You are on page 1of 12

stability Khalil, J and Zeuthen, M 2014 A Case Study of Counter Violent Extremism

(CVE) Programming: Lessons from OTIs Kenya Transition Initiative. Stability:


International Journal of Security & Development, 3(1): 31, pp.1-12, DOI:
http://dx.doi.org/10.5334/sta.ee

RESEARCH ARTICLE

A Case Study of Counter Violent Extremism


(CVE) Programming: Lessons from OTIs
Kenya Transition Initiative
James Khalil* and Martine Zeuthen

Between 2011 and 2014 the USAID Office of Transition Initiatives (OTI)s Kenya
Transition Initiative implemented what was essentially a pilot program of the new
Countering Violent Extremism (CVE) concept. Aiming to counter the drivers of
violent extremism (VE), this operated through a system of small grants funding
activities such as livelihood training, cultural events, community debates on
sensitive topics, counselling for post-traumatic stress disorder, and so on. This
paper delivers lessons from the program, generated via an independent evaluation,
offering insights of relevance to the broader CVE community of practitioners. A first
overarching conclusion is that programming decisions would have benefitted from a
more comprehensive understanding of VE in the local context. For instance, subsets
of the population more narrowly at-risk of being attracted to VE should have been
identified and targeted (e.g. potentially teenagers, ex-convicts, members of specific
clans, and so on), and a greater focus should have been placed upon comprehending
the relevance of material incentives, fear, status-seeking, adventure-seeking, and
other such individual-level drivers. A second conclusion is that the KTI team would
have profited from additional top-level guidance from their donors, for instance,
providing direction on the extent to which efforts should have been targeted at
those supportive of violence versus those directly involved in its creation, the
risks associated with donor branding, and contexts in which the pejorative term
extremism should have been pragmatically replaced by neutral terminology. As a
priority donors and the wider community should also provide suitable definitions
of the CVE concept, rather than leaving practitioners to construe (undoubtedly
inconsistently) its meaning from the available definitions of VE.

Introduction responsibility and maintaining that it was


The September 2013 attack at the Westgate conducted in revenge against Kenyan military
shopping mall brought worldwide atten- operations in Somalia.1 However, this par-
tion to Kenya, with Al-Shabaab claiming ticular incident represents only one of many
examples of violent extremism (VE) in Kenya
over in recent years, and indeed the intensity
* Independent Conflict Specialist, London, UK
jamiekalil@yahoo.com
has escalated over recent months. Home to
Evaluation Consultant and Specialist in CVE in
many individuals of Somali descent, Nairobis
the Horn of Africa, Nairobi, Kenya district of Eastleigh is one prominent VE hot-
mzeuthen@gmail.com spot. Such violence also occurs with relative
Art.31, page2 of 12 Khalil and Zeuthen: A Case Study of Counter Violent Extremism (CVE) Programming

