Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Terrorism

Series

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 56

Full-Text Articles in Entire DC Network

Digital Terror Crimes, Cody Corliss Jan 2024

Digital Terror Crimes, Cody Corliss

Law Faculty Scholarship

Terror actors operating within armed conflict have weaponized social media by using these platforms to threaten and spread images of brutality in order to taunt, terrify, and intimidate civilians. These acts or threats of violence are terror, a prohibited war crime in which acts or threats of violence are made with the primary purpose of spreading terror among the civilian population. The weaponization of terror content through social media is a digital terror crime.

This article is the first to argue that the war crime of terror applies to digital terror crimes perpetrated through social media platforms. It situates digital …


The Theorizing Of Terrorism Within Criminology, Daren Fisher, Erin M. Kearns Jan 2023

The Theorizing Of Terrorism Within Criminology, Daren Fisher, Erin M. Kearns

Criminology and Criminal Justice Faculty Publications

Objectives. While terrorism studies were once castigated as atheoretical and unempirical, criminology has been well suited to apply theories of crime to terrorism and to then test those theories with rigorous methods and robust data. The present study takes stock of how criminologists have theorized about terrorism and tested those theories over time in 13 of the discipline’s leading journals. Methods. The study systematically examines theoretical framing, hypotheses, methodological approach, focus within criminology and criminal justice, and policy recommendations in terrorism-focused articles. Results. While terrorism has become more central within top journals, sparse attention has been paid to many criminological …


Newsletter, Winter 2022 Jan 2022

Newsletter, Winter 2022

Newsletter

No abstract provided.


Tweet-To-Act: Towards Tweet-Mining Framework For Extracting Terrorist Attack-Related Information And Reporting, Farkhund Iqbal, Rabia Batool, Benjamin C. M. Fung, Saiqa Aleem, Ahmed Abbasi, Abdul Rehman Javed Aug 2021

Tweet-To-Act: Towards Tweet-Mining Framework For Extracting Terrorist Attack-Related Information And Reporting, Farkhund Iqbal, Rabia Batool, Benjamin C. M. Fung, Saiqa Aleem, Ahmed Abbasi, Abdul Rehman Javed

All Works

The widespread popularity of social networking is leading to the adoption of Twitter as an information dissemination tool. Existing research has shown that information dissemination over Twitter has a much broader reach than traditional media and can be used for effective post-incident measures. People use informal language on Twitter, including acronyms, misspelled words, synonyms, transliteration, and ambiguous terms. This makes incident-related information extraction a non-trivial task. However, this information can be valuable for public safety organizations that need to respond in an emergency. This paper proposes an early event-related information extraction and reporting framework that monitors Twitter streams, synthesizes event-specific …


The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi Jan 2021

The Evolution Of United States - Central Asian Security Policy Post-9/11: Military, Terrorism, And Cyber-Security, Shamsuddin Karimi

FIU Electronic Theses and Dissertations

Rudyard Kipling once described and wrote about the Great Game as a way to outline 19th century great power politics in the struggle for empire in Central Asia. While Kipling’s tale of spy-craft and espionage is fiction, the political philosophy behind the story has never lost relevance. The struggle for political dominance in Central Asia continued through the twentieth century in the Cold War as well as into twenty-first century after the terrorist attacks on September 11, 2001. Although the great power players may have changed over the past 120 years, the importance of Central Asia has not.

This …


Toward Tweet-Mining Framework For Extracting Terrorist Attack-Related Information And Reporting, Farkhund Iqbal, Rabia Batool, Benjamin C. M. Fung, Saiqa Aleem, Ahmed Abbasi, Abdul Rehman Javed Jan 2021

Toward Tweet-Mining Framework For Extracting Terrorist Attack-Related Information And Reporting, Farkhund Iqbal, Rabia Batool, Benjamin C. M. Fung, Saiqa Aleem, Ahmed Abbasi, Abdul Rehman Javed

