- The Strategist - https://www.aspistrategist.org.au -

CT Scan

Posted By on March 5, 2015 @ 2:30 pm

CCTV in Australian schools? [1]This week’s update includes CCTV for Australian schools, British extremism, China’s CT laws, the FBI’s online fight against IS, white supremacy, and inside the mind of a terrorist.

Australian schools categorised as being at risk of racially- or religiously-motivated attacks could have security guards and closed-circuit TVs as part of an $18 million investment in the Schools Security Program announced [2] by Justice Minister Michael Keenan this week. For some Jewish schools, rising anti-Semitism has made those measures necessary [3]. In other Australian developments, the Iraqi city of Mosul in Iraq has been added to the list [4] of banned travel locations under last year’s Foreign Fighters laws [5]—you can travel there but only for a ‘legitimate’ purpose. And finally, the inquiry into the metadata retention bill culminated in a bipartisan report [6] released last Friday, recommending that the bill requiring telecommunications companies to keep certain data for two years be passed with increased oversight mechanisms.

Meanwhile in the UK, British extremism has come under the microscope. The identification of ‘Jihadi John’ [7] as Mohammed Emwazi and revelations that he was known to MI5 since 2009 have fuelled fierce debate [8] about MI5’s CT strategies (see discussion here [9] and here [10]). Most controversially, advocacy group CAGE’s research director Asim Qureshi described [11] Emwazi as a ‘beautiful young man’ and claimed MI5 harassment had contributed to his radicalisation. Such statements attracted fierce condemnation, including from Prime Minister David Cameron [12] and Mayor of London Boris Johnson [13]. CAGE subsequently released an email trail [14] and an audio interview [15] between it and Emwazi detailing his descent into radicalisation, including the statement that ‘9/11 was wrong’. Emwazi’s identification also prompted an inquiry [16] into schools previously attended by British foreign fighters and a debate about the adequacy of British CT policies [17], including the use of biometrics. See Defense One’s story [18] for more on biometrics and CT.

In the Asia-Pacific, China is in the midst of drafting wide-ranging CT laws [19] that step up intelligence gathering and sharing. Reforms include requirements that all tech firms install ‘backdoors’ and provide both communications records and encryption keys to law-enforcement agencies. Xinhua indicated that the law sought to balance CT and human rights [20], as ‘global terrorism should not be a warrant for retreat on citizens’ rights’. But Reuters’ Michael Martina and Krista Hughes report [21] that the laws may compromise the security and privacy of data of anyone engaged in business with China. President Obama believes [22] the law must be changed if China wants ‘to do business with the United States’. See here [23] for China’s response.

Turning now to Islamic State, the FBI has conceded that it’s ‘losing the battle’ [24] against the online allure of the extremist organisation. Whilst the United States had produced ‘an effective counter-narrative…the sheer volume (of Islamic State’s online messaging) eclipses our effort’. Writing on Defense One, Simon Cottee argues [25] that IS’s videos of ‘shock and gore’ have the advantage over official US counter-narratives of ‘mock and bore’. Further, IS has a large online network of ‘fanboys’ [26] and an emotionally poignant narrative (‘Muslims are being killed’) that current counter-narratives lack.

Can other fields offer useful insights into developing deradicalisation strategies? In Canada, reformed white-supremacist Daniel Gallant drew on his experiences [27] in the recently-launched online Islamic State deradicalisation program, ‘Extreme Dialogue [28]’. The program targets school children at risk of radicalisation by Islamic State, through providing online resources including short films and educational resources:

The common denominator is that both (Islamic state and white supremacist) narratives include conspiracy theory about Zionism, that there’s a specific group of Jewish people that are controlling the world…What we’re seeing with the ISIS and the jihadist-type narrative currently is almost like a replication of the stuff that was going in the 80s and 90s…

Ever delved into the mind of a violent extremist? Aimen Dean, a founding member of al Qaeda who switched to becoming a British spy, documents his experiences in this BBC interview [29]. Similarly, former Islamic extremist and now chairman of the CT organisation Quilliam [30], Maajid Nawaz identified alienation and ‘charismatic recruiters’ as crucial radicalisation risk factors in this NPR podcast (4mins) [31].

Lastly, for some weekend reading, Anita McKonea reviewed [32] the fiction novel [33] Confessions of a Terrorist, penned by terrorism expert Richard Jackson. The novel weaves factual information into a story about a Middle Eastern violent extremist and a British intelligence officer. Aiming to go beyond the ‘good guy/bad guy mindset’, McKonea writes that the book provides uncomfortable answers to the question of why a person becomes a terrorist.

