International Maritime Safety and Security Exchange

Total Page:16

File Type:pdf, Size:1020Kb

International Maritime Safety and Security Exchange IDEAS. INFLUENCE. IMPACT. systems and initiatives. Data warehousing is a The maritime domain has the opportunity to make promising mechanism. significant progress in maritime security if existing nascent information exchange initiatives are brought Conclusions and Next Steps together in a formal government-led International Maritime Safety and Security Exchange. The world’s transportation infrastructure is vulnerable to Admiral Henry G. Ulrich, III, USN (Ret.) INTERNATIONAL SECURITY PROGRAM terrorists as they seek to intimidate nations and citizens May 2010 through fear. Attacks like 9/11, the Madrid train attack, the London subway bombing, and the Mumbai assault send a clear signal terrorists are waging a global war. International Maritime Safety and Security Governments have reduced, and continue to reduce, International Security Program vulnerabilities in transportation systems. Aviation security The Program on International Security shapes and Exchange: A Promising Business Model for has been the most visible. influences the debate on international security by But governments and the commercial sector have been facilitating dialogue through critical analysis and Global Maritime Safety and Security noticeably less creative and aggressive with ports and policy-relevant programming on the greatest security ur ports and waterways remain woefully vulnerable inland waterways. Much can be learned from the trials and challenges facing the United States and the trans- to terrorist attacks. Nearly a decade after 9/11 progress of the aviation community, in particular: atlantic community. The Program on International Maritime Security Studies revolutionized aviation security, we are long overdue Security builds on its extensive network of experts O In 2009, the Atlantic Council initiated several efforts • the potential strength of integrated and shared to apply many of those lessons learned to maritime and practitioners in North America and Europe to aimed at understanding better the national security information – properly analyzed with sophisticated rule security. This issue brief calls for the creation of an inform policy and to introduce ideas into the public implications of global maritime security and devel- sets – to alert authorities of anomalies; and innovative, integrated International Maritime Safety and debate. The Program influences policy and shapes oping policy-relevant solutions to maritime security Security Exchange to mitigate existing vulnerabilities in • the frightening and frustrating consequences of having ideas by publishing task force reports and analytical challenges. These efforts examined the drivers of the maritime domain. available information not properly shared and vetted. issues briefs, providing a public speaking platform maritime insecurity, examined current coalition To move ahead with the IMSSE concept, it is imperative to: for leaders in international security, briefing policy- maritime security operations, shared lessons makers and national security leaders in private Context learned from maritime security actors and identified • identify a lead U.S. Government department or agency strategy sessions and hosting working groups to The United States Government experienced a remarkable challenges to and opportunities for international with the capacity to synchronize all USG maritime tackle the most complex challenges in international rebirth in aviation security after 9/11. We have become cooperation, with a special emphasis on information security activities and engage international partners; security. For more information, contact Vice President familiar with air marshals, enhanced baggage screening, sharing in operations and maritime domain • determine what information requirements are necessary and Director of the Program on International passenger information exchanges, no-fly lists, body awareness. Key events included a conference to safely allow ships and cargo to ply our inland waters Security Damon Wilson ([email protected]) or scanning and travel document standardization. As our on “Pirates, Port, and Partners” co-hosted with and enter our ports; and Assistant Director Magnus Nordenman image of aviation security matures, we have become more the U.S. Naval War College (http://www.acus.org/ ([email protected]). event/5407) and workshops with senior government • develop, asses, and validate the processes and accepting of previously objectionable government-autho- officials. One of the key findings from the conference technologies in a limited pilot demonstration. rized technological applications, routines and procedures. In fact, we are much more appreciative of the persistent was the recognition of well intentioned yet uncoordi- dimension of aviation security, especially after the nated and therefore ineffective maritime security attempted hijacking or destruction of American Airlines efforts. This issue brief is a product of the Council’s Flight 63 by the “shoe bomber” Richard Reid on December maritime security initiative. 22, 2001 or more recently Northwest Airlines Flight 253 on December 25, 2009 by Umar Farouk Abdulmutallab. develop procedures to prevent their occurrence in the Like 9/11, these events energized security professionals to future. Not surprisingly, aviation security increasingly relies understand the gaps, acquire more technology and on sophisticated scanning sensors at airports and a web of The Atlantic Council of the United States has as its mission the renewal of the Atlantic community for 21st century global challenges through constructive U.S.