Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 30, 2024 Tue

Time: 12:41 am

Results for extremists groups

9 results found

Author: Carson, Jennifer Varriale

Title: The Criminal Conduct of Radical Environmental and Animal Rights Groups: A Rational Choice Perspsective

Summary: This dissertation examines whether members of radical environmental and animal rights groups are deterred by legal sanctions, morality, both, or neither. From a rational choice framework, I hypothesize that members of these groups weigh costs and benefits and act based on expected utility. I measure an increase in costs through three federal sentencing acts targeted at reducing the criminal behavior of these groups and hypothesize that this legislation decreased the total, serious, and ideologically-specific activity of extremists. I also contend that two terrorist events, the nearly fatal tree-spiking of George Alexander and the assassination of Hyram Kitchen, also increased the costs of criminal conduct for members of radical eco-groups. I evaluate interviews with twenty-five activists and analyze a database of 1056 incidents through both time-series and series hazard modeling. The interviews yield support for the rational choice perspective, particularly in regards to micro-level considerations of legal sanctions and morality. My quantitative findings indicate that the legislation was influential, albeit varying in direction by the method employed. Specifically, the time-series models yield significant increases in the frequency of criminal conduct after the legislation, while the series hazard analyses demonstrate a decrease in the hazard of an attack. I also find that the two major terrorist events did not significantly impact the criminal conduct of these groups. I conclude that members of radical environmental and animal rights groups are rational actors whom consider the moral evaluation of a given act and are susceptible to an increase in costs as measured through legislative efforts, but not as operationalized as a response to high profile attacks.

Details: College Park, MD: University of Maryland, College Park, 2010. 182p.

Source: Internet Resource: Dissertation: Accessed December 10, 2012 at: http://drum.lib.umd.edu/handle/1903/10966

Year: 2010

Country: United States

URL: http://drum.lib.umd.edu/handle/1903/10966

Shelf Number: 127204

Keywords:
Animal Rights Groups
Environmental Rights Groups
Extremists Groups
Radical Groups (U.S.)
Routine Choice Theory

Author: Berger, J.M.

Title: Who Matters Online: Measuring influence, evaluating content and countering violent extremism in online social networks

Summary: It is relatively easy to identify tens of thousands of social media users who have an interest in violent ideologies, but very difficult to figure out which users are worth watching. For students of extremist movements and those working to counter violent extremism online, deciphering the signal amid the noise can prove incredibly daunting. This paper sets out a first step in solving that problem. We have devised a scoring system to find out which social media accounts within a specific extremist circle were most influential and most prone to be influenced (a tendency we called exposure). Our starting data centered on followers of 12 American white nationalist/white supremacist “seed” accounts on Twitter. We discovered that by limiting our analysis to interactions with this set, the metrics also identified the users who were highly engaged with extremist ideology. Within our total dataset of 3,542 users, only 44 percent overtly identified themselves as white nationalists online. By measuring interactions alone—without analyzing user content related to the ideology—we narrowed the starting set down to 100 top-scoring accounts, of which 95 percent overtly selfidentified as white nationalist. Among the top 200, 83 percent self-identified, and for the top 400, the self-identification rate was 74 percent. A comparison analysis run on followers of anarchist Twitter accounts suggests the methodology can be used without modification on any number of ideologies. Because this approach is entirely new (at least in the public sphere), the paper spends some time discussing the methodology and findings in some detail, before concluding with a series of recommendations for countering violent extremism (CVE) based on the findings. The key terms for understanding the recommendations are: • Influence: The tendency of a user to inspire a measurable reaction from other users (such as a replies or retweets). • Exposure: The flip side of influence, this is the tendency of a user to respond to another user in a measurable way. • Interactivity: The sum of influence and exposure scores, roughly representing how often a user interacts with the content of other users. Our key findings include: • Influence is highly concentrated among the top 1 percent of users in the set. • High scores in both influence and exposure showed a strong correlation to engagement with the seed ideology (white nationalism in our primary analysis, and anarchism in a secondary analysis). • Interactivity, the sum of influence and exposure scores, was even more accurate at identifying users highly engaged with the seed ideology. In the course of collecting the data needed to measure influence and exposure, we incidentally collected a large amount of data on hashtags and links used by people who follow known white nationalists on Twitter. When we examined this data, we discovered that members of the dataset were highly engaged with partisan Republican and mainstream conservative politics. The paper presents a significant amount of context needed to properly evaluate this finding. Working from these findings, the paper makes several recommendations for new CVE initiatives with a focus on NGO efforts, which was the purpose of this research, although we recognize our findings will likely have utility for government efforts in this sphere as well. Our recommendations include: • We believe these metrics offer ways to concretely measure which types of CVE approaches are effective and which are not, bringing some clarity to a realm where strategies are often wishful and based on assumptions, while conclusions are often anecdotal and inconclusive. • The concentration of influence among a very few users suggests that disruptive approaches and countermessaging should be targeted to the top of the food chain, rather than working with the larger base of users. • Our analysis found that the seed accounts—all wellknown white nationalist ideologues and activists—were not necessarily producing the most popular content and links to external Web sites. The collected data can be used to find the most important external content sources, and target them for disruption through terms-of-service violation reporting, or through counter-messaging. • By tracking these metrics on an ongoing basis, NGO efforts to counterprogram against extremist narratives can be evaluated to measure how many users adopt or respond to counter-messaging content, and how much influence accrues to different kinds of positive messaging. • Since the data suggests white nationalists are actively seeking dialogue with conservatives, CVE activists should enlist the help of mainstream conservatives, who may be considerably more successful than NGOs at engaging extremists with positive messaging. Further research may also suggest avenues for engagement between other kinds of extremists and other mainstream political and religious movements. Finally, we believe that these metrics are only a starting point for the study of extremist use of social media. We believe the metrics and approaches here can be further refined, and we believe that additional research may yield substantial new techniques for monitoring and countering the promotion of violent ideologies online.