frequency along the Kenyan coast, both driven security initiative.3 We also believe that its
by and provoking elevated tensions between relevance is heightened both because the
religious communities, particularly after the CVE concept continues to grow in promi-
killing of prominent clerics such as Sheikhs nence amongst US and European donors, and
Aboud Rogo (August 2012), Ibrahim Rogo as many insights presented in this paper are
(October 2013), Abubakar Shariff (April 2014), also of substantial relevance to stabilization,
and Idris Mohamed (June 2014). counterterrorism and other related forms of
Within this tense context USAIDs Office of programming. Although it is unfortunately
Transition Initiative (OTI) implemented what not possible to provide additional details
was essentially a pilot program of the new given the sensitive nature of the program,
Countering Violent Extremism (CVE) con- during the field research we collected con-
cept, forming one component of the wider siderable qualitative evidence to suggest that
Kenya Transition Initiative (KTI). Between KTIs efforts achieved a positive impact in dis-
2011 and 2013 the program was operational suading certain individuals from following
in Eastleigh and its environs, and in 2012 the VE path. We also concluded that a criti-
it was expanded to the coastal regions of cal strength of the program was its flexibility,
Lamu, Kilifi, Kwale, Malindi and Mombasa. It enabling rapid responses to the aftermath of
was delivered via a flexible funding mecha- specific incidents such as the Westgate attack
nism that supported individuals, networks and the killing of Sheikh Aboud Rogo. It also
and organisations, often with small grants showed flexibility in its ability to scale-up
implemented over a short duration. These associations with successful grantees.
grants funded a broad range of activities This essay is structured loosely to reflect
aiming to counter the drivers of VE, includ- the KTI program lifecycle, sequentially focus-
ing livelihood training, community debates sing upon the goal statement, drivers of VE,
on sensitive topics, cultural events, counsel- vulnerable population subsets, the interven-
ling for post-traumatic stress disorder, and so tion logic, and negative effects. The final sec-
on. While the CVE concept is essentially still tion delivers two overarching conclusions
under development (as discussed below), it intended to be of relevance to the wider CVE
now commonly forms one component of a community. Firstly, we argue that KTI pro-
wider response to VE that also incorporates gramming decisions would have benefitted
law-enforcement, counterterrorism, develop- from a more comprehensive understanding
ment and other initiatives. While this article of VE within the local context. For instance,
focuses narrowly upon CVE programming, a subsets of the population more narrowly at-
key determinant of the extent to which VE risk of being attracted to VE should have been
is countered will undoubtedly be the degree identified and targeted (potentially including
to which these diverse efforts are adequately teenagers, members of specific clans, ex-con-
prioritized and coordinated. victs, etc.), and a greater focus should have
With the KTI team eager for the lessons been placed upon comprehending the role
from this pilot to be disseminated to the of material incentives, fear, status-seeking,
wider community of CVE practitioners, adventure-seeking, and other individual-level
this essay summarises a qualitative evalua- drivers. A second is that the KTI team would
tion undertaken by Integrity Research and have profited from additional top-level guid-
Consultancy as part of the program close- ance from their donors, for instance, provid-
down phase.2 With implementing organi- ing direction on the extent to which efforts
zations rarely willing and/or able to reveal should have been targeted at those support-
their lessons learned to a broader audience, ive of violence versus those directly involved
we believe that it offers the reader a rare in its creation, the risks associated with inap-
access inside a highly significant US-funded propriate donor branding, and the contexts in
Khalil and Zeuthen: A Case Study of Counter Violent Extremism (CVE) Programming Art.31, page3 of 12

which the pejorative term extremism should that is actively pursued. Seeking to coun-
be pragmatically replaced by neutral termi- ter this common perception, Marc Sageman
nology. As a priority donors and the wider (2004: 122) asserts that joining the jihad
community should also provide suitable defi- is more akin to the process of applying to a
nitions of the CVE concept, rather than leav- highly selective college. He continues that
ing practitioners to construe, undoubtedly many try to get in but only a few succeed,
inconsistently, its meaning from the avail- and that candidates are enthusiastic rather
able definitions of VE. than reluctant (Sageman 2004: 122). While
counterexamples certainly do exist of VE enti-
Defining the program goal ties actively recruiting from the populace, the
Providing a platform for the subsequent dis- wider point is that it is mistaken to assume
cussions, and CVE objective-setting more that enlistment is solely a top-down process.
broadly, this initial section comments upon Of greater relevance still, the language
the KTI program goal statement, stipulated is somewhat ambiguous, and this reflects
as: Stronger identity and self-confidence of broader issues that remain with the con-
youth to allow them to reject extremism. ceptualisation of CVE. Indeed, the concept
This statement is problematic for a variety of CVE is itself rarely defined by donors, and
of reasons. Firstly, we argue that the term this undoubtedly results in inconsistent
identity should have been omitted given interpretations as implementers are simply
that the relationship between this concept left to construe its meaning from the avail-
and VE is highly complex and nuanced (e.g. able definitions of VE. Compounding this
Schwartz et al 2009), and this runs counter to issue, the VE concept is extremely broad as
the need to maintain simplicity in the over- it focuses upon both those directly involved
arching goal.4 Indeed, there was confusion in the production of violence, and their
amongst KTI stakeholders regarding the basic supporters. For instance, the USAID paper
point of whether the term was intended to Development Response to Violent Extremism
refer to national, religious or clan identity, and Insurgency (from which the KTI team
or even identity as youth (widely defined as drew heavily throughout program design
those between 16 and 35 in Kenya). The focus and implementation) identifies VE (USAID
upon self-confidence is also problematic as it 2011: 2) as advocating, engaging in, prepar-
implies an association between this psycho- ing, or otherwise supporting ideologically
logical factor and an attraction to VE, despite motivated or justified violence to further
an apparent absence of supporting evidence social, economic and political objectives.
for this link. This is of particular relevance The Australian National Counter-Terrorism
given the growing consensus against the idea Committee similarly defines the concept as
that it is possible to create suitable psycholog- a willingness to use or support the use of
ical profiles (e.g. Sageman 2008: 17). In any violence to further particular beliefs, includ-
case, the converse relationship is also plausi- ing those of a political, social or ideological
ble, i.e. that elevated levels of self-confidence nature (cited in Nasser-Eddine et al 2011: 8).
may be associated with an attraction to VE. With this breadth in mind, and pending
Perhaps of greater relevance, the phrase suitable definitions of CVE from donors, we
allow them to reject extremism should have tentatively suggest the following goal state-
been adapted as it is suggestive of top-down ments for future initiatives:5 1) To reduce the
assumptions, implicitly removing degrees of rate of VE acts in Location X, and 2) To reduce
agency from individuals who often self-select the level of support for VE acts in Location X.
to travel the VE path. Put another way, it infers In practice, however, we also argue that the
that radicalisation is a process that happens comparative importance of the latter objec-
to individuals, rather than being something tive varies according to context. In particular,
Art.31, page4 of 12 Khalil and Zeuthen: A Case Study of Counter Violent Extremism (CVE) Programming