-European leadership and engagement in world affairs. Led by Senator Chuck Hagel, Chairman, and Frederick Kempe, President and CEO, the Atlantic Council embodies a network of policy, academic and Admiral Henry G. Ulrich, III, USN (Ret.) is a Board Director of the Atlantic Council and former Commander, business leaders who foster transatlantic ties through non-partisan and cross-national discussions and studies. U.S. Naval Forces Europe. 1101 15th Street NW • 11th Floor • Washington, DC 20005 • (202) 778-4968 • www.acus.org The International Security Program is grateful to Atlantic Council Senior Fellow Commander Philip Walker, USN, for his contribution to this issue brief and for his support of the Council’s maritime security programming. The views expressed do not necessarily represent the views of the Atlantic Council. 4 Atlantic Council international databases to validate cargo (mostly people) A Model for an International An alternative to the present reality is to institute an Challenges and before loading. Information Maritime Safety and International Maritime Safety and Security Exchange Suggested Strategies Security Exchange (IMSSE) (IMSSE). Exchange business models (EBM) are standard But is it enough? Have we completely eliminated, or at least Launching the IMSSE will require change in the status quo. in the financial, health, industrial and government sectors. sufficiently mitigated, aviation vulnerabilities? How will As trade in the 21st century continues to be shaped by The IMSSE should leverage ad hoc, informal and tempo- Essentially, EBMs connect providers and consumers future terrorists view their chances of penetrating aviation globalization, the maritime domain will become increasingly rary partnerships to overcome any disruptive perceptions. through the exchange of some product or commodity. In security? If they are deterred, might they turn to a less vulnerable to a wide range of nefarious activities each of The IMSSE must be able to build on these efforts, adapt this example, the commodity is information needed for understood and defended domain — our maritime which can have cascading and harmful effects far from best practices and work towards a business model that security and profitable commerce. This proposal brings industry and waterways? their sources. Such activities are inconsistent with U.S. satisfies both commercial and governmental needs. together members of the IMSSE for the willing exchange of national security interests and the broader objectives of Specifically, the IMSSE will need to: The Detroit incident highlighted two key points: first, the peace, prosperity, stability and security. Global maritime maritime information in support of their own safety, security advantage of integrated, shared and properly analyzed • Align Incentives and Expectations: To attract and security as it exists today lacks structure, governance, and commercial needs. The IMSSE should take on a information with sophisticated automated rule sets to alert retain participants, the IMSSE needs to align the resources, common information exchange protocols revolving door approach that allows members to consume authorities of anomalies; and, second, the consequences incentives of the exchange to participants’ self interests. and standardized rule sets. As in aviation security, and/or provide maritime information. Structured in this way, of having the information available, but not properly shared Governments will expect the information to be the vital proactive maritime security professionals must be able to an IMSSE will permit consumers and providers to realize and vetted. This issue brief addresses how sensor informa- link for actionable and preventive assurances to confi- detect an anomaly – then deliberately intervene. the symbiotic relationship on which long-term global tion and other data might be collected, shared, analyzed maritime commerce and security depends, in spite of dently ensure ships and cargo on inland
Recommended publications
  • Mateen in Orlando That Killed 49 Reminds Us That Despite All These FBI Investigations, Sometimes America’S Homegrown Terrorists Will Still Slip Through the Net
    The Future of Counterterrorism: Addressing the Evolving Threat to Domestic Security. House Committee on Homeland Security Committee, Counterterrorism and Intelligence Subcommittee February 28, 2017 Peter Bergen , Vice President, Director of International Security and Fellows Programs, New America; Professor of Practice, Arizona State University; CNN National Security Analyst. This testimony is organized into 8 sections 1. What is the terrorism threat to the U.S.? 2. What is the terrorism threat posed by citizens of proposed travel-ban countries? 3. An examination of attacks in the U.S. that are inspired or enabled by ISIS. 4. An assessment of who ISIS’ American recruits are and why they sign up; 5. An assessment of how ISIS is doing; 6. An examination of what the big drivers of jihadist terrorism are; 7. A discussion of some future trends in terrorism; 8. Finally, what can be done to reduce the threat from jihadist terrorists? 1. What is the terrorism threat to the United States? The ISIS attacks in Brussels last year and in Paris in 2015 underlined the threat posed by returning Western “foreign fighters” from the conflicts in Syria and Iraq who have been trained by ISIS or other jihadist groups there. Six of the attackers in Paris were European nationals who had trained with ISIS in Syria. Yet in the United States, the threat from returning foreign fighters is quite limited. According to FBI Director James Comey, 250 Americans have gone or attempted to go to Syria. This figure is far fewer than the estimated 6,900 who have traveled to Syria from Western nations as a whole — the vast majority from Europe.
