Edited by Prof em. Alex P. Schmid and featuring contributions from leading experts in the field, this ambitious joint project aims to be an authoritative resource on counter-terrorism.

The Handbook consists of five parts. New chapters will be released on a weekly basis. To receive a monthly update on chapter releases, subscribe here.


Handbook of Terrorism Prevention and Preparedness

Edited by Alex P. Schmid

Edition 1st Edition
First Published 2020
Publication Location The Hague
Imprint ICCT Press
DOI 10.19165/2020.6.01
ISBN 9789090339771

Suggested Citation
Schmid, Alex P. (ed.) Handbook of Terrorism Prevention and Preparedness (The Hague, NL: ICCT Press) 2020.

Introduction: Terrorism Prevention and Preparedness

This section contains the book's copyright information, table of contents, list of contributors, list of abbreviations, acknowledgements and a foreword by ICCT Director Alexander von Rosenbach.

Download
by Alex P. Schmid

This introduction contains a brief overview of the Handbook's five parts and chapters.

Download
by Alex P. Schmid

Abstract
This chapter serves to outline a framework for the analysis of terrorism. Key concepts (prevention, terrorism, extremism, radicalization) are defined and discussed, as are the prevention of radicalization and prevention of extremism as alternative frameworks related to terrorism prevention. The difficulty of theory formation is outlined and some promising borrowings from crime prevention theory are introduced. Typologies of terrorism and prevention are presented and a tri-partition into upstream-, midstream- and downstream-terrorism prevention is suggested, illustrated by examples of measures to be taken, or intervention to be made, for each of these phases. In addition to suggesting working definitions for terrorism prevention and preparedness, the chapter also features a short appendix with definitions of prevention in the fields of conflict, crime, and violence.

Download

Part I: Lessons for Terrorism Prevention from Literature in Related Fields

by Kelly A. Berkell

Abstract
This chapter provides an overview of the ways in which criminology and the crime prevention literature have contributed, and might prospectively contribute, to the study and practice of terrorism prevention. Underlying the discussion is the critical premise that terrorism is, inexorably, a particular form of crime, and that criminological perspectives accordingly function as key components of any comprehensive strategy for terrorism prevention and preparedness. Models and foundational concepts in crime prevention are introduced with a focus on situational crime prevention and its theoretical underpinnings. The application of situational crime prevention (SCP) to terrorism prevention is traced from its promising point of departure in 2006 through its evolution up to the present time. In addition, crime prevention models outside of (or extending beyond) situational crime prevention are considered to afford a broader overview of the maturing criminological perspective on terrorism prevention. Finally, benefits and drawbacks of the foregoing approaches are considered and directions for possible future research are discussed.

Download
by Andreas Schädel and Hans J. Giessmann

Abstract
This chapter shows how approaches, concepts, and instruments from conflict prevention and conflict resolution practice can be of use in conflicts marked by terrorist violence. Based on the assumption that terrorism and its effective prevention can only be understood as part of a wider political conflict and in combination with the surrounding structural power relationships, we examine how the instruments of negotiations and dialogue, although still categorically refused by some terrorism scholars and policymakers, can prove valuable additions to existing approaches of terrorism prevention.

The chapter begins with a conceptual critique of classical realist definitions of terrorism and shows how their homogenization and trivialization of the phenomenon helps policymakers legitimize hard security measures and delegitimize militant power contenders. After reviewing empirical evidence on the limited use of force as the only strategy against terrorist threats and debunking the most common objections against negotiations with terrorist groups, the chapter then delves into the details of how such negotiations evolve as part of a wider peace process. Drawing from the conflict resolution literature and related disciplines, we discuss in particular the role of timing, trust and spoilers in such processes. The chapter concludes by looking beyond classical approaches of conflict resolution and by presenting a systemic conflict transformation approach that does not attempt to simply reduce terrorist and counter terrorist violence but engages with, and aims to transform, the underlying structural violence and oppression that often form the context in which terrorist violence occurs.

While this chapter builds on the predominant literature on terrorism and thus looks at the phenomenon mostly from the perspective of governments, we acknowledge the conceptual bias in that approach and provide an insight into the theoretical debate that challenges the simplistic view of terrorism as a non-state phenomenon and a conflict between legitimate state actors and illegitimate power contenders.

