, to see if you have full access to this publication.
Edited Book No access

Talking to the Enemy

Deradicalization and Disengagement of Terrorists
Editors:
Publisher:
 2017

Summary

As a collected volume, ‘Talking to the Enemy’ focuses on various aspects of the communicative dimension of counter-terrorism and its marginal conditions. In its first part, the book features eight articles providing a variety of perspectives on Western as well as Asian efforts in countering potentially violent extremism. Besides more theoretical approaches, they offer practical insights from the coal face of counter-terrorism, especially in the field of disengagement, deradicalization and rehabilitation. The second part is made up of a longer essay breaking down the effects of the fundamental post-9/11 trends in counter-terrorism on single strategies of how to engage with the adversary in form of de-radicalization, counter-terrorism and counter-insurgency. A third part rounds off the volume with additional material including an interview on the Islamic State and its impact on geopolitics with a former chief intelligence advisor to the Indian government. The book addresses those generally interested in countering radicalization, terrorism, counter-insurgency, conflict and IR/security studies as well as particular communicative techniques and the politics of counter-terrorism from different regional angles.



Bibliographic data

Copyright year
2017
ISBN-Print
978-3-8487-0433-0
ISBN-Online
978-3-8452-4739-7
Publisher
Nomos, Baden-Baden
Series
CPG Series of Comparative Constitutional Law, Politics and Governance
Volume
4
Language
English
Pages
374
Product type
Edited Book

