Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

United States Institute of Peace • www.usip.org • Tel. 202.457.1700 • Fax. 202.429.

6063
MISSION

USIP’s Insights Newsletter aims to chal- STATE OF THE ART


lenge and refine major assumptions about
the theory and practice of peacebuilding
Countering Violent Extremism as a Field of Practice
and contributes to the design of specific
by Steven Heydemann, Ph.D, vice president, Center for Applied Research on Conflict, USIP

C
peacebuilding tools applicable in conflict
situations worldwide.
ountering Violent Extremism (CVE) is a rapidly expanding

ISSUE 1, SPRING 2014 field of practice. Despite its impressive growth, CVE has

Inside this issue struggled to establish a clear and compelling definition as


STATE OF THE ART
Countering Violent Extremism a field; has evolved into a catch-all category that lacks precision and
as a Field of Practice 1
focus; reflects problematic assumptions about the conditions that
Something Old, Something New 5
promote violent extremism; and has not been able to draw clear
PEACE ARENA
Theory vs. Practice with Tom Parker and boundaries that distinguish CVE programs from those of other, well-established fields, such
Dr. John Horgan 2 as development and poverty alleviation, governance and democratization, and education.
In addition, in reframing work in such fields in terms of its contribution to the prevention of
IN PRACTICE terrorism, CVE poses significant risks to practitioners and participants whose local engage-
CVE in Nigeria & CVE in Pakistan 4 ment may be seen as extensions of America’s often-controversial counterterrorism (CT)
policies and thus as legitimate targets of critics of such policies.
Addressing these problems will not be easy and may require a reassessment of whether
CVE is a useful or effective framework for field-based interventions. Developing a sharper,
narrower, and more focused definition of CVE; tightening the boundaries between CVE as
a field of practice and its related fields of development, governance, and conflict mitiga-
tion; and a stronger commitment to testing the causal assumptions underlying CVE work
are initial steps that would improve the design, implementation, and evaluation of CVE
programming. Identifying CVE as a classic case of a “wicked problem,” unpacking its com-
ponent elements, and establishing which components are most tractable to specific kinds
of interventions would be an important step in this direction.

The Problematic Origins and Development of CVE


In the wake of the 9/11 terror attacks, the U.S. embarked on a Global War on Terror. The
Bush administration, with bipartisan support, elevated counterterrorism into a defining
feature of U.S. foreign policy: Military action—the use of force, or “kinetic” measures—
became the preferred means for countering terrorism. Over the course of the 2000s,
Continued on page 9
ISSUE 1, SPRING 2014

In each Newsletter, the Peace Arena offers a space for discussion between scholars and practitioners as
PEACE ARENA they comment on a selected quote. This week we feature a discussion on CVE between Dr. John Horgan,
Director of the Center for Terrorism and Security Studies at the University of Massachusetts Lowell, and
Tom Parker, Advisor on Human Rights and Counter-Terrorism at the United Nations Counter-Terrorism
Implementation Task Force (CTITF). The selected quote comes from Georgia Holmer, Senior Program
Officer at USIP’s Center for Governance, Law and Society (GLAS). Holmer published a Special Report
entitled “Countering Violent Extremism: A Peacebuilding Perspective” in September 2013.
Theory vs. Practice
“As the domain of CVE continues to mature and expand, moving further upstream to address root
causes of extremist violence, much of the work touches the realm of peacebuilding. Violent extremism
is a driver of conflict, and violent extremists are often spoilers in peacebuilding efforts.”

