No. prev. doc.: 5692/1/10 REV 1 ADD 1 REV 1 ENFOPOL 24 Subject: Instrument for compiling data and information on violent radicalisation processes



Similar documents
Delegations will find in Annex a concept note on the creation of a EU Internet Referral Unit at Europol.

The White House CVE Summit

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

Tier 3/4 Social Work Services

Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism

LLB (Hons) Law with Criminology Module Information

Erbil Declaration. Regional Women s Security Forum on Resolution UNSCR 1325

Europol Public Information VACANCY NOTICE

Amendments to the Legal Aid, Sentencing and Punishment of Offenders (LASPO) Bill Equality Impact Assessment

Council of the European Union Brussels, 19 June 2015 (OR. en)

Concerning the remarks made during the meetings the Presidency wishes to clarify the following

Manifesto for Education Empowering Educators and Schools

SCDLMCB3 Lead and manage the provision of care services that deals effectively with transitions and significant life events

SCDLMCB2 Lead and manage service provision that promotes the well being of individuals

FACT SHEET: A summary of the rights under the Convention on the Rights of the Child

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

Criminal Justice Courses

Psychological Warfare and Terrorism

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT

Master of Arts, Counseling Psychology Course Descriptions

EUSA UNIVERSITY CENTRE DEGREE IN ADVERTISING AND PUBLIC RELATIONS SUBJECT DESCRIPTIONS

CSL 502 Legal, Ethical, and Professional Issues. CSL 503 Human Relations Methods and Skills

UMEÅ INTERNATIONAL SCHOOL

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

The social rights of victims of crime

Council of the European Union Brussels, 2 March 2015 (OR. en)

Southfields Academy: Safeguarding Principles

Code of Conduct Sourcing & Supply Chain FAU-F-SPG-2400/EN

Annex 1: Assesing risk: threats, vulnerabilities and capacities

Justice Studies - Criminal Justice Bachelor of Science Degree (B.S.)

Home Economics Education

Community Policing. Defined

CALL FOR PAPERS 8th Annual South East European Doctoral Student Conference Monday 16th & Tuesday 17th September 2013 Call for Papers

Delegations will find in annex a letter of the Chairman of the Europol Management Board informing the Council about the Strategy for Europol.

P. O. Box 1520 Columbia, South Carolina Effective date of implementation: January 1, Domestic Violence

Leading Experts in Employment Law, Industrial Relations and best practice Human Resource Management in Ireland

Homeland Security and Terrorism COURSE SYLLABUS

Council of the European Union Brussels, 24 November 2014 (OR. en) Foreign fighters and returnees: discussion paper

Equality and Diversity Forum response to the consultation on employer liability for harassment of employees by third parties

Assessment of the Terror Threat to Denmark

Use of the HELiCS Resource in a Spinal Injury Rehabilitation Service

Standards of Proficiency and Practice Placement Criteria

16094/14 MM/mj 1 DG E - 1C

Home Security: Russia s Challenges

Inquiry into the Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014

COUNCIL OF EUROPE COMMITTEE OF MINISTERS. RECOMMENDATION No. R (90) 2 OF THE COMMITTEE OF MINISTERS TO MEMBER STATES

PAUNG KU JOB ANNOUNCEMENT

Abu Dhabi Memorandum on Good Practices for Education and Countering Violent Extremism

Religion & Belief Tandem Learning

GENDER EQUALITY AND WOMEN S RIGHTS. Council of Europe Standards

Safe & Caring Schools Policy Revised 2013

UNCCT International Conference on National and Regional Counter- Terrorism Strategies Bogota, Colombia 31 January - 1 February 2013

Global Network Initiative Protecting and Advancing Freedom of Expression and Privacy in Information and Communications Technologies

B413 Digital Media Marketing MTCU code Program Learning Outcomes

The British Academy of Management. Website and Social Media Policy

Expert Seminar. Engagement with Non-State Armed Groups in Peace Processes

Compliance Toolkit. Protecting Charities from Harm

Equality and Diversity Policy. Deputy Director of HR Version Number: V.2.00 Date: 27/01/11

