Wanted: Foreign Fighters


Book Description










A Question Of Trust


Book Description

[This convenience copy of the official report by the UK Independent Reviewer of Terrorism Legislation, made available under OGLv3 on a cost-only basis] Modern communications networks can be used by the unscrupulous for purposes ranging from cyber-attack, terrorism and espionage to fraud, kidnap and child sexual exploitation. A successful response to these threats depends on entrusting public bodies with the powers they need to identify and follow suspects in a borderless online world. But trust requires verification. Each intrusive power must be shown to be necessary, clearly spelled out in law, limited in accordance with international human rights standards and subject to demanding and visible safeguards. The current law is fragmented, obscure, under constant challenge and variable in the protections that it affords the innocent. It is time for a clean slate. This Report aims to help Parliament achieve a world-class framework for the regulation of these strong and vital powers.




The MENA Region: a great power competition


Book Description

The volume deals with competition among regional and external players for the redistribution of power and international status in the Middle East and North Africa, with a focus on Russia’s renewed role and the implications for US interests. Over the last few years, a crisis of legitimacy has beset the liberal international order. In this context, the configuration of regional orders has come into question, as in the extreme case of the current collapse in the Middle East. The idea of a “Russian resurgence” in the Middle East set against a perceived American withdrawal has captured the attention of policymakers and scholars alike, warranting further examination. This volume, a joint publication by ISPI and the Atlantic Council, gathers analysis on Washington’s and Moscow’s policy choices in the MENA region and develops case studies of the two powers’ engagament in the countries beset by major crises.




The Eastern Question


Book Description

The future of Europe's east is open. Can the societies of this vast region become more democratic and secure and integrate into the European mainstream? Or are they destined to become failed, fractured lands of grey mired in the stagnation and turbulence historically characteristic of Europe's borderlands? How and why is Russia seeking to influence these developments, and what is the future of Russia itself? How should the West engage?




Countering Transregional Terrorism


Book Description

Countering terrorism is very hard. Countering it across global and regional geographic boundaries is even harder. Also, as increasingly powerful technologies become available to terrorists, the consequences of failing to surmount their adaptiveness and agility become much larger. It is vital to recognize that, despite some very impressive progress that the United States and the international community have made in combating terrorism since 9/11, we still struggle as a global community with the creation of durable, permanent solutions, and outcomes against it. This important publication urges consideration of how we might be able to find better pathways, better solutions, and better designs into the future. The future will not wait for us.




Foreign Terrorist Fighters


Book Description

The manual seeks to provide guidance on international legal instruments against FTF activities and techniques for digital investigation and evidence collection, especially concerning global financial transactions and social media activity. While it is tailored for judicial training institutes in South-Eastern Europe, it can be utilized in any jurisdiction seeking resources to address the FTF threat.




Information Technology for Peace and Security


Book Description

This book offers an introduction to Information Technology with regard to peace, conflict, and security research, a topic that it approaches from natural science, technical and computer science perspectives. Following an initial review of the fundamental roles of IT in connection with peace, conflict and security, the contributing authors address the rise of cyber conflicts via information warfare, cyber espionage, cyber defence and Darknets. The book subsequently explores recent examples of cyber warfare, including: • The Stuxnet attack on Iran’s uranium refining capability • The hacking of the German Federal Parliament’s internal communication system • The Wannacry malware campaign, which used software stolen from a US security agency to launch ransomware attacks worldwide The book then introduces readers to the concept of cyber peace, including a discussion of confidence and security-building measures. A section on Cyber Arms Control draws comparisons to global efforts to control chemical warfare, to reduce the risk of nuclear war, and to prevent the militarization of space. Additional topics include the security of critical information infrastructures, and cultural violence and peace in social media. The book concludes with an outlook on the future role of IT in peace and security. Information Technology for Peace and Security breaks new ground in a largely unexplored field of study, and offers a valuable asset for a broad readership including students, educators and working professionals in computer science, IT security, peace and conflict studies, and political science.




Dod Dictionary of Military and Associated Terms March 2017


Book Description

DOD Dictionary of Military and Associated Terms March 2017 The DOD Dictionary of Military and Associated Terms (DOD Dictionary) sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components.