Sie sind auf Seite 1von 4

J Forensic Sci, 2016

doi: 10.1111/1556-4029.13170
PAPER Available online at: onlinelibrary.wiley.com

PSYCHIATRY AND BEHAVIORAL SCIENCES

Samuel J. Leistedt,1,2,3,4 M.D., Ph.D.

On the Radicalization Process

ABSTRACT: This study aimed to provide an in-depth description of the radicalization process, which is a very important step in terrorist
activities. The author proposes a translational analysis that is first based on the author’s experience in the psychological evaluation of terrorist
behavior and second on an exhaustive review of the current literature. The search terms “terrorism,” “radicalization,” “social psychology,” and
“psychopathology” were used to identify relevant studies in the following databases: Scopus, Medline, PubCentral, and Science Direct. Because
of its importance, understanding radicalization process should be one of the priorities of behavioral scientists. International studies should be
performed with a focus on several aspects, such as radicalization risk factors, brainwashing, the role of the media, and finally, in de-radicaliza-
tion programs.

KEYWORDS: forensic science, radicalization, social psychology, social networks, terrorism, intelligence gathering

The radicalization of young men and women by terrorist As introduced in the above examples, this study deals with
organizations has become an overwhelming problem in the world the radicalization process in terrorist activities. In fact, in light of
(1–4). Recently, Mohammed Merah and the Kouachi Brothers in these facts, and in order to optimally counter terrorists, it is
France and Mehdi Nemmouche in Belgium appear to have been imperative to have a clear understanding of the psychology
motivated by a complex mix of politics and faith, and their com- underlying their actions. In recent years, research efforts have
munications illustrate the tactics used to try to recruit other young investigated radicalization, de-radicalization, and disengagement
Europeans and Americans to their cause (1–4). Recently, two 21- (2–5). In this report, the author describes findings from a litera-
year-old men from Birmingham, England were charged with trav- ture review and analyzes the factors that are involved in the pro-
eling to Syria to carry out acts of terrorism. Even more recently, cess of terrorist recruitment, focusing on the radicalization
in January of 2014, two 15-year-old boys from France left Tou- process.
louse to join the fighting in Syria. The possibility of French citi-
zens returning from Syria as hardened jihadists is the “biggest
Sources and Database
threat that the country faces in the coming years,” said Manuel
Valls, the interior minister (3–5). He added that France and Eur- Based on the author’s experience in evaluating terrorist psy-
ope risk being “overwhelmed” by the phenomenon. Mr. Valls chology and on an exhaustive literature review, the aim of this
estimated that 700 French nationals have either travelled to Syria, study was to describe and discuss the radicalization process in a
have travelled to Syria and returned to France, or are currently en translational manner.
route. Some 21 French nationals have been killed. Shiraz Maher, The search terms “terrorism,” “radicalization,” “social psy-
a senior research fellow at the International Centre for the Study chology,” and “psychopathology” were used to identify relevant
of Radicalization at King’s College London, estimated recently studies in the following databases: Scopus, Medline, PubCentral,
that up to 50 British fighters have already returned home (2–5). and Science Direct (the latter is a science-based web portal).
A few months ago, Richard Walton, the head of Scotland Yard’s Several textbooks were examined, and manual searches of the
counter-terrorism command, said there were already indications reference lists of relevant studies were used to identify additional
that Britons were returning from Syria with orders to carry out studies.
attacks, with the Metropolitan Police carrying out a “huge num-
ber of operations” to protect the public (2–5).
The Radicalization Process as a Complex Phenomenon
In the author’s opinion, to better understand the radicalization
process, several elements must be considered:
1
Forensic Mental Health Hospital “Les Marronniers”, Rue Despars 94, • Risk factors must be present. As described below, the author
Tournai 7500, Belgium. prefers to discuss the concept of risk factors rather than the
2
Department of Medicine, ULB, Route de Lennik, 808, 1070, Brussels, concept of a terrorist profile or personality.
Belgium.
3
Department of Medicine, UMons, Place du Parc, 20, 7000, Mons,
• When risk factors are present, persuasion techniques/brain-
Belgium.
washing must be used for radicalization to occur.
4
SPF Justice, Boulevard de Waterloo, 115, 1000, Brussels, Belgium. • Although these two elements are important, they are insuffi-
Received 27 Jan. 2015; and in revised form 20 Aug. 2015; accepted 22 cient for radicalization. In the modern world of “new
Aug. 2015. terrorism,” networks, communication, social engineering, and

