Usefulness of the study of thought patterns in Spanish jihadists as a prevention mechanism against radicalization
DOI:
https://doi.org/10.47741/17943108.318Keywords:
Terrorism, prevention, thought, jihadism, radicalizationAbstract
Jihadist terrorism has become one of the great challenges facing our society in the twenty-first century. To deepen their knowledge, numerous theories have been proposed about the process of radicalization that leads individuals to use violence under an ideological-religious pretext. Objective. The objective of this research is to investigate the thought patterns presented by Spanish jihadists as disinhibitory mechanisms of radical behavior. Its identification could be useful to know what is the cognitive process they experience, since it could be used as a prevention mechanism against the radicalization process. Methodology. An exhaustive search was carried out of the Spanish sentences published in the CENDOJ on jihadist terrorism in the period between 2015 and 2017. The content of the speech issued verbatim by the condemned jihadists and which were included in the texts, images and videos published by these subjects was analyzed. A database was created to synthesize the findings and the frequency of appearance of the thought patterns exposed in the instrument by Saucier, Akers, Shen-Miller, Knezevié, y Stanko (2009) was counted. Results. A total of 25 sentences were obtained that contained sufficient textual quotations referring to the jihadist propaganda issued by its authors to investigate the recurrent thought patterns. The patterns that were most frequent were the use of military terminology in speech and the glorification of death for the cause being defended. Discussion. The identification of thought patterns shed light on the motivation for action of the condemned Spanish jihadists. This information can be useful in the face of radicalization by interpreting the cognitive mechanisms that underlie a number of important needs that allow individuals to transgress moral norms and employ violence as an expression of a radical ideology.
Downloads
References
Alimi, E. (2011). Relational dynamics in factorial adoption of terrorist tactics: a comparative perspective. Journal of Theoretical Society, 40(95), 118.
Bandura, A. (1986). Social foundations of thought and action: a social cognitive theory. Prentice-Hall.
Bandura, A. (1991). Social cognitive theory of selfregulation. Organizational Behavior and Human Decision Processes, 50(2), 248-287.
Bandura, A. (1999). Social cognitive theory: an agentic perspective. Asian Journal of Social Psychology, 2, 21-41.
Bandura, A., Barbaranelli, C., Caprara, G., & Pastorelli, C. (1996). Mechanisms of moral disengagement in the exercise of moral agency. Journal of Personality and Social Psychology, 71(2), 364-374.
Borum, R. (2003). Understanding the terrorist mindset. FBI Law Enforcement Bulletin, 7-10.
Borum, R. (2014). Psychological vulnerabilities and propensities for involvement in violent extremism. Behavioral Sciences and the Law, 32, 286-305.
Cole, J., Alison, E., Cole, B., & Alison, L. (2013). Guidance for identifying people vulnerable to recruitment into violent extremism. http://www.safecampuscommunities.ac.uk/iploads/ed./files/IVP_Guidance_Draft_v0.3_web_version.pdf
Cole, J., & Cole, B. (2009). Martyrdom: radicalisation and terrorist violence among British Muslims. Pennant Books.
Cole, J., Cole, B., Alison, E., & Alison, A. (2010). Free radicals: stopping extremists before they start. Jane’s Intelligence Review, 22(10), 18-21.
Collins, A. (2006). My Jihad: the true story of an American mujahid’s amazing journey from Usama Bin Laden’s training camps to counterterrorism with the FBI and CIA. Manas.
Cottee, S., & Hayward, K. (2011). Terrorist (e) motives: the existential attractions of terrorism. Studies in Conflict & Terrorism, 34, 963-986.
Crenshaw, M. (2000). The psychology of political terrorism: an agenda for the 21st century. Political Psychology, 21(2), 405-420.
Egan, V., Cole, J., Cole, B., Alison, L., Alison, E., Warning, S., & Elntib, S. (2016). Can you identify violent extremists using a screening checklist and open-source intelligence alone? Journal of Threat Assessment and Management, 3(1), 21-36.
Fiske, A., & Rai, T. (2014). Virtuous Violence. Cambridge University Press.
Galvis, M., Garrido, V., & Guardiola, J. (2017). Tipologías del terrorista yihadista: análisis teórico desde un enfoque político-criminal. En Libro de actas del seminario internacional “El terrorismo en la actualidad: un nuevo enfoque políticocriminal” (pp. 61-74). Dykinson (coord.. Ruiz-Arias, M. y dir. Pérez-Cepeda, A.).
García-Pablos de Molina, A. (2012). La prevención del delito en un estado social y democrático de derecho. Estudios Penales y Criminológicos, 15, 79-98.
Garrido, V. (2020). Perfiles criminales: un recorrido por el lado oscuro del ser humano. Ariel.
Giddens, A. (1991). Modernity and Self-Identity Self and Society in the Late Modern Age. Stanford University Press.
Gunaratna, R. (2008). Understanding the challenge of ideological extremism. Discussion Papers, 18.
