ATHINA KARATZOGIANNI UNIVERSITY OF LEICESETER

Slides:



Advertisements
Similar presentations
Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Advertisements

United Nations Security Council Resolution 1624 (2005) Countering Incitement to Commit Terrorist Acts.
Disaster Risk Reduction and Governance. Ron Cadribo.
The intersectoral approach within the OAS Inter-American Council for Integral Development (CIDI) First Meeting of Ministers and High Authorities of Social.
Preventing Violent Extremism: ASB in relation to the policing of security Dr Basia Spalek Institute of Applied Social Studies University of Birmingham.
Lobbying for Food Security: FAO advocacy interventions
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Sub-regional Workshop for the Gulf Countries to Launch the Education for All National Assessments Sharjah, June, 2013 National EFA 2015 Review Concept.
Developing Capacity on Water Integrity WATER INTEGRITY NETWORK Delft 31st May 2013 Francoise Nicole Ndoume Regional Coordinator Water Integrity Network,
African Declaration on Internet Rights and Freedoms Presentation by: Edetaen Ojo Media Rights Agenda, Nigeria.
7 March 2013 Counter-terrorism Committee Executive Directorate Facilitating the Provision of Technical Assistance to Member States.
Guide to Human Rights for Internet Users (and beyond) Ukrainian IGF - Kyiv, 3 October 2014.
Strasbourg 05/06/07 Strasbourg 31/07/07 EUROPEAID Non-State Actors and Local Authorities in Development WTD: WORKING TOGETHER FOR DEVELOPMENT.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Meeting between representatives of the Muslim community and Minister Toews June 8, 2012 Hamilton, Ontario.
HIV AND HOUSING WORKSHOP : JOHANNESBURG 14—19 SEPTEMBER 2014 CONGEH PRESENTATION ON ADVOCACY AND NETWORK.
© 2006 Religious Freedoms Federal Ministry for Foreign Affairs of Austria.
The Global Centre for Information and Communication Technologies in Parliament 14 June 2006 V Legislative XML Workshop Towards European Standards for Legislative.
October  The Economic and Social Council (ESC) is “the civil parliament” of Bulgaria. It unites a variety of Bulgarian civil society organisations.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
Inter-American Program for the Prevention of Violence and Crime October 2014.
What, how and when 1 2 General Aims of ‘Youth in Action Programme ’ Promote young people’s active citizenship in general and their European.
Susan Scholefield CMG Director General Cohesion and Resilience.
M ARKING THE I NTERNATIONAL Y EAR OF V OLUNTEERS 10 TH ANNIVERSARY Ideas, Opportunities and Tools for stakeholders’ action.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Office of Special Projects Issues arising from the Second Review Conference on Safety and Security at Chemical Plants and Relationships with CWC stakeholders.
Preventing Violent extremism through inclusive development and the promotion of tolerance and respect for diversity UNDP’s development and peacebuilding.
3-MINUTE READ THE PREVENT DUTY. What is it and what does it mean for me? This 3-Minute Read summarises the DfE’s document: ‘The Prevent duty: Departmental.
University of Leeds Capitalism, Culture and Media Conference 7 Septemer 2015 ATHINA KARATZOGIANNI UNIVERSITY OF LEICESETER com GRUSIN’S.
Measures undertaken by the Network of National Agencies ERASMUS+: Youth in Action on Inclusion and Diversity Gerhard Moßhammer Interkulturelles Zentrum.
Prevent - Stopping People Becoming Terrorists or Supporting Terrorism Detective Chief Superintendent Alan Lyon National Coordinator Prevent
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
UN SECURITY COUNCIL RESOLUTION 2250 ON YOUTH, PEACE & SECURITY Adopted on 9 December 2015.
By Eunice Ndonga-Githinji
UN Action to End Violence Against Women
Strengthening Dialogue and Building Trust April 2017
Peacebuilding Approaches to Training & Dialogue with Security Forces
American University of Nigeria And the Adamawa Peace Initiative International Conference on Peace and Development June 10-13th, 2014.
A strategic vision for regional cooperation in the Arab Region Arab States Round Table World Bank Land and Poverty Conference 2017 Washington, 21 March.
TERRA Terrorism and Radicalisation
Almaty, Kazakhstan 27 September, 2016
Curriculum (Article 6) Teachers should be involved in all phases of curriculum development ..(design, piloting, implementation and review). Promote understanding.
Prevent.
Southwark Prevent programme
EU policy on combating hate speech online
Peacebuilding Priority Plan Heads of Mission
Council of Europe Exchange Strasbourg
SGSU Open Meeting 26 April 2016 Sophie Bowen
Programme of the Government of the Republic of Bulgaria (draft)
REGIONAL PROGRAMME IN THE ARAB STATES TO COMBAT
Belarus Research Council
IYPH main objective "The International Year of Plant Health will raise awareness of the importance and impacts of plant health in addressing issues of.
ReDSS Durable Solutions Framework tools
Macro-Fiscal Policy Unit/ Ministry of Finance Egypt
Foreign Policy; a brief introduction
What can be the concrete input of Religion for the promotion of Gender Equality & Women‘s Rights?
  The Second Consultative Meeting on Strengthening Partnerships with National Rapporteurs on Trafficking in Persons and Equivalent Mechanisms Wednesday.
1. Introduction to the Convention 2
COLOMBO DEFENCE SEMINAR 2018
Cyber Security Ecosystem of Georgia. Experience and Challenges
Meeting Outcomes “Building International Partnership To Enhance Science Based Ecosystem Approaches In Support Of Regional Ocean Governance” November.
Because we would like to make a meaningful contribution to our world we launched our frim commitment for this effort. Scouts for SDGs mobilization. © World.
Inclusion of Muslim communities and prevention of discrimination in cities E U R O C I T I E S W O R K I N G G R O U P M I G R A T I O N & I N T.
The Role of Regional Organisations in CVE EU/MENA/Americas Experience
The Strategic Focus of the Department for Women, Children and Persons with Disabilities 11 AUGUST 2009 V Y Nxasana.
Inclusion of Muslim communities and prevention of discrimination in cities E U R O C I T I E S W O R K I N G G R O U P M I G R A T I O N & I N T.
UNODC and CYBERCRIME October 2009.
The Active Citizens Fund in Bulgaria Programme Priorities and Measures for Support Short version of the presentation delivered at the Official Launch.
RCA Workshop on RCARO Future Strategies July 2007
Presentation transcript:

ATHINA KARATZOGIANNI UNIVERSITY OF LEICESETER athina.k@gmail.com Colombo Defence Seminar 28 and 29 August 2017: COUNTERING VIOLENT EXTREMISM: GLOBAL TRENDS  INVITED SPEAKER INTERVENTION ON THE TOPIC: INTELLIGENCE, CYBER CHALLENGES AND STRATEGIES

Cyberconflict theory (2006) 1

Cyberconflict theory (2006) 2

“isis WINNING THE SOCIAL MEDIA WAR”

Countermessaging Isis: the U.S. Internal department assessment of efforts to combat the Islamic State’s messaging machine (State Department Memo on The Islamic State Group composed by Richard Stengel, under secretary for public diplomacy, June 9, 2015, - Sensitive but Unclassified document). Memo was given to NYT by an Obama administration official. Memo concludes that ‘the Islamic State’s violent narrative has effectively “trumped” the efforts of some of the world’s richest and most technologically advanced nations’. (New York Times, ‘ISIS Is Winning the Social Media War, U.S. Concludes’, June 12, 2015) A “messaging working group” from the U.S, Britain, United Arab Emirates has not come together. Criticism because ISIS took over Ramadi occupied Falluja and Mosul for over a year now. Efforts to expand center for strategic counterterrorism communications To establish a communication coalition, a messaging coalition to compliment operations on the ground. Encouraging Muslim leaders to denounce ISIL, organising events against the destruction of historical articfacts in conference at Louvre etc. (Cultural Terrorism concept)

Countermessaging Isis: Other actors Europe: Euro-wide police team at Europol set up closing down accounts crackdown July 2015 follows report of 46,000 Twitter accounts Database (IBTimes Alistair Charlton, June 22, 2015) A Network of Twitter accounts which tweet 100,000 times everyday. Anonymous Operation ISIS (OpIsis) the group collected and published lists of tens of thousands of Twitter accounts which it claimed belonged to members of IS or sympathisers.(March 2015, 25,000 accounts were published) and a list of websites and hosts by GostSec. Anonymous publishes a guide on how to trackdown pro-IS Twitter accounts pops on Pastebin. Emerson Brooking (Council on Foreign Affairs) suggests the US should team up with Anonymous to fight ISIS online.

