MENU

HOME

DAILY BRIEF

LATEST POSTS

J.M. BERGER

ISIS: STATE OF TERROR

JIHAD JOE

LINKS

Blogs of War

Hizballah Cavalcade

Internet Haganah

Jihadology

Jihadica

Kremlin Trolls

Making Sense of Jihad

Selected Wisdom

Views from the Occident

TAGS

American Terrorists

Anwar Awlaki

Al Qaeda

AQAP

American Al Qaeda Members

Inspire Magazine

Revolution Muslim

OKBOMB


News, documents and analysis on violent extremism


Thursday, May 26, 2016
 

New Paper: Making CVE Work Through a Focused Approach

My latest paper, Making CVE Work: A Focused Approach Based on Process Disruption, has been published by the International Centre for Counter-Terrorism, The Hague. As long-time readers will know, I have long been a critic of the broad spectrum of CVE programs, based on a number of different objections. This paper is the summation of some years spent in the CVE trenches, working on programs and sitting through an endless series of planning meetings that I have come to think of as "CVE Groundhog Day." I have also done something here that I have not done in my previous writings on this subject -- offer a specific proposal for how I believe CVE can be accomplished most effectively.

The paper addresses:

  • A survey of the many flawed but seemingly unkillable assumptions about what constitutes CVE efforts, based in large part on my CVE Groundhog Day experiences. 
  • Case studies in how and why people actually disengage from violent armed movements, as opposed to theories based on the aforementioned assumptions. 
  • Based on those case studies, an updated version of my "Five Ds of CVE," in which I advocate for using negative inputs to promote disengagement from violent extremism and VE recruiting networks, as opposed to feel-good efforts to transform people vulnerable to radicalization into upstanding citizens of a pluralistic global society.  
  • A radicalization model that is practical enough to use for CVE purposes, but not wedded to any specific ideology. 
  • A proposal for how to integrate all of the above into a specific program that includes something many CVE programs lack -- a credible evaluation of the program's results.  

I still believe that CVE is a concept with some merit, if it can be stripped of its overweening ambition and factually flawed premises (prominently on display this week, unfortunately). This paper represents my best effort to contribute to a more effective model that can be evaluated on its actual merits.

Buy the new book ISIS: The State of Terror by Jessica Stern and J.M. Berger.

Buy J.M. Berger's seminal book on American jihadists, Jihad Joe: Americans Who Go to War in the Name of Islam


Views expressed on INTELWIRE are those of the author alone.


     



     

Tweets referencing this post:

loading..



BOOKS

"...smart, granular analysis..."

ISIS: The State of Terror
"Jessica Stern and J.M. Berger's new book, "ISIS," should be required reading for every politician and policymaker... Their smart, granular analysis is a bracing antidote to both facile dismissals and wild exaggerations... a nuanced and readable account of the ideological and organizational origins of the group." -- Washington Post

More on ISIS: The State of Terror

"...a timely warning..."

Jihad Joe: Americans Who Go to War in the Name of Islam:
"At a time when some politicians and pundits blur the line between Islam and terrorism, Berger, who knows this subject far better than the demagogues, sharply cautions against vilifying Muslim Americans. ... It is a timely warning from an expert who has not lost his perspective." -- New York Times

More on Jihad Joe

ABOUT

INTELWIRE is a web site edited by J.M. Berger. a researcher, analyst and consultant covering extremism, with a special focus on extremist activities in the U.S. and extremist use of social media. He is a non-resident fellow with the Brookings Institution, Project on U.S. Relations with the Islamic World, and author of the critically acclaimed Jihad Joe: Americans Who Go to War in the Name of Islam, the only definitive history of the U.S. jihadist movement, and co-author of ISIS: The State of Terror with Jessica Stern.

RECENT

Newest posts!

INTELWIRE Weekly Brief, 2/15/16

INTELWIRE Weekly Brief, 2/8/16

INTELWIRE Weekly Brief, 2/1/15

INTELWIRE Weekly Brief, 1/25/16

INTELWIRE Weekly Brief, 1/18/16: New ISIS Research...

INTELWIRE Weekly Brief, 1/11/2016, Misinfo, Malheu...

INTELWIRE Weekly Brief, 12/21/15 - 1/4/15

INTELWIRE Weekly Brief, 12/14/15. ISIS in Yemen, M...

INTELWIRE Weekly Brief, 12/7/15. ISIS in America, ...

INTELWIRE Weekly Brief, 11/30/2015: Defining the P...

EXCLUSIVES


New York Pipe Bomb Suspect Linked to Revolution Muslim

The Utility of Lone Wolves

Interview with Online Jihadist Abu Suleiman Al Nasser

A Way Forward for CVE: The Five Ds

How Terrorists Use The Internet: Just Like You

PATCON: The FBI's Secret War on the Militia Movement

Interview About Jihad With Controversial Cleric Bilal Philips

Forgeries on the Jihadist Forums

U.S. Gave Millions To Charity Linked To Al Qaeda, Anwar Awlaki

State Department Secretly Met With Followers of Blind Sheikh

State Department Put 'Political Pressure' On FBI To Deport Brother-in-Law Of Osama Bin Laden In 1995

FBI Records Reveal Details Of Nixon-Era Racial Profiling Program Targeting Arabs

Gaza Flotilla Official Was Foreign Fighter in Bosnia War

U.S. Had 'High Confidence' Of UBL Attack In June 2001

Behind the Handshake: The Rumsfeld-Saddam Meeting