Abstract
Islamist violent extremist (IVE) groups are frequently involved in civil conflicts. Indeed, some groups owe their origins to conflict, and tens of thousands of Islamists have chosen to participate in conflicts taking place in foreign countries in the past 35 years. Increasingly, IVE groups appear to have the capacity to influence the conflicts they are involved in, and are influenced in turn by their experiences. As a result, for those working on conflict resolution and post-conflict reconstruction, the involvement of IVE groups raises questions of whether traditional responses remain adequate. Drawing on three country case studies – Nigeria, Kenya and Iraq/Syria, this article examines the similarities and differences between IVE groups and other conflict actors, and what this means for development, state-building and peacebuilding responses.
Highlights
Ideology can be a factor for followers, but people in conflict situations join violent groups for a wide range of reasons – social, psychological and practical, as well as political
In Nigeria, while MEND’s narrative was explicitly based on grievances and Boko Haram has subordinated grievances to religious and cultural opposition to the state, both groups have responded to and seek to correct social, political and economic grievances in marginalised regions far removed from the centres of power
As we have shown, Islamist violent extremism is far from being a monolithic and stable movement, and within the broad scope of the term are groups that are potentially interested in political settlements
Summary
In Nigeria, while MEND’s narrative was explicitly based on grievances and Boko Haram has subordinated grievances to religious and cultural opposition to the state, both groups have responded to and seek to correct social, political and economic grievances in marginalised regions far removed from the centres of power.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Stability: International Journal of Security and Development
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.