Panel Discussion Report
|
|
- Sheena Holt
- 6 years ago
- Views:
Transcription
1 Panel Discussion Report Event: Counter-Terrorism: International Initiatives, Perspectives & Challenges Sadiah Waziri and Nina Levarska London Centre of International Law Practice (LCILP) Other Publications, 002/2015 Date: 27/01/2015 This paper is downloadable at: Sadiah Waziri and Nina Levarska. All LCILP publications are for non-commercial research use only. Distribution of publications from our website for material interest, profit-making and or commercial gain is strictly forbidden.
2 Counter-Terrorism: International Initiatives, Perspectives & Challenges Sadiah Waziri 1 and Nina Levarska 2 Brief Intro to Event On Tuesday November 25 th 2014, the London Centre of International Law Practice (LCILP), in collaboration with the London Academy of Diplomacy (LAD) hosted an event on Counter-Terrorism: International Initiatives, Perspectives and Challenges. The event venue was held at the LAD building, located in East London. The panel discussions were separated into three distinct but interrelated sessions: International Counter- Terrorism initiatives; Countering the Financing of Terrorism & Cyber Terrorism, and Combating Violent Extremism & Foreign Fighters. The diverse panel of experts invited to take part in the discussion included: representatives from international law firms, academia, NGOs and legal associations. 1 st Session The first session began with an introduction provided by the moderator, Arvinder Sambei (Joint Head- International Human Rights & Criminal Justice at LCILP & Director at Sambei Polaine), followed by the first speaker of the panel, Professor Charles Chatterjee (Co-Director of London Academy of Diplomacy & Professor of International Law), who discussed the role of the United Nations (UN) in connection to counter-terrorism measures. Chatterjee identified the different functions various UN organs undertake, describing the UN General Assembly (GA) as a platform for discussions, as opposed to the role of the UN Security Council (SC), and resolutions that are passed under it, which are binding. The UNSC Chatterjee identified, had a specific function and responsibility of pursuing humanitarian aid relief after a given conflict. 1 Sadiah Waziri is Research Coordinator-International Land and Maritime Boundaries at the London Centre of International Law Practice (LCILP). 2 Nina Levarska is Research Coordinator-International Human Rights and Criminal Justice at the London Centre of International Law Practice (LCILP). 2
3 He further advised the audience that in the case of counter-terrorism, the international community should use effective organ diplomats instead of going to the UNSC. He also explained that UNSC resolutions are weakened because of the lack of enforceability in the international legal sphere. Moreover, he also brought to attention the inefficient role of member states when UN resolutions are passed; pointing out that the UK unlike other states, immediately adopted resolutions into its own legislation, while other countries in his view- did not take enforcement as seriously. Professor Chatterjee advocated for a soft law approach to establishing solutions within the UN, emphasizing that if the law is coercive then there will inevitably be deviations from it. Chatterjee provided the example of exercising sanctions, which he believed to be ineffective. Soft law, Chatterjee insisted however, can be illustrated in the example of targeting the unjust apartheid system in South Africa, which stood clear as a moral sanction rather than a violent sanction that impedes growth and destabilizes the targeted country. He concluded his remarks by suggesting that instead of looking for aid, states should develop means by which they would protect themselves. For instance, UK adopted legislation for both counter-terrorism and anti-money laundering (AML). In regards to AML specifically, Chatterjee asserted that it was essential to build state capacity in order to detect illegal activities. Moreover, he highlighted that the role of action groups at grassroots level were crucially important. The second speaker for the first session was Tim Daniel, who introduced himself as a solicitor for asset tracing cases, mainly those involving proceeds of corruption. He posed a question to the audience about how the recoveries in the Far East were relevant to counter-terrorism measures, and went on to explain why. In the post 911 era Daniel stated, the United States was eager to trace the funding of those it deemed terrorists. Although, prior to 911, the UN Convention against funding of Terrorists was in place in 1999, only 4 countries (including the UK) were signed up at the time. There are up to 179 countries signed up to the convention in the post 911 period, including several UN resolutions that have been passed since then, mainly UNSC 1373 and The rest of his speech was tailored to explaining the traditional means in which terrorism is financed, pointing out charities, businesses, the smuggling of blood diamonds and timber as a few examples. Daniel spent the rest of his speech outlining the ideology of the fundamentalist group and their strategies in the region. Daniel pointed out that ISIS had a body aspiring to create a caliphate with 8 million people under its rank- though it is worth mentioning that given the incessant media attention and popularity that ISIS has gained over the past few months, pinpointing the exact number of followers has not been verified in a consistent 3
4 fashion by various information sources and outlets. Therefore, numbers are speculative figures at most at this point. He also outlined a few significant developments that helped strengthen ISIS financially, pointing out that the biggest case sources for ISIS was oil wells (which Daniel stated created 60% of Syria s production capacity); millions of dollars more have been gained through donations (multiple charities in the UK); $1.5 million gained through bank robberies; looting and smuggling of archaeological sites, and ransoms from kidnappings- which made up about 20% of their possible funding. Tim Daniel did point out that the disruption of oil tankers could be an important development in efforts to dismantle terrorist financing. The challenges faced in addressing these issues are extremely daunting given the perplexity of the subject. Daniel identified that one is left reliant on law enforcement agencies in the affected countries to trace and freeze funds by turning off the tap, and criticized the UN for not being the best alternative to solve the dilemma. Daniel also mentioned that the idea of setting up a supra national body to trace assets and organise recovery has been suggested in the past. From Tim Daniels personal experience in dealing with asset recovery cases, he stated that often times, the political will to pursue funds wilts as politicians who come into power realise they rely upon corruption to receive and uphold their political authority. Arvinder Sambei concluded the session by identifying that both Charles Chatterjee and Tim Daniel advocated that the Security Council was not fit for countering financing of terrorism and therefore, it was crucial for states to enforce the UNSC resolutions through training and expertise. Arvinder then opened up the floor to the audience to begin the q & a for the session. 