Details: London: International Centre for the Study of Radicalisation and Political Violence (ICSR), King's College London, 2013. 56p.

Source: Internet Resource: Accessed April 9, 2013 at: http://icsr.info/wp-content/uploads/2013/03/ICSR_Berger-and-Strathearn.pdf

Year: 2013

Country: International

URL: http://icsr.info/wp-content/uploads/2013/03/ICSR_Berger-and-Strathearn.pdf

Shelf Number: 128326

Keywords:
Extremists Groups
Online Communications
Social Media
Violent Extremism

Author: Fink, Naureen Chowdhury

Title: Evaluating Countering Violent Extremism Programming: Practice and Progress

Summary: As the threat from terrorism becomes more diffuse, networked, and transnational, with newly emerging lone terrorists or small groups, so too have the tools of counterterrorism continued to evolve. Policymakers and practitioners are focusing more on preventing and countering radicalization and recruitment and improving the resilience of individuals and communities against the appeal of violent extremism. Reflective of these trends, efforts on countering violent extremism (CVE)1 have emerged in a relatively short period as an increasingly important instrument in the counterterrorism tool kit as an integral part of their wider strategic objectives on countering terrorism. States are more attentive to the development of CVE strategies and are supporting initiatives that move beyond policy development and into implementation. Additionally, multilateral counterterrorism actors, such as the European Union and United Nations, have expanded their interest in CVE activities. Of particular note in this regard is the Global Counterterrorism Forum (GCTF), an informal, multilateral counterterrorism body comprising 29 countries plus the European Union that was launched in September 2011.2 The GCTF serves as a platform for identifying critical civilian counterterrorism needs and mobilizing the necessary expertise and resources to address such needs and enhance global cooperation. In December 2012, the Hedayah International Center of Excellence for Countering Violent Extremism was launched as an initiative of the GCTF in Abu Dhabi to assist governments and stakeholders in their efforts.3 Furthermore, regional organizations and civil society actors are becoming increasingly engaged in the development and implementation of CVE programming. This shift toward a more proactive approach to terrorism and the resulting proliferation of CVE programming have raised questions and concerns about its effectiveness. Challenges exist not only in designing preventive programs but also in developing tools for measuring and evaluating their impact. For example, developing a CVE intervention requires that a number of questions be addressed: How does radicalization occur, and at what stage in the radicalization process is an intervention warranted? Should CVE programs target all who are sympathetic to the causes espoused by militant groups or only those who have provided active support? Do programs that address some of the grievances often associated with violent extremism, such as underdevelopment, inequality, or sociopolitical marginalization, merit being tagged with a CVE label? What kind of added value can be provided by CVE programs that are not included within development, education, or conflict mitigation and peace-building efforts? The responses to these questions are important for establishing the scope and parameters of the program and in contributing to the development of indicators against which success can be measured, which should ideally be embedded in program design from the outset. Once the intervention has been designed, however, a number of obstacles remain in measuring its impact. These challenges include (1) determining the scope of the evaluation; (2) attributing causality where the desired outcome is a nonevent, i.e., “measuring the negative”; and (3) obtaining resources and technical expertise to conduct an evaluation.4 To a large extent, the answers to these questions will vary across regions and contexts and be determined by lessons learned from past practices. Reflecting the prevalence of CVE programs, there is now greater acceptance of the need to invest in program evaluation in order to address the questions and concerns about preventive interventions. It is no longer a question of whether, but how to conduct these evaluations.

