Search results for: root causes of terrorism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1462

Search results for: root causes of terrorism

1372 The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia

Authors: Aulia Dwi Nastiti

Abstract:

A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet.

Keywords: communication pattern, counterterrorism, darknet, extremist groups, terrorism

Procedia PDF Downloads 292
1371 A Computational Cost-Effective Clustering Algorithm in Multidimensional Space Using the Manhattan Metric: Application to the Global Terrorism Database

Authors: Semeh Ben Salem, Sami Naouali, Moetez Sallami

Abstract:

The increasing amount of collected data has limited the performance of the current analyzing algorithms. Thus, developing new cost-effective algorithms in terms of complexity, scalability, and accuracy raised significant interests. In this paper, a modified effective k-means based algorithm is developed and experimented. The new algorithm aims to reduce the computational load without significantly affecting the quality of the clusterings. The algorithm uses the City Block distance and a new stop criterion to guarantee the convergence. Conducted experiments on a real data set show its high performance when compared with the original k-means version.

Keywords: pattern recognition, global terrorism database, Manhattan distance, k-means clustering, terrorism data analysis

Procedia PDF Downloads 385
1370 Terrorist Financing through Ilegal Fintech Hacking: Case Study of Rizki Gunawan

Authors: Ishna Indika Jusi, Rifana Meika

Abstract:

Terrorism financing method in Indonesia is developing at an alarming rate, to the point, it is now becoming more complex than before. Terrorists traditionally use conventional methods like robberies, charities, and courier services to fund their activities; today terrorists are able to utilize modern methods in financing their activities due to the rapid development in financial technology nowadays; one example is by hacking an illegal Fintech Company. Therefore, this research is conducted in order to explain and analyze the consideration behind the usage of an illegal fintech company to finance terrorism activities and how to prevent it. The analysis in this research is done by using the theory that is coined by Michael Freeman about the reasoning of terrorists when choosing their financing method. The method used in this research is a case study, and the case that is used for this research is the terrorism financing hacking of speedline.com in 2011 by Rizki Gunawan. Research data are acquired from interviews with the perpetrators, experts from INTRAC (PPATK), Special Detachment 88, reports, and journals that are relevant to the research. As a result, this study found that the priority aspects in terms of terrorist financing are security, quantity, and simplicity while obtaining funds.

Keywords: Fintech, illegal, Indonesia, technology, terrorism financing

Procedia PDF Downloads 170
1369 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy

Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi

Abstract:

Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.

Keywords: terrorism, economy, Boko Haram, Nigeria

Procedia PDF Downloads 258
1368 Effect of Eddy Irrigant Activation on Cleanliness of the Root Canal Wall during Pulpectomy of Primary Teeth

Authors: Rasha Sharaf, Nehal Sharaf

Abstract:

Pulpectomy of primary teeth aims to remove the necrotic pulp tissue from the infected root canal and clean the root canal walls from any remnant of pulp tissue. Different irrigant activation systems have been recently used, and one of these devices is the Eddy which helps in removal of smear layer and improves the intimate contact between the filling material and the root canal wall. Aim: To evaluate the efficacy of Eddy in cleanliness of the root canal during pulpectomy of primary teeth. Materials and methods: 45 freshly extracted primary anterior teeth were divided into 3 equal groups, in the 1st group sodium hypochlorite only was used during pulpectomy, in the 2nd group irrigation using sodium hypochlorite with file agitation was performed and in the 3rd group sodium hypochlorite was used with Eddy for irrigant activation. All samples were sectioned longitudinally and scanned using scanning electron microscope to evaluate the cleanliness of the root canals. Results: It was found that Eddy showed high efficacy in removal of smear layer during pulpectomy of primary teeth.

Keywords: Eddy, irrigant activation, irrigation, pulpectomy

Procedia PDF Downloads 151
1367 ASEAN Our Eyes: A Strategic Information Exchange Platform on Counter-Terrorism

Authors: Nila Febri Wilujeng, Helda Risman

Abstract:

Enjoying stable security within its region for the last 50 years, ASEAN nowadays contends with the global context emerging dynamically, which brings about multidimensional challenges and threats such as terrorism, radicalism, armed rebellion, hijacking, and other non-traditional threats. Dealing with these circumstances, ASEAN member states tighten its capacity by enhancing regional cooperation and strategic information exchange among ASEAN member states so-called ASEAN Our Eyes. This initiative adopted for the sake of forestalling any possible threat posed by violent extremism, radicalization, and terrorism through timely strategic information exchange among ASEAN member states. By using qualitative method, this paper will utilize regional security complex and international cooperation theories in analyzing the process to examine ASEAN Our Eyes based on its terms of reference. As a result, it portrays that ASEAN Our Eyes is able to undermine the gaps in the realm of strategic information exchange in monitoring the movement of violent extremism, radicalism, foreign terrorist fighters, and crime-terror nexus. However, it remains premature as a strategic measure to encounter those threats in the years to come.

