Appendix A: List of Cases Included in the Analysis
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Activity Report 2016
ACTIVITY REPORT 2016 ACTIVITY REPORT 2016 Review Investigations, Control of Special Intelligence Methods and Recommendations Belgian Standing Intelligence Agencies Review Committee Belgian Standing Intelligence Agencies Review Committee Cambridge – Antwerp – Portland Th e Dutch and French language versions of this report are the offi cial versions. In case of confl ict between the Dutch and French language versions and the English language version, the meaning of the fi rst ones shall prevail. Activity Report 2016. Review Investigations, Control of Special Intelligence Methods and Recommendations Belgian Standing Intelligence Agencies Review Committee Belgian Standing Intelligence Agencies Review Committee Rue de Louvain 48, 1000 Brussels – Belgium + 32 (0)2 286 29 11 [email protected] www.comiteri.be © 2018 Intersentia Cambridge – Antwerp – Portland www.intersentia.com ISBN 978-1-78068-642-4 D/2018/7849/27 NUR 823 All rights reserved. Nothing from this report may be reproduced, stored in an automated database or made public in any way whatsoever without the express prior consent of the publishers, except as expressly required by law. CONTENTS List of abbreviations . vii Introduction . xi ACTIVITY REPORT 2016 Table of contents of the complete Activity Report . 3 Preface . 9 Review investigations . 11 Control of special intelligence methods . 85 Recommendations . 113 APPENDICES Extract of the Act of 18 July 1991 governing Review of the Police and Intelligence Services and the Coordination Unit for Th reat Assessment . 125 Extract of the Act of 30 November 1998 governing the Intelligence and Security Services . 143 v LIST OF ABBREVIATIONS BCC Belgian Criminal Code BCCP Belgian Code of Civil Procedure BICS Belgacom International Carrier Services BOJ Belgian Offi cial Journal CCB Centre for Cybersecurity Belgium (Centrum voor Cybersecurity België – Centre pour la cybersécurité Belgique) CCIRM Collection coordination and intelligence requirements management CHOD Chief of Defence C.O.C. -
Swedish Foreign Fighters in Syria and Iraq
Swedish Foreign Fighters in Syria and Iraq An Analysis of open-source intelligence and statistical data Linus Gustafsson Magnus Ranstorp Swedish Foreign Fighters in Syria and Iraq An analysis of open-source intelligence and statistical data Swedish Foreign Fighters in Syria and Iraq An analysis of open-source intelligence and statistical data Authors: Linus Gustafsson Magnus Ranstorp Swedish Defence University 2017 Swedish Foreign Fighters in Syria and Iraq: An analysis of open-source intelligence and statistical data Linus Gustafsson & Magnus Ranstorp © Swedish Defence University, Linus Gustafsson & Magnus Ranstorp 2017 No reproduction, copy or transmission of this publication may be made without written permission. Swedish material law is applied to this book. The contents of the book has been reviewed and authorized by the Department of Security, Strategy and Leadership. Printed by: Arkitektkopia AB, Bromma 2017 ISBN 978-91-86137-64-9 For information regarding publications published by the Swedish Defence University, call +46 8 553 42 500, or visit our home page www.fhs.se/en/research/internet-bookstore/. Summary Summary The conflict in Syria and Iraq has resulted in an increase in the number of violent Islamist extremists in Sweden, and a significant increase of people from Sweden travelling to join terrorist groups abroad. Since 2012 it is estimated that about 300 people from Sweden have travelled to Syria and Iraq to join terrorist groups such as the Islamic State (IS) and, to a lesser extent, al-Qaeda affiliated groups such as Jabhat al-Nusra. Even though the foreign fighter issue has been on the political agenda for several years and received considerable media attention, very little is known about the Swedish contingent. -
The Path to Terrorism: the Islamic State and Its Recruitment Strategies