    [Show full text]
  • U.S. Customs and Border Protection * Volume 4, Issue 3
    U.S. Customs and Border Protection H Volume 4, Issue 3 SPECIAL 9 / 11 EDITION In Memoriam H H H In honor of CBP employees who have died in the line of duty 2011 Hector R. Clark Eduardo Rojas Jr. 2010 Charles F. Collins II Michael V. Gallagher Brian A. Terry Mark F. Van Doren John R. Zykas 2009 Nathaniel A. Afolayan Cruz C. McGuire Trena R. McLaughlin Robert W. Rosas Jr. 2008 Luis A. Aguilar Jarod Dittman 2007 Julio E. Baray Eric Cabral Richard Goldstein Ramon Nevarez Jr. Robert Smith Clinton B. Thrasher David J. Tourscher 2006 Nicholas D. Greenig David N. Webb 2004 Travis Attaway George DeBates Jeremy Wilson 2003 James P. Epling H H H For a historic listing honoring federal personnel who gave their lives while securing U.S. borders, please visit CBP.gov Vol 4, Issue 3 CONTENTS H FEATURES VOL 4, ISSUE 3 4 A Day Like No Other SEPTEMBER 11, 2011 In the difficult hours and days after the SECRETARY OF HOMELAND SECURITY Sept. 11 attacks, confusion and fear Janet Napolitano turned to commitment and resolve as COMMISSIONER, the agencies that eventually would form 4 U.S. CUSTOMS AND BORDER PROTECTION CBP responded to protect America. Alan D. Bersin ASSISTANT COMMISSIONER, 16 Collective Memory OFFICE OF PUBLIC AFFAIRS Melanie Roe CBP employees look back on the day that united an agency… and a nation. EDITOR Laurel Smith 16 CONTRIBUTING EDITORS 41 Attacks Redefine Eric Blum Border Security Susan Holliday Marcy Mason CBP responds to challenge by coming Jay Mayfield together to build layers of security Jason McCammack extending around the globe, upgrading its ability to keep dangerous people PRODUCTION MANAGER Tracie Parker and things out of the homeland.
    [Show full text]
  • Hostile Intent and Counter-Terrorism Human Factors Theory and Application
    Hostile Intent and Counter-Terrorism Human Factors Theory and Application Edited by ALEX STEDMON Coventry University, UK GLYN LAWSON The University of Nottingham, UK ASHGATE ©Alex Stedmon, Glyn Lawson and contributors 2015 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior permission of the publisher. Alex Stedmon and Glyn Lawson have asserted their rights under the Copyright, Designs and Patents Act, 1988, to be identified as the editors of this work. Published by Ashgate Publishing Limited Ashgate Publishing Company Wey Court East 110 Cherry Street Union Road Suite 3-1 Famham Burlington, VT 05401-3818 Surrey, GU9 7PT USA England www.ashgate.com British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library. The Library of Congress has cataloged the printed edition as follows: The Library of Congress Cataloging-in-Publication Data has been applied for. ISBN: 9781409445210 (hbk) ISBN: 9781409445227 (ebk-PDF) ISBN: 9781472402103 (ebk-ePUB) MIX Paper from FSC rasponalbla tourcea Printed in the United Kingdom by Henry Ling Limited, wwvii.te«ro FSC* C013985 at the Dorset Press, Dorchester, DTI IHD Chapter 12 Competitive Adaptation in Militant Networks: Preliminary Findings from an Islamist Case Study Michael Kenney Graduate School o f Public and International Affairs, University o f Pittsburgh, USA John Horgan International Center for the Study o f Terrorism, Pennsylvania State University, USA Cale Home Covenant College, Lookout Mountain, USA Peter Vining International Center for the Study o f Terrorism, Pennsylvania State University, USA Kathleen M.