1 st Session Q&A The first member of the audience to share their comments insisted that the Security Council was a farce, and stated that many assets the SC freeze are not substantial in nature. Professor Chatterjee advised that such issues should not be referred to the Security Council, because they have failed and exceeded their remit. He suggested solving these issues through General Assembly instead, because since 1962, the Security Council has produced a zero success rate. Tim Daniel provided an example of tackling terrorism funding by drawing attention to a hotel that was blown up in Mombasa. He came to know that through this incident p that there were no banking controls in place. Only 5 sectors of the banks had AML compliance regulations in place. There were no ramifications to even allow employees to go on courses to learn AML. He also briefly pointed out that in this respect, London is considered to be the money laundering capital of the world, and that lots of UK money is illicit. 4
5 The second audience member who contributed to the discussion identified themselves as a UN employee, raising the following question: What is the success rate on confiscating money?... Sanctions affect normal people, just not people in power. On the matter of oil and ISIS, the price of oil has been going down, who is buying the oil? Tim Daniel responded by stating that the world record for recovery was General Sani Abacha, who had taken 5 billion dollars, of which 3.5 billion was recovered). Other audience members stated general discussion comments regarding the diverse means of funding for groups such as ISIS, and the possible link between Eastern European countries trading with ISIS. 2 nd Session The second panel discussion was geared towards the topic of financing terrorism, the use of the internet by terrorist organisations and determining responses to cyber terrorist attacks. In the beginning of his presentation, Roger McNally (Course Convenor: MSc Security Studies & Diplomacy, London Academy of Diplomacy) highlighted the advantages of analysing literature compared to political sciences and dry academics for learning about counter-terrorism. He also emphasised the problem associated with definitions in this vague area. In practice, it is not easy to recognise between a terrorist and an insurgent. This he argued was partly due to the lack of material and evidence which is often substituted by explanations and descriptions instead. McNally then began discussing the financing of terrorist groups. He mentioned a specific type of illegal financing often involving carrying money in briefcases by cash couriers. Moreover, Hawala (i.e. an informal value transfer system) is usually used in the cases of terrorist financing. In West Africa he highlighted for example, high value commodities such as diamonds and gold are often utilised for these purposes. The methods used differ depending on the volume, level of detection or convenience. However, simple methods are usually the most effective ones. The next part of his presentation dealt with combating the financing of terrorism. He pointed out several limitations of the criminal justice system: 1) the police usually catch people that work for the important criminal mastermind instead of the leader himself. 2) In the case of terrorism, the deterrent aspect of the criminal justice system is often ineffective because it is irrelevant to suicide bombers and due to the fact that the leaders usually stay free. 3) Guilt is difficult to prove and there is a great risk of acquittal. The terrorists use, in his opinion, trial as a platform for propaganda, and incarceration can 5
6 trigger further terrorist attacks and hostage taking. 4) Another problem he addressed can be found in connection to measuring actions against terrorism as it is unclear what they should be assessed against. Roger McNally s speech also touched upon the link between terrorism and the Internet. He said that the advantage of using Internet is that the terrorists can determine the content of their messages and therefore, they have the opportunity of selecting the means by which their image is projected into cyberspace. Terrorist groups on the Internet are very well established as the sites use manipulation techniques to influence young people. The websites contain histories of the group and the profiles of the key personalities. They usually emphasise the violence caused by their opponents without mentioning the violence and casualties the group itself is responsible for. The websites are used for communication, recruitment and moral disengagement for their followers. They also include information for their main audience such as target data on their enemies. In addition, these sites also provide a platform for networking, mobilisation and instructions. In addition, groups associated with terrorist activity predominantly publish online manuals, regarding orchestration, coordination and fundraising. The second speaker on the panel, Dr. Irene Couzigou (Lecturer in Law at the University of Aberdeen) gave a presentation on cyber terrorism, and began her presentation by raising the question of whether cyber-terrorism can be considered armed force and whether the law on the use of force can be applied to cyber-terrorism. She clarified that there is no international definition of armed force, as armed can be defined as equipped with a weapon. However, the UN Charter did not refer to any specific weapons. Therefore, she deducted that the definition of armed force is open to broader interpretation. Generally, there are two approaches according to which it could be determined whether a conduct constitutes armed force. Couzigou described two methods of approach in deducing armed force: instrument based approach and consequence based approach. According to the instrument based approach, the force must be physical in order to be considered armed force. For this reason, cyber terrorism would not be regarded as use of force under the instrument based approach. On the other hand, the consequence based approach compares the effect of cyber weapons to the effect to traditional weapons. Using both types of weapons causes similar consequences. This, she explained, was due to the fact that cyber operations such as shutting down power generators of hospitals or airline crashes, indirectly lead to injuries and death. Couzigou highlighted that states tend to adopt the consequence based approach, and that it was usually those states that considered armed force as an appropriate measure in responding to cyber terrorism. 6
