Professional Documents
Culture Documents
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/319123622
CITATIONS READS
0 209
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Iftekharul Bashar on 15 August 2017.
A JOURNAL OF THE INTERNATIONAL CENTRE FOR POLITICAL VIOLENCE AND TERRORISM RESEARCH
1
B u i l d i n g a G l o b a l N e t w o r k f o r S e c u r i t y
Editorial Note
Countering Violent Extremism
In 2013, the US announced the end of its (IS)-affiliates, with the latter having an
Global War on Terror (GWoT) after defeating ideological advantage. Third, in the recent
Al-Qaeda. Two years later, in 2015, at a White past, these countries have witnessed an
House-hosted summit, the Obama unprecedented rise of IS-inspired recruitment
administration propounded the concept of from the middle and upper-middle classes in
Countering Violent Extremism (CVE) to urban areas. Internet and various social media
confront, contain and eventually eliminate the platforms have played an important role in their
latent threat of radicalism and extremism. radicalisation and recruitment. In a way, the
W
Though CVE is not an entirely new concept, battlefield has expanded from real space to
the purpose of the summit was to add more cyber space. Or, as Thomas L. Friedman
urgency and impetus to the various on-going noted in his recent New York Times article,
non-kinetic efforts to counter extremism and its there are two kinds of caliphates – ‘real’ and
underlying causes. ‘cyber’. Fourth, all three are grappling with the
problem of growing religious conservatism and
Recently, some media reports have indicated politicisation of Islam. Compounding the
that the Trump administration is toying with the existing problem is the ambivalence of the
idea of scrapping the CVE project. Others authorities towards the jihadist threat in
maintain that the US is considering renaming Bangladesh and Pakistan, as they have been
CVE as countering radical Islamic extremism in denial of the IS threat to their internal
and shifting the focus back to kinetic-efforts. stability.
Regardless of the decision, it is clear that
components of CVE will have to be retained if CVE in Malaysia, Bangladesh and Pakistan is
the present threat of religious extremism and a work in progress. Short of any major
terrorism is to be checked. These involve achievements, these programmes,
community engagement to build social notwithstanding enormous challenges, have
resilience and counter extremism, and shown promise. They have created
rehabilitation and re-integration of radical awareness among these traditional Muslim
elements. societies about the threat of religiously-inspired
extremist ideologies. Similarly, the indigenous
Keeping this in view, the latest issue of CTTA natures of these programmes have bridged the
features the CVE programmes of three Muslim trust gap between the state and society, which
-majority countries, Malaysia, Pakistan and is the sine qua non of a successful CVE policy.
Bangladesh, focusing on the rationale and
main components of their initiatives along with When a comparison is carried out, some
highlighting the achievements and challenges. common traits of the CVE programmes in
these countries become visible. For instance,
Overall, the threat landscapes in Malaysia, all are aimed at balancing the kinetic and non-
Bangladesh and Pakistan have some common kinetic aspects of counter-terrorism and
characteristics that make the comparison extremism or as Rohan Gunaratna puts it,
worthwhile. First, all three are Muslim-majority evolving ‘smart’ responses by combining the
countries with religious diversity and ‘hard’ and ‘soft’ responses. Likewise, in all
heterogeneity. Second, the jihadist landscape three countries, CVE efforts are trying to
in these countries is presently split between Al- neutralise the social avenues which extremists
Qaeda loyalists and the so-called Islamic State exploit to recruit people. They are sensitising
W
countries need to institutionalise various CVE
components with clearly-defined mandates, Lastly, Iftekharul Bashar focuses on CVE in
roadmaps and a dedicated professional Bangladesh, discussing the shortcomings of
manpower to manage these programmes. the programme while the country is confronted
Additionally, a plethora of initiatives undertaken with the growing threat of IS. The author
by civil society organisations exists alongside advocates the need for a comprehensive
the government measures. There is a need to national action plan for CVE programme that
bring synergy and harmony between them for looks beyond ad-hoc responses, and a
better results. Another challenge is the dedicated body to coordinate inter-agency
dependence of these programmes on donor response to the problem of violent extremism.
funding which raises concern about their
sustainability and longevity.
1
Strategic Counter-Terrorism: A Game Changer in Fighting Terrorism – Rohan Gunaratna
its allies.2 Foreign and Iraqi insurgent groups Shift from Strategic to Tactical and
were created on the grounds of resentment Operational Counter-terrorism?
and anger towards the perceived ‘occupiers’.3
The recently elected Trump Administration has
In response to the growing threat, the US shifted its focus towards tactical and
adopted CVE during the Obama Administration operational counter-terrorism, as adopted by
(2009-2017) as a strategy to engage Muslim the Bush Administration. In President Trump's
communities and curb their radicalisation into new counter-terrorism policy, the White House
violence. Contrary to the Bush Administration, intends to replace the term CVE with radical
the Obama Administration realised the need Islamic extremism or scrap the CVE
for a softer approach, and focused on the programme altogether.6 One reason for such a
active participation of Muslim leaders and move could be linked to the idea that ideology
communities.4 To take the fight to the terrorists is not a driver of terrorism and that the gains
and manage extremism in their communities, from US’ CVE initiatives in the past were
President Obama actively engaged Muslim limited at best.7 This explains the counter-
leaders and empowered Muslim communities. terrorism team at the White House giving
Even though the US supported strategic preference to kinetic approaches. In
counter-terrorism, in the form of rehabilitation comparison, the use of the term ‘Islamic’
and community engagement efforts overseas, indicates that US is at war with militant Islam.8
the successes of such efforts within the US
were limited. In addition, there were no Even though this stance faces opposition,
attempts to build a rehabilitation programme President Trump and his team seem
targeted towards detainees of Guantanamo determined to do-away with CVE in one way or
Bay. Thus, it is evident that the US had still another. In this regard, the predominant focus
emphasised the application of military force, on the enemy-centric approach, divorced from
which was paired with capabilities in strategic the population-centric approach, is likely to fuel
counter-terrorism. extremism and terrorism in the future. In
addition, the term ‘Islamic’ singles out one
The US Administration had miscalculated particular religion as the source of
possible developments in Afghanistan and Iraq radicalisation and extremism. This leads to the
while fighting on both fronts. In Afghanistan, problematic issue of excluding and ignoring the
the decrease in US’s focus and military presence of white supremacist and other right-
presence resulted in the return of the Taliban. wing groups operating within the US and
In Iraq, the US had advocated a total abroad. However, it is possible that the recent
withdrawal believing that the Iraqi security Middle East visit could have changed Trump’s
forces could contain the threat.5 In both perspectives in line with his well-informed
countries, the insurgencies grew stronger, advisors such as General H. R. McMaster.
threatening the fragile governments put in
place by the US. In this sense, although a target-centric strategy
is essential to prevent and pre-empt attacks,
winning the hearts and minds of the people is
critical in mitigating the threat and defeating
terrorism. Tactical and operational counter-
terrorism provide critical yet limited benefits of
2
Paul Harris and Peter Beaumont. Iraq war created a
terrorist flood, American spymasters warn Bush. The
6
Guardian, 24 September 2006. Jim Acosta and Eli Watkins. Trump admin eyes
3
Robert Pape. It’s the Occupation, Stupid. Foreign scrapping anti-extremism program. CNN, 3 February
Policy, 18 October 2010. 2017.