All Works

The widespread popularity of social networking is leading to the adoption of Twitter as an information dissemination tool. Existing research has shown that information dissemination over Twitter has a much broader reach than traditional media and can be used for effective post-incident measures. People use informal language on Twitter, including acronyms, misspelled words, synonyms, transliteration, and ambiguous terms. This makes incident-related information extraction a non-trivial task. However, this information can be valuable for public safety organizations that need to respond in an emergency. This paper proposes an early event-related information extraction and reporting framework that monitors Twitter streams synthesizes event-specific …


The Rising Risk Of Terrorism In The Philippines And Natural Resource Corruption, Blair Mills Mar 2020

The Rising Risk Of Terrorism In The Philippines And Natural Resource Corruption, Blair Mills

Honors Theses

As foreign fighters, who had previously traveled to the Middle East to conduct operations under the flag of ISIL (Islamic State of Iraq and the Levant), return to the Philippines and other countries in Southeast Asia, they are bringing their ideologies and knowledge of terrorist operations with them. In addition to tracking the growing trend of terrorist attacks being conducted in the Philippines in the name of ISIL, it is crucial to determine how these returning fighters are gathering the funds and resources necessary to carry out these attacks and establish new terrorist cells. This question of how returning terrorists …


Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards Jan 2020

Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards

Mineta Transportation Institute Publications

Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.

This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and …


Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin Jan 2020

Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin

Articles by Maurer Faculty

תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …


Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri Sep 2019

Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri

Publications

This paper assesses current trends in small unmanned aircraft systems (sUAS) technology and its applications to the Special Operations Forces (SOF) community. Of critical concern to SOF is that commercial-off-the-shelf (COTS) sUAS technologies are relatively inexpensive, improving at a dramatic rate, and widely available throughout the world. Insurgents, terrorists, violent extremist organizations (VEOs) and other nefarious actors have used COTS sUAS to conduct offensive attacks as well as to develop battlefield situation awareness; these technological improvements combined with their widespread availability will require enhanced and rapidly adaptive counter-sUAS measures in the future. To understand the most current trends in the …


Terrorism Risk Insurance Act: Time To Renew . . . Or Rethink?, Jeffrey E. Thomas Jan 2019

Terrorism Risk Insurance Act: Time To Renew . . . Or Rethink?, Jeffrey E. Thomas

Faculty Works

This paper summarizes the U.S. program for terrorism insurance, outlines its advantages and disadvantages, and describes the current proposals for extension of the program. The program, generally referred to as a “Federal Backstop,” functions in some ways that are similar to reinsurance, but it does not require participants to pay premiums ex ante. Instead uses an ex post recoupment mechanism to recover some or all of the Federal payments made under the program. This approach has the advantage of reducing the cost and increasing the availability of terrorism insurance. Some have criticized the program for its interference in market mechanisms, …


Are Domestic Abusers Terrorists: Rhetoric, Reality, And Asylum Law, Natalie Nanasi Jan 2019

Are Domestic Abusers Terrorists: Rhetoric, Reality, And Asylum Law, Natalie Nanasi

Faculty Journal Articles and Book Chapters

The terms terrorism and terrorist are highly charged but all too often imprecisely utilized in legal, media, and political arenas. The terminology has even entered the field of intimate partner violence, where the phrases terrorism in the home or intimate terrorism have been used to describe domestic abuse. This language has proliferated not only due to identified commonalities between intimate partner abuse and terroristic behaviors but also because of the rhetorical impact of the words in highlighting the gravity of domestic violence. However, expanding the legal framework of terrorism into new areas has potentially serious and far-reaching consequences. It is …


Visualization, Feature Selection, Machine Learning: Identifying The Responsible Group For Extreme Acts Of Violence, Mahdi Hashemi, Margeret A. Hall Nov 2018

Visualization, Feature Selection, Machine Learning: Identifying The Responsible Group For Extreme Acts Of Violence, Mahdi Hashemi, Margeret A. Hall

