Foreign Terrorist Fighters

Total Page:16

File Type:pdf, Size:1020Kb

Foreign Terrorist Fighters Investigation, Prosecution and Adjudication of Foreign Terrorist Fighter Cases for South and South-East Asia Cover image: istockphoto.com/Lorado UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Investigation, Prosecution and Adjudication of Foreign Terrorist Fighter Cases for South and South-East Asia UNITED NATIONS Vienna, 2018 © United Nations, June 2018. All rights reserved. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. This publication has not been formally edited. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Contents Introduction .......................................................................................................................v Chapter 1. Overview of foreign terrorist fighter topics .......................................................................... 1 1.1 The foreign terrorist fighter phenomenon ......................................................1 1.2 Evolution ....................................................................................2 1.3 Global situation ...............................................................................5 1.4 Regional situation ...........................................................................11 1.5 Typology and motivation .....................................................................19 1.6 Women and children ........................................................................23 1.7 Criminal justice and administrative options ...................................................28 1.8 Prosecution of foreign terrorist fighters ........................................................32 Chapter 2. Global framework .............................................................................................................43 2.1 Introduction .................................................................................43 2.2 International legal framework on terrorism. .44 2.3 Criminal justice response to foreign terrorist fighters ...........................................45 2.4 Regional cooperation frameworks ............................................................51 2.5 International legal framework and civil society .................................................55 Chapter 3. Investigations and foreign terrorist fighters .......................................................................57 3.1 Introduction .................................................................................57 3.2 Securing digital evidence .....................................................................57 3.3 Digital evidence at a crime scene ..............................................................64 3.4 Online evidence and intelligence ..............................................................70 Chapter 4. Preventing and countering violent extremism ....................................................................81 4.1 Introduction .................................................................................81 4.2 Strategies to counter violent extremism leading to terrorism .....................................82 4.3 Detained and convicted foreign terrorist fighters ...............................................87 4.4 Civil society .................................................................................88 4.5 Involvement of society and communities ......................................................92 Chapter 5. Adult learning and training methodology ..........................................................................97 5.1 Chapter objectives ...........................................................................97 5.2 Introduction to the training methodology chapter ..............................................97 5.3 Comparing adult learning and student learning .................................................98 5.4 Identification of needs ..................................................................... 100 5.5 Learning objectives ........................................................................ 101 5.6 Learning cycle ............................................................................. 103 5.7 Course plan ............................................................................... 106 5.8 Logistical arrangements .................................................................... 107 5.9 Course opening ........................................................................... 109 5.10 Exercises .................................................................................. 109 5.11 Visual aids ................................................................................ 110 5.12 The facilitator ............................................................................. 113 5.13 Public speaking techniques ................................................................. 114 5.14 Conclusion: key numbers ................................................................... 116 iii Introduction Foreign terrorist fighters (FTFs) have, over the past few years, constituted one of the major threats to international peace and security. On 24 September 2014, the United Nations Security Council adopted resolution 2178 as a response to the increasing threat posed by FTFs, requiring Member States to implement criminal justice measures to effectively prevent, deter and criminalize the travel of FTFs and their related activities. While the resolution primarily targets individuals travelling to Iraq and the Syrian Arab Republic to join entities such as ISIL (Da’esh),1 the Al-Nusrah Front and certain other cells or derivatives of Al-Qaida, the definition of FTFs is cast widely to include all “individuals who travel to a State other than their States of residence or nationality for the purpose of the perpetration, planning, or preparation of, or participation in, terrorist acts or the providing or receiving of terrorist training”. Since the adoption of this resolution, there have been significant changes and developments in the landscape of the FTF phenomenon. As ISIL (Da’esh) loses ground in the Syrian Arab Republic and Iraq, Member States will be concerned as FTFs search for new battlegrounds. This is particularly the case in South and South-East Asia. For South and South-East Asian countries, the phenomenon of FTFs relates not only to a country’s nationals travelling to