首页 > 最新文献

Journal of Policing, Intelligence and Counter Terrorism最新文献

英文 中文
Super- (and hyper-) posters on extremist forums 极端主义论坛上的超级海报
Q1 Social Sciences Pub Date : 2022-07-30 DOI: 10.1080/18335330.2022.2103386
Stephane J. Baele, Lewys Brace, Travis G. Coan, Elahe Naserian
ABSTRACT This paper examines patterns of posting behaviour on extremist online forums in order to empirically identify and define classes of highly active ‘super-posters'. Using a unique dataset of 8 far-right, 7 Salafi-jihadist, and 2 Incel forums, totalling 12,569,639 unique posts, the study operates a three-dimensional analysis of super-posters (Gini coefficient, Fisher-Jenks algorithm, network analysis) that sheds light on the type of influence at play in these online spaces. Our study shows that extremist forums consistently display four statistically distinguishable classes of posters from the least active ‘hypo-posters' to the most active ‘hyper-posters', as well as demonstrating that, while hyper-posters’ activity is remarkable, they are not necessarily the most central or connected members of extremist forums. These findings, which suggest that extremist forums are places where both minority and majority influences occur, not only advance our understanding of a key locus of online radicalisation; they also pave the way for sounder interventions to monitor and disrupt the phenomenon.
摘要本文研究了极端主义网络论坛上的发帖行为模式,以从经验上识别和定义高度活跃的“超级海报”类别。该研究使用了一个由8个极右翼、7个萨拉菲圣战者和2个Incel论坛组成的独特数据集,共有12569639个独特帖子,对超级海报进行了三维分析(基尼系数、费雪-詹克斯算法、网络分析),揭示了这些在线空间中的影响力类型。我们的研究表明,极端主义论坛一贯显示四类在统计上可区分的海报,从最不活跃的“次海报”到最活跃的“超级海报”,并表明,尽管超级海报的活动引人注目,但他们不一定是极端主义论坛中最核心或最有联系的成员。这些发现表明,极端主义论坛是少数人和多数人都会受到影响的地方,这不仅促进了我们对网络激进主义关键所在地的理解;它们还为更健全的干预措施铺平了道路,以监测和破坏这一现象。
{"title":"Super- (and hyper-) posters on extremist forums","authors":"Stephane J. Baele, Lewys Brace, Travis G. Coan, Elahe Naserian","doi":"10.1080/18335330.2022.2103386","DOIUrl":"https://doi.org/10.1080/18335330.2022.2103386","url":null,"abstract":"ABSTRACT This paper examines patterns of posting behaviour on extremist online forums in order to empirically identify and define classes of highly active ‘super-posters'. Using a unique dataset of 8 far-right, 7 Salafi-jihadist, and 2 Incel forums, totalling 12,569,639 unique posts, the study operates a three-dimensional analysis of super-posters (Gini coefficient, Fisher-Jenks algorithm, network analysis) that sheds light on the type of influence at play in these online spaces. Our study shows that extremist forums consistently display four statistically distinguishable classes of posters from the least active ‘hypo-posters' to the most active ‘hyper-posters', as well as demonstrating that, while hyper-posters’ activity is remarkable, they are not necessarily the most central or connected members of extremist forums. These findings, which suggest that extremist forums are places where both minority and majority influences occur, not only advance our understanding of a key locus of online radicalisation; they also pave the way for sounder interventions to monitor and disrupt the phenomenon.","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"243 - 281"},"PeriodicalIF":0.0,"publicationDate":"2022-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41589039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An actor-based approach to understanding radical right viral tweets in the UK 以演员为基础的方法来理解英国激进右翼的病毒式推文
Q1 Social Sciences Pub Date : 2022-06-20 DOI: 10.1080/18335330.2022.2086440
Laila Sprejer, H. Margetts, Kleber Oliveira, David J. P. O'Sullivan, Bertie Vidgen
ABSTRACT Radical right actors routinely use social media to spread highly divisive, disruptive, and anti-democratic messages. Assessing and countering such content is crucial for ensuring that online spaces can be open, accessible, and constructive. However, previous work has paid little attention to understanding factors associated with radical right content that goes viral. We investigate this issue with a new dataset (the ‘ROT' dataset) which provides insight into the content, engagement, and followership of a set of 35 radical right actors who are active in the UK. ROT contains over 50,000 original entries and over 40 million retweets, quotes, replies and mentions, as well as detailed information about followership. We use a multilevel model to assess engagement with tweets and show the importance of both actor- and content-level factors, including the number of followers each actor has, the toxicity of their content, the presence of media and explicit requests for retweets. We argue that it is crucial to account for role of actors in radical right viral tweets, and therefore, moderation efforts should be taken not only on a post-to-post level but also on an account level.
