Cyberterrorism sʌɪbəˈtɛrərɪz(ə)m/ noun. What we are (not) speaking about?
|
|
- Mark Woods
- 5 years ago
- Views:
Transcription
1 Cyberterrorism sʌɪbəˈtɛrərɪz(ə)m/ noun. What we are (not) speaking about? Irina Rizmal Cyberterrorism has come to be understood as one of the leading threats to vital interests of Western states. Even though there is general agreement that a cyberterrorist attack has not yet been experienced, there is consensus on what cyberterrorism might imply. However, contrary to this understanding, when it comes to framing who the potential cyberterrorists are, this consensual definition seems to be marginalised in order to reinforce the narrative of the prevailing discourse of the War on Terror that Salafist jihadists are preparing an electronic war against the West and the liberal world order; with other actors, potentially more threatening to national security in the cyber sphere, intentionally left out. A specific political discourse is thus created around cyberterrorism, one that is meant to pose as a natural extension of the current discourse on terrorism in general, by artificially attributing cyberterrorist capabilities to already defined, traditional terrorist organisations. If continued, this trend of attributing cyberterrorist capabilities to the wrong actors, portraying cyberterrorism as something that it is not, may ultimately undermine actual counterterrorist efforts in the cyber sphere and damage national security in the long run. In 2016, 73% of Americans cited cyberterrorism as a leading threat to vital interests of the United States in the next 10 years 1. It has been described as perfectly combining two of the greatest present-day fears, that of random, violent victimization and the general distrust of computer technology 2. And given the language commonly used to describe the potential dangers stemming from the cyber sphere, including references to a potential Cybergeddon and an electronic Pearl Harbour, complemented with the overuse of the term cyberterrorism by mass media, for incidents ranging from computer viruses, to website defacement, to actual hacking attempts, these results are no surprise. Although there is no precise definition of cyberterrorism, there is general consensus that it involves attacks and threat of attacks on computers, networks and the information stored therein to coerce a government or its people in the furtherance of political or social objectives 3. However, the label cyberterrorist has in the political discourse mainly been applied to actors and organisations already framed as terrorist, although recognising that these actors have not yet carried out activities that could be labelled as cyberterrorism. Assigning this label of the next 1 Gallup, Americans Cite Cyberterrorism Among Top Three Threats to U.S. February 10, Available at [Accessed March 28, 2017 at PM] 2 Weimann, G. (2005) Cyberterrorism: The sum of all fears? Studies in Conflict and Terrorism 28(2) p Denning, D. (2000) Cyberterrorism, Testimony before the Special Oversight Panel on Terrorism of the Committee on Armed Services, US House of Representatives, The Terrorism Research Center.
2 cyberterrorists to organisations such as al Qaeda, Hamas and ISIL is justified based on the general use of the Internet by these actors, for purposes such as communication, spreading propaganda, recruitment and fundraising, or, in less words, mainly the spread of extremist content. At the same time, organisations that have and do engage in activities found in the narrower definition of cyberterrorism, such as Anonymous, are labelled merely as hacktivists and their activities as disruptive, rather than destructive or threatening to national security, despite attacks on, for example, national critical infrastructure. Therefore, parallel to the process of establishing a narrow(er) consensual definition of cyberterrorism, the framing of cyberterrorist actors follows a seemingly different logic, ignoring the fact that terrorism, in general, refers to actions, not actors. Cyberterrorism, sʌɪbəˈtɛrərɪz(ə)m/, noun. The greatest challenge in reaching consensus on a definition of cyberterrorism has focused around the debate on whether to adopt a narrow, target-oriented definition of the concept, or a broader, tool-oriented one 4. Proponents of the latter argue that cyberterrorism should be seen as encapsulating general use of the Internet and computers by terrorists 5. However, widening the definition in this way risks labelling any online activity conducted by terrorist organisations as terrorism, regardless of whether the activity itself is, in fact, terrorist 6. This precludes any understanding of the concept of cyberterrorism itself, and defines an activity based on the actors engaged, rather than what it actually implies. As a result, the term becomes so misplaced and overused that it no longer bears any clear meaning 7. For this reason, a number of authors agree that cyberterrorism needs to be clearly defined and separated from other activities terrorist and other organisations and individuals engage in online, including communication, spread of extremist content and propaganda, or cybercrime for terrorist purposes. There is general agreement that cyberterrorism refers to the means to carry out an attack, while the motive remains the same as in traditional forms of terrorism 8. Bearing this in mind, a consensual definition of cyberterrorism, and the one most often referred to, is found in Dorothy Denning s testimony before the US House of Representatives, defining cyberterrorism as unlawful attacks and threats of attack against computers, networks and the information stored therein with the intention of intimidating or coercing a government or its people in the furtherance of political or social objectives. For an attack to constitute an act of terrorism, it must also have a serious intended effect in terms of human and economic casualties or intense fear and anxiety among citizens terror 9. 4 Jarvis, L. and Macdonald, S. (2015) What is cyberterrorism? Findings from a survey of researchers, Terrorism and Political Violence 24(7) p Taliharm, A. M. (2011) Emerging Security Challenges and Cyber Terrorism, Digital Development Debates #05. Holt, T. J. (2012) Exploring the Intersections of Technology, Crime and Terror, Terrorism and Political Violence 24(2) pp Kenney, M. (2015) Cyber-Terrorism in a Post- Stuxnet World, Foreign Policy Research Institute (winter) pp Gordon, S. and Ford, R. (2002) Cyberterrorism? Computers and Security 21(7) pp Ahmad, R. and Yunos, Z. (2012) A Dynamic Cyber Terrorism Framework, International Journal of Computer Science and Information Security 10(2) pp Jarvis, L. and Macdonald, S. (2015) What is cyberterrorism? Findings from a survey of researchers, Terrorism and Political Violence 24(7) pp Weimann, G. (2008) Cyber-Terrorism: Are we barking at the wrong tree? Harvard Asia Pacific Review 9(2) pp Kenney, M. (2015) Cyber- Terrorism in a Post-Stuxnet World, Foreign Policy Research Institute (winter) pp Rogers, M. (2003) The Psychology of Cyber-Terrorism. In Silke, A (ed.) Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences, John Wiley and Sons, Ltd. Lachow, I. (2009) Cyber Terrorism: Menace or Myth? In Kramer et al (eds.) Cyberpower and National Security, University of Nebraska Press: Potomac Books. Heickero, R. (2014) Cyber Terrorism: Electronic Jihad, Strategic Analysis 38(4) pp Denning, D. (2000) Cyberterrorism, Testimony before the Special Oversight Panel on Terrorism of the Committee on Armed Services, US House of Representatives, The Terrorism Research Center.