by Tom Parker by Dr. John Horgan

I C
am always a little cautious about ountering Violent Extremism
references to the ‘”root causes” of (CVE), for many, is more about
extremist violence since it suggests preventing violent extrem-
that there are a discrete number of ism from taking root in the first place.
generic causes of extremist violence Because of this, those who espouse
whereas both social science and field CVE quickly find themselves in a no-
experience suggest that the drivers of win situation. It is not unlike being
extremism and violent behavior come in many forms and combi- shipwrecked with a tiny rowboat for survival. You may have the
nations, some deeply personal and others more societal in nature, company of others but will face no end of disagreement about
and differ from person to person. what to do. Once you realize that staying put is not a feasible option,
What is, I think, fair to say is that the grievances articulated by it can be impossible to know in which direction you should row, and
violent extremists are often grounded in the same political reali- you might never know if you have succeeded. Worse, if rescued, it
ties that peacebuilding efforts are designed to engage, although may not be because of anything that you actually did.
practitioners must take care not to draw facile connections as Violent extremism poses tremendous challenges for ex-
proximity is not always causation. Poverty is a classic case in point. planation and, thus, response. It comes in many forms. It has
Poverty is often cited as a root cause of terrorism, more often than multiple, sometimes overlapping causes. It attracts multiple and
not by governments mired in a security crisis and seeking financial differentially motivated participants, spawning diverse effects for
aid from international donors. Yet the social science suggests that participants and victims alike. Its reality is rarely as we would like it
personal experience of poverty is not highly correlated with ex- to be, and our responses do change it. Ironic then that so far CVE
tremist violence—think of the students in Germany and Italy who is unimpeded by the dueling metaphors that have plagued efforts
embraced Marxist terrorism in the early 1970s. Many—like Susanne to understand radicalization.
Albrecht, who assisted in the attempted kidnap and murder of Even if we reach consensus on where to focus resources for
Jürgen Ponto, Chairman of the Dresdener Bank, and the failed prevention (e.g., structural conditions), we should never assume
assassination attempt on Alexander Haig, NATO Commander-in- that one kind of cause takes priority over another— a point borne
Chief—came from affluent backgrounds. The same has been true out in conflicts where identity is a core driver. We still cannot even
of many of the recruits that have joined al-Qaeda. grasp the simple fact that the motivation of the violent extremist
Those involved in peacebuilding efforts need to be aware of is rarely the cause of their behavior.
extremist narratives and grievances but should not allow extremist The perennial challenge of violent extremists is to engineer revo-
narratives to dominate their approach. Extremist groups require the lution and mobilize the masses. By and large, they fail. They anchor
support of their aspirational client communities to survive, what the their vision in whatever crisis they can. The more they externalize
Irish academic Louise Richardson has called “complicit surround.” blame for that crisis, the greater potential to gain uncritical support-
This complicit surround should be the focus of peacebuilding ers. And yet, that the pace and nature of CVE is almost exclusively
efforts. If the client community turns its back on the extremists then responsive to short-term terroristic gains is a testament to how un-
their days are likely to be numbered as a political force. imaginative and lackluster our efforts in this space continue to be.

2
ISSUE 1, SPRING 2014

Tom Parker, Cont. John Horgan, Cont.

However, as the quote notes, extremists can often have private, That we do not know precisely what we are preventing, let
even mercenary reasons, for prolonging conflict, making them alone knowing how or whether we might have prevented it, does
potential spoilers in peacebuilding efforts even when legitimate not make for a bright future. We cannot hide behind complexity. It
grievances are being addressed. In such circumstances, it is worth is already too late to prevent the inevitable flood of recruits to Syria
bearing in mind that some violent extremists can also become pow- and probably too late also to adequately prepare for the increasing
erful advocates for peacebuilding efforts precisely because of their likelihood of a crisis that will emerge from at least some returnees.
past commitment to violent struggle. We have a rapidly diminishing opportunity to figure out what
Martin McGuinness, alleged former Head of the Provisional CVE can be, and we must seize it. Scalability must be a core feature.
IRA’s General Army Council now deputy First Minister in Northern CVE efforts should be big and small but also fast and slow and
Ireland, has played a pivotal role in the Northern Ireland peace both preemptive and responsive. They can never be top-down.
process. In a remarkable statement in 2009, he described the rejec- Community-level engagement (even online) will remain a critical
tionist murderers of two British soldiers outside Massereene Army rate-limiting success factor. Though it ought to be distinct from
Barracks as “traitors to the island of Ireland”—a powerful repudia- peacebuilding, CVE can be part of it, and lessons from peacebuild-
tion of rejectionist aims, which carried substantial weight with the ing can inform CVE. We can limit spoiler impact by better enhanc-
wider republican community. All views expressed are those of the ing resilience, but we cannot seriously talk, even implicitly, a game
author and do not represent official UN policy. of prevention unless we are willing to acknowledge our glaring
limitations and plan accordingly.
Tom Parker’s response to John Horgan:
John makes a compelling plea for flexibility of both thought John Horgan’s response to Tom Parker:
and action, with which I fully concur. CVE is imprecisely understood I agree wholeheartedly with Tom Parker’s arguments about
both within academia and the policymaking community—yet it is the limitations of “root cause” arguments. They offer misleading
also currently in vogue because it seems to some to offer solutions and serious ramifications for formulating responses to violent ex-
to pressing problems. However, what we actually have are not tremism and other conflict-centered challenges. Equally, his point
solutions but rather a basket of insights culled from case studies about the continuity of conflict (often for reasons that differ from
around the world that may or may not be transferable from one the original “causes”) is well taken. Ironically, however, a lesson in
conflict to another, and drawing analogies between conflicts is pointing out the extraordinary—and genuine—transformation of
fraught with its own perils. Awareness of CVE research can cer- Martin McGuinness from terrorist leader to elder statesman is that
tainly help inform peacebuilding strategies, but it falls well short of it was the movement to which McGuinness once belonged that
offering a roadmap to successful outcomes. n essentially was one of the major catalysts for change in Northern
. Ireland. Of course a multitude of important actors were involved in
peacebuilding in Northern Ireland, but one could argue that it was
the Provisional IRA many would say effectively choreographed the
Some Final Comments by Georgia Holmer: nature and pace of that process, at least until 2001–02. If the pursuit
The term “root cause” as used in this debate is a good illustration of CVE is implicitly a suggestion that its advocates are able to exert
of how CVE and Peacebuilding are indeed distinct domains of control and influence, we would do well to reflect on the examples
policy and practice, each with its own dialect. “Root cause” theory in raised by Parker. n
terrorism studies, and simplistic causal explanations for violent
extremism, are dated ideas and, as John Horgan cautions, “offer
misleading and serious ramifications for formulating responses to violent extremism.” In conflict analysis and among peacebuilders, and in
the context of this particular quote, the term refers to structural drivers of conflict. The quote attempted to capture the evolution of CVE policy
from an emphasis on countering the “pull” of ideology to addressing the more structural ”push” factors and, perhaps more importantly, the
relatively new engagement of CVE practitioners in what have been traditional peacebuilding “spaces,” such as civil society and the education
sector. Regarding the overlap of the two domains, John Horgan astutely asserts that “though it ought to be distinct from peacebuilding, CVE
can be part of it, and lessons from peacebuilding can inform CVE.” Tom Parker critically notes that “awareness of CVE research can certainly
help inform peacebuilding strategies, but it falls well short of offering a roadmap to successful outcomes.” Both perspectives are largely con-
sonant with the USIP Special Report from which the quote was taken. n