University of Connecticut OpenCommons@UConn Honors Scholar Theses Honors Scholar Program Spring 5-1-2018 The aP th to Terrorism: The slI amic State and Its Recruitment Strategies Laura Turner [email protected] Follow this and additional works at: https://opencommons.uconn.edu/srhonors_theses Part of the International Relations Commons, Near and Middle Eastern Studies Commons, and the Terrorism Studies Commons Recommended Citation Turner, Laura, "The aP th to Terrorism: The slI amic State and Its Recruitment Strategies" (2018). Honors Scholar Theses. 585. https://opencommons.uconn.edu/srhonors_theses/585 1 The University of Connecticut The Path to Terrorism: The Islamic State and Its Recruitment Strategies Laura Turner Honors Senior Thesis Advisor: Professor Jeremy Pressman Individualized & Interdisciplinary Studies Program 19 April 2018 2 Introduction 13,488 terrorist attacks occurred around the world in 2016.i 1,468 of these, or 10.9%, were perpetrated by the Islamic State.1 The Islamic State (IS), also known as the Islamic State in Iraq and Syria (ISIS) or the Islamic State in Iraq and the Levant (ISIL), is an extremely violent Islamist terrorist organization that follows Salafism, a strict interpretation of Sunni Islam. The group’s ultimate goal is to establish a worldwide caliphate, or a state governed by Islamic law. ISIS is rooted in Abu Musad al-Zarqawi’s Al Qaeda in Iraq, a militant organization so extreme and violent that even Al Qaeda’s leadership criticized its methods and eventually renounced connections with the group. When Zarqawi was killed by a U.S. airstrike in 2006, Abu Ayyub al Masri became the leader of the group and renamed it the Islamic State in Iraq (ISI). -
APR 2016 Part C.Pdf
Page | 1 CBRNE-TERRORISM NEWSLETTER – April 2016 www.cbrne-terrorism-newsletter.com Page | 2 CBRNE-TERRORISM NEWSLETTER – April 2016 After Brussels, Europe's intelligence woes revealed Source:http://www.cnbc.com/2016/03/22/brussels-attack-why-europe-must-increase-terror- intelligence.html Mar 23 – Europe must improve the regional Rudd's comments are at the crux of a hot- sharing of intelligence to successfully button discourse about the encroachment on combat the rise of homegrown militants, civil liberties should governments ramp up policy experts told CNBC a day after deadly surveillance and detainment tactics in the explosions hit Brussels. global war on terror. Global terrorist organization ISIS claimed Rudd believes it's a necessary cost to bear. responsibility for Tuesday's attacks that killed "This is not a normal set of circumstances, at least 31 people, the latest episode in the we've got to give our men and women in group's campaign of large-scale violence on uniform and in the intelligence services the the international stage. powers necessary to deal with this. This is no Recent offensives in Paris and Jakarta indicate criticism of the Belgian government but a wake- ISIS is increasingly relying on local up call to all of us who wrestle with this fundamentalists, typically trained in ISIS debate." strongholds within the Middle East, to execute Others agree that European officials must suicide bombings and shootings in busy direct more investment to counter-terrorism, metropolitan areas. despite strained finances for most countries in "The key question here is closing the the region. intelligence gap," said Kevin Rudd, former The fact that the perpetrator of December's Prime Minister of Australia and president of the Paris attacks was caught in Belgium four Asia Society Policy Institute. -
In Der Berichterstattung Über Die Anschläge
EINE KONTRASTIVE BEGRIFFSANALYSE DES SPRACHGEBRAUCHS (DEUTSCH UND NIEDERLÄNDISCH) IN DER BERICHTERSTATTUNG ÜBER DIE ANSCHLÄGE VON BRÜSSEL MIXED METHODS STUDIE AUF BASIS EINES SELBST ERSTELLTEN KORPUS VON DEUTSCHEN UND FLÄMISCHEN ZEITUNGS- UND ZEITSCHRIFTARTIKELN Aantal woorden: 16.706 Lisa De Brabant Studentennummer: 01306076 Promotor: Prof. dr. Carola Strobl Masterproef voorgelegd voor het behalen van de graad master in het Vertalen Academiejaar: 2017 – 2018 Verklaring i.v.m. auteursrecht De auteur en de promotor(en) geven de toelating deze studie als geheel voor consultatie beschikbaar te stellen voor persoonlijk gebruik. Elk ander gebruik valt onder de beperkingen van het auteursrecht, in het bijzonder met betrekking tot de verplichting de bron uitdrukkelijk te vermelden bij het aanhalen van gegevens uit deze studie. Het auteursrecht betreffende de gegevens vermeld in deze studie berust bij de promotor(en). Het auteursrecht beperkt zich tot de wijze waarop de auteur de problematiek van het onderwerp heeft benaderd en neergeschreven. De auteur respecteert daarbij het oorspronkelijke auteursrecht van de individueel geciteerde studies