Terrorism Strategy in Central Asia
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Virtual Currencies and Terrorist Financing : Assessing the Risks And
DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT FOR CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS COUNTER-TERRORISM Virtual currencies and terrorist financing: assessing the risks and evaluating responses STUDY Abstract This study, commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the TERR Committee, explores the terrorist financing (TF) risks of virtual currencies (VCs), including cryptocurrencies such as Bitcoin. It describes the features of VCs that present TF risks, and reviews the open source literature on terrorist use of virtual currencies to understand the current state and likely future manifestation of the risk. It then reviews the regulatory and law enforcement response in the EU and beyond, assessing the effectiveness of measures taken to date. Finally, it provides recommendations for EU policymakers and other relevant stakeholders for ensuring the TF risks of VCs are adequately mitigated. PE 604.970 EN ABOUT THE PUBLICATION This research paper was requested by the European Parliament's Special Committee on Terrorism and was commissioned, overseen and published by the Policy Department for Citizens’ Rights and Constitutional Affairs. Policy Departments provide independent expertise, both in-house and externally, to support European Parliament committees and other parliamentary bodies in shaping legislation and exercising democratic scrutiny over EU external and internal policies. To contact the Policy Department for Citizens’ Rights and Constitutional Affairs or to subscribe to its newsletter please write to: [email protected] RESPONSIBLE RESEARCH ADMINISTRATOR Kristiina MILT Policy Department for Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] AUTHORS Tom KEATINGE, Director of the Centre for Financial Crime and Security Studies, Royal United Services Institute (coordinator) David CARLISLE, Centre for Financial Crime and Security Studies, Royal United Services Institute, etc. -
Towards a Human Security Approach to Peacebuilding 1
www.isp.unu.edu Number 2, 2010 Overview In recent decades, international Towards a Human Security peacebuilding and reconstruction after civil wars have managed to promote stability and contain conflict in many Approach to Peacebuilding regions around the world, ending violence and enabling communities to rebuild their lives and societies. HAT IS THE RECORD, EFFECTIVENESS AND LEGACY However, the peacebuilding record of liberal approaches to peacebuilding in conflict-prone and post-conflict indicates that there are problems W societies? Aside from promoting stability and containing conflict, why does related to the effectiveness and international peacebuilding have a mixed—or even poor—record in promoting legitimacy of peacebuilding, especially welfare, equitable human development and inclusive democratic politics? Have these related to the promotion of liberal shortcomings jeopardized overall peacebuilding objectives and contributed to democracy, market reform and state questions about its legitimacy? How might alternative approaches to peacebuilding, institutions. This brief considers these based upon welfare and public service delivery, promote a more sustainable and limitations and argues that a new human security-based approach may inclusive form of peace? These questions allude to a core concern regarding offer insights for a more sustainable international peacebuilding: the limitations of existing approaches and the need form of peacebuilding. for greater emphasis upon welfare economics, human development and local engagement. Peacebuilding -
595 an Empirical Study of Terrorism Prosecutions in Canada
