Foreign Terrorist Fighters Manual for Judicial Training Institutes Middle East and North Africa

Total Page:16

File Type:pdf, Size:1020Kb

Foreign Terrorist Fighters Manual for Judicial Training Institutes Middle East and North Africa ForeignForeign Terrorist Terrorist Fighters Fighters Manual for Judicial Training Institutes Manual for Judicial Training Institutes Middle East and North Africa South-Eastern Europe UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Foreign Terrorist Fighters Manual for Judicial Training Institutes Middle East and North Africa First Edition 2021 UNITED NATIONS Vienna, 2021 © United Nations, February 2021. All rights reserved worldwide. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Reference to names of firms and commercial products and processes does not imply their endorsement by UNODC, and any failure to mention a particular firm, commercial product or process is not a sign of disapproval. UNODC takes no responsibility for the content of any external website. This handbook is a technical tool that has been developed for training purposes to support crime prevention and criminal justice practitioners in the Middle East and North Africa. (MENA). 3 Contents Abbreviations ......................................................................................................5 Introduction .........................................................................................................8 Chapter 1 .............................................................................................................9 The foreign terrorist fighter phenomenon ........................................................9 1.1 Scope of the term “foreign terrorist fighter”...........................9 1.2 Typology and motivation.....................................................10 1.3 Women and children.............................................................16 1.4 Evolution of the phenomenon..............................................22 1.5 Global situation....................................................................24 1.6 Regional situation in Middle East and North Africa............30 Chapter 2 ...........................................................................................................42 Foreign terrorist fighters: the international and regional legal frameworks ...........................................42 2.1 The international legal framework.........................................42 A) United Nations Security Council Resolutions 1373 (2001), 2178 (2014) and 2396 (2017).................................................42 B) United Nations Global Counter-Terrorism Strategy..........48 C) The 19 international instruments to prevent terrorist acts... 50 D) International guiding principles.........................................52 E) The role of civil society and local communities................57 2.2 The regional framework.......................................................58 A) League of Arab States counter-terrorism legal instruments....58 B) Organization of Islamic Cooperation ...............................63 Chapter 3 ...........................................................................................................68 Online investigation of offences related to foreign terrorist fighters ...........68 3.1 Online investigations............................................................72 3.2 How to collect e-evidence?..................................................93 3.3 Special investigative techniques and foreign terrorist fighters. 97 Annexes ............................................................................................................100 List of international legal instruments related to terrorism and FTF......100 List of regional legal instruments related to terrorism and FTF .......102 4 Abbreviations API Advance Passenger Information Systems AQI Al-Qaida in Iraq CDCT The Council of Europe Committee on Counter-Terrorism CGN Carrier-Grade Network Address Translation CHIS Covert Human Intelligence Source CII Covert Internet Investigator CODEXTER The Committee of Experts on Terrorism CSV Comma Separated Value CTC United Nations Security Council Counter-Terrorism Committee CTED United Nations Security Council Counter-Terrorism Executive Directorate DHCP Dynamic Host Configuration Protocol DNA Deoxyribonucleic Acid ESI Electronically Stored Information EUCTS European Union Counter-Terrorism Strategy EU-RAN European Union