Free Essay

Process of Becoming Involved in Terrorist Activities

In:

Submitted By gunnya33
Words 1439
Pages 6
The Process of Becoming Involved in Terrorist Activities

HLSS154

29 March 2015
Introduction
What pushes one to want to participate in terrorist activities and what are the determining factors? Terrorist profiling, for the most part, focuses on racial or ethnic stereotypes rather than specific psychological or behavioral profiling local to fundamentalists or nationalist terrorists. However, as it is well known around the world and especially in the United States, not all Muslims or Arabs are terrorist. With that being said there has to be other factors that come into play that construct the conditions that turn some individuals to terrorism. Why is it that certain individuals cross that line into terrorism? Do they all have psychological or behavioral traits that are common in nature? Is there a specific terrorist personality? And can the building of terrorist profiles assist authorities in identifying terrorists? (Hudson, 1999, p.14) This report will list some of the psychological and behavioral factors of individuals, as noted by professionals in the field today, of terrorism. It will also discuss these factors within the prominent terror group al Qaeda, models of terrorist motivations, and psychological factors that are common in individuals that disengage from terrorism.
Psychological and Behavioral Factors of Radicalization To a lot of people understanding why and how an individual could become a terrorist or get involved in terrorist activities is a difficult thing to comprehend. Truth be told terrorism is a complex phenomenon for anyone, but thanks to psychologist, anthropologist, counselors, and a host of others some light has been shed and is still continuing to be shed on this subject. Some studies suggest that some theories of a terrorist’s behavior can be the result of defects or some form of disorder in the individual’s personality structure. Some psychological and behavioral mechanisms that can lead to an individual to become involved in terrorist activities are ideological absolutism, self-identity issues, youth romantic appeal and heroism, and traumatic issues or incidents that may have happened to them or someone they cared for (Psychological, n.d., p. 4-5). A lot of the individuals that become terrorist have identity issues. They are young second and third generation immigrants that have been born and raised in the United States or other Western countries and at some point in time may have converted to Islam. With them being raised with a Western identity, their heritage identity, and having converted to Islam they are bound to face some sort of discrimination. More psychological research has shown that most people want to be a part of the mainstream society and also have their distinction; this is a very fine balance. Having their distinctiveness, as described in the research, is considered to be a psychological need; when someone feels that the distinctiveness of their identity is being threated they will pursue all avenues at their disposal to protect it (King and Taylor 2011, 602-618).
Other studies have shown that unlike traditional criminals, who for the most part are spontaneous criminals, terrorist are more deliberate in their attacks. They tend to do a great deal of preparation for their attacks such as surveillance, plotting, and gathering of materials and/or weapons they may feel they need to complete their mission (Smith 2008). The communication methods has also played a pretty significant role in the assisting with individuals participating in terrorist activities (radicalization). Terrorist groups have utilized the media for many years to capture the attention of the global audience to communicate their message. The advancements in technology has made the communication between terrorist organizations and the target audience that they want to attract extremely easy. Each terrorist group draws its inspiration from different political, economic, religious, and cultural ideologies, but they all have one main objective; to instill fear so as dominate and control their audience.
Countering the Radicalization Process There has been a very noticeable surge in the amount of American Muslims that have been identified by U.S. authorities as engaging in terrorist’s activities since 2009 (U.S. Congress 2010). Different countries may use different techniques, rules, and guidelines in there programs when it comes countering radicalization, but for the most part three types of programs are commonly included in counterradicalization and they are: deradicalization, disengagement, and radicalization prevention (Bjorgo and Horgan, 2009). Deradicalization is the process that is tailored toward those individuals that have been detained for terrorist activities and prisoners that have been suspected of terrorist crimes. This method is really tough because it involves changing a terrorist’s mind and way of thinking which can really be a tough thing to do because some of these terrorist have been involved in these activities for quite some time and are deeply rooted into this way of life. This is evident by Saudi native Said Ali al-Shihri who went through a Saudi deradicalization program after his release from Guantanamo Bay. After his release from the program al-Shihri fled the country and became the deputy leader of Al Qaeda in Yemen. There are a total of 85 terrorist that are on this list that was issued by Saudi officials with 11 of them being once housed at Guantanamo Bay before it’s closure (Worth 2009). The more realistic outcome in counterradicalization is disengagement. It’s an easier task to change an individual’s behavior than it is to change their psychology. By changing the terrorist’s behavior you essentially stop the violence because acts of violence require behavior. Another reason the disengagement is a more realistic outcome is because some of those terrorist who disengage from such activities have no other choice because they have been chosen by collectively by the leadership of the group, as with the Colombian Disengagement and Reincorporation Program. When they are forced to disengage in this manner they are not necessarily de-radicalized, but they are disengaged from the terrorist activities (Horgan and Braddock 2010, 271). With disengagement the governments of those countries usually provide assistance to the individual to help them readjust to life back in the normal populous as well as their family members; whether they de-radicalize or not the assistance they receive is enough for some to stay disengaged from terrorist activities. Radicalization prevention is the third program that was mentioned earlier and it is basically defined just as it sounds and that is to try to prevent radicalization before it happens. In an effort to prevent radicalization the U.S. passed the Violent Radicalization and Homegrown Terrorism Prevention Act of 2007. The act has allocated funds to assist with establishing and maintaining these programs and has allowed, with cooperation from the State Department and other Federal Agencies, to be able to international surveys and assistance from international efforts (110th Congress 2007).
Conclusion
Those that become involved in terrorist activities can be anyone from a Islamic Extremist, a second or third generation immigrant, or even an American born citizen that has decide to cross over. They each may decide to commit terrorist acts for different reasons, but research has shown that these reasons have psychological and behavioral factors that have similarities. Whether these factors may be identity issues or a traumatic incident, federal and local governments as well as in individual communities need to be on the lookout for signs of individuals that may be showing signs of crossing that terrorist line. It’s really important to be on the lookout at the community level because federal and local authorities may not detect the homegrown terrorist until it’s too late.