Keywords: regional cooperation, counter-terrorism, ASEAN our eyes, strategic information exchange

Procedia PDF Downloads 208
1366 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 276
1365 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces

Authors: Igor Pejic

Abstract:

The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.

Keywords: asymmetrical warfare, conventional forces, security, terrorism

Procedia PDF Downloads 262
1364 Anatomical and Histological Characters of Cymbopogon nardus Roots and Its Mutagenic Properties

Authors: Pravaree Phuneerub, Chanida Palanuvej, Nijsiri Ruangrungsi

Abstract:

Cymbopogon nardus Rendel (Family Gramineae) is commonly known as citronella grass. The dried root of C. nardus is used for antipyretic, anti-inflammation, anti-analgesic and anticancer in traditional Thai medicine. Transverse sectional and pulverized C. nardus root were illustrated. The volatile oil was extracted from oil gland by hydrodistillation and analysed by GC/MS. Cymbopogon nardus root was exhaustively extracted by continuously maceration in ethanol and water respectively. The mutagenic and antimutagenic properties of the ethanol extract and fractionated water extract of C. nardus root were evaluated by Ames assay using the S. typhimurium strains TA98 and TA100 as the models. The result indicated that the anatomical character of root transverse section displayed epidermis, parenchyma, oil gland, phloem, xylem vessel, endodermis and pith. Histological characters of root powder showed parenchyma containing oleoresin, parenchyma in longitudinal view, reticulate vessel, annular vessel, starch granules and fragment of fiber. The root volatile oil was rich in sesquiterpenes dominated by elemol (22.87%) and alpha-eudesmol (16.09%). For mutagenic activity, the both extracts of C. nardus were no mutagenic toward S. typhimurium strains TA98 and TA100. Furthermore, the ethanol extract and fractionated water extract of C. nardus root demonstrated strong antimutagenic effect against of nitrite treated 1-aminopyrene to S. typhimurium strains TA98 and TA100. This present investigation suggested that the dried root extract of C. nardus can be further developed as promising antimutagenic agent.

Keywords: Cymbopogon nardus, volatile oil analysis, mutagenic, antimutagenic effect, Ames Salmonella assay

Procedia PDF Downloads 343
1363 Growing Acts of Terrorism in Local Conflicts: A Dire Need for International Attention

Authors: Yusuf Abubakar Mamud

Abstract:

Highlighting the imperatives of local conflicts considering the dangerous dimensions of terrorism they are assuming in Africa has not attracted serious academic and political attention. The discourse about conflict in Africa was discussed within five identified conflict zones in the continent. The threats from these local conflicts are diverse and complex and the acts of terrorism in these local conflicts are driven by certain attitudes and behaviours linked to the African leadership. The paper examined and noted that the current conflict resolution model of the African Union (AU) was robust with requisite institutions to address the trends in local conflicts. However, it was observed that the AU peace and security framework lacked the requisite structural and technical capabilities to proactively address the drivers of local conflicts in Africa. It was found that the persistence of local conflicts in the African region may deny her the opportunities of achievement of the targets envisioned in the Sustainable Development Goals (SDGs). Consequently, the paper called on the international community to support Africa through provision of capacity. It urged the African leaders themselves to develop the political will to ensure that all issues concerning peace and security in the continent were guided by the provisions of the AU Constitutive Act. The need to strengthen the APRM in the light of the current trends in local conflicts was also highlighted.

Keywords: conflicts, local conflicts, terrorism, sustainable development

Procedia PDF Downloads 275
1362 Global and Domestic Response to Boko Haram Terrorism on Cameroon 2014-2018

Authors: David Nchinda Keming

Abstract:

The present study is focused on both the national and international collective fight against Boko Haram terrorism on Cameroon and the rule played by the Lake Chad Basin Countries (LCBCs) and the global community to suffocate the sect’s activities in the region. Although countries of the Lake Chad Basin include: Cameroon, Chad, Nigeria and Niger others like Benin also joined the course. The justification for the internationalisation of the fight against Boko Haram could be explained by the ecological and international climatic importance of the Lake Chad and the danger posed by the sect not only to the Lake Chad member countries but to global armed, civil servants and the international political economy. The study, therefore, kick start with Cameroon’s reaction to Boko Haram’s terrorist attacks on its territory. It further expounds on Cameroon’s request on bilateral diplomacy from members of the UN Security Council for an international collective support to staple the winds of the challenging sect. The study relies on the hypothesis that Boko Haram advanced terrorism on Cameroon was more challenging to the domestic military intelligence thus forcing the government to seek for bilateral and multilateral international collective support to secure its territory from the powerful sect. This premise is tested internationally via (multilateral cooperation, bilateral response, regional cooperation) and domestically through (solidarity parade, religious discourse, political manifestations, war efforts, the vigilantes and the way forward). To accomplish our study, we made used of the mixed research methodologies to interpret the primary, secondary and tertiary sources consulted. Our results reveal that the collective response was effectively positive justified by the drastic drop in the sect’s operations in Cameroon and the whole LCBCs. Although the sect was incapacitated, terrorism remains an international malaise and Cameroon hosts a fertile ground for terrorists’ activism. Boko Haram was just weakened and not completely defeated and could reappear someday even under a different appellation. Therefore, to absolutely eradicate terrorism in general and Boko Haram in particular, LCBCs must improve their military intelligence on terrorism and continue to collaborate with advanced experienced countries in fighting terrorism.

