Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (8)

Search Parameters:
Keywords = terrorist recruitment

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 573 KiB  
Systematic Review
Recruitment, Affiliation, and Disengagement Among Men in Terrorist Organizations: A Systematic Review
by Licínio Zacarias Zitha, Marina Leonor Pinheiro, Rui Abrunhosa Gonçalves and Sónia Caridade
Soc. Sci. 2024, 13(11), 609; https://doi.org/10.3390/socsci13110609 - 7 Nov 2024
Viewed by 3824
Abstract
Recruitment, affiliation, and disengagement in the context of terrorist groups remain underexplored in a comprehensive, integrated manner. This systematic review is a pioneering effort to address this gap by synthesizing existing knowledge, aiming to analyze the entire trajectory of individuals within terrorist organizations—from [...] Read more.
Recruitment, affiliation, and disengagement in the context of terrorist groups remain underexplored in a comprehensive, integrated manner. This systematic review is a pioneering effort to address this gap by synthesizing existing knowledge, aiming to analyze the entire trajectory of individuals within terrorist organizations—from recruitment to disengagement—thereby providing a foundation for guiding future research. Conducted through meticulous searches across three major databases—Academic Search Complete, SCOPUS, and the Web of Science Collection—our review followed a pre-registered protocol, ultimately identifying seven studies that met the inclusion criteria. These studies encompass qualitative, quantitative, and mixed-methods research published in peer-reviewed journals, and are accessible in English, Spanish, or Portuguese. Our analysis reveals the critical influence of push and pull factors across these phases, emphasizing that retention is predominantly shaped by individual roles within terrorist organizations and the impact of governmental amnesty policies. Diverging from existing segmented approaches, our findings highlight the importance of examining recruitment, retention, and disengagement as a continuous process to achieve a more comprehensive understanding of terrorist involvement. The insights derived from this study offer valuable guidance for counterterrorism strategies, suggesting interventions targeting recruitment, retention, and recidivism by addressing these crucial factors throughout the entire lifecycle of involvement in terrorist organizations. Full article
(This article belongs to the Section Crime and Justice)
Show Figures

Figure 1

13 pages, 614 KiB  
Study Protocol
July 14th 2016 Nice Terrorist Attack Court Trial: A Protocol on Sleep Quality and Somatic Symptoms as Markers of Risk for Traumatic Reactivation in Adolescents Exposed to This Attack
by Radia Zeghari, Morgane Gindt, Jokthan Guivarch, Philippe Auby, Philippe Robert, Julie Rolling, Carmen Schröder, Petri Valo, Florence Askenazy and Arnaud Fernandez
Healthcare 2023, 11(22), 2953; https://doi.org/10.3390/healthcare11222953 - 12 Nov 2023
Cited by 2 | Viewed by 1770
Abstract
The court trial of the 14th of July 2016 terrorist attack in Nice (France) opened in September 2022 and ended in December 2022. Engaging in court proceedings, whether as a victim or a witness, can lead to a significant risk of traumatic reactivation [...] Read more.
The court trial of the 14th of July 2016 terrorist attack in Nice (France) opened in September 2022 and ended in December 2022. Engaging in court proceedings, whether as a victim or a witness, can lead to a significant risk of traumatic reactivation (i.e., the re-emergence of post-traumatic stress symptoms). The present protocol aimed to improve knowledge of the pathophysiology of traumatic reactivation due to the media coverage of the trial by assessing sleep disturbances and somatic symptoms that could reappear if there is a traumatic reactivation. Method and Analysis: This is a monocentric longitudinal study, with recruitment solely planned at the Nice Pediatric Psychotrauma Center (NPPC). We intended to include 100 adolescents aged 12 to 17 years who were directly or indirectly exposed to the attack and included in the “14-7” program). Assessments began one month before the trial, in August 2022, and were scheduled once a month until the end of the trial. A smartwatch recorded sleep activity. Somatic and PTSD symptoms and sleep were assessed through validated questionnaires. The main analyses comprised the variance and regression analyses of predictors of clinical evolution over time. Ethics and Dissemination: The National Ethics Committee “NORD OUEST III” approved the “14-7” program protocol (number 2017-A02212-51). The specific amendment for this research was approved in April 2022 by the same national ethical committee. Inclusions started in August 2022. Full article
(This article belongs to the Special Issue Innovative Treatments for Post-traumatic Stress Disorder (PTSD))
Show Figures