4 7
Fact Sheet: The White House Summit on Countering Emma Green. What Lies Ahead for Obama's
Violent Extremism. The White House (Press Release), Countering Violent Extremism Program? The Atlantic.
18 February 2015. 17 March 2017.
5 8
Lionel Beehner. Iraq’s Post-Saddam Insurgency. Emma Green. What Lies Ahead for Obama's
Council on Foreign Relations (Backgrounder). 14 Countering Violent Extremism Program? The Atlantic,
November 2006. 17 March 2017.
2
Strategic Counter-Terrorism: A Game Changer in Fighting Terrorism – Rohan Gunaratna
detecting, disrupting, and degrading the the creation of Al Qaeda in Iraq (AQI), which
operations of groups. In comparison, strategic eventually became IS.10 Without eliminating
counter-terrorism is key because it fosters an the threat and stabilising Iraq, President
environment that prevents support for Obama withdrew US forces, creating the
extremism and terrorism. Hence, in order to conditions for the rise of IS. The US and UK
stabilise and resolve relevant local, regional failed to provide proof of WMD presence,
and global conflicts, initiatives both to counter which made them lose their credibility within
extremism and wasatiyyah or promote the international community. Also, the images
moderation are essential. of Muslims suffering in Iraq, with over half a
million civilians killed,11 managed to galvanise
Threat of the Global Jihadist support for extremist and terrorist groups that
Movement from AQ to IS used the rhetoric of widespread persecution of
Muslims and Islam being under attack as
The world has witnessed the rise of three recruitment strategies.
successive generations of global terrorist
movements in the last 15 years. The first Both IS and AQ are groups with a vision of
generation or ‘global jihad 1.0’ emerged after global jihad, but the scale, magnitude, and
AQ targeted the US in the 9/11 attacks. AQ intensity of IS threat are stronger in
provided an overarching ideology proclaiming comparison. IS, which emerged partially as a
that the West is against Muslims and Islam, consequence of the Afghan, Iraqi, and Syrian
leading to the development and spread of its conflicts, represents a predominant global
global jihadist narratives in Asia, Africa, Middle threat. On the other hand, while the strength of
East, and the Caucasus. The second AQ and its affiliates might have declined, they
generation or ‘global jihad 2.0’ came after Abu continue to be active in the form of Hayat Tahir
Bakr al Baghdadi announced the formation of Al-Sham (HTA),12 Al Qaeda in the Indian
the so-called Islamic State (IS) in June 2014. Subcontinent (AQIS), Al Qaeda in the Arabian
Lastly, the third generation or ‘global jihad 3.0’ Peninsula (AQAP), and Al Qaeda in the Islamic
represents the current global expansion of IS Maghreb (AQIM). Conversely, in the likelihood
and its continued threat. In light of territorial that IS and AQ join forces, the threat
losses and operational defeats within Iraq and emanating from this union would be
Syria, IS is putting faith in its wilayats unprecedented. The key strength of both
(provinces) as the bastions of power in the groups lies in their ability to reach out to and
Middle East, Africa, Caucasus, and Asia. Even offer a platform for addressing the grievances
though IS is facing serious setbacks, the group of Muslim communities in Asia, Africa, the
continues to hold some territory and garners a Caucasus, Middle East, and migrant and
social media presence with networks of diaspora communities in the West. In such a
individuals willing to fight for the IS’ caliphate scenario, both groups will continue to utilise
and ideology in their own countries. social media to politicise, radicalise, and
militarise their followers and potential recruits.
AQ, also referred to as the ‘pioneering
vanguard’, wanted other Islamist terrorist
groups to believe that it will pave the way for
the global jihadist movement.9 After conducting
the 9/11 attacks, AQ had inspired and 10
Doug Bandow. The Collapse of Iraq and the Rise of
instigated other groups to fight against the US ISIS: Made in America? The National Interest, 23
and the West. The war in Iraq was a critical September 2015.
11
impetus in the recruitment conducted by global Dan Vergano. Half-Million Iraqis Died in the War,
jihadist groups, such as AQ, and contributed to New Study Says. National Geographic, 16 October
2013.
12
It is believed that the rebranding of Al-Nusra Front
9
Rohan Gunaratna. “Defeating Al Qaeda – The as Hayat Tahrir Al-Sham (HTS) is a strategic move by
Pioneering Vanguard of the Islamic Movements.” In the group to distance itself from Al Qaeda. However,
Defeating Terrorism: Shaping the New Security other sources say that the link between AQ core and
Environment, edited by Russell D. Howard and Reid L. HTS exists. Refer to: Al Qaeda’s Latest Rebranding:
Sawyer, 1-28. New York: McGraw-Hill, 2004. Hay’at Tahrir al Sham.
3
Strategic Counter-Terrorism: A Game Changer in Fighting Terrorism – Rohan Gunaratna
4
Strategic Counter-Terrorism: A Game Changer in Fighting Terrorism – Rohan Gunaratna
The community is the primary resource base of networks, instead of threat groups, they need
the terrorists. Terrorists and extremists to shift their focus from counter-terrorism
penetrate communities and recruit vulnerable cooperation to collaboration. There is a dire
persons to join either their threat group or their need to work together to build common
support base by remaining in the databases, conduct joint training and
community. Even though those joining groups operations, and share experiences and
such as IS represent a minor proportion of the resources.
total populations of countries, a strategy is
needed to deter or dissuade their participation.
Outside conflict zones, the government should Professor Rohan Gunaratna is head of the
dedicate some of their efforts towards building International Centre for Political Violence and
operational and tactical counter-terrorism Terrorism Research (ICPVTR), a constituent
capabilities, while placing more emphasis on unit of the S. Rajaratnam School of
building strategic counter-terrorism capabilities. International Studies (RSIS), NTU.
