Talking to the Enemy
Deradicalization and Disengagement of Terrorists- Editors:
- Series:
- CPG Series of Comparative Constitutional Law, Politics and Governance, Volume 4
- Publisher:
- 2017
Summary
As a collected volume, ‘Talking to the Enemy’ focuses on various aspects of the communicative dimension of counter-terrorism and its marginal conditions. In its first part, the book features eight articles providing a variety of perspectives on Western as well as Asian efforts in countering potentially violent extremism. Besides more theoretical approaches, they offer practical insights from the coal face of counter-terrorism, especially in the field of disengagement, deradicalization and rehabilitation. The second part is made up of a longer essay breaking down the effects of the fundamental post-9/11 trends in counter-terrorism on single strategies of how to engage with the adversary in form of de-radicalization, counter-terrorism and counter-insurgency. A third part rounds off the volume with additional material including an interview on the Islamic State and its impact on geopolitics with a former chief intelligence advisor to the Indian government. The book addresses those generally interested in countering radicalization, terrorism, counter-insurgency, conflict and IR/security studies as well as particular communicative techniques and the politics of counter-terrorism from different regional angles.
Search publication
Bibliographic data
- Copyright year
- 2017
- ISBN-Print
- 978-3-8487-0433-0
- ISBN-Online
- 978-3-8452-4739-7
- Publisher
- Nomos, Baden-Baden
- Series
- CPG Series of Comparative Constitutional Law, Politics and Governance
- Volume
- 4
- Language
- English
- Pages
- 374
- Product type
- Edited Book
Table of contents
- Titelei/Inhaltsverzeichnis No access Pages 1 - 8
- Henning Glaser
- A. Introduction No access Henning Glaser
- B. (De-)radicalization, Disengagement and Rehabilitation: Processes, Programs and Marginal Conditions No access Henning Glaser
- Bibliography No access Henning Glaser
- Arabinda Acharya
- A. Introduction No access Arabinda Acharya
- B. Knowing the Enemy No access Arabinda Acharya
- C. The Right War? No access Arabinda Acharya
- D. The Just War? No access Arabinda Acharya
- E. Preemption No access Arabinda Acharya
- F. Reciprocity No access Arabinda Acharya
- G. Limits of Coercive Power No access Arabinda Acharya
- H. Countering Radical Ideology No access Arabinda Acharya
- I. De-radicalization/Disengagement No access Arabinda Acharya
- J. Rehabilitation No access Arabinda Acharya
- K. Education Reform No access Arabinda Acharya
- L. Communication Management No access Arabinda Acharya
- M. A Platform for the Moderate Voice No access Arabinda Acharya
- Bibliography No access Arabinda Acharya
- Rohan Gunaratna
- A. Introduction No access Rohan Gunaratna
- B. The Context No access Rohan Gunaratna
- Rohan Gunaratna
- I. Global Programs No access Rohan Gunaratna
- II. Challenges and Opportunities No access Rohan Gunaratna
- Rohan Gunaratna
- I. The Origins of Rehabilitation No access Rohan Gunaratna
- II. The Contemporary Wave of Rehabilitation No access Rohan Gunaratna
- E. Conclusion No access Rohan Gunaratna
- Bibliography No access Rohan Gunaratna
- Rommel C. Banlaoi
- A. Introduction No access Rommel C. Banlaoi
- B. The Contested Concept of De-radicalization No access Rommel C. Banlaoi
- C. Exemplary Practices of De-radicalization in Southeast Asia as a Means for Counter-Terrorism No access Rommel C. Banlaoi
- D. De-radicalization Efforts in the Philippines: The Case of Muslim Detainees Accused of Various Crimes Associated Witch Terrorism No access Rommel C. Banlaoi
- E. Challenges in Implementing De-radicalization Programs as Counter-Terrorism Measures No access Rommel C. Banlaoi
- Rommel C. Banlaoi
- I. Visitation No access Rommel C. Banlaoi
- II. Counseling No access Rommel C. Banlaoi
- III. Legal Assistance No access Rommel C. Banlaoi
- IV. Social and Economic Assistance No access Rommel C. Banlaoi
- V. After Care No access Rommel C. Banlaoi
- G. Conclusion No access Rommel C. Banlaoi
- Bibliography No access Rommel C. Banlaoi
- Michael Fischer, Eva-Maria Reh
- A. Introduction No access Michael Fischer, Eva-Maria Reh
- B. Terrorist Action as Rational Action No access Michael Fischer, Eva-Maria Reh
- C. Terrorist Action as Radical Action No access Michael Fischer, Eva-Maria Reh
- D. The Normalcy of the Extreme No access Michael Fischer, Eva-Maria Reh
- Michael Fischer, Eva-Maria Reh
- I. De-Radicalization Programs: Possible Effects on Extremism, Radicalism, and Terrorist Motives No access Michael Fischer, Eva-Maria Reh
- II. De-radicalization and Distributions of Extremism No access Michael Fischer, Eva-Maria Reh
- F. Conclusion No access Michael Fischer, Eva-Maria Reh
- Bibliography No access Michael Fischer, Eva-Maria Reh
- Thomas Koruth Samuel
- A. Introduction No access Thomas Koruth Samuel
- Thomas Koruth Samuel
- I. The Danger Signs No access Thomas Koruth Samuel
- II. The Root of the Problem No access Thomas Koruth Samuel
- Thomas Koruth Samuel
