Cyberterrorism sʌɪbəˈtɛrərɪz(ə)m/ noun. What we are (not) speaking about?

Size: px
Start display at page:

Download "Cyberterrorism sʌɪbəˈtɛrərɪz(ə)m/ noun. What we are (not) speaking about?"

Transcription

1 Cyberterrorism sʌɪbəˈtɛrərɪz(ə)m/ noun. What we are (not) speaking about? Irina Rizmal Cyberterrorism has come to be understood as one of the leading threats to vital interests of Western states. Even though there is general agreement that a cyberterrorist attack has not yet been experienced, there is consensus on what cyberterrorism might imply. However, contrary to this understanding, when it comes to framing who the potential cyberterrorists are, this consensual definition seems to be marginalised in order to reinforce the narrative of the prevailing discourse of the War on Terror that Salafist jihadists are preparing an electronic war against the West and the liberal world order; with other actors, potentially more threatening to national security in the cyber sphere, intentionally left out. A specific political discourse is thus created around cyberterrorism, one that is meant to pose as a natural extension of the current discourse on terrorism in general, by artificially attributing cyberterrorist capabilities to already defined, traditional terrorist organisations. If continued, this trend of attributing cyberterrorist capabilities to the wrong actors, portraying cyberterrorism as something that it is not, may ultimately undermine actual counterterrorist efforts in the cyber sphere and damage national security in the long run. In 2016, 73% of Americans cited cyberterrorism as a leading threat to vital interests of the United States in the next 10 years 1. It has been described as perfectly combining two of the greatest present-day fears, that of random, violent victimization and the general distrust of computer technology 2. And given the language commonly used to describe the potential dangers stemming from the cyber sphere, including references to a potential Cybergeddon and an electronic Pearl Harbour, complemented with the overuse of the term cyberterrorism by mass media, for incidents ranging from computer viruses, to website defacement, to actual hacking attempts, these results are no surprise. Although there is no precise definition of cyberterrorism, there is general consensus that it involves attacks and threat of attacks on computers, networks and the information stored therein to coerce a government or its people in the furtherance of political or social objectives 3. However, the label cyberterrorist has in the political discourse mainly been applied to actors and organisations already framed as terrorist, although recognising that these actors have not yet carried out activities that could be labelled as cyberterrorism. Assigning this label of the next 1 Gallup, Americans Cite Cyberterrorism Among Top Three Threats to U.S. February 10, Available at [Accessed March 28, 2017 at PM] 2 Weimann, G. (2005) Cyberterrorism: The sum of all fears? Studies in Conflict and Terrorism 28(2) p Denning, D. (2000) Cyberterrorism, Testimony before the Special Oversight Panel on Terrorism of the Committee on Armed Services, US House of Representatives, The Terrorism Research Center.

2 cyberterrorists to organisations such as al Qaeda, Hamas and ISIL is justified based on the general use of the Internet by these actors, for purposes such as communication, spreading propaganda, recruitment and fundraising, or, in less words, mainly the spread of extremist content. At the same time, organisations that have and do engage in activities found in the narrower definition of cyberterrorism, such as Anonymous, are labelled merely as hacktivists and their activities as disruptive, rather than destructive or threatening to national security, despite attacks on, for example, national critical infrastructure. Therefore, parallel to the process of establishing a narrow(er) consensual definition of cyberterrorism, the framing of cyberterrorist actors follows a seemingly different logic, ignoring the fact that terrorism, in general, refers to actions, not actors. Cyberterrorism, sʌɪbəˈtɛrərɪz(ə)m/, noun. The greatest challenge in reaching consensus on a definition of cyberterrorism has focused around the debate on whether to adopt a narrow, target-oriented definition of the concept, or a broader, tool-oriented one 4. Proponents of the latter argue that cyberterrorism should be seen as encapsulating general use of the Internet and computers by terrorists 5. However, widening the definition in this way risks labelling any online activity conducted by terrorist organisations as terrorism, regardless of whether the activity itself is, in fact, terrorist 6. This precludes any understanding of the concept of cyberterrorism itself, and defines an activity based on the actors engaged, rather than what it actually implies. As a result, the term becomes so misplaced and overused that it no longer bears any clear meaning 7. For this reason, a number of authors agree that cyberterrorism needs to be clearly defined and separated from other activities terrorist and other organisations and individuals engage in online, including communication, spread of extremist content and propaganda, or cybercrime for terrorist purposes. There is general agreement that cyberterrorism refers to the means to carry out an attack, while the motive remains the same as in traditional forms of terrorism 8. Bearing this in mind, a consensual definition of cyberterrorism, and the one most often referred to, is found in Dorothy Denning s testimony before the US House of Representatives, defining cyberterrorism as unlawful attacks and threats of attack against computers, networks and the information stored therein with the intention of intimidating or coercing a government or its people in the furtherance of political or social objectives. For an attack to constitute an act of terrorism, it must also have a serious intended effect in terms of human and economic casualties or intense fear and anxiety among citizens terror 9. 4 Jarvis, L. and Macdonald, S. (2015) What is cyberterrorism? Findings from a survey of researchers, Terrorism and Political Violence 24(7) p Taliharm, A. M. (2011) Emerging Security Challenges and Cyber Terrorism, Digital Development Debates #05. Holt, T. J. (2012) Exploring the Intersections of Technology, Crime and Terror, Terrorism and Political Violence 24(2) pp Kenney, M. (2015) Cyber-Terrorism in a Post- Stuxnet World, Foreign Policy Research Institute (winter) pp Gordon, S. and Ford, R. (2002) Cyberterrorism? Computers and Security 21(7) pp Ahmad, R. and Yunos, Z. (2012) A Dynamic Cyber Terrorism Framework, International Journal of Computer Science and Information Security 10(2) pp Jarvis, L. and Macdonald, S. (2015) What is cyberterrorism? Findings from a survey of researchers, Terrorism and Political Violence 24(7) pp Weimann, G. (2008) Cyber-Terrorism: Are we barking at the wrong tree? Harvard Asia Pacific Review 9(2) pp Kenney, M. (2015) Cyber- Terrorism in a Post-Stuxnet World, Foreign Policy Research Institute (winter) pp Rogers, M. (2003) The Psychology of Cyber-Terrorism. In Silke, A (ed.) Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences, John Wiley and Sons, Ltd. Lachow, I. (2009) Cyber Terrorism: Menace or Myth? In Kramer et al (eds.) Cyberpower and National Security, University of Nebraska Press: Potomac Books. Heickero, R. (2014) Cyber Terrorism: Electronic Jihad, Strategic Analysis 38(4) pp Denning, D. (2000) Cyberterrorism, Testimony before the Special Oversight Panel on Terrorism of the Committee on Armed Services, US House of Representatives, The Terrorism Research Center.

