A CURRENT AWARENESS SERVICE FROM THE MARSHALL CENTER The Marshall Center Transnational Weekly is a current awareness, information and policy tool for Marshall Center stakeholders to inform them about online publications by think tanks, research institutes and other organizations that deal with trans- national subjects. Use of these brief excerpts and links does not reflect the views of or endorsement by the Marshall Center, the U.S. government or the German government. All original content in these compilations is copyrighted unless spe- cifically noted otherwise. All rights to copyrighted items are reserved. weekly T H E M A R S H A L L C E N T E R transnational CONTENTS 6 JUNE 2017 COUNTERING TRANSNATIONAL ORGANIZED CRIME (CTOC) Corruption Drug Trafficking Trafficking in Scarce or Protected Resources Human Trafficking and Irregular Migration PROGRAM ON CYBER SECURITY STUDIES (PCSS) Internet Governance Internet Freedom Privacy and Security Cyber Statecraft Development Public/Private Partnership Protection of Intellectual Property Cyber Capacity Building Combating Terrorism and Cyber Crime Information Sharing Cyber Protection of Critical Infrastructure PROGRAM ON TERRORISM AND SECURITY STUDIES (PTSS) ISIS Terrorism Around the World Radicalization and Messaging Foreign Fighters Counterterrorism Strategies
Embed
6 JUNE 2017 E ENE transnational weekly - George … · Transnational Weekly is a current awareness, information and policy tool for Marshall Center ... Argentina to Expand Drug Treatment
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
A C U R R E N T A W A R E N E S S S E R V I C E F R O M T H E M A R S H A L L C E N T E R
The Marshall Center Transnational Weekly is a current awareness, information and policy tool for Marshall Center stakeholders to inform them about online publications by think tanks, research institutes and other organizations that deal with trans- national subjects. Use of these brief excerpts and links does not reflect the views of or endorsement by the Marshall Center, the U.S. government or the German government. All original content in these compilations is copyrighted unless spe-cifically noted otherwise. All rights to copyrighted items are reserved.
weeklyT H E M A R S H A L L C E N T E R
transnational
CONTENTS
6 JUNE 2017
COUNTERING TRANSNATIONAL ORGANIZED CRIME (CTOC)CorruptionDrug TraffickingTrafficking in Scarce or Protected ResourcesHuman Trafficking and Irregular Migration
PROGRAM ON CYBER SECURITY STUDIES (PCSS)Internet GovernanceInternet FreedomPrivacy and SecurityCyber Statecraft DevelopmentPublic/Private PartnershipProtection of Intellectual PropertyCyber Capacity BuildingCombating Terrorism and Cyber CrimeInformation SharingCyber Protection of Critical Infrastructure
PROGRAM ON TERRORISM AND SECURITY STUDIES (PTSS)ISISTerrorism Around the WorldRadicalization and MessagingForeign FightersCounterterrorism Strategies
Return to Table of Contents2
COUNTERING TRANSNATIONAL ORGANIZED CRIME (CTOC)
CORRUPTION
Turning Big Data Into a Useful Anticorruption Tool in AfricaDr. Elizabeth Dávid-Barrett – The Global Anticorruption Blog: 1 June 2017The use of big data may help to curtail corruption in Africa. Anti-corruption efforts to analyze contracts or track how money is spent can raise red flags or provide the evidence investigators need to convict.