Processes of Premediation by U. S Processes of Premediation by U.S. and its Allies benefit and boost ISIS

U.N. global approach to countering violent extremism United Nations General Assembly Resolution adopted by the Human Rights Council ‘Human rights and preventing and countering violent extremism’ (2 October 2015 A/HRC/RES/30/15) the role of regional organizations and comprehensive, multi- stakeholder approaches to preventing and countering violent extremism; “that violent extremism, in all its forms and manifestations, cannot and should not be associated with any religion, nationality, civilization or ethnic group”; “the commitment of all religions to peace, and determined to condemn violent extremism, which spreads hate and threatens lives”; “that violent extremism constitutes a serious common concern for all States, and convinced that there is no justification for violent extremism, whatever the motivation”; “that while there can be no excuse or justification for violent extremism, abuses and violations of human rights may be among the elements that contribute to creating an environment in which people, especially youth, are vulnerable to radicalization that leads to violent extremism and recruitment by violent extremists and terrorists”; “the commitment of States to take measures aimed at raising awareness of, and addressing the numerous and diverse conditions conducive to, the spread of violent extremism in all its forms and manifestation”; “that States may seek to integrate poverty eradication as part of their national strategies to address one of the conditions conducive to the spread of violent extremism”.

United Nations proposed strategies “to engage with local communities and non-governmental actors through a whole-of-society approach in developing strategies that respect human rights and fundamental freedoms to counter narratives that incite acts of violent extremism and terrorism and address the conditions conducive to the spread of violent extremism, including by empowering women, religious, cultural, education and local leaders, engaging members of all concerned groups in civil society and from the private sector, adopting tailored approaches that incorporate human rights and fundamental freedoms to prevent and counter recruitment to this kind of violent extremism, and promoting social inclusion and cohesion”. Among others, this resolution emphasizes the “need to empower youth, including by means of targeted youth employment programmes”; the role of education; “tolerance and dialogue among civilizations and the enhancement of interfaith and intercultural understanding”; “the need to enhance international cooperation and effective partnerships, including by strengthening national capacities and developing, promoting and implementing comprehensive and coordinated solutions that respect human rights and are aimed at preventing and countering violent extremism”. It also expresses concern “over the increased use by terrorists and violent extremists and their supporters of communications technology for the purpose of radicalizing to terrorism or violent extremism, recruiting and inciting others to commit acts of terrorism or violent extremism, including through the Internet”.

Cyber challenges The use of social media data (and the big data algorithmic surveillance of the present future) for intelligence gathering is a crucial challenge in the fight against violent extremism. The reasons are many: the commercial and profit driven nature of social media platforms and the closed algorithms involved; governments blaming tech giants and vice versa after a terrorist attack where social media were used is a common occurrence; potential issues of privacy and violation of civil and human rights through OSINT; no use of OSINT to counter extremism through community-engagement driven or other more imaginative initiatives; and lack of knowledge by authorities of how to develop their own predictive analytics software or awareness of the human biases involved in such endeavors create additional problems. Additionally, predictive analytics are used widely by all forms of non-state actors, which is a further complication as it can benefit the same actors that are operating in the violent extremism domain.

Return to basics The general explanations and ideas the United Nations resolution point to above are all well-known, understood and make wonderful sense like a Christmas wish list: eliminate the causes and motivations, as well as the spread of extremist ideologies through various policy interventions. The cyber challenges are also widely researched and understood in combating extremism online, and governments have relied on both open and closed intelligence to intercept, target, get situational awareness and counter-messaging initiatives to combat it. What I think remains buried from view in these approaches is what I would call the inability of counter-extremism actors to penetrate the “everyday fabric” of the processes involved in violent extremism.

What is to be done If predicting and identifying (by intelligence gathering) is difficult, and despite complete structural data acquisition (see Snowden revelations, WikiLeaks etc), we are witnessing more and more successful attacks, what else can be done, besides these lazy wholesale technological solutions that produce limited results and stop violent plots, but not all plots, and not all the time? to focus on penetrating the everyday fabric of violent extremism as a process, in order to make the materialization of an attack so difficult that independent of high motivation, ideology and grievances, the attacker(s) are disrupted from executing their extremist violence to begin with.

synopsis Instead of concentrating on vague general visions to eliminate poverty and hatred, and the lazy human-rights violating cyber intelligence, social media data gathering, identifying and so on, to instead concentrate on intervening on the phases extremist undergo to decide, to identify targets, to prepare, to overcome security, to surveil their targets, to purchase and conceal weapons, or in execution, to store transport, to decide on the place and time, to plan their escape and so on. In synopsis: turn to basics and pragmatics, to forget the motives, ideologies and structural conditions for a moment, in order to think about interventions to disrupt violent extremist conduct as a process.