Figure 1: Push and pull factors (summarised from project documents).

CVE initiatives should place an elevated focus comprehension the KTI team adopted the
on undermining support for VE in locations language of push and pull factors, as out-
where the perpetrators of violence are highly lined in USAIDs Development Response.
dependent on local communities for mate- According to this paper (2011: 34), the
rial resources, shelter, information on state former are important in creating the condi-
forces, and so on. This should also be the tions that favor the rise or spread in appeal
case in locations where support for VE is of violent extremism or insurgency, whereas
particularly widespread, and thus long-term the latter are associated with the personal
solutions necessarily involve extensive efforts rewards which membership in a group or
to change attitudes. This has programmatic movement, and participation in its activi-
implications given that supporters of violence ties, may confer. Development Response does
are often considerably more numerous than not aim to offer a definitive list of potential
those who are directly involved (Khalil 2014),6 drivers, and the KTI team correctly sought to
and thus interventions would have to target a identify factors of specific relevance within
broader cross-section of the populace. their areas of implementation, as indicated
in Figure 1. It should be briefly observed
Identifying the drivers of violent that, while the concepts of push and pull
extremism push factors provide a convenient means through which
However articulated, efforts to achieve to structure an understanding of VE drivers,
CVE aims require an ample understand- other such systems of categorization may
ing of what drives this violence in any also be adopted, e.g. distinguishing between
given environment, and in pursuit of such motivators and enablers.
Khalil and Zeuthen: A Case Study of Counter Violent Extremism (CVE) Programming Art.31, page5 of 12

Figure 2: Potential directions of causality.

Whilst it is beyond the scope of this paper While poverty and unemployment were
to comment upon all such drivers, the role also identified as drivers by KTI, there is sub-
of discrimination and profiling in push- stantial debate in the wider literature as to
ing individuals to VE is worth highlight- whether such factors actually correlate with
ing. This issue is routinely discussed within VE (e.g. Mercy Corps 2013; USAID 2009: v;
the Kenyan literature, for instance, with the Venhaus 2010: 5). Critically, even if a rela-
International Crisis Group (2012: 10) report- tionship between these factors and VE is
ing that the war against Al-Shabaab has led revealed in a specific location, it should not
to an increase in ethnic profiling and dis- be taken for granted that the former drive
crimination against Somalis in particular, the latter given that there are other poten-
and Muslims in general. Anneli Botha (2013: tial causal routes. Specifically, as shown in
9), from the Institute for Security Studies, Figure 2, unemployment may drive individ-
similarly states that members of the Somali- uals towards VE, or conversely VE may lead
Kenyan and Somali communities claim to be to a lack of employment opportunities (per-
victims of racial or ethnic profiling and to haps as individuals become tainted by the
have been rounded up and arrested for lit- former), or an external variable (clan affili-
tle reason other than their race and ethnic- ation, education levels, and so on) may drive
ity. Indeed, in response to escalating levels both. Complexity is added, however, as cau-
of violence, such patterns have increased in sality may flow in multiple directions simul-
2014 through Operation Usalama Watch.7 taneously (e.g. X causes Y and Y causes X).
This initiative was launched in the after- Such considerations are of critical relevance
math of the Westgate incident and associ- given that initiatives to enhance employ-
ated attacks in Nairobi, with its many critics ment in any specific region will not serve to
asserting that it applies a disproportionate reduce VE if the uppermost option in Figure
use of force against these same communities 2 is incorrect. Of course, this logic is poten-
(e.g. Amnesty International 2014). tially also applicable to all candidate drivers
Art.31, page6 of 12 Khalil and Zeuthen: A Case Study of Counter Violent Extremism (CVE) Programming