EMPIRICAL STUDY OF TERRORISM PROSECUTIONS IN CANADA 595 AN EMPIRICAL STUDY OF TERRORISM PROSECUTIONS IN CANADA: ELUCIDATING THE ELEMENTS OF THE OFFENCES MICHAEL NESBITT* AND DANA HAGG** It has now been over 15 years since Canada enacted the Anti-Terrorism Act, codifying what we think of today as Canada’s anti-terrorism criminal laws. The authors set out to canvass how these provisions have been judicially interpreted since their inception through an empirical analysis of court decisions. After exploring how courts have settled initial concerns about these provisions with respect to religious and expressive freedoms, the authors suggest that courts’ interpretations of Canada’s terrorism offences still leave us with many questions, particularly with respect to the facilitation and financing offences. The authors explore these questions and speculate about future challenges that may or may not be successful with the hopes of providing guidance to prosecutors and defence lawyers working in this area. TABLE OF CONTENTS I. INTRODUCTION ............................................. 595 II. TERRORISM PROSECUTIONS TO DATE ............................ 599 III. JUDICIAL INTERPRETATIONS OF THE ELEMENTS OF TERRORISM OFFENCES .................................... 608 A. DEFINITIONS (SECTION 83.01)............................. 608 B. OFFENCES ............................................ 620 IV. CONCLUSIONS AND FUTURE CONSIDERATIONS ....................... 647 I. INTRODUCTION It has now been over 15 years since Canada expeditiously enacted the Anti-Terrorism -
350520Referenc1money01offi
35052 Public Disclosure Authorized Public Disclosure Authorized Public Disclosure Authorized Reference Guide to Anti-Money Laundering and Combating the Financing of Terrorism Second Edition and Supplement on Special Recommendation IX Paul Allan Schott Public Disclosure Authorized Reference Guide to Anti-Money Laundering and Combating the Financing of Terrorism Second Edition and Supplement on Special Recommendation IX Reference Guide to Anti-Money Laundering and Combating the Financing of Terrorism Second Edition and Supplement on Special Recommendation IX © 2006 The International Bank for Reconstruction and Development/The World Bank/ The International Monetary Fund 1818 H Street NW Washington DC 20433 Telephone: 202-473-1000 Internet: www.worldbank.org E-mail: [email protected] All rights reserved First printing of Second Edition and Supplement on Special Recommendation IX, January 2006 1 2 3 4 5 10 09 08 07 06 This volume is a product of the staff of the International Bank for Reconstruction and Development/The World Bank/The International Monetary Fund. The findings, interpretations, and conclusions expressed in this paper do not necessarily reflect the views of the World Bank, the International Monetary Fund, their Executive Directors, or the governments they represent. The World Bank and International Monetary Fund do not guarantee the accuracy of the data included in this work. The boundaries, colors, denominations, and other information shown on any map in this work do not imply any judgment on the part of the World Bank or International Monetary Fund concerning the legal status of any territory or the endorsement or acceptance of such boundaries. Rights and Permissions The material in this publication is copyrighted. -
GENDER DIMENSIONS of Criminal Justice Responses to Terrorism Cover Photo: © Istock UNITED NATIONS OFFICE on DRUGS and CRIME Vienna
Handbook on GENDER DIMENSIONS of criminal justice responses to terrorism Cover photo: © iStock UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna HANDBOOK ON GENDER DIMENSIONS OF CRIMINAL JUSTICE RESPONSES TO TERRORISM UNITED NATIONS Vienna, 2019 © United Nations, 2019. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitations of its frontiers or boundaries. Mention of firm names and commercial products does not imply the endorsement of the United Nations. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Contents Acknowledgements . v Introduction . 1 Chapter 1 . Criminal justice and counter-terrorism in the context of the international legal and policy framework for women’s rights and gender equality . 5 A. Non-discrimination, gender equality and women’s rights ..........................................5 B. Mainstreaming gender in counter-terrorism and criminal justice ..................................12 C. Gender equality, the Women, Peace and Security Agenda and the Sustainable Development Goals: the nexus to counter-terrorism ...........................................................17 D. The special policy and legal framework for the protection of the girl child ..........................21 Chapter 2 . Gender dimensions of terrorism offences -
Middle Eastern Women on the Move Middle Eastern Women on the Move
