Transaction Search Form: please type in any of the fields below.
Date: November 22, 2024 Fri
Time: 11:40 am
Time: 11:40 am
Results for terrorism (u.s.)
14 results foundAuthor: Jenkins, Brian Michael Title: Stray Dogs and Virtual Armies Radicalization and Recruitment to Jihadist Terrorism in the United States Since 9/11 Summary: Since September 11, 2001, so-called "homegrown terrorists," working alone or with others, have planned and in some cases implemented terrorist activities, contributed financial or other material support to others' terrorist activities, or become radicalized in the United States and then traveled to other countries to conduct terrorist activities directed against those countries or against the United States. This paper examines the cases of homegrown terrorism from 9/11 through 2010, highlights lessons learned from those cases that suggest actions for the future, and includes a chronology of numbers and case descriptions of terrorist events in the United States during that period. Most of the individuals involved are Muslim, but the numbers are small. A total of 176 Americans have been indicted, arrested, or otherwise identified as jihadist terrorists or supporters since 9/11. They were involved in 82 cases, a majority of which involve the actions of a single individual. Al Qaeda has increasingly used the Internet to build an army of followers. Many of the terrorists identified in this study began their journey online. However, al Qaeda has not yet managed to inspire its online followers to action. Few of the 32 locally hatched jihadist plots to carry out terrorist attacks in the United States since 9/11 got much beyond the discussion stage. Nevertheless, al Qaeda remains a threat. More terrorist attempts will occur. Traditional law enforcement, in which authorities attempt to identify and apprehend a perpetrator after a crime has been committed, is inadequate to deal with terrorists who are determined to cause many deaths and great destruction and who may not care whether they themselves survive. Public safety demands a preventive approach — intervention before an attack occurs. In addition to law enforcement, intelligence collection, and community policing, public reaction is an essential component of such preventive defense. Details: Santa Monica, CA: RAND, 2011. 56p. Source: Internet Resource: Accessed September 8, 2011 at: http://www.rand.org/pubs/occasional_papers/OP343.html Year: 2011 Country: United States URL: http://www.rand.org/pubs/occasional_papers/OP343.html Shelf Number: 122679 Keywords: Radical GroupsTerrorism (U.S.)Terrorists |
Author: Vargas, Alejandro, Jr. Title: Applying Psychosocial Theories of Terrorism to the Radicalization Process: A Mapping of De La Corte‘s Seven Principles to Homegrown Radicals Summary: This study contains an application of psychosocial theories to the process of radicalization among Muslim militants (jihadis) with a history of activity in the United States. Drawing extensively from De la Corte‘s seven psychosocial principles of terrorism, the study codes each principle into a corresponding example from case studies of American jihadism. The end result is the use of theory to create a new empirical and psychosocial perspective into homegrown jihadism. The application of De la Corte‘s theory is also used as a framework to suggest frameworks for detection, intervention, and interdiction when it comes to homegrown jihadi activity. Details: Monterey, CA: Naval Postgraduate School, 2011. 71p. Source: Internet Resource: Master's Thesis: Accessed September 19, 2011 at: https://www.hsdl.org/?view&did=683351 Year: 2011 Country: United States URL: https://www.hsdl.org/?view&did=683351 Shelf Number: 122777 Keywords: Homeland SecurityMuslimsRadical GroupsRadicalizationTerrorism (U.S.)Terrorists |
Author: Neumann, Peter Title: Preventing Violent Radicalization in America Summary: In December 2010, Attorney General Eric Holder told journalists that the terrorist threat had changed from “foreigners coming here to… people in the United States, American citizens.” A number of independent studies have confirmed this assessment. One of the most recent – published by the New America Foundation and Syracuse University – showed that “nearly half” of the 175 cases of al Qaeda-related homegrown terrorism since September 11, 2001 occurred in 2009 and 2010. The threat is sufficiently serious to ask whether the U.S. government is fully prepared to confront this new challenge. “Hard” counterterrorism efforts – both at home and abroad – have become sophisticated and successful, yet there still is no domestic equivalent of the State Department’s “Countering Violent Extremism” policy seeking to prevent young Americans from being radicalized at home. Last September’s report by the Bipartisan Policy Center’s (BPC) National Security Preparedness Group, Assessing the Terrorist Threat, concluded that the lack of a coherent approach towards domestic counter-radicalization has left America “vulnerable to a threat that is not only diversifying, but arguably intensifying.” The purpose of this report is to provide guidance on ongoing efforts aimed at developing such an approach. Details: Washington, DC: Bipartisan Policy Center, 2011. 