Addressing Racially Or Ethnically Motivated Violent Extremism

Addressing Racially Or Ethnically Motivated Violent Extremism

The International Institute for Justice and the Rule of Law IIJ CRIMINAL JUSTICE PRACTITIONER’S GUIDE Addressing Racially or Ethnically Motivated Violent Extremism A publication under the IIJ REMVE Initiative The International Institute for Justice and the Rule of Law University of Malta - Valletta Campus Old University Building, St. Paul Street, Valletta, Malta [email protected] @iijmalta @iijmalta_fr www.theiij.org This publication is an integral part of the IIJ Racially or Ethnically Motivated Violent Extremism (REMVE) initiative, supported by the Governments of the United States and the United Kingdom. The International Institute for Justice and the Rule of Law Inspired by the Global Counterterrorism Forum (GCTF), the IIJ was established in 2014 as a neutral platform for training and capacity-building for lawmakers, judges, prosecutors, law enforcement, corrections officials, and other justice sector practitioners to share and promote the implementation of good practices and sustainable counter-terrorism approaches founded on the rule of law. The IIJ is an intergovernmental organisation based in Malta with an international Governing Board of Administrators (GBA) representing its 14 members: Algeria, France, Italy, Jordan, Kuwait, Malta, Morocco, the Netherlands, Nigeria, Tunisia, Turkey, the United Kingdom, the United States, and the European Union. The IIJ is staffed by a dynamic international team headed by an Executive Secretary, who are responsible for the day-to-day operations of the IIJ. Disclaimer This publication has been produced with the financial support of the United States Department of State. Its contents are the sole responsibility of the International Institute for Justice and the Rule of Law and do not necessarily reflect the views of the Governments of the United States or the United Kingdom. For more information, please contact: The International Institute for Justice and the Rule of Law University of Malta - Valletta Campus Old University Building, St. Paul Street, Valletta, Malta [email protected] @iijmalta @iijmalta_fr theiij.org IIJ Criminal Justice Practitioner’s Guide | 1 Addressing Racially or Ethnically Motivated Violent Extremism (REMVE) Table of Contents Acknowledgements _________________________________________________________________________________________ 2 Foreword ______________________________________________________________________________________________________ 3 Methodology _________________________________________________________________________________________________ 4 Good Practices for Countering Racially or Ethnically Motivated Violent Extremism (REMVE) ___ 5 Part I – OVERVIEW OF THE REMVE THREAT _______________________________________________________________ 8 A. Definition of REMVE __________________________________________________________________________________________________________________________________________________________________________________ 8 B. Historical Perspective ______________________________________________________________________________________________________________________________________________________________________________ 9 C. Current Outlook: Growing, Increasingly Transnational Threat _____________________________________________________________________________________ 10 Part II – PRACTICAL TOOLS TO COUNTER REMVE _______________________________________________________ 11 A. Understanding of Recent REMVE Trends_____________________________________________________________________________________________________________________________________11 Actors ............................................................................................................................................................................................................................................................................................................................................................12 Radicalisation and Recruitment ..........................................................................................................................................................................................................................................................................15 Attacks .........................................................................................................................................................................................................................................................................................................................................................17 B. Legislation and Regulation _________________________________________________________________________________________________________________________________________________________________ 21 Applicable Statutes ..................................................................................................................................................................................................................................................................................................................21 Proscription or Designation of Groups ....................................................................................................................................................................................................................................................23 Sanctions and Financial Tools .................................................................................................................................................................................................................................................................................25 C. Investigation and Disruption _____________________________________________________________________________________________________________________________________________________________ 26 Organisation and Interagency Coordination ..................................................................................................................................................................................................................................26 Investigative Focus and Resources ................................................................................................................................................................................................................................................................27 Individual Risk Assessment ........................................................................................................................................................................................................................................................................................28 Group and Network Analysis ...................................................................................................................................................................................................................................................................................29 Insider Threat Mitigation ................................................................................................................................................................................................................................................................................................30 Online Investigation and Disruption ............................................................................................................................................................................................................................................................32 International Cooperation ...........................................................................................................................................................................................................................................................................................33 Monitoring of Travel to Conflict Zones ......................................................................................................................................................................................................................................................35 Intelligence ............................................................................................................................................................................................................................................................................................................................................36 D. Prosecution_________________________________________________________________________________________________________________________________________________________________________________________________ 37 Charging and Sentencing ...............................................................................................................................................................................................................................................................................................37 E. Prison Rehabilitation and Post-Release Monitoring _____________________________________________________________________________________________________________ 39 Prisoner Monitoring and De-Radicalisation Programmes .......................................................................................................................................................................................39 Post-Release Rehabilitation

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    54 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us