Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: November 25, 2024 Mon

Time: 8:14 pm

Results for counter-extremism

13 results found

Author: Ramalingam, Vidhya

Title: On the Front Line. A guide to countering far-right extremism

Summary: Far-right extremism remains a worrying problem across Europe. The most visible cases are those that hit the headlines, such as the discovery of the National Socialist Underground in Germany or Anders Behring Breivik's attacks in Norway. In the past decade, both Hungary and Sweden were hit by a string of serial murders of Roma and ethnic minorities. Though attacks of this magnitude and scale remain rare, they are not unheard of. In some cases, those personally touched by these violent attacks are still fighting for justice. While high-profile and high-impact events hit the headlines, the bulk of the threat posed by the far right is felt through smaller-scale localised harassment, bullying and hate crime by extremists targeting minority communities. These kinds of incidences often go undetected, and indeed they are hard to quantify. They manifest in the sectioning off of some local areas as no-go zones for ethnic minorities, graffiti of far-right symbols on mosques and synagogues, or threats received by individual members of the community. Those carrying out these actions - far-right extremists - are a broad group, ranging from less ideological youth street gangs to neo-Nazi terrorist cells, anti-Islam activists and registered political parties. Though they differ in their aims and methods, there are some defining features: racism, xenophobia, ultra-nationalism and authoritarianism. The actions they take aim to intimidate and assert power over particular communities and undermine democracy. In some countries, the capacity for violence within the far right is on the rise, and it remains challenging to ascertain at what point ideology can turn to violence. With the proliferation of extremist content online, and the ease with which anyone can access communities advocating violence across the web, this challenge has only grown. There are thousands of front-line professionals across Europe who come face-to-face with this issue on a regular basis, whether it is those working specifically on countering violent extremism, or those who encounter the far right as part of their daily responsibilities policing communities or educating young people. Though European countries differ on the particular problems they face and the ways in which they address them, there are more commonalities than differences when it comes to specific challenges posed by the far right. Front-line professionals and local communities often develop innovative solutions to these challenges, though these rarely make headlines or send ripples beyond the community immediately affected. This project aims to change this. This is one of the first projects aiming to enhance understanding of what works in prevention, intervention and response to far-right extremism across Europe. It has developed a package of resources which include ISD's report Old Threat, New Approach: Tackling the Far Right Across Europe which sets out government approaches to far-right extremism and provides guidance to policymakers, as well as an online platform called The FREE Initiative - Far-Right Extremism in Europe (www.theFREEinitative.com), which aims to inspire and connect those tackling the far right and showcase best practices. This is a practical guide for front-line professionals and activists. It is based on the collective experiences of over 120 individuals tackling far-right extremism across 10 countries (Sweden, UK, the Netherlands, Norway, Finland, Denmark, Germany, Poland, Hungary, Slovak Republic). This includes both governmental and non-governmental professionals coming into contact with far-right individuals or those who are impacted by them, on a daily basis. These professionals are thus in a unique position to influence those within or vulnerable to far-right extremism, and limit their impact.

Details: London: Institute for Strategic Dialogue, 2014. 77p.

Source: Internet Resource: Accessed May 18, 2015 at: http://www.strategicdialogue.org/On_The_Front_Line_Far_RightHANDBOOK.pdf

Year: 2014

Country: Europe

URL: http://www.strategicdialogue.org/On_The_Front_Line_Far_RightHANDBOOK.pdf

Shelf Number: 135709

Keywords:
Counter-Extremism
Counter-Radicalization
Extremist Groups
Radical Groups
Violent Extremists

Author: Saltman, Erin Marie

Title: The Role of Prevent in Countering Online Extremism

Summary: The following White Paper addresses the role of the UK government and social media companies and Internet service providers (ISP) in monitoring and policing the Internet for extremist and/or terrorism-related content. This paper seeks to analyse the effectiveness of the UK government's Prevent strategy and provide recommendations for its improvement in line with the current nature of the threat. Currently, the two biggest challenges for UK counter-terrorism are the radicalisation and recruitment of individuals by the jihadist organisation Islamic State (IS) and the use of the Internet by IS and other extremist organisations to spread unwanted and potentially dangerous ideologies and narratives internationally. This subject is of great importance, especially as government debates how best to tackle extremism and adequately implement counter-extremism measures both in real terms and online. Sections 2 and 3 discuss the framework of the government's Prevent strategy, while sections 4 through 9 detail the challenges extremism and terrorism-related content online pose. Section 10 addresses the role of Prevent in countering online extremism in the UK.

Details: London: Quilliam Foundation, 2014. 13p.

