of transatlantic cooperation in this field this article employs regime theory in examining the 2004 EU–U.S. customs security agreement, the 2012 EU–U.S. mutual recognition decision, and the transatlantic disagreement on the U.S. 100 percent scanning rule. Journal: Studies in Conflict & Terrorism Pages: 451-471 Issue: 5 Volume: 39 Year: 2016 Month: 5 X-DOI: 10.1080/1057610X.2015.1108087 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1108087 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:5:p:451-471 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1144946_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael Becker Author-X-Name-First: Michael Author-X-Name-Last: Becker Title: A Response to “Key Issues and Research Agendas in Lone Wolf Terrorism†Journal: Studies in Conflict & Terrorism Pages: 472-476 Issue: 5 Volume: 39 Year: 2016 Month: 5 X-DOI: 10.1080/1057610X.2016.1144946 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1144946 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:5:p:472-476 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1116269_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael J. Suttmoeller Author-X-Name-First: Michael J. Author-X-Name-Last: Suttmoeller Author-Name: Steven M. Chermak Author-X-Name-First: Steven M. Author-X-Name-Last: Chermak Author-Name: Joshua D. Freilich Author-X-Name-First: Joshua D. Author-X-Name-Last: Freilich Title: Only the Bad Die Young: The Correlates of Organizational Death for Far-Right Extremist Groups Abstract: The domestic far-right movement has existed in the United States for many years. During that time, groups have appeared, disappeared, and reappeared. Unfortunately, very little is known about what causes these groups to disband. Prior research has focused on long-lived groups, but the majority of extremist or terrorist groups fail to survive for an extended period of time. This study examined a variety of external and internal correlates of organizational death identified from both terrorism and organizational literature, to empirically test which correlates lead to a group dying young. Journal: Studies in Conflict & Terrorism Pages: 477-499 Issue: 6 Volume: 39 Year: 2016 Month: 6 X-DOI: 10.1080/1057610X.2015.1116269 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1116269 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:6:p:477-499 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1127111_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sivan Hirsch-Hoefler Author-X-Name-First: Sivan Author-X-Name-Last: Hirsch-Hoefler Author-Name: Daphna Canetti Author-X-Name-First: Daphna Author-X-Name-Last: Canetti Author-Name: Ehud Eiran Author-X-Name-First: Ehud Author-X-Name-Last: Eiran Title: Radicalizing Religion? Religious Identity and Settlers' Behavior Abstract: Does religious identity prompt radical action? This article presents a model of individual-level radical action. Drawing mostly on collective action theory the article posits that organizational membership drives the effect of religious identity on individual-level radical action. Using survey data the article assesses the behavior of Jewish settlers in the West Bank in the face of the 2005 Gaza withdrawal. The article finds that contra the prevailing view, which holds that religious identity alone is sufficient to trigger violence, evidence suggests that organizational membership is a mechanism bridging religious identity and radical action. Longstanding arguments tying radical actions solely to religion may require substantial revision. Journal: Studies in Conflict & Terrorism Pages: 500-518 Issue: 6 Volume: 39 Year: 2016 Month: 6 X-DOI: 10.1080/1057610X.2015.1127111 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1127111 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:6:p:500-518 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1116274_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Annette Ranko Author-X-Name-First: Annette Author-X-Name-Last: Ranko Author-Name: Justyna Nedza Author-X-Name-First: Justyna Author-X-Name-Last: Nedza Title: Crossing the Ideological Divide? Egypt's Salafists and the Muslim Brotherhood after the Arab Spring Abstract: An important strand in the literature has stressed the analytical distinction between the Muslim Brotherhood's brand of Islamism and the Salafist movement. This article examines the shifts that have occurred within these two movements in Egypt since the Arab Spring. It specifically asks whether approximations between them in terms of strategies of actions have been paralleled by ideological approximations. The article argues that both movements have seen increased diversification which has—especially at the fringes—involved a reshaping of identities and ideological approximations that may facilitate cooperation between segments of these movements in the future. Journal: Studies in Conflict & Terrorism Pages: 519-541 Issue: 6 Volume: 39 Year: 2016 Month: 6 X-DOI: 10.1080/1057610X.2015.1116274 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1116274 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:6:p:519-541 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1124628_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael Jonsson Author-X-Name-First: Michael Author-X-Name-Last: Jonsson Author-Name: Elliot Brennan Author-X-Name-First: Elliot Author-X-Name-Last: Brennan Author-Name: Christopher O'Hara Author-X-Name-First: Christopher Author-X-Name-Last: O'Hara Title: Financing War or Facilitating Peace? The Impact of Rebel Drug Trafficking on Peace Negotiations in Colombia and Myanmar Abstract: Rebel involvement in drug trafficking is broadly found to prolong and intensify civil wars. Being an illicit good with strong demand, high profit margins, limited barriers to entry, and few interdiction opportunities, narcotic drugs disproportionately benefit rebel groups as a source of funding in civil wars. Furthermore, drug trafficking is believed to prolong civil wars by creating war economies that benefit rebel groups, making them reluctant to engage in peace negotiations. However, recent peace agreements suggest that drug trafficking can in some cases be used to “buy off†rebel leaders, whereas other insurgents willingly relinquish this source of funding. This article compares attempts at conflict resolution in Colombia and Myanmar, focusing on the impact drug trafficking by Fuerzas Armadas Revolucionarias de Colombia (Revolutionary Armed Forces of Colombia) and United Wa State Army has on contemporary peace negotiations. Journal: Studies in Conflict & Terrorism Pages: 542-559 Issue: 6 Volume: 39 Year: 2016 Month: 6 X-DOI: 10.1080/1057610X.2015.1124628 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1124628 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:6:p:542-559 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1120099_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Emily Corner Author-X-Name-First: Emily Author-X-Name-Last: Corner Author-Name: Paul Gill Author-X-Name-First: Paul Author-X-Name-Last: Gill Author-Name: Oliver Mason Author-X-Name-First: Oliver Author-X-Name-Last: Mason Title: Mental Health Disorders and the Terrorist: A Research Note Probing Selection Effects and Disorder Prevalence Abstract: Recent research on lone-actor terrorism has found a high prevalence of mental health disorders among these offenders. This research note addresses two shortcomings in these existing studies. First, it investigates whether selection effects are present in the selection process of terrorist recruits. Second, it builds on the argument that mental health problems and terrorist behavior should not be treated as a yes/no dichotomy. Descriptive results of mental health disorders are outlined utilizing a number of unique datasets. Journal: Studies in Conflict & Terrorism Pages: 560-568 Issue: 6 Volume: 39 Year: 2016 Month: 6 X-DOI: 10.1080/1057610X.2015.1120099 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1120099 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:6:p:560-568 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1140998_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joshua D. Freilich Author-X-Name-First: Joshua D. Author-X-Name-Last: Freilich Author-Name: Gary LaFree Author-X-Name-First: Gary Author-X-Name-Last: LaFree Title: Measurement Issues in the Study of Terrorism: Introducing the Special Issue Abstract: In this article, we introduce readers to a special issue of Studies in Conflict & Terrorism on measurement issues in the study of terrorism. In recent years scholarly interest in terrorism has increased and systematic methods are now more commonly used. Terrorism works that analyze data highlight substantive findings as opposed to measurement issues. A study's substantive findings are only meaningful though if it correctly addresses the measurement issues that invariably arise during the research process. In addition to summarizing the eight articles in this special issue, we outline the strengths and weaknesses of various measurement strategies and assess their contributions to our understanding of terrorism. The major goal is to place the special issue's contributions in context and highlight under-explored issues that future research could address. Journal: Studies in Conflict & Terrorism Pages: 569-579 Issue: 7-8 Volume: 39 Year: 2016 Month: 7 X-DOI: 10.1080/1057610X.2016.1140998 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1140998 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:569-579 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1142241_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jasper L. De Bie Author-X-Name-First: Jasper L. Author-X-Name-Last: De Bie Author-Name: Christianne J. De Poot Author-X-Name-First: Christianne J. Author-X-Name-Last: De Poot Title: Studying Police Files with Grounded Theory Methods to Understand Jihadist Networks Abstract: This article focuses on a challenge in the current terrorism literature, namely the methodological justification concerning the collection and analysis of empirical data. Lack of detailed methodological accounts of the collection and analysis of the data makes it difficult to evaluate presented findings, especially if these data are confidential or focused on specific aspects of the phenomenon. This article offers an extensive overview of the methodological procedures conducted in a large empirical research project on jihadist networks based on confidential police files (2000–2013), interviews, and trial observations. The article illustrates how grounded theory–based methods can be used to collect and analyze such data and to develop and test new theories in this research field. Journal: Studies in Conflict & Terrorism Pages: 580-601 Issue: 7-8 Volume: 39 Year: 2016 Month: 7 X-DOI: 10.1080/1057610X.2016.1142241 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1142241 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:580-601 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1141009_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel J. Harris Author-X-Name-First: Daniel J. Author-X-Name-Last: Harris Author-Name: Pete Simi Author-X-Name-First: Pete Author-X-Name-Last: Simi Author-Name: Gina Ligon Author-X-Name-First: Gina Author-X-Name-Last: Ligon Title: Reporting Practices of Journal Articles that Include Interviews with Extremists Abstract: The number of journal articles that rely on data derived from interviews with extremists has increased substantially over the past decade. This burgeoning invites the possibility that standardized reporting practices have not been explicitly clarified. To date, there has not been an adequate review of the methodological transparency of journal articles that include interviews with extremists. After content analyzing 48 articles involving such interviews, we found that field-wide methodological transparency is lacking. Recommendations are made with regard to enhancing methodological transparency, with the implication that consensus on optimal reporting practices within the extremism literature should be reached soon. Journal: Studies in Conflict & Terrorism Pages: 602-616 Issue: 7-8 Volume: 39 Year: 2016 Month: 7 X-DOI: 10.1080/1057610X.2016.1141009 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141009 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:602-616 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1141000_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gary A. Ackerman Author-X-Name-First: Gary A. Author-X-Name-Last: Ackerman Author-Name: Lauren E. Pinson Author-X-Name-First: Lauren E. Author-X-Name-Last: Pinson Title: Speaking Truth to Sources: Introducing a Method for the Quantitative Evaluation of Open Sources in Event Data Abstract: Open-source event data sets frequently used for social science analysis rarely provide any transparent explanation of the credibility of sources or the validity of data thereby obtained. We develop a sample Source Evaluation Schema for the purpose of operationalizing measures of open-source event validity at the case, source, and variable levels. Based on our findings, we argue that explicitly incorporating and disclosing credibility and validity levels allows for greater flexibility in tailoring the inclusion of cases for researchers' specific analytical requirements. By facilitating more transparent analyses, the inclusion of such measures in similar datasets can result in more defensible conclusions, especially in highly charged political and security contexts such as those surrounding terrorism. Journal: Studies in Conflict & Terrorism Pages: 617-640 Issue: 7-8 Volume: 39 Year: 2016 Month: 7 X-DOI: 10.1080/1057610X.2016.1141000 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141000 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:617-640 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1141004_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Brandon Behlendorf Author-X-Name-First: Brandon Author-X-Name-Last: Behlendorf Author-Name: Jyoti Belur Author-X-Name-First: Jyoti Author-X-Name-Last: Belur Author-Name: Sumit Kumar Author-X-Name-First: Sumit Author-X-Name-Last: Kumar Title: Peering through the Kaleidoscope: Variation and Validity in Data Collection on Terrorist Attacks Abstract: The nature of underreporting terrorism in developing countries is often acknowledged but poorly understood. Focusing on India, we triangulate terrorist attacks captured across three media-based datasets (Global Terrorism Database, South Asia Terrorism Portal, Worldwide Incident Terrorism System) against official police records from Andhra Pradesh. Results suggest that media-based datasets capture the geographic prevalence of terrorism yet severely underestimate the frequency of violence, biasing toward lethal bombings. Considerable variation is present for attacks targeting specific classes or types of actors. Similar to other crimes, the results suggest that existing terrorism databases represent a select version of violence in these countries, discounting the prevalence and regularity of non-lethal violent activity. Journal: Studies in Conflict & Terrorism Pages: 641-667 Issue: 7-8 Volume: 39 Year: 2016 Month: 7 X-DOI: 10.1080/1057610X.2016.1141004 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141004 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:641-667 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1141019_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: William S. Parkin Author-X-Name-First: William S. Author-X-Name-Last: Parkin Author-Name: David A. Green Author-X-Name-First: David A. Author-X-Name-Last: Green Title: Terrorism in the News: The Efficiency and Impact of Sampling Methods on Data Collection and Content Analysis Abstract: This study identifies the most efficient methodology for sampling from a population of New York Times articles related to terrorism, which were generated through keyword searching. Efficiency was based on which sample statistic was closest to the population parameters of interest. The smallest sample size, where 68 percent of the sample statistics were within one standard deviation of the population mean and 95 percent of the sample statistics were within two standard deviations of the population mean, were identified as the most efficient. In addition, we determine whether the frequency of news articles is correlated to the temporal distribution of terrorist incidents found in the Global Terrorism Database, which could possibly be utilized to more efficiently sample from the population. Our findings confirm prior research that shows that sampling efficiency is related to the weekly news cycle and, contrary to prior research, the sample must include between 20 to 29 constructed weeks to achieve representativeness of an entire year of coverage for a population generated through keyword searches. In addition, the study also found that there was a limited relationship between the frequency of terrorist incidents and the amount of terrorism coverage in the news. Journal: Studies in Conflict & Terrorism Pages: 668-686 Issue: 7-8 Volume: 39 Year: 2016 Month: 7 X-DOI: 10.1080/1057610X.2016.1141019 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141019 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:668-686 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1141012_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ashmini G. Kerodal Author-X-Name-First: Ashmini G. Author-X-Name-Last: Kerodal Author-Name: Joshua D. Freilich Author-X-Name-First: Joshua D. Author-X-Name-Last: Freilich Author-Name: Steven M. Chermak Author-X-Name-First: Steven M. Author-X-Name-Last: Chermak Title: Commitment to Extremist Ideology: Using Factor Analysis to Move beyond Binary Measures of Extremism Abstract: This study article focuses on American far-right (FR) extremists who committed ideologically motivated violent or financial crimes in the United States. We examine three research questions. First, are certain types of FR ideological beliefs associated with different types of criminal behavior? Second, can the various indicators of FR ideology be used to create a scalar measure of commitment to FR ideology? Third, which typology of the FR movement provides the most reliable measure of FR extremism? We use data from the United States Extremist Crime Database to measure indicators of FR ideology in a sample of 305 FRs who committed a financial crime or homicide between 2006 and 2010 in the United States. Conspiratorial, antigovernment, and antitax beliefs were positively associated with risk of financial crimes, while xenophobic, survivalist, and anti–gun control beliefs were positively associated with risk of violent crimes. A factor analysis created a commitment to FR ideology scale and identified four sub-types of FRs: Conspiracy Theorist, Survivalist, Movement Participant, and Proud far-rightist. The factor analysis did not support the prevailing typologies. Importantly though, these typologies were useful in predicting criminal behavior patterns of far rightists. We outline a number of other measurement issues for future research to address. Journal: Studies in Conflict & Terrorism Pages: 687-711 Issue: 7-8 Volume: 39 Year: 2016 Month: 7 X-DOI: 10.1080/1057610X.2016.1141012 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141012 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:687-711 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1141003_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Katharine A. Boyd Author-X-Name-First: Katharine A. Author-X-Name-Last: Boyd Title: Modeling Terrorist Attacks: Assessing Statistical Models to Evaluate Domestic and Ideologically International Attacks Abstract: Many prior studies have analyzed how country characteristics affect the rate of terrorist violence and there is a growing literature on how group traits influence terrorist violence. The current study expands on this literature by using multilevel modeling to assess both these units of analysis on the rate of domestic attacks and the rate of attacks against foreign targets. Using data from the Big Allied and Dangerous and the Global Terrorism Database, a cross-national sample of 224 terrorist groups are modeled in relation to their countries of origin to assess rates of domestic attacks. In this cross-sectional study many of these terrorist groups target multiple foreign countries. Multiple membership random effects modeling (MMREM) is used to assess the impact of multiple countries targeted by a group. The results of the study indicate that multilevel modeling provides an improved statistical fit and the MMREM model provides an improved measurement for analyzing attacks targeting foreign countries. Journal: Studies in Conflict & Terrorism Pages: 712-748 Issue: 7-8 Volume: 39 Year: 2016 Month: 7 X-DOI: 10.1080/1057610X.2016.1141003 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141003 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:712-748 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1141005_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Shuki J. Cohen Author-X-Name-First: Shuki J. Author-X-Name-Last: Cohen Title: Mapping the Minds of Suicide Bombers using Linguistic Methods: The Corpus of Palestinian Suicide Bombers' Farewell Letters (CoPSBFL) Abstract: This study proposes a novel methodology for the study of the mindset, motives, and cognitive style of individual suicide bombers in Israel/Palestine, based on a comprehensive corpus of personal farewell letters (which also serve as last wills) that were written by suicide bombers to their family during the Second Intifada (2000–2006). To avoid privileging certain a priori sentiments, motivations, or concepts over others, I used a programmatic “bottom-up†sequence of quantitative psycholinguistic procedures, in which prominent themes or concepts from one level of analysis are further qualified and contextualized in the next. This afforded a minimally biased view of the cognitive content of Palestinian suicide bombers, including the sentiments, motivations, and concepts that they were more preoccupied with, and the context in which these ideas were expressed. The results are largely consistent with theories of political violence that place pro-social sentiments at the forefront of the motivations for suicide terrorism, and paramount to antisocial sentiments such as hatred and revenge. Since the linguistic patterns that were uncovered in this analysis cannot be controlled consciously, and the farewell letters of suicide bombers have rarely been rigorously analyzed linguistically, this study may provide an unprecedented glimpse into the cognitive style and content of individual suicide bombers—a glimpse that is minimally biased by political, partisan, or sectarian preconceptions. Journal: Studies in Conflict & Terrorism Pages: 749-780 Issue: 7-8 Volume: 39 Year: 2016 Month: 7 X-DOI: 10.1080/1057610X.2016.1141005 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1141005 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:7-8:p:749-780 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1119544_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Emrullah Uslu Author-X-Name-First: Emrullah Author-X-Name-Last: Uslu Title: Jihadist Highway to Jihadist Haven: Turkey's Jihadi Policies and Western Security Abstract: Turkish support to jihadists is not merely a tactic aimed at removing Assad from power. It stems from a strategic decision on the part of Turkish authorities to influence Middle East affairs through non-state actors, much as Iran has been doing for some time. Turkey's support of jihadists transiting into Syria and its establishment of close ties with Hamas and the Muslim Brotherhood are joint aspects of this strategy. Turkish authorities have permitted Al Qaeda sympathizers to use pro-government media to promote their beliefs. The authorities have adopted a new political language that fuels anti-American and anti-Western sentiments. Prosecutors who have attempted to prevent shipments of weapons to Al Qaeda–affiliated groups in Syria have been fired and in some cases incarcerated. Indeed, by now Turkish prosecutors and the Turkish National Police are thoroughly intimidated. Not a single counterterror operation has been launched to disrupt Islamic State of Iraq and Syria (ISIS)’s networks or recruitment activities. The Turkish National Intelligence Organization has been given full responsibility to deal with jihadist activities, without any active oversight, and the police are loath to venture into their territory. As a member of the North Atlantic Treaty Organization, Turkey's jihadi policies have direct and indirect impact on Western security. This article examines Turkey's jihadi policies by examining official statements, media reports, interviews, and fieldwork. Journal: Studies in Conflict & Terrorism Pages: 781-802 Issue: 9 Volume: 39 Year: 2016 Month: 9 X-DOI: 10.1080/1057610X.2015.1119544 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1119544 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:9:p:781-802 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1131030_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kyle T. Kattelman Author-X-Name-First: Kyle T. Author-X-Name-Last: Kattelman Title: Party Structure, Information, and Coalition Durability: The Relevance of NATO in the Global War on Terror Abstract: Using the test cases of Afghanistan and Iraq, this study illustrates how alliances work to mitigate the conflicting frames that party structure and media access provide in the Global War on Terror, which leads to more cohesiveness in the North Atlantic Treaty Organization (NATO)–led coalition in Afghanistan as opposed to the U.S.-led coalition in Iraq. The approach utilized here extends the theory on alliance capability and uncertainty by arguing that alliances reduce uncertainty among member states on a strategic objective. This is particularly relevant when examining asymmetric, limited conflicts, where party structures and media access can work to disseminate conflicting frames to a domestic populace, who then can pressure their leader to withdraw from a coalition. The implications of these findings lend support to the continued relevance of NATO in the twenty-first-century security arena. Journal: Studies in Conflict & Terrorism Pages: 803-818 Issue: 9 Volume: 39 Year: 2016 Month: 9 X-DOI: 10.1080/1057610X.2015.1131030 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1131030 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:9:p:803-818 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1139375_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Barbara Perry Author-X-Name-First: Barbara Author-X-Name-Last: Perry Author-Name: Ryan Scrivens Author-X-Name-First: Ryan Author-X-Name-Last: Scrivens Title: Uneasy Alliances: A Look at the Right-Wing Extremist Movement in Canada Abstract: Despite the Canadian Security Intelligence Service's recent concern with the growing threat from right-wing extremists nationwide, we have little contemporary scholarship on the far right movement in Canada and fewer attempts to systematically analyze their ideologies and activities. Drawing on a three-year study involving interviews with Canadian law enforcement officials, community organizations, and right-wing activists, as well as analyses of open source intelligence, this article examines the endogenous factors that facilitate and inhibit the right-wing extremist movement in Canada. Findings suggest that strengths and weaknesses of the groups themselves can be exploited as a means of debilitating them. Journal: Studies in Conflict & Terrorism Pages: 819-841 Issue: 9 Volume: 39 Year: 2016 Month: 9 X-DOI: 10.1080/1057610X.2016.1139375 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1139375 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:9:p:819-841 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1144917_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gordon Clubb Author-X-Name-First: Gordon Author-X-Name-Last: Clubb Title: The Role of Former Combatants in Preventing Youth Involvement in Terrorism in Northern Ireland: A Framework for Assessing Former Islamic State Combatants Abstract: The article engages with emerging debates on the potential role returning Islamic State fighters may have in preventing violence and whether nonviolent radical ideology acts as a conveyor-belt or firewall to violence. Rather than focusing on former combatant ideologies, it demonstrates how framing processes—not ideology per se—are more salient indicators of whether former combatants will act as conveyor-belts or firewalls to violence. The analytical framework developed for analyzing framing processes is then applied to the case of Northern Ireland. It argues that ideology shapes and constrains the type of antiviolence framing that may emerge, which provides a middle ground between the two perspectives in the literature. Furthermore, the article highlights the importance of network structures, incentives, and opportunities insofar as these can shape antiviolence framing and improve resonance among audiences. While recognizing the differences between cases, the framework is then used to argue that former Islamic State combatants can play a preventative role depending on whether their antiviolence framing is based on durable structural conditions, de-glamorizes violence, and is supported by networks that incentivize its diffusion—not on whether they have denounced their ideology. Journal: Studies in Conflict & Terrorism Pages: 842-861 Issue: 9 Volume: 39 Year: 2016 Month: 9 X-DOI: 10.1080/1057610X.2016.1144917 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1144917 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:9:p:842-861 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1129820_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: George Kassimeris Author-X-Name-First: George Author-X-Name-Last: Kassimeris Title: Greece's Terrorism Problem: A Reassessment Abstract: The collapse of Greece's premier terrorist organization, the 17 November (17N) group, back in the summer of 2002 was a truly dramatic event, considering 17N's 27-year career, but it was not such a watershed event in the country's history as it was presented at the time by the mainstream political and media establishments. 17N's dismantling and imprisonment, far from demoralizing and emasculating the armed struggle movement, led to the emergence of new urban guerrilla groups and the increase and intensification of revolutionary violence. This article reassesses Greece's persistent terrorism problem by focusing on the nature, threat, and operational evolution of a new generation of political militancy. Journal: Studies in Conflict & Terrorism Pages: 862-870 Issue: 9 Volume: 39 Year: 2016 Month: 9 X-DOI: 10.1080/1057610X.2015.1129820 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1129820 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:39:y:2016:i:9:p:862-870 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1157402_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anne Aly Author-X-Name-First: Anne Author-X-Name-Last: Aly Author-Name: Stuart Macdonald Author-X-Name-First: Stuart Author-X-Name-Last: Macdonald Author-Name: Lee Jarvis Author-X-Name-First: Lee Author-X-Name-Last: Jarvis Author-Name: Thomas M. Chen Author-X-Name-First: Thomas M. Author-X-Name-Last: Chen Title: Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization Abstract: The Internet is a transformative technology that terrorists are exploiting for the spread of propaganda and radicalizing new recruits. While Al Qaeda has a longer history, Islamic State is conducting a modern and sophisticated media campaign centered around online social networking. This article introduces and contextualizes the contributions to this Special Issue by examining some of the ways in which terrorists make use of the Internet as part of their broader media strategies. Journal: Studies in Conflict & Terrorism Pages: 1-9 Issue: 1 Volume: 40 Year: 2017 Month: 1 X-DOI: 10.1080/1057610X.2016.1157402 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1157402 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:1:p:1-9 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1157403_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Martin Rudner Author-X-Name-First: Martin Author-X-Name-Last: Rudner Title: “Electronic Jihadâ€: The Internet as Al Qaeda's Catalyst for Global Terror Abstract: The Internet has emerged as a key technology for Al Qaeda and other jihadist movements waging their so-called electronic jihad across the Middle East and globally, with digital multiplier effects. This study will examine the evolving doctrine of “electronic jihad†and its impact on the radicalization of Muslims in Western diaspora communities The study describes Internet-based websites that served as online libraries and repositories for jihadist literature, as platforms for extremist preachers and as forums for radical discourse. Furthermore, the study will then detail how Internet connectivity has come to play a more direct operational role for jihadi terrorist-related purposes, most notably for inciting prospective cadres to action; for recruiting jihadist operatives and fighters; for providing virtual training in tactical methods and manufacture of explosives; for terrorism financing; and for actual planning and preparations for specific terror attacks. Whereas contemporary jihadist militants may be shifting from the World Wide Web to social media, such as Facebook, YouTube, and Twitter for messaging and communications, nevertheless the Internet-based electronic jihad remains a significant catalyst for promoting jihadist activism and for facilitating terrorist operations. Journal: Studies in Conflict & Terrorism Pages: 10-23 Issue: 1 Volume: 40 Year: 2017 Month: 1 X-DOI: 10.1080/1057610X.2016.1157403 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1157403 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:1:p:10-23 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1157404_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David Mair Author-X-Name-First: David Author-X-Name-Last: Mair Title: #Westgate: A Case Study: How al-Shabaab used Twitter during an Ongoing Attack Abstract: During the Westgate terrorist attack of 2013, al-Shabaab used Twitter to claim responsibility for and live tweet throughout the attack. This article analyzes 556 of these tweets to understand the motivations for using Twitter during ongoing terrorist operations and builds up a picture of how al-Shabaab interacted with Twitter throughout the Westgate attack. Conclusions arising from the analysis include that al-Shabaab were primarily concerned with controlling the narrative of the attack and retaining an audience. In addition, the tweets were aimed at a specific geographical audience, indicating that the Westgate attack was primarily motivated by territorial concerns. Journal: Studies in Conflict & Terrorism Pages: 24-43 Issue: 1 Volume: 40 Year: 2017 Month: 1 X-DOI: 10.1080/1057610X.2016.1157404 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1157404 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:1:p:24-43 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1157406_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Angela Gendron Author-X-Name-First: Angela Author-X-Name-Last: Gendron Title: The Call to Jihad: Charismatic Preachers and the Internet Abstract: A range of psychological, social, and environmental factors render some individuals more susceptible to militant Islam than others. Research also suggests that there are certain “triggers,†which help to explain why it is that only some individuals exposed to the same societal structural influences turn to violence. This article seeks to contribute to future empirical research in this area by studying the significance of certain “charismatic†preachers in this process and examining the role the Internet plays in strengthening the charismatic bond. Difficulties in defining and measuring “charisma†may help in part to explain the paucity of research on this aspect of radicalization but since charismatic authority derives from the bond between preacher and follower, an examination of the activities, strategies, and techniques used to build relationships and win adherents to Salafi-jihadism may provide valuable insights for countering radicalization. Journal: Studies in Conflict & Terrorism Pages: 44-61 Issue: 1 Volume: 40 Year: 2017 Month: 1 X-DOI: 10.1080/1057610X.2016.1157406 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1157406 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:1:p:44-61 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1157407_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anne Aly Author-X-Name-First: Anne Author-X-Name-Last: Aly Title: Brothers, Believers, Brave Mujahideen: Focusing Attention on the Audience of Violent Jihadist Preachers Abstract: The exponential growth in the use of the Internet and social media by terrorist actors and violent extremists has generated research interest into terrorism and the Internet. Much of this research is focused on the kinds of messages being spread via the various media platforms that host violent extremist content. This research has yielded significant insights into how organizations such as Al Qaeda and Islamic State craft their messages, the mediums they use to disseminate their messages, and the ways in which they reach their audiences. Yet we are still no closer to understanding why certain messaging appeals to certain people in certain ways and not to others. Within the literature on terrorism and the Internet, the audience—those individuals who receive messages, make meaning from them and then decide whether to act on them—is conspicuously missing. As a result, research into terrorism and the Internet can only hypothesize about the nature and extent of influence that terrorist messages wield. It is often based on an assumption that the violent extremist narrative works like a magic bullet to radicalize audiences already vulnerable and predisposed to becoming violent. Utilizing media theory approaches to studying the audience as an active agent in meaning-making, this article proposes a research framework for developing the current focus on terrorism and the Internet. Journal: Studies in Conflict & Terrorism Pages: 62-76 Issue: 1 Volume: 40 Year: 2017 Month: 1 X-DOI: 10.1080/1057610X.2016.1157407 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1157407 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:1:p:62-76 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1157408_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Maura Conway Author-X-Name-First: Maura Author-X-Name-Last: Conway Title: Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research Abstract: Some scholars and others are skeptical of a significant role for the Internet in processes of violent radicalization. There is increasing concern on the part of other scholars, and increasingly also policymakers and publics, that easy availability of violent extremist content online may have violent radicalizing effects. This article identifies a number of core questions regarding the interaction of violent extremism and terrorism and the Internet, particularly social media, that have yet to be adequately addressed and supplies a series of six follow-up suggestions, flowing from these questions, for progressing research in this area. These suggestions relate to (1) widening the range of types of violent online extremism being studied beyond violent jihadis; (2) engaging in more comparative research, not just across ideologies, but also groups, countries, languages, and social media platforms; (3) deepening our analyses to include interviewing and virtual ethnographic approaches; (4) up-scaling or improving our capacity to undertake “big data†collection and analysis; (5) outreaching beyond terrorism studies to become acquainted with, for example, the Internet Studies literature and engaging in interdisciplinary research with, for example, computer scientists; and (6) paying more attention to gender as a factor in violent online extremism. Journal: Studies in Conflict & Terrorism Pages: 77-98 Issue: 1 Volume: 40 Year: 2017 Month: 1 X-DOI: 10.1080/1057610X.2016.1157408 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1157408 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:1:p:77-98 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1239990_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Richard H. Shultz Author-X-Name-First: Richard H. Author-X-Name-Last: Shultz Title: U.S. Counterterrorism Operations during the Iraq War: A Case Study of Task Force 714 Abstract: U.S. counterterrorism (CT) forces that deployed to Iraq in 2003 as Task Force 714 (TF 714) faced an ugly surprise. Tasked to dismantle the al-Qaeda in Iraq (AQI) dominated insurgency, the organization could not achieve that mission. General Stanley McChrystal, who commanded TF 714 concluded, “we were losing to an enemy … we should have dominated.†But TF 714 transformed in the midst of war and during 2006-2009 was able to largely dismantle AQI's clandestine networks to a degree that they could no longer function in a cohesive manner. By developing the capacity to operate inside those networks, TF 714 was able, in the words of General McChrystal, to “claw the guts out of AQI.†This transformation runs counter to what organizational experts identify as barriers inhibiting militaries from learning, innovating, and changing, especially in wartime. To decipher the puzzle of how TF 714 overcame these barriers, two questions are addressed in this study: 1) How did TF 714 transform from a specialized and compartmented unit customized for executing infrequent CT missions in peacetime to a wartime industrial-strength CT machine that by 2009 dismantled AQI's networks that operated across Iraq; and 2) Why was TF 714 able to achieve this remarkable transformation? Journal: Studies in Conflict & Terrorism Pages: 809-837 Issue: 10 Volume: 40 Year: 2017 Month: 10 X-DOI: 10.1080/1057610X.2016.1239990 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1239990 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:10:p:809-837 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1248665_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jan Angstrom Author-X-Name-First: Jan Author-X-Name-Last: Angstrom Title: Escalation, Emulation, and the Failure of Hybrid Warfare in Afghanistan Abstract: In this article, I argue that hybridization is a contingent result of the dynamics of some conflicts but not others. In particular, faced with opponents with great power, weaker powers seek a situation of asymmetry to gain victory. Drawing on within-case analysis of the conduct of war during the past thirty years in Afghanistan, I demonstrate that what we now consider to be “hybrid†represents an important continuity and strategic option in Afghan warfare. Still, the analysis also demonstrates that choosing “hybrid†has not been a strategy that has worked. Hezb-i-Islami's rather limited attempt for conventionalization of the war against the forces of Dostum and Massoud in 1992 failed and the Taliban's more far-reaching attempt for conventionalization has so far also failed to reap strategic success. This suggests that the threat of hybrid war is inflated. Journal: Studies in Conflict & Terrorism Pages: 838-856 Issue: 10 Volume: 40 Year: 2017 Month: 10 X-DOI: 10.1080/1057610X.2016.1248665 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1248665 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:10:p:838-856 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1239991_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Merouan Mekouar Author-X-Name-First: Merouan Author-X-Name-Last: Mekouar Title: Police Collapse in Authoritarian Regimes: Lessons from Tunisia Abstract: The quick unraveling of authoritarian systems specifically designed to bear social pressure during revolutions is puzzling. Building on the 2011 Tunisian revolution, this article analyzes the collapse of the police apparatus during the 2011 revolution. In line with Way and Levitsky's study of authoritarian collapse, this article shows that the low cohesion and low scope of the security forces is one of the main factors explaining the rapid collapse of one of the Arab world's seemingly most solid repressive systems. At the theoretical level, this article will demonstrate that preference falsification is a double-edged sword. On the one hand, it can nourish authoritarian resilience. On the other, it can also weaken repressive regimes by making core members of the regime overestimate the loyalty of the low-ranking members of the security apparatus. Journal: Studies in Conflict & Terrorism Pages: 857-869 Issue: 10 Volume: 40 Year: 2017 Month: 10 X-DOI: 10.1080/1057610X.2016.1239991 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1239991 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:10:p:857-869 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1239992_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Radha Sarkar Author-X-Name-First: Radha Author-X-Name-Last: Sarkar Author-Name: Amar Sarkar Author-X-Name-First: Amar Author-X-Name-Last: Sarkar Title: The Rebels' Resource Curse: A Theory of Insurgent–Civilian Dynamics Abstract: The relationship between armed rebels and local civilians is among the least understood aspects of insurgency. This article posits a novel theory, the rebels' resource curse, to argue that the interaction between rebel groups and local communities can be traced to the availability of revenue-generating resources. The theory is developed using a case study comparison approach to critically analyze how access to revenue-generating resources among the Naxalites in India and the Fuerzas Armadas Revolucionarias de Colombia (Revolutionary Armed Forces of Colombia) in Colombia affect these insurgent-civilian interactions. The theory proposes that insurgents face a resource curse similar to that faced by states. Rather than resource wealth contributing to greater social engagement and fruitful insurgent–civilian interactions, it appears to precipitate isolationist, and even exploitative and violent relations between insurgents and local civilian populations. Conversely, resource scarcity predicts a greater degree of social integration and cohesion between civilians and insurgents. The framework of the rebels' resource curse can also be applied productively to other insurgent groups, enhancing our understanding of the social realities of insurgency. Journal: Studies in Conflict & Terrorism Pages: 870-898 Issue: 10 Volume: 40 Year: 2017 Month: 10 X-DOI: 10.1080/1057610X.2016.1239992 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1239992 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:10:p:870-898 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1248666_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Max Abrahms Author-X-Name-First: Max Author-X-Name-Last: Abrahms Author-Name: Nicholas Beauchamp Author-X-Name-First: Nicholas Author-X-Name-Last: Beauchamp Author-Name: Joseph Mroszczyk Author-X-Name-First: Joseph Author-X-Name-Last: Mroszczyk Title: What Terrorist Leaders Want: A Content Analysis of Terrorist Propaganda Videos Abstract: In recent years, a growing body of empirical research suggests that indiscriminate violence against civilian targets tends to carry substantial political risks compared to more selective violence against military targets. To better understand why terrorist groups sometimes attack politically suboptimal targets, scholars are increasingly adopting a principal-agent framework where the leaders of terrorist groups are understood as principals and lower level members as agents. According to this framework, terrorist leaders are thought to behave as essentially rational political actors, whereas lower level members are believed to harbor stronger non-political incentives for harming civilians, often in defiance of leadership preferences. We test this proposition with an original content analysis of terrorist propaganda videos. Consistent with the principal–agent framework, our analysis demonstrates statistically that terrorist leaders tend to favor significantly less indiscriminate violence than their operatives actually commit, providing unprecedented insight into the incentive structure of terrorist leaders relative to the rank-and-file. Journal: Studies in Conflict & Terrorism Pages: 899-916 Issue: 11 Volume: 40 Year: 2017 Month: 11 X-DOI: 10.1080/1057610X.2016.1248666 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1248666 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:11:p:899-916 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1253941_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David Lowe Author-X-Name-First: David Author-X-Name-Last: Lowe Title: Prevent Strategies: The Problems Associated in Defining Extremism: The Case of the United Kingdom Abstract: As the United Kingdom has placed some of its Prevent strategy on a statutory footing and is proposing to introduce a Counter-Extremism Bill, this article argues that a legal definition of extremism must be carefully drafted to provide legal certainty. The main recommendation is that all forms of violent and nonviolent extremism comes under the definition, ensuring it is differentiated from activism. Activism may hold radical views counter to the mainstream opinion, but it is required in liberal democracies as it encourages healthy debate and can prevent the policing of thought in any government strategy or legislation. Journal: Studies in Conflict & Terrorism Pages: 917-933 Issue: 11 Volume: 40 Year: 2017 Month: 11 X-DOI: 10.1080/1057610X.2016.1253941 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253941 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:11:p:917-933 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1250553_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nazli Avdan Author-X-Name-First: Nazli Author-X-Name-Last: Avdan Author-Name: Gary Uzonyi Author-X-Name-First: Gary Author-X-Name-Last: Uzonyi Title: V for Vendetta: Government Mass Killing and Domestic Terrorism Abstract: Scholarship explores the impact of human rights abuse and state repression on terrorism. Heretofore, scholarship has ignored the impact of government-sponsored killings on domestic terrorism. This article proposes that mass killings create a focal point for terrorist mobilization. The vendetta agenda fuels violence by animating retributory violence. Additionally, mass atrocities create a permissive environment for violent nonstate activity. A spiral of violence ensues whereby groups resort to terrorism. Utilizing data from the Global Terrorism Database, 1971–2011, the study shows that mass killings significantly increase domestic terrorism. It contributes to emerging scholarship examining how state policies influence terrorist activity. Journal: Studies in Conflict & Terrorism Pages: 934-965 Issue: 11 Volume: 40 Year: 2017 Month: 11 X-DOI: 10.1080/1057610X.2016.1250553 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1250553 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:11:p:934-965 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1258863_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Simon Mabon Author-X-Name-First: Simon Author-X-Name-Last: Mabon Title: Nationalist JaÌ„hiliyyah and the Flag of the Two Crusaders, or: ISIS, Sovereignty, and the “Owl of Minerva†Abstract: This article argues that by understanding Islamic State of Iraq and Syria (ISIS) state-building processes we are able to understand how ISIS has developed while also developing a united citizenship body built from people in Iraq and Syria and those making hijra. The fragmentation of Iraq and Syria resulted in conditions that would prove conducive to the group's expansion and identifying these conditions is imperative to understanding Sunni extremism in the Middle East. The article argues that ISIS builds citizenship in two ways: first, by developing asabiyya—group feeling—among Sunni and second, by securitizing the Shi'a threat. Identifying and engaging with the concepts of sovereignty and citizenship helps to develop much stronger policy responses. Journal: Studies in Conflict & Terrorism Pages: 966-985 Issue: 11 Volume: 40 Year: 2017 Month: 11 X-DOI: 10.1080/1057610X.2016.1258863 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1258863 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:11:p:966-985 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1253984_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Basia Spalek Author-X-Name-First: Basia Author-X-Name-Last: Spalek Author-Name: Douglas Weeks Author-X-Name-First: Douglas Author-X-Name-Last: Weeks Title: Community-Based Counterterrorism Journal: Studies in Conflict & Terrorism Pages: 987-990 Issue: 12 Volume: 40 Year: 2017 Month: 12 X-DOI: 10.1080/1057610X.2016.1253984 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253984 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:987-990 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1253985_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Basia Spalek Author-X-Name-First: Basia Author-X-Name-Last: Spalek Author-Name: Douglas Weeks Author-X-Name-First: Douglas Author-X-Name-Last: Weeks Title: The Role of Communities in Counterterrorism: Analyzing Policy and Exploring Psychotherapeutic Approaches within Community Settings Abstract: The role of communities in preventing or responding to terrorism and political violence is increasingly finding prominence within government strategies, nationally and internationally. At the same time, implementation of effective community-based partnerships has been nominal. Adding additional complexity to this problem are policies such as Prevent in Britain, which was arguably developed with good intentions but has received significant and sustained criticism by the very communities it sought to engage with. The result has been ongoing discussions within community practice and research arenas associated with radicalization, extremism, and terrorism, as to the role, if any, that communities might play in the counterterrorism environment. This article explores that environment and highlights some of the community-based perceptions and initiatives that prevail in the United Kingdom. In particular, innovations around the development of psychotherapeutic frameworks of understanding in relation to counterterrorism are discussed, alongside the role of connectors. Journal: Studies in Conflict & Terrorism Pages: 991-1003 Issue: 12 Volume: 40 Year: 2017 Month: 12 X-DOI: 10.1080/1057610X.2016.1253985 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253985 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:991-1003 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1253986_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tufyal Choudhury Author-X-Name-First: Tufyal Author-X-Name-Last: Choudhury Title: Campaigning on Campus: Student Islamic Societies and Counterterrorism Abstract: Cooperation in counterterrorism policing increases when communities can be confident that legislation and policy is not implemented in an arbitrary or discriminatory fashion: the ability to challenge executive overstretch, abuse, or misapplication of powers is vital for maintaining procedural justice. Through examining the experiences of the Federation of Student Islamic Societies, one of the oldest British Muslim civil society organizations, we see how key structural features of the counterterrorism legal and policy framework—the wide definition of terrorism, the broad discretion in the use of stop and search powers at ports, and the expansion of Prevent into the opaque terrain of nonviolent extremism—undermine cooperation. Journal: Studies in Conflict & Terrorism Pages: 1004-1022 Issue: 12 Volume: 40 Year: 2017 Month: 12 X-DOI: 10.1080/1057610X.2016.1253986 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253986 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:1004-1022 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1253987_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Adrian Cherney Author-X-Name-First: Adrian Author-X-Name-Last: Cherney Author-Name: Kristina Murphy Author-X-Name-First: Kristina Author-X-Name-Last: Murphy Title: Police and Community Cooperation in Counterterrorism: Evidence and Insights from Australia Abstract: Effectively engaging the Muslim community is a challenge for police given many Muslims feel unfairly targeted by counterterrorism policies and laws because of their faith. This article explores how such perceptions influence the willingness of Muslims to voluntarily cooperate in counterterrorism efforts, drawing on data collected from Muslims living in Australia. We test whether procedural justice policing can help buffer this perception of being targeted as a security threat and whether it can enhance Muslims' willingness to cooperate with police. Efforts by the Australian Federal Police to engage Muslim communities in Australia are also examined. The implications of the results for community-based approaches to counterterrorism are discussed. Journal: Studies in Conflict & Terrorism Pages: 1023-1037 Issue: 12 Volume: 40 Year: 2017 Month: 12 X-DOI: 10.1080/1057610X.2016.1253987 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253987 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:1023-1037 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1253988_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Aziz Z. Huq Author-X-Name-First: Aziz Z. Author-X-Name-Last: Huq Title: Community-Led Counterterrorism Abstract: This article explores the idea that nonstate actors embedded in geographically and religiously defined communities have a distinctive role to play in responding to growing terrorist recruitment efforts in Europe and North America. The resulting “community-led counterterrorism†works through at least two causal channels, which I label “ideological competition†and “ethical anchoring.†Existing counterterrorism policing strategies do not harness these mechanisms and may well undermine them. Community-led counterterrorism thus presents an untapped opportunity, even as it raises new and difficult ethical questions for both Muslim minority communities in the West, as well as liberal democracies. Journal: Studies in Conflict & Terrorism Pages: 1038-1053 Issue: 12 Volume: 40 Year: 2017 Month: 12 X-DOI: 10.1080/1057610X.2016.1253988 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253988 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:1038-1053 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1253989_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Robert Lambert Author-X-Name-First: Robert Author-X-Name-Last: Lambert Author-Name: Tim Parsons Author-X-Name-First: Tim Author-X-Name-Last: Parsons Title: Community-Based Counterterrorism Policing: Recommendations for Practitioners Abstract: This article presents recommendations for practitioners of community-based counterterrorism policing. The recommendations are located and explained within two broad propositions: recognize the implications and limitations of policing by consent, and respect the legitimate religious beliefs of all communities. Highlighting tensions between high and low policing and between policing and government imperatives, the article helps illustrate how different aspects of counterterrorism policy and practice may sometimes be at odds with one another. The recommendations are aimed at recognizing and, where practicable, reconciling such tensions. They arise from the authors' engagement with the issues in London and are understood to have application in other towns and cities in the United Kingdom and the West, particularly in communities and neighborhoods where Muslim citizens are the principal recipients of this form of policing. Journal: Studies in Conflict & Terrorism Pages: 1054-1071 Issue: 12 Volume: 40 Year: 2017 Month: 12 X-DOI: 10.1080/1057610X.2016.1253989 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253989 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:1054-1071 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1253990_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Carmel Joyce Author-X-Name-First: Carmel Author-X-Name-Last: Joyce Author-Name: Orla Lynch Author-X-Name-First: Orla Author-X-Name-Last: Lynch Title: “Doing Peaceâ€: The Role of Ex-Political Prisoners in Violence Prevention Initiatives in Northern Ireland Abstract: While a considerable amount of research has been conducted on community-based initiatives aimed at preventing violence, including the role of the ex-political prisoner community in preventative and counterterrorism work, little is known about how the ex-prisoners themselves manage their identity transition between the role they occupied during the conflict and their current role in violence prevention. We argue that it is important to consider the perspective of ex-prisoners who are both architects of their own process of desistance from political violence, as well active leaders of bespoke desistance programs. While many researchers have recognized the utility of the role of ex-prisoners in violence prevention work, theoretically, the way in which ex-prisoners do violence prevention through their use of language and intergroup contact and other resources, is poorly understood. Ultimately, the aim of the article is twofold: to understand the resources (discursive or otherwise) that the community of ex-political prisoners use in their preventative work and (2) to understand how this community understand their role in desistance programs in the context of their personal involvement in violent conflict, including the ways in which participants manage their identity transition. Journal: Studies in Conflict & Terrorism Pages: 1072-1090 Issue: 12 Volume: 40 Year: 2017 Month: 12 X-DOI: 10.1080/1057610X.2016.1253990 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253990 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:1072-1090 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1253991_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tanya Silverman Author-X-Name-First: Tanya Author-X-Name-Last: Silverman Title: U.K. Foreign Fighters to Syria and Iraq: The Need for a Real Community Engagment Approach Abstract: A growing number of British youth are traveling to join the Islamic State of Iraq and Syria and participate in the conflict. In this modern iteration of “foreign fighters†community driven countering violent extremism (CVE) efforts remain necessary as the age of travelers to the conflict zone from geographical hotspots in the United Kingdom decreases, and numbers of those going increases. It is their immediate environments—their communities—which can help to prevent violent radicalization and subsequent travel to conflict. Weaknesses in the government's approaches to community engagement can lessen the efficacy of community CVE capacity. This article aims to highlight some of these weaker U.K. government approaches while suggesting ways to improve community engagement that can strengthen CVE efforts. Journal: Studies in Conflict & Terrorism Pages: 1091-1107 Issue: 12 Volume: 40 Year: 2017 Month: 12 X-DOI: 10.1080/1057610X.2016.1253991 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1253991 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:1091-1107 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1383716_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Editorial Board EOV Journal: Studies in Conflict & Terrorism Pages: (1108)-(1108) Issue: 12 Volume: 40 Year: 2017 Month: 12 X-DOI: 10.1080/1057610X.2017.1383716 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1383716 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:12:p:(1108)-(1108) Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1177998_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Temitope B. Oriola Author-X-Name-First: Temitope B. Author-X-Name-Last: Oriola Title: “Unwilling Cocoonsâ€: Boko Haram's War Against Women Abstract: The kidnapping of 276 girls at Government Secondary School Chibok, Borno State, Nigeria, on 14 April 2014 has brought into international prominence the organization Jama'atu Ahlis Suna Lidda'awati Wal Jihad or Boko Haram. This incident heralded a new trajectory in Boko Haram's tactics and strategies. This article focuses on Boko Haram's strategic deployment of sexual and gender-based violence (SGBV) against women. The gendered performativity of Boko Haram, its methodology for sourcing for women and young girls, and its concomitant utilitarian/instrumental approach vis-à -vis SGBV against women are analyzed against the backdrop of the political economy and patriarchal ideational infrastructure of the Nigerian society. The article argues that Boko Haram's deployment of SGBV against women is an extension of the “repertoire of violence†ingrained in the sociopolitical and cultural milieu of Boko Haram's primary area of operation. Boko Haram's instrumental approach to SGBV is fourfold and hinges on the sociobiological utility of women. Boko Haram construes women as the bearers of its future despite its brutality toward them. The consequence is a strategic plan for procreation of a new generation of children raised through the cyclical constellation of mass rape of women, consequent impregnation and kidnapping the offspring of such rapes. Overall, this article contributes to the burgeoning scholarly literature on Boko Haram's terrorist activities. Journal: Studies in Conflict & Terrorism Pages: 99-121 Issue: 2 Volume: 40 Year: 2017 Month: 2 X-DOI: 10.1080/1057610X.2016.1177998 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1177998 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:2:p:99-121 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1174501_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Marco Pinfari Author-X-Name-First: Marco Author-X-Name-Last: Pinfari Title: Framing through Paradox: Egypt and the “Obama Supports Terrorism†Campaign Abstract: This article presents and analyzes the “Obama supports terrorism†campaign, which was launched in Egypt in late June 2013 and was instrumental to the framing of some Islamist groups as terrorist both before and after the 3 July 2013 coup. The analysis of the visual material of the campaign highlights its reliance on various Western discourses from the War on Terror, including some whose religious and racial content is an odd fit for a non-Western, Muslim country like Egypt. Yet, despite the lack of a clear and unified causal narrative to justify such framing, the success of the campaign was crucially aided by the symbolic and rhetorical power its slogan, which provided a credible “schema of interpretation†for its supporters. Journal: Studies in Conflict & Terrorism Pages: 122-138 Issue: 2 Volume: 40 Year: 2017 Month: 2 X-DOI: 10.1080/1057610X.2016.1174501 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1174501 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:2:p:122-138 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1168656_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stephen F. Pires Author-X-Name-First: Stephen F. Author-X-Name-Last: Pires Author-Name: Rob T. Guerette Author-X-Name-First: Rob T. Author-X-Name-Last: Guerette Author-Name: Auzeen Shariati Author-X-Name-First: Auzeen Author-X-Name-Last: Shariati Title: Specifying Kidnapping for Ransom Epidemics at the Global Level: A Matched-Case Control Design Abstract: Criminal groups around the world frequently rely on kidnapping for ransom (K&R) to fund and further their cause. Some case studies suggest war torn, fragile, and corrupt countries experience K&R epidemics more often. While such factors may be present in some countries experiencing K&R epidemics, it remains to be seen if these failed state factors are generalizable to all nations. To date, no research has systematically examined the conditions that might facilitate K&R epidemics. This study used a case-control design comparing countries with high rates of K&R (experimental) to countries without a K&R problem (control). Findings suggest that problem K&R countries were less secure, less peaceful, and unevenly developed in relation to social and economic indicators. Better understanding of the conditions involving K&R problems offers to improve foresight and the development of effective policy responses. Journal: Studies in Conflict & Terrorism Pages: 139-156 Issue: 2 Volume: 40 Year: 2017 Month: 2 X-DOI: 10.1080/1057610X.2016.1168656 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1168656 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:2:p:139-156 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1184060_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Laura N. Bell Author-X-Name-First: Laura N. Author-X-Name-Last: Bell Title: Terrorist Assassinations and Target Selection Abstract: This research note examines political institutional changes in the aftermath of terrorist assassinations. Contemporary assassinations are more often a component of wider campaigns of political violence rather than a singular attack on a head of state. The Global Terrorism Database counts 16,831 terrorist assassinations from 1970–2014, indicating significant frequency of these events and includes a wide range of targets from law enforcement officials to foreign diplomats. Utilizing survival analysis, the span of time from a terrorist assassination event to a change in political institutions within states is measured between target types. Outcome differences between target types are identified. Journal: Studies in Conflict & Terrorism Pages: 157-171 Issue: 2 Volume: 40 Year: 2017 Month: 2 X-DOI: 10.1080/1057610X.2016.1184060 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1184060 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:2:p:157-171 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1184062_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Brandon Colas Author-X-Name-First: Brandon Author-X-Name-Last: Colas Title: What Does Dabiq Do? ISIS Hermeneutics and Organizational Fractures within Dabiq Magazine Abstract: The Islamic State of Iraq and Syria (ISIS)'s flagship English-language magazine, Dabiq, is a puzzle. The magazine is not, despite appearances, primarily designed for direct recruiting efforts or inciting violence against the West. In fact, the primary audiences of Dabiq are English-speaking second generation Muslims or converts, Western policymakers, and a third group of current or would-be members of ISIS who are not integrating with the organization itself. The third audience—those members who are failing to function within the organization—is strange to include in an English-language magazine. Why publish organizational weaknesses, in English? One possibility for this puzzle is that the fundamentalist hermeneutics of ISIS is reflected in their own media efforts. One of the assumptions that ISIS holds about their sacred texts is that each text carries a single meaning that reflects the author's original intent. There might be multiple applications of that intent, but each text can only have one intent, and therefore one meaning. Following this logic, a message meant for one person is unlikely to be of utility for another, and so this may be why ISIS exposes their weaknesses as part of the process of correcting their own members. Journal: Studies in Conflict & Terrorism Pages: 173-190 Issue: 3 Volume: 40 Year: 2017 Month: 3 X-DOI: 10.1080/1057610X.2016.1184062 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1184062 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:3:p:173-190 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1274216_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lorne L. Dawson Author-X-Name-First: Lorne L. Author-X-Name-Last: Dawson Author-Name: Amarnath Amarasingam Author-X-Name-First: Amarnath Author-X-Name-Last: Amarasingam Title: Talking to Foreign Fighters: Insights into the Motivations for Hijrah to Syria and Iraq Abstract: Little of the discussion of foreign fighters in Syria and Iraq is informed by primary data derived from talking with the foreign fighters. This article reports some initial findings from interviews with twenty foreign fighters in Syria. The findings are compared with three other recent studies of European foreign fighters, and aspiring fighters, based on some primary data. While those studies emphasize the role of low social and economic prospects in motivating the choice to go, this study found little evidence of such factors, and alternatively argues more attention should be given to existential concerns and the role of religiosity. Consideration is also given to the methodological challenges posed by using of terrorists' accounts of their motivations. Journal: Studies in Conflict & Terrorism Pages: 191-210 Issue: 3 Volume: 40 Year: 2017 Month: 3 X-DOI: 10.1080/1057610X.2016.1274216 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1274216 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:3:p:191-210 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1188533_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Samuel Oyewole Author-X-Name-First: Samuel Author-X-Name-Last: Oyewole Title: Making the Sky Relevant to Battle Strategy: Counterinsurgency and the Prospects of Air Power in Nigeria Abstract: One of the most important roles in counterinsurgency (COIN) is to maintain adequate security presence to protect lives and properties of the affected population and restore law and order in the society. Accordingly, the state of affairs in Nigeria's COIN theater has been affected by the quantity and quality of security presence, most especially the ability of the operatives to gather timely and relevant information and mobilize for prompt response. Although the roles of the ground operatives have dominated public attention, the local air force and the complementary air powers have affected the security situations with the level of their presence or absence in the sky for intelligence, surveillance, and reconnaissance; firepower; and transportation in the theater. This study examines the relevance of security presence to achieve the objective of COIN and the prospects of air power in this arrangement in Nigeria and the Lake Chad region. Journal: Studies in Conflict & Terrorism Pages: 211-231 Issue: 3 Volume: 40 Year: 2017 Month: 3 X-DOI: 10.1080/1057610X.2016.1188533 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1188533 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:3:p:211-231 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1184061_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Benjamin Acosta Author-X-Name-First: Benjamin Author-X-Name-Last: Acosta Author-Name: Kristen Ramos Author-X-Name-First: Kristen Author-X-Name-Last: Ramos Title: Introducing the 1993 Terrorism and Political Violence Dataset Abstract: The introduction of the Global Terrorism Database (GTD) nearly a decade ago sparked a revolution in terrorism studies. However, one major flaw in the database continues to plague GTD users. Data lost prior to digitalization, along with unsuccessful data recollection efforts, have left GTD without data on events that took place during the year 1993. The missing data prevents researchers from using the entirety of GTD's annual range (1970–2014) to conduct reliable time-series analyses. Additionally, it has likely contributed to the formation of theories and claims on faulty empirical ground. To remedy the problem, we have collected data on 4,206 unique terror-attack incidents, with the aim of documenting the universe of 1993 terrorism events. This article showcases our 1993 dataset and illustrates the importance of terrorism events in 1993 for the development of conflicts in Israel, Afghanistan, Colombia, and India. Journal: Studies in Conflict & Terrorism Pages: 232-247 Issue: 3 Volume: 40 Year: 2017 Month: 3 X-DOI: 10.1080/1057610X.2016.1184061 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1184061 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:3:p:232-247 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1188535_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Randy Borum Author-X-Name-First: Randy Author-X-Name-Last: Borum Author-Name: Robert Fein Author-X-Name-First: Robert Author-X-Name-Last: Fein Title: The Psychology of Foreign Fighters Abstract: The recent influx of foreign fighters into Syria, particularly those aligning with the Islamic State, has brought renewed attention to the security threat posed by people who cross borders to participate in armed conflict. Although foreign fighters have rarely, if ever, constituted the majority of combatants in a war or insurgency, understanding their role is critical for conflict analysis and prevention. This review focuses on behavioral aspects of the foreign fighter phenomenon. Although other books and articles have focused wholly, or in part, on historical dimensions, the behavioral and social science literature on foreign fighters is much more limited. This review first explores the definitions of “foreign fighter†terminology, then analyzes what is known about their motivations and their pathways toward engaging in armed conflict on foreign soil. It examines recruitment strategies and the role of “radicalization†in feeding the transnational insurgent supply, and finally describes more specifically, the nature of foreign fighter involvement in more recent armed conflicts (e.g., Syria, Chechnya, Iraq, and Afghanistan), and speculates about the prospects for their future involvement. Journal: Studies in Conflict & Terrorism Pages: 248-266 Issue: 3 Volume: 40 Year: 2017 Month: 3 X-DOI: 10.1080/1057610X.2016.1188535 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1188535 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:3:p:248-266 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1206734_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: John McCoy Author-X-Name-First: John Author-X-Name-Last: McCoy Author-Name: W. Andy Knight Author-X-Name-First: W. Andy Author-X-Name-Last: Knight Title: Homegrown Violent Extremism in Trinidad and Tobago: Local Patterns, Global Trends Abstract: The article examines the subject of homegrown violent extremism related to militant Islamism in the dual-Island Caribbean state of Trinidad and Tobago (T & T). It employs original research drawn from a series of semi-structured interviews and focus groups conducted between November 2015 and January 2016. Tracing the evolution of endogenous forms of radicalism and extremism the article considers how globalized-exogenous forms of militant Islamism associated with Al Qaeda and its offshoots, such as the so-called Islamic State, have impacted local patterns of violent extremism. The case study draws attention to a state and a region that have received scant attention in terrorism studies. As demonstrated by the article, this oversight is imprudent. There are a number of noteworthy findings from this case study for terrorism studies scholars: the unique historical legacy of radicalism, extremism and insurrection among T & T's Islamists; the country's markedly high levels of extremist travelers on a per capita basis and the high rate of religious converts among those travelers; the inter-linkages between criminality and political violence; and the potential threat posed by Trinidadian and Tobagonian militancy regionally. Journal: Studies in Conflict & Terrorism Pages: 267-299 Issue: 4 Volume: 40 Year: 2017 Month: 4 X-DOI: 10.1080/1057610X.2016.1206734 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1206734 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:4:p:267-299 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1205368_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Brian M. Perkins Author-X-Name-First: Brian M. Author-X-Name-Last: Perkins Title: Yemen: Between Revolution and Regression Abstract: Yemen once again descended into chaos in November 2014, when the Houthis seized control of Sana'a. Saudi Arabia and its Gulf Cooperation Council partners, along with mainstream media, characterized the conflict as a sectarian proxy-war with Iran. However, this narrative fails to acknowledge the trajectory of Yemen's Arab Spring revolt. This article refutes this narrative by using theories of revolution to connect the Arab Spring revolt to the current conflict. Situating Yemen within a broader revolutionary moment sheds light on patterns of revolution in Third World societies and the likely outcome of the current conflict. Journal: Studies in Conflict & Terrorism Pages: 300-317 Issue: 4 Volume: 40 Year: 2017 Month: 4 X-DOI: 10.1080/1057610X.2016.1205368 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1205368 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:4:p:300-317 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1194025_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Innocent Chiluwa Author-X-Name-First: Innocent Author-X-Name-Last: Chiluwa Title: The Discourse of Terror Threats: Assessing Online Written Threats by Nigerian Terrorist Groups Abstract: Online threats by terrorist groups are viewed as a special type of discourse that sends menacing explicit messages, expressing not only an intention to cause a direct physical harm to the threatened, but also to show a commitment to destroy public property or cause a change of system or government. This study applies critical discourse analysis with some insights from pragmatics to analyze the discourse-pragmatic contents of terror threats by two terrorist groups in Nigeria—Boko Haram and Ansaru. Explicit and implied threats are examined from seven online publications by these groups written between 2009 and 2012. This study shows that terror threats by Nigerian terrorist groups are intertextually and ideologically related to threats associated with Al Qaeda and global jihad, which also goes further to establish their strong link and influence with other terror groups around the world. The findings also show that the structure of terror threats is significantly different from the conventional formula for verbal threats. Journal: Studies in Conflict & Terrorism Pages: 318-338 Issue: 4 Volume: 40 Year: 2017 Month: 4 X-DOI: 10.1080/1057610X.2016.1194025 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1194025 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:4:p:318-338 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1197692_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: C. Christine Fair Author-X-Name-First: C. Christine Author-X-Name-Last: Fair Author-Name: Jacob S. Goldstein Author-X-Name-First: Jacob S. Author-X-Name-Last: Goldstein Author-Name: Ali Hamza Author-X-Name-First: Ali Author-X-Name-Last: Hamza Title: Can Knowledge of Islam Explain Lack of Support for Terrorism? Evidence from Pakistan Abstract: In this research note we employ the work of Wiktorowicz who suggests that persons who are knowledgeable of Islam may be more capable of critically evaluating the claims of militant recruiters and ideologues and thus be more resistant to their appeals than those who are not knowledgeable. This gives rise to an interesting research question: Does knowledge of Islam reduce support for Islamist militancy? To evaluate this research question, we employ data derived from a nationally representative survey fielded among 16,279 Pakistanis in 2011. Using several survey items, we construct a “knowledge index†to measure respondents’ basic knowledge of Islam, which is our principal independent variable. To operationalize support for militancy we use two survey items that query respondents about their support for two prominent Islamist militant groups based in and from Pakistan: the Afghan Taliban as well the sectarian group, Sipah-e-Sahaba-e-Pakistan (also known as Lashkar-e-Jhangvi and Ahle Sunnat Wal Jamaat). We use ordinary least squares regression to evaluate the impact of our independent variables upon support for these two groups, controlling for other relevant factors. We find that knowledge of Islam does predict less support for these two groups; however, other variables such as sectarian organization and ethnicity have greater predictive power. Journal: Studies in Conflict & Terrorism Pages: 339-355 Issue: 4 Volume: 40 Year: 2017 Month: 4 X-DOI: 10.1080/1057610X.2016.1197692 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1197692 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:4:p:339-355 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1212551_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Haroro J. Ingram Author-X-Name-First: Haroro J. Author-X-Name-Last: Ingram Title: An Analysis of Inspire and Dabiq: Lessons from AQAP and Islamic State's Propaganda War Abstract: This study analyzes how Inspire and Dabiq seek to appeal to and radicalize English-speaking Muslims. It examines how each magazine strategically designs ingroup, Other, crisis, and solution constructs and interplays these via value-, dichotomy-, and crisis-reinforcing narratives. This analysis also explores how narrative, imagery, and counternarrative messaging are used to shape readers' perceptions and polarize their support. While both magazines are dominated by narratives designed to empower readers toward action, Inspire relies heavily on identity-choice appeals while Dabiq tends to balance identity- and rational-choice messaging. This study concludes by identifying key lessons for counterterrorism strategic communications campaign and message design. Journal: Studies in Conflict & Terrorism Pages: 357-375 Issue: 5 Volume: 40 Year: 2017 Month: 5 X-DOI: 10.1080/1057610X.2016.1212551 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1212551 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:5:p:357-375 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1210891_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ioana Emy Matesan Author-X-Name-First: Ioana Emy Author-X-Name-Last: Matesan Author-Name: Ronit Berger Author-X-Name-First: Ronit Author-X-Name-Last: Berger Title: Blunders and Blame: How Armed Non-State Actors React to Their Mistakes Abstract: Armed non-state actors make mistakes. Why this phenomenon occurs, and how organizations respond to their blunders, has remained understudied. This article draws on interdisciplinary research to examine sources of errors, and offers a public sensitivity argument to explain why groups claim and even apologize for their blunders. The quantitative analysis finds that all armed groups, regardless of ideology and organizational structure, are willing to apologize when there are unintended high casualty rates. A detailed analysis of three Provisional Irish Republican Army incidents reveals that public opinion is sensitive to the nature of the victims, and shows how public condemnation can impact organizational behavior. Journal: Studies in Conflict & Terrorism Pages: 376-398 Issue: 5 Volume: 40 Year: 2017 Month: 5 X-DOI: 10.1080/1057610X.2016.1210891 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1210891 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:5:p:376-398 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1212548_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kevin M. Fitzpatrick Author-X-Name-First: Kevin M. Author-X-Name-Last: Fitzpatrick Author-Name: Jeff Gruenewald Author-X-Name-First: Jeff Author-X-Name-Last: Gruenewald Author-Name: Brent L. Smith Author-X-Name-First: Brent L. Author-X-Name-Last: Smith Author-Name: Paxton Roberts Author-X-Name-First: Paxton Author-X-Name-Last: Roberts Title: A Community-Level Comparison of Terrorism Movements in the United States Abstract: The aim of this article is to identify characteristics of communities where persons indicted under terrorism charges lived, planned, and prepared prior to carrying out a terrorist act. Guided by a model of community deterioration and using data from the Terrorism and Extremist Violence in the United States database, findings indicate: (1) half of all census tracts where terrorists planned and prepared for attacks were located in the western United States; nearly one fourth were in the Northeast; (2) nationally, terrorist pre-incident activity is more likely to occur in census tracts with lower percentages of high school graduates for Al Qaeda and associated movements (AQAM) terrorism but not for far-right terrorism, higher percentages of households living below the poverty level, more urban places, and more unemployed; and (3) communities with terrorist pre-incident activity are different types of places compared to those where there was no pre-incident activity, generally between different regions of the country, and specifically in terms of differences across far-right and AQAM terrorist movements. Journal: Studies in Conflict & Terrorism Pages: 399-418 Issue: 5 Volume: 40 Year: 2017 Month: 5 X-DOI: 10.1080/1057610X.2016.1212548 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1212548 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:5:p:399-418 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1214434_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Arnim Langer Author-X-Name-First: Arnim Author-X-Name-Last: Langer Author-Name: Amélie Godefroidt Author-X-Name-First: Amélie Author-X-Name-Last: Godefroidt Author-Name: Bart Meuleman Author-X-Name-First: Bart Author-X-Name-Last: Meuleman Title: Killing People, Dividing a Nation? Analyzing Student Perceptions of the Boko Haram Crisis in Nigeria Abstract: The causes and consequences of the Boko Haram insurgency as well as its possible solutions have been subjected to different interpretations among scholars, politicians, and journalists. Little is known, however, about how the Nigerian populace thinks about the uprising. The present study contributes to the literature on Boko Haram by analyzing the perceptions of Nigerian students vis-à -vis Boko Haram's agenda and the government's response. The results demonstrate a north–south divide with Christians or Igbo and Muslims or Hausa-Fulani holding different ideas on the causes of the crisis, being differently affected by it, and slightly disagreeing on the desirability of military government responses. In conclusion, perceptions on Boko Haram lay bare ethno-religious fault lines reflecting existing grievances, thereby possibly undermining efforts at nation-building and peaceful coexistence in the multi-ethnic Nigerian society. Journal: Studies in Conflict & Terrorism Pages: 419-738 Issue: 5 Volume: 40 Year: 2017 Month: 5 X-DOI: 10.1080/1057610X.2016.1214434 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1214434 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:5:p:419-738 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1221258_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Simon Cottee Author-X-Name-First: Simon Author-X-Name-Last: Cottee Title: “What ISIS Really Wants†Revisited: Religion Matters in Jihadist Violence, but How? Abstract: In his influential and provocative article on “What ISIS Really Wants,†published in The Atlantic in March 2015, Graeme Wood argued that “the Islamic state is Islamic. Very Islamic.†He also sought to challenge what he diagnosed as a “western bias†among academics and policymakers toward religious ideology, whereby religious doctrines or beliefs are relegated to the status of epiphenomena rather than taken seriously as causal properties in their own right. Wood's article sparked a wider—and still ongoing—debate over the relationship between Islam and jihadist violence. For one side in this debate, Islamic State of Iraq and Syria (ISIS) is inexplicable without reference to Islamic scripture; indeed, some commentators and politicians have even argued that it represents the “true†face of Islam; for the other side, ISIS is a hideous distortion of Islam's “true†teachings, and is inexplicable without reference to the wider political circumstances in which it emerged and to which it is a response. This article attempts to forge a middle way between these two polarized viewpoints by arguing that any comprehensive account of ISIS must recognize both its secular and theological bases. More specifically, and drawing on the work of the intellectual historian Quentin Skinner, it argues that Wood's critics, in their understandable but misplaced eagerness to detach Islam from jihadist violence, fail to accord proper causal weight to the legitimizing role of revolutionary Islamic ideas—and the innovating ideologists who develop these—in the commission of this violence. Journal: Studies in Conflict & Terrorism Pages: 439-454 Issue: 6 Volume: 40 Year: 2017 Month: 6 X-DOI: 10.1080/1057610X.2016.1221258 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1221258 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:6:p:439-454 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1221265_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Dina Esfandiary Author-X-Name-First: Dina Author-X-Name-Last: Esfandiary Author-Name: Ariane M. Tabatabai Author-X-Name-First: Ariane M. Author-X-Name-Last: Tabatabai Title: A Comparative Study of U.S. and Iranian Counter-ISIS Strategies Abstract: The Islamic State in Iraq and Syria (ISIS)'s activities now go beyond insurgency and conventional operations in the territories it controls in the Middle East. It poses a threat to U.S. interests and allies in Europe, and a serious threat to Iran and its borders. While Washington formed an international coalition encompassing many European and Middle Eastern states to combat ISIS, it only coordinates some tactical and operation-level efforts with a key player on the ground: Iran. For its part, Iran is leveraging similar counter-ISIS tools as those adopted by the United States, despite their strategies differing fundamentally. Journal: Studies in Conflict & Terrorism Pages: 455-469 Issue: 6 Volume: 40 Year: 2017 Month: 6 X-DOI: 10.1080/1057610X.2016.1221265 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1221265 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:6:p:455-469 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1221253_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Antony Field Author-X-Name-First: Antony Author-X-Name-Last: Field Title: The Dynamics of Terrorism and Counterterrorism: Understanding the Domestic Security Dilemma Abstract: This article argues that the concept of the “domestic security dilemma†can help us to better understand public opposition to government counterterrorism policies. It examines the concept of the “security dilemma†in international relations theory and argues that this concept can also be applied to the analysis of domestic security politics. The article explains that when the government takes actions intended to make people safer from terrorist threats, it often has the unintended consequence of heightening concerns about government oppression. Thus, counterterrorism represents a “domestic security dilemmaâ€â€”a situation where security tradeoffs have consistently undermined anticipated security gains. Journal: Studies in Conflict & Terrorism Pages: 470-483 Issue: 6 Volume: 40 Year: 2017 Month: 6 X-DOI: 10.1080/1057610X.2016.1221253 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1221253 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:6:p:470-483 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1221255_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Pierre Losson Author-X-Name-First: Pierre Author-X-Name-Last: Losson Title: Does the International Trafficking of Cultural Heritage Really Fuel Military Conflicts? Abstract: General media outlets are increasingly arguing that the looting of cultural heritage artifacts contributes to the funding of terrorist groups such as Islamic State of Iraq and Syria (ISIS). This article reexamines this claim in light of the political science literature on internal conflicts duration. While we do know that armed conflicts contribute to an increase of looting activities in the territories at war, it is still too early to generalize the ISIS case and conclude that these activities contribute to significantly funding armed non-state actors and to prolonging internal armed conflicts. However, establishing this link may add political weight to archeologists' and art historians' efforts to curb the international trafficking of looted objects. Journal: Studies in Conflict & Terrorism Pages: 484-495 Issue: 6 Volume: 40 Year: 2017 Month: 6 X-DOI: 10.1080/1057610X.2016.1221255 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1221255 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:6:p:484-495 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1221256_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Eleanor Beevor Author-X-Name-First: Eleanor Author-X-Name-Last: Beevor Title: Coercive Radicalization: Charismatic Authority and the Internal Strategies of ISIS and the Lord's Resistance Army Abstract: A framework for understanding Islamic State of Iraq and al-Sham (ISIS)'s apocalyptic theology as an internal strategy to “coercively radicalize†its captive subjects is presented, by comparison to the Lord's Resistance Army (LRA), which shares key stages of captive indoctrination with ISIS. A violent experience of “entry,†religious rules learned in an “assimilation†process, and millenarian “grand narratives†framing violence as purification, are examined. These stages construct an image of group leaders as divinely endowed with spiritual knowledge and access (i.e., charismatic authority). This can create a sense of dependency on the leaders and their instructions, potentially motivating violent and altruistic behavior from initially unwilling subjects. Journal: Studies in Conflict & Terrorism Pages: 496-521 Issue: 6 Volume: 40 Year: 2017 Month: 6 X-DOI: 10.1080/1057610X.2016.1221256 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1221256 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:6:p:496-521 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1237224_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Louise Kettle Author-X-Name-First: Louise Author-X-Name-Last: Kettle Author-Name: Andrew Mumford Author-X-Name-First: Andrew Author-X-Name-Last: Mumford Title: Terrorist Learning: A New Analytical Framework Abstract: Terrorists learn every day to gain further knowledge on how to achieve their violent objectives. Consequently, understanding terrorist learning forms a crucial part of the fight to counter terrorism. However, while existing literature within terrorism studies has examined a number of different parts of the learning process, there currently fails to exist a comprehensive framework to encompass the learning process as a whole. This article will rectify this oversight by drawing on wider learning literature to develop a new analytical framework for terrorist learning that provides a definition, considers the actors involved and identifies processes and outcomes. Consequently, the full landscape of current and potential research in this important area is revealed. Journal: Studies in Conflict & Terrorism Pages: 523-538 Issue: 7 Volume: 40 Year: 2017 Month: 7 X-DOI: 10.1080/1057610X.2016.1237224 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237224 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:523-538 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1237226_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Maria Rasmussen Author-X-Name-First: Maria Author-X-Name-Last: Rasmussen Title: Terrorist Learning: A Look at the Adoption of Political Kidnappings in Six Countries, 1968–1990 Abstract: This article studies the epidemic of kidnappings across six countries between 1968 and 1990. The goal is to identify those factors that determine the operational decisions made by terrorists. Why and how do terrorists decide to engage in certain types of actions but not others? The article discusses a number of scholarly approaches, and the variables these studies have put forward to explain the decision-making processes within terrorist organizations. The argument made here is that the groups' ideological preferences, strategic analysis, and need to attract media attention did not appear to exert much influence in the terrorists' decision to kidnap. Organizational resources and the nature of the security environment in which the terrorists operated had some bearing. However, kidnappings became attractive when terrorists made a pragmatic evaluation of the reaction by governments and the public and consequently of the costs or benefits of a particular course of action. The decision to carry out a campaign of kidnappings, or to abstain from kidnapping, should be interpreted as clear evidence of terrorist learning. Two types of learning appear to have influenced the adoption of kidnappings: learning by observing others and learning by doing. Journal: Studies in Conflict & Terrorism Pages: 539-556 Issue: 7 Volume: 40 Year: 2017 Month: 7 X-DOI: 10.1080/1057610X.2016.1237226 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237226 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:539-556 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1237222_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Adrian Guelke Author-X-Name-First: Adrian Author-X-Name-Last: Guelke Title: Irish Republican Terrorism: Learning from and Teaching Other Countries Abstract: Violent nationalism in Northern Ireland has drawn inspiration from a tradition of physical-force republicanism that dates back centuries. The consequence has been a strong tendency for Irish republicans to draw on that history as a source of ideas for their conduct of campaigns of violence. However, during Northern Ireland's most recent Troubles from the late 1960s to the 1990s, external influence on the republican movement was evident in some of the tactics adopted and, even more strongly, in the turn toward negotiations. At the same time, Irish republicans have directly assisted other groups from Spain to South Africa in the employment of particular means such as the culvert bomb. But it is more striking that republicans have tended to eschew some of the means that have been widely associated with terrorism elsewhere since the 1960s such as the hijacking of aircraft for the taking of hostages. Transnational influences on Irish nationalists have been greater at the level of political ideas and as a source of legitimization than as a model for their own campaigns. Journal: Studies in Conflict & Terrorism Pages: 557-572 Issue: 7 Volume: 40 Year: 2017 Month: 7 X-DOI: 10.1080/1057610X.2016.1237222 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237222 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:557-572 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1237221_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Paul Gill Author-X-Name-First: Paul Author-X-Name-Last: Gill Title: Tactical Innovation and the Provisional Irish Republican Army Abstract: This article provides an overview of Provisional Irish Republican Army (PIRA) innovations with regards to improvised explosive devices (IEDs). It situates PIRA's tactical innovations within the broad organizational psychology literature focused on the nature and drivers of creativity and innovation. This discussion helps frame the two empirical analyses that follow. The first analysis provides a graphical timeline of PIRA's radical innovations (and their drivers) in relation to IED technology. This helps provide a sense of the specific occasions in which PIRA innovations were numerous and when they were sparse. The second analysis looks at the locations in which PIRA radical innovations debuted. This provides us with an understanding of the specific PIRA units responsible for these innovations. The results demonstrate that while PIRA operations spanned the six counties of Northern Ireland for 29 years, radical IED innovations were conceived, developed, and initially implemented within only two areas of operations for only seven of those years. Journal: Studies in Conflict & Terrorism Pages: 573-585 Issue: 7 Volume: 40 Year: 2017 Month: 7 X-DOI: 10.1080/1057610X.2016.1237221 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237221 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:573-585 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1237225_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: John F. Morrison Author-X-Name-First: John F. Author-X-Name-Last: Morrison Title: Copying to be Different: Violent Dissident Irish Republican Learning Abstract: While the impact of the Troubles retains centrality within much of Northern Irish political life, the spectre of almost daily violence is becoming a more distant memory. Peace has come to the region. In spite of this, however, there are those who wish to maintain the utility of violence to achieve their stated aims. Most dominant among these are the violent dissident republican groups. No longer is their existence solely defined by their desire to bring about a united Ireland. In order to have any opportunity of longevity, they must first legitimize their continued existence, and in turn distance themselves from their former Provisional comrades. This article assesses how groups, such as the Continuity Irish Republican Army (IRA), Óglaigh na hÉireann, and the IRA/New IRA utilize the lessons learned from their Provisional history to differentiate themselves from the politicized dominance of Sinn Féin. This evaluation is carried out through the analysis of interviews with leadership and rank and file members of both political and paramilitary dissident groupings, which is complemented by the analysis of the Violent Dissident Republican events database. These sources are supplemented with the assessment of organizational statements, from 2007 to the present day. The article focuses on violent, and nonviolent, learning. Journal: Studies in Conflict & Terrorism Pages: 586-602 Issue: 7 Volume: 40 Year: 2017 Month: 7 X-DOI: 10.1080/1057610X.2016.1237225 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237225 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:586-602 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1237219_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mia Bloom Author-X-Name-First: Mia Author-X-Name-Last: Bloom Title: Constructing Expertise: Terrorist Recruitment and “Talent Spotting†in the PIRA, Al Qaeda, and ISIS Abstract: The academic literature is divided with regard to whether terrorist recruits are dangerous masterminds, “malevolently creative,†and capable of perpetrating well-planned mass casualty attacks in the heart of European capitals. Or whether they are imbeciles, incapable of carrying out the most basic tasks, who mostly end up blowing themselves up by accident. This duality about the capabilities of terrorists is reflected in analyses of terrorist incidents. In fact, both depictions of terrorist recruits are accurate. Acuity and professionalism are not movement dependent (the same group may attract a variety of recruits) and might, instead, reflect a recruitment cycle that terrorist groups experience—one that alternates between labor-intensive and expertise-intensive periods of recruitment. The phases may shift because of external pressures (periods of territorial expansion/contraction) and opportunities (need for better quality recruits) with associated shifts in how groups use propaganda to attract a different quality of recruit during different periods of time. A possible first step toward hindering terrorist recruitment is to better understand the ways in which terrorist organizations work—where and when they recruit, whom they target, and the different propaganda messages used for selective/targeted recruitment. A clearer picture of the process could provide opportunities to counter a group's appeal, replenish their ranks, and inoculate vulnerable populations against recruitment. Case studies of three different terrorist organizations (Al Qaeda, the Islami State in Iraq and Syria [ISIS], and the Provisional Irish Republican Army [PIRA]) presented here posit that there exists a terrorism “recruitment cycle†that alternates between labor and expertise focus, uses different recruitment strategies and different propaganda messaging depending on this cycle. Journal: Studies in Conflict & Terrorism Pages: 603-623 Issue: 7 Volume: 40 Year: 2017 Month: 7 X-DOI: 10.1080/1057610X.2016.1237219 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237219 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:603-623 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1237228_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rashmi Singh Author-X-Name-First: Rashmi Author-X-Name-Last: Singh Title: A Preliminary Typology Mapping Pathways of Learning and Innovation by Modern Jihadist Groups Abstract: The importance of understanding how terrorist organizations learn and innovate cannot be overstated. Yet there is a remarkable paucity of literature systematically addressing this subject. This article contributes to an evolving conceptualization in this area by proposing a preliminary typology of learning and innovation as undertaken by modern jihadist groups. It identifies and discusses four categories: (a) intergroup learning within a single domestic setting; (b) intergroup learning between two or more local groups across a state or national boundary; (c) intergroup learning between a transnational group and one or more domestic groups; and finally (d) intragroup learning or “self-learning.