3 What about cyberterrorists? When it comes to engaging in debates on who cyberterrorist actors are, in general, a narrative is created in which the potential danger stemming from existing terrorist organisations use of the cyber sphere should be the primary focus of national security efforts. Despite the general, consensual agreement that cyberterrorism is not to encapsulate the notion of mere online presence of terrorist groups, facts such as a rise in the number of audio or video web messages published online by al Qaeda is highlighted as a cyberterrorist threat 10. The increase in the number of Salafist jihadi websites 11 and websites of terrorist organizations as listed by the State Department 12 is also referred to as an indicator of potential cyberterrorist activity. Thus, although there is agreement that, for the time being, terrorist groups such as al Qaeda mainly limit their online activities to communication, propaganda, data mining, recruitment and fundraising 13, the notion that the opportunities the cyber sphere opens to existing terrorist organisations will not go unnoticed, and that the threat of these actors turning to cyberterrorism is realistic (with the infinite number of avenues to explore and exploit), is constantly reinforced 14. These activities are generally used as evidence of cyberterrorist activity in the political discourse. The present-day narrative is that the West and the wider, liberal world order, are faced with an Islamist terrorism, linking the two labels together in one globally threatening concept. Such framing has been used time and time again to justify introduction of certain emergency measures and exceptional practices, ranging from war to engagement in regime change, statebuilding and extra-judicial procedures 15, all under the flag of removing threats to the liberal world order and our way of life, while at the same time, liberating the people suffering under such regimes. Terrorism, in general, has been framed as a concept linked to specific actors, groups and territories, certain religions and ways of life. This allows pursuing prevailing geostrategic interests in specific regions, as linking terrorism to states allows getting at states, [ ] and it is easier to find them then it is to find Bin Laden, as Dick Cheney, Vice President of the United States, outlined in It seems that the same logic is at play when it comes to framing cyberterrorist actors as well. Cyberterrorism is effectively and immensely being securitised and portrayed as a major national security threat, a Tier One security priority and one of the greatest challenges national security agencies will be faced with in the near future. At the same time, the consensual understanding of 10 Brunst, P. W. (2010) Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet. In Wade, M. and Maljevic, A. (eds.) A War on Terror?: The European Stance on a New Threat, Changing Laws and Human Rights Implications, Springer Science + Business Media, LLC p Ranstorp, M. (2007) The virtual sanctuary of al-qaeda and terrorism in an age of globalisation. In Eriksson, J. and Giacomello, G. (eds.) International Relations and Security in the Digital Age, Routledge Advances in International Relations and Global Politics p Minei, E. and Matusitz, J. (2013) Cyberterrorist messages: A semiotic perspective, Semiotica 197 p.274. Segal, A. (2016) The Hacked World Order, Public Affairs: A Council on Foreign Relations Book p Lewis, J. A. (2002) Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats, Center for Strategic and International Studies p.5. Weimann, G. (2005) Cyberterrorism: The sum of all fears? Studies in Conflict and Terrorism 28(2) pp Nye, J. S. Jr. (2011) The Future of Power, Public Affairs p.138. Heickero, R. (2014) Cyber Terrorism: Electronic Jihad, Strategic Analysis 38(4) pp Ranstorp, M. (2007) The virtual sanctuary of al-qaeda and terrorism in an age of globalisation. In Eriksson, J. and Giacomello, G. (eds.) International Relations and Security in the Digital Age, Routledge Advances in International Relations and Global Politics p.38. Brunst, P. W. (2010) Terrorism and the Internet: New Threats Posed by Cyberterrorism and Terrorist Use of the Internet. In Wade, M. and Maljevic, A. (eds.) A War on Terror?: The European Stance on a New Threat, Changing Laws and Human Rights Implications, Springer Science + Business Media, LLC p Ditrych, O. (2014) Tracing the Discourses of Terrorism: Identity, Genealogy and State, Palgrave Macmillan p Jackson, R. (2005) Language, Power and Politics: Critical Discourse Analysis and the War on Terrorism, 49 th Parallel: An Interdisciplinary Journal of North American Studies 15.