3 What about cyberterrorists? When it comes to engaging in debates on who cyberterrorist actors are, in general, a narrative is created in which the potential danger stemming from existing terrorist organisations use of the cyber sphere should be the primary focus of national security efforts. Despite the general, consensual agreement that cyberterrorism is not to encapsulate the notion of mere online presence of terrorist groups, facts such as a rise in the number of audio or video web messages published online by al Qaeda is highlighted as a cyberterrorist threat 10. The increase in the number of Salafist jihadi websites 11 and websites of terrorist organizations as listed by the State Department 12 is also referred to as an indicator of potential cyberterrorist activity. Thus, although there is agreement that, for the time being, terrorist groups such as al Qaeda mainly limit their online activities to communication, propaganda, data mining, recruitment and fundraising 13, the notion that the opportunities the cyber sphere opens to existing terrorist organisations will not go unnoticed, and that the threat of these actors turning to cyberterrorism is realistic (with the infinite number of avenues to explore and exploit), is constantly reinforced 14. These activities are generally used as evidence of cyberterrorist activity in the political discourse. The present-day narrative is that the West and the wider, liberal world order, are faced with an Islamist terrorism, linking the two labels together in one globally threatening concept. Such framing has been used time and time again to justify introduction of certain emergency measures and exceptional practices, ranging from war to engagement in regime change, statebuilding and extra-judicial procedures 15, all under the flag of removing threats to the liberal world order and our way of life, while at the same time, liberating the people suffering under such regimes. Terrorism, in general, has been framed as a concept linked to specific actors, groups and territories, certain religions and ways of life. This allows pursuing prevailing geostrategic interests in specific regions, as linking terrorism to states allows getting at states, [ ] and it is easier to find them then it is to find Bin Laden, as Dick Cheney, Vice President of the United States, outlined in It seems that the same logic is at play when it comes to framing cyberterrorist actors as well. Cyberterrorism is effectively and immensely being securitised and portrayed as a major national security threat, a Tier One security priority and one of the greatest challenges national security agencies will be faced with in the near future. At the same time, the consensual understanding of 10 Brunst, P. W. (2010) Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet. In Wade, M. and Maljevic, A. (eds.) A War on Terror?: The European Stance on a New Threat, Changing Laws and Human Rights Implications, Springer Science + Business Media, LLC p Ranstorp, M. (2007) The virtual sanctuary of al-qaeda and terrorism in an age of globalisation. In Eriksson, J. and Giacomello, G. (eds.) International Relations and Security in the Digital Age, Routledge Advances in International Relations and Global Politics p Minei, E. and Matusitz, J. (2013) Cyberterrorist messages: A semiotic perspective, Semiotica 197 p.274. Segal, A. (2016) The Hacked World Order, Public Affairs: A Council on Foreign Relations Book p Lewis, J. A. (2002) Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats, Center for Strategic and International Studies p.5. Weimann, G. (2005) Cyberterrorism: The sum of all fears? Studies in Conflict and Terrorism 28(2) pp Nye, J. S. Jr. (2011) The Future of Power, Public Affairs p.138. Heickero, R. (2014) Cyber Terrorism: Electronic Jihad, Strategic Analysis 38(4) pp Ranstorp, M. (2007) The virtual sanctuary of al-qaeda and terrorism in an age of globalisation. In Eriksson, J. and Giacomello, G. (eds.) International Relations and Security in the Digital Age, Routledge Advances in International Relations and Global Politics p.38. Brunst, P. W. (2010) Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet. In Wade, M. and Maljevic, A. (eds.) A War on Terror?: The European Stance on a New Threat, Changing Laws and Human Rights Implications, Springer Science + Business Media, LLC p Ditrych, O. (2014) Tracing the Discourses of Terrorism: Identity, Genealogy and State, Palgrave Macmillan p Jackson, R. (2005) Language, Power and Politics: Critical Discourse Analysis and the War on Terrorism, 49 th Parallel: An Interdisciplinary Journal of North American Studies 15.

4 what constitutes cyberterrorism is clearly and intentionally being marginalised for the sake of framing specific actors as cyberterrorists. Public opinion polls, as the one cited at the beginning of this article, demonstrate that the creation of such a discourse is reaping results the audience is reacting to such constructed frames and accepting them as a given. The end result is that the threat of cyberterrorism is, just like the threat of terrorism in general, be it chemical, biological or nuclear, having a significant effect on national policies 17, one led by the existing political discourse on terrorism, nicely fitted to the grand narrative of the War on Terror. That is, the narrative that cyberterrorists are, in reality, Salafist jihadi autonomous cells waging an electronic Pearl Harbour against the West. For this reason, specific attributes are used to describe the potential dangers stemming from terrorist use of the cyber sphere, including electronic, digital and cyber Jihad 18. At the same time, actors that have and do engage in activities that can be considered within the narrower definition of what cyberterrorism is, are generally left out of the debate. Organisations such as Anonymous are mainly framed as hacktivist groups, using digital means for organisational purposes rather than to commit acts of terror 19. They are not already labelled as a terrorist organisation and hence neither are their actions in the cyber sphere considered as acts of cyberterrorism. This understanding is maintained despite the fact that, for example, on April 7 each year, Anonymous runs the so-called #OpIsrael, in protest against Israeli policies towards Palestinians, with the aim of erasing Israel from the Internet, attacking websites of Israel Defence Forces, the prime minister s office, Israeli banks and airlines 20. Aside from using the cyber sphere to launch and carry out attacks on other computers and networks, groups claiming to be associated with Anonymous and contributing to #OpIsrael have also launched videos, threatening Israel with an electronic Holocaust 21. And this is only one example of Anonymous activity in the cyber sphere. Others include attacks on government and company websites in countries such as Brazil, Spain, Syria, Iran, Italy, the United States and the United Kingdom; attacks on banking systems; and attacks and leaking of information from the Central Intelligence Agency, the Federal Bureau of Investigation, the Federal Trade Commission, and Stratfor 22, to mention a few. The banking system has been defined as part of national critical infrastructure by a significant number of Western states, and therefore of interest for national security. The information leaked from security services could have contained either personal data of citizens or sensitive information of relevance to national security. And yet, none of these have been framed as cyberterrorist incidents in the general political discourse, as waging a War on Terror against Anonymous would not serve the purpose of a grand terrorism narrative. Anonymous is not a traditional organisation, it is not linked to a specific territory of strategic interest, it does not promote a specific religious, ethnic, or socio-economic group in society, nor does it act on behalf 17 Denning, D. (2001) Activism, hacktivism and cyberterrorism: The Internet as a tool for influencing foreign policy. In Arquilla, J. and Ronfeldt, D. (eds.) Networks and Netwars, RAND Corporation p Heickero, R. (2014) Cyber Terrorism: Electronic Jihad, Strategic Analysis 38(4) p.557. Emphasis added. 19 Cassim, F. (2012) Addressing the Spectre of Cyber Terrorism: A comparative perspective, PER 15(2) p Segal, A. (2016) The Hacked World Order, Public Affairs: A Council on Foreign Relations Book p.36, Zech, S. T. Virtual Vigilantes: Anonymous Cyber-Attacks Against the Islamic State, Political a Glance, April 7, Available at [Accessed March 28, 2017 at 4.16 PM] 22 Comninos, A. (2011) Information conflict and New Challenges to Peace Practitioners, Peace Magazine (October/November) p.16, 17. Kenney, M. (2015) Cyber-Terrorism in a Post-Stuxnet World, Foreign Policy Research Institute (winter) p.119.