Keywords: Boko Haram, terrorism, domestic, international, response

Procedia PDF Downloads 152
1361 The Crossroads of Corruption and Terrorism in the Global South

Authors: Stephen M. Magu

Abstract:

The 9/11 and Christmas bombing attacks in the United States are mostly associated with the inability of intelligence agencies to connect dots based on intelligence that was already available. The 1998, 2002, 2013 and several 2014 terrorist attacks in Kenya, on the other hand, are probably driven by a completely different dynamic: the invisible hand of corruption. The World Bank and Transparency International annually compute the Worldwide Governance Indicators and the Corruption Perception Index respectively. What perhaps is not adequately captured in the corruption metrics is the impact of corruption on terrorism. The World Bank data includes variables such as the control of corruption, (estimates of) government effectiveness, political stability and absence of violence/terrorism, regulatory quality, rule of law and voice and accountability. TI's CPI does not include measures related to terrorism, but it is plausible that there is an expectation of some terrorism impact arising from corruption. This paper, by examining the incidence, frequency and total number of terrorist attacks that have occurred especially since 1990, and further examining the specific cases of Kenya and Nigeria, argues that in addition to having major effects on governance, corruption has an even more frightening impact: that of facilitating and/or violating security mechanisms to the extent that foreign nationals can easily obtain identification that enables them to perpetuate major events, targeting powerful countries' interests in countries with weak corruption-fighting mechanisms. The paper aims to model interactions that demonstrate the cost/benefit analysis and agents' rational calculations as being non-rational calculations, given the ultimate impact. It argues that eradication of corruption is not just a matter of a better business environment, but that it is implicit in national security, and that for anti-corruption crusaders, this is an argument more potent than the economic cost / cost of doing business argument.

Keywords: corruption, global south, identification, passports, terrorism

Procedia PDF Downloads 421
1360 Salicylic Acid Signalling in Relation to Root Colonization in Rice

Authors: Seema Garcha, Sheetal Chopra, Navraj Sarao

Abstract:

Plant hormones play a role in internal colonization by beneficial microbes and also systemic acquired resistance. They define qualitative and quantitative nature of root microbiome and also influence dynamics of root rhizospheric soil. The present study is an attempt to relate salicylic acid (signal molecule) content and qualitative nature of root endophytes at various stages in the growth of rice varieties of commercial value- Parmal 121 and Basmati 1121. Root seedlings of these varieties were raised using tissue culture techniques and then they were transplanted in the fields. Cultivation was done using conventional methods in agriculture. Field soil contained 0.39% N, 75.12 Kg/hectare of phosphorus and 163.0 Kg/hectare of potassium. Microfloral profiling of the root tissue was done using the selective microbiological medium. The salicylic acid content was estimated using HPLC-Agilent 1100 HPLC Series. Salicylic acid level of Basmati 1121 remained relatively low at the time of transplant and 90 days after transplant. It increased marginally at 60 days. A similar trend was observed with Parmal 121 as well. However, Parmal variety recorded 0.935 ug/g of salicylic acid at 60 days after transplant. Salicylic acid content decreased after 90 days as both the rice varieties remained disease free. The endophytic root microflora was established by 60 days after transplant in both the varieties after which their population became constant. Rhizobium spp dominated over Azotobacter spp. Genetic profiling of endophytes for nitrogen-fixing ability is underway.