†Journal: Studies in Conflict & Terrorism Pages: 624-644 Issue: 7 Volume: 40 Year: 2017 Month: 7 X-DOI: 10.1080/1057610X.2016.1237228 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237228 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:624-644 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1221252_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: John G. Horgan Author-X-Name-First: John G. Author-X-Name-Last: Horgan Author-Name: Max Taylor Author-X-Name-First: Max Author-X-Name-Last: Taylor Author-Name: Mia Bloom Author-X-Name-First: Mia Author-X-Name-Last: Bloom Author-Name: Charlie Winter Author-X-Name-First: Charlie Author-X-Name-Last: Winter Title: From Cubs to Lions: A Six Stage Model of Child Socialization into the Islamic State Abstract: Using the Islamic State in Iraq and al-Sham (ISIS) as a case study, we explore the process by which children evolve from novice recruits to fully fledged members of a violent extremist movement. From currently available data, we propose six stages of child socialization to ISIS—Seduction, Schooling, Selection, Subjugation, Specialization, and Stationing. Furthermore, we explore this process in the context of “Community of Practice†(COP) as developed by Wenger and Lave. COP models highlight how newcomers learn and pass through degrees of involvement from the periphery of an organization to the inside. In subsequent research, Hundeide highlighted how “contracts of deep commitment†and “conversion†constitute important social and psychological elements of communities of practice. We regard such qualities as intrinsic to children's involvement in ISIS. We conclude with implications drawn from the disengagement and reintegration experiences of former child soldiers in other contexts. Journal: Studies in Conflict & Terrorism Pages: 645-664 Issue: 7 Volume: 40 Year: 2017 Month: 7 X-DOI: 10.1080/1057610X.2016.1221252 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1221252 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:7:p:645-664 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1237217_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: R. Kim Cragin Author-X-Name-First: R. Kim Author-X-Name-Last: Cragin Author-Name: Phillip Padilla Author-X-Name-First: Phillip Author-X-Name-Last: Padilla Title: Old Becomes New Again: Kidnappings by Daesh and Other Salafi-Jihadists in the Twenty-First Century Abstract: Daesh fighters have taken hostage over 100 foreigners in Syria, Iraq, and elsewhere since 2012. The kidnappings drew international attention in August 2014, when American journalist James Foley was decapitated and a video of his death was posted online. But the pattern of kidnappings and gruesome videos distributed by violent Salafi-jihadists extends back over a decade to the killing of Daniel Pearl in 2002. This article traces shifts in the strategic rationale of Al Qaeda and Daesh for beheading Western hostages. It argues that terrorists altered their calculations on foreign hostages beginning in 2012 and U.S. counterterrorism policy does not take these shifts into account. Journal: Studies in Conflict & Terrorism Pages: 665-683 Issue: 8 Volume: 40 Year: 2017 Month: 8 X-DOI: 10.1080/1057610X.2016.1237217 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1237217 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:8:p:665-683 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1231566_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Arie Perliger Author-X-Name-First: Arie Author-X-Name-Last: Perliger Title: The Role of Civil Wars and Elections in Inducing Political Assassinations Abstract: Political assassinations can dramatically impact political and social dynamics, especially in times of violent political conflicts or electoral competition. The current study explores if and how specific social and political events facilitate the occurrence of political assassinations. After an examination of the logic of political assassinations, a theoretical framework is presented, which explains the role of civil wars and electoral processes as facilitators of different types of political assassinations. The theory is tested via a dataset of political assassinations worldwide between the years 1946–2013. The findings confirm that different sets of structural and contextual factors facilitate assassinations against heads of state, legislators, and leaders of opposition movements/parties. In addition, the findings illustrate the tendency of elections, especially in nonliberal settings and in polarized societies, to facilitate political assassinations rather than to calm the political environment. In contrast, civil wars have a more limited impact on the probability of assassinations, and their intensity and endurance mainly enhance the risk of assassinations of legislators. Journal: Studies in Conflict & Terrorism Pages: 684-700 Issue: 8 Volume: 40 Year: 2017 Month: 8 X-DOI: 10.1080/1057610X.2016.1231566 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1231566 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:8:p:684-700 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1223979_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Elisaveta P. Petkova Author-X-Name-First: Elisaveta P. Author-X-Name-Last: Petkova Author-Name: Stephanie Martinez Author-X-Name-First: Stephanie Author-X-Name-Last: Martinez Author-Name: Jeffrey Schlegelmilch Author-X-Name-First: Jeffrey Author-X-Name-Last: Schlegelmilch Author-Name: Irwin Redlener Author-X-Name-First: Irwin Author-X-Name-Last: Redlener Title: Schools and Terrorism: Global Trends, Impacts, and Lessons for Resilience Abstract: This study characterizes trends in the frequency and characteristics of terrorist attacks in child-serving educational institutions around the world, examining the specific vulnerabilies of children and schools with regard to terrorist violence, as well as the various impacts that violence has on children, communities, and societies. Following the analysis of available data on terrorist attacks against educational institutions, vulnerabilities, and impacts, the study concludes with a discussion of what still needs to be understood in the intersection of child vulnerability and terrorism, and provides recommendations for improving resilience to terrorist attacks against child-serving educational institutions. Journal: Studies in Conflict & Terrorism Pages: 701-711 Issue: 8 Volume: 40 Year: 2017 Month: 8 X-DOI: 10.1080/1057610X.2016.1223979 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1223979 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:8:p:701-711 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1234313_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: René Karpantschof Author-X-Name-First: René Author-X-Name-Last: Karpantschof Author-Name: Flemming Mikkelsen Author-X-Name-First: Flemming Author-X-Name-Last: Mikkelsen Title: The Rise and Transformation of the Radical Right Movement in Denmark, 1980–2015 Abstract: This article examines the rise and subsequent development and transformation of the new radical right movement in Denmark from 1980–2015. The Danish radical right emerged from xenophobic subcultures as a reaction to increasing immigration during the 1980s and evolved into a social movement of nationalist associations, militant skinheads, and neo-Nazis that attempted to conquer the streets. This attempt was met by an antiracist countermovement, which built up a coalition of left-wing militants and moderate political organizations that put a temporary end to the radical right as a social movement during the second half of the 1990s. However, from 2001 national and international circumstances offered new opportunities for the Danish radical right both in the streets and as a parliamentary voice. Journal: Studies in Conflict & Terrorism Pages: 712-730 Issue: 8 Volume: 40 Year: 2017 Month: 8 X-DOI: 10.1080/1057610X.2016.1234313 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1234313 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:8:p:712-730 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1236571_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Vaughan Phillips Author-X-Name-First: Vaughan Author-X-Name-Last: Phillips Title: The Islamic State's Strategy: Bureaucratizing the Apocalypse through Strategic Communications Abstract: To understand the Islamic State's strategy, we have to look at the way the group twins Maoist and post-Maoist strategies, previously considered strategically incompatible. By establishing a state that it claims to embody the Caliphate, it not only gains revenue and resources, but also generates a seductive “brand†with a compelling message that it “sells†via the Internet. This brand, based on Propaganda of the Deed, synergizes its physical and digital activities to create a virtuous circle that is very close to being self-sustaining. As such it represents a new insurgent model that corroborates the News Wars thesis. Journal: Studies in Conflict & Terrorism Pages: 731-757 Issue: 9 Volume: 40 Year: 2017 Month: 9 X-DOI: 10.1080/1057610X.2016.1236571 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1236571 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:9:p:731-757 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1235352_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jeremy D. Mayer Author-X-Name-First: Jeremy D. Author-X-Name-Last: Mayer Author-Name: Naoru Koizumi Author-X-Name-First: Naoru Author-X-Name-Last: Koizumi Title: Is There a Culture or Religion of Torture? International Support for Brutal Treatment of Suspected Terrorists Abstract: Do certain cultures or religions predispose citizens to support the deployment of torture against suspected terrorists? Based on an international survey of 31 different countries, we examine how religion and culture affect respondents' position on torture. We find that at the individual level, the nonreligious are resolutely opposed to torture, and that Christians, Buddhists, Hindus, Jews, and other faiths are more supportive. Among world cultures, Muslim/African cultures are most opposed to the torture of terrorists, while Confucian, English-speaking, and South Asian cultures are the most supportive of it. We also find that the use of torture has less support in countries that are suffering from terrorism, once religion and culture are considered. Journal: Studies in Conflict & Terrorism Pages: 758-771 Issue: 9 Volume: 40 Year: 2017 Month: 9 X-DOI: 10.1080/1057610X.2016.1235352 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1235352 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:9:p:758-771 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1236569_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Isaac Kfir Author-X-Name-First: Isaac Author-X-Name-Last: Kfir Title: Al-Shabaab, Social Identity Group, Human (In)Security, and Counterterrorism Abstract: This article examines the link between human security, social identity, and al-Shabaab. The first section explores how social identity group theory can help explain al-Shabaab's recruitment. The second part focuses on the counterterrorism campaign against al-Shabaab, which involves decapitation, aggressive peacekeeping through a proxy in the shape of the African Union Mission in Somalia, and the role of a domestic de-radicalization program. The article concludes that al-Shabaab's allure is in decline and the group is facing internal turmoil, which makes its overtures toward the Islamic State of Iraq and the Levant very dangerous, as al-Shabaab could act as an effective conduit between the Arabian Peninsula and Africa. Journal: Studies in Conflict & Terrorism Pages: 772-789 Issue: 9 Volume: 40 Year: 2017 Month: 9 X-DOI: 10.1080/1057610X.2016.1236569 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1236569 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:9:p:772-789 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1239430_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daren G. Fisher Author-X-Name-First: Daren G. Author-X-Name-Last: Fisher Author-Name: Alexander A. Meitus Author-X-Name-First: Alexander A. Author-X-Name-Last: Meitus Title: Uprooting or Sowing Violence?: Coca Eradication and Guerrilla Violence in Colombia Abstract: Belligerent nonstate actors including terrorist organizations often exploit illicit economies to fund their activities. In Colombia numerous belligerent groups are involved in illegal narcotics markets. For more than 20 years, the Colombian government has responded with targeted eradication of illicit crops, intending to undermine the groups' sources of revenue while simultaneously disrupting the illicit drug economy. Despite its duration, this policy's effect on guerrilla violence remains unclear. Examining the potential for violent backlash to these tactics, this research note assesses the impact of aerial coca crop eradication in Colombia from 2004–2005 on domestic Colombian guerrilla kidnappings, assassinations, and terrorism. Journal: Studies in Conflict & Terrorism Pages: 790-807 Issue: 9 Volume: 40 Year: 2017 Month: 9 X-DOI: 10.1080/1057610X.2016.1239430 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1239430 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:40:y:2017:i:9:p:790-807 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1266896_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Vita Roy Author-X-Name-First: Vita Author-X-Name-Last: Roy Title: Natural Resource Production and the Risk of Conflict Recurrence Abstract: Do different types of natural resources have varying impacts on the risk of conflict recurrence? Using a classification of high-value natural resources according to their lootability and obstructability, this article develops a framework bridging research on natural resources and conflict recurrence. I find evidence for the destabilizing character of easily lootable resources that is coherent across different conflict data. Non-lootable resources show little robust effects at first sight; but when introducing a measure of obstructability, the analysis uncovers varying effects of obstructable and non-obstructable resources that interact with the mode of conflict termination. Overall, the results underline the importance of attending to the lootability and obstructability dimension of natural resources when researching post-conflict risks in resource endowed states. Journal: Studies in Conflict & Terrorism Pages: 1-23 Issue: 1 Volume: 41 Year: 2018 Month: 1 X-DOI: 10.1080/1057610X.2016.1266896 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1266896 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:1:p:1-23 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1283194_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Victor Asal Author-X-Name-First: Victor Author-X-Name-Last: Asal Author-Name: R. William Ayres Author-X-Name-First: R. William Author-X-Name-Last: Ayres Title: Attention Getters: Diaspora Support for Ethno–Political Organizations in the Middle East Abstract: Why do some ethno-political organizations get support from their diaspora while others do not? There is little analysis that examines why some organizations (both violent and nonviolent) get support. Using data on 112 organizations in the Middle East we examine how factors like the power of the organization, ideology, political behavior, and government treatment might impact the likelihood of an organization getting support from its diaspora. We argue that contentious political behavior should have the largest impact on such support. We find that those that do the best job of getting attention through visible action get the most support. Journal: Studies in Conflict & Terrorism Pages: 24-38 Issue: 1 Volume: 41 Year: 2018 Month: 1 X-DOI: 10.1080/1057610X.2017.1283194 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1283194 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:1:p:24-38 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1266824_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Marion van San Author-X-Name-First: Marion Author-X-Name-Last: van San Title: Belgian and Dutch Young Men and Women Who Joined ISIS: Ethnographic Research among the Families They Left Behind Abstract: Since the end of 2012 a sizeable number of Belgian and Dutch young men and women have joined the armed conflict in Syria. According to recent estimates, there are 632 Belgian and 260 Dutch foreign fighters in Syria. Very little is known about the families these men and women come from. The research on which this article is based comprised ethnographic research among 26 families with at least one member who has left for Syria to join the armed struggle. In addition, former teachers of these youngsters were asked to reflect on their students' actions. The central question of this article is whether or not the families of youngsters who left for Syria played a supporting role in the departure decision and, therefore, the process of radicalization of the young men and women. To answer this question the families' perception of the armed struggle is described. Also discussed are signals of radicalization present prior to the youngsters' departure and actions taken by the families to prevent departure or alternatively facilitate their trip. Journal: Studies in Conflict & Terrorism Pages: 39-58 Issue: 1 Volume: 41 Year: 2018 Month: 1 X-DOI: 10.1080/1057610X.2016.1266824 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1266824 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:1:p:39-58 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1287501_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: John Battersby Author-X-Name-First: John Author-X-Name-Last: Battersby Title: Terrorism Where Terror Is Not: Australian and New Zealand Terrorism Compared Abstract: Despite many commonalities in national security priorities, Australia and New Zealand approach the threat of terrorism quite differently. Both had twentieth-century manifestations of domestic terrorism which were generally downplayed. The emergence of jihadist-inspired threats globally have affected Australia much more than New Zealand, and Australian counterterrorism strategy has developed significantly since 9/11. New Zealand has watched global events so far untouched by any jihadist threat, and has implemented few effective counterterrorism measures. The reasons for the differing experience, it is contended here, are the varying historical perceptions of threat, and consequent differing approaches each country has taken to mitigate perceived threat. Journal: Studies in Conflict & Terrorism Pages: 59-76 Issue: 1 Volume: 41 Year: 2018 Month: 1 X-DOI: 10.1080/1057610X.2017.1287501 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1287501 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:1:p:59-76 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1510881_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bruce Hoffman Author-X-Name-First: Bruce Author-X-Name-Last: Hoffman Title: Michael Sheehan, February 10, 1955-JULY 30, 2018 Journal: Studies in Conflict & Terrorism Pages: 755-756 Issue: 10 Volume: 41 Year: 2018 Month: 10 X-DOI: 10.1080/1057610X.2018.1510881 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1510881 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:10:p:755-756 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1348096_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Seth Cantey Author-X-Name-First: Seth Author-X-Name-Last: Cantey Title: Beyond the Pale? Exploring Prospects for Negotiations with Al Qaeda and the Islamic State Abstract: This article argues that prospects for negotiations with Al Qaeda and the Islamic State have been undertheorized. Drawing on nearly two thousand pages of primary source material— all issues of Inspire and Dabiq magazines published at the time of writing—it examines these groups' statements about their motivations for violence, their objectives, and their views about the possibility of dialogue with the West. It finds stark differences in all three areas and suggests that assumptions that have prevented theorizing about negotiations with these groups should be revisited. Journal: Studies in Conflict & Terrorism Pages: 757-775 Issue: 10 Volume: 41 Year: 2018 Month: 10 X-DOI: 10.1080/1057610X.2017.1348096 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1348096 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:10:p:757-775 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1353355_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Amira Jadoon Author-X-Name-First: Amira Author-X-Name-Last: Jadoon Title: Persuasion and Predation: The Effects of U.S. Military Aid and International Development Aid on Civilian Killings Abstract: Powerful states frequently employ foreign aid to pursue international security objectives. Yet aid's effectiveness will be undermined if it exacerbates the effects of conflict on civilians within recipient states. This article investigates how international development aid and U.S. military aid influence recipient governments' incentives and ability to target civilians. U.S. military aid has a persuasion effect on state actors, which decreases a recipient state's incentives and necessity to target civilians. Development aid flows, however, trigger a predation effect in some environments, exacerbating civilian targeting. An analysis of aid flows in 135 countries on civilian killings between 1989–2011 provides support for both the persuasion and predation effects associated with aid. Journal: Studies in Conflict & Terrorism Pages: 776-800 Issue: 10 Volume: 41 Year: 2018 Month: 10 X-DOI: 10.1080/1057610X.2017.1353355 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1353355 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:10:p:776-800 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1433447_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Karl Kaltenthaler Author-X-Name-First: Karl Author-X-Name-Last: Kaltenthaler Author-Name: Daniel Silverman Author-X-Name-First: Daniel Author-X-Name-Last: Silverman Author-Name: Munqith Dagher Author-X-Name-First: Munqith Author-X-Name-Last: Dagher Title: Identity, Ideology, and Information: The Sources of Iraqi Public Support for the Islamic State Abstract: This article explores the amount and sources of support for the Islamic State among Iraqis. We argue that, in addition to shared identity and ideology, a neglected factor in debates about support for Islamist militancy is the messaging and information that individuals receive about a given group. We test these arguments using regression analysis on public opinion data collected in Iraq in April 2015. The analyses largely support our contentions, showing that exposure to news coverage of the Islamic State in Iraq and the Levant substantially reduces support for the group, even among alienated Sunnis or ideological Islamists. Journal: Studies in Conflict & Terrorism Pages: 801-824 Issue: 10 Volume: 41 Year: 2018 Month: 10 X-DOI: 10.1080/1057610X.2018.1433447 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1433447 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:10:p:801-824 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1348099_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Andreas E. Feldmann Author-X-Name-First: Andreas E. Author-X-Name-Last: Feldmann Title: Revolutionary Terror in the Colombian Civil War Abstract: This article investigates the use of terror in Colombia's civil war by examining the behavior of the Revolutionary Armed Forces of Colombia (FARC) and the National Liberation Army (ELN). Relying on an extensive database covering 25 years of conflict, the article traces the way in which the FARC and ELN have employed terror as part of their overall insurrectional strategy. I argue that, while ideology plays an important role in inspiring revolutionary terrorism, these groups' terror practices evolved over time and were driven principally by military strategies. Changing conditions in the theater of war, particularly growing competition with paramilitary forces, in turn, influenced these strategies. The article also discusses some interesting differences between the two groups' terror practices. Journal: Studies in Conflict & Terrorism Pages: 825-846 Issue: 10 Volume: 41 Year: 2018 Month: 10 X-DOI: 10.1080/1057610X.2017.1348099 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1348099 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:10:p:825-846 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1532175_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bruce Hoffman Author-X-Name-First: Bruce Author-X-Name-Last: Hoffman Title: Walter Laqueur, 26 May 1921–30 September 2018 Journal: Studies in Conflict & Terrorism Pages: 847-849 Issue: 11 Volume: 41 Year: 2018 Month: 11 X-DOI: 10.1080/1057610X.2018.1532175 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1532175 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:11:p:847-849 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1352280_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Elizabeth Pearson Author-X-Name-First: Elizabeth Author-X-Name-Last: Pearson Title: Online as the New Frontline: Affect, Gender, and ISIS-Take-Down on Social Media Abstract: Using a dataset of more than 80 accounts during 2015, this article explores the gendered ways in which self-proclaiming Twitter Islamic State of Iraq and Syria (ISIS) supporters construct community around “suspension.†The article argues that suspension is an integral event in the online lives of ISIS supporters, which is reproduced in online identities. The highly gendered roles of ISIS males and females frame responses to suspension, enforcing norms that benefit the group: the shaming of men into battle and policing of women into modesty. Both male and female members of “Wilayat Twitter†regard online as a frontline, with suspension an act of war against the “baqiya family.†The findings have implications for broader repressive measures against ISIS online. Journal: Studies in Conflict & Terrorism Pages: 850-874 Issue: 11 Volume: 41 Year: 2018 Month: 11 X-DOI: 10.1080/1057610X.2017.1352280 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1352280 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:11:p:850-874 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1348742_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Adam Lankford Author-X-Name-First: Adam Author-X-Name-Last: Lankford Title: A Psychological Re-Examination of Mental Health Problems among the 9/11 Terrorists Abstract: More than 15 years have passed since the terrorist attacks of 11 September 2001, and a comprehensive re-examination of the 9/11 attackers is now warranted. Research on the psychology of terrorists has evolved dramatically, and there is also new information on some offenders. The present study provides the available psychological and psychiatric evidence on each of the 9/11 pilots, muscle hijackers, and thwarted hijackers who intended to participate in the “planes operation.†Overall, findings suggest that the 9/11 terrorists may have had significantly more mental health problems than previously assumed, and the leaders who planned 9/11 personally approved suicide attackers with prior histories of mental illness. By widely publicizing this information, security officials may be able to more effectively delegitimize suicide terrorism and reduce the number of individuals who would consider funding, supporting, or committing these deadly attacks. Journal: Studies in Conflict & Terrorism Pages: 875-898 Issue: 11 Volume: 41 Year: 2018 Month: 11 X-DOI: 10.1080/1057610X.2017.1348742 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1348742 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:11:p:875-898 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1348101_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Simon Perry Author-X-Name-First: Simon Author-X-Name-Last: Perry Author-Name: Badi Hasisi Author-X-Name-First: Badi Author-X-Name-Last: Hasisi Author-Name: Gali Perry Author-X-Name-First: Gali Author-X-Name-Last: Perry Title: Who is the Lone Terrorist? A Study of Vehicle-Borne Attackers in Israel and the West Bank Abstract: Lone actor terrorism has become a significant challenge for Western democracies. Previous studies have failed to point out a comprehensive profile of lone terrorists, and suggested that examining more specific sub-groups of lone actors, sharing contextual factors or ideology, may produce such a profile. The current study examines the sub-group of vehicle-borne lone terrorists, who committed their attacks in Israel and the West Bank between January 2000 and March 2016. Based on confidential and open-source data, we find that general sociodemographic characteristics did not produce a unique profile of attackers. However, a deeper examination of behavioral factors preceding the attack yields common traits. Specifically, we find that previous experience—both in different forms of unlawful behavior and in training related to the attack method—was significantly related to a successful attack. Similarities in regards to the triggers for the attack and personal motivations also emerge, suggesting that while operating independently, lone actors are very much influenced by ongoing events. We conclude that focusing on a sub-group of lone attackers following a spatio-methodological-oriented approach contributes to the construction of a profile for lone terrorists, and discuss these findings in the context of mitigation. Journal: Studies in Conflict & Terrorism Pages: 899-913 Issue: 11 Volume: 41 Year: 2018 Month: 11 X-DOI: 10.1080/1057610X.2017.1348101 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1348101 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:11:p:899-913 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1348100_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Christopher Day Author-X-Name-First: Christopher Author-X-Name-Last: Day Title: Civil War and Rebellion Journal: Studies in Conflict & Terrorism Pages: 914-930 Issue: 11 Volume: 41 Year: 2018 Month: 11 X-DOI: 10.1080/1057610X.2017.1348100 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1348100 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:11:p:914-930 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1361281_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Byman Author-X-Name-First: Daniel Author-X-Name-Last: Byman Title: How States Exploit Jihadist Foreign Fighters Abstract: Jihadist foreign fighters are frequently described as non-state actors whose prominence challenges the traditional, state-dominated international system and our understanding of it. In practice, however, foreign fighters rely heavily on the very states they reject. Some of the most important foreign fighter movements in the world today receive massive and explicit state support, while still others rely on states to tolerate their fund-raising, transit, recruitment, and other core activities. Yet the scope, scale, and nature of this reliance varies tremendously, as does its overall impact. To stop or at least limit these flows, it is vital to change the policies and capacities of these state backers. Journal: Studies in Conflict & Terrorism Pages: 931-945 Issue: 12 Volume: 41 Year: 2018 Month: 12 X-DOI: 10.1080/1057610X.2017.1361281 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1361281 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:12:p:931-945 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1361282_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Andrew Barr Author-X-Name-First: Andrew Author-X-Name-Last: Barr Author-Name: Alexandra Herfroy-Mischler Author-X-Name-First: Alexandra Author-X-Name-Last: Herfroy-Mischler Title: ISIL's Execution Videos: Audience Segmentation and Terrorist Communication in the Digital Age Abstract: This article offers a bottom-up understanding of the media strategy employed by the Islamic State of Iraq and the Levant (ISIL) as it relates to the production and dissemination of its hostage execution videos. Through an empirical analysis of sixty-two videos of executions produced by ISIL in the year following its establishment as the “Islamic State†in 2014, this study examines the videos as a major component of ISIL's media strategy. Through these media products, ISIL seeks to spread a political message aimed at both local and global, ingroup and outgroup consumption through audience segmentation, while striving to influence both local and global audiences through the use and production of graphic violence. This article also discusses the strategy governing the production and release of ISIL's execution videos; how it relies on the global media to transmit its intertwined political and religious agenda in the digital media age. Journal: Studies in Conflict & Terrorism Pages: 946-967 Issue: 12 Volume: 41 Year: 2018 Month: 12 X-DOI: 10.1080/1057610X.2017.1361282 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1361282 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:12:p:946-967 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1365464_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Iwa Salami Author-X-Name-First: Iwa Author-X-Name-Last: Salami Title: Terrorism Financing with Virtual Currencies: Can Regulatory Technology Solutions Combat This? Abstract: This article considers the terrorism financing risk associated with the growth of Financial Technology innovations and in particular, focuses on virtual currency products and services. The ease with which cross-border payments by virtual currencies are facilitated, the anonymity surrounding their usage, and their potential to be converted into the fiat financial system, make them ideal for terrorism financing and therefore calls for a coordinated global regulatory response. This article considers the extent of the risk of terrorism financing through virtual currencies in “high risk†States by focusing on countries that have been recently associated with terrorism activities. It assesses the robustness of their financial regulatory and law enforcement regimes in combating terrorism financing and considers the extent to which Regulatory Technology and its global standardization, can mitigate this risk. Journal: Studies in Conflict & Terrorism Pages: 968-989 Issue: 12 Volume: 41 Year: 2018 Month: 12 X-DOI: 10.1080/1057610X.2017.1365464 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1365464 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:12:p:968-989 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1366621_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anne Marie Baylouny Author-X-Name-First: Anne Marie Author-X-Name-Last: Baylouny Author-Name: Creighton A. Mullins Author-X-Name-First: Creighton A. Author-X-Name-Last: Mullins Title: Cash is King: Financial Sponsorship and Changing Priorities in the Syrian Civil War Abstract: The role of resources in war has been much debated. What happens when foreign patrons provide lavish amounts of cash to rebels, without mechanisms of accountability? This article analyzes three major sources of funding and their micro-level effects on insurgent-groups in the Syrian civil war. Recipients of funding demonstrated opportunism in actions, alliances, and ideologies, directly related to the funding source. Funders thus set the agenda of the war, promoting Islamist ideologies and regional over local issues. Private donors rivaled state sponsors, in what may be a harbinger of future globalization trends. Journal: Studies in Conflict & Terrorism Pages: 990-1010 Issue: 12 Volume: 41 Year: 2018 Month: 12 X-DOI: 10.1080/1057610X.2017.1366621 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1366621 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:12:p:990-1010 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1249773_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David McIlhatton Author-X-Name-First: David Author-X-Name-Last: McIlhatton Author-Name: Rachel Monaghan Author-X-Name-First: Rachel Author-X-Name-Last: Monaghan Title: Special Issue: Contemporary Issues and Innovation in Counterterrorism Journal: Studies in Conflict & Terrorism Pages: 77-78 Issue: 2 Volume: 41 Year: 2018 Month: 2 X-DOI: 10.1080/1057610X.2016.1249773 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1249773 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:2:p:77-78 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1249780_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nicholas Ryder Author-X-Name-First: Nicholas Author-X-Name-Last: Ryder Title: Out with the Old and … In with the Old? A Critical Review of the Financial War on Terrorism on the Islamic State of Iraq and Levant Abstract: The aim of this article is to critically consider the effectiveness of the “Financial War on Terrorism†on the funding streams of the Islamic State of Iraq and Levant (ISIL). The article begins by identifying that the origins of the “Financial War on Terrorism†can be found in the international efforts to tackle money laundering. It then moves on to consider if the “Financial War on Terrorism†is able to tackle the funding streams of ISIL. The article concludes that the “Financial War on Terrorism†is no longer fit for the purpose to tackle the funding streams of ISIL. Journal: Studies in Conflict & Terrorism Pages: 79-95 Issue: 2 Volume: 41 Year: 2018 Month: 2 X-DOI: 10.1080/1057610X.2016.1249780 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1249780 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:2:p:79-95 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1249779_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matt Qvortrup Author-X-Name-First: Matt Author-X-Name-Last: Qvortrup Title: The Logic of Constitutional Engineering: Institutional Design and Counterterrorism from Aristotle to Arend Lijphart Abstract: Originally conceived by Aristotle and Thomas Hobbes, comparative constitutional engineering in its modern form is a relatively new field of political science. It is based on the premise that political behavior and policy outcomes can be affected and shaped by institutional design such as, above all, electoral systems. The article provides an overview of the empirical literature underlying this branch of institutional counterterrorism. The article presents the logic of constitutional engineering from its classical origins and especially through the work of Arend Lijphart. It is suggested that Lijphart provides a new paradigm in the sense employed by Thomas Kuhn. The article provides original research in support of this showing that the presence of consensus institutions has better explanatory value than most social factors. Journal: Studies in Conflict & Terrorism Pages: 96-108 Issue: 2 Volume: 41 Year: 2018 Month: 2 X-DOI: 10.1080/1057610X.2016.1249779 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1249779 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:2:p:96-108 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1249775_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stefano Armenia Author-X-Name-First: Stefano Author-X-Name-Last: Armenia Author-Name: Georgios Tsaples Author-X-Name-First: Georgios Author-X-Name-Last: Tsaples Title: Individual Behavior as a Defense in the “War on Cyberterrorâ€: A System Dynamics Approach Abstract: The problem of cyberterrorism, despite its contested nature, is an important area of research. Scholars agree that the most dangerous targets for such attacks are critical infrastructure and organizations that are vital to society due to their interconnectedness to the modern world and their increasing reliance on the cyber domain for their operations. Thus, their security and protection against cyberterrorism is of elevated importance. Given the lack of documented cases of cyberterrorism, the purpose of this article is to simulate the threat of a terrorist act on a critical infrastructure, using a computer virus and to investigate how the individual behavior of employees affects security. Journal: Studies in Conflict & Terrorism Pages: 109-132 Issue: 2 Volume: 41 Year: 2018 Month: 2 X-DOI: 10.1080/1057610X.2016.1249775 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1249775 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:2:p:109-132 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1249776_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David BaMaung Author-X-Name-First: David Author-X-Name-Last: BaMaung Author-Name: David McIlhatton Author-X-Name-First: David Author-X-Name-Last: McIlhatton Author-Name: Murdo MacDonald Author-X-Name-First: Murdo Author-X-Name-Last: MacDonald Author-Name: Rona Beattie Author-X-Name-First: Rona Author-X-Name-Last: Beattie Title: The Enemy Within? The Connection between Insider Threat and Terrorism Abstract: While the threat from terrorism has gained widespread acknowledgment over the last decade, the infiltration of organizations by “terrorist†insiders has not, and the potential dangers these individuals present has not been fully explored. There is a need to understand the wider aspects of insider threats, including motivations and attack methodologies, and to be able to demonstrate the potential devastation that could be caused. Organizations can attempt to mitigate the potential for insider infiltration by both terrorist and other hostile actors, and if such individuals were within an organization, there are procedures and strategies that can be employed to prevent exploitation of existing organizational vulnerabilities and detection of insiders. This article provides an informed and new approach to the connection between insider threat and terrorism. Journal: Studies in Conflict & Terrorism Pages: 133-150 Issue: 2 Volume: 41 Year: 2018 Month: 2 X-DOI: 10.1080/1057610X.2016.1249776 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1249776 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:2:p:133-150 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1249777_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joan Condell Author-X-Name-First: Joan Author-X-Name-Last: Condell Author-Name: Priyanka Chaurasia Author-X-Name-First: Priyanka Author-X-Name-Last: Chaurasia Author-Name: James Connolly Author-X-Name-First: James Author-X-Name-Last: Connolly Author-Name: Patheepan Yogarajah Author-X-Name-First: Patheepan Author-X-Name-Last: Yogarajah Author-Name: Girijesh Prasad Author-X-Name-First: Girijesh Author-X-Name-Last: Prasad Author-Name: Rachel Monaghan Author-X-Name-First: Rachel Author-X-Name-Last: Monaghan Title: Automatic Gait Recognition and its Potential Role in Counterterrorism Abstract: Closed-circuit television footage can be used to assemble an often-complex picture of an incident and aid in the identification of suspects after a crime or terrorist attack has occurred. For example, such footage allowed the police to not only identify the 7/7 London bombers but also to piece together the details of the bombers' movements prior to the attack. In the case of the London bombers little attempt was made to disguise their identities but where such identities are concealed it is possible to identify suspects based on other unique biometric characteristics such as the style of walk, referred to as gait. Gait feature–based individual identification has received increased attention from biometrics researchers. In this article, we propose a novel gait biometric methodology that could contribute to the counterterrorism effort and the identification of individuals involved in crime. Journal: Studies in Conflict & Terrorism Pages: 151-168 Issue: 2 Volume: 41 Year: 2018 Month: 2 X-DOI: 10.1080/1057610X.2016.1249777 File-URL: http://hdl.handle.net/10.1080/1057610X.2016.1249777 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:2:p:151-168 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1283198_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Meirav Mishali-Ram Author-X-Name-First: Meirav Author-X-Name-Last: Mishali-Ram Title: Foreign Fighters and Transnational Jihad in Syria Abstract: Foreign fighters arrive in Syria from across the Muslim world, yet the configuration of their countries of origin remains a puzzle. Examining alternative explanations for joining transnational jihad, the article draws insights from the cases of Tunisia and Saudi Arabia, two major countries of foreign fighters' origin, compared with Egypt, from where limited figures of volunteers have joined the Syrian war. The article shows that the sources of volunteering fighters may be well understood in combined terms of religious sentiments and national politics. Foreign fighters come largely from Muslim countries where restrained state–Islamists relations channel Islamic grievances to transnational arenas. Journal: Studies in Conflict & Terrorism Pages: 169-190 Issue: 3 Volume: 41 Year: 2018 Month: 3 X-DOI: 10.1080/1057610X.2017.1283198 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1283198 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:3:p:169-190 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1283197_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joas Wagemakers Author-X-Name-First: Joas Author-X-Name-Last: Wagemakers Title: Jihadi-Salafism in Jordan and the Syrian Conflict: Divisions Overcome Unity Abstract: Over the last decade, a rift has emerged among Jihadi-salafis in Jordan between the “Zarqawiyyunâ€â€”who see Abu Mus‘ab al-Zarqawi as their model and concentrate on combat—and the “Maqdisiyyunâ€â€”who want more scholarly guidance, emphasize the establishment of an Islamic State and follow Abu Muhammad al-Maqdisi. The conflict in Syria, however, offered options for both: a jihad against a reviled regime and the possibility to set up an Islamic state. It thus had the potential to unite the “Zarqawiyyun†and the “Maqdisiyyun.†This article analyzes why this did not happen. Journal: Studies in Conflict & Terrorism Pages: 191-212 Issue: 3 Volume: 41 Year: 2018 Month: 3 X-DOI: 10.1080/1057610X.2017.1283197 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1283197 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:3:p:191-212 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1283195_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Isabel Woodford Author-X-Name-First: Isabel Author-X-Name-Last: Woodford Author-Name: M. L. R. Smith Author-X-Name-First: M. L. R. Author-X-Name-Last: Smith Title: The Political Economy of the Provos: Inside the Finances of the Provisional IRA—A Revision Abstract: Few academically rigorous accounts exist of the financial activities that sustained the rise of the Provisional Irish Republican Army (PIRA) during the Northern Ireland Troubles. Through a sustained methodology this study seeks to challenge some popular preconceptions and address omissions in the limited historical record. The article explores the organization's evolving financial sophistication by analyzing PIRA's acquisition of capital rather than its arms dealings. Using a new quantitative evaluation, this investigation confronts the prevailing understanding that Irish-American funds were of unrivaled significance to PIRA. It points to an array of domestic fund-raisers that collectively provided the overwhelming bulk of revenue. The study reveals also how PIRA developed an extensive reliance on criminal gangs for its expertise in illegal fund-raising, suggesting that moneymaking schemes were perceived as a necessary but unpopular by-product of the greater political objective. Finally, this article briefly explores how the British authorities sought to interdict PIRA's funding. While the general perception is that little was done to counteract PIRA's financing initiatives in the early phases of its violent campaign, this study, nevertheless, reveals that a subtle counterfinance initiative did take place in Belfast across the 1970s. Overall, the analysis enables a more rounded comprehension of the group's financial resilience. Journal: Studies in Conflict & Terrorism Pages: 213-240 Issue: 3 Volume: 41 Year: 2018 Month: 3 X-DOI: 10.1080/1057610X.2017.1283195 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1283195 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:3:p:213-240 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1283196_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anna Getmansky Author-X-Name-First: Anna Author-X-Name-Last: Getmansky Author-Name: Tolga Sinmazdemir Author-X-Name-First: Tolga Author-X-Name-Last: Sinmazdemir Title: Settling on Violence: Expansion of Israeli Outposts in the West Bank in Response to Terrorism Abstract: How does terrorism affect land control in intrastate conflicts? This article explores this question in the case of the Israeli–Palestinian conflict during the Second Intifada (2000–2005), and shows that Palestinian attacks led to an expansion of Israeli outposts in the disputed territories of the West Bank. Following suicide attacks, there is an increase in outposts in home districts of the perpetrators. The number of outposts also increases following deadly attacks against Israelis in West Bank districts where these attacks take place. These results suggest that Israeli settlers use outpost expansion as retaliation against Palestinian communities they perceive to be involved in violence, and this shifts territorial control against Palestinians. Journal: Studies in Conflict & Terrorism Pages: 241-259 Issue: 3 Volume: 41 Year: 2018 Month: 3 X-DOI: 10.1080/1057610X.2017.1283196 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1283196 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:3:p:241-259 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1290428_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gary LaFree Author-X-Name-First: Gary Author-X-Name-Last: LaFree Author-Name: Min Xie Author-X-Name-First: Min Author-X-Name-Last: Xie Author-Name: Aila M. Matanock Author-X-Name-First: Aila M. Author-X-Name-Last: Matanock Title: The Contagious Diffusion of Worldwide Terrorism: Is It Less Common Than We Might Think? Abstract: Studies of the contagious spread of insurgency and conflict across national boundaries has generated a good deal of empirical research over time. While the contagious spread of terrorism has also been a policy concern, few empirical studies exist on the extent to which terrorism spreads contagiously. This article uses methods developed by criminologists to study the spread of crime to examine the worldwide diffusion of terrorism from 1970 to 2013. We distinguish between contagious increases (based on shared borders) and non-contagious increases (where no borders are shared). We define the “domino effect†as a particular type of contagious diffusion where high levels of terrorism spread to an adjoining country but also remain high in the host country. Our analysis shows that both contagious and non-contagious diffusion has been rare over the past 43 years, non-contagious diffusion is more common than contagious, and when contagious diffusion occurs, it is very likely to occur according to the domino effect. Journal: Studies in Conflict & Terrorism Pages: 261-280 Issue: 4 Volume: 41 Year: 2018 Month: 4 X-DOI: 10.1080/1057610X.2017.1290428 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1290428 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:4:p:261-280 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1284447_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: William Adair Davies Author-X-Name-First: William Adair Author-X-Name-Last: Davies Title: Counterterrorism Effectiveness to Jihadists in Western Europe and the United States: We Are Losing the War on Terror Abstract: A comparative analysis of Islamic extremism post-9/11 to 2015 and the effectiveness of the counterterrorism (CT) authorities to counter it in both Western Europe and the United States was conducted. Four measures of effectiveness revealed that 2010–2015 saw a gradual increase in jihadi attacks and in casualties emanating from these attacks, and more jihadists, foreign fighters, and material supporters. Additionally, 2013–2015 saw a 22 percent reduction both in Western Europe and the U.S. CT agencies' ability to counter Islamic extremism. We are losing the War on Terror and our citizens are less safe than they were six years ago. Further analysis revealed that singleton jihadists: (1) were much harder than group-based jihadists to uncover, (2) have been increasing since 2009, and (3) have generated over 70 percent of all jihadi violence. Finally, numerous similarities exist between Western Europe and the United States with respect to jihadism in their homelands and their respective CT effectiveness, indicating close cross-Atlantic CT collaboration since 9/11. This in-depth analysis provides essential threat/hazard information to security, law enforcement, intelligence, and policymaking personnel and the greater homeland security communities. Journal: Studies in Conflict & Terrorism Pages: 281-296 Issue: 4 Volume: 41 Year: 2018 Month: 4 X-DOI: 10.1080/1057610X.2017.1284447 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1284447 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:4:p:281-296 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1283199_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Or Honig Author-X-Name-First: Or Author-X-Name-Last: Honig Author-Name: Ariel Reichard Author-X-Name-First: Ariel Author-X-Name-Last: Reichard Title: Evidence-Fabricating in Asymmetric Conflicts: How Weak Actors Prove False Propaganda Narratives Abstract: As part of their common efforts to undermine public support for their militarily-stronger adversaries' war efforts, insurgents and other militarily weak actors often accuse governments of fighting in a brutal manner and of committing brutal acts such as deliberately targeting innocent civilians. While sometimes there is sufficient evidence to support this claim of the government's deliberate brutality, other times militarily-weak actors will lack sufficient evidence to support this allegation. In such situation of lack of evidence, instead of making only those minimal allegations which can still be support by existing available facts, some weak actors decide nevertheless to make unsubstantiated claims and resort to fabricating the necessary evidence. This behavior presents a challenge not only for many counterinsurgent governments but also for the larger international community (most notably by diverting attention away from real atrocities). We identify some of the most common evidence-forging techniques recently employed by weak actors designed to create the factual basis to support of their chosen (often false) narratives of government brutality. The study also discusses some implications for international actors to prevent rewarding faking of atrocities. Journal: Studies in Conflict & Terrorism Pages: 297-318 Issue: 4 Volume: 41 Year: 2018 Month: 4 X-DOI: 10.1080/1057610X.2017.1283199 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1283199 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:4:p:297-318 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1284448_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Pamir H. Sahill Author-X-Name-First: Pamir H. Author-X-Name-Last: Sahill Title: The Terror Speaks: Inside Pakistan's Terrorism Discourse and National Action Plan Abstract: This article, employing a poststructuralist Critical Discourse Analysis, reveals cracks, discrepancies, and inconsistencies in Pakistan's discourse on terrorism and practice. I argue that Pakistan continuously constructs a “monstrous enemy†and magnifies it in a way that conceals alternative representations of reality that could show that the state, by presenting itself as a victim of terrorism, is using phenomena of political violence to serve its political objectives inside and outside the boundaries of the state. The article argues that after a militant attack on a school in northwest Pakistan, critical, liberal, and dissenting narratives mingled with the dominant state discourse in a fashion that strengthen illiberal practices in the country, thus undermining the ideals of democracy. Journal: Studies in Conflict & Terrorism Pages: 319-337 Issue: 4 Volume: 41 Year: 2018 Month: 4 X-DOI: 10.1080/1057610X.2017.1284448 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1284448 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:4:p:319-337 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1314653_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Eran Shor Author-X-Name-First: Eran Author-X-Name-Last: Shor Author-Name: Leonardo Baccini Author-X-Name-First: Leonardo Author-X-Name-Last: Baccini Author-Name: Chi-Ting Tsai Author-X-Name-First: Chi-Ting Author-X-Name-Last: Tsai Author-Name: Tai-Ho Lin Author-X-Name-First: Tai-Ho Author-X-Name-Last: Lin Author-Name: Titus C. Chen Author-X-Name-First: Titus C. Author-X-Name-Last: Chen Title: Counterterrorist Legislation and Respect for Civil Liberties: An Inevitable Collision? Abstract: The literature on counterterrorist measures often emphasizes the potential harmful effects of such measures on human rights and civil liberties. While recent research has examined the effects of counterterrorist legislation on the violation of physical integrity rights (e.g., torture and extrajudicial killings), no quantitative cross-national study has looked at the consequences for civil liberties. Still, case studies in a variety of countries suggest that counterterrorist legislation indeed leads to various infringements of liberties such as the freedoms of expression, religion, assembly, and movement. We conduct a cross-national time series analysis of counterterrorist legislation and consequent repression of civil liberties for the years 1976–2009. We find that the effects of legislation vary by levels of initial repression. Legislation has a negative effect on respect for civil liberties in countries with moderate levels of repression. However, this effect diminishes in non-repressive countries and reverses in countries with high levels of repression. Journal: Studies in Conflict & Terrorism Pages: 339-364 Issue: 5 Volume: 41 Year: 2018 Month: 5 X-DOI: 10.1080/1057610X.2017.1314653 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1314653 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:5:p:339-364 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1290429_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael J. Suttmoeller Author-X-Name-First: Michael J. Author-X-Name-Last: Suttmoeller Author-Name: Steven M. Chermak Author-X-Name-First: Steven M. Author-X-Name-Last: Chermak Author-Name: Joshua D. Freilich Author-X-Name-First: Joshua D. Author-X-Name-Last: Freilich Title: Is More Violent Better? The Impact of Group Participation in Violence on Group Longevity for Far-Right Extremist Groups Abstract: Recent research has begun to explore the causes of organizational death for domestic far-right extremist groups. An important aspect that has not been examined is whether or not a group's participation in violence influences its longevity. This study addresses this gap in the literature by examining over 400 domestic far-right extremist groups that persisted for varying lengths of time to determine whether or not group participation in violence influences their longevity. Additionally, this study also examines whether a variety of external (environmental) and internal correlates influence the longevity of violent and nonviolent groups differently. Journal: Studies in Conflict & Terrorism Pages: 365-387 Issue: 5 Volume: 41 Year: 2018 Month: 5 X-DOI: 10.1080/1057610X.2017.1290429 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1290429 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:5:p:365-387 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1300758_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Annegret Kuhn Author-X-Name-First: Annegret Author-X-Name-Last: Kuhn Title: Explaining Ethnic Mobilization against Resource Extraction: How Collective Action Frames, Motives, and Opportunities Interact Abstract: The causal mechanisms linking natural resources and ethnic mobilization remain highly contested in the literature. Using novel data generated from interviews with ethnic representatives in Bolivia, the article addresses this research gap by combining a most similar systems design comparison of two local cases with a deviant case analysis. Results indicate that while resource-related grievances are a necessary motive for contention in terms of resource extraction, they have to concur with opportunity factors in the sense of strong local organizational capacities. Both explanatory conditions are, moreover, necessarily embedded in contentious collective action frames of a noncompliant and discriminatory state. Journal: Studies in Conflict & Terrorism Pages: 388-407 Issue: 5 Volume: 41 Year: 2018 Month: 5 X-DOI: 10.1080/1057610X.2017.1300758 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1300758 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:5:p:388-407 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1300757_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mohammad E. A. Alqattan Author-X-Name-First: Mohammad E. A. Author-X-Name-Last: Alqattan Author-Name: Tim Gray Author-X-Name-First: Tim Author-X-Name-Last: Gray Author-Name: Selina M. Stead Author-X-Name-First: Selina M. Author-X-Name-Last: Stead Title: The Forgotten Pirates: Iraqi and Iranian Pirates in the Arabian Gulf Who Have Never Been Reported to the International Maritime Bureau Abstract: If piracy attacks are unreported, a misleading impression is given of piracy situations in regions where there could be serious consequences for ships traveling in waterways on the assumption that they are piracy-free waters. However, sometimes not reporting piracy attacks could help to contain piracy before it expands, because reporting can lead to the media over-focusing on piratical incidents, and armed guards being deployed on ships, which causes pirates to use heavier arms and escalates the level of conflict. Piracy that took place during 2003–2012 in the north and the center of the Arabian Gulf has never been reported to the International Maritime Bureau. The present article examines this case of unreporting, and discusses its causes and consequences. Journal: Studies in Conflict & Terrorism Pages: 408-417 Issue: 5 Volume: 41 Year: 2018 Month: 5 X-DOI: 10.1080/1057610X.2017.1300757 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1300757 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:5:p:408-417 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1325649_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Marco Nilsson Author-X-Name-First: Marco Author-X-Name-Last: Nilsson Title: Interviewing Jihadists: On the Importance of Drinking Tea and Other Methodological Considerations Abstract: The field of terrorism research has arguably long been characterized by a separation of the scholars from their subject of inquiry. Interviews can be used to bridge this chasm, but making contact with potential interviewees, conducting interviews, and analyzing the data pose unique challenges when conducting research into jihadists, especially active ones. This article focuses on the author's experience of interviewing both former and active jihadi foreign fighters. It is specifically intended to contribute to a better methodological understanding of conducting first-hand empirical research into jihadi foreign fighters and builds on fieldwork conducted in Sweden, Iraq, and Lebanon. Journal: Studies in Conflict & Terrorism Pages: 419-432 Issue: 6 Volume: 41 Year: 2018 Month: 6 X-DOI: 10.1080/1057610X.2017.1325649 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1325649 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:6:p:419-432 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1323467_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Debra Smith Author-X-Name-First: Debra Author-X-Name-Last: Smith Title: So How Do You Feel about That? Talking with Provos about Emotion Abstract: Participation in political violence draws on identities and world views that have been shaped and influenced by emotion. This article uses data drawn from interviews conducted with 15 former members of the Provisional Irish Republican Army to highlight some of the ways that emotion is intertwined with decisions to use violence in pursuit of a substate political goal. Six themes emerge that help to demonstrate how participant's emotional lives have helped to build the identities, beliefs, and motivations that have led to violent acts. The study illuminates how the experience, elicitation, and management of emotions played an integral role in the participant's trajectory towards violence. Journal: Studies in Conflict & Terrorism Pages: 433-449 Issue: 6 Volume: 41 Year: 2018 Month: 6 X-DOI: 10.1080/1057610X.2017.1323467 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1323467 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:6:p:433-449 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1323469_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lukáš Tichý Author-X-Name-First: Lukáš Author-X-Name-Last: Tichý Author-Name: Jan Eichler Author-X-Name-First: Jan Author-X-Name-Last: Eichler Title: Terrorist Attacks on the Energy Sector: The Case of Al Qaeda and the Islamic State Abstract: The article focuses on the attitudes of two militant Islamist groups, Al Qaeda and the Islamic State, toward the issue of terrorist attacks in the energy sector. The main aim of the article is both to analyze the importance of attacks on energy infrastructure for the strategies of these two organizations, and to describe specific examples and manifestations of terrorist activities from the side of Al Qaeda and the Islamic State with regard to the energy sector in the Middle East and North Africa. The article is based on the concept of terrorist attacks on the energy sector. Journal: Studies in Conflict & Terrorism Pages: 450-473 Issue: 6 Volume: 41 Year: 2018 Month: 6 X-DOI: 10.1080/1057610X.2017.1323469 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1323469 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:6:p:450-473 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1323468_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gaetano Joe Ilardi Author-X-Name-First: Gaetano Joe Author-X-Name-Last: Ilardi Title: A Homegrown Terrorist Cell: Observations of a Police Undercover Operative Abstract: On 10 October 2004, an improvised explosive device was detonated in bush land in the vicinity of Mount Disappointment on the outskirts of Melbourne, Australia. A relatively small device, it was assembled and detonated by one of the two men present, a Victoria Police officer and undercover operative known as Security Intelligence Officer 39, or SIO39. The other person was the leader of a homegrown terrorist cell, who in the months preceding had assembled a group of a dozen individuals who became the subject of Australia's largest counterterrorism investigation known as Operation Pendennis. This article, which is based on in-depth interviews with SIO39, provides unique insights into a range of activities and behaviors peculiar to this cohort. Commencing his association with the group early in its development, SIO39 was privy to some of its key evolutionary stages, from a collection of individuals meeting more or less in the open, to a clandestine body that clearly harbored terrorist intent and undertook a number of overt acts to advance its violent objectives. Journal: Studies in Conflict & Terrorism Pages: 474-490 Issue: 6 Volume: 41 Year: 2018 Month: 6 X-DOI: 10.1080/1057610X.2017.1323468 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1323468 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:6:p:474-490 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1311101_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Javier Argomaniz Author-X-Name-First: Javier Author-X-Name-Last: Argomaniz Author-Name: Orla Lynch Author-X-Name-First: Orla Author-X-Name-Last: Lynch Title: Introduction to the Special Issue: The Complexity of Terrorism—Victims, Perpetrators and Radicalization Abstract: This special issue examines the complex relationship between radicalization, victimhood. and political violence. The interrelatedness of victims and perpetrators has been long recognized in the fields of criminology and victimology but it is has been often ignored in the case of terrorism and political violence. The key aim of this issue therefore is to assist in enhancing our understanding of this interrelatedness with a particular focus on the relevance of narratives, roles, and identities of victimhood for both the victims and perpetrators. A second, more policy-relevant dimension is to examine the role of victims and perpetrators in the prevention of terrorism and political violence. Journal: Studies in Conflict & Terrorism Pages: 491-506 Issue: 7 Volume: 41 Year: 2018 Month: 7 X-DOI: 10.1080/1057610X.2017.1311101 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311101 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:491-506 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1311102_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Carmel Joyce Author-X-Name-First: Carmel Author-X-Name-Last: Joyce Author-Name: Orla Lynch Author-X-Name-First: Orla Author-X-Name-Last: Lynch Title: The Construction and Mobilization of Collective Victimhood by Political Ex-Prisoners in Northern Ireland Abstract: This article attempts to challenge binary notions of “victim†and “perpetrator†categories by taking into account the complex interaction of actors who both participate in, and are impacted by, terrorist violence. Semi-structured interviews were conducted with self-identified Republican (n = 25) and Loyalist (n = 27) ex-prisoners in Northern Ireland who are currently involved in self-described peace initiatives. Results suggest that political ex-prisoners evoke notions of collective victimization as a vehicle to bridge their transition from “paramilitary†to “peace maker†in this context. The implications are discussed in terms of understanding the functionality of collective victimhood for those who controversially adopt the label. Journal: Studies in Conflict & Terrorism Pages: 507-522 Issue: 7 Volume: 41 Year: 2018 Month: 7 X-DOI: 10.1080/1057610X.2017.1311102 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311102 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:507-522 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1311107_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Douglas Weeks Author-X-Name-First: Douglas Author-X-Name-Last: Weeks Title: Doing Derad: An Analysis of the U.K. System Abstract: Since 2005, Britain has utilized a handful of interventionists to engage with those at risk of violent extremism and those convicted of terrorism related charges in order to manage its risk of terrorism. The goal of the interventionists is to “deradicalize†those that they interact with to facilitate their reintegration in society. This article discusses the mentoring environment in the United Kingdom, how intervention providers establish their credibility with individuals, communities, and government, some of the structural safeguards and their impact on mentoring, how success is conceived, and the absence of reporting. Journal: Studies in Conflict & Terrorism Pages: 523-540 Issue: 7 Volume: 41 Year: 2018 Month: 7 X-DOI: 10.1080/1057610X.2017.1311107 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311107 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:523-540 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1311110_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Antony Pemberton Author-X-Name-First: Antony Author-X-Name-Last: Pemberton Author-Name: Pauline G. M. Aarten Author-X-Name-First: Pauline G. M. Author-X-Name-Last: Aarten Title: Narrative in the Study of Victimological Processes in Terrorism and Political Violence: An Initial Exploration Abstract: Narrative is intimately connected to victimization and radicalization. Trouble, the notion that drives narrative, is often coupled with victimization: the experience of suffering intentional harm. This experience can play a turning point in the stories that radicals construct about their own lives and thus play a role in their pathway to radicalization. In this article, three main themes of narrative will be further explored in relation to victimization and radicalization: identity, emotions, and culture. Central in this article is the discussion on how narrative can contribute to theory and research into victimological processes in radicalization, while offering new means to further develop key constructs. Journal: Studies in Conflict & Terrorism Pages: 541-556 Issue: 7 Volume: 41 Year: 2018 Month: 7 X-DOI: 10.1080/1057610X.2017.1311110 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311110 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:541-556 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1311111_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Pauline G. M. Aarten Author-X-Name-First: Pauline G. M. Author-X-Name-Last: Aarten Author-Name: Eva Mulder Author-X-Name-First: Eva Author-X-Name-Last: Mulder Author-Name: Antony Pemberton Author-X-Name-First: Antony Author-X-Name-Last: Pemberton Title: The Narrative of Victimization and Deradicalization: An Expert View Abstract: While the study of victimology and radicalization mainly focuses on those who suffered from terrorist attacks, this article explores the role of victimological processes in deradicalization. Experts from different international deradicalization initiatives were interviewed. Using the narrative framework with its three key concepts—identity, emotion, and culture—as set forth by Pemberton and Aarten in this issue, the relationship between victimization and deradicalization is more thoroughly examined. Key findings include the delicacy of the term “victim†in radicals' narrative identity, the power of narrative in triggering and transmitting emotions, and the importance of a former radical that acknowledges the narratives of the radical and offers alternative narratives to their radicalized ideologies. Journal: Studies in Conflict & Terrorism Pages: 557-572 Issue: 7 Volume: 41 Year: 2018 Month: 7 X-DOI: 10.1080/1057610X.2017.1311111 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311111 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:557-572 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1311113_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Javier Argomaniz Author-X-Name-First: Javier Author-X-Name-Last: Argomaniz Title: A Battle of Narratives: Spanish Victims Organizations International Action to Delegitimize Terrorism and Political Violence Abstract: Spanish victims groups have provided a visible contribution to European terrorist violence prevention efforts. Instrumental and knowledge transfer motivations partly explain this interest but a separate driver that requires more attention is their opposition to the international narrative that legitimizes Euskadi Ta Askatasuna's violence promulgated by the political movement of the Basque Patriotic Left. This has resulted in a “battle of narratives†played out at the international level in order to shape the future of Basque politics where victims are challenging a discourse that frames the past in a way that justifies terrorism and that leaves the door open to a future return to violence. Journal: Studies in Conflict & Terrorism Pages: 573-588 Issue: 7 Volume: 41 Year: 2018 Month: 7 X-DOI: 10.1080/1057610X.2017.1311113 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311113 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:573-588 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1311114_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Max Taylor Author-X-Name-First: Max Author-X-Name-Last: Taylor Title: Rebalancing the Agenda Abstract: In welcoming the recognition that victimization through terrorism is a significant factor in our thinking about terrorism, a case is made for greater engagement of Civil Society, through nongovernmental organizations, in the development of policy in this area. It argues for a rebalancing of policy toward the “passive victims†of terrorist activity, and a recognition that the lived experience of harm done by terrorism is not mitigated by either context or alleged justification. A case is also made for using the study of victimization as a focus for interdisciplinary work on terrorism, recognizing that expertise in this area lies both within and outwith government. Journal: Studies in Conflict & Terrorism Pages: 589-593 Issue: 7 Volume: 41 Year: 2018 Month: 7 X-DOI: 10.1080/1057610X.2017.1311114 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1311114 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:589-593 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1369656_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: The Editors Title: Correction to: Argomaniz, A Battle of Narratives: Spanish Victims Organizations International Action to Delegitimize Terrorism and Political Violence Journal: Studies in Conflict & Terrorism Pages: 594-594 Issue: 7 Volume: 41 Year: 2018 Month: 7 X-DOI: 10.1080/1057610X.2017.1369656 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1369656 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:7:p:594-594 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1338053_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Temitope B. Oriola Author-X-Name-First: Temitope B. Author-X-Name-Last: Oriola Author-Name: Olabanji Akinola Author-X-Name-First: Olabanji Author-X-Name-Last: Akinola Title: Ideational Dimensions of the Boko Haram Phenomenon Abstract: This article draws on frame theory to explore the ideational dimensions of the Boko Haram phenomenon. Speech acts by Boko Haram's leaders are analyzed to interrogate how the organization conducts its three core framing tasks. The article argues that Boko Haram deploys three major master frames. These are the return to true Islam frame, the injustice frame, and the war against the infidel frame. Boko Haram's framing strategies draw on the social conditions and cultural reservoir in its domain of operations. This includes antipathy toward the West and Western education, patriarchal beliefs about gender roles and the “place†of women, and the contours of a widely popular Islamic movement that emerged in the early 1800s. Boko Haram's framing approach is also shaped by state repression and the post-9/11 cosmic war discourse. Overall, the article contributes to the limited literature on nonstructural aspects of Boko Haram's terrorist activities. Journal: Studies in Conflict & Terrorism Pages: 595-618 Issue: 8 Volume: 41 Year: 2018 Month: 8 X-DOI: 10.1080/1057610X.2017.1338053 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338053 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:8:p:595-618 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1338055_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Kirkpatrick Author-X-Name-First: Daniel Author-X-Name-Last: Kirkpatrick Title: Why Negotiate When You Can Criminalize? Lessons for Conflict Transformation from Northern Ireland and South Africa Abstract: Research on negotiating with criminalized actors generally assumes the criminal label as a given, neglecting the significance of criminalization itself. This article addresses this gap arguing that the processes of criminalization and decriminalization embody important incentive structures affecting peace negotiations. Specifically, for conflict transformation to effectively occur, criminalization needs to be orientated away from a criminalization of actors and on to specific acts to legitimize nonviolent political expression and negotiations. These arguments will be advanced through a comparative study of Northern Ireland and South Africa, adopting a conflict transformation framework, and drawing on original interviews and archival material. Journal: Studies in Conflict & Terrorism Pages: 619-637 Issue: 8 Volume: 41 Year: 2018 Month: 8 X-DOI: 10.1080/1057610X.2017.1338055 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338055 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:8:p:619-637 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1338052_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Susan Virginia Norman Author-X-Name-First: Susan Virginia Author-X-Name-Last: Norman Title: Narcotization as Security Dilemma: The FARC and Drug Trade in Colombia Abstract: This article addresses the relationship between the Revolutionary Armed Forces of Colombia (FARC) and the cocaine trade in Colombia, and implications for the FARC's complete demobilization under the 2016 peace agreement. The article identifies two phases of FARC interaction with drug markets. During the regulation phase (1982–1991), the FARC regulated the coca economy and charged protection rents. During vertical integration (1991–present), the FARC directly participated in drug markets. Contrary to conventional approaches, the article adopts the concept of the security dilemma to argue that FARC integration in drug markets was a strategic response to threats from paramilitaries and narcotics traffickers. Journal: Studies in Conflict & Terrorism Pages: 638-659 Issue: 8 Volume: 41 Year: 2018 Month: 8 X-DOI: 10.1080/1057610X.2017.1338052 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338052 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:8:p:638-659 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1338051_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daphna Canetti Author-X-Name-First: Daphna Author-X-Name-Last: Canetti Author-Name: Sivan Hirsch-Hoefler Author-X-Name-First: Sivan Author-X-Name-Last: Hirsch-Hoefler Author-Name: Carmit Rapaport Author-X-Name-First: Carmit Author-X-Name-Last: Rapaport Author-Name: Robert D. Lowe Author-X-Name-First: Robert D. Author-X-Name-Last: Lowe Author-Name: Orla T. Muldoon Author-X-Name-First: Orla T. Author-X-Name-Last: Muldoon Title: Psychological Barriers to a Peaceful Resolution: Longitudinal Evidence from the Middle East and Northern Ireland Abstract: Does individual-level exposure to political violence prompt conciliatory attitudes? Does the answer vary by phase of conflict? The study uses longitudinal primary datasets to test the hypothesis that conflict-related experiences impact conciliation. Data were collected from Israeli Jews, Palestinians, and Protestants and Catholics in Northern Ireland. Across both contexts, and among both parties to each conflict, psychological distress and threat perceptions had a polarizing effect on conciliatory preferences. The study highlights that experiences of political violence are potentially a crucial source of psychological distress, and consequently, a continuing barrier to peace. This has implications in peacemaking, implying that alongside removing the real threat of violence, peacemakers must also work toward the social and political inclusion of those most affected by previous violence. Journal: Studies in Conflict & Terrorism Pages: 660-676 Issue: 8 Volume: 41 Year: 2018 Month: 8 X-DOI: 10.1080/1057610X.2017.1338051 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338051 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:8:p:660-676 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1338414_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Moran Yarchi Author-X-Name-First: Moran Author-X-Name-Last: Yarchi Title: Two Stories for Two Nations: Public Diplomacy in the Israeli–Palestinian Conflict Abstract: A substantial part of asymmetric conflicts is the “image war†that takes place in the foreign media. This study examines the circumstances that explain the degree to which political actors successfully promote their preferred frames regarding the conflict in which they are involved to the foreign press. The study examines Israel and the Palestinians’ ability to promote their messages in various events over the last decade. Seven factors were examined, divided into three groups: focal event factors, political context factors, and message context factors. Separate examination of each predictor, followed by analysis of their shared effect, reveals that most factors have an impact on how successful political actors are at promoting their preferred frames to the foreign press. Our findings suggests that the media place greater emphasis on focal event factors when covering conflicts, and that events have a greater impact than cultural assumptions in terms of how foreign media frame news stories. Journal: Studies in Conflict & Terrorism Pages: 677-695 Issue: 9 Volume: 41 Year: 2018 Month: 9 X-DOI: 10.1080/1057610X.2017.1338414 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338414 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:9:p:677-695 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1338054_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alon Burstein Author-X-Name-First: Alon Author-X-Name-Last: Burstein Title: Ideological Rigidity and Flexibility of Secular and Religious Terror Groups: The Case of the Palestine Liberation Organization and the Palestinian Hamas Abstract: This article explores the ideological rigidity of secular and religious terror groups. Analyzing leaflets disseminated by two Palestinian groups during the First Intifada, it examines if and how each shifted its identity and goals in response to repression, political shifts, or resource changes. The results suggest that while similar catalysts led to ideological reformation among the secular and the religious group, the extent of ideological change within the religious group was more limited. The article argues for the need to disaggregate ideological analysis further in order to identify more subtle shifts, alterations, and omissions, in the positions held by religious terror groups, moving past the exploration of if such changes exist in ideological templates and instead focusing on the extent and type of alterations the different groups allow. Journal: Studies in Conflict & Terrorism Pages: 696-721 Issue: 9 Volume: 41 Year: 2018 Month: 9 X-DOI: 10.1080/1057610X.2017.1338054 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338054 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:9:p:696-721 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1341825_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Christina Cliff Author-X-Name-First: Christina Author-X-Name-Last: Cliff Title: The Coming Genocide? Burundi's Past, Present, and Potentially Deadly Future Abstract: The Great Lakes region of Africa is the most conflict-prone region of the world and one current concern is political violence in Burundi. This research investigates whether Burundi is on the precipice of a genocide. Burundi's weak democratic norms, genocidal history, and the impact of contagion and diffusion of violence in the region provide a number of the conditions that could contribute to a genocide. This research investigates the past and present conflict variables of the Great Lakes region with a focus on Burundi and assesses the potential that the ongoing political violence in Burundi will lead to genocide. Journal: Studies in Conflict & Terrorism Pages: 722-735 Issue: 9 Volume: 41 Year: 2018 Month: 9 X-DOI: 10.1080/1057610X.2017.1341825 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1341825 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:9:p:722-735 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1338057_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Abdullah bin Khaled al-Saud Author-X-Name-First: Abdullah Author-X-Name-Last: bin Khaled al-Saud Title: The Spiritual Teacher and His Truants: The Influence and Relevance of Abu Mohammad al-Maqdisi Abstract: Abu Mohammad al-Maqdisi is one of the most important spiritual fathers of the ideology and movement that has come to be known as Salafi-jihadism. Based on primary source materials produced by al-Maqdisi and other important relevant actors at different times and places, this article shows how he developed the ideas that have influenced his disciples and protégés, most prominently Abu Mus'ab al-Zarqawi, the founder of Al Qaeda in Iraq and “godfather†of the Islamic State, and Turki al-Binali, the Islamic State's current Grand Mufti. It also explains how and why, in later years, his disciples turned against him and, despite his repeated efforts, refused to allow him to play the role of the “critical friend,†much less regain control of the movement. The article seeks to expose the intra-jihadist frictions and debates involving al-Maqdisi during different times and contexts, especially the more recent ones between him and Islamic State of Iraq and the Levant. Indeed, it becomes obvious how al-Maqdisi has been trying to regain his lost influence and relevance among the most radical strands within his chosen movement for years. What this shows is that, amidst the fast-changing environment in which Salafi-jihadism has evolved, praxis trumps theory, and a reputation of steadfastness, zealousness, and unwavering convictions matter more to prospective radicals than a reputation of religious knowledge and scholarship. Journal: Studies in Conflict & Terrorism Pages: 736-754 Issue: 9 Volume: 41 Year: 2018 Month: 9 X-DOI: 10.1080/1057610X.2017.1338057 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1338057 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:41:y:2018:i:9:p:736-754 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1513684_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Maura Conway Author-X-Name-First: Maura Author-X-Name-Last: Conway Author-Name: Stuart Macdonald Author-X-Name-First: Stuart Author-X-Name-Last: Macdonald Title: Introduction to the Special Issue: Islamic State’s Online Activity and Responses, 2014–2017 Journal: Studies in Conflict & Terrorism Pages: 1-4 Issue: 1-2 Volume: 42 Year: 2019 Month: 2 X-DOI: 10.1080/1057610X.2018.1513684 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513684 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:1-4 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1513689_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Maxime Bérubé Author-X-Name-First: Maxime Author-X-Name-Last: Bérubé Author-Name: Benoit Dupont Author-X-Name-First: Benoit Author-X-Name-Last: Dupont Title: Mujahideen Mobilization: Examining the Evolution of the Global Jihadist Movement’s Communicative Action Repertoire Abstract: Drawing on Tilly’s notion of “repertoire of action,†this article shows how the evolution of the global jihadist movement’s communicative action repertoire has increased the potential resonance of its discourse. It foresees the construction of the global jihadist movement’s discourse of mobilization as the result of the evolution of its network of actors, the context in which its communications are undertaken, and its adaptation to new communication technologies. Accordingly, it argues that the decentralization of the global jihadist movement has led to a widening of its communicative action repertoire and a diversification of its discourse offering. Journal: Studies in Conflict & Terrorism Pages: 5-24 Issue: 1-2 Volume: 42 Year: 2019 Month: 2 X-DOI: 10.1080/1057610X.2018.1513689 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513689 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:5-24 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1513692_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gunnar J. Weimann Author-X-Name-First: Gunnar J. Author-X-Name-Last: Weimann Title: Competition and Innovation in a Hostile Environment: How Jabhat Al-Nusra and Islamic State Moved to Twitter in 2013–2014 Abstract: Social media offer unprecedented opportunities to terrorist groups to spread their message and target specific audiences for indoctrination and recruitment. In 2013 and 2014, social media, in particular Twitter, overtook Internet forums as preferred space for jihadist propaganda. This article looks into Arabic statements by Jabhat al-Nusra, Islamic State and jihadist forum administrators and online activists to argue that, beside the easier use of social media and disruption and infiltration of the forums, the conflict between the jihadist groups accelerated the migration to social media and the building of a presence on Twitter that provided relative resilience to suspensions. Journal: Studies in Conflict & Terrorism Pages: 25-42 Issue: 1-2 Volume: 42 Year: 2019 Month: 2 X-DOI: 10.1080/1057610X.2018.1513692 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513692 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:25-42 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1513691_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Imogen Richards Author-X-Name-First: Imogen Author-X-Name-Last: Richards Title: A Dialectical Approach to Online Propaganda: Australia’s United Patriots Front, Right-Wing Politics, and Islamic State Abstract: This article examines how the United Patriots Front (UPF), an Australian far-right organization, has communicated its ideology with reference to right-wing politics in Australia, Western Europe, and the United States, and through allusions to Islamic State. The investigation uses critical discourse and documentary analysis and a framework derived from the theory of Pierre Bourdieu to analyze textual and audiovisual postings on UPF Facebook pages, YouTube channels, and Twitter accounts. Relevant to the discussion are Bourdieu’s interdependent theories on “doxa†as a condition in which socially constructed phenomena appear self-evident, and “habitus†and “field,†which explain how structures and agents, through their reflexive behavior, become dialectically situated. Journal: Studies in Conflict & Terrorism Pages: 43-69 Issue: 1-2 Volume: 42 Year: 2019 Month: 2 X-DOI: 10.1080/1057610X.2018.1513691 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513691 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:43-69 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1513693_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mark D. Robinson Author-X-Name-First: Mark D. Author-X-Name-Last: Robinson Author-Name: Cori E. Dauber Author-X-Name-First: Cori E. Author-X-Name-Last: Dauber Title: Grading the Quality of ISIS Videos: A Metric for Assessing the Technical Sophistication of Digital Video Propaganda Abstract: This article offers a method for systematically grading the quality of Islamic State of Iraq and Syria (ISIS) videos based on technical production criteria. Using this method revealed moments when ISIS production capacity was severely debilitated (Fall 2015) and when they began to rebuild (Spring 2016), which the article details. Uses for this method include evaluating propaganda video output across time and across groups, and the ability to assess kinetic actions against propaganda organizations. This capacity will be critical as Islamic State media production teams will be pushed out of its territory as the State collapses. Journal: Studies in Conflict & Terrorism Pages: 70-87 Issue: 1-2 Volume: 42 Year: 2019 Month: 2 X-DOI: 10.1080/1057610X.2018.1513693 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513693 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:70-87 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1513694_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lauren R. Shapiro Author-X-Name-First: Lauren R. Author-X-Name-Last: Shapiro Author-Name: Marie-Helen Maras Author-X-Name-First: Marie-Helen Author-X-Name-Last: Maras Title: Women’s Radicalization to Religious Terrorism: An Examination of ISIS Cases in the United States Abstract: American women joining Islamic State of Iraq and Syria (ISIS) have increased and their roles evolved beyond auxiliary and domestic provisions, demonstrating both agency and tenacity for pursuing, recruiting, supporting, and spreading extreme Islamist ideals and terrorism. Social learning theory was applied to information gained from open-source court cases as a way of examining how thirty-one U.S. women acquired, maintained, and acted pursuant to radicalization to religious terrorism for ISIS. Internet functionalities, reasons, roles, and support types for radicalization and illegal activities for ISIS were examined using self-, dyad-, and group-classifications. A gendered interventive program based on social learning theory’s extinguishing of radicalized ideology and behavior was outlined. Journal: Studies in Conflict & Terrorism Pages: 88-119 Issue: 1-2 Volume: 42 Year: 2019 Month: 2 X-DOI: 10.1080/1057610X.2018.1513694 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513694 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:88-119 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1513696_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Amy-Louise Watkin Author-X-Name-First: Amy-Louise Author-X-Name-Last: Watkin Author-Name: Seán Looney Author-X-Name-First: Seán Author-X-Name-Last: Looney Title: “The Lions of Tomorrowâ€: A News Value Analysis of Child Images in Jihadi Magazines Abstract: This article reports and discusses the results of a study that investigated photographic images of children in five online terrorist magazines to understand the roles of children in these groups. The analysis encompasses issues of Inspire, Dabiq, Jihad Recollections (JR), Azan, and Gaidi Mtanni (GM) from 2009 to 2016. The total number of images was ninety-four. A news value framework was applied that systematically investigated what values the images held that resulted in them being “newsworthy†enough to be published. This article discusses the key findings, which were that Dabiq distinguished different roles for boys and girls, portrayed fierce and prestigious boy child perpetrators, and children flourishing under the caliphate; Inspire and Azan focused on portraying children as victims of Western-backed warfare; GM portrayed children supporting the cause peacefully; and JR contained no re-occurring findings. Journal: Studies in Conflict & Terrorism Pages: 120-140 Issue: 1-2 Volume: 42 Year: 2019 Month: 2 X-DOI: 10.1080/1057610X.2018.1513696 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513696 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:120-140 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1513984_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Maura Conway Author-X-Name-First: Maura Author-X-Name-Last: Conway Author-Name: Moign Khawaja Author-X-Name-First: Moign Author-X-Name-Last: Khawaja Author-Name: Suraj Lakhani Author-X-Name-First: Suraj Author-X-Name-Last: Lakhani Author-Name: Jeremy Reffin Author-X-Name-First: Jeremy Author-X-Name-Last: Reffin Author-Name: Andrew Robertson Author-X-Name-First: Andrew Author-X-Name-Last: Robertson Author-Name: David Weir Author-X-Name-First: David Author-X-Name-Last: Weir Title: Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts Abstract: This article contributes to public and policy debates on the value of social media disruption activity with respect to terrorist material. In particular, it explores aggressive account and content takedown, with the aim of accurately measuring this activity and its impacts. The major emphasis of the analysis is the so-called Islamic State (IS) and disruption of their online activity, but a catchall “Other Jihadi†category is also utilized for comparison purposes. Our findings challenge the notion that Twitter remains a conducive space for pro-IS accounts and communities to flourish. However, not all jihadists on Twitter are subject to the same high levels of disruption as IS, and we show that there is differential disruption taking place. IS’s and other jihadists’ online activity was never solely restricted to Twitter; it is just one node in a wider jihadist social media ecology. This is described and some preliminary analysis of disruption trends in this area supplied too. Journal: Studies in Conflict & Terrorism Pages: 141-160 Issue: 1-2 Volume: 42 Year: 2019 Month: 2 X-DOI: 10.1080/1057610X.2018.1513984 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513984 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:141-160 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1513697_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Benjamin J. Lee Author-X-Name-First: Benjamin J. Author-X-Name-Last: Lee Title: Informal Countermessaging: The Potential and Perils of Informal Online Countermessaging Abstract: Online countermessaging—communication that seeks to disrupt the online content disseminated by extremist groups and individuals—is a core component of contemporary counterterrorism strategies. Countermessaging has been heavily criticized, not least on the grounds of effectiveness. Whereas current debates are focused on the role of government and large organizations in developing and disseminating countermessages, this article argues that such approaches overlook the informal production of countermessages. Recognizing the appetite for “natural world†content among those engaged in countermessaging, this article highlights some of the potential benefits of informal approaches to countermessaging. At the same time, the article also acknowledges the risks that may result from closer working between countermessaging organizations and informal actors. Journal: Studies in Conflict & Terrorism Pages: 161-177 Issue: 1-2 Volume: 42 Year: 2019 Month: 2 X-DOI: 10.1080/1057610X.2018.1513697 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513697 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:161-177 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1513698_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tom Keatinge Author-X-Name-First: Tom Author-X-Name-Last: Keatinge Author-Name: Florence Keen Author-X-Name-First: Florence Author-X-Name-Last: Keen Title: Social Media and (Counter) Terrorist Finance: A Fund-Raising and Disruption Tool Abstract: The proliferation of social media has created a terrorist finance vulnerability due to the ease with which propaganda can be spread, promoting fund-raising