A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm A NEW VIRTUAL BATTLEFIELD Regional Cooperation Council Secretariat Trg Bosne i Hercegovine 1/V How to prevent online radicalisation 71000 Sarajevo, Bosnia and Herzegovina in the cyber security realm of the T +387 33 561 700 F +387 33 561 701 E [email protected] Western Balkans rcc.int RegionalCooperationCouncil rccint RCCSec RegionalCooperationCouncil Financed by the European Union 1 A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm Good. Better. Regional. A NEW VIRTUAL BATTLEFIELD Title: A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm of the Western Balkans - How to prevent online Publisher: Regional Cooperation Council Trg Bosne i Hercegovine 1/V, 71000 Sarajevo Bosnia and Herzegovina Tel: +387 33 561 700; Fax: +387 33 561 701 radicalisation in the cyber E-mail: [email protected] Website: www.rcc.int Authors: Prof. Maura Conway security realm Sheelagh Brady Editor: Amer Kapetanovic, RCC Consulting editor: Zoran Popov, RCC Design & Layout: Šejla Dizdarević ISBN: 978-9926-402-11-2 December 2018 ©RCC2018 All rights reserved. The responsibility for the content, the views, interpretations and conditions expressed herein rests solely with the authors and can in no way be taken to reflect the views Sarajevo, December 2018. of the RCC or of its participants, partners, donors or of the European Union. 2 3 A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm Chapter 2 - Online Radicalization in the Western Balkans .................................................... 63 TABLE OF CONTENTS Executive Summary ...........................................................................................64 Findings and Recommendations ....................................................................64 Recommendations ....................................................................................65 Chapter 1 - Cyber Security in the Western Balkans .............................................................. 6 National-level recommendations ..........................................................65 Executive Summary ............................................................................................ 7 Regional-level recommendations .........................................................65 Findings and Recommendations ..................................................................... 7 Organisations Interviewed ...................................................................................67 Recommendations ..................................................................................... 8 List of Abbreviations ..........................................................................................68 National-level recommendations ........................................................... 8 1. Introduction .................................................................................................70 Regional-level recommendations .......................................................... 8 1.1 Objectives of the overall study and objective of this report .............................70 Organisations Interviewed ...................................................................................10 1.2 Information Operations .........................................................................71 List of Abbreviations ..........................................................................................11 1.3 Online extremism and radicalisation .........................................................72 1. Introduction .................................................................................................13 1.4 Methodology ......................................................................................73 1.1 Objective of the study ..........................................................................14 2. Prevalence of Online Extremism and Radicalisation in the WB6 .................................74 1.2 Cyber Security ....................................................................................17 2.1. Kosovo* ............................................................................................75 1.3 Information Operations .........................................................................19 2.2. Bosnia and Herzegovina ........................................................................76 1.4 Methodology ......................................................................................20 2.3. Albania ............................................................................................78 2. European Environment .................................................................................. 23 2.4. The Former Yugoslav Republic of Macedonia ...............................................79 2.1 Cyber Security Strategy of the European Union ........................................... 23 2.5. Serbia .............................................................................................79 2.2 EU Legislation .....................................................................................25 2.6. Montenegro ......................................................................................80 2.3 The Budapest Convention on Cybercrime ....................................................26 2.7. Summing-up ......................................................................................81 2.4 The Digital Agenda for Europe (DAE) .........................................................27 3. European and International Environments ...........................................................82 2.5 The European Union Agency for Network and Information Security .....................28 3.1. European policy documents and strategies .................................................82 2.6 Additional Programmes and Activities ........................................................29 3.2. EU Legislation ....................................................................................90 2.7 Funding ............................................................................................30 3.3. EU agencies and networks .....................................................................92 3. Cyber Security in the Western Balkans ................................................................32 3.4. Additional programmes and activities .......................................................93 3.1 Legislation, strategies, and policies ...........................................................32 3.5. Funding ...........................................................................................98 3.2 Regional Development Agenda .................................................................34 4. Online Radicalisation and Extremism in the Western Balkans ....................................99 3.3 Challenges to operational implementation ..................................................36 4.1. Legislation, strategies, and policies .........................................................99 4. Mini Economy Case Studies ..............................................................................42 4.2. Regional Activities ............................................................................ 103 4.1 Albania .............................................................................................42 4.3 Challenges to operational implementation ................................................ 106 4.2 Bosnia and Herzegovina .........................................................................44 5. Findings and Recommendations ...................................................................... 111 4.3 Kosovo* .............................................................................................47 Recommendations .................................................................................. 112 4.4 Montenegro .......................................................................................49 5.1 National-level recommendations ............................................................ 112 4.5 Serbia ..............................................................................................52 5.2 Regional-level recommendations ............................................................ 113 4.6 The Former Yugoslav Republic of Macedonia ................................................55 5. Findings and Recommendations ........................................................................58 5.1 National-level recommendations ..............................................................58 5.2 Regional-level recommendations ..............................................................60 * This designation throughout this document is without prejudice to positions on status, and is in line with UNSCR 1244/1999 and the ICJ Opinion on the Kosovo declaration of independence 4 5 A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm Chapter 1 CYBER SECURITY IN THE WESTERN BALKANS 7 A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm in respect of staffing, technology, and training, proach to cyber security given their broad range which is negatively impacting investigations and of perspectives, experience, and vision. EXECUTIVE SUMMARY procedure; (iv) the lack of significant public-private Identify and develop Public-Private
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages59 Page
-
File Size-