In the conflict zones where the threat groups
are actively fighting, greater resources should
be dedicated towards building operational and
tactical capabilities to dismantle the groups
and decapitate their leaders and other
individuals directing and facilitating the
attacks. As the threat of terrorism and
extremism continues to evolve, it is essential to
build new tools to operate both in the physical
and virtual spaces. As such, the newest
frontiers in strategic counter-terrorism lie within
digital rehabilitation and online counter-
extremism.
14
Joseph S. Nye Jr. Get Smart: Combining Hard and
Soft Power. Foreign Affairs, July/August 2009.
5
Countering Violent Extremism in Malaysia: Past Experience and Future Prospects – Muhammad Haziq Bin Jani
This article examines Malaysia’s CVE strategy was known as the Malayan Emergency.3 The
and programmes which involve three main successful counter-insurgency against
components—legislation, rehabilitation and communist terrorists during the Malayan
education. As in other countries, CVE Emergency informed Malaysia’s strategy
programmes will continue to be a case of work towards a host of religiously-inspired extremist
in progress that requires constant reviews, and terrorist groups that have threatened its
adaptation and adjustment. security to date. Notable among them include
Jema’ah Islamiyah (JI), Kumpulan Mujahidin
Introduction Malaysia, and various groups linked to the
Islamic State (IS) terrorist group.
On 8 June 2005, at the Special Operations
Command headquarters in Florida, General This study departs from the conventional and
Bryan D. Brown and other senior security and US-centric understanding of CVE, which tends
military figures declared the end of the ‘global to focus on “community programmes” and
war on terror’ and the advent of a new counter- “surveillance.”4 Such an approach strays from
terrorism strategy: the Struggle against Violent the philosophy of CVE and ignores a wide
Extremism (SAVE).1 This eventually led to the range of state policies undertaken by Malaysia.
conception of the CVE (Countering Violent This paper explores various components of
Extremism) strategy against terrorism that CVE in the Malaysian context and what more
involved not only military, but also diplomatic, could be done to address violent extremism in
economic, political, and “all instruments of the future.
national power.” In 2015, the then US
President Barack Obama reified the new-ness CVE in the Malaysian Context
of the strategy in his speech at the United
Nations General Assembly underscoring the Essentially, CVE is a holistic approach to
need for “a comprehensive strategy” that uses address violence emanating from various
all available resources as mentioned above.2 forms of extremism. In Malaysia, CVE includes
the three following modules: legislation,
In Malaysia, a successful model of “CVE” rehabilitation, and education.5
approach existed long before its present US
conception. CVE was carried out in Malaya 3
Komer, Robert W. The Malayan Emergency In
(now Malaysia) from 1948 to 1960 during what Retrospect: Organization Of A Successful
Counterinsurgency Effort. No. 957, Arpa. Rand Corp
Santa Monica Ca, 1972.
4
Green, E. What Lies Ahead for Obama's Countering
Violent Extremism Program? The Atlantic, 17 March
1
Fox, R. Gwot is history. Now for Save: After the 2017.; Fernandez, B. The Psuedoscience of
Global War on Terror comes the Struggle Against Countering Violent Extremism. Al Jazeera America, 17
Violent Extremism. New Statesman, 8 August 2005. April 2017.
2 5
Office of the Press Secretary. Remarks by President El-Muhammady, A. “Countering the Threats of Daesh
Obama at the Leaders' Summit on Countering ISIL and in Malaysia.” Countering Daesh Extremism: European
Violent Extremism. The White House: Speeches & and Asian Responses, Konrad-Adenauer-Stiftung,
Remarks, 29 September 2015. 2016: pp.105-122.
6
Countering Violent Extremism in Malaysia: Past Experience and Future Prospects – Muhammad Haziq Bin Jani
7
Countering Violent Extremism in Malaysia: Past Experience and Future Prospects – Muhammad Haziq Bin Jani
and the Institute of Islamic Strategic Research Asian national, were also arrested in anti-
Malaysia (IKSIM). terrorist operations.18 All these indicate that
Malaysia’s CVE programme is very much a
Various civil society organisations that work in progress. This is especially so since
recognised the significance of the public 2016 accounted for about 40% of IS-related
communications approach also organised arrests since 2014.19
public talks and produced print, visual, and
new13 media to counter extremist narratives. Malaysia has declared that its IS-era
These groups include the Islamic Youth rehabilitation programme has had an
Movement (ABIM) and the Global Movement of impressive success rate of 97.5%.20 In 2012, a
Moderates (GMM); both groups combined to study of de-radicalisation programmes in
form a task force to counter IS ideology from Muslim-majority states produced similar
as early as September 2014.14 Since the numbers for Malaysia: 98.3% success rate – of
establishment of the task force, ABIM and the 154 jihadists detained, all except six
GMM have produced posters and short videos successfully completed the programme.21 The
that aim to create public awareness on lack of recidivism was taken as an indicator of
extremist narratives and prevent youths from the programme’s success. However, when IS
joining terrorist groups.15 emerged, six of the ex-ISA detainees
eventually joined IS in Syria.22 Critics may
Malaysia’s CVE and the longue durée question the long-term effectiveness of the
rehabilitation programme although in the age
Since 2014, Malaysia has been arresting local of the Internet and aggressive IS online
pro-IS cells that had been communicating with propaganda, it might be difficult to avoid some
Muhammad Wanndy Mohamed Jedi, level of re-radicalisation and recidivism of
Malaysia’s top IS operative in Syria.16 Now that released detainees and prisoners.
Wanndy has been killed, four more Malaysians
may take his place.17 Malaysia‘s Counter- Malaysia may continue to face the threat of
Terrorism Division had warned in December violent extremism so long as IS, Al-Qaeda, and
last year that there were scores of Malaysians their affiliates persist with their vigorous online
trying to evade the police to go Syria and Iraq radicalisation efforts. Coupled with the
to fight for IS. The number of people arrested politicisation of Islam and growing exclusivist
for wanting to go to Syria has increased from rhetoric that promote narrow world-views,
82 in 2015 to 112 in 2016; nine however Malaysia faces challenging times ahead. 23
managed to slip out. IS ideology continues to
spread through social media despite battlefield Another concern is Malaysia’s educational
losses in Iraq, Syria and Libya. And, terrorist approach to CVE. In order to counter IS
plots continue to be hatched. The most recent
was the arrest of four Yemeni terrorists in 18
The Star. Malaysia's police chief says four Yemeni
February for plotting attacks during the Saudi terror suspects arrested were targeting Saudi royalty.
King Salman’s visit to Malaysia. Separately, The Straits Times, 7 March 2017.