and from Iraq and the Syrian Arab Republic, but also to those individuals who travel to perpetrate terrorist acts in neighbouring South and South- East Asian countries. This unique situation faced by South and South-East Asian countries has given rise to calls for greater regional and cross-regional cooperation to prevent and counter the threat of FTFs. As such, it is imperative that national authorities review their current national criminal justice frameworks and strategies to prevent and counter the threat of FTFs, including returning and relocating FTFs and their families, in both regions. Responding to the identified needs of Member States in countering the threat of FTFs, the UNODC Terrorism Prevention Branch has published this training manual on the investigation, prosecution and adjudication of FTFs in South and South-East Asia. The training manual is intended to be used as an aide for practical training sessions for law enforcement officials and judicial officers. The training manual focuses on, among other aspects, the international and regional legal frameworks relevant to FTFs, with a focus on digital evidence, including online investigatory tools and techniques. The manual also includes an adult learning methodology. 1 Hereinafter for ease of reference, the text uses “ISIL” to refer to ISIL (Da’esh), ISIS, IS or the Islamic State, and the “caliphate” to refer to its area of control. The authors take no position as to the legal or formal status of any group, territory or jurisdiction. v Chapter 1 Overview of foreign terrorist fighter topics 1.1 The foreign terrorist fighter phenomenon Scope of the term “foreign terrorist fighter” The concept of “foreign fighters” is not new. Over the past 250 years alone, nearly 100 civil wars have included the participation of fighters from abroad.2 The Spanish Civil War (1936-1939) is a prime example, in which around 50,000 volunteers from more than 50 countries participated, representing both sides of the conflict.3 The term “foreign fighter” was first officially used in reference to fighters travelling from outside the conflict zone to fight for Al-Qaida in Afghanistan, and has become more and more commonly used since the terrorist-led insurgency started in Iraq in 2003. In the absence of a legal definition, several academics have presented differing meanings of the term. One of the most widely accepted is that of the Geneva Academy of International Humanitarian Law and Human Rights: “A foreign fighter is an individual who leaves his or her country of origin or habitual residence to join a non-State armed group in an armed conflict abroad and who is primarily motivated by ideology, religion, and/or kinship”.4 Terrorists who travel internationally to commit attacks is not a new concept either, and has become an increasing phenomenon since global travel became easier in the twentieth century. The first notable appearance
Recommended publications
  • TASK FORCE the Donald C
    HENRY M. JACKSON SCHOOL OF INTERNATIONAL STUDIES UNIVERSITY of WASHINGTON TASK FORCE The Donald C. Hellmann Task Force Program Preventing ISIL’S Rebirth Through a Greater Understanding of Radicalization: A Case Study of ISIL Foreign Fighters 2020 Preventing ISIL’s Rebirth Through A Greater Understanding of Radicalization: A Case Study of ISIL Foreign Fighters Evaluator Corinne Graff, Ph.D. Senior Advisor, Conflict Prevention and Fragility United States Institute of Peace (USIP) Faculty Advisor Denis Bašić, Ph.D. ~ Coordinator Orla Casey Editor Audrey Conrad Authors Orla Casey Audrey Conrad Devon Fleming Olympia Hunt Manisha Jha Fenyun Li Hannah Reilly Haley Rogers Aliye Volkan Jaya Wegner Our Task Force would like to express our gratitude towards Professor Denis Bašić, without whom this Task Force would not have been possible. Thank you for your guidance, expertise, and abundance of knowledge. We appreciate you always pushing us further towards a deeper understanding. TABLE OF CONTENTS Executive Summary……………………………………………………………………………….2 The Rise of ISIL and Foreign Fighters…………………………………………………………....3 Section I: Middle Eastern and North African ISIL Recruitment Saudi Arabia…………………………………………………………...………………………….7 Tunisia………………………………………………………………………………………...…13 Morocco………………………………………………………………………………………….15 Libya……………………………………………………………………………………………..17 Egypt……………………………………………………………………………………………..21 Jordan……………………………………………………………………………………………25 Lebanon………………………………………………………………………………………….30 Turkey……………………………………………………………………………………………34 Section II: South
    [Show full text]
  • The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—And Possible Policy Responses Kumar Ramakrishna S
    New England Journal of Public Policy Volume 29 | Issue 1 Article 6 3-20-2017 The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—and Possible Policy Responses Kumar Ramakrishna S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore, [email protected] Follow this and additional works at: http://scholarworks.umb.edu/nejpp Part of the International Relations Commons, Peace and Conflict Studies Commons, Public Policy Commons, and the Terrorism Studies Commons Recommended Citation Ramakrishna, Kumar (2017) "The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—and Possible Policy Responses," New England Journal of Public Policy: Vol. 29 : Iss. 1 , Article 6. Available at: http://scholarworks.umb.edu/nejpp/vol29/iss1/6 This Article is brought to you for free and open access by ScholarWorks at UMass Boston. It has been accepted for inclusion in New England Journal of Public Policy by an authorized editor of ScholarWorks at UMass Boston. For more information, please contact [email protected]. New England Journal of Public Policy The Growth of ISIS Extremism in Southeast Asia: Its Ideological and Cognitive Features—and Possible Policy Responses Kumar Ramakrishna S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore This article examines the radicalization of young Southeast Asians into the violent extremism that characterizes the notorious Islamic State of Iraq and Syria (ISIS). After situating ISIS within its wider and older Al Qaeda Islamist ideological milieu, the article sketches out the historical landscape of violent Islamist extremism in Southeast Asia. There it focuses on the Al Qaeda-affiliated, Indonesian-based but transnational Jemaah Islamiyah (JI) network, revealing how the emergence of ISIS has impacted JI’s evolutionary trajectory.