Corruption inquiry at Council of Europe over AzerbaijanBBC: 30 May 2017The Council of Europe has launched an investigation into allegations that some members accepted bribes from Azerbaijan in exchange for favors. Azerbaijan allegedly influenced the Parliamentary Assembly of the Council of Europe’s rejection of a 2013 report that outlined human rights abuses in the ex-Soviet state and urged the release of political prisoners.
http://www.bbc.com/news/world-europe-40092451
For more on this theme:When Corruption Is the Operating System: The Case of Hondurashttp://carnegieendowment.org/2017/05/30/when-corruption-is-operating-system-case-of-hondu-ras-pub-69999
U.S. to Honor Corruption Fighters from Afghanistan, Angola, Guatemala, Malaysia, and Ukrainehttps://globalanticorruptionblog.com/2017/05/31/u-s-to-honor-corruption-fighters-from-afghanistan-ango-la-guatemala-malaysia-and-ukraine/
China Should Go After Bribe Takers in FCPA Caseshttps://globalanticorruptionblog.com/2017/05/29/china-should-go-after-bribe-takers-in-fcpa-cases/
Macedonia Parliament Approves New Gov’t after Prolonged Stalemate http://www.balkaninsight.com/en/article/macedonia-parliament-approves-zaev-s-new-govt-05-31-2017
Ukraine takes important first step towards ending corporate secrecyhttps://www.transparency.org/news/feature/ukraine_takes_important_first_step_towards_ending_corpo-rate_secrecy
Spain’s top anti-corruption prosecutor quits over Panama linkhttps://www.theguardian.com/world/2017/jun/01/spains-top-anti-corruption-prosecutor-quits-over-pana-ma-link
Hooked: Mexico’s violence and U.S. demand for drugsVanda Felbab-Brown – Brookings: 30 May 2017 With deaths in Mexico dramatically increasing again, the violence rivals that of civil wars and insurgencies. Impediments to curtailing the violence, including cartel fragmentation and turf wars, coupled with weak law enforcement and ineffective legislation are driving deaths to record levels.
What Can Bolivia Teach Post-Conflict Colombia about Coca Reduction?David Gagne – InSight Crime: 29 May 2017 A new report examines how Bolivia’s failures with forced coca eradication can be a lesson for Colombia as cocaine production surges in the wake of the country’s peace deal with the FARC.
For more on this theme:Mexico’s Drug Warhttps://www.cfr.org/backgrounder/mexicos-drug-war
Corruption Undermining Paraguay Efforts to Combat Drug Flightshttp://www.insightcrime.org/news-briefs/corruption-undermining-paraguay-efforts-combat-drug-flights
Argentina to Expand Drug Treatment Program for Minor Crimes Nationwidehttp://www.insightcrime.org/news-briefs/argentina-expands-drug-treatment-program-minor-crimes-na-tionwide
New drug trafficking routes and smuggling methods identified in INTERPOL-led operationhttps://www.interpol.int/en/News-and-media/News/2017/N2017-071
Medical Marijuana and Marijuana Legalizationhttps://www.rand.org/pubs/external_publications/EP67168.html
Tackling drug flows, organized crime and terrorism in airports focus of discussions at Crime Commissionhttp://www.unodc.org/unodc/en/frontpage/2017/May/tackling-drug-flows--organized-crime-and-terror-ism-in-airports-focus-of-discussions-at-crime-commission.html?ref=fs2
Industrial-Scale Looting of Afghanistan’s Mineral ResourcesWilliam Byrd and Javed Noorani – United States Institute of Peace: 30 May 2017Afghanistan has suffered large-scale mineral looting worth hundreds of millions of dollars annually due to widespread corruption. Such activity strengthens warlords and fuels instability.
Heineken Brewery Partners with World Wildlife Fund to Help Save Endangered TigersLisa Kocay – Forbes: 31 May 2017In a partnership with the World Wildlife Foundation (WWF), Tiger Beer, made by Heineken Asia Pacific, will remove the tiger from its logo. The idea is to show the impact of wildlife traffick-ing on the tiger population. Earlier this year the company donated $1 million to WWF.