Middle East Project MIDDLE EASTERN WOMEN ON THE MOVE MIDDLE EASTERN WOMEN ON THE MOVE Middle East Project MIDDLE EASTERN WOMEN ON THE MOVE Openings for and the Constraints on Women’s Political Participation in the Middle East ©2003 Woodrow Wilson International Center for Scholars, Washington, D.C. www.wilsoncenter.org WOODROW WILSON INTERNATIONAL CENTER FOR SCHOLARS LEE H. HAMILTON, DIRECTOR BOARD OF TRUSTEES Joseph B. Gildenhorn, Chair; David A. Metzner, Vice Chair. Public Members: James H. Billington, Librarian of Congress; John W. Carlin, Archivist of the United States; Bruce Cole, Chair, National Endowment for the Humanities; Roderick R. Paige, Secretary, U.S. Department of Education; Colin L. Powell, Secretary, U.S. Department of State; Lawrence M. Small, Secretary, Smithsonian Institution; Tommy G. Thompson, Secretary, U.S. Department of Health and Human Services. Private Citizen Members: Joseph A. Cari, Jr., Carol Cartwright, Donald E. Garcia, Bruce S. Gelb, Daniel L. Lamaute, Tamala L. Longaberger, Thomas R. Reedy WILSON COUNCIL Bruce S. Gelb, President. Diane Aboulafia-D'Jaen, Elias F. Aburdene, Charles S. Ackerman, B.B. Andersen, Cyrus A. Ansary, Lawrence E. Bathgate II, John Beinecke, Joseph C. Bell, Steven Alan Bennett, Rudy Boschwitz, A. Oakley Brooks, Melva Bucksbaum, Charles W. Burson, Conrad Cafritz, Nicola L. Caiola, Raoul L. Carroll, Scott Carter, Albert V. Casey, Mark Chandler, Peter B. Clark, Melvin Cohen, William T. Coleman, Jr., Michael D. DiGiacomo, Sheldon Drobny, F. Samuel Eberts III, J. David Eller, Mark Epstein, Melvyn J. Estrin, Sim Farar, Susan Farber, Joseph H. Flom, John H. Foster, Charles Fox, Barbara Hackman Franklin, Norman Freidkin, Morton Funger, Gregory M. -
Human Security Twenty Years On
Expert Analysis June 2014 Human security twenty years on By Shahrbanou Tadjbakhsh Executive summary The concept of human security, which made its international debut in the 1994 UNDP Human Development Report, adds a people-centred dimension to the traditional security, development and human rights frameworks while locating itself in the area where they converge. Ever since, a number of countries have used the concept for their foreign and aid policies. Although it became the subject of a 2012 General Assembly Resolution, the concept still courts controversy and rejection twenty years after its introduction. Politically, its close association with the notion of the Responsibility to Protect in debates about international interventions has alienated Southern countries that are sceptical about violations of state sovereignty and new conditionali- ties for receiving aid. No country has adopted it as a goal at the national level, raising scepticism about its utility for domestic policymaking. Yet the concept represents a malleable tool for ana- lysing the root causes of threats and their multidimensional consequences for different types of insecurities. It can be operationalised through applying specific principles to policymaking and can be used as an evaluative tool for gauging the impact of interventions on the dynamics of other fields. The article suggests that Norway not only pursues the goal of human security at the global level, but that it also leads in adopting it as a national goal by scrutinising the country’s domestic policies using this approach. Still shaky after twenty years1 – have negated its value as an analytical framework, Often, in the space where the policy, political and academic rejected its utility as a policy agenda, and even opposed its arenas converge, much ink is spilled in defence of a very very existence as a concept. -
Counter-Terrorism Reference Curriculum