19
two Indonesians, one Malaysian, and an East Ng, E. Malaysia’s softer approach to radicals reaping
rewards. TODAY Online, 8 December 2016.
20
Ibid.
13 21
Mass communication and digital technologies such Harrigan, Jane, and Hamed El-Said. "Deradicalizing
as the Internet. Violent Extremists: Counter-Radicalization and
14
Loh, FF. GMM, Abim condemn IS, forming task force Deradicalization Programmes and their Impact in
to curb spread of extremism. The Star Online, 10 Muslim Majority States." Developments in
September 2014. Radicalisation and Political Violence (London:
15
El-Muhammady, A. “Countering the Threats of International Centre for the Study of Radicalisation and
Daesh in Malaysia”, pp.120-121. Political Violence, 2012).
16 22
Muhammad Haziq Bin Jani. Annual Threat El-Muhammady, A. “Countering the Threats of
Assessment: Malaysia. Counter Terrorist Trends and Daesh in Malaysia,” p.119.
23
Analysis, Volime 7, Issue 11, December 2015-January See some arguments about the drivers of extremism
2016, pp. 17-21. Accessed May 2017, within Malaysia in Hudson, J. Why Does Malaysia
17
Reduan, H. Four Msians replace dead Msian IS Have an Islamic State Problem? Foreign Policy, 9
leader Wanndy. New Straits Times, 15 May 2017. September 2015.
8
Countering Violent Extremism in Malaysia: Past Experience and Future Prospects – Muhammad Haziq Bin Jani
narratives, Malaysia announced the towards CVE in the longue durée, learning
establishment of a regional, digital counter- from its achievements of public education in
messaging centre for Southeast Asia, the schools. UNESCO praised Malaysia for taking
Regional Digital Counter-Messaging “a firm stance against violent extremism
Communication Centre (RDC3) in October through inclusion and education.” UNESCO
2015.24 Malaysia secured US funding for the considers it “the most effective long-term
project and set out to establish the centre in prevention to forces threatening to divide
May 2016.25 It is still work in progress.26 societies”.29 UNESCO was not referring to the
Besides the RDC3, Malaysia has a number of CVE initiatives, but Malaysia’s relatively
similar initiatives under various ministries with successful and indigenous efforts at managing
foreign assistance or in the pipeline. For ethnic relations in Malaysia’s context.30
instance, the Counter-Messaging Centre Malaysia can effectively counter the menace of
(CMC) under the Home Ministry was violent extremism through education and
established in May 2016. Similarly, a Digital developing counter-narratives as nation-
Strategic Communications Division (DSCD) building narratives further upstream.
under the Southeast Asia Regional Centre for
Counterterrorism (SEARCCT) was established Conclusion
in April 2016. Currently, a proposed centre for
a similar purpose is to be established under Malaysia’s CVE experience in the context of
the King Salman Centre for International the IS threat demonstrates the need for all
Peace with Saudi Arabia.27 The existence of facets of “countering violence” to be
several such counter-messaging centres runs implemented. Malaysia’s authorities have done
the risk of overlapping roles and straining well in the realm of counter-terrorism
limited resources. legislation and rehabilitation. A long-term
critical look at Malaysia’s CVE experience as it
Malaysia will have to do more in counter- evolves from the Malayan Emergency era until
ideology efforts. There is a need to formulate the present reveals the following.
a strong counter-narrative across the multitude
of government bodies and organisations it now Firstly, CVE requires constant adaptation to
has. Policy initiatives are also required in the address the changing security landscape.
cyber domain to counter jihadist narratives. Secondly, the adaptations must emanate from
These narratives on social media and chat and improve upon existing institutions, whether
groups are instrumental in radicalising the it is the legislative or security infrastructure or
vulnerable segments of Malaysian population, the education system. Thirdly, Malaysia would
particularly youth. When stern action was do well to rely more on its indigenous CVE
taken against various IS cells which operated policies which pre-dates the US-launched CVE
in the open, IS fighters and supporters grew in initiatives. Fourth, the politicisation of Islam
numbers in the online sphere, corresponding and growing exclusivist rhetoric in the country
with the increase in numbers of new pro-IS may render vulnerable groups susceptible to
cells in Malaysia.28 online jihadist narratives, thereby undercutting
its own CVE initiatives.
Malaysian authorities might also need to
reconsider the present educational approach Managing these trends through counter-
narratives that promote pluralism and religious
24
P. Parameswaran. Malaysia Eyes New Regional and political moderation, and introducing
Facility to Counter Islamic State. The Diplomat, 8 upstream education measures to build
October 2015.
25
P. Parameswaran. Malaysia to Launch New Center
29
to Counter Islamic State Messaging in May. The I. Bokova. The Malaysian Example – Partnering with
Diplomat, 27 January 2016. Asia to Prevent Violent Extremism. United Nations
26
P. Parameswaran. Malaysia’s New Terror Centers in Educational, Scientific and Cultural Organisation
Its Islamic State War. The Diplomat, 7 March 2017. website, 22 September 2016.
27 30
Ibid. R. Ibrahim. "Multiculturalism and education in
28
Muhammad Haziq Bin Jani. Annual Threat Malaysia." Culture and Religion 8, no. 2 (2007): 155-
Assessment: Malaysia. 167.
9
Countering Violent Extremism in Malaysia: Past Experience and Future Prospects – Muhammad Haziq Bin Jani
10
Pakistan’s CVE Programme: A Overview of Achievements and Challenges – Farhan Zahid
Unless the Countering Violent Extremism and values that may directly or indirectly
(CVE) measures are not instituted and contribute to the growing cycle of violence and
implemented judiciously, Pakistan’s fight extremism in the country. To achieve optimal
against home-grown extremism and terrorism results from a CVE policy, strengthening the
will remain partially successful. So far, ties between the states and societies and
Pakistan has made modest progress against removing the trust deficit are essential.
violent radicalisation but much remains to be
done. As the CVE initiatives—launched by the Defeating extremist ideologies requires joint
military and the civil society—are maturing state-and-society approach. Primarily, a CVE
from the embryonic phase to adolescence, a policy provides masses with a narrative against
critical overview of their challenges and extremist ideologies and resuscitates the trust
achievements will help Pakistan to consolidate of the community in the state, a sine qua non
the gains as well as plug the existing gaps. to fight violent extremism. It also assists
government agencies in containing terrorist
Introduction groups’ recruitment drive by neutralising the
social and political avenues they exploit to gain
The term CVE refers to measures taken by support and sympathy.