Figure 1

12 pages, 263 KiB  
Article
Cyberterrorism and Religious Fundamentalism: New Challenges for Europe in the Age of Universal Internet Access
by Silvia Baldassarre
Religions 2023, 14(4), 458; https://doi.org/10.3390/rel14040458 - 29 Mar 2023
Cited by 1 | Viewed by 3196
Abstract
Digital technology is now a fundamental and indispensable component of daily life. While the great opportunities offered by cyberspace are undoubted, the growing security challenges and threats it brings should not be overlooked. Cyberspace, by its nature transnational and elusive regarding forms of [...] Read more.
Digital technology is now a fundamental and indispensable component of daily life. While the great opportunities offered by cyberspace are undoubted, the growing security challenges and threats it brings should not be overlooked. Cyberspace, by its nature transnational and elusive regarding forms of control, is useful to terrorism because it allows not only the propaganda of fundamentalist doctrines but also the creation and manipulation of information; the apology and dissemination of information instrumental to the processes of radicalisation; the use of devices capable of transversally violating the security of technical and virtual infrastructures that are critical to the security of nations; the operational planning of terrorist activities; and the recruitment, financing, and training of recruits. The so-called “new terrorism”, religiously motivated, makes extensive use of the digital tool. After an excursus concerning the use of cyberspace by religious fundamentalist groups and the transformation of religiously motivated terrorism, this paper focuses on the analysis of the European legal response and on the need for global and shared European action. Full article
(This article belongs to the Special Issue Law and Religion in Europe in an Age of Fear and Insecurity)
13 pages, 285 KiB  
Article
Principled Pluralism and the Prevention of Religious Terrorism in Indonesia
by Benyamin Fleming Intan and Calvin Bangun
Religions 2022, 13(5), 429; https://doi.org/10.3390/rel13050429 - 9 May 2022
Cited by 4 | Viewed by 5615
Abstract
A number of religious terrorism acts closely related to the 9/11 event had happened in Indonesia and disrupted the nation’s stability and harmony. The hard-power approach that the Indonesian government had hitherto employed to curb terrorism had not succeeded in eradicating religious terrorist [...] Read more.
A number of religious terrorism acts closely related to the 9/11 event had happened in Indonesia and disrupted the nation’s stability and harmony. The hard-power approach that the Indonesian government had hitherto employed to curb terrorism had not succeeded in eradicating religious terrorist groups entirely. A soft-power approach is needed to contest the indoctrination that the terrorist exercised on their followers and to halt the recruitment of new terrorists. Although the savageness of religious terrorism has given religion a terrifying impression, taking a shortcut by restricting the role of religion to the private sphere—as applied by secular countries—has not proven successful. Rejecting the solution offered by secular countries, this article offers the idea of principled pluralism with its vision of religious freedom as a soft-power solution in treating religious terrorism. By opposing tyranny and authoritarianism, religious freedom would hopefully break the chain of consolidation maintained by religious terrorists with their followers. By using principled pluralism as a hermeneutical lens to read Pancasila, this article argues that civil society is the only channel for religion to contribute significantly to Indonesian society. Full article
26 pages, 447 KiB  
Article
A Kurdish al-Qaida? Making Sense of the Ansar al-Islam Movement in Iraqi Kurdistan in the Early 2000s
by Brynjar Lia
Religions 2022, 13(3), 203; https://doi.org/10.3390/rel13030203 - 26 Feb 2022
Cited by 1 | Viewed by 5974
Abstract
Initially construed as the vital link between Saddam Husayn’s Iraq and al-Qaida in the runup to the Iraq war, the Ansar al-Islam (AI) group formed in Iraqi Kurdistan in December 2001 has been the subject of intense debate and huge media coverage. In [...] Read more.
Initially construed as the vital link between Saddam Husayn’s Iraq and al-Qaida in the runup to the Iraq war, the Ansar al-Islam (AI) group formed in Iraqi Kurdistan in December 2001 has been the subject of intense debate and huge media coverage. In academic research, however, its history, evolution and affiliation have received surprisingly little academic scrutiny. Commonly depicted as an al-Qaida affiliated group or a sub-group controlled by al-Qaida’s emerging organization in Iraq (AQI), the AI group should—this article argues—instead be understood as a strong independent-minded group with an ideology and operational pattern distinct from that of AQI. Although sharing many commonalities, the AI and AQI became de facto rivals, not allies. Contrary to accepted wisdom, the AI and its first successor group remained a distinct Salafi-jihadi insurgent group largely focused on fighting ‘the near enemy’, i.e., Kurdish and Iraqi authorities. It strongly resisted repeated calls for joining al-Qaida’s new umbrella organization in Iraq, the Islamic State of Iraq (ISI) in 2006, and it paid no homage to AQI’s or ISI’s leaders. Also on the international level, the groups were fundamentally different. As opposed to al-Qaida’s terrorist plotting abroad, the AI’s international network were hierarchical structures, geared towards raising logistical and financial support as well as recruitment. The article highlights the need for greater attention to the complexities and nuances in patterns of contacts and cooperation between militant Islamist extremists. Informed by the growing scholarship on the multifaceted nature of contemporary jihadism, its numerous manifestations in local settings, and its strong internal rifts, this paper seeks to redress the early reductionist portrayal of the AI movement. Full article