Keywords: plant-microbe interaction, rice, root microbiome, salicylic acid

Procedia PDF Downloads 200
1359 The Nexus between Socio-Economic Inequalities and the Talibanization in Pakistan’s Federally Administrated Tribal Areas

Authors: Sajjad Ahmed

Abstract:

Since September 2001, the Federally Administered Tribal Areas (FATA) have become a hotbed of Talibanization. The eruption of Talibanization has caused a catastrophic human and socio-economic cost on Pakistan ever since. The vast majority of extant studies have tended to focus on assessing the current disparaging and destructive condition of FATA as a product of the notorious 'Global War on Terrorism' and its consequences in the form of the Afghan war and the rising socio-political unrest in the region. This, however, is not the case. This study argues that the Talibanization has not happened overnight, the magma of current militant volcanic outburst has been stockpiled since the inception of Pakistan in 1947. The study claims that the Talibanization is the expression of the conflict between the privileged and the underprivileged. The prevailing situation in FATA warrants an in-depth analysis of the problem. By using a qualitative and quantitative research principle, this paper attempts to critically examine 'How is Talibanization in Pakistan connected with the political, social, and economic conditions in FATA?' The critical analyses of this study would assist to policymakers in order to formulate all-encompassing anti-radicalization policies to effectively root out Talibanization in FATA. This research intends to explore the undiscovered root causes of the problem and to suggest remedial measures.

Keywords: exclusion, FATA (Federally Administrated Tribal Areas), inequalities, marginalization, Pakistan, socio-economic, talibanization

Procedia PDF Downloads 137
1358 Narrative Therapy as a Way of Terrorist Rehabilitation at Mohammad Bin Naif Counselling and Care Center: A Case Study

Authors: Yasser Almazrua

Abstract:

Terrorism is a multidimensional phenomenon that has increased recently. Many countries started combating terrorism through security forces; however, there has been relatively little attention given to rehabilitation programs for people involved in such terrorism acts. In Saudi Arabia, after facing so many terrorist attacks, they started understanding and countering terrorism differently by establishing Mohammad bin Naif Counselling and Care Center in 2006. The center now is considered one of the top experience centers in the world for terrorist rehabilitation and ideology correction. The center offers different programs such as training, educational, social, art and psychological programs. One of the approaches that have been used by psychological experts at the center is Narrative Therapy. It is a therapeutic approach that focuses on the ability of the client to identify their personal life story. The client during therapy works as a storyteller where he or she gets insight, meaning and better understanding of their own lives. Because each client at the center had a story, it can be better fit method for rehabilitation towards healing and personal development. The case describes a 34-years-old man who was involved in some terrorism activities locally by technically and financially supporting a terrorist group related to Al-Qaida. The beneficiary joined Mohammad bin Naif Counseling and Care Center after serving his sentence. Informed of consent has been given to the beneficiary before starting the therapeutic program. Both qualitative and quantitative data on the beneficiary are collected by self-reporting during the initial session, and by using a psychological measurement. The result found that the beneficiary was not insightful about himself, and he had a high level of repression which relatedly moved him to be targeted for recruitment in the terrorist group. With rehabilitation and by using the therapeutic approach, the beneficiary improved on the level of insight, specifically about himself and also about the experience. This case illustrates the importance of considering the effect of Narrative Therapy in terrorist rehabilitation programs.

Keywords: narrative therapy, rehabilitation, Saudi Arabia, terrorism

Procedia PDF Downloads 294
1357 Cone Beam Computed Tomography: A Useful Diagnostic Tool to Determine Root Canal Morphology in a Sample of Egyptian Population

Authors: H. El-Messiry, M. El-Zainy, D. Abdelkhalek

Abstract:

Cone-beam computed tomography (CBCT) provides high-quality 3-dimensional images of dental structures because of its high spatial resolution. The study of dental morphology is important in research as it provides information about diversities within a population. Many studies have shown different shapes and numbers of roots canals among different races, especially in molars. The aim of this study was to determine the morphology of root canals of mandibular first and third molars in a sample of Egyptian population using CBCT scanning. Fifty mandibular first Molars (M1) and fifty mandibular third (M3) extracted molars were collected. Thick rectangular molds were made using pink wax to hold the samples. Molars were embedded in the wax mold by aligning them in rows leaving arbitrary 0.5cm space between them. The molds with the samples in were submitted for CBCT scan. The number and morphology of root canals were assessed and classified according to Vertucci's classification. The mesial and the distal roots were examined separately. Finally, data was analyzed using Fisher exact test. The most prevalent mesial root canal frequency in M1 was type IV (60%) and type II (40 %), while M3 showed prevalence of type I (40%) and II (40%). Distal root canal morphology showed prevalence of type I in both M1 (66%) and M3 (86%). So, it can be concluded that CBCT scanning provides supplemental information about the root canal configurations of mandibular molars in a sample of Egyptian population. This study may help clinicians in the root canal treatment of mandibular molars.

Keywords: cone beam computed tomography, mandibular first molar, mandibular third molar, root canal morphology

Procedia PDF Downloads 317
1356 Deradicalization for Former Terrorists through Entrepreneurship Program

Authors: Jamal Wiwoho, Pujiyono, Triyanto

Abstract:

Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks.

