{"id":2435,"date":"2022-06-12T12:30:17","date_gmt":"2022-06-12T10:30:17","guid":{"rendered":"https:\/\/reda.hostpress.com\/?page_id=2408"},"modified":"2022-06-12T12:30:17","modified_gmt":"2022-06-12T10:30:17","slug":"past-present-and-future-of-terrorism","status":"publish","type":"post","link":"https:\/\/reda.archipress.org\/?p=2435","title":{"rendered":"Past, Present and Future of Terrorism"},"content":{"rendered":"<p>by Reda Benkirane<\/p>\n<p>Extracts from the <em>Independent Meta-synthesis under the Global Counter-Terrorism Strategy<\/em><a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a>, United Nations, December 2021.<br \/>\n(<strong><a href=\"https:\/\/www.archipress.org\/docs\/pdf\/Past_Present_and_Future_of_Terrorism.pdf\" target=\"_blank\" rel=\"noopener\">PDF<\/a> <\/strong>version)<\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: justify;\"><a href=\"https:\/\/reda.hostpress.com\/?page_id=2428\"> <img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2420 alignright\" src=\"j\/wp-content\/uploads\/2022\/06\/image_2022-06-12_094313472.png\" alt=\"\" width=\"279\" height=\"399\"><\/a>Undefined notions of terrorism\/counter-terrorism<\/h3>\n<p style=\"text-align: justify;\">There is no clear definition or shared understanding on terrorism or CT. A shared understanding of what constitutes CT is critical for the evaluation, assessment, audit, or reviews to assess whether a project or a programme is successful. The conceptual fuzziness around the umbrella term that covers a range of activities is not an impediment to the work, but it shows that, beyond security, military and judiciary measures easily and immediately associated to this term, it is difficult to develop a unified collective action within the UNGCTCC. This is a major gap, especially when considering the risk of states engaging in anti-terrorism measures with oppressive actions and threatening human rights. This omnipresent risk associated to a \u201cmisuse\u201d of an undefined terminology was clearly identified in 2005 at a UN Economic and Social Council:<\/p>\n<p style=\"text-align: justify; padding-left: 40px;\">\u201cThe absence of a universal, comprehensive and precise definition of \u201cterrorism\u201d is problematic for the effective protection of human rights while countering terrorism.\u201d Fighting terrorism, \u201cwithout defining the term, can be understood as leaving it to individual States to define what is meant by the term. This carries the potential for unintended human rights abuses and even the deliberate misuse of the term. Furthermore, there is a risk that the international community\u2019s use of the notion of \u201cterrorism\u201d, without defining the term, results in the unintentional international legitimization of conduct undertaken by oppressive regimes, through delivering the message that the international community wants strong action against \u201cterrorism\u201d however defined.\u201d <a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a><\/p>\n<p style=\"text-align: justify;\">The sentence \u201cone man&#8217;s terrorist is another man&#8217;s freedom fighter\u201d was mentioned several times during the interviews, indicating the relativist perspective of terrorism and therefore of CT itself. The same realities associated with these terms may appear differently from different perspectives. The absence of a definition is a gap with geopolitical consequences since it is not clear whether, where and when an entity, a movement, an individual may be classified as a terrorist and treated as such according to international laws, procedures, sanctions associated to it. The lack of proper definition is also an impediment to checking new threats and new forms of terrorism in this century. Some research reports of security-oriented entities may have identified the right-wing extremism as a new emerging threat in Northern Europe and Europe: but interviews indicated that, within the current structures and funding model, it was challenging to mobilize resources to prevent or fight it. The most powerful donor states are not amenable to CT actions by international organizations in their own sovereign space. Relatedly, aviation security, maritime security, border security, travel documents control, and immigration control, are all based on a set of standards that seek to prevent terrorist threats from abroad. These security standards are inadequate when terrorists are nationals, and the threat is intrinsically domestic. Further, ideological lines between mainstream politics and right-wing extremism are blurrier today than they were with left-wing extremism in the 1960s and 1970s. Countries where right-wing extremism or extreme right radicalization is taking place are usually the states that are funding CT projects in other countries. So right-wing terrorism is a major emerging threat in global north, but these states tend to underestimate this danger, and more importantly, are not used to external interventions. If no country is immune to terrorism, then the prevailing funding model is not compatible with the scrutiny of domestic affairs of donor states by international institutions engaged in counterterrorism.<\/p>\n<p style=\"text-align: justify;\">During the last 20 years, the international community has been highly vigilant about radical Islamism\/ Salafijihadi terrorism. Unlike the African and Asian states which are engaged in countering this threat, many MS are reluctant to use the \u201cterrorist\/ism\u201d qualification for mass-killings perpetrated bywhite supremacists or rightwing activists (most of them are often categorized as \u201clone wolves\u201d affected by \u201cmental illness\u201d) and to consequently undertake strong CT measures to fight them. The dominant but undefined terminology does not necessarily allow a universal approach to the armed and political violence qualified as \u201cterrorism\u201d despite the effort undertook by the Security Council to specify acts of that nature <a href=\"#_ftn3\" name=\"_ftnref3\">[3]<\/a>&nbsp;, and may, in situation of new threats, even end-up as another North-South divide or double standard prevailing between \u201cthe West and the Rest\u201d.<\/p>\n<h3 style=\"text-align: justify;\">&nbsp;<\/h3>\n<h3 style=\"text-align: justify;\">Brief history of \u201cterrorism\u201d in modern times<\/h3>\n<p style=\"text-align: justify;\">The terrorist attacks of the last 20 years are perceived and presented as a singularity in the history of political violence, and therefore their exceptionality has found a parallel in the treatment and the detainment of terrorists. However, this is not the first time in modern history that nation-states are threatened by a terrorist form of violence. First, it is important to remember that terrorism may be practiced by state actors. The first use of Terror in modern times to achieve political objectives \u2013 through laws or state of exception, arbitrary arrests, summary, and massive executions \u2013 was the fact of the French state (1793-1794) during its revolutionary process which exported in Europe and beyond both its violence and its universal values of human and citizen rights. In the case of France, its revolution was the cradle of both state violent terror and the Enlightenment, the civilization project of free market, parliament democracy and equality for all citizens. This project was progressively adopted with its inherent violence in most of the European countries. In the mid-19th century, terrorism started to designate the non-state actors that were using violence against the state in an ideological reconstruction. Anarchists, nihilists, nationalists spread violence in Europe until the 20th century, and their acts \u2013 bombings, assassinations, mass shootings \u2013 were largely reported and commented in the press. The list of assassinations includes monarchs, heads of state, prime ministers, and numerous statesmen <a href=\"#_ftn4\" name=\"_ftnref4\">[4]<\/a>. This historical background could be pursued all along the 20th century with the eruption of nationalism in Europe and struggles for national liberation in colonized countries, and later with the left-wing armed groups in post-war Europe, and Marxist guerrillas in Latin America, Africa, and Asia. It is heuristically important to put today\u2019s terrorism in a historical perspective with its specificities but also its continuities. It appears that today\u2019s jihadists express a form of nihilism that was dominant in Europe\u2019s 19th century. A brief history of violence and terrorism in modern times shows common patterns and ideological differentiation based on race, ethnicity, nationalism, and religion.