Source: Internet Resource: White Paper: Accessed February 12, 2016 at: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/white-paper-the-role-of-prevent-in-countering-online-extremism.pdf

Year: 2014

Country: United Kingdom

URL: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/white-paper-the-role-of-prevent-in-countering-online-extremism.pdf

Shelf Number: 137849

Keywords:
Counter-Extremism
Extremism
Extremist Groups
Online Communications
Radical Groups
Radicalization
Social Media

Author: Stuart, Hannah

Title: Community Policing and Preventing Extremism: Lessons from Bradford

Summary: Since the 7/7 terrorist attacks in London, police forces nationally have implemented successive counter-radicalisation policies. Community Policing and Preventing Extremism, based on a series of interviews with senior police officers from the West Yorkshire Police and the North East Counter-Terrorism Unit, provides a practical perspective on the challenges of delivering preventative work at grassroots level as well as on policy debates about the remit of counter-extremism in a free society. Key findings include: ◾The police advocate building sustainable relationships with communities based on mutual trust and confidence; and recognise the need to be representative and to respond to changing community dynamics; ◾A focus on successful community policing and "quality of life issues" allows the police to proactively create resilient partnerships rather than attempting to force a relationship in response to a counter-radicalisation-related issue; ◾A strategic mechanism for supporting the ideological challenge against extremism is promoting critical thinking skills and credible voices, which builds resilience against extremism; helps isolate extremists; and promotes dialogue around other controversial issues, such as grooming; ◾Promoting safe giving is a key response to the religious injunction for charity within Muslim communities, which can increase vulnerability to fundraising for criminal or terrorist intent and to intimidating styles of fundraising that take advantage of a generous and permissive cultural attitude towards giving; ◾Police forces are well-placed to identify grievances and negative perceptions within communities. Successful work around education, internet safety and grooming demonstrates the value of promoting counter-radicalisation as a safeguarding issue rather than simply as a counter-terrorism tool; ◾Among the biggest challenges anticipated for 2015 is ensuring consistency in relation to freedom of speech and the thresholds used to measure extremism, particularly as it manifests either online or in public situations, for example at universities and during political protests.

Details: London: Henry Jackson Society, 2015. 30p.

Source: Internet Resource: Policy Paper No. 4: Accessed February 12, 2016 at: http://henryjacksonsociety.org/wp-content/uploads/2015/02/Community-Policing-and-Preventing-Extremism.pdf

Year: 2015

Country: United Kingdom

URL: http://henryjacksonsociety.org/wp-content/uploads/2015/02/Community-Policing-and-Preventing-Extremism.pdf

Shelf Number: 137850

Keywords:
Community Policing
Counter-Extremism
Counter-Terrorism
Extremism
Extremist Groups
Radical Groups
Radicalization
Terrorism

Author: Hussain, Ghaffar

Title: Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter it

Summary: Online extremism and the role the Internet plays in the radicalisation process is currently being debated and discussed by journalists, academics, technologists and government officials alike. This report demystifies the topic of extremist content online and exposes the manner in which online tools are being used by Islamist extremist organisations and individuals to recruit and propagandise. Current measures to tackle online extremism are also assessed and critiqued, after which the report details a practical strategy for countering extremism online and making the Internet a less hospitable domain for extremists. The research conducted for this report focuses on 30 Islamist extremist groups operating in the UK and France, mapping their use of the Internet and what they hope to achieve through their online activities. Popular online platforms such as YouTube, Facebook, Twitter as well as chat rooms, discussion forums and static websites are analysed with a view to assessing the role online extremist messaging plays in the radicalisation process. The report also addresses the issue of censorship, assessing the effectiveness of current filtering methods available and their overall efficacy. Research for this report was based on original data collection and analyses as well as interviews with a range of experts, mentors and target audiences. Key findings in this report: - With the Internet often being accused of producing radicalisation in isolation of other factors, this report found that the vast majority of radicalised individuals come into contact with extremist ideology through offline socialisation prior to being indoctrinated online. In other words, the Internet does not radicalise in isolation of other factors and should not be targeted as the 'cause' of radicalisation. As such, the Internet's role is less about initiating the radicalisation process; rather it acts as a facilitator and catalyst for the radicalisation process by 1) indoctrinating, 2) educating and 3) socialising individuals. - Although governments are increasingly relying on censorship and filtering methods to counter online extremism, this report found that negative measures, or censorship in general, was not only ineffective and costly but also potentially counter-productive. - Positive measures, such as developing counter-extremist efforts through online counter-speech content and popularising online initiatives that fight against extremism are much more effective in challenging extremist ideologies. However, there are currently not enough materials that counter extremist content online, allowing extremists to monopolise certain issues. - We found that results from search engines rarely, if ever, provide links to content that supported Islamist extremism. It was equally rare to find content countering extremist narratives. - Research also found that available Islamist extremist content websites were most successful if they provided more subtle, non-illegal information platforms with links to active social media platforms for users. Available static websites served primarily to 1) propagate the Islamist narrative through specific interpretations of scriptures, 2) promote martyrdom and 3) solidify a 'self versus other' allegiance to Muslims, rejecting non-Muslims. This report seeks to differentiate itself from previous reports on online extremism in two ways; firstly the research itself is much more in-depth and diverse, combining qualitative and quantitative data to reach conclusions. Secondly, this report offers a comprehensive and practical list of recommendations which, if implemented fully, could unleash a new wave of online activism that will take the fight to extremists online, breaking the current monopoly they hold over certain socio-political issues. Recommendations to public, private and third party sectors based on our findings: - Establishing a forum that deals with online extremism and brings stakeholders from key sectors together in order to do so. - Improving digital literacy and critical consumption skills in schools and communities. - Encouraging the establishment of a social media outlet that clarifies government policies and debunks propaganda. - A mapping exercise that explores current efforts to tackle extremism online and identifies partners that could be given support to develop an effective online presence. - Establishing a central body that offers seed funding and training for grassroots online counter-extremism initiatives. - More research into how the far right is using the Internet to propagandise giving a broader view of 'extremism online'. The findings and recommendations of this report suggest a clearer understanding of the role the Internet plays in radicalisation process and an appreciation of the dangers of relying on illiberal censorship can contribute towards the development of a more holistic approach to tackling extremism online. Relying on the cultivation of grassroots initiatives to develop and promote counter-speech online, as opposed to censorship, could help turn the tide against current extremist efforts. However, co-operation and regular communication between stakeholders from key sectors is vital in order for the above vision to be realised and, thus, the establishment of a forum that allows this to take place is also important.

