Next Article in Journal
Argumentation Schemes in Technology-Mediated Open Innovation Product-Service Models: An Activity Systems Perspective
Previous Article in Journal
Bounding the Solution Space of Complex Systems in Terms of Non-Numeric and\or Uncontrollable Scenario Variables
Previous Article in Special Issue
Latent Errors and Visible Earned Value: How the Evolutionary Model Integrates Earned Value Metrics with Project System Dynamics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Contingencies of Violent Radicalization: The Terror Contagion Simulation

Worcester Polytechnic Institute, 100 Institute Rd., Worcester, MA 01609, USA
*
Author to whom correspondence should be addressed.
Systems 2021, 9(4), 90; https://doi.org/10.3390/systems9040090
Submission received: 7 October 2021 / Revised: 12 December 2021 / Accepted: 14 December 2021 / Published: 20 December 2021
(This article belongs to the Special Issue System Dynamics: Insights and Policy Innovation)

Abstract

:
This paper builds confidence in the terror contagion hypothesis that violent radicalization leading to predatory mass violence operates as a system. Within this system, the contingent values of key root causes create channels within which violent ideologies and terrorism emerge. We built a system dynamics simulation model capable of replicating historical reference modes and sophisticated enough to test the contingent values of these propositions. Of 16 propositions, we identified six root-cause propositions that must simultaneously exist, act in concert and explain the dynamics of their interaction which generate a terror contagion. Other propositions can strengthen or weaken an existing contagion but not eliminate it. We use an experiment to demonstrate how changing the contingent values of these propositions creates downward channels. This experiment helps reconcile the swarm vs. fishermen debate over the true root causes of violent radicalization. Within these channels, the contingent values can favor swarm or fishermen manifestations. The simulation and experimentation results enable the future development of the terror contagion hypothesis, provide a testing environment for research on violent radicalization, and provide a pathway to policy development in the combating of terrorism that arises from violent radicalization.

1. Introduction

In 1995 two perpetrators planned to use improvised explosives to kill their classmates at Columbine High School. When the explosives failed to detonate, the perpetrators improvised a mass-shooting attack which killed 13 people and wounded 24. A wave of media coverage generated by the fatalities broadcast the improvised, rather than intended method as well as a misleading profile of the two perpetrators [1], p. 6. Since 1995, at least 30 perpetrators, some born after Columbine, have seen themselves in that media-constructed representation, and have replicated the improvised mass-shooting method, rather than the intended explosives method, to attack their own schools [2], pp. 6–7. As a seed event, Columbine defined and transmitted a violent ideology and a template method for mass-violence terrorism. In Norway, in 2011, a violent ideology of xenophobia and white supremacy broadened the mass-shooting approach across multiple locations. Among the replications of Norway include the 2019 Christchurch, New Zealand attack. Moreover, even if the claimed contact between the two perpetrators was fabricated, the operational influence on the template method is clear [3], pp. 17–18. The seed event for so-called incels, the Isla Vista attacks of 2014, broadcast a violent ideology of misogyny and a belief in ‘involuntary celibacy’ [4], combined with a template of mass violence through vehicular ramming and mass shooting. In 2017, a wave of ISIS terrorist acts combined the violent ideology of Salafi takfirism with a mixed method of vehicular ramming and knife attacks. In June of 2017, the vehicular ramming template method crossed from one violent ideology to another when a British ultranationalist used it in a copycat retaliation against Finsbury Mosque attendees [5]. Two months later, in August 2017, a US right-wing extremist used vehicular ramming against Charlottesville protesters in a heavily publicized incident, completing the transition of a method of attack that originated in one violent ideology to another, where it has continued to be used [6].
Historically, the root cause of violent radicalization leading to terrorism such as these incidents has been the subject of debate, with opinion divided between two dominant theories. First is the swarm theory, which proposes that individuals are self-radicalized in loose social networks. Second is the fishermen theory, which proposes that non-state-actor terror networks operating from safe havens lead to violent radicalization, resulting in terrorism [7].
This article advances an alternative to the swarm and fishermen theories: the terror contagion hypothesis. In this hypothesis, violent radicalization operates in a system of social contagion where violent ideology and a template method to conduct terrorism transmits through cultural scripts created by each completed terrorist act. Swarm and fishermen radicalizations in this hypothesis are not the cause of the system but a byproduct of it, representing just two of many potential manifestations arising from the contingent values of the terror contagion system in a given channel within that system.
Our previous work examined the swarm versus fishermen debate through a data set of 4600 terror incidents [8], categorizing profiles by violent ideology and radicalization method. Statistical analysis did not reveal swarm or fishermen categorizations as being more useful for understanding terrorism within these profiles than other factors [9]. Additionally, a previously unidentified third potential radicalization mechanic suggested a deeper system structure, in which these radicalization mechanics are emergent properties of the system rather than causes.
We next proposed such a system by leveraging expert theories of radicalization and linking them into feedback structures [10]. Causal analysis techniques identified numerous potential root causes operating throughout this system. Moreover, the analysis suggested that violent radicalization is a social contagion that is spread by combining a violent ideology with a template method to conduct mass violence. Under certain conditions, furthermore, a contagion can become self-perpetuating, as described in historical cases above.
The main contribution of this paper is to further develop the terror contagion hypothesis through simulation. Our experiments identify which propositions of the terror contagion hypothesis represent the root cause of violent radicalization and under what range of contingencies these propositions operate. We demonstrate that certain values of these contingencies can create channeling effects that favor either swarm or fisherman manifestations, suggesting a source and resolution to the historical debate. Our findings provide a basis for further research in the terror contagion hypothesis.

2. Literature Review

Terrorism has many definitions; however, we stay within the academic consensus [11] by leveraging the Global Terrorism Database (GTD)’s definition of terrorism as “the threatened or actual use of illegal force and violence by a non-state actor to attain a political, economic, religious, or social goal through fear, coercion, or intimidation” [8], pp. 10–11. The GTD’s inclusion criteria require an intentional incident involving violence or the threat of violence against people or property, and perpetrators must not be state actors. The GTD looks for evidence in two of the following three additional categories: First, the action must have occurred outside “legitimate warfare activities.” Second, the act must advance political, religious, social, economic, or other widespread change. Third, there must be evidence of “an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) than the victims” [8], pp. 10–11.

2.1. Theories on Radicalization

Research into violent radicalization leading to terrorism tries to answer the following two questions: who is susceptible, and how does violent radicalization proceed?
Both the IVEE Theory of Radicalization [12] and TRAP-18 [13] approach the susceptibility of an at-risk population without focusing on any specific method of radicalization (see below) or specific violent ideology. Between these two, TRAP-18 indicators appear most robust across populations, including Islamic terrorists, extreme right-wing terrorists, and single-issue terrorists [14], p. 6, such as school shooters.
The second question of how violent radicalization occurs has been dubbed the swarm versus fishermen debate, which is a debate over “root causes” [4], p. 7564. The debate began between two experts in combating terrorism, namely, Hoffman, in 2006 [15,16], and Sageman, in 2008 [7,17]. The theory of swarm radicalization, advocated by Sageman, is “bottom-up”, occurring “in small social groups or ‘bunches of guys’ inspired by and socializing each other...through internal group dynamics” [18], p. 187. This ‘leaderless jihad’ acts like a free market, reacting and adjusting to local domestic conditions without top-down organization and enabling the swarm to appear intelligent and organized as an emergent byproduct of self-organizing and self-directing individuals [17], pp. 144–145.
The theory of fishermen radicalization, advocated by Hoffman, is facilitated by non-state actor organizations that identify, recruit, and radicalize individuals [5], p. 195. An individual does not have to join the non-state actor group to qualify as a case of fishermen radicalization, but the interaction should be meaningful.
Most theories of violent radicalization fall within one of these two camps because the debate represents a classic sociological divide “between structure and agency or the importance of organizations as opposed to individual socializations” [18], p. 179.
During the global war on terror, advocates of swarm or fishermen theories advanced their position through the case-analysis of terrorist incidents associated, even if not directly linked, with Islamic terror networks such as al-Qaeda [19,20,21,22,23,24]. This over-weighting of the analysis on a single violent ideology of an at-risk population is important to understanding the origins and the contentiousness of the swarm versus fishermen debate, as we describe later in our channeling experiment.

2.2. Theories on Cultural Script Social Contagions: The Werther Effect

If susceptibility concerns “who”, and the radicalization process concerns “how”, cultural scripts answer the question of “what” is conveyed within this process. Cultural scripts are an abstracted, symbolic, meta-language, conveying “cultural norms, values and practices in terms which are clear, precise, and accessible to cultural insiders…” [25], p. 153. The spread of cultural scripts is well known to further social contagions of self-harm in suicide [26,27], as well as affective and predatory violence [28,29,30]. Suicide contagions, sometimes called Werther contagions, consist of three mechanics. First, the cultural script is broadcast in a one-to-many way, resulting in broad distribution across the population [31]. This is accomplished by media reporting on a celebrity’s suicide. Second, the general population receiving the script is filtered by similarity bias to those who see themselves in the script’s originator or content [32]. Third, the subset population is narrowed a second time by prestige bias. These individuals view the script originator as having high status, celebrity, or in the case of violent behavior, notoriety [33], pp. 558–560. There are several decades of research on how media reporting of celebrity suicides can either increase (Werther effect) or decrease (Papageno effect) the risk of copycat suicides [34], p. 12.