Reference List

Bjorgo, Tore, and John Horgan. 2009. Leaving Terrorism Behind:

Individual and Collective Disengagement. London: Routledge.

Horgan, John, and Kurt Braddock. 2010. Rehabilitating the Terrorists?:

Challenges in Assessing the Effectiveness of De-radicalization

Programs. Terrorism & Political Violence 22, no. 2: 267-286.

King, Michael, and Donald M. Taylor. 2011. The Radicalization of

Homegrown Jihadists: A Review of Theoretical Models and Social

Psychological Evidence. Terrorism & Political Violence 23, no. 4:

602-618.

“Psychological Causes of Terrorism.” AcademicWeb. Powerpoint. (n.d.) 27

March 2015.Smith, Brent. 2008. A Look at Terrorist Behavior: How

They Prepare, Where They Strike. National Institute of Justice

Journal No. 260 July 2008

http://www.nij.gov/journals/260/pages/welcome.aspx (accessed

March 27, 2015)

U.S. Congress, Senate Committee on Homeland Security and

Governmental Affairs, hearing. Nine Years After 9/11: Confronting

the Threat to the Homeland. September 22, 2010.

Violent Radicalization and Homegrown Terrorism Prevention Act of 2007,

United States House of Representatives, 110th Cong. 2007.

http://www.gpo.gov/fdsys/pkg/CRPT-110hrpt384/pdf/CRPT-

110hrpt384-pt1.pdf

Worth, Robert F. 2009. Saudis Issue List of 85 Terrorism Suspects. New

York Times Magazine, 3 February, p. A5.

Similar Documents

Premium Essay

Reasons Leading to a Terrorist Behavior

...Reasons Leading to a Terrorist Behaviour Name: Stefan Karagiozov ID:500735804 Instructor: Terry Roswell Course: CRIM102 November 24th ,2015 Introduction In their article “ Modern Gangsters and the Patriot Act”, Gregory P. Orvis and Jeffery P. Rush’s thesis is focused on demonstrating how certain street gangs that have been affiliated in criminal behaviour are also involved in terrorist activity, and how some criminals convert to a terrorist behaviour while they are doing their sentence in prison. They also put their focus on the effectiveness of the Patriotic Act and how this Act has helped to capture terrorists over a certain period of years. To this end, the authors’ analysis is dichotic, focusing on the pros and cons of the Patriotic Act and the potential danger to the rights of privacy of American citizens, and the association of the American gangs with terroristic activity. Yet ,Orvis and Rush’s analysis insufficiently addresses the complex psychological traits that are a key factor in the developing of the criminal mind in gang members and later on the conversion of these criminals to a terrorist- like behaviour. For instance , their discussion about the arrest of the Chicago street gang, El Rukn, fails to addresses the development of this criminal thinking and behaviour that led to their affiliation with terrorist activity, which is grounded deep in themselves .Moreover, the authors scratch only the surface of these individuals’ ...