<\/p>\n<p style=\"text-align: justify;\">From the social sciences perspective, the expression \u201cterrorist\u201d does not present any heuristic value and does not bring a particular light to the view of the violent phenomenology associated to \u201carmed groups\u201d, \u201carmed dissidents\u201d, \u201cviolent rebels\u201d or \u201cinsurgents\u201d. It does not help either to apprehend the perceptions of the communities and their own description of armed conflicts and war occurring in the territories where they live. The use of the term \u201cterrorism\u201d has a value from a political standpoint and is to a certain extent tactically operational in the sense that what is designated as such is immediately denigrated and denied from any legitimacy or right associated to an armed struggle and, more problematic, even a civil political life.<\/p>\n<p style=\"text-align: justify;\">\u201cTerrorist or freedom fighter\u201d is a perspectivist proposition that is also based on historical evidence. Further, yesterday\u2019s terrorists may be tomorrow\u2019s politicians. This rule was valid in the case of the Israeli Irgoun (1931- 1948), the Algerian FLN (1954-1962), the PLO (1964-1974), the South African ANC (1960-1990), the IRA (1916- 2006), the Lebanese Hezbollah (1982-1991) and the Palestinian Hamas (1987-1991). However, since the events of September 11 and the \u201cwar on terror\u201d, this is no more validated in the case of the Algerian GIA, the International Al Qaida and ISIS in Iraq, Syria, and West Africa. Nevertheless, the recent negotiated return to power of the Taliban in Afghanistan, 20 years after 11 September 2001, should nuance the observation on these exceptions.<\/p>\n<p style=\"text-align: justify;\">It is important to notice that some prominent Western scholars, mainly specialists of political Islam, endorse the conventional terminology on \u201cterrorism\u201d and integrate it even in the general frame of political scientist Samuel Huntington\u2019s theory of \u201ccivilizational clash\u201d between the West and Islam, China, and the demographic peril of mass immigration in \u201csenescent\u201d Europe and North America. Although very controversial, the proposed theory of cultural and civilizational confrontation <a href=\"#_ftn5\" name=\"_ftnref5\">[5]<\/a> has been very influential in the governing sphere since the unprecedented terrorist attacks of Nine-eleven. More recently, on the ideological influence of ISIS, a polemic debate was engaged by French \u201cIslamologists\u201d to determine whether we are witnessing a \u2018radicalization of Islam-ism\u201d or an \u201cIslamization of radicalism.\u201d From this perspective, in the aftermath of terrorist attacks in many cities of the world, some authors <a href=\"#_ftn6\" name=\"_ftnref6\">[6]<\/a> have even tried to conceptualize a \u2018sociology of rage and anger\u2019 to describe what may encourage young people to engage with terrorist groups under the franchise of Al Qaeda or ISIS\/Daesh. This trend in the literature which puts the emphasis on \u201crage\u201d, \u201canger\u201d to explain contemporary violence, extremism and hatred is best represented with the magisterial thesis developed by Indian writer Pankaj Mishra <a href=\"#_ftn7\" name=\"_ftnref7\">[7]<\/a>. &nbsp;What is proposed is a unified vision on these phenomena that is the absolute opposite of the dominant theory of clash of civilizations. On the contrary, what is often perceived as a violence against the Enlightenment, modernity, the Western cultural values, etc., is a reaction by its children affected by a Rousseauist-Nietzschean resentment who feel excluded from the Enlightenment promise of free markets, universal suffrage, educational and personal advancement. Since the French revolution, the age of Enlightenment was also an age of anger and terror. New political expressions have emerged from nationalism to terrorism, led by individuals living on the margins of the great narrative on progress, modernity, and globalization, moved by an appropriative and mimetic rivalry <a href=\"#_ftn8\" name=\"_ftnref8\">[8]<\/a>.<\/p>\n<p style=\"text-align: justify;\">In the long historical run, history of mass violence and terrorism is the hidden and \u201cunthought\u201d facet of the \u201csanitized\u201d history of modernization. Today\u2019s violence and terrorism correspond to another series of \u201cshocks of modernity\u201d, in the 19th century, this nihilist violence made of \u201cnegative solidarity\u201d (Hannah Arendt) spread to all European countries; in the 20th century, it produced world wars, genocides, colonial carnages; in the 21st century, it affects nowadays billions of individuals in Africa and Asia. The latter shocks lack the immemorial cultural, social, and economic structures as well as the welfare state able to absorb them.<\/p>\n<p style=\"text-align: justify;\">&nbsp;<\/p>\n<h3 style=\"text-align: justify;\">Conflictual terminology, semantic warfare<\/h3>\n<p style=\"text-align: justify;\">The issue of the terminology associated with terrorism and VE has been studied and is still debated in the academic world. Most social scientists, who do empirical work, field survey, and research on the ground, avoid using terms associated with terrorism. The work on legal and illegitimate violence does not acquire more meaning by using the terms terrorism\/terrorist. On the contrary, what research reports often show is that it is preferable to refer neutrally to the denomination of the armed groups and\/or also indicate the name given by the populations. For example, in the case of the Nigerian armed group Boko Haram, one of the most extreme and violent terrorist groups currently fought by four African armies, it is instructive to know that its usual name was given by the population of Maiduguri (northeast of Nigeria) in 2009 after hearing a speech from one of its leaders preaching and sermonizing educated but unemployed youth about the uselessness of \u201cwestern education and diploma\u201d. \u201cBoko Haram\u201d is a contraction of Hausa (\u201cBoko\u201d referring to \u201cbook\u201d, \u201ceducation\u201d) and Arabic terms (\u201charam\u201d meaning \u201cforbidden\u201d) meanwhile the organization\u2019s original Arabic name is Jama\u2019at Ahl al-Sunnah li Da\u2019wa wa-l-Jihad, which means \u201cAssociation of the People of the Sunna for Preaching and Jihad\u201d. <a href=\"#_ftn9\" name=\"_ftnref9\">[9]<\/a>.