5 of a particular state 23. Therefore fighting Anonymous would not imply a need to topple a foreign regime, or liberate a territory, a state or its people. It does not fall into the existing narrative of fighting terrorism, and the group and its activities are therefore neither framed as such. Still, if the psychological projection of fear is the final attribute of cyberterrorism 24, does not an unidentifiable actor, attacking government websites and threatening an electronic Holocaust in a video that goes viral online fulfil the wider, if not even the narrower, requirements to be framed as a cyberterrorist actor, given the consensual definition above? Getting the facts right It is therefore seemingly obvious that a certain dichotomy is at play when it comes to what the consensual definition of what cyberterrorism is, and the process of framing who cyberterrorist actors are, creating a general political discourse on this issue 25. This dichotomy requires attention and an attempt to contest the selective, often wilful, misuse by actors seeking to advance partisan interests when it comes to framing who is and who is not a terrorist in general 26, a notion that spills-over into the inquiry of cyberterrorism as well. Cyberterrorist actors seem to be framed for a specific purpose, with specific geostrategic interests in mind. These frames are not questioned. Rather, they are replicated through mass media as well as academic discussions on cyberterrorism. And once they are assigned and accepted as a fact, what could happen starts weighing as much as what is actually the case 27. If not even more so. This also removes the challenge of defining what cyberterrorism is, as focus is rather placed on who the actors are. As a result, onlookers are encouraged to identify any act by a group labelled as terrorist as automatically and necessarily a terrorist action, seeing terrorism as inextricably tied to the organisation itself, and not as a means of action 28. The practice of framing cyberterrorists thus follows the logic of the power of a name, whereby once a label is assigned, the logic of why and how this was done disappears, and a series of normative associations is attached to the named subject 29. Instead of having the analysis of potential threats of cyberterrorism pointing to the existence of new actors given the consensual definition arrived at and the situation on the ground already mapped terrorist organisations are artificially assigned a new capacity and a new label, that of cyberterrorists. Cyberterrorism as a concept thus needs to be disentangled from the existing narrative of the War on Terror, framing cyberterrorist actors to suit specific political and geostrategic interests and wrapped in a political discourse devoid of reality. It is back to the drawing board for national security thinkers and decision makers. If we are to truly erect a national security system capable of developing resources to fend off potential terrorist attacks in the cyber sphere, a reference 23 Zech, S. T. Virtual Vigilantes: Anonymous Cyber-Attacks Against the Islamic State, Political a Glance, April 7, Available at [Accessed March 28, 2017 at 4.16 PM] 24 Kenney, M. (2015) Cyber-Terrorism in a Post-Stuxnet World, Foreign Policy Research Institute (winter) p Dunn Cavelty, M. (2008) Cyber-Terror Looming Threat or Phantom Menace? Journal of Information Technology and Politics 4(1) pp Jarvis, L. et al (2016) Analogy and Authority in Cyberterrorism Discourse: An analysis of Global News Media Coverage, Global Society 30(4) pp Jackson, R. et al (2011) Terrorism: A critical introduction, Palgrave Macmillan p Zulaika, J. (2010) The terror/counterterror edge: When non-terror becomes a terrorism problem and real terror cannot be detected by counterterrorism, Critical Studies on Terrorism 3(2) p Jackson, R. et al (2011) Terrorism: A critical introduction, Palgrave Macmillan p Bhatia, M. (2005) Fighting words: naming terrorists, bandits, rebels and other violent actors, Third World Quarterly 26(1) pp.5-22.

6 needs to be made back to the initial definitions that see terrorism as action, cyberterrorism included. In order to really know what we are speaking of when we use the term, the current political narrative on cyberterrorism needs to be deconstructed by exploring the divide between reality and discourse, breaking away from the established frames of cyberterrorist actors and developing security policies in line with actual threats and challenges and not wider political, geostrategic interests stemming from other concepts. To this end, the terminology used in the announcement on the creation of the Global Internet Forum to Counter Terrorism is to be acknowledged 30. The platform, created by Facebook, Microsoft, Twitter and YouTube is to enable these giants to take a hard line against terrorist or violent extremist content on their hosted consumer services. Perhaps a small nudge, but one in the right way in terms of branding the content, and not the action of sharing it, as terrorist and/or extremist. The fact that the announcement clearly makes this distinction may show that gradually, the political discourse may be deconstructed in order to conform better to actual reality, and in a way characteristic of the cyber era pioneered by the tech industry. 30 Twitter, Global Internet Forum to Counter Terrorism, June 26, Available at [Accessed June 29, 2017 at 1.58 PM]

Agreement on counter-terrorism measures

Agreement on counter-terrorism measures 10/12/2015 Agreement on counter-terrorism measures We stand united in the fight against terrorism. Accountability and cooperation are required if the population of Sweden are to feel safe and secure. Having

More information

PREVENTING VIOLENT EXTREMISM ONLINE

PREVENTING VIOLENT EXTREMISM ONLINE PREVENTING VIOLENT EXTREMISM ONLINE THROUGH PUBLIC-PRIVATE PARTNERSHIPS 8 April 2016 Palais des Nations, Salle XXIII Report Executive Report On 8 April 2016, the Federal Department of Foreign Affairs of