2.3. Simulation Models of Radicalization or Social Contagion

Simulations often model contagions through state transition models (STM), where individuals move between multiple states. In one common class of simulations, these states are linked to the progress of the spread of a disease, and individuals shift between Susceptible Infected and Recovered (SIR) [35], pp. 300–321. The IVEE Theory of Radicalization Simulation exemplifies a SIR approach [12], p. 3. In response to radicalizing content, susceptible individuals transition from non-radicalized to radicalized, becoming “infected” in the SIR framework [12], pp. 7–8. State transition changes in this model are determined by Markov chain stochastic processes based on probabilities [12], p. 2, which are determined by fitting parameters so that outcomes match known behaviors [12], p. 2. This represents the common challenge of using SIR frameworks with social contagions: the spread of viruses is empirically well understood while cultural scripts are not.
Alternative approaches have been more successful in capturing explicit causal mechanics. An agent-based model (ABM) simulation of the Werther effect successfully demonstrated contagion spread mechanics, including the one-to-many broadcast, self-similarity, and prestige bias effects [31]. Simulations have also depicted a contagion as a complex system [36]. Pruyt et al. demonstrated a technique for exploring deep uncertainty and dynamic complexity using radicalization as their topic, generating thousands of simulations [37] from a common suite. Auping et al. built upon that work by incorporating elements of grievance and the frustration of citizens [38]. The Farmers-Soldiers-Bandits (FSB) model by Saeed et al. is another STM where the states represent group identities, and the movement of individuals between group identities is made explicit. Whether a farmer shifts states to become a soldier or bandit is based on personal factors, incentives, and how individuals perceive their current group identity strength relative to other group identity strengths [39].

2.4. Selection of Simulation Method

We selected system dynamics to simulate the terror contagion hypothesis. System dynamics is well suited for military standards [40], p. 130, simulating complex environments by incorporating diplomatic, informational, military, and economic actions (DIME) and political, military, economic, societal, informational, and infrastructure system interactions (PMESII) [41], pp. 5–10. The system dynamics method also helps achieve DIME-PMESII capabilities for a simulation in order to analyze, understand, forecast, and respond to both adversary and societal behavior [40], pp. 34–44.
Meadows describes a model for understanding as useful in exploring new social problems where “old theories and old social structures are called into question [42], p. 24”, which describes the context of our work well. System dynamics supports developing models for understanding by making the hypothesis and assumptions explicitly clear in structure [43]. Additionally, within an endogenous system, such explicit structure aids in back-tracing behavior to its cause [44]. System dynamics also allows a model for understanding to be extended by operationalizing insights in order to develop pragmatic policies [45], a goal of our long-term work.
Our simulation is a state transition model (STM) and select the FSB over the SIR core representation of those states to build from. Although we use the analogy of a virus for the terror contagion hypothesis, all analogies have limits. SIR populations can only move one way along state transitions, from susceptible to infected and then recovered. In the FSB framework, individuals move fluidly back and forth between states based on the relative power of group identities, network effects, and individually experienced factors. The ability of an individual to self-radicalize themselves is, furthermore, an important feature of the swarm theory. In the disease-influenced SIR approach model, a person can neither will themselves into an infection nor become uninfected simply by exposure and interaction with uninfected people; however, these are characteristics of violent radicalization.
Additionally, in SIR, all infected individuals share the same general ability to infect others by exposure in equal measure. However, not all terrorists are created equal. Many are stopped or ineffective in completing attacks, while a handful generate catastrophic consequences.

3. Terror Contagion Hypothesis

We summarize our prior research beginning with the causal-loop diagram (CLD) system structure, synthesized from expert theories on violent radicalization in Figure 1 [10].
Governed space is the domestic area of interest within which terrorism occurs. The ungoverned space represents a physical or virtual safe haven for non-state actors to influence the governed space. The Growth of Radicalization Loops and Societal Limits to Growth in the Governed space in Figure 1A demonstrate the swarm theory, showing how violent domestic radicalization can grow or decline without any need for non-state actors operating from a safe haven. The Fishermen Growth & Decline Loop depicted in Figure 1B shows how cultural scripts from non-state actors in the ungoverned space can influence violent domestic radicalization. Figure 1C adds connective tissue between the governed and ungoverned spaces. These include policy interventions to eliminate safe havens, provoking backlash through the accidental guerilla syndrome and travel by violent radicals between governed and ungoverned spaces. In our perspective, ungoverned spaces that allow safe havens can be within a foreign country, digital or virtual spaces on the internet, or even temporary ungovernable physical pockets within the governed space.
We identified 16 potential causes of violent radicalization from this structure. Using qualitative causal analysis techniques [46], we identified a handful of these as a dynamic hypothesis regarding the root cause of violent radicalization, as depicted in Figure 2 [10].
A terror contagion is a form of social contagion spread through cultural scripts by incidents of mass violence. These cultural scripts convey a template ideology and a template method that is suitable for contagion (Figure 2A) based on specific grievances & moral outrage (Figure 2B) within a given at-risk population (Figure 2C). These templates must be suitable in terms of self-similarity and notoriety in relation to the at-risk population; self-similarity in that they recognize themselves in the perpetrator’s identity, and notoriety in that they view mass violence as a source of celebrity rather than repulsion. The template ideology conveys a conspiracy narrative that explains the perceived grievance, identifies an out-group as responsible, and advocates violence to address it. The template method conveys instructions on how to conduct mass-violence terrorism. These templates operate in concert to activate a biological adaptation to predatory mass violence (Figure 2D), leading to the next mass-violent incident (Figure 2E). This incident results in the spread of template ideology & method (Figure 2F) due to the broad reach of media reporting (Figure 2G). In celebrity suicide Werther contagions, the effect is short-lived because media attention is driven by the celebrity nature of the individual who commits suicide. In a terror contagion, however, media attention is generated by the template method to produce mass fatalities. This means terror contagions can become self-perpetuating. Each subsequently completed act of mass violence furthers the replication and spread of cultural scripts sustaining the contagion of violent radicalization in the at-risk population.
In this paper, we test the 16 propositions listed in Table 1. These quantitative experiments bolster previous qualitative analysis on the six core propositions and allow the numerical comparison and visual inspection of results.

4. Reference Modes of a Terror Contagion

Our previous analysis of ~4600 terrorist incidents identified several historical time series of incident frequency by violent ideology, as depicted in Figure 3 [9]. These include completed and uncompleted attempts, measured in per-capita of 1M population and classified by violent ideology. We use these historical time series as the basis for understanding the potential growth and decline of terror contagions.
We identify four behaviors of growth and decline in terrorism attempts within this data. Two of these represent little or no growth. First, Failure to Grow (F2G) is observed where, despite individual terrorist incidents, there is no clear growth, such as in Right-Wing Incidents in Western Europe 1995–2012 (Figure 3G) or Unknown Incidents in both Western Europe and the US between 1995–2014 (Figure 3E.) Next, the Struggle to Grow (S2G) behavior demonstrates mild growth and a long plateau or gradual decline, as seen in Anti-Government incidents in the US (Figure 3I).
In contrast, the third growth behavior, Contagion (CONT), shows a steady accumulation and a growth in terrorist incidents. This is seen in both Right-Wing Extremism and Salafi Takfiri in the US from 2010 onwards (Figure 3G,H). Finally, Strong Contagion (CONT+) behavior shows very sharp growth over short periods. Strong contagion behaviors are historically seen across various violent ideologies in the US and WUER, including Takfiri 2014-onwards, (Figure 3A); Crime & Hate Crime in the US 2013–2017 (Figure 3B); Left-Wing extremism in Western Europe 2007–2011 (Figure 3C); Separatism in Western Europe 1995–1998 (Figure 3D); and Right-Wing extremism in Western Europe 2013–2017 (Figure 3F).
Shifting from historical time series to reference modes, we abstract these four growth patterns (F2G), (S2G), (CONT), (CONT+) and add three more behaviors in Figure 4 [47], which are Equilibrium (EQ), Hoped, and Feared.
Each reference mode begins in an Equilibrium state in the historical (left side) portion of the chart, where violence may be occurring but is indistinguishable from normal criminal patterns. We locate an abstracted seed event as the vertical line indicating when the terror contagion starts. From that event, growth proceeds along one of several reference modes. A continuation at or close to EQ is an F2G represented by a string of dots. Observable growth patterns in S2G, CONT, and CONT+ are represented by a string of dashes, a combination of dots and dashes, and solid red lines. Although CONT and CONT+ share similar shapes, the sharper rise of a CONT+ relative to a CONT indicates how a strong contagion accelerates radicalization and is more severe in its behavior. Hoped and Feared, depicted by gray lines, represent desired and undesired policy outcomes where violence finds a new sustained equilibrium. These are at or below historical EQ levels for Hoped and higher than EQ for Feared. These reference modes are summarized in Table 2.