of VE (i.e. those identified in Figure 1), and endemic corruption, and a lack of political
so alternate causal directions should be con- and economic opportunities (to name but
sidered in each instance. a few) will require large-scale investments,
Furthermore, while the issue of causal carried out through hard-to-implement and
direction is of clear relevance, it should be expensive programs sustained over long
recognised that it represents no more than periods of time. In other words, there are
the tip of the iceberg in terms of complex few quick wins achievable on the push side.
effects. The idea of a simple linear relation- In addition, it is often observed (e.g. USAID
ship between causes (e.g. unemployment) 2009: ii) that such push factors are common
and effects (i.e. VE), gives way to a reality of to many global regions, whereas VE remains
tipping points, disproportionate feedback comparatively rare. Thus, at best these drivers
loops, interaction effects between multi- provide insufficient explanations for VE, and
ple variables, and other complexities. These it is thus necessary to additionally consider
issues are exacerbated as the analysis is com- what pulls individuals towards violence.
monly performed on data of questionable With many interventions focusing upon
quality given that study informants may push factors almost by default, the KTI team
offer false or misleading information, (a) as can be credited with placing an elevated
they themselves are misinformed, (b) to dis- focus upon those that pull. However, the
credit others, (c) to be viewed favourably by drivers identified by KTI diverge notably from
the interviewer (often referred to as social those suggested in USAIDs Development
desirability bias), (d) out of fear of poten- Response (see Figure 1), and in particular
tial repercussions of divulging information, it can be noted that the team neglected to
(e) to aggrandise their own role in events, or focus on those that motivate at the indi-
(f) as a process of unwitting self-deception.8 vidual level, rather than collectively.9 For
Thus, rather than attempt to prove causality, instance, these include selective incentives
the more modest aim of studies designed to such as Al-Shabaabs reported monthly salary
inform CVE efforts should be to draw cave- of 50150 USD (Hassan 2012: 18).10 Status-
ated findings to support or contest a prede- seeking is also commonly identified as a VE
termined list of hypotheses on the potential driver, with a former member claiming that
drivers of VE, i.e. including those listed in walking in the city with a gun as a member
Figure 1. And, with such considerations of al-Shabaab ensured everybody feared and
in mind, we argue that CVE practitioners respected you and that girls also liked you
should certainly not treat the resultant find- (Hassan 2012: 19). Adventure-seeking, fear
ings as being definitive. Arguably, the KTI and revenge are also routinely identified as
team placed too much faith in their commis- motivators in a range of cases (e.g. Kilcullen
sioned research. 2009: 4041; Ribetti 2007).11 Having over-
looked such factors during their initial
Identifying the drivers pull factors research efforts, the KTI subsequently down-
In any case, even if discrimination, unem- played the relevance of these drivers as they
ployment, poverty and other such push designed their program and selected grants.
factors are shown to drive VE in specific envi- Such considerations have two main pro-
ronments, it is increasingly recognised that grammatic implications. Firstly, individual-
an exclusive focus upon these variables is level drivers tend to be particularly applicable
insufficient. As observed in USAIDs Guide to to those directly engaged in the production of
Drivers (2009: 11) document, efforts to bring violence, rather than the supporters of these
about significant reductions in such alleged activities, as they are often contingent upon
root causes as high unemployment, perva- behaviours (Khalil 2014). Put another way,
sive poverty, systematic political exclusion, the benefits of material gain, elevated status,
Khalil and Zeuthen: A Case Study of Counter Violent Extremism (CVE) Programming Art.31, page7 of 12

