P/CVE Programs

Total Page:16

File Type:pdf, Size:1020Kb

P/CVE Programs Evaluating the Impact of P/CVE Programs UNITED STATES INSTITUTE OF PEACE Making Peace Possible United States Institute of Peace Press 2301 Constitution Avenue, NW Washington, DC 20037 www.usip.org To request permission to photocopy or reprint materials for course use, contact the Copyright Clearance Center at www.copyright.com. For print, electronic media, and other subsidiary rights, email permissions@usip .org. The paper used in this report meets the minimum requirements of American National Standards for Information Science—Permanence of Paper for Printed Library Materials, ANSI Z39.48-1984. First published 2018. © 2018 by the Endowment of the United States Institute of Peace. All rights reserved. Printed in the United States of America. ISBN: 1-60127-729-6 ISBN: 978-1-60127-729-9 About This Report This report considers the various conceptual and practical challenges in measuring the impact and value of programs designed to prevent and counter violent extremism (P/CVE). It examines potential solutions and emphasizes the significance of efforts to assess changes in attitudes, behaviors, and relationships. The report was developed in tandem with “Taking Stock: Analytic Tools for Understanding and Designing P/CVE Programs” and seeks to help advance more rigor and sustainability in P/CVE programming. 2 Measuring Up Contents 4 Key Findings 6 Introduction 7 Methodology and Definitions 8 The Challenges of Measuring Impact in P/CVE Programs 11 Evaluating P/CVE Interventions: Measuring Attitudes, Behaviors, and Relationships 16 Conclusion 18 Bibliography 21 Notes 23 About the Authors Acknowledgments 24 About USIP USIP Board of Directors 3 ⊲ There is no defined set of practices, ⊲ Attempts to establish causality in methods, or approaches used to P/CVE programs run into two major evaluate the impact of programs obstacles: the impossibility of that have the goal of preventing “measuring a negative,” or proving or countering violent extremism that violent activity or radicalization (P/CVE), reflecting the nascent and would have otherwise occurred had diverse nature of the field. Yet, there not been an intervention; and increasing efforts are being made accounting for the large number of to develop accessible guidelines for variables that may have contributed practitioners, as well as to develop to, enabled, or affected outcomes new approaches that address some beyond the P/CVE intervention, of the most significant challenges in especially in fragile or conflict-prone measuring impact. environments. These obstacles, however, do not preclude the ⊲ Those challenges can be grouped into possibility of rigorously evaluating two categories: analytic challenges, P/CVE programs. such as establishing causality, addressing contextual variations, and developing valid indicators; and practical challenges, such as collecting relevant and reliable data. 4 Measuring Up ⊲ Practitioners and academics have ⊲ Measuring behavioral change focused on tools to assess individual provides a more direct indication of and collective attitudes, behaviors, impact but is harder to accomplish. and relationships as meaningful Examples of this type of analysis are metrics for evaluating the impact of found mostly in the realm of online localized P/CVE interventions. activity. “Lab-in-field” approaches can be useful in assessing change. ⊲ Measures of attitudes generally assess changes in an individual’s ⊲ Social relationships and networks are sense of self, level of support for crucial factors in understanding and violent extremist groups or activity, mitigating radicalization and violent or level of support for the use of extremism (VE), but they are difficult violence generally. This is the most to measure. Most assessments of popular type of metric employed in changing relationships take place in P/CVE programs, but it is problematic the online space. New research on in its assumption of a relationship sources of community-level resilience between extremist beliefs and violent to VE will prove useful in informing activity. Efforts to improve rigor in more robust metrics for assessing the evaluation practice and circumvent impact of P/CVE interventions. some of the sensitivities unique to P/CVE programs include the use of random response, list, and endorsement experiments. 