What will I study? Year One core modules currently include:

Liverpool Hope University. Equality and Diversity Policy. Date approved: Revised (statutory changes)

Council of the European Union Brussels, 24 November 2014 (OR. en)

Handout: Risk. Predisposing factors in children include: Genetic Influences

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

Gender. Diversity Analysis. and. Discussion Paper and Lens

Code of Ethics and Conduct

Human Services Quality Framework. User Guide

COUNCIL OF THE EUROPEAN UNION. Brussels, 13 February 2002 (19.02) (OR. es) 5712/1/02 REV 1 ENFOPOL 18

Council of the European Union Brussels, 9 September 2014 (OR. en)

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

LIMITE EN. Background

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

General recommendation No. 34 adopted by the Committee

Miami University: Human Subjects Research General Research Application Guidance

How To Be A Responsible Corporate Citizen

City University of Hong Kong. Course Syllabus. offered by College/School/Department of School of Law with effect from Semester B 2015/ 16

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

MANAGEMENT COURSES Student Learning Outcomes 1

ASYLUM SCREENING INTERVIEW AND BIOMETRIC RESIDENCE PERMIT APPLICATION

Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington

Minor Interpellation tabled by Bundestag Member Andrej Hunko and others and The Left parliamentary group.

Below you will find information relevant to CCPS members which has been taken from the Single Outcome Agreement published in June 2009.

CALIFORNIA STATE UNIVERSITY, FRESNO DEPARTMENT OF PSYCHOLOGY UNDERGRADUATE PROGRAM

I Conference Summary

Information Governance Policy

How To Be A Successful Supervisor

2015 Sociology. New Higher. Finalised Marking Instructions

The National Occupational Standards. Social Work. Topss UK Partnership

PRIVACY POLICY. Any form of reproduction in whole or in part of the content of this document is prohibited.

ORGANIZATIONAL ASSESSMENT TOOL FOR NGOs WORKING ON DRUG PREVENTION, DEMAND REDUCTION AND DRUG CONTROL

Detention and Reintegration Working Group

Working with Local Criminal Justice Boards

2015 COES Annual Conference Urban and Territorial Conflicts: Contesting Social Cohesion? (Santiago de Chile, November 17-20, 2015)

THE COSTS AND BENEFITS OF DIVERSITY

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July December 2016

NOTICE OF VACANCY. Ref.: CONS/AST/090

Applied Sociology Course Descriptions

Safeguarding your organisation against terrorism financing. A guidance for non-profit organisations

Change Management Practitioner Competencies

What does it mean to be suicidal?

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.

Transcription:

COUNCIL OF THE EUROPEAN UNION Brussels, 30 March 00 7984/0 ADD LIMITE ENFOPOL 78 ADDENDUM TO THE NOTE from: Presidency to: CATS No. prev. doc.: 569//0 REV ADD REV ENFOPOL 4 Subject: Instrument for compiling data and information on violent radicalisation processes European Union Member States and institutions are invited and advised to make best use, as they see fit, of the data compilation instrument provided for them, by amending it and tailoring it to their specific requirements, should they see a need to do so, while taking advantage of the various features also making it very flexible and adaptable.. AIMS This instrument is being put forward as a basic means of compiling data and information, which it is believed may prove particularly useful at the information-gathering stage, in managing to: () facilitate, focus and improve data compilation, by increasing both the quantity and the quality of information obtained by other, non-specific means or instruments; Annexes I and II 7984/0 ADD AP/fm DG H 3A LIMITE EN

