Lessons from P/Cve Research Innovative Methods, Challenges, and Good Practices

Lessons from P/Cve Research Innovative Methods, Challenges, and Good Practices

WOMEN AND CVE 1 LESSONS FROM P/CVE RESEARCH INNOVATIVE METHODS, CHALLENGES, AND GOOD PRACTICES FARANGIZ ATAMURADOVA, STUART MACDONALD & RICHARD BURCHILL | EDITORS LESSONS FROM P/CVE RESEARCH INNOVATIVE METHODS, CHALLENGES, AND GOOD PRACTICES FARANGIZ ATAMURADOVA, STUART MACDONALD & RICHARD BURCHILL EDITORS The views expressed in these chapters are the opinions of the authors, and do not necessarily refect the opinions of Hedayah or any of the organizers or sponsors of the International CVE Research Conference 2018. CONTENTS © Hedayah, 2019 All rights reserved. Cover design and publication layout by Iman Badwan. Cover image © Hedayah stock photos. ABOUT HEDAYAH Hedayah was created in response to the growing desire from members of the Global Counter-Terrorism Forum (GCTF) and the wider international community for the establishment of an independent, mul- tilateral center devoted to dialogue and communications, capacity building programs, research and Introduction 8 analysis to counter violent extremism in all of its forms and manifestations. During the ministerial-level launch of the GCTF in New York in September 2011, the U.A.E. ofered to serve as the host of the Inter- Farangiz Atamuradova & Stuart Macdonald national Center of Excellence for Countering Violent Extremism. In December 2012 Hedayah was inau- gurated with its headquarters in Abu Dhabi, U.A.E. Hedayah aims to be the premier international center for expertise and experience to counter violent extremism by promoting understanding and sharing of A Linkage Based Approach to Combating Islamist Propa- 20 good practice to efectively serve as the true global center to counter violent extremism. 11 ganda ABOUT THE EDITORS Joe Whittaker & Lilah Elsayed Farangiz Atamuradova is a Research Associate at the Department of Research and Analysis, Hedayah. Farangiz joined Hedayah in February 2018. At Hedayah, Farangiz co-manages MASAR, an App for Moni- East Africa: Narratives of Extremism or Histories of Conflict?“ 43 toring, Measurement, and Evaluation for P/CVE projects, the Counter Extremism Hub, and the Radical 22 Peter Bofn & William Walwa Right Counter Narrative Collection, which is led by the Centre for Analysis of the Radical Right. Prior to Hedayah, Farangiz worked at Delma Institute as a political analyst covering various regional issues. Her internship experiences include the Organization for Security and Co-operation in Europe and the Royal Mapping the Landscape of Right-Wing Extremism in Australia 63 United Services Institute. Farangiz holds a Master of Letters in Terrorism Studies from the University of St. Andrews and a Bachelor of Arts in Politics with International Studies from the University of Warwick. 33 Sofa Patel Stuart Macdonald is Professor of Law at Swansea University. He completed his BA at the University of Cambridge (2000) and his PhD at the University of Southampton (2005). His research interests lie How Gender Matters in Violent Extremism & Efforts to 95 in criminal law and counterterrorism, particularly cyberterrorism and terrorists’ use of the internet. He 44 Counter It is Co-Director of Swansea University’s EPSRC-funded £7.6m CHERISH Digital Economy Centre and Di- rector of the University’s multidisciplinary cyberterrorism research project. To date the Cyberterrorism Elizabeth Pearson Project has conducted a survey of the global research community, compiled a database of defnitions of cyberterrorism, conducted a study of online terrorist magazines, compiled a database of news stories on cyberterrorism, hosted numerous events including a NATO Advanced Research Workshop and an Searching for Answers: Understanding the Role of Search in 117 international conference on terrorism and social media, and published four edited collections, six policy 55 Providing Access to Extremist Content reports and numerous journal articles and book chapters (see further www.cyberterrorism-project.org). In 2016/17 he was the holder of a Fulbright Cyber Security Award. Mubaraz Ahmed Richard Burchill is the Director of Research and Engagement for TRENDS Research & Advisory, Abu Dhabi, UAE. Previously he was Director of the McCoubrey Centre for International Law at the University Ethical Dilemmas for Research in Extremism and Radicali- 135 of Hull, UK. He has advised, researched and taught on a wide range of issues in global governance and 6 sation Using Internet-Generated Data security. 