5 Introduction A significant he emergence and spread of VE and the evolution of violent and increasingly extremist organizations (VEOs) pose a complex global threat. A significant diverse community and increasingly diverse community of of policymakers, policymakers, practitioners, and academics is striving to better understand what causes practitioners, and and drives VE and to develop effective interventions to prevent and counter it. academics is striving As in the peacebuilding and development to better understand fields, designing effective P/CVE programs what causes and requires practitioners to learn from what has and has not worked in the past. However, drives VE. the complexity and sensitivity both of VE as a phenomenon and of P/CVE programs (as well as the diversity of lexicons, levels of analysis, and theories of change that have proliferated in this evolving field) not only complicate the task of measuring Analytic Tools for Understanding and Designing impact and assessing risk but also limit P/CVE Programs the sharing of lessons. This report gives practitioners, policymakers, and researchers an overview of challenges in evaluating P/CVE interventions, explores some UNITED STATES INSTITUTE OF PEACE potential solutions, and highlights the significance and relevance of tools that assess impact by measuring changes in attitudes, behaviors, and relationships. This study was developed in tandem with a report that examines analytic models Evaluating the Impact of P/CVE Programs and frameworks used for understanding VE and designing P/CVE programs and strategies. The two studies, both published by the United States Institute of Peace,1 are intended to help improve P/CVE program UNITED STATES INSTITUTE OF PEACE design and thus give P/CVE interventions greater and more enduring impact. 6 Measuring Up his study is based on an extensive ⊲ A related effort isprocess evaluation, literature review and consultations which identifies changes, best practices, with experts. Materials reviewed issues, or challenges in implementation include publicly available P/CVE evaluations, that may have influenced how effective articles, handbooks, and reports (many listed in the intervention was or could have been. the bibliography of this report). Consultations were conducted with experts from think tanks, ⊲ Evaluation refers to the assessment of government agencies, and nongovernmental whether project activities collectively organizations to further elucidate the current achieved the objectives as intended and emerging practices, methods, and tools or planned, and as articulated in a used to evaluate P/CVE programs and to theory of change. Inherent to any identify their challenges in application. An effective evaluation effort is a clear analysis of the research led to a focus on understanding of the project objectives, the particular value of measuring changes the development of measurable and in attitudes, behaviors, and relationships in specific indicators, and access to reliable assessing the impact of P/CVE programs. and relevant data. Monitoring and evaluation, or “M&E,” ⊲ Impact evaluation is a high level of refers to the use of specific tools and assessment that analyzes the larger methodologies to collect, analyze, and assess cumulative and sustained change brought data throughout a project cycle or program to bear by the implementation of a project in order to measure progress, outcomes, and or program (a set of projects), as well as impact. For the purposes of this report, key unintended negative consequences. terms related to M&E are used as follows: Research suggests that M&E efforts in ⊲ Monitoring refers to the task of ensuring P/CVE programs often focus heavily that activities are completed on time on monitoring (i.e., tracking a project’s and within a prescribed budget and progress and outputs), not on assessing a plan. It is the assessment of progress project’s broader impact on trends toward toward project implementation—the radicalization or violent extremist activity. completion of key activities for intended Several factors account for this emphasis beneficiaries, implementers, and on monitoring, not the least of which is the partners—and the measurement of difficulty in effectively evaluating the impact quantitative outputs such as the number of P/CVE programs. The following section of participants engaged in the activities. outlines some of these challenges. 7 here is no defined set of practices, and reflect their securitized and sensitive methods, or approaches used to nature. These obstacles can be grouped evaluate the impact of P/CVE into two categories: analytic challenges, programs. A number of “toolkits” have such as establishing causality, addressing been issued in recent years 2 as P/CVE contextual variations, and developing valid projects have been increasingly funded indicators; and practical challenges, such as and implemented. These guidelines, while collecting relevant and reliable data. helpful in moving toward consensus around good practice, also underscore the nascent, diverse, and “borrowed” nature of the field. P/CVE programs reflect multiple approaches, theories of change, and levels of analysis, many of which draw from development and conflict prevention or peacebuilding