<\/p>\n<p style=\"text-align: justify;\">Part of terrorism\u2019s strategy not only relies but depends essentially on information and communication. Terrorism in modern age without relays of transmission and diffusion is inconceivable. More than anything else, it needs mass communication to show the violent and staggering acts perpetrated. A terrorist act denied of any form of communication, not covered by mainstream media and social networks completely misses its main target of creating fear and awe not only within affected communities but far beyond their surrounding socio-political environment. In today\u2019s globalized world, with ubiquitous communication, internet, and smartphones, more than ever semantic and semiotic conflicts precede and accompany terrorist acts and military operations. The most patent and tragic example of these conflicts of images, signs and languages is the case of the caricatures published in 2006 with the headline \u201cThe Face of Mohammed\u201d by the Danish conservative newspaper Jyllands-Posten, which resulted into violence and anger across the Muslim world in February 2006. These caricatures were reprinted in 2012 by the French satirical weekly Charlie Hebdo where 12 people were killed in 2015. The battlefields are now on the cyberspace around symbols, icons, signs of all sorts, and CT and VE or extreme violence should take into consideration the catalytic role of mass media and social networks in the diffusion of hate speech, in the ideological sway of terrorist groups, in the designation and targeting of cultural and religious minorities as \u201cscapegoats\u201d of violence. The fight against terrorism is also an endless battle of interpretations (what is terrorism? Jihad?), a clash over words (\u201cAxis of evil\u201d, \u201cCrusade\u201d, \u201cWar on terror\u201d, \u201cAllah akbar\u201d), concepts (secularization, la\u00efcity, East and West, North,and South), symbols (Bamiyan Buddhas, Palmyryan ruins) and images (Danish cartoons).<\/p>\n<p style=\"text-align: justify;\">Semantic and semiotic wars are real-time and low intensity conflicts fed by social and mass media with hate, fear, and anxiety as structural emotions. Semantic and semiotics are profound and powerful stockpiles for both terrorism and CT rhetoric artilleries. Using the appropriate terminology, designing meaningful, solid, and operative concepts based on vernacular realities can contribute to a therapeutic arsenal for the prevention of terrorism and extreme violence. In order to neutralize the dangers of terminology, an alternative strategy would be to use preferably the original appellations of VE groups (to not underestimate or despise the enemy), to de-penalize and de-remilitarize the polysemous (multiple meanings) religious notion of jihad (so that a civil and peaceful jihad (\u201cspiritual effort\u201d) against extreme violence can be legitimized), to control and if needed sanction hate speech and racist demagogic expressions in mainstream television news channels, to promote mass digital literacy \u2013 as an alternative to digital surveillance and other heavy security-oriented measures \u2013 on the responsible use of social networks, etc. In an age of universal access to information and communication, the strategic dimension of meaning and symbolism can be no more underestimated in any convincing analysis of 21st century conflict-ridden climate.<\/p>\n<p style=\"text-align: justify;\">&nbsp;<\/p>\n<h3 style=\"text-align: justify;\">From the \u201cWar on Terror\u201d to the \u201cFight against Terrorism and Violent Extremism\u201d<\/h3>\n<p style=\"text-align: justify;\">The bellicose trend of the \u201cwar on terror,\u201d which was the dominant paradigm characterizing the military operations conducted mainly in Afghanistan and Iraq in early 2000s, was a decade later openly criticized within the international cooperation sphere. The launching of the Global Counter-Terrorism Forum (New York, 2011)<a href=\"#_ftn10\" name=\"_ftnref10\">[10]<\/a>&nbsp;and other international institutions such as Hedayah (Abu Dhabi, 2012)<a href=\"#_ftn11\" name=\"_ftnref11\">[11]<\/a>, the International Institute of Justice and the Rule of Law (Valetta, 2014)<a href=\"#_ftn12\" name=\"_ftnref12\">[12]<\/a> and the Global Community Engagement and Resilience Fund (Geneva, 2014 8, were additional (p)layers in the international effort initiated by the UNGCTS in 2006. It is in this decade that progressively the terminology of \u201ccountering\/preventing violent extremism\u201d (CVE\/PVE) was adopted to focus more on the root causes of terrorism than on its symptomatic phenomenology. In 2015, President Barack Obama chaired in Washington the White House Summit on Countering Violent Extremism with representatives of more than 60 countries, leaders of the EU and the UN. This summit represents a sort of symbolic turning point since it established for the first time and at the highest level of the international community a recognition that the \u201cwar on terror\u201d has generated abuse of power from security forces, repression of dissenting voices that may have encouraged more terror and extremism. The official statement of the summit acknowledges:<\/p>\n<p style=\"text-align: justify; padding-left: 40px;\">\u201cthat intelligence gathering, military force, and law enforcement alone will not solve \u2013 and when misused can in fact exacerbate \u2013 the problem of violent extremism and reiterated that comprehensive rule of law and community-based strategies are an essential part of the global effort to counter violent extremism and, like all measures aimed at addressing the terrorist threat, should be developed and implemented in full compliance with international law, in particular international human rights law, international refugee law, and international humanitarian law, as well as with the principles and purposes of the UN Charter\u201d <a href=\"#_ftn13\" name=\"_ftnref13\">[13]<\/a>.<\/p>\n<p style=\"text-align: justify;\">In this same CVE summit statement, it was also:<\/p>\n<p style=\"text-align: justify; padding-left: 40px;\">\u201creaffirmed the central role of the UN in efforts to address violent extremism and the comprehensive framework that the UN Global Counter-Terrorism Strategy offers for addressing the conditions conducive to the spread of terrorism\u201d.<\/p>\n<p style=\"text-align: justify;\">This clear and unambiguous acknowledgement of \u201cmisused intelligence gathering, military force and law enforcement\u201d signals a new approach of terrorism and CT that is taking place and implemented in various countries and regions around countless projects and programmes of radicalization and deradicalization, rehabilitation and reintegration of former violent extremists since then. But how can this \u201cmisuse\u201d be identified without an evaluation or a monitoring process? The diplomatic dialog and the international encounters of the past decade have tacitly recognized that it is not possible to eradicate terrorism, it can\u2019t be defeated by war and more generally by military, security and intelligence means, but it can be considerably diminished and finally resorbed by an engagement in a larger civil\/civic fight on multiple fronts corresponding to its political, economic, social root causes. The logical outcome of this turning point unveiled in the White House CVE Summit nowadays will consist in the evaluation of how to improve, and if necessary, revise or reform the CVE strategies adopted by the international community. In the current decade, it seems almost inevitable that the international community would seek to develop mechanisms and tools of assessment in order to identify possible \u201cmisused\u201d and \u201cabusive\u201d security and CT policies and operations. The next diplomatic activity on terrorism should be on the assessment of the strategies put in place to fight it and on the long-term impact of the projects and programmes implemented for this end. And it is in this context of ideological shift (expressed by a change in the terminology) adopted by the international community (from the \u201cwar on terror\u201d to the \u201cfight against terrorism and violent extremism\u201d) that this synthesis apprehends some basic elements for a future potential evaluation of a CT strategy.