, to see if you have full access to this publication.
Edited Book No access

Talking to the Enemy

Deradicalization and Disengagement of Terrorists
Editors:
Publisher:
 2017

Summary

As a collected volume, ‘Talking to the Enemy’ focuses on various aspects of the communicative dimension of counter-terrorism and its marginal conditions. In its first part, the book features eight articles providing a variety of perspectives on Western as well as Asian efforts in countering potentially violent extremism. Besides more theoretical approaches, they offer practical insights from the coal face of counter-terrorism, especially in the field of disengagement, deradicalization and rehabilitation. The second part is made up of a longer essay breaking down the effects of the fundamental post-9/11 trends in counter-terrorism on single strategies of how to engage with the adversary in form of de-radicalization, counter-terrorism and counter-insurgency. A third part rounds off the volume with additional material including an interview on the Islamic State and its impact on geopolitics with a former chief intelligence advisor to the Indian government. The book addresses those generally interested in countering radicalization, terrorism, counter-insurgency, conflict and IR/security studies as well as particular communicative techniques and the politics of counter-terrorism from different regional angles.



Bibliographic data

Edition
1/2017
Copyright Year
2017
ISBN-Print
978-3-8487-0433-0
ISBN-Online
978-3-8452-4739-7
Publisher
Nomos, Baden-Baden
Series
CPG Series of Comparative Constitutional Law, Politics and Governance
Volume
4
Language
English
Pages
374
Product Type
Edited Book