Stephanie Huang is an intern at ASPI. Image courtesy of Flickr user PeacockArmageddon [34].



Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/ct-scan-3/

URLs in this post:

[1] Image: http://www.aspistrategist.org.au/wp-content/uploads/2015/03/8665223087_0fbdc453da_z.jpg

[2] announced: http://www.sbs.com.au/news/article/2015/03/02/security-expanded-more-50-schools

[3] rising anti-Semitism has made those measures necessary: http://www.brisbanetimes.com.au/queensland/antisemitism-makes-school-terrorism-protection-necessary-spokesman-20150302-13swqz.html

[4] added to the list: http://www.sbs.com.au/news/article/2015/03/02/australians-banned-travel-mosul

[5] Foreign Fighters laws: http://www.comlaw.gov.au/Details/C2014A00116

[6] bipartisan report: http://www.abc.net.au/news/2015-02-27/metadata-retention-laws-joint-intelligence-security-committee/6269396

[7] identification of ‘Jihadi John’: http://www.smh.com.au/world/jihadi-john-named-as-mohammed-emwazi-from-london-20150226-13q66a.html

[8] fierce debate: http://www.independent.co.uk/news/uk/home-news/jihadi-john-mi5-accused-of-letting-jihadists-slip-through-the-net-under-relaxed-antiterror-laws-10077899.html

[9] here: http://www.theguardian.com/world/2015/feb/26/mi5-mohammed-emwazi-serious-questions

[10] here: http://www.theguardian.com/commentisfree/2015/feb/27/mi5-mohammed-emwazi-security-failures-terrorists-free

[11] described: http://t.co/B4WUbTjMNq

[12] Prime Minister David Cameron : http://www.telegraph.co.uk/news/politics/david-cameron/11439605/David-Cameron-condemns-Cage-for-blaming-MI5-over-radicalisation-of-Jihadi-John.html

[13] Mayor of London Boris Johnson: http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/11446473/Boris-Johnson-in-angry-confrontation-with-Cage-director-over-Jihadi-John.html

[14] email trail: http://cageuk.org/article/emwazi-emails-cage-releases-its-correspondences-emwazi-full

[15] audio interview: http://www.theguardian.com/uk-news/2015/mar/02/mohammed-emwazi-isis-mi5-warning-2009-tapes-transcripts

[16] inquiry: http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/11443501/Jihadi-John-Schools-being-investigated-over-pupils-fighting-abroad.html

[17] British CT policies: http://www.theguardian.com/politics/blog/live/2015/mar/02/david-camerons-speech-on-housing-politics-live-blog

[18] Defense One’s story: http://www.defenseone.com/technology/2015/02/jihadi-john-and-future-biometrics-terror-hunt/106263/

[19] CT laws: http://english.cntv.cn/2015/02/26/VIDE1424899927428780.shtml

[20] balance CT and human rights: http://www.thehindu.com/news/international/chinas-draft-antiterror-law-high-on-privacy-human-rights/article6937110.ece

[21] report: http://uk.reuters.com/article/2015/02/27/uk-china-security-idUKKBN0LV19M20150227

[22] believes: http://www.reuters.com/article/2015/03/02/us-usa-obama-china-idUSKBN0LY2H520150302

[23] here: http://english.cntv.cn/2015/03/04/ARTI1425451057713132.shtml

[24] ‘losing the battle’: http://abcnews.go.com/News/fbi-losing-battle-stop-isis-radicalization-online/story?id=29241652

[25] argues: http://www.defenseone.com/threats/2015/03/us-isis-and-war-narratives-s-being-lost/106407/?oref=d-skybox

[26] fanboys’: http://www.theatlantic.com/international/archive/2014/06/isis-iraq-twitter-social-media-strategy/372856/

[27] drew on his experiences: http://www.cbc.ca/news/canada/british-columbia/isis-recruitment-former-white-supremacist-daniel-gallant-fights-radicalization-1.2976162

[28] Extreme Dialogue: http://extremedialogue.org/

[29] interview: http://www.bbc.com/news/magazine-31700894

[30] Quilliam: http://www.quilliamfoundation.org/

[31] NPR podcast (4mins): http://www.npr.org/2015/02/27/389585305/alienation-and-charismatic-recruiters-among-keys-to-radicalization

[32] reviewed: http://www.scoop.co.nz/stories/CU1503/S00041/review-of-confessions-of-a-terrorist-a-novel.htm

[33] novel: http://www.amazon.com/Confessions-Terrorist-Novel-Richard-Jackson/dp/1783600020

[34] PeacockArmageddon: https://www.flickr.com/photos/harby/8665223087

Copyright © 2016 The Strategist. All rights reserved.