a sense of adventure, and so on, are not gen- We argue that the KTI program would have
erally gained by those who merely remain on benefited from additional research into this
the sidelines. And, with these somewhat diver- matter, and that a greater proportion of
gent motivations, this underlines the point KTI grants should have targeted those sub-
discussed above that it is necessary to treat populations positively identified through
the perpetrators and supporters of violence comprehensive research as being specifically
as distinct (albeit overlapping) populations. vulnerable. This conclusion applies in par-
Secondly, programs within the scope of CVE ticular given that VE is associated with a very
can be designed to counter at least some of small minority in the Kenyan context.12 In
these individual-level drivers if they are deter- practice, however, our investigation revealed
mined to be of key significance. For instance, if that a number of interventions inadvert-
research reveals that revenge is an important ently selected against the most at-risk within
motivator in a specific location, projects can the broad categories of Somalis and youths.
be established to bridge the gap between reli- While it is not possible to provide additional
gious, ethnic, and clan-based communities. details given the sensitive nature of this
programming, put simply, those individu-
Identifying vulnerable als most likely to follow the VE path were
sub-populations seemingly less likely to attend a range of KTI-
While research into such push and pull fac- sponsored events.
tors provides a suitable framework upon
which to base CVE efforts, additional nuance Determining the intervention logic
is required in the contextual understanding In considering the topic of intervention logic
as certain individuals are more susceptible it should firstly be noted that CVE program-
than others to the appeal of VE. Amongst ming paradoxically cannot alone serve to
practitioners there is some resistance to the counteract VE. For instance, it is beyond the
idea of identifying such vulnerable indi- scope of CVE to provide protection to individ-
viduals as this is suggestive of stereotyping uals who are coerced into VE, or to attempt
at a time when it is increasingly recognised to cut the funding of VE entities in order
that terrorist profiles either do not exist or to undermine their ability to offer material
may never be identified (Horgan 2009: xxii; incentives for such acts. And, in a striking dis-
Sageman 2008: 17). However, we believe that connect between policy and practice, neither
this is misguided as the objective should not is it possible in certain US CVE lines to pro-
be to precisely identify individual types, but vide training to officials in the security forces
more modestly to narrow targeting efforts on or to engage with religious institutions that
a probabilistic basis. Indeed, this logic was in may play a key role in either provoking or
any case applied by KTI through placing an preventing VE.13 The former is of particular
emphasis upon Somalis and youth (taken to relevance in contemporary Kenya as many
be those between 16 and 35) as specifically state officials seemingly remain unaware of
at-risk. It was also applied in a geographical the apparently counterproductive effects of
sense in that the program focus was upon spe- their repressive practices. The simple retort
cific coastal regions and Eastleighs environs, to these observations is that CVE forms only
rather than Kenya in its entirety, as these loca- one component of a wider response that also
tions were deemed to be highly susceptible. often involves law-enforcement, counterter-
There is some anecdotal evidence that rorism, security sector reform, development,
teenagers (i.e. a tightening of the concept and other such initiatives. Yet, as observed
of youth), ex-convicts, members of specific above, this riposte is only valid if these efforts
clans, and other narrow sub-populations can be adequately coordinated and decon-
are specifically vulnerable to VE in Kenya. flicted, and this is no trivial matter given the
Art.31, page8 of 12 Khalil and Zeuthen: A Case Study of Counter Violent Extremism (CVE) Programming