    [Show full text]
  • AMERICA's CHALLENGE: Domestic Security, Civil Liberties, and National Unity After September 11
    t I l AlLY r .... )k.fl ~FS A Ot:l ) lO~Ol R.. Muzaffar A. Chishti Doris Meissner Demetrios G. Papademetriou Jay Peterzell Michael J. Wishnie Stephen W. Yale-Loehr • M I GRAT i o~]~In AMERICA'S CHALLENGE: Domestic Security, Civil Liberties, and National Unity after September 11 .. AUTHORS Muzaffar A. Chishti Doris Meissner Demetrios G. Papademetriou Jay Peterzell Michael J. Wishnie Stephen W . Yale-Loehr MPI gratefully acknowledges the assistance of Cleary, Gottlieb, Steen & Hamilton in the preparation of this report. Copyright © 2003 Migration Policy Institute All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means without prior permission in writing from the Migration Policy Institute. Migration Policy Institute Tel: 202-266-1940 1400 16th Street, NW, Suite 300 Fax:202-266-1900 Washington, DC 20036 USA www.migrationpolicy.org Printed in the United States of America Interior design by Creative Media Group at Corporate Press. Text set in Adobe Caslon Regular. "The very qualities that bring immigrants and refugees to this country in the thousands every day, made us vulnerable to the attack of September 11, but those are also the qualities that will make us victorious and unvanquished in the end." U.S. Solicitor General Theodore Olson Speech to the Federalist Society, Nov. 16, 2001. Mr. Olson's wife Barbara was one of the airplane passengers murdered on September 11. America's Challenge: Domestic Security, Civil Liberties, and National Unity After September 1 1 Table of Contents Foreword
    [Show full text]
  • Islamist Extremism in Europe
    Order Code RS22211 Updated January 6, 2006 CRS Report for Congress Received through the CRS Web Islamist Extremism in Europe Kristin Archick (Coordinator), John Rollins, and Steven Woehrel Foreign Affairs, Defense, and Trade Division Summary Although the vast majority of Muslims in Europe are not involved in radical activities, Islamist extremists and vocal fringe communities that advocate terrorism exist and reportedly have provided cover for terrorist cells. Germany and Spain were identified as key logistical and planning bases for the September 11, 2001, attacks on the United States. The March 2004 terrorist bombings in Madrid have been attributed to an Al Qaeda-inspired group of North Africans. And UK authorities are investigating suspected Al Qaeda support to the British perpetrators of the July 7, 2005, terrorist attacks on London. This report provides an overview of Islamist extremism in Europe, possible terrorist links, European responses, and implications for the United States. It will be updated as needed. See also CRS Report RL31612, European Counterterrorist Efforts: Political Will and Diverse Responses in the First Year after September 11, and CRS Report RL33166, Muslims in Europe: Integration in Selected Countries, by Paul Gallis. Background: Europe’s Muslim Communities1 Estimates of the number of Muslims in Europe vary widely, depending on the methodology and definitions used, and the geographical limits imposed. Excluding Turkey and the Balkans, researchers estimate that as many as 15 to 20 million Muslims live on the European continent. Muslims are the largest religious minority in Europe, and Islam is the continent’s fastest growing religion. Substantial Muslim populations exist in Western European countries, including France, Germany, the United Kingdom, Spain, Italy, the Netherlands, and Belgium.