<\/p>\n<p style=\"text-align: justify;\">Constantly increasing in demand and influence in private companies, international and governmental institutions, public programmes, the field of evaluation with its methodology, procedures, tools, guidelines, and recommendation could enrich considerably the CT expertise for which there should be a thorough risk assessment directly correlated with human rights and gender compliance. So, there might be an emerging new field of evaluation, the CT evaluation, which would be designed by experts on CT and by representatives from the civil society. It is not in the framework of the metasynthesis to apprehend this whole new emerging field, but the present document can at least indicate certain limitations and gaps in the evaluation studies and why is necessary to deepen critical issues, lessons learned, open questions and gaps beyond and beneath the levels of managerial, programmatic, and technical expertise.<\/p>\n<p style=\"text-align: justify;\">&nbsp;<\/p>\n<h3 style=\"text-align: justify;\">Monitoring of Counter-Terrorism and International Humanitarian Law<\/h3>\n<p style=\"text-align: justify;\">If we consider the role of the international community in the assessment of asymmetrical conflicts and extreme violence, it is also instructive to consider how one of the oldest, most respected, and prestigious internationals institutions like the International Committee of the Red Cross (ICRC) \u2013 founded in 1863 and at the origin of the first Geneva convention on humanitarian right in times of war \u2013 considers terrorism and CT. On the issues of violence, armed conflicts and wars, ICRC has a kind of precedence within the international community because this organization was created long before the League of Nations (1920-1946) and the United Nations (1945) and it has been closely associated with the formulation of the Geneva Conventions (four treaties and three protocols international containing \u201cthe most important rules limiting the barbarity of war\u201d 200) and the International Humanitarian Law (IHL). The baseline that it articulates as international humanitarian law is the establishment of a fundamental distinction between civilians and combatants in an armed conflict:<\/p>\n<p style=\"text-align: justify; padding-left: 40px;\">\u201cWhen a situation of violence amounts to an armed conflict, there is little added value in calling such acts &#8220;terrorism&#8221;, because they already constitute war crimes under international humanitarian law (\u2026) A crucial difference between IHL and the legal regime governing terrorism is that IHL is based on a premise that certain acts of violence in war \u2013 against military objectives and personnel \u2013 are not prohibited. Any act of &#8220;terrorism&#8221;, however, is prohibited and criminal. The two legal regimes should not be blurred given the different logic and rules that apply.\u201d <a href=\"#_ftn14\" name=\"_ftnref14\">[14]<\/a><\/p>\n<p style=\"text-align: justify;\">ICRC has 100\u2019000 employees present in 100 countries that guarantee neutrality and impartiality of humanitarian work in armed conflicts. This organization is in position to and has the legitimacy to evaluate if and when CT activities are transgressing IHL. On several occasions, ICRC has alerted on \u201cthe potential adverse effects on humanitarian action of certain counter-terrorism measures taken by States, both internationally and domestically.\u201d<a href=\"#_ftn15\" name=\"_ftnref15\">[15]<\/a> It is part of the general mission of the ICRC to assess if the humanitarian right is applied when individuals suspected of terrorism are detained.<\/p>\n<p style=\"text-align: justify; padding-left: 40px;\">\u201cIndependent and neutral monitoring mechanisms, such as the International Committee of the Red Cross, should be granted access to these individuals, so that they can assist detaining authorities in ensuring that detainees are treated humanely and in conformity with applicable international law and standards.\u201d <a href=\"#_ftn16\" name=\"_ftnref16\">[16]<\/a><\/p>\n<p style=\"text-align: justify;\">ICRC do not hesitate to signal to the international community when \u201cunintended consequences of counterterrorism measures\u201d are \u201climiting humanitarian assistance\u201d and \u201cjeopardizing the neutral, impartial and independent humanitarian action\u201d<a href=\"#_ftn17\" name=\"_ftnref17\">[17]<\/a>. Since humanitarian work is based on neutrality and impartiality, ICRC remains extremely vigilant about the use and misuse of the humanitarian right in risky geopolitical and conflictual contexts. ICRC is aware that the credibility associated to IHL can be lost in the eyes of civil populations when military-humanitarian interventions are blurred \u2013 like in the case of a \u201cright\u201d to interfere militarily on humanitarian grounds or in the ideological context of the global \u201cwar on terror\u201d that has generalized the use of drones and other lethal weaponry in Central Asia and the Middle East. On the military side, new forms of CT and counter insurgency tactics are developed increasingly relying on artificial intelligence and unmanned systems (\u201cflying, high-resolution video cameras armed with missiles.\u201d). The question of their compliance with humanitarian and human rights is completely open and \u201cunthought\u201d, since the new warfare opposes on one side lethal algorithms (that assures \u201ccombatant immunity\u201d while limiting \u201ccollateral damage\u201d) to both combatants and non-combatants on the other side (with the omnipresent risk, in front of a faceless and ubiquitous adversary, of driving civilians into the arms of the terrorist enemy). Fighting militarily terrorism has imposed a new kind of nonconventional wars and asymmetrical conflicts. The new wars from afar that guarantee \u201csurgical strikes\u201d while \u201cprojecting power without projecting vulnerability\u201d require new amendments in humanitarian and human rights. The combination of humanitarian and military operations in the perception of populations caught in the middle contributes to a combined \u201chumilitarian\u201d action that at the same time kills and saves civilians near the areas of intervention, simultaneously produce targeted assassinations, and provide care.205 It appears that nowadays not only new \u2013 AI-based \u2013 forms and of both terrorism and CT<a href=\"#_ftn18\" name=\"_ftnref18\">[18]<\/a> may undermine the application of IHL and challenge the universality of human rights in the 21st century.<\/p>\n<p style=\"text-align: justify;\">&nbsp;<\/p>\n<h3 style=\"text-align: justify;\">Imbalance between security and human rights and gender issues<\/h3>\n<p style=\"text-align: justify;\">The UN have long integrated in their evaluation process the human rights and gender equality compliance. In 2011, a handbook was released which details step-by-step how these issues can be integrated into evaluation practice. <a href=\"#_ftn19\" name=\"_ftnref19\">[19]<\/a> These guidelines have been since promoted and adapted in other UN agencies\u2019 evaluation handbooks. Despite that \u201call UN interventions have a mandate to address HR &amp; GE issues\u201d, the necessity to provide a manual was a means to change real situations where \u201cinterventions do not always mainstream HR &amp; GE\u201d as it is stated in the UNEG handbook. Evaluation criteria to assess human rights and gender equality for the capacity of \u201cduty-bearers\u201d (state and non-state actors) and the benefit of \u201crights holders\u201d (grassroots communities, women, youth) have been adapted from the use of the well-known evaluation criteria of the Organization for Economic Co-operation and Development\u2019s (OECD) Development Assistance Committee (DAC): relevance, effectiveness, efficiency, impact, and sustainability.