Keywords: deradicalization, terrorism, terrorists, entrepreneurship

Procedia PDF Downloads 268
1355 Terrorism and National Development: A Critique of Its Aftermath on Educational Attainment

Authors: David Chapola Nggada

Abstract:

Although the concept of terrorism is not a new phenomenon to Nigeria, the protracted terrorist activities experiencing in the north-eastern part of the country since 2009, had left an indelible mark on virtually every aspects of lives whether directly or indirectly, particularly the educational sector. Indeed, since the abduction of over 200 schoolgirls at Chibok in 2014 by the insurgence, education had witnessed a setback as most school remains closed for sometimes. The aftermath of this development on education and its future multiplier effect on national development is a source of concern. Consequently, this paper is designed to examine the consequences of terrorism on educational attainment and national development among the Chibok community of Borno State. The technique employed involves a mixture of both qualitative and quantitative research work on a sample size of 79 secondary school students currently displaced from Chibok, Damboa and Askira-Uba, now residing as internally displaced persons(IDPs) in Biu, Gombe, Maiduguri. A random sample technique is used. Structured and semi-unstructured questionnaire were administered. The result shows that, a significant number of students over these years, lacked access to education and this posed a great danger to national development. Recommendations towards reinvigorating education as a panacea to social, economic cum political vices were articulated. Concerted effort should be made to create confidence in the community.

Keywords: education, effect, terrorism, national, development

Procedia PDF Downloads 259
1354 Financial Risk Tolerance and Its Impact on Terrorism-Tourism Relation in Pakistan

Authors: Sania Sana, Afnan Nasim, Usman Malik, Maroof Tahir

Abstract:

The aim of this research is to scrutinize the interdependent relationship between terrorism and behavioral changes in the tourism activities in Pakistan with the moderating impact of a unique variable titled 'Financial Risk Tolerance'. The article looks at the inter-reliant relationship with the alleged political and economic aspects and behavioral changes in the tourists and the consumers by these variables over time. The researchers used many underlying theories like the catastrophe theory by (Svyantek, Deshon and Siler 1991), information integration theory (Anderson 1981, 1982) and prospect theory (Kahneman and Tversky 1979) to shape the study’s framework as per tourist decision making model. A sample of around 110 locals was used for this purpose and the data was gathered by convenience sampling. The responses were analyzed using regression analysis. The results exhibited how terrorism along with the influence of financial risk tolerance had inclined a behavioral shift in the travelling patterns and vacation destination choice of the local tourists. Lastly, the paper proposes a number of suggestive measures for the tourism industry and the legislative bodies to ensure the safety of travelers and to boost the tourist activities in the vacation industry of Pakistan.

Keywords: terrorism, tourism, financial risk tolerance, tourist decision-making, destination choice

Procedia PDF Downloads 236
1353 The Threat of International Terrorism and Its Impact on UK Migration Policy and Practice

Authors: Baljit Soroya

Abstract:

Transnational communities are as a consequence of greater mobility of people, globalization and digitization have had a major impact on international relations and diasporas in the context of external conflicts. To a significant extent conflicts are becoming deterritorialised and informed by both internal (state politics) and external (foreign policy) players such as in Iraq and Syria leading to forced migration of unprecedented levels within the last two decades. The situation of forced migrants has, it is suggested, worsened as a consequence of the neo-liberal policies and requirements of organizations such as the European Bank. A case example of this being that of Greece, and the exacerbation of insecurity for Greek nationals and the demonization of refugees seeking sanctuary. This has been as a consequence, in part, of the neoliberal dogma of the European Bank. The article analyses the complex intersection of the real and perceived threats of international terrorism and the manner in which UK migration policy and Practice is unfolding. The policy and practice developments are explored in the context of the shift in politics in both the UK and wider Europe to the far right and the drift of main stream political parties to the right. In many cases, the mainstream political groupings, have co-opted the fears as presented by far right organization for political their own political gains, such as in the UK and France In its analysis it will be argued that, whilst international terrorism is an issue of concern, however in the context of the UK it is not of the same scale as the effects of climate change or indeed domestic violence. Given that, the question has to be asked why the threat of international terrorism is having such an impact on UK migration policy and practice and, specifically refugees. Furthermore, it is argued that this policy and practice are being formulated within a narrative that portrays migrants as the problem both in relation to terrorism and the disenfranchisement of ‘ordinary white communities’. The intersectionality of social, economic inequalities, fear of international terrorism, increase in conflicts and the political climate have contributed to a lack of trust of political establishments that have in turn sought to impress the public with their anti-immigrant rhetoric and policy agendas. The article ends by suggesting that whilst politics and political affiliations have become fractured there are nevertheless spaces for collective action, particularly in relation to issues of refugees.

