This thesis explores the history of Countering Violent Extremism (CVE) through tracing a genealogy of “warm-hearted counter-terrorism” from the frontier of the British Indian empire in the late 19th century to Afghanistan peace programs in the 21st century. This genealogy of counter-terrorism emphasizes empathy, kindness, and closeness and has historical precedents in the Sandeman system, Briggs’ Plan for the Emergency in Malaya and the work of the RAND corporation. This thesis argues that countering violent extremism rose to prominence as a means to symbolically purge the legacy of the war on terror, while in practice CVE was central to a neo-Briggs’ Plan in Afghanistan put in place by General David Patreaus. While CVE may present itself as a kinder, smarter, better form of counter terror, CVE is still a tool of counter-terrorism and counter-insurgency more broadly that often has orientalist foundations but more importantly has been central to the prosecution of the war in Afghanistan. The symbolic appearance of CVE is as well a tool of counter-terrorism, that allows cruel and brutal motivations and programs to be packaged in innovative and humane wrappings. The history of CVE presented in this thesis is important, as this thesis also traces the way that programs of peace in Afghanistan became programs of war, in line with earlier attempts to make counter-terrorism and counter-insurgency kinder, warmer, and more humane.
|School:||The George Washington University|
|School Location:||United States -- District of Columbia|
|Source:||MAI 82/3(E), Masters Abstracts International|
|Subjects:||World History, Modern history|
|Keywords:||Afghanistan, Counter terrorism, Countering violent extremism, History, Malaya, Sandeman|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be