() facilitate and improve data integration and interpretation, by first organising and structuring information, thereby increasing potential for both tactical operational and strategic analysis of violent radicalisation processes; (3) facilitate and improve information sharing between agencies, institutions and Member States.. ADDRESSEES The instrument is being provided for all Member States, if they wish, to make best use of as they see fit, by amending it and tailoring it to their specific requirements, should they see a need to do so. It is also being provided for European Union institutions and agencies to use, in the same way, if they consider that this might enhance both domestic and collective capabilities in better and more efficiently combating radicalisation and recruitment. It is thought, too, that the instrument could be used to best advantage by police forces, security services and intelligence agencies and by institutions involved in combating radicalisation and recruitment and ultimately terrorism, which may have both direct or indirect access to a substantial flow of basic information (information-gathering capacity) and be able to build the resulting assessments into tactical operational and/or strategic decision-making. 3. NATURE AND USE OF THE INSTRUMENT STRATEGIC OR TACTICAL OPERATIONAL APPROACH: The instrument is designed to be used in two ways, focusing on the issue of violent radicalisation (ISSUE) or focusing on the agents of it (AGENTS). The choice of what to focus the instrument on will automatically determine its approach and hence the decisions to be taken. 7984/0 ADD AP/fm DG H 3A LIMITE EN

Focusing on agents, the instrument can be used to compile information on violent radicalisation of particular individuals or of a small group of people; data assessment will therefore automatically be built into tactical operational decision-making, with the measures and steps considered appropriate here being taken. Focusing on the issue, on the other hand, the instrument will not compile information on specific agents, but rather on the sum total of all known violent radicalisation cases. Subsequent assessment, whether purely descriptive, explanatory or forward-looking, will thus have a bearing on strategic decision-making aimed at changing the course of events for the issue. MULTIFACETED: Radicalisation processes are generally very specific, complex, multifaceted and hard to grasp; they may involve aspects such as personal, circumstantial, ideological, social and group-based, behavioural, psychological, technological and communication factors. In the light of that complexity, the instrument works along four different lines, bearing in mind that the distinction serves merely to help compile data and approach the issue, since the four aspects, as pointed out, form part of a single complex, evolving reality. The four lines along which the instrument works are as follows: A. ideologies and radical messages supporting violent radicalisation: this focuses on the ideological content to which individuals undergoing violent radicalisation are exposed; B. violent radicalisation dissemination channels: this focuses on the actual agents imparting and receiving ideological content and on the communication process involved; C. factors affecting violent radicalisation: this focuses on the setting and location in which radicalisation takes place; D. impact and changes: this describes the changes experienced by an individual after undergoing violent radicalisation. 7984/0 ADD AP/fm 3 DG H 3A LIMITE EN

SEMI-STRUCTURED: The instrument comprises 70 questions (Annex I), grouped along four lines (A, B, C and D), in turn broken down into 4 different factors, as shown in the table below : A. Ideologies and radical messages supporting violent radicalisation. Description of ideology directly supporting violence (). Agents adhering to that ideology and directly promoting violence and violent radicalisation (3) 3. Description of radical messages (4) 4. Radical messages and other ideologies or movements () B. Violent radicalisation dissemination channels 5. Communication models used to disseminate radical messages () 6. Agents involved in the communication process (6) 7. Other components of the communication process () C. Factors affecting violent radicalisation 8. Description of individual personal factors () 9. Description of group, social and organisational factors () 0. Description of macro-social factors (7). Description of locations where violent radicalisation takes place () D. Impact and changes. Description of cognitive impact and changes (6) 3. Description of emotional or affective impact and changes (5) 4. Description of behavioural impact and changes (6) COMMON LANGUAGE AND INFORMATION SHARING: Use of a semi-structured common instrument by various individuals and/or institutions and/or Member States will facilitate and foster conceptual equivalence and a similar approach to violent radicalisation, thus no doubt bringing improved information sharing. If that move towards conceptual equivalence is to progress, the instrument needs to be discussed, amended, adjusted and accepted, but above all used by the various parties concerned. The instrument proposed is meant to be no more than a first stage in this process. RADICALISATION EPISODE: In view of the evolving, complex nature of violent radicalisation, there seems a need to facilitate assessment of the factors and variables involved, which makes establishing the order in which they emerge and develop crucial to a better understanding of the processes at work. Hence the need, after detecting a radicalisation process, to date all information concerning it. After each of the 4 factors, the number of questions dealing with it is given in brackets. 7984/0 ADD AP/fm 4 DG H 3A LIMITE EN