Details: Goshen, IN: Center on Global Counterterrorism Cooperation, 2013. 24p.

Source: Internet Resource: Accessed August 10, 2013 at: http://www.globalct.org/wp-content/uploads/2013/07/Fink_Romaniuk_Barakat_EVALUATING-CVE-PROGRAMMING_2013.pdf

Year: 2013

Country: International

URL: http://www.globalct.org/wp-content/uploads/2013/07/Fink_Romaniuk_Barakat_EVALUATING-CVE-PROGRAMMING_2013.pdf

Shelf Number: 129612

Keywords:
Counter-Terrorism
Extremists Groups
Radical Groups
Terrorism
Violent Extremism ( International)

Author: Zeiger, Sara

Title: Countering Violent Extremism: Developing an evidence-base for policy and practice

Summary: This volume reports on the range of papers presented at the Annual Countering Violent Extremism (CVE) Research Conference 2014 from 7-8 December 2014 in Abu Dhabi, United Arab Emirates. The Conference was organized and hosted by Hedayah (the International Center of Excellence for Countering Violent Extremism), Curtin University, People Against Violent Extremism (PaVE), and the Australian Government, Department of Foreign Affairs and Trade (DFAT). The Conference was also sponsored in part by the European Commission and the United States Department of State. The event was attended by approximately 100 academics, practitioners and policymakers from over 25 countries. The 2014 CVE Research Conference follows from the inaugural CVE Symposium hosted by Curtin University, PaVE, Macquarie University and Hedayah in Perth, Australia in 2013. As the first of its kind in the region, the 2013 Symposium brought together national and international scholars, practitioners, policymakers and former extremists to discuss and debate the current state and future directions for CVE. The intention for the CVE Research Conference is to be an annual event at which the yearly highlights of cutting-edge CVE research and innovation can be presented to academics, researchers, practitioners and policymakers on a global scale.

Details: Perth, WA, AUS: Curtin University, 2015. 159p.

Source: Internet Resource: Accessed September 24, 2015 at: http://www.hedayah.ae/pdf/cve-edited-volume.pdf

Year: 2015

Country: Australia

URL: http://www.hedayah.ae/pdf/cve-edited-volume.pdf

Shelf Number: 136857

Keywords:
Counter-Terrorism
Extremism
Extremists Groups
Radical Groups
Radicalization
Terrorism
Violent Extremism

Author: Manning, Ruth

Title: In and Out of Extremism

Summary: Quilliam's latest report In and Out of Extremism features testimonies from 10 former extremists who have now deradicalised and provides analysis on their shared experiences. Building on Maajid Nawaz's personal deradicalisation story In and Out of Islamism, this report looks at the human processes of radicalisation and deradicalisation in five former far-right extremists and five former Islamist extremists. Combining interviews and correspondence with the former extremists, with Quilliam's own expertise and experience in these processes, this report synthesises the human with the academic to provide a deeper understanding of a complex phenomenon. - In particular, this report shows factors which increase vulnerability to radicalisation, the ways in which this vulnerability is exploited by extremist groups and individuals in the radicalisation process, and the factors that prompt escalation from contemplation to action. - In and Out of Extremism finds that when political grievances are combined with personal grievances, individuals consider extremist ideologies and narratives to better understand the world or to find perceived solutions to their personal difficulties. While these ideologies and narratives appear comforting in their simplicity, the former extremists found that they seldom changed the world or improved their lives. - This report also sheds light on the factors that have intervened in the radicalisation process to prompt the individuals to consider their commitment to extremist ideologies and narratives. In and Out of Extremism finds that challenging extremist messaging is central to this intervention and that the message should be targeted for the individual, with the identity, language, and even appearance of the messenger being of central importance. - Quilliam is well-known for our contribution to the macro debate on counter-extremism strategy and policy, but this report shows our value at a micro level, providing inspiration and support in deradicalising extremists. - In policy terms, this report also considers the value of refining the teaching of critical thinking skills in schools to reduce vulnerability to radicalisation, and of improving progressive online counter-extremism efforts through the development of a greater number and variety of counter-narratives.

Details: London: Quilliam, 2015. 78p.