5. Terror Contagion Simulation

Our simulation is designed to test the terror contagion hypothesis as a model for understanding within DIME-PMESII standards. The simulation does not replicate or improve upon general terrorism simulations or models. In the simulation, an at-risk population is located in a larger society. At the beginning of the simulation, the at-risk population supports no violent ideology nor employs a template method. However, they may be engaging in normal criminal violence. The simulation is initiated in equilibrium and runs for 12 months before a seed event. The seed event is a single contagion incident—a terrorist attack communicating both template ideology and a template method. After the seed event, the simulation runs for 9 years further, for a total of 10 years, to explore terror contagion dynamics.
Each simulation is initiated by importing a “profile.” A profile consists of the initial stock and parameter values. These include the success rates and average fatality rates of template methods, factors related to the at-risk population, and the extent to which this violent ideology is, or is not, supported by non-state actors in the ungoverned space. Profiles also contain policy response options activated as switches to test policy responses against a specific violent ideology. In this paper, the profiles are generic, using average values determined from prior research across a continuum of terrorist behavior identified in both the US and WEUR [9].
The full simulation model is developed and described in the supplementary materials. The structure and key sectors are presented in Figure 5, and select structures are described below.
As a model for understanding, we leveraged existing published simulation model structures or generic structures where possible. For example, Level 2 Agents and Level 3 Network Dynamics are based on the FSB model as depicted in brown in Figure 6 and Figure 7.
This structure depicts the transition of an at-risk population among different stocks, similar to FSB, except along a continuum of radicalization rather than profession, as in the original model. The at-risk population begins at 600 people distributed between states in the baseline runs, as shown in Table 3.
In equilibrium and base, this population is replenished at a constant addition of 10 People/Month into the Undecided State. However, this rate will be modified under some contingent experiments. State transition between moderate, undecided, radicalized, and activated is governed by network dynamics, including group identity taken from FSB shown in Figure 7.
FSB structure is depicted in brown. Additional influences are specific to our radicalization research, including the influence of non-state actors.
Non-state actors casting radicalizing cultural scripts from a safe haven in ungoverned spaces can affect the at-risk population’s transitions. A switch in the profile turns on non-state actor presence and activates the simplified structure shown in Figure 8.
This structure leverages the generic structure for organic regeneration [48] to depict the long-term dynamics of grievance in an ungoverned space, as in Figure 8A. Grievance then governs an implicit adjustment structure [48] to determine non-state actor casting capacity. Casting capacity is the aggregate ability of non-state actors to create cultural scripts and broadcast and narrowcast them into the governed space through literature, videos, and digital content. These influences reach the at-risk population through Level 3 Network Dynamics.
Although the overall model is continuously integrated when an activated person conducts terror incidents in Level 1, these are stochastically resolved using random number generators (RNG) as discrete events. These RNGs check against whether the perpetrator adopted a Template Ideology or Template Method, whether they succeeded in completing the terror incident, and whether they possess the evolutionary adaptation for predatory violence (currently set at 1). The model structure for terrorist incidents, with the location of RNGs highlighted in brown, is shown in Figure 9.
We recognize this approach will be controversial. This stochastic and discrete formulation of terror incidents within a larger continuous model reflects the terror contagion hypothesis as well as our findings from our research. Although we use the viral analogy to explain terror contagion, there are important differences. The sneezes and coughs which spread a virus are so ubiquitous and homogenous that they can be modeled as continuously occurring in the environment. Successfully completed terror incidents are discrete and rare. Terrorism, especially when segmented by ideology, doesn’t occur every day, and the incidents are highly heterogenous, with widely varying completion and fatality rates based on small permutations that occur during the incident.
A continuous formulation of terror incidents suggests fractional terrorism each day and every day. A discrete formulation suggests a few successful incidents interspaced by long periods of inactivity with no completed incidents. The latter better reflects the historical record observed in Figure 3. Modeling terror incident outcomes correctly is important to the hypothesis we are exploring. The longer the period between completed high-fatality incidents, the greater the forgetting of the cultural scripts. This implies that, within a given channel of contingencies, only certain template ideology and template method combinations have a high enough fitness to sustain the contagion (see Channel experiments below.) The discrete formulation of terror incidents is also key for falsification to understand the mechanism of why some contagions fail. Level 1 Incident Dynamics is the only place where this approach is used. Terrorist incidents may be discrete events, but the radicalization and other effects resulting from them are continuous. (See Limitations below and our Supplementary Materials for further discussion on the discrete formulation).

Base Runs of the Simulation

To create the simulation base runs, we imported five profiles listed in Table 4. These profiles are generic abstractions and do not represent real-world violent ideologies. We minimized variations between the profiles to reduce misattribution. All but one of the following profile settings are held constant for each base run: an at-risk starting population of 600, an out-of-door incident success rate near the global average of 80% [9], and 10 fatalities per completed template method incident. The pathway to violence success rate, which is the chance an activated perpetrator will be stopped before “going out the door” during their planning stages, is the only one varied. We selected this because it represents a template method factor, allowing us to hold at-risk population values such as perception of near suffering, personal resonance to near suffering, normal activation, and normal abandonment constant. Additionally, the other template method factor, OTD success rate, does not vary substantially in our research of terrorism, with a global average approaching 80% [8].
We simulated 1000 permutations of each loaded profile, varying the RNG seed driving the stochastic outcome of the discrete terror incidents described above. Incidents can broadcast a template ideology, employ a template method, do both, or neither. However, contagion incidents are only counted when both template ideology and template method are present in the same incident. The numerical mean and range of contagion incidents across these 1000 permutations are listed in Table 5, along with the falsification characteristics we used to distinguish behavior modes.
All of the base runs are statistically different from one another (see Supplementary Materials for complete statistical analysis). However, because the range of Contagion Incidents can overlap, we adopted visual inspection criteria to help distinguish which behavior mode a contagion is operating in and improve falsification criteria.
In Figure 10, we see the behavior patterns within the Activated Population for reference modes EQ, F2G, S2G, CONT, and CONT+.
Visual inspection of Activated Population still does not distinguish some behavior modes, such as F2G versus EQ or certain S2G versus CONT cases. We visually inspect adoption rates in Template Ideology Figure 11 and Template Method Figure 12 as further criteria. The steeper the rate of adoption, the more severe a contagion.
CONT+ has a hockey-stick adoption rate to reach the limit of the population, while CONT and S2G both have an S-shaped growth. CONT and S2G are distinguishable by the time delay to complete the s-curve pattern. F2G shows an increasing concave behavior but never materializes into an S-Shaped pattern before the end of the simulation.

6. Experimentation

Our method of contingency experimentation begins with a base run (usually CONT) and a change of model parameters related to one of the sixteen propositions. Results are shared in two tables. Table 6 lists the contingency values and dynamic changes for propositions #1–6 related to the terror contagion dynamic, all of which operate in Level 5 of the System. Table 7 lists the contingency values of propositions #7–18 located in Levels 1–4 of the system hierarchy.
Charts of every proposition test across a range of parameter values are included in the supplementary materials.

7. Discussion

7.1. Strong, Moderate & Weak Propositions of Terror Contagions

Using the criteria described above, we classified the 16 testable propositions into Strong, Moderate, and Weak categories in Table 8. A strong proposition has a contingency range that completely eliminates a base Contagion (CONT) dynamic, taking it back to or below the Equilibrium (EQ) mode both numerically and on visual inspection. A moderate proposition can strengthen or weaken a Contagion between the modes but not eliminate it based on contingencies. A weak proposition may adjust the final number of contagion incidents but not move it out of the range of the base model.

7.2. Root Causes of Terror Contagion

Six of the eight strong propositions reside in Level 5: System of Systems and correspond with our terror contagion hypothesis elements. The remaining two, Activation Rate and Template Fatality Rates, are subsequent causes of the original six. This is because Template Ideology determines Activation and the Template Method influences the average fatalities for a completed mass-violence incident. This builds confidence that these strong propositions, when combined, are the true root causes of predatory mass violence, as the absence of any single strong proposition means no terror contagion will occur.
A surprise finding is the weak influence of the duration of the pathway to violence. This finding may result from the success rates of pathways to violence being tested separately from their duration. When success rates are held constant, the time spent on a pathway becomes immaterial between 1–24 months. We suspect that what matters most is the relation between the preparation time the template method requires and the success rates enabled by that preparation, rather than the overall time itself.
Proposition #8, using a Non-State actor in a safe haven, was a special case. Broadcasting or narrowcasting alone (#8A & #8B) were weak propositions, unable to shift contagion modes. The contagion incidents may have grown or declined but still fall within the range of the original contagion mode. However, combining broadcasting and narrowcasting strengthened a contagion base mode such as Struggle to Grow (S2G) to a higher mode such as CONT under certain contingencies. We explore this special case further in our Channel Experiment below.

7.3. Contagions Require a Combination of Template Ideology & Template Method

Our findings indicate that a template ideology and method must be present for contagion to exist. To demonstrate this, we vary the power of Template Ideology and Template Method independently and present the results in Figure 13.
Even if Template Ideology or Template Method is at 50% power in isolation, the behavior of Activated Population remains the same as Equilibrium (EQ). Only when combined do they show the contagion behavior (CONT). Why must template ideology and method be paired together for a successful contagion? We explore this in two parts below.