56p. Source: Internet Resource: Accessed September 27, 2011 at: http://www.bipartisanpolicy.org/sites/default/files/NSPG.pdf Year: 2011 Country: United States URL: http://www.bipartisanpolicy.org/sites/default/files/NSPG.pdf Shelf Number: 122909 Keywords: Radical GroupsRadicalizationTerrorism (U.S.)Terrorists |
Author: Center for Human Rights and Global Justice, Title: Targeted and Entrapped: Manufacturing the “Homegrown Threat” in the United States Summary: Since September 11, 2001, the U.S. government has targeted Muslims in the United States by sending paid, untrained informants into mosques and Muslim communities. This practice has led to the prosecution of more than 200 individuals in terrorism-related cases. The government has touted these cases as successes in the so-called war against terrorism. However, in recent years, former Federal Bureau of Investigation (FBI) agents, local lawmakers, the media, the public, and community-based groups have begun questioning the legitimacy and efficacy of this practice, alleging that—in many instances—this type of policing, and the resulting prosecutions, constitute entrapment. This Report examines three high-profile terrorism prosecutions in which government informants played a critical role in instigating and constructing the plots that were then prosecuted. In all three cases, the FBI or New York City Police Department (NYPD) sent paid informants into Muslim communities or families without any particularized suspicion of criminal activity. Informants pose a particular set of problems given they work on behalf of law enforcement but are not trained as law enforcement. Moreover, they often work for a government-conferred benefit—say, a reduction in a preexisting criminal sentence or a change in immigration status—in addition to fees for providing useful information to law enforcement, creating a dangerous incentive structure. Details: New York: New York University School of Law, 2011. 82p. Source: Internet Resource: Accessed March 2, 2012 at: http://www.chrgj.org/projects/docs/targetedandentrapped.pdf Year: 2011 Country: United States URL: http://www.chrgj.org/projects/docs/targetedandentrapped.pdf Shelf Number: 124344 Keywords: Human RightsInformantsMuslimsTerrorism (U.S.) |
Author: Turner, Nathaniel J. Title: U.S. Muslim Charities and the War on Terror: A Decade in Review Summary: This report summarizes the shutdown of Muslim charities and subsequent lawsuits filed against the government. It also looks at cases of intrusive government actions, such as surveillance of Muslim communities and Islamophobic congressional hearings. Finally, the report gives an overview of how the civil society sector has responded to government scrutiny through interfaith dialogues, education initiatives and partnerships with law enforcement agencies. Details: Washington, DC: Charity and Security Network, 2011. 25p. Source: Internet Resource: Accessed March 2, 2012 at: http://www.charityandsecurity.org/studies/US_Muslim_Charities_and_the_War_on_Terror_2011 Year: 2011 Country: United States URL: http://www.charityandsecurity.org/studies/US_Muslim_Charities_and_the_War_on_Terror_2011 Shelf Number: 124345 Keywords: MuslimsTerrorism (U.S.) |
Author: Deardorff, Robert B. Title: Countering Violent Extremism: The Challenge and the Opportunity Summary: It is crucial for the United States to confront the increasing incidence of Americans who turn to violence against their fellow citizens in support of Islamist terrorists. This thesis explores the application of “soft power,” the government’s ability to mitigate the recruitment and radicalization of new terrorists by attraction rather than coercion, in order to prevent “homegrown” terrorism. Methods include a comparative policy analysis of counterterrorism models in the United Kingdom and the Netherlands, a survey of conservative Muslim leaders in the Houston area, and an