Recommended publications
  • Charting a New Course: Women Preventing Violent Extremism
    Charting a New Course I 2301 Constitution Avenue, NW Washington, DC 20037 www.usip.org © 2015 by the Endowment of the United States Institute of Peace. All rights reserved. First published 2015 To request permission to photocopy or reprint materials for course use, contact the Copyright Clearance Center at www.copyright.com. For print, electronic media, and all other subsidiary rights e-mail [email protected] Printed in the United States of America The paper used in this publication meets the minimum requirements of American National Standards for Information Science—Permanence of Paper for Printed Library Materials, ANSI Z39.48-1984. The views expressed in this publication are those of the authors alone. They do not necessarily reflect the views of the United States Institute of Peace. II Charting a WOMEN PREVENTING VIOLENT EXTREMISM New Course 2 Acknowledgments 3 Introduction 7 Why Gender Matters 9 Women on the Front Lines by Alistair Millar 11 Exercise: Act Like a Woman/ Act Like a Man 12 Blindspots by Jayne Huckerby 13 Exercise: Spheres of Influence 15 Women and the Dynamics of Extremist Violence 17 Listen to the Women Activists by Sanam Naraghi-Anderlini 19 Exercise: Gendered Motivations 20 When Women are the Problem by Mia Bloom 21 Exercise: Multiple Interpretations: Who is Right? 22 Motivations of Female Fighters by Nimmi Gowrinathan 25 Engaging Communities in Preventing Violent Extremism 27 Building Resilience to Violent Extremism by Georgia Holmer 29 Exercise: Allies and Challengers 30 Charting New Ways with New Partners by Edit Schlaffer 31 Resource: Active Listening Techniques 32 Everyday Technologies Can Help Counter Violence and Build Peace by Nancy Payne 33 Resource: Enabling Technologies for Preventing Violent Extremism 34 Increasing Understanding through Words by Alison Milofsky 35 Resource: Debate versus Dialogue 36 Acronyms 36 Resources 1 ACKNOWLEDGMENTS he creation of the thought for action kit, “Charting a New Course: Women TPreventing Violent Extremism,” has been a team effort.
    [Show full text]
  • Strategic Cooperation Between Japan and UNODC -The Joint Plan of Action
    Strategic Cooperation between Japan and UNODC -The joint plan of action- The Government of Japan (hereafter referred to as Japan) and the United Nations Office on Drugs and Crime (hereafter referred to as UNODC) have a long history of collaboration in countering illicit narcotic drugs, in crime prevention and criminal justice reform, as well as in countering terrorism. Japan has also been a leading provider of core support to the operations of UNODC. Japan and UNODC share mutual interest in further enhancing cooperation. During the first Strategic Policy Dialogue between Japan and UNODC, held in Yokohama on 2 June 2013 in the margins of the 5th Tokyo International Conference on African Development (TICAD V), they identified regional, thematic and other areas for strategic cooperation, and developed a joint plan of action. They also agreed to hold Strategic Policy Dialogue at the senior level annually in Tokyo or Vienna (alternately). Japan and UNODC reviewed the progress of the implementation of the plan of action during the Strategic Policy Dialogue recently held, and amended it as follows. 1. Regional Cooperation (1) Africa Japan welcomes the participation of UNODC in the TICAD V in June 2013 and the TICAD VI in August 2016 in the TICAD process. Through the follow-up of TICAD VI, Japan and UNODC will enhance substantive and operational collaboration in Africa, in particular, in areas related to peace and security such as strengthening of criminal justice systems, countering transnational organized crime (illicit trafficking of narcotic drugs, firearms, and persons), corruption and cybercrime as well as combating terrorism, violent extremism and piracy.
