{"id":923,"date":"2019-01-31T01:08:53","date_gmt":"2019-01-31T00:08:53","guid":{"rendered":"http:\/\/www.gc4ss.org\/?p=923"},"modified":"2024-02-13T00:27:43","modified_gmt":"2024-02-13T00:27:43","slug":"family-terror-networks-an-interview-with-dean-c-alexander","status":"publish","type":"post","link":"https:\/\/www.gc4ss.org\/?p=923","title":{"rendered":"Family Terror Networks: An Interview with Dean C. Alexander"},"content":{"rendered":"<p><span style=\"color: #ff0000;\"><strong><em>This interview was conducted by\u00a0<span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"http:\/\/N\u2013Ekici@wiu.edu\">Dr. Niyazi Ekici<\/a>\u00a0<\/span>who is a Senior\u00a0 Expert at GC4SS<\/em><\/strong><\/span><\/p>\n<p>GCSS&#8217;interview series continue with Professor Dean C. Alexander who is the\u00a0<strong><em>Director of Homeland Security Research Program and Professor at the School of Law <a href=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/DrAlexander.jpg?ssl=1\"><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"934\" data-permalink=\"https:\/\/www.gc4ss.org\/?attachment_id=934\" data-orig-file=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/DrAlexander.jpg?fit=1595%2C2137&amp;ssl=1\" data-orig-size=\"1595,2137\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1548889742&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"DrAlexander\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/DrAlexander.jpg?fit=224%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/DrAlexander.jpg?fit=764%2C1024&amp;ssl=1\" class=\"wp-image-934 alignright lazyload\" data-src=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/DrAlexander.jpg?resize=254%2C340&#038;ssl=1\" alt=\"\" width=\"254\" height=\"340\" data-srcset=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/DrAlexander.jpg?resize=764%2C1024&amp;ssl=1 764w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/DrAlexander.jpg?resize=224%2C300&amp;ssl=1 224w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/DrAlexander.jpg?resize=768%2C1029&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/DrAlexander.jpg?resize=45%2C60&amp;ssl=1 45w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/DrAlexander.jpg?w=1595&amp;ssl=1 1595w\" data-sizes=\"(max-width: 254px) 100vw, 254px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 254px; --smush-placeholder-aspect-ratio: 254\/340;\" \/><\/a>Enforcement and Justice Administration at Western Illinois University<\/em><\/strong>. Since publishing on terrorism in 1991, He has published several other books on the topic, including: <strong><em>The Islamic State: Combating the Caliphate Without Borders<\/em><\/strong> (Lexington, 2015), <strong><em>Business Confronts Terrorism: Risks and Responses<\/em><\/strong> (University of Wisconsin, 2004), and <strong><em>Terrorism and Business: The Impact of September 11, 2001<\/em><\/strong> (Transnational, 2002). He has also trained law enforcement and military personnel in the United States and abroad on terrorism and counterterrorism issues at <strong><em>NATO\u2019s Center of Excellence Defense Against Terrorism<\/em><\/strong> (Turkey), <strong><em>Illinois Statewide Terrorism and Intelligence Center, Oregon Fusion Center, and Milwaukee Police Department<\/em><\/strong>, among many other institutions. My insights on terrorism have been featured in domestic and international media, among them: the <strong><em>Washington Post, Voice of America, Tribune de Gen\u00e8ve, and NHK<\/em><\/strong>.\u00a0 We are going to talk about his new book &#8220;<em>Family Terror Network<\/em>&#8220;.<\/p>\n<p><span style=\"color: #0000ff;\"><strong>GCSS<\/strong>:\u00a0<\/span>Let us start with our first question which is directly about your new book. Could you please tell us about new boook\u00a0<strong>\u00a0Family Terror Networks, which is now available as an E-book <\/strong><strong><a href=\"https:\/\/www.amazon.com\/gp\/product\/B07N4B41PG\/ref=dbs_a_def_rwt_bibl_vppi_i2\">https:\/\/www.amazon.com\/gp\/product\/B07N4B41PG\/ref=dbs_a_def_rwt_bibl_vppi_i2<\/a><\/strong><strong>\u00a0 <\/strong><strong>and later this month in paperback?