Download
by Rob de Wijk

Abstract
Military establishments have learned that insurgency and terrorism are part of a broader political struggle with the population being the center of gravity. Therefore, the military’s vast experience contains important lessons for dealing with terrorists in Western states. A key difference between counterinsurgency (COIN) and counterterrorist (CT) operations is that insurgents rely on support of the population whilst terrorists are individuals or isolated groups or cells without broad public support. Consequently, COIN requires a “hearts and minds”campaign, whilst CT requires search, arrest or neutralize tactics, without causing too much trouble for the population. As the “hearts and minds” campaign is a prerequisite for gaining the support of the population, winning the trust of the people is an essential activity to prevail in a political struggle. Yet this requires responsible leaders who abstain from harsh rhetorical stigmatization of sectors of society vulnerable to terrorist appeals’ leader should also refrain from contributing to polarization between majority and minority groups in society. Political leaders ought to respect group identities and grievances, and should take socio-economic measures in response to justified grievances. At the same time, they should be aware that jihadists and other militants will try to deprive the population of a sense of security. As most insurgents and terrorists make a cost-benefit calculus in their strategic decisions, they can be deterred by the state’s security forces. Thus, increasing the costs of action by the deterring side is important. The party which deters should hold something at risk which the adversary values. Deterrence by denial is relatively simple; deterrence by punishment is more difficult; here the analytical literature can cite only a few successes. Deterrence can be a form of prevention in counterterrorism.

Download
by Clark McCauley

Abstract
This chapter reviews and extends the analysis of mass political murder advanced by Chirot and McCauley, then applies this analysis to understanding and countering terrorism. The justification for this application is that both politicide and terrorism target civilians in the context of asymmetric conflict. Three generalizations emerge. Politicide and terrorism cannot be understood or countered without (i) studying both sides in the conflict, (ii) separate studies of leaders, perpetrators, and mass sympathizers, and (iii) acknowledgment of the threats and grievances perceived by both sides. The chapter concludes with implications for fighting the war of ideas against jihadist and right-wing terrorists.

Download

Part II: Prevention of Radicalisation

by Thomas K. Samuel

Abstract
This chapter looks at the issue of violent extremists and terrorists targeting the education sector, and subsequently recommends steps that the education sector can take to prevent and counter violent extremism (PCVE) amongst students. Educational institutions in general and students in particular have been targeted by violent extremists and terrorists. Paradoxically, they have sought to physically attack and destroy institutions of learning, while at times, they have actively sought to radicalize and subsequently recruit students to join their cause. Short case studies of attacks on educational institutions in different parts of the world, as well as instances of young people being radicalized in schools and universities, are presented and evaluated.

Download
by Gary Hill

Abstract
This chapter focuses more on the practical than the theoretical. Much of the chapter will focus on how to identify inmates (and staff) at risk of becoming radicalized and how to work with them. In addition to looking at potential radical inmates, the chapter also deals with violent extremist offenders, who prison professionals often include when dealing with radical inmates. Why and how individuals become radicalized in prisons is explored. Many news articles, political presentations, and common knowledge indicate that prisons are “hotbeds for the recruitment of radicals” and that this is a big problem. Whether that is true is examined. The current emphasis on developing prison programs dealing with radicals are reviewed and summarized. The issue of whether radicalization in prisons is worthy of special programs or whether normal good prison practice would be just as effective is explored. Issues of dealing with inmates who enter the prison system already radicalized and who are possibly members of radical or terrorist organizations are explored, and the types of classification tools used to identify them are discussed. The chapter also looks at differing concepts as to how and where potential radicals should be housed. A major section of the chapter deals with the training of prison staff to identify and work with potential radicals. The use of “Dynamic Security” as a tool to help in the fight against prison radicalization is explained. Examples of various treatment models used in the rehabilitation of terrorists are presented. In its final section, the chapter offers general observations and recommendations for working with radicals, convicted terrorists and violent extremist prisoners.

Download
by Barbara H. Sude

Abstract
Only a minority of refugees and asylum seekers become terrorists, but some have committed major attacks, raising concern among host country governments and publics. This chapter identifies factors that contributed to or deterred the rise of violent militant groups and terrorists among refugees confined to camps during major historical migration crises. It then examines current efforts to mitigate the same risks among today’s refugees in camp situations. However, more than half of refugees are not in camps, but are housed either among host country populations near the countries they fled from or in third countries, where many transition through asylum reception facilities before beginning to rebuild their lives. The main factors identified in the historical cases remain relevant to more recent situations: host government policies, security and radicalizer access, living conditions, opportunities for youth, and local economic conditions and resilience. Lessons drawn from programs by the United Nations and other stakeholders to address these factors also are relevant to third countries struggling to integrate refugees. As refugees become part of the wider society in new countries, other individual risk factors for radicalization to terrorism become key to prevention efforts. These factors are essentially the same as for non-refugees. Not all have been empirically validated, but to the extent that these are useful indicators, this chapter will examine how much they apply to refugees specifically and identify promising methods drawn from mental health, criminal justice, youth, and community programs to mitigate individuals’ susceptibility to radicalization before they commit violence.

Download
by Asad Ullah Khan and Ifrah Waqar

Abstract
Historically, madrasahs as religious teaching institutions have held a position of esteem and significance in the Indian subcontinent. Since Pakistan’s independence, madrasahs have played a significant role in not only providing religious education, but also offering free board and lodging to many of the country’s poorest children. Overtime, their numbers have grown, owing to a number of national and international factors. After 9/11, a debate on regulating madrasahs and their curriculum gained strength, as links connecting extremist and terrorist elements operating in the country with these institutions were found. A number of government measures to introduce reforms and regulate madrasahs in Pakistan have been announced to date, but have mostly been unsuccessful - largely due to a lack of political will. This chapter examines the evolution, landscape, and features of the current madrasahs system and efforts to streamline them, the obstacles in their implementation, along with an overview and evaluation of Pakistan’s counterterrorism strategies related to madrasahs and, to a lesser extent, mosque reforms. The social setting of madrasahs and their role in education, politics, radicalization and terrorism is also discussed in some detail.