governments and civil society organizations to
contain, deter, and eventually address the Pakistan’s CVE Initiatives
underlying causes of violent extremism. As a
concept, CVE gained currency in academic Notable Pakistani counter-terrorism analyst,
circles in 2015 when the Obama Administration Muhammad Amir Rana, defines Pakistani CVE
hosted a summit at the White House following measures as preventive and as
the meteoric rise of the Islamic State (IS) disengagement steps implemented to dissuade
terrorist group. individuals from extremism and confront the
radical narratives.1
The CVE measures are considered essential
for sustainable counter-terrorism and counter- In Pakistan, jihadist literature available in the
extremism policies. They provide the balance vernacular press, social media platforms, and
between the kinetic (hard) and non-kinetic the traditional religious curricula taught at the
(soft) aspects of counter-terrorism. The major madrassas are major dissemination sources of
objective of any CVE policy is to create a jihadist narratives. These narratives emanate
counter-narrative against extremist ideologies from a variety of extremist groups and
through policy and academic research. To be individuals, such as Al-Qaeda and the so-
effective, every CVE strategy must be called Islamic State (IS) and domestic groups
contextual and cognisant of the extremist like the Tehrik-e-Taliban Pakistan (TTP),
milieu of a particular place. Lashkar-e-Jhangvi (LeJ), Lashkar-e-Taiba
(LeT), and others.
In Pakistan’s context, CVE can be defined as
1
countering radical narratives disseminated by Discussions with Mohammad Amir Rana, Director
jihadist organisations to promote intolerance Pakistan Institute of Peace Studies in April 2017,
Islamabad.
11
Pakistan’s CVE Programme: A Overview of Achievements and Challenges – Farhan Zahid
12
Pakistan’s CVE Programme: A Overview of Achievements and Challenges – Farhan Zahid
has been taken against the Islamist terrorist DERP programmes were held at Swat district,
outfits in Karachi, such as the Rah-e-Haq which was the region most affected by Taliban
Party, a new political face of sectarian militant militancy at that time. These centers were
organisation Lashkar-e-Jhangvi (and its mother established to de-radicalise, rehabilitate, and
organisation Siphah-e-Sahaba). Rah-e-Haq reintegrate militants arrested during the military
has managed to win nine constituencies in operation. So far, a total 2,500 militants have
Karachi’s municipal elections held in been de-radicalised under this initiative. Of
December 2015.6 these, 200 have been reintegrated from
Saboon rehabilitation center and 1,169 from
CVE Measures in Pakistan Rastoon center; the remaining figure (1,131)
comprises other militants who have interned at
The civil and military establishments in these centers.8
Pakistan have initiated a number of CVE
measures during the last eight years. These The Saboon Centre focused on de-radicalising
measures include de-radicalisation and the teenagers who were trained to become
rehabilitation programmes of detained suicide bombers, while the Rastoon Center
militants, madrassa reforms, and policy worked on Islamist militants aged between 19-
measures like National Internal Security Policy 25 years. Meanwhile, the Mashal Centre works
(NISP), National Action Plan (NAP), and legal with the families of Islamist militants
measures such as amendments to the Anti- undergoing deradicalisation to sensitise them
Terrorist Act and Protection of Pakistan to post-rehabilitation requirements. The military
Ordinance.7 These measures could be divided sought professional assistance from an
into: umbrella body of non-governmental
i. Militant De-radicalisation and organizations, Hum Pakistan Foundation
rehabilitation programmes (HPF), led by Dr Farieha Paracha.9
ii. Reforms and laws
iii. Policy measures Another initiative was taken in 2011 by the
Punjab government’s Counter Terrorism
Militant De-Radicalisation Department in partnership with Technical and
and Rehabilitation Programmes Vocational Training Authority (TEVTA) to de-
radicalise and rehabilitate militants of banned
Although a comprehensive and national-level Kashmiri jihadist and anti-Shia militant groups.
policy of militant de-radicalisation and The ex-members of these militant groups were
rehabilitation policy do not exist in Pakistan, a given technical and vocational training to
few initiatives warrant mentioning. After the pursue alternative livelihoods. The Punjab
conclusion of the military operation Rah-e-Rast government also provided modest soft-loans to
(Path of Righteousness) in Malakand Division start small businesses or to set up their own
in 2009 against the TTP Swat chapter, the workshops.
Pakistani army initiated de-radicalisation
programmes for detained Islamist militants Three batches of more than 300 militants were
ranging from teenagers (the would-be suicide rehabilitated and trained through this
bombers) to adults involved in militancy in programme.10 Two other programmes were
Swat and adjoining areas of northwest launched in the aftermaths of military
Pakistan. The initiative was called De-
Radicalisation and Emancipation Programs 8
Ibid.
9
(DERP). Discussion with Muhammad Amir Rana, Director
Pakistan Institute of Peace Studies in Islamabad. For
details, see: Muhammad Amir Rana, “Swat De-
6
Zia ur Rehman. ASWJ affiliate quietly swipes nine radicalization Model: Prospects for Rehabilitating,”
seats in Karachi. The News, 7 December 2015. Conflict and Peace Studies, Vol. 4, No. 2, April-June
7
Abdul Basit, “Countering Violent Extremism: 2011, pp. 5- 13.
10
Evaluating Pakistan’s Counter-Radicalization and De- Saba Noor, From Radicalization to De-
radicalization Initiatives”, Journal of Institute of Policy Radicalization: The Case of Pakistan, Counter
Research Islamabad (IPRI), XV, No. 2 (Summer 2015): Terrorists Trends and Analysis (CTTA), Vol. 5, Issue 8,
44-68. August 2013, pp.16-19,
13
Pakistan’s CVE Programme: A Overview of Achievements and Challenges – Farhan Zahid
operations Rah-e-Rast and Rah-e-Nijat in parliament.14 The apparent reason for the
Bajaur tribal region and KPK’s Tank districts. failed negotiations was ITMP’s demand for a
Although no latest information is available, the degree-awarding status on par with other
government plans to establish two de- government and private universities.15
radicalisation centers for Islamist militants who
renounced militancy.11 The center established On the legal front, the government amended
at Khar, capital of Bajaur, rehabilitated 47 old laws and introduced new ones to empower
Taliban militants under the Navi Sahar the law enforcement agencies to combat
programme. The militants were released after terrorism. For instance, the Anti-Terrorist Act
completing the vocational training course in (ATA) 1997 was amended twice in 2014 and
October 2013.12 2015 to give them more powers. Similarly, the
Protection of Pakistan Act was passed in 2014
Reforms and Legislation with a two-year sunset clause. The Act
provided sweeping powers such as ‘shoot
Another set of measures taken by the suspects on sight’, ‘enter and search, without
government under NAP was madrassa warrant any premises to make any arrest’,
reforms, which have been a contentious issue remand for an extended period, and prosecute
in Pakistan’s struggle against home-grown suspects on the basis of digital evidence.16
extremism and terrorism. It is slow moving and
progress, so far, has been one-step forward, In 2014, the 21st Constitutional Amendment
two steps backwards. After the 18th was passed to establish the Military Courts for
constitutional amendment, it has become a two years to expedite the judicial trials of
provincial matter. To date, the madrassa hardcore terrorists and execute them swiftly.