Radicalisation Awareness Network EXIF Exchangeable Image File Format FTF Foreign Terrorist Fighters FTP File Transfer Protocol GCTF Global Counter-Terrorism Forum GIMF Global Islamic Media Front GPS Global Positioning System HTML Hypertext Markup Language HTS Hayat Tahrir al-Sham HTTP Hypertext Transfer Protocol IACOmmHR Inter-American Commission on Human Rights IACP International Association of Chiefs of Police IAEA International Atomic Energy Agency IANA International Assigned Number Authority IAP International Association of Prosecutors IED Improvised Explosive Device IIJ International Institute for Justice and the Rule of Law 5 IP Internet Protocol ISIL Islamic State in Iraq and the Levant- Da’esh ISP Internet Service Provider LAS League of Arab States MENA Middle East and North Africa MILF Moro Islamic Liberation Front MLA Mutual Legal Assistance OIC Organization of Islamic Cooperation OCTA Organized Crime Threat Assessment OS Operating system OSINT Open Source Intelligence P2P Peer-to-Peer PNR Passenger Name Record RAM Random Access Memory SDF Syrian Democratic Forces SIM Subscriber Identity Module SNA Social Network Analysis TCP Transmission Control Protocol TOR The Onion Router UN United Nations UNODC United Nations Office on Drugs and Crime UNSC United Nations Security Council URL Uniform Resource Locator USB Universal Serial Bus VPN Virtual Private Network 6 Acknowledgements The preparation of this handbook was made possible by the cooperative efforts and invaluable contributions of several individuals, Governments and international organizations. The United Nations Office on Drugs and Crime (UNODC) wishes to extend its gratitude to the Member States who contributed to the consultation process related to the update of this handbook. UNODC is grateful to the participants and experts from Member States in the Middle East and North Africa and beyond, for their invaluable inputs and discussions during 2019 and 2020, which have been considered to update and better tailor the content of this handbook to the current situation. The production of this handbook was guided by Fernanda Lombardi and Ali Younes and reviewed by Carine Giraldou and Marco Venier. This handbook written and updated by Ahmed Genidy, using as a basis the first edition of “Foreign Terrorist Fighters manual for Judicial training Institutes South-Eastern Europe” and the contributions from consultations, meetings and workshops held since 2019. UNODC wishes to express its gratitude for the support provided by the European Union towards the development of the handbook. 7 Introduction This edition of UNODC’s “Foreign Terrorist Fighters. Manual for Judicial Training Institutes, Middle East and North Africa” builds upon the “Foreign Terrorist Fighters. Manual for Judicial Training Institutes, South-Eastern Europe” publication, which was issued in 2017 and updated in 2019. This edition aims to present cases and provide information relevant to MENA criminal justice and law enforcement practitioners working on FTF-related issues. Chapter 1 is expanded to elaborate on the FTF phenomenon and its evolution at the global and regional levels. It includes a section covering developments in the MENA region and sub-chapters on general FTF-related trends, which largely draw upon UNODC’s earlier publications, such as “Investigation, Prosecution and Adjudication of Foreign Terrorist Cases for SEE” (2018). Chapter 2 includes details of global and regional legal documents on countering and preventing terrorism with a focus on FTF-related aspects. For example, this chapter features the United Nations Security Council Resolutions 2178 (2014) and 2396 (2017), which address the risks posed by FTF, including those seeking to return to their country of origin or to relocate to other countries. The updated Chapter 3 responds to the requests from the crime prevention and criminal justice practitioners to equip them with the updated information and tools on online investigations in terrorism cases. It provides examples of online search tools that are available to investigators for open-source intelligence gathering (OSINT). “Foreign Terrorist Fighters. Manual for Judicial Training Institutes, Middle East and North Africa” aims to be utilized by judges and prosecutors and incorporated into existing training courses delivered by national training institutes in the region. This handbook is a technical tool that has been developed for training purposes to support crime prevention and criminal justice practitioners in the MENA. This edition is funded by the European Commission’s Directorate-General for Neighbourhood and Enlargement Negotiations (DG NEAR). 8 Chapter 1 The foreign terrorist fighter phenomenon 1.1 Scope of the term “foreign terrorist fighter” The concept of “foreign fighters” is not a modern invention. Fighters from abroad have participated in nearly 100 civil wars over the past 250 years.1 The Spanish Civil War (1936-1939), which saw 50,000 volunteers from more than 50 countries, representing both sides of the conflict,
