This course focuses on how Australia can most effectively protect itself from terrorism and violent extremism in ways consistent with its democratic system and community values. The imperatives of counter-terrorism (CT) and countering violent extremism (CVE) now permeate the policy and operational activities of federal and state governments, law enforcement agencies, business and the community at large.
A fee of $2110 (plus GST) applies to this course for Commonwealth participating agencies and NSC Partners. The open rate is $2,550 (GST exclusive).
The course considers the implications of our policy and operational responses across a spectrum from social cohesion through to disruption of terrorist actions. You will receive a comprehensive, up-to date overview of the nature of the terrorist threat in Australia and internationally, as well as the range of policy and operational responses. This will be balanced with the latest research and policy developments related to the difficult policy challenges around countering violent extremism.
You will be informed by leading international researchers who are guiding international policy responses. Speakers from the senior ranks of the public service, academia, the private sector and community groups will examine key policy questions in the light of societal resilience and cohesion, multiculturalism and politics.
Scope and content
The course will consider complex policy questions, including:
What constitutes violent extremism? How does this interact with terrorism, criminality, radicalisation (including in prisons) and normal dissent?
What is the nature and scale of violent extremism as a security threat in Australia?
What can Australia learn from the experience of other countries and vice versa?
How does CVE fit with counter-terrorism approaches?
What are the roles and responsibilities of state and federal governments, law enforcement, business and the community?
The course is designed to lay out the developments in thinking that have led to CVE-CT being seen as a spectrum. It will emphasise the importance of an interconnected systems approach (between states, the Commonwealth, and international partners). It will cover a current threat assessment for terrorism in Australia including drivers and dynamics, threat indicators and the implications for agencies looking to counter threats. Participants will also examine the evolution of thinking and practice across CVE and CT. The subject matter will draw heavily on international and national case studies to identify what has worked and what hasn’t. It will consider best practice and innovation across CVE-CT response options.
The course will take ‘lessons from the enemy’ by looking at communications as a key battlefield, providing a picture of the latest research on Jihadist propaganda, but also considering case studies of right-wing and left-wing propaganda use. It will also look at strategic communications as an offensive and defensive tool for governments.
Who should attend?
This course is designed for officials and security practitioners at all levels from departments and agencies involved in or requiring an understanding of CVE approaches and CT responses. State and territory government officials, police force members and professionals from other organisations dealing with CVE and CT are encourage to participate.
“The CVE course not only reflects the importance and seriousness of this vital work. As a course participant you gain a genuine understanding of where CVE currently is in the global sphere and most importantly, where it needs to go.”
• Two day non-residential, fully-catered program.
• An ANU parking permit will be supplied.
Please contact us at firstname.lastname@example.org for further information and to obtain the registration form.
“Comprehensive yet presented in a simple, interactive and thoroughly enjoyable manner. Of note was the quality, passion and international scope of the researchers, academics, policy makers and public servants who presented. I would highly recommended this course for anyone interested in or working within the field of CVE.”