Details: London: Quilliam Foundation, 2014. 132p.

Source: Internet Resource: Accessed February 12, 2016 at: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/jihad-trending-quilliam-report.pdf

Year: 2014

Country: United Kingdom

URL: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/jihad-trending-quilliam-report.pdf

Shelf Number: 137854

Keywords:
Counter-Extremism
Counter-Terrorism
Extremism
Extremist Groups
Internet
Islamists
Online Communications
Radical Groups
Radicalization
Terrorism

Author: Malik, Nikita

Title: South Asian Militant Groups and Global Jihad in 2015

Summary: This report is designed as a field guide to the most significant militant groups in Afghanistan, Pakistan, and India. It illustrates regional and international trends, and it explains the strategies that have been used by various global jihadist actors at a turning point in South Asian geopolitics. Due to a combination of military operations against them, internal fractionalisation, and the shifting influence of "global jihad", terrorist groups in South Asia are far from structured, cohesive units. As such, Quilliam advocates a new approach in policy. It is now crucial to revisit and re-emphasise the potential for counter-radicalization strategies, as well as mental health policy to reduce the risk of radicalisation. Moreover, we maintain that by coupling civil society initiatives with local, regional, and international policies, the affected Governments will be able to counter these violent ideologies. Based on our findings, Quilliam has developed the following set of counter-terrorism and counter-extremism recommendations: To the International Community: - Make counter-extremism and human rights principles the cornerstone of all related aid that is provided to Pakistan and Afghanistan. - Continue to focus on human rights as a core aim. Strongly insist on greater transparency during counter-terror operations such as Zarb-e-Azb in FATA. If human rights abuses against civilians go unchecked, then defeating one wave of militancy is a temporary victory, as another will be created in the process in response to perceived injustices. - Support grassroots reconciliation efforts and civil society initiatives which offer positive, sensitive, and sustainable forms of post-conflict solutions. - Better engage with Muslim communities in India, Pakistan, Jammu and Kashmir (J&K), and Afghanistan to decrease the appeal of an Islamic caliphate by promoting democratic cultures and addressing grievances to prevent militant ideologies exploiting them. - Help foster stronger micro-finance charity relationships, banking systems, and schemes in South Asia in order to provide conduits to micro-credit for smaller villages and communities that will facilitate economic and social development, and reduce the risks of radicalisation within the relevant communities. The informal 'value transfer' system that is known as the hawala system, tends to thrive when the banking sector is weak. We recommend requirements on hawaladar, such as licensing and registration. - Support economic policies that will reduce income inequality in Afghanistan, India, and Pakistan, and avoid the implementation of financial measures that disproportionately impact the poor in the way that structural adjustment schemes have done so in the past. - Critically review the legal, moral, and military arguments for Unmanned Aerial Vehicles (UAVs) in operations over Pakistan and Afghanistan. Associated grievances can be exploited by extremists to radicalize or recruit local populations.

Details: London: Quilliam Foundation, 2015. 54p.

Source: Internet Resource: Accessed March 10, 2016 at: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/south-asian-militant-groups-and-global-jihad-in-2015.pdf

Year: 2015

Country: Asia

URL: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/south-asian-militant-groups-and-global-jihad-in-2015.pdf

Shelf Number: 138176

Keywords:
Caliphate
Counter-Extremism
Counter-Terrorism
De-Radicalization
Islamic State
Jihad
Media
Radical Groups
Radicalization
Social Media
Terrorism
Terrorists

Author: Snair, Justin

Title: Countering Violent Extremism Through Public Health Practice: Proceedings of a Workshop

Summary: Countering violent extremism consists of various prevention and intervention approaches to increase the resilience of communities and individuals to radicalization toward violent extremism, to provide nonviolent avenues for expressing grievances, and to educate communities about the threat of recruitment and radicalization to violence. To explore the application of health approaches in community-level strategies to countering violent extremism and radicalization, the National Academies of Sciences, Engineering, and Medicine held a public workshop in September 2016. Participants explored the evolving threat of violent extremism and radicalization within communities across America, traditional versus health-centered approaches to countering violent extremism and radicalization, and opportunities for cross-sector and interdisciplinary collaboration and learning among domestic and international stakeholders and organizations. This publication summarizes the presentations and discussions from the workshop.

Details: Washington, DC: National Academies Press, 2017. 100p.