<\/p>\n<p style=\"text-align: justify;\">During the 2010s, most of evaluation\/audit\/assessment reports not only took into consideration HR and Gender issues but developed detailed sections in their final report to better quantify and qualify their integration in the monitoring and evaluation process. It is nowadays a prerequisite condition of any evaluation study to mainstream human rights and gender equality. Most, if not all, recent evaluation reports related to CT \u2013 as well as to all other UN activities \u2013 are sensitizing on these issues of global concern. \u201cAll UN evaluations address HR &amp; GE issues\u201d, but from the perspective of future improvement of evaluation studies, the question remains to determine if CT interventions do always mainstream HR &amp; GE, and consequently their direct and concrete impact on the rights holders is. Beyond the HR &amp; GE evaluation criteria and training curriculum, and considering the highly sensitive geopolitical, security military and judiciary issues at stake, the evaluation of the impact of human rights and gender mainstreaming is an extremely difficult task that requires far more robust long-term data than those studied and coded in evaluation\/audit\/assessment reports. It is beyond the current CT evaluation reports that focus on projects designed, programmed, and implemented in a very limited time (2-3 years). However, on the other hand, there exist actors, within the UN, that have the capacity to assess in a systematic monitoring and a long-term perspective the \u201cevaluability\u201d of the respect of human rights and gender issue: UN specialized agencies, independent international institutions, NGOs, and grassroots associations can establish a monitoring based on the depth of their engagement. Their presence and their influence in the UN Global Compact entities might guarantee that CT interventions may resolve conflictual problems and diminish VE while improving the situation of human rights and gender issue. Mainstreaming human rights and gender issue in projects and programmes does not necessarily traduce or imply real changes on the ground. For an expert working from an international observatory of human rights and gender condition who is not familiar with the evaluation approach, the systematic mentions and verification of the \u201cprerequisite\u201d in CT projects may appear essentially like an inescapable \u201cquality certification\u201d but it is not enough to establish that the said projects promote social conditions, individual freedom, and equality in treatment in risky geopolitical contexts. One of the best practices of evaluation process developed by a Compact entity is the one systematically applied by the UN Department of Political and Peacebuilding Affairs for all its projects. Instead of having a centralized and homogenized evaluation procedure systematically applied to different projects, contexts and countries, the Peacebuilding Fund requires that every financed PVE project must be evaluated by the recipients. Consequently, all evaluations are done with different actors on the field, organizations, methodological approaches. In this decentralized evaluation strategy, recipients are both participants and evaluators of the projects implemented. Furthermore, their evaluation is budgeted in the project itself. This innovative approach of evaluation allows more flexibility, adaptability, autonomy, and participation from the recipients. The evaluation architecture \u2013 the Peacebuilding Fund\u2019s recipients being the ones in charge of assessment \u2013 is evolutive and has the capacity to gain evaluation skills and knowledge on an empirical basis, by exploring different methods and allowing multiple ways of understanding the evaluation results<a href=\"#_ftn20\" name=\"_ftnref20\">[20]<\/a>. It also concretely traduces in real and risky geographies the behavior and institutional changes promoted by the Peacebuilding Fund. This best practice reflects the didactic aspect involved in an evaluation process, where negotiation and power are in the hands of different stakeholders. In the handbook Integrating Human Rights and Gender Equality in Evaluation a meaningful quotation from Joachim Theis, specialist of child protection and expert on evaluation and monitoring, is particularly highlighted:<\/p>\n<p style=\"text-align: justify; padding-left: 40px;\">\u201cA rights-based evaluation is not just a technical exercise in data collection and analysis. It is a dialogue and a democratic process to learn from each other, to strengthen accountability and to change power relations between stakeholders.\u201d <a href=\"#_ftn21\" name=\"_ftnref21\">[21]<\/a><\/p>\n<p style=\"text-align: justify;\">For all aspects related to fragilized communities, human rights, women, and youth in contexts of conflict and violence, the evaluation cannot be reduced at a top-down verification process that reports on \u201cgood or very good\u201d scores and results, it involves a complex relation of mutual dependency and trust, a negotiation and delegation of power between truly participating stakeholders.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>Evaluation, Stakeholders, Human Righs and Gender Equality<a href=\"#_ftn22\" name=\"_ftnref22\">[22]<\/a><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2412 aligncenter\" src=\"j\/wp-content\/uploads\/2022\/06\/Evaluation-Stakeholders-Human-Righs-and-Gender-Equality.jpg\" alt=\"\" width=\"632\" height=\"382\"><\/p>\n<p style=\"text-align: justify;\">Mainstreaming human rights and gender issue in CT evaluation reports somehow assesses the importance of these issues according to the specialization and areas of expertise of the UN Global Compact entities. It also reflects the priorities of decision-makers and donors, the actual balance between \u201chard\u201d security, military, judiciary treatments of CT and \u201csoft\u201d human rights, gender, socioeconomic empowerment, and development approaches. Entities working on the \u201csoft\u201d and no less strong and demanding methodologies may find a gap between statements, formal indications and the effective situation prevailing among fragilized communities or within oppressive regimes fully engaged in the CT mobilization. Since there is no consequent funding on human rights issues within the UN Global Compact entities (that might holds the comparison with the funding of \u201charder\u201d and \u201cover-securitized\u201d issues), mainstreaming human rights and gender issue appear to the UN human rights community more as a \u201crhetorical\u201d and \u201ctalismanic\u201d practice (recurrent keywords appropriately disseminated in security-oriented reports allow them to be ranked among \u201cHR &amp; GE\u201d ones) than a dedicated and in-situ engagement in the fight against terrorism and VE. MS have expressed on many occasion the importance to include the global civil society in their fight against terrorism, but its absence in the UN Global Compact entities remains problematic, especially when discourses call on inclusiveness. If the civil society and NGOs are excluded, the risk is to develop human rights and gender mainstreaming in an intellectually closed and poor space where no critical assessment is made possible.