en eventueel bijhorende documentatie, zoals tabellen en figuren. DANKESWORT Diese Masterarbeit wäre nicht möglich gewesen ohne die Hilfe einiger wichtiger Personen, denen ich hier meinen Dank aussprechen möchte. In erster Linie möchte ich meiner Betreuerin Prof. dr. Carola Strobl herzlich für die wertvolle Hilfe und die unerschöpfliche Geduld danken, denn ohne sie hätte ich es einfach nicht schaffen können. Als ich über bestimmte Sachen zweifelte oder während des Prozesses auf Schwierigkeiten stieß, konnte ich sie immer einfach um Rat beten und mit einer schnellen Antwort rechnen. Auch die Termine im Laufe des Jahres habe ich als sehr angenehm und motivierend erfahren. -
The Lone Wolf Terrorist: Past Lessons, Future Outlook, and Response Strategies
THE INTER-UNIVERSITY CENTER FOR TERRORISM STUDIES The Lone Wolf Terrorist: Past Lessons, Future Outlook, and Response Strategies Table of Contents Professor Yonah Alexander ............................................................................................. 1 Marion (Spike) Bowman ................................................................................................... 9 Professor Amit Kumar .................................................................................................... 11 Kyle B. Olson ...................................................................................................................... 15 Captain Dave Martin ........................................................................................................ 18 Professor Carol Flynn ...................................................................................................... 22 Lisa Curtis ............................................................................................................................ 25 Dr. Nimrod Raphaeli ........................................................................................................ 29 Professor Dean Alexander ............................................................................................. 32 Disclaimer The authors, editors, and research staff cannot be held responsible for errors or any consequences arising from the use of information contained in this publication. The views expressed do not necessarily reflect those of the institutions associated -
THE ROLE of BELGIAN FIGHTERS in the JIHADIFICATION of the SYRIAN WAR from PLOTTING EARLY in 2011 to the PARIS and BRUSSELS ATTACKS European Foundation for Democracy
THE ROLE OF BELGIAN FIGHTERS IN THE JIHADIFICATION OF THE SYRIAN WAR FROM PLOTTING EARLY IN 2011 TO THE PARIS AND BRUSSELS ATTACKS European Foundation for Democracy The European Foundation for Democracy (EFD) is a policy institute that has been working with civil society, academic, governmental and other stakeholders on the prevention of radicalisation for more than a decade. With offices in Brussels and Berlin, EFD supports initiatives to streng- then resilience of communities in various countries by empowering credible pro-democratic voices to prevent radicalisation from gaining a foothold in our societies. Counter Extremism Project The Counter Extremism Project (CEP) is a not-for-profit, non-partisan, international policy orga- nisation formed to address the threat of extremist ideologies. It does so by uncovering financial support networks, challenging the narrative of extremists and their online recruitment tactics and working with governments and other stakeholders to create effective laws, policies and regulations. CEP has offices in New York and Washington DC. Authors Pieter Van Ostaeyen and Guy Van Vlierden 2017 EXECUTIVE SUMMARY From early on in the Syrian–Iraqi conflict, foreign fighters from Belgium have played an important role. To begin with, there have been many of them: on a per capita basis, more fighters have come from Belgium than from any other Western European country. But beyond this, they have often ended up in the right place at the right time. Many of them joined a key militia in the genesis of the Islamic State (IS), and some were even present when IS was founded. Furthermore, many were under the command of later IS heavyweights, and several contributed to the transformation of IS into an international terrorist group. -
Nightclub Security Strategy in Finland