© 2016 American Academy of Forensic Sciences 1


2 JOURNAL OF FORENSIC SCIENCES

propaganda using information techniques must be present as do not. Such explanations are not only inconsistent; they
well. All of these can be found via the media and on the demonstrate a lack of understanding of basic psychological
Internet. concepts. The author’s experience in Europe has been that
• The use of coercive psychology leads to cognitive modifica- people who are radicalized have some common experiences
tions. The availability cascade is a good example of the or characteristics (e.g., Mohammed Merah in France, Mehdi
potential influence of the media on cognitive functions. Nemmouche in Belgium, the Kouachi brothers in France,
etc.) (i) They come from immigrant families (second or third
generation); (ii) they have previous police records (for vari-
Risk Factors
ous offenses, such as juvenile delinquency); (iii) they have
In the 1970s, the view of terrorism as a clinical disorder was been in jail (sometimes for short periods, prisons have proved
popular. In the 1980s and the 1990s, this view was often dis- fertile recruitment grounds for Muslim radicals); (iv) they
missed outright but, interestingly, there was insufficient evidence have social difficulties, including family problems, economi-
supporting the dismissal (6). The earlier, more heavy-handed cal difficulties, and identity crises; and (v), most have trav-
characterization of terrorists was replaced by the subtler notion eled to and returned from a country in which ISIS or another
that while terrorists could not really be characterized by a partic- extremist group is active.
ular personality type, they often almost had certain personality • Because of these commonalities, the author prefers to speak
traits. For example, narcissism and paranoia are the two traits of risk factors rather than of a terrorist personality per se.
most commonly associated with terrorists in this particular
These last assertions are derived from the observations of the
literature (6).
author of people who have been radicalized, that is, who
Contemporary scholars of terrorism consider much of that
returned to Europe and committed terrorist acts.
research quite dated and even obscure. The fact that the lessons
that emerged from early studies have almost disappeared from
contemporary psychological research on terrorism raises trou- Brainwashing
bling questions about the state of affairs in terrorist psychology
today (6,7). Nevertheless, at this point, it may be worth summa- Clearing a person of previously held beliefs, that is, “washing
rizing some basic assertions (6–9): their brains” in order to replace the beliefs with an alien set of
perspectives, is often used to explain how reasonably well-
• Explanations of terrorism at the individual level, in terms of adjusted citizens can become violent terrorists (10,11). A number
psychology/psychopathology, are insufficient for understand- of terms are used to describe this process, including brainwash-
ing why people become involved in terrorism. This is not ing, thought reform, coercive persuasion, mind control, a coordi-
exactly the same as saying that psychological explanations nated program of coercive influence and behavioral control, and
alone are insufficient in accounting for why people turn to exploitive persuasion. This perspective puts people such as
terrorism, because it seems that the “terrorist personality” Osama Bin Laden and the Hamas leader Sheikh Yassin in roles
issue needs to be temporarily isolated as far as its explicit that have only been clearly portrayed in fiction, such as in Du
and implicit purported importance is concerned, at least in Maurier’s story of the opera singer Trilby, who is controlled by
this context. Although the frustration-aggression hypothesis the manipulative Svengali. There are real cases of brainwashing,
and its derivatives have found their way into several political such as Mao Tse-tung’s thought-reform program, which was
science theories of terrorism, there is a persistent lack of implemented at Chinese revolutionary universities, and the tac-
acknowledgment of the conceptual problems that are involved tics used by Charles Manson and his “family.” However, many
(8,9). other studies show that it is difficult to demonstrate that such
• By themselves, personality traits are insufficient in terms of quasi-occult powers exist (10,11).
explaining why some people become terrorists and others do Thus, thought reform is a concerted effort to change a person’s
not, or, more generally, why people join terrorist groups. This way of looking at the world, which will then change their behav-
point is not the same as the first point. This assertion is ior. It is distinguished from other forms of social learning by the
related to the inherent attractiveness, and yet the danger, in conditions under which it is conducted and by the techniques of
placing too much emphasis on the “needs-fulfillment” stance, environmental and interpersonal manipulation that are meant to
for the same conceptual reasons that might be used to criti- suppress certain behaviors and to elicit and train others. It does
cize other trait-based approaches (and the interpretations of not consist of only one program. There are many ways and meth-
personality type and traits in this context altogether). In main- ods to conduct thought reform, such as (i) destabilizing a per-
stream contemporary psychology, trait theories do not attempt son’s sense of self; (ii) forcing a drastic reinterpretation of the
to be all encompassing or to explain all behavior, and the subject’s life history, resulting in a radically altered worldview,
same mistakes should not be made when applying such mod- and a new version and causality; and (iii) developing dependence
els to explain terrorism. Future attempts at developing indi- on the group, thereby turning the individual into a deployable
vidual terrorist profiles ought to bear this in mind. Whether agent of the organization (12). Singer’s six conditions describe
terrorist profiles ought ideally to be described in terms of what is needed to create an atmosphere that permits brainwashing
demographics or even in terms of psychological types (as to take place. The degree to which these conditions are present
opposed to characterization of actual behavior) merits real increases the level of restriction enforced by the group and the
consideration. Profiles that comprise behavioral analysis may overall effectiveness of the program. These conditions are as fol-
ultimately be more productive in terms of offering a means lows (12): (i) keep the person unaware that there is an agenda to
of detecting, and thus controlling, terrorism (6–9). control or change the person; (ii) control time and the physical
• There are conceptual, theoretical, and methodological prob- environment (contact with family); (iii) create a sense of power-
lems with explaining terrorism in terms of personality traits lessness, fear, and dependency; (iv) suppress old behaviors and
that suggest why some people become terrorists and others attitudes; (v) instill new behaviors and attitudes; and (vi) put forth
LEISTEDT . RADICALIZATION 3