7.4. Why Template Ideology Requires Template Method: Fatalities & Media Reach

Template Ideology requires combination with Template Method, which relates to the number of fatalities an incident produces and how that incident is subsequently reported by the media. In Figure 14, the Template Method Average Fatalities for CONT is modified between 0–21 at increments of 1 fatality, displaying behavior modes similar to the numerical findings in Table 7 #16. When Average Template Fatalities are low (<5), the CONT Behavior Mode is knocked out of the contagion pattern to EQ. Between 5–7 fatalities, the behavior mode of CONT weakens to F2G, and 8–9 fatalities weakens to an S2G.
Between 10–12 fatalities is the threshold for CONT behavior. When average fatalities reach 13–21 a CONT+ behavior emerges. However there are diminishing marginal increases for each additional fatality in this range. This is because there are only ever a finite number of at-risk population. Once a certain threshold of fatalities is reached, the media reporting reaches the entirety of the population and marginal increases in fatality will not return similar marginal increases in contagion strength.
However, high fatality rates require a sufficient one-to-many broadcast effect to fuel contagions, as shown in Figure 15. This graph demonstrates the effective broadcast reach of media to the at-risk population, 0–100% at increments of 10%, and the baseline CONT behavior being at 100% reach. As media coverage drops to only reach a quarter of the at-risk population (25%), the CONT behavior mode weakens into a Struggle to Grow (S2G) behavior mode.
These two effects show why Template Ideology alone cannot provoke a terror contagion. The high fatalities of a Template Method vary significantly from normal criminal violence, which drives the media to conduct one-to-many reporting. That reporting must be of sufficient power to reach enough of the target at-risk audience. This may also explain why terror contagions by individuals are relatively new phenomena. In the past, without modern equipment, including destructive devices and weaponry, an individual’s ability to create sufficient fatalities was limited. Even if this did happen, the reach of the media to spread it widely enough to spark replication in an at-risk population would not occur soon enough to sustain the terror contagion.

7.5. Why Template Method Requires Template Ideology: Template Attractiveness

The requirement for Template Methods to combine with Template Ideology in order for a terror contagion to occur relates to the contingencies of Template Attractiveness. This is an aggregate measure of notoriety, self-similarity, and template cohesion components. At 0%, none of the at-risk population will find the template attractive. At 100%, the entirety of the at-risk population will find the cultural scripts attractive, even if they have not adopted a radical position. As depicted in Figure 16, the Template Attractiveness is varied between 0–1 at increments of 0.1.
In Figure 16, when Template Attractiveness is 0%, the CONT reduces to EQ. Even when incidents are committed randomly with a Template Ideology and Template Method, the at-risk population cannot recognize and discern it as applying to them. As Template Attractiveness reaches < 90%, the CONT behavior reduces to S2G. At 50%, the S2G behavior shifts to F2G. This indicates that the power of Template Attractiveness need not be at 100% to be effective. When enough of the at-risk population receives the signals and replicates the broadcasting of Template Ideology and Method, the at-risk Broadcast Memory accumulates faster than it is forgotten, as shown in Figure 17.
Broadcast memory is the collective “memory” of the at-risk population that stores cultural scripts relating to template ideology and memory. It is increased by successful media reporting of mass-violence incidents and naturally declines through forgetting over time.
Template Attractiveness also explains why Template Methods alone cannot provoke a terror contagion. The Template Ideology is the vehicle that communicates cultural scripts by providing a conspiracy narrative that resonates with the perceived grievance and moral outrage of the at-risk population who see themselves in these actions and find them to possess notorious celebrity. Templates must also be well-cohered or reified. A Template Ideology or Method that cannot be discerned from a normal criminal incident provides no path for replication. This suggests that, in terms of selecting a modus operandi, like follows like. At-risk populations do not conduct a rational all-sources search to identify the objectively optimal means to mass violence available to them. Instead, based on heuristics, they replicate what those in whom they find self-similarity and notoriety have done in the past.

7.6. Contagions Have a Low Threshold to Form

A key finding of the propositions tests is the low threshold for a terror contagion. An at-risk population of 360–3000 people, of whom at least a small fraction are mobilized by a grievance, can generate a terror contagion, even when, to begin with, the non-radicalized members of the at-risk population greatly outnumber the radicalized,. The Template Method of mass violence does not need to be sophisticated or foolproof. As long as activated perpetrators can complete their pathway to violence preparations > 40% of the time and the incidents themselves successfully complete >60% of the time, reliably producing an average of 10–12 fatalities, a CONT behavior will emerge. The global average for the successful completion of terrorist incidents once they are begun is close to 80% [9].

7.7. Channel Experiment: Resolving the Swarm vs. Fishermen Debate

An important finding of our work may help resolve the swarm vs. fishermen debate. A channel, in our terms, is a space within the terror contagion system suitable for certain types of manifestations. The presence of six strong propositions creates the channel. The remaining moderate and weak propositions determine its nature and shape.
Swarm radicalization manifests within a channel where the contingent values of these propositions are sufficiently high that no outside influence is required to generate a CONT behavior. However, when these contingent values are low, a channel exists within which a contagion could form, but local conditions are insufficient to sustain it. Non-state actors casting cultural scripts from the ungoverned space into the governed space, however, can strengthen the weaker contagion, shifting it in behavior mode from Struggle to Grow (S2G) into a Contagion (CONT). This combination of contingencies would result in the attribution of a fishermen dynamic as a cause of radicalization, rather than a channel’s byproduct. We believe this occurred in the historical debate due to a focus on Salafi-takfiri violent ideology in the US and WEUR, where at-risk populations would be smaller. In an experiment, we set contingent values to create channels to replicate these conditions in Table 9. For this experiment, we used all six strong propositions and two moderate propositions (at-risk population and presence of a non-state actor), which are the fewest number of propositions necessary to replicate the swarm and fishermen manifestations.
In both channels of Table 9, all but two of the contingent values for Propositions 1–8 are set at levels sufficient to recreate the baseline terror contagion (CONT). The contingent size of the at-risk population remains at baseline values (600 People) for the swarm channel. It is reduced by half (300 People) for the fishermen channel. We ran three simulations, one within the swarm channel and two within the fishermen channel. The results are displayed in Figure 18. The difference between the two fishermen simulations is in the value of non-state actor (NSA) casting capacity, set at 0 and 1, representing 0% cultural-script casting into the governed space from the ungoverned and 100%, respectively.
The fishermen channel demonstrates an S2G behavior mode when the at-risk population is half the baseline and there is no non-state actor support. However, when non-state-actor-cultural-script casting is added at 100%, it returns to a CONT behavior, as shown by the number of contagion incidents in Table 10.
Even though the at-risk population of the Fishermen contagions is half that of Swarm, when a non-state actor is casting at 100%, the final Contagion Incidents for both are nearly the same. Template Ideology and Template Method adoption within the at-risk population demonstrates how the contingencies of those channels shape the manifestation, as shown in Figure 19.
For the swarm channel in Figure 19, the adoption of template ideology arises organically over time and in response to successfully completed contagion incidents only. Additionally, a fishermen channel of a smaller population without non-state actor casting spreads the ideology more slowly for the fewer contagion incidents that occur. However, in the figure above, as well as Figure 20 below, the non-state actor operating in a fishermen channel accelerates adoption rates.
The accelerated adoption rates are due to the fact that the non-state actor is flooding the governed space with both broadcasting and narrowcasting cultural scripts, which accelerate both radicalization within an ideology and activation to utilize the template method to carry out contagion incidents.
We believe this demonstrates how the debate over root causes in the literature, between swarm and fishermen, could actually be a debate over manifestations within different channels. Where system contingencies are too weak to generate a contagion without non-state actor intervention, only violent ideologies supported by non-state actors operating from safe havens are sustainable. This is the manifestation most likely found when looking at smaller at-risk populations in the US and WEUR within the violent ideology of Salafi-takfiri. But when system contingencies are strong, all the ingredients necessary for contagion behavior are located in the governed space. For example, right- and left-wing extremism in the US and/or WEUR operate within large enough populations and do not require non-state actor support. Channel effects can lead to survivor bias in data collections. If data collection focuses on channels with low at-risk populations, fishermen manifestations will be more common. This can lead to a conclusion that violent terrorism is caused by non-state actors rather than a byproduct of the contingencies of a low at-risk population channel. Many violent ideologies may have been introduced into the channel with low contingent values. Still, only those supported by an outside source manifested into observable phenomena.

7.8. Proposition Strength & Policy Implications

Proposition strength aids future efforts to operationalize these findings into policies [45]. Policies incorporating strong propositions are useful for finding the means to eliminate contagions altogether. Moderate propositions should be embraced or mitigated based on how they weaken or strengthen a proposition, but will need to be combined into portfolios and supplement a strong proposition. Additionally, weak propositions, even if publicly popular, show less value in changing behavior.