<\/strong><\/p>\n<p><a href=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Book-FamilyTerrorNetworks.jpg?ssl=1\"><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"931\" data-permalink=\"https:\/\/www.gc4ss.org\/?attachment_id=931\" data-orig-file=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Book-FamilyTerrorNetworks.jpg?fit=1800%2C2700&amp;ssl=1\" data-orig-size=\"1800,2700\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Book FamilyTerrorNetworks\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Book-FamilyTerrorNetworks.jpg?fit=200%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Book-FamilyTerrorNetworks.jpg?fit=683%2C1024&amp;ssl=1\" class=\"wp-image-931 alignleft lazyload\" data-src=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Book-FamilyTerrorNetworks.jpg?resize=258%2C387&#038;ssl=1\" alt=\"\" width=\"258\" height=\"387\" data-srcset=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Book-FamilyTerrorNetworks.jpg?resize=683%2C1024&amp;ssl=1 683w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Book-FamilyTerrorNetworks.jpg?resize=200%2C300&amp;ssl=1 200w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Book-FamilyTerrorNetworks.jpg?resize=768%2C1152&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Book-FamilyTerrorNetworks.jpg?resize=40%2C60&amp;ssl=1 40w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Book-FamilyTerrorNetworks.jpg?w=1800&amp;ssl=1 1800w\" data-sizes=\"(max-width: 258px) 100vw, 258px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 258px; --smush-placeholder-aspect-ratio: 258\/387;\" \/><\/a><strong><span style=\"color: #0000ff;\">Dr. Alexander:<\/span><\/strong>\u00a0This groundbreaking book analyzes the emerging and troubling facets of family terror networks. After addressing general principles of terrorism, the work discusses the characteristics of family terror networks. The book chronicles over one hundred case studies involving family affiliated terrorism across extremist ideologies. Also, it proposes a model for predicting and combating this type of political violence. Furthermore, the work describes law enforcement responses to terrorism, which concurrently undermine kin connected terrorism. Additionally, the book provides insights as to the future of family terror networks.<\/p>\n<blockquote><p><em><span style=\"color: #ff6600;\">The book chronicles over one hundred case studies involving family affiliated terrorism<\/span><\/em><\/p><\/blockquote>\n<p><span style=\"color: #0000ff;\"><strong>GC4SS<\/strong><\/span>:\u00a0<strong>How would you describe family terror networks?<\/strong><\/p>\n<p>Family terror networks (or alternatively, family affiliated terrorism) involve two or more people from the same clan who support the threat or use of terrorism. Kin terrorism has appeared across diverse views from religiously motivated precepts to national liberation, and from hate-based ideologies to other viewpoints. Family structures enable higher instances of conversion to radical beliefs given the imprimatur of credibility and trust that attaches within the family unit as opposed to unaffiliated networks.<\/p>\n<blockquote><p><span style=\"color: #ff6600;\"><em>Family structures enable higher instances of conversion to radical beliefs<\/em><\/span><\/p><\/blockquote>\n<p>This subset of terrorists comprises a full range of socioeconomic, racial, religious, ethnic, national-origin, and foreign-affinity ties. Terrorists aligned with hierarchical and network groups and unaffiliated cabals are represented in this form of terrorism as well. Family affiliated terrorists include group leaders, operational cadres, active supporters, and passive supporters. They use terror tactics including bombings, suicide bombings, and gunfire, among others, with variances in operational stages.<\/p>\n<p><strong><span style=\"color: #0000ff;\">GC4SS<\/span>:\u00a0Why are family terror networks important?<\/strong><\/p>\n<p><strong><span style=\"color: #0000ff;\">Dr. Alexander:\u00a0<\/span><\/strong>Family terror networks are important for multiple reasons. Households are an integral part of traditional social networks. This paradigm allows radicalization and recruitment to occur in a setting of trust, confidence, and privacy. The family unit has a greater level of legitimacy than the outside world. Even after detection of a kin-linked terror cell, deradicalization and disengagement programs may not succeed as family members may impede participation.<\/p>\n<p>Competing or incompatible opinions have trouble piercing the family network\u2019s ideological wall with outside viewpoints. Trust ties arising from friendship, religious institutions, and schools are less sustained than family ties. It is improbable that kin will abandon their terrorist activities when extremism was sourced at home. Frequently, vocalizing concerns about engaging in terrorism is barred within a familial terror cell.