4 what constitutes cyberterrorism is clearly and intentionally being marginalised for the sake of framing specific actors as cyberterrorists. Public opinion polls, as the one cited at the beginning of this article, demonstrate that the creation of such a discourse is reaping results the audience is reacting to such constructed frames and accepting them as a given. The end result is that the threat of cyberterrorism is, just like the threat of terrorism in general, be it chemical, biological or nuclear, having a significant effect on national policies 17, one led by the existing political discourse on terrorism, nicely fitted to the grand narrative of the War on Terror. That is, the narrative that cyberterrorists are, in reality, Salafist jihadi autonomous cells waging an electronic Pearl Harbour against the West. For this reason, specific attributes are used to describe the potential dangers stemming from terrorist use of the cyber sphere, including electronic, digital and cyber Jihad 18. At the same time, actors that have and do engage in activities that can be considered within the narrower definition of what cyberterrorism is, are generally left out of the debate. Organisations such as Anonymous are mainly framed as hacktivist groups, using digital means for organisational purposes rather than to commit acts of terror 19. They are not already labelled as a terrorist organisation and hence neither are their actions in the cyber sphere considered as acts of cyberterrorism. This understanding is maintained despite the fact that, for example, on April 7 each year, Anonymous runs the so-called #OpIsrael, in protest against Israeli policies towards Palestinians, with the aim of erasing Israel from the Internet, attacking websites of Israel Defence Forces, the prime minister s office, Israeli banks and airlines 20. Aside from using the cyber sphere to launch and carry out attacks on other computers and networks, groups claiming to be associated with Anonymous and contributing to #OpIsrael have also launched videos, threatening Israel with an electronic Holocaust 21. And this is only one example of Anonymous activity in the cyber sphere. Others include attacks on government and company websites in countries such as Brazil, Spain, Syria, Iran, Italy, the United States and the United Kingdom; attacks on banking systems; and attacks and leaking of information from the Central Intelligence Agency, the Federal Bureau of Investigation, the Federal Trade Commission, and Stratfor 22, to mention a few. The banking system has been defined as part of national critical infrastructure by a significant number of Western states, and therefore of interest for national security. The information leaked from security services could have contained either personal data of citizens or sensitive information of relevance to national security. And yet, none of these have been framed as cyberterrorist incidents in the general political discourse, as waging a War on Terror against Anonymous would not serve the purpose of a grand terrorism narrative. Anonymous is not a traditional organisation, it is not linked to a specific territory of strategic interest, it does not promote a specific religious, ethnic, or socio-economic group in society, nor does it act on behalf 17 Denning, D. (2001) Activism, hacktivism and cyberterrorism: The Internet as a tool for influencing foreign policy. In Arquilla, J. and Ronfeldt, D. (eds.) Networks and Netwars, RAND Corporation p Heickero, R. (2014) Cyber Terrorism: Electronic Jihad, Strategic Analysis 38(4) p.557. Emphasis added. 19 Cassim, F. (2012) Addressing the Spectre of Cyber Terrorism: A comparative perspective, PER 15(2) p Segal, A. (2016) The Hacked World Order, Public Affairs: A Council on Foreign Relations Book p.36, Zech, S. T. Virtual Vigilantes: Anonymous Cyber-Attacks Against the Islamic State, Political a Glance, April 7, Available at [Accessed March 28, 2017 at 4.16 PM] 22 Comninos, A. (2011) Information conflict and New Challenges to Peace Practitioners, Peace Magazine (October/November) p.16, 17. Kenney, M. (2015) Cyber-Terrorism in a Post-Stuxnet World, Foreign Policy Research Institute (winter) p.119.
5 of a particular state 23. Therefore fighting Anonymous would not imply a need to topple a foreign regime, or liberate a territory, a state or its people. It does not fall into the existing narrative of fighting terrorism, and the group and its activities are therefore neither framed as such. Still, if the psychological projection of fear is the final attribute of cyberterrorism 24, does not an unidentifiable actor, attacking government websites and threatening an electronic Holocaust in a video that goes viral online fulfil the wider, if not even the narrower, requirements to be framed as a cyberterrorist actor, given the consensual definition above? Getting the facts right It is therefore seemingly obvious that a certain dichotomy is at play when it comes to what the consensual definition of what cyberterrorism is, and the process of framing who cyberterrorist actors are, creating a general political discourse on this issue 25. This dichotomy requires attention and an attempt to contest the selective, often wilful, misuse by actors seeking to advance partisan interests when it comes to framing who is and who is not a terrorist in general 26, a notion that spills-over into the inquiry of cyberterrorism as well. Cyberterrorist actors seem to be framed for a specific purpose, with specific geostrategic interests in mind. These frames are not questioned. Rather, they are replicated through mass media as well as academic discussions on cyberterrorism. And once they are assigned and accepted as a fact, what could happen starts weighing as much as what is actually the case 27. If not even more so. This also removes the challenge of defining what cyberterrorism is, as focus is rather placed on who the actors are. As a result, onlookers are encouraged to identify any act by a group labelled as terrorist as automatically and necessarily a terrorist action, seeing terrorism as inextricably tied to the organisation itself, and not as a means of action 28. The practice of framing cyberterrorists thus follows the logic of the power of a name, whereby once a label is assigned, the logic of why and how this was done disappears, and a series of normative associations is attached to the named subject 29. Instead of having the analysis of potential threats of cyberterrorism pointing to the existence of new actors given the consensual definition arrived at and the situation on the ground already mapped terrorist organisations are artificially assigned a new capacity and a new label, that of cyberterrorists. Cyberterrorism as a concept thus needs to be disentangled from the existing narrative of the War on Terror, framing cyberterrorist actors to suit specific political and geostrategic interests and wrapped in a political discourse devoid of reality. It is back to the drawing board for national security thinkers and decision makers. If we are to truly erect a national security system capable of developing resources to fend off potential terrorist attacks in the cyber sphere, a reference 23 Zech, S. T. Virtual Vigilantes: Anonymous Cyber-Attacks Against the Islamic State, Political a Glance, April 7, Available at [Accessed March 28, 2017 at 4.16 PM] 24 Kenney, M. (2015) Cyber-Terrorism in a Post-Stuxnet World, Foreign Policy Research Institute (winter) p Dunn Cavelty, M. (2008) Cyber-Terror Looming Threat or Phantom Menace? Journal of Information Technology and Politics 4(1) pp Jarvis, L. et al (2016) Analogy and Authority in Cyberterrorism Discourse: An analysis of Global News Media Coverage, Global Society 30(4) pp Jackson, R. et al (2011) Terrorism: A critical introduction, Palgrave Macmillan p Zulaika, J. (2010) The terror/counterterror edge: When non-terror becomes a terrorism problem and real terror cannot be detected by counterterrorism, Critical Studies on Terrorism 3(2) p Jackson, R. et al (2011) Terrorism: A critical introduction, Palgrave Macmillan p Bhatia, M. (2005) Fighting words: naming terrorists, bandits, rebels and other violent actors, Third World Quarterly 26(1) pp.5-22.
