Figure 1 - uploaded by Tiffiany Howard
Content may be subject to copyright.
Counterterrorism Context.

Counterterrorism Context.

Contexts in source publication

Context 1
... reality, they are far from distinct. What happens operationally has significant impacts in the marketplace of ideas (Figure 1). This interrelationship is highlighted by any number of issues. ...
Context 2
... The Administration's CVE strategy depends on federal agencies cooperating with local groups to expand engagement efforts and to foster preventative programming -to build resilience against violent extremist radicalization.‖ 22 In fact, it highlights a -community-based approach‖ for the federal government, and much of the activity it describes will take place in the -marketplace of ideas‖ described in Figure 1. To this end, the federal government most effectively acts as a -facilitator, convener, and source of information.‖ ...
Context 3
... inherent challenge to building trust and partnership involves law enforcement investigative activities and tactics that can be perceived to unfairly target law-abiding citizens or infringe on speech, religion, assembly, or due process rights. This challenge highlights how government counterterrorism work in the secretive operational realm depicted in Figure 1 can influence engagement conducted in the open marketplace of ideas. If a community views government counterterrorism investigative activity as overly aggressive, it may not willingly cooperate in engagement programs. ...
Context 4
... FBI and DOJ have limited their ties to the Council on American-Islamic Relations (CAIR), because DOJ listed the group as an unindicted co-conspirator in a federal terrorism case. 69 This is an example of the dynamics described in Figure 1-the secretive (operational) realm driving community engagement activity in the marketplace of ideas. In November 2008, the Holy Land Foundation for Relief and Development and five of its leaders were convicted of providing material support to Hamas, a designated foreign terrorist organization. ...
Context 5
... the federal government be concerned about the over-classification of radicalization-related research and training material by the security agencies involved in its development? The SIP's second objective is an area in which a great deal of activity can occur behind closed doors (within the secretive realm described in Figure 1), especially if the objective largely involves security, intelligence, and law enforcement agencies that typically avoid public disclosure of much of their other work. However, the steps involved in the radicalization process involve largely constitutionally-protected activity that occurs in the public sphere. ...