(This article belongs to the Special Issue Islamist Movements in the Middle East)
13 pages, 239 KiB  
Commentary
Threats to Women/Women as Threats: Male Supremacy and the Anti-Statist Right
by Chelsea Ebin
Laws 2021, 10(2), 41; https://doi.org/10.3390/laws10020041 - 20 May 2021
Cited by 3 | Viewed by 8029
Abstract
Throughout the Trump administration, media coverage of extremist factions of the American right grew considerably, as did the actual membership and numbers of those factions. Included among these factions, and operating on a spectrum that ranges from the center-to-fringe right, are white supremacist, [...] Read more.
Throughout the Trump administration, media coverage of extremist factions of the American right grew considerably, as did the actual membership and numbers of those factions. Included among these factions, and operating on a spectrum that ranges from the center-to-fringe right, are white supremacist, Christian nationalist, and militia/patriot/sovereign citizen (broadly termed constitutionalist) movements. While the American right is heterogeneous, most of these groups are composed of white men, and male supremacism is often a common ideological denominator. Based on historical trends, recent activity, and ongoing movement mobilizations, we should anticipate increased recruitment and activism on the part of anti-statist right-wing groups during the Biden administration. While much has been written about the threat of terroristic violence these groups pose and their varying levels of engagement with white supremacist beliefs, examinations of gender have largely focused on masculinity. This note takes up the relationship between anti-statist right-wing movements and women by sketching three key areas that warrant further examination: (1) how collective interpretations of the law leave women vulnerable by refusing the legitimacy of federal legislation; (2) the threat of militia violence against women, particularly those who hold elected office; (3) how racial and gender exclusions preclude women from having their claims to membership in anti-statist right-wing movements be fully recognized. As we take stock of the growing threat posed by these movements, it is incumbent on us to critically examine the threats to women’s rights posed by the anti-statist right. Full article
(This article belongs to the Special Issue The Body Politic: Women’s Bodies and Political Conflict)
26 pages, 649 KiB  
Article
Challenges of Countering Terrorist Recruitment in the Lake Chad Region: The Case of Boko Haram
by Kangdim Dingji Maza, Umut Koldas and Sait Aksit
Religions 2020, 11(2), 96; https://doi.org/10.3390/rel11020096 - 20 Feb 2020
Cited by 15 | Viewed by 15142
Abstract
This article attempts to shed light on the challenges confronting relevant actors (state and non-state) in countering the threat of terrorism recruitment by focusing on the Boko Haram terrorist organization, whose presence and activities threaten the security of the Lake Chad region. The [...] Read more.
This article attempts to shed light on the challenges confronting relevant actors (state and non-state) in countering the threat of terrorism recruitment by focusing on the Boko Haram terrorist organization, whose presence and activities threaten the security of the Lake Chad region. The article uses a qualitative research technique combining key informant interviews with stakeholders familiar with the conflict, academic and non-academic documents, reports, and policy briefs. The findings of the article suggest that despite the various initiatives by stakeholders aimed at containing the strategies of recruitment, the group continues to expand its base by launching coordinated attacks that further destabilize the region. These challenges stem from a lack of a clear-cut counterterrorism strategy, a dearth in technological and mutual trust between actors and locals in the management and utilization of intelligence, and the inability of state institutions to ‘coerce and convince’ citizens in terms of its capacity to counter the danger of terrorism recruitment and expansion. The article, amongst other things, recommends a community policing model similar to the ‘Nyumba-Kumi security initiative’ adopted by most countries in East Africa for the effective assessment and detection of threat forces; the state and its agencies should show the capacity to coerce and convince in dealing with the (ideological, religious, social, and economic) conditions, drivers, and factors promoting the spread of terrorism as well as other forms of violent extremism in the society; furthermore, there is a need for stakeholders to adopt a comprehensive and holistic counterterrorism/violent extremism strategy to reflect present-day security challenges as well as to guarantee sustainable peace. Full article
(This article belongs to the Special Issue Peace, Politics, and Religion: Volume I)
Show Figures