<\/p>\n<p style=\"text-align: justify;\">What has been confirmed in the interviews is that the most outstanding asset of the Global Compact entities consists in the richness of approaches and expertise, the diversity of communities that constitute it. But these communities objectively don\u2019t have the same weight and influence in the access to funding, decision-making mechanism, design of projects and programmes within the UN Global Compact entities. The human rights compliance after all remains rather weak when at the same time, security measures are in a certain manner believed to be the priority ones that can stop terrorist threats. This significant imbalance is a reality beyond the large UN CT community. Security policies are the top priorities in the international affairs since 11 September 2001, and behind large-scale military interventions conducted (in Iraq, Afghanistan, and Libya) with the support of the international community, the working hypothesis is that is possible to simultaneously defeat terrorism, export and implement democracy in \u201cfragilized\u201d and\/or \u201crogue\u201d states. The assessment of the empirical evidence of this hypothetical assumption (security and democracy can be imposed by legal force, exported, and therefore overcome de facto an illegitimate violence) is not attested and never required by any international terrorism monitoring centre. The research community, including the one that is working with many UN agencies (members and non-members of the UN Global Compact entities), has considerably contributed to our understanding of some fundamental concepts such as the human rights and gender equality development: it has the scientific ability to critically review our understanding of violence &#8211; be it (il)legal, (il)legitimate, (inter)national, extreme &#8211; and its intricate links to state, security and power relations. It is probable that our understanding of violence will considerably evolve during the 21st century as well as our shared views on development considerably progressed over time. What is important to notice here is that we assume without robust data and empirical evidence:<\/p>\n<p style=\"text-align: justify; padding-left: 40px;\">\u201cFirst that all forms of violence are commensurate, such that it makes sense to say that \u2018violence\u2019 is on the increase or alternatively on the decline, globally and nationally. Second, that it can be measured and fitted into causal models, on the one hand of its causes or determinants; and on the other hand of its developmental and other impacts. Third, that violence by its nature unsettles established political and social orders and is thus inseparable from state failure or fragility and also from wider international insecurity. Fourth, that violence is the polar opposite of security, just as war is the absence of peace. And fifth, that violence and insecurity can be portrayed as \u2018development in reverse\u2019, or to put it the other way around, security is an essential prerequisite of development. All of these assumptions are open to question and debate\u201d <a href=\"#_ftn23\" name=\"_ftnref23\">[23]<\/a>.<\/p>\n<p style=\"text-align: justify;\">A certain number of hidden assumptions and premises are guiding our perception of violence as a process that is linear (more security will lead to a state of violence diminishing returns) and homogenous despite the variety of its manifestations (organized crime, jihadism, pastoral conflicts, urban riots, vigilantism, paramilitary violence, law enforcement and traditional authorities violence, electoral and political violence, ethnic cleansing, forced migration, human trafficking, domestic violence, sexual violence, etc.). The phenomenology of 21st violence is multifaceted, multicausal and eminently complex and the lack of knowledge on these dimensions within the UN Global Compact entities can be solved only by a significant investment of the international scientific research community \u2013 especially within the UN, notably through its dedicated institutes \u2013 and the inclusion of the global civil society through its planetary network of NGOs and grassroots associations. The historical moment is particularly appropriate to engage an intellectual debate on these issues of global concern. Our perception of violence must evolve since its manifestations differ radically from 20th century (two world wars, a mass genocide, and dozens of millions of deaths) to 21st century (with a myriad of nonlinear, asymmetrical, and low-intensity conflicts at the horizon). If we were to compare with our apprehension of the notion of development \u2013 which is part of the core mission of the UN -, we may observe that it has changed from the linear and universal stages of economic development <a href=\"#_ftn24\" name=\"_ftnref24\">[24]<\/a>, &nbsp;a dominant paradigm in the 1960s to the human development index adopted by the UN in the 1990s. Research centres and institute of development studies on their side have contributed to criticize the conventional understandings of determined and linear development and their premises, they have encouraged the knowledge production of different schools of thought from North and South that have considerably enriched the debate which has been later shared with the civil society and the grassroots organizations. Those who elaborated the socioeconomic visions that became global shared views on development were above all scholars: from the classical works done by American economist (and former national security adviser to the US presidency) Walt Whitman Rostow to those elaborated by the Pakistani economist (and former finance minister) Mahbub ul Haq, we see how in a time frame of thirty years, development has meant and expressed different quests &#8211; from material prosperity to human wellbeing and ecological sustainability \u2013 as well as different focus and needs. Similarly, with a critical distance of twenty years of CT mobilization, it is timely appropriate to engage in a global intellectual debate, to stimulate research and to explore new paradigms for security, peace, and violence studies. New understandings of the contemporary violence might consequently better integrate human rights and gender issue if the Global Compact entities could fully integrate the vast UN human rights community and progressively shift from the viewpoints of the MS actors \u2013 for whom security is a prior step conducive to peace, development, democracy \u2013 to more empirical and vernacular viewpoints reflected by the perceptions and representations of the populations concerned \u2013 whose sense of safety doesn\u2019t necessarily coincide with MS\u2019 concern but is no less essential.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: right;\">Reda Benkirane<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Notes:<\/strong><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> This first independent meta-synthesis of evaluation and oversight was commissioned by the Sub-Group on Evaluation of the Resource Mobilization, Monitoring and Evaluation Working Group of the United Nations Global Counter-Terrorism Coordination Compact. It provides collective results from an analysis of over 118 evaluation and oversight reports across Compact entities and has led to aggregated findings, conclusions, lessons learned and recommendations for use by Compact entities in the delivery of quality technical assistance.&nbsp; This report was prepared by an external evaluation team consisting of Dr. Punit Arora (Team Leader), Dr. Reda Benkirane (Counter-Terrorism Expert) and Ms. Xiomara Chavez (Evaluation Expert). <a href=\"https:\/\/www.un.org\/counterterrorism\/sites\/www.un.org.counterterrorism\/files\/meta-synthesis_united_nations_global_counter_terrorism_strategy.pdf\">https:\/\/www.un.org\/counterterrorism\/sites\/www.un.org.counterterrorism\/files\/meta-synthesis_united_nations_global_counter_terrorism_strategy.pdf<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> Report of the Special Rapporteur on the promotion and protection of human rights and fundament al freedoms while countering terrorism, Martin Scheinin, E\/CN.4\/2006\/98, 28 December 2005, p. 9. &nbsp;&nbsp;<a href=\"https:\/\/digitallibrary.un.org\/record\/564925?ln=fr\">https:\/\/digitallibrary.un.org\/record\/564925?ln=fr<\/a> &nbsp;&nbsp;<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> Security &nbsp;Council &nbsp;resolution 1566 (2004) call &nbsp;all &nbsp;States &nbsp;to cooperate &nbsp;in the fight &nbsp;against&nbsp; &nbsp;terrorism&nbsp; &nbsp;by preventing &nbsp;and punishing &nbsp;acts having &nbsp;the three&nbsp; cumulative &nbsp;characteristics: &nbsp;\u201c(a) &nbsp;acts committed &nbsp;with the intention&nbsp;&nbsp; of causing &nbsp;death &nbsp;or serious &nbsp;bodily &nbsp;injury, &nbsp;or the taking &nbsp;of hostages; &nbsp;(b) for the purpose &nbsp;of provoking &nbsp;a state &nbsp;of terror, &nbsp;intimidating &nbsp;a population, &nbsp;or compelling &nbsp;a Government&nbsp; &nbsp;or international &nbsp;organization &nbsp;to do or abstain &nbsp;from doing any act; and (c) constituting &nbsp;offences &nbsp;within &nbsp;the scope &nbsp;of and as defined&nbsp; &nbsp;in the international &nbsp;conventions &nbsp;and protocols &nbsp;relating &nbsp;to terrorism.