8. Limitations

The limitations of our work unfold from the modeling process itself, namely, the data we used, the modeling boundaries we selected, the formulation approach to the simulation, and the nature of simulation experiments.
Simulations are limited by the data used to instantiate them. We inherit limitations found in the definition of terrorism from the GTD that extend into our data set. The GTD excludes several categories of acts that some might consider terrorism, including cyberterrorism, terrorism conducted by a criminal cartel motivated by profit, violence by the state, and violence within an existing conflict zone. Further, our data set from the GTD is limited to the US and WEUR 1995–2018. The definitional and data boundaries leave hundreds of thousands of incidents occurring in different times, geographic regions, or conflict zones out of scope.
Boundary selections in scoping the terror contagion simulation further limit our findings. Although affective violence is an important aspect of violent radicalization, we only modeled predatory mass violence. Likewise, both base runs and all experiments were limited to the initial growth of a violent ideology within an at-risk population among individuals. In reality, certain violent ideologies have intermingled with at-risk populations for decades or centuries. Also, at some point of growth, a terror contagion conceivably initiates the rise of organized violent non-state actors. This continuation of a lifecycle into more organized non-state actor violence leading to the creation of terrorism networks, insurgencies, or even emerging-state actors is outside the scope of this effort, but is studied elsewhere [49,50]. Finally, as this is an early-stage model, it will benefit from continued development, revision, and improvement.
Our selection of FSB over SIR frameworks may impact results. Additionally, although stochastic formulations for discrete activities exist in the field (see the IVEE Radicalization simulation discussed earlier) [12], we recognize that the use of this method to model terrorist incidents themselves is controversial in system dynamics. To bolster confidence that an observed result was not the outcome of a particular random seed fueling the RNG, we ran each non-equilibrium base run across 1000 permutations of different RNG seeds, taking the mean and range of the results. This allowed us to use an ANOVA one-way test to evaluate statistical difference and power on contagion incidents between the base runs [51]. We also created an additional structure in the simulation activated by a switch in the loaded profile. A continuous formulation of Level 1 terror incidents bypasses all discrete and stochastic RNGs when the switch is active. This adheres to the conventional system dynamics method and allows side-by-side comparison between results obtained between two formulation types. However, this switch requires a different type of “seed event.” Instead of a singular “seed event” described in the literature and cases, a 12-month sustained wave of repeated contagion incidents occurs. We do not believe this representation is realistic with regards to the behavior observed in the historical record, which is why the default is selected as discrete.
However, as we continue to develop the model, we plan to explore revisions and enhancements to its formulation and structure. This could include improvements in structural equations, replacing the discrete Level 1 Incidents with either fully continuous formulation or a hybrid agent-based model, or approaching proposition analysis through structural uncertainty and leveraging an exploratory modeling approach. (For more on discrete vs. continuous formulation in Level 1 Incidents, see Sections B-3 Structure Assessment and B-7 Integration Errors in Validation & Confidence Building of the Supplementary Materials).
A large caveat is that these findings are generated from synthetic experiments conducted via simulation. The simulation is an early-stage model for understanding and uses a discrete stochastic formulation for resolving terror incidents. Parts of this model used methods controversial in the field of system dynamics. Moreover, the simulation will require further development and refinement to build confidence in its results.

9. Conclusions

This paper builds confidence in the terror contagion hypothesis that violent radicalization leading to mass violence terrorism operates within a system of social contagion. Within this system, the contingent values of key root cause propositions create channels within which violent ideologies and terrorist methods emerge.
We created a simulation capable of manifesting many plausible behavior modes of terrorism, including reference modes abstracted from historical data. With this simulation, we conducted experiments on sixteen testable propositions to identify contingent values that terror contagions would emerge, strengthen, or weaken.
We showed how six of these propositions combine to form a terror contagion. As a specific kind of social contagion, a terror contagion operates by spreading through cultural scripts, communicating a Template Ideology and Template Methods to at-risk populations susceptible to being violently radicalized. Among that population, those who use the template method of mass violence create sufficient media attention to spread cultural scripts and sustain social contagion. The threshold for these contingencies is low, but the absence of any of the six propositions eliminates the contagion.
Another key finding of our experiments into the terror contagion hypothesis may help to resolve the contentious historical swarm vs. fishermen debate. We demonstrated how the contingent values of the six propositions created channels downwards into the system of radicalization favoring swarm or fishermen manifestations. For example, a channel with a small at-risk population condition is not favorable for swarm behavior, as replication is too infrequent. However, an outside actor casting cultural scripts can strengthen weak contagions into stronger ones. We suggest that the swarm versus fishermen debate may have resulted from different researchers examining manifestations in different channels, some of which favored swarm and others of which favored fishermen; without realizing how channeling effects gave rise to these manifestations, they debated swarm or fishermen as the cause, rather than the byproducts, of the system.
We also believe there may be more channels and manifestations in the system of violent radicalization than swarm or fishermen alone. Future work could explore the large number of unsuccessful or low-fatality incidents to identify if there is a third type of manifestation at work. This would build confidence in the general model through falsification, identifying the contingent values of template ideologies and methods that emerged but failed to spark terror contagions.
The simulation and the terror contagion hypothesis are in the early stages of confidence-building. We encourage other researchers to replicate or challenge our initial findings through simulation, either using the published terror contagion simulation or creating their own. These could include system dynamics simulations built on different (SIR), agent-based modeling, Markov chains, or hybrids. Such development will help to build confidence and refine the understanding of the terror contagion hypothesis.
The terror contagion hypothesis could benefit from behavioral ecology, microeconomics, and complex systems science outside of simulation approaches. What are the contingencies within which different violent ideologies might grow or decline? How are these contingencies, communicated by cultural scripts, selected for fitness, inherited, and evolved in adaptation? How does an increasing population of violently radicalized individuals emerge into recognizable non-state actor groups and proceed across a lifecycle of clandestine terror networks, insurgencies, and emerging state actors? Understanding these interactions and developing mathematical models explaining or forecasting fitness for these values is key to building further confidence in this work.
Our terror contagion hypothesis findings also provide a pathway for future research into other cultural-script, or so-called memetic, contagion phenomena. For example, future research should examine whether the terror contagion hypothesis and its propositions can inform how other forms of violence or non-violent yet toxic behaviors spread through groups or society via cultural scripts.
Finally, our results serve as a basis upon which to operationalize findings into policy analysis and recommendations. This begins an iterative approach to model refinement, confidence building, replication, calibration, and ultimately pilot programs to apply these concepts in practice. We hope these findings encourage other researchers to contribute to this effort.

Supplementary Materials

The following are available online at https://www.mdpi.com/article/10.3390/systems9040090/s1. Supplementary Materials contains full model documentation including model structure diagrams, parameter description, parameterization specifics, and full runs for all analysis referenced in the article.

Author Contributions

Conceptualization, T.C.; methodology, T.C.; investigation, T.C.; writing—original draft preparation, T.C.; writing—review and editing, B.A., O.P. & K.S.; supervision, K.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

The authors would like to acknowledge the Rogues Den, a group of veterans working to invest themselves in their community to continue service after the military, for their support and encouragement of this effort.

Conflicts of Interest

Timothy Clancy is the founder of a consulting firm that has, and may in the future, receive funds from government agencies on topics related to those covered in this research. However, no government agency had a role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and/or in the decision to publish the results.