Words: 1543 - Pages: 7

Premium Essay

Prevent Strategy

...question. It simply means to cause terror - an act to endanger. * What is the meaning of radicalisation? - Steps taken by a person to adopt extreme political, social or religious ideals associated with terrorist groups. * What is meant by threat? – A statement of intention. * So called ‘Modern Terrorism’ since 7/7 was an attack without mercy. These extremist will go to any lengths to challenge, intimidate and incite fear in British Domestic Security by carrying out these attacks without regards for innocent human lives. According to National Security Strategy (NSS) ‘the current international terrorist threats to the UK comes mainly from sources involved with Al Qaeda’. The Modern Terrorism extremists are more lethal as their aim is to cause mass destruction. * Ideology behind these attacks is more or less deemed as ‘payback time’ and the backlash is linked to the British invasion on Iraq and the insurgency in Afghanistan. * UK legislations to combat terrorism -Terrorism Act 2000; Crime and Security Act 2001; CONTEST | 2. Introduction – Identify either a policy or ideology: * Identify the policy- The Government Prevent strategy – What is Prevent? What is its aim? * The Prevent strategy which was published in 2011. Prevent aim to stop people becoming terrorists or supporting terrorism and is one of the important facets of (CONTEST) --Counter-Terrorism strategy – To reduce risk of terrorism in the UK and its overseas interest. * Terrorism as a global issue...

Words: 4585 - Pages: 19

Premium Essay

Controlling Organized Crime

...strategies that support those efforts will be explained along with a solution to controlling organized crime by addressing many key factors. Organized crime is a nuisance to society and efforts to reduce this type of crime must not be taken lightly in order to maintain control here in the United States of America. Many issues are caused by organized crime such as higher crime rate, danger within the community, corruption of political officials, and can weaken the economy. These issues caused by organized crime and the association between organized crime and terrorism is becoming quite similar. After the attack on September 11th the efforts of cutting funds to the terrorist groups increased and many country’s that were financing these groups quit due to the destruction caused, so this led these terrorist groups to take another approach in their financing efforts. This is becoming an issue as the terrorist groups are working in conjunction with certain organized crime groups to help both organizations capitalized immensely. The crime rate in these communities’ increase due to the criminals operating within the community and they will intimidate any...

Words: 1238 - Pages: 5

Premium Essay

Technology and Communication

...for city police departments may not be as effective for use with federal agencies in airports or on the boarders. With the various types of technology to choose from it is safe to say that they all work together assisting law enforcement to better protect citizens. As with any new type of technology being used comes a risk of privacy concerns and private information becoming lost or stolen. AFIS, live scan, facial recognition, iris scan, and mobile data terminals are just a few of the technologies available to law enforcement personnel. Overtime these technologies have been improved in accuracy and dependability allowing them to become further accepted by police agencies and the public. There are a few similarities with live scan and iris scan technologies. One of the most common similarities is the use of these technologies in the correctional system. Prisons and jails use live scan and iris scan to process inmates into the facilities as well as out process inmates. Iris scan technology allows for quicker results than live scan, though live scan has been around a lot longer than iris scan. When inmates out process correctional facilities the accuracy of an iris scan is even greater than that of a live scan of their fingerprints. When used in conjunction with each other, there is no mistake in the release of prisoners. The database for the iris scan is smaller in comparison to that of the live scan but that is only because the iris scan is a newer technology. Once more agencies...