extensive literature review. Recent arrests portend an increasing threat if the United States continues along its “hard power” path exclusively. Potential solutions require active engagement by government leaders, coordinated messaging, and continuing contact between government agencies and vulnerable communities. A broad national strategy, refined and implemented at a regional level, is required. Strategies that balance hard and soft power separate radicalizing influences from their recruiting pool, alter the social context of potential recruits in favor of democratic process, and make partners of potential antagonists. Regional Outreach and Operational Coordination Centers (ROOCC) offer a mechanism to develop and support strategies that combine government, nongovernment, and community leaders to combat terrorism at the ideological level. Details: Monterey, CA: Naval Postgraduate School, 2010. 166p. Source: Internet Resource: Master's Thesis: Accessed April 12, 2012 at: http://www.hsdl.org/?view&did=11538 Year: 2010 Country: United States URL: http://www.hsdl.org/?view&did=11538 Shelf Number: 124942 Keywords: Radical GroupsRadicalizationTerrorism (U.S.)Violent Extremism |
Author: Willis, Henry H. Title: Terrorism Risk Modeling for Intelligence Analysis and Infrastructure Protection Summary: The Department of Homeland Security (DHS) has adopted a focused approach to risk reduction. DHS is moving increasingly to risk analysis and risk-based resource allocation, a process that is designed to manage the greatest risks instead of attempting to protect everything. This report applies a probabilistic terrorism model that is broadly applied in the insurance industry to assess risk across cities, to assess risks within specific cities, and to assist intelligence analysis. Among the authors' conclusions: Terrorism risk is concentrated in a small number of cities, with most cities having negligible relative risk, so terrorism estimates such as those described in the report should be incorporated into the grant allocation assessment process. DHS should consider funding the development of city profiles of major metropolitan areas receiving DHS preparedness grants. It should also develop descriptions of terrorist attack planning and operations that can be used to translate estimates from risk models of likely attack scenarios into detailed recommendations. Finally, DHS should develop tabletop exercises to test the scenarios and provide feedback. Details: Santa Monica, CA: RAND, 2007. 95p. Source: Internet Resource: Accessed May 18, 2012 at: http://www.rand.org/pubs/technical_reports/2007/RAND_TR386.pdf Year: 2007 Country: United States URL: http://www.rand.org/pubs/technical_reports/2007/RAND_TR386.pdf Shelf Number: 125343 Keywords: Homeland SecurityRisk AssessmentTerrorism (U.S.) |
Author: Jenkins, Brian Michael Title: Carnage Interrupted: An Analysis of Fifteen Terrorist Plots Against Public Surface Transportation Summary: This report examines 13 terrorist plots against public surface transportation that were uncovered and foiled by authorities between 1997 and 2010 and two failed attempts to carry out attacks. Certainly, this is not the total universe of foiled or failed terrorist plots in these years, but they were selected on the basis of what is known about them and the accessibility of information. The report focuses on terrorist plots in the West. Seven of the 15 plots took place in the United States, and four occurred in the United Kingdom. These two countries figure prominently as targets of terrorism, and in addition, American and British officials have dealt with terrorist plots through publicized arrests and trials, which provide additional information. Although motive was not a criterion in the selection of the plots, all but one involve individuals or groups inspired by al Qaeda’s ideology of violent global jihad against the West. The exception is the 1997 Flatbush plot, in which two terrorists, both of whom had connections with Hamas, angered by events in Palestine, simply wanted to kill as many Jews as possible to express their opposition to U.S. support for Israel. Other sources suggest that the Flatbush plotters wanted to force the release of jailed Islamist terrorists in the United States, including Ramzi Yousef, who participated in the 1993 World Trade Center bombing, and Sheik Omar Abdul-Rahman, who was convicted for his involvement in a plot to carry out additional bombings in New York. Details: San Jose, CA: Mineta Transportation Institute, College of Business, San José State University, 2012. 92p. Source: Internet Resource: MTS Report 11-20: Accessed July 13, 2012 at: http://www.transweb.sjsu.edu/PDFs/research/2979-analysis-of-terrorist-plots-against-public-surface-transportation.pdf Year: 2012 Country: United States URL: http://www.transweb.sjsu.edu/PDFs/research/2979-analysis-of-terrorist-plots-against-public-surface-transportation.pdf Shelf Number: 125611 Keywords: Public TransportationTerrorism (U.S.)TerrroristsTransportation Security |