    [Show full text]
  • Mitigating Youth Radicalization and Violent Extremism
    Journal of Strategic Security Volume 4 Number 4 Volume 4, No. 4, Winter 2011: Perspectives on Radicalization and Article 4 Involvement in Terrorism Disarming Youth Combatants: Mitigating Youth Radicalization and Violent Extremism Alpaslan Özerdem Coventry University, [email protected] Sukanya Podder Coventry University, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 63-80 Recommended Citation Özerdem, Alpaslan and Podder, Sukanya. "Disarming Youth Combatants: Mitigating Youth Radicalization and Violent Extremism." Journal of Strategic Security 4, no. 4 (2012) : 63-80. DOI: http://dx.doi.org/10.5038/1944-0472.4.4.3 Available at: https://scholarcommons.usf.edu/jss/vol4/iss4/4 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Disarming Youth Combatants: Mitigating Youth Radicalization and Violent Extremism Abstract In the complex of motivating variables that define the push and pull factors behind recruitment and participation in civil conflict, "radicalization"—or "violent extremism"—is not conceived as a very strong motive, as is the case with studies on terrorism. As part of disarming youth combatants,the linkages between reintegration outcomes and possible rerecruitment into radical and extremist violence must be better understood to mitigate such risks. In our analysis, the policies guiding reintegration of child soldiers and youth should be better attuned to the relationship between recruitment motivations and reintegration outcomes, and must be approached from a political lens rather than a purely technical one.
    [Show full text]
  • Defining the Concept of 'Violent Extremism'
    Geneva Paper 24/19 1 Defining the Concept of ‘Violent Extremism’ Delineating the attributes and phenomenon of violent extremism Geneva Paper 24/19 Mathias Bak, Kristoffer Nilaus Tarp, and Dr. Christina Schori Liang August 2019 GCSP Written by Mathias Bak*, Kristoffer Nilaus Tarp, and Dr. Christina Schori Liang. *Corresponding author: [email protected] The authors would like to thank Arsla Jawaid and Sanam Anderlini for invaluable comments and inputs. Defining the Concept of ‘Violent Extremism’ Delineating the attributes and phenomenon of violent extremism Geneva Paper 24/19 Mathias Bak*, Kristoffer Nilaus Tarp, and Dr. Christina Schori Liang August 2019 *Corresponding author: [email protected] The authors would like to thank Arsla Jawaid and Sanam Anderlini for invaluable comments and inputs. Written by Mathias Bak*, Kristoffer Nilaus Tarp, and Dr. Christina Schori Liang. *Corresponding author: [email protected] The authors would like to thank Arsla Jawaid and Sanam Anderlini for invaluable comments and inputs. 4 Defining the Concept of ‘Violent Extremism’ GCSP Geneva Paper 24/19 5 The Geneva Centre for Security Policy The Geneva Centre for Security Policy (GCSP) is an international foundation established in 1995, with 52 member states, for the primary purpose of promoting peace, security and international cooperation through executive education, applied policy research and dialogue. The GCSP trains government officials, diplomats, military officers, international civil servants and NGO and private sector staff in pertinent fields of international peace and security. The Geneva Papers and l’Esprit de Genève With its vocation for peace, Geneva is the city where states, international organisations, NGOs and the academic community, working together, have the possibility of creating the essential conditions for debate and concrete action.
    [Show full text]
  • Chapter 11 Prevention of Radicalization in Western Muslim
    Chapter 11 Prevention of Radicalization in Western Muslim Diasporas by Nina Käsehage This chapter opens with a brief definition of key terms such as “Muslim diasporas,” “prevention of violent extremism” (PVE), “countering violent extremism” (CVE) and discusses the role of Islamophobia in radicalization and its impacts on the prevention of radicalization. The size of the Muslim population in each of the selected five Western countries and the appearance of jihadist, left- and right-wing-groups, as well as the number of attacks resulting from these milieus are briefly discussed at the beginning of the country reports. The main body of this chapter discusses academic, governmental, and civil society approaches to PVE/CVE. For each country, some PVE examples are presented which might be helpful to policymakers and practitioners. A literature review regarding PVE/CVE approaches in each country seeks to provide an overview of the academic state of the art concerning the prevention of radicalization. Finally, a number of recommendations with regard to future PVE initiatives are provided, based on the author’s field research in Salafi milieus in various European countries.1 Keywords: countering violent extremism (CVE), countering violent extremism policy and practice, extremism, government and civil society responses, Muslim communities, Muslim diasporas, prevention, preventing violent extremism (PVE), PVE recommendations, radicalization, religious extremism, Salafism, terrorism 1 The following chapter includes extracts from the book: Nina Käsehage (2020). ‘Prevention of Violent Extremism in Western Muslim Diasporas’, Religionswissenschaft: Forschung und Wissenschaft. Zürich: LIT Verlag. HANDBOOK OF TERRORISM PREVENTION AND PREPAREDNESS 305 This chapter seeks to describe the state of research on the prevention of radicalization in Western Muslim diasporas.