for a certain cause. Social media companies recognize the importance of preventing violent extremist and terrorist content, but less attention is paid to their fund-raising role. As well as presenting a threat, the movement of terrorist fund-raising activities online creates a disruption opportunity. This article argues that social media companies need to display greater awareness of their vulnerability to supporting terrorist financing and greater collaboration with law enforcement and financial institutions to strengthen the integrity of the system against abuse. Journal: Studies in Conflict & Terrorism Pages: 178-205 Issue: 1-2 Volume: 42 Year: 2019 Month: 2 X-DOI: 10.1080/1057610X.2018.1513698 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513698 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:178-205 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1513986_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gareth Mott Author-X-Name-First: Gareth Author-X-Name-Last: Mott Title: A Storm on the Horizon? “Twister†and the Implications of the Blockchain and Peer-to-Peer Social Networks for Online Violent Extremism Abstract: “Twister,†developed by Miguel Freitas, is a social network platform centered around micro-blogging, much like Twitter. However, rather than relying on centralized servers owned and maintained by a single firm, Twister users operate a blockchain combined with distributed hash table (DHT)–like and BitTorrent-like protocols to both make posts and send private messages, and also to receive entries from other users. Twister’s raison d’etre is that it offers a social networking platform that cannot be censored and cannot itself censor. The software does not record the Internet Protocol addresses users use to access the service, nor does it notify other users of an account’s online/offline status. Growing adoption of blockchain services means that it is possible that the concept of decentralized social networks could become a norm. It is suggested in this article that blockchain-based peer-to-peer social networks present challenges to the current counterextremist practices for content removal and censorship. While there are methods to disrupt usage of blockchain-based peer-to-peer services, these approaches may have the net harm of curtailing bona fide use of legal and novel technologies. Given this opportunity cost, non-transitory online violent extremist content may need to be tolerated. Journal: Studies in Conflict & Terrorism Pages: 206-227 Issue: 1-2 Volume: 42 Year: 2019 Month: 2 X-DOI: 10.1080/1057610X.2018.1513986 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1513986 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:1-2:p:206-227 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1430656_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Hamoon Khelghat-Doost Author-X-Name-First: Hamoon Author-X-Name-Last: Khelghat-Doost Title: The Strategic Logic of Women in Jihadi Organizations Abstract: Despite the traditional restrictive views of Islamic jurisprudence on women's social activities, the level of women's incorporation into jihadi organizations is growing rapidly in both numbers and roles. This article argues that this increase reflects a strategic logic—jihadi groups integrate women to enhance organizational success. The article develops a typology of jihadi organizations: operation-based and state building and argues that the strategic logic of women in operation-based organizations lays in the tactical advantages women provide them. However, for state-building jihadi groups, the strategic logic of women is geared toward addressing the challenges facing a functioning state. Journal: Studies in Conflict & Terrorism Pages: 853-877 Issue: 10 Volume: 42 Year: 2019 Month: 10 X-DOI: 10.1080/1057610X.2018.1430656 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1430656 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:10:p:853-877 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1431316_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Moamen Gouda Author-X-Name-First: Moamen Author-X-Name-Last: Gouda Author-Name: Marcus Marktanner Author-X-Name-First: Marcus Author-X-Name-Last: Marktanner Title: Muslim Youth Unemployment and Expat Jihadism: Bored to Death? Abstract: Empirical studies analyzing the push factors of expat jihadism are scarce and typically give contradictory results. We hypothesize that youth unemployment, as opposed to overall unemployment, is a significant determinant of foreign fighters flow to join the Islamic State. Moreover, we also consider the interaction between youth unemployment and the Muslim population share as another meaningful variables affecting expat jihadism. Controlling for several variables including gross domestic product per capita; Gini; geographical proximity; the share of manufactures and services as a percentage of Gross Domestic Product; Polity score; and fractionalization, we provide strong evidence for the hypothesis that Muslim youth unemployment is a driver of expat jihadism not only for Muslim-majority countries, but globally. Journal: Studies in Conflict & Terrorism Pages: 878-897 Issue: 10 Volume: 42 Year: 2019 Month: 10 X-DOI: 10.1080/1057610X.2018.1431316 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1431316 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:10:p:878-897 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1432046_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Peter J. Phillips Author-X-Name-First: Peter J. Author-X-Name-Last: Phillips Author-Name: Gabriela Pohl Author-X-Name-First: Gabriela Author-X-Name-Last: Pohl Title: Terrorism Watch Lists, Suspect Ranking and Decision-Making Biases Abstract: The large number of names on terrorism watch lists raises the problem of monitoring. Given the existing resource constraints and other logistical considerations, efficient and accurate ranking of individuals in terms of threat posed is of paramount importance. This process, however, may be impacted by reference points, diminishing sensitivity, loss aversion, and other aspects of the human decision-making process that introduce biases. This article explores the relevance of decision-making processes and biases to the specific task of ranking and monitoring individuals whose names have been placed on a terrorism watch list. Journal: Studies in Conflict & Terrorism Pages: 898-914 Issue: 10 Volume: 42 Year: 2019 Month: 10 X-DOI: 10.1080/1057610X.2018.1432046 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1432046 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:10:p:898-914 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1430658_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: İ. Aytaç KadıoÄŸlu Author-X-Name-First: İ. Aytaç Author-X-Name-Last: KadıoÄŸlu Title: The Oslo Talks: Revealing the Turkish Government's Secret Negotiations with the PKK Abstract: This article explores the extent to which the secret talks influenced the path of official negotiations toward ending Turkey's Kurdish conflict, which the scholarly literature has yet to assess. Utilizing interviews with key political actors, this article aims to close this gap by assessing the Oslo talks (2006–2011) as the most comprehensive secret contact between the Turkish government and Kurdistan Workers' Party. It demonstrates that the secret track is not merely a “pre-negotiation†stage aimed at de-escalating the violent conflict ahead of official talks, but also a crucial part of the negotiation stage aimed at establishing a final political agreement. Journal: Studies in Conflict & Terrorism Pages: 915-933 Issue: 10 Volume: 42 Year: 2019 Month: 10 X-DOI: 10.1080/1057610X.2018.1430658 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1430658 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:10:p:915-933 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1430654_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Eric Rahman Author-X-Name-First: Eric Author-X-Name-Last: Rahman Author-Name: SiniÅ¡a Vuković Author-X-Name-First: SiniÅ¡a Author-X-Name-Last: Vuković Title: Sympathy for the Devil: When and How to Negotiate with Criminal Gangs—Case of El Salvador Abstract: Criminal gangs, while posing the most substantial threat to security in the Western hemisphere, fall outside the scope of contemporary studies in the field of mediation and negotiation. The prevailing wisdom that gangs are unmanageable due to their apolitical nature and the high political cost of dialogue has led to an approach that relies heavily on the security sector. While the security sector can and must play a role, confrontation alone has proven insufficient. The three-step theory presented in this article seeks to explain how and when to engage in dialogue as an alternative means of confronting criminal gangs. The success of this process, a reduction in violence and criminality through the transformation of gang-related conflict, hinges on sequencing and begins with state-sponsored mediation conducted in secret to establish a cease-fire between the gangs, then enters the phase of public negotiation between the state and the gangs, and finally concludes with a process of mainstreaming the reformed structures into society. This theory assumes that mediators can work with the gangs through a process of assisted articulation to develop a negotiating position, opening a zone of possible agreement between the government and the gangs. El Salvador offers a compelling example of how a society steeped in gang violence might pursue dialogue while also highlighting the threats posed to any negotiation. Journal: Studies in Conflict & Terrorism Pages: 935-952 Issue: 11 Volume: 42 Year: 2019 Month: 11 X-DOI: 10.1080/1057610X.2018.1430654 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1430654 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:11:p:935-952 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1431270_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kenneth L. Lasoen Author-X-Name-First: Kenneth L. Author-X-Name-Last: Lasoen Title: War of Nerves: The Domestic Terror Threat and the Belgian Army Abstract: The terror threat emanating from Daesh-inspired violent radicalization has made the vulnerability of soft targets and the means to defend them a pressing security challenge. Belgium responded to the threat by deploying the army to help protect the public space against terrorist attacks. This article explores the Belgian case of a counterterrorism mission by the military on home soil, but also looks at the wider security challenges posed by an asymmetric threat to the most vulnerable aspects of daily life, exploiting the openness and mobility of society. The study will also examine alternative ways to employ the necessary military skills and expertise to counter the threat to soft targets, from a re-examination of deterrence theory and by the utility of force, and introducing the concept of “marketing for counterterrorism†as a corollary to cognitive defense. It concludes with what tactical opportunities and policy prescriptions are presented for homeland security. Journal: Studies in Conflict & Terrorism Pages: 953-971 Issue: 11 Volume: 42 Year: 2019 Month: 11 X-DOI: 10.1080/1057610X.2018.1431270 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1431270 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:11:p:953-971 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1431363_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jennifer Boutz Author-X-Name-First: Jennifer Author-X-Name-Last: Boutz Author-Name: Hannah Benninger Author-X-Name-First: Hannah Author-X-Name-Last: Benninger Author-Name: Alia Lancaster Author-X-Name-First: Alia Author-X-Name-Last: Lancaster Title: Exploiting the Prophet's Authority: How Islamic State Propaganda Uses Hadith Quotation to Assert Legitimacy Abstract: Through its prolific propaganda, the self-declared Islamic State (IS) seeks to attract new recruits, motivate existing members, and assert the group's legitimacy. This study addresses the question of how IS attempts to legitimize itself through its official rhetoric by exploring its invocation of religious authority via reference to sacred Islamic texts. The study focuses on a specific category of religious scripture: the collected words and actions of the Prophet Muhammad, known as the hadith. The body of hadith has historically served as a bridge of authority from past to present, linking later individuals and groups to the legacy of the Prophet. Related studies have demonstrated that within the Arabic-speaking community in general, citing hadith and Qur'an is an everyday rhetorical strategy for argumentation across all topics, secular and sacred. This article takes an in-depth look at the hadith quotations included in a sample of official IS propaganda to compare the relative frequency of specific themes and to determine which hadith compilations IS publicists prefer. The study compares the quotation of hadith across media platforms (videos, newsletters, and magazines), genres (print and video), and languages (Arabic and English). The findings show that IS messaging tends to quote hadith from canonical Sunni collections. The study highlights important differences between English and Arabic language propaganda, noting in particular that English-language propaganda focuses more on apocalyptic prophecies than Arabic-language materials. Case studies illustrate how IS selectively draws on the vast body of hadith literature as part of the group's strategic framing. Journal: Studies in Conflict & Terrorism Pages: 972-996 Issue: 11 Volume: 42 Year: 2019 Month: 11 X-DOI: 10.1080/1057610X.2018.1431363 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1431363 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:11:p:972-996 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1431365_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Brian J. Phillips Author-X-Name-First: Brian J. Author-X-Name-Last: Phillips Title: Terrorist Group Rivalries and Alliances: Testing Competing Explanations Abstract: Terrorist group rivalries and alliances have important consequences, but the sources of these relationships are debated. This article offers a side-by-side examination of correlates of terrorist rivalries and alliances. Global analyses of hundreds of terrorist groups find violent rivalry is associated with drug trafficking, state sponsorship, ethnic motivation, and operating in a civil conflict country. Alliances are associated with territorial control, intermediate membership size, and religious motivation. The idea that alliances are an indicator of weakness does not find much support. When relationships are disaggregated into theoretically relevant categories (inter-field and intra-field rivalries, and domestic and international alliances), further distinctions appear. Journal: Studies in Conflict & Terrorism Pages: 997-1019 Issue: 11 Volume: 42 Year: 2019 Month: 11 X-DOI: 10.1080/1057610X.2018.1431365 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1431365 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:11:p:997-1019 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1434039_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mariya Y. Omelicheva Author-X-Name-First: Mariya Y. Author-X-Name-Last: Omelicheva Author-Name: Lawrence Markowitz Author-X-Name-First: Lawrence Author-X-Name-Last: Markowitz Title: Does Drug Trafficking Impact Terrorism? Afghan Opioids and Terrorist Violence in Central Asia Abstract: The relationship between drug trafficking and terrorism remains a contentious issue. While some assert that drug trafficking is a strong predictor of terrorism, others contest this observation. This study focuses on the impact of the Afghan opioid trade on terrorist violence in Central Asia, a region of drug transit states. We employ Geographic Information Systems–enabled visualizations of the drug trade and terrorism as well as statistical tests to study the drug–terror relationship at the subnational level. Our findings lend support to the argument that the drug trade facilitates terrorism, but we also find that the drug–terror relationship is multifaceted, complex, and intimately linked to the state. Journal: Studies in Conflict & Terrorism Pages: 1021-1043 Issue: 12 Volume: 42 Year: 2019 Month: 12 X-DOI: 10.1080/1057610X.2018.1434039 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1434039 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:12:p:1021-1043 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1434858_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Caitlin Ambrozik Author-X-Name-First: Caitlin Author-X-Name-Last: Ambrozik Title: Community Stakeholder Responses to Countering Violent Extremism Locally Abstract: In the United States, despite federal efforts to empower communities to form local governance networks to develop and implement collaborative countering violent extremism (CVE) programs, local CVE governance networks are rare. Why do CVE governance networks emerge within only some communities? I argue that three factors—interest in CVE, capacity to participate, and facilitation—determine the prospects for the emergence of a CVE governance network within a community. The article uses a matching technique to identify and compare the community stakeholder responses to CVE in two communities—Houston, TX and Columbus, OH. Survey research of stakeholders who participated in Houston and stakeholders most likely to participate in Columbus but did not highlights the importance of the three factors. By focusing on these drivers of collaborative governance, the article provides an explanation for the lack of CVE collaboration in the United States. Journal: Studies in Conflict & Terrorism Pages: 1044-1068 Issue: 12 Volume: 42 Year: 2019 Month: 12 X-DOI: 10.1080/1057610X.2018.1434858 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1434858 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:12:p:1044-1068 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1434860_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael Newell Author-X-Name-First: Michael Author-X-Name-Last: Newell Title: The Strategy of Exclusion in American Counterterrorism Abstract: While garnering heightened attention following the Trump administration's travel restrictions, exclusionary tactics in counterterrorism have a much lengthier history. Given that some terrorism studies scholars identify social and political exclusion as an explanation for the resort to terrorist violence, the selection of a strategy of exclusion is significant. In this article, I identify the elements of a strategy of exclusion and the logic behind this strategy. In particular, I examine the origins and persistence of this strategy in the U.S. context. Rather than a contemporary anomaly, exclusion was among the first strategies the United States added to its counterterrorist tool-kit, and has remained among the most consistent strategies relied on. I trace the history of this strategy from its origins in immigration restrictions passed following the assassination of President McKinley by an anarchist through the contemporary War on Terror. Controversy surrounding this strategy, its negative effects on nonviolent immigrant populations, and its failure to prevent further acts of terrorism suggest it was historically ineffective and may also be so today. Journal: Studies in Conflict & Terrorism Pages: 1069-1089 Issue: 12 Volume: 42 Year: 2019 Month: 12 X-DOI: 10.1080/1057610X.2018.1434860 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1434860 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:12:p:1069-1089 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1438062_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: James D. Boys Author-X-Name-First: James D. Author-X-Name-Last: Boys Title: The Clinton Administration's Development and Implementation of Rendition (1993–2001) Abstract: A firestorm of protest greeted revelations of the rendition program when it was made public during the George W. Bush administration. The operational and political basis for the rendition initiative, however, had been established years before George W. Bush became president and was viewed as 'a new art form' by the Clinton administration. Despite significant efforts to distinguish between the two administrations, the evolution of the rendition initiative during the 1990s reveals far greater continuity than has been widely acknowledged. This paper examines the manner in which the Clinton administration utilized rendition in its own war on terror, years before George W. Bush came to power, with little public scrutiny or outrage. Journal: Studies in Conflict & Terrorism Pages: 1090-1102 Issue: 12 Volume: 42 Year: 2019 Month: 12 X-DOI: 10.1080/1057610X.2018.1438062 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1438062 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:12:p:1090-1102 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1373895_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tricia Bacon Author-X-Name-First: Tricia Author-X-Name-Last: Bacon Author-Name: Elizabeth Grimm Arsenault Author-X-Name-First: Elizabeth Grimm Author-X-Name-Last: Arsenault Title: Al Qaeda and the Islamic State's Break: Strategic Strife or Lackluster Leadership? Abstract: Employing counterfactuals to assess individual and systemic explanations for the split between Al Qaeda and the Islamic State of Iraq and al-Sham (ISIS), this article concludes that individual leaders factor greatly into terrorist alliance outcomes. Osama bin Laden was instrumental in keeping Al Qaeda and ISIS allied as he prioritized unity and handled internal disputes more deftly than his successor, Dr. Ayman al-Zawahiri. Although a troubled alliance, strategic differences between Al Qaeda and ISIS were not sufficient to cause the split. Rather, the capabilities of Al Qaeda's leader determined the group's ability to prevent alliance ruptures. Journal: Studies in Conflict & Terrorism Pages: 229-263 Issue: 3 Volume: 42 Year: 2019 Month: 3 X-DOI: 10.1080/1057610X.2017.1373895 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1373895 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:3:p:229-263 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1373427_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David Parker Author-X-Name-First: David Author-X-Name-Last: Parker Author-Name: Julia M. Pearce Author-X-Name-First: Julia M. Author-X-Name-Last: Pearce Author-Name: Lasse Lindekilde Author-X-Name-First: Lasse Author-X-Name-Last: Lindekilde Author-Name: M. Brooke Rogers Author-X-Name-First: M. Brooke Author-X-Name-Last: Rogers Title: Challenges for Effective Counterterrorism Communication: Practitioner Insights and Policy Implications for Preventing Radicalization, Disrupting Attack Planning, and Mitigating Terrorist Attacks Abstract: Growing concerns about small-scale, low sophistication terrorist attacks, and the difficulties they present for security services, make public coproduction of security increasingly necessary. Communication to ensure that the public(s) is aware of the role they can play will be central to this. This article, based on interviews with thirty expert practitioners, explores challenges associated with communication designed to prevent radicalization, interdict attack planning and mitigate the impacts of a terrorist attack in the United Kingdom and Denmark. The interplay between these challenges and the contemporary terrorist context are analyzed, highlighting that new, or adapted, communications and approaches may be necessary. Journal: Studies in Conflict & Terrorism Pages: 264-291 Issue: 3 Volume: 42 Year: 2019 Month: 3 X-DOI: 10.1080/1057610X.2017.1373427 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1373427 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:3:p:264-291 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1374672_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Minwoo Yun Author-X-Name-First: Minwoo Author-X-Name-Last: Yun Author-Name: Eunyoung Kim Author-X-Name-First: Eunyoung Author-X-Name-Last: Kim Title: An Ethnographic Study on the Indonesian Immigrant Community and its Islamic Radicalization in South Korea Abstract: Contrary to popular belief, South Korea is not immune from the growth of Islamic radicalism. Although no serious terrorist attack has yet occurred within the country, some worrisome incidents have been reported. Recently, an Indonesian man was arrested on the grounds that he publicly supported the Al Nusra Front, a known Al Qaeda–affiliated terrorist organization, and even attempted to depart for Syria to join the organization. The current study is a response to such an incident. It investigates whether such an incident is an isolated exception or a harbinger of the Islamic radicalization process within South Korea, particularly within the Muslim immigrant community. The current study focuses primarily on the Indonesian immigrant community within South Korea but also investigates other Muslim communities when needed, as Muslim immigrant communities are often intermingled and share similar features. The study found some worrisome developments of Islamic radicalization within the Indonesian immigrant community in particular and the Muslim immigrant community in general. Using the enculturation stress model, the current study explains that such Islamic radicalization is a pathway of the collective response to cultural adaptation stress that most Indonesian and other Muslim immigrants face within South Korea. To conduct the study, ethnographic qualitative interviews were used. Indonesian immigrants, their Korean spouses, civilian activists, civilian aid workers, government officials, police officers, immigrant agency officials, and security officials were contacted and interviewed. Each interview lasted between approximately one and four hours. The limitations of the study are also discussed. Journal: Studies in Conflict & Terrorism Pages: 292-313 Issue: 3 Volume: 42 Year: 2019 Month: 3 X-DOI: 10.1080/1057610X.2017.1374672 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1374672 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:3:p:292-313 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1461320_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ahmed M. Abozaid Author-X-Name-First: Ahmed M. Author-X-Name-Last: Abozaid Title: Correspondence to “An Ethnographic Study on the Indonesian Immigrant Community and its Islamic Radicalization in South Korea†Journal: Studies in Conflict & Terrorism Pages: 314-319 Issue: 3 Volume: 42 Year: 2019 Month: 3 X-DOI: 10.1080/1057610X.2018.1461320 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1461320 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:3:p:314-319 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1461321_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Minwoo Yun Author-X-Name-First: Minwoo Author-X-Name-Last: Yun Author-Name: Eunyoung Kim Author-X-Name-First: Eunyoung Author-X-Name-Last: Kim Title: Response: Guilty of not critical and unpleasant findings: Endless arguments of definitions of terrorism: Correspondence from Abozaid Journal: Studies in Conflict & Terrorism Pages: 320-327 Issue: 3 Volume: 42 Year: 2019 Month: 3 X-DOI: 10.1080/1057610X.2018.1461321 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1461321 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:3:p:320-327 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1518205_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gina Bennett Author-X-Name-First: Gina Author-X-Name-Last: Bennett Title: What I Have Learned About Countering TerrorismÏ• Abstract: As a counterterrorism officer of thirty years, I have a healthy respect for history. Yet I also know that hindsight changes what you think about what you once thought. My observations about terrorism trends and counterterrorism strategies over the years are not what they once were. What I think now is more aligned with how I feel, and therefore, much clearer. Until recently, I had always based my observations about national security in my experiences as a counterterrorism analyst. I have come to realize that the lessons I believe are the most valid are not a result of my career experiences but from allowing the rest of my life to shed light on my career. Journal: Studies in Conflict & Terrorism Pages: 328-334 Issue: 3 Volume: 42 Year: 2019 Month: 3 X-DOI: 10.1080/1057610X.2018.1518205 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1518205 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:3:p:328-334 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1585533_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gordon McCormick Author-X-Name-First: Gordon Author-X-Name-Last: McCormick Title: Ernesto (Che) Guevara: The Last ‘Heroic’ Guerrilla Journal: Studies in Conflict & Terrorism Pages: 335-335 Issue: 4 Volume: 42 Year: 2019 Month: 4 X-DOI: 10.1080/1057610X.2019.1585533 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1585533 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:4:p:335-335 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1398319_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gordon H. McCormick Author-X-Name-First: Gordon H. Author-X-Name-Last: McCormick Author-Name: Mark T. Berger Author-X-Name-First: Mark T. Author-X-Name-Last: Berger Title: Ernesto (Che) Guevara: The Last “Heroic†Guerrilla Abstract: We take the opportunity presented by the fiftieth anniversary of the death of Che Guevara to reexamine his life and revolutionary program and the legacy he left behind. Attention is given to the formative influences that led to his introduction to Fidel Castro and his involvement in the Cuban revolution. We take a close look at the stylized theory of revolution that emerged from this experience, his reflective writings on the subject, and his subsequent attempts to generalize and apply his revolutionary model in the Congo and Bolivia. This model is critically interpreted and evaluated through the lense of his eleven month Bolivian campaign. We conclude by examining the ‘paradox’ of Che Guevara. He was a failed guerrilla who remains an iconic symbol of the revolutionary Left. He was an authentic true believer who dreamed that it might be possible to one day forge a utopian society of ‘new men’ and yet, fifty years after his death, his revolutionary project is farther away from being realized than ever. His heroic image, in the meantime, has evolved to become one of the most successful capitalist brands in history. Journal: Studies in Conflict & Terrorism Pages: 336-362 Issue: 4 Volume: 42 Year: 2019 Month: 4 X-DOI: 10.1080/1057610X.2017.1398319 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1398319 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:4:p:336-362 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1373428_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Victor Asal Author-X-Name-First: Victor Author-X-Name-Last: Asal Author-Name: Daniel Gustafson Author-X-Name-First: Daniel Author-X-Name-Last: Gustafson Author-Name: Peter Krause Author-X-Name-First: Peter Author-X-Name-Last: Krause Title: It Comes with the Territory: Why States Negotiate with Ethno-Political Organizations Abstract: Given that minority ethno-political organizations are generally weaker than states yet seek to change their policies or remove the ruling regime from power, why would negotiation occur? States prefer to ignore or repress such organizations, which typically have little to offer in return amidst negotiations that can legitimize them while delegitimizing the state. When a challenging organization establishes governing structures and controls movement in part of a state's territory, however, it can easily inflict significant economic and political costs on the state while also possessing a valuable asset to exchange for concessions. An organization with territorial control cannot be ignored, while the state will have a strong incentive to negotiate before the state loses more face, the group gains more legitimacy, neighboring states are more likely to invade, and the international community is more likely to formally recognize any facts on the ground as a new status quo. Our analysis of 118 organizations in the Middle East and North Africa from 1980–2004 reveals that territorial control is the most important determinant of intrastate negotiation. In regards to existing scholarship, this suggests that a certain type of successful violence works—not all violence and not only nonviolence—while certain types of strong organizations—those that control territory—are more likely to reach negotiations with the state than weak ones. Journal: Studies in Conflict & Terrorism Pages: 363-382 Issue: 4 Volume: 42 Year: 2019 Month: 4 X-DOI: 10.1080/1057610X.2017.1373428 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1373428 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:4:p:363-382 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1385903_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Miron Lakomy Author-X-Name-First: Miron Author-X-Name-Last: Lakomy Title: Let's Play a Video Game: Jihadi Propaganda in the World of Electronic Entertainment Abstract: This article argues that video games have become a valid and increasingly significant means of jihadist digital propaganda. “Gaming jihad†has recently shown interesting alterations, mostly due to actions undertaken by the so called Islamic State and its cyber-partisans, which have discovered new ways of using this flexible and immersive medium. Similar to more conventional forms of its online propaganda, which have been imitated by other Islamist terrorist groups for years, the “Caliphate's†exploitation of electronic entertainment software may be a forerunner for the increased interest of other violent extremist organizations in this medium. Journal: Studies in Conflict & Terrorism Pages: 383-406 Issue: 4 Volume: 42 Year: 2019 Month: 4 X-DOI: 10.1080/1057610X.2017.1385903 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1385903 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:4:p:383-406 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1373430_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Aaron Safer-Lichtenstein Author-X-Name-First: Aaron Author-X-Name-Last: Safer-Lichtenstein Title: An Explicit Consideration of Unintended Consequences from Counterterrorism Policy: The Case of Radical Eco-Groups Abstract: Criminologists and terrorism specialists alike have conducted research on the deterrent effect of policies; however, to date, only criminologists have thoroughly examined the associated displacement of crime and diffusion of benefits. Using data from the Eco-Incidents Database, this study first examines the deterrent effect of government efforts targeting animal rights and environmental terrorism over several years. Next, it extends this application by examining nonterrorist actions by both terrorist groups and nonterrorist groups to see if deterrent actions have any unintended consequences. Results show no evidence of displacement, but rather that several government actions evidenced a diffusion of benefits. Journal: Studies in Conflict & Terrorism Pages: 407-428 Issue: 4 Volume: 42 Year: 2019 Month: 4 X-DOI: 10.1080/1057610X.2017.1373430 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1373430 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:4:p:407-428 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1385182_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: James Khalil Author-X-Name-First: James Author-X-Name-Last: Khalil Title: A Guide to Interviewing Terrorists and Violent Extremists Abstract: The quality of studies drawing primary data from terrorists and violent extremist respondents varies substantially, with this body of literature exhibiting a variety of repeating methodological issues. For instance, researchers often uncritically accept interviewee responses at face value, overlook key theoretical insights, downplay or neglect potentially important explanatory variables, fail to offer sufficient information about their sampling methods, and deliver findings with inferences beyond what their sample allows. Indeed, certain studies demonstrate a number of these flaws, including the United Nations Development Programme's recently published Journey to Extremism in Africa report. Within this context, the dual purposes of this article are (a) to discuss ways to overcome these specific methodological problems, and (b) to provide broader guidance for face-to-face research with such respondents. Journal: Studies in Conflict & Terrorism Pages: 429-443 Issue: 4 Volume: 42 Year: 2019 Month: 4 X-DOI: 10.1080/1057610X.2017.1385182 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1385182 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:4:p:429-443 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1393897_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Laura Huey Author-X-Name-First: Laura Author-X-Name-Last: Huey Author-Name: Rachel Inch Author-X-Name-First: Rachel Author-X-Name-Last: Inch Author-Name: Hillary Peladeau Author-X-Name-First: Hillary Author-X-Name-Last: Peladeau Title: “@ me if you need shoutoutâ€: Exploring Women's Roles in Islamic State Twitter Networks Abstract: This article investigates the social media content of women who are affiliated with the Islamic State. Throughout one year, ninety-three Twitter accounts were tracked to explore the patterns of engagement by pro–Islamic State women online and examine how these patterns illuminate the roles that pro–Islamic State women occupy on social media networks. The study reveals that women who associate with the Islamic State mostly preserve the traditional gendered role of support in the online realm. However, support is not their exclusive role and some women are active in the organization, using Twitter to recruit, promote, and even commit terrorist violence. Journal: Studies in Conflict & Terrorism Pages: 445-463 Issue: 5 Volume: 42 Year: 2019 Month: 5 X-DOI: 10.1080/1057610X.2017.1393897 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1393897 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:5:p:445-463 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1392097_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael H. Creswell Author-X-Name-First: Michael H. Author-X-Name-Last: Creswell Title: Wasted Words? The Limitations of U.S. Strategic Communication and Public Diplomacy Abstract: For America's foes in Afghanistan and the Middle East, triumph on the battlefield is less important than winning the battle of perceptions. In response, the United States has turned to Strategic Communication and Public Diplomacy (SC-PD) to engage key audiences in ways that advance U.S. interests and to win the political-ideological contest for domestic and international legitimacy. But are these strategies effective? While winning hearts and minds is politically important, SC-PD—even at its best—is much less effective than other well-crafted and mutually supportive policies and strategies. Moreover, there are structural obstacles that greatly limit the effectiveness of SC-PD. Journal: Studies in Conflict & Terrorism Pages: 464-492 Issue: 5 Volume: 42 Year: 2019 Month: 5 X-DOI: 10.1080/1057610X.2017.1392097 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1392097 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:5:p:464-492 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1403152_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anneli Botha Author-X-Name-First: Anneli Author-X-Name-Last: Botha Author-Name: Mahdi Abdile Author-X-Name-First: Mahdi Author-X-Name-Last: Abdile Title: Reality Versus Perception: Toward Understanding Boko Haram in Nigeria Abstract: This article will explore the perception of individuals associated with civil society and working in Boko Haram–affected areas. This will compare the reality as reflected by former Boko Haram members. Central to this analysis will be who, why, and how individuals get involved in Boko Haram. Comparing perceptions with empirical evidence, civil society actors, but also policymakers tasked with addressing violent extremism, are reminded not to rely on perceptions when developing and implementing preventative measures and countermeasures. Additionally, a larger than expected former female Boko Haram sample was included that allowed a comparison to be made between the male and female samples, with specific reference to why and how women became members of Boko Haram. Journal: Studies in Conflict & Terrorism Pages: 493-519 Issue: 5 Volume: 42 Year: 2019 Month: 5 X-DOI: 10.1080/1057610X.2018.1403152 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1403152 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:5:p:493-519 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1393902_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stephane J. Baele Author-X-Name-First: Stephane J. Author-X-Name-Last: Baele Author-Name: Olivier C. Sterck Author-X-Name-First: Olivier C. Author-X-Name-Last: Sterck Author-Name: Thibaut Slingeneyer Author-X-Name-First: Thibaut Author-X-Name-Last: Slingeneyer Author-Name: Gregoire P. Lits Author-X-Name-First: Gregoire P. Author-X-Name-Last: Lits Title: What Does the “Terrorist†Label Really Do? Measuring and Explaining the Effects of the “Terrorist†and “Islamist†Categories Abstract: Many scholars and practitioners claim that labeling groups or individuals as “terrorists†does not simply describe them but also shapes public attitudes, due to the label's important normative and political charge. Yet is there such a “terrorist label effectâ€? In view of surprisingly scant evidence, the present article evaluates whether or not the terrorist label—as well as the “Islamist†one—really impacts both the audience's perception of the security environment and its security policy preferences, and if yes, how and why. To do so, the article implements a randomized-controlled vignette experiment where participants (N = 481) first read one out of three press articles, each depicting a street shooting in the exact same way but labeling the author of the violence with a different category (“terroristâ€/“shooterâ€/“Islamistâ€). Participants were then asked to report on both their perceptions and their policy preferences. This design reveals very strong effects of both the “terrorist†and “Islamist†categories on each dimension. These effects are analyzed through the lenses of social and cognitive psychology, in a way that interrogates the use of the terrorist category in society, the conflation of Islamism with terrorism, and the press and policymakers' lexical choices when reporting on political violence. Journal: Studies in Conflict & Terrorism Pages: 520-540 Issue: 5 Volume: 42 Year: 2019 Month: 5 X-DOI: 10.1080/1057610X.2017.1393902 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1393902 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:5:p:520-540 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1394653_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Omar Ashour Author-X-Name-First: Omar Author-X-Name-Last: Ashour Title: Sinai's Insurgency: Implications of Enhanced Guerilla Warfare Abstract: This article aims to explain the endurance of Sinai's insurgency despite its limited military capacity and resources, and the overwhelming man- and fire-power of the incumbent's regular and tribal forces. After reviewing the literature on how insurgents beat or survive strong incumbents, the article offers a short overview of historical developments and socio-political causes leading to the rise of Sinai Province and its military build-up. It then analyses, qualitatively and quantitatively, how Sinai Province fight, based on its original documents and releases as well as on interviews with individuals who fought against it. Finally, the article concludes with an explanation of why did the insurgency survive and, at times, expanded based on the quality of its military tactics. It also provides policy implications, as a result. Journal: Studies in Conflict & Terrorism Pages: 541-558 Issue: 6 Volume: 42 Year: 2019 Month: 6 X-DOI: 10.1080/1057610X.2017.1394653 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1394653 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:6:p:541-558 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1404000_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Steven Windisch Author-X-Name-First: Steven Author-X-Name-Last: Windisch Author-Name: Gina Scott Ligon Author-X-Name-First: Gina Author-X-Name-Last: Scott Ligon Author-Name: Pete Simi Author-X-Name-First: Pete Author-X-Name-Last: Simi Title: Organizational [Dis]trust: Comparing Disengagement Among Former Left-Wing and Right-Wing Violent Extremists Abstract: In order to move beyond the existing push/pull framework to understand disengagement, we apply a systematic coding scheme derived from Mayer and colleagues' integrative model of organizational trust to examine why people leave extremist groups. In doing so, we also rely on in-depth life history interviews with twenty former left- and right-wing extremists to examine whether antecedents of distrust vary between the two groups. Findings suggest substantial similarities and important differences between left- and right-wing extremists' decision to leave. In particular, perceptions of poor planning and organization, low-quality personnel and vindictive behavior generate perceptions of organizational distrust and disillusionment. Although findings from the current study are based on a relatively small sample, notable similarities were identified between both groups regarding sources of distrust (e.g., leaders, group members). We also identified differences regarding the role of violence in weakening solidarity and nurturing disillusionment with extremist activities. We conclude this article with suggestions for future research that extend the study of terrorism and that may have significance for how practitioners address countering violent extremism initiatives. Journal: Studies in Conflict & Terrorism Pages: 559-580 Issue: 6 Volume: 42 Year: 2019 Month: 6 X-DOI: 10.1080/1057610X.2017.1404000 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1404000 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:6:p:559-580 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1402430_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kevin Hearty Author-X-Name-First: Kevin Author-X-Name-Last: Hearty Title: Spoiling Through Performative Nonviolence: Ritualistic Funerary Practice as a Violent Dissident Irish Republican (VDR) Spoiling Tactic Abstract: This article assesses how Violent Dissident Irish Republican (VDR) groups have turned to funerary practice as a spoiling tactic in post–Good Friday Agreement Northern Ireland. In doing so it moves the lens of interrogation away from the residual violence exercised by these groups and onto other nonviolent mechanisms and strategies. Locating this discussion within the wider study of the VDR phenomenon, the article asserts that militarized and ritualized funerals possess propagandistic and mobilizational benefits that make them particularly conducive to spoiling activity in a post-conflict site that is increasingly embracing the process of normalization. Journal: Studies in Conflict & Terrorism Pages: 581-599 Issue: 6 Volume: 42 Year: 2019 Month: 6 X-DOI: 10.1080/1057610X.2017.1402430 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1402430 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:6:p:581-599 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1402429_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ophir Falk Author-X-Name-First: Ophir Author-X-Name-Last: Falk Author-Name: Amir Hefetz Author-X-Name-First: Amir Author-X-Name-Last: Hefetz Title: Minimizing Unintended Deaths Enhanced the Effectiveness of Targeted Killing in the Israeli–Palestinian Conflict Abstract: Targeted killing has become a primary counterterrorism measure used by a number of countries in their confrontation with lethal threats. This article focuses on the impact of unintended deaths on the effectiveness of targeted killing. The article evaluates the effectiveness of targeted killings carried out in the Israeli–Palestinian conflict theater that resulted in unintended deaths, compared to the effectiveness of targeted killings where the intended target is the sole person killed. Using multivariate analysis, we demonstrate that targeted killings with unintended deaths were followed by a greater number of suicide bombings and associated casualties compared with targeted killings with no unintended deaths. Based on these findings, nations involved in such conflicts should strive to inflict as few unintended deaths as possible, not only because it is morally right, but also because it is more effective in mitigating terrorism. Journal: Studies in Conflict & Terrorism Pages: 600-616 Issue: 6 Volume: 42 Year: 2019 Month: 6 X-DOI: 10.1080/1057610X.2017.1402429 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1402429 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:6:p:600-616 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1407480_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matthew M. Sweeney Author-X-Name-First: Matthew M. Author-X-Name-Last: Sweeney Title: Leaderless Resistance and the Truly Leaderless: A Case Study Test of the Literature-Based Findings Abstract: The literature on leaderless resistance is conceptually cloudy. Nevertheless, such literature has bounded the theoretical framework of leaderless resistance around four criteria. These criteria are leaderless resistors cannot be members of organizations they represent; leaderless resistance is a tactical manifestation of an organization; the goal of leaderless resistance is to insulate members and leaders from prosecution; and leaderless resistance arises from organizational failure. Using a case study of the Phineas Priesthood, this work tests these boundaries via a directed content analysis of the Priesthood's ideological manifesto. This research finds that leaderless resistance is theoretically problematic and too often lone wolves and leader resistors are viewed equivalent when they are theoretically different. Scholars must theoretically differentiate between individuals who ascribe to leaderless concepts, organizations, or groups versus those who develop an ideological framework and exist outside a concept, organization, or group. Journal: Studies in Conflict & Terrorism Pages: 617-635 Issue: 7 Volume: 42 Year: 2019 Month: 7 X-DOI: 10.1080/1057610X.2017.1407480 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1407480 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:7:p:617-635 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1404004_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Reinier Bergema Author-X-Name-First: Reinier Author-X-Name-Last: Bergema Author-Name: Marion van San Author-X-Name-First: Marion Author-X-Name-Last: van San Title: Waves of the Black Banner: An Exploratory Study on the Dutch Jihadist Foreign Fighter Contingent in Syria and Iraq Abstract: Since the violent escalation of the Syrian conflict, 280 Dutch nationals have been flocking to Syria and Iraq to join jihadist terrorist organizations. Attempts to create a more comprehensive understanding of the backgrounds of these jihadist foreign fighters often rely on small-N, qualitative analysis. This exploratory study systematically assesses the backgrounds of 217 Dutch jihadist foreign fighters. Additionally, it further differentiates the different “waves†of fighters since late 2012, by looking at their characteristics and comparing their composition. Journal: Studies in Conflict & Terrorism Pages: 636-661 Issue: 7 Volume: 42 Year: 2019 Month: 7 X-DOI: 10.1080/1057610X.2017.1404004 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1404004 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:7:p:636-661 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1407075_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stijn Sieckelinck Author-X-Name-First: Stijn Author-X-Name-Last: Sieckelinck Author-Name: Elga Sikkens Author-X-Name-First: Elga Author-X-Name-Last: Sikkens Author-Name: Marion van San Author-X-Name-First: Marion Author-X-Name-Last: van San Author-Name: Sita Kotnis Author-X-Name-First: Sita Author-X-Name-Last: Kotnis Author-Name: Micha De Winter Author-X-Name-First: Micha Author-X-Name-Last: De Winter Title: Transitional Journeys Into and Out of Extremism. A Biographical Approach Abstract: This article describes an empirical study into processes of homegrown radicalization and de-radicalization of young people. Researchers in Denmark and the Netherlands set out to answer the question regarding what pathways in and out of extremism (mainly far-right or Islamist) look like “from the inside.†The analysis is informed by grounded theory, based on interviews (N = 34) with “formers†and their family members on their life courses. The study shows that radicalization often concurs with distinct social–emotional developmental challenges that young people face in the transition between youth and adulthood. A practical implication of the marked transitional sequences in these processes is that each type of radical journey may call for a different type of (re)action. Journal: Studies in Conflict & Terrorism Pages: 662-682 Issue: 7 Volume: 42 Year: 2019 Month: 7 X-DOI: 10.1080/1057610X.2017.1407075 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1407075 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:7:p:662-682 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1402432_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sagi Polka Author-X-Name-First: Sagi Author-X-Name-Last: Polka Title: Hamas as a Wasati (Literally: Centrist) Movement: Pragmatism within the Boundaries of the Sharia Abstract: This article examines Hamas as a test case for the struggle within Islam between two rival ideological streams: wasatiyya, whose principles were formulated by Sheikh Yusuf al-Qaradawi (b. 1926), and Salafi-jihadism, which is the wellspring of global jihad. Hamas is a wasati movement, and its wasati principles serve as the basis for its polemic with Salafi-jihadists, who accuse both it and al-Qaradawi of heresy. The article also shows how the principles of wasatiyya afford Hamas flexibility and allow it to adopt pragmatic positions by distinguishing between immutable long-term goals and flexible means of pursuing them. Hamas translates the principles of wasati jurisprudence into practical political and military ones. Journal: Studies in Conflict & Terrorism Pages: 683-713 Issue: 7 Volume: 42 Year: 2019 Month: 7 X-DOI: 10.1080/1057610X.2017.1402432 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1402432 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:7:p:683-713 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1425112_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Huseyn Aliyev Author-X-Name-First: Huseyn Author-X-Name-Last: Aliyev Title: When and How Do Militias Disband? Global Patterns of Pro-Government Militia Demobilization in Civil Wars Abstract: The research to date on pro-governm`ent militias demonstrates that numerous pro-regime militia groups were actively deployed in civil wars over the last half a century. As hundreds of militia groups emerged amid civil warfare, hundreds more were disbanded, integrated into regular military, or transformed into political forces. This study seeks to improve our understanding of global patterns of militia demobilization. In contrast to the growing body of literature that explores the emergence of militias or examines their relationship with the state, studies on the demise of pro-government militias are notable by their absence. Statistical analysis of 220 pro-government militias involved in seventy-five civil wars from 1981 to 2011, based on a recent database of pro-government militias, demonstrates that the disappearance of militias has little to do with the termination of armed conflict. This study is the first to investigate when and under which conditions militias created to assist governments in fighting civil wars disband. Journal: Studies in Conflict & Terrorism Pages: 715-734 Issue: 8 Volume: 42 Year: 2019 Month: 8 X-DOI: 10.1080/1057610X.2018.1425112 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1425112 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:8:p:715-734 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1425087_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Douglas Weeks Author-X-Name-First: Douglas Author-X-Name-Last: Weeks Title: Barking Mosque and Quintessential Insight: Overcoming the Problematic Government/Community Counterterrorism Partnership in the UK Abstract: This article looks specifically at the front end of the radicalization problem and argues that vulnerability to political violence is first and foremost a social problem. The article explores the historical counterradicalization approach in Britain and the government/community relationship, and argues that addressing the disaffection that comes with social vulnerability is the key to building resilience to radicalization. Last, the article profiles a holistic counterradicalization response undertaken by Quintessential Insight and the Barking Mosque whereby social vulnerability is reduced, individuals and communities are empowered, social and political agency is maximized, social contracts are restored, and resilience to radicalization is increased. Journal: Studies in Conflict & Terrorism Pages: 735-754 Issue: 8 Volume: 42 Year: 2019 Month: 8 X-DOI: 10.1080/1057610X.2018.1425087 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1425087 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:8:p:735-754 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1415786_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Saira Bano Orakzai Author-X-Name-First: Saira Bano Author-X-Name-Last: Orakzai Title: Pakistan's Approach to Countering Violent Extremism (CVE): Reframing the Policy Framework for Peacebuilding and Development Strategies Abstract: Countering violent extremism (CVE) is one of the central focuses of the government of Pakistan. This article examines the current CVE policy framework and questions the existing paradigm of CVE policies in Pakistan. The article employs R. Kim Cragin's model of “resisting violent extremism†to suggest the need for a paradigm change in Pakistan's CVE policy framework, especially after the launch of another military operation in 2017. After a decade of security-centric counterterrorism policies, such a change requires balancing security-, development-, and prevention-centric policies in order to redefine Pakistan's policy framework. Journal: Studies in Conflict & Terrorism Pages: 755-770 Issue: 8 Volume: 42 Year: 2019 Month: 8 X-DOI: 10.1080/1057610X.2017.1415786 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1415786 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:8:p:755-770 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1419554_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bart Schuurman Author-X-Name-First: Bart Author-X-Name-Last: Schuurman Author-Name: Lasse Lindekilde Author-X-Name-First: Lasse Author-X-Name-Last: Lindekilde Author-Name: Stefan Malthaner Author-X-Name-First: Stefan Author-X-Name-Last: Malthaner Author-Name: Francis O'Connor Author-X-Name-First: Francis Author-X-Name-Last: O'Connor Author-Name: Paul Gill Author-X-Name-First: Paul Author-X-Name-Last: Gill Author-Name: Noémie Bouhana Author-X-Name-First: Noémie Author-X-Name-Last: Bouhana Title: End of the Lone Wolf: The Typology that Should Not Have Been Abstract: This research note argues that the “lone wolf†typology should be fundamentally reconsidered. Based on a three-year empirical research project, two key points are made to support this argument. First, the authors found that ties to online and offline radical milieus are critical to lone actors' adoption and maintenance of both the motive and capability to commit acts of terrorism. Second, in terms of pre-attack behaviors, the majority of lone actors are not the stealthy and highly capable terrorists the “lone wolf†moniker alludes to. These findings not only urge a reconsideration of the utility of the lone-wolf concept, they are also particularly relevant for counterterrorism professionals, whose conceptions of this threat may have closed off avenues for detection and interdiction that do, in fact, exist. Journal: Studies in Conflict & Terrorism Pages: 771-778 Issue: 8 Volume: 42 Year: 2019 Month: 8 X-DOI: 10.1080/1057610X.2017.1419554 File-URL: http://hdl.handle.net/10.1080/1057610X.2017.1419554 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:8:p:771-778 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1425109_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Brandon Colas Author-X-Name-First: Brandon Author-X-Name-Last: Colas Title: Understanding the Idea: Dynamic Equivalence and the Accurate Translation of Jihadist Concepts Abstract: This article argues that inaccurate translation of commonly-transliterated jihadist terms poses a major difficulty to scholars and policy makers who are seeking to understand the appeal and potential weaknesses of jihadist movements. Jihadist English-language propaganda is filled with transliterated terms, usually from Arabic. Although these transliterated terms (such as jihad and sharia) are extremely common, the shorthand English translations of these terms (such as “holy war†and “Islamic lawâ€) often fail to accurately convey the connotative meaning experienced by the jihadist groups using them.The translation theory of dynamic equivalence suggests that accurate translation consists not of word-for-word correspondence between an original source language and a reception language, but instead by finding concepts in the reception language that provide the same sense of emotive meaning that exists in the community using the source language. This concept-to-concept model of translation offers insights into both the community using the source language and the community for which the scholar is writing.A brief overview of dynamic equivalence and its merits for translation is followed by redefinitions of ten commonly-transliterated Arabic words found within the ISIS publication Dabiq. A refined understanding of some of these jihadist terms provides insights into both the appeal and weaknesses of jihadist groups. This model of translation and these improved definitions can serve as the foundation for a longer-term project providing an updated, comprehensive lexicon of jihadist terms. Journal: Studies in Conflict & Terrorism Pages: 779-797 Issue: 9 Volume: 42 Year: 2019 Month: 9 X-DOI: 10.1080/1057610X.2018.1425109 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1425109 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:9:p:779-797 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1427842_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Elena Pokalova Author-X-Name-First: Elena Author-X-Name-Last: Pokalova Title: Driving Factors behind Foreign Fighters in Syria and Iraq Abstract: With the rise of the self-proclaimed Islamic State of Iraq and Syria (ISIS), the phenomenon of foreign fighters became a significant security concern. Governments around the world have become preoccupied with the possibility of their citizens leaving for combat zones and then coming back with training and experience. While previously foreign fighters participated in such conflicts as Afghanistan, Bosnia, or Chechnya, today ISIS has attracted record numbers of individuals from various backgrounds. This article examines factors that might be connected with the outflow of foreign fighters to Syria and Iraq. The analysis is based on 190 countries with 103 of them serving as countries of origin for 33,815 foreign fighters. Negative binomial regression is used to evaluate the connection of political, economic, demographic, and social factors to numbers of foreign fighters. The findings indicate that more foreign fighters come from countries with higher Human Development Index levels, unemployment rates, percentages of youth, population size, percentages of Muslim population, emigration levels, Internet penetration, and the presence of Al Qaeda cells. However, the findings further indicate that the effect of these variables is not uniform across majority Muslim and majority non-Muslim countries. Journal: Studies in Conflict & Terrorism Pages: 798-818 Issue: 9 Volume: 42 Year: 2019 Month: 9 X-DOI: 10.1080/1057610X.2018.1427842 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1427842 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:9:p:798-818 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1430618_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Russell Lundberg Author-X-Name-First: Russell Author-X-Name-Last: Lundberg Title: Archetypal Terrorist Events in the United States Abstract: This research presents a typology of terrorist events rather than the more common typologies of terrorist groups and ideologies. Archetypal analysis, a quantitative methodology to identify pure types, was used with data in START's Global Terrorism Database to identify archetypal attacks in the United States. A set of seven archetypal events was identified including abortion bombings, poisonings, Aryan hate, hostage-taking, fire/bomb for damage, assassination, and the catastrophic Big Bad. These archetypes may be useful for training and exercising for events with additional potential value for developing theory of terrorist events. Journal: Studies in Conflict & Terrorism Pages: 819-835 Issue: 9 Volume: 42 Year: 2019 Month: 9 X-DOI: 10.1080/1057610X.2018.1430618 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1430618 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:9:p:819-835 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1432027_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alexandra Phelan Author-X-Name-First: Alexandra Author-X-Name-Last: Phelan Title: Engaging Insurgency: The Impact of the 2016 Colombian Peace Agreement on FARC's Political Participation Abstract: The 2016 Peace Agreement between the Colombian government and the Revolutionary Armed Forces of Colombia—People's Army (the FARC-EP or FARC) commits to reforming political participation, especially of traditionally marginalized sectors throughout the country to consolidate Colombian democracy. While the Peace Agreement provides implementation mechanisms that support the insurgency's transition from armed group to political party, it also complements the FARC's political strategy that has traditionally maintained consistency. This article argues that the 2016 Peace Agreement has the potential to enhance democratic, political, and societal participation by engaging with FARC in two key ways—by attempting to reconcile key FARC grievances and containing specific mechanisms that increase participation of traditionally marginalized groups in Colombia. This article argues that the Agreement has impacted positively on FARC's political participation and given it incentives to pursue its political strategy democratically. Likewise, the Agreement has provided a positive-sum outcome for the Colombian government to strengthen its democratic legitimacy by placing emphasis on structural reform. Journal: Studies in Conflict & Terrorism Pages: 836-852 Issue: 9 Volume: 42 Year: 2019 Month: 9 X-DOI: 10.1080/1057610X.2018.1432027 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1432027 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:42:y:2019:i:9:p:836-852 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1471965_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Dr Bernhard Blumenau Author-X-Name-First: Dr Bernhard Author-X-Name-Last: Blumenau Author-Name: Professor Jussi M. Hanhimäki Author-X-Name-First: Professor Jussi M. Author-X-Name-Last: Hanhimäki Title: Introduction Journal: Studies in Conflict & Terrorism Pages: 1-4 Issue: 1 Volume: 43 Year: 2020 Month: 1 X-DOI: 10.1080/1057610X.2018.1471965 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471965 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:1:p:1-4 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1471967_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Felicitas Fischer von Weikersthal Author-X-Name-First: Felicitas Fischer Author-X-Name-Last: von Weikersthal Title: From Terrorists to Statesmen: Terrorism and Polish Independence Abstract: This article examines the legacies of radical and terrorist pasts in Józef PiÅ‚sudski's “moral dictatorship†in interwar Poland. Leading figures of PiÅ‚sudki's government had been involved in the fight for Polish independence already during the years of the Russian Revolution of 1905. They joined the radical fighting squads of the Polish Socialist Party and participated in acts of political and economic terror. Exploring in detail the terrorist past of these later statesmen this article argues that their terrorist backgrounds were reflected in and shaped the nature of PiÅ‚sudki's leadership. Journal: Studies in Conflict & Terrorism Pages: 5-23 Issue: 1 Volume: 43 Year: 2020 Month: 1 X-DOI: 10.1080/1057610X.2018.1471967 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471967 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:1:p:5-23 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1471968_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Andrea Chiampan Author-X-Name-First: Andrea Author-X-Name-Last: Chiampan Title: Encountering Violence: The Movement and the Legitimation of Violence at the Eve of Italy's anni di piombo Abstract: In re-evaluating the origins of Italian clandestine political violence groups in the early 1970s, this article sheds new light on overlapping processes of legitimation of violence that took place in that “transitional space†created by the 1968–69 social upheavals. Eschewing mono-causal explanations, this article points attention to how violence was legitimized at different levels: in the interaction between the movement and the “protest policingâ€; in the competing memories of the Resistenza that generated opposing extremes; and at an international/transnational level, where the Cold War and the mythology of the decolonization movements framed and inspired the choices of Italians terrorists. Journal: Studies in Conflict & Terrorism Pages: 24-46 Issue: 1 Volume: 43 Year: 2020 Month: 1 X-DOI: 10.1080/1057610X.2018.1471968 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471968 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:1:p:24-46 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1471969_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bernhard Blumenau Author-X-Name-First: Bernhard Author-X-Name-Last: Blumenau Title: Unholy Alliance: The Connection between the East German Stasi and the Right-Wing Terrorist Odfried Hepp Abstract: This article, providing an example of state support for terrorists, looks at the cooperation between the Stasi and the right-wing West German terrorist Odfried Hepp in the 1980s. Based on research in Stasi archives, the article explains that gathering information, rather than using him as a terrorist weapon in the Cold War, was the main motivator for the Stasi to cooperate with a high-profile neo-Nazi. By looking at the details of the Hepp-Stasi alliance, it assesses what forms, results, and dangers this relationship produced. The article challenges the myth of the all-mighty East German State Security and demonstrates that the dynamics of this alliance were not always in the Stasi's favour. In the absence of other instruments of coercion, the Stasi used the personal relationship between Hepp and his officers to control him. The article offers insights into Hepps's terrorist career but also the pragmatic way in which the Stasi built its network of informants outside the GDR. It also adds nuances to the understanding of the relationship between Socialist states and terrorists during the Cold War. Journal: Studies in Conflict & Terrorism Pages: 47-68 Issue: 1 Volume: 43 Year: 2020 Month: 1 X-DOI: 10.1080/1057610X.2018.1471969 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471969 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:1:p:47-68 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1471970_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Adrian Hänni Author-X-Name-First: Adrian Author-X-Name-Last: Hänni Title: Secret Bedfellows? The KGB, Carlos the Jackal and Cold War Psychological Warfare Abstract: This article contributes to the understanding of the emergence, character, and significance of conspiracy theories on state–terrorism relations by providing a historical case study on the “Carlos–KGB [Komitet gosudarstvennoy bezopasnosti] conspiracy theoryâ€: the fictional narrative that the “super-terrorist†Carlos the Jackal was an agent of the KGB, exploited against the Soviet Union's Cold War enemies. The analysis shows that the stories originated from disinformation operations of Western intelligence services, which were then spread by the news media, politicians, and Carlos himself. The mythical Carlos simulated through Cold War psychological warfare is deconstructed as a symbol of Soviet control of international terrorism. Journal: Studies in Conflict & Terrorism Pages: 69-87 Issue: 1 Volume: 43 Year: 2020 Month: 1 X-DOI: 10.1080/1057610X.2018.1471970 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471970 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:1:p:69-87 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1510610_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Isabelle Côté Author-X-Name-First: Isabelle Author-X-Name-Last: Côté Author-Name: Limingcui Emma Huang Author-X-Name-First: Limingcui Emma Author-X-Name-Last: Huang Title: Where are the Daughters? Examining the Effects of Gendered Migration on the Dynamics of “Sons of the Soil†Conflict Abstract: Why are female migrants rarely attacked in “Sons of the Soil†(SoS) violence? Based on interviews with key stakeholders in Indonesia and China, we argue that women are shielded from the brunt of migration-related violence due to gendered patterns of migration and economic integration that highlights the positive contributions of female migration to the host region while drawing attention to the threat posed by male migration. By bringing together the literature on migration, gender, inequalities, and conflict, this article makes a foray into the previously unexamined dynamics affecting victimization patterns in armed conflict in general and SoS conflict in particular. Journal: Studies in Conflict & Terrorism Pages: 837-853 Issue: 10 Volume: 43 Year: 2020 Month: 10 X-DOI: 10.1080/1057610X.2018.1510610 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1510610 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:10:p:837-853 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1505686_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matteo Vergani Author-X-Name-First: Matteo Author-X-Name-Last: Vergani Author-Name: Muhammad Iqbal Author-X-Name-First: Muhammad Author-X-Name-Last: Iqbal Author-Name: Ekin Ilbahar Author-X-Name-First: Ekin Author-X-Name-Last: Ilbahar Author-Name: Greg Barton Author-X-Name-First: Greg Author-X-Name-Last: Barton Title: The Three Ps of Radicalization: Push, Pull and Personal. A Systematic Scoping Review of the Scientific Evidence about Radicalization Into Violent Extremism Abstract: In this article, we present the findings of the first systematic scoping review of scientific literature on radicalization into violent extremism since the Al Qaeda attacks on 11 September 2001. We selected and categorized all scholarly, peer-reviewed, English-language articles published between 2001 and 2015 that empirically investigated the factors of radicalization into violent extremism (N = 148). In the analysis we consider two main dependent variables (behavioral and cognitive radicalization) and three main independent variables (push, pull, and personal factors). “Pull†factors of radicalization emerge as the main factors of radicalization across studies focused on different geographical areas and ideologies. This article points to the need to focus more on the interaction between push, pull, and personal factors, and to diversify the methodologies used in the field. Journal: Studies in Conflict & Terrorism Pages: 854-854 Issue: 10 Volume: 43 Year: 2020 Month: 10 X-DOI: 10.1080/1057610X.2018.1505686 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1505686 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:10:p:854-854 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1507312_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matthijs Bogaards Author-X-Name-First: Matthijs Author-X-Name-Last: Bogaards Title: Kinder, Gentler, Safer? A Re-Examination of the Relationship between Consensus Democracy and Domestic Terrorism Abstract: Can inclusive institutions tame the threat of domestic terrorism? In a series of recent publications, the political scientists Arend Lijphart and Matt Qvortrup claim that consensus democracies are not only kinder and gentler, but also safer: consensus democracies are less likely to experience deadly domestic terrorism and when they do, they suffer fewer fatalities than majoritarian democracies. This article reexamines the logic and the evidence. It argues that the underlying grievance theory of terrorism contains important gaps and that the statistical results are based on a problematic coding of cases and lack robustness. Lijphart and Qvortrup have opened up an important new line of inquiry, but their results do not withstand scrutiny. Journal: Studies in Conflict & Terrorism Pages: 886-903 Issue: 10 Volume: 43 Year: 2020 Month: 10 X-DOI: 10.1080/1057610X.2018.1507312 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1507312 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:10:p:886-903 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1529376_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matt Qvortrup Author-X-Name-First: Matt Author-X-Name-Last: Qvortrup Title: The Logic of Domestic Terrorism Revisited: A Response to a Critic Abstract: The article responds to criticisms raised by Matthijs Bogaards. While he makes a number of valid methodological points, it is maintained that the Qvortrup–Lijphart Model of Domestic Terrorism remains paradigmatic. Part of the criticism seems to be based on a misunderstanding of the requirement that causal theories should be as parsimonious as possible. Further, Bogaards does not provide an alternative that both accounts for the occurrences explained by the model as well as the issues that were explained by it (as is required by falsificationist methodological rules). In short, the theory that institutions can contribute to limiting the occurrence of domestic terrorism remains strong, at least in developed capitalist societies. There is no viable alternative; opportunities for democratic engagement are a potent force against political violence. Journal: Studies in Conflict & Terrorism Pages: 904-909 Issue: 10 Volume: 43 Year: 2020 Month: 10 X-DOI: 10.1080/1057610X.2018.1529376 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1529376 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:10:p:904-909 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1529375_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matthijs Bogaards Author-X-Name-First: Matthijs Author-X-Name-Last: Bogaards Title: Coding, Concessions, Conclusions: A Reply to Matt Qvortrup Journal: Studies in Conflict & Terrorism Pages: 910-912 Issue: 10 Volume: 43 Year: 2020 Month: 10 X-DOI: 10.1080/1057610X.2018.1529375 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1529375 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:10:p:910-912 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1506560_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Zeynab Malakoutikhah Author-X-Name-First: Zeynab Author-X-Name-Last: Malakoutikhah Title: Iran: Sponsoring or Combating Terrorism? Abstract: Iran has a longstanding connection with terrorism, in particular after the 1979 Islamic Revolution. It has been recognized as both a victim and state sponsor of terrorism, but has predominantly been accused of supporting terrorism worldwide. Iran has been accused of training, financing, and providing weapons and safe havens for nonstate militant actors, such as Hezbollah and Hamas. While Iran considers such groups as national liberation movements, they are by contrast designated as terrorist groups according to other countries. At the same time, Iran has suffered from terrorist attacks, although Iranian security has proven much superior to its neighbors, such as Iraq, Syria, and Afghanistan. Regardless of claims relating to Iran as a victim or sponsor of terrorism, no official policy or document has been published by the government by way of a counterterrorism policy because any stated policy would be subject to accountability, human rights, and the rule of law. In practice, its focus is placed on the “War by Terror†as an external instrument as opposed to internal “Counterterrorism.†By analysis of official documents, statements, and laws, both Persian and English sources, this article aims to clarify Iran’s counterterrorism policy and framework and the actual practices of Iran in the Middle East. Journal: Studies in Conflict & Terrorism Pages: 913-939 Issue: 10 Volume: 43 Year: 2020 Month: 10 X-DOI: 10.1080/1057610X.2018.1506560 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1506560 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:10:p:913-939 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1507790_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Erin M. Kearns Author-X-Name-First: Erin M. Author-X-Name-Last: Kearns Author-Name: Victor Asal Author-X-Name-First: Victor Author-X-Name-Last: Asal Author-Name: James Igoe Walsh Author-X-Name-First: James Igoe Author-X-Name-Last: Walsh Author-Name: Christopher Federico Author-X-Name-First: Christopher Author-X-Name-Last: Federico Author-Name: Anthony F. Lemieux Author-X-Name-First: Anthony F. Author-X-Name-Last: Lemieux Title: Political Action as a Function of Grievances, Risk, and Social Identity: An Experimental Approach Abstract: Why would individuals engage in or support contentious politics? This question is challenging to answer with observational data where causal factors are correlated and difficult to measure. Using a survey-embedded experiment, we focus on three situational factors: grievances, risk, and identity. We also explore how individual differences in sociopolitical orientations—social dominance orientation (SDO) and right-wing authoritarianism (RWA)—impact action. Grievances influence engagement in and support for protests. Risk influences engagement in protest, but not support for it. Regardless of condition, SDO and RWA help explain why some people engage in protest while others do not, particularly within the same context. Journal: Studies in Conflict & Terrorism Pages: 941-958 Issue: 11 Volume: 43 Year: 2020 Month: 11 X-DOI: 10.1080/1057610X.2018.1507790 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1507790 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:11:p:941-958 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1514079_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: William Moravits Author-X-Name-First: William Author-X-Name-Last: Moravits Title: Attack at Fort Hood: Experiences and Suggestions for Security Abstract: In the past nine years, three lone wolf terrorists have targeted military bases or recruiting centers in the United States and research suggests attacks on the U.S. military are increasing globally. The problem was that research had not addressed the lived experiences of survivors of lone wolf attacks, nor how they could inform procedures regarding a sense of security for military men and women. The purpose of this research was to establish a need to address threats to the security of the military from these attacks, to provide a rich description of survivors’ experiences of the attack at Fort Hood, and to identify suggestions for improving military personnel’s sense of security while on base. Using the community-based approach to public health. the central research question asked how the lived experiences of survivors of the attack at Fort Hood could lead to an increased sense of security on base. The study revealed high levels of stress, hyperawareness, and negative changes in the lives of these soldiers. The findings suggest an increased show of force by police throughout the base, a designated office for anonymously reporting suspicious activity, and more training to help soldiers cope with the experiences of combat-related trauma. Journal: Studies in Conflict & Terrorism Pages: 959-988 Issue: 11 Volume: 43 Year: 2020 Month: 8 X-DOI: 10.1080/1057610X.2018.1514079 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1514079 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:11:p:959-988 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1512237_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jesse C. Reiff Author-X-Name-First: Jesse C. Author-X-Name-Last: Reiff Title: When Ali Comes Marching Home: Shi’a Foreign Fighters after Syria Abstract: Since the Syrian Civil War broke out in 2011, there has been an unprecedented mobilization of Iran-backed Shi’a foreign fighters to Syria to protect Shi’a communities and shrines, combat the Islamic State, and buttress Syrian President Bashar al-Assad. As the conflict nears a resolution, the fate of these Shi’a fighters remains uncertain. This article argues large numbers of Shi’a foreign fighters will engage in domestic and transnational insurgency and civil war due to hardening sectarian identities, a nascent pan-Shi’a ideology, Iranian direction, and the presence on ongoing conflicts in the Middle East and South Asia; however, the threat is lessened by so-called off-ramps, ranging from death to disillusionment with conflict. The article concludes with implications and policy recommendations for U.S. leaders. Journal: Studies in Conflict & Terrorism Pages: 989-1010 Issue: 11 Volume: 43 Year: 2020 Month: 11 X-DOI: 10.1080/1057610X.2018.1512237 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1512237 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:11:p:989-1010 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1514054_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Melissa J. Salyk-Virk Author-X-Name-First: Melissa J. Author-X-Name-Last: Salyk-Virk Title: Building Community Resilience? Community Perspectives of the Countering Violent Extremism Pilot Program in Minneapolis/St. Paul Abstract: In August 2011, international recruitment to terrorist groups became a growing concern for the United States. The Obama administration started a public–private partnership pilot program focused on countering violent extremism (CVE) in the United States. This program was the first of its kind. It directly addressed the administration’s concern about domestic violent extremism and radicalization in the United States. The Twin Cities’ program, Building Community Resilience, focused primarily on prevention of radicalization through a community and government partnership. This article analyzes tensions between government-sanctioned CVE approaches and the communities where programs are implemented. Until now, research and analysis have not been performed on this specific program from a community perspective. Journal: Studies in Conflict & Terrorism Pages: 1011-1042 Issue: 11 Volume: 43 Year: 2020 Month: 11 X-DOI: 10.1080/1057610X.2018.1514054 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1514054 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:11:p:1011-1042 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1514093_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Charles W. Mahoney Author-X-Name-First: Charles W. Author-X-Name-Last: Mahoney Title: Empty Threats: How Extremist Organizations Bluff in Terrorist Campaigns Abstract: Why do extremist organizations issue terrorist bluffs? According to previous research, empty threats against civilians are likely to negatively influence assessments of groups’ strength and credibility, thus making it more difficult for extremists to achieve their goals. Despite these potential audience costs, bluffing is a common terrorist tactic. This inquiry assesses data on the bluffing patterns of three organizations—Boko Haram, Jamaat-ul-Ahrar, and the Real Irish Republican Army—and finds that groups suffer few costs for making empty terrorist threats. Furthermore, extremists bluff to advance a variety of strategic goals including outbidding rival factions, spoiling peace settlements, and intimidating civilians. Journal: Studies in Conflict & Terrorism Pages: 1043-1063 Issue: 12 Volume: 43 Year: 2020 Month: 12 X-DOI: 10.1080/1057610X.2018.1514093 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1514093 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:12:p:1043-1063 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1520797_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nathan González Mendelejis Author-X-Name-First: Nathan Author-X-Name-Last: González Mendelejis Title: Toward a New Typology of Sunni Jihad Abstract: One recurring theme of the immediate post-9/11 environment was that of regional political organizations and violent lone-wolf actors pledging allegiance to Osama bin Laden’s Al Qaeda group (AQ). Following the Islamic State of Iraq and Syria (ISIS)’s 2014 capture of Mosul, Iraq, many of these loose affiliations began shifting to ISIS. This resulted in a blurring of distinctions between different types of Sunni jihadi organizations, with media commentators and analysts at times referring to groups as “Al Qaeda–like†or “ISIS-affiliated,†despite those groups’ goals and operational scopes being largely disconnected from both AQ and ISIS. This article proposes a new typology of Sunni jihadi groups according to theater of operation, strategy, and geopolitical alignment. This typology offers three categories: global jihad, local jihad, and sectarian jihad. In addition, it identifies four types of operation types that Sunni jihadi groups adopt: (1) core theater attacks, (2) power-projection attacks, (3) local recruitment, and (4) foreign recruitment. The main contribution of this article is its frameworks for improving the quality of the analysis of Sunni jihadi groups. Journal: Studies in Conflict & Terrorism Pages: 1064-1085 Issue: 12 Volume: 43 Year: 2020 Month: 12 X-DOI: 10.1080/1057610X.2018.1520797 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1520797 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:12:p:1064-1085 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1529367_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Niamatullah Ibrahimi Author-X-Name-First: Niamatullah Author-X-Name-Last: Ibrahimi Author-Name: Shahram Akbarzadeh Author-X-Name-First: Shahram Author-X-Name-Last: Akbarzadeh Title: Intra-Jihadist Conflict and Cooperation: Islamic State–Khorasan Province and the Taliban in Afghanistan Abstract: The proliferation of jihadist groups raises intriguing questions about their internal relationship. Drawing on Resource Mobilization Theory we explore this question by examining the relationship between the Taliban and the local incarnations of the Islamic State of Iraq and Syrian (ISIS) in Afghanistan. We conceive the Taliban and ISIS as parts of a broader “jihadist movement industry†that is simultaneously united and divided by the logic of their embeddedness in the movement. While most existing research emphasizes intra-jihadist conflict or rivalry, we found that the relationship between the two groups goes through cyclical shifts, vacillating between conflict and cooperation. Journal: Studies in Conflict & Terrorism Pages: 1086-1107 Issue: 12 Volume: 43 Year: 2020 Month: 12 X-DOI: 10.1080/1057610X.2018.1529367 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1529367 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:12:p:1086-1107 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1523358_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tom Smith Author-X-Name-First: Tom Author-X-Name-Last: Smith Author-Name: Peter Lee Author-X-Name-First: Peter Author-X-Name-Last: Lee Author-Name: Vladimir Rauta Author-X-Name-First: Vladimir Author-X-Name-Last: Rauta Author-Name: Sameera Khalfey Author-X-Name-First: Sameera Author-X-Name-Last: Khalfey Title: Understanding the Syria Babel: Moral Perspectives on the Syrian Conflict from Just War to Jihad Abstract: The war in Syria, and its ongoing analysis, is burdened by a variety of seemingly irreconcilable political motivations, actions, ideologies, religious affiliations, and power dynamics of multiple state and nonstate actors. In this context, various moral perspectives appear to come into direct conflict, underpinning the actions of the actors involved and to varying degrees influencing their competing political interests. Is there a coherent dialogue of moralities between the rivals involved or is Babel reborn with moral claims being launched but with no real exchange of meaning involved? On Syria, the answer is a complicated mixture of both but within which are important and as yet underappreciated patterns of convergence and divergence. This article looks at the leading states involved as well as the role of individuals to elucidate this pattern of overlap and difference in the morality discourses surrounding Syria. Ultimately, it is argued that a moral Babel is not reborn in Syria: there is sufficiently common moral language being used by all sides for a degree of shared meaning to emerge. The challenge is for the protagonists to listen and really hear what is being said and work with those commonalties as tools toward peace. Journal: Studies in Conflict & Terrorism Pages: 1108-1128 Issue: 12 Volume: 43 Year: 2020 Month: 12 X-DOI: 10.1080/1057610X.2018.1523358 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1523358 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:12:p:1108-1128 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1442141_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jacob Zenn Author-X-Name-First: Jacob Author-X-Name-Last: Zenn Title: Boko Haram's Conquest for the Caliphate: How Al Qaeda Helped Islamic State Acquire Territory Abstract: This article explains how Al Qaeda in the Islamic Maghreb (AQIM)–trained Nigerian militants split from Boko Haram and formed a new group called Ansaru in 2011 after consulting with AQIM. Ansaru leaders, however, reintegrated with Boko Haram and transferred their specialized skills in kidnappings, suicide bombings, and media to Boko Haram and contributed to the group's conquest of territory in 2013. Al Qaeda did not benefit from these conquests because Ansaru leaders switched loyalties and helped arrange Boko Haram's pledge to Islamic State in 2015. This article exploits primary source documents from AQIM, Islamic State, and Boko Haram and contributes to the literature on splits and mergers and knowledge transfer between terrorist groups and Al Qaeda–Islamic State competition. Journal: Studies in Conflict & Terrorism Pages: 89-122 Issue: 2 Volume: 43 Year: 2020 Month: 2 X-DOI: 10.1080/1057610X.2018.1442141 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1442141 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:2:p:89-122 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1445500_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Shelli Israelsen Author-X-Name-First: Shelli Author-X-Name-Last: Israelsen Title: Why Now? Timing Rebel Recruitment of Female Combatants Abstract: Using case study evidence, this article demonstrates how the relationship between conflict intensity, gender inclusive ideologies and gender inclusive policies on one hand, and the decision to recruit female combatants on the other hand, is conditioned by the groups' conflict phase. Conflict phases divide conflict events into two distinct parts, the guerrilla activity phase and the civil war phase, contingent on the insurgents' number of armed fighters, military capabilities, level of institutionalization and degree of territorial control. These conflict phases affect the recruitment behavior of insurgent groups making them more likely to recruit female combatants in the civil war phase and less likely to do so in the guerrilla activity phase. Journal: Studies in Conflict & Terrorism Pages: 123-144 Issue: 2 Volume: 43 Year: 2020 Month: 2 X-DOI: 10.1080/1057610X.2018.1445500 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1445500 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:2:p:123-144 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1445501_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Paul Gill Author-X-Name-First: Paul Author-X-Name-Last: Gill Author-Name: Zoe Marchment Author-X-Name-First: Zoe Author-X-Name-Last: Marchment Author-Name: Emily Corner Author-X-Name-First: Emily Author-X-Name-Last: Corner Author-Name: Noémie Bouhana Author-X-Name-First: Noémie Author-X-Name-Last: Bouhana Title: Terrorist Decision Making in the Context of Risk, Attack Planning, and Attack Commission Abstract: Terrorists from a wide array of ideological influences and organizational structures consider security and risk on a continuous and rational basis. The rationality of terrorism has been long noted of course but studies tended to focus on organizational reasoning behind the strategic turn toward violence. A more recent shift within the literature has examined rational behaviors that underpin the actual tactical commission of a terrorist offense. This article is interested in answering the following questions: What does the cost–benefit decision look like on a single operation? What does the planning process look like? How do terrorists choose between discrete targets? What emotions are felt during the planning and operational phases? What environmental cues are utilized in the decision-making process? Fortunately, much insight is available from the wider criminological literature where studies often provide offender-oriented accounts of the crime commission process. We hypothesize similar factors take place in terrorist decision making and search for evidence within a body of terrorist autobiographies. Journal: Studies in Conflict & Terrorism Pages: 145-160 Issue: 2 Volume: 43 Year: 2020 Month: 2 X-DOI: 10.1080/1057610X.2018.1445501 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1445501 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:2:p:145-160 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1446295_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Paul B. Rich Author-X-Name-First: Paul B. Author-X-Name-Last: Rich Title: Hollywood and Cinematic Representations of Far-Right Domestic Terrorism in the U.S Abstract: This article argues that a major influence on the imagery of far-right terrorism in the United States derives from cinema. Most of the feature films released by Hollywood on this theme have been rather superficial and have rarely strayed beyond portraying right-wing terrorist movements in popular genres such as westerns, crime thrillers, and romantic melodramas—although not, interestingly, action adventure movies, so often the terrain for narratives involving external terrorist movements. The article contends that U.S. far-right terrorism before the 1990s was anchored in the films depicting the Ku Klux Klan; more recently, a few films have begun to engage with “new†forms of far-right terrorism involving skinheads, neo-Nazis, and “patriot†militias. Overall, remarkably few films released by Hollywood have engaged with the structure of far-right terrorist movements or the motivations of their followers. This has ensured that the movements remained shadowy organizations run, for the most part, by two-dimensional and stereotypical characters. Journal: Studies in Conflict & Terrorism Pages: 161-182 Issue: 2 Volume: 43 Year: 2020 Month: 2 X-DOI: 10.1080/1057610X.2018.1446295 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1446295 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:2:p:161-182 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1444955_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Simon Cottee Author-X-Name-First: Simon Author-X-Name-Last: Cottee Author-Name: Jack Cunliffe Author-X-Name-First: Jack Author-X-Name-Last: Cunliffe Title: Watching ISIS: How Young Adults Engage with Official English-Language ISIS Videos Abstract: Research on jihadist online propaganda (JOP) tends to focus on the production, content, and dissemination of jihadist online messages. Correspondingly, the target of JOP—that is, the audience—has thus far attracted little scholarly attention. This article seeks to redress this neglect by focusing on how audiences respond to jihadist online messaging. It presents the findings of an online pilot survey testing audience responses to clips from English-language Islamic State of Iraq and Syria videos. The survey was beset at every stage by ethical, legal, and practical restrictions, and we discuss how these compromised our results and what this means for those attempting to do research in this highly sensitive area. Journal: Studies in Conflict & Terrorism Pages: 183-207 Issue: 3 Volume: 43 Year: 2020 Month: 3 X-DOI: 10.1080/1057610X.2018.1444955 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1444955 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:3:p:183-207 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1450613_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Suraj Lakhani Author-X-Name-First: Suraj Author-X-Name-Last: Lakhani Title: Extreme Criminals: Reconstructing Ideas of Criminality through Extremist Narratives Abstract: There is a growing body of evidence to suggest that there has been a determined effort by Al Qaeda, and more recently Islamic State, to recruit petty and street criminals into their networks. Despite this, and increasing global concern, there exists very little scholarly literature exploring this phenomenon, particularly empirically grounded. This article directly addresses this gap in research, and is one of the, if not the, first to present an analysis underpinned by qualitative empirical interview data, collected from former extremists and active grassroots workers in the United Kingdom. The article determines that through religious and social justifications offered to reduce moral concerns, extremists encourage criminals to continue, intensify, and diversify their criminality, with intentions to fund violent extremist activity, or to create social unrest within society. Rather than attempting to change behavior, this is about reconstructing criminals’ motivations; a consideration that has wider implications for counterterrorism policy and operations. Journal: Studies in Conflict & Terrorism Pages: 208-223 Issue: 3 Volume: 43 Year: 2020 Month: 3 X-DOI: 10.1080/1057610X.2018.1450613 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1450613 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:3:p:208-223 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1455372_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Erik Cruz Author-X-Name-First: Erik Author-X-Name-Last: Cruz Author-Name: Stewart J. D'Alessio Author-X-Name-First: Stewart J. Author-X-Name-Last: D'Alessio Author-Name: Lisa Stolzenberg Author-X-Name-First: Lisa Author-X-Name-Last: Stolzenberg Title: The Labor Market and Terrorism Abstract: Using six years of data (2011–16) drawn from the Global Terrorism Database and from other sources for 127 countries, a pooled cross-sectional time-series research design is employed to investigate whether the health of a country's labor market influences the number of terrorist incidents a country experiences. Results show a strong negative relationship between labor force participation and the frequency of terrorist incidents. Neither the youth unemployment rate nor the unemployment rate has a notable influence on predicting acts of terrorism. Findings also reveal that the percent of a country's population living in urban areas does not condition the relationship between labor force participation and terrorism. The observed effect of labor force participation has methodological consequences for how a country's labor market ought to be conceptualized in future research studies on terrorism. Such a finding also has relevant policy implications because it suggests that greater attention should be directed at devising ways for countries to enhance employment opportunities not only to improve economic conditions, but also to assist in the reduction of terrorism. Journal: Studies in Conflict & Terrorism Pages: 224-238 Issue: 3 Volume: 43 Year: 2020 Month: 3 X-DOI: 10.1080/1057610X.2018.1455372 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1455372 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:3:p:224-238 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1457204_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Samantha Weirman Author-X-Name-First: Samantha Author-X-Name-Last: Weirman Author-Name: Audrey Alexander Author-X-Name-First: Audrey Author-X-Name-Last: Alexander Title: Hyperlinked Sympathizers: URLs and the Islamic State Abstract: The self-proclaimed Islamic State of Iraq and Syria (ISIS) and its supporters take measured steps to ensure the group's survival in the virtual sphere, despite continued efforts to undercut the organization. This study examines a time-bound sample of 240,158 Uniform Resource Locators shared among English-language ISIS sympathizers on Twitter to better understand how networks in the jihadisphere inoculate