SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Statement of
Erroll G. Southers
Associate Director of Research Transition
National Homeland Security Center for Risk & Economic Analysis of Terrorism Events
Adjunct Professor, Sol Price School of Public Policy
University of Southern California
Before the
One Hundred Thirteenth Congress
United States House of Representatives
Committee on Homeland Security
“The Boston Bombings: A First Look”
Presented on
May 9, 2013
Members of the Committee, thank you for inviting me to appear before you today. It is extremely
unfortunate and saddening that our gathering and important conversations were precipitated by
the tragic events in Boston, but this hearing, and those to follow, offer valuable opportunities to
discuss the methods and strategies that can best address and disrupt the ever-present threat of
terrorism and violent extremism. My deepest condolences, thoughts and prayers go to the victims
of this cowardly act.
The Boston Marathon bombing was conducted by terrorists who grew up within miles of where
they committed their tragedy. They were locals, educated, living and working in the area.
Because of this, they knew the target environment and did not require training to familiarize
themselves with the area and its protective measures. Put simply, Tamerlan and Dzhokhar
Tsarnaev were homegrown violent extremists, and because of them, Boston joined a fraternity of
cities around the world that have endured terrorist attacks plotted and conducted by their own
residents. Much like the Madrid train bombings in March 2004, as well as the July 2005
bombings in London, the terrorists’ familiarity with the target area afforded them critical
situational awareness that facilitated their ability to plan and execute local attacks, as well as the
capacity to remain largely unidentified by our counterterrorism efforts until after the attack.
Superseding the issue of how the Tsarnaev brothers were able to succeed is a matter how they
arrived at the decision to attack in the first place. The Tsarnaevs came to the United States long
before embracing the ideology that, in their minds, legitimized their violent activity. As a starting
point for any analysis on this tragic incident, it is essential that law enforcement,
counterterrorism agencies, the members of this committee, and the country overall understand
that the Tsarnaev brothers became terrorists in this country and were thus homegrown, even as
the extremist ideology to which they ascribed was likely influenced by ideas created and
embraced elsewhere in the world. The Boston attacks were not a case of foreign-borne terrorism,
but rather, of homegrown violent extremism (HVE).
The Complex Radicalization Process
In the context of the United States, HVE describes terrorist activity or plots targeting the United
States and U.S. assets by American citizens or residents who have embraced their extremist
ideology largely within this country. A precursor to HVE is a process of radicalization, though
like the term “terrorism,” the concept of radicalization is widely referenced but remains poorly
defined. The term is routinely used as a synonym for extremist activities conducted by Muslim
Identity adherents. This is shortsighted, as radicalization is not limited to any one racial, religious
or issue-oriented group. Radicalization is a process whereby individuals identify, embrace and
engage in furthering extremist ideologies. This final element – engagement – is one part of the
indoctrination pathway continuum, which has the potential to yield violent extremist activities.
To be sure, many people who hold extremist views do not engage in violent activity. The
Constitution protects speech, even hate speech, which is inherently extremist. In that regard, we
should be mindful of the totality of circumstances that create the capacity for violent incidents
and avoid a narrow focus on the presence of extremist ideologies in general. Little attention has
been given in the scholarly or policy literature to defining criteria for which extremist ideologies
pose a threat to national or global security, or whether extremist ideologies matter in the absence
of violent actions. A 2009 U.S. Presidential Task Force on Confronting the Ideology of Radical
Extremism suggests the administration should expand its focus from violent to nonviolent
extremism.1
This is an important distinction deserving further analysis, and perhaps an even
more important issue is how an individual identifies and embraces extremism to begin with.
Indiscriminant violent action can be the result of radicalization, but the process often begins with
a “cognitive opening” that is unique to the individual. This opening may be a traumatic event
that makes someone more susceptible to accepting extremist ideology. It is as if a “grievance
switch” is flipped on, grievances that can stem from myriad experiences and perceptions, such as
conflicted identities, injustice, oppression, or socio-economic exclusion. Personal grievances
may be economic (such as losing a job or stinted mobility), social or cultural (such as racism or
humiliation), or political (such as discrimination). Some grievances incorporate a sense of
victimization by crime, including a perceived crime committed by the United States government,
as was the case with Timothy McVeigh and his view of the government standoff events of
Whidbey Island (1984), Ruby Ridge (1992) and Waco (1993).
While understanding and addressing these grievances is one potential avenue for predicting and
preventing violent extremism, the radicalization pathway is not a fixed trajectory, with specific,
identifiable indicators that can be acknowledged on an itemized checklist of suspicious activities.
Caution should be exercised against viewing radicalization as a conveyor belt that starts with
grievances and ends with violence, with easily discernible signposts along the way.2
Rather, a
more effective approach is to identify the circumstances under which an individual can progress
to violence through the radicalization process yet beneath the homeland security radar.
An examination of radicalization yields broad questions regarding how a person becomes
engaged, stays engaged or may actually disengage from a group or extremist ideology. Terrorism
requires a combination of three things – an alienated individual, a legitimizing ideology (engaged
through radicalization), and an enabling environment. Of the three, it is the environment that is
most susceptible to positive influences that, supported by appropriate policies and behaviors, can
reduce the risk of HVE.
Our security policies and technologies are an essential component in the never-ending
counterterrorism effort. Yet, as we encounter the threat from homegrown violent extremism,
such as the kind seen in Boston, our national efforts should also address the role communities
play in facilitating and more importantly, hindering radicalization.
Risk-Based Security and Positive Community Engagement
As law enforcement and counterterrorism officials analyze the Boston Marathon attacks, we
should resist the urge to “fix” something, absent specific evidence of some failure or
compromise of the system. Boston’s is one of the most famous marathons in the world, which
from a national security and law enforcement perspective, brings with it a range of protective
measures afforded to a Department of Homeland Security (DHS) National Special Security
Event (NSSE).
																																																								