3
ISSUE 1, SPRING 2014

IN PRACTICE
Countering Violent Extremism: The Nigerian Experience
Michael Olufemi Sodipo, Peace Initiative Network

N
igeria is diverse, like the causes and extremism. The JTF strategic operations,
characteristics of its ubiquitous very much in line with traditional counter-
conflicts, especially if the analysis terrorism approaches, include military
stretches over time. Intermittent erup- crackdowns on extremists through house-
tions of sectarian strife, corruption, mutual to-house searches, military stop and search
distrust, and social intolerance provide the checkpoint, raids, and demolition of homes
backdrop to extremist ideology in Nigeria. occupied by suspects. Noncoercive CVE
In June 2011, the federal government cre- instruments deployed by the Nigerian
ated the Joint Task Force (JTF), a special mili- government include the establishment Source: Wikimedia Commons
tary force comprising the Nigerian armed of dialogue committees, security sector
forces and the police, aimed at mitigating reform, economic development initiatives, of extremism. The U.S Department of State
the threat of violent extremism. and youth empowerment programs. listing of Boko Haram as a Foreign Terrorist
Despite the acclaimed success of Civil society actors, religious leaders, Organization in November 2013 is the latest
Nigerian CVE operations, paradoxically the community elders, and the media pursue move by an international partner in the ef-
terror campaign of Boko Haram is yet to a wide range of activities to increase com- fort to counter violent extremism in Nigeria.
abate, rather becoming more sophisticated munity engagement, promote peace The dynamics and manifestations
and lethal. The politicization of discourse on education, and build tolerance, social of violent extremism in Nigeria have
violent extremism, the lack of intelligence healing, security, and a culture of peace changed over the years. The phenomenon
on insurgent activities, and the alleged in Nigeria. The Nigerian government and has deep roots in poor governance and
human rights abuses by the security forces the UN Counter-Terrorism Implementation the culture of corruption that pervades
undermine CVE efforts. In addition, the lack Task Force in January 2012 unveiled proj- every level of Nigerian society and feeds
of national consensus on the best approach ects under the Integrated Assistance for extremist ideology. A CVE policy that does
to counter extremist groups continues to Counter-Terrorism initiative to support not address these drivers of violence is
be an albatross in the fight against violent Nigerian efforts in combating the scourge unlikely to succeed. n

CVE in Pakistan
Nadia Naviwala, Pakistan Country Representative, U.S. Institute of Peace

M
ost bilateral and multilateral mis- overarching policy objective of countering
sions in Pakistan are concerned violent extremism. The U.S. approach is also
with mitigating violence in or the most expansive, seeking to counter all
emanating from the country. While they each forms of ideological extremism that justify
have offices that could be considered to fall the use of violence. The most interesting it-
under the umbrella of “CVE,” their definitions, eration has been in Karachi, where counter-
objectives, and approaches are very different ing violent extremism has meant trying to
—reflecting the ambiguity of the term and counter participation in political violence,
the complexity of conflict in Pakistan. ethnic violence, and even criminal gangs Source: USIP Website
The United States has the clearest com- among youth. The term “stabilization” is
mitment to the term, collapsing the work of often seen alongside CVE, so that the objec- The UK approach is very different. Instead
many offices—public affairs, stabilization, tive is strengthening domestic peace and of the term CVE, their policy objective is
governance, and rule of law—under the stability in Pakistan. Continued on page 8

4
ISSUE 1, SPRING 2014

STATE OF THE ART


Something Old, Something New: The Emergence and Evolution of CVE Effort

O
by Naureen Chowdhury Fink, Head of Research and Analysis at the Global Center on Cooperative Security

ver a decade after the attacks of September 11, 2001, terrorism continues to factor heavily in

national security concerns. Its association with other transnational security challenges, including

drug trafficking, organized crime, and armed conflict, has underscored the need for a more

preventive and multidimensional response. Moreover, the ability of extremist groups to continue generating

support and sympathy has prompted awareness among governments that law enforcement approaches

alone are insufficient to counter terrorism and violent extremism in the medium to long term, despite some

of the short-term successes afforded by decapitation strikes that have targeted al-Qaeda leaders and affiliates.