Recommended publications
  • PDF FACULTAD DE BELLAS ARTES Archivo Digital: Descarga Y Online ISBN 978-950-34-1541-2 Decana Secretaria De 1
    1º Encuentro de las cátedras de Lenguaje Visual 2B, Patrimonio Cultural e Historia de las Artes Visuales IX 1º Encuentro de las cátedras de Lenguaje Visual 2B, Patrimonio Cultural e Historia de las Artes Visuales IX 1º Encuentro de las cátedras de Lenguaje Visual 2B, Patrimonio Cultural e Historia de las Artes Visuales IX Diciembre de 2016 Visualidades contemporáneas: patrimonio, exposiciones y dispositivos / Mariel Ciafardo... [et al.]. - 1a ed. - La Plata : Universidad Nacional de La Plata. Facultad de Bellas Artes, 2017. Libro digital, PDF FACULTAD DE BELLAS ARTES Archivo Digital: descarga y online ISBN 978-950-34-1541-2 Decana Secretaria de 1. Patrimonio. 2. Historia del Arte. I. Ciafardo, Mariel Prof. Mariel Ciafardo Publicaciones y Posgrado CDD 709 Prof. María Elena Larrègle Vicedecana Prof. Cristina Terzaghi Secretaria de Extensión Prof. María Victoria Mc Coubrey Secretaria de Decanato Prof. Paula Sigismondo Secretario de Relaciones Institucionales Secretaria de Asuntos Académicos DI Eduardo Pascal Prof. Santiago Romé Secretario de Cultura Jefa del Departamento Lic. Carlos Coppa de Estudios Históricos y Sociales Lic. Paola Sabrina Belén Secretario de Producción y Comunicación Secretario de Planificación, Prof. Martín Barrios Infraestructura y Finanzas DCV Juan Pablo Fernández Secretario de Asuntos Estudiantiles Prof. Esteban Conde Ferreira Secretaria de Ciencia y Técnica Lic. Silvia García Secretario de Programas Externos DCV Fermín González Laría COMITÉ ORGANIZADOR Lic. Liliana Conles Prof. Sergio Moyinedo Prof. Mariel Ciafardo Lic. Paola Sabrina Belén Lic. Natalia Giglietti Mg. Francisco Lemus Diseño Prof. Marina Panfili DCV Diego R. Ibañez Roka Edición de contenido Lic. Natalia Giglietti Mg. Francisco Lemus Obra de tapa Cristina Schiavi, Nocturno, 2013, acrílico sobre mdf, 135 x 135 cm, Colección Malba-Fundación Costantini.
    [Show full text]
  • Policy Notes for the Trump Notes Administration the Washington Institute for Near East Policy ■ 2018 ■ Pn55
    TRANSITION 2017 POLICYPOLICY NOTES FOR THE TRUMP NOTES ADMINISTRATION THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ 2018 ■ PN55 TUNISIAN FOREIGN FIGHTERS IN IRAQ AND SYRIA AARON Y. ZELIN Tunisia should really open its embassy in Raqqa, not Damascus. That’s where its people are. —ABU KHALED, AN ISLAMIC STATE SPY1 THE PAST FEW YEARS have seen rising interest in foreign fighting as a general phenomenon and in fighters joining jihadist groups in particular. Tunisians figure disproportionately among the foreign jihadist cohort, yet their ubiquity is somewhat confounding. Why Tunisians? This study aims to bring clarity to this question by examining Tunisia’s foreign fighter networks mobilized to Syria and Iraq since 2011, when insurgencies shook those two countries amid the broader Arab Spring uprisings. ©2018 THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY. ALL RIGHTS RESERVED. THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY ■ NO. 30 ■ JANUARY 2017 AARON Y. ZELIN Along with seeking to determine what motivated Evolution of Tunisian Participation these individuals, it endeavors to reconcile estimated in the Iraq Jihad numbers of Tunisians who actually traveled, who were killed in theater, and who returned home. The find- Although the involvement of Tunisians in foreign jihad ings are based on a wide range of sources in multiple campaigns predates the 2003 Iraq war, that conflict languages as well as data sets created by the author inspired a new generation of recruits whose effects since 2011. Another way of framing the discussion will lasted into the aftermath of the Tunisian revolution. center on Tunisians who participated in the jihad fol- These individuals fought in groups such as Abu Musab lowing the 2003 U.S.