1
Task Force on Confronting the Ideology of Radical Extremism (March 2009). Rewriting the Narrative: An
Integrated Strategy for Counterradicalization. Washington, D.C.: Washington Institute for Near East Policy.
2
Patel, Faiza (2011). Rethinking Radicalization. Brennan Center for Justice at New York University School of Law.
Security is comprised of policies, processes and technology. As it relates to environments like
sporting events or critical infrastructure, the emphasis should be on policies that are risk-based –
that is, focused on threats that present the most danger and are most likely to occur. We have the
applied research capacity to and do model potential attack paths, given the desirability or utility
yielded to an adversary. Interdisciplinary methodologies, such as our successful application of
game theory and randomization, will continue to hold significant importance in holistic
countermeasure strategies.
At the same time, recognizing that the goal is to contain terrorism and not simply stop terrorists,
we should seek out opportunities to empower communities to take part in disrupting the
radicalization process that could ultimately lead to violent action. Community inaction, either
through tacit approval of extremist ideas or a hesitancy to speak up when encountering an
individual exploring a legitimizing ideology, provides an enabling environment. Inasmuch as we
strive to intercept individuals in their transition from ideological extremist to violent adversary,
we should also work with communities where such threats may arise to disrupt the radicalization
process altogether, both by addressing grievances, and by recognizing and encouraging
stakeholder engagement.
One challenge in this case is the role online media can play in fostering violent extremism.
Arguably, the Internet’s capacity for propelling extremists through the radicalization process is
the single most important and dangerous innovation since the terrorist attacks of September 11,
2001. The Internet is in some ways a virtual community, and future attacks against the United
States and its interests will likely involve adversaries who have traversed the radicalization
process, at least in part, via the Internet. Inasmuch as real-world communities can take part in
preventing or facilitating violent extremism, the same is true for the digital environment.
Securing a democratic society is a formidable challenge, and we will never be completely free of
the terrorist threat. In the aftermath of tragedies like Boston, the public is generally amenable to
sacrificing certain liberties in the name of security. However, we must live by our principles,
which in the United States are upheld by the rule of law. To alter our government’s use and
amendment of law with a reactive policy response to a terrorist threat is to concede victory to the
adversary. What is more, singling out a person or entire community as suspect based on anything
other than fact undermines the community cohesion we need to counter the persistent threat.
Collective vigilance and awareness of how grievances can make individuals susceptible to
extremist ideas are fundamental tools that, when employed by counterterrorism officials as well
as the public, provide essential supplements to the broader mission of preventing tragedies of the
kind seen in Boston. Protecting the country is an ongoing effort that must remain versatile in the
face of creative and adaptive adversaries. Every step towards greater security is matched with a
would-be terrorist’s exploitation of an unaddressed vulnerability. There is no finish line in
homeland security.