Interdisciplinary Informatics Faculty Publications

The toll of human casualties and psychological impacts on societies make any study on violent extremism worthwhile, let alone attempting to detect patterns among them. This paper is an effort to predict which violent extremist organization (VEO), among 14 currently active ones throughout the world, is responsible for a violent act based on 14 features, including its human and structural tolls, its target type and value, intelligence, and weapons utilized in the attack. Three main steps in our paper include: 1) the visualization of the violent acts through linear and non-linear dimensionality reduction techniques; 2) sequential forward feature selection based …


Declaration Of The Modern Caliphate: Understanding The Importance Of Mosul To Isil, Megan Marchetti, Matthew J. Smith, Ken Wallace Apr 2018

Declaration Of The Modern Caliphate: Understanding The Importance Of Mosul To Isil, Megan Marchetti, Matthew J. Smith, Ken Wallace

Politics, Philosophy, and Legal Studies: Student Scholarship & Creative Works

This paper examines the importance of the Iraqi city of Mosul to ISIL. Special attention is given to the conquering of Mosul, ISIL's governance, and the Battle of Mosul.


The Popular But Unlawful Armed Reprisal, Mary Ellen O'Connell Jan 2018

The Popular But Unlawful Armed Reprisal, Mary Ellen O'Connell

Journal Articles

The United States and Iran carried out armed reprisals in Syria during 2017 in the wake of chemical and terror attacks. Despite support for their actions even by countries such as Germany and France, retaliatory uses of force are clearly prohibited under international law. International law generally prohibits all use of armed force with narrow exceptions for self-defense, United Nations Security Council authorization, and consent of a government to participate in a civil war. Military force after an incident are reprisals, which have been expressly forbidden by the UN. Prior to the Trump administration, the U.S. consistently attempted to justify …


Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson Oct 2017

Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson

Articles

In this section: Congress Enacts Sanctions Legislation Targeting Russia • United States and Qatar Sign Memorandum of Understanding over Terrorism Financing • Trump Reverses Certain Steps Toward Normalizing Relations with Cuba • United States Announces Plans to Withdraw from Paris Agreement on Climate Change • President Trump Issues Trade-Related Executive Orders and Memoranda • United States, Russia, and Jordan Sign Limited Ceasefire for Syria • Trump Administration Recertifies Iranian Compliance with JCPOA Notwithstanding Increasing Concern with Iranian Behavior


Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson Apr 2017

Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson

Articles

In this section: • United States Abstains on Security Council Resolution Criticizing Israeli Settlements • United States Sanctions Russian Individuals and Entities After Accusing Russian Government of Using Hacking to Interfere with U.S. Election Process; Congressional Committees and Intelligence and Law Enforcement Agencies Continue to Investigate President Trump’s Connections to Russian Officials • Second Circuit Overturns $655 Million Jury Verdict Against Palestine Liberation Organization and Palestinian Authority • New Legislation Seeks to Confirm Immunity of Artwork and Facilitate Cultural Exchange • United States Confronts China over Seizure of Unmanned Drone in the South China Sea • International Criminal Court Prosecutor …


Crimmigration-Counterterrorism, Margaret Hu Jan 2017

Crimmigration-Counterterrorism, Margaret Hu

Scholarly Articles

The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …


Impact Of Data On Litigation: Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott Jan 2017

Impact Of Data On Litigation: Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott

Faculty Articles

In order to explore the threats posed by cybersecurity breaches, first outline the steps taken by the government to address those threats in private sector economy, and then call attention to the ultimate solution, which will most certainly spur private businesses to create a more secure cyber environment for the American people - a Connie Francis-styled cyber civil action lawsuit. Technological advances opened up the unfathomable marvels of cyberspace and, by so doing, spawned a modern world that is now completely dependent on cyber, particularly in the context of sustaining and operating our critical infrastructure. Unfortunately, if supervisory control and …


Pennsylvania 2016 Pre-Election Poll On Policy And Governance, Alexander Siedschlag Nov 2016

Pennsylvania 2016 Pre-Election Poll On Policy And Governance, Alexander Siedschlag

Publications

Pennsylvanians mainly see Homeland Security as a comprehensive effort of the federal government to fight terrorism at home and abroad. While it most often has a positive connotation, the multi-faceted mission space of homeland security is widely unknown.