Source: Internet Resource: Accessed March 8, 2016 at: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/in-and-out-of-extremism.pdf

Year: 2015

Country: International

URL: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/in-and-out-of-extremism.pdf

Shelf Number: 138131

Keywords:
Deradicalizing
Extremism
Extremists Groups
Muslims
Racial Groups
Radicalization
Terrorists

Author: Ogbozor, Ernest

Title: Causes and Consequence of Violent Extremism in Northeast Nigeria

Summary: The consequence of violent extremism on rural livelihoods has received less attention in academic literature. This paper addresses three fundamental questions: What are the socio-economic causes of terrorism and violent religious movements? What is the root cause of Boko Haram in Northeast Nigeria? And what are the consequences of Boko Haram's violence on rural livelihoods? Based on a review of the literature and current studies in Nigeria, this paper contends that violent extremism has a correlation with the socio-economic conditions in Northeast Nigeria, and there are direct and indirect impacts of extremism on rural livelihoods. The paper concludes with a suggestion of further studies on the drivers of violent extremism, and the rural livelihoods strategies for coping with extremist activities in Nigeria.

Details: Brighton, UK: Households in Conflict Network, Institute of Development Studies, 2016. 35p.

Source: Internet Resource: HiCN Working Paper 227: Accessed December 8, 2016 at: http://scar.gmu.edu/sites/default/files/HiCN-WP-227.pdf

Year: 2016

Country: Nigeria

URL: http://scar.gmu.edu/sites/default/files/HiCN-WP-227.pdf

Shelf Number: 148136

Keywords:
Extremists Groups
Socioeconomic Conditions and Crime
Terrorism
Violence
Violent Extremism

Author: Schmid, Alex P.

Title: Public Opinion Survey Data to Measure Sympathy and Support for Islamist Terrorism: A Look at Muslim Opinions on Al Qaeda and IS

Summary: This Research Paper seeks to explore what 'sympathy' and 'support' actually mean when it comes to terrorism. The text addresses some of the problems of public opinion surveys, includes a conceptual discussion and then continues with the presentation of data from public opinion surveys. It notes that opinion polls can be helpful in gauging (verbal) support for terrorism but also finds that the questions asked in opinion polls are generally lacking precision while the answers are often influenced by political pressures. When translating (generally low) percentages of sympathy and support for al Qaeda and so-called Islamic State in various countries into actual population figures, it emerges that there is a sizeable radical milieu in both Muslim-majority countries and in Western Muslim diasporas, held together by the world wide web of the internet. While large majorities of Muslims in most countries have no love for jihadist extremists, there are more than enough breeding grounds for terrorism. The Research Paper concludes that better instruments for measuring sympathy and support for jihadist terrorism are needed to inform counter-terrorist strategies

Details: The Hague: The International Centre for Counter-Terrorism, 2017. 34p.

Source: Internet Resource: ICCT Research Paper: Accessed March 4, 2017 at: https://icct.nl/wp-content/uploads/2017/02/ICCT-Schmid-Muslim-Opinion-Polls-Jan2017-1.pdf

Year: 2017

Country: International

URL: https://icct.nl/wp-content/uploads/2017/02/ICCT-Schmid-Muslim-Opinion-Polls-Jan2017-1.pdf

Shelf Number: 141336

Keywords:
al Qaeda
Counter-Terrorism
Extremists Groups
Islamic State
Jihadists
Public Opinion
Terrorism
Terrorists
Violent Extremists

Author: Daniel, Makai

Title: A Study of Violence-Related Deaths in Nafada Local Government Area of Gombe State and Auyo, Gagarawa, Gumel, Gwiwa, Kaugama and Yankwasi Local Government Areas of Jigawa State (2006-2014)

Summary: Invisible violence exists in some rural areas in northern Nigeria. 'Invisible' here entails lack of available documented instances of fatal violence in such areas. Against this backdrop, the lack of data has prompted this study to unearth, document, and evaluate any occurrences of lethal violence in selected Local Government Areas (LGAs) in Gombe and Jigawa states from 2006 to 2014. The specific objectives are to: - Assess and document invisible violence in Gombe and Jigawa states. - Evaluate the categories of lethal violence that have occurred. - Document the series of lethal violence incidents through terrorism, ethno-religious conflicts, land disputes, inter- and intra-group and political conflicts. The field research gathered evidence of the drivers of invisible violence in northern Nigeria through desktop review of secondary materials such as media reports, databases, policy reports, and academic literature, combined with primary research involving the conduct of key informant interviews, administration of questionnaires, and focus group discussions (FGDs). According to the findings, the lack of data on fatal incidents in the focal communities results from the minimal occurrence of such violent activities. Yet economic (poverty and unemployment) as well as socio-cultural factors (poor parental upbringing or neglect of children) underpin young people's vulnerability to recruitment into violent activities by extremist groups or gangs. The high unemployment environment has caused youth involvement in the achaba (motor bike) business, leading to over-speeding and road traffic accidents. The study also found that the excesses of the security forces are not a major factor in youth involvement in violent activities, contrary to the popular assumption in some quarters.