摘要激进右翼行为者经常利用社交媒体传播极具分裂性、破坏性和反民主的信息。评估和打击此类内容对于确保在线空间的开放性、可访问性和建设性至关重要。然而,之前的工作很少关注理解与传播开来的激进右翼内容相关的因素。我们使用一个新的数据集(“ROT”数据集)来调查这个问题,该数据集深入了解了活跃在英国的35名激进右翼行为者的内容、参与度和关注度。ROT包含50000多个原创条目和4000多万条转发、引用、回复和提及,以及关于关注度的详细信息。我们使用多层次模型来评估推文的参与度,并显示演员和内容层面因素的重要性,包括每个演员的粉丝数量、内容的毒性、媒体的存在和明确的转发请求。我们认为,至关重要的是要考虑到激进右翼病毒推文中行为者的作用,因此,不仅应该在帖子到帖子的层面上,而且应该在账户层面上采取节制措施。
{"title":"An actor-based approach to understanding radical right viral tweets in the UK","authors":"Laila Sprejer, H. Margetts, Kleber Oliveira, David J. P. O'Sullivan, Bertie Vidgen","doi":"10.1080/18335330.2022.2086440","DOIUrl":"https://doi.org/10.1080/18335330.2022.2086440","url":null,"abstract":"ABSTRACT Radical right actors routinely use social media to spread highly divisive, disruptive, and anti-democratic messages. Assessing and countering such content is crucial for ensuring that online spaces can be open, accessible, and constructive. However, previous work has paid little attention to understanding factors associated with radical right content that goes viral. We investigate this issue with a new dataset (the ‘ROT' dataset) which provides insight into the content, engagement, and followership of a set of 35 radical right actors who are active in the UK. ROT contains over 50,000 original entries and over 40 million retweets, quotes, replies and mentions, as well as detailed information about followership. We use a multilevel model to assess engagement with tweets and show the importance of both actor- and content-level factors, including the number of followers each actor has, the toxicity of their content, the presence of media and explicit requests for retweets. We argue that it is crucial to account for role of actors in radical right viral tweets, and therefore, moderation efforts should be taken not only on a post-to-post level but also on an account level.","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"139 - 157"},"PeriodicalIF":0.0,"publicationDate":"2022-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49252180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Strengthening DHS intelligence analysis education: core competencies, gaps, and challenges 加强国土安全部情报分析教育:核心能力、差距和挑战
Q1 Social Sciences Pub Date : 2022-05-08 DOI: 10.1080/18335330.2022.2069475
Michelle Black, Lana Obradovic
{"title":"Strengthening DHS intelligence analysis education: core competencies, gaps, and challenges","authors":"Michelle Black, Lana Obradovic","doi":"10.1080/18335330.2022.2069475","DOIUrl":"https://doi.org/10.1080/18335330.2022.2069475","url":null,"abstract":"","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45805584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Humour, trust, and tacit knowledge of police and border officers in international police collaboration 警察和边境官员在国际警察合作中的幽默、信任和默契
Q1 Social Sciences Pub Date : 2022-04-30 DOI: 10.1080/18335330.2022.2069474
Sophia Yakhlef
ABSTRACT Previous studies have highlighted the significant role played by what is referred to as the ‘police gaze’, or the set of tacit skills that police officers use in their everyday work to scan the environment, to identify sources of threats or suspects on the streets. The present study suggests that the police gaze can also be used among police officers who do not know one another and do not know whom to trust and who not to trust. This is even more so in collaborative contexts that require the sharing of sensitive information and knowledge, such as in police intelligence work. The aim of the present paper is to suggest how intelligence officers use jokes and humour to identify whom to trust and whom not to trust. Not only is humour used as a social basis for building a sense of group identity and developing better interpersonal collaboration skills, but it is also used to test which colleagues are more trustworthy than others. The paper ends with conclusions, implications, and suggestions for further studies.