For more on this theme:Should Mexico Follow Colombia’s Example in Combating Fuel Theft?http://www.insightcrime.org/news-briefs/can-mexico-learn-colombia-fight-fuel-theft
Layers of Corruption Facilitate Fuel Theft in Mexicohttp://www.insightcrime.org/news-briefs/layers-of-corruption-facilitate-fuel-theft-in-mexico
Dark web of wildlife crimehttp://www.thestar.com.my/opinion/letters/2017/05/27/dark-web-of-wildlife-crime/
China rejects Uganda ivory trafficking claims against diplomatshttps://www.independent.co.ug/china-rejects-uganda-ivory-trafficking-claims-diplomats/
A Snapshot of Brazil’s Threatened Land Defendershttps://psmag.com/social-justice/brazils-threatened-land-defenders
Facing the Evidence – How EIA Reports Can Drive Changehttps://www.economicvoice.com/facing-the-evidence-how-eia-reports-can-drive-change/
Forensic chemical analysis of wood could stop illegal logginghttps://phys.org/news/2017-06-forensic-chemical-analysis-wood-illegal.html
Ghana adopts a multilateral approach to curbing illegal mininghttps://www.newsghana.com.gh/ghana-adopts-a-multilateral-approach-to-curbing-illegal-mining/
Big data maps India’s human traffic hot spotsNita Bhalla – Reuters: 31 May 2017The My Choices Foundation is using specialized technology to identify villages that are most at risk of human trafficking. The charity uses big data to pinpoint hot spots and then initiates local campaigns to raise an alarm.
Illegal Border Crossings Are Down, And So Is Business For SmugglersJohn Burnett – NPR: 31 May 2017The number of people being smuggled across the Southwest border of the United States appears to have dropped off sharply, according to law enforcement officials. The increased security at the border and enforcement of immigration laws were cited by one smuggler as the reason business has declined.
For more on this theme:Exclusive: Cuba warns of human trafficking risk due to frosty U.S. tieshttps://www.reuters.com/article/us-cuba-usa-immigration-exclusive-idUSKBN18S65E
Human trafficking to China, Gulf countries on the risehttp://www.deccanchronicle.com/nation/current-affairs/010617/human-trafficking-to-china-gulf-on-the-rise.html
Boost for human trafficking fighthttp://jamaica-gleaner.com/article/news/20170531/boost-human-trafficking-fight
People smugglers make $35 bln a year on migrant crisis: IOM headhttp://www.reuters.com/article/us-portugal-migration-idUSKBN18R26H
NGOs deny collusion with Mediterranean smugglershttp://www.aljazeera.com/news/2017/05/ngos-deny-collusion-mediterranean-smug-glers-170531111554101.html
World Day Against Child Labor: A Call to Actionhttp://www.huffingtonpost.com/entry/world-day-against-child-labor-a-call-to-action_us_592ca403e4b07d848fdc05ce
Should Technical Actors Play a Political Role in the Internet Age?Corinne Cath – Council on Foreign Relations: 1 June 2017The African Network Information Center is considering withholding internet protocol addresses to governments that deny internet access to their citizens. As a technical not-for-profit organization, is the group overstepping its bounds?
For more on this theme:(Latin America) Public Knowledge Cultivates Learning Community of Digital Rights Advocateshttps://www.publicknowledge.org/news-blog/blogs/public-knowledge-cultivates-learning-communi-ty-of-digital-rights-advocates
INTERNET FREEDOM
To censor or sanction extreme content? Either way, Facebook can’t winOlivia Solon – The Guardian: 23 May 2017Facebook asks a lot of its employees: Company guidelines instruct moderators to determine the fine line between terrorist recruitment, glorified violence and live-streamed crime — but not be so restrictive as to promote censorship.
For more on this theme:(Ethiopia) Ethiopia Imposes Nationwide Internet Blackouthttps://globalvoices.org/2017/06/01/ethiopia-imposes-nationwide-internet-blackout/
(Cameroon) Cameroon restores internet in time for UN Special Rep’s return visithttp://www.itwebafrica.com/ict-and-governance/364-cameroon/237947-cameroon-restores-internet-in-time-for-un-special-reps-return-visit
(Thailand) Thailand to regulate on-demand video streaming as internet censorship heightens in the countryhttps://e27.co/thailand-to-regulate-on-demand-video-streaming-20170601/
7 in 10 smartphone apps share your data with third-party servicesNarseo Vallina-Rodriguez and Srikanth Sundaresan – The Conversation: 1 June 2017Your data is likely being shared by seven of 10 apps on your smartphone, according to a new study. Most apps require an information-sharing agreement when downloaded, but the sharing often goes well beyond the needs of the app, and your information is passed to third-party services.