The violent radicalisation process can thus be seen as the sum total of all "episodes" experienced by an individual. The instrument is accompanied by a data compilation table (Annex II), in which to include information on each radicalisation episode. VALIDITY: Initially, it is felt that the instrument should be used in compiling data on individuals involved in terrorist operations detected (closed cases), which would on the face of it show there to be a prior radicalisation process on which to focus. Having said that, the instrument has been devised for the specific purpose of obtaining information on the aspects thought most significant in radicalisation, so that each Member State or institution making use of it will have to consider its added value in organising and collating existing violent radicalisation data. RELIABILITY: One of the instrument's features is its semi-structured data compilation approach, grouping questions around particular aspects of violent radicalisation. That feature, seen as a practical necessity in order to avoid overlooking information, build some flexibility into the tool and provide greater potential for future analytical exploitation, requires a breaking-in period for those teams who are to operate it, so as to familiarise themselves with it and work out how best to use it, since the tool's potential cannot be seen in isolation from the end user's observation and analysis skills. 7984/0 ADD AP/fm 5 DG H 3A LIMITE EN

INSTRUMENT ANNEX I A. IDEOLOGIES AND MESSAGES SUPPORTING VIOLENT RADICALISATION (VR). Description of ideology directly supporting violence:. Spectrum in which the ideology is situated?. Most significant principles and objectives? How and why does the ideology support the use of violence?. Agents adhering to that ideology and directly promoting violence and violent radicalisation: 3. Organisations or terrorist groups that have adopted this ideology and the use of violence? 4. Organisations or groups that promote violent radicalisation? 5. Geographical area affected? 3. Description of radical messages (RM): 6. Literal description of the RM(s), main RM(s) or title/content of the work. 7. Main function(s) of the RM(s)? 8. Features/aspects of the RM? 3 9. How are the RMs adapted for different target audiences? 4 4. RMs and other ideologies or movements: 0. Are any of these RMs also supported by other ideologies or movements that do not support violence?. Are there any other ideologies or movements that represent an alternative to, or compete with, the RMs and the ideology that supports them? 3 4 Extreme right/left, Islamist, nationalist, anti-globalisation, etc. Legitimisation of violence; orientation of violence (aims, targets of violence, modus operandi); reinforcement of group identity; intimidation, etc. Territorial, political, economic, social, historical, cultural, religious, ideological, ethnic, linguistic and social identity aspects, etc. Selection of audiences, internal logic and reasoning used in RMs (deductive, inductive), emotional elements used in RMs, languages, etc. 7984/0 ADD AP/fm 6 ANNEX DG H 3A LIMITE EN

B. VR DISSEMINATION CHANNELS 5. Communication models used to disseminate RMs. Most frequently used communication channels? Model I (MI), based on the "content" Model II (MII), based on the "effects" Model III (M III), based on the "process" 3. 3. Are these models combined in the same agents? How? 6. Agents involved in the communication process 4. In relation to the M I-II-III communication models, who are the transmitters and recipients? 4 5. Is there a prior relationship between the agents? 5 6. In relation to the M I-II communication models, what is the basis for the hierarchy between transmitters and the recipients? 6 7. In relation to the M III communication model, what is the basis for the equality between the agents? 8. In relation to the M II-III communication models, how do the agents contact each other? Who has the initiative? 9. How are the agents chosen? 3 4 5 6 (M-I) Communication based on the "content" of the RMs: characterised by a strict hierarchy among participants (transmitter and recipient), there is no contact or feedback between participants and communication is aimed at a large anonymous audience. The content (ideological, religious, etc) disseminated is the main characteristic of this model of communication (e.g. communication from Osama Bin Laden setting out the objectives of, and reasons for, Al Qaeda's activity). (M-II) Communication based on the "effects" of the RMs: there is some degree of hierarchy among participants, mainly oral or written communication, with feedback between transmitter and recipient within a secure environment, aimed at a small and familiar audience. The effect which the transmitter seeks to have on the recipient is the most important characteristic of this model (e.g. the relationship between the recruiter and the person recruited "vertical radicalisation"). (M-III) Communication based on the "process of exchange" of RMs: this is characterised by hierarchical equality among participants, who constantly interchange the roles of transmitter and recipient (emi-rec A y emi-rec B); there is feedback between participants within a secure environment, each participant being an active seeker of information. In general, the actors are "pre-prepared" (they have prior - albeit at times basic - knowledge of the nature and content of RMs and may have a radical background. The most important feature of this model of communication is the constant exchange of information (RMs) between participants (e.g. members of an internet discussion forum, which is used for exchanging files with radical content and openly expressing opinions on them "horizontal radicalisation"). Personal particulars, if any, general characteristics, etc. Schoolmates, neighbours, friends, relatives, shared time in prison, etc. Leader of a terrorist group, member of a terrorist group, leader of a religious/ideological movement or organisation, ideological/religious authority, charismatic personality, activist with a violent past, etc. 7984/0 ADD AP/fm 7 ANNEX DG H 3A LIMITE EN