摘要先前的研究强调了所谓的“警察凝视”所发挥的重要作用,即警察在日常工作中使用的一套隐性技能,以扫描环境,识别街头威胁或嫌疑人的来源。本研究表明,警察的凝视也可以用于彼此不认识、不知道该信任谁和不信任谁的警察。在需要共享敏感信息和知识的合作环境中更是如此,例如在警察情报工作中。本文的目的是建议情报官员如何利用笑话和幽默来确定谁应该信任,谁不应该信任。幽默不仅被用作建立群体认同感和培养更好的人际协作技能的社会基础,而且还被用来测试哪些同事比其他人更值得信赖。文章最后给出了结论、启示和进一步研究的建议。
{"title":"Humour, trust, and tacit knowledge of police and border officers in international police collaboration","authors":"Sophia Yakhlef","doi":"10.1080/18335330.2022.2069474","DOIUrl":"https://doi.org/10.1080/18335330.2022.2069474","url":null,"abstract":"ABSTRACT\u0000 Previous studies have highlighted the significant role played by what is referred to as the ‘police gaze’, or the set of tacit skills that police officers use in their everyday work to scan the environment, to identify sources of threats or suspects on the streets. The present study suggests that the police gaze can also be used among police officers who do not know one another and do not know whom to trust and who not to trust. This is even more so in collaborative contexts that require the sharing of sensitive information and knowledge, such as in police intelligence work. The aim of the present paper is to suggest how intelligence officers use jokes and humour to identify whom to trust and whom not to trust. Not only is humour used as a social basis for building a sense of group identity and developing better interpersonal collaboration skills, but it is also used to test which colleagues are more trustworthy than others. The paper ends with conclusions, implications, and suggestions for further studies.","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"658 ","pages":"174 - 188"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41315025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disaggregating religiously motivated terrorism: ideology as a frame for strategic behaviour in Islamist and Christian fundamentalist terrorism 分解宗教动机的恐怖主义:意识形态作为伊斯兰和基督教原教旨主义恐怖主义战略行为的框架
Q1 Social Sciences Pub Date : 2022-04-25 DOI: 10.1080/18335330.2022.2045622
Brittnee Carter, Ranya Ahmed, Cagil Albayrak, Maya Van Nuys
ABSTRACT Scholars consistently suggest that religiously motivated terrorist groups are more violent and more lethal. This necessarily drives questions about how religious ideology is connected to outcomes of terrorist group behaviour. This study examines how variations in religious ideology may influence strategic choices like target selection, tactic adoption, and the lethality of attacks. Terrorism motivated by Islamism and Christian fundamentalism are examined theoretically and empirically in a framework that allows for comparison across the groups within the same analysis. Though our results support existing claims that religiously motivated terrorism is more likely to target civilians, we find inter-religious differences in tactic adoption and secondary target selection. Finally, while we do find evidence that Islamist terrorism is likely more lethal than secular terrorism, Christian fundamentalist terrorism yields a higher expected casualty rate per attack when compared within the same model.
学者们一致认为,出于宗教动机的恐怖组织更暴力,更致命。这必然会引发人们对宗教意识形态与恐怖组织行为结果之间的联系的质疑。这项研究考察了宗教意识形态的变化如何影响战略选择,如目标选择、战术采用和袭击的致命性。以伊斯兰主义和基督教原教旨主义为动机的恐怖主义在一个框架内进行了理论和实证研究,该框架允许在同一分析中对不同群体进行比较。尽管我们的研究结果支持了现有的说法,即出于宗教动机的恐怖主义更有可能以平民为目标,但我们发现,在战术采用和次要目标选择方面,宗教间存在差异。最后,尽管我们确实发现了伊斯兰恐怖主义可能比世俗恐怖主义更致命的证据,但与同一模型相比,基督教原教旨主义恐怖主义每次袭击的预期伤亡率更高。