    [Show full text]
  • Transnational Neo-Nazism in the Usa, United Kingdom and Australia
    TRANSNATIONAL NEO-NAZISM IN THE USA, UNITED KINGDOM AND AUSTRALIA PAUL JACKSON February 2020 JACKSON | PROGRAM ON EXTREMISM About the Program on About the Author Extremism Dr Paul Jackson is a historian of twentieth century and contemporary history, and his main teaching The Program on Extremism at George and research interests focus on understanding the Washington University provides impact of radical and extreme ideologies on wider analysis on issues related to violent and societies. Dr. Jackson’s research currently focuses non-violent extremism. The Program on the dynamics of neo-Nazi, and other, extreme spearheads innovative and thoughtful right ideologies, in Britain and Europe in the post- academic inquiry, producing empirical war period. He is also interested in researching the work that strengthens extremism longer history of radical ideologies and cultures in research as a distinct field of study. The Britain too, especially those linked in some way to Program aims to develop pragmatic the extreme right. policy solutions that resonate with Dr. Jackson’s teaching engages with wider themes policymakers, civic leaders, and the related to the history of fascism, genocide, general public. totalitarian politics and revolutionary ideologies. Dr. Jackson teaches modules on the Holocaust, as well as the history of Communism and fascism. Dr. Jackson regularly writes for the magazine Searchlight on issues related to contemporary extreme right politics. He is a co-editor of the Wiley- Blackwell journal Religion Compass: Modern Ideologies and Faith. Dr. Jackson is also the Editor of the Bloomsbury book series A Modern History of Politics and Violence. The views expressed in this paper are solely those of the author, and not necessarily those of the Program on Extremism or the George Washington University.
    [Show full text]
  • The Changing Roles of Women in Violent
    The Changing Roles of Women in Violent Islamist Groups Devorah Margolin Devorah Margolin is a Senior Research Analyst at Combating Jihadist Terrorism in the UK (CoJiT-UK), a Research Fellow at the Centre for Policy Studies and a PhD Candidate in the Department of War Studies, King’s College London. Her PhD focuses on gender in relation to violent Islamist organizations. Devorah has published in Studies in Conflict & Terrorism and CTC Sentinel, written for Newsweek and Haaretz, and is a contributor to the BBC. Prior to attending King’s College London, Devorah was a Researcher at the International Institute for Counter-Terrorism (ICT) and served as the ICT Internship Coordinator. Additionally, she has served as an Associate Editor on the ICT Working Paper Series editorial board and as Senior Editor of Strife Journal in the Department of War Studies, King’s College London. Introduction An increased focus on the participation of women in violent Islamism1 has not ended misconceptions plaguing Countering Violent Extremism (CVE) policies2 and questions remain about the threat posed by women associated with violent Islamist groups.3 Ill-informed perceptions of women’s contributions to these movements can have serious ramifications, including deferential treatment in courts, insufficient intervention programming, and failure to disrupt the next wave of women involved in violent-Islamist inspired activity. While it is important to understand the motivations of women participating in violent Islamist movements, it is also critical to recognize the ideology of the organizations they join. A better comprehension of this phenomenon helps policymakers and practitioners anticipate new and evolving threats concerning women in violent extremism.
