Showing 12 of 2600 results.

The threat of radical Islam has been used by the Tajik government as a way to promote discriminatory policies based on a misinterpretation of the causes and extent of radicalisation in the country, argues Edward J Lemon. He analyses the Tajik government’s rhetoric and policies to show how it has…

The following article contributes to the emerging field of countering violent extremism (CVE) by proposing a framework to understand and categorise CVE programs, and applying this to Australia’s CVE efforts from 2010 to 2014. The first section outlines the evolution of CVE as a policy tool. A framework to categorise…

In 2012, the Dutch National Coordinator for Security and Counterterrorism and the Dutch Probation Service launched a reintegration project for offenders on probation or parole who were (suspected to be) involved in jihadist extremism or terrorism. The initiative’s primary goal was to reduce the chance of recidivism among this target…

The article explores why CVE is more critical than ever and why it is important to differentiate CVE from traditional counterterrorism measures. Looking ahead to discussions among member states and the UN system on a plan of action on CVE, the article encourages states to invest sufficient political capital to…

The Global Center will work with partners from South and Central Asia to develop five to eight pilot preventing/countering violent extremism (P/CVE) initiatives that offer contextually tailored and locally resonant responses to the threat of violent extremism in the region. The initiatives will be selected through a competitive application process…

As the conflicts in Syria and Iraq have been continuing for more than four years, the role of Turkey as a potential transit route for the movement of Foreign Terrorist Fighters (FTFs) has been a subject of intensive debate. Turkey is largely an end-user of the FTF travels and, surely,…

IN THE WAKE of the Paris attacks, US government officials have been vocal in their condemnation of encryption, suggesting that US companies like Apple and Google have blood on their hands for refusing to give intelligence and law enforcement agencies backdoors to unlock customer phones and decrypt protected communications. But…

The UK Government has recently announced a new Counter-Terrorism and Security Act 2015 to facilitate tackling the threat of violent extremism. In light of this and previous initiatives, this paper provides a critical assessment of UK counterterrorism policy. This policy has created a notion of ‘suspect communities’ such that it…

Indonesian extremists have a long history of online activism, but links to the Islamic State (still better known in Indonesia by its former acronym ISIS) have raised questions about whether social media usage is significantly changing patterns of radicalisation and recruitment. The answer seems to be a qualified no, but…

Over the last two years, the Obama administration and Congress have promoted Countering Violent Extremism or “CVE” as a “soft” counterterrorism methodology designed to empower communities and build resilience to extremism. But CVE isn’t a new concept, and the flawed foundation on which these programs are built all but ensures…

Who would be the first to notice, and able to intervene, with individuals considering acts of violent extremism? Study 1 found evidence that those best positioned to notice early signs of individuals considering acts of violent extremism might be those individuals’ friends: perhaps more so than school counselors, clergy, or…

The Southeast Asia fighting unit of the Islamic State of Iraq and Syria (ISIS), Katibah Nusantara (KN) continues to expand geographically within a year of its establishment. There are about 450 Indonesians and Malaysians, including children and women under fealty to ISIS in Iraq and Syria today. KN or Majmuah…