Source: Internet Resource: Accessed February 28, 2017 at: https://www.nap.edu/download/24638

Year: 2017

Country: United States

URL: https://www.nap.edu/download/24638

Shelf Number: 141257

Keywords:
Counter-Extremism
Extremist Groups
Public Health
Radical Groups
Terrorism
Violence Prevention
Violent Extremism

Author: Swedberg, Jeffrey

Title: Mid-Term Evaluation of USAID's Counter-Extremism Programming in Africa

Summary: Based on a review of quantitative and qualitative information and data from the Trans-Sahara Counterterrorism Partnership (TSCTP), it can be concluded that USAID-s Niger, Chad and Mali programs have had some positive impact - most strikingly on lower-level programmatic goals such as civic engagement and listenership for USAID-sponsored radio. Results on higher-level goals, measured through surveys on attitudes towards extremism, were also positive in the aggregate but less dramatic. Despite this empirical evidence of program impact, implementation of the TSTCP has coincided with a worsening of the terrorist threat in parts of the Sahel, indicating a continued need for counter-extremism programming. Background - In 2010, USAID's Bureau for Africa commissioned AMEX International and its subcontractor, the QED Group LLC, to conduct a mid-term evaluation of USAID's counterextremism-programming in Africa, focusing on the TSCTP. The evaluation team was composed of Team Leader Jeffrey Swedberg (QED Group LLC) and Peace and Security Specialist Steven A. Smith (AMEX consultant). The Sahel has been a concern to USG policy makers for several years as a possible staging area for violent extremists. These fears are becoming more pronounced as Mauritania, Niger and Mali have all experienced a worrisome uptick in kidnappings and killings of foreigners, while Chad continues to be plagued by chronic instability. To counter extremist forces in the Sahel, USAID has worked for the past five years in concert with the Departments of Defense and State on the TSCTP. The USG's interagency strategy is aimed at defeating terrorist organizations and their ability to gain recruits by (a) strengthening regional counter-terrorism capabilities; (b) enhancing and institutionalizing cooperation among the region's security forces; (c) promoting good governance; (d) discrediting terrorist ideology; and (e) reinforcing bilateral military ties. USAID implements the non-military portions of this partnership in cooperation with State and Defense. USAID's current TSCTP activities include: a regional multi-sector Peace for Development (PDEV) program in Niger and Chad (and in Mauritania until activities were suspended), implemented by the Academy for Educational Development (AED); and community development activities in Mali, implemented by multiple partners. For USAID, the program seeks to provide tangible benefits to populations, particularly youth, at risk for recruitment by violent extremist (VE) organizations and communities in at-risk regions through youth employment and outreach programs, vocational skills training, and community development and media activities. The program also gathers beneficiaries from different communities, ethnic groups, and countries together through outreach events on topics related to religion and tolerance. Methodology - The evaluators developed qualitative information (focus groups and key informant interviews) and quantitative data (surveys), and conducted an in-depth review of literature and past reports. Utilizing a quasi-experimental design, this impact evaluation analyzed survey data to determine if treatment populations in Niger, Chad and Mali, where TSCTP programming was present, had more favorable responses to the survey questionnaire than comparison populations in areas where less TSCTP programming had been present. In all, the evaluators analyzed the results of 1,064 surveys administered in five treatment and four comparison clusters across three countries. The evaluators used the same survey mechanism in both Niger and Chad, and a slightly different version in Mali. The questions for the surveys were chosen from previous questionnaires that had been administered in these countries before, allowing for comparison with baseline data. These - source surveys included the 2009 PDEV Baseline Survey for Niger and Chad; the Afrobarometer for Mali; and the Public Attitudes in the Sahel 2007-2008 survey commissioned by AFRICOM for all three countries. The survey questions were designed so that the most favorable answer to each question would be coded as a -- with the least favorable answer coded as a .... This system allows comparability of analysis of questions or groupings of questions, which are averaged to produce a score on the 1-5 Likert Scale . In order to measure these results, the evaluation team surveyed households identified as ―treatment‖ clusters, and -comparison clusters.‖ The survey was administered by trained enumerators in the local language of the community. Survey Results - While results from this quasi-experimental survey design cannot be considered definitive proof of impact, the findings are consistent with existing literature on the TSTCP. According to the surveys, the program appears to be having modest yet significant impact across all three countries. The graphic on the following page (Figure 1) highlights the differences on the survey questions shared in all three countries covered by this evaluation - The differences between treatment and comparison areas, when shown on a one to five scale, are modest - an average of 5.67% in aggregate in favor of the treatment clusters. However, the impact appears mostly consistent across countries. The biggest impact for all three countries came on the survey question regarding whether respondents listen to TSCTP-sponsored peace and tolerance radio. Since residents of all treatment and comparison clusters were in broadcast range of these radio signals, data indicates that complementary TSCTP programming, such as governance, youth, micro-enterprise, religious outreach and education, significantly boosts listener-ship. Scores on whether respondents -participate in decision-making - , a governance indicator, indicate significant results for Mali, where there has been a long-standing governance program, as well as for Chad where governance and civil society has been a focus of PDEV and its predecessor program. The level of - satisfaction with services, -- a key socio-economic indicator, shows marginal but positive results across the countries. The aggregated AFRICOM cultural questions - measuring respondents' views on the degree to which they were against Al Qaeda; against violence in the name of Islam; their opinion of the United States; whether they approved of working with West to combat terrorism; and felt that the U.S. was fighting terrorism not Islam - measure progress on the hardest goals to achieve, and are arguably the most important indicators for demonstrating TSCTP's long-term impact. Predictably, the differences between treatment and comparison areas are the smallest on the cultural/attitudinal questions. However, the relatively better results for Chad and Niger over Mali may indicate the value of having a holistic TSTCP program, in which programs directed at the various drivers of VE are more intensively coordinated but less integrated with other USAID programming.

