top of page
Art Supplies

Radicalisation and Extremism

Writer's picture: Luke KandiahLuke Kandiah

Becky Davies - Maiden Erlegh school reading DSL


Useful website about how to have difficult conversations with chidlren: https://www.educateagainsthate.com/

Subject Case studies: 'How I was Radicalised' Stories:

Why schools should never ignore a concern:


If you are concerned about any person, child or adult relating to development towards extreme views it is important this is flagged at as early a stage possible. this comes under the PREVENT duty which can be completed through the government website.

Extremism is the holding of extreme political or religious views; fanaticism.Terrorism is

Radicalisation is the action or process of causing someone to adopt radical positions on political or social issues.

Terrorism is the unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims.


Fundamental British Values (FBV) include:

Democracy

The Rule of Law

Individual Liberty

etc.


Examples of types of extremism:

Extreme Right wing

Islamist extremism

Left wing, Anarchist and Single Issue Extremism (LASI Extremism)


'When you're trying to have these difficult conversations with children, look for the humanity in their argument.'

E.g. The innocent people dying on both sides of the Gaza/ Israel war.


Recognising and responding to signs of grooming:

  • Grooming can take place online or in person

  • Grooming can lead to exploitation, including sexual exploitation

Vulnerability factors:

  • Having low self-esteem or being isolated

  • Feeling rejection, discrimination or injustice

  • Experiencing community tensions between groups

  • Experiencing a traumatic event

  • Struggling with a sense of identity or belonging

Warning signs of Radicalisation:

  • Spend increasing amounts of time talking to people with extreme views

  • Change in their style of dress or appearance

  • Becoming increasingly argumentative

  • Refusing to listen to different points of view

  • Unwilling to engage with children who are different

  • Becoming abusive to children who are different

  • Embracing conspiracy theories

  • Feeling persecuted

  • Changing friends and appearance

  • Distancing themselves from old friends

  • No longer doing things they used to enjoy

  • Converting to a new religion

  • Being secretive and reluctant to discuss their whereabouts

  • Sympathetic to extremist ideologies and groups

Warning signs observed through online behaviour:

  • Changing online identity

  • Having more than one online identity

  • Spending a lot of time online or on the phone

  • Accessing extremist online content

  • Joining or trying to join an extremist organisation


What Can Schools do?

  • Include radicalisation in your safeguarding policies and procedures

  • Identify those at risk and make sure everyone in your organisation knows when to report a concern

  • Work in partnership with other organisations across the community.

  • Promote positive messages of tolerance and community cohesion

  • Help parents and children get support

Channel

A voluntary confidential programme which safeguards people identified as susceptible to being drawn into terrorism.

It is a multi-agency process, involving partners from the local authority, the police, education, health providers and others.

When someone makes a referral, lots of agencies work together to offer support where they consider it necessary and proportionate to do so. This involves a number of steps:


1. The local authority and the police carefully assess all referrals to see if they are suitable for Channel or whether a different type of support is more appropriate, such as mental health support.

2. If suitable, the referral is discussed with all relevant partners at a meeting called a Channel panel to decide if an intervention is necessary. The individual who has been referred to Prevent is informed and must give their consent (or via a parent or guardian if they are children) before an intervention can take place.

3. If Channel intervention is required, the panel works with local partners to develop an appropriate tailored support package.

4. The support package is monitored closely and reviewed regularly by the Channel panel.




 

The Trust Network


How it is monitored - Mr Mike Gomm.


Network Monitoring

Everything you do using IT (All applications used, all internet activity as it happens) across the Maiden Erlegh Trust is Monitored. It is done to protect the users and to protect the integrity of the computer network.

This includes access to Google docs, Office 365 and individual youtube videos


Data Protection Act, UK GDPR Update

First introduced in 1992

To ensure that adequate data protection is incorporated into all processes. (By default and by design). It has to become an ongoing way of life (Common sense must prevail).


What is personal data and what is sensitive data?


(Data can be stored in any form: Including in pencil and as photographs.)


Personal Data is 'Any information relating to an individual.'...Whether it relates to his or her private, professional or public life.


Sensitive data is 'special categories of personal data'. It is effective professional practice to treat all data as sensitive data.


Security of Data


If anything happens report it immediately, loss of data, for example being stolen in a bag, places the data in the public domain and all those whose data is breached have a right to know as soon as possible.

Subject Access Requests


What does this mean to me?

Information which is processed by the teacher solely for their own use is excluded from SAR.

Care with codes

40,000 emails about a student

Can you recognise a SAR?


Online Services

Delete old posts

Care with trials of websites - check if students can access websites without signing up for them

Students will try very hard to find your online presence.

Good practice

You are allowed to use your phone in school.

Be careful, however to note where your recorded data backs up to.

Care with Family devices

Do not use USB memory sticks - they do not work in school computers

Care with paper records


Emails:

Only put student initials in subject line, but please do put students' full name in the main text.

Not a filing system

Delete anything over 6 months old

Do not forget to purge sent folder

Do not use personal email addresses at all when dealing with school matters

You can check if someone is in fact at the school by forwarding it to someone else. (Phishing)

Response time for communications with parents - 72 hours. Do not be afraid to send holding emails.

Careful with what you write and the language that you use


Passwords will expire every 90 days.

Data breach - Report it, Record what happened, do not hide it.

Ask them to delete it and ask them to confirm to you that you have deleted it.

Check Bromcom permissions or ask the class before you take photos.


 
3 views0 comments

Recent Posts

See All

Comentários


bottom of page