Table of contents

ChapterPages
  1. Titelei/Inhaltsverzeichnis No access Pages 1 - 8
    1. Henning Glaser
      1. A. Introduction No access Henning Glaser
      2. B. (De-)radicalization, Disengagement and Rehabilitation: Processes, Programs and Marginal Conditions No access Henning Glaser
      3. Bibliography No access Henning Glaser
    2. Arabinda Acharya
      1. A. Introduction No access Arabinda Acharya
      2. B. Knowing the Enemy No access Arabinda Acharya
      3. C. The Right War? No access Arabinda Acharya
      4. D. The Just War? No access Arabinda Acharya
      5. E. Preemption No access Arabinda Acharya
      6. F. Reciprocity No access Arabinda Acharya
      7. G. Limits of Coercive Power No access Arabinda Acharya
      8. H. Countering Radical Ideology No access Arabinda Acharya
      9. I. De-radicalization/Disengagement No access Arabinda Acharya
      10. J. Rehabilitation No access Arabinda Acharya
      11. K. Education Reform No access Arabinda Acharya
      12. L. Communication Management No access Arabinda Acharya
      13. M. A Platform for the Moderate Voice No access Arabinda Acharya
      14. Bibliography No access Arabinda Acharya
    3. Rohan Gunaratna
      1. A. Introduction No access Rohan Gunaratna
      2. B. The Context No access Rohan Gunaratna
      3. Rohan Gunaratna
        1. I. Global Programs No access Rohan Gunaratna
        2. II. Challenges and Opportunities No access Rohan Gunaratna
      4. Rohan Gunaratna
        1. I. The Origins of Rehabilitation No access Rohan Gunaratna
        2. II. The Contemporary Wave of Rehabilitation No access Rohan Gunaratna
      5. E. Conclusion No access Rohan Gunaratna
      6. Bibliography No access Rohan Gunaratna
    4. Rommel C. Banlaoi
      1. A. Introduction No access Rommel C. Banlaoi
      2. B. The Contested Concept of De-radicalization No access Rommel C. Banlaoi
      3. C. Exemplary Practices of De-radicalization in Southeast Asia as a Means for Counter-Terrorism No access Rommel C. Banlaoi
      4. D. De-radicalization Efforts in the Philippines: The Case of Muslim Detainees Accused of Various Crimes Associated Witch Terrorism No access Rommel C. Banlaoi
      5. E. Challenges in Implementing De-radicalization Programs as Counter-Terrorism Measures No access Rommel C. Banlaoi
      6. Rommel C. Banlaoi
        1. I. Visitation No access Rommel C. Banlaoi
        2. II. Counseling No access Rommel C. Banlaoi
        3. III. Legal Assistance No access Rommel C. Banlaoi
        4. IV. Social and Economic Assistance No access Rommel C. Banlaoi
        5. V. After Care No access Rommel C. Banlaoi
      7. G. Conclusion No access Rommel C. Banlaoi
      8. Bibliography No access Rommel C. Banlaoi
    5. Michael Fischer, Eva-Maria Reh
      1. A. Introduction No access Michael Fischer, Eva-Maria Reh
      2. B. Terrorist Action as Rational Action No access Michael Fischer, Eva-Maria Reh
      3. C. Terrorist Action as Radical Action No access Michael Fischer, Eva-Maria Reh
      4. D. The Normalcy of the Extreme No access Michael Fischer, Eva-Maria Reh
      5. Michael Fischer, Eva-Maria Reh
        1. I. De-Radicalization Programs: Possible Effects on Extremism, Radicalism, and Terrorist Motives No access Michael Fischer, Eva-Maria Reh
        2. II. De-radicalization and Distributions of Extremism No access Michael Fischer, Eva-Maria Reh
      6. F. Conclusion No access Michael Fischer, Eva-Maria Reh
      7. Bibliography No access Michael Fischer, Eva-Maria Reh
    6. Thomas Koruth Samuel
      1. A. Introduction No access Thomas Koruth Samuel
      2. Thomas Koruth Samuel
        1. I. The Danger Signs No access Thomas Koruth Samuel
        2. II. The Root of the Problem No access Thomas Koruth Samuel
      3. Thomas Koruth Samuel
        1. I. The Premise of the Terrorist No access Thomas Koruth Samuel
        2. II. The Narrative of the Terrorist and its Inconsistencies No access Thomas Koruth Samuel
        3. Thomas Koruth Samuel
          1. 1. The Audience No access Thomas Koruth Samuel
          2. Thomas Koruth Samuel
            1. a) Knowing the Audience No access Thomas Koruth Samuel
            2. b) Knowing the Subject No access Thomas Koruth Samuel
        4. Thomas Koruth Samuel
          1. 1. Start Listening No access Thomas Koruth Samuel
          2. 2. Understand and Counter the Message of the Enemy No access Thomas Koruth Samuel
          3. 3. Learning from Models of Youth Radicalization to Develop Modules of Counter-Radicalization No access Thomas Koruth Samuel
          4. 4. Developing Tools to Measure Effectiveness of the Counter-Narrative Mechanisms No access Thomas Koruth Samuel
      4. Thomas Koruth Samuel
        1. I. Hear Things you do not like to Hear No access Thomas Koruth Samuel
        2. II. Make Mistakes Fast and Rectifications Faster No access Thomas Koruth Samuel
        3. III. Be Humble, Seek Help and Form Alliances No access Thomas Koruth Samuel
        4. IV. Focus on What Can Be Done No access Thomas Koruth Samuel