    [Show full text]
  • Rebooting U.S. Security Cooperation in Iraq
    Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS POLICY FOCUS 137 Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY www.washingtoninstitute.org The opinions expressed in this Policy Focus are those of the author and not necessarily those of The Washington Institute, its Board of Trustees, or its Board of Advisors. All rights reserved. Printed in the United States of America. No part of this publica- tion may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2015 by The Washington Institute for Near East Policy The Washington Institute for Near East Policy 1828 L Street NW, Suite 1050 Washington, DC 20036 Design: 1000colors Photo: A Kurdish fighter keeps guard while overlooking positions of Islamic State mili- tants near Mosul, northern Iraq, August 2014. (REUTERS/Youssef Boudlal) CONTENTS Acknowledgments | v Acronyms | vi Executive Summary | viii 1 Introduction | 1 2 Federal Government Security Forces in Iraq | 6 3 Security Forces in Iraqi Kurdistan | 26 4 Optimizing U.S. Security Cooperation in Iraq | 39 5 Issues and Options for U.S. Policymakers | 48 About the Author | 74 TABLES 1 Effective Combat Manpower of Iraq Security Forces | 8 2 Assessment of ISF and Kurdish Forces as Security Cooperation Partners | 43 FIGURES 1 ISF Brigade Order of Battle, January 2015 | 10 2 Kurdish Brigade Order of Battle, January 2015 | 28 ACKNOWLEDGMENTS My thanks to a range of colleagues for their encouragement and assistance in the writing of this study.
    [Show full text]
  • Personal Data Protection
    Factsheet – Personal data protection May 2021 This factsheet does not bind the Court and is not exhaustive Personal data protection “The mere storing of data relating to the private life of an individual amounts to an interference within the meaning of Article 8 [of the European Convention on Human Rights, which guarantees the right to respect for private and family life, home and correspondence1] ... The subsequent use of the stored information has no bearing on that finding ... However, in determining whether the personal information retained by the authorities involves any ... private-life [aspect] ..., the Court will have due regard to the specific context in which the information at issue has been recorded and retained, the nature of the records, the way in which these records are used and processed and the results that may be obtained ...” (S. and Marper v. the United Kingdom, judgment (Grand Chamber) of 4 December 2008, § 67) Collection of personal data DNA information and fingerprints See below, under “Storage and use of personal data”, “In the context of police and criminal justice”. GPS data Uzun v. Germany 2 September 2010 The applicant, suspected of involvement in bomb attacks by a left-wing extremist movement, complained in particular that his surveillance via GPS and the use of the data obtained thereby in the criminal proceedings against him had violated his right to respect for private life. The Court held that there had been no violation of Article 8 of the Convention. The GPS surveillance and the processing and use of the data thereby obtained had admittedly interfered with the applicant’s right to respect for his private life.