1 Nightclub Security Strategy in Finland Simittchiev, Robert 2018 2 Laurea University of Applied Sciences Nightclub Security Strategy in Finland Simittchiev Robert Security Management HCA214SN Bachelor's Thesis August 2018 3 Laurea University of Applied Sciences Abstract Degree Programme in Security Management Bachelor Thesis Robert Simittchiev Nightclub Security Strategy in Finland Year 2018 Pages 33 The aim of this thesis was to find out in what kind of position the nightclub safety and security is in Finland currently, and to propose a new business model between the security companies and nightclubs as well to propose a new security procedure in order to increase the safety and security in the nightclubs. This study was based on the bigger nightclubs in Finland that have a capacity of 400 and above. The ratio of nightclubs and bars towards every Finn is very high, thus the subject of improving the safety and security is more important than we may think. The increased drug offences and threat of terrorism should definitely be considered. This topic was picked by author because of his background as a security guard in various nightclubs and his interest in the subject. The results showed that the vision of the nightclub security and safety differed greatly by the interviewed groups. While the clientele thought that the nightclubs are safe, the security staff stated that there are improvements to be made and that there are some major deficiencies. The nightclub manager was looking at the case from a business point of view and didn’t necessarily understand the connection between security and business. -
Belgium: Extremism and Terrorism
Belgium: Extremism and Terrorism On February 5, 2020, it was reported that prosecutors in Belgium are currently seeking to bring eight men to the country’s highest court for their alleged role in carrying out an ISIS-inspired triple suicide bombing in Brussels in March 2016. The ringleader, Oussama Atar, who was allegedly a senior figure in ISIS’s intelligence service, purportedly died in Syria in 2017. One other suspect, Salah Abdeslam, is already in French jail due to his role in the Paris 2015 attack that killed 131 people. The other suspects have been formally charged, but their trials are not due to start until 2021. (Source: The National) On January 30, 2020, the Belgian Court of Cassation confirmed a ruling by the Brussels Court of Appeals that the Kurdish Worker’s Party (PKK) should not be classified as a terrorist organization. Although the Belgian government considers the PKK to be a terrorist organization, the Court of Cassation represents the opinion of the judiciary which is an independent body from the executive branch. The ruling claimed that EU anti- terrorism legislation cannot be applied towards the PKK as it is involved in a non-international armed conflict or civil war and is thus allowed to use legitimate military force. The PKK is an internationally designated terrorist organization that has been in conflict with the Turkish government for decades. Although it is uncertain if the ruling will create diplomatic altercations with Turkey, the Belgian government depends on stable relations with Ankara to track Belgian nationals who joined ISIS in Syria and continue to remain in the region. -
Industrial Chocolate Manufacture and Use
INDUSTRIAL CHOCOLATE MANUFACTURE AND USE Industrial Chocolate Manufacture and Use: Fourth Edition. Edited by Stephen T. Beckett © 2009 Blackwell Publishing Ltd. ISBN: 978-1-405-13949-6 SSBeckett_FM.inddBeckett_FM.indd i 110/1/20080/1/2008 110:00:430:00:43 AAMM INDUSTRIAL CHOCOLATE MANUFACTURE AND USE Fourth Edition Edited by Stephen T. Beckett Formerly Nestlé PTC York, UK SSBeckett_FM.inddBeckett_FM.indd iiiiii 110/1/20080/1/2008 110:00:440:00:44 AAMM This edition fi rst published 2009 Third edition published 1999 Second edition published 1994 by Chapman and Hall First edition published 1988 by Chapman and Hall © 1999, 2009 by Blackwell Publishing Ltd Blackwell Publishing was acquired by John Wiley & Sons in February 2007. Blackwell’s publishing programme has been merged with Wiley’s global Scientifi c, Technical, and Medical business to form Wiley-Blackwell. Registered offi ce John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom Editorial offi ces 9600 Garsington Road, Oxford, OX4 2DQ, United Kingdom 2121 State Avenue, Ames, Iowa 50014-8300, USA For details of our global editorial offi ces, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com/wiley-blackwell. The right of the author to be identifi ed as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. -