7 Under International Law, armed force can be used in self-defence and/or if it is authorised by the UNSC. After acknowledging that cyber terrorism has disrupted peace and that it has harmed and killed, the UNSC can authorise violent retaliation. On the other hand, if the Security Council is not willing to authorise use of force against cyber terrorism, the right of self-defence can be utilised (under the UN Charter and general international law). According to the Article 51 of the UN Charter, the right to self-defence can be used if an armed attack occurs. Nevertheless, Irene Couzigou also mentioned that it is unclear against whom the right of self-defence should be used. If the cyber attack is carried out by a state, the cyber attack can be attributed to the state and the attacked state can respond in self-defence. The problem is that most cyber attacks are carried out by non-state actors. The invasion of Afghanistan was in her view the only clear case in which the right to self-defence was accepted against a non-state actor. Dr. Couzigou said that there is a right to self-defence against a non-state actor under customary international law. Moreover, she mentioned another question arises as to the legality of retaliation against a state that harbours cyber terrorists. The US used the fact that Afghanistan was harbouring terrorists as a justification for its illegal invasion. For this reason, Irene Couzigou believes that the law needs to evolve in order to recognise that the states have right to retaliate against states harbouring terrorists. She further stated that states should prevent any damage that is caused from its territory to another state. If the state does not apply due diligence to the situation, then the state forfeits its rights to territorial integrity, which triggers the right to invade the state by another state in self-defence. Finally, Dr. Couzigou expressed the opinion that there is also a right of self-defence against the states that endorse cyber terrorism and she said that providing finance and other means of support to terrorists should be considered endorsing terrorism. 2 nd Session Q&A An audience member asked why the perpetrator of the 2011 Norway attacks, Anders Brevic was not charged under the terrorism legislation, and based on the subject at hand, what is the legal definition of terrorism? The same audience member also further posed the question to Dr. Irene Couzigou regarding cyber terrorism by stating: The State of Israel had for the past 5 years attacked the Iranian stock exchange and various infrastructures. Did Iran have a right to retaliate in self defence against the Israeli attack? Irene clarified that the Islamic Republic of Iran had not exercised a formal 7
8 complaint, nor did they define the attack as an armed attack. However Irene acceded, that had Iran done so, they did in fact have a case for the exercise of self-defence. Roger McNally declared in his view that there was no fluid definition of terrorism. He used the example in Northern Mali and the difficulty in identifying who the rebels were, as some identified the Tuaregs as criminals, while others considered them as freedom fighters, and further still- some insisted they were insurgents. He also stated the irony of the entire situation as a result of Western intervention in Libya in The final audience member drew attention to the situation in Somalia concerning cyberterrorism, and Irene ended the session by responding that states had a responsibility to prevent damage from its territory to another, and that if a state did not apply due diligence to the situation then it would immediately forfeit its right to territorial integrity. She also recognised that it was difficult to be proportionate in circumstances in which armed attacks occur. 3 rd Session Martin Polaine (Joint Head- International Human Rights & Criminal Justice at LCILP & Director Sambei Polaine) was the moderator for the final session. He introduced speakers: Roger Smart (Barrister-at-law, QEB Hollis Whiteman), Eelco Kessels (Senior Analyst, Global Center on Cooperative Security, UK) and Sabah Al Mukhtar (Chairman of the Arab Lawyers Association). Roger Smart began the discussion with addressing the issues relating to the foreign terrorist fighters (FTFs); international obligations, and the UK structure, both in the present and for the future. He highlighted the UN counter terrorism protocols that listed a range of offences that address the conduct of FTFs in the event of prosecution. The UN resolutions were supported by the Global Counter Terrorism Forum (GCTF) and UNSCR, such as those associated with condemnation, freezing of assets and the sanctions regime. Roger Smart then focused on prevention and the UK long-term strategy, known as Contest which was established in 2003 to reduce the risk of terrorism. He explained the basic four limbs approach: pursue (to stop acts); prevent (prevent individuals from becoming extreme); protect (security against terrorist attacks) and mitigation (the effects of attacks). The final limb he explained was associated with the establishment of special investigators and prosecutors, who have diverse sources of evidential material, including access to various databases, and should thus, take part in training exercises. Roger also touched based on capacity building and the need for trust to be a foundation for agencies within the nation state. He admitted that there was a challenge associated with making 8
9 the system more cohesive. He insisted on the need for dedicated judges in terrorism related prosecutions. 002/2015 Whilst Roger focused on the measures needed to thwart terrorist activity and indeed locate them, Eelco Kessels presentation looked at the soft power approach to resolving issues related to terrorism threats. Kessels mainly focused on the importance and role of community and nongovernmental engagement. He believed prevention was far more effective than mitigation, by locating the root causes, i.e what drives an individual to become an FTF. He pointed out that at the GCTF, UN resolutions for example, highlighted the importance of preventing terror through community engagement, and identifying push factors (e.g. denial of rights/perceived marginalization/economic deficiency/repression/lack of justice/racial discrimination, etc). Moreover, the resolutions pointed towards a possible interconnection between these factors that can lead towards influencing an individual to become an FTF. Kessel also further provided other pull factors, which include: social networks as a weapon to spread propaganda to address various (albeit legitimate though perhaps at times not justified) grievances which made the cause appealing to youth (adventurous, various leadership opportunities) and incentives (social, economic, career oriented etc). Kessels insisted the need to identify and counter these various pull factors in an appropriate manner. He also emphasised the need to avoid generalisations and that each case be treated separately, as there are different push and pull factors that contribute to the overall aims of an individual, due in part to their previous circumstances and situations. He also touched based on the responsibility not to alienate communities, but rather engage in a manner where communities feel they are genuine partners. Education was also emphasized as a solution to CT initiatives within communities, ensuring that youth are not alienated or otherwise feel entrapped. Kessels concluded his contribution by pointing out that there needs to be a combination of both soft and hard power approaches, including training judges to better handle FTF cases. The final speaker of the night, who provided concluding remarks to the panel discussion event was Chairman of the Arab Lawyers Association, UK, Mr. Sabah Al Mukthar. He stated that the abuse of an individual leads to a negative reaction, and that when a person perceives that they are being unfairly treated and that there are no means of redress at their service, they react unreasonably. He also outlined the tragedy of Iraqi lives due to the illegal invasion of Iraq and it was a matter of principle that no state should have the right to dictate to another state their foreign policy. Sabah Al Mukhtar highlighted that there was a growing need to understand the enemy and that the popularity of the internet was based on the fact that people become more 9