\u201d&nbsp; &nbsp;Ibid, p. 11.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> Among the prominent victims of anarchist &nbsp;terrorism, there &nbsp;are &nbsp;the Russian&nbsp; &nbsp;Tsar &nbsp;Alexander&nbsp;&nbsp; II in 1881, the Empress &nbsp;of Austria &nbsp;and Queen &nbsp;of Hungary &nbsp;Sisi &nbsp;in 1896, the Italian &nbsp;King Umberto &nbsp;in 1901, the French &nbsp;President&nbsp; &nbsp;Sadi Carnot &nbsp;in 1894, the US President&nbsp; &nbsp;William&nbsp; &nbsp;McKinley&nbsp;&nbsp; in 1901, the Spanish &nbsp;Prime &nbsp;Ministers Antonio &nbsp;C\u00e1novas del Castillo&nbsp; &nbsp;in 1897 and Eduardo &nbsp;Dato in 1920\u2026 Nationalist&nbsp; &nbsp;violence &nbsp;has also &nbsp;been &nbsp;responsible &nbsp;for countless &nbsp;attacks, &nbsp;the most famous &nbsp;being &nbsp;the political &nbsp;event &nbsp;that started &nbsp;the First World &nbsp;War, that is the assassination in 1914 of Archduke &nbsp;Franz &nbsp;Ferdinand&nbsp; &nbsp;of Austria in Sarajevo&nbsp; &nbsp;by a clandestine&nbsp; &nbsp;group of Serbian &nbsp;nationalist s. This kind of highly symbolic&nbsp; &nbsp;and traumatic&nbsp; &nbsp;violence \u2013 killings of crowned heads and president s by ordinary citizens in the name of an ideology&nbsp; &nbsp;\u2013 is out of reach of current globalized terrorist groups.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> Samuel Huntington\u2019 s theory was first introduced in his article \u201cThe Clash of Civilizations?\u201d, <em>Foreign<\/em><em>&nbsp; &nbsp;Affair s<\/em>, vol. 72, no. 3, Summer 1993, pp. 22\u201349, before being exposed as a bestseller book, <em>The Clash of Civilizations and the Remaking<\/em> <em>of<\/em> <em>World Order<\/em>, New York, Simon &amp; Schuster, 1996.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> On the violent \u201cmovement s of rage\u201d, see Glenn E. Robinson, Global Jihad: &nbsp;A Brief History, Stanford, Stanford University Press, 2020. For a critical review&nbsp; &nbsp;and a more nuanced appreciation on the fact that \u201crage does not explain everything\u201d, see Farhad Khosrokhavar, \u201c<a href=\"https:\/\/laviedesidees.fr\/De-la-rage-au-djihad.html\">De la rage au jihad\u201d<\/a>, &nbsp;<em>La Vie des id\u00e9es<\/em>, 17 February 2021.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> Pankaj Mishra, <em>The Age of Anger. &nbsp;A History of the Present<\/em>, London, Allen Lane, 2017.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref8\" name=\"_ftn8\">[8]<\/a> \u201cWe must return to the convulsions of that [resentment, nihilist and anarchist] period in order to understand our own age of anger. &nbsp;For the Frenchmen&nbsp; &nbsp;who bombed music halls, caf\u00e9s and the Paris stock exchange in the late nineteenth&nbsp; &nbsp;century, and the French anarchist newspaper&nbsp;&nbsp; that issued the call to \u2018destroy\u2019 the \u2018den\u2019 (a music hall in Lyon) where \u2018the fine flower of the bourgeoisie and of commerce\u2019&nbsp; &nbsp;gather after midnight, have more in common than we realize with the ISIS-inspired young EU citizen s who massacred nearly two hundred people at a rock concert, bars and restaurants in Paris in November 2015. Much in our experience resonates with that of people in the nineteenth century. &nbsp;German and then Italian nationalist s called for a \u2018holy war\u2019 more than a century before the word \u2018jihad\u2019 entered common parlance, and young Europeans all through the nineteenth century joined political crusades in remote places, resolved&nbsp; &nbsp;on liberty or death.\u201d &nbsp;Ibid., p. 11.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref9\" name=\"_ftn9\">[9]<\/a> All observers and experts of Boko Haram recognize that from the creation&nbsp;&nbsp; of the group until 2009, the Nigerian association&nbsp; &nbsp;was a pietistic&nbsp; &nbsp;and non-violent&nbsp; &nbsp;one.&nbsp; It is only after the arrest and the death of Boko Haram\u2019s leader, Muhammad&nbsp; &nbsp;Yusuf, and many of his followers, that the group entered&nbsp; &nbsp;the cycle of armed violence. Regarding the name \u201cAssociation of the People of the Sunna for Preaching and Jihad\u201d, here again the use of the word \u201cjihad\u201d may be misleading for experts and research er s who are not familiar&nbsp; &nbsp;with the Islamic faith. &nbsp;The Arabic word \u201cjihad\u201d is one of the most searched word in Google and it means literarily \u201ceffort\u201d, \u201cforce\u201d. &nbsp;It has no intrinsic martial connotation, even in the Quran, the sacred book of Muslims, the mention of jihad refers in most occurrences to the \u201ceffort\u201d of spiritual, introspective, meditative nature. So asking Muslim leaders and clerics to \u201ccondemn jihad\u201d is a complete misunderstanding (but an ideological victory for those groups who promote it in the form of \u201choly war\u201d) since it would be equivalent to remove one fundament al aspect of the Islamic faith. &nbsp;We may say that jihadism is a modern ideologic al and bellicose interpret at io n&nbsp; &nbsp;of the religious notion of \u201cjihad\u201d like Islamism&nbsp; &nbsp;is a socio-politic al interpret at io n of Islam.<\/p>\n<p style=\"text-align: justify;\">Jihadism&nbsp;&nbsp; emerged&nbsp; &nbsp;gradually as an extremist&nbsp; &nbsp;ideology in Afghanistan during the nine-year guerrilla (1980-1989) against the Soviet occupation of Afghanistan.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref10\" name=\"_ftn10\">[10]<\/a> \u201cThe GCTF is an informal, apolitical, multilateral counterterrorism (CT) platform that contributes to the international architecture for addressing terrorism.&nbsp;&nbsp; The GCTF\u2019s mission&nbsp; &nbsp;is to diminish&nbsp;&nbsp; terrorist recruitment&nbsp; &nbsp;and increase countries\u2019 civilian capabilities for dealing with terrorist threats within their borders and regions.&nbsp; &nbsp;(\u2026)<\/p>\n<p style=\"text-align: justify;\">A main objective of the Forum is to support and catalyze implementation of the United Nations (UN) Global Counter-Terrorism Strategy, reviewed in June 2021, and the UN CT Framework more broadly, including for instance the UN Secretary-General\u2019s Plan of Action to Prevent Violent Extremism presented to the UN General Assembly in January 2016. The GCTF works closely with UN bodies to pursue this goal.\u201d <a href=\"https:\/\/www.thegctf.org\/Who-we-are\/Background-and-Mission\">https:\/\/www.thegctf.org\/Who-we-are\/Background-and-Mission<\/a> &nbsp;&nbsp;<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref11\" name=\"_ftn11\">[11]<\/a> &nbsp;\u201cHedayah is the premier international organization dedicated to using its expertise and experiences to countering violent extremism (CVE) in all of its forms and manifestations through dialogue, communications, capacity building programs, research and analysis\u201d. <a href=\"https:\/\/www.hedayahcenter.org\/about\/\">https:\/\/www.hedayahcenter.org\/about\/<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref12\" name=\"_ftn12\">[12]<\/a> \u201cThe International Institute for Justice and the Rule of Law (IIJ) provides rule of law-based training to lawmakers, police, prosecutors,&nbsp;&nbsp; judges,&nbsp; &nbsp;corrections&nbsp; &nbsp;officials,&nbsp; &nbsp;and &nbsp;other &nbsp;justice&nbsp; &nbsp;sector&nbsp; &nbsp;stakeholders&nbsp; &nbsp;on how &nbsp;to address&nbsp; &nbsp;terrorism&nbsp;&nbsp; &nbsp;and related&nbsp; &nbsp;transnational&nbsp; &nbsp;criminal&nbsp; &nbsp;activities&nbsp; &nbsp;within&nbsp; &nbsp;a rule &nbsp;of law &nbsp;framework.