Words: 1177 - Pages: 5

Premium Essay

Terrorism

...decades ago that it has been getting stronger and to influence our daily lives with any costs. In our report, we will explain more details about the relationship of terrorism and transportation. Transportation has always been a target or method for terrorism to transfer their message to the public. While transportation keeps economic moving, nationally and globally, business relies on transport and transport systems at every level no matter transferring goods, transporting customers or staff commuting. From jet airliners to mass transit buses and rail terminals, vehicles and transport facilities are all-too familiar targets of terrorist attacks in all country and abroad. The impact of large-scale disruption of transport infrastructures can be critical for national and global business because transport systems have long been viewed as targets for terrorists groups worldwide. Also we will elaborate more on how terrorism can be spread or being use through the four methods of transportation like rail, road, aviation and maritime. For the incident strikes on the World Trade Center (WTC) in New York on September 11, 2001, this has exposed critical security flaws within the United States transportation system which required urgent attention. The first attack on public transportation involving weapons of mass destruction occurred in 1995 when the Japanese doomsday cult Aum Shinrikyo released sarin gas into the Tokyo subway system. Then we will explain about what are the factors and...

Words: 13246 - Pages: 53

Premium Essay

Money Laundering In Australia

...(i) Discuss – What is money laundering? How does it differ from terrorist financing? The term money laundering was first pioneered in the early 20th Century. The disguising of income derived from illegitimate activities date back as far as the 13th Century B.C. The infamous Alphonse “Al” Capone who was an infamous organised criminal figure in America during the 1920s during the US Prohibition Era, was grossing criminal proceeds estimated to $100,000,000 of which he laundered through a series of businesses. Lansky who was known as the 'Mob's Accountant' unitised the worth of foreign countries that provide havens for criminal activities. Through laundering Lansky held untraceable millions in Swiss bank accounts and in banks and corporations abroad....

Words: 2296 - Pages: 10

Premium Essay

Counterterrorism Measures

...AM21/0425/13 ASSIGNMENT : TERRORISM AND COUNTERTERRORISM COURSE CODE : SECU. 715 COURSE TITLE: TERRORISM AND COUNTERTERRORISM SUPERVISOR : MADAM LOUISE MACHARIA DATE OF SUBMISSION: 16TH NOVEMBER, 2014 ACRONYMS CJM – Criminal Justice Model WM – War Model ECJM – Expanded Criminal Justice Model MACP – Military Aid to Civilian Power SIGNT – Signal acquired Intelligence HUMINT – Human acquired Intelligence ELINT - Electronic Communications Intelligence 1.0 INTRODUCTION Terrorists commit acts of great atrocity and inhumanity, and many affected by such acts may be tempted to take “an eye for an eye” approach, but it is important that any response or emergency powers follow democratic principles. By retaliating harshly, the state runs the risk not only of looking like an oppressive bullying regime but also of alienating the public, thus perhaps causing sympathy for the terrorists and making it harder for the state to refuse their demands. The counterterrorist approach/capability needs to have a preventive (before), responsive (during), and “post” or “after” approach to deal with incidents and eventualities afterward. If conflict prevention and deterrence fails, then there must be an effective law-enforcement, military, and emergency/ contingency services combination to react to events and a strong accountable and clear criminal justice system to punish perpetrators fairly afterward. 2.0 MODELS FOR A COUNTERTERRORISM...

Words: 6026 - Pages: 25

Free Essay

Ica Assgnmt Aml - Cft

...Assignment I Question 1 Alliance Bank (Bahamas Ltd) is an established offshore bank with an international presence, through a network of subsidiaries, branches and representative offices in over 15 locations. The referenced branch is located in jurisdiction of The Bahamas. A full range of banking and related financial products and services are offered to clients including but not limited to, bank accounts, wire transfers, cash deposits, and credit cards. Money laundering can be defined as the process of disguising or concealing illicit funds to make them appear legitimate. This is achieved by the launders disguising their identity and or distancing themselves from the illicit activity that would have produced his property. It is imperative then that MLROs fully appreciate the vulnerabilities of their Bank’s particular products and services in order to be able to implement systems to prevent exploitation, and be able to properly evaluate unusual and potentially suspicious activity. The core characteristics and vulnerability of the products and services previously mentioned, from the perspective of anti-money laundering are as follows: Bank Accounts: Bank accounts are the entry point into the financial system. Once this is achieved the launderer has access to a wider network of vehicles with which to carry out his objectives. These accounts and services become highly vulnerable in facilitating money laundering. Particularly at risk would be dormant accounts once they are...