<\/p>\n<blockquote><p><span style=\"color: #ff6600;\"><em>Trust ties arising from friendship, religious institutions, and schools are less sustained than family ties<\/em><\/span><\/p><\/blockquote>\n<p>The zeal and skills gained through a family setting are magnified more than otherwise. Household members can teach the best practices of extremism to others. Parents or other kin may intimidate household members to support radicalism or even carry out a martyrdom operation. Often, the bullied family member agrees out of duty, honor, or fear. This radicalism exploits the trust and security features that exist in households.<\/p>\n<blockquote><p><span style=\"color: #ff6600;\"><em>Household members can teach the best practices of extremism to others.<\/em><\/span><\/p><\/blockquote>\n<p><strong><span style=\"color: #0000ff;\">GC4SS:\u00a0<\/span>What are the key findings of your book?<\/strong><\/p>\n<p><strong><span style=\"color: #0000ff;\">Dr. Alexander:<\/span><\/strong>\u00a0Besides a new, six-stage model predicting family terror networks, analysis of the 118 families comprising the case studies\u2014encompassing 138 occurrences of kin relationships (e.g., husband and wives, brothers, and fathers and sons) involved with terrorism\u2014found 57% of the 138 family ties comprised from cases involving fairly equal amounts of husbands\/wives (43\/138 or 31%) and brothers (36\/138 or 26%). As such, these case studies suggest that family affiliated terrorism occurs most readily in husbands\/wives and brothers.<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"2715\" data-permalink=\"https:\/\/www.gc4ss.org\/?attachment_id=2715\" data-orig-file=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?fit=1024%2C1024&amp;ssl=1\" data-orig-size=\"1024,1024\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Family terror network\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?fit=300%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?fit=1024%2C1024&amp;ssl=1\" class=\"alignleft size-medium wp-image-2715 lazyload\" data-src=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?resize=300%2C300&#038;ssl=1\" alt=\"\" width=\"300\" height=\"300\" data-srcset=\"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?resize=146%2C146&amp;ssl=1 146w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?resize=50%2C50&amp;ssl=1 50w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?resize=85%2C85&amp;ssl=1 85w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?resize=80%2C80&amp;ssl=1 80w, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-.webp?w=1024&amp;ssl=1 1024w\" data-sizes=\"(max-width: 300px) 100vw, 300px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 300px; --smush-placeholder-aspect-ratio: 300\/300;\" \/><\/p>\n<blockquote><p><em><span style=\"color: #ff6600;\">Six-stage model predicting family terror networks<\/span><\/em><\/p><\/blockquote>\n<p>Also, overwhelmingly, jihadism was the ideology connected to the 118 instances of families affiliated with terrorism that were reviewed. This type of extremism was found in 85% of the cases with other precepts occurring comparatively fairly rarely (15%). Among the non-jihadists associated with kin terrorism, they were affiliated with mostly right-wing extremism (e.g., sovereign citizens, militia, and white supremacy).<\/p>\n<p><strong><span style=\"color: #0000ff;\">GC4SS:<\/span>\u00a0How do you envision the future of family terror networks?<\/strong><\/p>\n<p><span style=\"color: #0000ff;\"><strong>Dr. Alexander:<\/strong>\u00a0<\/span>Family terror networks are likely to remain prevalent for various reasons. Belief systems advocating political violence exist in some family units. It is natural to share enthusiasm about newly found ideology, including extremist tenets, with easily swayed family members. The ability of family members to pressure others to support extremism remains strong. The leverage is that much stronger when exerted by a parent or sibling. The enticement of following in the footsteps of a family member will likely continue in earnest.