Contenu connexe

Tendances

474 2015 terrorism political psychology
474 2015 terrorism political psychology474 2015 terrorism political psychology
474 2015 terrorism political psychologympeffl
 
Psychology of extremism and terrorism
Psychology of extremism and terrorismPsychology of extremism and terrorism
Psychology of extremism and terrorismMuhammad Musawar Ali
 
International terrorism scope, causes and the role of education in combating ...
International terrorism scope, causes and the role of education in combating ...International terrorism scope, causes and the role of education in combating ...
International terrorism scope, causes and the role of education in combating ...SARON MESSEMBE OBIA
 
SOCIAL PROBLEM :TERRORISM
SOCIAL PROBLEM :TERRORISMSOCIAL PROBLEM :TERRORISM
SOCIAL PROBLEM :TERRORISMFatima Gul
 
Media & Terrorism
Media & TerrorismMedia & Terrorism
Media & TerrorismFizza Rizvi
 
473 2016 demo theories and public opinion
473 2016 demo theories and public opinion473 2016 demo theories and public opinion
473 2016 demo theories and public opinionmpeffl
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorismRobbie Fordyce
 
Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism Mian Muhammad Zafar
 
Online Assignment
Online AssignmentOnline Assignment
Online AssignmentArun Murali
 
Terrorism and mental health: what should the psychiatrists know?
Terrorism and mental health: what should the psychiatrists know?Terrorism and mental health: what should the psychiatrists know?
Terrorism and mental health: what should the psychiatrists know?Yasir Hameed
 
Identity and terrorism
Identity and terrorismIdentity and terrorism
Identity and terrorismJaseme_Otoyo
 

Tendances (20)

474 2015 terrorism political psychology
474 2015 terrorism political psychology474 2015 terrorism political psychology
474 2015 terrorism political psychology
 
Psychology of extremism and terrorism
Psychology of extremism and terrorismPsychology of extremism and terrorism
Psychology of extremism and terrorism
 
International terrorism scope, causes and the role of education in combating ...
International terrorism scope, causes and the role of education in combating ...International terrorism scope, causes and the role of education in combating ...
International terrorism scope, causes and the role of education in combating ...
 
Terrorism
TerrorismTerrorism
Terrorism
 
April2011_Policy Brief_KW_Final
April2011_Policy Brief_KW_FinalApril2011_Policy Brief_KW_Final
April2011_Policy Brief_KW_Final
 
SOCIAL PROBLEM :TERRORISM
SOCIAL PROBLEM :TERRORISMSOCIAL PROBLEM :TERRORISM
SOCIAL PROBLEM :TERRORISM
 
Media & Terrorism
Media & TerrorismMedia & Terrorism
Media & Terrorism
 
Terrorism Essay
Terrorism EssayTerrorism Essay
Terrorism Essay
 
473 2016 demo theories and public opinion
473 2016 demo theories and public opinion473 2016 demo theories and public opinion
473 2016 demo theories and public opinion
 
Terrorism and criminology
Terrorism and criminologyTerrorism and criminology
Terrorism and criminology
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorism
 
Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism
 
Online Assignment
Online AssignmentOnline Assignment
Online Assignment
 
Turning point
Turning pointTurning point
Turning point
 
Terrorism and mental health: what should the psychiatrists know?
Terrorism and mental health: what should the psychiatrists know?Terrorism and mental health: what should the psychiatrists know?
Terrorism and mental health: what should the psychiatrists know?
 
Identity and terrorism
Identity and terrorismIdentity and terrorism
Identity and terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Psychology_of_Terrorism
Psychology_of_TerrorismPsychology_of_Terrorism
Psychology_of_Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 

En vedette

Deconstruction of horror film posters
Deconstruction of horror film postersDeconstruction of horror film posters
Deconstruction of horror film postersmisstory
 
What is inbound marketing by inBoundio
What is inbound marketing by inBoundioWhat is inbound marketing by inBoundio
What is inbound marketing by inBoundioinBoundio
 
National Assessments on Gender Equality in the Knowledge Society — Project Su...
National Assessments on Gender Equality in the Knowledge Society — Project Su...National Assessments on Gender Equality in the Knowledge Society — Project Su...
National Assessments on Gender Equality in the Knowledge Society — Project Su...Elsevier
 
From Ideas to Markets: the Gender Factor
From Ideas to Markets: the Gender FactorFrom Ideas to Markets: the Gender Factor
From Ideas to Markets: the Gender FactorElsevier
 
GenSET consensus report recommendations for action on the gender dimension in...
GenSET consensus report recommendations for action on the gender dimension in...GenSET consensus report recommendations for action on the gender dimension in...
GenSET consensus report recommendations for action on the gender dimension in...Elsevier
 