COUNTER-TERRORISM REFERENCE CURRICULUM CTRC Academic Project Leads & Editors Dr. Sajjan M. Gohel, International Security Director Asia Pacific Foundation Visiting Teacher, London School of Economics & Political Science [email protected] & [email protected] Dr. Peter Forster, Associate Professor Penn State University [email protected] PfPC Reference Curriculum Lead Editors: Dr. David C. Emelifeonwu Senior Staff Officer, Educational Engagements Canadian Defence Academy Associate Professor Royal Military College of Canada Department of National Defence [email protected] Dr. Gary Rauchfuss Director, Records Management Training Program National Archives and Records Administration [email protected] Layout Coordinator / Distribution: Gabriella Lurwig-Gendarme NATO International Staff [email protected] Graphics & Printing — ISBN XXXX 2010-19 NATO COUNTER-TERRORISM REFERENCE CURRICULUM Published May 2020 2 FOREWORD “With guns you can kill terrorists, with education you can kill terrorism.” — Malala Yousafzai, Pakistani activist for female education and Nobel Prize laureate NATO’s counter-terrorism efforts have been at the forefront of three consecutive NATO Summits, including the recent 2019 Leaders’ Meeting in London, with the clear political imperative for the Alliance to address a persistent global threat that knows no border, nationality or religion. NATO’s determination and solidarity in fighting the evolving challenge posed by terrorism has constantly increased since the Alliance invoked its collective defence clause for the first time in response to the terrorist attacks of 11 September 2001 on the United States of America. NATO has gained much experience in countering terrorism from its missions and operations. However, NATO cannot defeat terrorism on its own. Fortunately, we do not stand alone. -
A Tale of Two Studies: the Real Story of Terrorism Finance
Gordon Final.docx (DO NOT DELETE) // : PM RESPONSE A TALE OF TWO STUDIES: THE REAL STORY OF TERRORISM FINANCE † RICHARD GORDON In response to Shima Baradaran, Michael Findley, Daniel Nielson & Jason Sharman, Funding Terror, U. PA. L. REV. (). INTRODUCTION I was pleased when I saw that the University of Pennsylvania Law Review had published a new article on terrorism financing,1 especially when I saw that my friend and frequent collaborator Jason Sharman was an author. But my pleasure turned to puzzlement, then to dismay, as I delved into it. The Article, entitled Funding Terror, consists of three parts. The first is primarily a discussion of what we already know about terrorism financing, focusing on the use of shell companies (not easy to define, but, more or less, companies that have no independent operations, significant assets, ongoing business activities, or employees2) by terrorists,3 and on steps recently taken † Professor of Law and Director, Institute for Global Security Law and Policy, Case Western Reserve University School of Law. I thank Bianca Nunes and Jessica Rice for thoughtful comments and suggestions. 1 See Shima Baradaran, Michael Findley, Daniel Nielson & Jason Sharman, Funding Terror, U. PA. L. REV. () [hereinafter Funding Terror]. 2 EMILE VAN DER DOES DE WILLEBOIS ET AL., STOLEN ASSET RECOVERY INITIA- TIVE, THE PUPPET MASTERS: HOW THE CORRUPT USE LEGAL STRUCTURES TO HIDE STOLEN ASSETS AND WHAT TO DO ABOUT IT (), available at http://star.worldbank.org/ star/sites/star/files/puppetmastersv.pdf [hereinafter PUPPET MASTERS]; Funding Terror, supra note , at . 3 See Funding Terror, supra note , at -. () Gordon Final.docx (DO NOT DELETE)// : PM University of Pennsylvania Law Review Online [Vol. -
Terrorism Convictions Monitor
European Union Judicial Cooperation Unit EUROJUST May 2008 Terrorism Convictions Monitor EUROJUST Report Based on open sources information Issue 1 Contents I. Introduction II. Terrorism Convictions 1. Terrorism Convictions by Member State Overview January-April 2008 2. Comparative Analysis Terrorism Convictions January-April 2008 3. Comparative Study Convictions of a particular crime type III. Legal Update 1. EU 2. EU Member States Overview IV. Conclusions V. The Way Ahead Appendix Contact and Analyst Team I. Introduction Why a Terrorism With a view to the increasing involvement of EUROJUST in judicial co- Convictions Monitor operation matters related to terrorism as well as its active contribution to projects like Europol’s TE-SAT Reports, the Case Management Team (CMT) has initiated the present Terrorism Convictions Monitor, intended to provide a regular overview of the respective developments throughout the EU area. The Monitor has been developed on the basis of the open sources information available to the CMT and methodologies such as individual case studies and comparative analysis. There is a link provided to each of the convictions and acquittals found on the EUROJUST Intranet External News or the Internet. The general objective of the Terrorism Convictions Monitor is to inform and kindly invite the National Members to review and confirm the information retrieved from various open sources. In the cases when such a confirmation and/or follow-up is needed, a special icon will appear. In cases when it has already been provided, it will be noted by a . In order to facilitate the preparation of EUROJUST’s contribution to the annual TE-SAT Report, the Terrorism Convictions Monitor will be issued in January, May and September. -