    [Show full text]
  • Preventing Violent Extremism in Schools
    UNCLASSIFIED UNCLASSIFIED PREVENTING VIOLENT EXTREMISM IN SCHOOLS JANUARY 2016 High school students are ideal targets for recruitment by violent extremists seeking support for their radical ideologies, foreign fighter networks, or conducting acts of targeted violence within our borders. High schools must remain vigilant in educating their students about catalysts that drive violent extremism and the potential consequences of embracing extremist beliefs. UNCLASSIFIED 1 UNCLASSIFIED TABLE OF CONTENTS THE ISSUE PAGE 3 OUR SOLUTION PAGE 4 FORMS OF VIOLENT EXTREMISM PAGE 5 BEHAVIORAL DYNAMICS PAGE 6 CATALYSTS THAT DRIVE VIOLENT EXTREMISM PAGE 7 CONCERNING BEHAVIOR PAGE 15 OUTCOMES OF EMBRACING VIOLENT EXTREMISM PAGE 18 WHO SHOULD I CONTACT AND WHEN? PAGE 21 COMMUNITY INTERVENTION DECISION POINTS PAGE 24 RECOMMENDATIONS FOR PREVENTING VIOLENT EXTREMISM PAGE 25 CONTACTING THE FBI PAGE 27 UNCLASSIFIED 2 UNCLASSIFIED THE ISSUE Framing the Threat Despite efforts to counter violent extremism, the threat continues to evolve within our borders. Extremism and acts of targeted violence continue to impact our local communities and online violent propaganda has permeated social media. Countering these prevailing dynamics requires a fresh approach that focuses on education and enhancing public safety—protecting our citizens from becoming radicalized by identifying the catalysts driving extremism. Emerging Trends Youth are embracing many forms of violent extremism; those perpetrated by terrorist organizations or other domestic violent extremist movements, to those maintaining biases towards The Reality: others due to their race, religion, or sexual ISIL messaging likely influenced a 17-year old student to create, produce, and disseminate violent extremist orientation. Youth aged 13 – 18 are actively engaged messaging via social media to radicalize other youth to in extremist activities including online violence.
    [Show full text]
  • State of Violence: Government Responses to Violent Extremism in South-East Asia
    State of Violence: Government Responses to Violent Extremism in South-East Asia State of Violence: Government Responses to Violent Extremism in South-East Asia State of Violence: Government Responses to Violent Extremism in South-East Asia 2 UNDP is the leading United Nations organization fighting to end the injustice of poverty, inequality, and climate change. Working with our broad network of experts and partners in 170 countries, we help nations to build integrated, lasting solutions for people and planet. Learn more at undp.org or follow at @UNDP. This publication was produced with the financial assistance of the European Union. The views expressed in this publi- cation are those of the author(s) and do not necessarily represent those of the United Nations, including UNDP or the UN Member States, and can in no way be taken to reflect the official opinion of the European Union. Copyright © UNDP 2020 All rights reserved. Produced in Thailand. TABLE OF CONTENTS 3 4 List of Acronyms 5 Acknowledgements 7 Executive Summary 9 Introduction 13 Politics, Conflict and Violent Extremism in South-East Asia States and Violent Extremism Counter-terrorism Citizenship and identity Politics and religion State collusion with violence Hate speech 27 Conclusions 28 Recommendations 32 Endnotes 37 Glossary State of Violence: Government Responses to Violent Extremism in South-East Asia 4 LIST OF ACRONYMS AQ Al-Qaida ICOE Independent Commission of Enquiry IS Islamic State JAKIM The Malaysian Islamic Development Department NSC National Security Council (Malaysia) PVE preventing violent extremism SDG Sustainable Development Goals State of Violence: Government Responses to Violent Extremism in South-East Asia ACKNOWLEDGEMENTS 5 Authors Robert Templer Robert Templer is an author, analyst and educator who has spent 20 years working on conflict issues across Asia.
