Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016

Slides:



Advertisements
Similar presentations
Human Security Act of 2007 Protect life, liberty, and property from acts of terrorism. Condemn terrorism as inimical and dangerous to the national security.
Advertisements

European Commission Justice 26 October 2011 Council Framework Decision 2008/913/JHA on combating certain forms and expressions of racism and xenophobia.
MEDIA LAW Copenhagen University Session 9 Dirk VOORHOOF Ghent University (->contact)
DEVELOPING A CO-ORDINATED STRATEGIC APPROACH TO FIGHTING CYBER CRIME IN A WORLD WITHOUT BORDERS By Henry Osborn Quarshie.
1 Preventing the provision of “safe haven” to terrorists.
SECURITY STRATEGIES OF THE REGION Witek Nowosielski.
Copyright © 2009 South-Western Legal Studies in Business, a part of South-Western Cengage Learning. CHAPTER 2 International Law and the World’s Legal Systems.
Domestic vs. International Law
Internal Armed Conflict and the Law
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
The Law of Armed Conflict in Practice: Prima-facie Charges & New Defenses The charging of Iraqi insurgents with war crimes and the defense theories that.
The Privatisation of War The Law of Armed Conflict and Private Military Firms Dr Regina Rauxloh School of Law, University of Surrey, UK Surrey International.
EU responses to hate crimes and support to the victims Linda Maria Ravo DG Justice – European Commission Unit C1.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
The Global Fight against Money Laundering and Financing of Terrorism: Are we doing enough? Twenty Seventh International Symposium Economic Crime, Cambridge.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Military Ethics in the New Millennium
Corporate crime prevention project and Best practices manual Dr. Wybe Th. Douma T.M.C. Asser Institute, The Hague.
Terrorism. What is Terrorism? Terrorism is a criminal act that influences an audience beyond the immediate victim. The strategy of terrorists is to commit.
Conduct of hostilities Protection of civilians against the effects of hostilities Dr. Elżbieta Mikos-Skuza Seminar „Introduction to International Humanitarian.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
Chapter 6 International crime. In this chapter, you will study the concept of international crime. You will be introduced to the main categories of international.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Fight against terrorism. EU institutional/legal framework A bit of history 1957: European Communities are born.
2002 Symantec Corporation, All Rights Reserved The EU Regulations and IT security An industry perspective Ilias Chantzos, Government Relations EMEA Terena.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Extradition Issues arising in people smuggling matters Australia’s Experience Technical Expert Workshop on Mutual Legal Assistance (MLA) and Law Enforcement.
CIVILIAN SECRETARIAT FOR POLICE1 DRAFT POLICY GUIDELINES CIVILIAN SECRETARIAT FOR POLICE BY MINISTER OF POLICE TO BE APPROVED BY PARLIAMENT FOR THE DIRECTORATE.
Reading 1 Fight against cybercrime 板块:教学设计 —— 课件 Unit 4.
International Humanitarian Law Oral Presentation Module Name: UJGT8E-15-M Student No:
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign, Security and.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
International Crime.  Any thoughts?  Some points to consider:  Jurisdiction – how can nations/individuals/communities prosecute crimes originating.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
Dr. Heike Neuhaus. Federal Prosecutor General Head of Department Central Tasks; Espionage Staff Espionage 1 Espionage 2 Administration EU IT Espionage.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
TAIEX INTERNAL MARKET WEEK IN BUDAPEST November 2004 Co-operation of Customs Administrations Presentation by: Sandro Le Noci – Italian Customs.
1 Belfast, Horst Forster European Commission Belfast,
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
RESPONSIBLE BEHAVIOUR OF A STATE IN CYBERSPACE
Chapter 16 Terrorism and National Security.
Bellwork Think about this…. Historical Event
PREVENT 2015 The Prevent Strategy “Stopping people becoming
ASEAN v Transnational Crime and Terrorism…..an Introduction
1- Introduction ii-. Part ONE : foreign and security policy.
Monitoring and Detecting Online Hate Speech
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
IMPLEMENTATION OF THE GENEVA CONVENTIONS BILL KEY POLICY PRONOUNCEMENTS
348Α§2 of Greek Penal Code “Any person who produces, provides, sells or otherwise makes available, distributes, transmits, buys, procures or possesses.
EU policy on combating hate speech online
Stopping people becoming terrorists or supporting terrorism.
Major international instruments on counteracting corruption and organized crime, ratified by Bulgaria UN Convention against Corruption; Council of Europe.
What is terrorism? There is no agreed definition of terrorism internationally. The UK’s Terrorism Act 2000, defines terrorism as: The use or threat of.
Critical Infrastructure Protection Policy Priorities
8 Building Blocks of National Cyber Strategies
Team Leader Crime Statistics
13 February 2018 In search of a Remedy:
Protection under international humanitarian law
Chapter 6 International crime
Eurojust Presentation outline I. What is Eurojust? II. Objectives and competences III. Legal framework IV. Tasks and Powers V. Eurojust in action VI. Role.
UNIT FOUR| DEFENSE & SECURITY
Securing free and fair European elections
Eurojust Presentation outline I. What is Eurojust? II. Objectives and competences III. Legal framework IV. Tasks and Powers V. Eurojust in action VI. Role.
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Deborah Housen-Couriel, ADV.
Authors: Zerina Bosovic
Criminal Investigations
Presentation transcript:

Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016 Cyber warfare and cyber terrorism: Differences from a European perspective Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016

The danger of cyber war and cyber terrorism Digital revolution and technology evolution Civilian (private/individual and public) as well as military life depend on digital infrastructure and computer technology New type of battlefield for war and a new type of scene for terrorism Cyber war and Cyber terrorism: war and terror activity via Internet and information systems

Differences between cyber warfare and cyber terrorism (I) 1. Crime-Security vs. War-Defense Terrorism in European legislation as a criminal activity (cybercrime) Basic Legal texts: European Council Convention on the Prevention of Terrorism and its Additional Protocol, the Budapest Convention on Cybercrime and its Additional Protocol, the 2005 Framework Decision on attacks against information systems Responsibility of law enforcement agencies and the justice system Challenges: Difficulties in prosecution, debates on legal definitions, jurisdiction conflicts, extradition petitions, etc. Cyber terrorism: high-tech and without physical boundaries #the legal response: slow and with obstacles Cyber war a military matter in the context of defense policy Laws of armed conflict, the Geneva and Hague Conventions are a different category than domestic laws regarding crime Restrictions of fighting crime don’t apply Cooperation between military authorities of different countries problematic

Differences between cyber warfare and cyber terrorism (II) 2. The person behind the attack: terrorist or warrior? War: the personality of the individual soldier is irrelevant “Cyber warrior” expresses the will of a nation-state and its military policy, acts according to its orders and not to his own plan. Cyber-defense: interest about the state’s policy and strategy, the “warrior” is irrelevant to the defense analysis. Cyber terrorism: The individual perpetrator matters “Cyber terrorist”: Recruited in his own will and he acts upon his will and dedication to the organization, to his ideology, etc., can tell us a lot about his actions and the terrorist organization The personality and background of the cyber terrorist can prove crucial to the operation and affect it Radicalization and recruitment.

Differences between cyber warfare and cyber terrorism (III) 3. EU and NATO EU: cyber terrorism is a law enforcement matter in the context of security EU cooperation Cyber war and cyber defence not been really addressed as part of a common EU level defense cooperation NATO deals with cyber-defense/military issues EU level: still military defense is more a matter for each state Issues of sovereignty in defense and military cooperation can not function

Differences between cyber warfare and cyber terrorism (IV) 4. E-propaganda: different target group, different methods Large part of terrorist activity and communication on the web Terror internet propaganda: a part of terror work that openly manifests in internet The public face of terror, essential for a terror organization to radicalize and recruit Constant presence of terrorist on the web Jihadi websites operating, several e-social media that are platforms for terrorist rhetoric, communication and recruitment Presence on the web constitutes itself a crime as "public provocation to commit a terrorist offence" (distribution, or otherwise making available, of a message to the public, with the intent to incite the commission of a terrorist offence, where such conduct, whether or not directly advocating terrorist offences, causes a danger that one or more such offences may be committed) is punishable Cyber warfare: the public online propaganda exists mostly in times of conflict, works like any type of propaganda during war Aim: mainly to demoralize the enemy (psychological operations), to inform civilians in order to avoid crimes of war, attacking non combatants and collateral damage, plus to justify operations Type of military PR

Transitional and hybrid times regarding war and terror Very “primitive”, simple ways of fighting and terrorist techniques that result in death, injury and destruction Highly developed technology We do not know how terror organizations will continue operationally their activity Islamic State functions both in the framework of war and terrorism, with the second activity having a clear international character Conclusions from both law enforcement and military approaches about good practices, information exchange, incident response, risk assessment The safety of European citizens is a matter of both security and defense