Details: Washington, DC: United States Agency for International Development, 2011. 110p.

Source: Internet Resource: Accessed May 13, 2017 at: http://pdf.usaid.gov/pdf_docs/Pdacr583.pdf

Year: 2011

Country: Africa

URL: http://pdf.usaid.gov/pdf_docs/Pdacr583.pdf

Shelf Number: 145465

Keywords:
Counter-Extremism
Counter-Terrorism
Extremist Groups
Radical Groups
Terrorism
Terrorist Recruitment
Violent Extremism

Author: Zeiger, Sara

Title: Undermining Violent Extremist Narratives in South East Asia: A How-To Guide

Summary: The aim of this compendium is to provide guidance and insight for practitioners, policymakers, governments and civil society organizations in South East Asia that are interested in developing counter-narratives and alternative narratives to the messaging produced by violent extremists. The compendium will draw on international good practice and lessons learned to inform and inspire these actors to utilize the most effective methods and strategies. The compendium begins with a step-by-step approach to counter-narratives, with clear examples from South East Asia. The compendium then dives deeper into several case studies, highlighting elements of good practice from the region before presenting a detailed annex of 80 existing counter-narratives from South East Asia (Annex 3). It should be noted that the narratives and subsequent analysis of the narratives and counter-narratives contained in this report mostly focus on violent extremism of groups that claim to be Islamic, primarily because the majority of the threats posed by violent extremist groups in South East Asia fall under this category. However, this is not to say that violent extremism only relates to the above category, and there are case examples from other non-Islamic forms of violent extremism. For a more robust assessment of the threats of violent extremism in the region, refer to Annex 2: Violent Extremism in South East Asia. It is important to establish the terminology that has been adopted throughout the compendium. The term "narrative" generally refers to the story or recruitment pitch of violent extremists, whereas "counter-narrative" generally refers to the story or counter-argument utilized to reduce the appeal of violent extremism. Counter-narratives include counter-arguments as well as positive, alternative narratives and government strategic communications. The contents of this compendium rely on a number of sources: 1) research on the academic and policy literature conducted by the author; 2) an expert workshop on "South East Asia Counter-Narratives for Countering Violent Extremism (CVE)" hosted by Hedayah and the Jakarta Centre for Law Enforcement Cooperation (JCLEC) in Semarang, Indonesia in March 2016 and the subsequent report;1 and 3) a consultation process on draft versions of the compendium with regional experts and policymakers from the region.

Details: Abu Dhabi, United Arab Emirates: Hedayah Center, 2016. 45p.

Source: Internet Resource: Accessed May 13, 2017 at: http://www.hedayahcenter.org/Admin/Content/File-3182016115528.pdf

Year: 2016

Country: Asia

URL: http://www.hedayahcenter.org/Admin/Content/File-3182016115528.pdf

Shelf Number: 145466

Keywords:
Counter-Extremism
Extremist Groups
Terrorism
Terrorists
Violent Extremism

Author: Buchanan-Clarke, Stephan

Title: Violent extremism in Africa: Public opinion from the Sahel, Lake Chad, and the Horn