Words: 2371 - Pages: 10

Free Essay

Information Technology Act

...Information Technology Act Greg Bennett BIS/220 January 15, 2013 Nikia Johnson Information Technology Act Information technology continues to forge ahead and has done so from day one. Technology, moving forward, and becoming more advanced and sophisticated, adds growing concern over the ethical integrity of that technology. In correlation with those concerns, the United States government implemented various acts to aid control in these concerns and combat unethical behavior. Given the number of implemented acts, this paper focuses on two specific sections: the Fair Credit Reporting Act of 1970, and the U.S. Patriot Act of 2001. The implementation of the Fair Credit Reporting Act of 1970 enabled each American to be on an even plane with credit opportunities. The government executed the U.S. Patriot Act in 2001, in part because of the atrocity of 9/11, to lessen terrorist activities by the use of the Internet and cyberspace. Fair Credit Reporting Act of 1970 The Fair Credit Reporting Act (FCRA) ordained to “protect consumers from the disclosure of inaccurate and arbitrary personal information held by consumer reporting agencies” (Consumer Privacy Guide (2001). The Fair Credit Reporting Act (1970). 2001). At the time when this act was established, American citizens were not viewed equally by credit facilities when attempting to purchase homes or vehicles. This act was a means of governing and guaranteeing equal opportunity and consideration for these...

Words: 1036 - Pages: 5

Free Essay

Policemen of the World

...discussed below. Question 1 The Indian Ocean earthquake: The disaster affected various countries along the Indian Ocean. As a consequence, more than one hundred and eighty thousand individuals were killed, whereas fifty thousand individuals went missing (Carballo, Daita, & Hernandez, 2005). Furthermore, more than 1.6 million survivors were displaced. Island and coastal regions’ infrastructure was also damaged in most countries. The earthquake greatly affected the health, social, and economic gains that had been achieved in the years preceding the disaster. As a result, thousands of individuals were pushed further into poverty. The Al-Qaeda Bombing: The bombing was considered to be a symbolic attack by terrorists. The Twin Towers was targeted because terrorists considered it to be America’s symbol of influence and power. The bombing that occurred on 11th September 2001 killed approximately three thousand individuals, including 19 hijackers. The incident is also known to be the worst attack on the US soil. Occurrence of the two incidents is a clear indication of how the US was not prepared to handle disasters and save lives. Question 2 After the civil war, America’s government was focused on rebuilding the nation by reflecting on people’s interests. For instance, the government considered the country to be new, and its primary interest was to safeguard its independence from European countries that were more...

Words: 1216 - Pages: 5

Premium Essay

Risk Assessment

...Security Risk Management McBride Financial Risk Assessment Overview The purpose of Risk Assessment is to identify potential risks that could impact the operation of the business of McBride Financial Services. This will analyze the approaches to be implemented for omission of avoidable risks and the minimization of the risks that are unavoidable. In this quest, team B has chosen Sioux Falls office of McBride Financial Services, which will involve a risk assessment overview of several different topics. The discussions will be the use of toxic chemicals in the vicinity of business, public transportation facilities that might handle the carriage of dangerous or hazardous substances, any potential targets of criminal activities and potential targets of terrorist activity. Toxic Chemicals Chemicals are a necessary part of any work location. They can be used in work processes, for cleaning, and other functions. Chemicals can be found in solid, dust, liquid, and gas or vapor forms. "Industrial chemicals can be described by the physical form of the chemical (that is, whether it is a dust, fume, vapor, gas, etc.)." (Chemicals in the Workplace) The company needs to identify all the chemicals used at the McBride facility. The individual chemical components should be listed for a safety review. Material Safety and Data Sheets (MSDS) will be obtained and stored onsite for all chemicals used. MSDS is available for all chemicals and requirements from the Occupational Safety and Health...