6 needs to be made back to the initial definitions that see terrorism as action, cyberterrorism included. In order to really know what we are speaking of when we use the term, the current political narrative on cyberterrorism needs to be deconstructed by exploring the divide between reality and discourse, breaking away from the established frames of cyberterrorist actors and developing security policies in line with actual threats and challenges and not wider political, geostrategic interests stemming from other concepts. To this end, the terminology used in the announcement on the creation of the Global Internet Forum to Counter Terrorism is to be acknowledged 30. The platform, created by Facebook, Microsoft, Twitter and YouTube is to enable these giants to take a hard line against terrorist or violent extremist content on their hosted consumer services. Perhaps a small nudge, but one in the right way in terms of branding the content, and not the action of sharing it, as terrorist and/or extremist. The fact that the announcement clearly makes this distinction may show that gradually, the political discourse may be deconstructed in order to conform better to actual reality, and in a way characteristic of the cyber era pioneered by the tech industry. 30 Twitter, Global Internet Forum to Counter Terrorism, June 26, Available at [Accessed June 29, 2017 at 1.58 PM]
Agreement on counter-terrorism measures
10/12/2015 Agreement on counter-terrorism measures We stand united in the fight against terrorism. Accountability and cooperation are required if the population of Sweden are to feel safe and secure. Having
More informationPREVENTING VIOLENT EXTREMISM ONLINE
PREVENTING VIOLENT EXTREMISM ONLINE THROUGH PUBLIC-PRIVATE PARTNERSHIPS 8 April 2016 Palais des Nations, Salle XXIII Report Executive Report On 8 April 2016, the Federal Department of Foreign Affairs of
More informationCONFERENCE BACKGROUND GUIDE
MODEL UNITED NATIONS CHANGE THE WORLD E M I R A T E S CONFERENCE BACKGROUND GUIDE United Nations Security Council Cyber Terrorism Dear Delegates, Welcome to the 2018 Change The World Model United Nations
More informationDebating privacy and ICT
Debating privacy and ICT Citation for published version (APA): Est, van, R., & Harten, van, D. (2002). Debating privacy and ICT. In D. Harten, van (Ed.), International conference on the use of personal
More informationReport on community resilience to radicalisation and violent extremism
Summary 14-02-2016 Report on community resilience to radicalisation and violent extremism The purpose of the report is to explore the resources and efforts of selected Danish local communities to prevent
More informationUN Security Council Resolution on Foreign Terrorist Fighters (FTFs)
Friday September 19 - V7 - BLUE UN Security Council Resolution on Foreign Terrorist Fighters (FTFs) 1. Reaffirming that terrorism in all forms and manifestations constitutes one of the most serious threats
More informationDr. Maura Conway Dublin City University. Cyberterrorism
Dr. Maura Conway Dublin City University Cyberterrorism A Definition: [H]ighly damaging computer based attacks or threats of attack by non state actors against information systems when conducted to intimidate
More informationOccasional Paper Countering Extremism: Learning from the United Kingdom Model
October 2015 Occasional Paper Countering Extremism: Learning from the United Kingdom Model Ghaffar Hussain Program on Extremism The Program on Extremism at George Washington University provides analysis
More informationCountering Violent Extremism and Radical Rhetoric
and Radical Rhetoric Assistant Professor School of International and Public Affairs Data Science Institute Columbia University February 1, 2019 A Soft Approach to Combat Terrorism Traditionally, CT has
More informationIntelligence and National Security Essay. Critically evaluate community- based approaches to counter- terrorism and counter- radicalisation.
Critically evaluate community- based approaches to counter- terrorism and counter- radicalisation. This essay critically examines community- based approaches to counter- terrorism and counter- radicalisation
More informationRadicalization/De-radicalization:
Center on Global Counterterrorism Cooperation Project on U.S. Global Engagement Radicalization/De-radicalization: Lessons for the Next U.S. President 4 December 2008 SUMMARY In the third installment in
More informationPreventing Violent Extremism A Strategy for Delivery
Preventing Violent Extremism A Strategy for Delivery i. Contents Introduction 3 Undermine extremist ideology and support mainstream voices 4 Disrupt those who promote violent extremism, and strengthen
More informationRoma Lyon Group s First Report on the Implementation of the G7 Action Plan on Countering Terrorism and Violent Extremism
Roma Lyon Group s First Report on the Implementation of the G7 Action Plan on Countering Terrorism and Violent Extremism Introduction At the Ise Shima Summit in 2016, the G7 Heads of State and Government
More informationener.: ..., EU counter-terrorism policy: Main achievements and future challenges 9 th February 2011 Presentation by Rokhsana Fiaz, ENER Director
ener.: o EUROPEAN NETWORK OF EXPERTS ON RADICAlISATION EU counter-terrorism policy: Main achievements and future challenges Presentation by Rokhsana Fiaz, ENER Director European Economic and Social Committee
More informationG8 Declaration on Counter Terrorism
G8 Declaration on Counter Terrorism Now is the time for a new era of international cooperation that strengthens old partnerships and builds new ones to confront our common challenges and to defeat terrorism
More informationStudy on methodologies or adapted technological tools to efficiently detect violent radical content on the Internet
Annex 1 TERMS OF REFERENCE Study on methodologies or adapted technological tools to efficiently detect violent radical content on the Internet 1. INTRODUCTION Modern information and communication technologies
More informationPAGE PAGE PAGE PAGE PAGE PAGE
2015 PAGE 15 PAGE 11 PAGE 08 PAGE 16 PAGE 23 PAGE 07 CONTENT 4 A year of changes 7 Aiming at national security 9 Supo counters terrorism 10 Supo counters espionage 12 Supo protects the society 13 Supo
More informationConfronting Extremism and Terrorism. Chairman of the Committee for Defense and National Security, and the House of Representatives.