7. Other components of the communication process 0. Depending on the communication model (M I-II-III), what is the CHANNEL used for communications? How is the internet used? What internet addresses are used?. Depending on the communication model (MI-II-III), what is the CODE used in communications? 3 C. FACTORS AFFECTING VR 4 8. Description of individual personal factors. Age, gender, place of birth and nationality of the agents? 3. Administrative situation? 5 4. Economic situation? 6 5. Relevant psychological traits? 7 6. Possible underlying psychological motivation of the agents? 8 7. Level/type of education? 8. Nature of work experience? 9. Nature and level of ideological knowledge and/or commitment? 30. Nature and level of religious knowledge and/or commitment? 3. Socio-economic level? 3. Criminal background? 33. Level of exposure to violence? 3 4 5 6 7 8 Verbal, written, audio, images (TV channels, video), internet (several possible). Use of the internet to store and download RMs, use of the internet as a means of communication between transmitters and recipients, use of internet as a mechanism for communication between a group of equal persons (fora, chats, etc.). Language, secret or encrypted codes, etc. Factors that influence the individual(s) immersed in a process of radicalisation, focusing on the recipient of the radical message or the transmitter-recipient in the case of the M-III communication model. Original nationality, acquired nationality, illegal resident, temporary residence, work permit, study permit, etc. Unemployed, deterioration in economic position, loss of scholarship or financial assistance, etc. Psychological disorders, charismatic personality, weak personality, etc. Relative frustration and deprivation, hate-revenge, moral obligation, pro-social motivation, incentives and rewards, feelings of guilt, etc. 7984/0 ADD AP/fm 8 ANNEX DG H 3A LIMITE EN

9. Description of group, social and organisational factors 34. Mainly socialised where? 35. Social dynamic? 36. Level of integration in society? Reasons? 37. Level of direct personal support? 3 38. Group dynamic observed? 4 39. Basis for main social identity (membership group)? 5 40. Reference for social identity (reference group)? 4. Relationship with the various institutions/government bodies at State level, regional level and local level? 6 4. Relationship between the main social identity group (membership group) and institutions/government bodies at State level, regional level and local level? Level of representation of that social group in those bodies? 43. Orientation of terrorist groups or networks in the agent's geographical area? 7 44. Orientation of the non-violent organisations or movements in the area in which the agent lives? 8 0. Description of macro-social factors 45. Any relevant economic factor? 46. Any relevant social factor? 47. Any relevant cultural factor? 48. Any relevant technological factor? 49. Any relevant demographic factor? 50. Any relevant political factor? 9 5. Any other general or global factor?. Description of locations where VR takes place 5. City/country in which VR episode/process occurs? 53. Social environment in which VR occurs? 0 3 4 5 6 7 8 9 0 Place/country of birth, place/country of residence. For example in Muslim communities: immigrant dynamic, second or third generation dynamic, convert background. Family, civil status (single, married, widowed, divorced, separated), children, friends. Strong group dynamic (basis for "group mentality"), weak group dynamic. Nationality, country of origin, region, religious group, ethnic group, clan, social class, ideological vision, age group, etc. Social services, educational establishments, security services (immigration, police, prisons, intelligence, etc.), other. Terrorist attacks in the area in which the person lives, radicalisation and recruitment in that area sending human resources to other theatres, radicalisation and recruitment for terrorist logistical support in that area, other (several options possible). Reaching a large number of people (expansive), transmission of socio-political ideas, transmission of religious values, penetration into society and its institutions, etc. (several options possible). Wars, other conflicts, terrorist attacks, strong counter-terrorist activity, other. Family home, friends, Internet, educational centre, religious or prayer centre, prison, workplace, leisure centre, etc. 7984/0 ADD AP/fm 9 ANNEX DG H 3A LIMITE EN

