Gender, governance, and countering violent extremism (CVE) in the UK

Date of Publication

2019 12:00 AM

Security Theme

Violent Extremism

Keywords

Violent Extremism, GenderCounter-terrorismCommunityViolent extremismIslam

Description

The paper draws upon ideas of decentred security, and governance and security assemblages, to explore the gendered nature of countering violent extremism. The paper focuses on the UK as an example of decentred CVE and concentrates on two areas. First, the paper looks at the evolution of modes of governing Muslim women in CVE initiatives. Second, the paper explores the tensions and frictions involved with the state and civil society using ‘formers’ (men who were previously involved in violent extremism) to engage in countering violent extremism community and de-radicalisation work. The paper finds that a decentred security governance approach to understanding CVE reveals how CVE is productive of MuslimWomen, of Muslim Communities and Violent Extremism. It also reveals CVE to operate not only according to formal documents and programmes but through an assemblage of beliefs, traditions and practices of everyday security.

Share

Report Location

 
COinS
 
Jan 1st, 12:00 AM

Gender, governance, and countering violent extremism (CVE) in the UK

The paper draws upon ideas of decentred security, and governance and security assemblages, to explore the gendered nature of countering violent extremism. The paper focuses on the UK as an example of decentred CVE and concentrates on two areas. First, the paper looks at the evolution of modes of governing Muslim women in CVE initiatives. Second, the paper explores the tensions and frictions involved with the state and civil society using ‘formers’ (men who were previously involved in violent extremism) to engage in countering violent extremism community and de-radicalisation work. The paper finds that a decentred security governance approach to understanding CVE reveals how CVE is productive of MuslimWomen, of Muslim Communities and Violent Extremism. It also reveals CVE to operate not only according to formal documents and programmes but through an assemblage of beliefs, traditions and practices of everyday security.