Words: 2674 - Pages: 11

Free Essay

Impact of Terrorism and School Safety

...In the town of Beslan located in North Ossetia, Russia on September 1, 2004 School number one experienced one of their most devastating terror attacks imaginable. The day was planned to begin with festivities to mark a new year also known as the Day of Knowledge. The celebrations came to an immediate halt as a terrorist group, later discovered to contain Ingush and Chechen militants stormed the school. The 3 day siege left a devastating impact on the Russians as well as the entire world who then questioned their own vulnerability. America who had been increasing security measures since 2001 now needed to re-evaluate the school security system. Following the separation of the Soviet Union a Muslim group located in the Caucus Mountains started an independence movement. Resisting Russian rule, this group has been responsible for many terror attacks including, bombings, suicide bombings, sieges and the killing of innocent people. (Mcevers 2006) The group is well known for violent tactics and having absolutely no regard for human life including their own. The extreme measures taken over the years have shown to be true especially at School number one in Beslan. At approximately 9:00 AM almost 1,200 individuals at the celebration were forced into the school by masked armed militants. Immediately upon entering they began killing a group of boys while wiring the gymnasium area with explosives. Children were used as human shields to cover exposed windows and more boys who may have...

Words: 1695 - Pages: 7

Free Essay

Icrc-an Analysis of Culture

...will explore these challenges, venture to answer the question of whether the ICRC’s culture helps or hinders its evolving strategies, and discuss the implications of these challenges on Human Resource Management. The mission of the ICRC is that it is “an impartial, neutral and independent organization whose exclusively humanitarian mission is to protect the lives and dignity of victims of war and internal violence and to provide them with assistance. It directs and coordinates the international relief activities conducted by the Movement in situations of conflict. It also endeavors to prevent suffering by promoting and strengthening humanitarian law and universal humanitarian principles (www.icrc.org).” It seeks to achieve this mission through three main activities, protection, assistance and prevention. The ICRC’s reputation as a “western” and therefore US/UN associated organization can sometimes hinder its ability to be effective in areas in which the United States is involved in...

Words: 2371 - Pages: 10

Premium Essay

Criminology

...definition is that terrorism is an illegal act that affects an audience further than the direct victim. The tactic of terrorists is to perform acts of bloodshed that draw interest of the government, population and the world at large. Terrorists prepare their attack to get the largest publicity, selecting targets that signify what they resist. The success of a terror attack lies, not on the attack, but in the government’s or public’s response to the act (Larry, 2011). There are three views of terrorism; the victim’s, the terrorist’s and the public. The expression “one person’s terrorist is another person’s” freedom fighter’ is perspective terrorists would embrace. Terrorists do not regard themselves as wicked. They consider themselves as fighters, fighting for what they trust in, by any means possible. Victims of terrorist acts view the terrorists as evil with no consideration to human existence. The public’s perspective is the most unbalanced because people view terrorism acts differently. Terrorism is an essential part of mental warfare and requires to be opposed vigorously (Weisburd, 2009). Law makers, scholars and security experts have defined different forms of terrorism. These forms of terrorism vary according to the attack means the attacker uses (for instance biological) or by what they are opposing (eco-terrorism). State terrorism; states can be terrorists. States can use force without pronouncing war to terrorize nationals and attain a political mission. States take part...

Words: 2463 - Pages: 10

Premium Essay

C-Tpat and the Asian Consumer Electronic Products

...-Trade Partnership Against Terrorism (C-TPAT) Requirements within Procurement Strategies for a USA-Asian Supply Chain of Consumer Electronic Products Abstract “The Customs-Trade Partnership Against Terrorism (C-TPAT) was created by U.S. Customs and Border Protection (CBP) in direct response to the terrorist attacks that were launched against the United States on September 11, 2001”(www.ctpat.com), to enforce this in shipping of goods from foreign entities. Asia a leader in consumer electronic had to find ways to ship the products also combating the requirements set by CBP. This paper explains what C-TPAT does and ways Asia and other foreign entities can comply with C-TPAT. Introduction CBP established C-TPAT in an attempt to secure and safeguard the integrity of U.S. borders against future attacks by terrorists who might seek to further their terrorist activities by hijacking containers entering the United States and using such containers to smuggle in conventional arms or chemical or biological weapons. In seeking to secure and safeguard U.S. borders against future terrorist attacks, C-TPAT focuses on enlisting the cooperation and participation of all parties involved in shipping products to or importing products into the United States. “The USA Patriot Act, signed into law October, 2001, inspections at ports, regulated airport screening, and heightened at land-based border crossings. This act resulted in a widespread implementation of voluntary initiatives between...

Words: 2225 - Pages: 9