<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Combating Transnational Terrorism</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">Procon Ltd.</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Countering Violent Extremism</style></title><secondary-title><style face="normal" font="default" size="100%">Combating Transnational Terrorism</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">Procon</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">199-216</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The term “countering violent extremism” (CVE) has become like a buzzword in recent years – frequently used and yet rarely defined. Although there is no single definition of CVE, it refers primarily to ‘soft’ approaches to undermining the appeal of violent extremism and terrorism. This includes a wide variety of different measures, some of which are preventive, while others aim at rehabilitation. They may be narrow or broad in scope; state-run or non-governmental; in-person or online; large or small-scale. Perhaps most importantly, efforts to counter violent extremism are often culturally unique and so we cannot assume that what works in one country will work in the next. While clearly diverse, all CVE programs nevertheless share the same fundamental goal: to reduce the risk of engagement or re-engagement in extremist-related violence. 
Importantly, there is growing consensus that CVE can play a significant role as part of a comprehensive counter-terrorism (CT) strategy and an increasing number of countries around the world are establishing CVE programs. Nevertheless, it is vital to appreciate that although CVE draws upon lessons learned from other areas, it is still relatively new, both in terms of concept and practice. In addition, there are considerable challenges involved in trying to measure the efficacy of CVE and, because of this, it is difficult to establish with certainty just how effective (or sometimes ineffective or even harmful) these types of intervention are. As a result, there are also many CVE skeptics. The aim of this chapter is not to persuade the reader either way, but to offer an objective assessment. The reality is that an increasing number of CT professionals will come into contact with CVE programs, and in some cases may be directly involved in them. It is therefore essential to develop an informed understanding of what these different projects entail and what they have to offer.
This chapter begins by explaining key concepts and exploring the different reasons why people sometimes disengage (or fail to engage in the first place) with violent extremism. It then outlines the range of different tools that can be applied in CVE before describing case studies of targeted interventions aimed at rehabilitation of captured/convicted terrorists in Saudi Arabia and prevention of potential violent extremism in the UK. Principles of best practice which seem to be important to perceptions of ‘success’ across different types of intervention are identified, followed by a discussion of key, ongoing challenges and potential ways to overcome those challenges.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Foreword</style></title><secondary-title><style face="normal" font="default" size="100%">Combating Transnational Terrorism</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">Procon Ltd.</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">vii-x</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Jihadist Foreign Fighters  and ‘Lone Wolf’ Terrorism</style></title><secondary-title><style face="normal" font="default" size="100%">Combating Transnational Terrorism</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">Procon</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">115-130</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">By April 2015, it was estimated that more than 25,000 ‘foreign fighters’ from perhaps as many as 100 different countries around the world had flocked to Syria and Iraq.  Most are believed to have joined the so-called ‘Islamic State’ (IS) or al-Qaeda’s (AQ) official representative in the region, Jabhat al-Nusra (JN). Not only does this contribute to continued instability in the Middle East, but it also raises the risk of terrorist attacks committed by foreign fighters if and when they return home. Indeed, this has already begun to happen with successful attacks in Egypt in September 2013,  Belgium in May 2014 and Paris in November 2015. This is not to mention many historical cases as well as continued terrorism threats emanating from Afghanistan, Somalia and Yemen among other places. At the same time, there are increasing reports of ‘lone wolf’/ lone-actor terrorism where people inspired by IS or AQ, who have not received terrorist training overseas, carry out attacks on their behalf. As a result, we have seen unprecedented levels of mobilization to violent jihad and an increased threat of terrorism worldwide.
This chapter begins by clarifying what is meant by ‘foreign fighters’ and ‘lone wolf’ terrorism and then describes how these related challenges to global security have developed and escalated over time. It then examines who is getting involved, how and why they are becoming radicalized and what they are doing in pursuit of violent jihad. The chapter concludes with a discussion of key concerns for counter-terrorism (CT).</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Terrorism and Crime</style></title><secondary-title><style face="normal" font="default" size="100%">Combating Transnational Terrorism</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">Procon</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">67-84</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Most discussions of the so-called crime-terror nexus revolve around a very simple observation: terrorists and insurgents frequently engage in criminal activity as a source of revenue. There is no question that crime has been and continues to be a lucrative source of funding for all kinds of terrorists. However, there is still ongoing disagreement about the extent of overlap between the worlds of terrorism and organized crime (OC). Often there is a tendency to over-generalize from specific cases, to speculate or, at times, to overlook the available evidence. Confusion over the nature of the threat in turn acts as a barrier to developing more effective countermeasures. Based on a combination of the authors’ engagement with academic literature on the subject and operational experience, this chapter begins by examining the similarities and differences between terrorists and criminals including profiles, methods, systems of organization, and motives. In other words, the who, what, how and why of terrorism and OC. This is followed by a discussion of the crime-terror nexus and the concept of “convergence,” i.e. the relationships between terrorism and crime. The chapter then concludes with a brief discussion of implications for counter-terrorism (CT) and law enforcement (LE).</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Terrorism and Organized Crime</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">65-82</style></pages><abstract><style face="normal" font="default" size="100%">This article begins with an assessment of the similarities and differences between terrorists and criminals, including profiles, methods, systems of organization and motives. Notably, the article identifies seven categories of crimes committed by terrorists: 1) Inherent/violent, 2) Preparation/facilitation, 3) Funding, 4) Specialized terrorism offenses, 5) Vigilantism/public relations, 6) Miscellaneous/Spontaneous/Unrelated Offences, and 7) Previous criminal records. Next, the crime-terror nexus is discussed and four types of relationships between terrorists and criminals are identified: 1) Interaction, 2) Appropriation, 3) Assimilation, and 4) Transformation. The article concludes with a discussion of the concept of convergence between terrorism and organized crime, and implications for counter-terrorism and law-enforcement.
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">65</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Home-Grown’ Jihad: Understanding Islamist Terrorism in the US and UK</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">Imperial College Press</style></publisher><pub-location><style face="normal" font="default" size="100%">London</style></pub-location><pages><style face="normal" font="default" size="100%">chapter 2</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">‘Home-Grown’ Jihad: Understanding Islamist Terrorism in the US and UK</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">Imperial College Press</style></publisher><pub-location><style face="normal" font="default" size="100%">London</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Foreign Fighters in Syria: Tracking the Trends and Assessing the Threat</style></title><secondary-title><style face="normal" font="default" size="100%">Per Concordiam</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">36–43</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Rehabilitation of Islamist terrorists: Lessons from Criminology</style></title><secondary-title><style face="normal" font="default" size="100%">Dynamics of Asymmetric Conflict</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">162–93</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Parallels Between Crime and Terrorism: A Social-Psychological Perspective</style></title><secondary-title><style face="normal" font="default" size="100%">Studies in Conflict and Terrorism</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><volume><style face="normal" font="default" size="100%">32</style></volume><pages><style face="normal" font="default" size="100%">811–30</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">9</style></issue></record></records></xml>