The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats


Book Description

Skilled scientists are not immune to the appeal of terrorist groups, indeed recent studies indicate that engineers and medical doctors are over-represented within terrorist organizations. Also of particular concern with regard to the potential radicalization of scientists is the issue of the ‘lone wolf’; an individual who prepares and commits violence alone, outside of any command structure and without material assistance from any group. This book presents papers from the NATO Advanced Research Workshop (ARW) entitled ‘The Risk of Skilled Scientist Radicalization and Emerging Biological Warfare Threats’, held in Como, Italy, from 29 November to 2 December 2016. The aim of this ARW was to assess the risks surrounding the ability of radical terrorist groups to recruit highly skilled scientists. The ARW was unique in that it brought together acknowledged experts from the social science community and the scientific technical community to discuss their perspectives on the risk of radicalization of chemical, biological, radiological and nuclear (CBRN) skilled scientists. Countering terrorist organizations requires a comprehensive approach characterized by international cooperation across the military, intelligence, policy-making and scientific communities. The book provides an overview of the situation, as well as recommendations for how such cooperation can be achieved, and will be of interest to all those involved in the counter-terrorism process







Digital Jihad


Book Description

The internet offers tremendous opportunities for violent extremists across the ideological spectrum and at a global level. In addition to propaganda, digital technologies have transformed the dynamics of radical mobilisation, recruitment and participation. Even though the jihadist threat has seemingly declined in the West, the danger exists of the internet being an environment where radical messages can survive and even prosper. Against this background, this ISPI report investigates the current landscape of jihadist online communication, including original empirical analysis. Specific attention is also placed on potential measures and initiatives to address the threat of online violent extremism. The volume aims to present important points for reflection on the phenomenon in the West (including Italy) and beyond.




Jihadism Revisited


Book Description

Studying Jihadism is an endeavor facing several problems. For many researchers and the reading public it is difficult to accept that Jihadists do have a theology of their own and not some kind of ideology. Understanding that a phenomenon of communication that is done to a large extent in Arabic is not to be understood if research is done communication translated into or written in English. Saying it is al out there in the Internet without understanding Internet communication will help to understand terrorist phenomena like Jihadism. Ignoring that there is Jihadism IS and al-Qa'ida will guarantee that research will not be able to see the broad range of Jihadism. Last but not least, research not interested in the technologies, practices, etc., Jihadists use to commit terrorist attacks, cannot claim to study Jihadism. The contributions in this book provide knowledge in all these fields: based on Arabic language sources, theological aspects, Internet communication, groups usually ignored, the role of infographics, technical aspects, and covert and intelligence actions.




Psychology of Terrorism


Book Description

In compiling this annotated bibliography on the psychology of terrorism, the author has defined terrorism as "acts of violence intentionally perpetrated on civilian noncombatants with the goal of furthering some ideological, religious or political objective." The principal focus is on nonstate actors. The task was to identify and analyze the scientific and professional social science literature pertaining to the psychological and/or behavioral dimensions of terrorist behavior (not on victimization or effects). The objectives were to explore what questions pertaining to terrorist groups and behavior had been asked by social science researchers; to identify the main findings from that research; and attempt to distill and summarize them within a framework of operationally relevant questions. To identify the relevant social science literature, the author began by searching a series of major academic databases using a systematic, iterative keyword strategy, mapping, where possible, onto existing subject headings. The focus was on locating professional social science literature published in major books or in peer-reviewed journals. Searches were conducted of the following databases October 2003: Sociofile/Sociological Abstracts, Criminal Justice Abstracts (CJ Abstracts), Criminal Justice Periodical Index (CJPI), National Criminal Justice Reference Service Abstracts (NCJRS), PsycInfo, Medline, and Public Affairs Information Service (PAIS). Three types of annotations were provided for works in this bibliography: Author's Abstract -- this is the abstract of the work as provided (and often published) by the author; Editor's Annotation -- this is an annotation written by the editor of this bibliography; and Key Quote Summary -- this is an annotation composed of "key quotes" from the original work, edited to provide a cogent overview of its main points.




Threatcasting


Book Description

Impending technological advances will widen an adversary’s attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding an undesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader’s understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of “the next biological public health crisis.” The second half of the book is designed as a practitioner’s handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.




Terrorist Recruitment in American Correctional Institutions


Book Description

There are thousands of followers of non-Judeo-Christian faith groups in American correctional institutions. Research suggests that many of these prisoners began their incarceration with little or no religious calling, but converted during their imprisonment. According to the FBI, some of these prisoners may be vulnerable to terrorist recruitment. The purpose of this study is three-fold: (1) to collect baseline information on non-traditional religions in U.S. correctional institutions; (2) to identify the personal and social motivations for prisoners’ conversions to these faith groups; and (3) to assess the prisoners’ potential for terrorist recruitment. The study creates a starting point for more in-depth research on the relationship between prisoners’ conversion to non-traditional religions and extremist violence. Figure. This is a print on demand report.




Global Trends


Book Description

This edition of Global Trends revolves around a core argument about how the changing nature of power is increasing stress both within countries and between countries, and bearing on vexing transnational issues. The main section lays out the key trends, explores their implications, and offers up three scenarios to help readers imagine how different choices and developments could play out in very different ways over the next several decades. Two annexes lay out more detail. The first lays out five-year forecasts for each region of the world. The second provides more context on the key global trends in train.




Terrorism in Southeast Asia


Book Description

Contents: (1) The Rise of Islamist Militancy in Southeast Asia: Overview; The Rise of Al Qaeda in Southeast Asia; (2) The Jemaah Islamiya (JI) Network: History of JI; JI¿s Relationship to Al Qaeda; JI¿s Size and Structure; (3) Indonesia: Recent Events; The Bali Bombings and Other JI attacks in Indonesia; The Trial and Release of Baasyir; (4) The Philippines: Abu Sayyaf; The MILF; The Philippine Communist Party; (5) Thailand: Southern Insurgency; Current Government¿s Approach; Little Evidence of Transnational Elements; (6) Malaysia: Recent Events; A Muslim Voice of Moderation; Maritime Concerns; Terrorism and Counter-Terrorism in Malaysia; Terrorist Groups in Malaysia; Malaysia¿s Counter-Terrorism Efforts; (7) Singapore: U.S.-Singapore Coop.




Extremist Groups


Book Description

This compendium of information on terrorist groups, violent international criminal gangs, and other extremist groups that have been or are currently operating is intended for use as a reference guide and research tool for academics, students, government officials, security personnel, military personnel, law enforcement personnel, and the public. The publication also lists and describes political organizations and religious or ethnic factions that espouse violence or display the threat of violence in their philosophical or operational standards. The information was collected from a broad range of sources, including interviews with, law enforcement and military practitioners, researchers and academics, and and government officials. The organizations are listed geographically by continent and country. The listing for each organization covers its stated aims, ideology, or policy; areas of operation, numbers of active members, numbers of supporters, structure, headquarters, leaders' names, funding sources, types of activities, publications, network contacts, significant actions and activities, and trends.