More information

CONFERENCE BACKGROUND GUIDE

CONFERENCE BACKGROUND GUIDE MODEL UNITED NATIONS CHANGE THE WORLD E M I R A T E S CONFERENCE BACKGROUND GUIDE United Nations Security Council Cyber Terrorism Dear Delegates, Welcome to the 2018 Change The World Model United Nations

More information

Debating privacy and ICT

Debating privacy and ICT Debating privacy and ICT Citation for published version (APA): Est, van, R., & Harten, van, D. (2002). Debating privacy and ICT. In D. Harten, van (Ed.), International conference on the use of personal

More information

Report on community resilience to radicalisation and violent extremism

Report on community resilience to radicalisation and violent extremism Summary 14-02-2016 Report on community resilience to radicalisation and violent extremism The purpose of the report is to explore the resources and efforts of selected Danish local communities to prevent

More information

UN Security Council Resolution on Foreign Terrorist Fighters (FTFs)

UN Security Council Resolution on Foreign Terrorist Fighters (FTFs) Friday September 19 - V7 - BLUE UN Security Council Resolution on Foreign Terrorist Fighters (FTFs) 1. Reaffirming that terrorism in all forms and manifestations constitutes one of the most serious threats

More information

Dr. Maura Conway Dublin City University. Cyberterrorism

Dr. Maura Conway Dublin City University. Cyberterrorism Dr. Maura Conway Dublin City University Cyberterrorism A Definition: [H]ighly damaging computer based attacks or threats of attack by non state actors against information systems when conducted to intimidate

More information

Occasional Paper Countering Extremism: Learning from the United Kingdom Model

Occasional Paper Countering Extremism: Learning from the United Kingdom Model October 2015 Occasional Paper Countering Extremism: Learning from the United Kingdom Model Ghaffar Hussain Program on Extremism The Program on Extremism at George Washington University provides analysis

More information

Countering Violent Extremism and Radical Rhetoric

Countering Violent Extremism and Radical Rhetoric and Radical Rhetoric Assistant Professor School of International and Public Affairs Data Science Institute Columbia University February 1, 2019 A Soft Approach to Combat Terrorism Traditionally, CT has

More information

Intelligence and National Security Essay. Critically evaluate community- based approaches to counter- terrorism and counter- radicalisation.

Intelligence and National Security Essay. Critically evaluate community- based approaches to counter- terrorism and counter- radicalisation. Critically evaluate community- based approaches to counter- terrorism and counter- radicalisation. This essay critically examines community- based approaches to counter- terrorism and counter- radicalisation

More information

Radicalization/De-radicalization:

Radicalization/De-radicalization: Center on Global Counterterrorism Cooperation Project on U.S. Global Engagement Radicalization/De-radicalization: Lessons for the Next U.S. President 4 December 2008 SUMMARY In the third installment in

More information

Preventing Violent Extremism A Strategy for Delivery

Preventing Violent Extremism A Strategy for Delivery Preventing Violent Extremism A Strategy for Delivery i. Contents Introduction 3 Undermine extremist ideology and support mainstream voices 4 Disrupt those who promote violent extremism, and strengthen

More information

Roma Lyon Group s First Report on the Implementation of the G7 Action Plan on Countering Terrorism and Violent Extremism

Roma Lyon Group s First Report on the Implementation of the G7 Action Plan on Countering Terrorism and Violent Extremism Roma Lyon Group s First Report on the Implementation of the G7 Action Plan on Countering Terrorism and Violent Extremism Introduction At the Ise Shima Summit in 2016, the G7 Heads of State and Government

More information

ener.: ..., EU counter-terrorism policy: Main achievements and future challenges 9 th February 2011 Presentation by Rokhsana Fiaz, ENER Director

ener.: ..., EU counter-terrorism policy: Main achievements and future challenges 9 th February 2011 Presentation by Rokhsana Fiaz, ENER Director ener.: o EUROPEAN NETWORK OF EXPERTS ON RADICAlISATION EU counter-terrorism policy: Main achievements and future challenges Presentation by Rokhsana Fiaz, ENER Director European Economic and Social Committee

More information

G8 Declaration on Counter Terrorism

G8 Declaration on Counter Terrorism G8 Declaration on Counter Terrorism Now is the time for a new era of international cooperation that strengthens old partnerships and builds new ones to confront our common challenges and to defeat terrorism

More information

Study on methodologies or adapted technological tools to efficiently detect violent radical content on the Internet

Study on methodologies or adapted technological tools to efficiently detect violent radical content on the Internet Annex 1 TERMS OF REFERENCE Study on methodologies or adapted technological tools to efficiently detect violent radical content on the Internet 1. INTRODUCTION Modern information and communication technologies

More information

PAGE PAGE PAGE PAGE PAGE PAGE

PAGE PAGE PAGE PAGE PAGE PAGE 2015 PAGE 15 PAGE 11 PAGE 08 PAGE 16 PAGE 23 PAGE 07 CONTENT 4 A year of changes 7 Aiming at national security 9 Supo counters terrorism 10 Supo counters espionage 12 Supo protects the society 13 Supo

More information

Confronting Extremism and Terrorism. Chairman of the Committee for Defense and National Security, and the House of Representatives.

Confronting Extremism and Terrorism. Chairman of the Committee for Defense and National Security, and the House of Representatives. Confronting Extremism and Terrorism Major General Dr. Kamal Ahmed Amer Chairman of the Committee for Defense and National Security, and the House of Representatives. Terrorism is one of the most significant

More information

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein

NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES Martin S. Feldstein Working Paper 13729 http://www.nber.org/papers/w13729 NATIONAL BUREAU OF ECONOMIC RESEARCH

More information

Lee Jarvis List of Publications (September 2014)

Lee Jarvis List of Publications (September 2014) Lee Jarvis List of Publications (September 2014) Page 1 Books Jarvis, L., Macdonald, S. & Chen, T. (eds.) (Forthcoming, 2015) Terrorism Online. Abingdon: Routledge (in press). Heath-Kelly, C., Jarvis,

More information

EPP Policy Paper 1 A Secure Europe

EPP Policy Paper 1 A Secure Europe EPP Policy Paper 1 A Secure Europe We Europeans want to live in freedom, prosperity and security. Over more than 60 years, European integration and transatlantic cooperation has enabled us to achieve these

More information

Canada and Israel Strategic Partnership (22 January 2014)

Canada and Israel Strategic Partnership (22 January 2014) Canada and Israel Strategic Partnership (22 January 2014) http://www.international.gc.ca/name-anmo/canada_israel_mou-prot_ent_canada_israel.aspx?lang=eng Memorandum of Understanding: Canada and Israel