10 aware of injustices through it, i.e. the recent Israeli incursion in Gaza, and watching videos tailored to explaining the motivations behind Muslims going to fight in Syria. He also discussed the problem and impact of western media exaggeration in connection to a recent news piece on the impact of ISIS and the Mosul dam. He ended his presentation by addressing Western perceptions that are currently deciding who constitutes a terrorist and who does not, and that it is imperative to address double-standards, and that the Iraqi and Syrian people deserve to feel security knowing that there is and should be an alternative to ISIS and Western bombing of the region in retaliation to the expansionist objectives of ISIS in the region. 3 rd Session Q&A The final q&a session addressed issues relating to individuals going overseas to fight, and the factors which are possibly considered in deciding who constituted an FTF. Roger Smart responded by insisting that FTFs fall within remit of terrorist activity and that the public interest is also considering the extent to which an individual is allowed to fight in foreign campaigns. Another audience member, a representative from a Middle Eastern embassy, commented on grievances and push factors, such as the American drone strikes that target few individuals considered terrorists, whilst predominantly murdering innocent civilians (men, women and children). Sabah explained that the situation in Yemen and Pakistan was complex and tragic and that the US was indeed in breach of international law. A final audience member addressed the problem of state sanctioned terrorism, with Sabah highlighting terrorist activities by world powers who do not call each other, thus highlighting the hypocrisy and irony of the entire topic. Eelco Kessels also suggested that drone strikes and other related activities further grievances and need to be addressed. This could be achieved by the development of new policies, which are not currently in place. 10
Terrorism in Africa: Challenges and perspectives
African Training and Research Centre in Administration for Development Hanns Seidel Foundation The Governance of National Security: Challenges and Prospects New Strategies to Address Growing Security Threats
More informationPanel Discussion Report
Panel Discussion Report Event: Anti-corruption: Recovering Proceeds of Corruption & Dealing with Government Contracts Procured by Bribes Nina Levarska London Centre of International Law Practice (LCILP)
More informationTHE ISLAMIC STATE AND ITS HUMAN TRAFFICKING PRACTICE
THE ISLAMIC STATE AND ITS HUMAN TRAFFICKING PRACTICE 24-25. 10. 2017 Colonel János Besenyő, PhD. Contents 1. Human trafficking across the Middle East 2. Basic motivations towards human trafficking 3. Financial
More informationAddressing Emerging Terrorist Threats and the Role of UNODC
Addressing Emerging Terrorist Threats and the Role of UNODC Ms. Dolgor Solongo, Officer-in-Charge, ISS1 (Asia and Europe)/ Terrorism Prevention Branch 14 April 2015 Terrorism Evolving Global Threat Terrorism
More informationASHTON UNDER-LYNE SIXTH FORM COLLEGE BTEC EXTENDED DIPLOMA PUBLIC SERVICES
ASHTON UNDER-LYNE SIXTH FORM COLLEGE BTEC EXTENDED DIPLOMA PUBLIC SERVICES Unit 8: Understand the impact of war, conflict and terrorism on public services Assignment : Workbook Assignment title: The impact
More informationU.S.- Gulf Cooperation Council Camp David Joint Statement
For Immediate Release May 14, 2015 U.S.- Gulf Cooperation Council Camp David Joint Statement President Obama and Heads of Delegations of the Gulf Cooperation Council (GCC) member states, the Secretary
More informationEngage Education Foundation
2016 End of Year Lecture Exam For 2016-17 VCE Study design Engage Education Foundation Units 3 and 4 Global Politics Practice Exam Solutions Stop! Don t look at these solutions until you have attempted
More informationFollowing the Money to Combat Terrorism, Crime and Corruption
Following the Money to Combat Terrorism, Crime and Corruption ACAMS Houston Chapter April 19, 2017 Celina B. Realuyo Professor of Practice William J. Perry Center for Hemispheric Defense Studies, National
More informationChallenges Facing the Asian-African States in the Contemporary. Era: An Asian-African Perspective
Challenges Facing the Asian-African States in the Contemporary Era: An Asian-African Perspective Prof. Dr. Rahmat Mohamad At the outset I thank the organizers of this event for inviting me to deliver this
More informationSecurity Council. Topic B: Protection of Natural Resources and Cultural Heritage from Terrorism and Transnational Organized Crime
Security Council Topic B: Protection of Natural Resources and Cultural Heritage from Terrorism and Transnational Organized Crime Terrorists raise money through the oil trade, extortion, kidnapping for
More informationG8 Declaration on Counter Terrorism
G8 Declaration on Counter Terrorism Now is the time for a new era of international cooperation that strengthens old partnerships and builds new ones to confront our common challenges and to defeat terrorism
More informationThe European Union Strategy for Combating Radicalisation and Recruitment to Terrorism
COUNCIL OF THE EUROPEAN UNION The European Union Strategy for Combating Radicalisation and Recruitment to Terrorism Justice and Home Affairs Council meeting, Brussels 1 December 2005 1. Terrorism is a
More informationWorldwide Caution: Annotated
Worldwide Caution: Annotated Terrorism 9/14/2017 On September 14, 2017, the U.S. Department of State s Bureau of Consular Affairs released an updated version of its Worldwide Caution. This report is an
More informationIn analyzing the root causes of joining of individuals to FTFs, while we agree that such factors as dictatorship, poverty, corruption and
Statement by H.E Gh. Khoshroo Ambassador and Permanent Representative of Islamic Republic of Iran to the UN In the High-Level Conference of the Heads of Agencies combating Terrorism Second Panel: Combatting
More informationCounter-Terrorism as Crime Prevention: A Holistic Approach
Center for Research on Extremism Counter-Terrorism as Crime Prevention: A Holistic Approach Tore Bjørgo Director of Center for Research on Extremism (C-REX), University of Oslo and Professor of Police
More informationDRAFTING LEGISLATION AGAINST TERRORISM AND VIOLENT EXTREMISM
DRAFTING LEGISLATION 1 AGAINST TERRORISM AND VIOLENT EXTREMISM UNIVERSITY OF STELLENBOSCH (SECURITY INSTITUTE FOR GOVERNANCE AND LEADERSHIP IN AFRICA SIGLA) AND ACCS IN THE UNITED STATES OF AMERICA 7-11
More informationWCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC
The Challenges of Terrorist Financing in 2014 and Beyond May 7, 2014 Dennis M. Lormel President & CEO DML Associates, LLC Al-Qaeda s Most Dangerous Member: Nasir al-wuhayshi 2 Terrorist Threats 2014 Introduction
More information31/ Effects of terrorism on the enjoyment of all human rights
United Nations General Assembly Distr.: Limited 23 March 2016 A/HRC/31/L.13/Rev.1 Original: English Human Rights Council Thirty-first session Agenda item 3 Promotion and protection of all human rights,
More informationOrganization for Security and Co-operation in Europe. Asia-Europe Counter-Terrorism Dialogue Singapore, 31 October-1 November, 2016
Organization for Security and Co-operation in Europe Asia-Europe Counter-Terrorism Dialogue Singapore, 31 October-1 November, 2016 Remarks by Thomas Wuchte on Policy Recommendations for a Europe-Asia Counter-Terrorism
More information1267 and 1988 Committees Monitoring Team. CCW - Geneva, 2 April 2014
1267 and 1988 Committees Monitoring Team CCW - Geneva, 2 April 2014 1 UNDERSTANDING THE UN SANCTIONS REGIMES 2 Current Sanctions Regimes There are currently in place 15 sanctions regimes adopted by the
More informationPC.DEL/764/08 15 September ENGLISH only
PC.DEL/764/08 15 September 2008 ENGLISH only Statement by the United States Opening Session OSCE Follow-up Public-Private Partnership Conference: Partnership of State Authorities, Civil Society and the
More informationUN Security Council Resolution on Foreign Terrorist Fighters (FTFs)
Friday September 19 - V7 - BLUE UN Security Council Resolution on Foreign Terrorist Fighters (FTFs) 1. Reaffirming that terrorism in all forms and manifestations constitutes one of the most serious threats
More informationCOREPER/Council No. prev. doc.: 5643/5/14 Revised EU Strategy for Combating Radicalisation and Recruitment to Terrorism
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2014 (OR. en) 9956/14 JAI 332 ENFOPOL 138 COTER 34 NOTE From: To: Presidency COREPER/Council No. prev. doc.: 5643/5/14 Subject: Revised EU Strategy for Combating
More informationGood afternoon. I want to thank Dr. Robert Satloff for his invitation to speak to you today.
Remarks by David T. Johnson Assistant Secretary of State for the Bureau of International Narcotics and Law Enforcement Affairs Washington Institute for Near East Policy January 19, 2010 The Escalating
More informationU.S. Challenges and Choices in the Gulf: Unilateral U.S. Sanctions
Policy Brief #10 The Atlantic Council of the United States, The Middle East Institute, The Middle East Policy Council, and The Stanley Foundation U.S. Challenges and Choices in the Gulf: Unilateral U.S.
More informationObjectives To explore the meanings of conflict and war. To make deductions and practise reasoning skills.
H Oxfam Education www.oxfam.org.uk/education Making Sense of World Conflicts Lesson plan 5: Is it war? Age group: 14 17 Objectives To explore the meanings of conflict and war. To make deductions and practise
More informationepp european people s party
Combatting Islamist Terrorism and Protecting our Way of Life Resolution adopted by the EPP Political Assembly, Brussels 4th-5th December 2017 01 Today, more than ever before, freedom depends on security.
More informationWritten Testimony. Submitted to the British Council All Party Parliamentary Group on Building Resilience to Radicalism in MENA November 2016
Written Testimony Submitted to the British Council All Party Parliamentary Group on Building Resilience to Radicalism in MENA November 2016 Chairman, honorable members, is a world leader in International
More informationStatement of Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism
Statement of Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism Security Council meeting on "Threats to international peace and security from terrorist acts:
More informationThis is a repository copy of Hollande is facing a difficult balancing act over the French policy on military action against IS.
This is a repository copy of Hollande is facing a difficult balancing act over the French policy on military action against IS. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/81148/
More information"Responses to the threat of terrorism and effects on communities
SPEECH/05/718 Vice-President Franco FRATTINI European Commissioner responsible for Justice, Freedom and Security "Responses to the threat of terrorism and effects on communities EU JHA Committees Conference
More informationOAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM
OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM The member states of the Organization of African Unity: Considering the purposes and principles enshrined in the Charter of the Organization
More informationOAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM
1 OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM The Member States of the Organization of African Unity: Considering the purposes and principles enshrined in the Charter of the Organization
More informationReport on community resilience to radicalisation and violent extremism
Summary 14-02-2016 Report on community resilience to radicalisation and violent extremism The purpose of the report is to explore the resources and efforts of selected Danish local communities to prevent
More informationMeasures to prevent the recruitment and radicalization of young persons by international terrorist groups
2018 Peacebuilding Commission Measures to prevent the recruitment and radicalization of young persons by international terrorist groups 1 Index Introduction... 3 Definition of key-terms... 4 General Overview...
More informationFinland's response
European Commission Directorate-General for Home Affairs Unit 3 - Police cooperation and relations with Europol and CEPOL B - 1049 Brussels Finland's response to European Commission's Public Consultation
More informationA Guide to the UK s Bribery Act 2010 Martin Polaine. London Centre of International Law Practice. Anti-corruption Forum, 007/ /02/2015
A Guide to the UK s Bribery Act 2010 Martin Polaine London Centre of International Law Practice Anti-corruption Forum, 007/2015 16/02/2015 This paper is downloadable at: http://www.lcilp.org/anti-corruption-forum/
More informationChristian Aid Ireland s submission on civil society space 31 March 2017
Christian Aid Ireland s submission on civil society space 31 March 2017 Christian Aid Ireland recognises the leading role Ireland played during its membership of the UN Human Rights Council 2013-2015 and
More informationCountering Violent Extremism. Mohamed A.Younes Future For Advanced Research and Studies
Countering Violent Extremism Mohamed A.Younes Future For Advanced Research and Studies What are The Common Myths about CVE? 1-Extremists have some unique signs that can be Identified easily. Contrary to
More informationUN Presentation- Combating the Evolving Threat from Foreign Terrorist Fighters
UN Presentation- Combating the Evolving Threat from Foreign Terrorist Fighters Introduction Terrorist groups are increasingly radicalizing and inciting individuals worldwide to leave their homes and become
More informationH. RES. ll. Expressing the sense of the House of Representatives with respect to United States policy towards Yemen, and for other purposes.