Author: Jenkins, Brian Michael Title: Explosives and Incendiaries Used in Terrorist Attacks on Public Surface Transportation: A Preliminary Empirical Examination Summary: This report provides data on terrorist attacks against public surface transportation targets and serious crimes committed against such targets throughout the world. The data are drawn from the MTI database of attacks on public surface transportation, which is expanded and updated as information becomes available. This analysis is based on the database as of February 20, 2010. Data include the frequency and lethality with which trains, buses, and road and highway targets are attacked; the relationship between fatalities and attacks against those targets; and the relationship between injuries and attacks against them. The report presents some preliminary observations drawn from the data that can help stakeholder governments, transit managers, and employee to focus on the ways the most frequent and/or most lethal attacks are carried out as they consider measures to prevent or mitigate attacks that may be considered likely to happen in the United States. Details: San Jose, CA: Mineta Transportation Institute, College of Business, San Jose State University, 2010. 118p. Source: Internet Resource: MTI Report WP 09-02: Accessed July 18, 2012 at: http://transweb.sjsu.edu/mtiportal/research/publications/documents/2875-IED-Support-Research.pdf Year: 2010 Country: United States URL: http://transweb.sjsu.edu/mtiportal/research/publications/documents/2875-IED-Support-Research.pdf Shelf Number: 125667 Keywords: ExplosivesPublic TransportationTerrorism (U.S.)Transportation Security |
Author: Rollins, John Title: Terrorism and Transnational Crime: Foreign Policy Issues for Congress Summary: This report provides an overview of transnational security issues related to patterns of interaction among international terrorist and crime groups. In addition, the report discusses the U.S. government’s perception of and response to the threat. It concludes with an analysis of foreign policy options. In recent years, the U.S. government has asserted that terrorism, insurgency, and crime interact in varied and significant ways, to the detriment of U.S. national security interests. Although unclassified anecdotal evidence largely serves as the basis for the current understanding of criminal-terrorist connections, observers often focus on several common patterns. • Partnership Motivations and Disincentives: Collaboration can serve as a force multiplier for both criminal and terrorist groups, as well as a strategic weakness. Conditions that may affect the likelihood of confluence include demand for special skills unavailable within an organization, greed, opportunity for and proclivity toward joint ventures, and changes in ideological motivations. • Appropriation of Tactics: Although ideologies and motivations of an organization may remain consistent, criminals and terrorists have shared similar tactics to reach their separate operational objectives. Such tactics include acts of violence; involvement in criminal activity for profit; money laundering; undetected cross-border movements; illegal weapons acquisition; and exploitation of corrupt government officials. • Organizational Evolution and Variation: A criminal group may transform over time to adopt political goals and ideological motivations. Conversely, terrorist groups may shift toward criminality. For some terrorist groups, criminal activity remains secondary to ideological ambitions. For others, profit-making may surpass political aspirations as the dominant operating rationale. Frequently cited terrorist organizations involved in criminal activity include Abu Sayyaf Group (ASG), Al Qaeda’s affiliates, D-Company, Kurdistan Worker’s Party (PKK), Revolutionary Armed Forces of Colombia (FARC), Haqqani Network, and Hezbollah. To combat these apparent criminal-terrorist connections, Congress has maintained a role in formulating U.S. policy responses. Moreover, recent Administrations have issued several strategic documents to guide U.S. national