More information

I am happy to have the opportunity to address you today

I am happy to have the opportunity to address you today Special meeting of the Security Council Counter-Terrorism Committee on Preventing the Exploitation of Information and Communication Technologies (ICT) for Terrorist Purposes, while Respecting Human Rights

More information

Cover Story. - by Shraddha Bhandari. 24 JANUARY-FEBRUARY 2016 FSAI Journal

Cover Story. - by Shraddha Bhandari. 24 JANUARY-FEBRUARY 2016 FSAI Journal - by Shraddha Bhandari 24 JANUARY-FEBRUARY 2016 FSAI Journal Following the spate of terror attacks in Paris, Beirut, and downing of the Russian Metrojet liner in November 2015, concerns have been raised

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE COUNCIL OF THE EUROPEAN UNION Brussels, 29 October 2009 15184/09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE from : to : Subject : Presidency Delegations EU-US Statement on "Enhancing

More information

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism What is Terrorism? The Globalization of Terrorism Global Issues 621 Chapter 23 Page 364 1/13/2009 Terrorism 2 Unfortunately, the term terrorism is one that has become a part of our everyday vocabulary

More information

COREPER/Council No. prev. doc.: 5643/5/14 Revised EU Strategy for Combating Radicalisation and Recruitment to Terrorism

COREPER/Council No. prev. doc.: 5643/5/14 Revised EU Strategy for Combating Radicalisation and Recruitment to Terrorism COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2014 (OR. en) 9956/14 JAI 332 ENFOPOL 138 COTER 34 NOTE From: To: Presidency COREPER/Council No. prev. doc.: 5643/5/14 Subject: Revised EU Strategy for Combating

More information

Police-Community Engagement and Counter-Terrorism: Developing a regional, national and international hub. UK-US Workshop Summary Report December 2010

Police-Community Engagement and Counter-Terrorism: Developing a regional, national and international hub. UK-US Workshop Summary Report December 2010 Police-Community Engagement and Counter-Terrorism: Developing a regional, national and international hub UK-US Workshop Summary Report December 2010 Dr Basia Spalek & Dr Laura Zahra McDonald Institute

More information

Countering Violent Extremism and Humanitarian Action

Countering Violent Extremism and Humanitarian Action Photo: NRC / Christopher Herwig Position Paper June 2017 Countering Violent Extremism and Humanitarian Action Background Preventing crises will do more to contain violent extremists than countering violent

More information

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism?

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism? The Globalization of Terrorism Global Issues 621 Chapter 23 Page 364 What is Terrorism? 10/15/2013 Terrorism 2 What is Terrorism? Unfortunately, the term terrorism is one that has become a part of our

More information

epp european people s party

epp european people s party Combatting Islamist Terrorism and Protecting our Way of Life Resolution adopted by the EPP Political Assembly, Brussels 4th-5th December 2017 01 Today, more than ever before, freedom depends on security.

More information

Organization for Security and Co-operation in Europe. Asia-Europe Counter-Terrorism Dialogue Singapore, 31 October-1 November, 2016

Organization for Security and Co-operation in Europe. Asia-Europe Counter-Terrorism Dialogue Singapore, 31 October-1 November, 2016 Organization for Security and Co-operation in Europe Asia-Europe Counter-Terrorism Dialogue Singapore, 31 October-1 November, 2016 Remarks by Thomas Wuchte on Policy Recommendations for a Europe-Asia Counter-Terrorism

More information

UN- C.T.E.D 16 Nevember New York Returning Foreign Terrorist Fighters: Combating Threats and Managing Resilience

UN- C.T.E.D 16 Nevember New York Returning Foreign Terrorist Fighters: Combating Threats and Managing Resilience UN- C.T.E.D 16 Nevember 2017. New York Returning Foreign Terrorist Fighters: Combating Threats and Managing Resilience DR EL MOSTAFA REZRAZI OCP Policy Center Senior Fellow President of Moroccan Observatory

More information

Combating Terrorism Center at West Point. Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda

Combating Terrorism Center at West Point. Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda Combating Terrorism Center at West Point Occasional Paper Series Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda May 2, 2011 Scott Helfstein, Ph.D. Dominick Wright, Ph.D. The views

More information

U.S. House Committee on Armed Services Subcommittee on Terrorism, Unconventional Threats

U.S. House Committee on Armed Services Subcommittee on Terrorism, Unconventional Threats U.S. House Committee on Armed Services Subcommittee on Terrorism, Unconventional Threats "Strategic Communication and Countering Ideological Support for Terrorism" Statement of Duncan MacInnes Principal

More information

14276/16 UM/lv 1 DGE 1C

14276/16 UM/lv 1 DGE 1C Council of the European Union Brussels, 23 November 2016 (OR. en) 14276/16 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 21 November 2016 To: No. prev. doc.: Subject: Delegations

More information

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952) TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952) Until the 1990s, terrorism was widely considered to be a security concern of the second

More information

Manual for trainers. Community Policing Preventing Radicalisation & Terrorism. Prevention of and Fight Against Crime 2009

Manual for trainers. Community Policing Preventing Radicalisation & Terrorism. Prevention of and Fight Against Crime 2009 1 Manual for trainers Community Policing Preventing Radicalisation & Terrorism Prevention of and Fight Against Crime 2009 With financial support from the Prevention of and Fight against Crime Programme

More information

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES AT A HEARING ENTITLED ENCRYPTION TIGHTROPE: BALANCING AMERICANS

More information

Finland's response

Finland's response European Commission Directorate-General for Home Affairs Unit 3 - Police cooperation and relations with Europol and CEPOL B - 1049 Brussels Finland's response to European Commission's Public Consultation

More information

COUNTERING AND PREVENTING RADICALIZATION IN THE MENA REGION AND THE EU

COUNTERING AND PREVENTING RADICALIZATION IN THE MENA REGION AND THE EU REPORT COUNTERING AND PREVENTING RADICALIZATION IN THE MENA REGION AND THE EU SUMMARY OF FINDINGS AND CONCLUSIONS OF THE WORKSHOP COUNTERING AND PREVENT-ING RADICALIZATION: REVIEWING APPROACHES IN THE

More information

Rising Extremism in Central Asia? Stability in the Heartland for a Secure Eurasia

Rising Extremism in Central Asia? Stability in the Heartland for a Secure Eurasia Rising Extremism in Central Asia? Stability in the Heartland for a Secure Eurasia Briefing Seminar 9 February 2016 At a time when terrorist threats and the emergence of religious extremism are affecting