radical materials and communities online. A thematic but descriptive analysis of results illustrates the dynamic apparatus of digital communications leveraged by ISIS. Findings suggest a more comprehensive strategy to undercut ISIS's web of online information requires a similarly networked response by counterextremism practitioners. Journal: Studies in Conflict & Terrorism Pages: 239-257 Issue: 3 Volume: 43 Year: 2020 Month: 3 X-DOI: 10.1080/1057610X.2018.1457204 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1457204 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:3:p:239-257 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1455373_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kira Harris Author-X-Name-First: Kira Author-X-Name-Last: Harris Title: Russia's Fifth Column: The Influence of the Night Wolves Motorcycle Club Abstract: While the Night Wolves Motorcycle Club's (NWMC) roots are similar to Western counterparts such as the Hells Angels MC and Bandidos MC, they have evolved into a proxy of the Russian state who unite combat-ready diasporas. The NWMC nongovernmental organization provides soft propaganda while they operate alongside the Russian military and imbed military tactics into foreign Russian populations through their corporate entity Wolf Holding of Security Structures. This case study explores the evolution from outlaw motorcycle club to political force and their integration into Russia's information operations and conflict. The NWMC activities in Eastern Europe, particularly Ukraine, highlight how this motorcycle club has been able to cultivate a fifth column to agitate domestic politics and increase ties to the Kremlin. Journal: Studies in Conflict & Terrorism Pages: 259-273 Issue: 4 Volume: 43 Year: 2020 Month: 4 X-DOI: 10.1080/1057610X.2018.1455373 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1455373 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:4:p:259-273 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1457420_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jonathan Pieslak Author-X-Name-First: Jonathan Author-X-Name-Last: Pieslak Author-Name: Nelly Lahoud Author-X-Name-First: Nelly Author-X-Name-Last: Lahoud Title: The Anashid of the Islamic State: Influence, History, Text, and Sound Abstract: This article examines the rise of the Islamic State (IS) through its anashid (a cappella), analyzing their lyrics and their musical attributes such as sonic elements, pitch, and harmony, among others. It focuses on key themes that define the group's lyrics and traces the evolution of anashid production and use—an evolution that began with the IS borrowing existing jihad-themed anashid to articulate its message and accompany its video messaging, and led to a far more developed and sophisticated sonic identity in the form of internally produced, group-specific anashid. The IS's claims to legitimacy as the caliphate are sounded out in the group's anashid. The recurring appearance of propaganda in the form of anashid and videos builds a strong case for the genre's significance among the highly complex factors catalyzing an individual's involvement in carrying out violence, especially among recent attacks within Western countries in the name of IS. Journal: Studies in Conflict & Terrorism Pages: 274-299 Issue: 4 Volume: 43 Year: 2020 Month: 4 X-DOI: 10.1080/1057610X.2018.1457420 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1457420 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:4:p:274-299 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1454042_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Edward Newman Author-X-Name-First: Edward Author-X-Name-Last: Newman Title: Hungry, or Hungry for Change? Food Riots and Political Conflict, 2005–2015 Abstract: This article presents new, original data on food riots and protests between 2005 and 2015 and explores the societal conditions in which these events occurred. These conditions include a range of economic, social, demographic, political, and household consumption factors, with reference to a number of conflict theories. The article explores whether instability related to food prices should be seen as an expression of hunger within the most vulnerable and deprived societies, or a demonstration of grievances rooted in broader political contestation. The article also contributes to debates about the methodological challenges of focusing on food prices as a factor relevant to instability and conflict, and the question of whether food riots have significance to broader debates about conflict. Journal: Studies in Conflict & Terrorism Pages: 300-324 Issue: 4 Volume: 43 Year: 2020 Month: 4 X-DOI: 10.1080/1057610X.2018.1454042 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1454042 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:4:p:300-324 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1462135_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nazih Richani Author-X-Name-First: Nazih Author-X-Name-Last: Richani Title: Fragmented Hegemony and the Dismantling of the War System in Colombia Abstract: Establishing peace in Colombia has been an enigma escaping the best intentions of some presidents. The causes of this riddle are multiple. Some attributed it to the nature of the state-making process led by a fractured elite compounded with the state limited resources in a country with one of the most complex topographies in the world. This article tackles part of this puzzle, particularly the inability of any fraction of the elite to establish its hegemonic vision over the others and hence to pacify the polity. It explores why previous presidents who attempted to find a peaceful settlement of its long armed conflict failed and why and how did President Juan Manuel Santos succeed. Against the backdrop of a fragmented hegemony, I analyze two core areas that have received scant attention in the literature, which are essential to understand the previous failures. The role of the United States in the Colombian conflict and the excessive autonomy of Colombia military institution vis-à -vis the executive in conducting the war. Journal: Studies in Conflict & Terrorism Pages: 325-350 Issue: 4 Volume: 43 Year: 2020 Month: 4 X-DOI: 10.1080/1057610X.2018.1462135 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1462135 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:4:p:325-350 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1471972_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Zachary Kallenborn Author-X-Name-First: Zachary Author-X-Name-Last: Kallenborn Author-Name: Philipp C. Bleek Author-X-Name-First: Philipp C. Author-X-Name-Last: Bleek Title: Avatars of the Earth: Radical Environmentalism and Chemical, Biological, Radiological, and Nuclear (CBRN) Weapons Abstract: Terrorists combining motivations and capabilities to conduct significant chemical, biological, radiological, or nuclear (CBRN) attacks are, logically and empirically, outliers. Certain characteristics of radical environmentalism heighten the risk of such outliers. The majority of even radical environmentalists embrace nonviolence. Those who turn violent mostly do so in limited ways due to a combination of motivations and capabilities. Fringe elements are motivated to commit large-scale—including CBRN—violence, but are mostly constrained by capability. Yet eco-radicalism also draws more capable adherents. If serious CBRN terrorism attacks occur—a risk about which analysts differ markedly—radical environmentalist fringe actors are plausible perpetrators. Journal: Studies in Conflict & Terrorism Pages: 351-381 Issue: 5 Volume: 43 Year: 2020 Month: 5 X-DOI: 10.1080/1057610X.2018.1471972 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471972 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:5:p:351-381 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1463615_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Amir Rostami Author-X-Name-First: Amir Author-X-Name-Last: Rostami Author-Name: Joakim Sturup Author-X-Name-First: Joakim Author-X-Name-Last: Sturup Author-Name: Hernan Mondani Author-X-Name-First: Hernan Author-X-Name-Last: Mondani Author-Name: Pia Thevselius Author-X-Name-First: Pia Author-X-Name-Last: Thevselius Author-Name: Jerzy Sarnecki Author-X-Name-First: Jerzy Author-X-Name-Last: Sarnecki Author-Name: Christofer Edling Author-X-Name-First: Christofer Author-X-Name-Last: Edling Title: The Swedish Mujahideen: An Exploratory Study of 41 Swedish Foreign Fighters Deceased in Iraq and Syria Abstract: This study analyzes the demographics, criminality, and network relations of forty-one deceased Swedish foreign fighters. Our results show that most of the deceased Swedish foreign fighters were on average just under 26 years old when they died. Concerning network relations, nineteen out of the forty-one foreign fighters had at least one relationship (next-of-kin or friend) with another deceased foreign fighter. Two thirds were previously suspected of at least one crime. Based on our results, we argue that more attention needs to be given to tertiary and secondary prevention directed toward foreign fighter hubs. Journal: Studies in Conflict & Terrorism Pages: 382-395 Issue: 5 Volume: 43 Year: 2020 Month: 5 X-DOI: 10.1080/1057610X.2018.1463615 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1463615 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:5:p:382-395 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1469587_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nam Kyu Kim Author-X-Name-First: Nam Kyu Author-X-Name-Last: Kim Author-Name: Gary Uzonyi Author-X-Name-First: Gary Author-X-Name-Last: Uzonyi Title: Government Mass Killing and Post-Conflict Domestic Trials Abstract: Why do some countries implement trials to punish perpetrators of state-sponsored mass killing during civil war? A common explanation is that domestic and international demand for justice pressures the government to implement trials. However, this demand is unlikely to produce prosecutions because state-sponsored violence during fighting provides elites incentive to conceal information after war. The revelation of information concerning the government's atrocities could result in renewed domestic instability or international sanction. Therefore, a government that has committed atrocities during the civil war, and emerges victorious from the conflict, should be unlikely to pursue trials in the aftermath of the war. Journal: Studies in Conflict & Terrorism Pages: 396-413 Issue: 5 Volume: 43 Year: 2020 Month: 5 X-DOI: 10.1080/1057610X.2018.1469587 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1469587 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:5:p:396-413 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1471971_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Dmitry Dima Adamsky Author-X-Name-First: Dmitry Dima Author-X-Name-Last: Adamsky Title: The Impact of the Russian Operation in Syria on Hezbollah's Operational Art: A Hypothesis Abstract: This article hypothesizes about the impact that the Russian combat practice in Syria might have had on the operational art of Hezbollah. Three years of joint fighting with the Russian military has been a major formative experience for the organization. Presumably, this profound and diverse practice is likely to shape Hezbollah's subsequent military transformation, and to project on its force buildup tendencies, organizational structures and concept of operations. The article argues that Hezbollah's most profound takeaway from the Russian approach might relate to the notion of the reconnaissance-strike complex and its main segments—intelligence capabilities, command and control, and the element related to the actual use of force (Strike). Although this article aims to facilitate critical discussion about potential adaptations in Hezbollah's art of strategy and operations, its insights extend beyond the case itself, as they might be indicative of other hybrid nonstate actors in the Middle East and elsewhere. Journal: Studies in Conflict & Terrorism Pages: 414-430 Issue: 5 Volume: 43 Year: 2020 Month: 5 X-DOI: 10.1080/1057610X.2018.1471971 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1471971 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:5:p:414-430 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1452701_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Josefin Graef Author-X-Name-First: Josefin Author-X-Name-Last: Graef Author-Name: Raquel da Silva Author-X-Name-First: Raquel Author-X-Name-Last: da Silva Author-Name: Nicolas Lemay-Hebert Author-X-Name-First: Nicolas Author-X-Name-Last: Lemay-Hebert Title: Narrative, Political Violence, and Social Change Abstract: This special issue is concerned with the development of the study of narratives of political violence and terrorism. While the concept of narrative has become increasingly popular among scholars in the field over the past two decades, this has not been accompanied by an active and critical engagement with its full ontological, epistemological, and methodological implications. This issue proposes to view the extant work through a basic framework of three modes of narrative—as lens, as data, and as tool—in order to take stock of the progress that has been made to date and to facilitate the identification of remaining research gaps. Building on this framework, the six contributions in this issue demonstrate how the study of narratives of political violence and terrorism may be advanced. This is done, in particular, through a focus on narrative's value for understanding social and political change, as well as an emphasis on developing interdisciplinary and methodologically innovative approaches. Journal: Studies in Conflict & Terrorism Pages: 431-443 Issue: 6 Volume: 43 Year: 2020 Month: 6 X-DOI: 10.1080/1057610X.2018.1452701 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452701 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:431-443 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1452709_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Raquel da Silva Author-X-Name-First: Raquel Author-X-Name-Last: da Silva Author-Name: Pablo Fernández-Navarro Author-X-Name-First: Pablo Author-X-Name-Last: Fernández-Navarro Author-Name: Miguel M. Gonçalves Author-X-Name-First: Miguel M. Author-X-Name-Last: Gonçalves Author-Name: Catarina Rosa Author-X-Name-First: Catarina Author-X-Name-Last: Rosa Author-Name: Joana Silva Author-X-Name-First: Joana Author-X-Name-Last: Silva Title: Disengagement from Political Violence and Deradicalization: A Narrative-Dialogical Perspective Abstract: This article applies a dialogical analysis to the change processes involved in moving from engagement with to disengagement from an armed militant group, as well as from radicalization to deradicalization. The findings underline the interplay between different push and pull factors at individual, organizational, and societal levels that played a role in the already mentioned processes in three periods of time—engagement with, life within, and disengagement from an armed organization. The dialogical framework conceptualizes the development trajectory as relationships between a variety of positions of the self (I-positions), which generate different personal meanings involved in processes of disengagement and deradicalization. Journal: Studies in Conflict & Terrorism Pages: 444-467 Issue: 6 Volume: 43 Year: 2020 Month: 6 X-DOI: 10.1080/1057610X.2018.1452709 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452709 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:444-467 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1452728_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kurt Braddock Author-X-Name-First: Kurt Author-X-Name-Last: Braddock Author-Name: John F. Morrison Author-X-Name-First: John F. Author-X-Name-Last: Morrison Title: Cultivating Trust and Perceptions of Source Credibility in Online Counternarratives Intended to Reduce Support for Terrorism Abstract: Terrorism researchers have long sought to identify methods for challenging terrorist ideologies. The construction and dissemination of counternarratives has begun to receive substantial attention as a means of doing so. However, the effectiveness of this approach is contingent on message targets' trust in the counternarrative's content and source. This article draws from literatures on trust and online source credibility to offer preliminary guidelines for cultivating trust in counternarratives and their sources. By encouraging trust in this manner, practitioners can reduce the likelihood that their counternarratives will be dismissed by their intended audiences—a perpetual challenge to strategic messaging geared toward countering violent extremism. Journal: Studies in Conflict & Terrorism Pages: 468-492 Issue: 6 Volume: 43 Year: 2020 Month: 6 X-DOI: 10.1080/1057610X.2018.1452728 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452728 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:468-492 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1452754_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sarah Colvin Author-X-Name-First: Sarah Author-X-Name-Last: Colvin Author-Name: Daniela Pisoiu Author-X-Name-First: Daniela Author-X-Name-Last: Pisoiu Title: When Being Bad is Good? Bringing Neutralization Theory to Subcultural Narratives of Right-Wing Violence Abstract: Bringing together terrorism studies, subcultural theory, and narrative criminology, we here test the thesis that neutralization theory might be (further) developed to provide a framework for understanding stories of ideologically informed subcultural violence. Beginning with Gresham Sykes's and David Matza's original five neutralizations, we illustrate how actors engage them in three modes: the encultured, the subcultural, and (tentatively) the postnarrative mode. We test the first two modes in particular against narratives and narrative fragments from interviews with men convicted of right-wing violence in Germany. Our findings provide a preliminary illustration of what neutralization theory might bring to research into political violence. Journal: Studies in Conflict & Terrorism Pages: 493-508 Issue: 6 Volume: 43 Year: 2020 Month: 6 X-DOI: 10.1080/1057610X.2018.1452754 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452754 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:493-508 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1452767_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Josefin Graef Author-X-Name-First: Josefin Author-X-Name-Last: Graef Title: Telling the Story of the National Socialist Underground (NSU): A Narrative Media Analysis Abstract: The German media have played a much more important role in the context of the National Socialist Underground (NSU) than has been acknowledged. Drawing on criminological approaches to media images of crime and narrative hermeneutics, this article is based on an analysis of more than 1,000 print news articles published on the NSU crimes before and after the discovery of the perpetrators in November 2011. It argues that the story of the NSU as a right-wing terrorist group whose violent campaign was not recognized for more than a decade cannot be conceived of without the news media's narrative work across the period 2000–2012. Journal: Studies in Conflict & Terrorism Pages: 509-528 Issue: 6 Volume: 43 Year: 2020 Month: 6 X-DOI: 10.1080/1057610X.2018.1452767 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452767 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:509-528 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1452794_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ioannis Tellidis Author-X-Name-First: Ioannis Author-X-Name-Last: Tellidis Title: Peacebuilding Beyond Terrorism? Revisiting the Narratives of the Basque Conflict Abstract: Taking stock of critical peace research and agonistic politics, this article revisits the Basque conflict to examine the role of the state's counterterrorist narrative and that of the Basque civil society in the elimination of violence. It argues that violence could have ended sooner if Spanish governments had sought to engage with the non- and antiviolent independentist discourse of broad sectors of the Basque society, rather than criminalizing it as they rightly did with the radical/extremist nationalists. Had they done so, they could have capitalized on Basque civil society's strong antiviolent and anti–Euskadi Ta Askatasuna discourse to marginalize the terrorist organization and its networks of support. The article presents a framework that makes possible the marginalization of militancy and extremism in cases where the state accepts to negotiate the legitimacy of the demands of non- and/or antiviolent nationalists. Journal: Studies in Conflict & Terrorism Pages: 529-547 Issue: 6 Volume: 43 Year: 2020 Month: 6 X-DOI: 10.1080/1057610X.2018.1452794 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452794 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:529-547 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1452808_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Irene G. Madina Author-X-Name-First: Irene G. Author-X-Name-Last: Madina Author-Name: Galo Bilbao Author-X-Name-First: Galo Author-X-Name-Last: Bilbao Author-Name: Angela Bermudez Author-X-Name-First: Angela Author-X-Name-Last: Bermudez Title: Recognizing Victims of Political Violence: Basque Literary Narratives as an Ethical Tool Abstract: Adopting an ethical approach to education that focuses on the perspective of victims, this article analyzes some of the difficulties of acknowledging the victims of political violence in the Basque Country. It conceptualizes these difficulties as pathologies of recognition and argues that works of literary fiction have humanizing and educational value insofar as they reflect the victim's perspective and foster the reader's ethical education through narrative imagination. As a critical example, the article provides an analysis of four Basque literary works of fiction that respond to the pathologies of recognition as they narrate various acts of victimization. The transformative potential of working with literature that tells stories of victimization for politically violent conflicts in the Basque Country and elsewhere is highlighted. Journal: Studies in Conflict & Terrorism Pages: 548-564 Issue: 6 Volume: 43 Year: 2020 Month: 6 X-DOI: 10.1080/1057610X.2018.1452808 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1452808 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:6:p:548-564 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1751459_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bruce Hoffman Author-X-Name-First: Bruce Author-X-Name-Last: Hoffman Author-Name: Jacob Ware Author-X-Name-First: Jacob Author-X-Name-Last: Ware Author-Name: Ezra Shapiro Author-X-Name-First: Ezra Author-X-Name-Last: Shapiro Title: Assessing the Threat of Incel Violence Abstract: In recent years, increasingly serious incidents of violence have been committed by young men predominantly in the United States and Canada who self-identify as incels (involuntary celibates). Although these attacks often specifically target women, the principal source of their animus, men as well as children have been among the casualties in the series of shootings and vehicular homicides that have occurred at universities, high schools, and on city streets. Although, the incel worldview is not obviously political, its core ethos entails the subjugation and repression of a group and its violence is designed to have far-reaching societal effects. Accordingly, incel violence arguably conforms to an emergent trend in terrorism with a more salient hate crime dimension that necessitates greater scrutiny and analysis—especially as it spreads to Europe and shows similarities to and has nascent connections with other terrorist movements. Journal: Studies in Conflict & Terrorism Pages: 565-587 Issue: 7 Volume: 43 Year: 2020 Month: 7 X-DOI: 10.1080/1057610X.2020.1751459 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1751459 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:7:p:565-587 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1492819_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jytte Klausen Author-X-Name-First: Jytte Author-X-Name-Last: Klausen Author-Name: Rosanne Libretti Author-X-Name-First: Rosanne Author-X-Name-Last: Libretti Author-Name: Benjamin W. K. Hung Author-X-Name-First: Benjamin W. K. Author-X-Name-Last: Hung Author-Name: Anura P. Jayasumana Author-X-Name-First: Anura P. Author-X-Name-Last: Jayasumana Title: Radicalization Trajectories: An Evidence-Based Computational Approach to Dynamic Risk Assessment of “Homegrown†Jihadists Abstract: The research aimed to develop and test a new dynamic approach to preventive risk assessment of violent extremists. The well-known New York Police Department four-phase model was used as a starting point for the conceptualization of the radicalization process, and time-stamped biographical data collected from court documents and other public sources on American homegrown Salafi-jihadist terrorism offenders were used to test the model. Behavioral sequence patterns that reliably anticipate terrorist-related criminality were identified and the typical timelines for the pathways to criminal actions estimated for different demographic subgroups in the study sample. Finally, a probabilistic simulation model was used to assess the feasibility of the model to identify common high-frequency and high-risk sequential behavioral segment pairs in the offenders’ pathways to terrorist criminality. Journal: Studies in Conflict & Terrorism Pages: 588-615 Issue: 7 Volume: 43 Year: 2020 Month: 7 X-DOI: 10.1080/1057610X.2018.1492819 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1492819 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:7:p:588-615 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1494409_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mehmet F. Bastug Author-X-Name-First: Mehmet F. Author-X-Name-Last: Bastug Author-Name: Aziz Douai Author-X-Name-First: Aziz Author-X-Name-Last: Douai Author-Name: Davut Akca Author-X-Name-First: Davut Author-X-Name-Last: Akca Title: Exploring the “Demand Side†of Online Radicalization: Evidence from the Canadian Context Abstract: We examined whether and how social media play a role in the process of radicalization, and whether and for what purposes extremists use social media after they become radicalized within a sample of fifty-one Canadian extremists. Differences between converts and non-converts in terms of their radicalization process, involvement in terrorism, and social media usage were also investigated. Data were collected from a combination of media reports via an in-depth LexisNexis search and court records obtained from The Canadian Legal Information Institute database. The results confirm that social media played a role either during or after the radicalization process of the majority of the sample and converts are more vulnerable to online radicalization than non-converts. Journal: Studies in Conflict & Terrorism Pages: 616-637 Issue: 7 Volume: 43 Year: 2020 Month: 7 X-DOI: 10.1080/1057610X.2018.1494409 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1494409 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:7:p:616-637 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1494411_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David Bright Author-X-Name-First: David Author-X-Name-Last: Bright Author-Name: Chad Whelan Author-X-Name-First: Chad Author-X-Name-Last: Whelan Author-Name: Shandon Harris-Hogan Author-X-Name-First: Shandon Author-X-Name-Last: Harris-Hogan Title: On the Durability of Terrorist Networks: Revealing the Hidden Connections between Jihadist Cells Abstract: This article conducts a social network analysis (SNA) on discrete groups of Australian-based jihadists across three time periods and then compares these groups to an aggregated network. The aim of this analysis is to potentially reveal hidden connections between seemingly separate groups that could facilitate the flow of information and resources. Results reveal the presence of a number of key actors who appear to connect groups across different geographic locations and time periods. By utilizing SNA to identify the presence of these critical individuals, this case study aims to contribute to our overall understanding regarding how terrorist networks manage to endure, evolve, and adapt over time. Journal: Studies in Conflict & Terrorism Pages: 638-656 Issue: 7 Volume: 43 Year: 2020 Month: 7 X-DOI: 10.1080/1057610X.2018.1494411 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1494411 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:7:p:638-656 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1493833_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David C. Hofmann Author-X-Name-First: David C. Author-X-Name-Last: Hofmann Title: How “Alone†are Lone-Actors? Exploring the Ideological, Signaling, and Support Networks of Lone-Actor Terrorists Abstract: Conventional knowledge and early academic work on lone-actor terrorists has popularized the concept that they radicalize, operate, plan, and execute plots in relative anonymity, with little connection to formal or more organized terrorist groups and networks. However, recent scholarship has increasingly challenged the notion of the “loneliness†of lone-actors. In order to further empirically test this notion, this article uses social network analysis to examine the ideological, signaling, and support networks of two case studies of lone-actors during the twenty-four months prior to the commission of their first act of terrorist violence. Journal: Studies in Conflict & Terrorism Pages: 657-678 Issue: 7 Volume: 43 Year: 2020 Month: 7 X-DOI: 10.1080/1057610X.2018.1493833 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1493833 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:7:p:657-678 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1495291_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joseph El Khoury Author-X-Name-First: Joseph Author-X-Name-Last: El Khoury Title: The Use of Stimulants in the Ranks of Islamic State: Myth or Reality of the Syrian Conflict Abstract: The emergence of the Islamic State organization on the Syrian war scene has raised the role of amphetamines, and in particular the drug Captagon, in explaining the military performance and the savagery of its militants. This phenomenon has received extensive coverage in the international media. We review the evidence for it relying on available public sources in the context of a historical understanding of the use of stimulants in warfare and the Islamic position on psychoactive substances. Journal: Studies in Conflict & Terrorism Pages: 679-687 Issue: 8 Volume: 43 Year: 2020 Month: 8 X-DOI: 10.1080/1057610X.2018.1495291 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1495291 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:8:p:679-687 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1494413_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Andrew C. Sparks Author-X-Name-First: Andrew C. Author-X-Name-Last: Sparks Title: Dar al-Islam: A Quantitative Analysis of ISIS’s French-Language Magazine Abstract: This study is a content analysis of Islamic State of Iraq and Syria (ISIS)’s French-language magazine Dar al-Islam. The first seven issues of the magazine are quantitatively examined and broken down into the number of articles, images, and terms used as a means of determining how ISIS targets French-speaking individuals. This study find that ISIS focuses on religious terminology and justifications to rationalize its existence and its fight. Also, despite being a French-language magazine, a majority of the focus is on Middle Eastern groups, not Western groups. Overall, the magazine is similar, but not a carbon copy to ISIS’s English-language magazine, Dabiq. Journal: Studies in Conflict & Terrorism Pages: 688-705 Issue: 8 Volume: 43 Year: 2020 Month: 8 X-DOI: 10.1080/1057610X.2018.1494413 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1494413 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:8:p:688-705 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1495292_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Fenja Søndergaard Møller Author-X-Name-First: Fenja Søndergaard Author-X-Name-Last: Møller Title: Performance Legitimacy and Conflict in African Provinces Abstract: Several conflict studies explore material factors connected to state performance (e.g., growth and Gross Domestic Product per capita). Recently, georeferenced conflict research has linked local economic factors such as subnational wealth and intrastate inequality to conflict. However, few studies concern the people’s perceptions. More specifically, existing studies neglect the effect of performance legitimacy, understood as the people’s evaluations of presidential performance. This study argues that systematic focus on subnational variation of presidential performance legitimacy contributes to a deeper understanding of conflict occurrence. This is because objective indicators of performance such as economic wealth differ from actual perceptions of performance. The hypothesis is investigated with survey data from the Afrobarometer rounds 2–5 covering thirty-four countries and 376 first-order administrative units. These data are merged with georeferenced data from the Armed Conflict Location & Event Data (ACLED) and the Peace Research Institute Oslo-Grid dataset (PRIO-GRID). The results show that high levels of performance legitimacy in a province decrease the expected number of conflict events the following year. Future conflict studies should therefore include perceptions on a substate level. Journal: Studies in Conflict & Terrorism Pages: 706-727 Issue: 8 Volume: 43 Year: 2020 Month: 8 X-DOI: 10.1080/1057610X.2018.1495292 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1495292 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:8:p:706-727 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1494874_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Eitan Azani Author-X-Name-First: Eitan Author-X-Name-Last: Azani Author-Name: Nadine Liv Author-X-Name-First: Nadine Author-X-Name-Last: Liv Title: A Comprehensive Doctrine for an Evolving Threat: Countering Terrorist Use of Social Networks Abstract: Terrorists are using social media for the mass dissemination of terrorism-supporting messages. Activating the “long arm of the law†mechanism over media corporations, similar to that in the financial sector, will help to eradicate this phenomenon. The article describes the structure of a holistic framework that expands legal liability for the publication of terrorism-supporting content so that it applies to the entire chain of participants facilitating its distribution: the corporation, the platform, the Web-user publishing the content, and the Web-user viewing the content. The article proposes an adaptation of criminal legal tools at the state and international levels, as well as tools from the field of civil law; finally, the article argues that civil society also has the power to generate social change and to shape a mindset that imposes corporate liability on user content. Journal: Studies in Conflict & Terrorism Pages: 728-752 Issue: 8 Volume: 43 Year: 2020 Month: 8 X-DOI: 10.1080/1057610X.2018.1494874 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1494874 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:8:p:728-752 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1507311_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David McIlhatton Author-X-Name-First: David Author-X-Name-Last: McIlhatton Author-Name: James Berry Author-X-Name-First: James Author-X-Name-Last: Berry Author-Name: David Chapman Author-X-Name-First: David Author-X-Name-Last: Chapman Author-Name: Pernille H. Christensen Author-X-Name-First: Pernille H. Author-X-Name-Last: Christensen Author-Name: John Cuddihy Author-X-Name-First: John Author-X-Name-Last: Cuddihy Author-Name: Rachel Monaghan Author-X-Name-First: Rachel Author-X-Name-Last: Monaghan Author-Name: Dan Range Author-X-Name-First: Dan Author-X-Name-Last: Range Title: Protecting Crowded Places from Terrorism: An Analysis of the Current Considerations and Barriers Inhibiting the Adoption of Counterterrorism Protective Security Measures Abstract: While much of the literature concerning counterterrorism focuses on policies and strategies aimed at removing either the terrorist environment and/or the groups or individuals willing to utilize political violence to achieve their goal(s), there is a much smaller body of work concerned with antiterrorism, namely those defensive measures that are designed to prevent or deter terrorist attacks. Increasingly, crowded places have become popular targets for terrorists and the research presented in this article connects the planning, design, and development of real estate with respect to the adoption of protective counterterrorism measures. It seeks to develop new understandings of the considerations that real estate developments have toward terrorism, as well as the barriers that may inhibit counterterrorism protective security measures in future development projects. The analysis is based on qualitative research, namely semi-structured interviews conducted in the United Kingdom, United States, and Australia with professionals involved in all core strands of the real estate development process. The findings suggest that considerations toward terrorism vary considerably as a consequence of a range of factors and that while expected factors such as cost and aesthetics are important determinants for decision making, a range of other barriers exist. Journal: Studies in Conflict & Terrorism Pages: 753-774 Issue: 9 Volume: 43 Year: 2020 Month: 9 X-DOI: 10.1080/1057610X.2018.1507311 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1507311 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:9:p:753-774 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1499694_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nilay Saiya Author-X-Name-First: Nilay Author-X-Name-Last: Saiya Title: Confronting Apocalyptic Terrorism: Lessons from France and Japan Abstract: Terrorists who believe they have a role to play in bringing about the apocalypse pose a serious threat to countries around the world. In their quest to eradicate this especially pernicious form of terrorism, states, including liberal democratic ones, confront the understandable temptation to eliminate such groups through brute force: repression of apocalyptic groups and their constituencies at home and overwhelming military force abroad. Using a comparative case study of France and Japan, this article argues that such policies actually serve to perpetuate the very conditions that generate further terrorism rooted in apocalyptic beliefs. France’s policies of repression of Islam at home and militarism abroad have had the unintended consequence of encouraging attacks by those affiliated with the apocalyptic group the Islamic State of Iraq and Syria. Conversely, the case of Japan shows that successfully combating apocalyptic terrorism requires far more understated measures, including respecting religious rights at home and caution in using force abroad. Journal: Studies in Conflict & Terrorism Pages: 775-795 Issue: 9 Volume: 43 Year: 2020 Month: 9 X-DOI: 10.1080/1057610X.2018.1499694 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1499694 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:9:p:775-795 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1505685_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Burcu Pinar Alakoc Author-X-Name-First: Burcu Pinar Author-X-Name-Last: Alakoc Title: Femme Fatale: The Lethality of Female Suicide Bombers Abstract: Are female suicide bombers deadlier than male suicide bombers? Utilizing newly coded data on the tactical attributes of suicide terrorism worldwide from 1998 to 2015, this study shows that the use of female suicide bombers is not only positively correlated with the lethality of the suicide attacks, but also accentuates the existing tactical advantages of suicide terrorism. Especially in the cases of soft targets like civilians, and easily accessible locations, the deadliest outcomes result from those attacks carried out by female suicide bombers. Journal: Studies in Conflict & Terrorism Pages: 796-814 Issue: 9 Volume: 43 Year: 2020 Month: 9 X-DOI: 10.1080/1057610X.2018.1505685 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1505685 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:9:p:796-814 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1499696_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nil S. Satana Author-X-Name-First: Nil S. Author-X-Name-Last: Satana Author-Name: Tijen Demirel-Pegg Author-X-Name-First: Tijen Author-X-Name-Last: Demirel-Pegg Title: Military Counterterrorism Measures, Civil–Military Relations, and Democracy: The Cases of Turkey and the United States Abstract: This study examines how military counterterrorism (CT) measures affect the quality of democracy by altering civil–military relations (CMR) and focuses on CMR as the main causal mechanism. We argue that the use of military measures in CT jeopardizes democracy at the societal level by increasing the belief that only the military is equipped to deal with the threat at hand. Therefore, erosions of civil liberties are tolerated in exchange for security. Second, we argue that military CT measures change the balance between the military and civilian executive powers in procedural and liberal democracies. While the military’s executive power increases in procedural democracies, civilian executive power increases and goes unchecked in liberal ones. Case studies of the United States and Turkey show that military CT measures affect CMR in these countries, which generate a similar tradeoff between security and the quality of democracy, albeit via different causal mechanisms. While that tradeoff is less severe in the United States, Turkey is more vulnerable to erosion of democracy. Journal: Studies in Conflict & Terrorism Pages: 815-836 Issue: 9 Volume: 43 Year: 2020 Month: 9 X-DOI: 10.1080/1057610X.2018.1499696 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1499696 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:43:y:2020:i:9:p:815-836 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1799508_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Antonio Giustozzi Author-X-Name-First: Antonio Author-X-Name-Last: Giustozzi Title: A Struggle for Power: Al Nusra and Al Qaida in Syria Abstract: Relying on interviews with members of the organization, the article argues (contrary to the prevailing view) that Al Nusra never split from Al Qaida and even more so from the global jihadist movement. Instead the leadership of Al Nusra was locked in a power struggle with Al Qaida over the control of jihad in Syria and possibly even over the future of Al Qaida itself. Efforts to unify the Syrian opposition, even those limited to jihadist groups, failed also because of the leadership of Al Nusra kept trying to co-opt other opposition groups, rather than forming alliances with them. Journal: Studies in Conflict & Terrorism Pages: 1-25 Issue: 1 Volume: 44 Year: 2020 Month: 8 X-DOI: 10.1080/1057610X.2020.1799508 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1799508 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2020:i:1:p:1-25 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1793456_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: José Antonio Gutiérrez D. Author-X-Name-First: José Antonio Author-X-Name-Last: Gutiérrez D. Author-Name: Frances Thomson Author-X-Name-First: Frances Author-X-Name-Last: Thomson Title: Rebels-Turned-Narcos? The FARC-EP’s Political Involvement in Colombia’s Cocaine Economy Abstract: According to the ‘rebels-turned-narcos’ premise, increasing involvement in the illicit drug industry causes insurgent groups to lose sight of their political aims, as they shift their focus to profit-making. The (former) Colombian rebel group, the FARC-EP, became a paragon for this idea. Drawing on primary research, we argue that the FARC-EP’s involvement in the illicit drug economy was itself political. Their involvement included governance activities, which are by their very nature political. Furthermore, these activities formed part of the FARC-EP’s political project, aimed at ensuring the reproduction of the peasant smallholder economy. Our argument challenges the rebels-turned-narcos premise more broadly by showing why involvement in the illicit drug economy, on its own, is insufficient evidence to posit the depoliticization of an insurgent group. Journal: Studies in Conflict & Terrorism Pages: 26-51 Issue: 1 Volume: 44 Year: 2020 Month: 7 X-DOI: 10.1080/1057610X.2020.1793456 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1793456 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2020:i:1:p:26-51 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1793458_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ayse Deniz Lokmanoglu Author-X-Name-First: Ayse Deniz Author-X-Name-Last: Lokmanoglu Title: Coin as Imagined Sovereignty: A Rhetorical Analysis of Coins as a Transhistorical Artifact and an Ideograph in Islamic State’s Communication Abstract: This research argues that an imagined artifact, the IS coins, serves as a transhistorical artifact, condensing the larger ideology of the violent extremist organization of legitimacy and sovereignty. This paper conducts a qualitative content analysis on all references to IS Coin within Dabiq, al-Naba, Rumiyah and all the official videos publicized in the above magazines from April 2014 to September 2018. The power of one artifact, in this case, coin, embodies the whole ideology of ISIS and transports the ideology from the past to the present to the future and the artifact belongs to daily life, amplifies its power. Journal: Studies in Conflict & Terrorism Pages: 52-73 Issue: 1 Volume: 44 Year: 2020 Month: 7 X-DOI: 10.1080/1057610X.2020.1793458 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1793458 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2020:i:1:p:52-73 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1799516_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mehmet Ümit Necef Author-X-Name-First: Mehmet Ümit Author-X-Name-Last: Necef Title: Research Note: Former Extremist Interviews Current Extremist: Self-Disclosure and Emotional Engagement in Terrorism Studies Abstract: In this article I describe how recognizing elements from my own extremist past made me emotional while interviewing a jailed terrorist about his motivations for joining Islamic State. I relate how this mood led me to an uncontrolled self-disclosure and recount how he agreed to elaborate on his motivations for joining IS, despite initial reluctance to talk about them. Then, I present some considerations on whether research in which emotional attachment is involved can produce critical scientific knowledge. The basic aim of the article is to develop methods, concepts and means to contribute to research on the motivations of terrorists. Journal: Studies in Conflict & Terrorism Pages: 74-92 Issue: 1 Volume: 44 Year: 2020 Month: 7 X-DOI: 10.1080/1057610X.2020.1799516 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1799516 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2020:i:1:p:74-92 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1586356_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nathan P. Jones Author-X-Name-First: Nathan P. Author-X-Name-Last: Jones Title: Bacterial Conjugation as a Framework for the Homogenization of Tactics in Mexican Organized Crime Abstract: This article posits a competitive bacterial ecology as a framework for Mexican drug trafficking with a novel focus on bacterial conjugation (one type of horizontal gene transmission) to explain tactical homogenization. Individual drug traffickers consciously switch between Mexican organized crime groups sometimes three and four times, much like individual bacteria exchange their DNA in a horizontal genetic transfer that allows rapid evolution and resilience. Bacterial conjugation is a useful amplifying variable for understanding the homogenization of violence and this article probes its plausibility by providing examples of traffickers switching groups and taking tactics with them. Drawing on examples of traffickers and cells from the Arellano Felix Organization, the Sinaloa Cartel, Cartel de Jalisco Nueva Generacion, the Viagras, Zetas, and the Gulf Cartels, this article traces the genealogy of violent tactics, techniques, and procedures such as dissolving bodies in acid, asphyxiation, and infantry tactics, through individual traffickers into new groups drawn generally in the direction of more powerful, proximate, and similar trafficking groups. Journal: Studies in Conflict & Terrorism Pages: 855-884 Issue: 10 Volume: 44 Year: 2021 Month: 10 X-DOI: 10.1080/1057610X.2019.1586356 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1586356 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:10:p:855-884 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1592356_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sergei Boeke Author-X-Name-First: Sergei Author-X-Name-Last: Boeke Author-Name: Giliam de Valk Author-X-Name-First: Giliam Author-X-Name-Last: de Valk Title: The Unforeseen 2012 Crisis in Mali: The Diverging Outcomes of Risk and Threat Analyses Abstract: The 2012 crisis in Mali, where the state collapsed and terrorist groups took over the north, came as a surprise to many. Mali had been considered a poster-child for democracy and was judged as considerably more stable than its neighbors by leading quantitative indices of state fragility. This article explores how quantitative risk and qualitative threat approaches led to incomplete analyses, and how bureaucratic processes stifled a holistic diagnosis of the situation in Mali. French and Dutch government views are analyzed, adding new empirical information on how ministries and embassies were unwilling to call out disconcerting developments in Mali. Journal: Studies in Conflict & Terrorism Pages: 835-854 Issue: 10 Volume: 44 Year: 2021 Month: 10 X-DOI: 10.1080/1057610X.2019.1592356 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1592356 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:10:p:835-854 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1591742_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Barbara Elias Author-X-Name-First: Barbara Author-X-Name-Last: Elias Title: Local Minorities in Counterinsurgency: U.S. Approaches to Baghdad and Saigon Regarding Marginalized Populations Abstract: In counterinsurgencies, minority groups such as the Sunnis in Iraq are important elements of the “population,†the social–political terrain where population-centric counterinsurgency is battled. Yet there has been little systematic analysis of minority groups in unconventional warfare and no investigation of the ways intervening forces, like the United States, have approached in-country allies in an effort to get host nations to address the strategic importance of minorities. Examining new data on alliance politics between the United States and local partners in Vietnam and Iraq, I find that while existing scholarship would suggest that in-country allies will resist U.S. pressure to engage with minority groups, local allies are surprisingly likely to comply, at least in part, in order to avoid U.S. unilateral engagement with local minorities and to influence the policies adopted. This process slowly undermines U.S. counterinsurgency efforts, speaking to the complexities of population-centric approaches and working through local proxies. Journal: Studies in Conflict & Terrorism Pages: 818-834 Issue: 10 Volume: 44 Year: 2021 Month: 10 X-DOI: 10.1080/1057610X.2019.1591742 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1591742 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:10:p:818-834 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1585636_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Chi Zhang Author-X-Name-First: Chi Author-X-Name-Last: Zhang Title: Community Engagement under the Mass Line for Counterterrorism in China Abstract: The mass line principle offers an alternative approach to mobilize citizens to participate in governance. The key tenets of the mass line principle resemble that of the regime of community engagement, aiming at encouraging democratic participation, improving the trust between the rule and the ruled, and improving the ability of the government to gather intelligence. In the context of China’s counterterrorism strategy, the mass line involves the encouraging citizens’ participation in the People’s War on Terror, incentivizing individuals to provide tip-offs, and engaging patriotic believers, opinion leaders, grass-roots propagandists, and cultural workers to persuade and educate the masses to adopt “correct†views. In addition, the government seeks to publicize the voice of Uyghurs from within the community. However, such efforts only served as evidence for intolerance for diversity and an invitation for further suspicion and criticism. This article demonstrates the trust dilemma the state faces—in order to improve democratic participation, the efforts to engage a community and gather intelligence often result in eroding the trust. This article also highlights the importance of differentiating harmony and political conformity. Diversity per se is not the source of conflict, but it is often targeted by the state as it is desperately seeking to demonstrate efficacy in the face of terrorism. Journal: Studies in Conflict & Terrorism Pages: 799-817 Issue: 10 Volume: 44 Year: 2021 Month: 10 X-DOI: 10.1080/1057610X.2019.1585636 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1585636 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:10:p:799-817 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1599192_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stephane J. Baele Author-X-Name-First: Stephane J. Author-X-Name-Last: Baele Author-Name: Gregorio Bettiza Author-X-Name-First: Gregorio Author-X-Name-Last: Bettiza Author-Name: Katharine A. Boyd Author-X-Name-First: Katharine A. Author-X-Name-Last: Boyd Author-Name: Travis G. Coan Author-X-Name-First: Travis G. Author-X-Name-Last: Coan Title: ISIS’s Clash of Civilizations: Constructing the “West†in Terrorist Propaganda Abstract: Depictions of the West abound in the propaganda produced by the self-proclaimed “Islamic State,†presenting to potentially sympathetic audiences an overwhelmingly negative image of a supposedly homogeneous political entity. Combining quantitative and qualitative language and visual analysis, we systematically expose the various facets of this image and analyze the overall picture. Drawing on the “clash of civilizations†literature as well as on research on extremist language, we conceptualize this presentation of the West as a powerful radicalizing voice shaping today’s global civilizational politics. Journal: Studies in Conflict & Terrorism Pages: 887-919 Issue: 11 Volume: 44 Year: 2021 Month: 11 X-DOI: 10.1080/1057610X.2019.1599192 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1599192 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:11:p:887-919 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1594660_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ginger L. Denton Author-X-Name-First: Ginger L. Author-X-Name-Last: Denton Author-Name: Jonathan R. Harris Author-X-Name-First: Jonathan R. Author-X-Name-Last: Harris Title: The Impact of Illegal Fishing on Maritime Piracy: Evidence from West Africa Abstract: The recent increase in maritime piracy is often associated with economic issues such as a decline in the fishing industry, but there is still no consensus on whether a decrease in local fishing causes a rise in piracy rates. We introduce the use of unreported fish catch and fishing industry type in addition to reported fish catch in Gulf of Guinea waters when analyzing factors influencing West African piracy. Using a newly released data set, which includes Illegal, Unregulated, and Unreported (IUU) fish catch by sector, we show that an increase in reported and unreported fishing yields an increase in piracy. Further, we find that increases in industrial fish catch are related to increases in maritime piracy while the opposite is true of artisanal and subsistence fish catch. We expect this new approach will highlight the impact of IUU and large-scale industrial fishing on piracy throughout the entire world. Journal: Studies in Conflict & Terrorism Pages: 938-957 Issue: 11 Volume: 44 Year: 2021 Month: 11 X-DOI: 10.1080/1057610X.2019.1594660 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1594660 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:11:p:938-957 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1615256_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: MarÃa Idaly Barreto-Galeano Author-X-Name-First: MarÃa Idaly Author-X-Name-Last: Barreto-Galeano Author-Name: Iván Felipe Medina-Arboleda Author-X-Name-First: Iván Felipe Author-X-Name-Last: Medina-Arboleda Author-Name: Sonia Zambrano-Hernández Author-X-Name-First: Sonia Author-X-Name-Last: Zambrano-Hernández Author-Name: José-Manuel Sabucedo-Cameselle Author-X-Name-First: José-Manuel Author-X-Name-Last: Sabucedo-Cameselle Author-Name: Amalio Blanco-Abarca Author-X-Name-First: Amalio Author-X-Name-Last: Blanco-Abarca Author-Name: Éric Maurice Lair Author-X-Name-First: Éric Author-X-Name-Last: Maurice Lair Title: Rhetoric, Political Ideology and the Peace Process in Colombia: A Twitter® Analysis Abstract: An ethos of violence based on political ideologies aiming to delegitimize an adversary is a psychosocial barrier to solving lasting conflicts, such as in Colombia. Beyond the signing of a peace agreement, the cessation of political violence implies modifying the complex symbolic dynamics constructed by various opposing actors to legitimize acts of direct violence. This research evaluates whether a new rhetoric that encourages the development of a peace culture has replaced the ideological rhetoric of various social actors involved in dialog and negotiations to end the armed conflict between the Colombian government and the Revolutionary Armed Forces of Colombia – People’s Army (FARC-EP). To this end, a textual analysis of the ideological rhetoric disseminated through Twitter® by several actors in Colombian society was conducted to identify the expressions used (semantic analysis) to legitimize or delegitimize those involved in the conflict in the last negotiation year (2016). The outcome indicates that the agenda of topics revolves around peace, and although the ideological differences between the negotiation table (i.e., the government and FARC-EP) and the opposition party are evident in the published messages, all the actors are striving to develop a rhetoric of tolerance and coexistence. Journal: Studies in Conflict & Terrorism Pages: 920-937 Issue: 11 Volume: 44 Year: 2021 Month: 11 X-DOI: 10.1080/1057610X.2019.1615256 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1615256 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:11:p:920-937 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1606992_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Curtis M. Craig Author-X-Name-First: Curtis M. Author-X-Name-Last: Craig Author-Name: Randy W. Overbeek Author-X-Name-First: Randy W. Author-X-Name-Last: Overbeek Author-Name: Elizabeth M. Niedbala Author-X-Name-First: Elizabeth M. Author-X-Name-Last: Niedbala Title: A Global Analysis of Temperature, Terrorist Attacks, and Fatalities Abstract: Higher temperatures have been associated with aggression in humans, but the heat–aggression relationship has not been clearly established for terrorist attacks. We found significant and positive relationships when regressing the number of terrorist attacks and associated deaths on temperature in 159 countries from 1970 to 2015. When temperature increases, the number of terrorist attacks and deaths due to terrorist attacks tend to increase. Our results are consistent with a large body of research on the effect of climate on conflict and are of practical concern given increasing average global temperatures. Journal: Studies in Conflict & Terrorism Pages: 958-970 Issue: 11 Volume: 44 Year: 2021 Month: 11 X-DOI: 10.1080/1057610X.2019.1606992 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1606992 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:11:p:958-970 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1616928_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alexandra Phelan Author-X-Name-First: Alexandra Author-X-Name-Last: Phelan Title: FARC’s Pursuit of “Taking Powerâ€: Insurgent Social Contracts, the Drug Trade and Appeals to Eudaemonic Legitimation Abstract: This paper argues that eudaemonic legitimation is a useful tool in understanding how insurgencies seek to justify their “effectiveness†and “performance†vis-à -vis the state in order to enhance authority and mobilise support for their strategic objectives. By examining primary FARC documents, conference and plenary findings, and select interviews with former and active FARC, ELN and M-19 members, it demonstrates how FARC constructed social contracts and integrated illicit financing into its operations as a strategy to appeal to its eudaemonic legitimation in its areas of proto-state influence, in turn aiming to mobilise support and consolidate a full-spectrum normative system. “Effectiveness†in FARC’s strategic approach through rule-setting allowed the organisation to expand to control significant portions of Colombian territory, which to a degree impacted positively on social mobilisation and challenged the government’s legitimacy by consolidating power structures in areas where there was a lack of government authority. FARC further appealed to social and economic “performance†by using revenue from its fundraising activities through engagement in the coca trade and kidnap for ransom to not only strengthen its military capacity, but also implement social initiatives and provide material goods. In turn, FARC was able to develop zones of security through the creation of social contracts in which stable economic practices were able to solidify, contributing in its effectiveness in providing proto-state authority and allowing for insurgent expansion. Journal: Studies in Conflict & Terrorism Pages: 971-993 Issue: 12 Volume: 44 Year: 2021 Month: 12 X-DOI: 10.1080/1057610X.2019.1616928 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1616928 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:971-993 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1628622_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ido Levy Author-X-Name-First: Ido Author-X-Name-Last: Levy Author-Name: Abdi Yusuf Author-X-Name-First: Abdi Author-X-Name-Last: Yusuf Title: How Do Terrorist Organizations Make Money? Terrorist Funding and Innovation in the Case of al-Shabaab Abstract: This paper examines the funding sources of the terrorist group Harakat al-Shabaab al-Mujahideen. Using existing research and original interviews, this study outlines al-Shabaab’s history and funding sources. It theorizes that an organization’s capacity to operate in different fields of economic activity drives innovation in funding. Applying a framework for terrorist innovation to al-Shabaab’s funding sources, this study finds support for the theory. Development of intelligence and taxation capabilities is especially prevalent in the al-Shabaab context. Holding territory considerably increases organizational ability to raise funds. Increasing reliance on criminality may compromise an organization’s ideological character and leave it more vulnerable to inter-group competition. Journal: Studies in Conflict & Terrorism Pages: 1167-1189 Issue: 12 Volume: 44 Year: 2021 Month: 12 X-DOI: 10.1080/1057610X.2019.1628622 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1628622 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1167-1189 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1626093_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael H. Becker Author-X-Name-First: Michael H. Author-X-Name-Last: Becker Title: When Extremists Become Violent: Examining the Association Between Social Control, Social Learning, and Engagement in Violent Extremism Abstract: This research examines the relationship between social control and social learning variables on involvement in violent vs. non-violent extremism. Using data from the Profiles of Individual Radicalization in the United States (PIRUS) database (n = 1,757), this study presents a series of logistic regressions. Among radicalized individuals, weaker social control and stronger social learning of violence were associated violent over non-violent behavior. These results hold across all models. Taken together, these findings support the role of control and learning theories in identifying correlates of violent and non-violent extremism and suggest the possibility of reciprocal and interaction effects for future work. Journal: Studies in Conflict & Terrorism Pages: 1104-1124 Issue: 12 Volume: 44 Year: 2021 Month: 12 X-DOI: 10.1080/1057610X.2019.1626093 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1626093 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1104-1124 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1620470_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: George Kassimeris Author-X-Name-First: George Author-X-Name-Last: Kassimeris Title: Greece’s Ulrike Meinhof: Pola Roupa and the Revolutionary Struggle Abstract: Pola Roupa’s arrest in 2016 was the final nail in the coffin of Revolutionary Struggle, the first guerrilla group to emerge on Greece’s terrorist landscape after the 2002 collapse of 17 November, the country’s premier terrorist organisation for almost three decades and one of Europe’s longest-running terror gangs. Drawing on the judicial investigation findings, courtroom testimonies, RS communiqués and interviews with counter-terrorism officials, this article tells the story of Pola Roupa, the first female leader of a Greek terrorist group in an attempt to understand the political reasons and motivational factors that led to her involvement in terrorism. At the same time, the article hopefully contributes to the study and understanding of women and terrorism by providing an insight into the role and experience of a female militant inside Greece’s gender-conservative and overwhelmingly male-dominated armed struggle movement. Journal: Studies in Conflict & Terrorism Pages: 1090-1103 Issue: 12 Volume: 44 Year: 2021 Month: 12 X-DOI: 10.1080/1057610X.2019.1620470 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1620470 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1090-1103 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1620432_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Goran Peic Author-X-Name-First: Goran Author-X-Name-Last: Peic Title: Divide and Co-Opt: Private Agendas, Tribal Groups, and Militia Formation in Counterinsurgency Wars Abstract: Recent research suggests that civilian defense forces (CDFs) – a distinct type of pro-government militia – can help states suppress insurgent movements. Considering the potential benefits, it is understandable why governments would want to use them. However, viewed from the perspective of civilian recruits, militia duty is a perilous side job that pays very little. So, why do civilians sign up to serve in them? This paper argues that civilian private agendas play a major role in facilitating the recruitment of CDFs. Because private agendas are difficult to observe directly, I examine their impact indirectly by identifying tribal groups as a population segment with particularly strong private incentives stemming from intertribal feuds and the concomitant desire to gain an upper hand relative to local rivals. The argument is tested on a novel province-level data set of CDF deployments in Turkey and the Philippines. Statistical analyses of these data show that states recruit over 50 percent more CDFs in regions with even modest tribal presence than in comparable areas without any tribal populations. These findings suggest that private agendas play a significant role in motivating militia recruitment. Private agendas thus help governments to combat macro-level insurgent movements by exploiting micro-level social tensions. The research also sheds light on the makeup of recruits and points to intensification of civilian disputes as likely ramification of CDF deployment in counterinsurgency campaigns. Journal: Studies in Conflict & Terrorism Pages: 1022-1049 Issue: 12 Volume: 44 Year: 2021 Month: 12 X-DOI: 10.1080/1057610X.2019.1620432 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1620432 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1022-1049 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1634343_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Larissa Daria Meier Author-X-Name-First: Larissa Daria Author-X-Name-Last: Meier Title: The Strategic Use of Emotions in Recruitment Strategies of Armed Groups: The Case of the Liberation Tigers of Tamil Eelam Abstract: What role do emotions play in recruitment strategies employed by armed groups? I argue that armed groups use “emotion work†– the effort to evoke or shape emotions – to recruit new fighters, trying to appeal not only to peoplès self-interest or reason but to their values and normative judgements. I use data from 30 interviews with former members of the LTTE to show that emotions were a central element of their recruitment strategy. To analyze the role of emotions in recruitment, I build on social movement theory and the sociology of emotions and propose an analytical framework linking different types of collective action frames with different emotions they provoke and the mechanisms through which they facilitate recruitment. Journal: Studies in Conflict & Terrorism Pages: 1148-1166 Issue: 12 Volume: 44 Year: 2021 Month: 12 X-DOI: 10.1080/1057610X.2019.1634343 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1634343 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1148-1166 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1628623_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Craig Whiteside Author-X-Name-First: Craig Author-X-Name-Last: Whiteside Author-Name: Ian Rice Author-X-Name-First: Ian Author-X-Name-Last: Rice Author-Name: Daniele Raineri Author-X-Name-First: Daniele Author-X-Name-Last: Raineri Title: Black Ops: Islamic State and Innovation in Irregular Warfare Abstract: This paper studies non-state militant group emulation and development of a special operation capability that stands in stark contrast to the normal repertoire of guerilla and terror tactics. Building on evidence of one well-documented Islamic State attack in 2012 that fit many of the criteria of a special operation, we analyzed the mission using concepts from strategic studies to understand the decision-making behind it. We then expanded our search of Islamic State operational claims looking for other examples, in order to understand the scope and frequency of Islamic State special operations since 2006. We found solid evidence of at least three Islamic State special operations over a decade: Ramadi, Iraq (2007), Haditha, Iraq (2012), and Abu Ghraib/Taji, Iraq (2013). Using these insights, we present two key levers – leadership and propaganda - used by the Islamic State in the decision-making and centralized distribution of resources to invest in a special operations capability that produced outsized strategic effects. These findings contest the conventional wisdom of the future of insurgency as decentralized structures made up of loose, leaderless networks. Journal: Studies in Conflict & Terrorism Pages: 1190-1217 Issue: 12 Volume: 44 Year: 2021 Month: 12 X-DOI: 10.1080/1057610X.2019.1628623 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1628623 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1190-1217 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1616927_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tobias Bruce-Jones Author-X-Name-First: Tobias Author-X-Name-Last: Bruce-Jones Author-Name: M.L.R. Smith Author-X-Name-First: M.L.R. Author-X-Name-Last: Smith Title: Coca, Clausewitz, and Colombia: The Inadequacy of Micro-level Studies in Explaining FARC Violence Against Civilians During the Colombian Civil War Abstract: Studies of micro-level violence make various claims to universality: namely, that there are patterns of violence in civil wars that are observable across time and space. The analysis of rebel violence against civilians constitutes one of the enduring themes of these studies. By evaluating the actions of the Revolutionary Armed Forces of Colombia (FARC) during the latter half of the Colombian civil war, this paper demonstrates that the claims of micro-level studies are unable to account for FARC’s violence against civilians. In response, this study provides an alternative framework for understanding FARC’s violence. Informed by the theories of Carl von Clausewitz it is possible to comprehend the logic of FARC’s violence against civilians within a strategic framework that aimed to advance the movement’s political goals. However, it also illustrates that FARC was influenced heavily by its involvement in the drugs trade. The main findings are a) that whilst FARC’s acts of violence may have contained similarities to that of other drugs cartels FARC did not become a narco-guerrilla organization, b) the case of FARC demonstrates that ultimately there are no reproducible patterns in war, micro-level or otherwise. Journal: Studies in Conflict & Terrorism Pages: 994-1021 Issue: 12 Volume: 44 Year: 2021 Month: 12 X-DOI: 10.1080/1057610X.2019.1616927 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1616927 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:994-1021 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1616929_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: B. Heidi Ellis Author-X-Name-First: B. Heidi Author-X-Name-Last: Ellis Author-Name: Georgios Sideridis Author-X-Name-First: Georgios Author-X-Name-Last: Sideridis Author-Name: Alisa B. Miller Author-X-Name-First: Alisa B. Author-X-Name-Last: Miller Author-Name: Saida M. Abdi Author-X-Name-First: Saida M. Author-X-Name-Last: Abdi Author-Name: Jeffrey P. Winer Author-X-Name-First: Jeffrey P. Author-X-Name-Last: Winer Title: Trauma, Trust in Government, and Social Connection: How Social Context Shapes Attitudes Related to the Use of Ideologically or Politically Motivated Violence Abstract: In this study we examine how grievances and social connection among Somali immigrants are associated with attitudes towards radicalization to violence. Data was drawn from structured interviews with 213 Somali young adult men living in North America. Structural Equation Modeling was used to test the association of grievances with attitudes in support of political violence, and the mediating role of social connection (ethnic community belonging, attachment to nation of residence, and social comfort seeking online). Both grievances and social connection/disconnection relate to support for political violence, but in complex ways. Findings are discussed in relation to prevention of violent extremism. Journal: Studies in Conflict & Terrorism Pages: 1050-1067 Issue: 12 Volume: 44 Year: 2021 Month: 12 X-DOI: 10.1080/1057610X.2019.1616929 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1616929 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1050-1067 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1616930_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joshua Tschantret Author-X-Name-First: Joshua Author-X-Name-Last: Tschantret Title: Nuclear Legitimacy: Why Insurgents Seek and Destroy Nuclear Technology Abstract: Scholars observe that we know little about what motivates non-state actors’ strategic interest in nuclear technology. This article argues that insurgents with ideological ambitions to form new states adopt acquisitive or destructive interests because nuclear power is a symbol of state legitimacy. State-seeking insurgents—separatists and revolutionaries—require domestic constituencies to recognize them as legitimate sovereigns. However, they differ in their need for international legitimation. Separatists’ demand for international acceptance deters them from pursuing nuclear weapons, which poses an international security threat. They will nonetheless attack the state’s nuclear facilities in areas they consider their national homeland to assert the legitimacy of their claims over these regions. Since revolutionaries do not expect international acceptance, they can pursue nuclear technology to enhance their legitimacy among key domestic audiences. Statistical analysis and qualitative examination support these hypotheses. Journal: Studies in Conflict & Terrorism Pages: 1068-1089 Issue: 12 Volume: 44 Year: 2021 Month: 12 X-DOI: 10.1080/1057610X.2019.1616930 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1616930 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1068-1089 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1628613_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ahmet S. Yayla Author-X-Name-First: Ahmet S. Author-X-Name-Last: Yayla Title: Turkish ISIS and AQ Foreign Fighters: Reconciling the Numbers and Perception of the Terrorism Threat Abstract: This article attempts to establish a database of the numbers of the Turkish ISIS and AQ foreign terrorist fighters (FTFs) and their profiles through open sources, available news articles and personal interviews by the author with some former senior government officers; provides insights about the government and public perceptions on Salafi Jihadist terrorist organizations; and studies policy responses concerning returning FTFs and terrorist organizations. Journal: Studies in Conflict & Terrorism Pages: 1125-1147 Issue: 12 Volume: 44 Year: 2021 Month: 12 X-DOI: 10.1080/1057610X.2019.1628613 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1628613 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:12:p:1125-1147 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1822589_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Simon Cottee Author-X-Name-First: Simon Author-X-Name-Last: Cottee Title: Incel (E)motives: Resentment, Shame and Revenge Abstract: This article provides a framework for thinking about incels and incel-inspired terrorism. Incels are part of a fringe online subculture that trades in misogyny, victimhood and fatalism. The aim of the article is to describe these aforementioned orientations and the emotions associated with them. Only a tiny minority of incels commit acts of incel-inspired terrorism. Research on shame and revenge provides a useful starting-point for understanding these acts. Journal: Studies in Conflict & Terrorism Pages: 93-114 Issue: 2 Volume: 44 Year: 2020 Month: 9 X-DOI: 10.1080/1057610X.2020.1822589 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1822589 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2020:i:2:p:93-114 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1799519_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anna Kruglova Author-X-Name-First: Anna Author-X-Name-Last: Kruglova Title: “I Will Tell You a Story about Jihadâ€: ISIS’s Propaganda and Narrative Advertising Abstract: This article further broadens the understanding of ISIS propaganda and its effectiveness by looking at the group’s social media through the prism of marketing. The group was found to rely on a narrative type of advertising while creating its propaganda. Specifically, ISIS was using stories to appeal to its recruits’ emotions and desires. The use of stories helped ISIS to establish a strong connection with its target audience, and increased the group’s success in promoting its ideas. Journal: Studies in Conflict & Terrorism Pages: 115-137 Issue: 2 Volume: 44 Year: 2020 Month: 7 X-DOI: 10.1080/1057610X.2020.1799519 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1799519 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2020:i:2:p:115-137 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1799520_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alexa Katon Author-X-Name-First: Alexa Author-X-Name-Last: Katon Author-Name: Christine Shahan Brugh Author-X-Name-First: Christine Shahan Author-X-Name-Last: Brugh Author-Name: Sarah L. Desmarais Author-X-Name-First: Sarah L. Author-X-Name-Last: Desmarais Author-Name: Joseph Simons-Rudolph Author-X-Name-First: Joseph Author-X-Name-Last: Simons-Rudolph Author-Name: Samantha A. Zottola Author-X-Name-First: Samantha A. Author-X-Name-Last: Zottola Title: A Qualitative Analysis of Drivers among Military-Affiliated and Civilian Lone Actor Terrorists Inspired by Jihadism Abstract: This qualitative study explored and compared factors that drive individuals with and without military experience to commit violent acts of terrorism within a sample of 10 jihadism-inspired lone actors. Findings reveal four major themes driving violent terrorist action among lone actors: Action, Grievance, Growing in Jihad, Religious Fervor. Results also provide some of the first evidence that drivers of lone actor terrorism differ between those with and without military experience. Factors related to action, certain grievances, and growth in Jihad were seen more commonly among the military-affiliated lone actors than their civilian peers. Implications for policy and prevention are discussed. Journal: Studies in Conflict & Terrorism Pages: 138-155 Issue: 2 Volume: 44 Year: 2020 Month: 8 X-DOI: 10.1080/1057610X.2020.1799520 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1799520 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2020:i:2:p:138-155 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1759487_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ioan Pop Author-X-Name-First: Ioan Author-X-Name-Last: Pop Author-Name: Mitchell D. Silber Author-X-Name-First: Mitchell D. Author-X-Name-Last: Silber Title: Iran and Hezbollah’s Pre-Operational Modus Operandi in the West Abstract: Tensions between the United States and Iran/Hezbollah have been on the rise since 2018 when the U.S. administration withdrew from the 2015 nuclear deal. These tensions spiked in January 2020 when U.S. strikes killed Qassem Soleimani the leader of Iran’s IRGC-Quds Force. Furthermore, there is mounting evidence that in recent years, Iran and Hezbollah have sought to create a sleeper network in the U.S. and Western Europe, which could be activated to launch attacks as part of a retaliatory attack. This paper assesses Iran and Hezbollah pre-operational modus operandi in the West derived from court documents and open source reporting of recent arrest of Hezbollah and Iranian agents in the US and abroad. It sheds lights on the recruitment, training, and placement of these agents and the intricacies of their past operations. While it is impossible to predict when, where or how Iran/Hezbollah might retaliate as retribution for Soleimani’s killing, this article argues that there is growing number of indicators and warning signs for a possible attack in the U.S. or against U.S. interests abroad. Journal: Studies in Conflict & Terrorism Pages: 156-179 Issue: 2 Volume: 44 Year: 2021 Month: 2 X-DOI: 10.1080/1057610X.2020.1759487 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759487 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:2:p:156-179 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1538092_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Marco Nilsson Author-X-Name-First: Marco Author-X-Name-Last: Nilsson Title: Jihadiship: From Radical Behavior to Radical Beliefs Abstract: Jihadism is a complex social phenomenon that changes people, but not always uniformly. This article argues that cognitive and behavioral radicalization can be seen as a discursive journey or jihadiship involving (e)merging ideas, problems, and solutions that change with encounters with new circumstances—both material and immaterial. The differences observed between various generations of jihadists are one manifestation of this complexity. Especially in a jihadi group, the processes of radicalization are bound to continue and take new forms, compared with those experienced in the West. Another example of the complexity of jihadiship is that not only can radical ideas lead to radical behavior, but also radical behavior can increasingly give rise to radical ideas in jihadi groups. Journal: Studies in Conflict & Terrorism Pages: 181-197 Issue: 3 Volume: 44 Year: 2021 Month: 3 X-DOI: 10.1080/1057610X.2018.1538092 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1538092 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:3:p:181-197 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1538124_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael J. Schumacher Author-X-Name-First: Michael J. Author-X-Name-Last: Schumacher Author-Name: Peter J. Schraeder Author-X-Name-First: Peter J. Author-X-Name-Last: Schraeder Title: Does Domestic Political Instability Foster Terrorism? Global Evidence from the Arab Spring Era (2011–14) Abstract: This article explores the intellectual puzzle of whether the domestic political instability associated with the Arab Spring is responsible for a surge in global terrorism that peaked in 2014. A series of negative binomial regressions demonstrate strong support for an “escalation effectâ€: more severe forms of domestic political instability, most notably government purges and riots, breed greater levels of terrorism, although the most severe form of domestic political instability—revolution—does not. We also find that specific types of domestic political instability affect terrorism levels differently depending on geographical region and regime type (i.e., democracy versus dictatorship). Journal: Studies in Conflict & Terrorism Pages: 198-222 Issue: 3 Volume: 44 Year: 2021 Month: 3 X-DOI: 10.1080/1057610X.2018.1538124 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1538124 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:3:p:198-222 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1538661_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nadia Al-Dayel Author-X-Name-First: Nadia Author-X-Name-Last: Al-Dayel Title: Sexual Suppression and Political Agency: Evoking a Woman’s Support for the Islamic State Abstract: This article explores the gender dynamics of recruitment materials published by the so-called Islamic State. Through an investigation of the Islamic State’s only female-authored column in Dabiq, it reveals how a unique “voice†evokes support by urging readers to consider their agency in both the citizen–state relationship and the husband–wife patriarchal structure. It utilizes an original method of contextualizing narratives through reflexivity and responsivity. Overall, it reveals that an analysis of contemporary extremist recruitment materials must consider the mediatized environment in which it forms as well as the realistic political situations to which it responds. Journal: Studies in Conflict & Terrorism Pages: 223-247 Issue: 3 Volume: 44 Year: 2021 Month: 3 X-DOI: 10.1080/1057610X.2018.1538661 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1538661 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:3:p:223-247 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1538143_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nicole K. Drumhiller Author-X-Name-First: Nicole K. Author-X-Name-Last: Drumhiller Author-Name: Jason Roesler Author-X-Name-First: Jason Author-X-Name-Last: Roesler Title: Perceptions of Fear Among Targets of Radical Animal Rights Extremism Abstract: This study explores criminal acts carried out in the name of animals and the environment and assesses the perception of fear they instill within their targets. Acts classified as terrorism are often categorized using a set definition of terrorism and by judging the potential fear caused within humans. This study utilizes survey and field research to assess the perceptions of those targeted by extremism in this area, the degree to which these criminal acts cause fear. We find that animal liberations, arson, and systematic harassment coupled with vandalism can be considered acts that cause fear in intended targets. Journal: Studies in Conflict & Terrorism Pages: 248-265 Issue: 3 Volume: 44 Year: 2021 Month: 3 X-DOI: 10.1080/1057610X.2018.1538143 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1538143 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:3:p:248-265 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1531542_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Marek Bodziany Author-X-Name-First: Marek Author-X-Name-Last: Bodziany Author-Name: Marzena Netczuk-Gwoździewicz Author-X-Name-First: Marzena Author-X-Name-Last: Netczuk-Gwoździewicz Title: Feminization of Terror: Psychological Analysis of the Role of Women in Terrorist Structures Abstract: Feminization of terror is a significant issue in the light of its etiology, scale, and effects. Moreover, it is a social problem that arose in psychology, sociology, cultural anthropology, and politics. This article aims to analyze only a part of this complicated matter. The article has put an emphasis on the motives that drive women to take up such a risky and dangerous practice, as well as on the specifics of their activities in four organizations: the Liberation Tigers of Tamil Eelam, Fuerzas Armadas Revolucionarias de Colombia, Chechen Kavkazskiy Emirat, and groups associated with Islam. Journal: Studies in Conflict & Terrorism Pages: 266-283 Issue: 3 Volume: 44 Year: 2021 Month: 3 X-DOI: 10.1080/1057610X.2018.1531542 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1531542 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:3:p:266-283 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1543145_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Erin M. Kearns Author-X-Name-First: Erin M. Author-X-Name-Last: Kearns Author-Name: Allison E. Betus Author-X-Name-First: Allison E. Author-X-Name-Last: Betus Author-Name: Anthony F. Lemieux Author-X-Name-First: Anthony F. Author-X-Name-Last: Lemieux Title: When Data Do Not Matter: Exploring Public Perceptions of Terrorism Abstract: Public perceptions of terrorism are out of line with reality. How can perceptions be changed? Using a 4 × 2 experimental design with a national sample of U.S. adults, we examine how source of information and details provided impact views of terrorism. Sources, details, and individual-level factors—Islamophobia, trust in media, and trust in science—impact perceived accuracy of terrorism data. Many people updated their views on terrorism after reading factual information, yet only trust in science was related with this change. In short, people can be persuaded by factual information on terrorism, but it is less clear why they change beliefs. Journal: Studies in Conflict & Terrorism Pages: 285-309 Issue: 4 Volume: 44 Year: 2021 Month: 4 X-DOI: 10.1080/1057610X.2018.1543145 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1543145 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:4:p:285-309 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1545828_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jonathan Pieslak Author-X-Name-First: Jonathan Author-X-Name-Last: Pieslak Author-Name: Brian Pieslak Author-X-Name-First: Brian Author-X-Name-Last: Pieslak Author-Name: Anthony F. Lemieux Author-X-Name-First: Anthony F. Author-X-Name-Last: Lemieux Title: Trends of Anashid Usage in Da‘esh Video Messaging and Implications for Identifying Terrorist Audio and Video Abstract: This article examines how Da‘esh utilizes anashid (“Islamic songs†or “recitationâ€) as soundtrack elements within its video messaging, focusing primarily on a sample set of 755 videos released in 2015. The authors also present the development of an automatic content recognition (ACR) tool that enabled them to engage this large data set. The article then explores the possibilities of ACR for the identification of terrorist audio and video, utilizing the conclusions drawn from the trends of audio usage in Da‘esh video messaging to support the validity and promise of such an approach. Journal: Studies in Conflict & Terrorism Pages: 310-325 Issue: 4 Volume: 44 Year: 2021 Month: 4 X-DOI: 10.1080/1057610X.2018.1545828 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1545828 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:4:p:310-325 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1538153_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sally Sharif Author-X-Name-First: Sally Author-X-Name-Last: Sharif Title: Predicting the End of the Syrian Conflict: From Theory to the Reality of a Civil War Abstract: The Syrian civil war has confounded all predictions on its end date and is still ongoing. Valuable explicative work has been done on civil war duration; however, scholars have failed to reliably predict the end of ongoing conflicts. This article argues that faulty predictions on termination date of the Syrian conflict did not necessarily result from statistical errors in modeling civil wars data and better models might not necessarily mitigate the prediction problem. Rather, three factors contributed to the misperceptions: the conflict’s cartography problem, the splintering of the opposition, and the multi-partner foreign intervention in the conflict. The last two factors can also be held accountable for prolonging the conflict. Incorrect predictions or descriptions in scholarly works on ongoing conflicts can have disastrous implications for the present and future of states and populations beset by protracted conflict. Had it been made clear that neither the insurgents nor the government had the capacity to win the war within the predicted timeframe, the international community may have taken a more decisive role in bringing belligerents to the negotiation table, improving prospects for a peaceful diplomatic settlement. Journal: Studies in Conflict & Terrorism Pages: 326-345 Issue: 4 Volume: 44 Year: 2021 Month: 4 X-DOI: 10.1080/1057610X.2018.1538153 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1538153 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:4:p:326-345 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1543144_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: William Stephens Author-X-Name-First: William Author-X-Name-Last: Stephens Author-Name: Stijn Sieckelinck Author-X-Name-First: Stijn Author-X-Name-Last: Sieckelinck Author-Name: Hans Boutellier Author-X-Name-First: Hans Author-X-Name-Last: Boutellier Title: Preventing Violent Extremism: A Review of the Literature Abstract: The rapid growth in research directed toward preventing violent extremism has resulted in a rich but fragmented body of literature spanning multiple disciplines. This review finds a number of themes that cut across a range of disciplinary approaches and suggests that the concept of resilience could provide the basis for a common framework for prevention. However, thus far the notion of resilience to extremism has often focused on the individual, and insufficient attention has been given to the role of contextual structures and institutions. We suggest that a social–ecological perspective on resilience could re-orientate the discourse on resilience to extremism. Journal: Studies in Conflict & Terrorism Pages: 346-361 Issue: 4 Volume: 44 Year: 2021 Month: 4 X-DOI: 10.1080/1057610X.2018.1543144 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1543144 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:4:p:346-361 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1559508_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stuart Macdonald Author-X-Name-First: Stuart Author-X-Name-Last: Macdonald Author-Name: Nuria Lorenzo-Dus Author-X-Name-First: Nuria Author-X-Name-Last: Lorenzo-Dus Title: Visual Jihad: Constructing the “Good Muslim†in Online Jihadist Magazines Abstract: Images are known to have important effects on human perception and persuasion. Jihadist groups are also known to make strategic use of emotive imagery and symbolism for persuasive ends. Yet until recently studies of the online magazines published by violent jihadist groups largely focused on their textual, not their image, content and, while the image content of these magazines is now the subject of a burgeoning number of studies, few of these compare the images used by different groups. This article accordingly offers a cross-group comparison, examining the image content of a total of thirty-nine issues of five online magazines published by four different jihadist groups. Starting with a content analysis, it shows that the images’ most common focus is non-leader jihadis. Using a news values analysis, it then shows how these images of non-leader jihadis are used to visually construct the identity of a “good Muslim.†This construct is characterized by three traits, each corresponding to a different news value: fulfilled (personalization); active (consonance); and respected (prominence). Moreover, these traits are intertwined: fulfillment comes from responding actively to the call to violent jihad, which in turn promises respect. The article concludes by highlighting some subtle differences between how the news values of personalization, consonance, and prominence are realized in the different magazines, and by discussing the implications of the “good Muslim†construct for efforts to develop countermessages. Journal: Studies in Conflict & Terrorism Pages: 363-386 Issue: 5 Volume: 44 Year: 2021 Month: 5 X-DOI: 10.1080/1057610X.2018.1559508 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1559508 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:5:p:363-386 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1551294_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joel A. Capellan Author-X-Name-First: Joel A. Author-X-Name-Last: Capellan Author-Name: Jason R. Silva Author-X-Name-First: Jason R. Author-X-Name-Last: Silva Title: An Investigation of Mass Public Shooting Attacks Against Government Targets in the United States Abstract: The current study examines mass public shooters who target government agents and institutions in the United States. This research uses a rational choice perspective to examine the incidence, motivations, and target selection. Additionally, this work provides an in-depth investigation of ideological attacks, as well as a comparison against general mass public shooting perpetrator, planning, and incident characteristics. Results indicate non-ideological attacks against government targets occur more than ideologically motivated shootings. Importantly, the majority of ideologically motivated mass public shooters do not attack government targets. These findings provide implications for security, policy, and prevention strategies that have historically focused on ideologically motivated mass public shootings against government targets. Journal: Studies in Conflict & Terrorism Pages: 387-409 Issue: 5 Volume: 44 Year: 2021 Month: 5 X-DOI: 10.1080/1057610X.2018.1551294 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1551294 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:5:p:387-409 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1543131_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Emeka Thaddues Njoku Author-X-Name-First: Emeka Thaddues Author-X-Name-Last: Njoku Title: Strategic Exclusion: The State and the Framing of a Service Delivery Role for Civil Society Organizations in the Context of Counterterrorism in Nigeria Abstract: This article examines the sociopolitical factors that influenced the framing of counterterrorism measures (CTMs) in Nigeria. It argues that the government strategically excluded civil society organizations CSOs from participating in the process of formulating CTMs. Thus, this situation renders CSOs without agency in the making of CTMs and their legal capacity to advocate for the marginalized and vulnerable groups in the context of counterterrorism in Nigeria. Additionally, the employed strategic exclusion of CSOs aided in the construction of a service delivery role that restrained political advocacy. Furthermore, the study argues that, despite the government counterterrorism approach, CSOs did not seek public support on the need to contest CTMs in Nigeria and have complied with these laws and policies. The empirical analysis is based on mixed-method research of CSOs and government agents. This research seeks to contribute to the debate regarding the effects of CTMs on CSOs by tracing the establishment of service delivery roles for CSOs to these organisations strategic exclusion in the formulation of CTMs. Journal: Studies in Conflict & Terrorism Pages: 410-430 Issue: 5 Volume: 44 Year: 2021 Month: 5 X-DOI: 10.1080/1057610X.2018.1543131 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1543131 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:5:p:410-430 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1559512_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael Moncrieff Author-X-Name-First: Michael Author-X-Name-Last: Moncrieff Author-Name: Pierre Lienard Author-X-Name-First: Pierre Author-X-Name-Last: Lienard Title: The Impact of Coalitional Commitment on the Recall of Moral Memories Abstract: We explore the relationship between coalitional alignment and memories of the Croatian Homeland War. Fifty-seven Croatian citizens with war experiences participated in a semi-structured interview. Participants less affected by the war and high in ethnic commitment recalled more morally charged memories than participants low in commitment. Participants highly affected by the war similarly recalled morally charged memories; however, the qualitative nature of the memories differed between high and low commitment. Offspring of mixed marriages and Orthodox participants reported more virtuous behaviors than other participants. The findings contribute to the literature on the intractability of conflict. Journal: Studies in Conflict & Terrorism Pages: 431-454 Issue: 5 Volume: 44 Year: 2021 Month: 5 X-DOI: 10.1080/1057610X.2018.1559512 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1559512 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:5:p:431-454 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1559516_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tom Keatinge Author-X-Name-First: Tom Author-X-Name-Last: Keatinge Author-Name: Kerstin Danner Author-X-Name-First: Kerstin Author-X-Name-Last: Danner Title: Assessing Innovation in Terrorist Financing Abstract: The innovation terrorist groups apply to their strategy and tactical operations is subject to increasing study. Yet an assessment of the innovation applied by terrorist groups to their financing is lacking, with consideration typically limited to “where does the money come from and what is it used for?