Sergei Boeke LL.M.
Sergei Boeke is a Research Fellow at ICCT. After completing Officer training for the Royal Netherlands Navy, he studied law at the Vrije Universiteit Amsterdam, specialising in international and criminal law. After graduation he held several posts in the Navy, serving on different warships and with the Second Marine Battalion, deploying to Southern Iraq in 2003-4. After a short posting as fellow at the Netherlands Institute for International Relations Clingendael, he joined the diplomatic service and worked for the Department of Political Affairs in The Hague. Moving back to the Ministry of Defense in 2008, he was involved in supporting the Dutch comprehensive approach mission in Afghanistan. In 2011, he completed a 9 month training for civil servants at the Ecole Nationale d’Administration (ENA) in Strasbourg, France. His areas of research include cyber- security governance and terrorism in the Sahel.
Key Publications include:
Boeke, S. and A. Tisseron. “Mali’s Long Road Ahead”, The RUSI Journal 159, no. 5 (2014), pp. 32-40.
Boeke, S. “Transitioning from Military Interventions to a Long-Term Counter-Terrorism Policy”, The International Centre for Counter-Terrorism – The Hague 5, no. 6 (2014).
Boeke, S. “Mokhtar Belmokhtar: A Loose Cannon?”, Perspectives, The International Centre for Counter-Terrorism – The Hague 4 (2013).
Boeke, S. “Al Qaeda during the Elections in Mali: The Dog that Did Not Bark”, Perspectives, The International Centre for Counter-Terrorism – The Hague 4 (2013).
Boeke, S. and D. Weggemans “Destination Jihad: Why Syria and not Mali”, Perspectives, The International Centre for Counter-Terrorism – The Hague 4 (2013).
Boeke, S. “Mali and the Narco-Terrorists”, Perspectives, The International Centre for Counter-Terrorism – The Hague 4 (2013).
Follow Sergei Boeke on Twitter @SergeiBoeke
Introduction We live in an inter-connected, inter-dependent world, not only in digital spaces, but increasingly between the physical and digital worlds. While our inter-connectedness and the accompanying rapid technological change bring with them widespread societal benefits, they can also deepen existing vulnerabilities and create new ones, such as in relation to critical infrastructure interdependencies. These […]
This paper critically compares seven widely used risk assessment tools for violent extremism, including the VERA-2R, the ERG 22+, the SQAT, the IR46, the RRAP, the Radar, and the VAF. For each risk assessment method, the authors (1) provide background information about its country of origin, the field of expertise/discipline within which they were created, […]
This study focuses on increasing our understanding of the different pathways converts take during conversion to Islam. It looks specifically at the following research question: “How do the pathways of converts involved in jihadist movements differ from those of converts who are not, in terms of their life prior to Islam, their conversion experience and […]