    [Show full text]
  • PERSPECTIVES on TERRORISM Volume 11, Issue 5
    ISSN 2334-3745 Volume V, Issue 5 October 2017 PERSPECTIVES ON TERRORISM Volume 11, Issue 5 Table of Contents Welcome from the Editors......................................................................................................1 Articles Countering Violent Extremism in Prisons: A Review of Key Recent Research and Critical Research Gaps.........................................................................................................................2 by Andrew Silke and Tinka Veldhuis The New Crusaders: Contemporary Extreme Right Symbolism and Rhetoric..................12 by Ariel Koch Exploring the Continuum of Lethality: Militant Islamists’ Targeting Preferences in Europe....................................................................................................................................24 by Cato Hemmingby Research Notes On and Off the Radar: Tactical and Strategic Responses to Screening Known Potential Terrorist Attackers................................................................................................................41 by Thomas Quiggin Resources Terrorism Bookshelf.............................................................................................................50 Capsule Reviews by Joshua Sinai Bibliography: Terrorist Organizations: Cells, Networks, Affiliations, Splits......................67 Compiled and selected by Judith Tinnes Bibliography: Life Cycles of Terrorism..............................................................................107 Compiled and selected by Judith
    [Show full text]
  • How Sophisticated Are Terrorist Attacks on Passenger Rail Transportation
    How Sophisticated are Terrorist Attacks on Passenger Rail Project SP 0520 Transportation June 2020 Brian Michael Jenkins and Bruce R. Butterworth Executive Summary Summary of Key Findings Terrorist attacks on passenger rail transportation are statistically rare events in the developed world— only about seven attacks per year are carried out against all of the economically advanced countries combined. However, uncovered plots and attempts indicate continuing terrorist interest in attacking transportation targets. The vast majority of terrorist attacks on passenger rail transportation are aimed at disrupting travel or causing casualties. Most of the attacks (87%) and 100% of the casualties result from attacks on passengers aboard trains and in stations, i.e., where the people are. We have defined sophistication by identifying four criteria, of which at least one must be met: The attack must (1) involve the recruitment of inside assistance, the use of insider knowledge, or the acquisition of specialized skills through training; (2) require the penetration of manned or closely monitored security systems; (3) involve the use of sophisticated weapons, devices, or means (for an IED to be considered sophisticated, it must do more than simply explode—it must have a timing or remote detonating system that guarantees detonation at a remote time or in a specific location, or it must be miniaturized or disguised so as to evade detection); and (4) must be complex—it must involve multiple actors with individual roles or coordinated simultaneous or near-simultaneous attacks at different locations. Using those criteria, we find few of the terrorist attacks on public surface transport are sophisticated.
    [Show full text]
  • The Jihadi Threat: ISIS, Al-Qaeda, and Beyond
    THE JIHADI THREAT ISIS, AL QAEDA, AND BEYOND The Jihadi Threat ISIS, al- Qaeda, and Beyond Robin Wright William McCants United States Institute of Peace Brookings Institution Woodrow Wilson Center Garrett Nada J. M. Berger United States Institute of Peace International Centre for Counter- Terrorism Jacob Olidort The Hague Washington Institute for Near East Policy William Braniff Alexander Thurston START Consortium, University of Mary land Georgetown University Cole Bunzel Clinton Watts Prince ton University Foreign Policy Research Institute Daniel Byman Frederic Wehrey Brookings Institution and Georgetown University Car ne gie Endowment for International Peace Jennifer Cafarella Craig Whiteside Institute for the Study of War Naval War College Harleen Gambhir Graeme Wood Institute for the Study of War Yale University Daveed Gartenstein- Ross Aaron Y. Zelin Foundation for the Defense of Democracies Washington Institute for Near East Policy Hassan Hassan Katherine Zimmerman Tahrir Institute for Middle East Policy American Enterprise Institute Charles Lister Middle East Institute Making Peace Possible December 2016/January 2017 CONTENTS Source: Image by Peter Hermes Furian, www . iStockphoto. com. The West failed to predict the emergence of al- Qaeda in new forms across the Middle East and North Africa. It was blindsided by the ISIS sweep across Syria and Iraq, which at least temporarily changed the map of the Middle East. Both movements have skillfully continued to evolve and proliferate— and surprise. What’s next? Twenty experts from think tanks and universities across the United States explore the world’s deadliest movements, their strate- gies, the future scenarios, and policy considerations. This report reflects their analy sis and diverse views.