    [Show full text]
  • Boko Haram Beyond the Headlines: Analyses of Africa’S Enduring Insurgency
    Boko Haram Beyond the Headlines: Analyses of Africa’s Enduring Insurgency Editor: Jacob Zenn Boko Haram Beyond the Headlines: Analyses of Africa’s Enduring Insurgency Jacob Zenn (Editor) Abdulbasit Kassim Elizabeth Pearson Atta Barkindo Idayat Hassan Zacharias Pieri Omar Mahmoud Combating Terrorism Center at West Point United States Military Academy www.ctc.usma.edu The views expressed in this report are the authors’ and do not necessarily reflect those of the Combating Terrorism Center, United States Military Academy, Department of Defense, or U.S. Government. May 2018 Cover Photo: A group of Boko Haram fighters line up in this still taken from a propaganda video dated March 31, 2016. COMBATING TERRORISM CENTER ACKNOWLEDGMENTS Director The editor thanks colleagues at the Combating Terrorism Center at West Point (CTC), all of whom supported this endeavor by proposing the idea to carry out a LTC Bryan Price, Ph.D. report on Boko Haram and working with the editor and contributors to see the Deputy Director project to its rightful end. In this regard, I thank especially Brian Dodwell, Dan- iel Milton, Jason Warner, Kristina Hummel, and Larisa Baste, who all directly Brian Dodwell collaborated on the report. I also thank the two peer reviewers, Brandon Kend- hammer and Matthew Page, for their input and valuable feedback without which Research Director we could not have completed this project up to such a high standard. There were Dr. Daniel Milton numerous other leaders and experts at the CTC who assisted with this project behind-the-scenes, and I thank them, too. Distinguished Chair Most importantly, we would like to dedicate this volume to all those whose lives LTG (Ret) Dell Dailey have been afected by conflict and to those who have devoted their lives to seeking Class of 1987 Senior Fellow peace and justice.
    [Show full text]
  • The Making and Unmaking of Syria Strategy Under Trump
    REPORT SYRIA The Making and Unmaking of Syria Strategy under Trump NOVEMBER 29, 2018 — ARON LUND PAGE 1 The most effective way to change the world these days seems to be to plant a message directly in the brain of its most powerful inhabitant: Donald J. Trump, president of the United States of America. Although the U.S. executive branch always had a fairly free hand in foreign policy, ideas would normally need to snake their way through a whole series of interagency deliberations before landing on the Oval Office desk for a final verdict. But as media leaks and disgruntled former members of the Trump administration have made abundantly clear, decision- making in the current White House is both more temperamental and more personalized, revolving around a president known for forming strong opinions based on ideas picked up from television, friends, and other outside sources. Advocates inside and outside the U.S. government increasingly seem to operate under the assumption that the best way to influence American policy is to sidestep the bureaucracy and speak directly to an audience of one: Donald Trump. And, last September, that’s exactly what two pro-opposition Syrian-Americans managed to do after paying a Republican lobbyist to get seats at an Indiana fundraising dinner.1 President Trump later told the story: I was at a meeting with a lot of supporters, and a woman stood up and she said, “There’s a province in Syria with 3 million people. Right now, the Iranians, the Russians, and the Syrians are surrounding their province.
    [Show full text]
  • The Islamic Caliphate's Influence in Southeast Asia Rohan Gunaratna
    9th Berlin Conference on Asian Security (BCAS) International Dimensions of National (In)Security Concepts, Challenges and Ways Forward Berlin, June 14-16, 2015 A conference jointly organized by Stiftung Wissenschaft und Politik (SWP), Berlin and Konrad-Adenauer -Stiftung (KAS), Berlin Discussion Paper Do Not Cite or Quote without Author’s Permission Session IV: Islamic State and Asia Rohan Gunaratna S. Rajaratnam School of International Studies Singapore The Islamic Caliphate's influence in Southeast Asia Rohan Gunaratna Introduction June 29, 2015 marks the first anniversary of the Islamic Caliphate (IS). As it seeks to expand its core area of Iraq and Syria, enlists support groups and individuals, and create provinces worldwide, the rise of IS presents a global threat. Despite military, diplomatic, political, economic, and other efforts by the International Community to target IS, the group has expanded operationally in theatre and its influence worldwide. As IS eclipse al Qaeda as the dominant global threat, the world faces a hybrid threat from two networks of terrorists and extremists: Al Qaeda and IS. In Asia too, both these networks present a formidable challenge. In Southeast Asia, governments are still coming to terms with IS and its affiliated groups in the region. The Context The AQ-centric global threat landscape is eclipsed by an IS-AQ hybrid threat. The threat groups worldwide have either pledged allegiance to IS leader Abu Bakr al Baghdadi or expressed support to IS. Both in the physical and virtual space, IS footprint is expanding. With Asian foreign fighters traveling to Syria and Iraq, IS presents a growing threat to the stability and security of Asia.