range of (often highly bureaucratic) agencies in counselling despite the potential stigma,
typically involved. (c) it is possible to recruit suitably qualified/
As also noted above, we collected consid- experienced counsellors, (d) such treatment
erable qualitative evidence to suggest that is able to successfully counter PTSD, (e) PTSD
KTIs efforts achieved a positive impact, i.e. drives VE, and (f) individuals specifically at-
in preventing certain individuals from fol- risk of VE are willing and able to partake in
lowing the VE path. However, we also argue the counselling. While it is necessary to chal-
that KTI could have enhanced this success lenge all of these assumptions as a matter of
through applying the Theories of Change due process, the fifth is perhaps of particu-
(ToC) logic in order to maximize the likeli- lar concern. A key KTI document maintained
hood that each separate grant contributed to that former Al-Shabaab members are likely to
the broader program goal, and this section reenlist if unable to get appropriate psycho-
serves to provide a brief introduction to this logical counselling to deal with their trauma,
topic. ToC provide a map of the pathways but this assertion seemingly lacked support-
from inputs (e.g. funds, time, etc.) through ing evidence. Indeed, focussing on a selected
to impacts (i.e. a reduction in VE or support sample of global Salafi mujahedin, Marc
for such acts), involving the articulation of Sageman (2004: 97) maintains that there
assumptions upon which such efforts are was no pattern of emotional trauma in their
based. Certain KTI grants aimed to enhance past, nor was there any evidence of pathologi-
livelihood opportunities through linking cal hatred or paranoia when the facts are ana-
local youth and financial institutions, with lysed. While counselling of this nature would
the intention being that the former obtain undoubtedly have a positive impact upon
loans or grants from the latter. Such efforts the community, clearly it will not serve to
rested on assumptions that (inter alia) (a) undermine VE if this disorder does not actu-
youth did not already engage with such enti- ally drive this violence. The wider point is that
ties, (b) youth had the motivation/time to entire lines of programming may wholly fail
engage with these bodies, (c) financial insti- to contribute to the broader KTI goal if only
tutions were willing/able to support youth, one assumption is misguided.
(d) youth are able to channel such resources
to enhance their livelihood opportunities, (e) Mitigating negative effects
a lack of opportunities for youth drives VE Of course, it is necessary to consider not
(as discussed above), and (f) individuals spe- only the positive effects of programs, but
cifically at-risk of being attracted to VE will also potential negative consequences. For
partake in such initiatives (also discussed instance, grantees and other stakeholders
above). Ideally the resources would be avail- may be subject to threats or actual targeting
able for implementers to research each of as a result of their association with external
these assumptions, but the process of articu- donors. Indeed, one grantee highlighted that
lating such suppositions in itself commonly local youth distributed leaflets to denounce
reveals potential weak links. And, this ena- their KTI-funded activities, and that these
bles adjustments to be made to the program same individuals subsequently threatened
design at suitably early stages in the process. staff members. While KTI offered to cancel
Another example that perhaps even better this grant in order to resolve this issue, the
demonstrates the role of ToC is offered by KTI grantee elected to continue with the pro-
efforts to combat post-traumatic stress disor- ject. The obvious recommendation is that
der (PTSD) amongst all community members. such initiatives require robust systems of risk
These initiatives rested upon assumptions management, assessment and mitigation. In
that (inter alia) (a) PTSD occurs in the com- making this suggestion, however, it is neces-
munity, (b) individuals are willing to partake sary to recognise that CVE programs must
Khalil and Zeuthen: A Case Study of Counter Violent Extremism (CVE) Programming Art.31, page9 of 12

also avoid the temptation to become overly agendas, and the sense of being manipulated
risk-adverse as this will undoubtedly impinge may in itself also discourage some from asso-
upon their ability to achieve their program ciating with initiatives that carry the CVE tag.
objectives. Put simply, CVE efforts inevitably In addition, the label may attract unwanted
entail elevated levels of risk. attention from unsavoury elements, thereby
A more specific recommendation is for elevating risk for grantees and other program
donors (and particularly those from the US stakeholders. Indeed, presumably with this
given that ill-feelings towards the pivotal threat in mind, various KTI grantees elected
Western nation are commonly pronounced) to tone-down the CVE language, instead
to be cautious with branding. KTIs policy portraying their projects as being focused
was flexible, allowing grantees to operate upon, for instance, peace-messaging and
without the USAID logo if they deemed it coexistence. In a very different sense the
to be unsuitable. Advocates of branding in label may also undermine interventions
this context argue that the logo serves to through implying that it is primarily or solely
demonstrate the good-will of the US, and in nonstate actors who are at fault for the vio-
doing so it may draw individuals away from lence (i.e. as extremists), thereby potentially
the VE path. Yet, this argument may be out- steering practitioners away from pursuing
weighed, firstly, by the fact that those who necessary state reforms. Each of these pos-
seek to encourage VE can utilise this brand- sible consequences remain under-research (a
ing as evidence of external meddling, and matter that should be remedied as a priority),
thus it may inadvertently serve as a rallying but all may substantially undermine CVE ini-
point for violence. Secondly, with opposition tiatives. This is certainly not to suggest that
to Western influence being common in many the CVE terminology should be abandoned,
regions, such branding may actually discour- but rather that it may be necessary to adopt
age those individuals who are part-way down neutral language in certain contexts.
the VE path from participating in CVE ini-
tiatives. And, thirdly, it likely increases the Conclusion
risk of grantees and other associates being While this brief essay has covered substan-
threatened or physically targeted through tial ground, from the program goal state-
advertising their links to an external entity. ments through to negative effects during
Put simply, in certain contexts the net effect implementation, it is worth concluding
of branding may actually be to undermine with two overarching points. Firstly, KTI
progress towards CVE aims, or to elevate the programming decisions would have benefit-
costs of such efforts, and thus selectivity is ted from additional research in order to pro-
certainly required. vide a more thorough understanding of the
It is also necessary to reflect upon the nor- VE context in Kenya. For instance, while the
mative nature of the VE/CVE concepts. The KTI team correctly placed an elevated focus
extremism label (alongside terrorism and upon drivers that pull individuals to VE,
other such tags) is routinely utilized to vilify they essentially neglected the role of mate-
opponents in an effort to isolate them from rial incentives, fear, revenge, status-seeking
the wider populace.14 However, this label may and other individual-level drivers. Similarly,
instead serve to polarise communities by dis- the program team would have benefit-
tinguishing between extremists and (implic- ted from a more precise understanding of
itly) normal or moderate individuals, and which subsets of the populace (potentially
in doing so it may inadvertently cause some including ex-convicts, members of specific
to shift towards the former camp. Such pejo- clans, teenagers, etc.) were specifically vul-
rative labels are of course associated with nerable to the appeal of VE, particularly as
attempts to shape perceptions and disguise comparatively few individuals are drawn to
Art.31, page10 of 12 Khalil and Zeuthen: A Case Study of Counter Violent Extremism (CVE) Programming