reform measures have not achieved the This was done due to the inherent weaknesses
intended goal of registering all the madrassas and failures of the slow-moving criminal justice
in Pakistan. system which failed to try and convict the
terrorists. This stop-gap measure was heavily
The Madrassa Regulation Ordinance had been criticised by human rights watchdogs and civil
passed in 2002 (amended in 2008) by the then society organisations. Although the
military regime of General Pervez Musharraf establishment of military courts was never
(1999-2008). The main aim was to register and viewed as a judicious step and did not yield the
revise the curricula of madrassas promoting desired results, the government extended their
narrow sectarian worldviews and promoting duration for another two years after parliament
jihadi ideologies. Following the restoration of passed the 28th Amendment Bill 2017 and
democracy in Pakistan in February 2008, the gave a fresh lease to the courts starting from
Pakistan People’s Party-led coalition January 7, 2017.17
government reached an accord with the Ittihad-
e-Tanzeem-ul-Madaris Pakistan (ITMP),13 a Policy Measures
coalition of five madrassa boards in Pakistan.
The consensus reached between the Federal The incumbent government of the Pakistan
Ministry of Education and ITMP was that the Muslim League-Nawaz (PML-N) is not the first
government would recognise the madrassa one to initiate policy measures specifically
boards and in return, the madrassa boards related to CVE in Pakistan, despite the fact
would revise their curricula. Despite initial that their policy frameworks are important sub-
success, the talks did not last long and the components of various ongoing CVE initiatives.
agreement failed to become an act of the
14
Govt and Ittehad-e-Tanzeemate-Madaris (ITMD)
talks fail. Pakistan Today, 9 October 2010.
11 15
Zulfiqar Ali, De-radicalization centers being set up in Abidoon Nadeem. Govt and Ittehad-e-Tanzeemate-
Bajur and Tank. Dawn, 21 January 2012. Madaris (ITMD) talks fail. Nation, 9 October 2010.
12 16
“Rehabilitation & integration: 47 ex-militants freed Irfan Haider. Protection of Pakistan Bill 2014
after receiving vocational training”, Express Tribune, approved in NA. Dawn, 2 July 2014.
17
13 October 2013. President Mamnoon signs bill extending military
13
Alliance of the Boards of Religious Seminaries. courts for two years. Geo News, 31 March 2017.
14
Pakistan’s CVE Programme: A Overview of Achievements and Challenges – Farhan Zahid
However, the PML-N government has built on Civil Society’s CVE Initiatives in Pakistan
the work of their predecessors. The previous
government established the National Counter In addition to government-led CVE measures,
Terrorism Authority (NACTA) in 2009 to take the civil society in Pakistan has taken a
the lead role of coordinating agency modelled number of measures as well. For instance, the
on the US Directorate of National Intelligence Pakistan Institute of Peace Studies (PIPS), an
(DNI) and Department of Homeland Security Islamabad-based private think tank, has
(DHS). NACTA also has a specialised launched a project Reconstruction of the
directorate for CVE. Since NACTA’s creation, it National Narratives and Counter Violent
took the government another four years to Extremism Model for Pakistan. Under this
pass the bill in parliament in 2013 to make it project, a series of consultative discussions
operational. with religious clerics, scholars, policymakers,
law enforcers, parliamentarians, social
Another similar step was the National Internal activists, and retired civil servants were held in
Security Policy (NISP) 2014-2018 which was Islamabad in 2016-17. The overarching
announced in 2014. The policy provided a objective of these meetings was to devise
clear roadmap for achieving targets concerning guiding principles for shaping the national
Pakistan’s internal security challenges. The narrative.
policy document calls for the establishment of
the Directorate of Internal Security (DIS) and Other CVE initiatives by the civil society
federal Rapid Response Force (RRF), an arms include public awareness campaigns and
control regime, preventing the misuse of peace rallies. For instance, the Jinnah Institute,
cyberspace, a border control regime, and a private think-tank based in Islamabad,
capacity building and modernization of overall organised a peace march to promote peaceful
criminal justice system.18 The highly ambitious coexistence, religious harmony and tolerant
policy, even after three years, has hitherto not values. Similarly, CSO CIRCLE organised a
been implemented. National Flag day in 2014 to bring together
cross sections of society.19
The twenty-point National Action Plan (NAP)
turned out to be a corollary to NISP in Need for consolidation
December 2014, following the tragic terrorist
attack on the Army Public School (APS) in As discussed earlier, a number of CVE
Peshawar on December 16, 2014, by TTP measures have been initiated by the
militants; the militants killed 132 APS students. government but there is a need to consolidate
The NAP was the result of an All Parties the gains along with improving the
Conference (APC) convened after the APS implementation mechanism through regular
attack. Besides policy measures, a consensus assessment. Arguably, terrorism is low cost
was developed to adopt both soft and hard whereas counter-terrorism is very high cost
measures to deal with the terrorists. There are and CVE is one major pillar of the overall
a number of initiatives adopted in the 20-point counter-terrorism strategy of any country.
NAP agenda such as the strengthening of Pakistani policymakers need to analyse the
NACTA, action against hate literature, challenges in the implementation of CVE
protection of the minorities, registration of measures. Most importantly, there is a need to
madrassas, and measures to safeguard cyber expedite the strengthening of NACTA because
space from radical ideologies. The it is the primary agency leading the efforts in
implementation of NAP has been only partially the execution of CVE initiatives.
successful as apparently, the major
stakeholders are not on board. The CVE wing of NACTA has not been able to
implement the policy initiatives as elaborated in
NISP and NAP. There may be other
18 19
Raza Rumi. Charting Pakistan’s Internal Security Hediah Mirahmadi, Waleed Zaid et al, Empowering
Policy. United States Institute of Peace Studies (USIP), Pakistan’s Civil Society to Counter Global Violent
Special Report 369, May 2015. Extremism. Brookings Institute, January 2015.