    [Show full text]
  • Volume X, Issue 2 April 2016 PERSPECTIVES on TERRORISM Volume 10, Issue 2
    ISSN 2334-3745 Volume X, Issue 2 April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Table of Contents Welcome from the Editor 1 I. Articles ‘Gonna Get Myself Connected’: The Role of Facilitation in Foreign Fighter Mobilizations 2 by Timothy Holman II. Special Correspondence to Perspectives on Terrorism Why Has The Islamic State Changed its Strategy and Mounted the Paris-Brussels Attacks? 24 by David C. Rapoport III. Research Notes Analysing the Processes of Lone-Actor Terrorism: Research Findings 33 by Clare Ellis, Raffaello Pantucci, Jeanine de Roy van Zuijdewijn, Edwin Bakker, Melanie Smith, Benoît Gomis and Simon Palombi Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations 42 by Jeanine de Roy van Zuijdewijn and Edwin Bakker Evaluating CVE: Understanding the Recent Changes to the United Kingdom’s Implementation of Prevent 50 by Caitlin Mastroe In Conversation with Mubin Shaikh: From Salafi Jihadist to Undercover Agent inside the “Toronto 18” Terrorist Group 61 Interview by Stefano Bonino IV. Resources Bibliography: Terrorism Research Literature (Part 2) 73 Compiled and selected by Judith Tinnes V. Book Reviews Counterterrorism Bookshelf: 30 Books on Terrorism & Counter-Terrorism-Related Subjects 103 Reviewed by Joshua Sinai ISSN 2334-3745 i April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 VI. Notes from the Editor Op-Ed: Competing Perspectives on Countering ISIS 118 by Hashim Al-Ribaki Conference Announcement and Call for Proposals 120 About Perspectives on Terrorism 122 ISSN 2334-3745 ii April 2016 PERSPECTIVES ON TERRORISM Volume 10, Issue 2 Welcome from the Editor Dear Reader, We are pleased to announce the release of Volume X, Issue 2 (April 2016) of Perspectives on Terrorism at www.terrorismanalysts.com.
    [Show full text]
  • Global Reader Volume 2 | 2018
    ROHATYN CENTER for GLOBAL AFFAIRS GLOBAL READER Student Academic Journal|Spring 2018|Volume 2 1 CONTENTS 01 Foreword from the Rohatyn Student Advisory Board 02 On the Edge of Hope: Internally Displaced Peoples and Urban Humanitarianism Esteban Arenas-Pino, Class of 2018 09 Understanding Sino-Indian Relations: Can China and India Rise Peacefully? Naing Phyo, Class of 2018 17 Women’s Rights In The Early Days Of Khomeini Talia Ruxin, Class of 2020 25 Language and Power: Diglossia and the Disempowerment of Guaraní Speakers in Paraguay Leah Metzger, Class of 2020 31 Colonized, Exploited, and Excluded: Western European Paths to Radicalization and Terrorism in Ethnonationalist and Jihadist Perspective Meredith Tulloch, Class of 2018 43 Electronic Waste: Transboundary Movement and Producer Responsibility Amelia Pollard, Class of 2020.5 52 Understanding the Local and International of Terrorism in Sub-Saharan Africa Sarah Corsico, Class of 2018 ROHATYN CENTER for GLOBAL AFFAIRS: GLOBAL READER Student Academic Journal|Spring 2018|Volume 2 Student Editors Laura Dillon '19 Sabina Latifovic ‘18 Isabella Mauceri '20.5 Marykate Melanson '18 Vignesh Ramachandran '18 Julian Schlemmer '20 Maya Woser '18 Editor & Designer Karlo Škarica '17 Program and Outreach Fellow Rohatyn Center for Global Affairs Foreword After the success of last year’s inaugural edition, the Global Reader is back! This academic journal continues to provide a platform for exceptional student works in the field of global affairs. We are committed to the production and dissemination of knowledge about international and global issues, across languages, borders, and disciplines. Our students produce high-quality work on a daily basis, but the opportunity to share it remains scarce.