The War On Terror, How The Strategies Used By The United States Against Islamic Extremism Have Been Ineffective, Hein Paing Aug 2016

The War On Terror, How The Strategies Used By The United States Against Islamic Extremism Have Been Ineffective, Hein Paing

Student Works

The purpose of this thesis is to investigate the ineffective strategies used by the United States and coalition forces in the fight against Islamic extremist terrorism. The continuation of terrorist groups acting in the name of Islam begs the question as to just how well have these strategies worked, and what further measures must be taken in order to quell the existence of these organizations? This will be done through the examination of tactics such as the deployment of troops, bombardments from airstrikes, and the restrictive rules of engagements. When explored thoroughly, it will be easier to ascertain exactly why …


The Identification And Exploitation Of Terrorist Financing, Jacob S. Gordon May 2016

The Identification And Exploitation Of Terrorist Financing, Jacob S. Gordon

Senior Honors Theses

Terrorism and the threat of terrorist attacks have forced the United States to place a high priority on developing a comprehensive counterterrorism strategy. A crucial component of this overarching strategy focuses on targeting the finances of a terrorist organization, hoping to eliminate or stifle their sources of funding in an effort to render the organization incapable of launching successful operations due to an absence of funding. By analyzing the most common financing options that terrorist groups use, the United States can hone its ability to disrupt the funding operations for terrorist groups. Likewise, developing a method for tracking the laundering …


Terrorist Experts’ Perceptions Of How The Internet Has Shaped International Terrorism, Samuel F. Wilson Ii, Teresa M. Lao Ph.D., Ernesto Escobedo Dr. Jan 2016

Terrorist Experts’ Perceptions Of How The Internet Has Shaped International Terrorism, Samuel F. Wilson Ii, Teresa M. Lao Ph.D., Ernesto Escobedo Dr.

School of Public Policy and Administration Publications

The use of the Internet by terrorists has greatly contributed to international terrorism. The Internet is a main strategic communication asset for terrorists who use online message boards and chat rooms to share information, coordinate attacks, spread propaganda, raise money, and recruit. The Internet gives terrorists a medium to legitimize, propagate, and intimidate citizens to their cause. Their strategies are based on careful analysis of human communications; thus, messages are adapted and carefully delivered to appeal to people who may need something to believe in. This study bridged the gap in knowledge by exploring, understanding, and explaining the perceptions of …


Terrorist Experts’ Perceptions Of How The Internet Has Shaped International Terrorism, Samuel F. Wilson Ii, Teresa M. Lao Ph.D., Ernesto Escobedo Dr. Jan 2016

Terrorist Experts’ Perceptions Of How The Internet Has Shaped International Terrorism, Samuel F. Wilson Ii, Teresa M. Lao Ph.D., Ernesto Escobedo Dr.

Walden Faculty and Staff Publications

The use of the Internet by terrorists has greatly contributed to international terrorism. The Internet is a main strategic communication asset for terrorists who use online message boards and chat rooms to share information, coordinate attacks, spread propaganda, raise money, and recruit. The Internet gives terrorists a medium to legitimize, propagate, and intimidate citizens to their cause. Their strategies are based on careful analysis of human communications; thus, messages are adapted and carefully delivered to appeal to people who may need something to believe in. This study bridged the gap in knowledge by exploring, understanding, and explaining the perceptions of …


No Good Options Against Isis Barbarism? Human Shields In 21st Century Conflicts, Charles J. Dunlap Jr. Jan 2016

No Good Options Against Isis Barbarism? Human Shields In 21st Century Conflicts, Charles J. Dunlap Jr.

