- The Strategist - https://www.aspistrategist.org.au -

CT Scan

Posted By on February 26, 2015 @ 12:47

Pakistan has ordered that unless mobile phone users to confirm their identities via fingerprints, to be added to a CT database; otherwise, their service will be severed. [1]

This week features the Prime Minister’s national security statement, the Countering Violent Extremism Summit in Washington, terror threats in the Asia–Pacific, sweeping CT legal reforms across the globe and the upcoming metadata retention bill.

Following the release of the Martin Place Siege Review [2] on Sunday and the Review of Australia’s Counter-Terrorism Machinery [3] the next day, Prime Minister Tony Abbott delivered the much-anticipated National Security Statement [4] at AFP headquarters on Monday. The announcement included tighter immigration controls, a crackdown on ‘hate preachers’ and the future appointment of CT ‘tsar’ to improve cooperation between national security agencies. He also called on Muslim leaders to more frequently describe Islam as a ‘religion of peace’.

Reaction to the statement was mixed. Critics warned that the announcements risk alienating the Islamic community [5] (‘a vital source of information on extremists’), that the tsar would be ‘good in theory but a bit messy in practice’ [6] and that tougher laws are not necessarily more effective. [7] See also The Australian’s analysis [8] of the statement in the context of Australia’s national security climate.

Complementing the law reform proposals, Attorney-General George Brandis announced [9] last Thursday an allocation of $18 million to combatting and restricting access to extremist narratives online. However, terrorism researcher Andrew Zammit wrote [10] that the role of social media in radicalisation is ‘overstated’, pointing to reports indicating that ‘real-world’ relationships, not social media, are the decisive influence in radicalising British extremists.

Tuning into international dialogue, what can we take out of the White House’s Countering Violent Extremism (CVE) Summit? Hardeep S. Puri and Omar El Okdah over on The Global Observatory noted [11] that the summit underscored the need for a multilateral strategy, whilst acknowledging changes in the scope of the problem (now that violent non-state actors control land as large as the UK) and the need to address the ‘root causes’ [12] of extremism. Adopting a human rights approach to CT, President Obama stressed the ‘undeniable’ link between oppression and terrorism:

‘When people are oppressed, and human rights are denied — particularly along sectarian lines or ethnic lines, when dissent is silenced, it feeds violent extremism…’

See here [13] for the President’s full remarks and the summit’s Ministerial Meeting S [14]tatement [14] for a full overview. On the other hand, critics of the meeting argued that the conference was too narrowly focussed, including that it looked at soft power to the exclusion of hard power [15], at individuals and not broader extremist group strategies [16], and at Muslims over all forms of violent extremists [17].

Turning to the Asia–Pacific, Michael Kugelman has a new Foreign Policy piece [18] setting out three ways that ISIS could make inroads in the region. On China, the Australian Security Magazine provided a succinct analysis [19] of how the rising terrorism threat plays out in the unique Chinese context. In particular, China’s Turkic speaking, predominantly Muslim Uyghur minority has received considerable attention, with China currently carrying out a terrorism crackdown [20] in the Uyghur homeland of Xinjiang. The Diplomat discusses [21] how Afghanistan’s arrest and transfer of Muslim Uyghur militants to China demonstrates Afghanistan’s willingness to deepen CT cooperation with the nation, a sign of China’s ever-growing engagement with the Central Asian state.

Finally, the global wave of new CT legislation continues. Pakistan has ordered that unless mobile phone users to confirm their identities via fingerprints [22] to be added to a CT database, their service will be severed. These measures were a response to the accumulation of untraceable cell phones, including those used by Taliban militants who killed 150 students in December last year. Egypt has passed new anti-terror laws [23] that broaden the meaning of ‘terrorist’ and gives authorities sweeping powers, including banning activities and freezing funds of deemed ‘terrorists’. In Canada, the anti-terrorism bill dubbed ‘Bill C-51’ passed the second reading [24], taking the country closer to the expansion of powers of national security agencies and police to foil terrorist plots. See here [25] for details and Prime Minister Stephen Harper’s case for the bill, and here [26] for details of a joint statement signed by prominent Canadians (including four former PMs) calling for greater oversight.

Coming up, the Parliamentary Committee on Intelligence and Security will be delivering a report on the hotly debated [27] metadata retention bill tomorrow. Speaking at the Tech Leaders conference on Sunday, AFP Assistant Commissioner made the case that access to metadata and telecommunications data is a ‘vital aspect of all serious crime investigations’ [28]. For a look at both sides of the argument, the CSO has conveniently provided a two-part series, including the cases for [29] and against [30] metadata retention.