More information

Keywords: cyberterrorism, countermeasures, terrorism. 1. Introduction

Keywords: cyberterrorism, countermeasures, terrorism. 1. Introduction Countermeasures to Consider in the Combat against Cyberterrorism N Veerasamy and M Grobler CSIR, Pretoria, South Africa nveerasamy@csir.co.za mgrobler1@csir.co.za Abstract: Cyberterrorism addresses the

More information

Human Rights and Ethical Implications of Approaches to Countering Violent Extremism in Europe January 2018

Human Rights and Ethical Implications of Approaches to Countering Violent Extremism in Europe January 2018 Meeting Summary Human Rights and Ethical Implications of Approaches to Countering Violent Extremism in Europe 11 12 January 2018 The views expressed in this document are the sole responsibility of the

More information

Youth DE-Radicalization in Tunisia. Wissem Missaoui Search For Common Ground - Tunisia NECE Focus Group Thessaloniki, October 20, 2015

Youth DE-Radicalization in Tunisia. Wissem Missaoui Search For Common Ground - Tunisia NECE Focus Group Thessaloniki, October 20, 2015 Youth DE-Radicalization in Tunisia Wissem Missaoui Search For Common Ground - Tunisia NECE Focus Group Thessaloniki, October 20, 2015 Youth DE-Radicalization in Tunisia Wissem Missaoui Search For Common

More information

Recommendation for a COUNCIL DECISION

Recommendation for a COUNCIL DECISION EUROPEAN COMMISSION Brussels, 20.12.2017 COM(2017) 806 final Recommendation for a COUNCIL DECISION authorising the opening of negotiations for an agreement between the European Union and the State of Israel

More information

Conference on Use of the Internet to Counter the Appeal of Extremist Violence AGENDA

Conference on Use of the Internet to Counter the Appeal of Extremist Violence AGENDA Naif Arab University for Security Sciences Supported By In Partnership With Conference on Use of the Internet to Counter the Appeal of Extremist Violence Naif Arab University for Security Sciences, Riyadh,

More information

UNIT SIX: CHALLENGES OF THE MODERN ERA Part II

UNIT SIX: CHALLENGES OF THE MODERN ERA Part II UNIT SIX: CHALLENGES OF THE MODERN ERA Part II ARMS PROLIFERATION Spread of weapons of mass destruction (WMDs) (nuclear, chemical & biological weapons) throughout the world.* This is seen as dangerous

More information

Can Hashtags Change Democracies? By Juliana Luiz * Universidade Estadual do Rio de Janeiro, Rio de Janeiro, Rio de Janeiro, Brazil

Can Hashtags Change Democracies? By Juliana Luiz * Universidade Estadual do Rio de Janeiro, Rio de Janeiro, Rio de Janeiro, Brazil By Juliana Luiz * Universidade Estadual do Rio de Janeiro, Rio de Janeiro, Rio de Janeiro, Brazil (Sunstein, Cass. #Republic: Divided Democracy in the Age of Social Media. New Jersey: Princeton University

More information

Zahri Yunos CyberSecurity Malaysia Selangor, Malaysia

Zahri Yunos CyberSecurity Malaysia Selangor, Malaysia A Dynamic Cyber Terrorism Framework Rabiah Ahmad Dept of Computer System and Communication Faculty of Information and Communication Technology Universiti Teknikal Malaysia Melaka (UTeM) Melaka, Malaysia

More information

CoPPRa : Community policing and prevention of radicalisation. Rob Out 1

CoPPRa : Community policing and prevention of radicalisation. Rob Out 1 CoPPRa : Community policing and prevention of radicalisation Rob Out 1 I m really pleased to see that the CoPPRa project specifically addresses one of the most important but, in counter-terrorism context

More information

The Department of State s Annual Report on Terrorism

The Department of State s Annual Report on Terrorism The Department of State s Annual Report on Terrorism Testimony of Raphael F. Perl Specialist in International Affairs Foreign Affairs, Defense, and Trade Division Congressional Research Service Before

More information

Concept Note: Preventing of ideas radicalization Author: Séraphin ALAVA

Concept Note: Preventing of ideas radicalization Author: Séraphin ALAVA Programme Erasmus + Programme Action 3 Key Action 3: Support for policy reform - Social inclusion through education, training and youth Sub-area Lot 1: Education and training Call deadline 30 May 2016

More information

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire 2015 Biennial American Survey May, 2015 - Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire [DISPLAY] In this survey, we d like your opinions about some important

More information

International conference on preventing and countering radicalization and violent extremism as related to the Foreign Terrorist Fighters (FTF) threat

International conference on preventing and countering radicalization and violent extremism as related to the Foreign Terrorist Fighters (FTF) threat International conference on preventing and countering radicalization and violent extremism as related to the Foreign Terrorist Fighters (FTF) threat Abu Dhabi, United Arab Emirates (UAE) Dates: 26-28 April

More information

Lebanon, Egypt, Palestine, Iraq, Syria, Tunisia, Morocco, Libya, Yemen and Kurdistan Region in Iraq.

Lebanon, Egypt, Palestine, Iraq, Syria, Tunisia, Morocco, Libya, Yemen and Kurdistan Region in Iraq. Conference Enhancing Women s Contribution to Peace Building and Conflict Resolution in the Arab Region Beirut - Lebanon - 25-26 May 2016 Final Communique Sixty women leaders from 10 Arab countries Participate

More information

Cyberterrorism conjures images of

Cyberterrorism conjures images of Terrorist Use of the Internet The Real Story By I r v i n g L a c h o w and C o u r t n e y R i c h a r d s o n Web site showing nuclear attack on large city Abu Musab al-zarqawi used streaming media on

More information

UN Presentation- Combating the Evolving Threat from Foreign Terrorist Fighters

UN Presentation- Combating the Evolving Threat from Foreign Terrorist Fighters UN Presentation- Combating the Evolving Threat from Foreign Terrorist Fighters Introduction Terrorist groups are increasingly radicalizing and inciting individuals worldwide to leave their homes and become

More information

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC The Challenges of Terrorist Financing in 2014 and Beyond May 7, 2014 Dennis M. Lormel President & CEO DML Associates, LLC Al-Qaeda s Most Dangerous Member: Nasir al-wuhayshi 2 Terrorist Threats 2014 Introduction