For more on this theme:(Europe) New perspectives on cyber security: The regulatory challengehttp://globalriskinsights.com/2017/05/new-perspectives-cyber-security-regulatory-challenge/
(U.S.) How Congress dismantled federal Internet privacy ruleshttps://www.washingtonpost.com/politics/how-congress-dismantled-federal-internet-privacy-rules/2017/05/29/7ad06e14-2f5b-11e7-8674-437ddb6e813e_story.html
(U.S.) The BROWSER Act: A Worthy Goal, But There’s an Easier Fix to the Net Neutrality Privacy Messhttps://www.forbes.com/sites/jamesccooper1/2017/05/26/the-browser-act-a-worthy-goal-but-theres-an-easier-fix-to-the-net-neutrality-privacy-mess/#34e48dcdea19
CYBER STATECRAFT DEVELOPMENT
Australia’s cyber security strategy: execution & evolutionZoe Hawkins and Liam Nevill – Australian Strategic Policy Institute: 31 May 2017This report examines the Australian government’s Cyber Security Strategy performance over the past year and compares progress to each initiative in the strategy’s action plan.
For more on this theme:(Africa) Internet Society and Commission of the African Union launch Internet Infrastructure Security Guidelines for Africahttps://www.internetsociety.org/news/internet-society-and-commission-african-union-launch-internet-in-frastructure-security
(China) China’s Cybersecurity Law Takes Effect: What to Expecthttps://www.lawfareblog.com/chinas-cybersecurity-law-takes-effect-what-expect
(Australia, Global) Facebook: A short guide for ambassadorshttps://www.lowyinstitute.org/the-interpreter/facebook-guide-ambassadors
Cyber crime: Turnbull to hold crisis talks with major telcos and internet companiesSharri Markson – The Daily Telegraph: 30 May 2017The Australian prime minister is concerned about protecting small businesses and families from cyber crime and is partnering with major telecommunication and internet firms to assist.
(U.S.) Why One Lawmaker Sees the Future of Silicon Valley in Appalachiahttp://www.nextgov.com/cio-briefing/2017/05/why-one-lawmaker-sees-future-silicon-valley-appala-chia/138247/
PROTECTION OF INTELLECTUAL PROPERTY
China’s strict cybersecurity laws took effect today; potentially impacting foreign businessesJonathan Shieber – TechCrunch: 1 June 2017With China’s new cyber security laws now in effect, foreign businesses are worried about how much control the government will have over their data and intellectual property.
For more on this theme:(Italy) Abu-Ghazaleh Honorary Guest at Italian Senate Intellectual Property Seminar (Rome)http://www.ag-ip-news.com/news.aspx?id=43285&lang=en
(U.S.) What Is a Data Breach and How Can It Impact Your Small Business?https://smallbiztrends.com/2017/06/what-is-a-data-breach.html
Ethical hacking: The Zomato case highlights how the government should use bug bounty programmesAbhishek Dey – Scroll: 28 May 2017After the recent hacking of India’s largest online restaurant guide, the author argues that the government must employ white-hat hackers to better secure its systems.