Summary: Over the past two decades, the threat posed by violent extremist groups that espouse fundamentalist religious narratives has grown substantially across Africa (Hallowanger, 2014). The colonial era and the undemocratic rule that characterized many post-independence governments generated anti-Western and jihadist movements across the Middle East and the wider Islamic world (Moore, 2016). These movements advocate conservative religious rule as a cure for modern societies' social ills. By the 1990s, these ideologies had begun to spread to Africa, where porous borders, poor security apparatuses, weak governance, corruption, ethnic divisions, and high youth unemployment created conditions under which violent extremist groups thrived (Institute for Economics & Peace, 2014). In Nigeria and Somalia, for example, violent extremist organisations began as ethnically homogenous movements with purely domestic concerns - the overthrow of their respective governments. Over time they have evolved toward more ambitious political goals and established an active presence in neighbouring states. These groups generally favour border regions due to lower levels of government presence and security, which facilitate illicit networks and vulnerable border communities. Such a situation challenges not only the internal stability of many countries, but also the stability of the broader region. Moreover, links between national and international jihadist groups have increased over the past decade. In 2012, al Shabaab declared allegiance to al Qaeda, but there has been recent infighting over whether to shift this allegiance to the Islamic State of Iraq and the Levant (ISIL). In early 2015, the Nigerian group Boko Haram publicly declared allegiance to ISIL leader Abu Bakr al-Baghdadi (Guardian, 2015). These international networks not only help these groups with material and operational support, but also build their credibility within the broader jihadist movement, thereby facilitating international recruitment (CNN, 2015). Security-led approaches have largely failed to contain the geographic footprint of violent extremists in sub-Saharan Africa. This has prompted the emergence of more development-oriented approaches, such as countering violent extremism (CVE) and preventing violent extremism (PVE) initiatives, which seek to address root political and socioeconomic causes of extremism (Zeiger & Aly, 2015). In the past two years, both the United States and the European Union have officially outlined their approaches to CVE. 1 Several initiatives have also emerged on the African continent, including Nigeria's Soft Approach to Countering Terrorism (NACTEST). These development-oriented approaches place emphasis on the environments in which violent extremism thrives. Public opinion research offers insight into violent extremism's impact on ordinary citizens by presenting their perceptions, attitudes, and policy preferences. It also allows researchers to identify areas and populations in which possible drivers of extremism, such as low levels of social cohesion or high levels of distrust toward the state, are present. Afrobarometer's Round 6 surveys in 2014/2015 asked security-related questions in several countries that have experienced growth in violent extremism in recent years. This paper provides exploratory analysis of new opinion data from three of sub-Saharan Africa's regional "hotspots" of extremist activity, which are home to some of the continent's most prolific groups: 1. Boko Haram in the Lake Chad region (Cameroon, Niger, and Nigeria) 2. Ansar Dine, al Qaeda in the Islamic Maghreb (AQIM), and al Mourabitoun (among others) in the Sahel region (Mali). 3. Al Shabaab in the Horn of Africa (Kenya and Uganda). Afrobarometer survey data suggest that security-related issues are a top priority for citizens of countries that have experienced high levels of extremist activity. Public trust in security forces varies widely by country; trust is generally lower in the police than in the army. Public approval of government counter-extremist efforts ranged from about four in 10 in Nigeria and Kenya to three-fourths or more in Mali, Cameroon, Niger, and Uganda. Support for strengthening military responses and capabilities was high in all countries in which the question was asked. Among citizens' perceptions of what motivates people to join extremist groups, personal gain was a far more common response than religious beliefs. While the exploratory analysis presented here must be considered in light of changes in government and of evolving extremist and counter-extremist strategies, it suggests the value of tracking and expanding insights into citizens' perceptions and attitudes related to violent extremism.

Details: Afrobarometer, 2016. 36p.

Source: Internet Resource: Accessed May 13, 2017 at: http://afrobarometer.org/sites/default/files/publications/Policy%20papers/r6-afropaperno32-violent-extremism-in-ss-africa-en.pdf

Year: 2016

Country: Africa

URL: http://afrobarometer.org/sites/default/files/publications/Policy%20papers/r6-afropaperno32-violent-extremism-in-ss-africa-en.pdf

Shelf Number: 145467

Keywords:
Counter-Extremism
Extremist Groups
Radical Groups
Terrorism
Terrorists
Violent Extremism

Author: Robinson, Eric

Title: What Factors Cause Individuals to Reject Violent Extremism in Yemen?

Summary: Why do some individuals become terrorists? Why do some choose to travel overseas to become foreign fighters and others remain home to engage in political violence? More than academic, the answers to these questions inform a central component of U.S. national security strategy: countering violent extremism. This report addresses the topic of radicalization - or individual motivations to engage in political violence-in Yemen. This report uses data from focus groups and a national survey conducted during the spring of 2016. Yemen is in the midst of a civil war. In the wake of the collapse of the government of Tunisia in 2011, Yemeni protesters took to the streets in major cities to protest the reelection of then-President Ali Abdullah Saleh. After protracted negotiations by the Gulf Cooperation Council (GCC), Abd Rabbuh Mansur Hadi, who was Saleh's vice president, took over the presidency in February 2012. By then, the internal strife had gained momentum. The Houthis, who had fought several wars against Saleh's forces, had used the unrest to expand from their stronghold in the Sa'ada governorate. They eventually seized the capital of Sana'a in September 2014. President Hadi and his forces retreated to Aden and southern Yemen, but the Houthis pushed south and assaulted Aden's international airport in March 2015. The civil war had begun. More than 10,000 people have died in Yemen's civil war. Nearly 2.2 million-out of a total population of 27 million-are internally displaced and an additional 200,000 are refugees overseas. Various nonstate armed groups exist. Some fight with the aforementioned Houthi movement. Others have joined the local al Qaeda affiliate, al Qaeda in the Arabian Peninsula (AQAP). Still, others are associated with the Islamic State. These armed groups fight against one another as well as the Yemeni military forces and those of the Arab coalition. With such a widespread conflict, it would be easy to understand the motivations of those who are sympathetic to, or become involved in, political violence. But rather than focus on support for political violence per se, the report looks at the other side of the coin - why individuals reject violent extremism in Yemen. It argues that the more effective approach to countering violent extremism is to reinforce a propensity toward nonviolence.

Details: Santa Monica, CA: RAND, 2017. 73p.