References

  1. Larkin, R.W. The Columbine Legacy: Rampage Shootings as Political Acts. Am. Behav. Sci. 2009, 52, 1309–1326. [Google Scholar] [CrossRef] [Green Version]
  2. Langman, P. Different Types of Role Model Influence and Fame Seeking Among Mass Killers and Copycat Offenders. Am. Behav. Sci. 2018, 62, 210–228. [Google Scholar] [CrossRef] [Green Version]
  3. Macklin, G.; Bjorgo, T. Breivik’s Long Shadow? The Impact of the July 22, 2011 Attacks on the Modus Operandi of Extreme-Right Lone Actor Terrorists. Perspect. Terror. 2021, 15, 14–36. [Google Scholar]
  4. Alfano, M.; Carter, J.A.; Cheong, M. Technological Seduction and Self-Radicalization. J. Am. Philos. Assoc. 2018, 4, 298–322. [Google Scholar] [CrossRef] [Green Version]
  5. Dearden, L. Darren Osborne: How Finsbury Park Terror Attacker Became ‘Obsessed’ with Muslims in Less Than a Month. Independent. 2 February 2018. Available online: https://www.independent.co.uk/news/uk/crime/darren-osborne-finsbury-park-attack-who-is-tommy-robinson-muslim-internet-britain-first-a8190316.html (accessed on 17 February 2019).
  6. Miller, V.; Hayward, K.J. ‘I Did My Bit’: Terrorism, Tarde and the Vehicle Ramming Attack as an Imitative Event. Br. J. Criminol. 2019, 59, 1–23. [Google Scholar] [CrossRef]
  7. Sciolino, E.; Schmitt, E. A Not Very Private Feud over Terrorism. New York Times 8 June 2008. Available online: http://www.nytimes.com/2008/06/08/weekinreview/08sciolino.html?sq=bruce%20hoffman&st=cse&scp=4&pagewanted=all (accessed on 1 October 2021).
  8. Global Terrorism Database [Full GTD Dataset]. National Consortium for the Study of Terrorism and Responses to Terrorism (START) (2016). 2018. Available online: http://www.start.umd.edu/gtd/ (accessed on 23 March 2018).
  9. Clancy, T.; Pavlov, O.; Addison, B.; Saeed, K. Profiles of Violent Radicalization: Challenging Key Premises on Root Causes Leading to Terrorism. Work. Draft 2021. [Google Scholar] [CrossRef]
  10. Clancy, T.; Addison, B.; Pavlov, O.; Saeed, K. Root Causes of Violent Radicalization: The Terror Contagion Hypothesis. Work. Draft 2021. [Google Scholar] [CrossRef]
  11. Hunter, L.Y.; Ginn, M.H.; Storyllewellyn, S.; Rutland, J. Are mass shootings acts of terror? Applying key criteria in definitions of terrorism to mass shootings in the United States from 1982 to 2018. Behav. Sci. Terror. Political Aggress. 2021, 13, 265–294. [Google Scholar] [CrossRef]
  12. Pepys, R.; Bowles, R.; Bouhana, N. A Simulation Model of the Radicalisation Process Based on the IVEE Theoretical Framework. J. Artif. Soc. Soc. Simul. 2020, 23, 12. [Google Scholar] [CrossRef]
  13. Meloy, J.R. Assessing the Risk of Lone-Actor Terrorism; Behavioral Intervention Team Leadership Council: Lake Arrowhead, CA, USA, 2016. [Google Scholar]
  14. Meloy, J.R. The Operational Development and Empirical Testing of the Terrorist Radicalization Assessment Protocol (TRAP–18). J. Personal. Assess. 2018, 100, 483–492. [Google Scholar] [CrossRef] [PubMed]
  15. Hoffman, B. Inside Terrorism, Rev. and Expanded ed.; Columbia University Press: New York, NY, USA, 2006. [Google Scholar]
  16. Hoffman, B. Inside Terrorism, 3rd ed.; Columbia University Press: New York, NY, USA, 2017. [Google Scholar]
  17. Sageman, M. Leaderless Jihad: Terror Networks in the Twenty-First Century; University of Pennsylvania Press: Philadelphia, PA, USA, 2008. [Google Scholar]
  18. Baaken, T.; Schlegel, L. Fishermen or Swarm Dynamics? Should we Understand Jihadist Online-Radicalization as a Top-Down or Bottom-Up Process? J. Deradicalization 2017, 13, 178–212. [Google Scholar]
  19. Picarelli, J.T. The Future of Terrorism. Natl. Inst. Justice 2009, 264, 26–30. [Google Scholar]
  20. Borum, R. Radicalization into Violent Extremism I: A Review of Social Science Theories. J. Strateg. Secur. 2011, 4, 7–36. [Google Scholar] [CrossRef] [Green Version]
  21. Hafez, M.; Mullins, C. The Radicalization Puzzle: A Theoretical Synthesis of Empirical Approaches to Homegrown Extremism. Stud. Confl. Terror. 2015, 38, 958–975. [Google Scholar] [CrossRef]
  22. Jordan, J. The Evolution of the Structure of Jihadist Terrorism in Western Europe: The Case of Spain. Stud. Confl. Terror. 2014, 37, 654–673. [Google Scholar] [CrossRef]
  23. Hoffman, B. A First Draft of the History of America’s Ongoing Wars on Terrorism. Stud. Confl. Terror. 2015, 38, 75–83. [Google Scholar] [CrossRef]
  24. McCauley, C. Misunderstanding Terrorism. Dyn. Asymmetr. Confl. 2017, 10, 74–77. [Google Scholar] [CrossRef]
  25. Goddard, C.; Wierzbicka, A. Cultural scripts: What are they and what are they good for? Intercult. Pragmat. 2004, 1, 153–166. [Google Scholar] [CrossRef]
  26. Phillips, D. The Influence of Suggestion on Suicide: Substantive and Theoretical Implications of the Werther Effect. Am. Sociol. Rev. 1974, 39, 340–354. [Google Scholar] [CrossRef] [PubMed]
  27. Schmidtke, A.; Hafner, H. The werther effect after television films: New evidence of an old hypothesis. Psychol. Med. 1988, 18, 665–676. [Google Scholar] [CrossRef]
  28. Schmidtke, A.; Schaller, S.; Muller, I. Imation of Amok & Amok Suicide. Crisis Mag. 2002, 10, 49–60. [Google Scholar]
  29. Towers, S.; Gomez-Lievano, A.; Khan, M.; Mubayi, A.; Castillo-Chavez, C. Contagion in Mass Killings and School Shootings. PLoS ONE 2015, 10, e0117259. [Google Scholar] [CrossRef] [Green Version]
  30. Meloy, J.R.; Mohandie, K.; Knoll, J.L.; Hoffmann, J. The Concept of Identification in Threat Assessment: Identification in Threat Assessment. Behav. Sci. Law 2015, 33, 213–237. [Google Scholar] [CrossRef]
  31. Mesoudi, A. The Cultural Dynamics of Copycat Suicide. PLoS ONE 2009, 4, e7252. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  32. McElreath, R.; Boyd, R.; Richerson, P.J. Shared Norms and the Evolution of Ethnic Markers. Curr. Anthropol. 2013, 44, 122–130. [Google Scholar] [CrossRef] [Green Version]
  33. Henrich, J.; McElreath, R. Dual-Inheritance Theory: The Evolution of Human Cultural Capacities and Cultural Evolution; Oxford University Press: Oxford, UK, 2007. [Google Scholar] [CrossRef]
  34. Domaradzki, J. The Werther Effect, the Papageno Effect or No Effect? A Literature Review. Int. J. Environ. Res. Public Health 2021, 18, 2396. [Google Scholar] [CrossRef]
  35. Sterman, J. Business Dynamics: Systems Thinking and Modeling for a Complex World; Irwin/McGraw-Hill: Boston, MA, USA, 2000. [Google Scholar]
  36. Centola, D. How Behavior Spreads: The Science of Complex Contagions; Princeton University Press: Princeton, NJ, USA, 2018. [Google Scholar]
  37. Pruyt, E.; Kwakkel, J.H. Radicalization under deep uncertainty: A multi-model exploration of activism, extremism, and terrorism: Radicalization under Deep Uncertainty. Syst. Dyn. Rev. 2014, 30, 1–28. [Google Scholar] [CrossRef]
  38. Auping, W.L.; Pruyt, E.; de Jong, S.; Kwakkel, J.H. The geopolitical impact of the shale revolution: Exploring consequences on energy prices and rentier states. Energy Policy 2016, 98, 390–399. [Google Scholar] [CrossRef] [Green Version]
  39. Saeed, K.; Pavlov, O.V.; Skorinko, S.; Alexander, J. Farmers, bandits and soldiers: A generic system for addressing peace agendas. Syst. Dyn. Rev. 2013, 29, 237–252. [Google Scholar] [CrossRef]
  40. Zacharias, G.L.; MacMillian, J.; van Hemel, S.B. Behavioral Modeling and Simulation: From Individuals to Societies; National Academies Press: Washington, DC, USA, 2008. [Google Scholar] [CrossRef]
  41. Hilson, R.; Young, W.; Smith, J.R. Requirements for a Government Owned DIME/PMESII Model Suite; Office of the Secretary of Defense Modeling & Simulation Steering Committee: Washington, DC, USA, 2009. [Google Scholar]
  42. Meadows, D.H.; Robinson, J.M. The Electronic Oracle: Computer Models and Social Decisions; Wiley: New York, NY, USA; Chichester, UK, 1985. [Google Scholar]
  43. Richardson, G.P. Reflections on the foundations of system dynamics. Syst. Dyn. Rev. 2011, 27, 219–243. [Google Scholar] [CrossRef]
  44. Richardson, G. Confidence in Exploratory Models; System Dynamics Society Winter Camp: Albuquerque, NM, USA, 2017. [Google Scholar]
  45. Acharya, S.R.; Saeed, K. An attempt to operationalize the recommendations of the ‘limits to growth’ study to sustain the future of mankind. Syst. Dyn. Rev. 1996, 12, 281–304. [Google Scholar] [CrossRef]
  46. Ellis, G.F.R. Top-down causation and emergence: Some comments on mechanisms. Interface Focus 2012, 2, 126–140. [Google Scholar] [CrossRef] [PubMed]
  47. Saeed, K. Defining a Problem or Constructing a Reference Mode. May 1988. Available online: https://www.researchgate.net/publication/228723910_Defining_a_Problem_or_Constructing_a_Reference_Mode (accessed on 23 August 2019).
  48. Saeed, K. ‘Modeling & Experimental Analysis of Complex Problems Lecture 2: Generic Decision Rules’ (SD551); WPI Class Lecture.
  49. Clancy, T. Theory of an Emerging-State Actor: The Islamic State of Iraq and Syria (ISIS) Case. Systems 2018, 6, 16. [Google Scholar] [CrossRef] [Green Version]
  50. Clancy, T. Application of Emerging-State Actor Theory: Analysis of Intervention and Containment Policies. Systems 2018, 6, 17. [Google Scholar] [CrossRef] [Green Version]