    [Show full text]
  • From Criminals to Terrorists and Back?
    FROM CRIMINALS TO TERRORISTS AND BACK? KICK-OFF REPORT www.globsec.org AUTHORS Kacper Rekawek, Head of Defence and Security Programme, GLOBSEC Policy Institute Stanislav Matejka, Junior Research Fellow, Defence and Security Programme, GLOBSEC Policy Institute Martina Babikova, GLOBSEC Policy Institute Tomas Nagy, Research Fellow, Defence and Security Programme, GLOBSEC Policy Institute Jakub Rafay, GLOBSEC Policy Institute Design by Peter Verček, GLOBSEC The following distinguished partners were consulted in the process of preparation of this report. The sole responsibility for the content of this publication lies with the authors. • Austria - Daniela Pisoiu • Bulgaria - Rositsa Dzhekova, Nadya Stoynova • France - Olivier de France, Damien Saverot, Pierre Colomina • Germany - Matenia Sirseloudi • Greece - Eleni Fotou • Ireland - Orla Lynch • Italy - Marco Lombardi, Giovanni Giacalone, Nicolò Spagna • Netherlands - Jessica Sciarone, Bart Schuurman • Spain - Fernando Reinares, Carola García Calvo, Álvaro Vicente • United Kingdom - John Morrison, Aleksandra Łojek The project is funded under PMI IMPACT, a global grant initiative of Philip Morris International to support projects against illegal trade. GLOBSEC is fully independent in implementing the project and has editorial responsibility for all views and opinions expressed herein. CONTENTS PROJECT SUMMARY 6 EXECUTIVE SUMMARY 7 FROM CRIMINALS TO TERRORISTS AND BACK? 10 INTRODUCING CRIME-TERROR NEXUS 10 RESEARCHING THE CRIME-TERROR NEXUS: CHALLENGES 12 RESEARCHING THE NEXUS: WHAT IS NEXT?
    [Show full text]
  • Jihadist Attacks on Critical Infrastructure
    DOI: 10.38146/BSZ.SPEC.2020.1.7 Bianka Speidl – Hanga Horváth-Sántha Jihadist attacks on Critical Infrastructure Abstract Besides its function to maintain the social and economic well-being of a nation, operating critical infrastructure serves as a proof of the ability of the state to provide protection to its citizens. Hence, a successful terrorist attack targeting critical infrastructure - in addition to generating fear and panic in the ranks of society undermines the operational character of the state. In recent years, several terrorist incidents in Europe have highlighted the vulnerability of crit- ical infrastructure and, consequently, the importance of protecting it. Bearing this in mind, the protection of critical infrastructure has become a high prior- ity for Western states, in parallel with the growing trend of risks, challenges and threats posed by international terrorism. Recently Europe has seen an in- crease in terrorist attacks against members of law enforcement as well as the armed forces. This paper argues that such attacks should also be considered as attacks on critical infrastructure, as it is ultimately the human resources be- ing responsible for the well-functioning of those agencies. Further, the paper aims to examine the religious justification of Jihadist terrorist attacks against critical infrastructure. Keywords: Critical infrastructure, terrorist attack, Salafi-Jihadism, al-Qā‛ida, Islamic State Introduction Greatly simplified, critical infrastructure can be defined as all those infrastruc- tures our society depends on in daily life, including transport, energy, informa- tion technology and many other sectors. Critical infrastructure has made life of the citizens in a modern state much more simple compared to previous dec- Belügyi Szemle / 2020 / Special Issue 1.