Details: Ibadan, Nigeria: FRA Institute of African Studies , University of Ibadan, 2015. 30p.

Source: Internet Resource: Accessed April 11, 2017 at: IFRA-Nigeria working papers series, no 46: Accessed April 11, 2017 at: http://www.ifra-nigeria.org/publications/e-papers/invisible-violence-project/84-daniel-makai-2015-a-study-of-violence-related-deaths-in-nafada-local-government-area-of-gombe-state-and-auyo-gagarawa-gumel-gwiwa-kaugama-and-yankwasi-local-government-areas-of-jigawa-state-2006-2014

Year: 2015

Country: Nigeria

URL: http://www.ifra-nigeria.org/publications/e-papers/invisible-violence-project/84-daniel-makai-2015-a-study-of-violence-related-deaths-in-nafada-local-government-area-of-gombe-state-and-auyo-gagarawa-gumel-gwiwa-kaugama-and-yan

Shelf Number: 144792

Keywords:
Extremists Groups
Gangs
Homicides
Lethal Violence
Murders
Violence
Violent Crime

Author: Fox, Emma

Title: Profiting from Prejudice: How Mend's 'IAM' Campaign Legitimised Extremism

Summary: An initiative branded as a campaign to fight Islamophobia in fact provided a platform for extremism across the public and charity sectors, according to a new report from the Henry Jackson Society. The report says that Muslim Engagement and Development (MEND) exploited the legitimate concerns of people who want to fight hatred and discrimination against Muslims to push an alarmist and divisive 'us vs. them' narrative - including literature which warned that the UK was heading towards the ethnic genocide of Muslims. MEND also offered 'training' for students and encouraged them to raise money for the organisation. Profiting from Prejudice: How MEND's 'IAM' Campaign Legitimised Extremism catalogues the events which took place in November 2017 under the banner of Islamophobia Awareness Month (IAM), run by MEND. It finds that the campaign gave a platform to extremism-linked individuals, with some events hosting people with a high-profile extremist history - including incitement to violence, sympathy with convicted terrorists and support for corporal punishment against Jews, homosexuals, minority Muslim sects and 'disbelievers'. Despite the fact that the UK's national Counter-Extremism Strategy requires local authorities to ensure that "publicly-owned venues and resources do not provide a platform for extremists and are not used to disseminate extremist views", the report finds that the majority of IAM events took place on public property - from schools to university campuses - without challenge. Some of the schools involved, including two in Waltham Forest, have a history of hosting high-profile extremist speakers. IAM events also played host to various parliamentarians, academics and activists, lending the initiative - and MEND - added legitimacy. A report from the Henry Jackson Society published in 2017 found that MEND were "Islamists masquerading as civil libertarians" - but engagement with the organisation by figures such as Labour Leader Jeremy Corbyn continues to enable MEND's prominence on mainstream platforms. The report contains several recommendations to reduce the impact of non-violent extremist groups in the public and civil society sectors, including: Events hosted at public institutions featuring a speaker linked to extremism should be recorded - and panels should always be balanced, with extremist-linked views challenged by other speakers. Universities' risk mitigation procedures, required under Prevent, should be more transparent in order to highlight why extremist groups continue to appear unchallenged on campus. A guidance framework should be drawn up for politicians, the police and civil society to raise awareness of how extremist groups operate - and ensure a unified stance against those who threaten social cohesion.

Details: London: Henry Jackson Society, 2018. 67p.

Source: Internet Resource: Accessed March 27, 2017 at: http://henryjacksonsociety.org/wp-content/uploads/2018/03/HJS-Profiting-from-Prejudice-Report.pdf

Year: 2018

Country: United Kingdom

URL: http://henryjacksonsociety.org/wp-content/uploads/2018/03/HJS-Profiting-from-Prejudice-Report.pdf

Shelf Number: 149592

Keywords:
Extremism
Extremists Groups
Hate Crimes
Islamophobia
Muslims
Prejudice