Scorecard on Gender Equality and the Knowledge Society
Scorecard on Gender Equality and the Knowledge Society  Scorecard on Gender Equality and the Knowledge Society
Scorecard on Gender Equality and the Knowledge Society Elsevier
 
STEM education: preparing for the jobs of the future
STEM education: preparing for the jobs of the futureSTEM education: preparing for the jobs of the future
STEM education: preparing for the jobs of the futureElsevier
 
Farmacija UPIS
Farmacija UPISFarmacija UPIS
Farmacija UPISEUFF
 

En vedette (11)

Deconstruction of horror film posters
Deconstruction of horror film postersDeconstruction of horror film posters
Deconstruction of horror film posters
 
What is inbound marketing by inBoundio
What is inbound marketing by inBoundioWhat is inbound marketing by inBoundio
What is inbound marketing by inBoundio
 
Lec2
Lec2Lec2
Lec2
 
Lec1
Lec1Lec1
Lec1
 
National Assessments on Gender Equality in the Knowledge Society — Project Su...
National Assessments on Gender Equality in the Knowledge Society — Project Su...National Assessments on Gender Equality in the Knowledge Society — Project Su...
National Assessments on Gender Equality in the Knowledge Society — Project Su...
 
From Ideas to Markets: the Gender Factor
From Ideas to Markets: the Gender FactorFrom Ideas to Markets: the Gender Factor
From Ideas to Markets: the Gender Factor
 
GenSET consensus report recommendations for action on the gender dimension in...
GenSET consensus report recommendations for action on the gender dimension in...GenSET consensus report recommendations for action on the gender dimension in...
GenSET consensus report recommendations for action on the gender dimension in...
 
Scorecard on Gender Equality and the Knowledge Society
Scorecard on Gender Equality and the Knowledge Society  Scorecard on Gender Equality and the Knowledge Society
Scorecard on Gender Equality and the Knowledge Society
 
STEM education: preparing for the jobs of the future
STEM education: preparing for the jobs of the futureSTEM education: preparing for the jobs of the future
STEM education: preparing for the jobs of the future
 
Lec4
Lec4Lec4
Lec4
 
Farmacija UPIS
Farmacija UPISFarmacija UPIS
Farmacija UPIS
 

Similaire à Statement of Erroll G. Southers before the US House of Representatives Committee on Homeland Security

Whittaker and CrottyTerrorism DefinedTerrorism is a di.docx
Whittaker and CrottyTerrorism DefinedTerrorism is a di.docxWhittaker and CrottyTerrorism DefinedTerrorism is a di.docx
Whittaker and CrottyTerrorism DefinedTerrorism is a di.docxalanfhall8953
 
What does extremism mean in the U - Google Docs.pdf
What does extremism mean in the U - Google Docs.pdfWhat does extremism mean in the U - Google Docs.pdf
What does extremism mean in the U - Google Docs.pdfDC Diew
 
Is America Under Siege?
Is America Under Siege?Is America Under Siege?
Is America Under Siege?Denise Scelsi
 
P A R T VCyber Terrorism The New”Face of Terrorism.docx
P A R T  VCyber Terrorism The New”Face of Terrorism.docxP A R T  VCyber Terrorism The New”Face of Terrorism.docx
P A R T VCyber Terrorism The New”Face of Terrorism.docxgerardkortney
 
[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and typeCarlos Oliveira
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...paperpublications3
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...paperpublications3
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxwrite31
 

Similaire à Statement of Erroll G. Southers before the US House of Representatives Committee on Homeland Security (10)

Whittaker and CrottyTerrorism DefinedTerrorism is a di.docx
Whittaker and CrottyTerrorism DefinedTerrorism is a di.docxWhittaker and CrottyTerrorism DefinedTerrorism is a di.docx
Whittaker and CrottyTerrorism DefinedTerrorism is a di.docx
 
What does extremism mean in the U - Google Docs.pdf
What does extremism mean in the U - Google Docs.pdfWhat does extremism mean in the U - Google Docs.pdf
What does extremism mean in the U - Google Docs.pdf
 
Terrorism
TerrorismTerrorism
Terrorism
 
Is America Under Siege?
Is America Under Siege?Is America Under Siege?
Is America Under Siege?
 