Building an Effective Anti-Money Laundering and Counter-Terrorism Financing Regime in Afghanistan
World Bank and International Monetary Fund Global Dialogue Series Strengthening the Collaborative Process for Building an Effective Anti-Money Laundering and Counter-Terrorism Financing Regime in Afghanistan Sponsored by the World Bank Financial Sector and the World Bank Institute in partnership with the South Asia Region of the World Bank and the International Monetary Fund Strengthening the Collaborative Process for Building an Effective Anti-Money Laundering and Counter-Terrorism Financing Regime in Afghanistan i Copyright © 2004 The International Bank for Reconstruction and Development. All rights reserved. Strengthening the Collaborative Process for Building an Effective Anti-Money Laundering and Counter-Terrorism Financing Regime in Afghanistan Sponsored by the World Bank Financial Sector and the World Bank Institute in partnership with the South Asia Region of the World Bank and the International Monetary Fund iii Contents A Worldwide Challenge… . 1 Strengthening the Collaborative Process to Build Effective Anti-Money Laundering and Combating the Financing of Terrorism (AML/CFT) Regimes . 5 Recommendations for Reforms Emerging from the Global Dialogue on June 2, 2004 . 7 Videconference Agenda—June 2, 2004 . 13 Speaker Biographies . 15 Opening Remarks . 19 New International Standards on AML/CFT: The Impact on the Financial Sector . 23 Implementing the International Standards— Developing an AML/CFT Strategy and Structure . 29 AML/CFT Legal and Regulatory Reforms . 35 v AML/CFT in Afghanistan from the Financial Industry’s Perspective . 39 Open Discussion with a Panel of Experts . 43 Wrap-up . 51 vi Building an Effective Anti-Money Laundering and Counter-Terrorism Financing Regime in Afghanistan A Worldwide Challenge… n recent years, and especially since the events of September , 200, worldwide efforts to combat financial abuse have assumed Iheightened importance. -
Paying Danegeld to Pirates – Humanitarian Necessity Or Financing Jihadists*
Paying Danegeld to Pirates – Humanitarian Necessity or Financing Jihadists* Andreas S. Kolb/ Tim René Salomon/ Julian Udich A. von Bogdandy and R. Wolfrum, (eds.), Max Planck Yearbook of United Nations Law, Volume 15, 2011, p. 105-164. © 2011 Koninklijke Brill N.V. Printed in The Netherlands. 106 Max Planck UNYB 15 (2011) I. Introduction II. Paying Ransom and/or Funding Terrorists? A Joining of Forces and Legal Consequences 1. Factual Background 2. Legal Issues beyond Ransom Payments III. Ransom Payments to Pirates and the International Law for the Suppres- sion of Terrorist Financing 1. International Convention for the Suppression of the Financing of Ter- rorism a. Application of the International Convention for the Suppression of the Financing of Terrorism to the Funding of Piratical Acts? b. Ransom Payments as Terrorist Financing? c. Conclusion on the Lawfulness of Ransom Payments to Pirates un- der the International Convention for the Suppression of the Fi- nancing of Terrorism 2. Conformity of Ransom Payments with Security Council Resolutions a. Conformity of Ransom Payments with Security Council Resolu- tion 1373 aa. Piracy as “Terrorist Act” within the Meaning of Resolution 1373 bb. Ransom Payments as Financing under Resolution 1373 cc. Conclusion on the Applicability of Resolution 1373 to Ran- som Payments to Pirates b. Suppression of Ransom Payments under the UN Sanctions Re- gime Targeting al-Qaida and the Taliban c. Suppression of Ransom Payments under the UN Sanctions Re- gime Regarding Somalia 3. Conclusion on the Legal Framework on the Payment of Ransom IV. National Solutions to Legality of Ransom Payments V. Conclusion Kolb, Salomon, Udich, Paying Danegeld to Pirates 107 I.