    [Show full text]
  • Reference Guide to Developing National and Regional PVE Action
    Reference Guide Developing National and Regional Action Plans to Prevent Violent Extremism 1st Edition 1. Message from the Under-Secretary-General of the Office of Counter-Terrorism As Under-Secretary-General of the Office of Counter-Terrorism I am glad to introduce this PVE Reference Guide for the Development of National and Regional Plans of Action to Prevent Violent Extremism (PVE). ddressing the rise of violent extremism that is conducive to terrorism is a difficult challenge for A Vladimir Voronkov, Under-Secretary-General the international community. Fear, mistrust, intercultural of the Office of Counter-Terrorism. clashes, conflict, destruction and unrest are just some of PHOTO: UN Photo/Mark Garten the ills that violent extremism fosters and exacerbates. This scourge cannot be eliminated through a single solution, method or tool. Identifying effective measures support their efforts to develop National and Regional requires concerted effort by the international community PVE Action Plans which must ensure national and regional and the promotion of effective practices and proven ownership and political commitment. This Reference Guide methodologies for a comprehensive approach that can builds upon the available practice, and seeks to enhance address the complex drivers of violent extremism. Sharing the capability of Member States and organizations to direct of information, cooperation and collaboration is not only and tailor the development of their PVE plans, while also essential between the United Nations entities, but also providing practical guidance for stakeholders shepherding between donors, beneficiaries, regional organizations, think the process. tanks and expert bodies who work in this field on a daily I hope practitioners around the world will find the basis.
    [Show full text]
  • The Development Response to Violent Extremism and Insurgency
    THE DEVELOPMENT RESPONSE TO VIOLENT EXTREMISM AND INSURGENCY Putting Principles USAID POLICY into Practice BUREAU FOR POLICY, PLANNING AND LEARNING SEPTEMBER 2011 USAID THE DEVELOPMENT RESPONSE TO VIOLENT EXTREMISM AND INSURGENCY POLICY SEPTEMBER 2011 i Message from the Administrator USAID Policy /The Development Response to Violent Extremism and Insurgency MESSAGE FROM THE ADMINISTRATOR President Obama’s National Security Strategy and Global Already today, close to 60 percent of State and USAID’s for­ Development Policy both stress that successful development eign assistance goes to 50 countries that are in the midst of, is essential to advancing our national security objectives. or trying to prevent conflict or state failure.This policy is crit­ ical to supporting our staff on the frontlines of our greatest Consistent with these broader strategic frameworks, this pol­ national security and development challenges. Our Agency’s icy provides USAID with a clear mandate and specific renewed emphasis on learning, innovation and risk­taking guidance on the development response to violent extremism means we will study and improve our work in exactly those and insurgency.This policy comes at a critical time; develop­ areas that have proven most difficult. ment assistance is increasingly called upon as an integral component of the interagency response to complex national With this policy, the Agency and its field Missions can now security and development challenges. rely on a clear set of common concepts and definitions, engagement criteria, and programming principles to support In line with our USAID Forward reform effort, this policy rep­ and guide our work, enhance its impact and ensure we resents an ongoing drive to use our long experience and vast deliver sustainable results.
    [Show full text]
  • Handbook: a Conflict Sensitive Approach to Reporting on Conflict and Violent Extremism
    HANDBOOK A CONFLICT SENSITIVE APPROACH TO REPORTING ON CONFLICT AND VIOLENT EXTREMISM This project is funded by the European Union This project is funded by the European Union HANDBOOK: A CONFLICT SENSITIVE APPROACH TO REPORTING ON CONFLICT AND VIOLENT EXTREMISM Disclaimer: This handbook has been produced within the framework of the “Contributing to stability and peace in Central Asia through media literacy, improved reporting and regional cooperation” Project implemented by Internews and funded by the European Union. The contents of this handbook are the sole responsibility of authors and can not be regarded as reflecting the position of the European Union and Internews under any circumstances. 1 2 Contents FOREWORD ...............................................................................................................................................................4 ACKNOWLEDGEMENTS .........................................................................................................................................5 ABOUT THE AUTHOR .............................................................................................................................................5 OVERALL INTRODUCTION - THE THINKING BEHIND THIS HANDBOOK ..............................................6 PART ONE: CONFLICT SENSITIVE REPORTING .............................................................................................. 7 CASE STUDY: GETTING IT WRONG .....................................................................................................................
    [Show full text]