<\/p>\n<blockquote><p><em><span style=\"color: #ff6600;\">T<\/span><span style=\"color: #ff6600;\">he ability of family members to pressure others to support extremism remains strong. The leverage is that much stronger when exerted by a parent or sibling<\/span><\/em><\/p><\/blockquote>\n<p><strong><span style=\"color: #0000ff;\">GC4SS:<\/span><\/strong>\u00a0<strong>What can law enforcement do to undermine terrorism, including that of the family affiliated variety?<\/strong><\/p>\n<p><strong><span style=\"color: #0000ff;\">Dr. Alexander:<\/span><\/strong>\u00a0Police interactions with terrorists can include: responding to kinetic incidents, conducting investigations and surveillance, receiving tips about suspicious people and activities, and interacting with community organizations and persons. Additional themes to consider are steps to find terrorists, missed signs in discovering terrorists, the role of traffic stops, the role of community policing, the participation of the public, improved communications, leveraging technology, preventing the next attack, responding to a terrorist strike, terrorists targeting police and responses, and international cooperation. Indeed, these many law enforcement methodologies in fighting terrorism can be implemented with vigor against the challenges emanating from family affiliated terror.<\/p>\n<p><strong><span style=\"color: #0000ff;\">GC4SS:\u00a0<\/span><em>I\u2019d like to thank you on behalf of our team and your invaluable contribution to our Global Center for Security Studies<\/em><\/strong>.<\/p>\n<p><strong><span style=\"color: #0000ff;\">Dr. Alexander:<\/span><\/strong>\u00a0Thank you very much for conducting the interview.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This interview was conducted by\u00a0Dr. Niyazi Ekici\u00a0who is a Senior\u00a0 Expert at GC4SS GCSS&#8217;interview series continue with Professor Dean C. Alexander who is the\u00a0Director of Homeland<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":420,"featured_media":2716,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[65,61],"tags":[],"class_list":["post-923","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exclusive-interviews","category-terrorism"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/01\/Family-terror-network-cover.webp?fit=1792%2C1024&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9RaMN-eT","jetpack-related-posts":[{"id":945,"url":"https:\/\/www.gc4ss.org\/?p=945","url_meta":{"origin":923,"position":0},"title":"Event: Seminar on Radicalisation of Terrorists","author":"Niyazi Ekici","date":"February 25, 2019","format":false,"excerpt":"GC4SS' senior expert Dr. Niyazi Ekici gave a seminar on Terrorism together with Professor Dean C. Alexander at Western Illinois University, USA on 22nd of February 2019. The event gain outstanding interest from Western Illinois University students and faculty. Dr. Ekici and Professor Alexander are researching homegrown radicalisation in the\u2026","rel":"","context":"In &quot;Americas&quot;","block_context":{"text":"Americas","link":"https:\/\/www.gc4ss.org\/?cat=47"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/02\/IMG_3054.jpg?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/02\/IMG_3054.jpg?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/02\/IMG_3054.jpg?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/02\/IMG_3054.jpg?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/02\/IMG_3054.jpg?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":708,"url":"https:\/\/www.gc4ss.org\/?p=708","url_meta":{"origin":923,"position":1},"title":"The Future of Political Violence and Terrorism Studies: An Interview with Marc Sageman","author":"Ahmet Celik","date":"May 20, 2018","format":false,"excerpt":"This interview was conducted by Dr. Ahmet Celik who is a Senior Expert at GC4SS We start here our first GC4SS\u2019 Interview Series with Marc Sageman who is an iconoclastic Polish-born American scholar in the field\u00a0of Terrorism. As an independent expert on terrorism, he is the founder of Sageman Consulting,\u2026","rel":"","context":"In &quot;Conflicting Zones&quot;","block_context":{"text":"Conflicting Zones","link":"https:\/\/www.gc4ss.org\/?cat=43"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/07\/21.jpg?fit=1200%2C627&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/07\/21.jpg?fit=1200%2C627&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/07\/21.jpg?fit=1200%2C627&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/07\/21.jpg?fit=1200%2C627&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/07\/21.jpg?fit=1200%2C627&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2510,"url":"https:\/\/www.gc4ss.org\/?p=2510","url_meta":{"origin":923,"position":2},"title":"Lock