{"title":"Disaggregating religiously motivated terrorism: ideology as a frame for strategic behaviour in Islamist and Christian fundamentalist terrorism","authors":"Brittnee Carter, Ranya Ahmed, Cagil Albayrak, Maya Van Nuys","doi":"10.1080/18335330.2022.2045622","DOIUrl":"https://doi.org/10.1080/18335330.2022.2045622","url":null,"abstract":"ABSTRACT Scholars consistently suggest that religiously motivated terrorist groups are more violent and more lethal. This necessarily drives questions about how religious ideology is connected to outcomes of terrorist group behaviour. This study examines how variations in religious ideology may influence strategic choices like target selection, tactic adoption, and the lethality of attacks. Terrorism motivated by Islamism and Christian fundamentalism are examined theoretically and empirically in a framework that allows for comparison across the groups within the same analysis. Though our results support existing claims that religiously motivated terrorism is more likely to target civilians, we find inter-religious differences in tactic adoption and secondary target selection. Finally, while we do find evidence that Islamist terrorism is likely more lethal than secular terrorism, Christian fundamentalist terrorism yields a higher expected casualty rate per attack when compared within the same model.","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"72 - 94"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47612633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genetic Surveillance and Crime Control: Social, Cultural and Political Perspectives 基因监测与犯罪控制:社会、文化和政治视角
Q1 Social Sciences Pub Date : 2022-04-17 DOI: 10.1080/18335330.2022.2063697
Ryan Shaffer
{"title":"Genetic Surveillance and Crime Control: Social, Cultural and Political Perspectives","authors":"Ryan Shaffer","doi":"10.1080/18335330.2022.2063697","DOIUrl":"https://doi.org/10.1080/18335330.2022.2063697","url":null,"abstract":"","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"240 - 241"},"PeriodicalIF":0.0,"publicationDate":"2022-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42787662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The integration of statistical learning in intelligence education: is the academy equipping tomorrow’s intelligence professionals to analyze data-centric threats? 情报教育中统计学习的整合:学院是否为未来的情报专业人员提供了分析以数据为中心的威胁的能力?
Q1 Social Sciences Pub Date : 2022-04-10 DOI: 10.1080/18335330.2022.2048965
James Ramsay, A. Macpherson
{"title":"The integration of statistical learning in intelligence education: is the academy equipping tomorrow’s intelligence professionals to analyze data-centric threats?","authors":"James Ramsay, A. Macpherson","doi":"10.1080/18335330.2022.2048965","DOIUrl":"https://doi.org/10.1080/18335330.2022.2048965","url":null,"abstract":"","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43120472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indonesia’s response to returning foreign fighters: network affiliation as basis for risk assessment 印度尼西亚对回国的外国战斗人员的反应:网络隶属关系作为风险评估的基础
Q1 Social Sciences Pub Date : 2022-03-07 DOI: 10.1080/18335330.2022.2037690
A. Wibisono, Iwa Maulana
ABSTRACT Council has mandated member-states pursue criminal prosecution, rehabilitation and reintegration of foreign terrorist fighters (FTFs), the state’s capacity has been limited and there has been public demand to prioritise security over reintegration. The Indonesian public remains divided in terms of facilitating the returnees’ reintegration and rejecting their return for the sake of public security, the government’s response showed an effort to comply with international norms in creating a guided process of rehabilitation and reintegration alongside criminal prosecution of returning foreign fighters. This study uses a dataset of Indonesia’s returning FTFs who joined the Islamic State in Syria and Iraq (ISIS) between 2015 and 2020 and were prosecuted on their return. This study finds that terrorist network affiliation has been used in the criminal prosecution of returning foreign fighters to determine the degree of risk that they carried. The use of network affiliation is due to the lack of capacity on the state to collect and present evidence of foreign fighting in court. The Indonesian case study showcases the nature of the problem of responding to foreign fighters when the state has limited resources and capacity.