- I. The Premise of the Terrorist No access Thomas Koruth Samuel
- II. The Narrative of the Terrorist and its Inconsistencies No access Thomas Koruth Samuel
- Thomas Koruth Samuel
- 1. The Audience No access Thomas Koruth Samuel
- Thomas Koruth Samuel
- a) Knowing the Audience No access Thomas Koruth Samuel
- b) Knowing the Subject No access Thomas Koruth Samuel
- Thomas Koruth Samuel
- 1. Start Listening No access Thomas Koruth Samuel
- 2. Understand and Counter the Message of the Enemy No access Thomas Koruth Samuel
- 3. Learning from Models of Youth Radicalization to Develop Modules of Counter-Radicalization No access Thomas Koruth Samuel
- 4. Developing Tools to Measure Effectiveness of the Counter-Narrative Mechanisms No access Thomas Koruth Samuel
- Thomas Koruth Samuel
- I. Hear Things you do not like to Hear No access Thomas Koruth Samuel
- II. Make Mistakes Fast and Rectifications Faster No access Thomas Koruth Samuel
- III. Be Humble, Seek Help and Form Alliances No access Thomas Koruth Samuel
- IV. Focus on What Can Be Done No access Thomas Koruth Samuel
- V. Building Programs Around an Institution or Alliance and not as an Individual No access Thomas Koruth Samuel
- VI. Treating the Youth as Part of the Solution and not Part of the Problem No access Thomas Koruth Samuel
- E. Conclusion No access Thomas Koruth Samuel
- Bibliography No access Thomas Koruth Samuel
- Oliver Gerson
- Oliver Gerson
- I. Starting with “Roots” No access Oliver Gerson
- II. Thesis: Radicalization of Human Beings Done by Human Beings No access Oliver Gerson
- B. Defining Phenomena and Measures No access Oliver Gerson
- Oliver Gerson
- I. The National Democratic Party of Germany: Old Wine in new Bottles No access Oliver Gerson
- II. The Religious Fanaticism: Islamism, Salafism, Wahhabism No access Oliver Gerson
- III. Effects of Radicalization No access Oliver Gerson
- Oliver Gerson
- I. The German drop-out Program EXIT No access Oliver Gerson
- II. HATIF No access Oliver Gerson
- III. Radicalization Awareness Network (RAN) No access Oliver Gerson
- IV. European Network of Deradicalization (ENoD) No access Oliver Gerson
- Oliver Gerson
- I. Vengeance and Group Pressure No access Oliver Gerson
- II. Embedding of Racist or Fanatic Thoughts (stage “early”) No access Oliver Gerson
- III. Interim Findings: Opt-out Programs are not Enough No access Oliver Gerson
- Oliver Gerson
- I. Banning Extremist Groups and Associations (stage “repressive”) No access Oliver Gerson
- II. Legal Sanctions against Extremists (stage “repressive”) No access Oliver Gerson
- III. Counter-Terrorism Legislation in Germany No access Oliver Gerson
- IV. Joint Terrorism Defense Centre of Germany (GTAZ) No access Oliver Gerson
- V. Counter-Terrorism Legislation in Europe No access Oliver Gerson
- VI. Sense of Punishment No access Oliver Gerson
- VII. Special Law for the Enemies of our Values? No access Oliver Gerson
- Oliver Gerson
- I. Knowing the “Enemy” (1st step) No access Oliver Gerson
- II. Finding the “Enemy” (2nd step) No access Oliver Gerson
- III. Fighting the “Enemy” No access Oliver Gerson
- G. Conclusion No access Oliver Gerson
- Bibliography No access Oliver Gerson
- Eelco Kessels, Orla Hennessy
- A. Introduction No access Eelco Kessels, Orla Hennessy
- B. Points of Intersection and Divergence No access Eelco Kessels, Orla Hennessy
- C. Types of Linkages No access Eelco Kessels, Orla Hennessy
- D. Incentives and Disincentives No access Eelco Kessels, Orla Hennessy
- E. Drivers and Enablers No access Eelco Kessels, Orla Hennessy
- Eelco Kessels, Orla Hennessy
- I. Cutting off the Money Supply No access Eelco Kessels, Orla Hennessy
- II. Improving Governance and Reducing Areas of Ungoverned Space No access Eelco Kessels, Orla Hennessy
- G. Concluding Remarks No access Eelco Kessels, Orla Hennessy
- Bibliography No access Eelco Kessels, Orla Hennessy
- Henning Glaser
- Henning Glaser
- I. A new Terrorism? No access Henning Glaser
- II. A new Counter-Terrorism? No access Henning Glaser
- Henning Glaser
- I. Communication and Counter-Terrorism No access Henning Glaser
- II. Core Values and Counter-Terrorism No access Henning Glaser
- III. Deriving a Dichotomous Model View on Counter-Terrorism No access Henning Glaser
- Henning Glaser
- I. Filling the Gap: The Global War on Terror and the Cold War No access Henning Glaser
- II. Paradigm Shift No access Henning Glaser
- Henning Glaser
- 1. Foundation No access Henning Glaser
- 2. Continuation No access Henning Glaser
- D. Conclusion and Outlook: Counterterrorism and Communication in Times of the GWOT No access Henning Glaser
- Bibliography No access Henning Glaser
- Interview with Major General Ashok Hukku (ret.) on the Islamic State No access Pages 355 - 364 Ashok Hukku
- A. S. A. Safras
- A. Sri Lankan Context No access A. S. A. Safras
- B. Rehabilitation of Ex-LTTE Combatants No access A. S. A. Safras
- C. Engagement of Individuals with Extremist Ideology No access A. S. A. Safras
- D. Conclusion No access A. S. A. Safras
- List of Contributors No access Pages 371 - 372
- Index No access Pages 373 - 374