†The forces that determine how terrorist groups fund themselves are questioned less closely. Given the widely held belief by national governments and international organizations that financing is a key requisite of terrorist activity, this omission represents a striking gap in our ability to anticipate, disrupt, and deny terrorists of financing. Journal: Studies in Conflict & Terrorism Pages: 455-472 Issue: 6 Volume: 44 Year: 2021 Month: 3 X-DOI: 10.1080/1057610X.2018.1559516 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1559516 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:6:p:455-472 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1568004_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Quint Hoekstra Author-X-Name-First: Quint Author-X-Name-Last: Hoekstra Title: Helping the Contras: The Effectiveness of U.S. Support for Foreign Rebels During the Nicaraguan Contra War (1979–1990) Abstract: During the 1980s, the United States spent substantial political and economic capital supporting the Nicaraguan Contras. How effective was this in helping the rebels take on the Sandinista government? This article explores this topic by extending the application of principal-agent theory. It finds that, as expected, the effect of U.S. assistance was undermined by adverse selection and agency losses. However, the most important factor that undermined support effectiveness was the great inconsistency of the level of U.S. aid awarded to the insurgents. Reductions of official U.S. government support led to insurgency campaign collapse and meant that, in the end, the U.S. support program was only partially effective in helping the Contra struggle. Journal: Studies in Conflict & Terrorism Pages: 521-541 Issue: 6 Volume: 44 Year: 2021 Month: 3 X-DOI: 10.1080/1057610X.2019.1568004 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1568004 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:6:p:521-541 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1560666_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Cameron Sumpter Author-X-Name-First: Cameron Author-X-Name-Last: Sumpter Author-Name: Yuslikha K. Wardhani Author-X-Name-First: Yuslikha K. Author-X-Name-Last: Wardhani Author-Name: Sapto Priyanto Author-X-Name-First: Sapto Author-X-Name-Last: Priyanto Title: Testing Transitions: Extremist Prisoners Re-Entering Indonesian Society Abstract: Readjusting to society after a prolonged period of detention is fraught with emotional and practical challenges. When recently released prisoners convicted of terrorism offenses focus on rebuilding their lives, supporting their families, and engaging with community members they may be less likely to resume the subversive behavior that put them behind bars. With this in mind, the Indonesian government attempts to facilitate the reintegration of former extremist inmates, primarily through entrepreneurial development initiatives. The government’s general approach holds promise but suffers from insufficient planning and human resource constraints. Greater involvement from local authorities and civil society would provide opportunities for more consistent engagement and a stronger chance of successful reintegration outcomes. Journal: Studies in Conflict & Terrorism Pages: 473-494 Issue: 6 Volume: 44 Year: 2021 Month: 3 X-DOI: 10.1080/1057610X.2018.1560666 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1560666 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:6:p:473-494 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1567997_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lior Herman Author-X-Name-First: Lior Author-X-Name-Last: Herman Author-Name: Itay Fischhendler Author-X-Name-First: Itay Author-X-Name-Last: Fischhendler Title: Energy as a Rewarding and Punitive Foreign Policy Instrument: The Case of Israeli–Palestinian Relations Abstract: This article examines how and when energy is used as a punitive or rewarding measure to advance foreign policy ends under conditions of perpetual conflict. Drawing on hundreds of primary governmental and commercial documents, and extensive elite interviews, we examine Israeli–Palestinian relations over 50 years. We find extensive instrumentalization of energy for foreign policy objectives in the conflict. We highlight electricity, a neglected area in international relations and conflict literatures, as a significant foreign policy tool. Our findings emphasize four major variables that shape the timing and form of energy measures—politics, regime type, dependence level, and energy production chain. Journal: Studies in Conflict & Terrorism Pages: 495-520 Issue: 6 Volume: 44 Year: 2021 Month: 3 X-DOI: 10.1080/1057610X.2019.1567997 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1567997 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:6:p:495-520 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1571696_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Clara Egger Author-X-Name-First: Clara Author-X-Name-Last: Egger Author-Name: Raùl Magni-Berton Author-X-Name-First: Raùl Author-X-Name-Last: Magni-Berton Title: The Role of Islamist Ideology in Shaping Muslims Believers’ Attitudes toward Terrorism: Evidence from Europe Abstract: This article investigates the role religious beliefs play in leading European Muslims to justify terrorism, using survey data collected in twenty-one countries. Results show that the factors leading Muslims to justify terrorism contextually vary. Where Muslims are predominant, this probability decreases with the importance respondents assign to religion, while it increases where Muslims are a minority. We find no evidence in support of the thesis that Islamist propaganda causes ordinary believers’ radicalization. Yet, in Western countries affected by homegrown terrorism, we observe that justifying terrorism is strongly associated with an increase in religious practice, providing support to the thesis that Islamist groups are attracting Islam radical individuals. Journal: Studies in Conflict & Terrorism Pages: 581-604 Issue: 7 Volume: 44 Year: 2021 Month: 7 X-DOI: 10.1080/1057610X.2019.1571696 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1571696 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:7:p:581-604 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1568008_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Miron Lakomy Author-X-Name-First: Miron Author-X-Name-Last: Lakomy Title: Recruitment and Incitement to Violence in the Islamic State’s Online Propaganda: Comparative Analysis of Dabiq and Rumiyah Abstract: This article attempts to fill a gap in research on the propaganda methods exploited in the Islamic State’s flagship online magazines, Dabiq and Rumiyah. Its major objective is to discover methods exploited by their editors either to convince readers to join the ranks of the Islamic State, or to partake in jihad in the form of violent actions against infidels. The article also attempts to understand the magazines’ modus operandi in terms of legitimizing the “Caliphate’s†violence against its enemies. In order to reach these goals, content analysis and comparative analysis were utilized. This article argues that while the legitimization of violence and call to violence was strongly emphasized in both magazines, there are significant differences in terms of recruitment messages. On the one hand, Dabiq prioritized this issue (e.g., through the promotion of hijrah). On the other hand, Rumiyah was much less interested in inciting followers to join its ranks in the Middle East. Instead, it focused on calling Ummah to participate in jihad against the infidels, especially in the form of lone-wolf terrorist attacks. Journal: Studies in Conflict & Terrorism Pages: 565-580 Issue: 7 Volume: 44 Year: 2021 Month: 7 X-DOI: 10.1080/1057610X.2019.1568008 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1568008 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:7:p:565-580 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1568815_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Boaz Ganor Author-X-Name-First: Boaz Author-X-Name-Last: Ganor Title: Artificial or Human: A New Era of Counterterrorism Intelligence? Abstract: A new revolution has begun in counterterrorism—the Artificial Intelligence (AI) revolution. The AI revolution has had a significant impact on many areas of security and intelligence. The use of AI and big data in general, and in the field of intelligence and counterterrorism in particular, has led to intense debates between supporters of the continuation and expansion of the use of this technology and those who oppose it. The traditional delicate balance between effectiveness in the fight against terrorism and the liberal democratic values ​​of society becomes even more crucial when counterterrorism engages in AI and big data technology. Journal: Studies in Conflict & Terrorism Pages: 605-624 Issue: 7 Volume: 44 Year: 2021 Month: 7 X-DOI: 10.1080/1057610X.2019.1568815 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1568815 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:7:p:605-624 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1568005_J.xml processed with: repec_from_tfjats.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: R. Kim Cragin Author-X-Name-First: R. Kim Author-X-Name-Last: Cragin Title: Preventing the Next Wave of Foreign Terrorist Fighters: Lessons Learned from the Experiences of Algeria and Tunisia Abstract: Foreign terrorist fighters (FTFs) signify a unique threat. Islamic State leaders recruited many of them specifically to conduct terrorist attacks against the West. Many of these external operations have proven to be sophisticated and deadly, such as the November 2015 attacks in Paris. Yet the threat posed by FTFs goes beyond orchestrating attacks. In the past, they returned home to build networks that, in turn, facilitated a new generation of FTFs. Even more challenging, today’s FTFs can interact with recruits on social media to inspire attacks. This article addresses the threat of a new wave of FTFs and potential countermeasures. It presents findings from a comparative analysis of Tunisia and Algeria, concluding that to reverse the compounding nature of FTFs, countries must identify the potential threat from the outset, put appropriate legal measures in place, adequately fund judicial systems, and institute re-integration programs. Journal: Studies in Conflict & Terrorism Pages: 543-564 Issue: 7 Volume: 44 Year: 2021 Month: 7 X-DOI: 10.1080/1057610X.2019.1568005 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1568005 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:7:p:543-564 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1575036_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michal Mochtak Author-X-Name-First: Michal Author-X-Name-Last: Mochtak Title: Understanding Electoral Violence through Complex Textual Data: OSCE Monitoring Missions in Different Contexts Abstract: The article analyzes more than twenty years of evidence on electoral violence as reported by Organization for Security and Cooperation in Europe (OSCE) monitoring mission reports. It identifies prevailing trends of electoral violence in the OSCE participating states in order to better understand how the phenomenon is understood and framed by the leading international monitoring organizations in the region. The analysis utilizes a unique approach based on automated content analysis employing counting algorithms and latent semantic indexing. The results of the analysis show how electoral violence differs throughout the region while highlighting the qualitative variations in regional patterns of the reported incidents of election-related violence. Journal: Studies in Conflict & Terrorism Pages: 646-667 Issue: 8 Volume: 44 Year: 2021 Month: 8 X-DOI: 10.1080/1057610X.2019.1575036 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1575036 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:8:p:646-667 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1575031_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: John Battersby Author-X-Name-First: John Author-X-Name-Last: Battersby Title: Can Old Lessons Inform Current Directions: Australia, New Zealand, and Ananda Marga’s Trans-Tasman “Terrorism†1975–1978 Abstract: Ananda Marga (AM) was established in India in 1951, and was over time involved in political violence there. Its leader was arrested in 1971 and AM banned in 1975. By then it had spread globally, with AM groups set up in Australia and New Zealand in the early 1970s all peacefully disposed. The 1975 banning of the sect in India led to a change in AM behaviour globally, with the first act of AM terrorism outside of India attempted in New Zealand that year. AM acts of terrorism occurred subsequently in Australia. There were significant links between AM in both countries, but Australia and New Zealand chose individual national approaches over a coordinated response to AM terrorism. These approaches were not always effective and at times actually counter-productive. This case study considers the limitations of CT tactics used at the time, some of which are still used today. Journal: Studies in Conflict & Terrorism Pages: 686-700 Issue: 8 Volume: 44 Year: 2021 Month: 8 X-DOI: 10.1080/1057610X.2019.1575031 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1575031 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:8:p:686-700 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1577016_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Adrian Cherney Author-X-Name-First: Adrian Author-X-Name-Last: Cherney Author-Name: Emma Belton Author-X-Name-First: Emma Author-X-Name-Last: Belton Title: Evaluating Case-Managed Approaches to Counter Radicalization and Violent Extremism: An Example of the Proactive Integrated Support Model (PRISM) Intervention Abstract: In recent years there has been the proliferation of counterradicalization programs that incorporate a case management approach involving individually tailored intervention plans. The evaluation of case-managed countering violent extremism (CVE) interventions is challenging. This article provides results from research that evaluated a custody-based case-managed intervention delivered to convicted terrorists and individuals identified as at risk of radicalization in the Australian state of New South Wales, called the Proactive Integrated Support Model. A quantitative assessment of disengagement based on the coding of client case note data is provided. Results provide data on the background of clients, their intervention goals, and illustrate client change over time. Lessons for CVE evaluation and the role of formal interventions in facilitating disengagement are highlighted. Journal: Studies in Conflict & Terrorism Pages: 625-645 Issue: 8 Volume: 44 Year: 2021 Month: 8 X-DOI: 10.1080/1057610X.2019.1577016 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1577016 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:8:p:625-645 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1575027_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Revital Sela-Shayovitz Author-X-Name-First: Revital Author-X-Name-Last: Sela-Shayovitz Author-Name: Hava Dayan Author-X-Name-First: Hava Author-X-Name-Last: Dayan Title: Female Palestinian Terrorists: The Role of the Intifada Period and the Terrorism Context Abstract: Palestinian women have played an increasingly active role in terrorist activities in the past two decades as part of the Israeli–Palestinian conflict. The present study aims to examine differences in the characteristics of female Palestinian terrorists and in the patterns of their terrorist activity between the Second Intifada and the Third Intifada. Furthermore, a comparative analysis of male Palestinian terrorist activity between the two Intifada periods was conducted in order to explore whether trends in female terrorist activity were unique to women or reflected global trends. Data are based on 171 female and male Palestinians that carried out terrorist activities. The findings show that age, terrorist method and organizational affiliation correlate significantly with the Intifada period. Significant differences were not found in the main motive for female terrorist activity. The analysis shows that overall trends of Palestinian female terrorist characteristics and their involvement in terrorism were similar to those of male terrorists. Moreover, during the Third Intifada female terrorists mainly acted alone, reflecting the current growing global trend of lone-actor terrorists. Journal: Studies in Conflict & Terrorism Pages: 668-685 Issue: 8 Volume: 44 Year: 2021 Month: 8 X-DOI: 10.1080/1057610X.2019.1575027 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1575027 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:8:p:668-685 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1586354_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sadi Shanaah Author-X-Name-First: Sadi Author-X-Name-Last: Shanaah Title: What Motivates Muslims to Engage in Counterextremism? The Role of Identity, Efficacy, Emotions, and Morality Abstract: Western governments increasingly encourage Muslims to challenge Islamist extremism. However, the dominant academic and public discourse regards Muslims as deeply alienated and thus reluctant to do so. The article investigates motivations for Muslim counterextremism engagement and based on that formulates policy recommendations that are useful to government agencies that seek to mobilize Muslim communities to fight Islamist extremism. The analysis finds that Muslims are more likely to mobilize if governments highlight how Islamist extremism violates Islamic and universal values, how it negatively affects particular sections of Muslim communities, and how it can be successfully tackled by Muslim-based action. Journal: Studies in Conflict & Terrorism Pages: 755-775 Issue: 9 Volume: 44 Year: 2021 Month: 7 X-DOI: 10.1080/1057610X.2019.1586354 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1586354 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:9:p:755-775 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1585628_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Colleen E. Mills Author-X-Name-First: Colleen E. Author-X-Name-Last: Mills Author-Name: Joshua D. Freilich Author-X-Name-First: Joshua D. Author-X-Name-Last: Freilich Author-Name: Steven M. Chermak Author-X-Name-First: Steven M. Author-X-Name-Last: Chermak Author-Name: Thomas J. Holt Author-X-Name-First: Thomas J. Author-X-Name-Last: Holt Author-Name: Gary LaFree Author-X-Name-First: Gary Author-X-Name-Last: LaFree Title: Social Learning and Social Control in the Off- and Online Pathways to Hate Crime and Terrorist Violence Abstract: Although recent years have seen a great increase in the study of hate crime and terrorism, there is limited research to date that explores connections between hate crime and terrorism. This study uses a qualitative case-study method to explore the competing criminological theories of social learning and social control to investigate their utility in explaining radicalization among hate and terrorist violent extremists. Our analysis demonstrates important similarities and differences across ideology and offender types in their career pathways. We find support for the use of an integrated social control–social learning model to explain radicalization and the commission of extremist violence. Journal: Studies in Conflict & Terrorism Pages: 701-729 Issue: 9 Volume: 44 Year: 2021 Month: 7 X-DOI: 10.1080/1057610X.2019.1585628 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1585628 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:9:p:701-729 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1580419_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Barak Mendelsohn Author-X-Name-First: Barak Author-X-Name-Last: Mendelsohn Title: The Battle for Algeria: Explaining Fratricide among Armed Nonstate Actors Abstract: Unity among a rebel movement is associated with positive returns, yet rebel groups often fail to come together and even fall into fratricide infighting. Focusing on a rebel field in which one group enjoys primacy, I present three pathways that are likely to produce rebel fratricide: first, power shifts within the rebel movement; second, spillover from internal conflict within the dominant group; and third, disagreements over targeting noncombatants. I explore the role these mechanisms played in fratricidal violence among the Islamist opposition in Algeria during the 1990s civil war. Journal: Studies in Conflict & Terrorism Pages: 776-798 Issue: 9 Volume: 44 Year: 2021 Month: 7 X-DOI: 10.1080/1057610X.2019.1580419 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1580419 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:9:p:776-798 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1577541_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Markus K. Binder Author-X-Name-First: Markus K. Author-X-Name-Last: Binder Author-Name: Gary A. Ackerman Author-X-Name-First: Gary A. Author-X-Name-Last: Ackerman Title: Pick Your POICN: Introducing the Profiles of Incidents involving CBRN and Non-State Actors (POICN) Database Abstract: The majority of scholarship on chemical, biological, radiological, and nuclear (CBRN) terrorism relies on non-empirical theorizing or the in-depth examination of a handful of prominent cases. A key reason for the dearth of systematic analyses is the lack of a comprehensive database on CBRN terrorism events amenable to quantitative analysis. This article introduces the Profiles of Incidents involving CBRN and Non-State Actors (POICN) database, consisting of 517 CBRN terrorism–related events from 1990 to 2017. After laying out the general scope of the database and its unique approach to incident validation, the article illustrates POICN’s potential through preliminary observations of the data. Journal: Studies in Conflict & Terrorism Pages: 730-754 Issue: 9 Volume: 44 Year: 2021 Month: 7 X-DOI: 10.1080/1057610X.2019.1577541 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1577541 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:44:y:2021:i:9:p:730-754 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1647678_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Niamatullah Ibrahimi Author-X-Name-First: Niamatullah Author-X-Name-Last: Ibrahimi Title: Rumor and Collective Action Frames: An Assessment of How Competing Conceptions of Gender, Culture, and Rule of Law Shaped Responses to Rumor and Violence in Afghanistan Abstract: How do rumors emerge and spread? One explanation emphasizes some form of crisis and uncertainty as the facilitating condition and another strand of research focuses on micro-level dynamics to explain how some groups are more vulnerable to rumors than others. This article applies framing theory to examine a rumor that led to violence that killed Farkhunda Malikzada in Afghanistan in March 2015 and three separate protests against the incident. Focusing on how different groups understand and reinterpret rumors, the article makes a distinction between rumor as an informational shortcut and an instrument of deliberate manipulation of information. Journal: Studies in Conflict & Terrorism Pages: 20-42 Issue: 1 Volume: 45 Year: 2022 Month: 1 X-DOI: 10.1080/1057610X.2019.1647678 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1647678 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:1:p:20-42 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1697024_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael J. Soules Author-X-Name-First: Michael J. Author-X-Name-Last: Soules Title: Martyr or Mystery? Female Suicide Bombers and Information Availability Abstract: An extensive body of literature examines how the media depicts female suicide bombers. However, there has been little systematic testing of these theories. I test common arguments about how female bombers are portrayed, relative to male bombers. I find mixed support for the notion that information on female bombers relies on gender stereotypes. I find robust evidence that the marital status of female bombers is more likely to be reported on than for their male counterparts, while other characteristics, such as education and occupation, are not. I discuss the incentives media outlets and armed groups have for reinforcing these stereotypes. Journal: Studies in Conflict & Terrorism Pages: 62-91 Issue: 1 Volume: 45 Year: 2022 Month: 1 X-DOI: 10.1080/1057610X.2019.1697024 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1697024 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:1:p:62-91 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1647673_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matthew J. Dolliver Author-X-Name-First: Matthew J. Author-X-Name-Last: Dolliver Author-Name: Erin M. Kearns Author-X-Name-First: Erin M. Author-X-Name-Last: Kearns Title: Is It Terrorism?: Public Perceptions, Media, and Labeling the Las Vegas Shooting Abstract: When a mass casualty event occurs, why do some people label it terrorism while others do not? People are more likely to consider an attack to be terrorism when the perpetrator is Muslim, yet it is unclear what other factors influence perceptions of mass violence. Using data collected from a national sample of U.S. adults shortly after the 2017 Las Vegas shooting, we examine how media consumption and social identity influence views of the attack. Media consumption and individual-level factors—Islamophobia, political ideology, and other participant demographics—influence how people view the attack and how confident people are in their assessments. Journal: Studies in Conflict & Terrorism Pages: 1-19 Issue: 1 Volume: 45 Year: 2022 Month: 1 X-DOI: 10.1080/1057610X.2019.1647673 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1647673 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:1:p:1-19 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1626091_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Marco Nilsson Author-X-Name-First: Marco Author-X-Name-Last: Nilsson Title: Motivations for Jihad and Cognitive Dissonance – A Qualitative Analysis of Former Swedish Jihadists Abstract: This study is based on interviews with three former Swedish jihadists, and it uses cognitive dissonance theory to analyze how their motivations for jihad changed—from the early stages of radicalization to fighting as part of a jihadist group and finally leaving jihad. It argues that cognitive dissonance is a causal mechanism, alternative to empathy and collective relative deprivation, that can explain how individuals with collective identities can be motivated to opt for jihad. For none of the interviewees did fundamentalist Islam provide a gateway into jihadism, nor did they seem to use Islam as a mere justification for violent behavior. Cognitive dissonance can also shed light on why some jihadists have not been susceptible to further radicalization by accepting even more radical ideas. Journal: Studies in Conflict & Terrorism Pages: 92-110 Issue: 1 Volume: 45 Year: 2022 Month: 1 X-DOI: 10.1080/1057610X.2019.1626091 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1626091 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:1:p:92-110 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1647682_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Colin Atkinson Author-X-Name-First: Colin Author-X-Name-Last: Atkinson Author-Name: Donna Yates Author-X-Name-First: Donna Author-X-Name-Last: Yates Author-Name: Nick Brooke Author-X-Name-First: Nick Author-X-Name-Last: Brooke Title: Researching a Risky Business? The Use of Freedom of Information to Explore Counterterrorism Security at Museums in the United Kingdom Abstract: This article reflects on the value and limitations of the use of Freedom of Information (FOI) in the collection of data on counterterrorism policies and practices at museums in the United Kingdom (UK). In doing so, this article re-interprets the museum within the “single narrative†of global jihadist terrorism before using FOI to uncover counterterrorism security measures at museums in the UK. We particularly signpost the importance of the role of the museum security manager as the interface between the museum and the wider UK counterterrorism network. Throughout, but particularly in the discussion section, the article reflects on the value and limitations of FOI as a social research tool. The conclusion highlights the requirement for further qualitative enquiry into the museum as an emerging site of counterterrorism security discourse and practice, particularly in relation to how museum security managers understand and navigate this unique cultural space. Journal: Studies in Conflict & Terrorism Pages: 43-61 Issue: 1 Volume: 45 Year: 2022 Month: 1 X-DOI: 10.1080/1057610X.2019.1647682 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1647682 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:1:p:43-61 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1711601_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Miron Lakomy Author-X-Name-First: Miron Author-X-Name-Last: Lakomy Title: Between the “Camp of Falsehood†and the “Camp of Truthâ€: Exploitation of Propaganda Devices in the “Dabiq†Online Magazine Abstract: This paper attempts to fill the gap in research and contribute to the academic debate on the online magazines of Daesh. Its primary objective is to identify and understand propaganda devices, which were exploited by the editors of “Dabiq†to influence its readers. In order to do this, the study utilized a classic framework of propaganda devices elaborated by the American Institute for Propaganda Analysis, which consists of seven methods: name-calling, glittering generalities, transfer, testimonial, card-stacking, plain folks, and bandwagon. Journal: Studies in Conflict & Terrorism Pages: 881-906 Issue: 10 Volume: 45 Year: 2022 Month: 10 X-DOI: 10.1080/1057610X.2020.1711601 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1711601 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:10:p:881-906 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1711605_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Shlomo O. Goldman Author-X-Name-First: Shlomo O. Author-X-Name-Last: Goldman Author-Name: Smadar Noy Author-X-Name-First: Smadar Author-X-Name-Last: Noy Title: The Size of Terror Organizations: Poverty and Economic Inequality as Mobilizing Forces Abstract: This study examines the relationships between poverty, economic inequality and joining to terror organizations. Based on the rational-economic model, differently, from previous studies, we focused on the organizational level. We hypothesized that in a poorer base country of operation and in a base country of operation in which the economic inequality is wider the likelihood of terror organizations to become larger (higher number of core activists) is higher. Using GDP per-capita and GINI index as proxies and several statistical methods we tested these hypotheses analyzing hundreds of terror organizations. The findings are that there are no robust relationships between poverty and economic inequality and the number of people who joined them. However, the likelihood of a larger terror organization – lifetime, defeat as the life-ending cause of the organization and political goal – regime change, found to be significantly related to the size of terror organizations. Journal: Studies in Conflict & Terrorism Pages: 843-861 Issue: 10 Volume: 45 Year: 2022 Month: 10 X-DOI: 10.1080/1057610X.2020.1711605 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1711605 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:10:p:843-861 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1711604_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jugdep S. Chima Author-X-Name-First: Jugdep S. Author-X-Name-Last: Chima Title: Are Participants in Ethnonationalist Movements Rational-Choosers, Socially-Embedded Actors, or Psychologically-Instinctive Beings?: Motivations and Worldviews of Sikh Separatists from India Abstract: This article contributes to answering the fundamental research question, “Why do individuals participate in contentious ethnonationalist movements?†More specifically, it tries to ascertain which competing theory of human behavior—rational-chooser, socially-embedded actor, or instinctive psychological being—best explains this phenomenon. Based on over a dozen in-depth interviews with Sikh ethnonationalists from Punjab-India, this paper finds that social constructivism, and to a much lesser extent, the sociopsychological paradigm best explain why individuals join collective ethnonationalist movements. In contrast, the rational-choice theory finds only very limited support. Even when sociopsychological and rational-choice motivations are found for individual participation in risky ethnonationalist movements, they exist either intertwined or in close conjunction with social constructivist ones, thus giving even increased support for this dominant theory. Journal: Studies in Conflict & Terrorism Pages: 907-928 Issue: 10 Volume: 45 Year: 2022 Month: 10 X-DOI: 10.1080/1057610X.2020.1711604 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1711604 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:10:p:907-928 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1711588_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Zoe Marchment Author-X-Name-First: Zoe Author-X-Name-Last: Marchment Author-Name: Paul Gill Author-X-Name-First: Paul Author-X-Name-Last: Gill Title: Spatial Decision Making of Terrorist Target Selection: Introducing the TRACK Framework Abstract: Guided by previous research and recent empirical analyses, this paper gives insight into elements that characterize the spatial decision making of terrorist target selection. Five key factors explain why targets are chosen by terrorists. The authors propose that, generally, targets will be selected when they are Tolerable, Relevant, Accessible, Close and/or Known. This is followed by a discussion of attacks witnessed between January 2013 and December 2018 in the United Kingdom, and implications. Journal: Studies in Conflict & Terrorism Pages: 862-880 Issue: 10 Volume: 45 Year: 2022 Month: 10 X-DOI: 10.1080/1057610X.2020.1711588 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1711588 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:10:p:862-880 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1961706_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Victoria Williamson Author-X-Name-First: Victoria Author-X-Name-Last: Williamson Author-Name: Dominic Murphy Author-X-Name-First: Dominic Author-X-Name-Last: Murphy Author-Name: Sharon A.M. Stevelink Author-X-Name-First: Sharon A.M. Author-X-Name-Last: Stevelink Author-Name: Edgar Jones Author-X-Name-First: Edgar Author-X-Name-Last: Jones Author-Name: Shannon Allen Author-X-Name-First: Shannon Author-X-Name-Last: Allen Author-Name: Neil Greenberg Author-X-Name-First: Neil Author-X-Name-Last: Greenberg Title: The Relationship between of Moral Injury and Radicalisation: A Systematic Review Abstract: This review aimed to explore individual-level factors involved in radicalization and the impact of moral injury on an individual’s beliefs and behaviors that are relevant to radicalization. The results indicate that both individuals who develop radical beliefs and those with moral injury are exposed to events which provoke similar adverse outcomes, including a loss of personal significance, suggesting that moral injury could be a useful way to understand the process of radicalization. Understanding the processes involved in moral injury may inform preventative programs, as well programs to promote disengagement from radical action in those who have already been radicalized. Journal: Studies in Conflict & Terrorism Pages: 977-1003 Issue: 11 Volume: 45 Year: 2022 Month: 11 X-DOI: 10.1080/1057610X.2021.1961706 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1961706 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:11:p:977-1003 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1727098_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Clive Walker Author-X-Name-First: Clive Author-X-Name-Last: Walker Author-Name: Oona Cawley Author-X-Name-First: Oona Author-X-Name-Last: Cawley Title: The Juridification of the UK’s Counter Terrorism Prevent Policy Abstract: The U.K. policy of “Prevent†aims to stop people becoming involved in, or supporting, terrorism. In common with many CVE policies worldwide, Prevent has remained controversial in its conception, delivery, and impact. A formal review is now underway, so it is opportune to ask, “Whither Prevent?†This paper will examine briefly the justifications for Prevent, but the main thesis is that the juridification of Prevent is a beneficial trend in the U.K. Juridification is depicted as: the legislative production of ever more extensive and elaborate instruments; the expansion of judicial oversight; and the administrative (bureaucratic) application of soft law standards. Juridification is here invoked in order to enhance the legitimacy of the policy of Prevent through explicit improvements in its modes of operation and through offering modes of challenge where the principles of constitutionalism are contravened. If Prevent can be improved in these ways, then its application can be refined to address more effectively and efficiently the threat of terrorist attacks, especially given that the originators or observers of these threats are invited under the Prevent policy to cooperate by consent in the enterprise of counter terrorism. Journal: Studies in Conflict & Terrorism Pages: 1004-1029 Issue: 11 Volume: 45 Year: 2022 Month: 11 X-DOI: 10.1080/1057610X.2020.1727098 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1727098 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:11:p:1004-1029 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1711586_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rachel Schmidt Author-X-Name-First: Rachel Author-X-Name-Last: Schmidt Title: Duped: Examining Gender Stereotypes in Disengagement and Deradicalization Practices Abstract: In narratives around insurgencies, terrorism, and other forms of political violence, the media—and policymakers—frequently portray women as victims or unintelligent pawns of men. But these violent women get more media attention than their male counterparts because they are a shocking departure from gendered expectations of nurturing, peaceful women. However, even such narratives of deviance can reinforce societal stereotypes about women by emphasizing that they are emotional but not political, easily manipulated, often deranged, or simply unintelligent. Using in-depth interviews in Ireland and the United Kingdom with practitioners in counter terrorism (CT) and countering violent extremism (CVE), this paper argues that a failure to ask meaningful questions about women’s roles in extremist violence has reinforced gender stereotypes, leading to disengagement and deradicalization practices that ignore or downplay women’s importance in fostering violence. Journal: Studies in Conflict & Terrorism Pages: 953-976 Issue: 11 Volume: 45 Year: 2022 Month: 11 X-DOI: 10.1080/1057610X.2020.1711586 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1711586 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:11:p:953-976 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1711590_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nadia Al-Dayel Author-X-Name-First: Nadia Author-X-Name-Last: Al-Dayel Author-Name: Andrew Mumford Author-X-Name-First: Andrew Author-X-Name-Last: Mumford Author-Name: Kevin Bales Author-X-Name-First: Kevin Author-X-Name-Last: Bales Title: Not Yet Dead: The Establishment and Regulation of Slavery by the Islamic State Abstract: The Islamic State is an organization at the nexus of modern slavery and terrorism. This article provides the first in-depth analysis of how it regulated slavery. With a consideration of gendered approaches, it applies multiple data sources to reveal a three-part assessment of the forms, establishment, and regulation of slavery from 2014 to 2017. Beginning with the August 2014 Sinjar massacre, it reveals the logistics of slavery through an innovative process entitled the Division and Regulation of Enslavement Framework. It concludes with a discussion on the domestic and international aspects of this crime, detailing recommendations for research and policy. Journal: Studies in Conflict & Terrorism Pages: 929-952 Issue: 11 Volume: 45 Year: 2022 Month: 11 X-DOI: 10.1080/1057610X.2020.1711590 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1711590 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:11:p:929-952 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1723283_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ian Oxnevad Author-X-Name-First: Ian Author-X-Name-Last: Oxnevad Title: Beyond a Desert Revolt: TE Lawrence’s Theory of Proxy War and State Creation Abstract: The work of TE Lawrence is traditionally included among theories of insurgency and irregular warfare. However, such a reading of Lawrence’s work disregards the political theory of state creation underpinning his strategic understanding of insurgency. This article comprises a historically driven analysis of Lawrence’s writing and action in order to discern his military theory and return the Arab Revolt to its context of proxy warfare. This article argues that Lawrence’s work is strategic and political as opposed to tactical. Rather than a simple theory of insurgency, Lawrence’s military theory is one of proxy war that envisions state creation as a strategic goal. Journal: Studies in Conflict & Terrorism Pages: 1050-1068 Issue: 12 Volume: 45 Year: 2022 Month: 12 X-DOI: 10.1080/1057610X.2020.1723283 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1723283 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:12:p:1050-1068 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1738683_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Meghan Conroy Author-X-Name-First: Meghan Author-X-Name-Last: Conroy Author-Name: Nadia Al-Dayel Author-X-Name-First: Nadia Author-X-Name-Last: Al-Dayel Title: Identity Construction Through Discourse: A Case Study of ISIS’s No Respite Video Abstract: This article investigates the motivations driving the production of ISIS’s distinctive 2015 video, No Respite, released in response to the UN Security Council’s condemnation of the terrorist organization’s spate of violence. The article embraces a unique methodological framework that examines both the relationship between identity, discourse, and critical geopolitics and ISIS’s specific organized persuasive communication strategies. The framework is used to explain ISIS’s use of statistics as well as competitive and masculine discourse to bolster its legitimacy as a self-proclaimed state. The analysis is conducted through the lens of ISIS’s goal to be seen as a legitimate statehood project in lieu of a violent non-state actor. Journal: Studies in Conflict & Terrorism Pages: 1069-1094 Issue: 12 Volume: 45 Year: 2022 Month: 12 X-DOI: 10.1080/1057610X.2020.1738683 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1738683 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:12:p:1069-1094 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1723282_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Henrik GrÃ¥trud Author-X-Name-First: Henrik Author-X-Name-Last: GrÃ¥trud Title: When Insularity Becomes a Problem: The Literature on Jihadism in Jordan Abstract: This article offers a review of the literature on Jordanian jihadism. While excellent work has been done, particularly on the phenomenon’s history and ideologues such as Abu Muhammad al-Maqdisi, several topics remain unexplored. The main explanation for the literature’s shortcomings is that it has been too inward-looking. I argue that this insularity has led to three problems: first, the literature sometimes recycles observations already made; second, it fails to show how Jordan presents specificities in terms of jihadism; and third and most importantly, it misses insights from the literature on political violence about radicalization and terrorist attack activity. As a result, it fails to address key questions about Jordanian jihadism, such as why, when, and how terrorist attacks happen. Journal: Studies in Conflict & Terrorism Pages: 1095-1118 Issue: 12 Volume: 45 Year: 2022 Month: 12 X-DOI: 10.1080/1057610X.2020.1723282 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1723282 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:12:p:1095-1118 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1738682_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Byman Author-X-Name-First: Daniel Author-X-Name-Last: Byman Title: Understanding, and Misunderstanding, State Sponsorship of Terrorism Abstract: The U.S. government list of state sponsors of terrorism is dated, politicized, analytically muddy, and in general not useful for distinguishing which states truly sponsor terrorism and how aggressively they do so. A better list and process would identify different criteria that go into sponsoring terrorism and, in so doing, create multiple de facto lists. Lists would distinguish important factors such as the use of terrorism in war and the problematic criterion of states using their own clandestine agents for terrorism-like violence. Different forms of passive support would also be assessed, particularly because state passivity is often vital for jihadists and white supremacists, two of the greatest terrorism dangers today. The political and analytically flawed nature of the state sponsor list and process, however, is as much by design as it is by accident, and change is especially difficult as a result. Journal: Studies in Conflict & Terrorism Pages: 1031-1049 Issue: 12 Volume: 45 Year: 2022 Month: 12 X-DOI: 10.1080/1057610X.2020.1738682 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1738682 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:12:p:1031-1049 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1654726_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bagong Suyanto Author-X-Name-First: Bagong Author-X-Name-Last: Suyanto Author-Name: Mun’im Sirry Author-X-Name-First: Mun’im Author-X-Name-Last: Sirry Author-Name: Rahma Sugihartati Author-X-Name-First: Rahma Author-X-Name-Last: Sugihartati Title: Pseudo-Radicalism and the De-Radicalization of Educated Youth in Indonesia Abstract: This article discusses a recent phenomenon of radicalization among university students in Indonesia, with special attention to what may be called “pseudo-radicalists†(i.e., a group of students who have been exposed to radical ideologies); however, they are not strongly grounded in an exclusive and extreme religious viewpoint that justifies militant attitudes and violent actions. We carefully and critically examine the extent to which educated youth have been infiltrated by radical influences and how they de-radicalized themselves. Our research includes seven government tertiary institutions identified by the National Agency for Combating Terrorism or Badan Nasional Penanggulangan Terorisme as having been inflicted by radicalism, namely, Universitas Indonesia, Institut Teknologi Bandung, Institut Pertanian Bogor, Universitas Diponegoro, Institut Teknologi Sepuluh Nopember, Universitas Airlangga, and Universitas Brawijaya. By situating our case study within the existing literature on radicalization and de-radicalization, we hope that this article will enrich our perspectives and shed some light on crucial issues facing educated youth, especially within tertiary campuses. Journal: Studies in Conflict & Terrorism Pages: 153-172 Issue: 2 Volume: 45 Year: 2022 Month: 2 X-DOI: 10.1080/1057610X.2019.1654726 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1654726 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:2:p:153-172 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1657304_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Eitan Azani Author-X-Name-First: Eitan Author-X-Name-Last: Azani Author-Name: Liram Koblentz-Stenzler Author-X-Name-First: Liram Author-X-Name-Last: Koblentz-Stenzler Title: Muslim Converts Who Turn to Global Jihad: Radicalization Characteristics and Countermeasures Abstract: Over the past three decades, along with the expansion of the phenomenon of global jihad, we have witnessed a growing trend of converts to Islam integrating into global jihad organizations. Some of these converts constitute an important element in the terrorist infrastructure, globally, and particularly in the West. Some are recruited as foreign fighters into the ranks of the Islamic State or other Islamic extremist organizations. Global jihad organizations have identified the potential of new converts (knowledge of the local culture, the difficulty in tracking them faced by intelligence organizations), and they are investing efforts in every possible arena (physical and digital) to recruit them for terrorist activity. The converts, for their part, are more vulnerable to recruitment for terrorist purposes. The aim of the article is to illuminate the existing phenomenon of radicalization among new converts to Islam and expand the current knowledge base with regard to the variables that affect the growth of this phenomenon and the background and preconditions for such growth. Moreover, this article will attempt to use the above in order to design and develop effective tools for early warning and curbing this phenomenon. Journal: Studies in Conflict & Terrorism Pages: 173-199 Issue: 2 Volume: 45 Year: 2022 Month: 2 X-DOI: 10.1080/1057610X.2019.1657304 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657304 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:2:p:173-199 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1657657_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: John Jupp Author-X-Name-First: John Author-X-Name-Last: Jupp Title: Strengthening Protection and Support for Victims of Terrorism in Criminal Proceedings in Afghanistan Abstract: Afghanistan faces significant challenges as it seeks to emerge from thirty years of civil war and insurgent violence and promote lasting peace and security. Terrorist incidents, which have increased dramatically since 2004, continue to pose a major threat to security, destabilizing governance and fracturing state initiatives to guarantee rule of law to citizens. An urgent priority for the government, as part of its development of counterterrorism policy, is to ensure that the formal criminal justice system responds effectively to the threat of terrorism by creating mechanisms and procedures that support the rights and needs of victims in accordance with international human rights standards. To date, examining victimhood in Afghanistan and accurately understanding the assistance and support that victims of terrorism receive and to which they are entitled during criminal justice processes have avoided academic scrutiny. Informed by empirical evidence and qualitative interviews with justice officials in Afghanistan, this article aims to fill this important gap in scholarship. It does so by drawing on an international framework for good practices outlined in the Global Counterterrorism Forum’s Madrid Memorandum to shed new light on gaps in existing national law. In doing so, it makes important recommendations for both institutional and legislative reform designed to strengthen protections and assistance for victims of terrorism and inform contemporary reviews of criminal procedural law being undertaken by justice ministries in Afghanistan. Journal: Studies in Conflict & Terrorism Pages: 133-152 Issue: 2 Volume: 45 Year: 2022 Month: 2 X-DOI: 10.1080/1057610X.2019.1657657 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657657 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:2:p:133-152 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1647685_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Chuck Thiessen Author-X-Name-First: Chuck Author-X-Name-Last: Thiessen Title: The Strategic Ambiguity of the United Nations Approach to Preventing Violent Extremism Abstract: The use of international peacebuilding as a delivery vehicle for preventing violent extremism (PVE) initiatives is a recent and pivotal development in United Nations (UN) counterterrorism strategy. However, existing research has not considered the contradictions that emerge when international organizations transition to new peacebuilding approaches such as PVE. Further, it remains unclear whether and how intervening organizations overcome these contradictions. Based on forty-seven interviews with UN, government, and nongovernmental organization officials in Kyrgyzstan and New York this article critically analyzes the shift to PVE as an underlying strategic approach to UN peacebuilding and the mismatch between external expectations and local priorities. Interview narratives feature ambiguity in conceptions of foundational PVE concepts and in how interveners reference a menu of drivers for violent extremism according to project requirements. This article argues that ambiguity is strategically tolerated and employed, whereby not clarifying the terms of engagement with (sub-)national counterparts supports external agendas and achieves a basic unity of purpose by permitting counterparts increased managerial latitude to satisfy self-interests. Journal: Studies in Conflict & Terrorism Pages: 111-132 Issue: 2 Volume: 45 Year: 2022 Month: 2 X-DOI: 10.1080/1057610X.2019.1647685 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1647685 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:2:p:111-132 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1657297_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Adis Duderija Author-X-Name-First: Adis Author-X-Name-Last: Duderija Title: Mainstream Sunnism, Salafi-Jihadism and progressive Islam: Rejoinder to Alan Gabon's Journal: Studies in Conflict & Terrorism Pages: 211-222 Issue: 3 Volume: 45 Year: 2022 Month: 3 X-DOI: 10.1080/1057610X.2019.1657297 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657297 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:3:p:211-222 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1657296_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alain Gabon Author-X-Name-First: Alain Author-X-Name-Last: Gabon Title: Can Mainstream Sunni Islam Counter the Islamic State? a Critique of Adis Duderija’s “The Salafi Worldview and the Hermeneutical Limits of Mainstream Sunni Critique of Salafi-Jihadism†Journal: Studies in Conflict & Terrorism Pages: 202-210 Issue: 3 Volume: 45 Year: 2022 Month: 3 X-DOI: 10.1080/1057610X.2019.1657296 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657296 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:3:p:202-210 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1657293_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bruce Hoffman Author-X-Name-First: Bruce Author-X-Name-Last: Hoffman Title: Editor’s Note: A Tripartite Discussion of “The Salafi Worldview and the Hermeneutical Limits of Mainstream Sunni Critique of Salafi-Jihadism†Journal: Studies in Conflict & Terrorism Pages: 201-201 Issue: 3 Volume: 45 Year: 2022 Month: 3 X-DOI: 10.1080/1057610X.2019.1657293 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657293 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:3:p:201-201 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1657299_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nadia Oweidat Author-X-Name-First: Nadia Author-X-Name-Last: Oweidat Title: Providing Context: Commentary on the Debate Over the Critique of Salafi-Jihadism from a Mainstream Sunni Perspective Journal: Studies in Conflict & Terrorism Pages: 223-230 Issue: 3 Volume: 45 Year: 2022 Month: 3 X-DOI: 10.1080/1057610X.2019.1657299 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657299 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:3:p:223-230 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1662625_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ethan B. Kapstein Author-X-Name-First: Ethan B. Author-X-Name-Last: Kapstein Author-Name: David Ribar Author-X-Name-First: David Author-X-Name-Last: Ribar Title: The Industrial Organization of the Syrian Civil War Abstract: The Syrian Civil War represents an extreme outlier in terms of the number of insurgent groups which have been engaged in the fighting. These groups have also been remarkably persistent over time, partly due to the fact that rebel in-fighting has been relatively contained. They have also targeted civilians far less than the Syrian Army. These stylized facts run counter to much of the existing literature on multi-party civil wars, which has emphasized the influence of the balance of power on group dynamics. In this article we instead draw upon balance of threat theory, along with insights from the economics of industrial organization, to understand insurgent behavior in the Syrian Civil War, based on a newly compiled dataset of rebel violence. Our research suggests that conflict scholars need to account for factors beyond the balance of power if they are to adequately explain inter-rebel dynamics. Journal: Studies in Conflict & Terrorism Pages: 231-257 Issue: 4 Volume: 45 Year: 2022 Month: 4 X-DOI: 10.1080/1057610X.2019.1662625 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1662625 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:4:p:231-257 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1661083_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rob Geist Pinfold Author-X-Name-First: Rob Geist Author-X-Name-Last: Pinfold Author-Name: M. L. R. Smith Author-X-Name-First: M. L. R. Author-X-Name-Last: Smith Title: Theorizing Territorial Withdrawal: The Need to Think Strategically Abstract: This article examines what factors cause states to withdraw from foreign territorial interventions. Scholarly analyses of withdrawal are rare, whilst within the broader research area of territorial conflict, studies are often dichotomized into neorealist or constructivist-inspired works, emphasizing a select few variables and one level of analysis alone. We argue these excessive simplifications of international politics lack utility for understanding territorial withdrawal. Instead, we employ the principles of strategic theory informed by a Clausewitzian paradigm, and construct a framework of three “arenas of bargaining,†spanning multiple variable-types and levels of analysis, to explain territorial withdrawal. In so doing, the analysis delineates a comprehensible and novel theoretical framework for understanding an under-researched policy problem. Journal: Studies in Conflict & Terrorism Pages: 285-310 Issue: 4 Volume: 45 Year: 2022 Month: 4 X-DOI: 10.1080/1057610X.2019.1661083 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1661083 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:4:p:285-310 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1702256_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Niels Terpstra Author-X-Name-First: Niels Author-X-Name-Last: Terpstra Title: Opportunity Structures, Rebel Governance, and Disputed Leadership: The Taliban’s Upsurge in Kunduz Province, Afghanistan, 2011–2015 Abstract: Even though Kunduz province in Afghanistan was under relatively firm government control in 2011, the Taliban insurgency was able to consolidate its power throughout the province in the years that followed and to temporarily take-over the provincial capital of Kunduz city for the first time since the U.S.-led intervention in 2001. Based on field research in 2013 and 2016, I argue that the Taliban’s upsurge took place because of a favorable opportunity structure for the insurgency that coincided with sufficient organizational capacities and a sense of urgency among the Taliban’s senior leadership. Journal: Studies in Conflict & Terrorism Pages: 258-284 Issue: 4 Volume: 45 Year: 2022 Month: 4 X-DOI: 10.1080/1057610X.2019.1702256 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1702256 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:4:p:258-284 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1657310_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Steven M. Radil Author-X-Name-First: Steven M. Author-X-Name-Last: Radil Author-Name: Jaume Castan Pinos Author-X-Name-First: Jaume Author-X-Name-Last: Castan Pinos Title: Reexamining the Four Waves of Modern Terrorism: A Territorial Interpretation Abstract: Territory is a persistent concern in international politics but is unevenly explored in the terrorism literature. We argue that territory has salience for terrorist actors and apply our argument to Rapoport's influential “four waves†thesis of the modern history of terrorism. By examining the key ideologies and groups associated with each historical era, we find that territory was a crucial element to each wave even when it took on different forms. We conclude by calling for additional concern for territory in terrorism studies, which promises to yield new insights into pressing questions. Journal: Studies in Conflict & Terrorism Pages: 311-330 Issue: 4 Volume: 45 Year: 2022 Month: 4 X-DOI: 10.1080/1057610X.2019.1657310 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1657310 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:4:p:311-330 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1678877_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Guillermo Kreiman Author-X-Name-First: Guillermo Author-X-Name-Last: Kreiman Author-Name: Mar C. Espadafor Author-X-Name-First: Mar C. Author-X-Name-Last: Espadafor Title: Unexpected Allies: The Impact of Terrorism on Organised Crime in Sub-Saharan Africa and South-East Asia Abstract: Is there a link between levels of terrorism and the presence of organized crime groups? Which factors does terrorism affect that could impact the presence and expansion of organized crime groups? This study aims to empirically analyze this link. Dealing with potential endogeneity bias using matching methods, we provide quantitative evidence showing that terrorist attacks increase the future levels of organized crime group activities. Using Structural Equation Modeling techniques (SEM), we also show that the main mechanisms through which this relation seems to occur are through the effects of terrorism on state capacity and state legitimacy. Thus, organized crime groups seem to take advantage of the turbulent situation created by terrorist attacks in order to expand their activities. The findings provided in this paper aim to increase our knowledge on the so-called crime-terror nexus. Journal: Studies in Conflict & Terrorism Pages: 348-367 Issue: 5-6 Volume: 45 Year: 2022 Month: 6 X-DOI: 10.1080/1057610X.2019.1678877 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678877 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:348-367 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1678882_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Irene Couzigou Author-X-Name-First: Irene Author-X-Name-Last: Couzigou Title: The Criminalization of Online Terrorism Preparatory Acts Under International Law Abstract: Terrorist organizations increasingly resort to the Internet to promote terrorism, recruit new terrorists, plan and finance their operations. The paper first proposes a definition of terrorism, cyberterrorism, and online terrorism preparatory acts. It then analyses whether current binding international instruments on terrorism, organized crime or cybercrime could prohibit cyber activities precursor of terrorism. The paper concludes that there is no gap in international law that leaves online terrorism related acts completely unregulated. It nevertheless recommends the drafting of an international treaty that would respond more comprehensively, precisely and thus efficiently to the use of the Internet for terrorist purposes. Journal: Studies in Conflict & Terrorism Pages: 535-554 Issue: 5-6 Volume: 45 Year: 2022 Month: 6 X-DOI: 10.1080/1057610X.2019.1678882 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678882 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:535-554 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1678878_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: John Jupp Author-X-Name-First: John Author-X-Name-Last: Jupp Author-Name: Matthew Garrod Author-X-Name-First: Matthew Author-X-Name-Last: Garrod Title: Legacies of the Troubles: The Links between Organized Crime and Terrorism in Northern Ireland Abstract: One of the most important legacies of the “Troubles†in Northern Ireland and the ensuing 20 years post-peace-process era, heralded by the 1998 Good Friday Agreement, is the rise of complex and diverse Republican and Loyalist paramilitary groups engaging in acts of terrorism and a wide range of organized criminal and cross-border activities. Yet, little scholarship has been dedicated for examining the nexus between terrorism and organized crime in Northern Ireland or for accurately understanding the role that paramilitaries play in organized crime and their dynamic interactions with organized criminal groups. Informed by empirical evidence and qualitative interviews with government agencies in Northern Ireland, it is this important gap in scholarship that this article aims to fill. It does so by developing a new terrorism-organized crime model which reveals a range of different types of crime-terror interactions in Northern Ireland. The article concludes that national terrorism-organized crime models, and the Northern Ireland model in particular, albeit with variations to its constituent components to accommodate local situations, are most appropriate for capturing intricate and dynamic interactions between these two phenomena across diverse environments rather than existing models designed for universal application. Journal: Studies in Conflict & Terrorism Pages: 389-428 Issue: 5-6 Volume: 45 Year: 2022 Month: 6 X-DOI: 10.1080/1057610X.2019.1678878 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678878 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:389-428 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1678881_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: James J. F. Forest Author-X-Name-First: James J. F. Author-X-Name-Last: Forest Title: Crime-Terror Interactions in Sub-Saharan Africa Abstract: Interactions between criminal and terrorist networks in sub-Saharan Africa (and elsewhere) are frequently based on a complex mix of intentions, capabilities, opportunities and precipitant conditions found in their operating environment. Understanding these interactions, and responding accordingly, thus requires a complex, multi-dimensional analysis that draws from several academic disciplines. This article begins by reviewing several contemporary examples of organized criminal and terrorist activity in sub-Saharan Africa, as well as examples of crime-terror interactions in this region. Then the discussion turns to examine several contextual influences (trends and conditions) that contribute to these contemporary examples and provide ample reasons why we should anticipate future crime-terror interactions in Africa for many years ahead. Research and policy implications that flow from these observations are also provided in the conclusion. Journal: Studies in Conflict & Terrorism Pages: 368-388 Issue: 5-6 Volume: 45 Year: 2022 Month: 6 X-DOI: 10.1080/1057610X.2019.1678881 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678881 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:368-388 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1678880_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Amira Jadoon Author-X-Name-First: Amira Author-X-Name-Last: Jadoon Author-Name: Daniel Milton Author-X-Name-First: Daniel Author-X-Name-Last: Milton Title: Strength from the Shadows? How Shadow Economies Affect Terrorist Activities Abstract: Despite scholarly interest in the existence and consequences of the crime-terror nexus, little research has been done to examine how the presence of an illegal economic area, known as a shadow economy, impacts terrorist activity in a country. We propose a theory which argues that terrorists are able to rely on the partnerships and resources available in the shadow economy to increase their organizational capacity. Using data on terrorist activity and the size of the shadow economy, our empirical results show that the larger the shadow economy, the greater the number of overall terrorist attacks, fatalities, and certain types of mass-casualty events that a country experiences. Journal: Studies in Conflict & Terrorism Pages: 517-534 Issue: 5-6 Volume: 45 Year: 2022 Month: 6 X-DOI: 10.1080/1057610X.2019.1678880 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678880 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:517-534 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1678871_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Riikka Puttonen Author-X-Name-First: Riikka Author-X-Name-Last: Puttonen Author-Name: Flavia Romiti Author-X-Name-First: Flavia Author-X-Name-Last: Romiti Title: The Linkages between Organized Crime and Terrorism Journal: Studies in Conflict & Terrorism Pages: 331-334 Issue: 5-6 Volume: 45 Year: 2022 Month: 6 X-DOI: 10.1080/1057610X.2019.1678871 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678871 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:331-334 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1678873_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Katharine Petrich Author-X-Name-First: Katharine Author-X-Name-Last: Petrich Title: Cows, Charcoal, and Cocaine: Al-Shabaab’s Criminal Activities in the Horn of Africa Abstract: Contrary to historical terrorism scholarship, terrorist groups can strategically diversify into a variety of criminal activities without losing their core ideology or support among the civilian population. This pattern is demonstrated by the evolutionary arc of al-Shabaab, which grew from a small subset of Somalia’s Islamic Courts Union to the most violent political actor in the Horn of Africa, able to conduct terrorist attacks as far afield as Kenya, Djibouti, and Ethiopia. Al-Shabaab has been highly successful in creating a narrative of truth and justice provision while simultaneously exploiting the Somali population and engaging in criminal activity. For the group, criminal activity and crime networks serve two primary purposes: as a funding mechanism and as an avenue for recruitment. Using ethnographic fieldwork and process tracing, I find that the group’s criminal activities throughout the Horn of Africa have made the group significantly more resilient to counterterrorism and counterinsurgency campaigns, extending both its lifespan and operational capability. Journal: Studies in Conflict & Terrorism Pages: 479-500 Issue: 5-6 Volume: 45 Year: 2022 Month: 6 X-DOI: 10.1080/1057610X.2019.1678873 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678873 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:479-500 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1678860_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Yuliya Zabyelina Author-X-Name-First: Yuliya Author-X-Name-Last: Zabyelina Title: The “Capone Discoveryâ€: Extortion as a Method of Terrorism Financing Abstract: This article analyzes extortion by terrorist groups. A three-factor theoretical framework borrowed from the literature on organized crime informs the qualitative analysis of several terrorist organizations—active and quiescent—which have committed casual and systematic extortion of businesses and local communities in exchange for protection. It is argued that similarly to organized crime, extortion is a common means of terrorism financing. Terrorist groups, especially those aspiring for statehood, rely on extortion of local communities and businesses under the disguise of “taxation.†Partly by coercion and partly by manipulation, governance-capable terrorist organizations, like the Islamic State in Iraq and the Levant (ISIL)/Da’esh, have demonstrated unprecedented ability to reshape the victim-offender relationship in the way that transforms victims of extortion into involuntary terrorist supporters. Viewing terrorist activity through the governance perspective sheds new light on the evolution of extortion and its place in terrorism studies. Journal: Studies in Conflict & Terrorism Pages: 501-516 Issue: 5-6 Volume: 45 Year: 2022 Month: 6 X-DOI: 10.1080/1057610X.2019.1678860 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678860 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:501-516 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1678884_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Luigi Achilli Author-X-Name-First: Luigi Author-X-Name-Last: Achilli Author-Name: Alessandro Tinti Author-X-Name-First: Alessandro Author-X-Name-Last: Tinti Title: Debunking the Smuggler-Terrorist Nexus: Human Smuggling and the Islamic State in the Middle East Abstract: Amid increasing terrorist violence in and beyond European countries, concerns have been raised about connections between illegal migration and terrorism. Regional armed conflicts in the Middle East have led to the massive migration of people in search of safe heavens and better livelihoods, pressing upon frontline countries in the Mediterranean and throughout the EU. Multiple government and intelligence agencies report that human smuggling networks have been identified as providing a readily available conduit through which terrorist groups such as the Islamic State and Al-Qaida can enter Europe and the U.S. These criminal travel networks are said to rely on highly effective transnational alliances involving service providers within source, transit and destination countries. There is also widespread consensus in the intelligence circles that terrorist groups rely on the practice of smuggling for financing of terrorist activity. Nonetheless, despite the region’s geopolitical significance and its demonstrated potential for spillover effects, scant systematic field research has been conducted by independent researchers to understand the purported nexus between terrorism and human smugglers within the Middle East into the Mediterranean. This constitutes a severe gap in knowledge which our study will address. In this paper, we debunk the nexus human smuggling-terrorism by comparing the Islamic State’s logistics with human smuggling networks’ modus operandi and organizational structures. Based on a mixed research approach that combines the analysis of a unique date-set (U.S. Special Forces) and an empirical research carried out among smugglers and migrants in the Middle East and across the Eastern Mediterranean route over the past two years, this paper will tackle the alleged connection between human smuggling and terrorist groups. What will be argued is that smuggling networks and terrorist networks have fundamental operational and structural differences. These operational and structural differences need to be taken into account in order to deconstruct harmful stereotypes on irregular migration and, consequently, develop adequate responses to analytically distinct phenomena. Journal: Studies in Conflict & Terrorism Pages: 463-478 Issue: 5-6 Volume: 45 Year: 2022 Month: 6 X-DOI: 10.1080/1057610X.2019.1678884 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678884 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:463-478 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1678874_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Arie Perliger Author-X-Name-First: Arie Author-X-Name-Last: Perliger Author-Name: Michael Palmieri Author-X-Name-First: Michael Author-X-Name-Last: Palmieri Title: Mapping Connections and Cooperation between Terrorist and Criminal Entities Abstract: In recent years, terrorist groups intensified their cooperation with criminal entities or their independent engagement in criminal activities. But why and how, exactly, is cooperation with criminal actors beneficial for terrorist groups? And under which political and economic conditions are criminal and terrorist entities more inclined to cooperate or coordinate their operations? Despite the growing interest of academics and practitioners in the nexus of crime and terrorism, we are still unable to answer such questions authoritatively, and, in general, we are lacking in our understanding of the operational characteristics of these connections. The current study utilizes a global dataset of cases of cooperation between terrorist and criminal groups in order to try and answer some of these questions. Our findings indicate that both organizational and environmental factors can predict the likelihood of collaboration. More specifically, group structure, lifespan, ethnic/religious compatibility, geographical proximity, and the existence of criminal infrastructure are all associated with the tendency of criminal and terrorist groups to cooperate. Lastly, corporate and established terrorist groups are more inclined to engage in multiple low-end cooperation rather than high end. Journal: Studies in Conflict & Terrorism Pages: 335-347 Issue: 5-6 Volume: 45 Year: 2022 Month: 6 X-DOI: 10.1080/1057610X.2019.1678874 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678874 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:335-347 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1678875_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mohammed Sinan Siyech Author-X-Name-First: Mohammed Sinan Author-X-Name-Last: Siyech Title: Arms Smuggling in India: Exploring Links between Crime and Terrorism Abstract: This article looks at the linkage between arms smuggling and terrorist groups operating in and outside India, focusing on inflow and outflow of weapons through the country. By examining various news reports and using information from security officials, it concludes that the nexus between arms smugglers and terrorists encompasses multiple fronts. These include weapons that enter India mainly from Pakistan, Myanmar, and Bangladesh. Using theories of insurgencies as a reference point, it analyzes how various terrorist/insurgent groups in India have sustained themselves logistically using these linkages to wage war against the Indian state. The article thus tries to tackle the under-researched nexus between arms proliferation and terrorism in India and abroad by providing national, socioeconomic, and political recommendations, a useful reference point for members from the government, security, and research community. Journal: Studies in Conflict & Terrorism Pages: 445-462 Issue: 5-6 Volume: 45 Year: 2022 Month: 6 X-DOI: 10.1080/1057610X.2019.1678875 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678875 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:445-462 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1678869_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Line Haidar Author-X-Name-First: Line Author-X-Name-Last: Haidar Title: The Emergence of the Mafia in Post-War Syria: The Terror-Crime Continuum Abstract: This paper aims at building from existing sociological, economic, political and strategic knowledge an analysis that anticipates the emergence of the Mafia. By employing Mill’s method of agreement, the research finds that it is very probable that the aftermath of the Syrian War yields fertile terrain for the emergence of the Mafia. The reasons of this are fourfold: (1) as the black market expands in Syria and the rights of private property become blurred once ‘peace’ is restored, (2) the postwar Syrian State will be either unwilling and unable to protect the property rights of its population, (3) this situation would result in a widespread institutional distrust that will provoke the population to seek alternative forms of private protection; (4) an abundant supply of insurgents and terrorists trained in violence will meet the emergent demand. This conclusion sheds light on the importance for policymakers to take prompt action to change the probable course of history of Syria. Journal: Studies in Conflict & Terrorism Pages: 429-444 Issue: 5-6 Volume: 45 Year: 2022 Month: 6 X-DOI: 10.1080/1057610X.2019.1678869 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1678869 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:5-6:p:429-444 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1686854_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gahl Silverman Author-X-Name-First: Gahl Author-X-Name-Last: Silverman Author-Name: Udi Sommer Author-X-Name-First: Udi Author-X-Name-Last: Sommer Title: Prevalent Sentiments of the Concept of Jihad in the Public Commentsphere Abstract: Certain studies of social conflicts and geopolitical processes through online social networks entail qualitative analysis. One such issue is the tension between Western and Muslim societies. We introduce computer-assisted qualitative sentiment analysis for the inquiry and extraction of varied sentiments. The analysis explores the prevalent meanings of the term jihad through discussions of Muslims and non-Muslims in the online public sphere. After examining 4,630 Facebook comments and replies, our examination leads to a holistic mapping that details “peaceful,†“moderate,†and “radical†opinions regarding jihad, which is an integral institution of the Muslim world. Through this method, we suggest a “Muslim–non-Muslim tension indicator,†which can be used in a range of political analyses. Journal: Studies in Conflict & Terrorism Pages: 579-607 Issue: 7 Volume: 45 Year: 2022 Month: 7 X-DOI: 10.1080/1057610X.2019.1686854 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1686854 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:7:p:579-607 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1531545_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daveed Gartenstein-Ross Author-X-Name-First: Daveed Author-X-Name-Last: Gartenstein-Ross Author-Name: Madeleine Blackman Author-X-Name-First: Madeleine Author-X-Name-Last: Blackman Title: Fluidity of the Fringes: Prior Extremist Involvement as a Radicalization Pathway Abstract: This article argues for recognition of fringe fluidity as a distinct radicalization pathway. Most studies on individual-level radicalization examine how relatively normal people come to accept violent extremist beliefs. But some people who come to accept and act on an extremist ideology transition from the embrace of one form of violent extremism to another—and understanding their prior extremism is essential to appreciating their ultimate beliefs and actions. The article demonstrates the existence of fringe fluidity by detailing the pathway between neo-Nazism and militant Islamism. Factors allowing fringe fluidity between these ideologies include recent cases of individuals who transitioned from one to the other or simultaneously embraced both; some ideological overlap, particularly in shared out-groups; and historical precedent that allows some adherents to reconcile inconsistent aspects of the two ideologies. Despite this article’s focus on neo-Nazism and militant Islamism, fringe fluidity is likely more widely applicable beyond the context of these two ideologies. Journal: Studies in Conflict & Terrorism Pages: 555-578 Issue: 7 Volume: 45 Year: 2022 Month: 7 X-DOI: 10.1080/1057610X.2018.1531545 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1531545 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:7:p:555-578 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1680186_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Peter Chalk Author-X-Name-First: Peter Author-X-Name-Last: Chalk Title: Domestic Counter-Terrorist Intelligence Structures in the United Kingdom, France, Canada and Australia Abstract: This research note considers the origin, development, and functions of intelligence organizations in four selected democratic states, assessing their role in terrorism threat mitigation, their relationship with police forces, and the means and modalities by which they are controlled and monitored. The article is intended to help inform debate over the various strengths and weaknesses of establishing and maintaining dedicated security agencies that have no executive powers of arrest and which exist outside formal structures of law enforcement. Journal: Studies in Conflict & Terrorism Pages: 626-658 Issue: 7 Volume: 45 Year: 2022 Month: 7 X-DOI: 10.1080/1057610X.2019.1680186 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1680186 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:7:p:626-658 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1680185_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anna Geifman Author-X-Name-First: Anna Author-X-Name-Last: Geifman Title: “Terrorism as Veiled Suicide: A Comparative Analysis†Abstract: In the early twentieth century Russian revolutionaries carried out suicidal assaults and validated them by anarchist and radical socialist rhetoric as fervently as jihadists today employ the idiom of Islamism. When death-seeking became a fashionable sociocultural trend in Russia, political subversives embraced terrorism as camouflaged suicide. For their part, Islamists uphold self-inflicted death by constructing environments in which martyrdom carries greater value than life. Headhunters recruit perpetrators of self-destructive attacks among those who covet death and link it to faith – socialist or jihadist. Rather than taking their own lives, the believers opt for publicly commended acts of suicide terrorism. Journal: Studies in Conflict & Terrorism Pages: 608-625 Issue: 7 Volume: 45 Year: 2022 Month: 7 X-DOI: 10.1080/1057610X.2019.1680185 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1680185 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:7:p:608-625 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1716523_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bruce Hoffman Author-X-Name-First: Bruce Author-X-Name-Last: Hoffman Title: In Memoriam: Martin Rudner Journal: Studies in Conflict & Terrorism Pages: 659-660 Issue: 7 Volume: 45 Year: 2022 Month: 7 X-DOI: 10.1080/1057610X.2020.1716523 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1716523 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:7:p:659-660 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1680192_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sarah Knight Author-X-Name-First: Sarah Author-X-Name-Last: Knight Author-Name: David Keatley Author-X-Name-First: David Author-X-Name-Last: Keatley Author-Name: Katie Woodward Author-X-Name-First: Katie Author-X-Name-Last: Woodward Title: Comparing the Different Behavioral Outcomes of Extremism: A Comparison of Violent and Non-Violent Extremists, Acting Alone or as Part of a Group Abstract: Presented here is an exploratory study that compared four kinds of extremists (violent lone, nonviolent lone, violent group member, and nonviolent group member). Thematic analysis of 40 case studies identified five key themes and a number of subthemes that comprised a range of underlying variables. Comparisons of the four groups showed that in many ways violent and nonviolent extremists acting alone or as part of a group do not differ. However there were some variables that distinguished between groups. Findings are discussed in terms of implications for countering and preventing violent extremism. Journal: Studies in Conflict & Terrorism Pages: 682-703 Issue: 8 Volume: 45 Year: 2022 Month: 8 X-DOI: 10.1080/1057610X.2019.1680192 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1680192 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:8:p:682-703 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1686856_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ryan Scrivens Author-X-Name-First: Ryan Author-X-Name-Last: Scrivens Author-Name: Vivek Venkatesh Author-X-Name-First: Vivek Author-X-Name-Last: Venkatesh Author-Name: Maxime Bérubé Author-X-Name-First: Maxime Author-X-Name-Last: Bérubé Author-Name: Tiana Gaudette Author-X-Name-First: Tiana Author-X-Name-Last: Gaudette Title: Combating Violent Extremism: Voices of Former Right-Wing Extremists Abstract: While it has become increasingly common for researchers, practitioners and policymakers to draw from the insights of former extremists to combat violent extremism, overlooked in this evolving space has been an in-depth look at how formers perceive such efforts. To address this gap, interviews were conducted with 10 Canadian former right-wing extremists based on a series of questions provided by 30 Canadian law enforcement officials and 10 community activists. Overall, formers suggest that combating violent extremism requires a multidimensional response, largely consisting of support from parents and families, teachers and educators, law enforcement officials, and other credible formers. Journal: Studies in Conflict & Terrorism Pages: 661-681 Issue: 8 Volume: 45 Year: 2022 Month: 8 X-DOI: 10.1080/1057610X.2019.1686856 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1686856 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:8:p:661-681 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1696444_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stuart Macdonald Author-X-Name-First: Stuart Author-X-Name-Last: Macdonald Author-Name: Lee Jarvis Author-X-Name-First: Lee Author-X-Name-Last: Jarvis Author-Name: Simon M. Lavis Author-X-Name-First: Simon M. Author-X-Name-Last: Lavis Title: Cyberterrorism Today? Findings From a Follow-on Survey of Researchers Abstract: This article reports on a survey of researchers designed to capture current perspectives on core questions around cyberterrorism. The survey—conducted in 2017 as a follow-on to an initial, 2012, exercise—focused on questions of definition, threat and response. By documenting our findings in each of these areas—and highlighting developments in the years between our surveys—we identify three particularly important trends. First, an increasing convergence around the core characteristics of cyberterrorism, albeit with continuing conceptual disagreements at the concept’s penumbra. Second, increasing researcher concern with the threat posed by cyberterrorism, underpinned by a widespread view that this threat has increased, and a growing feeling that cyberterrorist attacks have now taken place. Third, support for a diversity of counter-measures to this threat, although perhaps counter-intuitively little suggestion that resort to exceptional or draconian measures is needed. In order to inform future research, the article concludes by detailing some of the major limitations, gaps and weaknesses within academic research to date as identified by our respondents. Journal: Studies in Conflict & Terrorism Pages: 727-752 Issue: 8 Volume: 45 Year: 2022 Month: 8 X-DOI: 10.1080/1057610X.2019.1696444 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1696444 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:8:p:727-752 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1680193_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Carolin Goerzig Author-X-Name-First: Carolin Author-X-Name-Last: Goerzig Title: Deradicalization through Double-Loop Learning? How the Egyptian Gamaa Islamiya Renounced Violence Abstract: The transformation of the Gamaa Islamiya can be understood by analyzing it against Argyris and Schön’s double-loop learning model. This paper bases the analysis on five books published by the Gamaa Islamiya, which include comprehensive elaborations on internal reflections and criticism of Al-Qaeda. While the Gamaa Islamiya’s learning can be framed with the model of double-loop learning, Al-Qaeda’s reactions can be depicted as a less evolved single-loop learning system. This case is relevant for the discovery of key mechanisms of de-radicalization that could be used as a blueprint for other groups. Journal: Studies in Conflict & Terrorism Pages: 704-726 Issue: 8 Volume: 45 Year: 2022 Month: 8 X-DOI: 10.1080/1057610X.2019.1680193 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1680193 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:8:p:704-726 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1700039_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael J. Boyle Author-X-Name-First: Michael J. Author-X-Name-Last: Boyle Title: Weapon of Choice: Terrorist Bombings in Armed Conflict Abstract: Under what circumstances do armed groups in conflict choose to use terrorist bombings? This article challenges the conventional wisdom that terrorist bombings are done by either ideologically-driven or weak armed groups who have no reasonable prospect of success on the battlefield. Drawing from Mao’s theory of protracted struggle, it argues that terrorist bombings are a weapon of choice for armed groups that have transitioned into capable fighting armies but lack the degree of popular support they need to be a serious political contender. Using data on attributed terrorist bombings from 1998–2005, it finds that Islamist groups and older armed groups with sizeable membership are more likely to use terrorist bombings than smaller or newer groups. Journal: Studies in Conflict & Terrorism Pages: 778-798 Issue: 9 Volume: 45 Year: 2022 Month: 8 X-DOI: 10.1080/1057610X.2019.1700039 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1700039 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:9:p:778-798 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1700029_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joshua Eastin Author-X-Name-First: Joshua Author-X-Name-Last: Eastin Author-Name: Steven T. Zech Author-X-Name-First: Steven T. Author-X-Name-Last: Zech Title: Joining the Counterinsurgency: Explaining Pro-Government Militia Participation in the Philippines Abstract: What motivates civilians to fight in a progovernment militia? This article draws on survey and interview data from active members of Citizen Armed Forces Geographical Units (CAFGU), a progovernment militia in the Philippines, to evaluate why individuals enlist. We find poverty and unemployment to be key drivers of group membership, and the biggest attraction a steady paycheck. This situation presents a moral hazard for the Philippine government and other states that rely on impoverished citizens to wage counterinsurgency: while doing so can be cost-effective, the need to keep costs low might also impede efforts at socioeconomic or political reform. Journal: Studies in Conflict & Terrorism Pages: 817-841 Issue: 9 Volume: 45 Year: 2022 Month: 8 X-DOI: 10.1080/1057610X.2019.1700029 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1700029 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:9:p:817-841 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1700038_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mary Beth Altier Author-X-Name-First: Mary Beth Author-X-Name-Last: Altier Author-Name: Emma Leonard Boyle Author-X-Name-First: Emma Leonard Author-X-Name-Last: Boyle Author-Name: John G. Horgan Author-X-Name-First: John G. Author-X-Name-Last: Horgan Title: Terrorist Transformations: The Link between Terrorist Roles and Terrorist Disengagement Abstract: Research pays little attention to the diverse roles individuals hold within terrorism. This limits our understanding of the varied experiences of the terrorist and their implications. This study examines how a terrorist’s role(s) influence the likelihood of and reasons for disengagement. Using data from autobiographies and in-person interviews with former terrorists, we find that role conflict and role strain increase the probability of disengagement. We show those in certain roles, especially leadership and violent roles, incur greater sunk costs and possess fewer alternatives making exit less likely. Finally, certain roles are associated with the experience of different push/pull factors for disengagement. Journal: Studies in Conflict & Terrorism Pages: 753-777 Issue: 9 Volume: 45 Year: 2022 Month: 8 X-DOI: 10.1080/1057610X.2019.1700038 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1700038 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:9:p:753-777 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1700027_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Andrea Beccaro Author-X-Name-First: Andrea Author-X-Name-Last: Beccaro Author-Name: Stefano Bonino Author-X-Name-First: Stefano Author-X-Name-Last: Bonino Title: Terrorism and Counterterrorism: Italian Exceptionalism and Its Limits Abstract: The aim of this article is to understand why there has not been a successful jihadist terrorist attack in Italy. While it is impossible to offer a clear and unambiguous explanation, there are some unique aspects of the Italian case that should be emphasized and that can offer a convincing, albeit incomplete, answer to this narrative. The article will first highlight the fact that in Italy there have in fact been some attempted terrorist attacks and that the country has experienced jihadist terrorist activities. Subsequently, the article turns to an exploration of Italian counterterrorism in order to emphasize the most convincing and effective aspects, in particular the role of the legislation and the Antiterrorism Strategic Analysis Committee (CASA). Then, the article takes a more sociological perspective and analyzes the ways in which the social composition of the Muslim communities in Italy and their presence in its territories have affected the phenomenon of terrorism. In its conclusions, the article will reiterate why the country has remained exceptionally free of a successful terrorist attack, despite not being immune to jihadist propaganda. Journal: Studies in Conflict & Terrorism Pages: 799-816 Issue: 9 Volume: 45 Year: 2022 Month: 8 X-DOI: 10.1080/1057610X.2019.1700027 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1700027 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:45:y:2022:i:9:p:799-816 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1738681_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sissel H. Jore Author-X-Name-First: Sissel H. Author-X-Name-Last: Jore Title: Is Resilience a Good Concept in Terrorism Research? A Conceptual Adequacy Analysis of Terrorism Resilience Abstract: Resilience has been suggested as a unifying concept in terrorism research. This article investigates the conceptual adequacy of resilience applied to terrorism. The framework for criteria for conceptual adequacy was applied on the academic literature that deals with the meaning of terrorism resilience. The conclusion of this study is that at its current state resilience serves more the role of cultural metaphor than that of a well-developed scientific concept. The almost endless definitions of resilience and lack of coherence in the descriptions of attributes is a warning signs to terrorism researchers that, if not careful with its usage, the resilience concept can end up more as a utopian goal than an actual means for countering terrorism. Journal: Studies in Conflict & Terrorism Pages: 1-20 Issue: 1 Volume: 46 Year: 2023 Month: 1 X-DOI: 10.1080/1057610X.2020.1738681 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1738681 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:1:p:1-20 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1752008_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Diana Rico Revelo Author-X-Name-First: Diana Rico Author-X-Name-Last: Revelo Author-Name: Cecilia Emma Sottilotta Author-X-Name-First: Cecilia Emma Author-X-Name-Last: Sottilotta Title: Barriers to Peace? Colombian Citizens’ Beliefs and Attitudes Vis-à -Vis the Government-FARC-EP Agreement Abstract: The 2016 peace deal between the Colombian government and the Revolutionary Armed Forces of Colombia - People’s Army (FARC-EP) faces several challenges concerning its implementation. This study explores the beliefs and attitudes of citizens from the Colombian Caribbean coast vis-à -vis the 2016 peace agreement as well as the first steps in its implementation in 2017 identifying barriers that are likely to undermine support for long-term peace. We detect a tendency to maintain beliefs and attitudes that hinder the de-escalation of the conflict and fuel mistrust, mostly linked to the weaponization of the peace process in a polarized political context. Journal: Studies in Conflict & Terrorism Pages: 46-67 Issue: 1 Volume: 46 Year: 2023 Month: 1 X-DOI: 10.1080/1057610X.2020.1752008 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1752008 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:1:p:46-67 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1751464_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Wali Aslam Author-X-Name-First: Wali Author-X-Name-Last: Aslam Title: Whose Interest? Whose Peace? An Evaluation of Pakistan’s Peace Agreements with the Taliban in the Tribal Areas (2004–2015) Abstract: The Pakistani state signed a number of peace agreements with the Taliban between 2004 and 2015. Despite their significance, hardly any academic evaluations of these agreements exist. This paper assesses these peace deals from three perspectives: political settlements, culture and conflict resolution and cosmopolitan protection. We argue that they failed due to the following reasons: the Pakistani state was more concerned with the interests of the central government in Islamabad than those in the tribal borderlands; the agreements clashed with the unique tribal cultural code of Pashtunwali; and they represented a solution imposed on the tribal societies from the outside. Journal: Studies in Conflict & Terrorism Pages: 21-45 Issue: 1 Volume: 46 Year: 2023 Month: 1 X-DOI: 10.1080/1057610X.2020.1751464 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1751464 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:1:p:21-45 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1777710_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Janice Gross Stein Author-X-Name-First: Janice Gross Author-X-Name-Last: Stein Author-Name: Ron Levi Author-X-Name-First: Ron Author-X-Name-Last: Levi Title: Testing Deterrence by Denial: Experimental Results from Criminology Abstract: Deterrence by denial is gaining attention as a counter-terrorism strategy. Yet there are formidable obstacles to testing its empirical validity. We argue that experimental and quasi-experimental evidence from criminology offers support for deterrence by denial strategies. Studies of individual offending, gangs, and mafias suggest that deterrence by denial would not displace terrorist activity elsewhere. We also find evidence that physical target hardening and enhanced human guardianship can deter terrorism, with public surveillance being less effective. Criminological evidence thus supports that deterrence by denial works by increasing the risk of failure. We argue for further rapprochement between terrorism and related research fields. Journal: Studies in Conflict & Terrorism Pages: 101-121 Issue: 1 Volume: 46 Year: 2023 Month: 1 X-DOI: 10.1080/1057610X.2020.1777710 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1777710 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:1:p:101-121 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1738669_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alessandro Orsini Author-X-Name-First: Alessandro Author-X-Name-Last: Orsini Title: What Everybody Should Know about Radicalization and the DRIA Model Abstract: Thousands of monographs, reports, and articles about radicalization have been published since 2001. With the passage of time, the “scientific community†has come to identify some of them as “milestones.