Faculty Scholarship

One of the most vexing conundrums of 21st century warfare has been not just the explosive growth in the use of human shields, but the apparent systemization of the tactic, particularly by nonstate actors. In noting the international prohibition, the International Committee of the Red Cross (ICRC) defines the practice as the “intentional co-location of military objectives and civilians or persons hors de combat with the specific intent of trying to prevent the targeting of those military objectives.”


Disengagement From Ideologically-Based And Violent Organizations: A Systematic Review Of The Literature, Steven Windisch, Peter Simi, Gina Sott Ligon, Hillary Mcneel Jan 2016

Disengagement From Ideologically-Based And Violent Organizations: A Systematic Review Of The Literature, Steven Windisch, Peter Simi, Gina Sott Ligon, Hillary Mcneel

Sociology Faculty Articles and Research

Research on disengagement from violent extremism is an emerging field of inquiry. As compared to the related field of radicalization, there have been fewer studies of disengagement. Further, little effort has been made to conduct a large scale, systematic review of what is currently known about disengagement from violent extremism. This type of meta-literature assessment can play an important role in terms of informing strategies and programs designed to facilitate exit. To help fill this gap, our project systematically examines the disengagement literature to determine the range and frequency of various exit factors identified in previous studies. We also rely …


'Protection And Empire': The Martens Clause, State Sovereignty, And Individual Rights, Jeffrey D. Kahn Jan 2016

'Protection And Empire': The Martens Clause, State Sovereignty, And Individual Rights, Jeffrey D. Kahn

Faculty Journal Articles and Book Chapters

The Martens Clause was a last-minute compromise that saved the 1899 Hague Convention with Respect to the Laws and Customs of War on Land. In its original formulation, the clause shielded individuals under “the protection and empire” of international law, principles of humanity, and the dictates of the public conscience. F. F. Martens, its author, was Russia’s greatest international law scholar and occasional diplomat. He saw no application for his work in the nineteenth-century internal affairs of his sovereign, notwithstanding the transnational terrorism that plagued (and ultimately destroyed) the Russian Empire. As the relationship between individual rights and state sovereignty …


Is The Internet The Main Medium Of Transmitting Terrorism?, Hatem El Zein Jan 2015

Is The Internet The Main Medium Of Transmitting Terrorism?, Hatem El Zein

Australian Information Warfare and Security Conference

The influx of virtual media platforms has allowed extremists and terrorists to transmit their messages to wider audiences without passing through a gatekeeper or being a subject to editorial policies existed in traditional media outlets. Thus, extremists and terrorists exploit virtual media platforms to report their actions; propagate their ideologies and ultimately to boost their objectives, because these mediums enabled them to have control over time and space. As a result, some governments work to deprive extremists and terrorists from this 'oxygen' through monitoring the cyberspace to block the suspected virtual media platforms. The reactions of some governments to face …


Contemporary Practice Of The Untied States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson Jan 2015

Contemporary Practice Of The Untied States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson

Articles

In this section: • Iran Nuclear Framework Agreement Reached; Congress Seeks to Influence Negotiation • United States Lifts Some Cuba Restrictions and Explores the Possibility of Normalizing Relations • United States Responds to Alleged North Korean Cyber Attack on Sony Pictures Entertainment • Senate Select Committee on Intelligence Releases Executive Summary of Its Study of CIA’s Detention and Interrogation Program • President Obama Seeks Statutory Authorization for the Use of Military Force Against ISIL


Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson Jan 2015

Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson

Articles

In this section: United States Objects to Russia’s Continued Violations of Ukraine’s Territorial Sovereignty, Including by Convoys Purporting to Provide Humanitarian Aid • United States and Afghanistan Sign Bilateral Security Agreement • United States Announces “Changes and Confirmations” in Its Interpretation of the UNConvention Against Torture • United States and China Make Joint Announcement to Reduce Greenhouse Gas Emissions, Bolstering Multilateral Climate Change Negotiations • United States Deepens Its Engagement with ISIL Conflict • NATO Affirms that Cyber Attacks May Trigger Collective Defense Obligations