Keywords: international terrorism, migration policy, conflict, media, community, politics

Procedia PDF Downloads 333
1352 'Propaganda by the Deed', 'Armed Propaganda' and Mass Mobilization: The Missing Link in the Left-Wing Terrorist Thinking

Authors: Ersun N. Kurtulus

Abstract:

One of the strategic goals of left-wing terrorism, both in its Anarchist and Marxist-Leninist forms, was mobilization of masses as a first step in launching a revolution. However, in the canonical texts of left-wing terrorist literature (such as the works of Brousse, Nachaev, Bakunin, Kropotkin, Most, Heinzen, Guevara and Marighella) it is not clear how resort to terrorist tactics such as assassinations or bomb attacks will lead to mobilization of masses. This link is usually presumed and taken for granted. However, in other, less known terrorist texts, where there is some elaboration upon this link, two conflicting views emerge: (i) terrorist attacks are supposed to cause state repression which in turn radicalizes masses and opens up the way for recruitment and mobilization versus (ii) terrorist attacks are supposed to demonstrate the hollowness of the already existent state repression and thereby encourage mobilization of masses that are already radicalized but inactive due fear caused by state repression. The paper argues that terrorism studies have largely overemphasized the former while the latter has remained more or less unnoticed.

Keywords: terrorism, repression, radical left, mobilization of masses

Procedia PDF Downloads 224
1351 The Effects of Root Zone Supply of Aluminium on Vegetative Growth of 15 Groundnut Cultivars Grown in Solution Culture

Authors: Mosima M. Mabitsela

Abstract:

Groundnut is preferably grown on light textured soils. Most of these light textured soils tend to be highly weathered and characterized by high soil acidity and low nutrient status. One major soil factor associated with infertility of acidic soils that can negatively depress groundnut yield is aluminium (Al) toxicity. In plants Al toxicity damages root cells, leading to inhibition of root growth as a result of the suppression of cell division, cell elongation and cell expansion in the apical meristem cells of the root. The end result is that roots become stunted and brittle, root hair development is poor, and the root apices become swollen. This study was conducted to determine the effects of aluminium (Al) toxicity on a range of groundnut varieties. Fifteen cultivars were tested in incremental aluminum (Al) supply in an ebb and flow solution culture laid out in a randomized complete block design. There were six aluminium (Al) treatments viz. 0 µM, 1 µM, 5.7 µM, 14.14 µM, 53.18 µM, and 200 µM. At 1 µM there was no inhibitory effect on the growth of groundnut. The inhibition of groundnut growth was noticeable from 5.7 µM to 200 µM, where the severe effect of aluminium (Al) stress was observed at 200 µM. The cultivars varied in their response to aluminium (Al) supply in solution culture. Groundnuts are one of the most important food crops in the world, and its supply is on a decline due to the light-textured soils that they thrive under as these soils are acidic and can easily solubilize aluminium (Al) to its toxic form. Consequently, there is a need to develop groundnut cultivars with high tolerance to soil acidity.

Keywords: aluminium toxicity, cultivars, reduction, root growth

Procedia PDF Downloads 150
1350 Predicting Root Cause of a Fire Incident through Transient Simulation

Authors: Mira Ezora Zainal Abidin, Siti Fauzuna Othman, Zalina Harun, M. Hafiz M. Pikri

Abstract:

In a fire incident involving a Nitrogen storage tank that over-pressured and exploded, resulting in a fire in one of the units in a refinery, lack of data and evidence hampered the investigation to determine the root cause. Instrumentation and fittings were destroyed in the fire. To make it worst, this incident occurred during the COVID-19 pandemic, making collecting and testing evidence delayed. In addition to that, the storage tank belonged to a third-party company which requires legal agreement prior to the refinery getting approval to test the remains. Despite all that, the investigation had to be carried out with stakeholders demanding answers. The investigation team had to devise alternative means to support whatever little evidence came out as the most probable root cause. International standards, practices, and previous incidents on similar tanks were referred. To narrow down to just one root cause from 8 possible causes, transient simulations were conducted to simulate the overpressure scenarios to prove and eliminate the other causes, leaving one root cause. This paper shares the methodology used and details how transient simulations were applied to help solve this. The experience and lessons learned gained from the event investigation and from numerous case studies via transient analysis in finding the root cause of the accident leads to the formulation of future mitigations and design modifications aiming at preventing such incidents or at least minimize the consequences from the fire incident.

Keywords: fire, transient, simulation, relief

Procedia PDF Downloads 93
1349 Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal 'Amman Message'

Authors: Adnan M. Al Assaf

Abstract:

This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well.