†Which are they? Unlike Anja Dalgaard-Nielsen, who wrote an article in 2010 on what we know and what we don’t know about violent radicalization in Europe, the author here aims to present and discuss what everybody should know about the process of becoming radicalized. This article has four aims. The first is to present and discuss the most influential theories of radicalization leading to terrorism. This author attributes the milestones in radicalization research to the following scholars: Fathali M. Moghaddam, Silber & Bhatt, Marc Sageman, John Horgan, Quintan Wiktorowicz, Lawrence Kuznar, Clark McCauley, Sophia Moskalenko, Donatella della Porta, Arie W. Kruglanski, Jocelyn J. Bélanger, and Rohan Gunaratna. The second aim is to highlight the contribution of sociology, as an academic discipline, to the study of radicalization. To that end, the process of radicalization has been conceptualized here as a process of socialization or, more precisely, resocialization. The third aim is to present the DRIA Model of radicalization that is based on the lives of thirty-nine jihadi terrorists who succeeded in carrying out terror attacks in the West between 2004 and 2018. The fourth aim is to contribute to the debate over the “stagnation†– real or presumed – in radicalization research. Journal: Studies in Conflict & Terrorism Pages: 68-100 Issue: 1 Volume: 46 Year: 2023 Month: 1 X-DOI: 10.1080/1057610X.2020.1738669 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1738669 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:1:p:68-100 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1903669_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: M. L. R. Smith Author-X-Name-First: M. L. R. Author-X-Name-Last: Smith Title: Setting the Strategic Cat among the Policy Pigeons: The Problems and Paradoxes of Western Intervention Strategy Abstract: In theory, the idea of strategy is easy to comprehend but in practice it is a hard taskmaster because it often involves calculations of political values that are rarely amenable to the kind of rationalistic application of “expert†opinion to which Western nations invariably default when considering overseas interventions. Based on remarks to the Oxford Changing Character of War Centre, this research note argues that foreign policy experts frequently find themselves out of touch with the sentiments of their own populations, which in part is responsible for the poor strategic outcomes that Western foreign policies have incurred in recent years. A number of remedies are suggested, based principally on returning Western policy making to a tradition of prudential realism. Journal: Studies in Conflict & Terrorism Pages: 2093-2097 Issue: 10 Volume: 46 Year: 2023 Month: 10 X-DOI: 10.1080/1057610X.2021.1903669 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1903669 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:2093-2097 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1892635_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jonathan Kenyon Author-X-Name-First: Jonathan Author-X-Name-Last: Kenyon Author-Name: Christopher Baker-Beall Author-X-Name-First: Christopher Author-X-Name-Last: Baker-Beall Author-Name: Jens Binder Author-X-Name-First: Jens Author-X-Name-Last: Binder Title: Lone-Actor Terrorism – A Systematic Literature Review Abstract: A systematic review of the empirical literature on lone-actor terrorism, the first of its kind, is presented. Across 109 sources, ten main themes that characterize this domain are identified and described: definitions of lone-actor terrorism and typologies; heterogeneity of lone-actor terrorists; presence of mental health issues and/or personality disorders; similarities with other lone-offender criminal types; motivation to act driven by personal and ideological influences; increasing prominence of internet use; ties with other extremists, groups or wider movements; processes of attack planning and preparation; role of opportunity/triggers; and a tendency toward leakage/attack signaling. Journal: Studies in Conflict & Terrorism Pages: 2038-2065 Issue: 10 Volume: 46 Year: 2023 Month: 10 X-DOI: 10.1080/1057610X.2021.1892635 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1892635 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:2038-2065 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1872156_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joel Busher Author-X-Name-First: Joel Author-X-Name-Last: Busher Author-Name: Donald Holbrook Author-X-Name-First: Donald Author-X-Name-Last: Holbrook Author-Name: Graham Macklin Author-X-Name-First: Graham Author-X-Name-Last: Macklin Title: How the “Internal Brakes†on Violent Escalation Work and Fail: Toward a Conceptual Framework for Understanding Intra-Group Processes of Restraint in Militant Groups Abstract: This article advances the emergent literature on restraint within militant groups in three ways. First, it offers a framework for situating the “internal brakes on violent escalationâ€â€”understood as the practices through which group members shape the outer limits of their action repertoires—in relation to the interplay between conflict dynamics, intra-group processes and individual-level decision making. Second, it develops a basic analytical strategy for examining how such brakes operate at different levels of proximity to potential or actual instances of escalation. Third, it sets out four types of mechanisms through which internal brakes appear to generate or enable restraint. Journal: Studies in Conflict & Terrorism Pages: 1960-1983 Issue: 10 Volume: 46 Year: 2023 Month: 10 X-DOI: 10.1080/1057610X.2021.1872156 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1872156 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1960-1983 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1886432_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: José Antonio Gutiérrez D Author-X-Name-First: José Antonio Author-X-Name-Last: Gutiérrez D Title: Eating, Shitting and Shooting: A Scatological and Culinary Approximation to the Daily Lives of Rebels Abstract: Everything that comes in, eventually goes out. One way or another. This paper will look into eating and defecating practices among rebels in Colombia, in particular, the FARC-EP. I will argue that these practices, despite being daily occurrences, have been overlooked in conflict studies. I will argue that eating practices in particular reinforced emotional bonds within the organization and fostered micro-solidarity. At the same time, eating and defecating practices reflected and reinforced, at once, organizational practices and ideological commitments of the rebels – particularly gender equality and collectivism. This paper, by focusing on cherished everyday activities which are deeply human, both biological and social, is a call to re-humanise this field of study. Journal: Studies in Conflict & Terrorism Pages: 1817-1839 Issue: 10 Volume: 46 Year: 2023 Month: 10 X-DOI: 10.1080/1057610X.2021.1886432 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1886432 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1817-1839 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1937818_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ore Koren Author-X-Name-First: Ore Author-X-Name-Last: Koren Author-Name: Sumit Ganguly Author-X-Name-First: Sumit Author-X-Name-Last: Ganguly Author-Name: Aashna Khanna Author-X-Name-First: Aashna Author-X-Name-Last: Khanna Title: Fragile States, Technological Capacity, and Increased Terrorist Activity Abstract: Research on terrorism disagrees on whether terrorist activity is at its highest in collapsed states, which are more hospitable to such activities, or whether terrorism increases in more capable states. We revisit this discussion by theorizing an interactive relationship: terrorists prefer to operate in politically-hospitable states, but their attack frequency within these states increases with greater technological capacity, which allows them to expand their military, recruitment, and financing operations. We analyze 27,018 terrorist incidents using regression and causal inference models, conduct a case study, and find robust support for this interactive logic. Our conclusions outline implications for policy and academic work. Journal: Studies in Conflict & Terrorism Pages: 2066-2092 Issue: 10 Volume: 46 Year: 2023 Month: 10 X-DOI: 10.1080/1057610X.2021.1937818 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1937818 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:2066-2092 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1894737_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ahmet Kule Author-X-Name-First: Ahmet Author-X-Name-Last: Kule Author-Name: Mustafa Demir Author-X-Name-First: Mustafa Author-X-Name-Last: Demir Author-Name: Niyazi Ekici Author-X-Name-First: Niyazi Author-X-Name-Last: Ekici Author-Name: Huseyin Akdogan Author-X-Name-First: Huseyin Author-X-Name-Last: Akdogan Title: Perceptions of Generation Z regarding Terrorism: A Cross-Regional Study Abstract: Although the threat of terrorism remains a high priority among Americans, no study has explored the regional differences in perceptions of terrorism in the United States. In order to address the current gap in the literature, the present research specifically examines the fear and risk perceptions of college students regarding the threat of terrorism. The research sample consisted of 1,384 undergraduate students from three major regional universities in the United States. Bivariate and multivariate analyses of the collected data yielded significant regional differences, and uncovered several associations and predictors, such as political identity, that previous studies have not revealed. Journal: Studies in Conflict & Terrorism Pages: 2011-2037 Issue: 10 Volume: 46 Year: 2023 Month: 10 X-DOI: 10.1080/1057610X.2021.1894737 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1894737 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:2011-2037 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1872159_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tricia Bacon Author-X-Name-First: Tricia Author-X-Name-Last: Bacon Author-Name: Daniel Byman Author-X-Name-First: Daniel Author-X-Name-Last: Byman Title: De-Talibanization and the Onset of Insurgency in Afghanistan Abstract: This article examines the reasons for the rise of the Taliban and the onset of the insurgency in Afghanistan after the 2001 U.S. invasion, using counterfactual and path dependence analysis to bolster its arguments. We argue that the U.S. decision to de-Talibanize was a critical juncture, after which the rise of insurgency was far harder to prevent. The total rejection of the Taliban translated into the under-representation of Pashtuns in the Afghan government, delivering power to ethnic minorities at their expense. De-Talibanization led the United States to support strongmen to hunt the Taliban, but they were predatory, creating grievances that the Taliban exploited to recruit. Finally, de-Talibanization led many Taliban to flee to Pakistan, pushing them into the country most opposed to Afghanistan new political order. The lessons of the U.S. experience in Afghanistan suggest the necessity of a strategy for managing defeated enemies after an initial military victory. Journal: Studies in Conflict & Terrorism Pages: 1840-1867 Issue: 10 Volume: 46 Year: 2023 Month: 10 X-DOI: 10.1080/1057610X.2021.1872159 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1872159 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1840-1867 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1902604_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: John Gearson Author-X-Name-First: John Author-X-Name-Last: Gearson Author-Name: Philip A. Berry Author-X-Name-First: Philip Author-X-Name-Last: A. Berry Title: British Troops on British Streets: Defence’s Counter-Terrorism Journey from 9/11 to Operation Temperer Abstract: In May 2017, Operation Temperer – the deployment of British military personnel in support of the police following a terrorist attack or the threat of such an attack – was activated for the first time. The deployment of uniformed armed personnel as a core element of the U.K.’s CT capability represents a significant and, in the authors view, welcome shift in how successive administrations have utilized aspects of state power in response to a terrorist threat or incident. Little academic work has been devoted to explaining how and why this change occurred, with the military moving from reluctant participants in domestic CT missions, to playing a central (and public) role in providing capacity for domestic security, as witnessed under Operation Temperer. This article charts the evolution of greater military involvement in domestic counter-terrorism missions after 9/11, revealing that a decade of policy paralysis was finally broken by the combination of terrorist events in Paris in January 2015, and the intervention of a forward leaning prime minister overcoming institutional reluctance on the part of the Ministry of Defence and other government departments to put British troops on British streets. Journal: Studies in Conflict & Terrorism Pages: 1984-2010 Issue: 10 Volume: 46 Year: 2023 Month: 10 X-DOI: 10.1080/1057610X.2021.1902604 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1902604 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1984-2010 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1905141_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Natalie Anastasio Author-X-Name-First: Natalie Author-X-Name-Last: Anastasio Author-Name: Arie Perliger Author-X-Name-First: Arie Author-X-Name-Last: Perliger Author-Name: Neil Shortland Author-X-Name-First: Neil Author-X-Name-Last: Shortland Title: How Emotional Traits and Practices Lead to Support in Acts of Political Violence Abstract: The current study aims to assess the emotional processes that foster support for political violence. A survey of 1202 respondents was used to identify the association between emotional traits, support for extremist groups, and willingness to engage in political violence. Additionally, we tested how attitudinal traits’ interaction with emotional factors may impact radicalization. Our findings indicate that aspects of anger and anxiety, as well as emotional triggers related to social interactions, are associated with increased support for political violence and extremism. Moreover, we identified important pathways in which attitudinal and emotional traits interact to facilitate radicalization further. Journal: Studies in Conflict & Terrorism Pages: 1912-1932 Issue: 10 Volume: 46 Year: 2023 Month: 10 X-DOI: 10.1080/1057610X.2021.1905141 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1905141 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1912-1932 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1915930_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gaetano Joe Ilardi Author-X-Name-First: Gaetano Joe Author-X-Name-Last: Ilardi Title: Violent Islamism and Shame-Inducing Narratives Abstract: Shame avoidance or repair can serve as a powerful source of motivation, a view shared by violent Islamist (VI) organizations such as the Islamic State of Iraq and the Levant (ISIL) and al-Qaeda, whose respective propaganda activities seek to shame sympathizers into action by dislodging them from positions of inactivity or indecisiveness. Utilizing concepts contained in Benford and Snow’s notion of experiential commensurability, this article will examine how VI organizations seek to induce shame among their targets of mobilization by facilitating comparison and instilling a sense of accountability. Journal: Studies in Conflict & Terrorism Pages: 1868-1893 Issue: 10 Volume: 46 Year: 2023 Month: 10 X-DOI: 10.1080/1057610X.2021.1915930 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1915930 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1868-1893 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1889091_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Samantha Kruber Author-X-Name-First: Samantha Author-X-Name-Last: Kruber Author-Name: Stephanie Carver Author-X-Name-First: Stephanie Author-X-Name-Last: Carver Title: Insurgent Group Cohesion and the Malleability of ‘Foreignness’: Al-Shabaab’s Relationship with Foreign Fighters Abstract: Foreign fighters can be both an asset and a liability for the groups to which they are recruited. While they can bring with them much sought after skills and resources, they can also create tensions between foreign fighter contingents and local membership. This paper considers Al-Shabaab’s relationship with foreign fighters from the group’s foundational years in the 1990s through to the infamous purge of 2011–2013. By examining Al-Shabaab’s history and narratives around foreign-ness and foreign fighters, this paper finds that foreign fighters have persistently influenced Al-Shabaab’s organizational cohesion and structural integrity. Journal: Studies in Conflict & Terrorism Pages: 1894-1911 Issue: 10 Volume: 46 Year: 2023 Month: 10 X-DOI: 10.1080/1057610X.2021.1889091 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1889091 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1894-1911 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1930863_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Victor Asal Author-X-Name-First: Victor Author-X-Name-Last: Asal Author-Name: Joseph K. Young Author-X-Name-First: Joseph K. Author-X-Name-Last: Young Author-Name: Nakissa Jahanbani Author-X-Name-First: Nakissa Author-X-Name-Last: Jahanbani Author-Name: Suzanne Weedon Levy Author-X-Name-First: Suzanne Weedon Author-X-Name-Last: Levy Title: Tugging on Superman’s Cape: Why Some Insurgencies Are Targets of Foreign Militaries Abstract: Why do foreign militaries attack some insurgencies and not others? Although foreign involvement in civil conflicts is on the rise, many insurgencies are not targeted militarily by external powers. Current research suggests organizations that are lethal or that attack democracies should be targeted more often. We argue that organizations that have vital markers of capabilities, such as alliances with other violent non-state actors (VNSAs) and territorial control, and the ability to attack members of a powerful country, in this case, U.S. citizens at home or abroad, are more likely to be targeted. Our empirical analysis supports this contention: we use a logistic regression model and, in post-estimation, predicted probabilities and a Classification and Regression Tree (CART) model to understand the effect of potential factors on international military interventions. Journal: Studies in Conflict & Terrorism Pages: 1933-1959 Issue: 10 Volume: 46 Year: 2023 Month: 10 X-DOI: 10.1080/1057610X.2021.1930863 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1930863 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:10:p:1933-1959 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1906483_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Brandon del Pozo Author-X-Name-First: Brandon Author-X-Name-Last: del Pozo Title: Complexity, Lethality, and the Perverse Imagination: Modelling Nonstate Actors’ Means of Attack Abstract: In the pursuit of security, state actors presume a linear relationship between the lethality and complexity of various means of attack. They deploy resources and research programs to overcome the inherent or “analytic†complexity of increasingly lethal means of their own (think of programs to develop nuclear weapons and other highly lethal munitions), and they impose security, legal and regulatory regimes to increase the imposed or “synthetic†complexity opponents must overcome to appropriate or adopt the means they develop. Nonstate actors such as terrorists overcome the challenges of complexity by imaginatively seeking new ways to operate in an alternative high lethality/low complexity space. The perversity of their imagination allows them to conceive of means of attack beyond the pale for state actors, leaving states initially unprepared to defend against them. Car bombs, vehicle ramming and small arms attacks on dense crowds, and iconic attacks such as 9/11 are examples of nonstate actors successfully operating in the high lethality/low complexity space. Successful attackers will continue to do so in ways that state actors fail to imagine and protect against, especially when the prevention of low-complexity attacks traditionally falls on local governments with fewer resources, and they employ means that do not have especially suspicious signatures. The deployment of weaponized drones against crowds and other soft targets may indicate one of the evolutions of this operational space. State security requires fully understanding the imagination of the nonstate actor, but good governance requires balancing the necessary thinking and preventive measures with the freedoms of a state not burdened by such a perverse outlook. Journal: Studies in Conflict & Terrorism Pages: 2351-2362 Issue: 11 Volume: 46 Year: 2023 Month: 11 X-DOI: 10.1080/1057610X.2021.1906483 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1906483 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2351-2362 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1923188_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Garth Davies Author-X-Name-First: Garth Author-X-Name-Last: Davies Author-Name: Edith Wu Author-X-Name-First: Edith Author-X-Name-Last: Wu Author-Name: Richard Frank Author-X-Name-First: Richard Author-X-Name-Last: Frank Title: A Witch’s Brew of Grievances: The Potential Effects of COVID-19 on Radicalization to Violent Extremism Abstract: Historically, pandemics had inevitably produced demonization and scapegoating, and the COVID-19 pandemic has been no exception. Some individuals and groups have attempted to weaponize and exploit the pandemic, to use it as a means of spreading their extremist ideologies and to radicalize others to their causes. Segmented regression analyses of seven online extremist forums revealed that posting behavior on violent right-wing extremist and incel forums increased significantly following the declaration of the pandemic. The same was not true of left-wing or jihadist forums. These unequal effects likely reflect the particular grievance-based and online nature of right-wing and incel extremism. Journal: Studies in Conflict & Terrorism Pages: 2327-2350 Issue: 11 Volume: 46 Year: 2023 Month: 11 X-DOI: 10.1080/1057610X.2021.1923188 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1923188 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2327-2350 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1913819_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nicole Satherley Author-X-Name-First: Nicole Author-X-Name-Last: Satherley Author-Name: Kumar Yogeeswaran Author-X-Name-First: Kumar Author-X-Name-Last: Yogeeswaran Author-Name: Danny Osborne Author-X-Name-First: Danny Author-X-Name-Last: Osborne Author-Name: Sadi Shanaah Author-X-Name-First: Sadi Author-X-Name-Last: Shanaah Author-Name: Chris G. Sibley Author-X-Name-First: Chris G. Author-X-Name-Last: Sibley Title: Investigating the Effects of Right-Wing Terrorism on Government Satisfaction: A Time Course Analysis of the 2019 Christchurch Terror Attack Abstract: We examine political attitude change using data from a large national probability sample collected over the months leading up to, and following, the 2019 March 15 terror attacks against a Muslim minority community in Christchurch, New Zealand. Satisfaction with the government declined in the months prior to the attack, rose sharply immediately following the attack, and returned to pre-attack levels roughly 3 months after the attack. Support for the ruling centre-left Labour party followed a similar trend, whereas centre-right National party support was unchanged. These results provide valuable comparison to studies focusing on the effects of Islamist attacks, and insight into the time-course of attitude change by examining the effects of far right terrorism toward a minority community. Journal: Studies in Conflict & Terrorism Pages: 2174-2187 Issue: 11 Volume: 46 Year: 2023 Month: 11 X-DOI: 10.1080/1057610X.2021.1913819 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1913819 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2174-2187 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1917628_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Raphael D. Marcus Author-X-Name-First: Raphael D. Author-X-Name-Last: Marcus Title: ISIS and the Crime-Terror Nexus in America Abstract: This study explores the nexus between crime and Islamic State (ISIS) terrorism in America. It highlights trends in the criminal history of all federal ISIS defendants and deceased perpetrators in America, and evaluates whether crime was integral to a plot’s funding or logistics. While less pronounced than in Europe, a prevalence of prior violent crimes is evident, although plot-relevant crime was generally perpetrated by those without criminal history. It explores how gangs and prison impact defendant radicalization and mobilization, finding that gang members often left gang life upon radicalization, and while rare, prison inmates were radicalized by non-isolated terrorist inmates. Journal: Studies in Conflict & Terrorism Pages: 2188-2213 Issue: 11 Volume: 46 Year: 2023 Month: 11 X-DOI: 10.1080/1057610X.2021.1917628 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1917628 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2188-2213 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1913820_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kutluer Karademir Author-X-Name-First: Kutluer Author-X-Name-Last: Karademir Author-Name: Mahmut Cengiz Author-X-Name-First: Mahmut Author-X-Name-Last: Cengiz Title: Names Are Never Only Names: A Nominal Analysis of Terrorist Organizations Abstract: This study argues that terrorism is a political communication process that starts with the connotations made by the keywords terrorist organizations purposefully use in their names to appeal to their first-order audience and show themselves as the vanguards of the values represented by those words. Data analyses conducted based on the names of 2,939 terrorist organizations revealed that terrorist groups name their organizations following similar patterns. Moreover, the study found local and temporal patterns in line with the political trends of the respective era. Journal: Studies in Conflict & Terrorism Pages: 2303-2326 Issue: 11 Volume: 46 Year: 2023 Month: 11 X-DOI: 10.1080/1057610X.2021.1913820 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1913820 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2303-2326 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1907897_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jacob Aasland Ravndal Author-X-Name-First: Jacob Aasland Author-X-Name-Last: Ravndal Title: From Bombs to Books, and Back Again? Mapping Strategies of Right-Wing Revolutionary Resistance Abstract: This article begins by outlining four post-WWII strategies of right-wing revolutionary resistance: vanguardism; the cell system; leaderless resistance; and metapolitics. Next, the article argues that metapolitics became a preferred strategy for many right-wing revolutionaries during the 2000s and early 2010s, and proposes three conditions that may help explain this metapolitical turn: limited opportunities for armed resistance; a subcultural style shift; and new opportunities for promoting alternative worldviews online. Finally, the article theorizes about the types of threats that may emerge in the wake of this metapolitical turn, and speculates about the likelihood of a new and more violent turn in the near future. Journal: Studies in Conflict & Terrorism Pages: 2120-2148 Issue: 11 Volume: 46 Year: 2023 Month: 11 X-DOI: 10.1080/1057610X.2021.1907897 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1907897 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2120-2148 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1914361_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Miron Lakomy Author-X-Name-First: Miron Author-X-Name-Last: Lakomy Title: Listening to the “Voice of Islamâ€: The Turkestan Islamic Party’s Online Propaganda Strategy Abstract: This article aims to map the online propaganda presence and activities of the Turkestan Islamic Party’s media arm—Islam Awazi (“Voice of Islamâ€). It also discusses its capabilities in terms of producing new releases and attracting online audiences. In order to reach these objectives, this study exploited a methodology which is a combination of open source intelligence techniques (OSINT) with limited content analysis. It argues that the Uyghur-oriented Islam Awazi’s (IA) propaganda strategy was primarily based on one standalone website, which constituted a central repository of its new productions. It was supported by several Telegram channels. However, open source intelligence investigation allowed other domains proliferating the IA’s productions, which were still accessible but abandoned at the time when this study was carried out, to be discovered. It also proved that the organization was capable of producing more than 160 propaganda releases between January and September 2020. Their viewership on the surface web was, however, quite limited. Finally, this study also outlines a peculiar connection between Islam Awazi’s websites and two networks of domains exploited by the cyber-criminal underground to distribute pornography and malware. This may be considered as a sign of an existing—and widely discussed by the academia—terror-crime nexus. Journal: Studies in Conflict & Terrorism Pages: 2241-2266 Issue: 11 Volume: 46 Year: 2023 Month: 11 X-DOI: 10.1080/1057610X.2021.1914361 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1914361 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2241-2266 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1917651_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: D. A. Keatley Author-X-Name-First: D. A. Author-X-Name-Last: Keatley Author-Name: S. Knight Author-X-Name-First: S. Author-X-Name-Last: Knight Author-Name: A. Marono Author-X-Name-First: A. Author-X-Name-Last: Marono Title: A Crime Script Analysis of Violent and Nonviolent Extremists Abstract: Extremists and the behaviors performed by extremists are a growing concern. There is a growing body of research showing the differences between violent and nonviolent extremists in terms of developmental pathways and actions. The current research used a temporal approach, crime script analysis, to map the pathways of violent and nonviolent extremists. Results showed differences between the groups in terms of Internet use, social networks and methods of enacting their beliefs. This research provides a new approach to understanding extremism and highlights the role of temporal methods in showing key differences that require different intervention strategies. Journal: Studies in Conflict & Terrorism Pages: 2285-2302 Issue: 11 Volume: 46 Year: 2023 Month: 11 X-DOI: 10.1080/1057610X.2021.1917651 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1917651 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2285-2302 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1917639_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Koehler Author-X-Name-First: Daniel Author-X-Name-Last: Koehler Title: Disengaging from Left-Wing Terrorism and Extremism: Field Experiences from Germany and Research Gaps Abstract: Left-wing terrorism and extremism have received limited scholarly attention beyond a focus on large terrorist groups and violent campaigns between the 1970s and 1990s (e.g. German Red Army Faction, Italian Red Brigades, or Weather Underground in the United States). This article discusses the contribution of German research regarding disengagement from left-wing terrorism and extremism, as well as field experiences from Germany in the field of preventing and countering violent left-wing extremism. Significant research and prevention practice gaps severely limit knowledge in this regard. Available evidence mostly stems from highly structured and strategically operating groups from past decades. Journal: Studies in Conflict & Terrorism Pages: 2099-2119 Issue: 11 Volume: 46 Year: 2023 Month: 11 X-DOI: 10.1080/1057610X.2021.1917639 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1917639 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2099-2119 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1923625_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ekaterina Stepanova Author-X-Name-First: Ekaterina Author-X-Name-Last: Stepanova Title: Foreign Terrorist Fighters from Russia in and after Syria and Iraq: (Trans) National Trends and Threats Abstract: Despite the large number of foreign terrorist fighters from Russia in Syria and Iraq, the specifics of this phenomenon are often reduced to the Northern Caucasian connection. The article suggests a differentiated assessment of types and scale of threat posed by ISIS-linked FTFs in the Russian, Eurasian and broader international contexts, relying on data-based analysis of the main trends in the dynamic process of their circulation. They include changing composition of the FTF outflow, by type of domestic radicalization, low return rate, and high potential for relocation to third countries. The article challenges conventional views on correlation of threats posed by returnees and relocated FTFs, the main domestic challenge linked to Russian FTFs, the intra-Eurasian circulation of the FTFs, the risk of their concentration in northern Afghanistan, and potential for their cross-regional circulation between Eurasia, Middle East and Europe. Journal: Studies in Conflict & Terrorism Pages: 2214-2240 Issue: 11 Volume: 46 Year: 2023 Month: 11 X-DOI: 10.1080/1057610X.2021.1923625 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1923625 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2214-2240 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1913818_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ryan Scrivens Author-X-Name-First: Ryan Author-X-Name-Last: Scrivens Author-Name: Amanda Isabel Osuna Author-X-Name-First: Amanda Isabel Author-X-Name-Last: Osuna Author-Name: Steven M. Chermak Author-X-Name-First: Steven M. Author-X-Name-Last: Chermak Author-Name: Michael A. Whitney Author-X-Name-First: Michael A. Author-X-Name-Last: Whitney Author-Name: Richard Frank Author-X-Name-First: Richard Author-X-Name-Last: Frank Title: Examining Online Indicators of Extremism in Violent Right-Wing Extremist Forums Abstract: Although many law enforcement and intelligence agencies are concerned about online communities known to facilitate violent right-wing extremism, little is empirically known about the presence of extremist ideologies, expressed grievances, or violent mobilization efforts that make up these spaces. In this study, we conducted a content analysis of a sample of postings from two of the most conspicuous right-wing extremist forums known for facilitating violent extremism, Iron March and Fascist Forge. We identified a number of noteworthy posting patterns within and across forums that may assist law enforcement and intelligence agencies in identifying credible threats online. Journal: Studies in Conflict & Terrorism Pages: 2149-2173 Issue: 11 Volume: 46 Year: 2023 Month: 11 X-DOI: 10.1080/1057610X.2021.1913818 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1913818 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2149-2173 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1913815_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Manuel R. Torres-Soriano Author-X-Name-First: Manuel R. Author-X-Name-Last: Torres-Soriano Title: Barriers to Entry to Jihadist Activism on the Internet Abstract: The present article contends that terrorist activism on the Internet is determined by the technical configuration and ease of use of the tool. Engagement in Internet activities considered criminal offenses is not only explained by a progression in the level of radicalization of the individual. Rather, the type of barriers to entry which they must overcome plays a decisive role in the decision. The article classifies the various Internet spaces featuring terrorist content under the categories of “hard platforms†and “friendly platformsâ€. This differentiation will enable us to identify how the barriers to entry to such activism have evolved over the last two decades and how this evolution has been responsible for different levels of terrorist mobilization in cyberspace. The investigation focuses on jihadist terrorism and uses the antiterrorist operations carried out in Spain during the period 2001-2020 as a case study. Journal: Studies in Conflict & Terrorism Pages: 2267-2284 Issue: 11 Volume: 46 Year: 2023 Month: 11 X-DOI: 10.1080/1057610X.2021.1913815 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1913815 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:11:p:2267-2284 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1935716_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Saleh Hasanzadeh Author-X-Name-First: Saleh Author-X-Name-Last: Hasanzadeh Author-Name: Ali Abedi Renani Author-X-Name-First: Ali Abedi Author-X-Name-Last: Renani Title: A Peaceful Interpretation of Jihad in the Qur’an Abstract: This paper studies the subject of jihad in the Qur’an and the Prophet’s conduct, and seeks to answer the following questions. What is the primary principle in the Islamic state’s international relations with non-Muslim states? Is war or peace the primary principle in the relationship of the Islamic state with non-Muslim states? What is the nature of Islamic jihad? The primacy of war means that the cause of war and jihad with infidels and pagan states lies in their people’s disbelief. The primacy of peace means that war is an exceptional situation, and whenever it occurs, it is not because of disbelief, but because of the aggression or hostility that has been shown by those states. This paper defends a pacific interpretation of jihad using an intra-textual interpretive method according to which the general verses of jihad should be understood based on the conditional verses, as opposed to claiming that the verses of peace have been abrogated by the verses of jihad. Journal: Studies in Conflict & Terrorism Pages: 2501-2520 Issue: 12 Volume: 46 Year: 2023 Month: 12 X-DOI: 10.1080/1057610X.2021.1935716 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1935716 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2501-2520 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1928887_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Dennis Broeders Author-X-Name-First: Dennis Author-X-Name-Last: Broeders Author-Name: Fabio Cristiano Author-X-Name-First: Fabio Author-X-Name-Last: Cristiano Author-Name: Daan Weggemans Author-X-Name-First: Daan Author-X-Name-Last: Weggemans Title: Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy Abstract: This article analyses the evolution and interplay of national policies and international diplomacy on cyber terrorism within and across the UNSC’s permanent five members and the UN process on cyber norms (GGE and OEWG). First, it reveals how – through the extension of preemptive measures to low-impact cyber activities and online content – national policies progressively articulate cyber terrorism as an issue of information security. Second, it problematizes how – through the adoption of comprehensive and imprecise definitions – the diplomatic language on cyber terrorism might lend international support to those authoritarian regimes keen on leveraging counter-terrorism to persecute domestic oppositions and vulnerable groups. Third, it concludes that – with UN diplomatic efforts increasingly discussing countering (dis)information operations – combining normative debates on cyber terrorism with those on information security requires precision of language to safeguard human rights globally. Journal: Studies in Conflict & Terrorism Pages: 2426-2453 Issue: 12 Volume: 46 Year: 2023 Month: 12 X-DOI: 10.1080/1057610X.2021.1928887 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1928887 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2426-2453 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1923623_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Helena Knupfer Author-X-Name-First: Helena Author-X-Name-Last: Knupfer Author-Name: Jörg Matthes Author-X-Name-First: Jörg Author-X-Name-Last: Matthes Title: An Attack against Us All? Perceived Similarity and Compassion for the Victims Mediate the Effects of News Coverage about Right-Wing Terrorism Abstract: Right-wing terrorism (RWT) poses an increasing threat to Western societies, with perpetrators targeting diverse members of society. We investigated the affective and attitudinal outcomes of exposure to news about RWT, depending on the victims’ religious affiliation (Christian vs. Muslim). Results of a quota-based experiment in [Austria; predominantly non-Muslim] (N = 315) revealed no direct effects of the victims’ religious affiliation on affective and attitudinal outcomes. However, mediation analyses suggest that, compared to Muslim victims, Christian victims elicit higher perceived similarity, which in turn, impacts compassion. Similarity and compassion then significantly predict affective and attitudinal outcomes. Theoretical and practical implications are discussed. Journal: Studies in Conflict & Terrorism Pages: 2400-2425 Issue: 12 Volume: 46 Year: 2023 Month: 12 X-DOI: 10.1080/1057610X.2021.1923623 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1923623 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2400-2425 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1929056_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jeppe Fuglsang Larsen Author-X-Name-First: Jeppe Fuglsang Author-X-Name-Last: Larsen Author-Name: Sune Qvotrup Jensen Author-X-Name-First: Sune Qvotrup Author-X-Name-Last: Jensen Title: Everyday Religion and Radical Islamism – A Contribution to Theorizing the Role of Religion in Radicalization Studies Abstract: Empirical data have indicated that radical Islamists often interpret their everyday life as embedded in religion. Nonetheless, the research field has at times tended to downplay the religious dimensions of radicalization processes. This paper aims to reinstate religion in analyses of radicalization by introducing the theoretical approach of everyday religion. By utilizing this approach, the paper argues that when religion, in the minds of radical Islamists themselves, has an effect on everyday lives and practices, then religion plays a substantial role in their radicalization process. The potential of the approach is illustrated through an analysis of interviews with former converts to radical Islamism. Journal: Studies in Conflict & Terrorism Pages: 2521-2537 Issue: 12 Volume: 46 Year: 2023 Month: 12 X-DOI: 10.1080/1057610X.2021.1929056 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1929056 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2521-2537 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1935706_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Burcu Pinar Alakoc Author-X-Name-First: Burcu Pinar Author-X-Name-Last: Alakoc Author-Name: Stephanie Werner Author-X-Name-First: Stephanie Author-X-Name-Last: Werner Author-Name: Michael Widmeier Author-X-Name-First: Michael Author-X-Name-Last: Widmeier Title: Violent and Nonviolent Strategies of Terrorist Organizations: How Do Mixed Strategies Influence Terrorist Recruitment and Lethality? Abstract: Terrorist organizations do not solely rely on violence, but also utilize a range of nonviolent activities from political engagement to social services provision. We argue that terrorist organizations that use a combination of violent and nonviolent strategies are more effective in achieving two important organizational goals than those that rely solely on violent strategies. Using the Reputation of Terror Groups Dataset (2016), we demonstrate that organizations that deploy a mix of violent and nonviolent strategies are better able to attract new recruits and carry out more lethal attacks than those that rely exclusively on violence. Journal: Studies in Conflict & Terrorism Pages: 2598-2621 Issue: 12 Volume: 46 Year: 2023 Month: 12 X-DOI: 10.1080/1057610X.2021.1935706 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1935706 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2598-2621 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1927203_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Maxime Bérubé Author-X-Name-First: Maxime Author-X-Name-Last: Bérubé Author-Name: Laurie-Anne Beaulieu Author-X-Name-First: Laurie-Anne Author-X-Name-Last: Beaulieu Author-Name: Pierre Mongeau Author-X-Name-First: Pierre Author-X-Name-Last: Mongeau Author-Name: Johanne Saint-Charles Author-X-Name-First: Johanne Author-X-Name-Last: Saint-Charles Title: Identifying Key Players in Violent Extremist Networks: Using Socio-Semantic Network Analysis as Part of a Program of Content Moderation Abstract: Some moderation strategies of online content have targeted the individuals believed to be the most influential in the diffusion of such material, while others have focused on censorship of the content itself. Few approaches consider these two aspects simultaneously. The present study addresses this gap by showing how a socio-semantic network analysis can help identify individuals and subgroups who are strategically positioned in radical networks and whose comments encourage the use of violence. It also made it possible to identify the individuals and subgroups who act as intermediaries and whose statements are often the most violent. Journal: Studies in Conflict & Terrorism Pages: 2381-2399 Issue: 12 Volume: 46 Year: 2023 Month: 12 X-DOI: 10.1080/1057610X.2021.1927203 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1927203 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2381-2399 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1935700_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nicholas Lees Author-X-Name-First: Nicholas Author-X-Name-Last: Lees Author-Name: Ulrich Petersohn Author-X-Name-First: Ulrich Author-X-Name-Last: Petersohn Title: To Escalate, or Not to Escalate? Private Military and Security Companies and Conflict Severity Abstract: The existing literature is unclear about whether private military and security companies (PMSCs) are a cause of increased conflict severity, or rather are simply hired within more severe conflicts. We argue that PMSCs do increase conflict severity, yet this is the result of an escalation strategy by states to regain territory from rebels. If contracted, PMSCs either substitute for host nation forces, or free up such conventional forces to engage in offensive operations. In both cases the conflict severity increases substantially. This argument is tested with OLS regression using data from 30 weak states from 1990 to 2007. Journal: Studies in Conflict & Terrorism Pages: 2622-2645 Issue: 12 Volume: 46 Year: 2023 Month: 12 X-DOI: 10.1080/1057610X.2021.1935700 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1935700 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2622-2645 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1929066_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kumar Ramakrishna Author-X-Name-First: Kumar Author-X-Name-Last: Ramakrishna Author-Name: Yusuf Roque Santos Morales Author-X-Name-First: Yusuf Roque Santos Author-X-Name-Last: Morales Author-Name: Sheryl Renomeron-Morales Author-X-Name-First: Sheryl Author-X-Name-Last: Renomeron-Morales Title: Countering Violent Islamist Extremism in Muslim Mindanao the 4M Way: The Role of Alternative Narratives Abstract: This article argues that countering violent Islamist extremism in the southern Philippines requires greater employment of proactive Alternative Narratives (AN) rather than more reactive Counter-Narratives (CN). It offers the “4 M Way†of employing Alternative Narratives so as to achieve Information Dominance over countervailing violent extremist ideology. Properly executed, the 4 M Way could gradually steer vulnerable Muslims away from violent Islamist ideological rigidities toward the flexible beliefs that have long been part of the lived realities of Bangsamoro region—and essential for peace and stability in Muslim Mindanao. Journal: Studies in Conflict & Terrorism Pages: 2538-2563 Issue: 12 Volume: 46 Year: 2023 Month: 12 X-DOI: 10.1080/1057610X.2021.1929066 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1929066 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2538-2563 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1930862_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David Martin Jones Author-X-Name-First: David Martin Author-X-Name-Last: Jones Author-Name: M. L. R. Smith Author-X-Name-First: M. L. R. Author-X-Name-Last: Smith Title: Blowin’ in the Wind? The Musical Response to the War on Terror Abstract: Popular music was the most immediate way in which the cultural response to 9/11 manifested itself. Initially music offered a way of mourning and coping with grief. As the United States moved toward the invasion of Iraq, pop music also began to reflect the divisions in society between patriot-artists who supported the invasion, most notably in country music, and protest-artists who articulated critical attitudes to war. These anti-war songs did not attain the stature of those that characterized the era of protest during the Vietnam War, nor did they offer a musical accompaniment to a social movement with any enduring political significance. One little observed dissonance that a longitudinal survey of the musical response to political violence reveals, however, is that over time the attitudes of protest songwriters and the patriots transvalued. Ironically, interventionist “rednecks†became disillusioned with the endless wars of intervention, whilst the “protest†writers lost their voices after President Obama came to power. Ironically, icons of popular music instead turned their ire on those who voted for an anti-establishment President Trump who vowed not to involve the U.S. in further military adventures. Journal: Studies in Conflict & Terrorism Pages: 2454-2477 Issue: 12 Volume: 46 Year: 2023 Month: 12 X-DOI: 10.1080/1057610X.2021.1930862 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1930862 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2454-2477 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1926070_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Juline Beaujouan Author-X-Name-First: Juline Author-X-Name-Last: Beaujouan Title: Investigating the Influence of Islamic State’s Discourse in Jordan Abstract: Guided by the general investigation of the “discursive assault†launched by Islamic State (IS) in the Middle East and beyond, this paper examines the resonance of IS’ use of language in grassroots populations living in Jordan. Representing IS’ communication campaign as a sender-message-receiver continuum, this research aims to give primary importance to the message and its audience. Frame theory is used as the general framework to understand the formation and reception of IS’ discourse on the conflicts in Iraq and Syria. The analysis reveals that, while IS’ rhetoric on the perceived “crisis of the Ummah†and its solution seems to resonate inside Jordan, the social practices this solution entails failed to convince. In that sense, if IS succeeded to echo the grievances and resentment of its audiences in Jordan, the group was unable to attract generalized support for its caliphate. Nonetheless, this apparent rejection of IS’ project must be nuanced at the regional and state levels. After years of war in Iraq and Syria, the conditions that initially gave rise to IS remain. So, do the dynamics that nurtured the popular grievances against perceived illegitimate rulers. Journal: Studies in Conflict & Terrorism Pages: 2478-2500 Issue: 12 Volume: 46 Year: 2023 Month: 12 X-DOI: 10.1080/1057610X.2021.1926070 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1926070 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2478-2500 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1928894_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Beth Windisch Author-X-Name-First: Beth Author-X-Name-Last: Windisch Title: A Downward Spiral: The Role of Hegemonic Masculinity in Lone Actor Terrorism Abstract: This article examines the intersection of grievances, identity threats, and gender-based violence in the radicalization and attacks of post-9/11 lone actor terrorists in the United States. Before their attacks, many perpetrators committed acts of gender-based violence, and most experienced stressors related to the performance of hegemonic masculinity, a culturally constructed set of norms that places value on dominance and accomplishment. This study hypothesizes that these stressors might have been perceived as identity threats, catalyzing the attackers’ downward spiral toward violence. A thematic diagram relating stressors, male identity, and lone actor terrorism is offered as an alternative framework for understanding radicalization. Journal: Studies in Conflict & Terrorism Pages: 2363-2380 Issue: 12 Volume: 46 Year: 2023 Month: 12 X-DOI: 10.1080/1057610X.2021.1928894 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1928894 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2363-2380 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1929051_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Victor Asal Author-X-Name-First: Victor Author-X-Name-Last: Asal Author-Name: Christopher Linebarger Author-X-Name-First: Christopher Author-X-Name-Last: Linebarger Author-Name: J. Michael Greig Author-X-Name-First: J. Michael Author-X-Name-Last: Greig Title: Counter-Insurgency Strategies and Transnational Attacks by Rebel Groups Abstract: International attacks by rebel groups are an historically important phenomenon. Yet, few scholars have sought to understand why some rebel organizations “go abroad†and commence international attacks and some do not. We theorize that a rebel group’s decision to attack internationally is partly the result of its home-state’s counter-insurgency strategy. Home-states that employ broad-based repression discourage rebels from engaging in international attacks. By contrast, home-states that employ narrowly targeted repression accelerate rebel decisions to attack internationally. Finally, concessions by the home-state are a sufficient condition for the rebel groups in our data to never attack internationally. Journal: Studies in Conflict & Terrorism Pages: 2564-2597 Issue: 12 Volume: 46 Year: 2023 Month: 12 X-DOI: 10.1080/1057610X.2021.1929051 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1929051 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:12:p:2564-2597 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1751998_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Aaron Anfinson Author-X-Name-First: Aaron Author-X-Name-Last: Anfinson Author-Name: Nadia Al-Dayel Author-X-Name-First: Nadia Author-X-Name-Last: Al-Dayel Title: Landmines and Improvised Explosive Devices: The Lingering Terror of the Islamic State Abstract: The extensive use of explosives by the Islamic State (ISIS/ISIL) resulted in the highest level of contamination ever documented across Iraq and Syria. This article identifies the breadth and depth of improvised explosive devices (IEDs) and landmines as tools of terror permeating everyday civilian life. Utilizing multiple data sources, it explains factors contributing to the unprecedented scale, potency, and semi-industrialized production of explosives contaminating the territory formerly occupied by the Islamic State. It concludes with a discussion on the barriers to decontamination efforts, predicting an increase in IED campaigns by armed non-state actors. It offers contributions to counterterrorism, foreign policy, and humanitarian concerns. Journal: Studies in Conflict & Terrorism Pages: 162-182 Issue: 2 Volume: 46 Year: 2023 Month: 2 X-DOI: 10.1080/1057610X.2020.1751998 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1751998 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:2:p:162-182 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1758372_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Christine Shahan Brugh Author-X-Name-First: Christine Shahan Author-X-Name-Last: Brugh Author-Name: Sarah L. Desmarais Author-X-Name-First: Sarah L. Author-X-Name-Last: Desmarais Author-Name: Joseph Simons-Rudolph Author-X-Name-First: Joseph Author-X-Name-Last: Simons-Rudolph Title: Application of the TRAP-18 Framework to U.S. and Western European Lone Actor Terrorists Abstract: The purpose of this study is to examine the feasibility and relevance of the Terrorist Radicalization Assessment Protocol-18 (TRAP-18), an investigative framework to identify those at risk of lone actor terrorism. Using public information, we rated TRAP-18 items for 35 U.S. and 38 European jihadism-inspired lone actors (total N = 77). Results reveal challenges completing the TRAP-18 using public information: only four of 18 items (Pathway, Identification, Personal Grievance, Framed by Ideology) were rated present more often than absent or unknown. Findings suggest greater relevance of TRAP-18 items to U.S. lone actors, who had a higher average number of items rated present. Journal: Studies in Conflict & Terrorism Pages: 183-208 Issue: 2 Volume: 46 Year: 2023 Month: 2 X-DOI: 10.1080/1057610X.2020.1758372 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1758372 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:2:p:183-208 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1776964_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Benedetta Berti Author-X-Name-First: Benedetta Author-X-Name-Last: Berti Title: From Cooperation to Competition: Localization, Militarization and Rebel Co-Governance Arrangements in Syria Abstract: The article explores the complex interaction between war-dynamics and non-state armed groups’ approaches to governance and politics at the local, sub-national level. It focuses on understanding how broader conflict trends influence rebel groups’ choices with respect to establishing local governance partnerships, both with civilian agents and other armed factions. The study examines this question through the lens of the Syrian landscape and through an overview of local governance arrangements by Jabhat al-Nusra1 in the Idlib and Aleppo provinces between 2012 and 2017. In tracing the evolution of rebel co-governance arrangements at the local level,2 the article highlights two dynamics: first, how the breakdown of centralized governance and the gradual processed of militarization of local authority3 altered the balance between civilian and armed actors, shifting power in the hands of the latter. Second, how the combination of prolonged strategic stalemate, resource scarcity and ideological competition between armed factions resulted in a shift from cooperative to competitive rebel governance. The article seeks to further nuance the study of rebel governance and rebel-to-political transitions by focusing on how multi-level relationships affect armed groups’ governance choices.4 Journal: Studies in Conflict & Terrorism Pages: 209-227 Issue: 2 Volume: 46 Year: 2023 Month: 2 X-DOI: 10.1080/1057610X.2020.1776964 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1776964 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:2:p:209-227 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1751461_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Moran Yarchi Author-X-Name-First: Moran Author-X-Name-Last: Yarchi Author-Name: Ami Ayalon Author-X-Name-First: Ami Author-X-Name-Last: Ayalon Title: Fighting over the Image: The Israeli − Palestinian Conflict in the Gaza Strip 2018 − 19 Abstract: The current paper analyzes the recent wave of violence in the Israeli–Palestinian conflict, and especially the occurrences on the Gazan border since March 2018, from a less covered point of view – the battle over the image and narrative. The Palestinians’ main tools of resistance during this wave of violence have been civilian protests near the fence and the launching of explosive kites and balloons across the border – causing massive damage to Israeli agriculture. We argue that the Palestinians had waged a sophisticated Image War on the border of Gaza, and while they are performing, the world is watching. Journal: Studies in Conflict & Terrorism Pages: 123-136 Issue: 2 Volume: 46 Year: 2023 Month: 2 X-DOI: 10.1080/1057610X.2020.1751461 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1751461 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:2:p:123-136 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1751460_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matthew Dixon Author-X-Name-First: Matthew Author-X-Name-Last: Dixon Title: Militants in Retreat: How Terrorists Behave When They Are Losing Abstract: It is often stated that militant groups rely on terrorism following setbacks, but this article is the first test this idea empirically. A statistical study of 56 losing terrorist groups shows that, as they are defeated, a greater proportion of operational activity is directed against softer targets. I argue the shift is caused by a change in strategy to focus on mobilizing support, which creates a greater perceived utility for operations against civilians. Case studies of militant groups in Chechnya and Argentina show how the change in strategy interacts with other constraints to induce a greater focus on softer targets. Journal: Studies in Conflict & Terrorism Pages: 137-161 Issue: 2 Volume: 46 Year: 2023 Month: 2 X-DOI: 10.1080/1057610X.2020.1751460 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1751460 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:2:p:137-161 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1777711_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gilbert Ramsay Author-X-Name-First: Gilbert Author-X-Name-Last: Ramsay Title: Online Jihadi Storytelling: The Case of Najm al-Din Azad Abstract: Despite great interest in the importance of “narrative†to the global jihadi movement, research on actual examples of jihadi storytelling has been very limited to date. In this paper, I discuss the phenomenon of jihadi storytelling, specifically in digital contexts, focusing on the case study of one storyteller in particular: “Najm al-Din Azadâ€, a Saudi jihadist who tweeted and blogged a collection of “Tales of the Heroism of the Mujahidin†while participating in the Syrian civil war. Journal: Studies in Conflict & Terrorism Pages: 229-248 Issue: 3 Volume: 46 Year: 2023 Month: 3 X-DOI: 10.1080/1057610X.2020.1777711 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1777711 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:3:p:229-248 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1759186_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Djallil Lounnas Author-X-Name-First: Djallil Author-X-Name-Last: Lounnas Title: The Failed Ideological Hybridization of the Islamic State Abstract: The Islamic State (IS) was founded on the premise of a “new ideological†offer based on extreme takfir as an alternative to Al-Qaeda ideology i.e. Salafism-Jihadism. More specifically and ideologically speaking, IS ideology rested on the alliance between three schools of thought: the Neo-Takfiri, the Bin Ali, and the Hazimiyah. However, instead of coalescing into a single coherent thought, those three schools confronted each other in a violent internal strife that caused the death of hundreds of its members including key leaders, endangering the very existence of this organization. This paper shows that instead of opting for a clear ideological line, the IS leadership of neo-takfiri orientation, alternated its support for each of these, between the Bin Ali and the Hazimiyah, resorting each time to severe internal purges. Using interviews with former foreign fighters jihadists in addition to other relevant material1, this paper analyses the origins and ideological foundations of these three schools and seeks to explain the patterns of conflict as well as the perspectives for a possible reconciliation between them in the wake of the death of Al Baghdadi. Journal: Studies in Conflict & Terrorism Pages: 278-306 Issue: 3 Volume: 46 Year: 2023 Month: 3 X-DOI: 10.1080/1057610X.2020.1759186 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759186 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:3:p:278-306 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1776952_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Francesco Marone Author-X-Name-First: Francesco Author-X-Name-Last: Marone Author-Name: Marco Olimpio Author-X-Name-First: Marco Author-X-Name-Last: Olimpio Title: “We Will Conquer Your Romeâ€: Italy and the Vatican in the Islamic State’s Propaganda Abstract: Over the last few years, Italy has occupied a relatively marginal position with respect to the jihadist threat. Nonetheless, the propaganda of the Islamic State mentions Italy and the bordering Vatican with a seemingly disproportionate frequency. This article presents an in-depth analysis of all textual references in Dabiq and Rumiyah, the flagship magazines of this sophisticated jihadist organization. Overall, several mentions concern “Rome,†intended as a symbol for the West and Christianity and with a number of other meanings. However, there is no lack of potentially worrying references to Italy, Italians, the Vatican, and the Pope. Journal: Studies in Conflict & Terrorism Pages: 307-329 Issue: 3 Volume: 46 Year: 2023 Month: 3 X-DOI: 10.1080/1057610X.2020.1776952 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1776952 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:3:p:307-329 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1759182_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael Jensen Author-X-Name-First: Michael Author-X-Name-Last: Jensen Author-Name: Patrick James Author-X-Name-First: Patrick Author-X-Name-Last: James Author-Name: Elizabeth Yates Author-X-Name-First: Elizabeth Author-X-Name-Last: Yates Title: Contextualizing Disengagement: How Exit Barriers Shape the Pathways Out of Far-Right Extremism in the United States Abstract: This paper explores how obstacles to disengagement and push and pull factors combine to produce pathways out of extremism. Using Qualitative Comparative Analysis and a sample of 50 far-right extremists in the United States, including 25 who disengaged and 25 who did not, we show how certain exit barriers, like the presence of extremist family members, poor social mobility, and past criminal convictions, determine which push and pull factors are capable of assisting individuals in leaving extremism. We conclude with how these findings can be used to support intervention and reintegration programs. Journal: Studies in Conflict & Terrorism Pages: 249-277 Issue: 3 Volume: 46 Year: 2023 Month: 3 X-DOI: 10.1080/1057610X.2020.1759182 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759182 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:3:p:249-277 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1777714_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Keith W. Ludwick Author-X-Name-First: Keith W. Author-X-Name-Last: Ludwick Title: “Sorry, We’re Closedâ€: Applying Business Models to Failed Terrorist Organizations Abstract: The application of specific, business organizational models to understand terrorism remains absent in the literature. This article argues business models can apply to understanding terrorist organizational behavior. Two traditional organizational models are integrated with two terrorist organizations to examine their leadership and management. These two business models successfully demonstrate which elements of terrorist group organization potentially lead to their failure, specifically a lack of concern for administrative functions. This paper more broadly suggests specific models within business organizational theory offer an insight into future growth or decline of a terrorist organization. Journal: Studies in Conflict & Terrorism Pages: 330-352 Issue: 3 Volume: 46 Year: 2023 Month: 3 X-DOI: 10.1080/1057610X.2020.1777714 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1777714 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:3:p:330-352 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1759252_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alexandra Phelan Author-X-Name-First: Alexandra Author-X-Name-Last: Phelan Title: Special Issue Introduction for Terrorism, Gender and Women: Toward an Integrated Research Agenda Abstract: This special issue encourages a greater integration of gender-sensitive approaches to studies of violent extremism and terrorism. It seeks to create and inspire a dialogue by suggesting the necessity of incorporating gender analysis to fill gaps within, and further enhance, our understanding of political violence. In this introductory essay, I argue that there have traditionally been four approaches to understanding the interplay between gender and terrorism– positivist or “gender-as-a-variableâ€, instrumentalist, gendered motivations, and gender-based analysis and/or feminist methodology. Terrorism, Gender and Women: Toward an Integrated Research Agenda intends to advance a discussion of new ways in understanding how women and men can be affected by terrorism and violent extremism differently, and how involvement can often be influenced by highly gendered experiences and considerations. Journal: Studies in Conflict & Terrorism Pages: 353-361 Issue: 4 Volume: 46 Year: 2023 Month: 4 X-DOI: 10.1080/1057610X.2020.1759252 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759252 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:353-361 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1759270_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Elizabeth Pearson Author-X-Name-First: Elizabeth Author-X-Name-Last: Pearson Title: Gendered Reflections? Extremism in the UK’s Radical Right and al-Muhajiroun Networks Abstract: The rise of populism and the radical right alongside ongoing global recruitment by jihadist groups has seen academics and popular discourse alike note parallels between the two. In particular, authors have emphasized gendered similarities between the movements. Based on ‘close-up’ ethnographic research, this article empirically shows how gender produces group members’ activism in two extreme movements: a network linked to the U.K.’s banned Islamist group al-Muhajiroun; and activists for the English Defence League, Britain First and other anti-Islam(ist) groups. Through a gendered analysis, the article problematizes assertions that the two movements mirror one another. In particular, it emphasizes the ways in which gender produces fragmentation across the anti-Islam(ist) movement, contrasted with a more consistent gendered logic in those networked to al-Muhajiroun. Its key contribution is to use ethnographic research to evidence the ways in which group members’ gendered activism ultimately undercuts group ideals. Journal: Studies in Conflict & Terrorism Pages: 489-512 Issue: 4 Volume: 46 Year: 2023 Month: 4 X-DOI: 10.1080/1057610X.2020.1759270 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759270 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:489-512 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1759267_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Melissa Frances Johnston Author-X-Name-First: Melissa Frances Author-X-Name-Last: Johnston Author-Name: Muhammad Iqbal Author-X-Name-First: Muhammad Author-X-Name-Last: Iqbal Author-Name: Jacqui True Author-X-Name-First: Jacqui Author-X-Name-Last: True Title: The Lure of (Violent) Extremism: Gender Constructs in Online Recruitment and Messaging in Indonesia Abstract: The gender dimension of violent extremism is under-studied; and “women terrorists†are stereotyped as either men’s dupes or (internet) warriors. Applying a gender lens, this study uses content analysis to examine Islamist extremist websites in Indonesia. Analysis reveals distinct recruitment language targeted at women and men, and rigid gender segregation of content and spaces. Extremists co-opt the language of women’s rights while also promoting gender-discriminatory harmful practices with the intent of establishing what they consider to be a more devout Islamic state. Gender analysis of online extremism has implications for strategies to counter and prevent radicalization to violence. Journal: Studies in Conflict & Terrorism Pages: 470-488 Issue: 4 Volume: 46 Year: 2023 Month: 4 X-DOI: 10.1080/1057610X.2020.1759267 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759267 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:470-488 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1759256_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Victor Asal Author-X-Name-First: Victor Author-X-Name-Last: Asal Author-Name: Nazli Avdan Author-X-Name-First: Nazli Author-X-Name-Last: Avdan Author-Name: Nourah Shuaibi Author-X-Name-First: Nourah Author-X-Name-Last: Shuaibi Title: Women Too: Explaining Gender Ideologies of Ethnopolitical Organizations Abstract: What explains the gender ideologies of ethnopolitical organizations? Recently, scholarship has cast attention to the determinants of violent organizations’ female recruitment patterns. Others have examined the effects of gender ideology on organizational tactics. There is a paucity of work on the determinants of gender ideologies. The article redresses this lacuna by exploring how organizational characteristics influence the gender platforms of ethnopolitical organizations in the Middle East and North Africa (MENA). Focusing on 102 ethnic and ethnoreligious MENA for 25 years from 1980 to 2004, the study finds that broader gender ideologies shape gender platforms. In addition, organizations that provide social services are significantly more likely to advocate gender inclusivity. The context in which organizations operate also has significant effects in that state repression steers organizations to adopt gender inclusivity. The study thus contributes to an emerging literature on gender, shifting focus from the state to the organizational context. Journal: Studies in Conflict & Terrorism Pages: 362-379 Issue: 4 Volume: 46 Year: 2023 Month: 4 X-DOI: 10.1080/1057610X.2020.1759256 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759256 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:362-379 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1759262_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Hilary Matfess Author-X-Name-First: Hilary Author-X-Name-Last: Matfess Title: Part and Parcel? Examining Al Shabaab and Boko Haram’s Violence Targeting Civilians and Violence Targeting Women Abstract: In an effort to produce a more holistic and nuanced understanding of the violence women face in conflict, this article describes al Shabaab and Boko Haram’s respective patterns of political violence targeting women and compares them to one another. This article also describes and compares their respective political violence targeting civilians. This analysis, using data from the the Armed Conflict Location & Event Data Project (ACLED), provides three insights. Firstly, though al Shabaab and Boko Haram share a number of theoretically important characteristics, the nature of their violence targeting women differs considerably. Secondly, this comparison suggests that violence targeting women should be considered a distinct form of violence targeting civilians. Thirdly, this review sheds light on the degree to which different instrumentalist and ideological explanations, not theories of violence targeting civilians explain al Shabaab and Boko Haram’s patterns of violence. Ultimately, this article finds that a counter-insurgency plan, counter-terrorism strategy, or academic analysis that takes the same approach to al Shabaab and Boko Haram on the basis of their shared identities as Salafi-jihadist rebel groups will fail to capture important differences in their targeting patterns. Journal: Studies in Conflict & Terrorism Pages: 380-398 Issue: 4 Volume: 46 Year: 2023 Month: 4 X-DOI: 10.1080/1057610X.2020.1759262 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759262 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:380-398 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1759264_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mehr Latif Author-X-Name-First: Mehr Author-X-Name-Last: Latif Author-Name: Kathleen Blee Author-X-Name-First: Kathleen Author-X-Name-Last: Blee Author-Name: Matthew DeMichele Author-X-Name-First: Matthew Author-X-Name-Last: DeMichele Author-Name: Pete Simi Author-X-Name-First: Pete Author-X-Name-Last: Simi Title: Do White Supremacist Women Adopt Movement Archetypes of Mother, Whore, and Fighter? Abstract: The rhetoric of the far-right typically depicts women in tripartite archetypes: as beloved mothers or sex symbols for far-rightist men or, less commonly, as fighters for the cause. But the propaganda and speeches that produced these archetypes of women are largely produced by far-rightist men. Do they reflect the lived experiences of women in the far-right? And how do far-rightist women – and men – react to such rhetorical messages about the female role? This paper broadens our understanding of modern white supremacist groups by examining the experiences of its female members. We employ lenses of emotionality and embodiment to understand how women accept and resist group-level gender expectations in white supremacism. This is responsive to the broader goal in research on women in terrorism and political violence to specify how women act within and beyond ascribed gender-typical roles. Our extensive interview data allow us to provide a rich depiction of the integrated natures of the public and private lives of white supremacist activist women, adding new information about a population of women engaged in political extremism and violent organization about which little is known. Journal: Studies in Conflict & Terrorism Pages: 415-432 Issue: 4 Volume: 46 Year: 2023 Month: 4 X-DOI: 10.1080/1057610X.2020.1759264 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759264 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:415-432 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1759265_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ora Szekely Author-X-Name-First: Ora Author-X-Name-Last: Szekely Title: Exceptional Inclusion: Understanding the PKK’s Gender Policy Abstract: The PKK’s gender policy, which includes maintaining a fighting force that is 40% female and the promotion of women’s liberation as a key component of its political platform, makes the PKK an outlier among both Kurdish nationalist groups and leftist armed movements in the Middle East. Based on interviews with members of the PKK’s allied civilian political movement and former PKK combatants, this paper argues that rather than being a function of the PKK’s ethnic or ideological identities, this policy emerged as a result of a confluence of four other factors: the PKK’s leftist ideology, the preferences of its leadership, and the need to recruit selectively all served as permissive factors. Ultimately, however, it was the greater participation of Kurdish women as a result of Turkish state violence in the Kurdish southeast in the 1980s that ultimately changed the PKK from within. Journal: Studies in Conflict & Terrorism Pages: 433-450 Issue: 4 Volume: 46 Year: 2023 Month: 4 X-DOI: 10.1080/1057610X.2020.1759265 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759265 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:433-450 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1759263_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mia Bloom Author-X-Name-First: Mia Author-X-Name-Last: Bloom Author-Name: Ayse Lokmanoglu Author-X-Name-First: Ayse Author-X-Name-Last: Lokmanoglu Title: From Pawn to Knights: The Changing Role of Women’s Agency in Terrorism? Abstract: As terrorist groups became more technologically advanced with their media campaigns, the global audience began to see pictures of women in black burkas pledging allegiance to the so-called Islamic State of Iraq and Syria (ISIS) and posing with guns. Although there is a backlash against such change that we see reflected in the ideologies of violent extremism; the shifts in gender relations within these groups are significant to examine. Further, we face questions about the repatriation of ISIS women and children to their countries of origin – notably questions of agency and culpability within the mainstream media. This paper asks: to what extent have women’s roles changed within and across terrorist groups? Is there a move toward women’s empowerment, or is it a facade? Analyzing the three cases of Al-Qaeda (AQ), Islamic State of Iraq and Syria (ISIS), and Kurdistan Workers’ Party (PKK) does their advent represent a significant shift? The emergence of ISIS and Boko Haram’s explicitly gendered strategies of violence and recruitment within the highly patriarchal and misogynistic Salafi-jihadist culture, and PKK’s postconflict gender-equal political advances demonstrates that addressing women’s agency through a gendered analysis outside of the masculine domain is imperative. Scholars should challenge the idea that women have limited roles. Journal: Studies in Conflict & Terrorism Pages: 399-414 Issue: 4 Volume: 46 Year: 2023 Month: 4 X-DOI: 10.1080/1057610X.2020.1759263 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759263 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:399-414 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1759266_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alexis Henshaw Author-X-Name-First: Alexis Author-X-Name-Last: Henshaw Title: Outbidding and Gender: Dynamics in the Colombian Civil War Abstract: The civil conflict in Colombia has gained attention in part for the inclusion of women in rebel forces and peace negotiations between the government and the Revolutionary Armed Forces of Colombia (FARC). Scholarship has often explained the FARC’s decision to mobilize women as both an ideological and tactical move, designed to increase the ranks of the organization and signal commitment to leftist principles. In this paper, I argue that the incorporation of women into Colombia’s civil war is better understood by viewing the country’s various leftist armed movements (including the ELN, EPL, and M-19) through a comparative framework. By applying the theoretical concept of outbidding, I argue that the mobilization and expansion of women’s roles in Colombian armed groups was in fact an intersubjective process, driven by competition among leftist movements existing in a crowded marketplace. In contrast to alternative explanations that focus on mobilization as an elite-driven process, I argue that the outbidding dynamic exposes agency among women recruited to these groups and demonstrates the potential for women to create strategic openings in times of conflict. Journal: Studies in Conflict & Terrorism Pages: 451-469 Issue: 4 Volume: 46 Year: 2023 Month: 4 X-DOI: 10.1080/1057610X.2020.1759266 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1759266 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:4:p:451-469 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1780014_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Koehler Author-X-Name-First: Daniel Author-X-Name-Last: Koehler Title: Fake It till You Make It? Representation of Special Operations Forces Capabilities in Jihadist Propaganda Videos Abstract: Jihadist propaganda videos depicting training camps and combat scenes have steadily increased in variety and quality over the years. A small number of these videos attempt to mimic Special Operation Forces (SOF)’s tactics and skills. This subset of jihadist propaganda might go beyond a mere attempt to show prowess and reveal actual operational capabilities. This article analyzes three exemplary jihadist propaganda videos depicting claimed SOF capabilities through expert reviews with active service SOF personnel to assess the actual tactical quality of the content shown. It also discusses the potential reasons for those groups to mimic SOF and implications for counterterrorism. Journal: Studies in Conflict & Terrorism Pages: 541-558 Issue: 5 Volume: 46 Year: 2023 Month: 5 X-DOI: 10.1080/1057610X.2020.1780014 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780014 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:541-558 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1780027_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gabriel Weimann Author-X-Name-First: Gabriel Author-X-Name-Last: Weimann Author-Name: Natalie Masri Author-X-Name-First: Natalie Author-X-Name-Last: Masri Title: Research Note: Spreading Hate on TikTok Abstract: TikTok is the fastest-growing application today, attracting a huge audience of 1.5 billion active users, mostly children and teenagers. Recently, the growing presence of extremist’s groups on social media platforms became more prominent and massive. Yet, while most of the scholarly attention focused on leading platforms like Twitter, Facebook or Instagram, the extremist immigration to other platforms like TikTok went unnoticed. This study is a first attempt to find the Far-right’s use of TikTok: it is a descriptive analysis based on a systematic content analysis of TikTok videos, posted in early 2020. Our findings reveal the disturbing presence of Far-right extremism in videos, commentary, symbols and pictures included in TikTok’s postings. While similar concerns were with regard to other social platforms, TikTok has unique features to make it more troublesome. First, unlike all other social media TikTok’ s users are almost all young children, who are more naïve and gullible when it comes to malicious contents. Second, TikTok is the youngest platform thus severely lagging behind its rivals, who have had more time to grapple with how to protect their users from disturbing and harmful contents. Yet, TikTok should have learned from these other platforms’ experiences and apply TikTok’s own Terms of Service that does not allow postings that are deliberately designed to provoke or antagonize people, or are intended to harass, harm, hurt, scare, distress, embarrass or upset people or include threats of physical violence. Journal: Studies in Conflict & Terrorism Pages: 752-765 Issue: 5 Volume: 46 Year: 2023 Month: 5 X-DOI: 10.1080/1057610X.2020.1780027 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780027 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:752-765 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1780011_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bryce Loidolt Author-X-Name-First: Bryce Author-X-Name-Last: Loidolt Title: Al-Qaeda’s Iran Dilemma: Evidence from the Abbottabad Records Abstract: Through a comprehensive review of documents recovered from Usama bin Ladin’s Abbottabad compound, this study provides a new periodization of al-Qaeda’s relationship with Iran. The analysis reveals that al-Qaeda often had to reconcile conflicting operational and ideational pressures in its interactions with the Islamic Republic over time. Beyond offering insight into the trajectory of this important relationship and direction for future scholarship, the analysis suggests some ways through which the United States might expand the strategic wedge that exists between these unlikely allies and highlights the need for a more flexible understanding of state sponsored terrorism. Journal: Studies in Conflict & Terrorism Pages: 513-540 Issue: 5 Volume: 46 Year: 2023 Month: 5 X-DOI: 10.1080/1057610X.2020.1780011 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780011 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:513-540 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1780009_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jason Roach Author-X-Name-First: Jason Author-X-Name-Last: Roach Author-Name: Ashley Cartwright Author-X-Name-First: Ashley Author-X-Name-Last: Cartwright Author-Name: Ken Pease Author-X-Name-First: Ken Author-X-Name-Last: Pease Title: More Angry than Scared? A Study of Public Reactions to the Manchester Arena and London Bridge Terror Attacks of 2017 Abstract: Although public reaction to disaster has been the subject of much research, reactions to acts of terrorism have been studied less, sustaining a common assumption that fear is the generic response. The present paper tests this assumption through a survey of reactions to the Manchester Arena bombing and London Bridge attack of 2017, and the findings suggest that an important likely additional modal citizen reaction to such events is one of anger at the perpetrators, holding important implications for public policy and security practice in the wake of such acts. Journal: Studies in Conflict & Terrorism Pages: 579-593 Issue: 5 Volume: 46 Year: 2023 Month: 5 X-DOI: 10.1080/1057610X.2020.1780009 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780009 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:579-593 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1780005_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Enrique Wedgwood Young Author-X-Name-First: Enrique Wedgwood Author-X-Name-Last: Young Title: Theorizing the Influence of Wartime Legacies on Political Stability after Rebel Victories Abstract: This paper develops a theory which explains how wartime processes and relationships result in positive or negative ‘wartime legacies’ which can influence the degree of political stability experienced by countries after civil wars that end in rebel victory. Specifically, it predicts that variations in a) the character, scope, and extent of rebel-civilian wartime interaction, and; b) the decisiveness, costs, and payoffs of victory, combine to influence the legitimacy, capacity to govern, and capacity to control that rebels have when they capture power. These legacies in turn shape incentives and opportunities for violent challenge to the new regime in the postwar environment, thereby lowering or raising the prospects for political stability. To illustrate the utility of the theory, it is applied to three cases which experienced differing levels of political stability following rebel victory; Cuba, Uganda, and the Democratic Republic of Congo. Journal: Studies in Conflict & Terrorism Pages: 703-727 Issue: 5 Volume: 46 Year: 2023 Month: 5 X-DOI: 10.1080/1057610X.2020.1780005 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780005 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:703-727 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1780007_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Oscar Palma Author-X-Name-First: Oscar Author-X-Name-Last: Palma Title: A Model for Counterinsurgency Success? The Good, the Bad and the Ugly in the Struggle against the Revolutionary Armed Forces of Colombia (2003–2012) Abstract: The Colombian counterinsurgency campaign against FARC, during the years 2003–2012, was successful in significantly reducing the insurgency to its weakest condition in history. The strategy was a result of the transformation of the leadership mind-set, which motivated an understanding of counterinsurgency as a political enterprise, demanding the participation of all state institutions and officials. This all-of-government approach allowed to place military action as part of a broader strategy, in which military commanders transformed the way the struggle was understood, placing legitimacy as a center of gravity in operations. However, the latter part of the strategy, the consolidation of state institutions in remote regions of the territory, wasn’t achieved, while extrajudicial killings clouded the entire success of the strategy.1 Journal: Studies in Conflict & Terrorism Pages: 728-751 Issue: 5 Volume: 46 Year: 2023 Month: 5 X-DOI: 10.1080/1057610X.2020.1780007 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780007 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:728-751 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1780021_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mohammed Ibrahim Shire Author-X-Name-First: Mohammed Author-X-Name-Last: Ibrahim Shire Title: How Do Leadership Decapitation and Targeting Error Affect Suicide Bombings? The Case of Al-Shabaab Abstract: Targeted killing is a cornerstone of counter-terrorism strategy, and tactical mistakes made by militant groups are endemic in terrorism. Yet, how do they affect a militant group’s suicide bomber deployment? Since joining Al-Qaeda, Al-Shabaab has carried out various types of suicide attacks on different targets. Using a uniquely constructed dataset, I introduce two typologies of suicide bomber detonation profiles – single and multiple – and explore the strategic purposes these have served for the group during multiphasic stages following targeted killings against the group’s leadership and targeting errors committed by Al-Shabaab. The findings reveal that targeted killing has the opposite effect of disrupting suicide attacks, instead, leading to a rapid proliferation of unsophisticated single suicide attacks against civilian and military targets to maintain the perception of the group’s potency. Thus, I argue that targeting errors made by Al-Shabaab have a more serious detrimental effect on its deployment of suicide attacks than any counter-terrorism measure. Journal: Studies in Conflict & Terrorism Pages: 682-702 Issue: 5 Volume: 46 Year: 2023 Month: 5 X-DOI: 10.1080/1057610X.2020.1780021 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780021 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:682-702 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1776958_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joana Cook Author-X-Name-First: Joana Author-X-Name-Last: Cook Author-Name: Haid Haid Author-X-Name-First: Haid Author-X-Name-Last: Haid Author-Name: Inga Trauthig Author-X-Name-First: Inga Author-X-Name-Last: Trauthig Title: “Jurisprudence Beyond the State: An Analysis of Jihadist “Justice†in Yemen, Syria and Libya Abstract: The provision of law, order and justice are some of the most sacred responsibilities of the contemporary nation-state. However, non-state actors have frequently introduced their own jurisprudence, implementing courts and various forms of related law and order in broader attempts to implement governance. Yet, little research has examined the diverse contours of such jurisprudence, and how these aspects offer insights into how these groups vie for legitimacy, and how such jurisprudence helps them achieve their strategic aims. Examining AQAP in Yemen, HTS in Syria, and ISIS in Libya this article describes the implementation, scope and contours of jihadist jurisprudence. Journal: Studies in Conflict & Terrorism Pages: 559-578 Issue: 5 Volume: 46 Year: 2023 Month: 5 X-DOI: 10.1080/1057610X.2020.1776958 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1776958 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:559-578 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1780028_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Adib Bencherif Author-X-Name-First: Adib Author-X-Name-Last: Bencherif Author-Name: Aurélie Campana Author-X-Name-First: Aurélie Author-X-Name-Last: Campana Author-Name: Daniel Stockemer Author-X-Name-First: Daniel Author-X-Name-Last: Stockemer Title: Lethal Violence in Civil War: Trends and Micro-Dynamics of Violence in the Northern Mali Conflict (2012-2015) Abstract: This article discusses the trends and micro-dynamics of violence in northern Mali. Using a mixed research design, we focus on the violence used by jihadist groups during the first phases of the Malian civil war (2012–2015). Integrating research on civil war and terrorism, we distinguish between direct and remote violence. Quantitative analyses show that the involvement of jihadist groups in this conflict had a strong impact on the level and intensity of violence of all warring parties. Qualitative analysis of data collected during field research done in Mali between 2016 and 2017 complements the quantitative work. It enlightens that relational dynamics strongly influence the decision to resort to violence within non-state armed groups, including jihadist ones, while local contexts often explain temporal and geographic variations in violence. Journal: Studies in Conflict & Terrorism Pages: 659-681 Issue: 5 Volume: 46 Year: 2023 Month: 5 X-DOI: 10.1080/1057610X.2020.1780028 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780028 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:659-681 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1780030_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nadia Kaneva Author-X-Name-First: Nadia Author-X-Name-Last: Kaneva Author-Name: Andrea Stanton Author-X-Name-First: Andrea Author-X-Name-Last: Stanton Title: An Alternative Vision of Statehood: Islamic State’s Ideological Challenge to the Nation-State Abstract: This study contributes to efforts to theorize contemporary challenges to the nation-state as a normative governance unit through an analysis of Islamic State’s state ideology. It is argued that, by reinterpreting concepts from Islamic history, IS puts forth a religiously motivated, post-national state ideology. Based on an interdisciplinary reading of Dabiq magazine, the de facto official IS publication between 2014 and 2016, three concepts emerge as foundational in the group’s state ideology: imamah (leadership), hijrah (migration), and bay‘a (allegiance). The study sheds light on the enduring ideology of Islamic State, despite its territorial defeat. Journal: Studies in Conflict & Terrorism Pages: 640-658 Issue: 5 Volume: 46 Year: 2023 Month: 5 X-DOI: 10.1080/1057610X.2020.1780030 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780030 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:640-658 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1780025_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rogelio Alonso Author-X-Name-First: Rogelio Author-X-Name-Last: Alonso Author-Name: Paul Delgado Author-X-Name-First: Paul Author-X-Name-Last: Delgado Title: The Radicalization of Young Jihadi Convicted of Membership of Terrorist Organization in Spain: Analyzing the Pieces of the Puzzle Abstract: This article analyses the radicalization of all of the five young offenders -aged between fourteen and eighteen years- who have been convicted in Spain between 2004 and 2019 of membership of a jihadist terrorist organization. It is based on: a) unprecedented access to the assessments of these youths produced by the Agency for the Reeducation and Reintegration of Young Offenders in the regional Government of Madrid; b) personal semi-structured interviews with the staff at this Agency responsible for their psycho-socio and educational intervention during their custodial measures; and c) judicial reports related to their cases. The article assesses the main features of the radicalization processes of these minors following a three-dimensional analysis at the micro, meso and macro level. It provides empirical evidence to test the validity of the main hypotheses on the causality of radicalization. Journal: Studies in Conflict & Terrorism Pages: 594-617 Issue: 5 Volume: 46 Year: 2023 Month: 5 X-DOI: 10.1080/1057610X.2020.1780025 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1780025 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:594-617 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1792723_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Danielle Gilbert Author-X-Name-First: Danielle Author-X-Name-Last: Gilbert Title: The Oxygen of Publicity: Explaining U.S. Media Coverage of International Kidnapping Abstract: What explains U.S. media coverage of Americans kidnapped abroad? While some hostages receive national media attention, others hardly make the local news. Using an original, event count dataset of newspaper stories about Americans kidnapped abroad since 2001, this article tests the oft-cited, under-measured assumption that “terrorism†receives more media attention than other violence. Controlling for variation across kidnapping, I show that those framed as “terrorism†receive more coverage. Challenging existing literature, I also demonstrate that incidents with more victims receive less coverage than those incidents with fewer victims, and that there is no “missing white woman syndrome†in international kidnapping. Journal: Studies in Conflict & Terrorism Pages: 618-639 Issue: 5 Volume: 46 Year: 2023 Month: 5 X-DOI: 10.1080/1057610X.2020.1792723 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792723 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:5:p:618-639 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1792724_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Edward Stoddard Author-X-Name-First: Edward Author-X-Name-Last: Stoddard Title: Maoist Hybridity? A Comparative Analysis of the Links between Insurgent Strategic Practice and Tactical Hybridity in Contemporary Non-State Armed Groups Abstract: While the recent literature on hybrid warfare has focused overwhelmingly on Russia, military tactical hybridity among non-state actors has received less attention, and minimal comparative examination. This is surprising as the range of non-state actors successfully using hybridized irregular-conventional tactics (increasingly symmetrically) against states has grown. Examining this phenomenon comparatively in three divergent cases (Islamic State, Boko Haram, the Houthi Movement), this article tests an often-overlooked argument stating that military hybridity among non-state actors is a result of these groups’ common adoption of a specific form of Maoist-style warfare strategy – emulative insurgency. Journal: Studies in Conflict & Terrorism Pages: 913-937 Issue: 6 Volume: 46 Year: 2023 Month: 6 X-DOI: 10.1080/1057610X.2020.1792724 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792724 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:913-937 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1811539_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Phillip Conrad De Bruyn Author-X-Name-First: Phillip Conrad Author-X-Name-Last: De Bruyn Title: Developing an Extremist Construct Schema and Measuring Ideological Engagement Abstract: The study of online communication in extremist communities can benefit from novel methods to cast new empirical light on how individuals engage with the content of these phenomena. This work categorized such content through the systematic extraction of constructs used by members of Islamic-based extremist forums. To identify constructs that could attract engagement from extremists over time, a schema was developed from four proposed dimensions of extremism: conflict, emotion, religion, and role. Analysis of engagement relied on a mixed methods approach applied to numerous discussions on 11 independent forums, where constructs were coded according to schema dimensions. A novel change point detection methodology was used to examine the lifespan of constructs and empirically measure engagement, which was estimated across forums through meta-analyses. A small proportion of constructs experienced significant engagement over time, primarily concentrated in the religion and role dimensions. Both dimensions attracted high engagement in all the forums analyzed, where role had smaller effects than religion across forums. The forum context and extremist discourse make high engagement with religion an expected outcome, but similar results produced by the role dimension were surprising and should recalibrate thinking when compared to the traditionally studied emotion and conflict dimensions in online radicalization. Journal: Studies in Conflict & Terrorism Pages: 938-963 Issue: 6 Volume: 46 Year: 2023 Month: 6 X-DOI: 10.1080/1057610X.2020.1811539 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1811539 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:938-963 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1792739_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Javier Jordán Author-X-Name-First: Javier Author-X-Name-Last: Jordán Title: The Last Stand of Al Andalus Lessons on the Changing Nature of War from an Early Modern Islamic Insurgency Abstract: The present article pursues a two-fold purpose. The first is to identify elements of continuity throughout history in internal armed conflicts where state structures are still in the process of being formed or, if already consolidated, where they have suffered serious deterioration. The second is to present and analyze a case study that has received scant attention in scientific literature on insurgencies, namely, the War of the Alpujarras, which was fought at the beginning of the early modern period and was the last Islamic rebellion in Spain. Journal: Studies in Conflict & Terrorism Pages: 824-846 Issue: 6 Volume: 46 Year: 2023 Month: 6 X-DOI: 10.1080/1057610X.2020.1792739 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792739 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:824-846 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1816680_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gina Vale Author-X-Name-First: Gina Author-X-Name-Last: Vale Title: Defying Rules. Defying Gender?: Women’s Resistance to Islamic State Abstract: Through disproportionate restrictions placed on women’s movement and visualization within its “caliphateâ€, the Islamic State (IS) group enforced its policies of female domesticity and submission. Studies on IS governance of local Iraqi, Syrian and Kurdish women have focused overwhelmingly on their victimization, abuse, and restricted agency. By contrast, this paper uncovers the opportunities, activities, and impacts of individual and collective nonviolent resistance led by local Sunni and Yazidi women. Through endeavors such as personal resilience, individual confrontations, and even group protest, local female civilian women acted against the group’s policies, members, ideology, and expectations of female passivity. Journal: Studies in Conflict & Terrorism Pages: 985-1008 Issue: 6 Volume: 46 Year: 2023 Month: 6 X-DOI: 10.1080/1057610X.2020.1816680 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1816680 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:985-1008 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1792740_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Carola GarcÃa-Calvo Author-X-Name-First: Carola Author-X-Name-Last: GarcÃa-Calvo Author-Name: Fernando Reinares Author-X-Name-First: Fernando Author-X-Name-Last: Reinares Author-Name: Ãlvaro Vicente Author-X-Name-First: Ãlvaro Author-X-Name-Last: Vicente Title: National Extraction, Geographical Origin and Migratory Ancestry among Jihadists in Spain Abstract: Eight out of every 10 jihadists arrested or deceased in Spain between 2013 and 2018 are of Moroccan origin. This figure includes Moroccan nationals, Spanish nationals born in Morocco, and Spanish nationals descending from Moroccan immigrants. The historically restive Rif region of northwest Africa is the main geographical provenance of those who were born in Morocco and, similarly, because of violent Salafist who are natives of Ceuta and Melilla, of those who were born in Spain. All this reveals the extent to which the enduring reality of global jihadism in Morocco is projected externally onto Spain. This is unsurprising, since a large majority of Muslims in Spain come from Morocco or have Moroccan ancestors. Yet, the blooming of homegrown jihadism in Spain over the mentioned six-year period, largely resulting from the radicalization of Moroccan descendants or second generations, points toward the internal dynamics behind the phenomenon. In Spain, however, these second generations may or may not be in a diaspora situation, an important feature which is unique in the context of Western Europe. Journal: Studies in Conflict & Terrorism Pages: 798-823 Issue: 6 Volume: 46 Year: 2023 Month: 6 X-DOI: 10.1080/1057610X.2020.1792740 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792740 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:798-823 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1793457_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Huseyn Aliyev Author-X-Name-First: Huseyn Author-X-Name-Last: Aliyev Title: “Unlikely Recruitsâ€: Why Politically Irrelevant Ethnic Minorities Participate in Civil Wars? Abstract: There is little research on why smaller ethnic groups with no political stakes in the conflict take part in civil wars. There is even less understanding as to why members of small ethnicities join ideologically distant conflict participants to fight against an enemy that does not directly threaten their ethnic security. This study describes these ethnic minority combatants as “unlikely recruits.†It argues that members of politically irrelevant minorities join stronger conflict participants—either governments or rebels—seeking to protect their ethnic interests from both their prospective hosts and their foes. Although the “unlikely recruits†have minimal grievances against enemies of their hosts and they receive limited participation rewards, forging an alliance with an actor which is likely to offer the highest benefits is sufficient to overcome the collective action problem. Recruiting members of smaller ethnic minorities in the context of ethnic civil wars allows armed actors to strengthen their image of ethnic diversity and all-inclusiveness, as well as to benefit from material resources provided by the “unlikely recruits.