    [Show full text]
  • April 11, 2021 Under Attack: Terrorism and International Trade in France
    April 11, 2021 Under Attack: Terrorism and International Trade in France, 2014-16* Volker Nitsch Isabelle Rabaud Technische Universität Darmstadt Université d’Orléans, LEO, Abstract Terrorist events typically vary along many dimensions, making it difficult to identify their economic effects. This paper analyzes the impact of terrorism on international trade by examining a series of three large-scale terrorist incidents in France over the period from January 2015 to July 2016. Using firm-level data at monthly frequency, we document an immediate and lasting decline in cross-border trade after a mass terrorist attack. According to our estimates, France’s trade in goods, which accounts for about 70 percent of the country’s trade in goods and services, is reduced by more than 6 billion euros in the first six months after an attack. The reduction in trade mainly takes place along the intensive margin, with particularly strong effects for partner countries with low border barriers to France, for firms with less frequent trade activities and for homogeneous products. A possible explanation for these patterns is an increase in trade costs due to stricter security measures. JEL Classification Codes: F14; F52 Keywords: shock; insecurity; uncertainty; terrorism; international trade; France * We thank Béatrice Boulu-Reshef, Stefan Goldbach, Jérôme Héricourt, Laura Hering, Christophe Hurlin, Miren Lafourcade, Laura Lebastard, Daniel Mirza, Serge Pajak, Felipe Starosta de Waldemar, Patrick Villieu, three anonymous referees, and participants at presentations in Bern (European Trade Study Group), Darmstadt, Köln (Verein für Socialpolitik), Orléans (Association Française de Science Economique), Paris (Université Paris-Saclay, RITM, and Université Paris-Est, ERUDITE), and Poitiers for helpful comments.
    [Show full text]
  • A Framework for Identifying Host-Based Artifacts in Dark Web Investigations
    Dakota State University Beadle Scholar Masters Theses & Doctoral Dissertations Fall 11-2020 A Framework for Identifying Host-based Artifacts in Dark Web Investigations Arica Kulm Dakota State University Follow this and additional works at: https://scholar.dsu.edu/theses Part of the Databases and Information Systems Commons, Information Security Commons, and the Systems Architecture Commons Recommended Citation Kulm, Arica, "A Framework for Identifying Host-based Artifacts in Dark Web Investigations" (2020). Masters Theses & Doctoral Dissertations. 357. https://scholar.dsu.edu/theses/357 This Dissertation is brought to you for free and open access by Beadle Scholar. It has been accepted for inclusion in Masters Theses & Doctoral Dissertations by an authorized administrator of Beadle Scholar. For more information, please contact [email protected]. A FRAMEWORK FOR IDENTIFYING HOST-BASED ARTIFACTS IN DARK WEB INVESTIGATIONS A dissertation submitted to Dakota State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Cyber Defense November 2020 By Arica Kulm Dissertation Committee: Dr. Ashley Podhradsky Dr. Kevin Streff Dr. Omar El-Gayar Cynthia Hetherington Trevor Jones ii DISSERTATION APPROVAL FORM This dissertation is approved as a credible and independent investigation by a candidate for the Doctor of Philosophy in Cyber Defense degree and is acceptable for meeting the dissertation requirements for this degree. Acceptance of this dissertation does not imply that the conclusions reached by the candidate are necessarily the conclusions of the major department or university. Student Name: Arica Kulm Dissertation Title: A Framework for Identifying Host-based Artifacts in Dark Web Investigations Dissertation Chair: Date: 11/12/20 Committee member: Date: 11/12/2020 Committee member: Date: Committee member: Date: Committee member: Date: iii ACKNOWLEDGMENT First, I would like to thank Dr.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Global Extremism Monitor