摘要:安理会已授权成员国对外国恐怖分子进行刑事起诉、康复和重返社会,但该国的能力有限,公众要求将安全置于重返社会之上。印度尼西亚公众在为回返者重返社会提供便利和出于公共安全考虑拒绝他们返回方面仍然存在分歧,政府的回应表明,政府努力遵守国际规范,建立一个有指导的康复和重返社会进程,同时对返回的外国战斗人员进行刑事起诉。这项研究使用了2015年至2020年间加入叙利亚和伊拉克伊斯兰国(ISIS)并在回国时被起诉的印度尼西亚回国自由贸易基金的数据集。这项研究发现,在对回国的外国战士的刑事起诉中,恐怖主义网络的隶属关系被用来确定他们所携带的风险程度。使用网络隶属关系是由于国家缺乏在法庭上收集和出示外国战斗证据的能力。印尼的案例研究展示了在国家资源和能力有限的情况下应对外国战斗人员问题的性质。
{"title":"Indonesia’s response to returning foreign fighters: network affiliation as basis for risk assessment","authors":"A. Wibisono, Iwa Maulana","doi":"10.1080/18335330.2022.2037690","DOIUrl":"https://doi.org/10.1080/18335330.2022.2037690","url":null,"abstract":"ABSTRACT Council has mandated member-states pursue criminal prosecution, rehabilitation and reintegration of foreign terrorist fighters (FTFs), the state’s capacity has been limited and there has been public demand to prioritise security over reintegration. The Indonesian public remains divided in terms of facilitating the returnees’ reintegration and rejecting their return for the sake of public security, the government’s response showed an effort to comply with international norms in creating a guided process of rehabilitation and reintegration alongside criminal prosecution of returning foreign fighters. This study uses a dataset of Indonesia’s returning FTFs who joined the Islamic State in Syria and Iraq (ISIS) between 2015 and 2020 and were prosecuted on their return. This study finds that terrorist network affiliation has been used in the criminal prosecution of returning foreign fighters to determine the degree of risk that they carried. The use of network affiliation is due to the lack of capacity on the state to collect and present evidence of foreign fighting in court. The Indonesian case study showcases the nature of the problem of responding to foreign fighters when the state has limited resources and capacity.","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"122 - 134"},"PeriodicalIF":0.0,"publicationDate":"2022-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49091600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ideologically motivated mass shootings: a crime script analysis of far-right, far-left, and jihadist-inspired attacks in the United States 意识形态驱动的大规模枪击事件:对美国极右翼、极左翼和圣战分子发动的袭击的犯罪脚本分析
Q1 Social Sciences Pub Date : 2022-02-22 DOI: 10.1080/18335330.2022.2039402
Jason R. Silva
ABSTRACT This study uses a crime script analysis to examine far-right, far-left, and jihadist-inspired ideologically motivated mass shooters (IMMS) in the US (1970-2019). This work provides a comparison of incident rates and shooter backgrounds, as well as the preparation, execution, and conclusion of attacks. When comparing the three IMMS types, findings indicate far-right incidents were most common, far-left shooters were largely Black Nationalists, and jihadist-inspired shooters had more success in life (college graduates, employed, married, parents). During initial preparation, IMMS often leaked violent intentions and had facilitating conditions including criminal, domestic violence, and military histories. Jihadist-inspired shooters had more planning, and far-left shooters often accessed guns illegally. During attack execution, IMMS incidents often occurred in the South and involved open-space and/or unrestricted access locations. Jihadist-inspired shooters targeted government locations more often, while far-left incidents often occurred outside with law enforcement on the scene. During attack conclusion, IMMS incidents often ended quickly and involved gunfire with police. Jihadist-inspired shooters had a higher rate of victim casualties, and far-left shooters had a higher rate of police casualties. Far-right shooters had a higher number of victim and police casualties overall. A discussion of findings contextualises IMMS threats and explores strategies for countering the phenomenon.
摘要本研究使用犯罪脚本分析来考察美国(1970-2019年)极右翼、极左翼和圣战分子启发的意识形态动机的大规模枪击案。这项工作提供了事件发生率和枪手背景的比较,以及攻击的准备、执行和结论。在比较这三种IMMS类型时,研究结果表明,极右翼事件最为常见,极左翼枪手主要是黑人民族主义者,圣战分子启发的枪手在生活中更成功(大学毕业生、就业者、已婚者、父母)。在最初的准备过程中,IMMS经常泄露暴力意图,并提供便利条件,包括犯罪、家庭暴力和军事历史。受圣战主义启发的枪手有更多的计划,极左翼枪手经常非法获取枪支。在攻击执行期间,IMMS事件经常发生在南部,涉及开放空间和/或不受限制的访问位置。受圣战分子启发的枪手更经常以政府地点为目标,而极左翼事件经常发生在执法部门在场的情况下。在袭击结束期间,IMMS事件往往很快结束,并涉及与警方的交火。受圣战分子启发的枪手的受害者伤亡率更高,极左翼枪手的警察伤亡率也更高。总体而言,极右翼枪手的受害者和警察伤亡人数更高。对调查结果的讨论结合了IMMS的威胁,并探讨了应对这一现象的策略。