... (Original Signature of Member) 115TH CONGRESS 1ST SESSION H. RES. ll Expressing the sense of the House of Representatives with respect to United States policy towards Yemen, and for other purposes.
More informationConfronting the Terror Finance Challenge in Today s Middle East
AP PHOTO/MANU BRABO Confronting the Terror Finance Challenge in Today s Middle East By Hardin Lang, Peter Juul, and Trevor Sutton November 2015 WWW.AMERICANPROGRESS.ORG Introduction and summary In the
More informationBackground Brief for Final Presidential Debate: What Kind of Foreign Policy Do Americans Want? By Gregory Holyk and Dina Smeltz 1
October 19, 2012 Background Brief for Final Presidential Debate: What Kind of Foreign Policy Do Americans Want? By Gregory Holyk and Dina Smeltz 1 Foreign policy will take center stage in the third and
More informationThe Astana declaration. of the Heads of State of the Shanghai Cooperation Organisation
The Astana declaration of the Heads of State of the Shanghai Cooperation Organisation The heads of state of the Shanghai Cooperation Organisation (hereinafter referred to as the SCO, or the Organisation)
More information2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM
2017 ASEAN COMPREHENSIVE PLAN OF ACTION ON COUNTER TERRORISM Adopted in Manila, the Philippines on 20 September 2017 I. GENERAL / INTRODUCTION... 2 II. AREAS OF COOPERATION... 3 III. COOPERATION WITH DIALOGUE
More informationThe Action Plan and Declaration
The EU s Response to the Threat of Terrorism BRIEFING PAPER 3 The Action Plan and Declaration Introduction As we said in Briefing Paper 1, the EU s response to modern terrorism was accelerated as a result
More information- the resolution on the EU Global Strategy adopted by the UEF XXV European Congress on 12 June 2016 in Strasbourg;
PROPOSAL FOR A RESOLUTION [3.1] OF THE UEF FEDERAL COMMITTEE ON THE EU- MIDDLE EAST AND NORTH AFRICA (MENA) RELATIONS THE EU NOT ONLY A PAYER BUT ALSO A PLAYER Presented by Bogdan Birnbaum 1 2 3 4 5 6
More informationThe Legal Basis for Targeted Airstrikes Against Islamic State s British Citizens
The Legal Basis for Targeted Airstrikes Against Islamic State s British Citizens Introduction CRT BRIEFING, 8 September 2015 On 7 September, Prime Minister David Cameron informed the House of Commons that
More informationTransnationally networked armed conflict. Associate Professor Greg Rose
Transnationally networked armed conflict Associate Professor Greg Rose Politics, Crime or War? Armed attacks as Politics No problem! Apply laws of asylum Politics, Crime or War? Crime Enforce domestic
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE
COUNCIL OF THE EUROPEAN UNION Brussels, 29 October 2009 15184/09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE from : to : Subject : Presidency Delegations EU-US Statement on "Enhancing
More informationEvents Events Navigator Awards Executive Luncheon Series Archives
Events Events Navigator Awards Executive Luncheon Series Archives Executive Luncheon Series Counter-Terrorism Strategies in the Post 9-11 Era International Cooperation (what works and what doesn't) November
More informationResearch Report. Leiden Model United Nations 2015 ~ fresh ideas, new solutions ~
Forum: Issue: Student Officer: Position: General Assembly First Committee: Disarmament and International Security Foreign combatants in internal militarised conflicts Ethan Warren Deputy Chair Introduction
More informationThe Israel-Lebanon War of 2006 and the Ceyhan-Haifa Pipeline
- Iakovos Alhadeff The Israel-Lebanon War of 2006 and the Ceyhan-Haifa Pipeline By Iakovos Alhadeff Release Date : 2014-09-13 Genre : Politics & Current Affairs FIle Size : 0.65 MB is Politics & Current
More informationOAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM
Downloaded on August 16, 2018 OAU CONVENTION ON THE PREVENTION AND COMBATING OF TERRORISM Region African Union Subject Security Sub Subject Terrorism Type Conventions Reference Number Place of Adoption
More informationand fundamental freedoms while countering terrorism: Ten areas of best practice, Martin Scheinin A/HRC/16/51 (2010)
1. International human rights background 1.1 New Zealand s international obligations in relation to the civil rights affected by terrorism and counter terrorism activity are found in the International
More information2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire
2015 Biennial American Survey May, 2015 - Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire [DISPLAY] In this survey, we d like your opinions about some important
More informationREGIONAL PROGRAMME TO COMBAT CRIMINAL & TERRORIST THREATS AND STRENGTHEN CRIMINAL JUSTICE & HEALTH SYSTEMS IN LINE WITH INTERNATIONAL STANDARDS ON
REGIONAL PROGRAMME TO COMBAT CRIMINAL & TERRORIST THREATS AND STRENGTHEN CRIMINAL JUSTICE & HEALTH SYSTEMS IN LINE WITH INTERNATIONAL STANDARDS ON HUMAN RIGHTS IN THE ARAB STATES 2016-2021 DEVELOPMENT
More informationMontessori Model United Nations. Distr.: Middle School Twelfth Session XX March Security Council
Montessori Model United Nations S/12/BG-Terrorist Acts General Assembly Distr.: Middle School Twelfth Session XX March 2018 Original: English Security Council This is a special part of the United Nations.
More informationPreventing Violent Extremism A Strategy for Delivery
Preventing Violent Extremism A Strategy for Delivery i. Contents Introduction 3 Undermine extremist ideology and support mainstream voices 4 Disrupt those who promote violent extremism, and strengthen
More informationUnited Nations and measures to eliminate international terrorism
Árpád Prandler - Rita Silek * United Nations and measures to eliminate international terrorism I. The question of terrorism has been on the United Nations agenda since the 1960s when the spread of aircraft
More informationC I E D C O E. Legal tools for prosecution of threat network agents May 26 th, This report can be downloaded from: BICES NATO CIED PORTAL
Legal tools for prosecution of threat network agents May 26 th, 2017 C I E D C O E This report can be downloaded from: BICES NATO CIED PORTAL BICES COE CIED PORTAL http://www.ciedcoe.org/documents/documents/
More informationCAC/COSP/2018/CRP.9 * * 28 August English only V (E) CAC/COSP/IRG/2018/1/Add.1.
