Countering Violent Extremism (CVE) Questions

Screen Shot 2015-01-11 at 6.44.43 PMAs a group of Muslim women organizers, we have compiled a list of questions from our various discussions with Muslim activists on concerns regarding the Countering Violent Extremism (CVE) programs in the country, and their explicit focus on Muslim American communities.

We will also be updating this page to include a list of articles and resources to better understand CVE. In order to follow this discussion, please follow #CVESpeakout online to contribute links, resources, and questions.

Click Here for PDF on Questions for Participants – CVE SummitQuestions

Questions for Attendees Re: Countering Violent Extremism Summit (CVE)

By Darakshan Raja, Washington Peace Center,

Dr. Maha Hilal, National Coalition to Protect Civil Freedoms,

Ramah Kudaimi, Washington Peace Center,

Operational Definitions of Countering Violent Extremism and Extant Research:

  1. What are the operational definitions of radicalization, extremism, and terrorism that federal, state, and local law enforcement agencies utilize in their programming? On what research is this definition(s) based?
  2. Are there CVE instruments or at-risk tools that have been piloted and evaluated for effectiveness?  If so what are these tools and where have they been piloted? Also, what does effectiveness mean?
  3. What are the factors that government agencies use to predict individuals’ propensity to commit acts of terrorism?
  4. What is the relationship between prevalence of terrorism and proportionately of responses from the government?
  5. What is the government’s justification or rationale, for suggesting a different set of factors as cause for Muslims committing acts of terrorism? On what research is this based?
  6. How does the government justify differential policy changes based on perpetrator identity?
  7. Is there data available on the effectiveness of previously implemented CVE programs in preventing terrorism that includes a cost-benefit analysis?

CVE Funding, Test Site Determination, and Program Monitoring:

  1. How are CVE programs funded? Where is the funding coming from?
  2. How are CVE program recipients identified?
  3. Are there oversight mechanisms built into these CVE programs? Is there an independent community entity responsible for monitoring the program?
  4. How does this impact policing for Muslim communities and other local communities?

Rights Preservation and CVE:

  1. Will the new CVE programming focus on preservation of first amendment rights? To what extent, if any, are first amendment rights of Muslims and Muslim Americans discussed in the realm of CVE programming?
  2. To what extent, if any, are CVE measures discussed in terms of how freedom of religious may be undermined as a result of these measures?
  3. How should recipients of CVE programs interpret apparent violations of the establishment clause vis-à-vis such measures (i.e. focusing on one particular religious group)?

Educational Resources with Links to Documents

Article (Guardian): Obama wants to ‘counter violent extremism’. He should look beyond Muslims by Deepa Iyer and Linda Sarsour

Article (The Intercept): Is Your Child a Terrorist? U.S. Government Questionnaire Rates Families at Risk for Extremism By Murtaza Hussain, Cora Currier, and Jana Winter

Article (The Intercept): Spies Among Us: How Community Outreach Programs to Muslims Blur Lines between Outreach and Intelligence By Cora Currier

Journal Article: Policing Terrorists in the Community by Sahar F. Aziz (Harvard National Security Journal)

Report: Mapping Muslims: NYPD Spying and It’s Impact on American Muslims

Report: Southern Poverty Law Center’s Report: Age of the Wolf

Report: Under Suspicion, Under Attack: Xenophobic Political Rhetoric and Hate Violence Against South Asian, Muslim, Sikh, Hindu, Middle Eastern, and Arab Communities in the United States

One thought on “Countering Violent Extremism (CVE) Questions

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s