The phenomenon of radicalized “self-starter” groups or individuals—“lone wolves”—also prompted greater

focus by governments and counterterror- including public diplomacy, strategic com- generalized at a global level, they create
ism practitioners on the need to challenge munications, development, and conflict a particular set of environmental enablers
extremist narratives and ideologies to prevention or mitigation. Today, CVE is in different contexts, allowing extremist
reduce their appeal and recruiting poten- an articulated interest of numerous inter- groups and recruiters to exploit local
tial early on. national organizations and associations, grievances and offer alternative narratives
In recent years, this evolution of the including the United Nations, European and mechanisms for addressing them. The
threat has prompted efforts to counter Union, and the Global Counterterrorism range of personalities and backgrounds
violent extremism or “CVE” allowing prac- Forum (GCTF). of extremists underscores the highly indi-
titioners to complement counterterrorism vidualized nature of the process by which
strategies in a number of countries and An assessment of contemporary CVE individuals support violent extremist ideas
regions. The unpredictability of terror- The preventive focus of CVE reflects the im- or groups; it may be just one or all of the
ism today, characterized by increasingly portance attached to addressing what the factors mentioned above that provides
diffused transnational networks and the United Nations Global Counter-Terrorism the necessary conditions. In addition to
phenomenon of “self-starters” that no Strategy calls the “conditions conducive to the right combination of structural drivers,
longer need extensive training or contact the spread of terrorism.” While no definitive “pull factors” such as charismatic recruiters,
with identifiable terrorist organizations, causal relationship has been established, appealing communications, and material
further underscores the need for a preven- given that violent radicalization appears benefits may also prompt recruitment and
tive approach that addresses the condi- to be a highly individualized and complex support for extremist groups.
tions and ideologies that may create an process, there is widespread agreement Conflicts in South Asia, the Sahel,
enabling environment for terrorism. While among policymakers, experts, and grass- and the Horn of Africa, for example, have
the terminology and the policy framework roots practitioners that prolonged conflict, demonstrated that violent extremism is
of CVE is relatively new, it builds on long- underdevelopment, weak governance, not only related to terrorism but can play
standing bodies of work to counter radi- and human rights infractions make for a large role in fuelling sectarian tensions,
calization and prevent violence and draws powerful drivers of violence and extrem- intra- and interstate violence, transna-
on a number of related areas of practice, ism. While these “push factors” are often tional insecurity and criminality, and