Confronting Extremism and Terrorism Major General Dr. Kamal Ahmed Amer Chairman of the Committee for Defense and National Security, and the House of Representatives. Terrorism is one of the most significant
More informationNBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein
NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES Martin S. Feldstein Working Paper 13729 http://www.nber.org/papers/w13729 NATIONAL BUREAU OF ECONOMIC RESEARCH
More informationLee Jarvis List of Publications (September 2014)
Lee Jarvis List of Publications (September 2014) Page 1 Books Jarvis, L., Macdonald, S. & Chen, T. (eds.) (Forthcoming, 2015) Terrorism Online. Abingdon: Routledge (in press). Heath-Kelly, C., Jarvis,
More informationEPP Policy Paper 1 A Secure Europe
EPP Policy Paper 1 A Secure Europe We Europeans want to live in freedom, prosperity and security. Over more than 60 years, European integration and transatlantic cooperation has enabled us to achieve these
More informationCanada and Israel Strategic Partnership (22 January 2014)
Canada and Israel Strategic Partnership (22 January 2014) http://www.international.gc.ca/name-anmo/canada_israel_mou-prot_ent_canada_israel.aspx?lang=eng Memorandum of Understanding: Canada and Israel
More informationI am happy to have the opportunity to address you today
Special meeting of the Security Council Counter-Terrorism Committee on Preventing the Exploitation of Information and Communication Technologies (ICT) for Terrorist Purposes, while Respecting Human Rights
More informationCover Story. - by Shraddha Bhandari. 24 JANUARY-FEBRUARY 2016 FSAI Journal
- by Shraddha Bhandari 24 JANUARY-FEBRUARY 2016 FSAI Journal Following the spate of terror attacks in Paris, Beirut, and downing of the Russian Metrojet liner in November 2015, concerns have been raised
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE
COUNCIL OF THE EUROPEAN UNION Brussels, 29 October 2009 15184/09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE from : to : Subject : Presidency Delegations EU-US Statement on "Enhancing
More information1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism
What is Terrorism? The Globalization of Terrorism Global Issues 621 Chapter 23 Page 364 1/13/2009 Terrorism 2 Unfortunately, the term terrorism is one that has become a part of our everyday vocabulary
More informationCOREPER/Council No. prev. doc.: 5643/5/14 Revised EU Strategy for Combating Radicalisation and Recruitment to Terrorism
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2014 (OR. en) 9956/14 JAI 332 ENFOPOL 138 COTER 34 NOTE From: To: Presidency COREPER/Council No. prev. doc.: 5643/5/14 Subject: Revised EU Strategy for Combating
More informationPolice-Community Engagement and Counter-Terrorism: Developing a regional, national and international hub. UK-US Workshop Summary Report December 2010
Police-Community Engagement and Counter-Terrorism: Developing a regional, national and international hub UK-US Workshop Summary Report December 2010 Dr Basia Spalek & Dr Laura Zahra McDonald Institute
More informationCountering Violent Extremism and Humanitarian Action
Photo: NRC / Christopher Herwig Position Paper June 2017 Countering Violent Extremism and Humanitarian Action Background Preventing crises will do more to contain violent extremists than countering violent
More information10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism?
The Globalization of Terrorism Global Issues 621 Chapter 23 Page 364 What is Terrorism? 10/15/2013 Terrorism 2 What is Terrorism? Unfortunately, the term terrorism is one that has become a part of our
More informationepp european people s party
Combatting Islamist Terrorism and Protecting our Way of Life Resolution adopted by the EPP Political Assembly, Brussels 4th-5th December 2017 01 Today, more than ever before, freedom depends on security.