        5. V. Building Programs Around an Institution or Alliance and not as an Individual No access Thomas Koruth Samuel
        6. VI. Treating the Youth as Part of the Solution and not Part of the Problem No access Thomas Koruth Samuel
      5. E. Conclusion No access Thomas Koruth Samuel
      6. Bibliography No access Thomas Koruth Samuel
    7. Oliver Gerson
      1. Oliver Gerson
        1. I. Starting with “Roots” No access Oliver Gerson
        2. II. Thesis: Radicalization of Human Beings Done by Human Beings No access Oliver Gerson
      2. B. Defining Phenomena and Measures No access Oliver Gerson
      3. Oliver Gerson
        1. I. The National Democratic Party of Germany: Old Wine in new Bottles No access Oliver Gerson
        2. II. The Religious Fanaticism: Islamism, Salafism, Wahhabism No access Oliver Gerson
        3. III. Effects of Radicalization No access Oliver Gerson
      4. Oliver Gerson
        1. I. The German drop-out Program EXIT No access Oliver Gerson
        2. II. HATIF No access Oliver Gerson
        3. III. Radicalization Awareness Network (RAN) No access Oliver Gerson
        4. IV. European Network of Deradicalization (ENoD) No access Oliver Gerson
      5. Oliver Gerson
        1. I. Vengeance and Group Pressure No access Oliver Gerson
        2. II. Embedding of Racist or Fanatic Thoughts (stage “early”) No access Oliver Gerson
        3. III. Interim Findings: Opt-out Programs are not Enough No access Oliver Gerson
      6. Oliver Gerson
        1. I. Banning Extremist Groups and Associations (stage “repressive”) No access Oliver Gerson
        2. II. Legal Sanctions against Extremists (stage “repressive”) No access Oliver Gerson
        3. III. Counter-Terrorism Legislation in Germany No access Oliver Gerson
        4. IV. Joint Terrorism Defense Centre of Germany (GTAZ) No access Oliver Gerson
        5. V. Counter-Terrorism Legislation in Europe No access Oliver Gerson
        6. VI. Sense of Punishment No access Oliver Gerson
        7. VII. Special Law for the Enemies of our Values? No access Oliver Gerson
      7. Oliver Gerson
        1. I. Knowing the “Enemy” (1st step) No access Oliver Gerson
        2. II. Finding the “Enemy” (2nd step) No access Oliver Gerson
        3. III. Fighting the “Enemy” No access Oliver Gerson
      8. G. Conclusion No access Oliver Gerson
      9. Bibliography No access Oliver Gerson
    8. Eelco Kessels, Orla Hennessy
      1. A. Introduction No access Eelco Kessels, Orla Hennessy
      2. B. Points of Intersection and Divergence No access Eelco Kessels, Orla Hennessy
      3. C. Types of Linkages No access Eelco Kessels, Orla Hennessy
      4. D. Incentives and Disincentives No access Eelco Kessels, Orla Hennessy
      5. E. Drivers and Enablers No access Eelco Kessels, Orla Hennessy
      6. Eelco Kessels, Orla Hennessy
        1. I. Cutting off the Money Supply No access Eelco Kessels, Orla Hennessy
        2. II. Improving Governance and Reducing Areas of Ungoverned Space No access Eelco Kessels, Orla Hennessy
      7. G. Concluding Remarks No access Eelco Kessels, Orla Hennessy
      8. Bibliography No access Eelco Kessels, Orla Hennessy
    1. Henning Glaser
      1. Henning Glaser
        1. I. A new Terrorism? No access Henning Glaser
        2. II. A new Counter-Terrorism? No access Henning Glaser
      2. Henning Glaser
        1. I. Communication and Counter-Terrorism No access Henning Glaser
        2. II. Core Values and Counter-Terrorism No access Henning Glaser
        3. III. Deriving a Dichotomous Model View on Counter-Terrorism No access Henning Glaser
      3. Henning Glaser
        1. I. Filling the Gap: The Global War on Terror and the Cold War No access Henning Glaser
        2. II. Paradigm Shift No access Henning Glaser
        3. Henning Glaser
          1. 1. Foundation No access Henning Glaser
          2. 2. Continuation No access Henning Glaser
      4. D. Conclusion and Outlook: Counterterrorism and Communication in Times of the GWOT No access Henning Glaser
      5. Bibliography No access Henning Glaser
    1. Interview with Major General Ashok Hukku (ret.) on the Islamic State No access Pages 355 - 364 Ashok Hukku
    2. A. S. A. Safras
      1. A. Sri Lankan Context No access A. S. A. Safras
      2. B. Rehabilitation of Ex-LTTE Combatants No access A. S. A. Safras
      3. C. Engagement of Individuals with Extremist Ideology No access A. S. A. Safras
      4. D. Conclusion No access A. S. A. Safras
  2. List of Contributors No access Pages 371 - 372
  3. Index No access Pages 373 - 374

Similar publications

from the topics "European Law & International Law & Comparative Law"
Cover of book: Der Volkseinwand
Book Titles No access
Florian Feigl
Der Volkseinwand
Cover of book: Wie fördert die EU Menschenrechte in Drittstaaten?
Book Titles No access
Dennis Traudt
Wie fördert die EU Menschenrechte in Drittstaaten?
Cover of book: Future-Proofing in Public Law
Edited Book No access
Nicole Koblenz LL.M., Nicholas Otto, Gernot Sydow
Future-Proofing in Public Law