For more on this theme:(India) Mumbai Technologists Are Using TV Spectrum to Bring More Internet Access to Indiahttps://globalvoices.org/2017/05/22/mumbai-technologists-are-using-tv-spectrum-to-bring-more-inter-net-access-to-india/
(China) China to build integrated big data centerhttp://news.xinhuanet.com/english/2017-05/17/c_136292235.htm
(Europe) EU set to launch thousands of free WiFi hotspotshttp://www.dw.com/en/eu-set-to-launch-thousands-of-free-wifi-hotspots/a-39038190
COMBATING TERRORISM AND CYBER CRIME
Under tough surveillance, China’s cybercriminals find creative ways to chatPatrick Howell O’Neill – CyberScoop: 3 May 2017High levels of government censorship and surveillance are failing to curtail cyber crime in China. Criminals use technical, typographic and linguistic tricks to make themselves untraceable.
For more on this theme:(Africa) Is Africa heeding the WannaCry wake-up call?http://www.itwebafrica.com/security/513-africa/237932-is-africa-heeding-the-wannacry-wake-up-call
(Global) Rising cyber attacks compels governments across the world to invest in cyber intelligence and cyber weaponshttp://cio.economictimes.indiatimes.com/tech-talk/rising-cyber-attacks-compels-governments-across-the-world-to-invest-in-cyber-intelligence-and-cyber-weapons-by/2391
NATO to beef up cyber capabilitiesGerard O’Dwyer – Defense News: 31 May 2017NATO plans to increase its ability to defend against cyber attacks by developing both defensive and offensive cyber tools. One of the key areas for improvement is to increase threat-information sharing.
For more on this theme:(U.S.) Agencies Can Meet Challenges of Cyber Executive Order, MGT Acthttps://www.meritalk.com/articles/agencies-can-meet-challenges-of-cyber-executive-order-mgt-act/
(Middle East) ‘WannaCry’ online attacks a wake up call for Middle East cyber securityhttp://www.thenational.ae/uae/wannacry-online-attacks-a-wake-up-call-for-middle-east-cyber-security
CYBER PROTECTION OF CRITICAL INFRASTRUCTURE
Expanding the Role of the National Guard in CybersecurityBobby Shields – International Affairs Review: 1 June 2017To help bridge the gap between cyber security jobs and the lack of professionals in the field, the U.S. military is expanding the role of its National Guard to oversee cyber issues for some critical infrastructure.
http://www.iar-gwu.org/content/expanding-role-national-guard-cybersecurity For more on this theme:(Global) Securing Democracy in the Digital Agehttps://www.aspi.org.au/publications/securing-democracy-in-the-digital-age
(India) Designing cybersecurity for the financial sectorhttp://www.livemint.com/Opinion/LVq77kZ1YmRNSgn34kIdjO/Designing-cybersecurity-for-the-finan-cial-sector.html
What Happens After ISIS Goes UndergroundColin P. Clarke and Chad C. Serena – The National Interest: 29 May 2017ISIS is losing territory and is in dire financial straits. Still, the battle against ISIS is unlikely to be won in the coming months or even years. ISIS appears to be transitioning to the next stage, during which it will work underground to conduct attacks across the globe.
The Maute Group: New Vanguard of IS in Southeast Asia?Joseph Franco – S. Rajaratnam School of International Studies: 31 May 2017The Maute Group is wreaking havoc in the southern Philippine city of Marawi, indicating the group could draw other ISIS-inspired extremists on the island of Mindanao. If the government doesn’t contain the threat soon, Mindanao may become a terrorist haven.
For more on this theme:Fleeing civilians wounded by Islamic State mortar fire in Mosulhttp://in.reuters.com/article/mideast-crisis-iraq-mosul-idINKBN18S4R4
The ISIS-Linked Takeover of a Philippines Cityhttps://www.theatlantic.com/news/archive/2017/05/philippines-isis/528531/
ISIS’s Perverse, Bloody Interpretation of Ramadanhttps://www.theatlantic.com/international/archive/2017/05/ramadan-isis-attack-muslim/528336/
Islamic State suicide bombers attack Baghdad during Ramadanhttp://www.longwarjournal.org/archives/2017/05/islamic-state-suicide-bombers-attack-bagh-dad-during-ramadan.php
The Islamic State and the End of Lone-Wolf Terrorismhttp://foreignpolicy.com/2017/05/23/the-islamic-state-and-the-end-of-lone-wolf-terrorism/
Philippines: ISIL-linked Maute group using children as fightershttp://www.aljazeera.com/video/news/2017/05/philippines-maute-armed-group-child-soldiers-mara-wi-170530193625476.html
The 1967 War and the Birth of International TerrorismDaniel Byman – Lawfare: 30 May 2017While terrorism wasn’t invented during the 1967 Six-Day War, the war set the stage for terrorism to go global, changing the very nature of the act.