a closed system of logic. In parallel with Singer’s six conditions communication systems. Cyber terrorism may very well become a
are the eight psychological themes that psychiatrist Robert Lifton central facet of the terrorist environment in the near future (20).
identified as being central to the thought reform environment, Today more than ever, terrorist networks can be viewed as a
including the environment created by terrorist groups, that invoke “bunch of grapes” that are strongly interconnected by the media
these themes for the purpose of promoting behavioral and attitu- (electronic communications mainly).
dinal changes (13): (i) milieu control (total control of communi-
cation); (ii) loading the language (the group’s jargon); (iii)
Cognition Modification: The Availability Cascade
demand for purity (an “all-or-nothing” belief system); (iv) confes-
sion (to lead members to reveal past and present behavior and An “availability cascade” is a self-reinforcing cycle that
history); (v) mystical manipulation (“you have been chosen to be explains the development of certain kinds of collective beliefs
here”); (vi) doctrine over person (false memory syndrome); (vii) (21,22). A novel idea or insight, especially one that seems to
sacred science (“respected and historical leaders with connections explain a complex process in a simple or straightforward manner,
with Sigmund Freud, Karl Marx, the Buddha”); and (viii) dis- gains rapid currency in the popular discourse by its very simplicity
pensing existence (the terrorist total environment clearly empha- and by its apparent insightfulness. Its rising popularity triggers a
sizes that the members are part of an elite group). Schein’s three chain reaction within the social network: individuals adopt the
stages describe the process of changing attitudes through thought new insight because other people within the network have adopted
reform: “unfreezing, changing, and refreezing.” In unfreezing, it, or because, superficially, the idea seems plausible. The reasons
which is the first stage, past attitudes, choices, and behavior are for the increased use and popularity of the new idea involve both
destabilized by the group. Many terrorist groups use a “hot seat” the availability of the previously obscure term or idea and the need
technique or other forms of criticism to attain the goal of under- of the individuals who use the term or idea to appear to be current
cutting and destabilizing. In the second stage, which is changing, with the stated beliefs and ideas of others, regardless of whether
the person senses that the group’s solutions provide a path. Peer they in fact fully believe in the idea that they are expressing. Their
pressure is very important in this stage. Finally, in refreezing, need for social acceptance, and the apparent sophistication of the
which is the last stage, the group reinforces the desired behavior new insight, overwhelm their critical thinking (21).
with social and psychological rewards and punishes unwanted From our perspective, and in other words, an availability cas-
attitudes and behaviors with harsh criticism, group disapproval, cade is a self-sustaining chain of events, which may start from
social ostracism, and the loss of status (14). media reports of a relatively minor event and lead to public
These practices by terrorist leaders and their subordinates panic and large-scale government action. On some occasions, a
imply a very strong hierarchy that is indeed very similar to that media story about a particular risk catches the attention of a seg-
of a rigid military structure or cult organization. In general, as ment of the public, which becomes aroused and worried. This
with illegal groups (especially those spread over a wide area), it emotional reaction becomes a story in itself, prompting addi-