15
Pakistan’s CVE Programme: A Overview of Achievements and Challenges – Farhan Zahid
Conclusion
16
Countering Violent Extremism in Bangladesh – Iftekharul Bashar
17
Countering Violent Extremism in Bangladesh – Iftekharul Bashar
consistently used the Rohingya issue to educational institutions in the capital Dhaka
advance their propaganda. alone.7 While the existence of extremist
organisations in educational institutions is not a
Factors that have contributed new phenomenon in Bangladesh, the lack of
to the CVE programme attention from families, society, and state has
provided space for these entities to operate
The on-going CVE initiatives are being freely. Additionally, in the last few years, there
undertaken by the 17-member National has been an increase in the number of female
Committee on Militancy Resistance and recruits as male terrorists are actively
Prevention formed in 2009. The committee engaging the female members of their family.
comprises relevant ministries (Ministry of
Home Affairs, Ministry of Education, Ministry of Second, the penetration of internet has made
Information, Ministry of Youth and Sports, and online radicalisation more prevalent. As such,
Ministry of Culture) and security agencies since the establishment of the so-called
(Directorate General of Forces Intelligence, ‘caliphate’ of IS in June 2014, Bangladesh has
National Security Intelligence, Police seen a steady increase in internet-based
Headquarters, Rapid Action Battalion, Special radicalisation. IS and Al Qaeda propaganda
Branch, Border Guards Bangladesh etc.), and materials are readily available on the internet,
is headed by the Minister for Home Affairs.4 A where write-ups on IS and Al Qaeda leaders,
number of factors have contributed to the operations methodology, and success stories
establishment of the country’s CVE of their attacks are regularly posted in
programme. Facebook groups. Bangladesh has a sizeable
number of active Facebook users. Dhaka city
First, according to Bangladesh’s law alone has 22 million users, which represents
enforcement agencies, recruitment by terrorist the region with the second highest active
entities, such as the pro-IS Neo-JMB, remains Facebook users globally.8
persistent despite the numerous counter-
terrorist operations.5 The demography of This is worrying because the majority of
terrorist recruits has also changed significantly current recruitment takes place online, which
due to IS and its recruitment strategy. While in has minimal measures in place to counter the
the past recruitment took place mostly in rural impact of extremist propaganda. In fact, there
and sub-urban areas, the present-day recruits are over one hundred secret Facebook
are predominantly urban youth with secular accounts that terrorists are using for
education.6 Also, in the past, terrorist recruitment.9 Despite limited capacity for
recruitment took place mostly in madrassas vigilance, law enforcement agencies have
(Islamic religious schools). However, the status arrested some extremists operating in the
quo has seen mainstream educational cyber domain and managed to shut down their
institutions being used as recruiting grounds. forums. However, a dozen more forums would
The profile of the attackers of the Holy Artisan usually replace the ones that have been
Café and the subsequent attacks attest to this. brought down.10
According to an intelligence report, Third, terrorist groups are also changing their
Bangladeshi authorities have brought 21 tactics. They are constantly changing their
educational institutions under surveillance due locations and operating in small cells, instead
to extremist activities. The list includes 18 of maintaining organised and large networks,
4 7
Shahab Enam Khan, “Bangladesh: Changing This report is based on an investigative report dated
Dynamics of Violent Extremism and Response of the 27 September 2016 by a prominent Bengali Daily
State,” Small Wars and Insurgencies, Vol 28, No. 1 Newspaper named the Kaler Kontho. Link.
8
(2017): 210. Dhaka ranked second in number of active Facebook
5
Interview with a Bangladeshi Counterterrorism users. bdnews24, 14 April 2017,
9
professional in Dhaka. M Abul Kalam Azad. No thanks to technology. The
6
Interview with Bangladeshi counter-terrorism officer Daily Star, 23 April 2017.
10
in Dhaka Ibid.
18
Countering Violent Extremism in Bangladesh – Iftekharul Bashar
enabling them to deceive the authorities and institutions in building awareness about
make detection difficult. extremism and terrorism among teachers,
students, and parents. The educational
Given the above, CVE initiatives, such as institutions have also instructed teachers,
community engagement, can help in detecting parents, and students to remain vigilant and
extremist behaviour more effectively. report to the police if any student is involved in
extremist activity or goes missing for ten days.
Major components of the CVE initiatives Currently, there are 37 public and 95 private
universities in the country with a total student
The fundamental features of CVE initiatives in population of 600,000 students.11
Bangladesh focus on building greater
awareness of religious teachings in society and Engaging Youth through Sports and Extra-
engaging communities in building social Curricular Activities
resilience. These include:
The Ministry of Youth is developing a Youth
Religious Education Database to develop new youth-based
programmes. Through its countrywide network,
Extremists often exploit religious spaces to it is organising various sporting events across
recruit and spread their radical ideas. As such, the country to channel the energy of
a key component of Bangladesh’s CVE Bangladeshi youth into creative and
programme is to partner with religious leaders constructive activities.
who play an important role as community
leaders. Religious leaders are co-opted to alert Revising Madrassa syllabus
and sensitise the Muslim community about
violent extremism. Bangladesh Islamic Some madrassas have been known to preach
Foundation (BIF), an autonomous body under religious intolerance and extremism.
the Ministry of Religious Affairs, is working with Consequently, madrassa textbooks have been
Imams from a network of 70,000 mosques to revised and the government has directed the
ensure that a pre-sermon speech is delivered Ministry of Education to continue its scrutiny of
by them during weekly Friday congregational madrassa curriculum. Additionally, the
prayers. The text of the speech is prepared by government has co-opted the Qawmi
BIF experts and sent to Imams all over the Madrassa in the country, which is one of the
country. two major madrassas in Bangladesh. The
government has recognised the Dawra-e-
CVE Messaging through print Hadith degrees issued by Qawmi Madrassa
and electronic-media Education Boards as equivalent to a Master’s
Degree in Islamic Studies and Arabic. This
Bangladesh’s Ministry of Information and implies that Qawmi Madrassa graduates will
Ministry of Culture are using newspapers, now compete in the job markets with others
radio, and television for CVE messaging. who studied under the National Curriculum.
Presently, the government is producing However, it remains to be seen how
documentaries, short-films, and differences in the syllabus of Qawmi
advertisements with a focused CVE message Madrassas and the general education system
targeted at confronting extremist narratives. are reconciled.
Additionally, television channels, including
those of private media houses, have been Controlling extremist messaging
instructed to broadcast programmes against on the internet
terrorism and extremism.