Table of contents

ChapterPages
  1. Titelei/Inhaltsverzeichnis No access Pages 1 - 8
    1. Authors:
      1. A. Introduction No access
        Authors:
      2. B. (De-)radicalization, Disengagement and Rehabilitation: Processes, Programs and Marginal Conditions No access
        Authors:
      3. Bibliography No access
        Authors:
    2. Authors:
      1. A. Introduction No access
        Authors:
      2. B. Knowing the Enemy No access
        Authors:
      3. C. The Right War? No access
        Authors:
      4. D. The Just War? No access
        Authors:
      5. E. Preemption No access
        Authors:
      6. F. Reciprocity No access
        Authors:
      7. G. Limits of Coercive Power No access
        Authors:
      8. H. Countering Radical Ideology No access
        Authors:
      9. I. De-radicalization/Disengagement No access
        Authors:
      10. J. Rehabilitation No access
        Authors:
      11. K. Education Reform No access
        Authors:
      12. L. Communication Management No access
        Authors:
      13. M. A Platform for the Moderate Voice No access
        Authors:
      14. Bibliography No access
        Authors:
    3. Authors:
      1. A. Introduction No access
        Authors:
      2. B. The Context No access
        Authors:
      3. Authors:
        1. I. Global Programs No access
          Authors:
        2. II. Challenges and Opportunities No access
          Authors:
      4. Authors:
        1. I. The Origins of Rehabilitation No access
          Authors:
        2. II. The Contemporary Wave of Rehabilitation No access
          Authors:
      5. E. Conclusion No access
        Authors:
      6. Bibliography No access
        Authors:
    4. Authors:
      1. A. Introduction No access
        Authors:
      2. B. The Contested Concept of De-radicalization No access
        Authors:
      3. C. Exemplary Practices of De-radicalization in Southeast Asia as a Means for Counter-Terrorism No access
        Authors:
      4. D. De-radicalization Efforts in the Philippines: The Case of Muslim Detainees Accused of Various Crimes Associated Witch Terrorism No access
        Authors:
      5. E. Challenges in Implementing De-radicalization Programs as Counter-Terrorism Measures No access
        Authors:
      6. Authors:
        1. I. Visitation No access
          Authors:
        2. II. Counseling No access
          Authors:
        3. III. Legal Assistance No access
          Authors:
        4. IV. Social and Economic Assistance No access
          Authors:
        5. V. After Care No access
          Authors:
      7. G. Conclusion No access
        Authors:
      8. Bibliography No access
        Authors:
    5. Authors:
      1. A. Introduction No access
        Authors:
      2. B. Terrorist Action as Rational Action No access
        Authors:
      3. C. Terrorist Action as Radical Action No access
        Authors:
      4. D. The Normalcy of the Extreme No access
        Authors:
      5. Authors:
        1. I. De-Radicalization Programs: Possible Effects on Extremism, Radicalism, and Terrorist Motives No access
          Authors:
        2. II. De-radicalization and Distributions of Extremism No access
          Authors:
      6. F. Conclusion No access
        Authors:
      7. Bibliography No access
        Authors:
    6. Authors:
      1. A. Introduction No access
        Authors:
      2. Authors:
        1. I. The Danger Signs No access
          Authors:
        2. II. The Root of the Problem No access
          Authors:
      3. Authors:
        1. I. The Premise of the Terrorist No access
          Authors:
        2. II. The Narrative of the Terrorist and its Inconsistencies No access
          Authors:
        3. Authors:
          1. 1. The Audience No access
            Authors:
          2. Authors:
            1. a) Knowing the Audience No access
              Authors:
            2. b) Knowing the Subject No access
              Authors:
        4. Authors:
          1. 1. Start Listening No access
            Authors:
          2. 2. Understand and Counter the Message of the Enemy No access
            Authors:
          3. 3. Learning from Models of Youth Radicalization to Develop Modules of Counter-Radicalization No access
            Authors:
          4. 4. Developing Tools to Measure Effectiveness of the Counter-Narrative Mechanisms No access
            Authors:
      4. Authors:
        1. I. Hear Things you do not like to Hear No access
          Authors:
        2. II. Make Mistakes Fast and Rectifications Faster No access
          Authors:
        3. III. Be Humble, Seek Help and Form Alliances No access
          Authors:
        4. IV. Focus on What Can Be Done No access
          Authors:
        5. V. Building Programs Around an Institution or Alliance and not as an Individual No access
          Authors:
        6. VI. Treating the Youth as Part of the Solution and not Part of the Problem No access
          Authors:
      5. E. Conclusion No access
        Authors:
      6. Bibliography No access
        Authors:
    7. Authors:
      1. Authors:
        1. I. Starting with “Roots” No access
          Authors:
        2. II. Thesis: Radicalization of Human Beings Done by Human Beings No access
          Authors:
      2. B. Defining Phenomena and Measures No access
        Authors:
      3. Authors:
        1. I. The National Democratic Party of Germany: Old Wine in new Bottles No access
          Authors:
        2. II. The Religious Fanaticism: Islamism, Salafism, Wahhabism No access
          Authors:
        3. III. Effects of Radicalization No access
          Authors:
      4. Authors:
        1. I. The German drop-out Program EXIT No access
          Authors:
        2. II. HATIF No access
          Authors:
        3. III. Radicalization Awareness Network (RAN) No access
          Authors:
        4. IV. European Network of Deradicalization (ENoD) No access
          Authors:
      5. Authors:
        1. I. Vengeance and Group Pressure No access
          Authors:
        2. II. Embedding of Racist or Fanatic Thoughts (stage “early”) No access
          Authors:
        3. III. Interim Findings: Opt-out Programs are not Enough No access
          Authors:
      6. Authors:
        1. I. Banning Extremist Groups and Associations (stage “repressive”) No access
          Authors:
        2. II. Legal Sanctions against Extremists (stage “repressive”) No access
          Authors:
        3. III. Counter-Terrorism Legislation in Germany No access
          Authors:
        4. IV. Joint Terrorism Defense Centre of Germany (GTAZ) No access
          Authors:
        5. V. Counter-Terrorism Legislation in Europe No access
          Authors:
        6. VI. Sense of Punishment No access
          Authors:
        7. VII. Special Law for the Enemies of our Values? No access
          Authors:
      7. Authors:
        1. I. Knowing the “Enemy” (1st step) No access
          Authors:
        2. II. Finding the “Enemy” (2nd step) No access
          Authors:
        3. III. Fighting the “Enemy” No access
          Authors:
      8. G. Conclusion No access
        Authors:
      9. Bibliography No access
        Authors:
    8. Authors:
      1. A. Introduction No access
        Authors:
      2. B. Points of Intersection and Divergence No access
        Authors:
      3. C. Types of Linkages No access
        Authors:
      4. D. Incentives and Disincentives No access
        Authors:
      5. E. Drivers and Enablers No access
        Authors:
      6. Authors:
        1. I. Cutting off the Money Supply No access
          Authors:
        2. II. Improving Governance and Reducing Areas of Ungoverned Space No access
          Authors:
      7. G. Concluding Remarks No access
        Authors:
      8. Bibliography No access
        Authors:
    1. Authors:
      1. Authors:
        1. I. A new Terrorism? No access
          Authors:
        2. II. A new Counter-Terrorism? No access
          Authors:
      2. Authors:
        1. I. Communication and Counter-Terrorism No access
          Authors:
        2. II. Core Values and Counter-Terrorism No access
          Authors:
        3. III. Deriving a Dichotomous Model View on Counter-Terrorism No access
          Authors:
      3. Authors:
        1. I. Filling the Gap: The Global War on Terror and the Cold War No access
          Authors:
        2. II. Paradigm Shift No access
          Authors:
        3. Authors:
          1. 1. Foundation No access
            Authors:
          2. 2. Continuation No access
            Authors:
      4. D. Conclusion and Outlook: Counterterrorism and Communication in Times of the GWOT No access
        Authors:
      5. Bibliography No access
        Authors:
    1. Interview with Major General Ashok Hukku (ret.) on the Islamic State No access Pages 355 - 364
      Authors:
    2. Authors:
      1. A. Sri Lankan Context No access
        Authors:
      2. B. Rehabilitation of Ex-LTTE Combatants No access
        Authors:
      3. C. Engagement of Individuals with Extremist Ideology No access
        Authors:
      4. D. Conclusion No access
        Authors:
  2. List of Contributors No access Pages 371 - 372
  3. Index No access Pages 373 - 374

Similar publications

from the series "CPG Series of Comparative Constitutional Law, Politics and Governance"
Cover of book: Doing Justice
Edited Book No access
Henning Glaser
Doing Justice
Cover of book: State and Religion
Edited Book No access
Dirk Ehlers, Henning Glaser
State and Religion
Cover of book: Constitutional Jurisprudence
Edited Book No access
Henning Glaser
Constitutional Jurisprudence
Cover of book: Norms, Interests, and Values
Edited Book No access
Henning Glaser
Norms, Interests, and Values
Cover of book: Constitutionalism and Good Governance
Edited Book No access
Dirk Ehlers, Henning Glaser, Kittisak Prokati
Constitutionalism and Good Governance