\u201d <a href=\"https:\/\/www.theiij.org\/about-us\/\">https:\/\/www.theiij.org\/about-us\/<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref13\" name=\"_ftn13\">[13]<\/a> The White House Summit to Counter Violent Extremism Ministerial Meetin g Statement, 19 February 2015,<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/2009-2017.state.gov\/j\/ct\/cvesummit\/releases\/237673.htm\">https:\/\/2009-2017.state.gov\/j\/ct\/cvesummit\/releases\/237673.htm<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref14\" name=\"_ftn14\">[14]<\/a> Challenges for IHL &#8211; terrorism:&nbsp; overview, 29 October&nbsp; &nbsp;2010. <a href=\"https:\/\/www.icrc.org\/en\/document\/challenges-ihl-terrorism\">https:\/\/www.icrc.org\/en\/document\/challenges-ihl-terrorism<\/a> &nbsp;&nbsp;<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref15\" name=\"_ftn15\">[15]<\/a> Counter-terrorism&nbsp;&nbsp; &nbsp;activities&nbsp; &nbsp;must respect&nbsp;&nbsp; &nbsp;protections&nbsp; &nbsp;afforded&nbsp;&nbsp; &nbsp;by international&nbsp; &nbsp;humanitarian&nbsp;&nbsp; &nbsp;law. &nbsp;Statement&nbsp; &nbsp;to UN General&nbsp; &nbsp;Assembly&nbsp;&nbsp;&nbsp; Sixth Committee&nbsp; &nbsp;Meeting&nbsp; &nbsp;on &#8220;Measures&nbsp; &nbsp;to Eliminate&nbsp; &nbsp;International&nbsp; &nbsp;Terrorism &#8220;,&nbsp;&nbsp; &nbsp;10 &nbsp;October&nbsp; &nbsp;2019. <u>https:\/\/www.icrc.org\/en\/document\/counter-terrorism-activities-must-respect-protections-afforded-international-humanitarian<\/u><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref16\" name=\"_ftn16\">[16]<\/a> Ibid.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref17\" name=\"_ftn17\">[17]<\/a> \u201cIn recent months the ICRC has faced several challenging situations which have delayed&nbsp;&nbsp; or blocked our ability to protect and assist&nbsp; &nbsp;people affected&nbsp; &nbsp;by conflict and violence.&nbsp; &nbsp;These have come in diverse forms, including domestic counter-terror ism legislation, criminal laws, sanctions regimes and measures, clauses in grant contracts, de-risk in g measures, or simply politically -motivated or security -based&nbsp;&nbsp; restriction s,&nbsp; or economic &nbsp;activities &nbsp;in theatres &nbsp;of conflict &nbsp;in which we operate.\u201d &nbsp;Combatting terrorism should not come at the expense of humanitarian action or principles.<\/p>\n<p style=\"text-align: justify;\">Remarks&nbsp; &nbsp;to UN General&nbsp; &nbsp;Assembly&nbsp;&nbsp; &nbsp;High-Level&nbsp; &nbsp;Side Event&nbsp; &nbsp;on &#8220;Counter-terrorism&nbsp;&nbsp; Frameworks and Sanctions&nbsp; &nbsp;Regimes: Safeguarding&nbsp; &nbsp;Humanitarian&nbsp; &nbsp;Space&#8221;, 26 September 2019. <a href=\"https:\/\/www.icrc.org\/en\/document\/combatting-terrorism-should-not-come-expense-humanitarian-action-or-principles\">https:\/\/www.icrc.org\/en\/document\/combatting-terrorism-should-not-come-expense-humanitarian-action-or-principles<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref18\" name=\"_ftn18\">[18]<\/a> On AI and counter terrorism, cf. the joint UNICRI-UNOCCT recent reports Algorithms and Terrorism: The Malicious Use &nbsp;of Artificial&nbsp; Intelligence for Terrorist&nbsp; Purposes,&nbsp; &nbsp;2021, (<a href=\"https:\/\/unicri.it\/News\/Algorithms-Terrorism-Malicious-Use-Artificial-Intelligence-Terrorist-Purposes)\">https:\/\/unicri.it\/News\/Algorithms-Terrorism-Malicious-Use-Artificial-Intelligence-Terrorist-Purposes)<\/a> and Countering&nbsp; &nbsp;Terrorism&nbsp;&nbsp; &nbsp;Online&nbsp; &nbsp;with Artificial&nbsp; &nbsp;Intelligence.&nbsp;&nbsp; &nbsp;An Overview&nbsp;&nbsp; &nbsp;for Law Enforcement&nbsp;&nbsp; &nbsp;and Counter-Terrorism Agencies&nbsp; &nbsp;in South Asia&nbsp; &nbsp;and South-East Asia,&nbsp; 2021 (<a href=\"https:\/\/unicri.it\/Publications\/Countering-Terrorism-Online-with-Artificial-Intelligence-%20SouthAsia-South-EastAsia\">https:\/\/unicri.it\/Publications\/Countering-Terrorism-Online-with-Artificial-Intelligence-%20SouthAsia-South-EastAsia<\/a>).<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref19\" name=\"_ftn19\">[19]<\/a> Integrating Human Rights and Gender Equality in Evaluation. &nbsp;Towards UNEG Guidance, UNEG\/G(201 1 )2,<u> http:\/\/www.uneval.org\/document\/detail\/980<\/u><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref20\" name=\"_ftn20\">[20]<\/a> For an overview of the Peacebuilding Fund\u2019s evaluations, consult the thematic and country reviews available online:<u> https:\/\/www.un.org\/peacebuilding\/fund\/documents\/evaluations<\/u><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref21\" name=\"_ftn21\">[21]<\/a> Joachim Theis, \u201cRights-based Monitoring and Evaluation. A Discussion Paper\u201d, Save the Children, April 2003. <a href=\"https:\/\/archive.crin.org\/en\/docs\/resources\/publications\/hrbap\/RBA_monitoring_evaluation.pdf\">https:\/\/archive.crin.org\/en\/docs\/resources\/publications\/hrbap\/RBA_monitoring_evaluation.pdf<\/a> &nbsp;<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref22\" name=\"_ftn22\">[22]<\/a> Schematic table after and inspired from Joachim Theis\u2019 illustration, Ibid.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref23\" name=\"_ftn23\">[23]<\/a> Robin Luckham, \u201cWhose violence, whose security? &nbsp;Can violence reduction and security work for poor, excluded and vulnerable people?\u201d, Peacebuilding, Volume 5, 2017 &#8211; Issue 2: Security in the Vernacular.<br \/>\n<a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/21647259.2016.1277009\">https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/21647259.2016.1277009<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref24\" name=\"_ftn24\">[24]<\/a> Namely 1) traditional society, 2) precondition s to take-off, 3) take-off, 4) drive to maturity, and 5) age of high mass consumption. &nbsp;Cf. Walt Whitman Rostow, <em>The Stages of Economic Growth: &nbsp;A Non-Communist Manifesto<\/em>. Cambridge University Press, 1960.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Reda Benkirane Extracts from the Independent Meta-synthesis under the Global Counter-Terrorism Strategy[1], United Nations, December 2021. (PDF version) &nbsp; Undefined notions of terrorism\/counter-terrorism There is no clear definition or shared understanding on terrorism or CT. A shared understanding of what constitutes CT is critical for the evaluation, assessment, audit,&#8230; <a class=\"continue-reading-link\" href=\"https:\/\/reda.archipress.org\/?p=2435\">Lire plus \/ Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-2435","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/reda.archipress.org\/index.php?rest_route=\/wp\/v2\/posts\/2435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reda.archipress.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reda.archipress.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reda.archipress.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reda.archipress.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2435"}],"version-history":[{"count":0,"href":"https:\/\/reda.archipress.org\/index.php?rest_route=\/wp\/v2\/posts\/2435\/revisions"}],"wp:attachment":[{"href":"https:\/\/reda.archipress.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reda.archipress.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reda.archipress.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}