Download
by Nina Käsehage

Abstract
This chapter opens with a brief definition of key terms such as “Muslim diasporas,” “prevention of violent extremism” (PVE), “countering violent extremism” (CVE) and discusses the role of Islamophobia in radicalization and its impacts on the prevention of radicalization. The size of the Muslim population in each of the selected five Western countries and the appearance of jihadist, left- and right-wing-groups, as well as the number of attacks resulting from these milieus are briefly discussed at the beginning of the country reports. The main body of this chapter discusses academic, governmental, and civil society approaches to PVE/CVE. For each country, some PVE examples are presented which might be helpful to policymakers and practitioners. A literature review regarding PVE/CVE approaches in each country seeks to provide an overview of the academic state of the art concerning the prevention of radicalization. Finally, a number of recommendations with regard to future PVE initiatives are provided, based on the author’s field research in Salafi milieus in various European countries.

Download
by Sara Zeiger and Joseph Gyte

Abstract
In the age of selfies, snaps, likes and shares, the internet and social media have transformed the way in which people communicate. In early 2019, global internet penetration reached 57%, or 4.4 billion users, and the overall number of mobile social media users reached 42%, or 3.2 billion people. This means that people are able to share ideas, communicate and interact more rapidly than ever before, including with audiences on the other side of the world. Terrorist groups have certainly leveraged these new mechanisms and platforms for communicating amongst themselves and to potential recruits. For example, the Islamic State of Iraq and al-Sham (ISIS) has been known for producing sleek videos circulated on YouTube and Twitter, and has mastered new and emerging technologies and social media platforms, such as Telegram; all to promote its messages and recruit new members in cyberspace. This chapter focuses on the prevention of radicalization on social media and the internet in this digital age. It first reviews the relevant methods and approaches that terrorists employ to spread their propaganda and recruit online. Subsequently, it looks at some of the more common and emerging prevention and preparedness strategies which address the online space. Besides reviewing the theoretical foundations to prevent radicalization on social media and the internet, this chapter will also draw upon specific examples, predominantly from three regions: Europe, Southeast Asia and East Africa, to illustrate what some countries are doing to tackle the problem of online radicalization.

Download

Part III: Prevention of Preparatory Acts

by Ahmet S. Yayla

Abstract
The long-term survival of terrorist organizations relies on their ability to attract new members and maintain an ongoing terrorist recruitment cycle. The numbers of terrorist organization members may decrease due to counterterrorism operations or defections, forcing the leaders of those groups to seek new members. Preventing terrorist recruitment is one of the most effective and least lethal methods of countering terrorism, and yet it is often overlooked by those combating terrorism. Western governments did not stop Al-Qaeda from recouping its losses, even after it suffered devastating losses in the months following the 9/11 attacks. The fact is that Al-Qaeda had only around 400 armed members at the time of 9/11, as opposed to thousands of affiliated members in 2019. Although the recruitment strategies of different organizations may vary, they follow a similar historical pattern. All recruiters must first identify qualified candidates, then establish secure connections, build rapport, indoctrinate them, and slowly pull them into an organization. ISIS proved that this process could be fast-forwarded through online propaganda and social media. Preventing recruitment in the first place can be the most fruitful, and maybe also least expensive, method used to counter terrorism. Successfully short-circuiting the recruitment cycle may save thousands of lives of prospective recruits and many more lives by thwarting future attacks. This chapter aims to present a holistic and comprehensive road map for interrupting and preventing terrorist recruitment by identifying relevant societal factors and triggers that recruiters use to find and control their subjects.

Download
by Jessica Davis

Abstract
This chapter on the prevention of the financing of terrorism will examine the international instruments and mechanisms in place to identify and prevent terrorist financing and describe and analyze the roles of the bodies involved in countering terrorist financing. It will also provide a general overview of some national-level programs, including the role of domestic financial intelligence units (and the different types generally employed.) The bodies, laws, regulations, and norms in place to prevent terrorist financing will be examined in the context of a terrorist financing framework that explores how terrorists raise, use, move, store, manage, and obscure their funds, and how (and to what extent) these bodies are able to detect such activities. Finally, a brief analysis will be offered on their role in detecting and preventing organization and operational financing, drawing the distinction between how terrorist organizations finance their activities, and how terrorist cells and individual actors finance their plots and attacks.

Download
by Branislav Todorovic and Darko Trifunovic

Chapter forthcoming

Part IV: Prevention of, and Preparedness for, Terrorist Attacks

Part V: Preparedness and Consequence Management

Conclusions