is not possible to maintain the top-down discipline that is classi- tional coverage in the media, which in turn produces greater
cally found in a standing army (15). Instead, what Atran calls a concern and involvement. The cycle is sometimes perpetuated
“Hydra-headed network” is much more likely to be the norm deliberately by “availability entrepreneurs,” that is, individuals
(16). Mullins illustrates the evolving structure of such networks or organizations who work to ensure a continuous flow of wor-
and how they can develop into something that resembles a busi- rying news. The danger is increasingly exaggerated as the media
ness when they involve frequent kidnaping activities, as compete for attention-grabbing headlines. Scientists and others
described by Mullins and Phillips (17,18). who try to dampen the increasing fear and revulsion attract little
attention, most of it hostile: anyone who claims that the danger
is overstated is suspected of association with a “heinous cover-
The Role of the Media
up.” The issue becomes politically important because it is on
It is well known that the media has many effects on people, everyone’s mind, and the response of the political system is
especially on young people, such as instigating aggression, pro- guided by the intensity of public sentiment (21).
moting social stereotypes, and contributing to cognitive develop- How is an availability cascade linked to terrorism? In his book,
ment, among others (19). In terms of social and terrorist network Thinking Fast and Slow, Kahneman notes that terrorism “speaks
theories, it is clear that new technologies allow terrorists to com- directly to System,” generating an availability cascade that ratchets
municate more efficiently, to broaden their message, and to up an unreasonable level of fear that system has difficulty counter-
wield unconventional weapons in unexpected ways, all of which ing. But there is more to the perceived threat of terrorism than
are central characteristics of asymmetrical warfare. Because of availability. One approach to terrorism is to see it as the use of vio-
incremental improvements in communications and computer lence to trigger and amplify communication: the ultimate target of
technologies, terrorists and their supporters will continue to use terrorist actions is not the people who are attacked but rather audi-
them extensively. Likewise, the increasing availability of compo- ences that learn about the attack. The mass media are implicated in
nents for weapons of mass destruction will continue to soften this process, because their own assessments of what is newsworthy
terrorists’ reluctance to use them (20). give undue attention to violence compared to peaceful protest. In
The Internet provides opportunities for commercial, private, and order to fully understand the popular response to terrorism, we
political interests to spread their messages and communicate with must understand both the psychological dynamics, such as avail-
outsiders. In fact, information technologies are being invented and ability cascades, and the media dynamics, as well as other factors
refined constantly and will continue to be central to the New Ter- such as the internal politics of terrorist groups (23–26).
rorism, providing networks between groups and cells and spread-
ing specific tactics, instructions about overall goals, new bomb-
A Prevalent and Particular Situation: The Lone Wolf
making techniques, and so forth. However, information and com-
puter technologies can also be used offensively. Terrorists today There has been a change in terrorist threats that parallels the
can adopt cyber warfare techniques to destroy information and rise of “lone wolves” who are terrorists acting on their own; they
4 JOURNAL OF FORENSIC SCIENCES