More informationOrganization for Security and Co-operation in Europe. Asia-Europe Counter-Terrorism Dialogue Singapore, 31 October-1 November, 2016
Organization for Security and Co-operation in Europe Asia-Europe Counter-Terrorism Dialogue Singapore, 31 October-1 November, 2016 Remarks by Thomas Wuchte on Policy Recommendations for a Europe-Asia Counter-Terrorism
More informationUN- C.T.E.D 16 Nevember New York Returning Foreign Terrorist Fighters: Combating Threats and Managing Resilience
UN- C.T.E.D 16 Nevember 2017. New York Returning Foreign Terrorist Fighters: Combating Threats and Managing Resilience DR EL MOSTAFA REZRAZI OCP Policy Center Senior Fellow President of Moroccan Observatory
More informationCombating Terrorism Center at West Point. Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda
Combating Terrorism Center at West Point Occasional Paper Series Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda May 2, 2011 Scott Helfstein, Ph.D. Dominick Wright, Ph.D. The views
More informationU.S. House Committee on Armed Services Subcommittee on Terrorism, Unconventional Threats
U.S. House Committee on Armed Services Subcommittee on Terrorism, Unconventional Threats "Strategic Communication and Countering Ideological Support for Terrorism" Statement of Duncan MacInnes Principal
More information14276/16 UM/lv 1 DGE 1C
Council of the European Union Brussels, 23 November 2016 (OR. en) 14276/16 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 21 November 2016 To: No. prev. doc.: Subject: Delegations
More informationTERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)
TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952) Until the 1990s, terrorism was widely considered to be a security concern of the second
More informationManual for trainers. Community Policing Preventing Radicalisation & Terrorism. Prevention of and Fight Against Crime 2009
1 Manual for trainers Community Policing Preventing Radicalisation & Terrorism Prevention of and Fight Against Crime 2009 With financial support from the Prevention of and Fight against Crime Programme
More informationSTATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES AT A HEARING ENTITLED ENCRYPTION TIGHTROPE: BALANCING AMERICANS
More informationFinland's response
European Commission Directorate-General for Home Affairs Unit 3 - Police cooperation and relations with Europol and CEPOL B - 1049 Brussels Finland's response to European Commission's Public Consultation
More informationCOUNTERING AND PREVENTING RADICALIZATION IN THE MENA REGION AND THE EU
REPORT COUNTERING AND PREVENTING RADICALIZATION IN THE MENA REGION AND THE EU SUMMARY OF FINDINGS AND CONCLUSIONS OF THE WORKSHOP COUNTERING AND PREVENT-ING RADICALIZATION: REVIEWING APPROACHES IN THE
More informationRising Extremism in Central Asia? Stability in the Heartland for a Secure Eurasia
Rising Extremism in Central Asia? Stability in the Heartland for a Secure Eurasia Briefing Seminar 9 February 2016 At a time when terrorist threats and the emergence of religious extremism are affecting
More informationKeywords: cyberterrorism, countermeasures, terrorism. 1. Introduction
Countermeasures to Consider in the Combat against Cyberterrorism N Veerasamy and M Grobler CSIR, Pretoria, South Africa nveerasamy@csir.co.za mgrobler1@csir.co.za Abstract: Cyberterrorism addresses the
More informationHuman Rights and Ethical Implications of Approaches to Countering Violent Extremism in Europe January 2018
Meeting Summary Human Rights and Ethical Implications of Approaches to Countering Violent Extremism in Europe 11 12 January 2018 The views expressed in this document are the sole responsibility of the
More informationYouth DE-Radicalization in Tunisia. Wissem Missaoui Search For Common Ground - Tunisia NECE Focus Group Thessaloniki, October 20, 2015
Youth DE-Radicalization in Tunisia Wissem Missaoui Search For Common Ground - Tunisia NECE Focus Group Thessaloniki, October 20, 2015 Youth DE-Radicalization in Tunisia Wissem Missaoui Search For Common
More informationRecommendation for a COUNCIL DECISION
EUROPEAN COMMISSION Brussels, 20.12.2017 COM(2017) 806 final Recommendation for a COUNCIL DECISION authorising the opening of negotiations for an agreement between the European Union and the State of Israel
More informationConference on Use of the Internet to Counter the Appeal of Extremist Violence AGENDA
Naif Arab University for Security Sciences Supported By In Partnership With Conference on Use of the Internet to Counter the Appeal of Extremist Violence Naif Arab University for Security Sciences, Riyadh,
More informationUNIT SIX: CHALLENGES OF THE MODERN ERA Part II
UNIT SIX: CHALLENGES OF THE MODERN ERA Part II ARMS PROLIFERATION Spread of weapons of mass destruction (WMDs) (nuclear, chemical & biological weapons) throughout the world.* This is seen as dangerous
More informationCan Hashtags Change Democracies? By Juliana Luiz * Universidade Estadual do Rio de Janeiro, Rio de Janeiro, Rio de Janeiro, Brazil
By Juliana Luiz * Universidade Estadual do Rio de Janeiro, Rio de Janeiro, Rio de Janeiro, Brazil (Sunstein, Cass. #Republic: Divided Democracy in the Age of Social Media. New Jersey: Princeton University
More informationZahri Yunos CyberSecurity Malaysia Selangor, Malaysia
A Dynamic Cyber Terrorism Framework Rabiah Ahmad Dept of Computer System and Communication Faculty of Information and Communication Technology Universiti Teknikal Malaysia Melaka (UTeM) Melaka, Malaysia
More informationCoPPRa : Community policing and prevention of radicalisation. Rob Out 1
CoPPRa : Community policing and prevention of radicalisation Rob Out 1 I m really pleased to see that the CoPPRa project specifically addresses one of the most important but, in counter-terrorism context
More informationThe Department of State s Annual Report on Terrorism
The Department of State s Annual Report on Terrorism Testimony of Raphael F. Perl Specialist in International Affairs Foreign Affairs, Defense, and Trade Division Congressional Research Service Before
More informationConcept Note: Preventing of ideas radicalization Author: Séraphin ALAVA
Programme Erasmus + Programme Action 3 Key Action 3: Support for policy reform - Social inclusion through education, training and youth Sub-area Lot 1: Education and training Call deadline 30 May 2016
More information2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire
2015 Biennial American Survey May, 2015 - Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire [DISPLAY] In this survey, we d like your opinions about some important
More informationInternational conference on preventing and countering radicalization and violent extremism as related to the Foreign Terrorist Fighters (FTF) threat
International conference on preventing and countering radicalization and violent extremism as related to the Foreign Terrorist Fighters (FTF) threat Abu Dhabi, United Arab Emirates (UAE) Dates: 26-28 April
More informationLebanon, Egypt, Palestine, Iraq, Syria, Tunisia, Morocco, Libya, Yemen and Kurdistan Region in Iraq.