P A R T VCyber Terrorism The New”Face of Terrorism.docx
P A R T  VCyber Terrorism The New”Face of Terrorism.docxP A R T  VCyber Terrorism The New”Face of Terrorism.docx
P A R T VCyber Terrorism The New”Face of Terrorism.docx
 
[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type
 
How Does Terrorism Affect Global Politics
How Does Terrorism Affect Global PoliticsHow Does Terrorism Affect Global Politics
How Does Terrorism Affect Global Politics
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docx
 

Plus de Elsevier

Infographic infectious disease outbreaks research trends
Infographic infectious disease outbreaks research trendsInfographic infectious disease outbreaks research trends
Infographic infectious disease outbreaks research trendsElsevier
 
Semi-automated Exploration and Extraction of Data in Scientific Tables
Semi-automated Exploration and Extraction of Data in Scientific TablesSemi-automated Exploration and Extraction of Data in Scientific Tables
Semi-automated Exploration and Extraction of Data in Scientific TablesElsevier
 
Zen and the Art of Data Science Maintenance
Zen and the Art of Data Science MaintenanceZen and the Art of Data Science Maintenance
Zen and the Art of Data Science MaintenanceElsevier
 
Machine Learning and AI, by Helena Deus, PhD
Machine Learning and AI, by Helena Deus, PhDMachine Learning and AI, by Helena Deus, PhD
Machine Learning and AI, by Helena Deus, PhDElsevier
 
Gender Report 2017 Infographic – Focus on Engineering
Gender Report 2017 Infographic – Focus on EngineeringGender Report 2017 Infographic – Focus on Engineering
Gender Report 2017 Infographic – Focus on EngineeringElsevier
 
Elsevier Gender Report Infographic – Focus on Computer Science
Elsevier Gender Report Infographic – Focus on Computer ScienceElsevier Gender Report Infographic – Focus on Computer Science
Elsevier Gender Report Infographic – Focus on Computer ScienceElsevier
 
Elsevier CWTS Open Data Report Presentation at RDA meeting in Barcelona
Elsevier CWTS Open Data Report Presentation at RDA meeting in Barcelona Elsevier CWTS Open Data Report Presentation at RDA meeting in Barcelona
Elsevier CWTS Open Data Report Presentation at RDA meeting in Barcelona Elsevier
 
Gender Report Infographic: Elsevier 2017
Gender Report Infographic: Elsevier 2017Gender Report Infographic: Elsevier 2017
Gender Report Infographic: Elsevier 2017Elsevier
 
Elsevier Cancer Moonshot Infographic
Elsevier Cancer Moonshot InfographicElsevier Cancer Moonshot Infographic
Elsevier Cancer Moonshot InfographicElsevier
 
Elsevier Society Member Survey
Elsevier Society Member SurveyElsevier Society Member Survey
Elsevier Society Member SurveyElsevier
 
Food Security: an information provider’s view
Food Security: an information provider’s viewFood Security: an information provider’s view
Food Security: an information provider’s viewElsevier
 
Response from OFAC to Elsevier, October 2015
Response from OFAC to Elsevier, October 2015Response from OFAC to Elsevier, October 2015
Response from OFAC to Elsevier, October 2015Elsevier
 
Sustainability Science in a Global Landscape
Sustainability Science in a Global LandscapeSustainability Science in a Global Landscape
Sustainability Science in a Global LandscapeElsevier
 
Research Performance in South-East Asia: Executive Summary
Research Performance in South-East Asia: Executive SummaryResearch Performance in South-East Asia: Executive Summary
Research Performance in South-East Asia: Executive SummaryElsevier
 
Mendeley Report: New Horizons: From Research Paper to Pluto
Mendeley Report: New Horizons: From Research Paper to PlutoMendeley Report: New Horizons: From Research Paper to Pluto
Mendeley Report: New Horizons: From Research Paper to PlutoElsevier
 
Infographic: The Noble Nurse
Infographic: The Noble NurseInfographic: The Noble Nurse
Infographic: The Noble NurseElsevier
 
Jennifer Saul's presentation for Cambridge University's gender equality summit
Jennifer Saul's presentation for Cambridge University's gender equality summit Jennifer Saul's presentation for Cambridge University's gender equality summit
Jennifer Saul's presentation for Cambridge University's gender equality summit Elsevier
 
Open access survey
Open access surveyOpen access survey
Open access surveyElsevier
 
Presentation: A Decade of Development in Sub-Saharan African STEM Research
Presentation: A Decade of Development in Sub-Saharan African STEM ResearchPresentation: A Decade of Development in Sub-Saharan African STEM Research
Presentation: A Decade of Development in Sub-Saharan African STEM ResearchElsevier
 