    [Show full text]
  • Download This Article As A
    YOU SAY DEFENDANT, I SAY COMBATANT: OPPORTUNISTIC TREATMENT OF TERRORISM SUSPECTS HELD IN THE UNITED STATES AND THE NEED FOR DUE PROCESSAI JESSELYN A. RADACK* "[S]hould the Government determine that the defendant has engaged in conduct proscribed by the offenses now listed.., the United States may... capture and detain the defendant as an unlawful enemy com- 1 batant." - Plea Agreement of "American Taliban" John Walker Lindh "You are not an enemy combatant-you are a terrorist. You are not a 2 soldier in any way-you are a terrorist." - U.S. District Court Judge William G. Young to "shoe bomber" Richard Reid "[Enemy combatants] are not there because they stole a car or robbed a bank .... They are not common criminals. They're enemy combatants and terrorists who are being detained for acts of war against our coun- 3 try and this is why different rules have to apply." - U.S. Secretary of Defense Donald H. Rumsfeld A EDITOR'S NOTE: After this article was completely written and accepted for publication, the Supreme Court ruled in Hamdi v. Rumsfeld, as author Radack proposed with great foresight, that the Mathews v. Eldridge balancing test provides the appropriate analysis for the type of process that is constitutionally due to a detainee seeking to challenge his or her classification as an "enemy combatant." See Hamdi v. Rumsfeld, 124 S.Ct. 2633 (2004). *A.B., Brown University, 1992; J.D., Yale Law School, 1995. The author is Founder and Execu- tive Director of the Coalition for Civil Rights and Democratic Liberties (http://www.cradl.info).
    [Show full text]
  • The European Angle to the U.S. Terror Threat Robin Simcox | Emily Dyer
    AL-QAEDA IN THE UNITED STATES THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT Robin Simcox | Emily Dyer THE EUROPEAN ANGLE TO THE U.S. TERROR THREAT EXECUTIVE SUMMARY • Nineteen individuals (11% of the overall total) who committed al-Qaeda related offenses (AQROs) in the U.S. between 1997 and 2011 were either European citizens or had previously lived in Europe. • The threat to America from those linked to Europe has remained reasonably constant – with European- linked individuals committing AQROs in ten of the fifteen years studied. • The majority (63%) of the nineteen European-linked individuals were unemployed, including all individuals who committed AQROs between 1998 and 2001, and from 2007 onwards. • 42% of individuals had some level of college education. Half of these individuals committed an AQRO between 1998 and 2001, while the remaining two individuals committed offenses in 2009. • 16% of offenders with European links were converts to Islam. Between 1998 and 2001, and between 2003 and 2009, there were no offenses committed by European-linked converts. • Over two thirds (68%) of European-linked offenders had received terrorist training, primarily in Afghanistan. However, nine of the ten individuals who had received training in Afghanistan committed their AQRO before 2002. Only one individual committed an AQRO afterwards (Oussama Kassir, whose charges were filed in 2006). • Among all trained individuals, 92% committed an AQRO between 1998 and 2006. • 16% of individuals had combat experience. However, there were no European-linked individuals with combat experience who committed an AQRO after 2005. • Active Participants – individuals who committed or were imminently about to commit acts of terrorism, or were formal members of al-Qaeda – committed thirteen AQROs (62%).