5
ISSUE 1, SPRING 2014

hindering socioeconomic development. and the threat scenario, and opportunities target audience, and articulated theory of
Consequently, CVE efforts include a mix to intervene, may well be found in such change, developing a set of benchmarks
of security and development approaches relationships. or indicators becomes more feasible. Most
and provide an important platform to CVE projects that have been evaluated in
build bridges across divergent areas of From Ideas to Action a thoughtful manner have taken this latter
policy and practice that focus on the CVE has manifested itself in a broad range of approach. Like development work, CVE is
prevention and mitigation of violence. initiatives that include building the capaci- a long-term strategy with a more uncer-
Thus, while CVE emerged from the ties of financial, criminal justice, and rule of tain outcome than kinetic measures but is
counterterrorism portfolio, in practice it is law institutions; developing media prod- an important instrument in the prevention
closer to efforts to address the structural ucts and messages to challenge extremist toolkit since the narratives and activities
causes of conflict, while serving as one narratives and counter their ideologies; that fuel recruitment and support for vio-
instrument in the conflict prevention and training police and frontline officials about lent extremism cannot be allowed to go
mitigation toolkit. CVE; and strengthening engagement with unchallenged.
The absence of a clear consensus on civil society groups working on violence Although progress has been made,
the drivers of violent extremism and the prevention and related development is- there remain a number of critical challenges
particularities which shape grievances and sues. A number of innovative activities have for CVE policymakers and practitioners.
reactions make it difficult to determine been undertaken to further CVE efforts, First, despite the proliferation of CVE
exactly which push or pull factors will mo- such as youth engagement and employ- activities, there remains a lack of clarity or
tivate individuals or groups to support vio- ment projects, educational programs, and shared understanding among different
lent extremist ideas and groups—or even the development of TV, radio, and other governments and experts regarding the
go that extra step and perpetrate a terror- media programming to showcase alterna- definition of the term and its implications
ist act. This discord raises the thorny ques- tive narratives to those propagated by for programming. For some actors, CVE
tion of the basis for CVE engagement and extremists. efforts constitute outreach by security
policies. Some international actors have sector actors to gain intelligence and infor-
had the resources and political support to “While CVE emerged mation; for others, CVE entails a broader
dedicate resources for needs assessments range of prevention efforts including
and the mapping of dynamics that can from the counterterror- initiatives by social workers, educators,
foster violent extremism. However, not all and development actors, which traditional
are able to invest adequately—either in ism portfolio, in practice security actors may not consider related to
terms of time or finances—to gain a deep counterterrorism. This ambiguity poses
understanding of local or regional dynam- it is closer to efforts to challenges in the determination of funding
ics. On the other hand, it may be unrealistic for projects, for cohesive messaging across
to expect any external actor to gain a deep address the structural different government entities, and for the
understanding of local dynamics when evaluation of CVE projects. Without agree-
the threat landscape is constantly fluid causes of conflict.” ment on a working premise, if not a defini-
and they are caught between domestic, tion of CVE, it is difficult to determine what
international, and other policy priorities. Do any of these work? Evaluating any projects are specifically focusing on CVE and
How then to develop a better starting preventive measure remains an enormous what projects address related issues but
point for CVE interventions? At the very challenge as it necessitates “measuring the have attendant benefits for CVE. Moreover,
least, by ensuring sufficient resources and negative” and attributing causality where this makes it difficult to evaluate programs
time—which is often in even less supply none can be fully determined. However, and better understand their impact, espe-
than money—to undertake field visits and that does not mean it cannot be done cially when the theories of change and the
research to understand not only local and at all. Where particular structural condi- objectives of the projects remain unclear.
national but also regional dynamics and, tions have been directly linked to violent Second, and not unrelated to the first,
where relevant, have the opportunity to extremism, projects addressing those con- is the challenge of the “CVE” label. Without
interact with important external actors ditions can be evaluated for their impact a shared understanding of the term “CVE”
either in the diaspora or neighbouring in mitigating the threat. Moreover, where it is difficult to know which programs
states. No state or community is an island, projects have a clearly defined objective, can accurately be labelled as such. The

6
ISSUE 1, SPRING 2014

political sensitivities around counterterror- bureaucracy and political sensitivities, ex- ly tailored to the contemporary threat.
ism programs have made it problematic for tremist groups like al-Qaeda have demon- Responding to terrorist acts without tak-
a number of grassroots groups to receive strated adaptability and resilience in craft- ing a more preventive and multidimen-
funding and support under a CVE rubric ing messages and communications that can sional approach will not prove sufficient
without compromising the relationship both radicalize and mobilize supporters and for an effective response to these threats,
with their constituencies. Moreover, there link local grievances and events to a global making CVE a critical component of coun-
remain concerns about the securitization of narrative of struggle. In contrast, it appears terterrorism strategies and a contribution
development programs and instrumental- government actors are left with the task of to broader efforts to prevent violence and
ization of local partners, as well as the safety countering a narrative that has been estab- promote human security.
of personnel associated with counterter- lished by extremists—of responding rather Post-9/11 counterterrorism responses
rorism efforts in the field. Such concerns than proactively shaping it. have at times created fissures between
have constrained engagement between states focusing on the threats generated by
security and development practitioners, “Responding to terrorist al-Qaeda and its affiliates and those states
though there are some indications of posi- concerned that their development priori-
tive change in this regard. Revisions to the acts without taking a more ties would be superseded by the counter-
United Kingdom’s “Prevent” program and terrorism agenda. The balance between
efforts to couch CVE in terms applicable to preventive and multi the need to address “structural causes” and
local contexts reflect an evolution from the “hard” security responses was struck in the
earlier approaches in which a broad spec- dimensional approach United Nations’ 2006 Global Strategy and
trum of activities were labelled as “CVE” and is reflected in the broad spectrum of CVE
generated some backlash from communi- will not prove sufficient.” initiatives. The CVE framework therefore
ties who believed they were being unduly offers a valuable opportunity to take a
stigmatized and securitized. Fifth, there remains a need for more more integrated approach to violence and
Third, scaling up CVE projects and effective balancing of top-down and conflict and can build on longstanding ex-
moving from a tactical to a strategic ap- bottom-up approaches. Local partners periences and lessons learned from related
proach remains a challenge. Evolving or are essential to determine the dynamics fields of practice.
unclear funding mechanisms for projects of violence and radicalization in a local Multilateral actors, such as the United
have not always been conducive to the or regional context and to determine Nations, Global Counterterrorism Forum,
kind of multiyear support required for CVE the environmental factors most relevant and European Union, have increasingly
projects that focus on addressing struc- in driving support for extremist groups. emphasized the importance of the multi-
tural prevention, such as educational or Moreover, local partners are often best dimensional preventive approach encap-
development activities focused on youth placed to shape contextually appropriate sulated in CVE policies and programs. The
or women, or capacity-building initia- CVE interventions that are more likely UN’s Counter-Terrorism Implementation
tives to strengthen key institutions. While to gain traction with critical audiences. Task Force and Counter-Terrorism Executive
counterterrorism efforts have tradition- However, this engagement needs to be Directorate are working on a number of
ally focused on responsive interventions complemented with top-down support initiatives that promote dialogue and
to proximate threats, CVE takes a longer- from governments to ensure the political understanding to counter the appeal of
term approach which is not always easy space and support for the implementation terrorism, as well as efforts to inhibit incite-
to fit into financial and political cycles. On of CVE projects. ment to terrorism. The GCTF’s CVE Working
the flip side, the government proclivity Group offers an important platform for in-
for funding large projects has sometimes Going Forward ternational action on this front, illustrated
sidelined smaller grassroots groups that As a number of conflict dynamics grow by the establishment of Hedayah, the
have sought support for more localized increasingly complex, violent extremism international centre of excellence on CVE
and smaller-scale CVE projects. is one of several ingredients contributing in Abu Dhabi, and the announcement of a
Fourth, governments and international to a lethal cocktail of insecurity, criminal- Global Fund for Community Engagement
organizations face constraints when trying ity, and conflict. In contrast to traditional and Resilience. The latter will offer a first
to keep up with the strategic communica- counterterrorism approaches, CVE offers time vehicle for public-private partner-
tions of extremist groups. Unhampered by the opportunity for a reaction more clear- ships on CVE and facilitate support to local