Culinary Nutrition: garlic-enhanced-mashed-potatoes
Culinary Nutrition: garlic-enhanced-mashed-potatoesCulinary Nutrition: garlic-enhanced-mashed-potatoes
Culinary Nutrition: garlic-enhanced-mashed-potatoesElsevier
 

Plus de Elsevier (20)

Infographic infectious disease outbreaks research trends
Infographic infectious disease outbreaks research trendsInfographic infectious disease outbreaks research trends
Infographic infectious disease outbreaks research trends
 
Semi-automated Exploration and Extraction of Data in Scientific Tables
Semi-automated Exploration and Extraction of Data in Scientific TablesSemi-automated Exploration and Extraction of Data in Scientific Tables
Semi-automated Exploration and Extraction of Data in Scientific Tables
 
Zen and the Art of Data Science Maintenance
Zen and the Art of Data Science MaintenanceZen and the Art of Data Science Maintenance
Zen and the Art of Data Science Maintenance
 
Machine Learning and AI, by Helena Deus, PhD
Machine Learning and AI, by Helena Deus, PhDMachine Learning and AI, by Helena Deus, PhD
Machine Learning and AI, by Helena Deus, PhD
 
Gender Report 2017 Infographic – Focus on Engineering
Gender Report 2017 Infographic – Focus on EngineeringGender Report 2017 Infographic – Focus on Engineering
Gender Report 2017 Infographic – Focus on Engineering
 
Elsevier Gender Report Infographic – Focus on Computer Science
Elsevier Gender Report Infographic – Focus on Computer ScienceElsevier Gender Report Infographic – Focus on Computer Science
Elsevier Gender Report Infographic – Focus on Computer Science
 
Elsevier CWTS Open Data Report Presentation at RDA meeting in Barcelona
Elsevier CWTS Open Data Report Presentation at RDA meeting in Barcelona Elsevier CWTS Open Data Report Presentation at RDA meeting in Barcelona
Elsevier CWTS Open Data Report Presentation at RDA meeting in Barcelona
 
Gender Report Infographic: Elsevier 2017
Gender Report Infographic: Elsevier 2017Gender Report Infographic: Elsevier 2017
Gender Report Infographic: Elsevier 2017
 
Elsevier Cancer Moonshot Infographic
Elsevier Cancer Moonshot InfographicElsevier Cancer Moonshot Infographic
Elsevier Cancer Moonshot Infographic
 
Elsevier Society Member Survey
Elsevier Society Member SurveyElsevier Society Member Survey
Elsevier Society Member Survey
 
Food Security: an information provider’s view
Food Security: an information provider’s viewFood Security: an information provider’s view
Food Security: an information provider’s view
 
Response from OFAC to Elsevier, October 2015
Response from OFAC to Elsevier, October 2015Response from OFAC to Elsevier, October 2015
Response from OFAC to Elsevier, October 2015
 
Sustainability Science in a Global Landscape
Sustainability Science in a Global LandscapeSustainability Science in a Global Landscape
Sustainability Science in a Global Landscape
 
Research Performance in South-East Asia: Executive Summary
Research Performance in South-East Asia: Executive SummaryResearch Performance in South-East Asia: Executive Summary
Research Performance in South-East Asia: Executive Summary
 
Mendeley Report: New Horizons: From Research Paper to Pluto
Mendeley Report: New Horizons: From Research Paper to PlutoMendeley Report: New Horizons: From Research Paper to Pluto
Mendeley Report: New Horizons: From Research Paper to Pluto
 
Infographic: The Noble Nurse
Infographic: The Noble NurseInfographic: The Noble Nurse
Infographic: The Noble Nurse
 
Jennifer Saul's presentation for Cambridge University's gender equality summit
Jennifer Saul's presentation for Cambridge University's gender equality summit Jennifer Saul's presentation for Cambridge University's gender equality summit
Jennifer Saul's presentation for Cambridge University's gender equality summit
 
Open access survey
Open access surveyOpen access survey
Open access survey
 
Presentation: A Decade of Development in Sub-Saharan African STEM Research
Presentation: A Decade of Development in Sub-Saharan African STEM ResearchPresentation: A Decade of Development in Sub-Saharan African STEM Research
Presentation: A Decade of Development in Sub-Saharan African STEM Research
 