6 Jessie Hronesova Through Redistribution, Recognition, Representation and Rec- 151 77 onciliation in Education System Towards Building Resilience to Violent Extremism in the Republic of North Macedonia Marija Risteska In Pursuit of a Degree; Being Pursued by Terrorists: Under- 183 88 graduate Radicalization in Selected Countries in Southeast Asia Thomas Samuel Creating “Safe” Spaces for Dialogue and Discussion: The Im- 207 99 pact of a Preventing Violent Extremism Through Education (PVE-E) Intervention in Uganda Sara Zeiger INTRODUCTION Farangiz Atamuradova & Stuart Macdonald Violent extremism is a transnational threat that has afected in one form or an- other every society and nation around the world. Its adaptive nature allows it to alter ways it manifests itself and adjust and employ efective and innovative techniques of recruitment and attacks. Despite the territorial defeat of Daesh in Syria and Iraq, the issue of violent extremism - in its many forms and ideo- logical manifestation- has proved to be resilient to solely military actions. To this end, governments, security actors, and other key community members re- quire evidence-based and up-to-date research to respond to the ever-evolving threat and take informed decisions on countering violent extremism. It is therefore key to provide a neutral platform that allows researchers, policy makers, and practitioners to discuss shared challenges, good practices, and lessons learned and to approach the topic with an interdisciplinary lens. In response to the above challenges and needs, Hedayah, University of Swan- sea, TRENDS Research & Advisory, UN Women, and M&C Saatchi host- ed the ffth “International Countering Violent Extremism Research Conference” in Swansea, Wales, United Kingdom from 29th August to 31st August, 2018. The conference was sponsored by the Government of Spain, Government of Turkey, and the European Union - STRIVE Global Pro- gram (Hedayah). Strategic partners included Tony Blair Institute for Global Change, Aktis Strategy, BRICS, Cairo International Center for Confict Res- olution, Peacekeeping, and Peacebuilding (CCCPA), the International Centre for the Study of Radicalization and Political Violence (ICSR), RESOLVE Network, and the Royal United Services Institute (RUSI). 10 LESSONS FROM P/CVE RESEARCH INTRODUCTION 11 The ffth annual International Countering Violent Extremism (CVE) Re- “existing arguments” can refer to distorted interpretation of religious scripture search Conference1 aimed to achieve the following objectives: and texts or incidents that help extremists establish their legitimacy in the eyes of their followers. As a counter action, governments and other CVE actors • Enhance and broaden the existing network of P/CVE researchers and are actively seeking to develop counter-narratives, alternative narratives, or policy-makers and encourage them to share their most current research messages that would weaken violent extremists’ activities. Similarly to violent and best practices; extremism groups, CVE actors tailor their narratives and messages to ensure • Identify and present narratives and counter-narratives of violent extremist that it reaches the ‘right’ audience, often through choosing the most appropri- groups, as well as assess ways these narratives are being disseminated; ate messengers. The hope is that if these narratives are successful in delivering • Provide researchers and practitioners a neutral platform to exchange the message, then the population that is also being targeted by violent extrem- ideas, jointly identify trends and needs for on-the-ground implementation, ist messages will grow resilient against these groups, because they will be aware prepare the ground for further research, and collaborate with each other of the implications of joining violent extremist groups and their intentions. on emerging areas of work; Eforts to measure the efectiveness and impact of narratives continues to be • Explore ways to turn theoretical knowledge and evidence-based research part of a wider debate among CVE actors. (Rosand & Winterbotham, 2019) on P/CVE into coherent and practical implementation systems and pol- icies; Careful analysis of networks and tactics of violent extremist groups have also • Convene an international audience of a diverse disciplinary background. demonstrated that diferent strategies for recruitment are applied based on gender. Similarly, men and women are often assigned diferent roles within The essays contained in this edited volume refect the presentations given by these groups.(Fink, Zeiger, & Bhulai, 2016) Exploring gender dynamics and speakers of the International CVE Research Conference 2018. The Confer- highlighting the importance of masculinity and femininity within the day-to- ence covered a number of other topics, presenting fndings from a variety day operations of violent extremist groups has the potential of aiding CVE of geographical contexts, and giving practical recommendations for policy practitioners to better tailor eforts to counter radicalization and recruitment. makers, practitioners, and researchers. However, the essays contributed to this In response,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    115 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us