28 August 2018 English only Implementation Review Group First resumed ninth session Vienna, 3 5 September 2018 Item 6 of the provisional agenda * Other matters Summary of the President of the General Assembly
More informationInternational conference on preventing and countering radicalization and violent extremism as related to the Foreign Terrorist Fighters (FTF) threat
International conference on preventing and countering radicalization and violent extremism as related to the Foreign Terrorist Fighters (FTF) threat Abu Dhabi, United Arab Emirates (UAE) Dates: 26-28 April
More informationS/2001/1294. Security Council. United Nations
United Nations Security Council Distr.: General 27 December 2001 English Original: French Letter dated 27 December 2001 from the Chairman of the Security Council Committee established pursuant to resolution
More informationSmall Arms Trade. Topic Background
Small Arms Trade Topic Background On 24-25 April 2014, the President of the General Assembly hosted a thematic debate on Ensuring Stable and Peaceful Societies. At the event, the United Nations recognized
More informationFollow-up issues. Summary
UNITED NATIONS ECONOMIC AND SOCIAL COUNCIL Distr. LIMITED E/ESCWA/2015/EC.1/3(Part II) 19 May 2015 ORIGINAL: ENGLISH E Economic and Social Commission for Western Asia (ESCWA) Executive Committee First
More informationDelegations will find enclosed the declaration on combating terrorism as adopted by the European Council at its meeting on 25 March 2004.
COUNCIL OF THE EUROPEAN UNION Brussels, 29 March 2004 7906/04 JAI 100 ECOFIN 107 TRANS 145 RELEX 123 ECO 73 PESC 208 COTER 20 COSDP 142 NOTE from : Subject : the General Secretariat Declaration on combating
More informationIllicit Small Arms Trade
Dear Delegates, My name is Alexis Noffke and I will be your Chair for the Disarmament and International Security Committee at SEMMUNA! I m really excited to be discussing the topic of the Illicit Small
More informationAdvanced Summer Programme
Advanced Summer Programme Countering Terrorism: Legal Challenges and Dilemmas 28 August 1 September 2017 PROGRAMME* Monday 28 August (Day 1): Countering Terrorism: Introduction and Legal Frameworks 08:45
More informationAdvanced Summer Programme
Advanced Summer Programme Countering Terrorism: Legal Challenges and Dilemmas 28 August 1 September 2017 PRELIMINARY PROGRAMME* Monday 28 August (Day 1): Countering Terrorism: Introduction and Legal Frameworks
More informationNBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES. Martin S. Feldstein
NBER WORKING PAPER SERIES DESIGNING INSTITUTIONS TO DEAL WITH TERRORISM IN THE UNITED STATES Martin S. Feldstein Working Paper 13729 http://www.nber.org/papers/w13729 NATIONAL BUREAU OF ECONOMIC RESEARCH
More informationNegotiating with Terrorists an Option Not to Be Forgone
KOMMENTARE /COMMENTS Negotiating with Terrorists an Option Not to Be Forgone MICHAEL DAUDERSTÄDT I t is very tempting, in the wake of the many shocking terrorist attacks of recent times such as those in
More informationAdopted by the Security Council at its 7317th meeting, on 20 November 2014
United Nations S/RES/2185 (2014) Security Council Distr.: General 20 November 2014 Resolution 2185 (2014) Adopted by the Security Council at its 7317th meeting, on 20 November 2014 The Security Council,
More informationSecurity Council The question of Somalia and the spread of terrorism into Africa. Sarp Çelikel
Security Council The question of Somalia and the spread of terrorism into Africa. Sarp Çelikel Overview Since the downfall of the Federal Republic of Somalia s dictatorial regime under president Siad Barre
More informationTechnical guide to the implementation of Security Council resolution 1373 (2001) and other relevant resolutions
Technical guide to the implementation of Security Council resolution 1373 (2001) and other relevant resolutions Compiled by the Counter-Terrorism Committee Executive Directorate (CTED) in 2017 Technical
More informationOccasional Paper Countering Extremism: Learning from the United Kingdom Model
October 2015 Occasional Paper Countering Extremism: Learning from the United Kingdom Model Ghaffar Hussain Program on Extremism The Program on Extremism at George Washington University provides analysis
More informationDear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.
Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference. The following pages intend to guide you in the research of the topics that will be debated at MMUN
More informationUNITED NATIONS HEADQUARTERS, NEW YORK WEDNESDAY, 5 APRIL 2017, A.M. Ali Rached INTERPOL Counter-Terrorism Directorate
Open Briefing of the Counter-Terrorism Committee on Denying Save Haven to Those who Finance, Plan, Support, or Commit Terrorist Acts, or Provide Safe Havens, and Preventing Terrorists from Abusing the
More informationEPP Policy Paper 1 A Secure Europe
EPP Policy Paper 1 A Secure Europe We Europeans want to live in freedom, prosperity and security. Over more than 60 years, European integration and transatlantic cooperation has enabled us to achieve these
More informationSECRETARIAT S REPORT ON ITS ACTIVITIES (OCTOBER MAY 2017)
SECRETARIAT S REPORT ON ITS ACTIVITIES (OCTOBER 2016 - MAY 2017) Fifth Session of the Subsidiary Committee of the Meeting of States Parties to the Convention concerning the Means of Prohibiting and Preventing
More informationOrganization for Security and Co-operation in Europe
SEC.GAL/100/15/Corr.1* 4 June 2015 ENGLISH only Organization for Security and Co-operation in Europe THE CHANGING GLOBAL SECURITY ENVIRONMENT AND VISIONS OF MULTILATERAL SECURITY CO-OPERATION IN ASIA 2015
More informationConflating Terrorism and Insurgency
Page 1 of 6 MENU FOREIGN POLICY ESSAY Conflating Terrorism and Insurgency By John Mueller, Mark Stewart Sunday, February 28, 2016, 10:05 AM Editor's Note: What if most terrorism isn t really terrorism?