Conference Enhancing Women s Contribution to Peace Building and Conflict Resolution in the Arab Region Beirut - Lebanon - 25-26 May 2016 Final Communique Sixty women leaders from 10 Arab countries Participate
More informationCyberterrorism conjures images of
Terrorist Use of the Internet The Real Story By I r v i n g L a c h o w and C o u r t n e y R i c h a r d s o n Web site showing nuclear attack on large city Abu Musab al-zarqawi used streaming media on
More informationUN Presentation- Combating the Evolving Threat from Foreign Terrorist Fighters
UN Presentation- Combating the Evolving Threat from Foreign Terrorist Fighters Introduction Terrorist groups are increasingly radicalizing and inciting individuals worldwide to leave their homes and become
More informationWCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC
The Challenges of Terrorist Financing in 2014 and Beyond May 7, 2014 Dennis M. Lormel President & CEO DML Associates, LLC Al-Qaeda s Most Dangerous Member: Nasir al-wuhayshi 2 Terrorist Threats 2014 Introduction
More information30 June 1 July 2015, Hofburg, Vienna
CIO.GAL/105/15 10 July 2015 ENGLISH only Chairmanship s Perception Paper Outcomes and Recommendations from the 2015 OSCE-wide Counter-Terrorism Expert Conference on Countering the Incitement and Recruitment
More informationThe European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks
Policy Paper The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks I Context The writing of the new European Union
More informationPanel: Norms, standards and good practices aimed at securing elections
Panel: Norms, standards and good practices aimed at securing elections The trolls of democracy RAFAEL RUBIO NÚÑEZ Professor of Constitutional Law Complutense University, Madrid Center for Political and
More informationterrorism commentary on security pdf (PDF) The War on Cyberterrorism - academia.edu Anti-terrorism legislation - Wikipedia
DOWNLOAD OR READ : TERRORISM COMMENTARY ON SECURITY DOCUMENTS VOLUME 113 OMMENTARY ON SECURITY DOCUMENTS PIRACY AND INTERNATIONAL MARITIME SECURITYTERRORISM AND HOMELAND SECURITY PDF EBOOK EPUB MOBI Page
More informationEU-GRASP Policy Brief
ISSUE 3 03 March 2012 EU-GRASP Policy Brief Changing Multilateralism: the EU as a Global-Regional Actor in Security and Peace, or EU-GRASP, is a European Union (EU) funded project under the 7th Framework
More informationMeasures to prevent the recruitment and radicalization of young persons by international terrorist groups
2018 Peacebuilding Commission Measures to prevent the recruitment and radicalization of young persons by international terrorist groups 1 Index Introduction... 3 Definition of key-terms... 4 General Overview...
More informationCounter-Extremism Strategy
Counter-Extremism Strategy Purpose For discussion and direction. Summary In the summer the Prime Minister set out how the government would look to tackle the threat posed by extremism through a Counter
More informationChapter 6 Foreign Aid
Chapter 6 Foreign Aid FOREIGN AID REPRESENTS JUST 1% OF THE FEDERAL BUDGET FOREIGN AID 1% Defense 19% Education 4% Health 10% Medicare 13% Income Security 16% Social Security 21% Net Interest 6% Veterans
More informationAda, National College for Digital Skills supports the Home Office 4P Prevent strategy to combat radicalisation and terrorism.
Prevent Policy Ada, National College for Digital Skills September 2016 Introduction Ada, National College for Digital Skills is committed to providing a secure environment for students, and all staff recognise
More informationTerrorism in Africa: Challenges and perspectives
African Training and Research Centre in Administration for Development Hanns Seidel Foundation The Governance of National Security: Challenges and Prospects New Strategies to Address Growing Security Threats
More informationWINTER. March 24. Template
March 24 WINTER EQ- What are the different state shapes and types of boundaries? Agenda: 1. Daily Sheet 2. Review 3. Nation, State, Nation-States Gallery walk 4. Types of Boundaries Notes 4. Shapes of
More informationParliamentary Papers, House of Representatives , , no Papers, House of Representatives , , no. 253.
Letter of 14 November 2016 from the Minister of Security and Justice and the Minister of Social Affairs and Employment to the House of Representatives on the seventh progress report on the Integrated Approach
More informationSchool Prevent Policy Protecting Children from Extremism and Radicalisation
School Prevent Policy Protecting Children from Extremism and Radicalisation Schools have a vital role to play in protecting children and young people from the risks of extremism and radicalization. This
More informationDelegations will find attached the conclusions adopted by the European Council at the above meeting.
European Council Brussels, 19 October 2017 (OR. en) EUCO 14/17 CO EUR 17 CONCL 5 COVER NOTE From: General Secretariat of the Council To: Delegations Subject: European Council meeting (19 October 2017)
More informationicd - institute for cultural diplomacy
2011: Hard Vs. Soft Power in Global and National Politics: Innovative Concepts of Smart Power and Cultural Diplomacy in an Age of Interdependence, Digital Revolution, and Social Media The 2011: Hard Vs.
More information7834/18 KT/np 1 DGE 1C
Council of the European Union Brussels, 24 April 2018 (OR. en) 7834/18 NOTE From: To: General Secretariat of the Council JEUN 38 EDUC 122 CULT 38 RELEX 309 Permanent Representatives Committee/Council No.
More informationAt the outset, I wish to thank our hosts for inviting me to this Conference.