More information

30 June 1 July 2015, Hofburg, Vienna

30 June 1 July 2015, Hofburg, Vienna CIO.GAL/105/15 10 July 2015 ENGLISH only Chairmanship s Perception Paper Outcomes and Recommendations from the 2015 OSCE-wide Counter-Terrorism Expert Conference on Countering the Incitement and Recruitment

More information

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks Policy Paper The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks I Context The writing of the new European Union

More information

Panel: Norms, standards and good practices aimed at securing elections

Panel: Norms, standards and good practices aimed at securing elections Panel: Norms, standards and good practices aimed at securing elections The trolls of democracy RAFAEL RUBIO NÚÑEZ Professor of Constitutional Law Complutense University, Madrid Center for Political and

More information

terrorism commentary on security pdf (PDF) The War on Cyberterrorism - academia.edu Anti-terrorism legislation - Wikipedia

terrorism commentary on security pdf (PDF) The War on Cyberterrorism - academia.edu Anti-terrorism legislation - Wikipedia DOWNLOAD OR READ : TERRORISM COMMENTARY ON SECURITY DOCUMENTS VOLUME 113 OMMENTARY ON SECURITY DOCUMENTS PIRACY AND INTERNATIONAL MARITIME SECURITYTERRORISM AND HOMELAND SECURITY PDF EBOOK EPUB MOBI Page

More information

EU-GRASP Policy Brief

EU-GRASP Policy Brief ISSUE 3 03 March 2012 EU-GRASP Policy Brief Changing Multilateralism: the EU as a Global-Regional Actor in Security and Peace, or EU-GRASP, is a European Union (EU) funded project under the 7th Framework

More information

Measures to prevent the recruitment and radicalization of young persons by international terrorist groups

Measures to prevent the recruitment and radicalization of young persons by international terrorist groups 2018 Peacebuilding Commission Measures to prevent the recruitment and radicalization of young persons by international terrorist groups 1 Index Introduction... 3 Definition of key-terms... 4 General Overview...

More information

Counter-Extremism Strategy

Counter-Extremism Strategy Counter-Extremism Strategy Purpose For discussion and direction. Summary In the summer the Prime Minister set out how the government would look to tackle the threat posed by extremism through a Counter

More information

Chapter 6 Foreign Aid

Chapter 6 Foreign Aid Chapter 6 Foreign Aid FOREIGN AID REPRESENTS JUST 1% OF THE FEDERAL BUDGET FOREIGN AID 1% Defense 19% Education 4% Health 10% Medicare 13% Income Security 16% Social Security 21% Net Interest 6% Veterans

More information

Ada, National College for Digital Skills supports the Home Office 4P Prevent strategy to combat radicalisation and terrorism.

Ada, National College for Digital Skills supports the Home Office 4P Prevent strategy to combat radicalisation and terrorism. Prevent Policy Ada, National College for Digital Skills September 2016 Introduction Ada, National College for Digital Skills is committed to providing a secure environment for students, and all staff recognise

More information

Terrorism in Africa: Challenges and perspectives

Terrorism in Africa: Challenges and perspectives African Training and Research Centre in Administration for Development Hanns Seidel Foundation The Governance of National Security: Challenges and Prospects New Strategies to Address Growing Security Threats

More information

WINTER. March 24. Template

WINTER. March 24. Template March 24 WINTER EQ- What are the different state shapes and types of boundaries? Agenda: 1. Daily Sheet 2. Review 3. Nation, State, Nation-States Gallery walk 4. Types of Boundaries Notes 4. Shapes of

More information

Parliamentary Papers, House of Representatives , , no Papers, House of Representatives , , no. 253.

Parliamentary Papers, House of Representatives , , no Papers, House of Representatives , , no. 253. Letter of 14 November 2016 from the Minister of Security and Justice and the Minister of Social Affairs and Employment to the House of Representatives on the seventh progress report on the Integrated Approach

More information

School Prevent Policy Protecting Children from Extremism and Radicalisation

School Prevent Policy Protecting Children from Extremism and Radicalisation School Prevent Policy Protecting Children from Extremism and Radicalisation Schools have a vital role to play in protecting children and young people from the risks of extremism and radicalization. This

More information

Delegations will find attached the conclusions adopted by the European Council at the above meeting.

Delegations will find attached the conclusions adopted by the European Council at the above meeting. European Council Brussels, 19 October 2017 (OR. en) EUCO 14/17 CO EUR 17 CONCL 5 COVER NOTE From: General Secretariat of the Council To: Delegations Subject: European Council meeting (19 October 2017)

More information

icd - institute for cultural diplomacy

icd - institute for cultural diplomacy 2011: Hard Vs. Soft Power in Global and National Politics: Innovative Concepts of Smart Power and Cultural Diplomacy in an Age of Interdependence, Digital Revolution, and Social Media The 2011: Hard Vs.

More information

7834/18 KT/np 1 DGE 1C

7834/18 KT/np 1 DGE 1C Council of the European Union Brussels, 24 April 2018 (OR. en) 7834/18 NOTE From: To: General Secretariat of the Council JEUN 38 EDUC 122 CULT 38 RELEX 309 Permanent Representatives Committee/Council No.

More information

At the outset, I wish to thank our hosts for inviting me to this Conference.

At the outset, I wish to thank our hosts for inviting me to this Conference. Statement by Dr. Dipu Moni, MP, Hon ble Foreign Minister, Government of the People s Republic of Bangldesh, at the Opening Session of the International Counter-Terrorism Focal Points Conference on Addressing

More information

Anti-Radicalisation Guidance

Anti-Radicalisation Guidance 1. Introduction CALAT is committed to providing a secure environment for students, where learners feel safe and are kept safe. All adults at CALAT recognise that safeguarding is everyone s responsibility

More information

Written Testimony. Submitted to the British Council All Party Parliamentary Group on Building Resilience to Radicalism in MENA November 2016

Written Testimony. Submitted to the British Council All Party Parliamentary Group on Building Resilience to Radicalism in MENA November 2016 Written Testimony Submitted to the British Council All Party Parliamentary Group on Building Resilience to Radicalism in MENA November 2016 Chairman, honorable members, is a world leader in International

More information

Prevent and counter extremism

Prevent and counter extremism Prevent and counter extremism Purpose For discussion and direction. Summary This paper is to update the on recent work around Prevent and counter-extremism and set out proposals for future work. Recommendations

More information

Safeguarding Children and Young People Statement

Safeguarding Children and Young People Statement Safeguarding Children and Young People Statement Excellence in Learning, Development and Training The support and protection of children cannot be achieved by a single agency Every service has to play