7
ISSUE 1, SPRING 2014

grassroots actors furthering CVE efforts in to continue engaging a broad range while the existing expertise and experi-
the field. of practitioners in the various fields in ences of several countries in addressing
The proliferation of these oppor- which core CVE activities are under- violence and extremism have contributed
tunities and activities, however, also taken—development, education, conflict to a global knowledge base of good prac-
underscores the need for collaboration, prevention, and media. Rather than rush tices and lessons learned, there remains a
cooperation, and information sharing need to ensure that responses are more
among relevant actors to reduce the scope “There remains a need closely tailored to the context in which
for duplication and avoid saturating com- they are implemented. Fitting these re-
munities and regions with programming to ensure that responses sponses requires translating macro-level
beyond the absorption capacity. Emphasis assessments of “push” and “pull” factors
on holistic approaches for CVE needs to are more closely tailored into assessments of local and regional driv-
be matched by “whole of government” ers of violence and extremism based on
approaches in countries as well as within to the context in which research and engagement. These might
these organizations. Over the past few include mapping exercises to determine
years the CVE policy framework has been they are implemented.” perceptions of violent extremism and
developed, refined, and revised. While in identify needs and credible interlocutors.
the early stages the framework was largely to relabel all these activities as “CVE,” it Such a baseline will provide an important
determined by security and intelligence is more opportune to mainstream CVE foundation upon which responses can be
actors, the emphasis on engaging local objectives—a preventive approach to developed that help prevent extremist
actors and communities presents an op- violent extremism—into these activities groups from preying on vulnerable com-
portunity for CVE to be situated within a to meet the overall objective of prevent- munities and recruiting youth into a vio-
truly multidimensional paradigm. ing violence and conflict and promoting lent path that hinders prospects for both
Going forward, CVE efforts will need sustainable development. To that end, individual and national development. n

CVE in Pakistan cont. While CVE is an attractive political many other explanations for how conflict
concept, most missions and their civil has emerged in the course of the country’s
counterterrorism. Counter radicalization society partners struggle to operationalize political development. Finally, in the local
and rule of law, especially strengthening it. “Extremism” is an awkward way to de- context, the term can be offensive and end
the police and justice systems, serve this scribe conflict in a country where it takes up exacerbating conflict between secular
objective. The British focus is to prevent the and religious communities.
next terrorist attack in the UK by preventing “There is little if any Ironically, while the ambiguity of the
people from becoming terrorists or sup- term may have led to some operational
porting terrorist organizations, specifically evidence of the impact challenges, its flexibility has also given
al-Qaeda and its affiliates. They are also not missions and offices space to develop pro-
shy in their concern with “violent Islamist of these types of gramming that is adaptive and responsive
ideology” and promotion of liberal values— to the context. But whether it is successful
democracy, human rights, equality—which interventions on shift- in achieving its objective of changing
they believe undermine that support. mindsets and preventing violence is very
Other actors, like USIP, work towards ing individual beliefs difficult, maybe impossible, to measure.
CVE objectives within their work on Most discussion about work in this space
conflict management. The Germans, who or societal norms.” focuses on outputs—work with religious
experienced violent extremism in the leaders, flashy media. There is little if any
form of Nazism, do support work around so many shapes: political, ethnic, sectarian, evidence of the impact of these types of
conflict mitigation but deliberately avoid separatist, and criminal. And using ideol- interventions on shifting individual beliefs
the term. ogy as a point of departure neglects the or societal norms. n