Source: Internet Resource: accessed June 17, 2017 at: https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1727/RAND_RR1727.pdf

Year: 2017

Country: Yemen

URL: https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1727/RAND_RR1727.pdf

Shelf Number: 146245

Keywords:
Counter-Extremism
Counter-Terrorism
Extremist Groups
Radicalization
Terrorism
Violent Extremism

Author: London Assembly. Police and Crime Committee

Title: Preventing extremism in London

Summary: Preventing individuals from participating in, or supporting, the kinds of extremism that harm individuals and communities is crucial to our safety and security. Extremism, particularly violent extremism, is one of the most serious challenges facing society today. It has the potential to not only manifest itself in physical attacks on people and places, but to isolate individuals and create a breakdown in relationships between communities. Our investigation focused on the implementation of the Government's Prevent Strategy in London. The Strategy-and more recently its Counter-Extremism Strategy-sets out how it intends to help public sector bodies and communities dissuade individuals from engaging in extremism. Throughout our work, one thing stood out to us: that the risk of being drawn into extremist activity is a vulnerability in the same way that some are at risk of exploitation by others. Engaging the person at risk, and all those around them, in an open and honest way is vital to success. Only by being candid about the issues, open about how they are being tackled, and by delivering a strong and positive message, can efforts to prevent extremism be expected to make a difference. The context: the challenges in preventing extremism Instances of violent extremism are sadly not new. However, there has in recent years been a step change in the volume, range, and pace of extremist activity. The nature of the threat from extremist groups is now not only from large scale coordinated attacks, but increasingly from lone individuals inspired and encouraged to carry out attacks in the UK. The violent extremism promoted and carried out by supporters of the so called Islamic State (ISIL) poses the biggest current threat to UK security. But while there will be different priorities at different times, depending on the nature of the threat, it is important that the agenda covers all forms of extremism. For example, London has-and continues to-experience the impact of far right-wing extremism. Examples include the 1999 nail-bomb attacks in Soho, and a neo-Nazi demonstration in June 2015. Extremist groups establish a narrative that is used to encourage people to support them. We heard that attempts to deliver a strong counter-narrative- one that rebuts the claims made by an extremist group and tells a different story-to date have been poor. It was suggested that the current emphasis on de-radicalisation has reduced the focus on developing a broader counternarrative. While this is understandable and necessary, it needs to be in addition to strong preventive work, and both elements need to be funded in a proper way. The internet has opened up new ways to promote extremism. It has also made it more difficult to identify, monitor, and support those at risk. The Met's Counter-Terrorism Internet Referral Unit removes around 1,000 items of material from a range of extremist groups from the internet each week, and this is a trend that is continuing. Engaged and computer-savvy parents and families are critical to addressing the risk present online in their homes, but education for parents and families on managing risk and on their own IT skills needs to improve. The policy: the Government's Prevent Strategy The Government's approach to tackling extremism is set out in its Prevent Strategy. The strategy commits to challenging extremist ideas that can be used to legitimise terrorism, and to intervene to stop people moving towards terrorist-related activity. All local authorities, the police, and the wider public sector are expected to support efforts to prevent extremism. But recently, greater emphasis has been placed on public services through the introduction of a statutory duty for Prevent. This places an obligation on sectors to have due regard to the need to prevent people from being drawn into terrorism, and as a minimum, organisations should demonstrate an awareness and understanding of the risk of radicalisation in their area. It is hard to measure the impact of the Government's approach to preventing extremism. It was suggested to us that the real success of Prevent is achieved through public confidence and through the confidence and buy-in of public services and institutions. The Prevent Strategy has, however, had a troubled history and the feedback we received suggests that neither of these elements is being fully achieved at the moment. Definitions of extremism and radicalisation are highly debated. Each can be defined in different ways and can exist in different forms, and broad definitions could risk labelling some of the more moderate voices as extremist. The Government's increased focus on non-violent extremism, for example, has raised questions with academics and communities. It has also raised questions about the approach that public services need to take when delivering Prevent. The implications of the Government's definition for issues such as freedom of speech and open debate need further consideration, and we recognise that the debate is ongoing. What is meant by extremism, and the types of behaviour considered extreme, is a fundamental concern that communities have with the Government's approach. It needs to get the right balance in both the eyes of communities and public services.

Details: London: The Assembly, 2015. 50p.

Source: Internet Resource: Accessed February 8, 2018 at: https://www.london.gov.uk/sites/default/files/preventing_extremism_in_london_report.pdf

Year: 2015

Country: United Kingdom

URL: https://www.london.gov.uk/sites/default/files/preventing_extremism_in_london_report.pdf

Shelf Number: 149033

Keywords:
Counter-Extremism
Counter-Terrorism
Extremism
Extremist Groups
Radical Groups
Radicalization
Terrorism
Terrorists
Violent Extremism