†These arguments are empirically tested using new evidence from Ukraine that offers a rare glimpse into the dynamics of politically irrelevant minorities’ participation in civil wars. Journal: Studies in Conflict & Terrorism Pages: 847-869 Issue: 6 Volume: 46 Year: 2023 Month: 6 X-DOI: 10.1080/1057610X.2020.1793457 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1793457 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:847-869 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1792737_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Maria-Louise Clausen Author-X-Name-First: Maria-Louise Author-X-Name-Last: Clausen Title: Unity, Segregation, and Obedience: Islamic State’s Use of Quranic Verses and How It Relates to State-Building Abstract: Too little attention has been given to Islamic States efforts to present itself as a more legitimate alternative to the nation-state. This is particularly surprising as IS’ claim to statehood has been a prominent element in IS’ self-branding. This article argues that IS understands itself as a form of political order superior to the state because it is a revival of the caliphate. This argument is made through an investigation of three key dimensions of how Islamic state uses Quranic quotes in Dabiq to undergird this notion of Islamic state as a more legitimate state, namely the need to avoid division (unity), the obligation to avoid disbelievers and fight them (segregation), and the necessity to obey God and by extension, the caliph (obedience). Journal: Studies in Conflict & Terrorism Pages: 870-887 Issue: 6 Volume: 46 Year: 2023 Month: 6 X-DOI: 10.1080/1057610X.2020.1792737 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792737 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:870-887 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1816676_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Wesley S. McCann Author-X-Name-First: Wesley S. Author-X-Name-Last: McCann Title: Who Said We Were Terrorists? Issues with Terrorism Data and Inclusion Criteria Abstract: This article examines the reliability of “terrorism†classifications within the Global Terrorism Database (GTD) by looking at its inclusion criteria as well as filtering mechanisms for ensuring quality case inclusion. Using several descriptive analyses, this article examines how various measures within the GTD affect researcher’s ability to adequately analyze various patterns or trends of offending. The underlying limitations of the data, namely data inclusion, the defining of terrorism, and inconsistency in labeling events are examined. It is concluded from the analyses that what is being defined as terrorism matters downstream when examining the data, given that it is used to make inferences about groups, movements, or the efficacy of governmental policy. Since scholars often lack a proper “error†framework for assessing the quality of big data derived from open sources on terrorism, it makes it difficult for scholars to assess the quality of the data itself. As a result, researchers are encouraged to include an error framework within the GTD for academics to assess the quality of the data they are plugging into their models. Results, limitations, and recommendations are further expanded upon within. Journal: Studies in Conflict & Terrorism Pages: 964-984 Issue: 6 Volume: 46 Year: 2023 Month: 6 X-DOI: 10.1080/1057610X.2020.1816676 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1816676 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:964-984 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1793452_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Sara Doering Author-X-Name-First: Sara Author-X-Name-Last: Doering Author-Name: Garth Davies Author-X-Name-First: Garth Author-X-Name-Last: Davies Author-Name: Raymond Corrado Author-X-Name-First: Raymond Author-X-Name-Last: Corrado Title: Reconceptualizing Ideology and Extremism: Toward an Empirically-Based Typology Abstract: The majority of contemporary research on terrorism and extremism has focused on jihadi extremism, while other ideologies have received far less attention. In response to this gap, the current study aims to compare the similarities and differences between jihadi, right-wing and left-wing extremists at the individual level. Using the Profiles of Individual Radicalization in the United States (PIRUS) dataset, a multinomial logistic regression model was used to compare individual-level characteristics across ideologies. Additionally, a two-step cluster analysis was conducted to determine whether these similarities and differences can provide additional insights into differentiating types of extremists generally based on their personal characteristics, regardless of their ideological adherence. The results of the multinomial logistic regression illustrate that there are notable differences across extremist ideologies, but also many similarities. Further exploring ways to better highlight individual-level differences, a cluster analysis revealed five distinct groups of extremists based on their personal characteristics, and demonstrate the utility of a typology of individual characteristics that is empirically derived and validated, and is not dependent on the a priori identification or specification of ideological motivation. Journal: Studies in Conflict & Terrorism Pages: 1009-1033 Issue: 6 Volume: 46 Year: 2023 Month: 6 X-DOI: 10.1080/1057610X.2020.1793452 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1793452 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:1009-1033 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1792733_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: James A. Piazza Author-X-Name-First: James A. Author-X-Name-Last: Piazza Title: White Demographic Anxiety and Support for Torture of Terrorism Suspects Abstract: In this study I use a survey experiment to test whether the prospect of White demographic decline affects attitudes toward treatment of terrorism suspects. I find that when White subjects are informed that Whites are projected to become a demographic minority in the United States by 2060 they are more likely to approve of the use of torture on terrorism suspects. In contrast, White subjects who are informed that Whites are expected to remain a demographic majority through 2030 are not. I also find that the effect of White decline salience on support for torture of terror suspects is mediated through a heighted perception of threat due to terrorism. Journal: Studies in Conflict & Terrorism Pages: 769-797 Issue: 6 Volume: 46 Year: 2023 Month: 6 X-DOI: 10.1080/1057610X.2020.1792733 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792733 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:769-797 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1800919_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bruce Hoffman Author-X-Name-First: Bruce Author-X-Name-Last: Hoffman Title: In Memoriam: Christopher Dickey, August 31, 1951–July 16, 2020 Journal: Studies in Conflict & Terrorism Pages: 767-768 Issue: 6 Volume: 46 Year: 2023 Month: 6 X-DOI: 10.1080/1057610X.2020.1800919 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1800919 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:767-768 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1792726_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Zoey Reeve Author-X-Name-First: Zoey Author-X-Name-Last: Reeve Title: Repeated and Extensive Exposure to Online Terrorist Content: Counter-Terrorism Internet Referral Unit Perceived Stresses and Strategies Abstract: U.K. Metropolitan Police Counter-Terrorism Internet Referral Unit (CTIRU) Case Officers (COs) are tasked with identifying, and facilitating the removal of material that breaches the Terrorism Act 2006. COs are extensively and repeatedly exposed to material deemed illegal and harmful (including but not restricted to graphic terrorist and non-terrorist material). However, there is little research on the impact of this work, or how COs manage and mitigate the risks of their roles. Semi-structured interviews reveal the adaptive coping mechanisms that promote good perceived health and wellbeing in CTIRU, as well as areas of concern and improvement. Journal: Studies in Conflict & Terrorism Pages: 888-912 Issue: 6 Volume: 46 Year: 2023 Month: 6 X-DOI: 10.1080/1057610X.2020.1792726 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1792726 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:6:p:888-912 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1531565_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Christopher Whyte Author-X-Name-First: Christopher Author-X-Name-Last: Whyte Title: Cryptoterrorism: Assessing the Utility of Blockchain Technologies for Terrorist Enterprise Abstract: Much recent policy discourse has pivoted on the relationship between terrorist campaigns and an emergent feature of the global financial landscape in the form of cryptocurrencies. Cryptocurrencies are a subset of digital currencies that are distributed by the developers thereof. The various unique features of cryptocurrencies have led to discussion in punditry about how terrorists could benefit from this new mode of financial transaction but few policy-oriented works and scholarly assessments exist to outline and assess this claim. This article describes cryptocurrencies, and assesses them in line with the operational realities of terrorist campaigns. I argue that, while there is limited evidence that terrorists are likely to disproportionately benefit from use of cryptocurrencies at present, there do exist unique opportunities for money laundering and revenue generation. Journal: Studies in Conflict & Terrorism Pages: 1126-1149 Issue: 7 Volume: 46 Year: 2023 Month: 7 X-DOI: 10.1080/1057610X.2018.1531565 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1531565 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1126-1149 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1531532_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Malin E. Wimelius Author-X-Name-First: Malin E. Author-X-Name-Last: Wimelius Author-Name: Malin Eriksson Author-X-Name-First: Malin Author-X-Name-Last: Eriksson Author-Name: John Kinsman Author-X-Name-First: John Author-X-Name-Last: Kinsman Author-Name: Veronica Strandh Author-X-Name-First: Veronica Author-X-Name-Last: Strandh Author-Name: Mehdi Ghazinour Author-X-Name-First: Mehdi Author-X-Name-Last: Ghazinour Title: What is Local Resilience Against Radicalization and How can it be Promoted? A Multidisciplinary Literature Review Abstract: In this research note, we present results from a review of research on local resilience in relation to radicalization in public health, social work, crisis management, and community policing using terrorism studies as a point of departure. In order to identify agreements between literatures, we focus on how local resilience is understood, how it is said to be promoted, and how this knowledge could be synthesized. We show that resilience by and large is understood as both a process and a capacity underpinned by cooperation, social networks, and community resources and that an initial mapping of existing strengths and resources is pivotal for local resilience-building. Journal: Studies in Conflict & Terrorism Pages: 1108-1125 Issue: 7 Volume: 46 Year: 2023 Month: 7 X-DOI: 10.1080/1057610X.2018.1531532 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1531532 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1108-1125 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1040293_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mahdieh Aghazadeh Khoei Author-X-Name-First: Mahdieh Author-X-Name-Last: Aghazadeh Khoei Title: Iran's Security and the Islamic State through the Lenses of the Copenhagen School Abstract: After the Cold War, a new generation of security studies emerged that moved debates beyond traditional, narrow, state-centric definitions of security toward considering other aspects like economic, political, social, and environmental contexts. This article evaluates one such contemporary important security concern—the threat of the Islamic State (IS), mainly against Iran, in the framework of the Copenhagen School security approach. The analysis concludes that IS threatens Iran's security by increasing the possibility of Kurdish sectarianism, widening the Shi’ite–Sunni gap, creating economic threats, decreasing Iran's influence in Syria, and challenging its power in the region. Analyzing Iran's stance against IS and the ensuing security debate is important to predict the future of the Middle East. Journal: Studies in Conflict & Terrorism Pages: 1035-1041 Issue: 7 Volume: 46 Year: 2023 Month: 7 X-DOI: 10.1080/1057610X.2015.1040293 File-URL: http://hdl.handle.net/10.1080/1057610X.2015.1040293 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1035-1041 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1818435_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jessica White Author-X-Name-First: Jessica Author-X-Name-Last: White Title: Gender in Countering Violent Extremism Program Design, Implementation and Evaluation: Beyond Instrumentalism Abstract: Using a countering violent extremism program as a case study, this article highlights the conceptual and practical challenges for meaningful inclusion of gender in security programing. Gender mainstreaming is commonly cited as a goal for stakeholders. Unfortunately, the security framework under which many counterterrorism programs are implemented and the general lack of understanding around the complexity of gender has often led to failures for meaningful inclusion in program design and evaluation. This article argues that a gender-sensitive approach is needed for effective countering violent extremism programing and counterterrorism policy, therefore is needed to create a more secure world for all individuals. Journal: Studies in Conflict & Terrorism Pages: 1192-1215 Issue: 7 Volume: 46 Year: 2023 Month: 7 X-DOI: 10.1080/1057610X.2020.1818435 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1818435 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1192-1215 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1529359_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Adis Duderija Author-X-Name-First: Adis Author-X-Name-Last: Duderija Title: The Salafi Worldview and the Hermeneutical Limits of Mainstream Sunni Critique of Salafi-Jihadism Abstract: The aim of this article is to point to the hermeneutical limits of the critique of mainstream Sunnism vis-a-vis the Salafi-jihadist interpretations with particular reference to the literature produced by the proponents of the IS. The main argument the article makes is that by subscribing to what will be termed a “Salafi worldview,†mainstream Sunnism shares many interpretationally crucial epistemological and methodological mechanisms with those adopted by the proponents of the ideology behind the IS. As such mainstream Sunnism has strong hermeneutical limits that do not allow it to be in a position to mount an interpretationally effective rebuttal of many beliefs and practices Salafi-jihadists resort to including those pertaining to apostasy, enslavement, and gender-related issues. Journal: Studies in Conflict & Terrorism Pages: 1072-1087 Issue: 7 Volume: 46 Year: 2023 Month: 7 X-DOI: 10.1080/1057610X.2018.1529359 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1529359 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1072-1087 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1538187_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tom Christensen Author-X-Name-First: Tom Author-X-Name-Last: Christensen Author-Name: Per Lægreid Author-X-Name-First: Per Author-X-Name-Last: Lægreid Author-Name: Lise H. Rykkja Author-X-Name-First: Lise H. Author-X-Name-Last: Rykkja Title: How to Balance Individual Rights and Societal Security? The View of Civil Servants Abstract: How do Norwegian government officials perceive the dilemma between liberty and security after the 2011 terrorist attacks? A survey from 2016 shows that the central government officials’ attitudes are rather similar to the general population. Both are willing to trade individual rights for more societal security. Structural, cultural, and demographic features explain variations in the civil servants’ views. Position and perceptions of crisis management capacity make a difference. Officials responsible for crisis management are more willing to prioritize security. Low conflict, high trust, and a strong identification with central government creates support for security measures. Furthermore, age and gender matter. Journal: Studies in Conflict & Terrorism Pages: 1150-1166 Issue: 7 Volume: 46 Year: 2023 Month: 7 X-DOI: 10.1080/1057610X.2018.1538187 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1538187 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1150-1166 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1680184_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daveed Gartenstein-Ross Author-X-Name-First: Daveed Author-X-Name-Last: Gartenstein-Ross Author-Name: Samuel Hodgson Author-X-Name-First: Samuel Author-X-Name-Last: Hodgson Author-Name: Daniele Bellutta Author-X-Name-First: Daniele Author-X-Name-Last: Bellutta Author-Name: Chiara Pulice Author-X-Name-First: Chiara Author-X-Name-Last: Pulice Author-Name: V.S. Subrahmanian Author-X-Name-First: V.S. Author-X-Name-Last: Subrahmanian Title: When Jihadist Factions Split: A Data-Driven Network Analysis Abstract: This article investigates group fragmentation in the al-Qaeda and Islamic State ecosystems, employing network analysis to examine the impact of specific network conditions on the probability of a faction splitting. Using new datasets of faction–faction (FF) and terrorist–terrorist (TT) relationships, the article tests 18 hypotheses exploring connections between factional splits and the number, polarity, and strength of FF and TT relationships, among other factors. The article offers three major findings. First, a greater number of relationships between factions is positively correlated with the probability of fragmentation. Second, having a small or moderate number of a faction’s members belonging to another faction increases the probability of a split, but more significant cross-factional membership decreases the probability. Third, both high-degree centrality of a faction’s leader and significant variations in the degree centrality within a faction’s leadership structure is correlated with increased probability of a split. Journal: Studies in Conflict & Terrorism Pages: 1167-1191 Issue: 7 Volume: 46 Year: 2023 Month: 7 X-DOI: 10.1080/1057610X.2019.1680184 File-URL: http://hdl.handle.net/10.1080/1057610X.2019.1680184 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1167-1191 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1816682_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nils Hägerdal Author-X-Name-First: Nils Author-X-Name-Last: Hägerdal Title: Starvation as Siege Tactics: Urban Warfare in Syria Abstract: Famine is on the rise across conflict zones worldwide. Yet in Syria – unlike other contemporary wars – the phenomenon is concentrated in urban areas, and intensified significantly after 2015. To explain these outcomes I delve into the nature of urban warfare. Urban combat operations favor the defender, and many military organizations resort to siege warfare to conquer urban territory; starvation remains a powerful siege tactic. Qualitative evidence on all sieges conducted inside Syria, where a majority of the prewar population lived in urban areas, shows how its regime forces constitute a prime example of this process. Journal: Studies in Conflict & Terrorism Pages: 1241-1262 Issue: 7 Volume: 46 Year: 2023 Month: 7 X-DOI: 10.1080/1057610X.2020.1816682 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1816682 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1241-1262 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1816683_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Juan Del Rio Author-X-Name-First: Juan Author-X-Name-Last: Del Rio Title: Do Vigilante Groups Reduce Cartel-Related Violence? An Empirical Assessment of Crime Trends in Michoacán, Mexico Abstract: When the Knights Templar cartel targeted the people of Michoacán, vigilantes formed for protection. This study uses a paired sample t-test to investigate the effect that the emergence and subsequent removal of the vigilantes and their confrontational approach against the Knights Templar had on cartel-related crimes. Initially, homicides increased in vigilante areas, while kidnappings and extortions decreased. After vigilantes were removed, homicides and kidnappings increased, while extortions decreased. Government removal of vigilantes allowed for a power vacuum to ensue, allowing violence to increase. Therefore, violence initially increases with vigilante presence, then decreases, while increasing again once the group is removed. Journal: Studies in Conflict & Terrorism Pages: 1216-1240 Issue: 7 Volume: 46 Year: 2023 Month: 7 X-DOI: 10.1080/1057610X.2020.1816683 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1816683 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1216-1240 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1531517_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Blake Campbell Author-X-Name-First: Blake Author-X-Name-Last: Campbell Author-Name: Amanda Murdie Author-X-Name-First: Amanda Author-X-Name-Last: Murdie Title: Keep the Informants Talking: The Pursuit and Use of CBRN Weapons by Terrorist Organizations Abstract: What factors affect the likelihood that violent nonstate actors pursue and use chemical, biological, radiological, or nuclear (CBRN) weapons? What factors make a country at-risk for a CBRN terrorist attack? We argue that widespread repressive practices, also termed human rights abuses, are especially problematic in the fight to stop the pursuit or use of CBRN weapons. Repression by government forces severs ties between civilians and their government, leading those with knowledge of attacks to refrain from turning over necessary information. We test our argument quantitatively using data from the Big Allied and Dangerous Project and the Global Terrorism Database. Our results highlight how efforts taken to limit the use of repression may be an effective strategy to reduce risks of CBRN terrorism. Journal: Studies in Conflict & Terrorism Pages: 1088-1107 Issue: 7 Volume: 46 Year: 2023 Month: 7 X-DOI: 10.1080/1057610X.2018.1531517 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1531517 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1088-1107 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1926069_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Isaac Kfir Author-X-Name-First: Isaac Author-X-Name-Last: Kfir Title: Innovating to Survive, a Look at How Extremists Adapt to Counterterrorism Abstract: This paper examines the under-studied area of innovation and terrorism. Beyond exploring the debate on the difference between creativity and innovation and how it impacts terrorist groups, the paper also reviews the typology of terrorist innovation and of the law of unintended consequences. The presence of terrorist groups in the online gaming world is an example of creativity and innovation as the groups recognize that counterterrorist policies have limited their ability to communicate with potential recruits. Consequently, extremists have had to find new avenues to communicate with supporters and attract potential recruits as they are determined to survive. Security agencies must also ensure that they are also thinking ‘outside the box’ as only through creativity can they stay one-step ahead of their adversaries. Journal: Studies in Conflict & Terrorism Pages: 1263-1281 Issue: 7 Volume: 46 Year: 2023 Month: 7 X-DOI: 10.1080/1057610X.2021.1926069 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1926069 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1263-1281 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1529353_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jennifer Philippa Eggert Author-X-Name-First: Jennifer Philippa Author-X-Name-Last: Eggert Title: Female Fighters and Militants During the Lebanese Civil War: Individual Profiles, Pathways, and Motivations Abstract: This article offers an analysis of women’s profiles, pathways, and motivations to join the Lebanese civil war (1975 to 1990), with a particular focus on female fighters militants involved with Harakat Amal, Kataeb, the Progressive Socialist Party, Lebanese Communist Party, Fatah and the Popular Front for the Liberation of Palestine. The article contributes to existing debates on women’s motivations to join nonstate armed groups by examining both militias that included female fighters and those that did not. It is the first study so far that analyses the profiles and motivations of female fighters and militants within all major militias during the Lebanese civil war. Journal: Studies in Conflict & Terrorism Pages: 1042-1071 Issue: 7 Volume: 46 Year: 2023 Month: 7 X-DOI: 10.1080/1057610X.2018.1529353 File-URL: http://hdl.handle.net/10.1080/1057610X.2018.1529353 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:7:p:1042-1071 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1816681_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Marta Furlan Author-X-Name-First: Marta Author-X-Name-Last: Furlan Title: Rebel Governance at the Time of Covid-19: Emergencies as Opportunities for Rebel Rulers Abstract: As Covid-19 has spread worldwide, not only governments but also rebel rulers have had to face the crisis. Therefore, it is important to understand whether exogenous shocks pose to rebel rulers the same challenges they pose to governments. To answer this question, I will refer to the academic literature and I will study two insurgent groups that have been confronted by coronavirus – Hayat Tahrir al-Sham and the Taliban. Following the case studies, I will argue that while emergencies pose great challenges to governments, they provide rebel rulers with an opportunity to project themselves as more credible and legitimate rulers. Journal: Studies in Conflict & Terrorism Pages: 1440-1463 Issue: 8 Volume: 46 Year: 2023 Month: 8 X-DOI: 10.1080/1057610X.2020.1816681 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1816681 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1440-1463 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1836847_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rogelio Alonso Author-X-Name-First: Rogelio Author-X-Name-Last: Alonso Author-Name: Jesús Castán Author-X-Name-First: Jesús Author-X-Name-Last: Castán Title: The Barcelona and Cambrils Attacks: A Case Study of the Impact of Political Decentralization and Separatism on Counter Terrorism Policing Abstract: This article analyses how counter terrorism policing before and after the August 2017 jihadi attacks in Catalonia was negatively affected by two factors: the Spanish policing model based on a decentralized security system and the independentist challenge posed by the Catalan Government. Firstly, the article assesses the political and legal framework vis-à -vis security in a quasi-federal democracy like Spain. Secondly, it analyzes how the police response to the jihadist threat was impacted by this multilayer system structured around a central government, seventeen autonomous regions, two autonomous cities, and over eight thousand local councils. Thirdly, the article examines how the challenge posed by independentists in the Autonomous region of Catalonia, who in 2017 attempted to break away from Spain in defiance of the Spanish Constitution, exacerbated the structural problems of the security system. It concludes that the combination of several factors in a particularly conflictive political environment led to the failure of counter terrorism policing on three levels: proactive, preventive, and reactive. Journal: Studies in Conflict & Terrorism Pages: 1393-1416 Issue: 8 Volume: 46 Year: 2023 Month: 8 X-DOI: 10.1080/1057610X.2020.1836847 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1836847 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1393-1416 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1846252_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Philippe Le Billon Author-X-Name-First: Philippe Author-X-Name-Last: Le Billon Title: Oil and the Islamic State: Revisiting “Resource Wars†Arguments in Light of ISIS Operations and State-Making Attempts Abstract: Debates over the relationship between natural resources and armed conflicts have flourished in the past two decades, but few studies have considered the case of oil and the Islamic State in Iraq and Syria. This paper reviews key scholarly arguments concerning the relationship between natural resources and armed groups, and examines the interrelationship between oil, armed conflict and ISIS. Building on this analysis, the paper offers insights into dilemmas of oil dependence for non-state armed groups controlling proto-states: specifically, while oil enabled ISIS to consolidate its attempts at establishing a de facto state, it also created vulnerabilities. Among these, U.S.-led forces deliberately targeted oil to deny ISIS’ attempts to achieve statehood, and to politically confine its status to that of a terrorist organization ruling over an oil rich and dangerous proto-state targeted for military and political eradication. These findings point to the value of nuanced analyses of relations between resource wars arguments and terrorism studies, as well as the need to more broadly consider the various political dimensions of natural resources in the study of armed conflicts and campaigns against terrorist organizations. Journal: Studies in Conflict & Terrorism Pages: 1417-1439 Issue: 8 Volume: 46 Year: 2023 Month: 8 X-DOI: 10.1080/1057610X.2020.1846252 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1846252 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1417-1439 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1822591_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Giampiero Giacomello Author-X-Name-First: Giampiero Author-X-Name-Last: Giacomello Title: Research Note: More Bucks, Still No Bangs? Why a Cost-Benefit Analysis of Cyberterrorism Still Holds True Abstract: Taking as reference a cost-benefit analysis of cyberterrorism published in 2004 by Studies in Conflict and Terrorism, this article briefly reviews what happened in the last 15 years in cyberterrorism research, what was correctly forecast, what was wrong and what may happen in the future. Some of the analyses published in during this period have been accurate, indicating that terrorists would use the Web and then social media for supporting operations in financing, recruiting and, especially “propaganda†(information operations), instead of wasting resources in ineffectual cyberattacks against critical infrastructures. The same analyses, however, did not appreciate enough how successful information operations by terrorist groups would have been. Overall, the approach, research methods, findings and forecasting have been quite valid and fruitful and thus they can represent a solid foundation on which scholars of (cyber)terrorism may base their future research. Journal: Studies in Conflict & Terrorism Pages: 1508-1517 Issue: 8 Volume: 46 Year: 2023 Month: 8 X-DOI: 10.1080/1057610X.2020.1822591 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1822591 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1508-1517 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1835002_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Niklas Karlén Author-X-Name-First: Niklas Author-X-Name-Last: Karlén Title: Escalate to De-Escalate? External State Support and Governments’ Willingness to Negotiate Abstract: Policymakers sometimes argue that material assistance to rebels involved in a civil war can create a ‘ripe moment’ that is favorable for negotiations. Ripeness theory provides support for this idea. However, this notion has never been systematically assessed. This article evaluates this claim by using global data on negotiations in all intrastate armed conflicts from 1975 to 2009. Contrary to popular belief, the article demonstrates that external state support to rebel groups does not increase the prospect of negotiations. Instead, the results suggest that external support is likely to reduce the likelihood of negotiations between the warring parties, especially if the state sponsor is a great power. The study contributes to our understanding of civil war processes by demonstrating that military assistance hinders rather than promotes the onset of negotiations and by questioning the utility of ripeness theory as the most suitable framework for understanding this phenomenon. Journal: Studies in Conflict & Terrorism Pages: 1323-1344 Issue: 8 Volume: 46 Year: 2023 Month: 8 X-DOI: 10.1080/1057610X.2020.1835002 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1835002 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1323-1344 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1841242_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nicolò Scremin Author-X-Name-First: Nicolò Author-X-Name-Last: Scremin Title: Family Matters: A Preliminary Framework for Understanding Family Influence on Islamist Radicalization Abstract: This explorative study presents some theoretical reflections on the influence that family may exert in the context of Islamist radicalization. In doing so, a new preliminary framework consisting of four levels of analysis is introduced and its relevance illustrated using examples from the Palestinian, Indonesian, Chechen and, more broadly, Western context. If sufficiently adaptive, the proposed framework may not only raise the analyst’s awareness of the “bigger picture†in which family’s influence on radicalization should be investigated. It can also serve as a useful analytical model to uncover certain trends and characteristics of family’s attitudes toward terrorism in specific contexts, rendering the framework valuable from both a theoretical and practical analysis. Journal: Studies in Conflict & Terrorism Pages: 1491-1507 Issue: 8 Volume: 46 Year: 2023 Month: 8 X-DOI: 10.1080/1057610X.2020.1841242 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1841242 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1491-1507 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1841197_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: George Kassimeris Author-X-Name-First: George Author-X-Name-Last: Kassimeris Title: What I Have Learned about Countering Terrorism in the UK: A Conversation with Robert Spencer Abstract: Bob Spencer served as senior investigating officer and a specialist senior investigating officer for terrorism for the West Midlands Police in the U.K. Almost immediately after the 7/7 attacks in London, he was made Head of Intelligence for the West Midlands CTU. West Midlands being assessed at the time to have had the highest terrorism threat in the U.K. outside the capital, Spencer was invited to head the delivery of the governments Prevent agenda within the Regional Counter Terrorism Unit, with responsibility for embedding the strategy across four regional forces. Spencer retired from the force in 2012 but continued to advise various organizations around their compliance with terrorism regulations and particularly their organizational security and preparedness. In June 2016, he was appointed the Prevent Coordinator for Walsall Council in the West Midlands, retiring from the role in 2019. Journal: Studies in Conflict & Terrorism Pages: 1518-1527 Issue: 8 Volume: 46 Year: 2023 Month: 8 X-DOI: 10.1080/1057610X.2020.1841197 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1841197 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1518-1527 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1862737_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kira Jumet Author-X-Name-First: Kira Author-X-Name-Last: Jumet Author-Name: Zana Gulmohamad Author-X-Name-First: Zana Author-X-Name-Last: Gulmohamad Title: Reframing the Campaign: From Egypt’s Ansar Bayt al-Maqdis to Wilayat Sinai, Islamic State’s Sinai Province Abstract: The article employs collective action framing theory to explore Egyptian violent Islamist group Ansar Bayt al-Maqdis’s (ABM’s) frames, which altered when it became Islamic State’s Sinai Province (IS-SP), Wilayat Sinai (WS). Using data from 40 videos and audio recordings released by the group in all three of its forms (al-Tawhid Wal-Jihad/TWJ, ABM, and WS), along with additional material disseminated by Islamic State Central, the article identifies transformations in the group’s frames in response to changes in the political environment and need for external support. When ABM became WS, it mimicked IS’s aggressive and transnational approach to framing and tactics. Journal: Studies in Conflict & Terrorism Pages: 1464-1490 Issue: 8 Volume: 46 Year: 2023 Month: 8 X-DOI: 10.1080/1057610X.2020.1862737 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862737 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1464-1490 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1822593_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Vidar B. Skretting Author-X-Name-First: Vidar B. Author-X-Name-Last: Skretting Title: Al-Qaida in the Islamic Maghrib’s Expansion in the Sahara: New Insights from Primary Sources Abstract: Although originating in Algeria, AQIM and its allies had by 2012 become so entrenched in the Sahel that they were in de-facto control of vast swathes of territory in northern Mali. This article explains how and why GSPC/AQIM established itself in the Sahel, and why the group eventually decided to take the fight to the Sahelian countries, where they had previously found sanctuary. Relying on hitherto unused primary sources, this article is the first to show that the leadership of AQIM and al-Qaida Central did not want to engage in direct conflicts with the Sahelian states. The eventual shift of strategy in the region was brought about by the increasing numbers of Sahelians in AQIM's southern brigades. Journal: Studies in Conflict & Terrorism Pages: 1368-1392 Issue: 8 Volume: 46 Year: 2023 Month: 8 X-DOI: 10.1080/1057610X.2020.1822593 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1822593 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1368-1392 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1862774_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gabriel Toole Author-X-Name-First: Gabriel Author-X-Name-Last: Toole Title: Research Note: Deception, Drugs, & Death: Interviews with Survivors of al-Shabaab’s Youth Recruitment Traps in Kenya Abstract: The following paper consists of interviews with former members of Harakat al-Shabaab al-Mujahideen (al-Shabaab), recruited in Kenya between 2008 and 2017. Their stories shed light on al-Shabaab’s compartmentalized network of recruiters in Kenya. These individuals are tasked with recruiting disadvantaged youth from Kenya, in order to supply al-Shabaab’s camps in Somalia with a steady stream of expendable soldiers. The similarities between interviews emphasizes al-Shabaab’s role as human traffickers, highlights the under researched connection between al-Shabaab and the illicit drug trade, and reiterates the fact that government corruption is a significant hinderance to future counter-terrorism efforts. Journal: Studies in Conflict & Terrorism Pages: 1345-1367 Issue: 8 Volume: 46 Year: 2023 Month: 8 X-DOI: 10.1080/1057610X.2020.1862774 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862774 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1345-1367 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1830573_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Adam Ghazi-Tehrani Author-X-Name-First: Adam Author-X-Name-Last: Ghazi-Tehrani Author-Name: Erin M. Kearns Author-X-Name-First: Erin M. Author-X-Name-Last: Kearns Title: Biased Coverage of Bias Crime: Examining Differences in Media Coverage of Hate Crimes and Terrorism Abstract: News media differentially cover violence based on social identity. How does media bias apply to terrorist attacks—typically “upward crimes†where perpetrators hold less power than targets—that are also hate crimes—typically “downward crimesâ€? We compare coverage of incidents that are both terrorist attacks and hate crimes to coverage of incidents that are just terrorism in the U.S. from 2006 to 2015. Attacks that are also hate crimes receive less media attention. Articles are more likely to reference hate crimes when the perpetrator is unknown and more likely to reference terrorism when the perpetrator is non-white in some models. Journal: Studies in Conflict & Terrorism Pages: 1283-1303 Issue: 8 Volume: 46 Year: 2023 Month: 8 X-DOI: 10.1080/1057610X.2020.1830573 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1830573 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1283-1303 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1862818_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jessica M. Grosholz Author-X-Name-First: Jessica M. Author-X-Name-Last: Grosholz Author-Name: Zacharias P. Pieri Author-X-Name-First: Zacharias P. Author-X-Name-Last: Pieri Title: “A Skinhead at Heart with a Hate-Filled Mindâ€: Understanding the Themes Present in the White Power Music Scene Abstract: White extremism in the U.S. has not received much attention in the literature, despite scholars arguing that it represents the most sustained form of terrorism in the U.S. While much of the research on extremist movements has focused on the groups’ violent acts, there has been significantly less attention on the nonviolent activities, such as music. Following a social movement theoretical framework, we set out to understand the role that music plays in constructing the worldview and narrative of white extremists. Using lyrics from 337 white power songs from seven white power bands, we analyzed the linear and interconnected narrative that emerges in the music. What we found is a narrative interwoven throughout the music that presents a clear picture of white societies under threat from immigration, the Jewish-controlled media, and liberalism, with clear directives for extreme violence and vigilante justice. Based on this picture, we discuss the potential counterextremism implications and provide several avenues for future research. Journal: Studies in Conflict & Terrorism Pages: 1304-1322 Issue: 8 Volume: 46 Year: 2023 Month: 8 X-DOI: 10.1080/1057610X.2020.1862818 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862818 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:8:p:1304-1322 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1892604_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Reyhan Topal Author-X-Name-First: Reyhan Author-X-Name-Last: Topal Title: An Empirical Assessment of China’s Counterterrorism Efforts and Securitization of Turkic Muslims Abstract: Why does China view its Turkic Muslims as a security threat? Although scholars have written a good deal on China’s repression of minorities, the number of empirical studies about China’s ever-expanding incarceration and surveillance of Turkic Muslims is rather limited. To identify the reasons for China’s repressive policies, this article draws evidence from Xinjiang Victims Database that presents video testimonies of 8973 people whose family members and friends are in China’s prisons and detention camps. The evidence shows that China’s policies stem from a constructivist securitization approach where religion, culture and identity play central roles although the country frames its policies through a realist discourse on terrorism and security. Journal: Studies in Conflict & Terrorism Pages: 1745-1765 Issue: 9 Volume: 46 Year: 2023 Month: 9 X-DOI: 10.1080/1057610X.2021.1892604 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1892604 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1745-1765 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1872163_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Dina Sharipova Author-X-Name-First: Dina Author-X-Name-Last: Sharipova Author-Name: Serik Beissembayev Author-X-Name-First: Serik Author-X-Name-Last: Beissembayev Title: Causes of Violent Extremism in Central Asia: The Case of Kazakhstan Abstract: The article focuses on causes of violent extremism in Kazakhstan by looking at the violent attacks on law-enforcement bodies in 2011 and 2016 in Aqtobe, Almaty, and Atyrau. Drawing on interviews with the convicted extremists, we argue that criminal youth subculture, grievances, the Salafi-jihadist ideology, and propaganda in the Internet have promoted extremist violence in Kazakhstan. We also make a brief comparative analysis of European jihadists and violent extremists in Kazakhstan, highlighting some important similarities and differences across the regions. Journal: Studies in Conflict & Terrorism Pages: 1702-1724 Issue: 9 Volume: 46 Year: 2023 Month: 9 X-DOI: 10.1080/1057610X.2021.1872163 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1872163 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1702-1724 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1862752_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kira Harris Author-X-Name-First: Kira Author-X-Name-Last: Harris Title: A Hybrid Threat: The Night Wolves Motorcycle Club Abstract: Hybrid threat actors are dynamic and often intentionally disguise their intentions. While the Russian motorcycle club Night Wolves dress comparably to outlaw motorcycle gangs, open source materials describe the club as posing a distinctly different national security threat. The Night Wolves’ ambiguity and covert activities make the club hard to analyze; however, this case study uses open source materials to provide insight into their activities and characteristics across an array of security domains. International incidents indicate members and associates have the capability and resources to engage in crime, corruption and politically-motivated violence both for personal interests, as well as the furtherance of Russian goals. Journal: Studies in Conflict & Terrorism Pages: 1784-1816 Issue: 9 Volume: 46 Year: 2023 Month: 9 X-DOI: 10.1080/1057610X.2020.1862752 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862752 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1784-1816 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1886427_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rotem Dvir Author-X-Name-First: Rotem Author-X-Name-Last: Dvir Author-Name: Nehemia Geva Author-X-Name-First: Nehemia Author-X-Name-Last: Geva Author-Name: Arnold Vedlitz Author-X-Name-First: Arnold Author-X-Name-Last: Vedlitz Title: Unpacking Public Perceptions of Terrorism: Does Type of Attack Matter? Abstract: The study explores terrorism threat perceptions, focusing on the American public’s views of conventional and cyber-terrorism methods. Based on a national survey data, we find that when asked about the likelihood and the extent of threat associated with each type of terror method, citizens make clear and significant distinctions. Furthermore, these distinctions translate to variations in counter-terrorism policy preferences. Our analyses reveal that, considering the low level of knowledge of complex security issues, measuring citizens’ `true attitudes’ requires using survey instruments with lower level of abstraction, which force respondents to ‘stop and think’, and better reflect their associated opinions. Journal: Studies in Conflict & Terrorism Pages: 1575-1598 Issue: 9 Volume: 46 Year: 2023 Month: 9 X-DOI: 10.1080/1057610X.2021.1886427 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1886427 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1575-1598 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1888404_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Erin Saltman Author-X-Name-First: Erin Author-X-Name-Last: Saltman Author-Name: Farshad Kooti Author-X-Name-First: Farshad Author-X-Name-Last: Kooti Author-Name: Karly Vockery Author-X-Name-First: Karly Author-X-Name-Last: Vockery Title: New Models for Deploying Counterspeech: Measuring Behavioral Change and Sentiment Analysis Abstract: The counterterrorism and CVE community has long questioned the effectiveness of counterspeech in countering extremism online. While most evaluation of counterspeech rely on limited reach and engagement metrics, this paper explores two models to better measure behavioral change and sentiment analysis. Conducted via partnerships between Facebook and counter-extremism NGOs, the first model uses A/B testing to analyze the effects of counterspeech exposure on low-prevalence-high-risk audiences engaging with Islamist extremist terrorist content. The second model builds upon online safety intervention approaches and the Redirect Method through a search based “get-help†module, redirecting white-supremacy and Neo-Nazi related search-terms to disengagement NGOs. Journal: Studies in Conflict & Terrorism Pages: 1547-1574 Issue: 9 Volume: 46 Year: 2023 Month: 9 X-DOI: 10.1080/1057610X.2021.1888404 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1888404 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1547-1574 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1862850_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Emily Blout Author-X-Name-First: Emily Author-X-Name-Last: Blout Author-Name: Patrick Burkart Author-X-Name-First: Patrick Author-X-Name-Last: Burkart Title: White Supremacist Terrorism in Charlottesville: Reconstructing ‘Unite the Right’ Abstract: The “Unite the Right†rally that subsumed Charlottesville, Virginia in 2017 will be remembered for its haunting torch-lit rally, massive display of neo-Nazi and white nationalist paraphernalia, bloody riots, and murderous car attack. Despite extensive media coverage, a comprehensive, scholarly, synthetic study of the planning and execution of the Unite the Right (UtR) has yet to emerge. Drawing from a repository of 5,000 primary texts and digital artifacts and using the lens of symbolic interactionism and levels of analysis theory, this study details the event as manifested in three theatres: symbolically mediated, systems-technical, and physical. Three findings are discussed: first, the “event†was centrally organized as a simulacrum of a military campaign; second, the agitational propaganda and information warfare was extensive and designed to publicize, recruit, and terrorize; and third, the city of Charlottesville suffered two cyber-attacks timed for meaningful symbolic interaction with movement actors and public officials. Based on these three findings, the authors offer the term “immersive terrorism†to describe the extended, trans-mediated, multi-theatre nature of the UtR terror campaign. Journal: Studies in Conflict & Terrorism Pages: 1624-1652 Issue: 9 Volume: 46 Year: 2023 Month: 9 X-DOI: 10.1080/1057610X.2020.1862850 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862850 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1624-1652 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1868097_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Asya Metodieva Author-X-Name-First: Asya Author-X-Name-Last: Metodieva Title: The Radical Milieu and Radical Influencers of Bosnian Foreign Fighters Abstract: This research note looks at the radical influencers of Bosnian foreign fighters. This group is important, as the Balkan region has been seen as a spot of jihadist activism and recruitment for the IS and Al-Nusra Front. Previous research on foreign fighters emphasized that a small number of individuals (religious leaders, former combatants, and others) at the local level play a significant role in this recruitment. The influence of such figures results in hotspots of radical activism, which are called “power centers†here. This research note argues that such dynamics are likely to be even more evident in postwar societies due to state weaknesses, which create more power for social actors and inhibit counterterrorism. The paper also analyses the role of leader-led radical “institutions†that have appeared after the Bosnian War. By doing so, it stresses the significance of local radical influencers in the recruitment of Bosnian foreign fighters. The research note shows that radical influencers in postwar radical milieus manage to “institutionalize†their authority by filling the void left by domestic war(s) with life guidance and religious values. The paper provides insights into the social relations, authority and decision-making connected with foreign fighter departures to Syria and Iraq (2012-2016). Journal: Studies in Conflict & Terrorism Pages: 1725-1744 Issue: 9 Volume: 46 Year: 2023 Month: 9 X-DOI: 10.1080/1057610X.2020.1868097 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1868097 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1725-1744 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1862895_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stephane J. Baele Author-X-Name-First: Stephane J. Author-X-Name-Last: Baele Author-Name: Lewys Brace Author-X-Name-First: Lewys Author-X-Name-Last: Brace Author-Name: Travis G. Coan Author-X-Name-First: Travis G. Author-X-Name-Last: Coan Title: Uncovering the Far-Right Online Ecosystem: An Analytical Framework and Research Agenda Abstract: Recent years have seen a substantial increase in far-right inspired attacks. In this context, the present article offers an analytical framework for the study of right-wing extremists’ multifaceted and fast-growing activity on the Internet. Specifically, we conceptualize the far-right online presence as a dynamic ecosystem, teasing out four major components that correspond to the different levels of analysis available to future research. We illustrate the benefits of this framework with key illustrative examples from the English-, French-, and German- speaking far-right, revealing the worrying size and breadth – but also heterogeneity – of today’s far-right online ecosystem. Journal: Studies in Conflict & Terrorism Pages: 1599-1623 Issue: 9 Volume: 46 Year: 2023 Month: 9 X-DOI: 10.1080/1057610X.2020.1862895 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862895 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1599-1623 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1868095_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Boaz Ganor Author-X-Name-First: Boaz Author-X-Name-Last: Ganor Title: A Typology of Terrorist Attacks: The “32 Profiles†Model Abstract: Typologies of terrorist attacks enable researchers to analyze the complex phenomenon of terrorism in an organized manner, while facilitating the formulation of effective counter-terrorism policies. This paper contributes to the literature on typologies of terrorism by proposing a new conceptual model which classifies the various terrorist attacks that take place around the world according to two axes of reference: (1) the extent to which a terrorist organization is involved in the attack, and (2) The nature of interaction of the attacker/s with others. By placing the properties of various attacks on both axes, this article presents a new methodology that creates a typology of 32 different profiles of terrorist attacks, which can be grouped into 15 prototypes. The proposed model facilitates the examination of different types of terrorist attacks, while opening up new avenues of research. Journal: Studies in Conflict & Terrorism Pages: 1529-1546 Issue: 9 Volume: 46 Year: 2023 Month: 9 X-DOI: 10.1080/1057610X.2020.1868095 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1868095 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1529-1546 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1868099_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: A. S. M. Ali Ashraf Author-X-Name-First: A. S. M. Ali Author-X-Name-Last: Ashraf Author-Name: Mohammed Saiful Islam Author-X-Name-First: Mohammed Saiful Author-X-Name-Last: Islam Title: Islamist Militant Groups and Crime-Terror Nexus in Bangladesh Abstract: This paper employs a mixed-method approach to explore the criminal nexus of Islamist militant groups operating in Bangladesh. Data for 98 (14%) of 710 militants profiled in this study suggest various types of criminal involvement. By blending a qualitative social network analysis of top leaders from four militant groups, we find a much better picture of how terrorists pursue the strategies of appropriation, cooperation or transformation in developing criminal nexus. Findings also reveal the organizational level at which terrorists interact with criminals, and the processes through which they use marketplace interactions, prison-based radicalization, and virtual crime-linkage to expand their operations. Journal: Studies in Conflict & Terrorism Pages: 1678-1701 Issue: 9 Volume: 46 Year: 2023 Month: 9 X-DOI: 10.1080/1057610X.2020.1868099 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1868099 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1678-1701 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1868094_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Barak Mendelsohn Author-X-Name-First: Barak Author-X-Name-Last: Mendelsohn Title: The Limits of Ideologically-Unlikely Partnerships: Syria’s Support for Jihadi Terrorist Groups Abstract: Why did Syria collaborate with al-Qaeda’s Iraqi branch after 2003 and with ISIS during the Syrian civil war? States’ support for terrorist groups is risky, but cooperation with jihadi actors who see the Syrian regime as an enemy and wish to impose a radical Islamic rule in its stead is particularly dangerous. This paper argues that such ideologically-unlikely partnerships reveal the workings of the instrumental logic behind state-sponsored terrorism. Collaborating with terrorist groups is a rational strategy. States such as Syria will partner with ideologically-incompatible terrorist groups when they judge there to be a greater and more urgent threat from a third actor; when they believe the partnership would give them unique capabilities or produce special, otherwise unattainable effects; and when they believe they can shield themselves from the relationship’s potential adverse effects. The Syrian case also shows that such a pairing is likely to have limited utility. In order to have meaningful impact, the terrorist group must have a significant role, but the greater this role is, the higher the direct danger the group poses to its ally and the greater the likelihood of international action against the sponsoring state. Journal: Studies in Conflict & Terrorism Pages: 1653-1677 Issue: 9 Volume: 46 Year: 2023 Month: 9 X-DOI: 10.1080/1057610X.2020.1868094 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1868094 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1653-1677 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1862952_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Victor Asal Author-X-Name-First: Victor Author-X-Name-Last: Asal Author-Name: Daren Fisher Author-X-Name-First: Daren Author-X-Name-Last: Fisher Author-Name: Joe Young Author-X-Name-First: Joe Author-X-Name-Last: Young Title: Target Them with What? Why States Choose Different COIN Strategies for Different Insurgent Organizations Abstract: Why do some governments negotiate with insurgent organizations while others use force? This study examines the factors that influence these strategic government approaches to insurgencies using an original data set of state actions toward 140 insurgent groups between 1998 and 2012. We develop a simple model to explain government policy choice and test on these original data. After accounting for ideological differences and insurgent organization alliances, our findings suggest that the size of the insurgent group, the extent of previous lethal violence, and previous government decisions all influence government selection of conciliatory, repressive, mixed, and non-response strategies. We conclude by discussing the implications for how governments make counterterrorism/counterinsurgency strategy. Journal: Studies in Conflict & Terrorism Pages: 1766-1783 Issue: 9 Volume: 46 Year: 2023 Month: 9 X-DOI: 10.1080/1057610X.2020.1862952 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1862952 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:46:y:2023:i:9:p:1766-1783 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1723276_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Scott Fitzsimmons Author-X-Name-First: Scott Author-X-Name-Last: Fitzsimmons Title: Contracting Blowback?: The Use of Violence by Private Security Companies and Insurgents during the Iraq War Abstract: This article assesses the influence of Private Security Companies’ (PSCs’) violence against insurgents and noncombatants on the frequency of insurgent attacks against PSCs during the 2004 to 2009 period of the Iraq War. It finds that PSC violence may have exerted fairly weak influence on short-term variations in the frequency with which insurgents attacked the firms. It also finds that variations in the frequency of insurgent attacks against PSCs may have been at least partly a side-effect of variations in the overall frequency of insurgent violence in Iraq that were, in turn, driven by events that were beyond the firms’ control. Journal: Studies in Conflict & Terrorism Pages: 78-97 Issue: 1 Volume: 47 Year: 2024 Month: 1 X-DOI: 10.1080/1057610X.2020.1723276 File-URL: http://hdl.handle.net/10.1080/1057610X.2020.1723276 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:1:p:78-97 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1937821_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: János BesenyÅ‘ Author-X-Name-First: János Author-X-Name-Last: BesenyÅ‘ Author-Name: Krisztina Márton Author-X-Name-First: Krisztina Author-X-Name-Last: Márton Author-Name: Ryan Shaffer Author-X-Name-First: Ryan Author-X-Name-Last: Shaffer Title: Hospital Attacks Since 9/11: An Analysis of Terrorism Targeting Healthcare Facilities and Workers Abstract: This article explores terrorism against healthcare facilities and workers throughout the world since September 11, 2001 to assess trends in these attacks. Using five datasets, it examines the increased risk of terrorist attacks against healthcare facilities and workers, and analyzes when, where and how these largely soft targets have been attacked by terrorists. The article provides a quantitative and qualitative analysis about the types of attacks and concludes with recommendations for healthcare facilities to mitigate the risk of terrorist attacks as well as provides suggestions for further studies. Journal: Studies in Conflict & Terrorism Pages: 36-59 Issue: 1 Volume: 47 Year: 2024 Month: 1 X-DOI: 10.1080/1057610X.2021.1937821 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1937821 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:1:p:36-59 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1940472_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tadeusz ZieliÅ„ski Author-X-Name-First: Tadeusz Author-X-Name-Last: ZieliÅ„ski Title: On Theory and Practice of No-Fly Zones in Humanitarian Intervention Abstract: Drastic violations of human rights, humanitarian crises or genocide constituted a basis for the intervention of military forces under the flag of the UN or as part of a coalition of states after the end of Cold War. These activities have always been associated with a risk to the intervenors, mainly land units, hence the politicians’ reluctance to make decisions about sending soldiers to a crisis area. Therefore, often the only tool in the hands of politicians remains air power, which enforces a ban on flying over a defined area established by the international community. In the article the phenomenon of humanitarian intervention in the context of international law is the basis for identifying no-fly zones as a political and military tool necessary to resolve crises as part of humanitarian interventions. In addition, it defines what no-fly zones are, the objectives, forms and principles of their creation, as also presents arguments for using air power (air forces) to carry out this type of mission, but also doubts related to their functioning. Theoretical considerations were supported by examples from the use of aviation to enforce no-fly zones in Iraq (1991–2003), Bosnia and Herzegovina (1992–1995) and Libya (2011). Journal: Studies in Conflict & Terrorism Pages: 60-77 Issue: 1 Volume: 47 Year: 2024 Month: 1 X-DOI: 10.1080/1057610X.2021.1940472 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1940472 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:1:p:60-77 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2247620_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Matthew L. N. Wilkinson Author-X-Name-First: Matthew L. N. Author-X-Name-Last: Wilkinson Author-Name: Muzammil Quraishi Author-X-Name-First: Muzammil Author-X-Name-Last: Quraishi Title: Defining and Illustrating “Extremism†Using the Largest Investigation into Islam in Prison Abstract: In the context of a damaging absence of clarity, we define “Islamist Extremism†as: the absolutely divided and antagonistic Worldview of the “Usâ€-true-Muslim “in-group†who must strive to live in an “Islamic†State versus “Themâ€-non-Muslim’ and “wrongâ€-Muslim “out-groups†who are stripped of their human status due to their opposition to “true Islam.†We illustrate this definition of “Extremism†- including showing how Islamist Extremism is different from Mainstream Islam - using fresh empirical data from the largest ever study of Islam and Muslims in prison. We proceed to show how this definition of “Extremism†can be used as the basis for understanding processes of radicalization and de-radicalization in and outside prison. We then extrapolate from the case of Islamist Extremism in prison to suggest a working definition of “Extremism†more generally as: any absolutely divided “Us†versus “Them†Worldview by which a “chosen†in-group strips “condemned†out-groups of their basic human qualities, properties and rights and thereby sets them up for harm. Journal: Studies in Conflict & Terrorism Pages: 1-35 Issue: 1 Volume: 47 Year: 2024 Month: 1 X-DOI: 10.1080/1057610X.2023.2247620 File-URL: http://hdl.handle.net/10.1080/1057610X.2023.2247620 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:1:p:1-35 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2229088_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Beatrice de Graaf Author-X-Name-First: Beatrice Author-X-Name-Last: de Graaf Author-Name: Nikki Sterkenburg Author-X-Name-First: Nikki Author-X-Name-Last: Sterkenburg Author-Name: Jorin Dijkstra Author-X-Name-First: Jorin Author-X-Name-Last: Dijkstra Author-Name: Tessa Glas Author-X-Name-First: Tessa Author-X-Name-Last: Glas Title: Discussing Terrorism in the Classroom – Adopting an Empathizing and Historical Perspective: A Research Note Abstract: In this article, we examine the pre-existing state of knowledge, attitudes and sentiments that pupils have and display in relation to terrorism and violent extremism. Based on our experiences with our historical-pedagogical TerInfo project, we propose a new approach for dealing with these topics in the classroom: the adoption of an historicizing approach in teaching about terrorism in class. This approach relies on the creation of a historical framework that serves as a tool to both deal with emotions of shock and panic, and to help teachers and pupils find an objectified ground to discuss terrorism on a knowledge-informed base. Journal: Studies in Conflict & Terrorism Pages: 98-114 Issue: 1 Volume: 47 Year: 2024 Month: 1 X-DOI: 10.1080/1057610X.2023.2229088 File-URL: http://hdl.handle.net/10.1080/1057610X.2023.2229088 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:1:p:98-114 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2024943_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Shandon Harris-Hogan Author-X-Name-First: Shandon Author-X-Name-Last: Harris-Hogan Author-Name: Amarnath Amarasingam Author-X-Name-First: Amarnath Author-X-Name-Last: Amarasingam Author-Name: Lorne L. Dawson Author-X-Name-First: Lorne Author-X-Name-Last: L. Dawson Title: A Comparative Analysis of Australian and Canadian Foreign Fighters Traveling to Syria and Iraq Abstract: This article provides a comparative analysis of Jihadist foreign fighters who traveled from Australia and Canada to engage in the conflict in Syria and Iraq. Data are provided on the demographics of those who traveled, group affiliations, when and how they traveled, and their social connections. Despite the strong similarities between these societies, significant differences are detected across levels of educational attainment, immediate familial status, and the degree of connection to existing Jihadist networks. The Australian and Canadian foreign fighters also differ, in key respects, from their European counterparts, and even those from the United States. Consideration is given to the possible significance of these differences, as well as the possible return of those currently detained in the region. Journal: Studies in Conflict & Terrorism Pages: 1230-1260 Issue: 10 Volume: 47 Year: 2024 Month: 10 X-DOI: 10.1080/1057610X.2021.2024943 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2024943 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1230-1260 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2015820_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Stephen J. Ceccoli Author-X-Name-First: Stephen J. Author-X-Name-Last: Ceccoli Title: Foreign Policy Orientations and U.S. Counterterrorism Support Abstract: Since terrorism has an undeniable psychological component; how citizens think about counterterrorism offers important implications for determining successful state responses. This research note examines empirical linkages between foreign policy preferences and support for eight counterterrorism measures, especially military-focused approaches associated with the “war model†of counterterrorism. Findings derived from the Chicago Council Survey of American Public Opinion and U.S. Foreign Policy indicate that traditional foreign policy orientations, especially internationalist and militarist postures, condition respondent counterterrorism preferences in important ways beyond ideology and partisan identification. Moreover, threat perceptions consistently predict respondent support for both violent and restrictive counterterrorism measures. Journal: Studies in Conflict & Terrorism Pages: 1366-1381 Issue: 10 Volume: 47 Year: 2024 Month: 10 X-DOI: 10.1080/1057610X.2021.2015820 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2015820 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1366-1381 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2017395_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lotta Rahlf Author-X-Name-First: Lotta Author-X-Name-Last: Rahlf Title: Beyond Healthy Skepticism: Exploring German News Media Framing of Terrorism-Affiliated Women Returnees Abstract: Various feminist contributions to Terrorism Studies provide insight into how the media rationalizes terrorism-affiliated women through framing, but the question of how newspapers frame women returnees remains scarcely explored. Through a semantic content analysis of 63 German news articles, supplemented by interviews with journalists, this article reveals how German news media framing fosters a skeptical attitude toward women returnees. This effect is further reinforced when accompanied by a portrayal of individual returnees as irresponsible mothers. In contrast to the treatment of terrorism-affiliated women in general, the framing of women returnees does not seek to rationalize their violence, but instead provides moral guidance regarding security responses. Journal: Studies in Conflict & Terrorism Pages: 1200-1229 Issue: 10 Volume: 47 Year: 2024 Month: 10 X-DOI: 10.1080/1057610X.2021.2017395 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2017395 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1200-1229 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2037185_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rune Ellefsen Author-X-Name-First: Rune Author-X-Name-Last: Ellefsen Author-Name: Sveinung Sandberg Author-X-Name-First: Sveinung Author-X-Name-Last: Sandberg Title: Everyday Prevention of Radicalization: The Impacts of Family, Peer, and Police Intervention Abstract: This study examines early intervention against individual radicalization. The data originate from interviews with young Muslims in Norway who had experienced interventions related to their own radicalization, or engaged in or witnessed interventions directed at a radicalized peer or relative. We find that informal interventions by family and friends were most prevalent in the data and played the most decisive role in interrupting radicalization, while police interventions were less common and had mixed results. Interventions by family or peers often came early in the radicalization process, were employed by trusted “insidersâ€, and took place as part of everyday life, thus having less detrimental consequences for radicalized individuals. We finally discuss the challenges of combining interventions by family members and friends with involvements from the police and security service. Journal: Studies in Conflict & Terrorism Pages: 1342-1365 Issue: 10 Volume: 47 Year: 2024 Month: 10 X-DOI: 10.1080/1057610X.2022.2037185 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2037185 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1342-1365 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2034852_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Wesley S. McCann Author-X-Name-First: Wesley S. Author-X-Name-Last: McCann Title: Outbreak: A Comprehensive Analysis of Biological Terrorism♦ Abstract: Only a few studies on biological terrorism have ever been conducted empirically. Many of these focus on CBRN terrorism as a whole, rather than biological terrorism, specifically. Other accounts utilize a case- or historical analysis instead. This study serves as the most comprehensive empirical assessment of bioterrorism to date by drawing on the Profiles of Incidents involving CBRN and Non-State Actors (POICN) Database at START as well as additional databases. The databases were merged to create a database whereby both CBRN and non-CBRN cases were included for both individuals and groups. Several binary logistic regression models (1990-2016) were then executed on biological weapons pursuit. The type of actor and ideology seem to be the most important factors for predicting biological weapons pursuit, although ethnic fractionalization was also negatively correlated with biological weapons pursuit. Governance measures had variable, but negative relationships with pursuit as well. Implications and recommendations are discussed. Journal: Studies in Conflict & Terrorism Pages: 1299-1328 Issue: 10 Volume: 47 Year: 2024 Month: 10 X-DOI: 10.1080/1057610X.2022.2034852 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034852 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1299-1328 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2018903_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Barak Mendelsohn Author-X-Name-First: Barak Author-X-Name-Last: Mendelsohn Title: Casting Shadow: Founders and the Unique Challenges of a Terrorist Group’s First Leadership Change Abstract: The first transfer of power presents unique challenges to terrorist groups. Four challenges of succession are more manifest the first time a terrorist group undergoes transition: first, a lack of precedent creates greater uncertainty about the group’s ability to survive leadership change; second, where the new leader replaces a mythical founder, there is an inevitable negative comparison to the predecessor; third, the successor must prevent infighting and splintering that results when the glue that held the group together is lost; and fourth, a first successor often has to shift the source of organizational authority from charismatic leadership to a rational-bureaucratic model. This article argues that the shadow of the departing leader and his actions in preparation for power transition affect the magnitude of the challenges his successor faces. Three case studies—al-Qaeda, the Peruvian Sendero Luminoso (Shining Path), and the Abu Nidal organization—demonstrate both first succession challenges and the role of founders in shaping these challenges’ magnitude. Journal: Studies in Conflict & Terrorism Pages: 1147-1171 Issue: 10 Volume: 47 Year: 2024 Month: 10 X-DOI: 10.1080/1057610X.2021.2018903 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2018903 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1147-1171 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2025020_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Patrick Bury Author-X-Name-First: Patrick Author-X-Name-Last: Bury Title: Post-Fordism and the Transformation of Transatlantic Counter-Terrorism Abstract: There is growing evidence that, led by the U.S., a transformation of trans-Atlantic counter-terrorism (CT) has occurred since 9/11. However, a theoretically informed framework for understanding how this has happened remains elusive. Using post-Fordist industrial theory and new evidence collected from senior practitioners across the trans-Atlantic space, this article provides a novel conceptual framework for understanding how states have transformed CT organization since 9/11, primarily in response to global jihadism. It shows how many of these solutions are remarkably similar and based on post-Fordist business and/or military best practices, including centralization and decentralization; integration of core and periphery workforces; a network approach to knowledge sharing; and outsourcing. The conclusion discusses the effectiveness of these solutions and their use in meeting new policy challenges. Journal: Studies in Conflict & Terrorism Pages: 1261-1285 Issue: 10 Volume: 47 Year: 2024 Month: 10 X-DOI: 10.1080/1057610X.2021.2025020 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2025020 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1261-1285 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2028684_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Patrick J. Burke Author-X-Name-First: Patrick J. Author-X-Name-Last: Burke Title: Civil-Military Relations and Civilian Victimization in Civil War Abstract: Why do some states victimize noncombatants during civil war? Scholars have identified regime type, international norms, and battlefield conditions as important factors explaining variation in outcomes. Here I argue that understanding variation in civilian victimization requires the identification of the institutional interests of those in control of the state. Civilian victimization is likely when the military controls pre-war planning and execution because of the institutional goal of winning wars quickly and efficiently by attacking every major source of enemy power. This often includes noncombatants. Most civilian leaders’ institutional goals, however, are centered around governance. Thus, these leaders prefer restraint from victimization because they often believe such barbarity will result in future difficulties for governance. I test my argument alongside others through a binary regression analysis of 103 conflict dyads between 1989 and 2010 and find that the variable for militarily dominated governments maintains significance across model specifications and features the largest effect size of any variable. Journal: Studies in Conflict & Terrorism Pages: 1286-1298 Issue: 10 Volume: 47 Year: 2024 Month: 10 X-DOI: 10.1080/1057610X.2022.2028684 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2028684 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1286-1298 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2037630_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: A. Wood Author-X-Name-First: A. Author-X-Name-Last: Wood Author-Name: P. Tanteckchi Author-X-Name-First: P. Author-X-Name-Last: Tanteckchi Author-Name: D. A. Keatley Author-X-Name-First: D. A. Author-X-Name-Last: Keatley Title: A Crime Script Analysis of Involuntary Celibate (INCEL) Mass Murderers Abstract: Involuntary Celibates (INCELs) are an increasing concern in academia and policing. Owing to the rise of internet sub-groups, understanding the developmental processes of INCELs is necessary to assist with investigations. The current research used a temporal method, Crime Script Analysis, to map the life histories of INCELs. Results indicated overlaps between INCELs and other forms of extremism and terrorism, while indicating developmental differences in terms of rejection and life histories. This research provides a new approach to understanding INCELs and forms the basis for future research using other temporal methods to better understand the life history of INCELs. Journal: Studies in Conflict & Terrorism Pages: 1329-1341 Issue: 10 Volume: 47 Year: 2024 Month: 10 X-DOI: 10.1080/1057610X.2022.2037630 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2037630 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1329-1341 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2024944_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ariel Koch Author-X-Name-First: Ariel Author-X-Name-Last: Koch Title: The ONA Network and the Transnationalization of Neo-Nazi-Satanism Abstract: This article focuses on the Order of the Nine Angles (ONA), which from a fringe group of the British far-right in the 1970s has evolved a violent philosophy and a loose and leaderless network of individuals and groups that merge National Socialism and Satanism; endorses tyrants, cult leaders, non-NS terrorists, and child-abusers; promotes violence, celebrates death, and advocates for real-life actions. The article will analyze the connection between ONA’s philosophy and the development of what can be called Fused Extremism. This phenomenon manifests itself in groups that merge different types of violent extremism and have crystallized through the Internet into a trans-national, leaderless, decentralized, and subversive network that promotes terrorism and violence. Journal: Studies in Conflict & Terrorism Pages: 1172-1199 Issue: 10 Volume: 47 Year: 2024 Month: 10 X-DOI: 10.1080/1057610X.2021.2024944 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2024944 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:10:p:1172-1199 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2034223_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Willem de Lint Author-X-Name-First: Willem Author-X-Name-Last: de Lint Author-Name: Rodrigo Praino Author-X-Name-First: Rodrigo Author-X-Name-Last: Praino Title: Does Martialization Contribute to Australia’s Right-Wing Extremism? Implications of an Analysis of the General Social Survey Abstract: Concept review on right-wing extremism (RWE) holds that authoritarianism, nationalism and anti-democracy are the values that most strongly correlate. Evidence suggests these views are prevalent among military veterans. In this paper we test the hypothesis that individuals that are subjected to martialization are more likely to hold RWE values than other individuals. Using the General Social Survey, which permits the operationalization of authoritarianism, nationalism and anti-democracy into 12 dependent variables, we find that individuals with high levels of exposure to martialization show higher probability of preferring a more extreme stance for every single dependent variable modeled for every year included in the analysis. The result suggests that counter-extremism policy must not ignore the overwhelming impact of military experience where “hearts and minds†are shaped. Journal: Studies in Conflict & Terrorism Pages: 1471-1494 Issue: 11 Volume: 47 Year: 2024 Month: 11 X-DOI: 10.1080/1057610X.2022.2034223 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034223 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1471-1494 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2034224_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Wahyudi Akmaliah Author-X-Name-First: Wahyudi Author-X-Name-Last: Akmaliah Author-Name: Priyambudi Sulistiyanto Author-X-Name-First: Priyambudi Author-X-Name-Last: Sulistiyanto Author-Name: Sukendar Author-X-Name-First: Author-X-Name-Last: Sukendar Title: Making Moderate Islam in Indonesia Abstract: This article examines the roles of the late Abdurrahman Wahid and Syafi’i Maarif in the promotion of moderate Islam in post-Suharto Indonesia. Both as formerly prominent leaders within Indonesia’s largest Muslim organizations, Nahdatul Ulama and Muhammadiyah, their earlier influences through family, education and travels abroad are examined, and how these shaped their views and ideas on moderate Islam within Indonesia. The establishment of their namesake institutions, the Wahid Foundation and the Maarif Institute, is discussed, as is the ongoing legacy of these two men and their principles and ideas about moderate Islam. The inspirational influence of both Wahid and Maarif on the younger generations across Indonesia warrants critical attention, in particular as Indonesia is facing an upsurge of disunity and religious discrimination. Journal: Studies in Conflict & Terrorism Pages: 1495-1509 Issue: 11 Volume: 47 Year: 2024 Month: 11 X-DOI: 10.1080/1057610X.2022.2034224 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034224 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1495-1509 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2034217_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Susilo Wibisono Author-X-Name-First: Susilo Author-X-Name-Last: Wibisono Author-Name: Winnifred R. Louis Author-X-Name-First: Winnifred R. Author-X-Name-Last: Louis Author-Name: Jolanda Jetten Author-X-Name-First: Jolanda Author-X-Name-Last: Jetten Title: Willingness to Engage in Religious Collective Action: The Role of Group Identification and Identity Fusion Abstract: In Study 1, 239 Indonesian Muslims reported their religious identification, identity fusion and their willingness to engage in peaceful and violent collective action. Both religious identification and identity fusion were positively associated with peaceful collective action. In addition, when the role of identity fusion was controlled, identification was found to be negatively associated with support for violence. A second study (N = 176 Indonesian Muslims) found that religious identification was positively associated with peaceful collective action. However, even though identity fusion was again positively associated with support for violence, identification was not a significant predictor when controlling for identity fusion. Journal: Studies in Conflict & Terrorism Pages: 1519-1532 Issue: 11 Volume: 47 Year: 2024 Month: 11 X-DOI: 10.1080/1057610X.2022.2034217 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034217 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1519-1532 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2034216_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Halim Rane Author-X-Name-First: Halim Author-X-Name-Last: Rane Author-Name: Shane Satterley Author-X-Name-First: Shane Author-X-Name-Last: Satterley Author-Name: Riyad H. Rahimullah Author-X-Name-First: Riyad H. Author-X-Name-Last: Rahimullah Title: Education and Islamist Jihadism: A Survey of Muslim Australians Abstract: This article presents findings from a national survey of 1034 Muslim Australians, examining the relationship between educational qualifications and Islamist-jihadist interpretations of Islam. A minority of respondents identified with indicators of Islamism, while a smaller sub-group identified with those associated with jihadism. Respondents educated in STEM (science, technology, engineering and mathematics) fields were more likely than their HSS (humanities and social science) counterparts to accept ideas associated with Islamism and to a much lesser extent jihadism. Ideas associated with jihadism were more likely among respondents without a tertiary qualification than among those educated in either HSS or STEM fields. Journal: Studies in Conflict & Terrorism Pages: 1403-1426 Issue: 11 Volume: 47 Year: 2024 Month: 11 X-DOI: 10.1080/1057610X.2022.2034216 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034216 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1403-1426 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2034232_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Claire Smith Author-X-Name-First: Claire Author-X-Name-Last: Smith Author-Name: Lucy Resnyansky Author-X-Name-First: Lucy Author-X-Name-Last: Resnyansky Author-Name: Craig Taylor Author-X-Name-First: Craig Author-X-Name-Last: Taylor Title: Radicalization in the Asia-Pacific Region: Themes and Concepts Journal: Studies in Conflict & Terrorism Pages: 1383-1387 Issue: 11 Volume: 47 Year: 2024 Month: 11 X-DOI: 10.1080/1057610X.2022.2034232 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034232 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1383-1387 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2034220_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David Duriesmith Author-X-Name-First: David Author-X-Name-Last: Duriesmith Author-Name: Noor Huda Ismail Author-X-Name-First: Noor Huda Author-X-Name-Last: Ismail Title: Masculinities and Disengagement from Jihadi Networks: The Case of Indonesian Militant Islamists Abstract: Men who join militant Islamist networks often frame their participation in masculine terms, as protectors, warriors or brothers. While the role of masculinities in recruitment to jihadi groups has received increasing attention, their role in disengaging men from armed groups (and particularly men in the global south) have not. This paper explores the role of masculinities in shaping men’s paths out of jihadi networks. Based on life history research with Indonesian former militant Islamist we suggest that men’s pathways out of armed groups are defined by negotiating alternate masculinities, which reposition their gendered role in society from those associated with militancy. Journal: Studies in Conflict & Terrorism Pages: 1450-1470 Issue: 11 Volume: 47 Year: 2024 Month: 11 X-DOI: 10.1080/1057610X.2022.2034220 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034220 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1450-1470 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2034229_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Lucy Resnyansky Author-X-Name-First: Lucy Author-X-Name-Last: Resnyansky Author-Name: Claire Smith Author-X-Name-First: Claire Author-X-Name-Last: Smith Author-Name: Craig Taylor Author-X-Name-First: Craig Author-X-Name-Last: Taylor Author-Name: Priyambudi Sulistiyanto Author-X-Name-First: Priyambudi Author-X-Name-Last: Sulistiyanto Author-Name: George Merryman Author-X-Name-First: George Author-X-Name-Last: Merryman Author-Name: Mujahiduddin Author-X-Name-First: Author-X-Name-Last: Mujahiduddin Title: Reasons behind Reasons: A Communitarian Reading of Women’s Radicalization and Family Bombings in Southeast Asia Abstract: This paper analyses conceptual frameworks that have been suggested in the literature for understanding women’s radicalization, including the emergent phenomenon of family bombings, focusing on Indonesia and Malaysia. We argue that understanding these trends requires grappling with socio-culturally specific gender-related concepts and that the liberal political theory framework that has informed a significant body of research in this area, with its emphasis on individuality, has limited utility for making sense of the new models of women’s engagement in extremism in Southeast Asia’. We suggest that a communitarian philosophical framework has the potential to provide new context-specific insights on radicalization, extremism and terrorism in Southeast Asia. We apply this approach to a reading of the family suicide bombings in Surabaya and Sidoarjo, East Java, Indonesia, in May 2018. Journal: Studies in Conflict & Terrorism Pages: 1533-1558 Issue: 11 Volume: 47 Year: 2024 Month: 11 X-DOI: 10.1080/1057610X.2022.2034229 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034229 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1533-1558 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2034221_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Muhammad Iqbal Author-X-Name-First: Muhammad Author-X-Name-Last: Iqbal Author-Name: Kerry S. O’Brien Author-X-Name-First: Kerry S. Author-X-Name-Last: O’Brien Author-Name: Ana-Maria Bliuc Author-X-Name-First: Ana-Maria Author-X-Name-Last: Bliuc Title: The Relationship between Existential Anxiety, Political Efficacy, Extrinsic Religiosity and Support for Violent Extremism in Indonesia Abstract: Young people’s involvement in violent extremism remains a concern in many countries, including Indonesia. This study examined direct and indirect relationships between indicators of existential anxiety, political efficacy, extrinsic religiosity, and support for violent extremism. Two hundred and ten young Indonesians were recruited to the study and all completed an anonymous online survey containing the measures of interest. The findings suggest that indicators of existential anxiety are related to greater support for violent extremism, but this relationship may be dependent on perceptions of political efficacy and religious orientation. Future research could explore whether support for violent extremism can be reduced by enhancing young people’s sense of control and political efficacy. Journal: Studies in Conflict & Terrorism Pages: 1510-1518 Issue: 11 Volume: 47 Year: 2024 Month: 11 X-DOI: 10.1080/1057610X.2022.2034221 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034221 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1510-1518 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2034222_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Emma F. Thomas Author-X-Name-First: Emma F. Author-X-Name-Last: Thomas Author-Name: Nathan Leggett Author-X-Name-First: Nathan Author-X-Name-Last: Leggett Author-Name: David Kernot Author-X-Name-First: David Author-X-Name-Last: Kernot Author-Name: Lewis Mitchell Author-X-Name-First: Lewis Author-X-Name-Last: Mitchell Author-Name: Saranzaya Magsarjav Author-X-Name-First: Saranzaya Author-X-Name-Last: Magsarjav Author-Name: Nathan Weber Author-X-Name-First: Nathan Author-X-Name-Last: Weber Title: Reclaim the Beach: How Offline Events Shape Online Interactions and Networks Amongst Those Who Support and Oppose Right-Wing Protest Abstract: In this paper we examine how offline protests attended by members of the Australian far-right shape online interactions. Tweets about the 2019 St Kilda beach rally were collected. Users were manually classified as supporters (n = 104) or opponents of the rally (n = 872). Network analysis demonstrated that interactions between the two groups increased at the time of the rally. Natural language processing showed that both groups became angrier and used more “othering†language during the rally. However, there were stark differences in the moral worldviews, highlighting the very different moral positions that underpin engagement with, and opposition to, the far-right agenda. Journal: Studies in Conflict & Terrorism Pages: 1427-1449 Issue: 11 Volume: 47 Year: 2024 Month: 11 X-DOI: 10.1080/1057610X.2022.2034222 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034222 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1427-1449 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2034231_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mirra Noor Milla Author-X-Name-First: Mirra Noor Author-X-Name-Last: Milla Author-Name: Whinda Yustisia Author-X-Name-First: Whinda Author-X-Name-Last: Yustisia Author-Name: Muhammad Abdan Shadiqi Author-X-Name-First: Muhammad Abdan Author-X-Name-Last: Shadiqi Author-Name: Haykal Hafizul Arifin Author-X-Name-First: Haykal Hafizul Author-X-Name-Last: Arifin Title: Mechanisms of 3N Model on Radicalization: Testing the Mediation by Group Identity and Ideology of the Relationship between Need for Significance and Violent Extremism Abstract: This paper seeks to examine the mechanisms of the 3 N model (need, narrative, and network) by testing a serial mediation model of group identity and ideology. We propose two rival hypotheses: need for significance predicts violent extremism, and its relationship is serially mediated by (1) group identity and ideology (Model 1); (2) ideology and group identity (Model 2). To test the hypotheses, we conducted a survey of 137 terrorism detainees from prisons across Indonesia. The results revealed that Model 1 had a better fit than Model 2, suggesting the important role of group processes in developing violent extremism’s ideology. Journal: Studies in Conflict & Terrorism Pages: 1388-1402 Issue: 11 Volume: 47 Year: 2024 Month: 11 X-DOI: 10.1080/1057610X.2022.2034231 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2034231 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:11:p:1388-1402 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2068944_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Byman Author-X-Name-First: Daniel Author-X-Name-Last: Byman Author-Name: Asfandyar Mir Author-X-Name-First: Asfandyar Author-X-Name-Last: Mir Title: Assessing al-Qaeda: A Debate Abstract: Twenty years after the 9/11 attacks, the current status and future of al-Qaeda is a central policy question, especially as the U.S. government looks to pivot away from counterterrorism toward managing great power competition. This article presents a debate on this issue between Daniel Byman and Asfandyar Mir. Mir argues that al-Qaeda remains a significant threat, committed to fighting the United States despite pressures to alter direction. The control of al-Qaeda central over its major regional affiliates remains strong, with steady growth in capability. It also retains important allies and has major opportunities due to the return of the Taliban in Afghanistan, the domestic political environment, changing priorities in the United States, and great power competition. Byman, in contrast, contends that al-Qaeda suffers debilitating organizational problems, with affiliates having localized and the movement lacking a haven remotely comparable to pre-9/11 Afghanistan. In addition, improved counterterrorism keeps al-Qaeda off balance. If al-Qaeda remains a major threat, counterterrorism must remain among the United States’ major national security priorities, even if it is not the top one, and robust counterterrorism measures need to be sustained. If al-Qaeda is weak, the importance of counterterrorism in the hierarchy of U.S. foreign policy priorities can fall substantially. Journal: Studies in Conflict & Terrorism Pages: 1559-1598 Issue: 12 Volume: 47 Year: 2024 Month: 12 X-DOI: 10.1080/1057610X.2022.2068944 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2068944 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1559-1598 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2074394_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Amiad Haran Diman Author-X-Name-First: Amiad Author-X-Name-Last: Haran Diman Author-Name: Dan Miodownik Author-X-Name-First: Dan Author-X-Name-Last: Miodownik Title: Social Cohesion and Collective Violence: Latent Variable Approach to Explaining Riots in East Jerusalem Abstract: Does social cohesion explain variation in violence within divided cities? In line with insights drawn from the ethnic politics, criminology and urban geography literature we suggest that explaining variation in intergroup violence is not possible by relying on motivational elements alone, and attention to social cohesion is required as well. While cohesion can facilitate collective action that aids violent mobilization, it can also strengthen social order that contributes to the group’s capability to control and prevent unrest. We test these relationships using an application of a latent variable model to an integration of survey results, crime data and expert-coded data in order to measure cohesion in East Jerusalem neighborhoods. We then analyze its impact on riots using three original geolocated datasets recording violence in the neighborhoods between the years 2013 and 2015. Our results reveal that even with controls for economic and political determinants of violence, as well as for spatial clustering and temporal explanations, neighborhood-level social cohesion is a robust explanatory variable that negatively correlates with riots. Journal: Studies in Conflict & Terrorism Pages: 1772-1799 Issue: 12 Volume: 47 Year: 2024 Month: 12 X-DOI: 10.1080/1057610X.2022.2074394 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2074394 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1772-1799 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2045967_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ido Levy Author-X-Name-First: Ido Author-X-Name-Last: Levy Author-Name: Abdi Yusuf Author-X-Name-First: Abdi Author-X-Name-Last: Yusuf Title: The “Lightning†Brigade: Security Force Assistance and the Fight Against al-Shabaab Abstract: In the fight against the terrorist group al-Shabaab, the Somali National Army has suffered acute personnel, training, funding, and other difficulties that have rendered it ineffective. The U.S.-trained Danab Brigade has proven capable in breaking the ineffectiveness pattern. Drawing on over 20 interviews with Somali officials and service members, this paper analyzes U.S. security force assistance in the case of Somalia. Danab’s sound performance stems from its U.S. training and support, multi-clan ethos, and aggressive tactical style. Danab exemplifies American success in building small, aggressive, mobile partner military forces. The recent U.S. withdrawal from Somalia raises questions about Danab’s continued viability. Journal: Studies in Conflict & Terrorism Pages: 1800-1825 Issue: 12 Volume: 47 Year: 2024 Month: 12 X-DOI: 10.1080/1057610X.2022.2045967 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2045967 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1800-1825 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2043226_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ellen Tveteraas Author-X-Name-First: Ellen Author-X-Name-Last: Tveteraas Title: Under the Hood – Learning and Innovation in the Islamic State’s Suicide Vehicle Industry Abstract: This article explores how the Islamic State learned from its suicide bombings, a tactic that in theory undermines the in-group stability associated with organizational learning. Using interviews from Mosul and Baghdad together with internal documents from the Division of Soldiers it provides a case study of the learning and production process underlying innovations in suicide vehicle designs between 2014 and 2017. It examines how the group acquired, distributed, interpreted, implemented, and stored information from suicide vehicle operations in its military-industrial complex, and details how the group learned by maximizing continuity among personnel in support, coordinating, and production roles. Journal: Studies in Conflict & Terrorism Pages: 1648-1671 Issue: 12 Volume: 47 Year: 2024 Month: 12 X-DOI: 10.1080/1057610X.2022.2043226 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2043226 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1648-1671 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2038409_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tanya Bandula-Irwin Author-X-Name-First: Tanya Author-X-Name-Last: Bandula-Irwin Author-Name: Max Gallien Author-X-Name-First: Max Author-X-Name-Last: Gallien Author-Name: Ashley Jackson Author-X-Name-First: Ashley Author-X-Name-Last: Jackson Author-Name: Vanessa van den Boogaard Author-X-Name-First: Vanessa Author-X-Name-Last: van den Boogaard Author-Name: Florian Weigand Author-X-Name-First: Florian Author-X-Name-Last: Weigand Title: Beyond Greed: Why Armed Groups Tax Abstract: Based on a review of the diverse practices of how armed groups tax, we highlight that a full account of why armed groups tax needs to go beyond revenue motivations, to also engage with explanations related to ideology, legitimacy, institution building, legibility and control of populations, and the performance of public authority. This article builds on two distinct literatures, on armed groups and on taxation, to provide the first systematic exploration of the motivations of armed group taxation. We problematize common approaches toward armed group taxation and state-building, and outline key questions of a new research agenda. Journal: Studies in Conflict & Terrorism Pages: 1599-1622 Issue: 12 Volume: 47 Year: 2024 Month: 12 X-DOI: 10.1080/1057610X.2022.2038409 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2038409 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1599-1622 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2043225_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mohammed Samir Elshimi Author-X-Name-First: Mohammed Samir Author-X-Name-Last: Elshimi Title: The Constraints Hypothesis: Rethinking Causality in Deradicalisation, Disengagement and Reintegration Pathways. A Complex Systems Perspective Abstract: This paper re-frames the concept of causality in deradicalisation, disengagement and reintegration pathways. Analysis of the theories and frameworks in counter-terrorism research indicate that prevalent causal models offer reductive explanations of human behavior, revealing the absence of a scientifically credible account of how agents undergo transformation in pathways out of terrorism. To address the problem of causality, I borrow from the thought bank of complexity theory and reconceptualise causality as the operation of “constraints.