  51. Weisburd, D.; Britt, C.; Wilson, D.B.; Wooditch, A. Comparing Means among More Than Two Samples to Test Hypotheses about Populations: Analysis of Variance. In Basic Statistics in Criminology and Criminal Justice; Springer International Publishing: Cham, Switzerland, 2020; pp. 373–423. [Google Scholar] [CrossRef]
Figure 1. System structure of violent radicalization. (A) Governed Space Growth of Radicalization(Swarm). (B) Ungoverned Space Growth & Declin of Radicalization(Fishermen). (C) Conective links between Governed & Ungoverend spaces.
Figure 1. System structure of violent radicalization. (A) Governed Space Growth of Radicalization(Swarm). (B) Ungoverned Space Growth & Declin of Radicalization(Fishermen). (C) Conective links between Governed & Ungoverend spaces.
Systems 09 00090 g001
Figure 2. Dynamic hypothesis of the growth of a terror contagion. (AG) root cause propositions.)
Figure 2. Dynamic hypothesis of the growth of a terror contagion. (AG) root cause propositions.)
Systems 09 00090 g002
Figure 3. Growth reference modes for (A) Takfiri WEUR, (B) Crimes & Hate Crimes Both Regions, (C) Left-Wing Incidents WEUR, (D) Separatists WEUR, (E) Unknown Both Regions, (F) Right-Wing WEUR, (G) Takfiri US, (H) Right-Wing US, (I) Anti-Government US. Note that Y-axis scales are varied for clarity.
Figure 3. Growth reference modes for (A) Takfiri WEUR, (B) Crimes & Hate Crimes Both Regions, (C) Left-Wing Incidents WEUR, (D) Separatists WEUR, (E) Unknown Both Regions, (F) Right-Wing WEUR, (G) Takfiri US, (H) Right-Wing US, (I) Anti-Government US. Note that Y-axis scales are varied for clarity.
Systems 09 00090 g003
Figure 4. Terror contagion reference modes of growth.
Figure 4. Terror contagion reference modes of growth.
Systems 09 00090 g004
Figure 5. Terror contagion simulation structure and key sectors.
Figure 5. Terror contagion simulation structure and key sectors.
Systems 09 00090 g005
Figure 6. A simplified view of radicalization lifecycle structure in level 2 of the simulation.
Figure 6. A simplified view of radicalization lifecycle structure in level 2 of the simulation.
Systems 09 00090 g006
Figure 7. Simplified view of network dynamics structure in level 3 of the simulation.
Figure 7. Simplified view of network dynamics structure in level 3 of the simulation.
Systems 09 00090 g007
Figure 8. A simplified view of grievance & casting capacity structures in level 4 of the simulation. (A) organic regeneration structrue representing long-term grievance in the ungoverned space. (B) implicit adjustment structrue that determines level of castinc capability of non-state actors with adjustment mechanism driven by (A).
Figure 8. A simplified view of grievance & casting capacity structures in level 4 of the simulation. (A) organic regeneration structrue representing long-term grievance in the ungoverned space. (B) implicit adjustment structrue that determines level of castinc capability of non-state actors with adjustment mechanism driven by (A).
Systems 09 00090 g008
Figure 9. Simplified view of discrete formulation of incident dynamics, RNG’s highlighted.
Figure 9. Simplified view of discrete formulation of incident dynamics, RNG’s highlighted.
Systems 09 00090 g009
Figure 10. Activated population over base runs.
Figure 10. Activated population over base runs.
Systems 09 00090 g010
Figure 11. Adoption of template ideology across base runs.
Figure 11. Adoption of template ideology across base runs.
Systems 09 00090 g011
Figure 12. Adoption of template method across base runs.
Figure 12. Adoption of template method across base runs.
Systems 09 00090 g012
Figure 13. Template ideology & template method contingency results on an activated population.
Figure 13. Template ideology & template method contingency results on an activated population.
Systems 09 00090 g013
Figure 14. Variation of fatality rates on CONT run.
Figure 14. Variation of fatality rates on CONT run.
Systems 09 00090 g014
Figure 15. Sensitivity of media broadcast power on CONT run.
Figure 15. Sensitivity of media broadcast power on CONT run.
Systems 09 00090 g015
Figure 16. Template attractiveness power varied.
Figure 16. Template attractiveness power varied.
Systems 09 00090 g016
Figure 17. At-risk population broadcast memory on CONT run as template attractiveness varies 0–100%.
Figure 17. At-risk population broadcast memory on CONT run as template attractiveness varies 0–100%.
Systems 09 00090 g017
Figure 18. Channeling effect swarm (CONT) vs. fishermen contingencies (S2G shifting to CONT).
Figure 18. Channeling effect swarm (CONT) vs. fishermen contingencies (S2G shifting to CONT).
Systems 09 00090 g018
Figure 19. Radicals adopting template ideology by channel swarm vs. fishermen.
Figure 19. Radicals adopting template ideology by channel swarm vs. fishermen.
Systems 09 00090 g019
Figure 20. Activated adopting template method by channel swarm vs. fishermen.
Figure 20. Activated adopting template method by channel swarm vs. fishermen.
Systems 09 00090 g020
Table 1. Table of Propositions.
Table 1. Table of Propositions.
IDPartial CauseTestable Proposition
1Template Attractiveness for Social ContagionTemplate ideology and method behind terror contagion must be well-cohered, and convey self-similarity and notoriety biases to the at-risk population.
2Perceived Grievance & moral OutrageAn exploitable grievance exists within or is perceived by the at-risk population.
3Template IdeologyCultural scripts must sufficiently convey a conspiracy narrative to an at-risk population.
4Template MethodCultural scripts must sufficiently convey the modus operandi of both a pathway to violence and the conducting of the incident.
5Biological Adaptation to Predatory Mass ViolenceEnough of the at-risk population possess the evolutionary adapted trait to predatory violence suited for generating mass violence.
6Media ReachSufficient mass-media or algorithmic social media conveys cultural scripts to at-risk populations through a one-to-many broadcast effect after an incident.
7at-risk PopulationThe at-risk population is sufficiently large enough to support the terror contagion.
8Non-State Actor in the Ungoverned SpaceSufficient violent non-state actors exploit the ungoverned safe haven space to send broadcast and narrowcast cultural scripts of the template ideology & method into governed space
9Moderating AlternativesThere aren’t enough viable alternatives for addressing the grievance within the networks of the at-risk population to dampen radicalization.
10Abandonment RateAbandonment pressure isn’t high enough within the networks of the at-risk population to dampen radicalization.
11Activation RateWithin the at-risk population, there must be sufficient activation from radicalized to activated in those who seek to begin the pathway to violence.
12The ratio of radicalized to non-radicalized in an at-risk population.The ratio between radicalized and-non-radicalized groups of at-risk populations must be sufficient to enable radicalizing effects.
13Time to Complete Pathway to ViolenceThe time delay between activation and incident initiation must be long enough to enable sufficient incident success rates, but not so long as to cause forgetting within the at-risk population.
14Template Method Pathway to Violence Success RateTemplate Method preparation activities must enable sufficient incidents to be initiated without being thwarted.
15Template Method OTD Success RatesTemplate Method must enable sufficient initiated incidents to be completed without being stopped.
16Template Fatality RatesTemplate Method must generate enough fatalities as a result of completed incidents to attract media attention.
Table 2. List of reference modes.
Table 2. List of reference modes.
Reference ModeAbbreviationDescription
EquilibriumEQNo terrorist violence can be distinguished from normal criminal violence before a seed event.
Failure to GrowF2GAfter a seed event, a terror contagion is difficult to distinguish from equilibrium.
Struggle to GrowS2GLimited growth from a seed event.
ContagionCONTNoticeable growth after a seed event.
Strong ContagionCONT+Strong growth and decline after a seed event.
Hoped The desired policy outcome is where violence finds a new equilibrium at below-EQ levels.
Feared The undesired policy outcome is where terrorist violence finds a new equilibrium at a higher level.
Table 3. Starting State Levels & Descriptions within an At-Risk Population.
Table 3. Starting State Levels & Descriptions within an At-Risk Population.
State LevelPeople in State at StartState Description
Moderate200Those who have adopted more moderate reactions to the perceived grievance and moral outrage.
Undecided200Those who have not responded to the perceived grievance and moral outrage. This state receives all new additions.
Radicalized100Those who have adopted a conspiracy narrative perspective on the perceived grievance and moral outrage.
Activated100Radicals who have begun the pathway to violence: planning, preparation, and intent to commit violent actions.
Table 4. Base Run Settings.
Table 4. Base Run Settings.