What the Terrorist Campaign in France and Belgium Tells Us About the Future of Jihadist Terrorism in Europe MTI Report 12-02 December 2012 December 12-02 MTI Report
MTI Trains, Concert Halls, Airports, and Restaurants—All Soft Targets: Funded by U.S. Department of Services Transit Census California of Water 2012 Transportation What the Terrorist Campaign in France and Belgium Tells Us About the Future of Jihadist Terrorism in Europe MTI ReportMTI 12-02 December 2012 MTI Report WP 12-10 MINETA TRANSPORTATION INSTITUTE MTI FOUNDER Hon. Norman Y. Mineta The Mineta Transportation Institute (MTI) was established by Congress in 1991 as part of the Intermodal Surface Transportation Equity Act (ISTEA) and was reauthorized under the Transportation Equity Act for the 21st century (TEA-21). MTI then successfully MTI BOARD OF TRUSTEES competed to be named a Tier 1 Center in 2002 and 2006 in the Safe, Accountable, Flexible, Efficient Transportation Equity Act: A Legacy for Users (SAFETEA-LU). Most recently, MTI successfully competed in the Surface Transportation Extension Act of 2011 to Founder, Honorable Norman Joseph Boardman (Ex-Officio) Diane Woodend Jones (TE 2016) Richard A. White (Ex-Officio) be named a Tier 1 Transit-Focused University Transportation Center. The Institute is funded by Congress through the United States Mineta (Ex-Officio) Chief Executive Officer Principal and Chair of Board Interim President and CEO Department of Transportation’s Office of the Assistant Secretary for Research and Technology (OST-R), University Transportation Secretary (ret.), US Department of Amtrak Lea+Elliot, Inc. American Public Transportation Transportation Association (APTA) Centers Program, the California Department of Transportation (Caltrans), and by private grants and donations. Vice Chair Anne Canby (TE 2017) Will Kempton (TE 2016) Hill & Knowlton, Inc. Director Executive Director Bud Wright (Ex-Officio) OneRail Coalition California Transportation Executive Director The Institute receives oversight from an internationally respected Board of Trustees whose members represent all major surface Honorary Chair, Honorable Bill Commission American Association of State transportation modes. -
Is It Time to Reform the Counter-Terrorist
‘Is it time to reform the counter-terrorist financing reporting obligations? A critical and comparative assessment of the counter-terrorist financing reporting obligations in the European Union and the United Kingdom’. Dr. Nicholas Ryder, Professor in Financial Crime, Bristol Law School, Faculty of Business and Law, University of the West of England, Bristol 1 Abstract This paper critically considers the effectiveness of the European Union’s (EU) counter-terrorist financing (CTF) strategies. In particular, it concentrates on the use of financial intelligence gathered from the submission of suspicious activity reports (SARs) by reporting entities to Member States Financial Intelligence Units (FIU). The paper identifies a series of weaknesses in the United Kingdom’s (UK) reporting regime: defensive reporting, increased compliance costs and the definition of suspicion. The paper concludes by making a series of recommendations that are aimed at improving the effectiveness of the EU and UK CTF reporting obligations. 2 A. Introduction The European Union is suffering from the second decade of the most intense wave of international terrorism since the 1970s and nation states have been subjected to an increasing number of terrorist attacks. For example, there have been terrorist attacks in France (Toulouse, Montauban, Joué-lès-Tours, Île-de-France, Nice, Saint-Quentin-Fallavier, Oignies, Paris, Saint-Denis, Marseille, Magnanville, Saint-Étienne-du-Rouvray, Orly Airport, Garges-lès-Gonesse, Levallois-Perret, Carcassone and Trèbes), Belgium (Brussels, Zaventem and Charleroi), Germany (Berlin, Hanover, Essen, Würzburg, Ansbach and Hamburg), Sweden (Stockholm), Turkey (Istanbul), the United Kingdom (London and Manchester), Finland (Turku) and Russia (Kizlyar, Saint Petersburg and Moscow). These terrorist attacks have three common themes: evidence of a sophisticated terrorist support network, the use of low capability weapons and cheap acts of terrorism.