More informationCouncil conclusions on counter-terrorism
European Council Council of the European Union Council conclusions on counterterrorism Foreign Affairs Council Brussels, 9 February 2015 1. The Council strongly condemns the recent attacks, which have
More informationTHE FIGHT AGAINST THE ISLAMIC STATE IN SYRIA: TOWARDS THE MODIFICATION OF THE RIGHT TO SELF-DEFENCE?
Geopolitics, History, and International Relations 9(2) 2017, pp. 80 106, ISSN 1948-9145, eissn 2374-4383 THE FIGHT AGAINST THE ISLAMIC STATE IN SYRIA: TOWARDS THE MODIFICATION OF THE RIGHT TO SELF-DEFENCE?
More informationAdvanced Summer Programme
Advanced Summer Programme Countering Terrorism: Legal Challenges and Dilemmas 28 August 1 September 2017 PROGRAMME Monday 28 August (Day 1): Countering Terrorism: Introduction and Legal Frameworks 08:45
More informationResolution UNSC/1.1. UNSC United Nations Security Council
Resolution UNSC/1.1 Zealand, French Republic, Oriental Republic of Uruguay, Bolivarian Republic of Venezuela, Malaysia, People s Republic of China, Kingdom of Spain. Topic: The Democratic Republic of Congo
More informationMadam Chair Distinguished Guests, Ladies and Gentlemen,
Statement of Mr. Yoo Dae-jong, Director-General for International Organizations, MOFA, Republic of Korea UNSC CTC Special Meeting on FTF 28 July 2015, Madrid Madam Chair Distinguished Guests, Ladies and
More informationSituation in Iraq and Syria and the IS offensive including the persecution of minorities
EUROPEAN PARLIAMENT 2014-2019 TEXTS ADOPTED Provisional edition P8_TA-PROV(2014)0027 Situation in Iraq and Syria and the IS offensive including the persecution of minorities European Parliament resolution
More informationCounter-Terrorism Bill
EXPLANATORY NOTES Explanatory notes to the Bill, prepared by the Home Office, will be published separately as HL Bill 6 EN. EUROPEAN CONVENTION ON HUMAN RIGHTS Lord West of Spithead has made the following
More informationPROTECTING CULTURAL HERITAGE
PROTECTING CULTURAL HERITAGE AN IMPERATIVE FOR HUMANITY ACTING TOGETHER AGAINST DESTRUCTION AND TRAFFICKING OF CULTURAL PROPERTY BY TERRORIST AND ORGANIZED CRIME GROUPS United Nations 22 September 2016
More informationThe failure of logic in the US Israeli Iranian escalation
The failure of logic in the US Israeli Iranian escalation Alasdair Hynd 1 MnM Commentary No 15 In recent months there has been a notable escalation in the warnings emanating from Israel and the United
More informationRole of Security Sector and Civil Society in Responding to and Preventing VE
Role of Security Sector and Civil Society in Responding to and Preventing VE Security Governance Initiative Partners Seminar Accra, Ghana; 13 th December, 2017 Motivations, Commitments, Interests and profiles
More informationIntroduction. Definition of Key Terms. Special Conference. Measures to suppress the financing of terrorism
Forum: Issue: Student Officer: Position: Special Conference Measures to suppress the financing of terrorism Sinan van der Hoeven Co-Chair Introduction Throughout the history of humanity we have always
More informationEU response to the illicit trade in cultural goods
EU response to the illicit trade in cultural goods May 2018 Chiara Bellani European Commission Directorate General for Education, Youth, Sport and 1. EU competence Supporting in the field of culture Art.
More informationProspects for CWC Universality. Daniel Feakes Harvard Sussex Program Open Forum Second CWC Review Conference The Hague 9 April 2008
Prospects for CWC Universality Daniel Feakes Harvard Sussex Program Open Forum Second CWC Review Conference The Hague 9 April 2008 The Harvard Sussex Program Academic NGO based at University of Sussex
More informationIt Happens on the Pavement: The Role of Cities in Addressing Migration and Violent Extremism Challenges and Opportunities
Meeting Summary It Happens on the Pavement: The Role of Cities in Addressing Migration and Violent Extremism Challenges and Opportunities August 4, 2016 Brookings Institution, Washington, DC The Prevention
More informationThe legal basis for the invasion of Afghanistan
The legal basis for the invasion of Afghanistan Standard Note: SN/IA/5340 Last updated: 26 February 2010 Author: Ben Smith and Arabella Thorp Section International Affairs and Defence Section The military
More information2015 ASEAN PLAN OF ACTION AGAINST TRAFFICKING IN PERSONS, ESPECIALLY WOMEN AND CHILDREN
2015 ASEAN PLAN OF ACTION AGAINST TRAFFICKING IN PERSONS, ESPECIALLY WOMEN AND CHILDREN I. INTRODUCTION... 2 II. CHALLENGES... 2 III. OBJECTIVE... 3 IV. ACTION PLANS... 3 A. PREVENTION OF TRAFFICKING IN
More informationChapter 6 Foreign Aid
Chapter 6 Foreign Aid FOREIGN AID REPRESENTS JUST 1% OF THE FEDERAL BUDGET FOREIGN AID 1% Defense 19% Education 4% Health 10% Medicare 13% Income Security 16% Social Security 21% Net Interest 6% Veterans
More informationBRIEFING: MANDATE AND ACTIVTIES DIRECTORATE FOR PRIORITY CRIME INVESTIGATION(DPCI): 17 SEPTEMBER 2014
BRIEFING: MANDATE AND ACTIVTIES DIRECTORATE FOR PRIORITY CRIME INVESTIGATION(DPCI): 17 SEPTEMBER 2014 OUTLINE OF THE PRESENTATION INTRODUCTION BACKGROUND MANDATE DECLARED PRIORITIES DPCI OPERATING MODEL
More information