this violence in Kenya. More generally, CVE together these two studies represent the
practitioners should also aim to become final evaluation.
more conversant in the limitations of 3 A limited number of other such studies
research and analysis in such environments. are available, e.g. see USAID 2013 (which
In particular, this applies to the reliability of also focusses upon the Eastleigh compo-
data collected from informants, and regard- nent of the KTI initiative).
ing questions of causality, e.g. to consider 4 This is absolutely not to suggest that the
whether a correlation between a lack of live- concept of identity should be neglected,
lihoods opportunities and VE in a specific but rather that it should be interwoven
region may result from the former driving within the program logic, e.g. underpin-
the latter, or vice versa, or whether an exter- ning assumptions within the Theories of
nal factor is responsible for both. Change.
The second conclusion is that the KTI 5 The issue of how to research progress
implementers would have benefitted from towards/reversals away from the goal
additional top-level guidance from donors. (including the thorny attribution prob-
For instance, they would have gained from lem) is discussed in the final report (see
direction with regard to the extent to which footnote 2).
the CVE concept should be intended to tar- 6 For instance, support for martyrdom
get individuals who are directly involved in operations in the Palestinian Territories
the creation of violence, versus those who has reportedly reached as high as 66 per
only support such acts in cases such as Kenya. cent, while those actually involved in cre-
Additional guidance would also have been ating this violence remained at a fraction
beneficial, for instance, with regard to circum- of that figure.
stances in which practitioners may potentially 7 Usalama translates as security in
undermine their own programs through the Kiswahili.
inappropriate application of branding, and in 8 Such issues are discussed in detail in
which the pejorative term extremism should Wood 2003: 3140.
be pragmatically replaced by neutral termi- 9 The underpinning theory is discussed in
nology. Above all, we argue that USAID and Khalil 2014.
other donors should offer suitable definitions 10 It should be noted that there is no clean
of CVE, rather than leave practitioners to con- division between push and pull factors.
strue its meaning from the limited number of In this instance an example of the latter (i.e.
available definitions of VE. a financial incentive from Al-Shabaab) is at
least partly dependent upon examples of
Notes the former (i.e. poverty, unemployment).
1 Debate continues regarding responsibil- 11 Particular caution must be taken when
ity for these attacks, despite the claims of assessing the role of fear as a driver as indi-
Al-Shabaab. viduals aiming to discredit Al-Shabaab
2 A redacted version of the final report will and other such groups may overstate the
shortly be available on the USAID web- extent to which individuals are coerced
site, within which the study methods are into VE acts.
outlined. Given the current insecurity in 12 For instance, the International Crisis
Kenya the grantees have not been named Group (2012: 7) asserts that the support
in either the report or this essay, and it base for Al-Shabaab in Kenya is a tiny, but
has been necessary to leave a number of highly radicalised, close-knit and secre-
opinions uncited on this basis. A paral- tive Salafi Jihadi fringe.
lel quantitative evaluation was also con- 13 This is due to the Establishment Clause
ducted during program close-down and in the US.
Khalil and Zeuthen: A Case Study of Counter Violent Extremism (CVE) Programming Art.31, page11 of 12