More information

Speech by Mr. Jean-Paul Laborde Open Briefing to Member States 22 December 2010

Speech by Mr. Jean-Paul Laborde Open Briefing to Member States 22 December 2010 Speech by Mr. Jean-Paul Laborde Open Briefing to Member States 22 December 2010 Excellencies, Ladies and Gentlemen I would like to begin by thanking you for taking the time to come to this Open Briefing

More information

7th ANNUAL INTERPA CONFERENCE NEW TRENDS IN COMBATTING TERRORISM AND EXTREMISM

7th ANNUAL INTERPA CONFERENCE NEW TRENDS IN COMBATTING TERRORISM AND EXTREMISM 7th ANNUAL INTERPA CONFERENCE NEW TRENDS IN COMBATTING TERRORISM AND EXTREMISM The 7 TH Annual INTERPA Conference on New trends in combatting terrorism and extremism was hosted by the police college of

More information

Addressing Emerging Terrorist Threats and the Role of UNODC

Addressing Emerging Terrorist Threats and the Role of UNODC Addressing Emerging Terrorist Threats and the Role of UNODC Ms. Dolgor Solongo, Officer-in-Charge, ISS1 (Asia and Europe)/ Terrorism Prevention Branch 14 April 2015 Terrorism Evolving Global Threat Terrorism

More information

Background Brief for Final Presidential Debate: What Kind of Foreign Policy Do Americans Want? By Gregory Holyk and Dina Smeltz 1

Background Brief for Final Presidential Debate: What Kind of Foreign Policy Do Americans Want? By Gregory Holyk and Dina Smeltz 1 October 19, 2012 Background Brief for Final Presidential Debate: What Kind of Foreign Policy Do Americans Want? By Gregory Holyk and Dina Smeltz 1 Foreign policy will take center stage in the third and

More information

Terrorism and Communication: A Critical Introduction

Terrorism and Communication: A Critical Introduction Terrorism and Communication: A Critical Introduction Matusitz, J ISBN-13: 9781452240282 Table of Contents 1. What Is Terrorism? Terrorism: Origin of the Word Terrorism: Definition Definitions from Various

More information

Countering Violent Extremism (CVE) How to fight the monster? Author: Selim Ibraimi, MA

Countering Violent Extremism (CVE) How to fight the monster? Author: Selim Ibraimi, MA Countering Violent Extremism () How to fight the monster? Author: Selim Ibraimi, MA Center for Security Studies and Development- Macedonia CSSD Area:Extremism Studies -Western Balkans 2016 TABLE OF CONTENTS

More information

Preventing violent extremism through youth empowerment

Preventing violent extremism through youth empowerment Forum: Issue: Human Rights Council Preventing violent extremism through youth empowerment Student Officer: Nayoon Park Position: Deputy President Introduction Violent extremism is a practice that involves

More information

Researching Counter-Terrorism Policing and Communities

Researching Counter-Terrorism Policing and Communities Researching Counter-Terrorism Policing and Communities D R B A S I A S P A L E K R E A D E R I N C O M M U N I T I E S & J U S T I C E U N I V E R S I T Y O F B I R M I N G H A M Background Context: Community

More information

General Course Information

General Course Information Course ECON 3369_HN1 The Political Economy of Terrorism Professor Todd Sandler Term Fall 2016 Meetings M, W 10:00-11:15 a.m., GC 1.208B Professor s Contact Information Office Phone 972-883-6725 Office

More information

ICAO AVIATION SECURITY GLOBAL RISK CONTEXT STATEMENT. (Extract)

ICAO AVIATION SECURITY GLOBAL RISK CONTEXT STATEMENT. (Extract) Page 1 of 6 ICAO AVIATION SECURITY GLOBAL RISK CONTEXT STATEMENT (Extract) INTRODUCTION The continuing threat of terrorism is most effectively managed by identifying, understanding and addressing the potential

More information

Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon

Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon by Lee Jarvis and Stuart Macdonald Abstract This article reports on findings from a survey on the concept of cyberterrorism

More information

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act Statement for the Record House Judiciary Subcommittee on Crime, Terrorism and Homeland Security Hearing on Reauthorizing the Patriot Act Statement for the Record Robert S. Litt General Counsel Office of

More information

Australasian University Safety Association 2016 Fiona Austin

Australasian University Safety Association 2016 Fiona Austin Managing global mobility legal issues for work safety and security Australasian University Safety Association 2016 Fiona Austin Top legal issues for organisations in mobility transition Global jurisdictions

More information

Prevent Policy Preventing violent and non-violent extremism and radicalisation

Prevent Policy Preventing violent and non-violent extremism and radicalisation Prevent Policy Preventing violent and non-violent extremism and radicalisation The purpose of this policy is to: Ensure an awareness of Prevent within the College Provide a clear framework to structure

More information

Promoting British Values/ Anti-Radicalisation/ Prevent Policy Reviewed June 2018

Promoting British Values/ Anti-Radicalisation/ Prevent Policy Reviewed June 2018 Ulverston Victoria High School POLICIES Promoting British Values/ Anti-Radicalisation/ Prevent Policy Reviewed June 2018 Adopted by Ulverston Victoria High School Governing Body On (Date) 26 th May 2016

More information

White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION

White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION The United States has a vital national security interest in addressing the current and potential

More information

Willington Primary Prevent Policy Protecting Children from Extremism and Radicalisation

Willington Primary Prevent Policy Protecting Children from Extremism and Radicalisation Willington Primary Prevent Policy Protecting Children from Extremism and Radicalisation Childcare providers have a vital role to play in protecting children and young people from the risks of extremism

More information

"Responses to the threat of terrorism and effects on communities

Responses to the threat of terrorism and effects on communities SPEECH/05/718 Vice-President Franco FRATTINI European Commissioner responsible for Justice, Freedom and Security "Responses to the threat of terrorism and effects on communities EU JHA Committees Conference

More information

European Council Conclusions on Migration, Digital Europe, Security and Defence (19 October 2017)

European Council Conclusions on Migration, Digital Europe, Security and Defence (19 October 2017) European Council Brussels, 19 October 2017 European Council Conclusions on Migration, Digital Europe, Security and Defence (19 October 2017) I. MIGRATION 1. The approach pursued by Member States and EU

More information

Congressional Testimony

Congressional Testimony Congressional Testimony FOREIGN ASSISTANCE, SUPPORT FOR EXTREMISM AND PUBLIC OPINION IN MUSLIM MAJORITY COUNTRIES Written Testimony of Kenneth Ballen President Terror Free Tomorrow: The Center for Public

More information