Deadly Bombing in Kabul Is One of the Afghan War’s Worst StrikesMujib Mashal, Fahim Abed and Jawad Sukhanyar – The New York Times: 31 May 2017 At least 80 people were killed and more than 350 wounded when a truck bomb struck Kabul’s diplomatic quarter last week. Neither ISIS nor the Taliban initially claimed responsibility.
For more on this theme:Taliban warns against retaliation over Kabul attackhttp://www.reuters.com/article/us-afghanistan-blast-idUSKBN18S42J?il=0
Westminster attack, London, 22 March 2017https://www.aspi.org.au/publications/westminster-attack,-london,-22-march-2017
Local Community Resistance to Extremist Groups in Syria: Lessons from Ataribhttps://www.chathamhouse.org/publication/local-community-resistance-extremist-groups-syria-les-sons-atarib
Shabaab claims US is ‘Satan of our time,’ praises al Qaeda’s leadershiphttp://www.longwarjournal.org/archives/2017/05/shabaab-claims-us-is-satan-of-our-time-praises-al-qaedas-leadership.php
Jihad during Ramadan is ‘obligatory,’ Taliban spokesman sayshttp://www.longwarjournal.org/archives/2017/05/jihad-during-ramadan-is-obligatory-taliban-spokes-man-says.php
How Al-Shabab Overtook Boko Haram to Become Africa’s Deadliest Militantshttp://www.newsweek.com/isis-africa-al-shabaab-boko-haram-619010
After Boko Haram terror, Cameroon’s ‘ghost towns’ come back to lifehttp://www.dw.com/en/after-boko-haram-terror-cameroons-ghost-towns-come-back-to-life/a-39067479
Boko Haram’s massacre of the innocentshttps://www.spectator.co.uk/2017/06/boko-harams-massacre-of-the-innocents/#
Manchester Attack: Now is the Time to Properly Talk about ‘Radicalisation’Hilary Pilkington – Global Policy: 25 May 2017The author argues that we must not be afraid to discuss radicalization and extremism despite the controversial nature of the subjects.
Why Prevent has proved a blunt instrument in the fight against terrorismTahir Abbas – Democratic Audit: 26 May 2017The Manchester attack highlights the gaps between the government’s Prevent strategy and counterterrorism. The causes of radicalization are difficult to pinpoint and even more difficult to counter.
For more on this theme:Confronting An ISIS Emir: ICSVE’s Breaking ISIS Brand Counter-Narrative Videos – Analysishttp://www.eurasiareview.com/01062017-confronting-an-isis-emir-icsves-breaking-isis-brand-counter-narrative-videos-analysis/
Treating Islamic Violent Extremism as a Pandemic Super-Infection: Inverse Darwinist Operations Line of Operation Explainedhttp://smallwarsjournal.com/jrnl/art/treating-islamic-violent-extremism-as-a-pandemic-super-infec-tion-inverse-darwinist-operatio
The Call to Radicalism, Both at Home and Abroadhttps://www.thecipherbrief.com/article/north-america/what-we-miss-domestic-radicalization-pro-cess-1089
Britain Must Ramp Up Its Fight Against Islamic Extremistshttp://nationalinterest.org/feature/britain-must-ramp-its-fight-against-islamic-extremists-20962
Why are young men prone to radicalization?https://www.theglobeandmail.com/opinion/why-are-young-men-prone-to-radicalization/arti-cle35164423/
Grooming Jihadists: The Ladder of Radicalization and Its Antidotehttps://www.gatestoneinstitute.org/10263/grooming-jihadists
Allow youth to be radical in the fight against radicalization, experts sayhttps://www.devex.com/news/allow-youth-to-be-radical-in-the-fight-against-radicalization-experts-say-90340
Could Balkan nations become the new hotbeds of Islamist extremism?http://www.dw.com/en/could-balkan-nations-become-the-new-hotbeds-of-islamist-extrem-ism/a-39045256
Manchester Attack Highlights Foreign Fighters in LibyaAaron Y. Zelin – The Washington Institute for Near East Policy: 24 May 2017The Manchester attack underscores the potential role foreign fighters and Libya may play in future attacks in Europe — both as a country of refuge or transit and as a training destination.