HM Government. (2006). Countering international terrorism: the United Kingdom's strategy. CM, 6888. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/272320/6888.pdf
HM Government. (2011). Prevent strategy. CM, 8092. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/97976/preventstrategy-review.pdf
James, W. (1982). The moral equivalent of war. Essays in Religion and Morality. Harvard University Press.
Javaid, U. (2015). National consensual narrative against terrorism. Journal of Political Studies, 22(2), 383-398.
Kebbell, M., & Porter, L. (2012). An intelligence assessment framework for identifying individuals at risk of committing acts of violent extremism against the West. Security
Journal, 25(3), 212-228.
Klausen, J., Campion, S., Needle, N., Nguyen, G., & Libretti, R. (2016). Toward a behavioral model of “homegrown” radicalization trajectories. Studies in Conflict & Terrorism, 39(1), 67-83.
Klausner, S. (1968). The intermingling of pain and pleasure: the stress-seeking personality in its social context. En S. Klausner (ed.), Why man takes chances: studies in stress seeking (pp.137-168). Doubleday.
Kruglanski, A., & Fishman, S. (2009). Psychological factors in terrorism and counterterrorism: Individual, group, and organizational levels of analysis. Social Issues and Policy Review, 3(1), 1-44.
Laurence, J., & Matthews, M. (2012). The Oxford handbook of military psychology. Oxford University Press.
Leistedt, S. (2013). Behavioral aspects of terrorism. Journal of Forensic Science International, 228, 21-27.
Marret, J., Feddes, A., Mann, L., Doosje, B., & GriffioenYoung, H. (2013). An overview of the SAFIRE project: a scientific approach to finding indicators and responses to radicalization. Journal EXIT-Deutschland, Zeitschrift für Deradikalisierung and demokratische Kultur, 2, 123-148
McCauley, C., & Moskalenko, S. (2008). Mechanisms of political radicalization: pathways toward terrorism. Terrorism and Political Violence, 20(3), 415-433.
Moghaddam, F. (2005). The staircase to terrorism: a psychological exploration. American Psychologist, 60(2), 161-169.
Moyano, M. (2011). Factores psicosociales contribuyentes a la radicalización islamista de jóvenes en España. Construcción de un instrumento de evaluación. [Tesis doctoral].
Universidad de Granada.
Pliner, J. (2013). Observable indicators of possible radicalization. ISCA, Safire Project. International Security and CounterTerrorism Academy.
Quiggin, T. (2010). Understanding Al-Qaida’s ideology for counter-narrative work. Perspectives on Terrorism Vol. 3.2. Canadian Centre for Intelligence and Security Study at Carleton University.
Romero, J. (2015). La influencia de la lengua árabe en el léxico militar español. Art and Humanities, 2(2), 67-76.
Sageman, M. (2008). A strategy for fighting international Islamist terrorists. Annals of the American Academy of Political and Social Science, 618(1), 223-231.
Sageman, M. (2010). Small group dynamics. En S. Canna (ed.), Protecting the Homeland from International and Domestic Terrorism Threats: Current Multi-Disciplinary Perspectives on Root Causes, the Role of Ideology, and Programs for Counter-radicalization and Disengagement (pp. 129-137). https://www.start.umd.edu/sites/default/files/files/publications/U_Counter_Terrorism_White_Paper_Final_January_2010.pdf
Sarma, K. (2017). Risk assessment and the prevention of radicalization from nonviolence into terrorism. American Psychologist, 72(3), 278-288.
Saucier, G., Akers, L., Shen-Miller, S., Knezevié, G., & Stanko, L. (2009). Patterns of thinking in militant extremism. Perspectives on Psychological Science, 4(3), 256-271.
Schmid, A. (2014a). Violent and non-violent extremism: two sides of the same coin? ICCT Research Paper. https://icct.nl/publication/violent-and-non-violent-extremism-twosides-of-the-same-coin/
Schmid, A. (2014b). Al-Qaeda’s “single narrative” and attempts to develop counter-narratives: the state of knowledge. ICCT Research Paper.
Silber, M., & Bhatt, A. (2007). Radicalization in the West: the homegrown threat. NYPD Intelligence Division.
Sykes, G., & Matza, D. (1957). Techniques of neutralization: a theory of delinquency. American Sociological Review, 22(6), 664-670.
Taylor, M., & Horgan, J. (2006). A conceptual framework for addressing psychological process in the development of the terrorist. Terrorism and Political Violence, 18(4), 585-601.
Vega, E. (2017). El control y la prevención del delito como objeto de la criminología. Miscelánea Comillas, 75(146), 171-194.
Wiktorowicz, Q. (2004). Joining the cause: AlMuhajiroun and radical Islam. Paper presented at The Roots of Islamic Radicalism Conference (Yale University, May 2004). http://insct.syr.edu/wp-content/uploads/2013/03/Wiktorowicz.Joining-the-Cause.pdf
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Revista Criminalidad
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Licencia creative commons CC BY NC ND https://creativecommons.org/licenses/by-nc-nd/2.0/