Successfully reported this slideshow.
Your SlideShare is downloading. ×

Effective Counters to Terrorism & Violent Extremism

Effective Counters to Terrorism & Violent Extremism

Download to read offline

Alexandria, Virginia (November 19, 2014) — ENODO Global, Inc. presented at the Countering Terrorism and Violent Extremism conference held at the Defence Academy of the United Kingdom. The conference, part of the Symposia at Shrivenham series, provides a forum to Government agencies, military and civilian, industry and research establishments for the exploration and exchange of experience and knowledge. Such multi-perspective open exchanges lead to constructive questioning and a synthesis of ideas in a relaxed but professional environment.

This presentation provided solutions for how governments and corporations can design and implement effective population-centric communications and engagement strategies. By adopting a proactive approach to counter civil unrest, institutions can delegitimize activist’s narratives and activities, diminish their influence and utility, and build cohesion between government institutions, companies, and communities. This allows for channeling of resources to address grievances in an ordered, constructive manner.

Alexandria, Virginia (November 19, 2014) — ENODO Global, Inc. presented at the Countering Terrorism and Violent Extremism conference held at the Defence Academy of the United Kingdom. The conference, part of the Symposia at Shrivenham series, provides a forum to Government agencies, military and civilian, industry and research establishments for the exploration and exchange of experience and knowledge. Such multi-perspective open exchanges lead to constructive questioning and a synthesis of ideas in a relaxed but professional environment.

This presentation provided solutions for how governments and corporations can design and implement effective population-centric communications and engagement strategies. By adopting a proactive approach to counter civil unrest, institutions can delegitimize activist’s narratives and activities, diminish their influence and utility, and build cohesion between government institutions, companies, and communities. This allows for channeling of resources to address grievances in an ordered, constructive manner.

More Related Content

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Effective Counters to Terrorism & Violent Extremism

  1. 1. Effective Counters To Terrorism & Violent Extremism Symposia at Shrivenham Conference Series Defence Academy of the United Kingdom
  2. 2. The Issue is Not Violence
  3. 3. Issues are in addressing the desire, particularly desires expressed by a majority who identify with an unmet expectation* • As economic conditions i m p r o v e , o r a r e anticipated to improve, majority expectations and desires will rise and become declared Violence is an expression of desire, a means to achieve an objective, when other means are not possible, apparent, or are non-rewarding • Anticipated and countered, but roots will *perceived “reasonable” expectation endure unless directly challenged
  4. 4. SOCIETY COMMUNITY IDENTITY
  5. 5. A Society is formed from communities with shared goals. Communities are formed with shared identity & needs. Identity and narrative (description) of a community is a basic factor in formation of ‘extremism’: • Extremists reject the shared goals of a society • The society’s goals are perceived as a threat to the identity of a community, and consequently its fundamental existence • Extremists convince followers (and targeted communities) that there is no other choice but violence to protect their identity
  6. 6. ‘Modern’ | | Extremism
  7. 7. Worldwide audience available via mass communication • Identity and communities are not restricted to national boundaries • Many naïve/uneducated and willing recruits with unmet, rising expectations Global appeal makes counter argument(s) difficult • Societal ‘norms’ are not the same worldwide; different perceptions and variance of “right and wrong” and application of consequences Use of disenfranchised communities by proxy The extremist still seeks a political change, using violence to achieve it • Yet communities’ long-term goals are often at odds with the extremist’s e.g. resolution of a grievance vs. establishing a brand new political structure
  8. 8. Typical Approach: Big Data One cannot defeat an ideology or point of view with brute technological force and simple reliance on “data” to point the way. It fails to address the human element of the problem, where the individual human being needs to feel part of a vibrant community that will endure and grow.
  9. 9. Technology As a Solution Instead of a Tool Social Media Geospa.al Audiovisual 3D Data Web Traffic Log Files These may provide indicators of identity and associated narratives, but will not reveal true drivers of discontent – the ‘why’ of the problem. Tech driven pointers must be understood within context of community identity.
  10. 10. Effective Countermeasures KNOW YOUR SOURCE
  11. 11. Proactive NOT Reactive • Know and engage with your communities – know what they want – serve their legitimate, reasonable needs Attack the Source • Determine the grievance(s) – sift for the true motivator – dialogue and demo good faith to address the concerns Delegitimize Negative Actors • Call out individuals and groups acting for themselves • Show evidence of proxy use; destroy their credibility Engage the Disenfranchised • He who thinks he has nothing to lose is very deadly • Show they have a say and a future in the society
  12. 12. Recruiting for ISIS U.S. Broadcast of CBS 60 Minutes Sunday, November 2nd, 2014 cbsnews.com/news/recruiting-for-isis-60-minutes/
  13. 13. Anjem Choudary Abu Rumaysah Profile: Intelligent, crafty, & motivated; legitimized by Interview and subsequent arrest • Organizations banned by U.K. government under anti-terror laws; denies “actively recruiting” to send followers to fight abroad • Arrested after interview on suspicion of encouraging terrorism Profile: Dutiful lieutenant with dreams of grandeur; also legitimized by interview & arrest • Convert with complete rejection of anyone not of Muslim faith • Identifies first as Muslim, not British – “this is just an island I was born in” • “Alternate Reality” • A reality none-the-less • Sharia Patrols “are a means to an end”
  14. 14. ENODO Global’s Analysis: Choudary & Rumaysah deliberately wanted to make viewers uneasy. Answers were incensing and filled with rhetoric and simple minded platitudes. Objective: • Appeal to Those Desiring Power o Disenfranchised British citizens o Immigrants already ostracized, feared for Islamic beliefs • Instill, Sow Fear • Heighten U.K. Government Defensives “This is a group that believes the West is at war with Islam” ~ Inaccurate Statement ~ This group wants its audience and converts worldwide to believe the West is at war with Islam, particularly the U.K. government against its own British citizens and immigrants of Islamic faith.
  15. 15. ENODO’s Recommended Solutions Directly attack the arguments and delegitimize these two individuals, their organizations, and their methods. Challenge Double Standards ‘Sharia Patrols’ as Paramilitary Public Engagements • Violence is not The Overall Issue Is a Social Integration Matter • Redirect attention away from looming civil battles • Ensure fair treatment of Islamic adherents and humanity tolerated against Muslims & NON-Muslims in British Society • Arrest for Disturbance of Peace • Public Trial for vigilantism & inciting insurrection. • Support Local Leaders • Praise Outreach Programs • Reconciliation Incentives
  16. 16. The ENODO Global Approach
  17. 17. Collection & Analysis Collection of data sets from multiple sources to build an accurate, in-depth, historical and contemporary understanding of the identity dynamics within a particular area Population-Centric Methodology Application of our proprietary, population-centric methodology to delineate key issues, sentiments, and specific complexities that resonate with a given population or target group Irregular Warfare Techniques Apply irregular warfare techniques to our analytical process to create and maintain discreet, secure production environments, operating with and through their communities Engagement Strategies Tailored operational guidance to work with communities that will facilitate the growth and development of community networks, which over time will deliver advanced warning against potential threats
  18. 18. ENODO Global, Inc. • Business intelligence and risk assessment firm • Conducts population-centric analysis to solve complex social problems in dynamic cultural environments • We deliver community-based risk assessments, predictive analysis, and engagement strategies that are monitored near real-time
  19. 19. www.enodoglobal.com

×