security, counterterrorism, anti-crime, and intelligence activities. In July 2011, for example, the Obama Administration issued the Strategy to Combat Transnational Organized Crime, which emphasized, among other issues, the confluence of crime and terrorism as a major factor in threatening the U.S. global security interests. While the U.S. government has maintained substantial long-standing efforts to combat terrorism and transnational crime separately, Congress has been challenged to evaluate whether the existing array of authorities, programs, and resources sufficiently respond to the combined crime-terrorism threat. Common foreign policy options have centered on diplomacy, foreign assistance, financial actions, intelligence, military action, and investigations. At issue for Congress is how to conceptualize this complex crime-terrorism phenomenon and oversee the implementation of cross-cutting activities that span geographic regions, functional disciplines, and a multitude of policy tools that are largely dependent on effective interagency coordination and international cooperation. Details: Washington, DC: Congressional Research Service, 2012. 40p. Source: Internet Resource: R41004: Accessed October 25, 2012 at: http://www.fas.org/sgp/crs/terror/R41004.pdf Year: 2012 Country: United States URL: http://www.fas.org/sgp/crs/terror/R41004.pdf Shelf Number: 126799 Keywords: Counter-TerrorismForeign PolicyOrganized CrimeTerrorism (U.S.)Transnational Crime |
Author: Bjelopera, Jerome P. Title: American Jihadist Terrorism: Combating a Complex Threat Summary: This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, “homegrown” describes terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The term “jihadist” describes radicalized individuals using Islam as an ideological and/or religious justification for their belief in the establishment of a global caliphate, or jurisdiction governed by a Muslim civil and religious leader known as a caliph. The term “violent jihadist” characterizes jihadists who have made the jump to illegally supporting, plotting, or directly engaging in violent terrorist activity. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. Appendix A provides details about each of the post-9/11 homegrown jihadist terrorist plots and attacks. Details: Washington, DC: Congressional Research Service, 2013. 141p. Source: Internet Resource: R41416: Accessed February 22, 2013 at: http://www.fas.org/sgp/crs/terror/R41416.pdf Year: 2013 Country: United States URL: http://www.fas.org/sgp/crs/terror/R41416.pdf Shelf Number: 127702 Keywords: Extremist GroupsHomegrown TerroristsHomeland SecurityJihadist TerrorismRadical GroupsRadicalizationTerrorism (U.S.)TerroristsViolent Extremism |
Author: U.S. Government Accountability Office Title: Information Sharing: Additional Actions Could Help Ensure That Efforts to Share Terrorism-Related Suspicious Activity Reports Are Effective Summary: In 2007, DOJ and its federal partners developed the Nationwide Suspicious Activity Reporting Initiative to establish a capability to gather and share terrorism-related suspicious activity reports. GAO was asked to examine the initiative's progress and performance. This report addresses the extent to which (1) federal agencies have made progress in implementing the initiative, and what challenges, if any, remain; (2) the technical means used to collect and share reports overlap or duplicate each other; (3) training has met objectives and been completed; and (4) federal agencies are assessing the initiative's performance and results. GAO analyzed relevant documents and interviewed federal officials responsible for implementing the initiative and stakeholders from seven states (chosen based on their geographic location and other factors). The interviews are not generalizable but provided insight on progress and challenges. What GAO Recommends GAO recommends that DOJ implement formalized mechanisms to provide stakeholders feedback on the suspicious activity reports they submit, mitigate risks from supporting two systems to collect and share reports that may result in the FBI not receiving needed information, more fully assess if training for line officers meets their needs, and establish plans and time frames for implementing measures that assess the homeland security results the initiative has achieved. DOJ agreed with these recommendations and identified actions taken or planned to implement them. Details: Washington, DC: GAO, 2013. 63p. Source: Internet Resource: GAO-13-233: Accessed May 1, 2013 at: Year: 2013 Country: United States URL: Shelf Number: 128579 Keywords: Fusion CentersInformation SharingTerrorism (U.S.)Terrorists |