Culinary Nutrition: garlic-enhanced-mashed-potatoes
Culinary Nutrition: garlic-enhanced-mashed-potatoesCulinary Nutrition: garlic-enhanced-mashed-potatoes
Culinary Nutrition: garlic-enhanced-mashed-potatoes
 

Dernier

IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxunark75
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptUsmanKaran
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxSasikiranMarri
 

Dernier (9)

IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptx
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.ppt
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptx
 

Statement of Erroll G. Southers before the US House of Representatives Committee on Homeland Security

  • 1. Statement of Erroll G. Southers Associate Director of Research Transition National Homeland Security Center for Risk & Economic Analysis of Terrorism Events Adjunct Professor, Sol Price School of Public Policy University of Southern California Before the One Hundred Thirteenth Congress United States House of Representatives Committee on Homeland Security “The Boston Bombings: A First Look” Presented on May 9, 2013
  • 2. Members of the Committee, thank you for inviting me to appear before you today. It is extremely unfortunate and saddening that our gathering and important conversations were precipitated by the tragic events in Boston, but this hearing, and those to follow, offer valuable opportunities to discuss the methods and strategies that can best address and disrupt the ever-present threat of terrorism and violent extremism. My deepest condolences, thoughts and prayers go to the victims of this cowardly act. The Boston Marathon bombing was conducted by terrorists who grew up within miles of where they committed their tragedy. They were locals, educated, living and working in the area. Because of this, they knew the target environment and did not require training to familiarize themselves with the area and its protective measures. Put simply, Tamerlan and Dzhokhar Tsarnaev were homegrown violent extremists, and because of them, Boston joined a fraternity of cities around the world that have endured terrorist attacks plotted and conducted by their own residents. Much like the Madrid train bombings in March 2004, as well as the July 2005 bombings in London, the terrorists’ familiarity with the target area afforded them critical situational awareness that facilitated their ability to plan and execute local attacks, as well as the capacity to remain largely unidentified by our counterterrorism efforts until after the attack. Superseding the issue of how the Tsarnaev brothers were able to succeed is a matter how they arrived at the decision to attack in the first place. The Tsarnaevs came to the United States long before embracing the ideology that, in their minds, legitimized their violent activity. As a starting point for any analysis on this tragic incident, it is essential that law enforcement, counterterrorism agencies, the members of this committee, and the country overall understand that the Tsarnaev brothers became terrorists in this country and were thus homegrown, even as the extremist ideology to which they ascribed was likely influenced by ideas created and embraced elsewhere in the world. The Boston attacks were not a case of foreign-borne terrorism, but rather, of homegrown violent extremism (HVE). The Complex Radicalization Process In the context of the United States, HVE describes terrorist activity or plots targeting the United States and U.S. assets by American citizens or residents who have embraced their extremist ideology largely within this country. A precursor to HVE is a process of radicalization, though like the term “terrorism,” the concept of radicalization is widely referenced but remains poorly defined. The term is routinely used as a synonym for extremist activities conducted by Muslim Identity adherents. This is shortsighted, as radicalization is not limited to any one racial, religious or issue-oriented group. Radicalization is a process whereby individuals identify, embrace and engage in furthering extremist ideologies. This final element – engagement – is one part of the indoctrination pathway continuum, which has the potential to yield violent extremist activities. To be sure, many people who hold extremist views do not engage in violent activity. The Constitution protects speech, even hate speech, which is inherently extremist. In that regard, we should be mindful of the totality of circumstances that create the capacity for violent incidents and avoid a narrow focus on the presence of extremist ideologies in general. Little attention has been given in the scholarly or policy literature to defining criteria for which extremist ideologies pose a threat to national or global security, or whether extremist ideologies matter in the absence of violent actions. A 2009 U.S. Presidential Task Force on Confronting the Ideology of Radical
  • 3. Extremism suggests the administration should expand its focus from violent to nonviolent extremism.1 This is an important distinction deserving further analysis, and perhaps an even more important issue is how an individual identifies and embraces extremism to begin with. Indiscriminant violent action can be the result of radicalization, but the process often begins with a “cognitive opening” that is unique to the individual. This opening may be a traumatic event that makes someone more susceptible to accepting extremist ideology. It is as if a “grievance switch” is flipped on, grievances that can stem from myriad experiences and perceptions, such as conflicted identities, injustice, oppression, or socio-economic exclusion. Personal grievances may be economic (such as losing a job or stinted mobility), social or cultural (such as racism or humiliation), or political (such as discrimination). Some grievances incorporate a sense of