    Global Extremism Monitor Violent Islamist Extremism in 2017 WITH A FOREWORD BY TONY BLAIR SEPTEMBER 2018 1 2 Contents Foreword 7 Executive Summary 9 Key Findings About the Global Extremism Monitor The Way Forward Introduction 13 A Unifying Ideology Global Extremism Today The Long War Against Extremism A Plethora of Insurgencies Before 9/11 A Proliferation of Terrorism Since 9/11 The Scale of the Problem The Ten Deadliest Countries 23 Syria Iraq Afghanistan Somalia Nigeria Yemen Egypt Pakistan Libya Mali Civilians as Intended Targets 45 Extremist Groups and the Public Space Prominent Victims Breakdown of Public Targets Suicide Bombings 59 Use of Suicide Attacks by Group Female Suicide Bombers Executions 71 Deadliest Groups Accusations Appendices 83 Methodology Glossary About Us Notes 3 Countries Affected by Violent Islamist Extremism, 2017 4 5 6 Foreword Tony Blair One of the core objectives of the Institute is the promotion of co-existence across the boundaries of religious faith and the combating of extremism based on an abuse of faith. Part of this work is research into the phenomenon of extremism derived particularly from the abuse of Islam. This publication is the most comprehensive analysis of such extremism to date and utilises data on terrorism in a new way to show: 1. Violent extremism connected with the perversion of Islam today is global, affecting over 60 countries. 2. Now more than 120 different groups worldwide are actively engaged in this violence. 3. These groups are united by an ideology that shares certain traits and beliefs. 4. The ideology and the violence associated with it have been growing over a period of decades stretching back to the 1980s or further, closely correlated with the development of the Muslim Brotherhood into a global movement, the Iranian Revolution in 1979 and—in the same year—the storming by extremist insurgents of Islam’s holy city of Mecca.
    [Show full text]
  • Zeronet Presentation
    ZeroNet Decentralized web platform using Bitcoin cryptography and BitTorrent network. ABOUT ZERONET Why? Current features We believe in open, free, and ◦ Real-time updated sites uncensored network and communication. ◦ Namecoin .bit domain support ◦ No hosting costs ◦ Multi-user sites Sites are served by visitors. ◦ Password less, Bitcoin's BIP32- ◦ Impossible to shut down based authorization It's nowhere because it's ◦ Built-in SQL server with P2P data everywhere. synchronization ◦ No single point of failure ◦ Tor network support Site remains online so long as at least 1 peer serving it. ◦ Works in any browser/OS ◦ Fast and works offline You can access the site even if your internet is unavailable. HOW DOES IT WORK? THE BASICS OF ASYMMETRIC CRYPTOGRAPHY When you create a new site you get two keys: Private key Public key 5JNiiGspzqt8sC8FM54FMr53U9XvLVh8Waz6YYDK69gG6hso9xu 16YsjZK9nweXyy3vNQQPKT8tfjCNjEX9JM ◦ Only you have it ◦ This is your site address ◦ Allows you to sign new content for ◦ Using this anyone can verify if the your site. file is created by the site owner. ◦ No central registry ◦ Every downloaded file is verified, It never leaves your computer. makes it safe from malicious code inserts or any modifications. ◦ Impossible to modify your site without it. MORE INFO ABOUT CRYPTOGRAPHY OF ZERONET ◦ ZeroNet uses the same elliptic curve based encryption as in your Bitcoin wallet. ◦ You can accept payments directly to your site address. ◦ Using the current fastest supercomputer, it would take around 1 billion years to "hack" a private key. WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? (1/2) 1 Gathering visitors IP addresses: Please send some IP addresses for site 1EU1tbG9oC1A8jz2ouVwGZyQ5asrNsE4Vr OK, Here are some: 12.34.56.78:13433, 42.42.42.42:13411, ..
    [Show full text]