Figure 1

30 pages, 286 KiB  
Article
“Jihad Cool/Jihad Chic”: The Roles of the Internet and Imagined Relations in the Self-Radicalization of Colleen LaRose (Jihad Jane)
by Caroline Joan S. Picart
Societies 2015, 5(2), 354-383; https://doi.org/10.3390/soc5020354 - 22 Apr 2015
Cited by 35 | Viewed by 23322
Abstract
The internet provides the means through which a “self-activating terrorist” may first self-radicalize through some imaginary or sympathetic connection with an organized terrorist network. Additionally, the internet allows such a self-activating terrorist to move into the stage of radical violent action. The internet [...] Read more.
The internet provides the means through which a “self-activating terrorist” may first self-radicalize through some imaginary or sympathetic connection with an organized terrorist network. Additionally, the internet allows such a self-activating terrorist to move into the stage of radical violent action. The internet serves both functions by providing the lone wolf with not only a rhetorical medium for self-justification and communication through the use of “monster talk” and its converse, the rhetoric about the “good citizen,” but it is also a source for relatively inexpensive and more unpredictable technologies of mass destruction. Crucial to this analysis is the distinction between radicalization of thought and radicalization of action, as a theoretical rhetoric of radicalization does not automatically convert into a rhetoric of radical action unless there are catalysts at work. The internet, as well as imagined relations cemented by the rhetorics of “jihadi cool” or “jihadi chic,” function as these crucial catalysts, galvanizing monster talk into monstrous action. The article focuses specifically on the case of self-activating terrorist Colleen LaRose to analyze how different factors—mental, psychological, social, and economic—interact with imaginative elements, such as surrogate father-mentor-lover relations for LaRose, and contribute to the formation of a self-activating terrorist, and what ultimately motivates and galvanizes her to move from a rhetoric of radical talk to a rhetoric of radical action, using Silber and Bhatt’s model of radicalization as an initial heuristic. In the case of Colleen LaRose, the romance of “jihadi chic” or “jihadi cool” (the converse of the rhetoric of the monstrous “infidel” or “lone wolf terrorist”) was an essential factor to her self-radicalization. It is this imagined status of “jihadi chic” or “jihadi cool” (that nevertheless must somehow have a look of “reality” or “authenticity” and command a response from its audience) that continues to be a crucial component of the success of recruitment strategies of radical jihadi groups, such as ISIS. Full article
(This article belongs to the Special Issue Imaginative Criminology)
Back to TopTop