may be motivated by various radical ideas, but they are not con- Telegraph, 2/09/14: Telegraph Media Group Limited, 2014; http://
trolled by terrorist groups (27). Examples of lone wolves include www.telegraph.co.uk/news/worldnews/middleeast/syria/10582945/Al-Qaeda-
training-British-and-European-jihadists-in-Syria-to-set-up-terror-cells-at-
the Tsarnaev brothers, who attacked the Boston Marathon in home.html
2013, and Maj. Hasan, who went on a shooting rampage at Fort 4. The Economist. It ain’t half hot here, mum. August 30, 2014; http://
Hood. Lone wolves are, by definition, more difficult to spot in www.economist.com/news/middle-east-and-africa/21614226-why-and-
advance of their acts; as such, detecting them raises difficult how-westerners-go-fight-syria-and-iraq-it-aint-half-hot-here-mum
5. Cruickshank P, Lister T. Europe faces ‘greatest terror threat ever’ from
questions about the balance between civil liberties and preven-
jihadists in Iraq and Syria. CNN, Breaking News, June 19, 2014; http://
tive surveillance (27). www.cnn.com/2014/06/19/world/europe/lister-european-jihadists/
Unpredictability makes lone wolf attacks very hard to prevent. 6. Horgan J. Terrorist minds? In: Horgan J, editor. The psychology of ter-
Potential perpetrators are difficult to profile and lack the social, rorism, 2nd edn rev. and updated. Abington: Routledge, 2014;47–77.
operational, and financial networks that can be used to catch groups 7. Post JM. Terrorisms and terrorist psychologies: an introduction. In:
Post JM, editor. The mind of the terrorist: the psychology of terrorism
of terrorists. Large-scale terrorist attacks such as the 7/7 London from the IRA to al-Qaeda. New York, NY: St. Martin’s Griffin, 2007;
bombings and the attacks in Mumbai (2008) and at the Westgate 1–10.
mall in Kenya (2013) require extensive planning, intelligence gath- 8. Miller NE. The frustration-aggression hypothesis. Psychol Rev 1941;48
ering, and financing, all of which increase the chance of discovery. (4):337–42.
9. Klandermans B. Frustration-aggression. In: Snow DA, Porta DD, Klan-
An Internet connection and a knife may be all that are needed for
dermans B, McAdam D, editors. The Wiley-Blackwell encyclopedia of
an individual to perform a terrorist act (27). social and political movements. Hoboken, NJ: Wiley-Blackwell, 2013.
For these reasons, inciting lone wolf terrorism is an ideal tactic 10. Singer MT. The process of brainwashing, psychological coercion, and
for a group such as ISIL. Contrary to many views in the West, thought reform. In: Singer MT, Lalich J, editors. Cults in our midst – the
ISIL propaganda does not represent an unstoppable force, and only hidden menace in our everyday lives. San Francisco, CA: Jossey-Bass
Publishers, 1995;52–83.
a tiny fraction of Muslims have answered ISIL’s call to rise up and 11. Kirsch II, author; Heap MM, editor. Hypnosis: theory, research and
attack their Western neighbors. However, its propaganda can cov- application. Alderschot: Taylor & Francis, Ltd., 2006.
ertly radicalize a small number of susceptible individuals who may 12. Singer MT, Addis ME. Cults, coercion, and contumely. Cultic Stud J
then decide to act. Those individuals may be poorly trained or 1992;2(2):163–89.
even act spontaneously, but, most importantly, their actions sow 13. Lifton RJ. Thought reform and the psychology of totalism: a study of brain-
washing in China. New York, NY: W.W. Norton & Co., 1961;419–25.
fear in civilian populations at minimal cost (27). 14. Schein E. Coercive persuasion: a socio-psychological analysis of the
“brainwashing” of the American civilian prisoners by the Chinese Com-
munists. New York, NY: W.W. Norton Publishers, 1961.
Conclusion and Future Perspectives 15. Canter DV, Alsion LJ, editors. The social psychology of crime: groups,
teams, networks. Farnham: Ashgate Publishing Ltd, 2000.
The radicalization process is an increasing and complex phe- 16. Atran S. Mishandling suicide terrorism. Wash Q 2004;27(3):67–90.