The Bad Guys Up and Then Sleep Tight? The (Im)Possible Impacts Of The Terrorist Offenders Bill","author":"Kutluer Karademir","date":"February 21, 2020","format":false,"excerpt":"","rel":"","context":"In &quot;Democracy And Rule of Law&quot;","block_context":{"text":"Democracy And Rule of Law","link":"https:\/\/www.gc4ss.org\/?cat=57"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2020\/02\/Kutlu-1.webp?fit=1200%2C686&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2020\/02\/Kutlu-1.webp?fit=1200%2C686&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2020\/02\/Kutlu-1.webp?fit=1200%2C686&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2020\/02\/Kutlu-1.webp?fit=1200%2C686&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2020\/02\/Kutlu-1.webp?fit=1200%2C686&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2708,"url":"https:\/\/www.gc4ss.org\/?p=2708","url_meta":{"origin":923,"position":3},"title":"The Crucial Role of Mediation in Resolving Disputes","author":"Tuncay Unal","date":"February 2, 2021","format":false,"excerpt":"Tuncay Unal, PhDtuncay.unal@gc4ss.org ExpertGlobal Center for Security Studies Conflict resolution is a comprehensive field dedicated to peacefully and constructively addressing disagreements, disputes, or conflicts among individuals, groups, organizations, or nations. To successfully navigate these challenges, adhering to specific principles prioritising harmony and respect is imperative. In this context, mediators are\u2026","rel":"","context":"In &quot;Conflicting Zones&quot;","block_context":{"text":"Conflicting Zones","link":"https:\/\/www.gc4ss.org\/?cat=43"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/Mediation-2.webp?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/Mediation-2.webp?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/Mediation-2.webp?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2024\/02\/Mediation-2.webp?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2466,"url":"https:\/\/www.gc4ss.org\/?p=2466","url_meta":{"origin":923,"position":4},"title":"The Strategic Importance of Misrata for Libya&#8217;s Future","author":"Paolo Zucconi","date":"August 6, 2019","format":false,"excerpt":"","rel":"","context":"In &quot;Africa&quot;","block_context":{"text":"Africa","link":"https:\/\/www.gc4ss.org\/?cat=50"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/09\/misrata.jpg?fit=960%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/09\/misrata.jpg?fit=960%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/09\/misrata.jpg?fit=960%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/09\/misrata.jpg?fit=960%2C829&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":959,"url":"https:\/\/www.gc4ss.org\/?p=959","url_meta":{"origin":923,"position":5},"title":"Chad, An Evolving Dramatic Context of Insurgency and Poverty","author":"Paolo Zucconi","date":"May 13, 2019","format":false,"excerpt":"Paolo Zucconi paolo.zucconi@gc4ss.org Research Fellow Global Center for Security Studies Boko Haram (BH) remains today a major threat for Nigeria's, Chad's, Niger's and Cameroon's stability and security. One of the most critical issues is its decentralized structure and resilience to attempts to eradicate it from the society. The group is\u2026","rel":"","context":"In &quot;Africa&quot;","block_context":{"text":"Africa","link":"https:\/\/www.gc4ss.org\/?cat=50"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/05\/Chad-latest-news.jpg?fit=938%2C450&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/05\/Chad-latest-news.jpg?fit=938%2C450&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/05\/Chad-latest-news.jpg?fit=938%2C450&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.gc4ss.org\/wp-content\/uploads\/2019\/05\/Chad-latest-news.jpg?fit=938%2C450&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/posts\/923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/users\/420"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=923"}],"version-history":[{"count":0,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/posts\/923\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=\/wp\/v2\/media\/2716"}],"wp:attachment":[{"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gc4ss.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}