Stephanie Huang is an intern at ASPI. Image courtesy of Flickr user LL Twistiti [31].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/ct-scan-2/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2015/02/1562338649_18161d7964_z.jpg

[2] Martin Place Siege Review: http://www.dpmc.gov.au/sites/default/files/publications/170215_Martin_Place_Siege_Review_1.pdf

[3] Review of Australia’s Counter-Terrorism Machinery: http://www.dpmc.gov.au/pmc/publication/review-commonwealths-counter-terrorism-arrangements

[4] National Security Statement: http://www.smh.com.au/federal-politics/political-news/prime-minister-tony-abbotts-full-national-security-statement-20150223-13m2xu.html

[5] risk alienating the Islamic community: http://www.theage.com.au/federal-politics/political-opinion/tony-abbotts-speech-may-increase-muslim-feelings-of-alienation-20150223-13mnv0.html

[6] ‘good in theory but a bit messy in practice’: http://www.theaustralian.com.au/opinion/columnists/good-in-theory-but-a-bit-messy-in-practice/story-e6frg76f-1227236148999

[7] tougher laws are not necessarily more effective. : http://www.theage.com.au/comment/pms-terrorism-talk-all-rhetoric-no-new-vision-20150223-13mcbm.html

[8] analysis: http://www.theaustralian.com.au/subscribe/news/1/index.html?sourceCode=TAWEB_WRE170_a&mode=premium&dest=http://www.theaustralian.com.au/news/features/terror-resistant-tactics/story-e6frg6z6-1227236133036&memtype=anonymous

[9] announced: http://www.attorneygeneral.gov.au/Mediareleases/Pages/2015/FirstQuarter/20-February-2015-Combating-terrorist-propaganda-online.aspx

[10] wrote: http://andrewzammit.org/2015/02/20/online-radicalisation-how-much-does-it-matter/

[11] noted: http://theglobalobservatory.org/2015/02/global-fight-extremism-cve-terrorism/

[12] ‘root causes’: http://www.whitehouse.gov/the-press-office/2015/02/18/fact-sheet-white-house-summit-countering-violent-extremism

[13] here: http://www.whitehouse.gov/the-press-office/2015/02/19/remarks-president-summit-countering-violent-extremism-february-19-2015

[14] Ministerial Meeting S: http://www.state.gov/j/ct/cvesummit/releases/237673.htm

[15] soft power to the exclusion of hard power: http://www.washingtonpost.com/opinions/dont-just-counter-violent-extremists-defeat-them/2015/02/23/dad3e52a-bb68-11e4-8668-4e7ba8439ca6_story.html?wpisrc=nl_opinions&wpmm=1

[16] at individuals and not broader extremist group strategies: http://warontherocks.com/2015/02/the-strategy-of-savagery-explaining-the-islamic-state/?singlepage=1

[17] Muslims over all forms of violent extremists: http://www.muslimadvocates.org/files/Countering-Violent-Extremism.pdf

[18] piece: http://foreignpolicy.com/2015/02/20/how-isis-could-become-a-potent-force-in-south-asia/

[19] analysis: https://www.australiansecuritymagazine.com.au/2015/02/rise-terrorism-china-war-terror/

[20] terrorism crackdown: http://chinadigitaltimes.net/2015/02/xinjiang-violence-global-fight-terrorism/

[21] discusses: http://thediplomat.com/2015/02/afghanistan-transfers-captured-uyghur-militants-to-china/

[22] mobile phone users to confirm their identities via fingerprints: http://www.washingtonpost.com/world/asia_pacific/pakistanis-face-a-deadline-surrender-fingerprints-or-give-up-cellphone/2015/02/23/de995a88-b932-11e4-bc30-a4e75503948a_story.html

[23] passed new anti-terror laws: http://www.middle-east-online.com/english/?id=70301

[24] passed the second reading: #http://www.huffingtonpost.ca/2015/02/23/rafe-mair-anti-terrorism-bill-c51_n_6739034.html

[25] here: http://www.cbc.ca/news/politics/stephen-harper-makes-his-case-for-new-powers-to-combat-terror-1.2937602

[26] here: http://www.huffingtonpost.ca/2015/02/19/former-pms-call-for-bette_n_6713018.html

[27] hotly debated: https://theconversation.com/its-not-what-but-who-you-connect-with-in-metadata-retention-37225

[28] vital aspect of all serious crime investigations’: http://www.theaustralian.com.au/business/technology/data-retention-absolutely-necessary-assistant-commissioner-tim-morris/story-e6frgakx-1227236067727

[29] for: http://www.cso.com.au/article/568834/case-metadata-retention/?utm_medium=www.cso.com.au&utm_source=article_body_related_article

[30] against: http://www.cso.com.au/article/568923/case-against-metadata-retention-part-2/

[31] LL Twistiti: https://www.flickr.com/photos/twistiti/1562338649

Copyright © 2024 The Strategist. All rights reserved.