    [Show full text]
  • Utbildning I Luftfartsskydd Känd Leverantör – Manus
    Välkommen till utbildning i luftfartsskydd för dig som arbetar hos eller på uppdrag av en Känd leverantör. 1 Innan du börjar utbildningen är det några begrepp som du behöver ha koll på. Luftfartsskydd: det är ju vad hela utbildningen handlar om, och det är alltså olika åtgärder som syftar till att förhindra kriminella och olagliga handlingar riktade mot den civila luftfarten. Vi kommer in mer på begreppet Luftfartsskydd alldeles strax… Förnödenheter är: • Alla föremål som är avsedda - för försäljning eller användning inom ett kontrollerat område på en flygplats eller - att tas ombord på ett flygplan för att användas, konsumeras eller köpas av passagerare eller besättning under flygning. • Förnödenheter ska anses vara förnödenheter för användning ombord eller till flygplatsen från det ögonblick då de kan identifieras som sådana. Känd leverantör • Ett företag, med en godkänd validering, som uppfyller säkerhetsregler för att inte behöva genomgå säkerhetskontroll vid leverans till flygplats, flygbolag eller en säkerhetsgodkänd leverantör. En säkerhetsgodkänd leverantör ska inte förväxlas med en Känd leverantör . En säkerhetsgodkänd leverantör är oftast ett så kallat cateringföretag, som levererar mat/dryck direkt ombord på flygplanet. • Förnödenheter från en känd leverantör får inte lastas direkt ombord på ett flygplan. Vidare i denna utbildning skriver vi ibland varor eller leveranser , och då avses identifierbara förnödenheter som levereras till flygplats, säkerhetsgodkänd leverantör eller flygbolag. 2 Följande delar vill vi att du ska ha kunskap om och förståelse för när du genomgått utbildningen: • Inträffade händelser och hotbilden mot luftfarten • Lagstiftning inom luftfartsskydd • Luftfartsskyddets grunder, mål och organisation • Förbjudna föremål – alltså de föremål vi INTE vill ha ombord på ett flygplan! • Kunskap om krav på säkerhetsåtgärder • Krav på transport • Rapportering och agerande vid incidenter 3 11 september 2001, USA Världens mest uppmärksammade terroristdåd.
    [Show full text]
  • Digest of Terrorist Cases
    back to navigation page Vienna International Centre, PO Box 500, 1400 Vienna, Austria Tel.: (+43-1) 26060-0, Fax: (+43-1) 26060-5866, www.unodc.org Digest of Terrorist Cases United Nations publication Printed in Austria *0986635*V.09-86635—March 2010—500 UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Digest of Terrorist Cases UNITED NATIONS New York, 2010 This publication is dedicated to victims of terrorist acts worldwide © United Nations Office on Drugs and Crime, January 2010. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. This publication has not been formally edited. Publishing production: UNOV/DM/CMS/EPLS/Electronic Publishing Unit. “Terrorists may exploit vulnerabilities and grievances to breed extremism at the local level, but they can quickly connect with others at the international level. Similarly, the struggle against terrorism requires us to share experiences and best practices at the global level.” “The UN system has a vital contribution to make in all the relevant areas— from promoting the rule of law and effective criminal justice systems to ensuring countries have the means to counter the financing of terrorism; from strengthening capacity to prevent nuclear, biological, chemical, or radiological materials from falling into the
    [Show full text]
  • Building a 21St-Century Infrastructure for America: Air Transportation in the United States in the 21St Century
    BUILDING A 21ST-CENTURY INFRASTRUCTURE FOR AMERICA: AIR TRANSPORTATION IN THE UNITED STATES IN THE 21ST CENTURY (115–4) HEARING BEFORE THE SUBCOMMITTEE ON AVIATION OF THE COMMITTEE ON TRANSPORTATION AND INFRASTRUCTURE HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS FIRST SESSION MARCH 8, 2017 Printed for the use of the Committee on Transportation and Infrastructure ( Available online at: http://www.gpo.gov/fdsys/browse/ committee.action?chamber=house&committee=transportation U.S. GOVERNMENT PUBLISHING OFFICE 24–655 PDF WASHINGTON : 2017 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Aug 31 2005 14:00 May 19, 2017 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 P:\HEARINGS\115\AV\3-8-20~1\24655.TXT JEAN COMMITTEE ON TRANSPORTATION AND INFRASTRUCTURE BILL SHUSTER, Pennsylvania, Chairman DON YOUNG, Alaska PETER A. DEFAZIO, Oregon JOHN J. DUNCAN, JR., Tennessee, ELEANOR HOLMES NORTON, District of Vice Chair Columbia FRANK A. LOBIONDO, New Jersey JERROLD NADLER, New York SAM GRAVES, Missouri EDDIE BERNICE JOHNSON, Texas DUNCAN HUNTER, California ELIJAH E. CUMMINGS, Maryland ERIC A. ‘‘RICK’’ CRAWFORD, Arkansas RICK LARSEN, Washington LOU BARLETTA, Pennsylvania MICHAEL E. CAPUANO, Massachusetts BLAKE FARENTHOLD, Texas GRACE F. NAPOLITANO, California BOB GIBBS, Ohio DANIEL LIPINSKI, Illinois DANIEL WEBSTER, Florida STEVE COHEN, Tennessee JEFF DENHAM, California ALBIO SIRES, New Jersey THOMAS MASSIE, Kentucky JOHN GARAMENDI, California MARK MEADOWS, North Carolina HENRY C. ‘‘HANK’’ JOHNSON, JR., Georgia SCOTT PERRY, Pennsylvania ANDRE´ CARSON, Indiana RODNEY DAVIS, Illinois RICHARD M.
