Showing 12 of 2594 results.

The security sector and the development sector have not traditionally been natural partners, and have not traditionally cooperated to a large degree. However, given the recent developments in Countering Terrorism (CT) that shifted the focus from reactive measures to a more preventive and multi dimensional approach, the Security sector and…

This meeting note outlines the key recommendations on the role of education in countering violent extremism concluded from a group of experts, policymakers, government officials and practitioners brought together by Hedayah and the Center on Global Counterterrorism Cooperation held in New York, September 2013.

A paper investigating the political landscape in Hungary, in particular the alarming rise to power of the extreme right party Jobbik. It concludes that although the extent of the far right goes beyond Jobbik, the party ensures there is a hardcore of fanatical and potentially violent far-right adherents.

This research paper examines some of the challenges, as well as possible strategies and legal mechanisms available for European policymakers to address the foreign fighters phenomenon. It first assesses the complex threat (potentially) posed by returning mujahidin to Europe’s security. The Paper then outlines some of the risk assessment and…

This manual focuses on the investigation process and has been produced following requests from law enforcement officers working in the field for a practical tool to aid their work. It is designed to help improve democratic policing practice across the OSCE and to assist law enforcement practitioners in strengthening their…

This note describes a new and unique, open source, relational database called the United States Extremist Crime Database (ECDB). We first explain how the ECDB was created and outline its distinguishing features in terms of inclusion criteria and assessment of ideological commitment. Second, the article discusses issues related to the…

This paper presents the results from exploratory primary research into the role of the internet in the radicalisation of 15 terrorists and extremists in the UK. The 15 cases were identified by the research team together with the UK Association of Chief Police Officers (ACPO) and UK Counter Terrorism Units…

This field observation examines 58 police interrogators’ rapport-based behaviors with terrorist suspects; specifically, whether rapport helps elicit meaningful intelligence and information. The Observing Rapport-Based Interpersonal Techniques (ORBIT; Alison, Alison, Elntib & Noone, 2012) is a coding framework with 3 elements. The first 2 measures are as follows: (i) 5 strategies…

In recent years, policymakers and practitioners have recognized that “hard” counterterrorism measures alone cannot address terrorism, a threat that is increasingly diffuse and unpredictable. Furthermore, these approaches ineffectively address the enabling environment for violent extremism, such as the conditions, grievances, and ideologies that may contribute to the violent radicalization and…

The present work employs a utilization-focused evaluation perspective to ask the big question regarding so-called deradicalization programs: how to evaluate the degree to which a given terrorism risk reduction initiative reduces post-detainment terrorism engagement. Its dual objectives are: (a) to provide a roadmap for conducting such an impact analysis with…

The anti-terror public media campaigns started in Iraq around 2004 and wascalled ‘Terror has no Religion’ in order to combat the threats of sectarianism and Al-Qaeda.After the withdrawal of the US forces from the country in late 2010, the campaign stopped,but a new and similar one emerged that is called…

Using examples from a wider study, the authors explore different ways in which individuals have used the Internet in their processes of radicalisation and point out that policy-makers and researchers need to focus their efforts on understanding not merely the content tthat is available online, but the ways in which…