†The paper then goes on to operationalize the concept of constraints for counter-terrorism researchers and practitioners, laying down a new and preliminary conceptual framework for thinking about how people leave terrorism behind. Journal: Studies in Conflict & Terrorism Pages: 1623-1647 Issue: 12 Volume: 47 Year: 2024 Month: 12 X-DOI: 10.1080/1057610X.2022.2043225 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2043225 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1623-1647 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2050484_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Vasabjit Banerjee Author-X-Name-First: Vasabjit Author-X-Name-Last: Banerjee Title: Maintaining Dominance: Explaining the Rise of Late-Entering Insurgent Groups in El Salvador and Guatemala Abstract: Although there exists substantial political science research on insurgent group fragmentation, this process remains ignored in the decades long civil wars of El Salvador and Guatemala. A comparative analysis of insurgencies in El Salvador (1979–1983) and Guatemala (1962–1969 and 1979–1983) investigates whether late insurgent groups arise from opportunities created by early groups’ ability to: (a) present attractive ideologies; (b) establish cohesive organizations with popular, effective leaders; (c) and acquire resources. My findings suggest, late insurgent groups arise because early groups cannot create cohesive organizations with effective leadership. The effects of ideology and resources—important in research on insurgencies—are inconclusive. Journal: Studies in Conflict & Terrorism Pages: 1672-1698 Issue: 12 Volume: 47 Year: 2024 Month: 12 X-DOI: 10.1080/1057610X.2022.2050484 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2050484 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1672-1698 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2065902_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jonathan Kenyon Author-X-Name-First: Jonathan Author-X-Name-Last: Kenyon Author-Name: Jens Binder Author-X-Name-First: Jens Author-X-Name-Last: Binder Author-Name: Christopher Baker-Beall Author-X-Name-First: Christopher Author-X-Name-Last: Baker-Beall Title: Understanding the Role of the Internet in the Process of Radicalisation: An Analysis of Convicted Extremists in England and Wales Abstract: This study explores the Internet’s role in radicalization pathways and offending of 235 convicted extremists in England and Wales. A comprehensive database was developed by coding content of specialist assessment reports by professionals with direct contact with individuals concerned. A series of quantitative analyses were then conducted. Findings suggest the Internet is playing an increasingly prominent role in radicalization, with variations in online activities depending on pathway taken. Internet use has also changed over time, with increasing social media use. This study informs the debate on the Internet’s role within radicalization pathways, guiding counter-terrorism approaches and policy in this area. Journal: Studies in Conflict & Terrorism Pages: 1747-1771 Issue: 12 Volume: 47 Year: 2024 Month: 12 X-DOI: 10.1080/1057610X.2022.2065902 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2065902 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1747-1771 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2055008_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Karl Kaltenthaler Author-X-Name-First: Karl Author-X-Name-Last: Kaltenthaler Author-Name: Arie W. Kruglanski Author-X-Name-First: Arie W. Author-X-Name-Last: Kruglanski Author-Name: Austin J. Knuppe Author-X-Name-First: Austin J. Author-X-Name-Last: Knuppe Title: The Paradox of the Heavy-Handed Insurgent: Public Support for the Taliban among Afghan Pashtuns Abstract: Afghanistan is a profoundly insecure country, with a very high rate of insurgent violence affecting large swathes of the population. Despite contributing to physical and economic insecurity across the country, Taliban insurgents have succeeded in creating what we call the “paradox of the heavy-handed insurgent.†Insurgents use attacks on government-controlled areas to generate public support by fostering a reputation for effective security provision for the civilian population under its control. For civilians who have a strong unmet need for physical security – especially those in rural and contested communities – heavy-handed insurgents are preferable to government forces who are perceived as either incompetent or unwilling to provide governance. We test this argument using data from the 2018 Asia Society Survey of the Afghan People. We find that the most important factor driving sympathy for the Taliban among Afghan Pashtuns is their sense of insecurity where they live. This indicates that an insurgent group that wears down government forces and weakens their ability to provide public goods and services can actually benefit by appearing as the more viable alternative for governance despite their heavy-handed tactics. Journal: Studies in Conflict & Terrorism Pages: 1699-1723 Issue: 12 Volume: 47 Year: 2024 Month: 12 X-DOI: 10.1080/1057610X.2022.2055008 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2055008 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1699-1723 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2058863_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Oscar L. Larsson Author-X-Name-First: Oscar L. Author-X-Name-Last: Larsson Author-Name: J. J. Widen Author-X-Name-First: J. J. Author-X-Name-Last: Widen Title: The European Union as a Maritime Security Provider – The Naval Diplomacy Perspective Abstract: The aim of this article is to assess how the European Union advances its role as a global security actor and how it deploys the military forces provided by the member states. Tracing the current debate of the identity and means of the European Union, we analyze the two maritime operations, EU NAVFOR Somalia (Operation Atalanta) and EUNAVFOR MED (Operation Sophia) from a naval diplomacy perspective. Naval diplomacy acknowledge a more versatile role for naval forces, not just military advancement and force projection. For this purpose, we need to go beyond mission descriptions and operational mandates in order to analyze and assess the two operations from within, relying on internal reports and interviews with senior officers who have participated in the operations. Results show that naval forces seeks cooperation with International organizations, NGOs, and third countries in order to facilitate security and good order of the global common of international water. Still, complex security problems are not resolved in this manner and EU maritime operations are highly political, thus facing an uncertain future as a tool of CSDP. Journal: Studies in Conflict & Terrorism Pages: 1724-1746 Issue: 12 Volume: 47 Year: 2024 Month: 12 X-DOI: 10.1080/1057610X.2022.2058863 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058863 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:12:p:1724-1746 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1944023_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Gregory D. Koblentz Author-X-Name-First: Gregory D. Author-X-Name-Last: Koblentz Author-Name: Stevie Kiesel Author-X-Name-First: Stevie Author-X-Name-Last: Kiesel Title: The COVID-19 Pandemic: Catalyst or Complication for Bioterrorism? Abstract: The COVID-19 pandemic demonstrates how an infectious disease can cause massive casualties, destabilize governments, and garner intense media attention as countries struggle to respond effectively. Will the pandemic inspire terrorist groups to consider biological weapons, hoping to replicate these effects? This question is the latest iteration of the debate over the risk posed by bioterrorism, which is characterized by three camps: optimists, pessimists, and pragmatists. This article revisits these schools of thought in light of COVID-19 and analyzes recent developments among extremists to assess the new risk of bioterrorism. The article concludes with recommendations for policymakers to mitigate this risk. Journal: Studies in Conflict & Terrorism Pages: 154-180 Issue: 2 Volume: 47 Year: 2024 Month: 2 X-DOI: 10.1080/1057610X.2021.1944023 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1944023 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:2:p:154-180 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1945187_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jannis Saalfeld Author-X-Name-First: Jannis Author-X-Name-Last: Saalfeld Title: Inter-Secular Party Competition and the (Non-)Formation of Salafi-Jihadist Milieus: Evidence from Tanzania and Kenya Abstract: This article investigates whether inter-secular party competition can constrain the formation of Salafi-jihadist milieus. Focusing on the recent rise of militant Islamism in sub-Saharan Africa, I argue that the electoral process prevents the opening of political space for jihadist radicalization when Salafi contention has historically become aligned with salient non-Islamist grievances. Specifically, I hypothesize that based on this alignment, the competitive electoralization of non-Islamist grievances incentivizes Salafi movements to endorse the electoral process and support secular parties. The article explores the validity of these propositions with the help of a “most-similar†case study of Zanzibar (Tanzania) and coastal Kenya. Journal: Studies in Conflict & Terrorism Pages: 181-198 Issue: 2 Volume: 47 Year: 2024 Month: 2 X-DOI: 10.1080/1057610X.2021.1945187 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1945187 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:2:p:181-198 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1943813_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: David Martin Jones Author-X-Name-First: David Martin Author-X-Name-Last: Jones Author-Name: M. L. R. Smith Author-X-Name-First: M. L. R. Author-X-Name-Last: Smith Title: The Age of Ambiguity: Art and the War on Terror Twenty Years after 9/11 Abstract: 9/11 and its aftermath was to have a dramatic impact on the visual arts and the artistic response to the War on Terror. This study surveys the evolution of these responses from the dramatic events of 11 September 2001 to the longer term reactions generated by the two-decade long encounter with the so-called War on Terrorism, primarily via the Imperial War Museum’s Age of Terror/Art Since 9/11 exhibition of 2017–2018. The analysis suggests that the visual artistic response moved from the initial amazement at the destruction of the Twin Towers, through satirical caricature of the terrorist persona, to a trite predictability that mirrored official equivocation about the threat posed by violent jihadist activism. Artistic endeavor on these terms became notable only for its moral ambiguity and complicity in self-censorship rather than contributing to the creation of artwork of enduring value. Journal: Studies in Conflict & Terrorism Pages: 115-134 Issue: 2 Volume: 47 Year: 2024 Month: 2 X-DOI: 10.1080/1057610X.2021.1943813 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1943813 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:2:p:115-134 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1956063_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Yasmine Ahmed Author-X-Name-First: Yasmine Author-X-Name-Last: Ahmed Author-Name: Orla Lynch Author-X-Name-First: Orla Author-X-Name-Last: Lynch Title: Terrorism Studies and the Far Right – The State of Play Abstract: Terrorism Studies as a specific area of research came to prominence in the aftermath of the September 11th 2001 terrorist attacks in the USA, but had existed across a range of disciplines long before albeit as a less consolidated and certainly less visible subject area. However, despite the existence of a body of work on terrorism, the impact of 9/11 on western perceptions of terrorism ensured that the direction of study was firmly focused on Islamic extremism for many years after the attacks. It is only very recently that significant attention has been focused on other ideologically motivated extremisms, namely the Far-Right. This article examines the nature of research into the Far-Right in the field of terrorism studies and examines what we mean when we refer to the Far-Right, and to what degree the field of terrorism studies has attended to this form of ideological extremism over the past two decades. In order to achieve these aims, this article presents an analysis of the academic publications concerned with the Far-Right produced in three Terrorism Studies journals: Terrorism and Political Violence, Studies in Conflict and Terrorism and Critical Studies in Terrorism. The results demonstrate that between 2001 and 2018 only 41 articles exclusively focus on the Far Right, and of these only 6 use primary data in their analysis. The results of a content analysis carried out on these 41 articles provides an insight into the research trajectory on the Far Right. Ultimately the results of the rapid appraisal and the content analysis speak to the extent to which and nature of how Far-Right terrorism is attended to in the field of Terrorism Studies. Journal: Studies in Conflict & Terrorism Pages: 199-219 Issue: 2 Volume: 47 Year: 2024 Month: 2 X-DOI: 10.1080/1057610X.2021.1956063 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1956063 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:2:p:199-219 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1961715_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Victor Asal Author-X-Name-First: Victor Author-X-Name-Last: Asal Author-Name: David Malet Author-X-Name-First: David Author-X-Name-Last: Malet Title: Nobody More Terrible than the Desperate: Conflict Conditions and Rebel Demand for Foreign Fighters Abstract: This article argues that the structural conflict conditions surrounding insurgencies produce rebel demand for external participation. Drawing on a data set of 140 militant organizations between 1998 and 2012, we find robust evidence that violence between insurgent groups is most likely to cause one or more of them to recruit externally. The effect is especially pronounced when regimes also employ punitive “stick†measures against opponents. Rather than a particular ideology being the best predictor of foreign fighters, it is desperate conflict conditions that lead insurgents to invest in the costs and uncertainties of outside assistance. Journal: Studies in Conflict & Terrorism Pages: 135-153 Issue: 2 Volume: 47 Year: 2024 Month: 2 X-DOI: 10.1080/1057610X.2021.1961715 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1961715 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:2:p:135-153 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1954798_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Cooper Vardy Author-X-Name-First: Cooper Author-X-Name-Last: Vardy Title: Silesia to Sinjar: The Export and Adaption of Einsatzgruppen Mobilized Killing Tactics from Eastern Europe to the Middle East Abstract: While the Nazi war machine is best known for its use of concentration camps to exterminate vast swathes of Europe’s Jewish population, more than 1.5 million other “undesirables†were executed by mobile killing squads across Eastern Europe. More recently, the Islamic State in Iraq and Syria (ISIS) utilized similar tactics to ethnically cleanse the Levant of various racial and religious minorities, relying on an analogous form of execution. The present research note contends, building from these similarities in action, that the methods of genocide employed by ISIS are an adaptation of the tactics developed by German Einsatzgruppen in the 1940s. To argue this point, this note utilizes a comparative framework examining the mobilization, localization, preparation, execution, and burial of both groups, and posits that the similarities are the result of ideological and tactical cross-pollination between Nazis and Islamists during and after World War 2. Journal: Studies in Conflict & Terrorism Pages: 321-343 Issue: 3 Volume: 47 Year: 2024 Month: 3 X-DOI: 10.1080/1057610X.2021.1954798 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1954798 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:3:p:321-343 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1956062_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jason Warner Author-X-Name-First: Jason Author-X-Name-Last: Warner Author-Name: Ellen Chapin Author-X-Name-First: Ellen Author-X-Name-Last: Chapin Author-Name: Quinn Sorenson Author-X-Name-First: Quinn Author-X-Name-Last: Sorenson Title: Bombing It: The Meaning and Sources of Suicide Bombing Failure Abstract: Over the years, political scientists and policymakers have striven to understand the circumstances under which terrorists fail, operationally and strategically. However, the question of failure has less frequently been approached through the lens of any one specific tactic. This article asks: how should one define and understand the sources of suicide bombing failure? After introducing a new definition of suicide bombing failure, the article next uses probit model analysis to test planner (or “architectâ€) versus militant (or “attackerâ€) sources of failure by using a unique dataset detailing the suicide bombing efforts of three of the most active African jihadist terror groups which leveraged suicide terrorism from 2007 to 2020 — al-Shabaab, “Boko Haram,†and Al-Qaeda in the Islamic Maghreb (“AQIMâ€). It finds evidence that choices made by these groups’ “architects,†are most commonly correlated with suicide bombing failures, rather than operational failures by “attackers†themselves. Journal: Studies in Conflict & Terrorism Pages: 249-277 Issue: 3 Volume: 47 Year: 2024 Month: 3 X-DOI: 10.1080/1057610X.2021.1956062 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1956062 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:3:p:249-277 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1956100_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Byman Author-X-Name-First: Daniel Author-X-Name-Last: Byman Title: Counterterrorism and Modern White Supremacy Abstract: Too often the terrorist threat is judged by lives lost, but less quantifiable metrics like political impact and strategic plausibility are also vital for understanding the danger. The history of the modern white supremacist movement in the United States illustrates different dimensions of how terrorism and political violence affect a country. Changing politics led to a devastating U.S. government crackdown on various Klan and like-minded groups in the mid and late 1960s. In the years that followed, violent white supremacist groups decentralized and followed new strategies, and the internet also transformed the movement. As a result, the threat white supremacists pose changed: they no longer enforce a structurally racist political and social system in the South, but they target a wider range of enemies, conduct bloodier attacks, and embrace sedition. Journal: Studies in Conflict & Terrorism Pages: 221-248 Issue: 3 Volume: 47 Year: 2024 Month: 3 X-DOI: 10.1080/1057610X.2021.1956100 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1956100 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:3:p:221-248 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1961673_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bárbara Motta Author-X-Name-First: Bárbara Author-X-Name-Last: Motta Author-Name: David P. Succi Junior Author-X-Name-First: David P. Author-X-Name-Last: Succi Junior Title: Legitimation through Collectivization: Al Qaeda and US Discourses on the Use of Force Abstract: Discursive struggles for legitimation are a constitutive feature of the politically guided deployment of force. This dynamic of political communication frequently entails engaging with multiple audiences, such as international, local, and intra-group. As it compels actors to diversify their narrative strategies, it often results in conflicting statements. We argue that a particular discursive strategy, which we call the collectivization of the self, provides actors with an instrument to address different audiences with a singular narrative. We present this strategy through a content and qualitative analysis of Bin Laden’s statements on terrorist actions and Bush’s speeches on the intervention in Afghanistan. Journal: Studies in Conflict & Terrorism Pages: 301-320 Issue: 3 Volume: 47 Year: 2024 Month: 3 X-DOI: 10.1080/1057610X.2021.1961673 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1961673 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:3:p:301-320 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1954353_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Thomas Juneau Author-X-Name-First: Thomas Author-X-Name-Last: Juneau Title: How War in Yemen Transformed the Iran-Houthi Partnership Abstract: The war in Yemen has transformed the Iran-Houthi partnership. Iran has built significant influence in Yemen since 2015, but the Houthis are not a simple arm of its foreign policy: Iran has bandwagoned on Houthi successes as much as it has caused them. For Iran, supporting the Houthis is an appealing proposition: at a low cost, it has contributed to getting Saudi Arabia bogged down in a costly war. This article analyses the causes and consequences of the quantitative and qualitative shifts in Iran’s support for the Houthis. After laying out the strategic rationale for the expansion of the partnership, it explains how this has represented an important victory for Iran and how these developments mirror other trends in the evolution of the constellation of revisionist actors Iran supports. Journal: Studies in Conflict & Terrorism Pages: 278-300 Issue: 3 Volume: 47 Year: 2024 Month: 3 X-DOI: 10.1080/1057610X.2021.1954353 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1954353 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:3:p:278-300 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1965728_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Suleyman Ozeren Author-X-Name-First: Suleyman Author-X-Name-Last: Ozeren Author-Name: Suat Cubukcu Author-X-Name-First: Suat Author-X-Name-Last: Cubukcu Author-Name: Gabriel Cash Author-X-Name-First: Gabriel Author-X-Name-Last: Cash Title: Exposure to Extremist Content and Public Sympathy for ISIS Abstract: This study examines how individuals’ exposure to ISIS-related propaganda affects public sympathy for ISIS. We examine the extent that each type of communication channel (e.g. online media, traditional offline media, and in-person interactions) affects an individual’s perceptions of ISIS. We use a nationally representative sample (N = 1,609) from Turkey, which has played an important role during the rise and fall of ISIS with its unique geographical, social, and political position. The findings suggest a significant relationship between exposure to in-person propaganda and having sympathy for ISIS. However, this relationship does not exist for online and traditional media propaganda. Journal: Studies in Conflict & Terrorism Pages: 345-365 Issue: 4 Volume: 47 Year: 2024 Month: 4 X-DOI: 10.1080/1057610X.2021.1965728 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1965728 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:4:p:345-365 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1968983_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Victor Asal Author-X-Name-First: Victor Author-X-Name-Last: Asal Author-Name: Michael Shkolnik Author-X-Name-First: Michael Author-X-Name-Last: Shkolnik Title: Crossing Battle Death Lines: Why Do Some Insurgent Organizations Escalate Violence to Higher-Intensity Armed Conflicts? Abstract: Why do some insurgent groups escalate violence to higher-intensity insurgencies or civil war? We explore this question among 140 insurgent groups worldwide across various thresholds of armed conflict. We argue that the main drivers of escalation are insurgent networks and domestic resource mobilization. Findings show that territorial control and engagement in criminal activities to finance operations are key factors associated with insurgent-inflicted battle deaths. The number of insurgent alliances, however, is the strongest determinant of higher-intensity armed conflicts. State counterinsurgency strategies also play an important role. Many of these insights support an exploratory look at rising insurgent violence in West Africa’s Sahel region. Journal: Studies in Conflict & Terrorism Pages: 416-431 Issue: 4 Volume: 47 Year: 2024 Month: 4 X-DOI: 10.1080/1057610X.2021.1968983 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1968983 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:4:p:416-431 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1962500_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Henriette Frees Esholdt Author-X-Name-First: Henriette Author-X-Name-Last: Frees Esholdt Author-Name: Kathrine Elmose Jørgensen Author-X-Name-First: Kathrine Author-X-Name-Last: Elmose Jørgensen Title: Emotional Trials in Terrorism Research: Running Risks When Accessing Salafi-Jihadist Foreign Fighter Returnees and Their Social Milieu Abstract: Islamist radicalization and terrorism studies, besides lacking in methodological transparency, have long suffered from immense access problems. Based on ethnographic fieldwork in Sweden and Denmark—two countries with significant populations of Salafi-jihadist Western foreign fighter returnees—this article focuses on challenges to gaining initial access to a field described as emotionally demanding, hard-to-reach and high-risk. Addressing emotional trials that emerge when experiencing risks of physical dangers, emotional stressors and ethical issues, we demonstrate how emotions shape and influence decisions made in the field, such as whether to continue or to give up attempting to gain initial access. Thus, we provide the transparency that is so crucial to unraveling and understanding the methodological obstacles to accessing Salafi-jihadist environments. Journal: Studies in Conflict & Terrorism Pages: 432-456 Issue: 4 Volume: 47 Year: 2024 Month: 4 X-DOI: 10.1080/1057610X.2021.1962500 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1962500 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:4:p:432-456 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1963092_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Catherine Bouko Author-X-Name-First: Catherine Author-X-Name-Last: Bouko Author-Name: Pieter Van Ostaeyen Author-X-Name-First: Pieter Author-X-Name-Last: Van Ostaeyen Author-Name: Pierre Voué Author-X-Name-First: Pierre Author-X-Name-Last: Voué Title: How Jihadi Salafists Sometimes Breach, But Mostly Circumvent, Facebook’s Community Standards in Crisis, Identity and Solution Frames Abstract: We analyzed posts written by Facebook profiles who advocate violent jihad without supporting any terrorist group. They share extremist content in the middle of regular posts, thanks to which they are likely to reach a large audience. We identified to what extent their ingroup-outgroup opposition is constructed in crisis, identity, and solution frames and how they use these frames in posts which sometimes breach Facebook’s community standards, but which mostly circumvent them through various strategies of doublespeak. Among them, myth, in the sense of Barthes, and eudaimonic content appeared as particularly powerful to naturalize and spread jihadi ideology on social media. Journal: Studies in Conflict & Terrorism Pages: 366-391 Issue: 4 Volume: 47 Year: 2024 Month: 4 X-DOI: 10.1080/1057610X.2021.1963092 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1963092 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:4:p:366-391 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1966721_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Robert S. Snyder Author-X-Name-First: Robert S. Author-X-Name-Last: Snyder Title: Ideology and Global Conflicts: Revolutionary Actors and Their Opposition to Liberalism Abstract: The concept of the revisionist state has been central to IR, and the literature demonstrates that they initiate international conflicts. As a subset of the revisionist state, revolutionary states in particular have been shown to foment international conflicts. Moreover, ideology has come to explain international conflicts, especially the Second World War, Cold War, and “War on Terror.†Nevertheless, the literature on revolutionary states discounts the role of ideology and that on ideology often discounts the role of revisionist or revolutionary states. This paper develops the concept of a distinct type of revisionist state—the revolutionary actor—that explains the outbreak of the Second World War, the Cold War, and War on Terror, three of the greatest global conflicts of the last century. It first develops a model of the revolutionary actor, linking the ideologies of Marxism-Leninism, Nazism, and jihadism that led to the Second World War, the Cold War, and War on Terror. It then offers a theory based on ideology as to why the revolutionary actors initiated these three global conflicts. Lastly, it offers a research design to test the theory and highlights the three cases with recent literature on them. Journal: Studies in Conflict & Terrorism Pages: 392-415 Issue: 4 Volume: 47 Year: 2024 Month: 4 X-DOI: 10.1080/1057610X.2021.1966721 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1966721 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:4:p:392-415 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1981203_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rueben Ananthan Santhana Dass Author-X-Name-First: Rueben Ananthan Author-X-Name-Last: Santhana Dass Title: Jihadists’ Use and Pursuit of Weapons of Mass Destruction: A Comparative Study of Al-Qaeda and Islamic State’s Chemical, Biological, Radiological and Nuclear (CBRN) Weapons Programs Abstract: This article compares and contrasts the Chemical, Biological, Radiological and Nuclear (CBRN) weapons programs of Al-Qaeda and Islamic State through the framework of organizational structure, typology, ideology and CBRN incidents (selected case studies). A three-step CBRN model explaining the use of CBRN weapons by both groups is proposed. This model suggests that the use of CBRN weapons is predicated on three factors: leadership at the strategic level; acquisition of material at the operational level and technical capabilities at the tactical level. It is found that the failure of both groups in developing and carrying out large-scale CBRN attacks boils down primarily to the lack of technical capabilities and the difficulties associated with acquisition of materials. It is argued that the future CBRN threat landscape will likely be dominated by the threat of small-scale, localized attacks using crude chemical or biological agents by lone actors or autonomous cells as opposed to larger-scale centrally directed attacks. Journal: Studies in Conflict & Terrorism Pages: 548-582 Issue: 5 Volume: 47 Year: 2024 Month: 5 X-DOI: 10.1080/1057610X.2021.1981203 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1981203 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:5:p:548-582 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1980981_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniela Peterka-Benton Author-X-Name-First: Daniela Author-X-Name-Last: Peterka-Benton Author-Name: Francesca Laguardia Author-X-Name-First: Francesca Author-X-Name-Last: Laguardia Title: The Trouble with Numbers: Difficult Decision Making in Identifying Right-Wing Terrorism Cases. An Investigative Look at Open Source Social Scientific and Legal Data Abstract: Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism. Journal: Studies in Conflict & Terrorism Pages: 502-525 Issue: 5 Volume: 47 Year: 2024 Month: 5 X-DOI: 10.1080/1057610X.2021.1980981 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1980981 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:5:p:502-525 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1980982_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Keshab Giri Author-X-Name-First: Keshab Author-X-Name-Last: Giri Author-Name: Roos Haer Author-X-Name-First: Roos Author-X-Name-Last: Haer Title: Female Combatants and Durability of Civil War Abstract: How is conflict duration affected by female combatants in rebel group? In this study, we advance three possible pathways through which female combatants enhance the resilience of the rebel group, thereby lengthening the conflict. We explore this association using quantitative cross-sectional data on female combatant and conflict duration. The positive relationship between female combatants and civil war duration from quantitative analysis is substantiated by the qualitative evidence collected via in-depth interviews with former male and female combatants in the Maoist insurgency in Nepal. This work has important implications for the study of armed conflict duration, rebel organizations, and post-conflict peacebuilding. Journal: Studies in Conflict & Terrorism Pages: 526-547 Issue: 5 Volume: 47 Year: 2024 Month: 5 X-DOI: 10.1080/1057610X.2021.1980982 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1980982 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:5:p:526-547 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1970891_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joseph M. Brown Author-X-Name-First: Joseph M. Author-X-Name-Last: Brown Title: Terrorist Peer Review: Which Autonomous Attacks Does ISIL Accept for Publication? Abstract: The Islamic State of Iraq and the Levant (ISIL) claims some attacks by autonomous jihadists in the West, but not all of them. This article argues that ISIL selectively takes credit for attacks that fit tactical norms laid out in the group’s propaganda. These norms include lethality toward the victims and martyrdom for the assailant. Probit regression analyses of a new database of autonomous attacks in the West confirm that lethality and martyrdom increase the probability of ISIL’s official propaganda claiming a given incident. The Islamic State’s “peer review†and selective credit-claiming incentivize autonomous jihadists to adopt more lethal and suicidal tactics so that their actions will gain acceptance and they will be recognized as soldiers of the caliphate. Journal: Studies in Conflict & Terrorism Pages: 457-475 Issue: 5 Volume: 47 Year: 2024 Month: 5 X-DOI: 10.1080/1057610X.2021.1970891 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1970891 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:5:p:457-475 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1980978_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Christopher Day Author-X-Name-First: Christopher Author-X-Name-Last: Day Author-Name: Michael Woldemariam Author-X-Name-First: Michael Author-X-Name-Last: Woldemariam Title: From Rebelling to Ruling: Insurgent Victory and State Capture in Africa Abstract: Political order following rebel victory in civil wars has seen remarkable variation. While some rebellions transform their victories into durable regimes, others do not. This article develops a typological framework to assess the ability, and inability, of victorious rebellions to capture the state after overthrowing incumbents, with a focus on Africa. We argue that these outcomes – state capture, failed state capture, or mixed – depend on two key dimensions of political and military centralization before victory: (1) the distribution of power between rebel organizations participating in the civil war and (2) the communal structure within them. Journal: Studies in Conflict & Terrorism Pages: 476-501 Issue: 5 Volume: 47 Year: 2024 Month: 5 X-DOI: 10.1080/1057610X.2021.1980978 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1980978 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:5:p:476-501 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1983211_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Erin M. Kearns Author-X-Name-First: Erin M. Author-X-Name-Last: Kearns Author-Name: Casey Delehanty Author-X-Name-First: Casey Author-X-Name-Last: Delehanty Title: The Fast & The Furious…Torturous?: Examining the Impact of Torture Scenes in Popular Films on Public Perceptions of Torture Policy Abstract: Entertainment media regularly depict torture as effective. Indeed, most popular films contain torture—often outside of counterterrorism-specific plotlines. In the counterterrorism-specific context, watching a scene where torture works increases support for the practice. Yet counterterrorism-specific media is a niche genre, and we do not know if this holds for torture scenes more generally. We address this gap with a 4 (movie rating) x 3 (scene type) experiment with U.S. adults. While participants recognized that torture scenes are in fact torture, viewing these scenes did not impact support for the practice. Findings suggest that media’s influence on views about torture is more nuanced. Journal: Studies in Conflict & Terrorism Pages: 583-598 Issue: 6 Volume: 47 Year: 2024 Month: 6 X-DOI: 10.1080/1057610X.2021.1983211 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1983211 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:6:p:583-598 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1990826_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anna Kruglova Author-X-Name-First: Anna Author-X-Name-Last: Kruglova Title: “For God, for Tsar and for the Nation: Authenticity in the Russian Imperial Movement’s Propaganda†Abstract: This paper will examine how extremist organizations manage to present themselves as credible actors in the eyes of potential supporters on social media. This paper will address this question by exploring the role of authenticity in strategic narratives, which is believed to help these groups achieve this purpose. Apart from introducing this new theoretical concept, the paper will also apply it to a new case study of the Russian Imperial Movement (RIM) – the first far-right organization to be designated as terrorist by the U.S. and Canada. By conducting discourse analysis of the group’s social media propaganda on the Russian network VKontakte, the paper will show how the RIM makes its strategic narratives authentic and, as a consequence, creates an image of a credible and trustworthy actor and thus manages to reach out to its target audience. Journal: Studies in Conflict & Terrorism Pages: 645-667 Issue: 6 Volume: 47 Year: 2024 Month: 6 X-DOI: 10.1080/1057610X.2021.1990826 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1990826 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:6:p:645-667 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1987656_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Christopher Wall Author-X-Name-First: Christopher Author-X-Name-Last: Wall Title: The (Non) Deus-Ex Machina: A Realistic Assessment of Machine Learning for Countering Domestic Terrorism Abstract: In light of the January 6 insurrection, the Department of Homeland Security (DHS) and other national security agencies are looking toward using more artificial intelligence (AI) and machine learning (ML) tools to detect and combat extremism in America. AI and ML hold much promise for the domestic CT mission, but the discourse has placed on them unrealistic expectations that do not conform to what is technically possible. This essay seeks to create a baseline conversation about what is ML, how it actually works, and what is a more realistic use case for ML in domestic CT. The core argument is that current ML tools are not optimal for the CT enterprise because terrorism experts are often sidelined in the development and the implementation of these algorithms. Journal: Studies in Conflict & Terrorism Pages: 599-621 Issue: 6 Volume: 47 Year: 2024 Month: 6 X-DOI: 10.1080/1057610X.2021.1987656 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1987656 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:6:p:599-621 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1987659_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Rachel Yon Author-X-Name-First: Rachel Author-X-Name-Last: Yon Author-Name: Daniel Milton Author-X-Name-First: Daniel Author-X-Name-Last: Milton Title: Examining the Outcome of Investigations and Prosecutions of Extremism in the United States Abstract: While the criminology literature indicates that investigative and judicial outcomes can be influenced by several factors, a smaller number of scholars have examined how similar factors operate in terrorism investigations and prosecutions. We use the Profiles of Individual Radicalization in the United States (PIRUS) and American Terror Study (ATS) datasets to examine the factors that influence outcomes in such cases from 1947 to 2017. We find that the ideological affiliation, leadership activity, and the commission of an act of violence increase the severity of the legal outcome, while other factors such as gender, age, race, and biographic availability have less consistent impact. Journal: Studies in Conflict & Terrorism Pages: 622-644 Issue: 6 Volume: 47 Year: 2024 Month: 6 X-DOI: 10.1080/1057610X.2021.1987659 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1987659 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:6:p:622-644 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1995940_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Graig R. Klein Author-X-Name-First: Graig R. Author-X-Name-Last: Klein Title: Refugees, Perceived Threat & Domestic Terrorism Abstract: Refugees’ effect on domestic terrorism is conditioned by host-country social perception (attitude about living next-door to foreigners) and economic competition. These hypotheses are tested cross-nationally from 1995-2014 leveraging data from the World Values Survey. The results show social perception matters. When refugee flow to a country increases from the mean to 75th percentile, it does not statistically alter domestic terrorism risk. But when a host-country’s preference to not live next-door to foreigners is accounted for and changes from the mean (20.9%) to 75th percentile (30.3%), the change in refugee flow increases the risk of domestic terrorism by 40%. Journal: Studies in Conflict & Terrorism Pages: 668-699 Issue: 6 Volume: 47 Year: 2024 Month: 6 X-DOI: 10.1080/1057610X.2021.1995940 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1995940 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:6:p:668-699 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2007244_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jeffrey Treistman Author-X-Name-First: Jeffrey Author-X-Name-Last: Treistman Title: Social Exclusion and Political Violence: Multilevel Analysis of the Justification of Terrorism Abstract: Research on the causes of terrorism tends to focus on broad national-level trends without examining how such factors influence individuals and their propensity for political violence. Meanwhile, theories of radicalization have yielded important insight on how individuals embrace terrorism, but the transformation does not occur within a vacuum divorced from contextual factors. This article is therefore an attempt to bridge macro-micro linkages to better understand the causes of terrorism, and focuses on levels of socio-political exclusion within a country. Using multilevel analysis, the article finds a consistently positive relationship between levels of social exclusion and individual support for terrorism. The results help capture the multidimensional nature of the causes of terrorism and better informs counterterrorism policymaking. Journal: Studies in Conflict & Terrorism Pages: 701-724 Issue: 7 Volume: 47 Year: 2024 Month: 7 X-DOI: 10.1080/1057610X.2021.2007244 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2007244 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:7:p:701-724 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2042897_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kerem Övet Author-X-Name-First: Kerem Author-X-Name-Last: Övet Author-Name: James Hewitt Author-X-Name-First: James Author-X-Name-Last: Hewitt Author-Name: Tahir Abbas Author-X-Name-First: Tahir Author-X-Name-Last: Abbas Title: Understanding PKK, Kurdish Hezbollah and ISIS Recruitment in Southeastern Turkey Abstract: This paper provides an explanation for how the PKK, Kurdish Hezbollah, and ISIS, representing distinct ethno-nationalist, Islamist and ideologically motivated political movements, radicalize and recruit supporters in the regions of Eastern and Southeastern Turkey. In doing so, this paper contributes to ongoing theoretical debates about radicalization and recruitment. This study reveals how various regionally specific structural factors encourage radicalization and recruitment into violent politico-ideological movements. In particular, state oppression of ethnic minorities, economic inequalities, geography, and local demographics. While existing literature on radicalization focuses on push factors (structural) combined with pull factors (ideology), this research demonstrates that structural factors in Eastern and Southeastern Turkey are both push and pull factors in processes of radicalization. Journal: Studies in Conflict & Terrorism Pages: 750-770 Issue: 7 Volume: 47 Year: 2024 Month: 7 X-DOI: 10.1080/1057610X.2022.2042897 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2042897 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:7:p:750-770 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2007562_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Vidar B. Skretting Author-X-Name-First: Vidar B. Author-X-Name-Last: Skretting Title: Pragmatism and Purism in Jihadist Governance: The Islamic Emirate of Azawad Revisited Abstract: The Islamic Emirate established in northern Mali in 2012 was brought down less than a year later by a French military intervention, provoked by the Emirate’s belligerent posture. This article explains why the leaders of the Emirate appeared to govern in a way that jeopardized the state’s survival, despite AQIM’s leadership calling for a cautious approach. Based on novel primary sources, this article provides a detailed view of governance practices in the Emirate, showing that they were in fact considerably more pragmatic than hitherto assumed. Furthermore, it argues that both AQIM and the leaders of the Emirate in the end were more concerned with the long-term prospects of jihadist expansion in the region than with the survival of the Emirate itself. Journal: Studies in Conflict & Terrorism Pages: 725-749 Issue: 7 Volume: 47 Year: 2024 Month: 7 X-DOI: 10.1080/1057610X.2021.2007562 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2007562 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:7:p:725-749 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_1997134_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Eldad Ben Aharon Author-X-Name-First: Eldad Author-X-Name-Last: Ben Aharon Title: The “War on Terror†and Public Diplomacy during the Cold War: Israeli–Turkish Relations and the 1980 Military Coup Abstract: What influence does the digital diplomacy of the post 9/11 world have on our understanding of counter-terrorism (CT) diplomacy during the Cold War? This article explores this question and the intersection between intelligence, counterterrorism diplomacy and the digital transformation long overlooked by scholars of Israeli–Turkish relations, Cold War history and terrorism studies. Diplomacy in crisis situations usually operates in an uncertain reality triggered by conflict. Turkey’s domestic crises, specifically its energy crisis between 1978 and 1980, served to shift the country’s foreign policy toward the more anti-Israeli stance of the Arab nations and their demands that Turkey boycott Israel in return for supplying Turkey’s energy needs. This came in the context of a regional wave of contentious politics in the Middle East after the 1979 Iranian revolution, when Israel had just lost three decades of massive investment in Iran under the Shah. I argue that knowing the Turkish military junta’s primary goals centered on the fight against the far left and right political violence at home and on Armenian terror attacks against Turkish diplomats abroad, Israeli diplomats employed a very selective CT policy focusing on the cooperation between Armenian Secret Army for the Liberation of Armenia and the Palestine Liberation Organization. Public diplomacy was key to conveying this message, and attempts to plant information about the Armenian-Palestinian cooperation in Turkish news outlets and national television were made. Israel’s goal was to influence Turkey’s public emotions and convey to Turkey’s military junta that Jerusalem was a true ally, working to confront the mutual regional threat of Armenian-Palestinian terrorists arising from Lebanese training camps. This case study highlights the paradox that Ministries of Foreign Affairs and diplomats enjoyed an unparalleled monopoly of power during the Cold War over the use of means of public diplomacy, while at the time having very limited capacity, and a frequent need for third party mediators to engage with foreign public audiences. It is thus unlikely that the conveyed messages would have been as visible and disseminated as easily as they could be in the post 9/11 via means of digital diplomacy. Journal: Studies in Conflict & Terrorism Pages: 792-815 Issue: 7 Volume: 47 Year: 2024 Month: 7 X-DOI: 10.1080/1057610X.2021.1997134 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.1997134 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:7:p:792-815 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2002687_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Joelle Rizk Author-X-Name-First: Joelle Author-X-Name-Last: Rizk Title: Exploring the Nexus between Armed Groups and the Trafficking and Smuggling of Human Beings in the Central Sahel and Libya Abstract: In the past decade a series of events including the outbreak of the Syrian war, drought and tireless insurgencies in sub-Saharan Africa triggered the largest wave of displacement ever seen through and around the Mediterranean. The majority of those bound to Europe through the Mediterranean are smuggled by criminal networks. The proliferation of Trafficking and Smuggling of Human Beings (TSHB) between the Sahel and the Libyan shores feeds into the evolving threats of terrorism, crime and insecurity in the Sahel, West Africa and Europe. This paper explores the involvement of armed groups in TSHB in the Central Sahel and Libya. The author argues that the involvement of armed actors in the TSHB in the Central Sahel and Libya is not uniform and not systematically used for terrorism financing. Criminal networks and armed groups leverage opportunities created by conflict to generate profit and project power. They operate in convergent spaces benefitting from state fragility, and shared social networks. The link between terrorism and migrant smuggling and trafficking, if found, remains localized benefitting individuals rather than organizations. Journal: Studies in Conflict & Terrorism Pages: 771-791 Issue: 7 Volume: 47 Year: 2024 Month: 7 X-DOI: 10.1080/1057610X.2021.2002687 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2002687 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:7:p:771-791 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2083932_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Emma Ylitalo-James Author-X-Name-First: Emma Author-X-Name-Last: Ylitalo-James Author-Name: Andrew Silke Author-X-Name-First: Andrew Author-X-Name-Last: Silke Title: How Proximity and Space Matter: Exploring Geographical & Social Contexts of Radicalization in Northern Ireland Abstract: The “specificity problem†is one of the longest running unanswered questions in research on terrorism. This problem focuses on the fundamental question as to why do only a few people radicalize when many appear to have been exposed to at least some of the same causes of radicalization? The current study seeks to help answer that question through comparative research with two sample populations in Northern Ireland. In-depth interviews were carried out with 17 former paramilitary members and 12 paramilitary sympathizers. The interviews explored factors which distinguished those who became actively involved with paramilitary groups versus those who did not. The results discussed here found that geographic proximity to intercommunity violence flashpoints/interfaces was strongly associated with increased paramilitary involvement. Thematic analysis found this effect was mediated by two additional factors: (1) levels of exposure to violence and (2) levels of community isolation. The findings are discussed in relation to the wider literature on radicalization. Journal: Studies in Conflict & Terrorism Pages: 940-962 Issue: 8 Volume: 47 Year: 2024 Month: 8 X-DOI: 10.1080/1057610X.2022.2083932 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2083932 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:8:p:940-962 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2011711_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mirna El Masri Author-X-Name-First: Mirna Author-X-Name-Last: El Masri Author-Name: Brian J. Phillips Author-X-Name-First: Brian J. Author-X-Name-Last: Phillips Title: Threat Perception, Policy Diffusion, and the Logic of Terrorist Group Designation Abstract: Many governments maintain lists of terrorist groups, imposing sanctions on designated organizations. However, the logic behind designation remains unclear. Furthermore, most studies focus on Western countries. This paper develops arguments for why attack attributes, group attributes, and policy diffusion might explain proscription. Empirically, we examine hundreds of militant organizations to see which are listed by the European Union, India, Pakistan, Russia, the United Kingdom, or the United States. Generally, designation does not seem to be driven by target or attack severity. It often results from diffusion: most countries follow the United States. Islamist group motivation is also an important factor. Journal: Studies in Conflict & Terrorism Pages: 838-861 Issue: 8 Volume: 47 Year: 2024 Month: 8 X-DOI: 10.1080/1057610X.2021.2011711 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2011711 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:8:p:838-861 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2009633_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Odin Shaw Author-X-Name-First: Daniel Odin Author-X-Name-Last: Shaw Author-Name: Huseyn Aliyev Author-X-Name-First: Huseyn Author-X-Name-Last: Aliyev Title: The Frontlines Have Shifted: Explaining the Persistence of Pro-State Militias after Civil War Abstract: Many ceasefire and peace agreements stipulate the disarmament and demobilization of pro-state armed groups involved in the conflict, yet few of these groups ever completely demobilize. This study seeks to explain the process of incomplete demobilization by advancing a theoretical argument that pro-state armed groups are least likely to disarm and demobilize when the monopoly on violence is fragmented, and when there is relative balance of capabilities and interests between the government and pro-state armed groups. Under these circumstances, both governments and pro-state armed groups may favor incomplete demobilization enabling them to pursue their strategic objectives. We draw on unique interview data with pro-state paramilitaries from Ukraine to empirically illustrate our theoretical expectations. Journal: Studies in Conflict & Terrorism Pages: 817-837 Issue: 8 Volume: 47 Year: 2024 Month: 8 X-DOI: 10.1080/1057610X.2021.2009633 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2009633 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:8:p:817-837 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2016514_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Emeka Thaddues Njoku Author-X-Name-First: Emeka Thaddues Author-X-Name-Last: Njoku Title: Queering Terrorism Abstract: There are few theoretical and empirical researches on sexual fluidity and sexual victimization against men inside terrorist groups. Drawing from the case of Islamic terrorists group (Boko Haram), queer theory, and discursive accounts of male survivors, NGOs and security agents, I argue that Boko Haram’s rape of men and boys, whether collectively or individually, exposes their sexual fluidity. The reconstruction of acceptable sexual norms, syncretism due to the existence of same-sex subculture in Lake Chad, and hypocrisy explain their sexual variability. This study adds to the growing body of knowledge on the dynamics of sexuality and terrorism. Journal: Studies in Conflict & Terrorism Pages: 888-910 Issue: 8 Volume: 47 Year: 2024 Month: 8 X-DOI: 10.1080/1057610X.2021.2016514 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2016514 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:8:p:888-910 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2016558_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Tiffiany Howard Author-X-Name-First: Tiffiany Author-X-Name-Last: Howard Author-Name: Brach Poston Author-X-Name-First: Brach Author-X-Name-Last: Poston Author-Name: April Lopez Author-X-Name-First: April Author-X-Name-Last: Lopez Title: Extremist Radicalization in the Virtual Era: Analyzing the Neurocognitive Process of Online Radicalization Abstract: Emerging research on the etiology of violent radical political behavior has begun to explore the role of empathy in shaping an individual’s beliefs, attitudes, and intentions that culminate in radicalization. The existing studies focus on persuasive influence upon an individual, but they overlook the centrality of empathy and that in the absence of empathy, persuasion is not salient. If an individual empathizes with a message then when it is processed by the receiver, the message is more likely to be considered realistic, relatable, believable, and therefore, persuasive. However, very little is known as to how messages should be designed to stimulate empathy in order to optimize their persuasive impact, which is particularly relevant to terrorist and extremist messaging given the lethal outcome of successful persuasion. This study examines the neurocognitive process of radicalization, specifically as it occurs within virtual online space, and how message content and production features have the potential to arouse empathy and generate radical-persuasive outcomes among the target audience. The findings of this research demonstrate how emotions, specifically that of empathy, can be stimulated in order to facilitate the process of radicalization, thus increasing the potential for violent radical political behavior. Journal: Studies in Conflict & Terrorism Pages: 862-887 Issue: 8 Volume: 47 Year: 2024 Month: 8 X-DOI: 10.1080/1057610X.2021.2016558 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2016558 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:8:p:862-887 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2016541_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mathew L. Bukit Author-X-Name-First: Mathew Author-X-Name-Last: L. Bukit Title: Bangsamoro Separatism and Classical Counterinsurgency: Reconsidering Revolutionary War in the Southern Philippines Abstract: The dominant history of Muslim armed separatism in the Philippines obscures the insurgency’s character. Insurgents espouse revolutionary war, even though this mischaracterizes the interests constituted in the insurgent cause. Patricio Abinales’ critiques of the orthodoxy are applied to disambiguate the Bangsamoro cause, highlighting the insurgency’s concurrent supralocal and local logics. Supralocal-local dissonance is reconciled by recasting the Bangsamoro cause as a supralocal-local bargain through Stathis Kalyvas’ concept of alliance, retaining classical counterinsurgency theory’s macropolitical locus but imbued with cognizance of the insurgency’s micropolitics. This approach challenges the perceived finality of the insurgency after the Bangsamoro Autonomous Region in Muslim Mindanao. Journal: Studies in Conflict & Terrorism Pages: 911-939 Issue: 8 Volume: 47 Year: 2024 Month: 8 X-DOI: 10.1080/1057610X.2021.2016541 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2016541 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:8:p:911-939 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2013760_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Alexandra Chinchilla Author-X-Name-First: Alexandra Author-X-Name-Last: Chinchilla Author-Name: Jesse Driscoll Author-X-Name-First: Jesse Author-X-Name-Last: Driscoll Title: Side-Switching as State-Building: the Case of Russian-Speaking Militias in Eastern Ukraine Abstract: Why do some militias bandwagon with the state during a civil war while others resist state authority? A formal model highlighting the role of material incentives treats militia commanders as rent-seekers competing for security sector jobs run by civilians. Western donors can send aid to inflate the size of the pie that civilians distribute to militia commanders. Our key result is a partial incorporation equilibrium by which jointly-sustainable strategies selected by a minimum winning coalition of battalion commanders maximize their share of rents. Battalion commanders outside this coalition do best by remaining outside the state. We evaluate the model using an analytic narrative of contemporary Ukraine – a hard case for our theory since ideology and ethnicity play an important role in most standard accounts of the conflict. Analysis of a volunteer battalion incorporation dataset, results from a survey of 64 Ukrainian volunteer battalion members, and a short discussion of the Azov Battalion suggest the salience of intra-Ukrainian distributional politics to militia commanders’ incorporation strategies. Journal: Studies in Conflict & Terrorism Pages: 1127-1146 Issue: 9 Volume: 47 Year: 2024 Month: 9 X-DOI: 10.1080/1057610X.2021.2013760 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013760 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1127-1146 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2013751_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mohammed M. Hafez Author-X-Name-First: Mohammed M. Author-X-Name-Last: Hafez Author-Name: Michael Gabbay Author-X-Name-First: Michael Author-X-Name-Last: Gabbay Author-Name: Emily Kalah Gade Author-X-Name-First: Emily Kalah Author-X-Name-Last: Gade Title: Consolidation of Nonstate Armed Actors in Fragmented Conflicts: Introducing an Emerging Research Program Abstract: How do armed groups consolidate power in conflict landscapes packed with rival factions, paramilitary militias, and local warlords? Extant scholarship has studied the causes and consequences of rebel fragmentation, but the reverse process in which power that is dispersed among many armed actors becomes concentrated among a handful of factions is underexplored. In this special issue, we bring together eight case studies to illustrate at least three pathways to militant consolidation. Cooperative consolidation involves organizations growing consensually through alliance formation and mergers. Competitive consolidation entails a gradual process of increasing political and military power by outcompeting rival groups for fighters, popular support, and international sponsors. Coercive consolidation occurs when militant organizations violently eliminate rivals. This framing article considers several factors that may explain the choice of consolidation mode, including the role of territorial control, permeability of group boundaries, and state sponsorship. By investigating this under-examined aspect of civil conflict, we forge fundamentally new theoretical ground in the study of internal wars and weakly-governed societies. Journal: Studies in Conflict & Terrorism Pages: 963-983 Issue: 9 Volume: 47 Year: 2024 Month: 9 X-DOI: 10.1080/1057610X.2021.2013751 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013751 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:963-983 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2013757_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Wolfram Lacher Author-X-Name-First: Wolfram Author-X-Name-Last: Lacher Title: Social Cleavages and Armed Group Consolidation: The Case of Khalifa Haftar’s Libyan Arab Armed Forces Abstract: In Libya’s fragmented military landscape, Khalifa Haftar’s Libyan Arab Armed Forces stands out as the only armed group that concentrated power over entire regions. The interplay of relative power and social cleavages conditioned Haftar’s choices of consolidation strategies. As Haftar grew stronger, he progressively moved from cooperative and competitive approaches toward coercion. Social cleavages wrought by conflict – as opposed to seemingly objective group boundaries – contributed to shaping Haftar’s choices between coercive and cooperative strategies. The significance of these cleavages depended on how violence had shaped local social cohesion and armed groups’ links with communities. Journal: Studies in Conflict & Terrorism Pages: 1065-1089 Issue: 9 Volume: 47 Year: 2024 Month: 9 X-DOI: 10.1080/1057610X.2021.2013757 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013757 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1065-1089 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2013759_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Michael Knights Author-X-Name-First: Michael Author-X-Name-Last: Knights Title: Real or Imagined Consolidation? The Case of Iraq’s Popular Mobilization Forces Abstract: Iraq’s Popular Mobilization Forces (PMF or Hashd al-Shaabi in Arabic) presents an intriguing case study of rebel consolidation, in which pro-regime militias opportunistically seized the reins of a new and rapidly expanding government security institution. The organizational wrapper of the PMF Commission gave an illusory sense of instant consolidation, whereas the formation of the PMF was just the beginning of one of many cycles of armed actor consolidation that came close to overtaking the Iraqi state in 2018–2019. The partial consolidation achieved by the militias within the PMF was largely an organizational, competitive and coercive phenomenon, masquerading as an ideational, cooperative merger. The effort to further consolidate PMF’s control over the Iraqi state became harder as it came close to achieving a near-hegemonic outcome, resulting in a factional field presently characterized as a multipolar distribution of power across militia factions. Journal: Studies in Conflict & Terrorism Pages: 1110-1126 Issue: 9 Volume: 47 Year: 2024 Month: 9 X-DOI: 10.1080/1057610X.2021.2013759 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013759 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1110-1126 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2013755_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Nadeem Elias Khan Author-X-Name-First: Nadeem Elias Author-X-Name-Last: Khan Author-Name: Craig Whiteside Author-X-Name-First: Craig Author-X-Name-Last: Whiteside Title: State Accompli: The Political Consolidation of the Islamic State Prior to the Caliphate Abstract: This study examines the successful consolidation of the Islamic State movement within the Sunni insurgency in Iraq from 2003 to 2014. We rely on insurgent media releases, captured documents, and a declassified U.S. military study of the Sunni insurgency in Anbar to evaluate the Islamic State movement’s complex relationship with its Sunni Arab rivals. We found the group moved through sequential stages of cooperative, competitive, and coercive consolidation to achieve hegemony in the insurgent field. Each phase of transition entailed organizational changes, including mergers, re-branding, and new structures. The movement’s well-developed ideology and state-building project distinguished it from peers whose political agendas were too diffuse to establish lasting coalitions. The tribal Awakening that worked with the Americans to temporarily defeat the Islamic State of Iraq also badly splintered its rivals and failed to prevent the revitalization of the Islamic State movement, setting the foundation for its short-lived caliphate project. Journal: Studies in Conflict & Terrorism Pages: 1045-1064 Issue: 9 Volume: 47 Year: 2024 Month: 9 X-DOI: 10.1080/1057610X.2021.2013755 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013755 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1045-1064 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2013752_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Megan Erickson Author-X-Name-First: Megan Author-X-Name-Last: Erickson Author-Name: Michael Gabbay Author-X-Name-First: Michael Author-X-Name-Last: Gabbay Title: Strategies of Armed Group Consolidation in the Afghan Civil War (1989–2001) Abstract: What explains the variation in the strategies of consolidation among armed groups? We examine three conditions that can explain the modes of militant consolidation – territorial control, organizational structure, and external support. We test these theoretical conjectures using unique time series data on armed group consolidation in Afghanistan from 1989 to 2001. Using a linear probability model, we find that territorial control, organizational structure, and fungible forms of external support have the most significant impact on explaining consolidation. This article contributes to the study of armed group dynamics by drawing on existing theory and leveraging original data to explain variation in strategies of militant consolidation. Journal: Studies in Conflict & Terrorism Pages: 984-1005 Issue: 9 Volume: 47 Year: 2024 Month: 9 X-DOI: 10.1080/1057610X.2021.2013752 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013752 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:984-1005 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2013754_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ilmari Käihkö Author-X-Name-First: Ilmari Author-X-Name-Last: Käihkö Title: Operation Jungle Fire: The Consolidation of the Liberians United for Reconciliation and Democracy Abstract: Drawing on 15 months of ethnographic fieldwork, this article investigates the cooperative consolidation of the Liberians United for Reconciliation and Democracy (LURD), a rebel movement that in 1999-2003 sought to rid Liberia of President Charles Taylor. The LURD faced many obstacles to consolidation, including a history of ethnic fragmentation and infighting, leadership conflicts, lack of territory inside Liberia, and a paucity of resources. Yet, despite these hurdles, the LURD succeeded in forging a coalition that lasted just long enough to oust Taylor. It did this by adopting three maxims that emphasized institutional learning, interethnic power sharing, and Guinean sponsorship. Journal: Studies in Conflict & Terrorism Pages: 1026-1044 Issue: 9 Volume: 47 Year: 2024 Month: 9 X-DOI: 10.1080/1057610X.2021.2013754 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013754 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1026-1044 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2013753_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kate Cronin-Furman Author-X-Name-First: Kate Author-X-Name-Last: Cronin-Furman Author-Name: Mario Arulthas Author-X-Name-First: Mario Author-X-Name-Last: Arulthas Title: How the Tigers Got Their Stripes: A Case Study of the LTTE’s Rise to Power Abstract: Over the course of six months in 1986, the Liberation Tigers of Tamil Eelam (LTTE) eliminated their rival militant organizations, despite being significantly outgunned and outmanned by some of these groups. Relying primarily on contemporaneous accounts in Tamil and English, this article traces the process by which the LTTE became the primary avatar of Tamil nationalism, and explores the question of why consolidation unfolded so violently in this case. We argue that the answer lies in the LTTE’s successful portrayal of this violence as order-upholding rather than destructive, and attribute their ability to do this to the fact that much of the population perceived the LTTE as the most legitimate user of violence among the militants. Journal: Studies in Conflict & Terrorism Pages: 1006-1025 Issue: 9 Volume: 47 Year: 2024 Month: 9 X-DOI: 10.1080/1057610X.2021.2013753 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013753 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1006-1025 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2013758_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Wladimir van Wilgenburg Author-X-Name-First: Wladimir Author-X-Name-Last: van Wilgenburg Author-Name: Mario Fumerton Author-X-Name-First: Mario Author-X-Name-Last: Fumerton Title: From the PYD-YPG to the SDF: the Consolidation of Power in Kurdish-Controlled Northeast Syria Abstract: Within a multiparty civil war involving domestic rivalries and regional antagonisms, the Kurdish-led PYD-YPG rebel movement managed to consolidate its political-military power in northeastern Syria. Using the analytical framework of Political Opportunity Structures (POS), we describe how, through its ability to maintain organizational cohesion and establish its own governance structures, and by forging alliances with domestic and foreign actors, it became the hegemonic power in the territory. Whereas it initially relied on coercive consolidation against its main Kurdish rivals, to secure local and international support against the significant threat posed by the Islamic State it had to shift to cooperative and cooptation strategies of power consolidation. Journal: Studies in Conflict & Terrorism Pages: 1090-1109 Issue: 9 Volume: 47 Year: 2024 Month: 9 X-DOI: 10.1080/1057610X.2021.2013758 File-URL: http://hdl.handle.net/10.1080/1057610X.2021.2013758 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:47:y:2024:i:9:p:1090-1109 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2111990_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Kamil C. Klosek Author-X-Name-First: Kamil C. Author-X-Name-Last: Klosek Author-Name: Emil A. Souleimanov Author-X-Name-First: Emil A. Author-X-Name-Last: Souleimanov Title: One or Many? Disentangling the Puzzle of Pro-Government Militia Deployment Abstract: Why do some countries harbor pro-government militias (PGMs), while others do not? We assert that the deployment of PGMs depends on topographic, social, and political structures within which governments and rebels operate. Drawing on the concept of opportunity structures, we postulate that structural conditions within which governments are embedded in constitute a contributing factor to the existence and multiplicity of PGMs. Data from the Pro-Government Militia Dataset along with a two-stage hurdle model reveal that personalist regime type and civil wars increase the likelihood of PGM emergence. In contrast, ethnic fractionalization, onshore oil fields, drug production, number of rebel groups, and military prowess influence the number of PGMs. Journal: Studies in Conflict & Terrorism Pages: 67-91 Issue: 1 Volume: 48 Year: 2025 Month: 1 X-DOI: 10.1080/1057610X.2022.2111990 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2111990 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:1:p:67-91 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2083933_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Brittnee Carter Author-X-Name-First: Brittnee Author-X-Name-Last: Carter Author-Name: Cora Caton Author-X-Name-First: Cora Author-X-Name-Last: Caton Title: Primed for Violence: Intrareligious Conflict and the State in Sectarian Societies Abstract: Intrareligious competition may be founded on grievances stemming from social and political context. The environment that the state creates may fuel intrareligious competition and conflict. Using case studies on Pakistan and Iraq, we examine the role of the state in facilitating intrareligious conflict. We argue the state creates competition for material resources due to institutional characteristics concerning political participation, the education system, and the clergy’s role in government. The state also creates competition for dogmatic resources by legitimizing one sect over another, discriminatory practice, and tacit approval or active involvement in repression of one sect and not the other. Journal: Studies in Conflict & Terrorism Pages: 1-20 Issue: 1 Volume: 48 Year: 2025 Month: 1 X-DOI: 10.1080/1057610X.2022.2083933 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2083933 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:1:p:1-20 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2082858_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Luis Fernando Medina Author-X-Name-First: Luis Fernando Author-X-Name-Last: Medina Author-Name: Radha Sarkar Author-X-Name-First: Radha Author-X-Name-Last: Sarkar Title: Blueprints for Red Insurgencies: Revolutionary Ideology and Strategy in India and Colombia Abstract: Increasingly, scholars agree that role of ideology in civil wars goes beyond mere window-dressing. With respect to leftist insurgencies, we argue that ideology provides insurgent groups an understanding of pivotal constituents (urban or rural) and the timing of revolution (imminent or distant). These factors shape insurgent groups’ politico-military strategies, which may be insurrectionary, militarist Maoist, or protracted people’s war. We develop case studies of the FARC and the EPL in Colombia, and the CPI(ML) and Andhra Maoists in India, using primary sources including conference proceedings, newsletters, pamphlets, and letters of insurgent groups and leaders. Journal: Studies in Conflict & Terrorism Pages: 21-45 Issue: 1 Volume: 48 Year: 2025 Month: 1 X-DOI: 10.1080/1057610X.2022.2082858 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2082858 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:1:p:21-45 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2082833_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ahmet Keser Author-X-Name-First: Ahmet Author-X-Name-Last: Keser Author-Name: Fareed Fakhoury Author-X-Name-First: Fareed Author-X-Name-Last: Fakhoury Title: Hay’at Tahrir Al-Sham (HTS) from an Insurgent Group to a Local Authority: Emergence, Development and Social Support Base Abstract: In 2011, the Middle East entered an era of turmoil. Syria has been the scene for evolution of many NSAGs. This study aims to analyze the factors helped one of the prominent violent organizations, HTS, to become one of the main NSAGs outside the Regime control areas, by applying qualitative methodology using two data sources: primarily, semi-structured field interviews, secondarily, related sources of newspapers/research centers’ publications. Findings show that the decisive military factor and ability to build an interest-based relationship with local elites, impose order and security, and provide public services were critical in imposing hegemony and establishing governance. Journal: Studies in Conflict & Terrorism Pages: 46-66 Issue: 1 Volume: 48 Year: 2025 Month: 1 X-DOI: 10.1080/1057610X.2022.2082833 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2082833 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:1:p:46-66 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2099240_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Muhammad Haniff Hassan Author-X-Name-First: Muhammad Haniff Author-X-Name-Last: Hassan Author-Name: Walid Jumblatt Abdullah Author-X-Name-First: Walid Jumblatt Author-X-Name-Last: Abdullah Title: The Model Muslim Minority: Wasatiyah (Justly-Balanced) as a Counter-Ideology Tool in Singapore Abstract: In the post 9–11 world, Muslims have had to grapple with various challenges, which often involved justifying their faith to others within secular contexts. The matter is more acute, if not existential, for Muslim minority populations. This paper analyzes attempts by the Singaporean Muslim community to deal with a post 9–11 world, through a development of the concept of wasatiyah (justly balanced). It investigates key initiatives by two important players – the Islamic Religious Council of Singapore (MUIS), and the Singapore Islamic Scholars and Religious Teachers Association (Pergas) – that had significant influence in shaping the wasatiyah vision in Singapore. We make two arguments: (1) The wasatiyah discourse represents a longstanding effort by Muslims to contextualize and appropriate traditional Islamic concepts to make them relevant to the contemporary world; and (2) The two approaches adopted by the organizations in question highlight the strengths and weaknesses of initiatives being propagated by state-affiliated and non-state bodies respectively. The study is situated within the literature on religion and politics, counter-ideology and state-Muslim relations. Journal: Studies in Conflict & Terrorism Pages: 92-114 Issue: 1 Volume: 48 Year: 2025 Month: 1 X-DOI: 10.1080/1057610X.2022.2099240 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2099240 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:1:p:92-114 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2091038_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Edoardo Corradi Author-X-Name-First: Edoardo Author-X-Name-Last: Corradi Title: The Kurdish Protection Units in Northern Syria: A Deviant Case of Peaceful Cohabitation between Foreign Fighters and Local Civilians? Abstract: Interactions between foreign combatants and local populations during civil wars are often conflictual. Existing research underscores how trans-national insurgents typically behave more violently than domestic fighters toward civilians. Nevertheless, most research has focused on relations between local rebels and civilians, showing how the type of endowments that rebels exhibit determines the pattern of behavior toward civilian populations. Only recently has the impact of foreign fighters caught the attention of scholars. The consensus in the existing literature is that trans-national insurgents are typically more violent toward civilians than local rebels: they have neither ethnic nor linguistic kinships, there is no mechanism of accountability on foreign fighters, and, usually, they have more extreme religious or ideological beliefs compared to locals. Contrary to the general view, the Kurdish YPG/YPJ appears as a deviant case since it has exhibited low levels of civilian victimization. The presence of foreign fighters in its ranks seems not to affect this trend. Relying on primary and secondary sources, the article argues that the YPG/YPJ’s inclusive ideology, daily practices, and the organizational measures that the Kurdish leadership has adopted in dealing with foreign combatants in the ranks have resulted in lower levels of violence toward civilians. Journal: Studies in Conflict & Terrorism Pages: 139-160 Issue: 2 Volume: 48 Year: 2025 Month: 2 X-DOI: 10.1080/1057610X.2022.2091038 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2091038 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:2:p:139-160 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2090048_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Anastassiya Reshetnyak Author-X-Name-First: Anastassiya Author-X-Name-Last: Reshetnyak Author-Name: Mariya Omelicheva Author-X-Name-First: Mariya Author-X-Name-Last: Omelicheva Title: A Framework for Explaining National P/CVE Programs: A Case Study of Kazakhstan Abstract: This study extends the P/CVE scholarship from the “what†and “how†questions of assessment (What and how do countries do in P/CVE area?) to the underlying “why†issues (Why do countries choose to define and approach P/CVE in certain ways?). Toward the goal of explaining states’ P/CVE programs, we put forth a “3-Is†framework emphasizing the impact interests, ideas, and institutions on their measures for countering violent extremism. Jointly, these concepts direct our attention to the pragmatic and ideational aspects of policymaking as well as the countries’ institutional legacies. We apply this framework to the case of Kazakhstan to illuminate and explain certain highly visible aspects of its P/CVE program. Journal: Studies in Conflict & Terrorism Pages: 161-178 Issue: 2 Volume: 48 Year: 2025 Month: 2 X-DOI: 10.1080/1057610X.2022.2090048 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2090048 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:2:p:161-178 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2066525_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Moran Yarchi Author-X-Name-First: Moran Author-X-Name-Last: Yarchi Title: The Image War as a Significant Fighting Arena – Evidence from the Ukrainian Battle over Perceptions during the 2022 Russian Invasion Abstract: Ukrainian activity in the realm of image and perceptions during the 2022 Russian invasion provides a unique opportunity to examine deep understanding and creative usage of this important fighting arena in the current political reality. The current paper analyzes the actions of the Ukrainian leadership, which invested a lot of time and effort into garnering support from the international community and mobilizing various leaders to assist the Ukrainians in their fight, while using different strategies and tools. Based on the unprecedent amount of support they received, it appears the Ukrainians were successful in applying Imagefare as their strategy. Journal: Studies in Conflict & Terrorism Pages: 205-217 Issue: 2 Volume: 48 Year: 2025 Month: 2 X-DOI: 10.1080/1057610X.2022.2066525 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2066525 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:2:p:205-217 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2095700_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Murat YeÅŸiltaÅŸ Author-X-Name-First: Murat Author-X-Name-Last: YeÅŸiltaÅŸ Author-Name: Muhammed KarakuÅŸ Author-X-Name-First: Muhammed Author-X-Name-Last: KarakuÅŸ Title: The Logic of Non-State Armed Groups Survival in Syria: A Contemporary Framework of Analysis Abstract: A growing body of research stresses finding out why some non-state armed groups in Syria survive longer than others. Despite this encouraging uptick in scholarship, studies have focused on the individual methods these groups have adopted. The extant literature suffers from a lack of comprehensive and rigorous analytical explanation based on a model that reveals the logic behind these groups’ actions within the savagery, ferocity, and cruelty of other rival actors. By focusing on three significant cases in Syria, this study develops a new analytical perspective to unpack the strategic logic behind NSAGs’ survival in a competitive, anarchical conflict environment. Journal: Studies in Conflict & Terrorism Pages: 179-204 Issue: 2 Volume: 48 Year: 2025 Month: 2 X-DOI: 10.1080/1057610X.2022.2095700 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2095700 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:2:p:179-204 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2090047_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Daniel Koehler Author-X-Name-First: Daniel Author-X-Name-Last: Koehler Title: From Superiority to Supremacy: Exploring the Vulnerability of Military and Police Special Forces to Extreme Right Radicalization Abstract: This article explores potential vulnerability factors for extreme right radicalization of Special Operation Forces (SOF) and Special Weapons and Tactics (S.W.A.T.) personnel in Western countries. Drawing on inquiry commissions reports regarding extreme right behavior or ethical misconduct by six elite units from four countries (Germany, Canada, Australia, the U.S.), this article argues that a lack of diversity in gender and ethnicity, elite warrior subcultures, echo chamber effects and cognitive rigidity can become vulnerability factors for extreme right radicalization. Further, the need for targeted resilience among SOF and S.W.A.T. units designed to counter such processes is highlighted. Journal: Studies in Conflict & Terrorism Pages: 115-138 Issue: 2 Volume: 48 Year: 2025 Month: 2 X-DOI: 10.1080/1057610X.2022.2090047 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2090047 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:2:p:115-138 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2058348_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Maria-Louise Clausen Author-X-Name-First: Maria-Louise Author-X-Name-Last: Clausen Title: Exploring the Agency of the Affiliates of Transnational Jihadist Organizations: The Case of al-Qaeda in the Arabian Peninsula Abstract: The ability of trans-national jihadist organizations to exploit war, state collapse and geopolitical upheaval in the Middle East to expand and consolidate their global networks, is of major concern. This has led to a growing literature that investigates the factors that may or may not lead to the expansion of organizations such as al-Qaeda and Islamic State, but this literature has focused less on the continued agency of the affiliate once integrated into the trans-national jihadist organization. This article contributes to ongoing debates on inter-organizational dynamics within trans-national jihadist organizations by using the proxy war literature to explore the factors that may foster or inhibit the agency of local affiliates of trans-national jihadist organizations. It uses the case of al-Qaeda in the Arabian Peninsula to explore how a local affiliate navigates between the local and international. Specifically, the article suggests that al-Qaeda in the Arabian Peninsula displays substantial agency in how it navigates between local integration and its relationship to al-Qaeda central. In doing this, the article underscores the need to look beyond rhetoric aimed at an international audience to get a fuller understanding of the affiliates of trans-national jihadist organizations. Journal: Studies in Conflict & Terrorism Pages: 250-264 Issue: 3 Volume: 48 Year: 2025 Month: 3 X-DOI: 10.1080/1057610X.2022.2058348 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058348 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:250-264 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2058350_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Isak Svensson Author-X-Name-First: Isak Author-X-Name-Last: Svensson Author-Name: Desirée Nilsson Author-X-Name-First: Desirée Author-X-Name-Last: Nilsson Title: Capitalizing on Cleavages: Transnational Jihadist Conflicts, Local Fault Lines and Cumulative Extremism Abstract: Trans-national jihadist groups have established themselves across many contexts. However, we have limited knowledge about the larger picture of how such groups tap into various inter-religious, sectarian, or ethnic divisions. To address this research gap, we explore: How do trans-national jihadist groups mobilize on the basis of different forms of identity cleavages? Our empirical analysis focuses on all trans-national jihadist groups who have challenged governments in civil wars. We find that mobilization along ethnic divisions is the most common cleavage, and is increasing most over time. We also find that sectarian mobilization is rare, but associated with significant escalation of violence. Journal: Studies in Conflict & Terrorism Pages: 265-283 Issue: 3 Volume: 48 Year: 2025 Month: 3 X-DOI: 10.1080/1057610X.2022.2058350 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058350 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:265-283 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2058374_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Amira Jadoon Author-X-Name-First: Amira Author-X-Name-Last: Jadoon Title: Operational Convergence or Divergence? Exploring the Influence of Islamic State on Militant Groups in Pakistan Abstract: Transnational terrorist organizations such as Al-Qaeda and the Islamic State often rely on local militant groups to set up new affiliates or branches around the world. While past research has generally explored the motivations of groups to align, as well as the effects of alliances on lethality and survival of groups at the core of an alliance hub, there is limited analysis of how links with a transnational jihadist group triggers changes in the operational behavior of groups embedded in local conflict dynamics. To investigate this phenomenon, this study provides an assessment of the changes in Pakistan-based groups’ tactics, targets, and geographical locations after they formed operational links with Islamic State’s affiliate in the Afghanistan-Pakistan region. More specifically, I examine Lashkar-e-Jhangvi’s and Jamaat-ul-Ahrar’s operational behavior shortly before and after they established links with Islamic State Khorasan (ISK), at the organizational or individual level, which emerged in 2015 and developed an extensive network in the region. The findings indicate that both groups expanded into new regions across Pakistan after the emergence of ISK, and also shifted their targeting priorities in ways that aligned with ISK’s top targets in the country. The findings further our understanding of the threat associated with the proliferation of transnational affiliates, and the security implications of interlinkages between international and local militant groups. Journal: Studies in Conflict & Terrorism Pages: 316-340 Issue: 3 Volume: 48 Year: 2025 Month: 3 X-DOI: 10.1080/1057610X.2022.2058374 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058374 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:316-340 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2058347_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Dino Krause Author-X-Name-First: Dino Author-X-Name-Last: Krause Title: Failed Transnationalization? The Challenges Faced by al-Qaeda and IS in South Asia Abstract: What factors hinder al-Qaeda’s and IS’s ability to enter new conflict settings? Analyzing existing databases across three types of organized violence, I show that in South Asia, outside of Afghanistan and Pakistan, levels of violence associated with these organizations have remained lower than in other world regions. In the case of IS, the group’s anti-Deobandi stance has reduced its pool of affiliation partners. Moreover, the availability of other support channels has limited local groups’ demand for support from al-Qaeda and IS. Lastly, higher levels of democracy have allowed for the formation of political parties, which have targeted similar population segments as al-Qaeda and IS. Journal: Studies in Conflict & Terrorism Pages: 231-249 Issue: 3 Volume: 48 Year: 2025 Month: 3 X-DOI: 10.1080/1057610X.2022.2058347 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058347 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:231-249 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2058346_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Mona Kanwal Sheikh Author-X-Name-First: Mona Kanwal Author-X-Name-Last: Sheikh Title: Transnational Jihad as a Bundled Conflict-Constellation Journal: Studies in Conflict & Terrorism Pages: 219-230 Issue: 3 Volume: 48 Year: 2025 Month: 3 X-DOI: 10.1080/1057610X.2022.2058346 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058346 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:219-230 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2058360_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Signe Marie Cold-Ravnkilde Author-X-Name-First: Signe Marie Author-X-Name-Last: Cold-Ravnkilde Author-Name: Boubacar Ba Author-X-Name-First: Boubacar Author-X-Name-Last: Ba Title: Jihadist Ideological Conflict and Local Governance in Mali Abstract: In West Africa’s Sahel region, franchises of global jihadist groups like Islamic State and al-Qaeda proliferate. So far, the dynamics of jihadist groups in the Sahel have predominantly been studied through analyses of the material and strategic dimensions of the struggle. Curiously, little attention has paid to how religiously-informed worldviews inform their expansion. Drawing on the concept of “epistemic worldviewsâ€, this article explores how local leaders of al-Qaeda and Islamic State franchises frame their fight. It argues that transnational jihadist ideology matters; both for how different jihadist groups compete to mobilize new followers as well as for how they implement new models of jihadist governance. Contributing to ongoing debates about the transnationalization of jihad, the article shows that in the intra-jihadist contestation between the groups in Mali, global jihadist concepts are negotiated, contested, and constituted by the groups as they go along. Thereby global jihadist ideology comes to provide both a cause and an effect of contestations and conflicts between the expanding jihadist groups in the Sahel. Journal: Studies in Conflict & Terrorism Pages: 300-315 Issue: 3 Volume: 48 Year: 2025 Month: 3 X-DOI: 10.1080/1057610X.2022.2058360 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058360 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:300-315 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2058351_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Jerome Drevon Author-X-Name-First: Jerome Author-X-Name-Last: Drevon Author-Name: Patrick Haenni Author-X-Name-First: Patrick Author-X-Name-Last: Haenni Title: Redefining Global Jihad and Its Termination: The Subjugation of al-Qaeda by Its Former Franchise in Syria Abstract: The globalization of jihad has proceeded in several stages from the mobilization against the Soviet Union in Afghanistan in the 1980s to Islamic State’s current campaign. The end of global jihad is nonetheless less understood, including the conditions in which jihadi groups could reject al-Qaeda (AQ) or Islamic State (IS). This article examines this question through the trajectory of a former AQ franchise, jabhat al-nusra (JaN), that became hay’at tahrir al-sham (HTS) in 2017. This article argues that global jihad is not absolute. Global jihad exists on a spectrum of four inter-connected dimensions that can be disaggregated. In Syria, JaN was only partially globalist when it emerged. JaN’s rejection of IS and AQ resulted from its opposition to their strategic objectives against the backdrop of the evolution of the Syrian conflict, which eroded JaN’s globalism and made it particularly costly. This article is based on extensive field research and interviews with HTS’s leadership in Idlib and other insurgents that have interacted with the group over the years. Journal: Studies in Conflict & Terrorism Pages: 284-299 Issue: 3 Volume: 48 Year: 2025 Month: 3 X-DOI: 10.1080/1057610X.2022.2058351 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2058351 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:3:p:284-299 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2097585_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Carola GarcÃa-Calvo Author-X-Name-First: Carola Author-X-Name-Last: GarcÃa-Calvo Author-Name: Fernando Reinares Author-X-Name-First: Fernando Author-X-Name-Last: Reinares Title: How Members of the Islamic State-Linked Ripoll Cell Grouped, Radicalized and Plotted Mass Casualty Terrorist Attacks in Barcelona Abstract: Members of the so-called Ripoll cell plotted mass casualty attacks to be executed in Barcelona on August 20, 2017. Instead, some of them improvised vehicle-ramming and stabbing attacks earlier in Barcelona and Cambrils, also in Spain’s Catalonia. Who were those jihadists and how did they form an attack cell? What explains their radicalization into Salafi-jihadism? How did they prepare mass casualty attacks? The article’s three sections address these questions, mostly drawing from primary sources. As analyzed in the first section, the cell, formed by 10 men, nine of them young adults and adolescents born or raised in Spain, descendants of Moroccan immigrants, was built by an imam with past jihadist leanings who acted as entrepreneur. As explained in the second section, the radicalization leading to terrorism underwent by these individuals was highly contingent upon both in person exposure to a radicalizing agent as well as preexisting kinship and friendship ties. Finally, as substantiated in the third section, members of the Ripoll cell performed the plot’s six tasks, from financing and securing attack preparation to selecting the terrorist modality and targets, in a remarkably articulated and coordinated way consistent with its IS-linked nature. Journal: Studies in Conflict & Terrorism Pages: 341-368 Issue: 4 Volume: 48 Year: 2025 Month: 4 X-DOI: 10.1080/1057610X.2022.2097585 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2097585 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:4:p:341-368 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2097586_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Bernhard Blumenau Author-X-Name-First: Bernhard Author-X-Name-Last: Blumenau Title: From Punishment to Pre-emption: The Changing Nature of Regional Organizations’ Legal Responses to Terrorism, 1990–2010 Abstract: This article examines regional organizations’ antiterrorism efforts across the globe from 1990 until 2010. Empirically, it provides a comprehensive overview of the legal responses developed. Analytically, it determines long-term patterns and regional differences in these treaties, examines bones of contention, and how these were overcome. This study shows that after the Cold War, all regions developed legal antiterrorism frameworks, but states continued to preserve their sovereignty by various means; and extraditing or trying suspects remained the compromise of choice. Importantly, these antiterrorism efforts marked a watershed. Measures shifted from an approach exclusively focused on punishing and deterring terrorists toward an emphasis on preemption. Journal: Studies in Conflict & Terrorism Pages: 392-418 Issue: 4 Volume: 48 Year: 2025 Month: 4 X-DOI: 10.1080/1057610X.2022.2097586 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2097586 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:4:p:392-418 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2097584_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Elizabeth M. Jenaway Author-X-Name-First: Elizabeth M. Author-X-Name-Last: Jenaway Author-Name: Steven Windisch Author-X-Name-First: Steven Author-X-Name-Last: Windisch Title: And the Last Straw Falls: The Cumulative Influence of Disillusionment among Former Viet Cong Insurgents Abstract: Relying on interviews with 87 former members of the Viet Cong, we investigate the cumulative role of unmet behavioral and emotional expectations in producing disillusionment. We found that the combination of unmet expectations generated negative emotions, creating distance between participants and their organization. Unlike desistance from conventional crime, which results from a reduction in anger, we found that the emergence of anger provoked disengagement from the insurgency. Moreover, our findings highlight how disillusionment does not begin with a single event but is influenced by the cascading effect of multiple factors that merge over time. Journal: Studies in Conflict & Terrorism Pages: 439-461 Issue: 4 Volume: 48 Year: 2025 Month: 4 X-DOI: 10.1080/1057610X.2022.2097584 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2097584 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:4:p:439-461 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2098553_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Andrew Glazzard Author-X-Name-First: Andrew Author-X-Name-Last: Glazzard Title: Violent Extremist Disengagement and Reintegration: A Framework for Planning, Design and Evaluation of Programmatic Interventions Abstract: Disengagement from violent extremism and reintegration into mainstream society have been the focus of significant research over the last 15 years. However, programs to facilitate or bring about violent extremist disengagement and reintegration are under-researched, largely as a result of the opacity of these programs and difficulties in access. Understanding how and why programs work or do not work is also impeded by conceptual confusion, and by four specific problems which have been discussed in the relevant literature: insufficient attention to the context and environment surrounding programmatic interventions, lack of clarity over their intended outcomes, lack of specificity in responses, and simplistic models of causation. The paper endorses previous studies recommending the use of realist evaluation to understand disengagement and reintegration interventions, and proposes a conceptual framework derived from an extensive review of the relevant literature to support planning, design and evaluation of interventions. Journal: Studies in Conflict & Terrorism Pages: 419-438 Issue: 4 Volume: 48 Year: 2025 Month: 4 X-DOI: 10.1080/1057610X.2022.2098553 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2098553 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:4:p:419-438 Template-Type: ReDIF-Article 1.0 # input file: UTER_A_2099269_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20241127T073524 git hash: 0fa6686462 Author-Name: Ryan Scrivens Author-X-Name-First: Ryan Author-X-Name-Last: Scrivens Author-Name: Garth Davies Author-X-Name-First: Garth Author-X-Name-Last: Davies Author-Name: Tiana Gaudette Author-X-Name-First: Tiana Author-X-Name-Last: Gaudette Author-Name: Richard Frank Author-X-Name-First: Richard Author-X-Name-Last: Frank Title: Comparing Online Posting Typologies among Violent and Nonviolent Right-Wing Extremists Abstract: Although many researchers, practitioners, and policymakers are concerned about identifying and characterizing online posting patterns of violent extremists prior to their engagement in violence offline, little is empirically known about their online patterns generally or differences in their patterns compared to their nonviolent counterpart particularly. In this study, we drew from a unique sample of violent and nonviolent right-wing extremists to develop and compare their online posting typologies (i.e. super-posters, committed, engaged, dabblers, and non-posters) in the largest white supremacy web-forum. We identified several noteworthy posting patterns that may assist law enforcement and intelligence agencies in identifying credible threats online. Journal: Studies in Conflict & Terrorism Pages: 369-391 Issue: 4 Volume: 48 Year: 2025 Month: 4 X-DOI: 10.1080/1057610X.2022.2099269 File-URL: http://hdl.handle.net/10.1080/1057610X.2022.2099269 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:uterxx:v:48:y:2025:i:4:p:369-391