    [Show full text]
  • The “Shoe Bomber” Richard Reid - His Radicalization Explained Avraham Jager, (Research Assistant, ICT)
    The “Shoe Bomber” Richard Reid - His Radicalization Explained Avraham Jager, (Research Assistant, ICT) February, 2018 On December 22, 2001 Richard Colvin Reid boarded an American Airlines flight from Paris to Miami with the intention to bomb the flight. As luck would have it, he encountered technical issues and was unable to carry out the attack. Richard's attempt to execute this large scale terror attack was the outcome of a long radicalization process. This process can be divided into four main phases using the NYPD model of radicalization: Pre- radicalization, Self-Identification, Indoctrination, and Jihadization. The study of Richard Reid's case through the lens of the NYPD Model of Radicalization sheds light on the roots of his indoctrination, and how it led to the potentially catastrophic event he was planning. His radicalization process started as a non-radical religious journey and took a sharp, dangerous turn as a result of various social, sociological and psychological factors, combined with the influence of charismatic leaders, an effective mobilizing mechanism, and group radicalization. **The views expressed in this publication are solely those of the author(s) and do not necessarily reflect the views of the International Institute for Counter-Terrorism (ICT). 2 Table of Contents Background 5 Introduction 5 NYPD Model of Radicalization 6 First Stage: Pre-Radicalization 7 Second Stage: Self-Identification 9 Third Stage: Indoctrination 10 Fourth Stage: Jihadization 12 Conclusion 13 Bibliography 14 3 Background Richard Colvin Reid is a convicted terrorist who tried to bomb an American Airlines flight from Paris to Miami on December 22, 2001. Richard was born in 1973 to a working class family in Bromley, Britain.
    [Show full text]
  • For Caliph and Country Exploring How British Jihadis Join a Global Movement
    For Caliph and Country Exploring how British jihadis join a global movement RACHEL BRYSON 1 2 Contents Executive Summary 5 Policy Recommendations 9 Findings British Jihadis in a Global Network 13 Trends Among British Jihadis 23 Appendix Methodology 34 Note Research for this report was conducted in November and December 2016 and then subsequently analysed. 3 4 1.0 Executive Summary This report explores what connects jihadis from across the UK and how they made their journey into jihadism. For more than 30 years, British jihadis have been fighting under the banner of an extreme Islamist ideology in conflicts from Algeria to the Philippines. For half of that time, the streets of the UK have been seen as a legitimate target, as witnessed most recently in both London and Manchester. Ideologues made their home in Britain, having been rejected from Muslim-majority countries because the ideas they expounded were considered dangerous. From the UK, they influenced many. In the last five years, the conflict in Syria alone has attracted over 800 British fighters.1 1 “Who are Britain’s Jihadists?”, BBC News, 10 October 2016. www. bbc.co.uk/news/uk-32026985. 55 Their ideology justifies the use of violent jihad to Our sample was diverse – from the very wealthy achieve its aims. Its proponents believe in imposing to the very poor; those raised in Muslim households to their interpretation of Islam on others as state law, with converts; ‘straight-laced,’ straight-A students, to drug no tolerance for alternatives. They believe in brutally dealers – but there were some significant trends that punishing apostates and subjugating women.
    [Show full text]