victimization by crime, including a perceived crime committed by the United States government, as was the case with Timothy McVeigh and his view of the government standoff events of Whidbey Island (1984), Ruby Ridge (1992) and Waco (1993). While understanding and addressing these grievances is one potential avenue for predicting and preventing violent extremism, the radicalization pathway is not a fixed trajectory, with specific, identifiable indicators that can be acknowledged on an itemized checklist of suspicious activities. Caution should be exercised against viewing radicalization as a conveyor belt that starts with grievances and ends with violence, with easily discernible signposts along the way.2 Rather, a more effective approach is to identify the circumstances under which an individual can progress to violence through the radicalization process yet beneath the homeland security radar. An examination of radicalization yields broad questions regarding how a person becomes engaged, stays engaged or may actually disengage from a group or extremist ideology. Terrorism requires a combination of three things – an alienated individual, a legitimizing ideology (engaged through radicalization), and an enabling environment. Of the three, it is the environment that is most susceptible to positive influences that, supported by appropriate policies and behaviors, can reduce the risk of HVE. Our security policies and technologies are an essential component in the never-ending counterterrorism effort. Yet, as we encounter the threat from homegrown violent extremism, such as the kind seen in Boston, our national efforts should also address the role communities play in facilitating and more importantly, hindering radicalization. Risk-Based Security and Positive Community Engagement As law enforcement and counterterrorism officials analyze the Boston Marathon attacks, we should resist the urge to “fix” something, absent specific evidence of some failure or compromise of the system. Boston’s is one of the most famous marathons in the world, which from a national security and law enforcement perspective, brings with it a range of protective measures afforded to a Department of Homeland Security (DHS) National Special Security Event (NSSE). 1 Task Force on Confronting the Ideology of Radical Extremism (March 2009). Rewriting the Narrative: An Integrated Strategy for Counterradicalization. Washington, D.C.: Washington Institute for Near East Policy. 2 Patel, Faiza (2011). Rethinking Radicalization. Brennan Center for Justice at New York University School of Law.
  • 4. Security is comprised of policies, processes and technology. As it relates to environments like sporting events or critical infrastructure, the emphasis should be on policies that are risk-based – that is, focused on threats that present the most danger and are most likely to occur. We have the applied research capacity to and do model potential attack paths, given the desirability or utility yielded to an adversary. Interdisciplinary methodologies, such as our successful application of game theory and randomization, will continue to hold significant importance in holistic countermeasure strategies. At the same time, recognizing that the goal is to contain terrorism and not simply stop terrorists, we should seek out opportunities to empower communities to take part in disrupting the radicalization process that could ultimately lead to violent action. Community inaction, either through tacit approval of extremist ideas or a hesitancy to speak up when encountering an individual exploring a legitimizing ideology, provides an enabling environment. Inasmuch as we strive to intercept individuals in their transition from ideological extremist to violent adversary, we should also work with communities where such threats may arise to disrupt the radicalization process altogether, both by addressing grievances, and by recognizing and encouraging stakeholder engagement. One challenge in this case is the role online media can play in fostering violent extremism. Arguably, the Internet’s capacity for propelling extremists through the radicalization process is the single most important and dangerous innovation since the terrorist attacks of September 11, 2001. The Internet is in some ways a virtual community, and future attacks against the United States and its interests will likely involve adversaries who have traversed the radicalization process, at least in part, via the Internet. Inasmuch as real-world communities can take part in preventing or facilitating violent extremism, the same is true for the digital environment. Securing a democratic society is a formidable challenge, and we will never be completely free of the terrorist threat. In the aftermath of tragedies like Boston, the public is generally amenable to sacrificing certain liberties in the name of security. However, we must live by our principles, which in the United States are upheld by the rule of law. To alter our government’s use and amendment of law with a reactive policy response to a terrorist threat is to concede victory to the adversary. What is more, singling out a person or entire community as suspect based on anything other than fact undermines the community cohesion we need to counter the persistent threat. Collective vigilance and awareness of how grievances can make individuals susceptible to extremist ideas are fundamental tools that, when employed by counterterrorism officials as well as the public, provide essential supplements to the broader mission of preventing tragedies of the kind seen in Boston. Protecting the country is an ongoing effort that must remain versatile in the face of creative and adaptive adversaries. Every step towards greater security is matched with a would-be terrorist’s exploitation of an unaddressed vulnerability. There is no finish line in homeland security.