{"title":"Ideologically motivated mass shootings: a crime script analysis of far-right, far-left, and jihadist-inspired attacks in the United States","authors":"Jason R. Silva","doi":"10.1080/18335330.2022.2039402","DOIUrl":"https://doi.org/10.1080/18335330.2022.2039402","url":null,"abstract":"ABSTRACT This study uses a crime script analysis to examine far-right, far-left, and jihadist-inspired ideologically motivated mass shooters (IMMS) in the US (1970-2019). This work provides a comparison of incident rates and shooter backgrounds, as well as the preparation, execution, and conclusion of attacks. When comparing the three IMMS types, findings indicate far-right incidents were most common, far-left shooters were largely Black Nationalists, and jihadist-inspired shooters had more success in life (college graduates, employed, married, parents). During initial preparation, IMMS often leaked violent intentions and had facilitating conditions including criminal, domestic violence, and military histories. Jihadist-inspired shooters had more planning, and far-left shooters often accessed guns illegally. During attack execution, IMMS incidents often occurred in the South and involved open-space and/or unrestricted access locations. Jihadist-inspired shooters targeted government locations more often, while far-left incidents often occurred outside with law enforcement on the scene. During attack conclusion, IMMS incidents often ended quickly and involved gunfire with police. Jihadist-inspired shooters had a higher rate of victim casualties, and far-left shooters had a higher rate of police casualties. Far-right shooters had a higher number of victim and police casualties overall. A discussion of findings contextualises IMMS threats and explores strategies for countering the phenomenon.","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"1 - 23"},"PeriodicalIF":0.0,"publicationDate":"2022-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42626165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lessons learned from dual site formative evaluations of Countering violent extremism (CVE) programming co-led by Canadian police 从加拿大警方共同领导的打击暴力极端主义方案的双站点形成性评估中汲取的经验教训
Q1 Social Sciences Pub Date : 2022-02-21 DOI: 10.1080/18335330.2022.2040741
Sara K. Thompson, E. Leroux
ABSTRACT Drawing on lessons learned from recently completed formative evaluations of police co-led CVE programming in Toronto, Ontario and Calgary, Alberta, this research aims to underscore the importance of, and provide technical guidance on, evaluation and reporting standards in the context of multi-agency CVE programming – which ultimately will help to facilitate the identification and replication of good practice. The results of the evaluative process highlight the need for greater articulation regarding intended program outcomes as well as program theorising regarding the underlying mechanisms that connect program activities and outputs with said intended outcomes. Both evaluations also demonstrated the importance of prioritising collaboration at both the evaluation-level and the program-level to facilitate successful and robust program implementation. As such, this study also yields findings that speak to the beneficial role that the evaluative process itself can play in facilitating the evolution of CVE programming.
摘要:根据最近在安大略省多伦多和阿尔伯塔省卡尔加里完成的警察联合领导的CVE规划形成性评估的经验教训,本研究旨在强调在多机构CVE规划背景下评估和报告标准的重要性,并提供技术指导,最终将有助于促进识别和复制良好做法。评估过程的结果突出表明,需要对计划预期结果进行更清晰的表述,并对将计划活动和产出与预期结果联系起来的潜在机制进行计划理论化。这两项评估还证明了在评估级别和计划级别优先合作的重要性,以促进成功和稳健的计划实施。因此,本研究也得出了一些结果,说明了评估过程本身在促进CVE编程的发展中所起的有益作用。
{"title":"Lessons learned from dual site formative evaluations of Countering violent extremism (CVE) programming co-led by Canadian police","authors":"Sara K. Thompson, E. Leroux","doi":"10.1080/18335330.2022.2040741","DOIUrl":"https://doi.org/10.1080/18335330.2022.2040741","url":null,"abstract":"ABSTRACT\u0000 Drawing on lessons learned from recently completed formative evaluations of police co-led CVE programming in Toronto, Ontario and Calgary, Alberta, this research aims to underscore the importance of, and provide technical guidance on, evaluation and reporting standards in the context of multi-agency CVE programming – which ultimately will help to facilitate the identification and replication of good practice. The results of the evaluative process highlight the need for greater articulation regarding intended program outcomes as well as program theorising regarding the underlying mechanisms that connect program activities and outputs with said intended outcomes. Both evaluations also demonstrated the importance of prioritising collaboration at both the evaluation-level and the program-level to facilitate successful and robust program implementation. As such, this study also yields findings that speak to the beneficial role that the evaluative process itself can play in facilitating the evolution of CVE programming.","PeriodicalId":37849,"journal":{"name":"Journal of Policing, Intelligence and Counter Terrorism","volume":"18 1","pages":"24 - 42"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44519936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Policing, Intelligence and Counter Terrorism
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1