Author: Malik, Nikita

Title: Terror in the Dark: How Terrorists Use Encryption

Summary: Terrorists and extremists are increasingly moving their activities online - and areas of the web have become a safe haven for Islamic State to plot its next attacks, according to a report published today by the Henry Jackson Society. Terror in The Dark: How Terrorists use Encryption, the Darknet and Cryptocurrencies shows how those planning to commit terrorist atrocities are using extremist networks on the 'Darknet' to indoctrinate sympathisers, create a reservoir of propaganda, evade detection and fundraise. It calls for urgent action by government and the policing and security services to step up intelligence gathering and action to counter online extremist activity. The report shows how terrorists are: Using encrypted apps such as Telegram to hide, communicate and plan attacks. Drawing interested sympathisers from the 'surface' world of the web into the Darknet in order to recruit and indoctrinate new supporters. Building up reservoirs of propaganda - saving it from deletion by the security services or tech companies and removing it as potential evidence for use by law enforcement. Using cryptocurrencies such as bitcoin to fundraise, taking advantage of the anonymity they offer. Following the five terror attacks on British soil in 2017, the Government has dedicated more time and funds to the combating of online extremism. However, the report makes a strong case for more attention to be paid to the Darknet, as terrorists mask their actions and intentions unchallenged on a currently anarchic platform. The report recommends: That tech companies should create a self-regulatory system to remove and audit extremist content - and release public annual reports outlining their efforts, including stats on content flagged by users, the outcome of companies' investigations and areas for improvement. That there should be a new internet regulatory body appointed by government, with the role of scrutinising tech companies' efforts to remove extremist content - with the potential for fines if companies consistently fail to take down offending material. More resources for the Joint Terrorism Action Centre to build up intelligence on the Darknet. Social media companies should work with law enforcement to ensure that extremist material is not lost when it is deleted, but is archived - to ensure that we understand extremists' patterns of behaviour online and retain evidence.

Details: London: Henry Jackson Society, 2018. 61p.

Source: Internet Resource: Accessed April 11, 2018 at: http://henryjacksonsociety.org/wp-content/uploads/2018/04/Terror-in-the-Dark.pdf

Year: 2018

Country: International

URL: http://henryjacksonsociety.org/wp-content/uploads/2018/04/Terror-in-the-Dark.pdf

Shelf Number: 149759

Keywords:
Counter-Extremism
Counter-Terrorism
Dark Net
De-Radicalization
Islamic State
Jihad
Media
Radical Groups
Radicalization
Social Media
Terrorism
Terrorists

Author: Alexander, Audrey

Title: Digital Decay?: Tracing Change over Time Among English-Language Islamic State Sympathizers on Twitter

Summary: Until 2016, Twitter was the online platform of choice for English-language Islamic State (IS) sympathizers. As a result of Twitter's counter-extremism policies - including content removal - there has been a decline in activity by IS supporters. This outcome may suggest the company's efforts have been effective, but a deeper analysis reveals a complex, nonlinear portrait of decay. Such observations show that the fight against IS in the digital sphere is far from over. In order to examine this change over time, this report collects and reviews 845,646 tweets produced by 1,782 English-language pro-IS accounts from February 15, 2016 to May 1, 2017. This study finds that: - Twitter's policies hinder sympathizers on the platform, but counter-IS practitioners should not overstate the impact of these measures in the broader fight against the organization online. ‐ Most accounts lasted fewer than 50 days, and the network of sympathizers failed to draw the same number of followers over time. ‐ The decline in activity by English-language IS sympathizers is caused by Twitter suspensions and IS' strategic shift from Twitter to messaging platforms that offer encryption services. ‐ Silencing IS adherents on Twitter may produce unwanted side effects that challenge law enforcement's ability to detect and disrupt threats posed by violent extremists. - The rope connecting IS' base of sympathizers to the organization's top-down, central infrastructure is beginning to fray as followers stray from the agenda set for them by strategic communicators. - While IS' battlefield initiatives are a unifying theme among adherents on Twitter, the organization's strategic messaging output about these fronts receive varying degrees of attention from sympathizers. - Terrorist attacks do little to sustain the conversation among supporters on Twitter, despite substantive attention from IS leadership, central propaganda, and even Western mass media. ‐ Over time, there has been a decline in tweets following major attacks. This suggests that attacks in the West have diminishing effects in mobilizing support. - Current events - such as the attempted coup in Turkey and the 2016 U.S. presidential election - are among the most popular topics within the sample. ‐ Events unrelated directly to IS cause some of the greatest spikes in activity. ‐ These discussions are ongoing despite Twitter's policies. Conclusions and Policy Recommendations ‐ English-language IS sympathizers on Twitter defy straightforward analysis and convenient solutions. ‐ They are skilled problem-solvers in the digital sphere. Rather than ruminating over losses, angered adherents fight to be heard, either on Twitter or other digital platforms. ‐ Counter-IS practitioners must show a similar willingness to adapt and explore alternative ventures. ‐ While some collaboration is beneficial, the government cannot rely predominantly on the efforts of tech companies to counter IS and its supporters.

Details: Washington, DC: George Washington University, 2017. 60p.

Source: Internet Resource: Accessed December 18, 2018 at: https://extremism.gwu.edu/sites/g/files/zaxdzs2191/f/DigitalDecayFinal_0.pdf

Year: 2017

Country: International

URL: https://extremism.gwu.edu/sites/g/files/zaxdzs2191/f/DigitalDecayFinal_0.pdf

Shelf Number: 154039

Keywords:
Counter-Extremism
Extremism
Social Networks
Terrorism
Tweets
Twitter
Violent Extremism