Author: Bjelopera, Jerome P. Title: The Federal Bureau of Investigation and Terrorism Investigations Summary: The Federal Bureau of Investigation (FBI, the Bureau) is the lead federal law enforcement agency charged with counterterrorism investigations. Since the September 11, 2001 (9/11) attacks, the FBI has implemented a series of reforms intended to transform itself from a largely reactive law enforcement agency focused on investigations of criminal activity into a more proactive, agile, flexible, and intelligence-driven agency that can prevent acts of terrorism. This report provides background information on key elements of the FBI terrorism investigative process based on publicly available information. It discusses • several enhanced investigative tools, authorities, and capabilities provided to the FBI through post-9/11 legislation, such as the USA PATRIOT Act of 2001; the 2008 revision to the Attorney General’s Guidelines for Domestic FBI Operations (Mukasey Guidelines); and the expansion of Joint Terrorism Task Forces (JTTF) throughout the country; • intelligence reform within the FBI and concerns about the progress of those reform initiatives; • the FBI’s proactive, intelligence-driven posture in its terrorism investigations using preventative policing techniques such as the “Al Capone” approach and the use of agent provocateurs; and • the implications for privacy and civil liberties inherent in the use of preventative policing techniques to combat terrorism. This report sets forth possible considerations for Congress as it executes its oversight role. These issues include the extent to which intelligence has been integrated into FBI operations to support its counterterrorism mission and the progress the Bureau has made on its intelligence reform initiatives. Details: Washington, DC: Congressional Research Service, 2013. 30p. Source: Internet Resource: R41780: Accessed May 3, 2013 at: http://www.fas.org/sgp/crs/terror/R41780.pdf Year: 2013 Country: United States URL: http://www.fas.org/sgp/crs/terror/R41780.pdf Shelf Number: 128611 Keywords: Criminal InvestigationTerrorism (U.S.) |
Author: Perliger, Arie Title: Challengers from the Sidelines: Understanding America’s Violent Far-Right Summary: In the last few years, and especially since 2007, there has been a dramatic rise in the number of attacks and violent plots originating from individuals and groups who self-identify with the far-right of American politics. These incidents cause many to wonder whether these are isolated attacks, an increasing trend, part of increasing societal violence, or attributable to some other condition. To date, however, there has been limited systematic documentation and analysis of incidents of American domestic violence. This study provides a conceptual foundation for understanding different far-right groups and then presents the empirical analysis of violent incidents to identify those perpetrating attacks and their associated trends. Through a comprehensive look at the data, this study addresses three core questions: (1) What are the main current characteristics of the violence produced by the far right? (2) What type of far-right groups are more prone than others to engage in violence? How are characteristics of particular far-right groups correlated with their tendency to engage in violence? (3) What are the social and political factors associated with the level of far-right violence? Are there political or social conditions that foster or discourage violence? It is important to note that this study concentrates on those individuals and groups who have actually perpetuated violence and is not a comprehensive analysis of the political causes with which some far-right extremists identify. While the ability to hold and appropriately articulate diverse political views is an American strength, extremists committing acts of violence in the name of those causes undermine the freedoms that they purport to espouse. Details: West Point, NY: Combating Terrorism Center at West Point, 2013. 147p. Source: Internet Resource: Accessed August 8, 2013 at: http://www.ctc.usma.edu/posts/challengers-from-the-sidelines-understanding-americas-violent-far-right Year: 2013 Country: United States URL: http://www.ctc.usma.edu/posts/challengers-from-the-sidelines-understanding-americas-violent-far-right Shelf Number: 129588 Keywords: Domestic TerrorismExtremist GroupsHomeland SecurityRadical GroupsTerrorism (U.S.)Terrorist GroupsViolent Extremism |