D.-IMPACT AND CHANGES IN THE INDIVIDUAL. Description of cognitive impact and changes 54. How does the person consider or interpret his own relationship to the new collective identity and its members? 55. How does the person consider or interpret the relationship between that collective identity and other agents, and the social, cultural, religious, political or economic situation? 3 56. How does the person change his perception of the relationship between things and why they happen? 57. How does the person consider or interpret other collectives considered as "enemies"? 58. How does the person come to regard violence as the best way or the only way of acting against "enemies"? 59. How does the person consider, interpret or evaluate his participation in the activities of the new collective identity? 3. Description of emotional or affective impact and changes 60. Person's feelings about his own relationship to the new collective identity and its members? 6. Person's feelings about the relationship between that collective identity and other agents, and the social, cultural, religious, political or economic situation? 6. Person's feelings about other collectives considered as "enemies"? 63. Person's feelings about the use of violence? 64. Person's feelings about how and why he should take part in the activities of the new collective identity? 3 Factors affecting the individual(s) immersed in a radicalisation process, focusing on the receiver of the radical message or the transmitter/receiver if communication model M-III. Terrorist organisations and groups usually set themselves up as defenders of a group or social identity which may be real or fictitious and is the focus of supposed affronts, persecutions, injustices, etc. That, in turn, enables them to identify other social or group identities, treating or defining them as "enemies". In this context, "new social identity" therefore means the identity as defined by the terrorist groups or the ideologies which sustain them. Terrorist groups exaggerate situations of injustice, inequality, oppression, etc. 7984/0 ADD AP/fm 0 ANNEX DG H 3A LIMITE EN

4. Description of behavioural impact and changes 65. Has the person made oral comments on: the collective identity promoting violence? the collective or group considered as the "enemy"? the use of violence? any intention of taking part in violent action? other issues, mainly of a political nature, using arguments based on RMs? 66. Has the person recently given up some routine behaviour? Possible reasons? Most likely cause? Any prior information suggesting radical influence? 67. Has the person recently taken up some routine behaviour? Possible reasons? Most likely cause? Any prior information suggesting radical influence? 68. Has the person begun to actively seek out a radical point of reference? 69. Has the person recently taken up some relevant non-routine behaviour? Possible reasons? Most likely cause? Any prior information suggesting radical influence? 70. Has the person recently given up some relevant non-routine behaviour? Possible reasons? Most likely cause? Any prior information suggesting radical influence? Habits, dress code, hygiene, diet, prayer, means of communication, visits, contact with groups, etc. (several options possible) Ideology, religions, group, means of communication, web pages, prayer centres, etc. (several options possible) 7984/0 ADD AP/fm ANNEX DG H 3A LIMITE EN

ANNEX II DEFINING DEVELOPMENT OF VR Episode Date/ time Place/ country Ideologies and RMs supporting VR VR dissemination channels Factors affecting VR Impact and changes 3 4 5 6 7 8 9 0 7984/0 ADD AP/fm ANNEX DG H 3A LIMITE EN