Keywords: Islam, tolerance, anti-terrorism, coexistence, Amman Message

Procedia PDF Downloads 457
1348 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 375
1347 Counter-Terrorism and De-Radicalization as Soft Strategies in Combating Terrorism in Indonesia: A Critical Review

Authors: Tjipta Lesmana

Abstract:

Terrorist attacks quickly penetrated Indonesia following the downfall of Soeharto regime in May 1998. Reform era was officially proclaimed. Indonesia turned to 'heaven state' from 'authoritarian state'. For the first time since 1966, the country experienced a full-scale freedom of expression, including freedom of the press, and heavy acknowledgement of human rights practice. Some religious extremists previously run away to neighbor countries to escape from security apparatus secretly backed home. Quickly they consolidated the power to continue their long aspiration and dream to establish 'Shariah Indonesia', Indonesia based on Khilafah ideology. Bali bombings I which shocked world community occurred on 12 October 2002 in the famous tourist district of Kuta on the Indonesian island of Bali, killing 202 people (including 88 Australians, 38 Indonesians, and people from more than 20 other nationalities). In the capital, Jakarta, successive bombings were blasted in Marriott hotel, Australian Embassy, residence of the Philippine Ambassador and stock exchange office. A 'drunken Indonesia' is far from ready to combat nationwide sudden and massive terrorist attacks. Police Detachment 88 (Densus 88) Indonesian counter-terrorism squad, was quickly formed following 2002 Bali Bombing. Anti-terrorism Provisional Act was immediately erected, as well, due to urgent need to fight terrorism. Some Bali bombings criminals were deadly executed after sentenced by the court. But a series of terrorist suicide attacks and another Bali bombings (the second one) in Bali, again, shocked world community. Terrorism network is undoubtedly spreading nationwide. Suspicion is high that they had close connection with Al Qaeda’s groups. Even 'Afghanistan alumni' and 'Syria alumni' returned to Indonesia to back up the local mujahidins in their fights to topple Indonesia constitutional government and set up Islamic state (Khilafah). Supported by massive aids from friendly nations, especially Australia and United States, Indonesia launched large scale operations to crush terrorism consisted of various radical groups such as JAD, JAS, and JAADI. Huge energy, money, and souls were dedicated. Terrorism is, however, persistently entrenched. High ranking officials from Detachment 88 squad and military intelligence believe that terrorism is still one the most deadly enemy of Indonesia.

Keywords: counter-radicalization, de-radicalization, Khalifah, Union State, Al Qaedah, ISIS

Procedia PDF Downloads 177
1346 The International Fight against the Financing of Terrorism: Analysis of the Anti-Money Laundering and Combating Financing of Terrorism Regime

Authors: Loukou Amoin Marie Djedri

Abstract:

Financing is important for all terrorists – from the largest organizations in control of territories, to the smallest groups – not only for spreading fear through attacks, but also to finance the expansion of terrorist dogmas. These organizations pose serious threats to the international community. The disruption of terrorist financing aims to create a hostile environment for the growth of terrorism and to limit considerably the terrorist groups capacities. The World Bank (WB), together with the International Monetary Fund (IMF), decided to include in their scope the Fight against the money laundering and the financing of terrorism, in order to assist Member States in protecting their internal financial system from terrorism use and abuse and reinforcing their legal system. To do so, they have adopted the Anti-Money Laundering /Combating Financing of Terrorism (AML/CFT) standards that have been set up by the Financial Action Task Force. This set of standards, recognized as the international standards for anti-money laundering and combating the financing of terrorism, has to be implemented by States Members in order to strengthen their judicial system and relevant national institutions. However, we noted that, to date, some States Members still have significant AML/CFT deficiencies, which can constitute serious threats not only to the country’s economic stability but also for the global financial system. In addition, studies stressed out that repressive measures are more implemented by countries than preventive measures, which could be an important weakness in a state security system. Furthermore, we noticed that the AML/CFT standards evolve slowly, while techniques used by terrorist networks keep developing. The goal of the study is to show how to enhance the AML/CFT global compliance through the work of the IMF and the WB, to help member states to consolidate their financial system. To encourage and ensure the effectiveness of these standards, a methodology for assessing the compliance with the AML/CFT standards has been created to follow up the concrete implementation of these standards and to provide accurate technical assistance to countries in need. A risk-based approach has also been adopted as a key component of the implementation of the AML/CFT Standards, with the aim of strengthening the efficiency of the standards. Instead, we noted that the assessment is not efficient in the process of enhancing AML/CFT measures because it seems to lack of adaptation to the country situation. In other words, internal and external factors are not enough taken into account in a country assessment program. The purpose of this paper is to analyze the AML/CFT regime in the fight against the financing of terrorism and to find lasting solutions to achieve the global AML/CFT compliance. The work of all the organizations involved in this combat is imperative to protect the financial network and to lead to the disintegration of terrorist groups in the future.