Statement by Dr. Dipu Moni, MP, Hon ble Foreign Minister, Government of the People s Republic of Bangldesh, at the Opening Session of the International Counter-Terrorism Focal Points Conference on Addressing
More informationAnti-Radicalisation Guidance
1. Introduction CALAT is committed to providing a secure environment for students, where learners feel safe and are kept safe. All adults at CALAT recognise that safeguarding is everyone s responsibility
More informationWritten Testimony. Submitted to the British Council All Party Parliamentary Group on Building Resilience to Radicalism in MENA November 2016
Written Testimony Submitted to the British Council All Party Parliamentary Group on Building Resilience to Radicalism in MENA November 2016 Chairman, honorable members, is a world leader in International
More informationPrevent and counter extremism
Prevent and counter extremism Purpose For discussion and direction. Summary This paper is to update the on recent work around Prevent and counter-extremism and set out proposals for future work. Recommendations
More informationSafeguarding Children and Young People Statement
Safeguarding Children and Young People Statement Excellence in Learning, Development and Training The support and protection of children cannot be achieved by a single agency Every service has to play
More informationSpeech by Mr. Jean-Paul Laborde Open Briefing to Member States 22 December 2010
Speech by Mr. Jean-Paul Laborde Open Briefing to Member States 22 December 2010 Excellencies, Ladies and Gentlemen I would like to begin by thanking you for taking the time to come to this Open Briefing
More information7th ANNUAL INTERPA CONFERENCE NEW TRENDS IN COMBATTING TERRORISM AND EXTREMISM
7th ANNUAL INTERPA CONFERENCE NEW TRENDS IN COMBATTING TERRORISM AND EXTREMISM The 7 TH Annual INTERPA Conference on New trends in combatting terrorism and extremism was hosted by the police college of
More informationAddressing Emerging Terrorist Threats and the Role of UNODC
Addressing Emerging Terrorist Threats and the Role of UNODC Ms. Dolgor Solongo, Officer-in-Charge, ISS1 (Asia and Europe)/ Terrorism Prevention Branch 14 April 2015 Terrorism Evolving Global Threat Terrorism
More informationBackground Brief for Final Presidential Debate: What Kind of Foreign Policy Do Americans Want? By Gregory Holyk and Dina Smeltz 1
October 19, 2012 Background Brief for Final Presidential Debate: What Kind of Foreign Policy Do Americans Want? By Gregory Holyk and Dina Smeltz 1 Foreign policy will take center stage in the third and
More informationTerrorism and Communication: A Critical Introduction
Terrorism and Communication: A Critical Introduction Matusitz, J ISBN-13: 9781452240282 Table of Contents 1. What Is Terrorism? Terrorism: Origin of the Word Terrorism: Definition Definitions from Various
More informationCountering Violent Extremism (CVE) How to fight the monster? Author: Selim Ibraimi, MA
Countering Violent Extremism () How to fight the monster? Author: Selim Ibraimi, MA Center for Security Studies and Development- Macedonia CSSD Area:Extremism Studies -Western Balkans 2016 TABLE OF CONTENTS
More informationPreventing violent extremism through youth empowerment
Forum: Issue: Human Rights Council Preventing violent extremism through youth empowerment Student Officer: Nayoon Park Position: Deputy President Introduction Violent extremism is a practice that involves
More informationResearching Counter-Terrorism Policing and Communities
Researching Counter-Terrorism Policing and Communities D R B A S I A S P A L E K R E A D E R I N C O M M U N I T I E S & J U S T I C E U N I V E R S I T Y O F B I R M I N G H A M Background Context: Community
More informationGeneral Course Information
Course ECON 3369_HN1 The Political Economy of Terrorism Professor Todd Sandler Term Fall 2016 Meetings M, W 10:00-11:15 a.m., GC 1.208B Professor s Contact Information Office Phone 972-883-6725 Office
More informationICAO AVIATION SECURITY GLOBAL RISK CONTEXT STATEMENT. (Extract)
Page 1 of 6 ICAO AVIATION SECURITY GLOBAL RISK CONTEXT STATEMENT (Extract) INTRODUCTION The continuing threat of terrorism is most effectively managed by identifying, understanding and addressing the potential
More informationLocating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon by Lee Jarvis and Stuart Macdonald Abstract This article reports on findings from a survey on the concept of cyberterrorism
More informationStatement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act
Statement for the Record House Judiciary Subcommittee on Crime, Terrorism and Homeland Security Hearing on Reauthorizing the Patriot Act Statement for the Record Robert S. Litt General Counsel Office of
More informationAustralasian University Safety Association 2016 Fiona Austin
Managing global mobility legal issues for work safety and security Australasian University Safety Association 2016 Fiona Austin Top legal issues for organisations in mobility transition Global jurisdictions
More informationPrevent Policy Preventing violent and non-violent extremism and radicalisation
Prevent Policy Preventing violent and non-violent extremism and radicalisation The purpose of this policy is to: Ensure an awareness of Prevent within the College Provide a clear framework to structure
More informationPromoting British Values/ Anti-Radicalisation/ Prevent Policy Reviewed June 2018
Ulverston Victoria High School POLICIES Promoting British Values/ Anti-Radicalisation/ Prevent Policy Reviewed June 2018 Adopted by Ulverston Victoria High School Governing Body On (Date) 26 th May 2016
More informationWhite Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION
White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION The United States has a vital national security interest in addressing the current and potential
More informationWillington Primary Prevent Policy Protecting Children from Extremism and Radicalisation
Willington Primary Prevent Policy Protecting Children from Extremism and Radicalisation Childcare providers have a vital role to play in protecting children and young people from the risks of extremism
More information"Responses to the threat of terrorism and effects on communities
SPEECH/05/718 Vice-President Franco FRATTINI European Commissioner responsible for Justice, Freedom and Security "Responses to the threat of terrorism and effects on communities EU JHA Committees Conference
More informationEuropean Council Conclusions on Migration, Digital Europe, Security and Defence (19 October 2017)
European Council Brussels, 19 October 2017 European Council Conclusions on Migration, Digital Europe, Security and Defence (19 October 2017) I. MIGRATION 1. The approach pursued by Member States and EU
More informationCongressional Testimony
Congressional Testimony FOREIGN ASSISTANCE, SUPPORT FOR EXTREMISM AND PUBLIC OPINION IN MUSLIM MAJORITY COUNTRIES Written Testimony of Kenneth Ballen President Terror Free Tomorrow: The Center for Public
More information