8
ISSUE 1, SPRING 2014

Countering Violent cont. and how they should be pursued. ing “high levels of social marginalization
Within the State Department, the and fragmentation; poorly governed or
however, U.S. officials came to recognize Bureau of Counterterrorism added a new ungoverned areas; government repression
the limits of kinetic tactics. Killing ter- office focusing on CVE. In line with this and human rights violations; endemic
rorists might prevent or deter but could trend, other governments and interna- corruption and elite impunity . . . cultural
not respond to the factors that cause tional institutions, including the UK (in threat perceptions . . . access to material
terrorism in the first place and could be its CONTEST counterterrorism strategy resources, social status and respect from
counterproductive by provoking violent released in July 2011), the UN, the GCC, peers; a sense of belonging, adventure,
reactions to U.S. counterterrorism efforts. and the EU, also began to develop their and self-esteem or personal empowerment
In response, and without diminishing the own CVE programs. In December 2012, that individuals and groups that have long
role of military tools in CT, the U.S. gov- an international coalition of governments viewed themselves as victimized and mar-
ernment expanded its focus to include established the Hedayah International ginalized can derive from the feeling that
strategies for addressing the root causes Center of Excellence for Countering they are making history; and the prospect
of terrorism. This shift reflected growing Violent Extremism in the United Arab of achieving glory or fame.”
appreciation among American officials Emirates. Where donors lead, contractors
that effective counterterrorism required and implementing organizations are not Causal Confusion versus
addressing the underlying conditions far behind: Within the span of only a few Causal Complexity
that promote violent extremism. years, a large number of USAID contractors For practitioners struggling to unpack
The field of CVE has diverse origins and moved to establish their capacity to man- the causal pathways that lead individuals
links to earlier efforts to address violent age government-funded CVE programs. into extreme violence, create or rein-
forms of political mobilization. Yet its Their counterparts in the UK and else- force pathways out of it, and remove
expansion as a field in the 2000s can be or weaken the factors that produce it in
linked to the response of U.S. agencies “CVE as currently con- the first place, this list poses a daunting
to the growing priority they attached to challenge. Which factors matter most?
the threat of violent extremism and the figured within the U.S. If they all matter, which should we pri-
conditions that support it. In effect, CVE as oritize? How do we know whether our
currently configured within the U.S. policy policy system can be assumptions about the causes of violent
system can be seen as a bureaucratic re- extremism are valid? What if causality
sponse to shifts in the policy priorities of seen as a bureaucratic is too complex to imagine that we can
the U.S. as its war on terror matured. counter violent extremism through
Beginning in the late 2000s, the State response to shifts in piecemeal interventions? Do we have
Department and the U.S. Agency for confidence that the tools and interven-
International Development (USAID) un- the policy priorities tions available will produce meaningful
dertook extensive efforts to define CVE, to results, especially given the uncertainty
establish what constituted best practice in of the U.S. as its war about whether the causal claims that
the field of CVE, and to set out operational USAID advances are right? These are the
principles and guidelines to inform the de- on terror matured.” kinds of questions about what works and
velopment of CVE programming. In keeping what does not with which practitioners in
with USAID’s longstanding focus on issues of where followed suit. more established fields have wrestled for
development and poverty alleviation, CVE As part of their efforts to define and give decades. In many cases, years of testing
was initially seen as tightly linked to—and coherence to CVE as a field of practice, U.S. and field experiments have yielded only
an offshoot of—broader strategies aimed at officials, through USAID, sought to identify modest results. Yet for advocates of CVE,
enhancing economic development. It soon the conditions that were believed to pro- there is little sense that such uncertainty
expanded beyond this, however, becoming mote violent extremism and what might be about causal relationships has informed
a catch-all category that was embraced by done to address them. In keeping with the its development as a field of practice.
agencies and bureaus across the U.S. policy diffuse, unfocused, yet expansive identity As a result, key elements of the effort
system—notwithstanding tensions across of the field, these conditions encompassed to define “best practice” in the field of CVE
agencies in what CVE priorities should be an unwieldy assortment of factors, includ- have had problematic effects. Five such