nomenon. It implies several aspects that are multidimensional 17. Mullins S. Terrorist networks and small-group psychology. In: Canter D,
(on the individual and societal levels) and heterogeneous, such editor. The faces of terrorism: multidisciplinary perspectives: cross-disci-
as some individual risk factors, the brainwashing, and cognitive plinary explorations. Hoboken, NJ: Wiley-Blackwell, 2009;137–51.
modifications (i.e. the role of the media in general). 18. Philips E. The business of kidnap ransom. In: Canter D, editor. The faces
of terrorism: multidsiciplinary perspectives: cross-disciplinary explo-
In terms of perspectives, counter-radicalization programs, such rations. Hoboken, NJ: Wiley-Blackwell, 2009;189–209.
as those run by Saudi Arabia and Sweden, have shown mixed 19. Chomsky N. Media control: the spectacular achievements of propaganda,
results. The most successful efforts in Britain have been the 2nd edn. New York, NY: Seven Stories Press, 2002.
efforts of the so-called Channel program, which is part of the 20. Martin G. Future trends and projections. In: Martin G, editor. Essentials
of terrorism: concepts and controversies. Thousand Oaks, CA: Sage
British government’s counter-terrorism strategy, to divert young Publications Inc., 2011;260–97.
people from extremism. Such efforts, which involve the police, 21. Kahneman D. The science of availability. In: Kahneman D, editor.
social services, and local authorities working together, draw on Thinking fast and slow. Toronto, ON: Doubleday Canada, 2011;129–45.
methods used to help young people leave gangs. 22. Kuran T, Sunstein CS. Availability cascades and risk regulation. Stanford
Not all of those returning from radical countries will have Law Rev 1999;51:683–768.
23. Nacos BL. Mass-mediated terrorism: the central role of the media in ter-
blood on their hands. Governments need to offer a way out for rorism and counterterrorism. Lanham, MD: Rowman and Littlefield,
those who realize that they have made a mistake, and Western 2002.
countries may benefit from an even softer approach. Chastened 24. Nacos BL. Terrorism, the mass media and the events of 9–11. Phi Kappa
returning fighters may be the very best people to persuade more Phi Forum 2002;82(2):13; https://www.questia.com/magazine/1P3-
122959561/terrorism-the-mass-media-and-the-events-of-9-11
young men to forgo the fight. No one yet knows whether 25. Nacos BL. Terrorism/counterterrorism and media in the age of global
today’s European jihadists who are fighting for IS will become communication. United Nations University Global Seminar Second
tomorrow’s murderers on the streets of Western cities. Shimame-Yamaguchi Session, Terrorism – A Global Challenge; 2006
On a more practical note, it is clear there are currently not enough Aug 5–8; http://archive.unu.edu/globseminar/files/shimane06/Nacos_-
detailed case studies of terrorists to inform psychological analyses text_en.pdf
26. Nacos BL. Terrorism and counterterrorism, 5th edn. Abington: Rout-
or even to conduct comprehensive reviews of the literature. ledge, 2016.
27. Lowenthal M. The intelligence agenda. In: Lowenthal MM, editor. Intel-
ligence: from secrets to policy, 6th edn. Thousand Oaks, CA: SAGE
References Publications, 2015;349–98.
1. Neumann P. Recruitment grounds. In: Neumann P, editor. Joining Al
Qaeda: Jihadist recruitment in Europe. Adelphi Paper 399. Abington: Additional information and reprint requests:
Routledge, 2009. Samuel J. Leistedt, M.D., Ph.D.
2. Horgan J. Qualities are not causes. In: Horgan J, editor. Walking away Forensic Mental Health Hospital “Les Marronniers”
from terrorism: accounts of disengagement from radical and extremist Rue Despars 94
movements. London: Roultedge, 2009;1–20. Tournai 7500
3. Sherlock R, Gaziantep, Whitehead T. Al-Qaeda training British Belgium
and European ‘jihadists’ in Syria to set up terror cells at home. The E-mail: sleistedt@icloud.com

Das könnte Ihnen auch gefallen