14 As is noted by Hoffman (2006: 23), for Kilcullen, D 2009 Accidental Guerrilla.


instance, on one point, at least, everyone Oxford: Oxford University Press.
agrees: Terrorism is a pejorative term. Mercy Corps 2013 Examining the Links
It is a word with intrinsically negative between Youth, Economic Opportunity,
connotations that is generally applied to Civic Engagement, and Conflict. Avail-
ones enemies and opponents, or to those able at http://pdf.usaid.gov/pdf_docs/
with whom one disagrees and would oth- PA00JGK6.pdf
erwise prefer to ignore. Nasser-Eddine, M et al 2011 Counter-
ing Violent Extremism (CVE) Literature
Acknowledgements Review, Defence Science and Technology
The authors wish to thank the many grantees Organisation. Available at http://dspace.
and beneficiaries who kindly assisted with dsto.defence.gov.au/dspace/bitstream/
the research. We also wish to extend thanks 1947/10150/1/DSTO-TR-2522%20PR.pdf
to the KTI team, who were highly supportive Ribetti, M 2007 Unveiled Motivations of
throughout the process. It is to their consider- Violence in Intra-State Conflicts. Small
able credit that they strongly encouraged the Wars and Insurgencies, 18(4): 699720.
creation of this article to enable the wider CVE DOI: http://dx.doi.org/10.1080/095923
community to learn from their experiences. 10701778548
Sageman, M 2004 Understanding Terror Net-
References works. Philadelphia: University of Penn-
Amnesty International 2014 Somalis are sylvania Press.
Scapegoats in Kenyas Counter-Terror Crack- Sageman, M 2008 Leaderless Jihad. Philadel-
down. Available at http://www.amnesty. phia: University of Pennsylvania Press.
org/en/news/kenya-somalis-scapegoated- Schwartz, S et al 2009 Terrorism: An Iden-
counter-terror-crackdown-2014-05-26 tity Theory Perspective. Studies in Con-
Botha, A 2013 Assessing the Vulnerability flict and Terrorism, 32: 537559. DOI:
of Kenyan Youths, Institute for Security http://dx.doi.org/10.1080/1057610090
Studies Paper. Available at http://www. 2888453
issafrica.org/uploads/Paper245.pdf USAID 2009 Guide to the Drivers of Violent
Hassan, M 2012 Understanding Drivers of Extremism. Available at http://pdf.usaid.
Violent Extremism. CTC Sentinel, 5(8): gov/pdf_docs/pnadt978.pdf
1820. USAID 2011 Development Response to Vio-
Hoffman, B 2006 Inside Terrorism (revised lent Extremism and Insurgency. Avail-
and expanded edition). New York: Colum- able at http://pdf.usaid.gov/pdf_docs/
bia University Press. pdacs400.pdf
Horgan, J 2009 Walking Away from Terror- USAID 2013 Mid-Term Evaluation of Three
ism. Oxon: Routledge. Countering Violent Extremism Projects.
International Crisis Group 2012 Kenyan Available at http://pdf.usaid.gov/pdf_
Somali Islamist Radicalisation. Avail- docs/PDACX479.pdf
able at http://www.crisisgroup.org/en/ Venhaus, J M 2010 Why Youth Join al-Qaeda.
regions/africa/horn-of-africa/kenya/ Washington, D.C.: United States Institute
b085-kenyan-somali-islamist-radicalisa- for Peace. Available at http://www.usip.
tion.aspx org/sites/default/files/SR236Venhaus.
Khalil, J 2014 Radical Beliefs and Violent pdf
Actions are not Synonymous. Studies in Wood, E J 2003 Insurgent Collective Action
Conflict and Terrorism, 37(2): 198211. and Civil War in El Salvador. Cambridge:
DOI: http://dx.doi.org/10.1080/10576 Cambridge University Press. DOI: http://
10X.2014.862902 dx.doi.org/10.1017/CBO9780511808685
Art.31, page12 of 12 Khalil and Zeuthen: A Case Study of Counter Violent Extremism (CVE) Programming

How to cite this article: Khalil, J and Zeuthen, M 2014 A Case Study of Counter Violent Extremism
(CVE) Programming: Lessons from OTIs Kenya Transition Initiative. Stability: International Journal of
Security & Development, 3(1): 31, pp.1-12, DOI: http://dx.doi.org/10.5334/sta.ee

Published: 30 September 2014

Copyright: 2014 The Author(s). This is an open-access article distributed under the terms of the
Creative Commons Attribution 3.0 Unported License (CC-BY 3.0), which permits unrestricted use,
distribution, and reproduction in any medium, provided the original author and source are credited.
See http://creativecommons.org/licenses/by/3.0/.

Stability: International Journal of Security & Development is a


peer-reviewed open access journal published by Ubiquity Press
OPEN ACCESS

You might also like