For more on this theme:Marise Payne: ’eliminate Daesh fighters in Iraq and Syria’https://www.aspistrategist.org.au/marise-payne-eliminate-daesh-fighters-iraq-syria/
The Latest: Foreign fighters among militants in Philippineshttp://www.nzherald.co.nz/world/news/article.cfm?c_id=2&objectid=11864061
Tony Abbott calls for ‘special courts’ for jihadists returning to Australiahttp://www.abc.net.au/news/2017-06-01/abbott-calls-for-special-courts-for-returning-jihad-ists/8579084
Inside the Isis social networkhttp://www.newstatesman.com/world/2017/06/inside-isis-social-network
Libya and the Manchester connectionhttp://www.aljazeera.com/indepth/opinion/2017/05/libya-manchester-connection-170528081044095.html
Sources: Iran to Bankroll Pro-Government Militia Fighters in Syriahttps://www.voanews.com/a/sources-iran-to-bankroll-pro-government-militia-fighters-in-syria/ 3874390.html
Fighters who can’t travel to Syria pose growing threathttps://www.theguardian.com/uk-news/2017/may/27/aspiring-isis-fighters-in-uk-growing-threat
COUNTERTERRORISM STRATEGIES
What Policy Changes Are Needed after the Manchester Attack?Raffaello Pantucci – Royal United Services Institute: 31 May 2017A week after the atrocity in Manchester, it is now possible to draw some preliminary conclusions: There clearly was a breakdown in the intelligence flow that led to suicide bomber Salman Abedi slipping through the net; there are enduring questions about the United Kingdom’s Prevent anti-terrorism strategy; and, finally, there are the weaknesses of “soft targets” that such an attack invariably expose.
How can we better protect crowds from terrorism?Robert Friedmann – The Conversation: 1 June 2017There have been over 500 attacks around the world since the start of 2017, causing people to wonder about their safety and the measures in place to protect them.
For more on this theme:DoD budget request includes anti-tank rockets for Syrians fighting ISIShttp://www.militarytimes.com/articles/anti-tank-ypg-isis-turkey
Protecting crowded places from terrorhttps://www.policyforum.net/protecting-crowded-places-terror/
Countering the Islamic State in Germany and Abroad: German-American Policy Optionshttp://www.gmfus.org/publications/countering-islamic-state-germany-and-abroad-german-american-pol-icy-options
Terrorism and Counter-terrorism – A View from Europehttp://www.ispsw.com/wp-content/uploads/2017/05/486_Roell_Indonesien_Final.pdf
The Manchester Terror Attack and Problems with Securing so-called “Soft Targets”http://www.soufangroup.com/martin-reardon-interviewed-on-al-jazeera-english-the-manchester-terror-attack-and-problems-with-securing-so-called-soft-targets/
Rise Of Commercial Threat: Countering Small Unmanned Aircraft System – Analysishttp://www.eurasiareview.com/25052017-rise-of-commercial-threat-countering-small-unmanned-air-craft-system-analysis/