    [Show full text]
  • Forensic Study and Analysis of Different Artifacts of Web Browsers in Private Browsing Mode
    || Volume 5 || Issue 6 || June 2020 || ISSN (Online) 2456-0774 INTERNATIONAL JOURNAL OF ADVANCE SCIENTIFIC RESEARCH AND ENGINEERING TRENDS FORENSIC STUDY AND ANALYSIS OF DIFFERENT ARTIFACTS OF WEB BROWSERS IN PRIVATE BROWSING MODE Rinchon Sanghkroo1, Dr. Deepak Raj Rao G.2 and Kumarshankar Raychaudhuri3 M.Sc. (Forensic Science) Final Semester Student, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India 1 Assistant Professor, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India2 Junior Research Fellow, Cyber Forensic Division, LNJN National Institute of Criminology and Forensic Science (MHA), Delhi, India3 [email protected], [email protected], [email protected] ------------------------------------------------------ ***-------------------------------------------------- Abstract: - Web browsers today have become one of the most commonly used applications in digital devices, storing and maintaining huge information on user activities. The privacy mode has been introduced to combat the privacy issues related with browsers. This feature keeps the browsing activities of a user private by not storing or removing the traces of artifacts related to the browsing session on the system. In this study, we test the effectiveness of this claim and to ensure ways in which a forensic investigation may be done in such cases. The private modes of different browsers have been tested in Windows and MAC OS by performing pre-defined browsing activities in each of the browsers in both the operating systems. Moreover, the default locations of normal web browser artifacts are also examined to find whether artifacts of private browsing activities are stored in such locations or not. Keywords: - Private Browsing, Windows, MAC, Safari, Microsoft Edge, Brave Browser ------------------------------------------------------ ***-------------------------------------------------- I INTRODUCTON artifacts related to it on the end device.
    [Show full text]
  • EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet
    EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, and Adrian Perrig, ETH Zurich https://www.usenix.org/conference/usenixsecurity20/presentation/legner This paper is included in the Proceedings of the 29th USENIX Security Symposium. August 12–14, 2020 978-1-939133-17-5 Open access to the Proceedings of the 29th USENIX Security Symposium is sponsored by USENIX. EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, and Adrian Perrig Department of Computer Science, ETH Zurich, Switzerland {markus.legner, tobias.klenze, marc.wyss, sprenger, adrian.perrig}@inf.ethz.ch Abstract as compliance, when data is not allowed to leave a particular An exciting insight of recent networking research has been jurisdiction; privacy leaks, when BGP hijacking attacks are that path-aware networking architectures are able to funda- used to de-anonymize users [43]; or re-routing attacks being mentally solve many of the security issues of today’s Internet, used to obtain fake certificates [10]. Another shortcoming of while increasing overall efficiency and giving control over the current Internet is that there is no way for an end user to path selection to end hosts. In this paper, we consider three verify the actual path a packet took on its way to the recipi- traceroute important issues related to this new networking paradigm: ent. While applications such as enable network First, network operators still need to be able to impose their probing, the obtained information cannot be trusted due to own policies to rule out uneconomical paths and to enforce the lack of authentication [2,4].
    [Show full text]
  • Extremism & Counter-Extremism Overview Radicalization And
    The Philippines: Extremism & Counter-Extremism On January 27, 2019, two bombs detonated during Sunday mass at the Our Lady of Mount Carmel Cathedral on Jolo island in the southern Philippines province of Sulu. The first explosion occurred inside the cathedral, which was followed by a second blast just outside as soldiers rushed to the scene. At least 23 people were killed and more than 100 others were wounded. ISIS claimed responsibility for the attack. In July, Indonesian police revealed the attack was carried out by a married Indonesian couple who attempted to travel to ISIS territory in 2016. The couple was stopped in Turkey and deported back to Indonesia in January 2017. It is the first known suicide bombing carried out by Indonesian deportees. (Sources: CBS News [1], CNN Philippines [2], BBC News [3], Guardian [4], New Yok Times [5]) On June 28, 2019, two suicide attackers bombed a temporary camp of the Philippine army’s counterterrorism unit in Sulu. The attack killed five soldiers and wounded several others. ISIS promptly claimed responsibility attack, though a police official maintained that the attack was locally-planned and carried out by Abu Sayyaf Group (ASG) militants. In July 2019, DNA tests confirmed the identity of one of the attackers as Sulu-born 23-year-old Norman Lasuca, making him the first known Filipino to carry out a suicide bombing. (Sources: Straits Times [6], Associated Press [7]) Overview Both Communist nationalist rebels and Islamic separatist insurgencies have wreaked havoc on the Philippines, especially on the southern island of Mindanao. As a result, several thousands of Filipinos have been murdered in bombings, assassinations, kidnapping attempts, and executions.
    [Show full text]