Abstract
Preventing and/or countering violent extremism (P/CVE) involves the use of coercive or non-coercive means to dissuade individuals or groups from engaging in violent extremism and to mitigate recruitment, support, facilitation, or engagement of ideologically motivated terrorism by non-state actors. There is no defined set of practices, methods, or approaches used to evaluate the impact of P/CVE, but a rise in extremism, from the continued threat of Salafi-Jihadist terrorism to the rise of alt-right extremism, has forced practitioners in the field to understand who their target audience is before they begin the development of countermeasure programs. The following chapter sets out an approach for standardizing and regularizing a scope of best practices that should be used in the development of any P/CVE programs, using a simple checklist of five sequential steps that help to identify what P/CVE program is best used. This checklist will help identify the target audience, the use of prevention methods or countering methods, the type of engagement (direct or indirect), the type of program to be used, and the intricacies of the P/CVE program itself. These practices are supplemented by current examples of their use, and they will demonstrate how the wrong strategy applied to the wrong target can result in an ineffective program. This chapter provides a means for practitioners and academics to gain an introductory understanding of current best practices available for P/CVE across the spectrum of extremism and the ability for a simplified process to determine how to approach their own program’s target audience.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Bibliography
Bötticher A (2017) Towards academic consensus definitions of radicalism and extremism. Perspect Terror 11(4):73–77. https://doi.org/10.2307/26297896
Burgoon B (2006) On welfare and terror: social welfare policies and political-economic roots of terrorism. J Confl Resolut 50(2):176–203. https://doi.org/10.2307/27638483
Cross M, Schori Liang C (2020) White-Crusade: How to Prevent Right-Wing Extremists from Exploiting the Internet. Issue 11. Geneva Centre for Security Policy. https://www.gcsp.ch/publications/white-crusade-how-prevent-right-wing-extremists-exploiting-internet/
Downy J (2019) Building cooperation between national and local: why dialogue is key to P/CVE
Glazzard A, Zeuthen M (2016) Violent extremism. GSDRC Professional Development Reading Pack no. 34. Birmingham: University of Birmingham
Government of Canada (2013) Building Resilience against Terrorism
Herbert S (2014) Targeting groups at risk of extremism through security and justice programming
Johnston PB, Sarbahi AK (2016) The impact of US drone strikes on terrorism in Pakistan. Int Stud Q 60:203–219. https://doi.org/10.1093/isq/sqv004
Karagiannis E (2006) Political Islam in Uzbekistan: Hizb ut-Tahrir al-Islami. Eur Asia Stud 58:261–280. https://doi.org/10.1080/09668130500481444
Knight S, Woodward K, Lancaster GLJ (2017) Violent versus nonviolent actors: an empirical study of different types of extremism. J Threat Assess Manag 4:230–248. https://doi.org/10.1037/tam0000086
McCants W, Watts C (2012) U.S. Strategy for countering violent extremism: An assessment - Foreign Policy Research Institute. In: Foreign Policy Research Institute. https://www.fpri.org/article/2012/12/u-s-strategy-for-countering-violent-extremism-an-assessment/
MI5 (2021) Joint Terrorism Analysis Centre. In: United Kingdom Security Service. https://www.mi5.gov.uk/joint-terrorism-analysis-centre. Accessed 29 Nov 2021
Pape RA (2003) Dying to win: the strategic logic of suicide terrorism 129–132. https://doi.org/10.1057/9780230616509_18
Pressman E, Flockton J (2012) Calibrating risk for violent political extremists and terrorists: the VERA 2 structured assessment. Br J Forens Pract 14:237–251. https://doi.org/10.1108/14636641211283057
RAN Collection of Inspiring Practices (2020) In: Migration and home affairs – European Commission. https://ec.europa.eu/home-affairs/what-we-do/networks/radicalisation_awareness_network/ran-best-practices_en. Accessed 25 Jan 2021
Rockefeller ML (2004) The imminent threat requirement for the use of pre-emptive military force: is it time for a non-temporal standard. Denver J Int Law Policy. https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1446&context=djilp
Schmid A (ed) (2008) Routledge Handbook of Terrorism Research. Routledge. Oxford
The Commonwealth (2017) Countering violent extremism toolkits. In: The Commonwealth. https://thecommonwealth.org/countering-violent-extremism-toolkits. Accessed 29 Nov 2021
The United Nations Global Counter-Terrorism Strategy (2015) Plan of Action to Prevent Violent Extremism. https://www.un.org/en/ga/search/view_doc.asp?symbol=A/70/674/
United Nations Development Program (2016) Preventing violent extremism through promoting inclusive development, tolerance and respect for diversity. https://www1.undp.org/content/dam/norway/undp-ogc/documents/Discussion%20Paper%20-%20Preventing%20Violent%20Extremism%20by%20Promoting%20Inclusive%20%20Development.pdf
United Nations Security Council (2000) Landmark resolution on women, peace, and security. United Nations
United States Bureau of Democracy, Human Rights, and Labor (2021) 2020 Country Reports on Human Rights Practices
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this entry
Cite this entry
Cross, M.J., Benjamin, G.W. (2022). Preventing and Countering Violent Extremism: Best Practices and Standardizations. In: Masys, A.J. (eds) Handbook of Security Science. Springer, Cham. https://doi.org/10.1007/978-3-319-91875-4_83
Download citation
DOI: https://doi.org/10.1007/978-3-319-91875-4_83
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91874-7
Online ISBN: 978-3-319-91875-4
eBook Packages: Physics and AstronomyReference Module Physical and Materials ScienceReference Module Chemistry, Materials and Physics