Bangladesh has taken steps to monitor social
Engaging Educational Institutions media platforms, such as Facebook and
19
Countering Violent Extremism in Bangladesh – Iftekharul Bashar
Twitter. Efforts are underway to develop the risk due to a pronounced presence of extremist
technological capacity of the National outreach efforts mainly through radical
Telecommunication Monitoring Centre (NTMC) preachers or so-called social organisations.
to enhance the detection of extremist websites.
The Bangladesh Telecommunication Third, there is a need for more coordination
Regulatory Commission (BTRC) is also and information sharing among the various
working in this regard. security agencies in the country. The
coordination is limited despite the
Community initiatives government’s stress on better coordination and
the formation of several committees to this
Muslim clerics in Bangladesh have contributed end.
significantly to Bangladesh government’s CVE
efforts. For instance, in 2016, a leading Islamic Fourth, there is no framework to assess the
group in Bangladesh issued a fatwa (religious implementation and effectiveness of the CVE
edict) condemning terrorism and militancy, programmes so as to make necessary
including violent attacks on non-Muslims and adjustments.
secular writers and activists. Such acts were
declared as "Haraam," or forbidden in Islam. Fifth, the detection and countering of extremist
The fatwa was signed by more than 100,000 trends on social media platforms is not
Islamic scholars, legal experts, and clerics, and effective since there is a lack of dedicated and
presented by Maulana Fariduddin Masoud, technologically-skilled professionals in this
chairman of Bangladesh Jamiatul Ulema domain. Sixth, Bangladesh lacks a holistic plan
(BJU), a national body of Islamic scholars.12 to rehabilitate violent extremist offenders.
Presently, there are more than 3,000 detainees
The fatwa by esteemed scholars and its in prison and some inmates will be released in
endorsement by the apex Islamic religious the next few years. Unless they go through a
body of Bangladesh provides an effective comprehensive rehabilitation programme, they
counter-weight to extremist propaganda. It will fail to reintegrate back into society and will
helps in delegitimising the dangerous continue to pose a security threat.
narratives forwarded by the likes of IS, hence
dissuading those attracted by extremist On the strategic front, Bangladesh’s response
advocacy of violence. remains weak. There are some initiatives to
utilise media to create social awareness and
Gaps in Bangladesh’s resistance to extremism and terrorism.
Counter-Terrorism Efforts However, the progress is slow and the
outcome remains to be seen. In recent months,
Despite the CVE initiatives taken by there have been some concerns about the
Bangladesh, the overall programme remains government’s appeasement of an Islamist
weak because of a number of reasons. First, vigilante group known as Hefajat-eIslam, which
the existing CVE initiatives are being carried is a pressure group of madrasah (religious
out on an ad hoc basis. As a result, the schools) teachers and students. The
sustainability and continuity of such initiatives government has changed the content of some
will remain a concern. school textbooks by ‘Islamising’ them. Many
observers in Bangladesh are worried that this
Second, the CT agencies remain focused on move will be counterproductive, especially at a
the capital Dhaka. There is inadequate time when Bangladesh is attempting to
coverage of the more vulnerable northern and eradicate extremism.
south-eastern regions of Bangladesh. These
areas, especially those with a concentrated Conclusion
Rohingya population, are at greater security
Bangladesh must formulate a comprehensive
National Action Plan for CVE and ensure that
12
Anti-Terror Fatwa Endorsed by 100,000 Bangladeshi the CVE work of various agencies and
Islamic Scholars. Voice of America, 21 June 2016.
20
Countering Violent Extremism in Bangladesh – Iftekharul Bashar
13
Interview of Rohan Gunaratna, Singapore, 12 May
2017.
21
Submissions and Subscriptions
Counter Terrorist
Trends and Analyses
L
aunched in 2009, Counter Terrorist Trends and Analyses (CTTA) is the journal of
the International Centre for Political Violence and Terrorism Research (ICPVTR).
Each issue of the journal carries articles with in-depth analysis of topical
issues on terrorism and counter-terrorism, broadly structured around a common
theme. CTTA brings perspectives from CT researchers and practitioners with a view to
produce policy relevant analysis.
The International Centre for Political Violence and Terrorism Research has entered into
an electronic licensing relationship with EBSCO, the world’s largest aggregator of full text
journals and other sources. Full text issues of Counter Terrorist Trends and Analyses can
be found on EBSCOhost’s International Security and Counter-Terrorism Reference Center
collection.
Counter Terrorist Trends and Analyses (CTTA) welcomes contributions from researchers and
practitioners in political violence and terrorism, security and other related fields. The CTTA is
published monthly and submission guidelines and other information are available at
www.rsis.edu.sg/research/icpvtr/ctta. Presently we are seeking contributions specifically on
women and terrorism, Boko Haram, Al-Shabaab, Lashkar-e-Taiba (LeT), Afghan Taliban,
Pakistani Taliban and the Islamic Movement of Uzbekistan (IMU). To pitch an article in 2017 on
similar topics or others please send the contribution at: ctta@ntu.edu.sg.
For inclusion in the CTTA mailing list, please send your full name, organisation and
designation with the subject ‘CTTA Subscription’ to ctta@ntu.edu.sg.
4
The S. Rajaratnam School of International Studies (RSIS) is a professional graduate school of international affairs at the
Nanyang Technological University (NTU), Singapore. RSIS' mission is to develop a community of scholars and policy
analysts at the forefront of security studies and international affairs. Its core functions are research, graduate education
and networking. It produces cutting-edge research on Asia Pacific Security, Multilateralism and Regionalism, Conflict
Studies, Non-Traditional Security, International Political Economy, and Country and Region Studies. RSIS' activities are
aimed at assisting policymakers to develop comprehensive approaches to strategic thinking on issues related to security
and stability in the Asia Pacific. For more information about RSIS, please visit www.rsis.edu.sg.
The International Centre for Political Violence and Terrorism Research (ICPVTR) is a specialist research centre within the S.
Rajaratnam School of International Studies (RSIS) at Nanyang Technological University, Singapore. ICPVTR conducts
research and analysis, training and outreach programmes aimed at reducing the threat of politically motivated violence and
mitigating its effects on the international system. The Centre seeks to integrate academic theory with field research, which
is essential for a complete and comprehensive understanding of threats from politically-motivated groups. The Centre is
staffed by academic specialists, counter-terrorism analysts and other research staff. The Centre is culturally and
linguistically diverse, comprising of functional and regional analysts from Asia, the Middle East, Africa, Europe and North
America as well as Islamic religious scholars. Please visit www.rsis.edu.sg/research/icpvtr/ for more information.
STAFF PUBLICATIONS
5
Counter Terrorist Trends and Analyses www.rsis.edu.sg/research/icpvtr/ctta
View publication stats