Keywords: AML/CFT standards, financing of terrorism, international financial institutions, risk-based approach

Procedia PDF Downloads 275
1345 Field Application of Trichoderma Harzianum for Biological Control of Root-Knot Nematodes in Summer Tomatoes

Authors: Baharullah Khattak, Saifullah

Abstract:

To study the efficacy of the selected Trichoderma isolates, field trials were conducted in the root-knot nematode-infested areas of Dargai and Swat, Pakistan. Four isolates of T. harzianum viz, Th-1, Th-2, Th-9 and Th-15 were tested against root knot nematodes on summer tomatoes under field conditions. The T. harzianum isolates, grown on wheat grains substrate, were applied @ 8 g plant-1, either alone or in different combinations. Root weight of tomato plants was reduced Th-9 as compared to 26.37 g in untreated control. Isolate Th-1 was found to enhance shoot and root lengths to the maximum levels of 78.76 cm and 19.59 cm, respectively. Tomato shoot weight was significantly increased (65.36g) in Th-1-treated plots as compared to 49.66 g in control. Maximum (156) number of flowers plant-1 and highest (48.18%) fruit set plant-1 was observed in Th-1 treated plots, while there were 87 flowers and 35.50% fruit set in the untreated control. Maximum fruit weight (70.97 g) plant-1 and highest (17.99 t ha-1) marketable yield were recorded in the treatments where T. harzianum isolate Th-1 was used, in comparison to 51.33 g tomato fruit weight and 9.90 t ha-1 yield was noted in the control plots. It was observed that T. harzianum isolates significantly reduced the nematode populations. The fungus enhanced plant growth and yield in all the treated plots. Jabban isolate (Th-1) was found as the most effective in nematode suppression followed by Shamozai (Th-9) isolate. It was concluded from the present findings that T. harzianum has a potential bio control capability against root-knot nematodes.

Keywords: biological control, Trichoderma harzianum, root-knot nematode, meloidogyne

Procedia PDF Downloads 493
1344 A Fast and Cost-Effective Method to Monitor Microplastics in Compost and Soiduration of Enterococcus Faecalis Penetration in Environmentally Exposed Root Canals Obturated With Lateral Condensation Technique

Authors: N. Thawornwisit, P. Pradoo, S. Nuypree, L. Jarukasetrporn, S. Jitpukdeebodintra

Abstract:

Objective: The aim of this study was to evaluate the duration of the Enterococcus faecalis (E. faecalis) penetration into the gap between root canal wall and filling material at a 3 to 6 mm distance from the cementoenamel junction (CEJ) in the dislodged temporary filling, in vitro. Material and methods: Thirty-four single root canal mandibular premolars were divided into two experimental groups (N = 15) and one negative control (N = 4). Root canals were prepared and obturated with gutta-percha using lateral condensation technique, X-ray checked, and sterilized. Leakages were set up using the modified bacterial leakage model, and E. faecalis was used as a microbial marker. Leakages were evaluated at 3 and 7 days by culturing gutta-percha and dentine drilled from a 3-6 mm distance from CEJ. Broth turbidity was recorded and compared. Result: All four negative control and the 3-day experimental group showed no broth turbidity. For the 7-day experimental group, there was 33.3% leakage. Conclusion: Penetration of E. faecalis into the gap between root canal wall and filling material at a 3 to 6 mm distance from CEJ in the dislodged temporary filling were not found at three days. However, at seven days of exposure, bacteria could penetrate into the interface of the root canal and filling materials.

Keywords: coronal leakage, bacterial leakage model, enterococcus faecalis

Procedia PDF Downloads 92
1343 Allelopathic Effects of Eucalyptus camaldulensis and E. gomphocephala on Seed Germination and Seedling Growth of Barley

Authors: Sallah S. El-Ammari, Mona. S. Hasan

Abstract:

This research is aimed to study allelopathic effects of two wind breakers Eucalyptus camaldulensis and E.gomphocephala on germination and growth of barley using aqueous extracts of leaves at 0.5, 1, 5, and 10% concentrations for treatment of barley caryopsis in petri dishes incubated in growth chamber. Distilled water was used in the experiment as a control. Seed germination was recorded on daily basis for five days. After ten days measurements of root length, shoot length, fresh and dry weight of root and shoot were taken. With the exception of 0.5% E. gomphocephala extract effect on length and dry weight of barley root, all the tested extract concentrations for both eucalyptus species significantly decreased the percent and speed of germination, root and shoot length, fresh and dry weight of root and shoot of barley compared to the control. For both species the allelopathic effect was significantly increasing with the increase of the extract concentration. Although, higher allelopathic effect was shown by E. camaldulensis, the results indicating that both eucalyptus species should not be recommended as wind breakers for barley fields.

Keywords: allelopathy, eucalyptus, barley, Libya

Procedia PDF Downloads 348