[{"bbox": [145, 153, 457, 183], "category": "Section-header", "text": "## 3.5 The Intervention Logic"}, {"bbox": [153, 197, 349, 224], "category": "Section-header", "text": "### Specific Objective 1"}, {"bbox": [147, 224, 1120, 463], "category": "Text", "text": "By supporting the Government of Kenya to progressively transform its approach to PCVE in delivering a more transparent, accountable, and integrated approach to violent extremism the overall security in the country will improve. As a result, the risks, and implications of violent extremists' activities on national and regional security and stability will be reduced. The action's intervention logic is based on two main elements: (1) if the action strengthens the National Counter Terrorism Centre in delivering its mandate, it will improve the approaches to violent extremism and shrink the pool of individuals at risk of recruitment into radicalised groups; and (2) if the action assists the National Counter Terrorism Centre in addressing underlying factors and promoting a whole of society approach, Kenyan communities shall emphatically and continuously reject violent extremists' ideologies and aims."}, {"bbox": [153, 488, 349, 515], "category": "Section-header", "text": "### Specific Objective 2"}, {"bbox": [147, 515, 1120, 595], "category": "Text", "text": "If communities' resilience to violent extremism will be increased, all this will result in a reduction of the terrorist threat and in levels of extremism-related violence and in a positive, sustainable contribution to increased stability in the areas in which the activities have been implemented."}, {"bbox": [153, 620, 349, 647], "category": "Section-header", "text": "### Specific Objective 3"}, {"bbox": [147, 647, 1120, 781], "category": "Text", "text": "If the resilience of the cybersecurity ecosystem will be strengthened this will contribute to increase state and societal capacity to manage cyber incidents and crises in a time, effective and efficient manner. With Kenya increasingly reliant on the use of ICT to optimise various critical and non-critical infrastructure, it is paramount to identify vulnerabilities in the inter-linked networks and information systems that could be exploited for political or financial gains."}, {"bbox": [998, 1667, 1115, 1691], "category": "Page-footer", "text": "Page 16 of 26"}]