9
ISSUE 1, SPRING 2014

elements deserve further attention here. reform, governance and democratization, opposed to success in reducing poverty,
(1) The U.S. and other government mediation and negotiation, gender and improving literacy, reforming a security sec-
sponsors of CVE programs acknowledge peacebuilding, religion and conflict, con- tor, empowering women, improving gover-
that the motivations that lead individu- flict prevention, and development. This nance, creating jobs, mitigating sectarian
als to embrace violent extremism may blurring of boundaries reinforces percep- violence, promoting democracy, etc.—are
be too varied and too idiosyncratic to be tions of CVE as a catch-all category lacking poorly defined. As noted by McCants and
generalizable and may not respond to well-defined conceptual, organizational, Watts, “[A]lthough U.S. government docu-
external interventions unless they are very and empirical foundations as a field of ments frequently employ the term CVE,
narrowly targeted. Yet diffuse and vague practice. there is not a shared view of what CVE is or
guidance concerning the design of CVE (5) Finally, despite the rise of CVE as how it should be done. Definitions range
programs encourages broad-spectrum an attempt to temper the kinetic and coer- from stopping people from embracing ex-
interventions that often lack the specificity cive aspects of counterterrorism policy, it treme beliefs that might lead to terrorism to
to clearly assess their effects. is widely seen as furthering the militariza- reducing active support for terrorist groups.
(2) An exceptionally large and diverse tion of the many fields that are brought The lack of a clear definition for CVE not only
number of variables are understood to under the CVE umbrella and which, for leads to conflicting and counterproductive
contribute to the decision by individuals to reasons both political and financial, be- programs but also makes it hard to evaluate
embrace violent extremism, including so- come redefined in terms of their utility in the CVE agenda as a whole and determine
cial, political, economic, psychological, and advancing a CVE agenda. whether it is worthwhile to continue.”
cultural factors—a list that is so encompass-
ing that virtually any set of conditions could “Advocates of CVE Redefining CVE?
be viewed as drivers of violent extremism. Is it worthwhile to continue? Despite the
As funding for work defined as CVE has should develop a reservations and concerns associated with
expanded, this lack of focus has produced the emergence of CVE as a field, it should
mission creep, the relabeling of existing sharper, narrower, and not be summarily set aside as a framework
programs in terms of CVE, and other tactics for programming. Its presence has the po-
that undermine efforts to determine what more focused defini- tential to focus the attention of practitioners
is distinctive about the work of countering on the root causes of violent extremism as
extremism and to design and test models tion of the field.” a problem distinct from outcomes defined
and tools that explicitly target specific driv- in terms of development or governance.
ers of extremism. Collectively, these factors have had a It creates incentives for practitioners to
(3) The frameworks developed by profound and problematic effect on the integrate CVE objectives into programs
the U.S. government rest on very poorly trajectory and growth of CVE as a field of that may previously have viewed mitigat-
anchored assumptions about the causal practice. It has become an amorphous cat- ing extremism as ancillary to success in, say,
relationship between various factors and egory, lacking theoretical or applied focus; enhancing political participation, reducing
the decision by an individual to become a encompasses a confusing and occasion- corruption, or improving service provision.
violent extremist. Assumptions about links ally contradictory array of approaches; has These benefits are not trivial. Yet they are
between poverty and violent extremism become a label of convenience for inter- insufficient to demonstrate the value-added
have been questioned by economists. ventions that would otherwise be defined of CVE as a discrete field, distinct in some
Political scientists have challenged whether in terms of better established categories, meaningful way from its component parts.
socially marginal populations are more such as security sector reform, governance, To realize its potential as a field of practice,
likely to embrace terrorist ideologies than gender and peacebuilding, rule of law, and CVE will need to do more than increase the
are well-educated and relatively well-off conflict prevention, among others; has amount of money spent on interventions
segments of society. Yet uncertainty about developed practices that rest on poorly un- that have not proven their effectiveness.
the causes of violent extremism has not derstood and poorly documented assump- Most important, advocates of CVE should
influenced the pace or scale of U.S. govern- tions about what causes violent extremism, develop a sharper, narrower, and more
ment funding for CVE programs. virtually ensuring that CVE programming focused definition of the field. This effort
(4) The boundaries between CVE and will be unsuccessful; and has such diffuse should be accompanied by a stronger com-
other more established fields are quite po- and wide-ranging scope that efforts to es- mitment—including through the allocation
rous, including rule of law, security sector tablish what constitutes success in CVE—as of resources—to defining and testing the

10
ISSUE 1, SPRING 2014

causal assumptions underlying CVE, efforts this direction will require that donor organi-
that would improve the design, implemen- zations commit themselves to support “dual-
tation, and evaluation of CVE program- purpose” programming: approaches that
ming. Identifying CVE as a classic case of a exploit interventions as opportunities to test
“wicked problem,” unpacking its component causal assumptions, explore the efficacy of
elements, and establishing which are most tools, clarify and sharpen the boundaries of
tractable to specific kinds of interventions are the field, and refine strategies and practices.
important steps in this direction. In the absence of such efforts, the field of
To implement these recommendations CVE is unlikely to answer the central ques-
will require that CVE programming become tion of whether it deserves to be understood
more self-reflexive and self-critical. Moves in as a distinct field of practice. n

United States
Institute of Peace
2301 Constitution Ave. NW
Washington, DC 20037
202.457.1700
www.usip.org

USIP provides the analysis, training and


tools that prevent and end conflicts,
promotes stability and professionalizes
the field of peacebuilding.

For media inquiries, contact the office


of Public Affairs and Communications,
202.429.4725

© USIP 2014 • All rights reserved.

You might also like