Template Method FactorsAt Risk Population Conditions
RUN NamePathway to Violence
Success Rate
Out the Door (OTD) Success RatePerception of Near SufferingPersonal Resonance to Near SufferingNormal ActivationNormal
Abandonment
Equilibrium (EQ)10.80.050.00.10.0
Failure to Grow (F2G)0.10.80.050.00.10.0
Struggle to Grow (S2G)0.20.80.050.00.10.0
Contagion (CONT)0.50.80.050.00.10.0
Strong Contagion (CONT+)10.80.050.00.10.0
Table 5. Numerical Values of Base Runs at the end of Simulation after 1000 permutations.
Table 5. Numerical Values of Base Runs at the end of Simulation after 1000 permutations.
Run NameFalsifiable CharacteristicsValue at DT 120AttemptsFailsContagionP-Value of Difference between Runs Based on Contagion Incidents
(1) EQInitial values = ending values in Activated. No Ideology or Method adoption. Mean1181170NA
Min/MaxNANANA
(2) F2GZero to few Contagion Incidents. Limited adoption of Ideology or Method.Mean119.390.53.2p < 0.001 vs. #3, #4, & #5.
Min/Max119–12554–118.10–32
(3) S2GZero to many Contagion Incidents. S-shaped adoption emerges in Ideology & Template adoption. Mean245.4146.227.7p < 0.001 vs. #2, #4, & #5.
Min/Max238–271100.8–235.60–105
(4) CONTMany contagion events and clear cresting wave behavior in Activated. Ideology & Method clearly display S-shaped growth.Mean726.4318.3259.8p < 0.001 vs. #2, #3, & #5.
Min/Max620–756246.6–405.957–372
(5) CONT+ Activated reaches sharp peak and decline while Template Ideology & Template Method display hockey-stick growth.Mean1540.2591.62704.8p < 0.001 vs. #2, #3, & #4.
Min/Max1491–1544511–770.7469–806
Table 6. Contingency analysis of propositions #1–#6.
Table 6. Contingency analysis of propositions #1–#6.
Prop #Parameter TestedBaseline TestedBaseline ValueBehavior Mode-->Below EQEQF2GS2GCONTCONT+Range Tested & Notes
NANA Range Across 100k Permutations--> 00–320–10557–372469–806CONT = Contagion
1Template Attractiveness for Social ContagionCONT100%Range 00–130–72216–234 0–100% @ 10% Increments
Result 0%0–50%50–90%90–100%
2Near SufferingCONT5%Range 0NA22113–277 0–10% @ 1% Increments. Diminishing returns for Near Suffering > 10% and even 100% stays in CONT range.
Result 0%NA1%2%+
3Template MethodCONT100%Range 0010–45175–247 0–100% in 10% increments. As long as Template Ideology > 0%.
Result 0%10–20%20–40%40–100%
4Template IdeologyCONT100%Range 00–680–107159–234 0–100% in 10% increments. As long as Template Method > 0%.
Result 0%10–30%30–50%50–100%
5Biological Adaptation to Predatory Mass ViolenceCONT100%Range 01–620–85201–234 0–100% @ 10% increments.
Result 0%10–20%30–70%80–100%
6Media Power Experimental ValueCONT100%Range 03061–101130–400404–4200–10% in 1% increments, 10–100% in 10% increments. 100% reverts back down to CONT behavior mode.
Result 0%1%2–7%8–40% & 100%40–90%
Table 7. Contingency analysis of propositions #7–#16.
Table 7. Contingency analysis of propositions #7–#16.
Prop #Parameter TestedBaseline TestedBaseline ValueBehavior Mode-->Below EQEQF2GS2GCONTCONT+Range Tested & Notes
NANA Range Across 100k Permutations--> 00–320–10557–372469–806CONT = Contagion
7Multiplier for PopulationCONTx1 (600 People)Range 0–137–72153–15812080–4364×0.1 to ×10 (60–60,000 at-risk Population) in increments of 0.1. Behavior modes are determined by falsification criteria, not incident ranges, as increased populations naturally move values out of baseline ranges.
Result 60–120120–360360–30003000–30,000
8ASafe Haven Casting Capacity (Broadcast)CONT0%Range 234–452 Broadcast casting Power 0–100% @ 10% increments. CONT begins to shift to CONT+ at 30%+, but adoption rates remain S-curve and do not change to hockey-stick of CONT+
Result 0–100%
8BSafe Haven Casting Capacity (Narrowcast)CONT0%Range 234–424 Narrowcast casting power 0–100% @ 10%. CONT begins to shift to CONT+ at 30%+, but adoption rates remain S-curve and do not change to hockey-stick of CONT+
Result 0–100%
8CSafe Haven Casting Capacity (Both)CONT0%Range 234–443446–492Broadcast & Narrowcast factors 0–100% @ 10% increments. Clear transition from CONT to CONT+ at 30%+ Power in both contagion incident counts and adoption rate behavior shapes.
Result 0–30%30–100%
8DSafe Haven Casting Capacity (Both)S2G0%Range 37–114141–190 Broadcast & Narrowcast factors 0–100% @ 10% increments. S2G mode escalates to CONT at combined power of 20%+.
Result 0–20%20–100%
9Moderating AlternativesCONT5%Range 102–257 0–100% in increments of 10%. As moderating alternatives increase, contagion severity declines within the range of that contagion. Still, it does not shift behavior to a new contagion shape.
Result 0%1%2–7%8–40% & 100%40–90%
10Abandonment RateCONT0%Range0 797234 0–30% in increments of 5%. 15%+ Abandonment creates a sub-EQ result with increased growth in Undecided and Moderates.
Result15–30% 10%0–5%0%
11Activation RateCONT10%Range0 2875123–328 0–10% in increments of 1%, 10–100% in increments of 10%. CONT emerges 5–10%, 20–100% show initial bumps then CONT. Victim rates increase until 30% Activation, at which point they decline slightly. This is because too high an Activation drains the Radicals too fast, negatively impacting network effects, though this effect is minor.
Result0% 0–1%1–2%3–100%
12Ratio Multiplier of Non-radicalized to RadicalizedCONT1 (2:1)Range 052.4–71.452–364 ×0.1–×2.0 @ increments of 0.1.
Result ×1.4, 1.5, 1.7–2.0×0.1–0.2×0.2–1.4
13Pathway to Violence TimeCONT10Range 48–421 1–24 Months @ 1 month Increments. Given a fixed population with fixed replacement, and all else being equal, altering time for the pathway to violence alters the draining rate at which the population will be converted to Activated. This moves Activated peak and decline left and right and adjusts incident rates, but all within the CONT behavior.
Result 1–24
14Template Method Pathway to Violence Success RateCONT50%Range 0137–72161–383472–6950–100% @ increments of 10%.
Result 0%0–10%10–40%40–70%70–100%
15Template Method OTD Success RatesCONT80%Range 0029–95212–336 0–100% in Increments of 10%.
Result 0%1%2–7%8–40% & 100%40–90%
16Template Method Fatality RatesCONT10Range 000–48234–377392–4770–21 Fatalities @ increments of 1 Fatality
Result 0–55–78–910–1213–21
Table 8. Proposition Influences on Contagion based on Contingency Values.
Table 8. Proposition Influences on Contagion based on Contingency Values.
Strong Propositions: Can eliminate Contagions.Moderate Propositions: Can Strengthen/Weaken Contagions.Weak Propositions: Cannot Change Base Behavior Mode of Contagion.
IDPropositionsIDPropositionsIDPropositions
1Template Attractiveness for Social Contagion7Size of At-Risk Population 8ANon-State Actors using Safe Havens to only Broadcast (CONT)
2Perceived Grievance & Moral Outrage8CNon-State Actors using Safe Havens to both Broadcast & Narrow Cultural Scripts (CONT)8BNon-State Actors using Safe Havens to only Narrow Cultural Scripts (S2G)
3Template Method8DNon-State Actors using Safe Havens to both Broadcast & Narrow Cultural Scripts (S2G)9Moderating Alternatives
4Template Ideology10Abandonment Rate16Template Fatality Rates
5Biological Adaptation to Predatory Mass Violence11Activation Rate
6Media Reach12The Ratio of Radicalized to Non-Radicalized in an At-Risk Population.
11Activation Rate13Time to Complete Pathway to Violence
16Template Fatality Rates14Template Method Pathway to Violence Success Rate
15Template Method OTD Success Rates
Table 9. Contingency Values for Swarm vs. Fishermen Channels.
Table 9. Contingency Values for Swarm vs. Fishermen Channels.
Prop IDPropositionContingencies to Create Swarm ChannelContingencies to Create Fishermen Channel
1Template Attractiveness for Social Contagion100%100%
2Perceived Grievance & Moral Outrage 5%5%
3Template Ideology100%100%
4Template Method100%100%
5Biological Adaptation to Predatory Mass Violence100%100%
6Media Reach100%100%
7At-Risk Population600 People300 People
8Non-State Actor Casting Capacity00 & 1
Table 10. Numerical values of channel behaviors at simulation end.
Table 10. Numerical values of channel behaviors at simulation end.
RunTotal Attempted IncidentsFailed
Incidents
Total Contagion
Incidents
Swarm Channel Contagion719342.4234
Fishermen Channel Contagion without Non-State Actor Casting318186.660
Fishermen Channel Contagion with Non-State Actor Casting @ 100%360113.7224
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Clancy, T.; Addison, B.; Pavlov, O.; Saeed, K. Contingencies of Violent Radicalization: The Terror Contagion Simulation. Systems 2021, 9, 90. https://doi.org/10.3390/systems9040090

AMA Style

Clancy T, Addison B, Pavlov O, Saeed K. Contingencies of Violent Radicalization: The Terror Contagion Simulation. Systems. 2021; 9(4):90. https://doi.org/10.3390/systems9040090

Chicago/Turabian Style

Clancy, Timothy, Bland Addison, Oleg Pavlov, and Khalid Saeed. 2021. "Contingencies of Violent Radicalization: The Terror Contagion Simulation" Systems 9, no. 4: 90. https://doi.org/10.3390/systems9040090

APA Style

Clancy, T., Addison, B., Pavlov, O., & Saeed, K. (2021). Contingencies of Violent Radicalization: The Terror Contagion Simulation. Systems, 9(4), 90. https://doi.org/10.3390/systems9040090

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop