Search results for: maritime terrorism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 493

Search results for: maritime terrorism

403 A Descriptive Study of Turkish Straits System on Dynamics of Environmental Factors Causing Maritime Accidents

Authors: Gizem Kodak, Alper Unal, Birsen Koldemir, Tayfun Acarer

Abstract:

Turkish Straits System which consists of Istanbul Strait (Bosphorus), Canakkale Strait (Dardanelles) and the Marmara Sea has a strategical location on international maritime as it is a unique waterway between the Mediterranean Sea, Black Sea and the Aegean Sea. Thus, this area has great importance since it is the only waterway between Black Sea countries and the rest of the World. Turkish Straits System has dangerous environmental factors hosts more vessel every day through developing World trade and this situation results in expanding accident risks day by day. Today, a lot of precautions have been taken to ensure safe navigation and to prevent maritime accidents, and international standards are followed to avoid maritime accidents. Despite this, the environmental factors that affect this area, trigger the maritime accidents and threaten the vessels with new accidents risks in different months with different hazards. This descriptive study consists of temporal and spatial analyses of environmental factors causing maritime accidents. This study also aims at contributing to safety navigation including monthly and regionally characteristics of variables. In this context, two different data sets are created consisting of environmental factors and accidents. This descriptive study on the accidents between 2001 and 2017 the mentioned region also studies the months and places of the accidents with environmental factor variables. Environmental factor variables are categorized as dynamic and static factors. Dynamic factors are appointed as meteorological and oceanographical while static factors are appointed as geological factors that threaten safety navigation with geometrical restricts. The variables that form dynamic factors are approached meteorological as wind direction, wind speed, wave altitude and visibility. The circulations and properties of the water mass on the system are studied as oceanographical properties. At the end of the study, the efficient meteorological and oceanographical parameters on the region are presented monthly and regionally. By this way, we acquired the monthly, seasonal and regional distributions of the accidents. Upon the analyses that are done; The Turkish Straits System that connects the Black Sea countries with the other countries and which is one of the most important parts of the world trade; is analyzed on temporal and spatial dimensions on the reasons of the accidents and have been presented as environmental factor dynamics causing maritime accidents.

Keywords: descriptive study, environmental factors, maritime accidents, statistics

Procedia PDF Downloads 168
402 Social Media as a Source of Radicalization; A Case Study of Pakistan

Authors: Manam Hanfi

Abstract:

Pakistan is a victim of terrorism since 9/11 attacks. Since then it is a home for violence and extremism. One of the major reasons behind rising violence and extremism in Pakistan is radicalization. Pakistan has seen and suffered from the modification of terrorism from old to new. In new terrorism, the terrorist organizations incorporated internet to disseminate propaganda, to recruit and train people. The study focuses on the relationship between Pakistan and new terrorism and examines how the internet is being used by terrorist organizations. The study investigates radicalization through social media by terrorist organizations in Pakistan with the help of case studies. The study suggests five ways to counter radicalization, including, counter narrative on social media, content analysis of the data on the internet, curriculum and madrassa reforms, teaching peace education in the educational institutions and use of technical software such as eGLYPH to quickly remove violent data from social media. Lastly, the research attempted to contribute in counter-radicalization by combining the media dependency model and ideas for counter-radicalization. The dependency model elaborates the impact of mass media content on the audience. If media dependency is high, it will cause cognitive, affective and behavioral changes. In order to counter radicalization through social media, it is important to make cognitive, affective and behavioral changes with the help of counter-radicalization suggestions.

Keywords: counter radicalization, extremism, social media, terrorism

Procedia PDF Downloads 128
401 China's BRI and Germany's Baghdad Railroad – a Realist Analysis of Hegemonic Conflict and the Circumvention of Maritime Power

Authors: Kamen Kirov

Abstract:

In the late 19th and early 20th centuries, Britain dominated global trade and finance in large part due to its maritime superiority. Germany, a land power, sought to undermine Britain’s position as the primary hegemon but ultimately could not challenge Britain’s maritime position or capabilities. This drove Germany to seek alternative strategies to weaken Britain’s position. Notably, it pushed Germany to create a reliable overland link through the Balkans to the Middle East via railroad. This article will seek to draw parallels between the German-British hegemonic conflict of the early 20th century and the Chinese-American hegemonic conflict taking place today using both secondary historical sources and current scholarly discussions of the changing international sphere. In doing so, it will provide useful insights into how China might attempt to outflank American power. The article will demonstrate that in many ways, the strategic positions and approaches of the early-20th century Germany and modern China are similar. Both countries were faced with a vastly superior foe with respect to maritime and economic power, and in both cases, their response was to undermine their rival hegemon by creating new overland infrastructure. Furthermore, in both cases, a major goal of creating new overland links was to gain further access to and control over Middle Eastern energy markets. It seems that in the modern day, China is conducting such a policy on a much grander scale than Germany did in the early 20th century—which may result in negative consequences for the US strategic position.

Keywords: belt and road Initiative, hegemonic conflict, maritime power, realism

Procedia PDF Downloads 160
400 Jurisdiction Conflicts in Contracts of International Maritime Transport: The Application of the Forum Selection Clause in Brazilian Courts

Authors: Renan Caseiro De Almeida, Mateus Mello Garrute

Abstract:

The world walks to be ever more globalised. This trend promotes an increase on the number of transnational commercial transactions. The main modal for carriage of goods is by sea, and many countries have their economies dependent on the maritime freightage – it could be because they exercise largely this activity or because they follow the tendency of using the maritime logistic widely. Among these ones, Brazil is included. This nation counts with sixteen ports with good capacities, which receive most of the international income by sea. It is estimated that 85 per cent of the total influx of goods in Brazil is by maritime modal, leaving mere 15 per cent for the other ones. This made it necessary to develop maritime law in international and national basis, to create a standard to be applied with the intention to harmonize the transnational carriage of goods by sea. Maritime contracts are very specific and have interesting peculiarities, but in their range, little research has been made on what causes the main divergences when it comes to international contracts: the jurisdiction conflict. Likewise any other international contract, it is common for the parties to set a forum selection clause to choose the forum which will be able to judge the litigations that could rise from a maritime transport contract and, consequently, also which law should be applied to the cases. However, the forum choice in Brazil has always been somewhat polemical – not only in the maritime law sphere - for sometimes national tribunals overlook the parties’ choice and call the competence for themselves. In this sense, it is interesting to mention that the Mexico Convention of 1994 about the law applicable to international contracts did not gain strength in Brazil, nor even reached the Congress to be considered for ratification. Furthermore, it is also noteworthy that Brazil has a new Civil Procedure Code, which was put into reinforcement in 2016 bringing new legal provisions specifically about the forum selection. This represented a mark in the national legal system in this matter. Therefore, this paper intends to give an insight through Brazilian jurisprudence, making an analysis of how this issue has been treated on litigations about maritime contracts in the national tribunals, as well as the solutions found by the Brazilian legal system for the jurisdiction conflicts in those cases. To achieve the expected results, the hypothetical-deductive method will be used in combination with researches on doctrine and legislations. Also, jurisprudential research and case law study will have a special role, since the main point of this paper is to verify and study the position of the courts in Brazil in a specific matter. As a country of civil law, the Brazilian judges and tribunals are very attached to the rules displayed on codes. However, the jurisprudential understanding has been changing during the years and with the advent of the new rules about the applicable law and forum selection clause, it is noticeable that new winds are being blown.

Keywords: applicable law, forum selection clause, international business, international maritime contracts, litigation in courts

Procedia PDF Downloads 247
399 On the Causes of Boko Haram Terrorism: Socio-Economic versus Religious Injunctions

Authors: Sogo Angel Olofinbiyi

Abstract:

There have been widespread assumptions across the globe that the root cause of Boko Haram terrorism in Nigeria is religious rather than socio-economic. An investigation into this dichotomy allowed this study to fully demonstrate that the root cause of Boko Haram’s terrorist actions emanates from the non-fulfillment of socio-economic goals that are prompted by the violation of fundamental human rights, corruption, poverty, unconstitutional and undemocratic practices in the northern part of the Nigerian state. To achieve its aim of establishing the root cause of the terrorism crisis in the latter country, the study critically appraised the socio-economic context of the insurgency by adopting one-on-one in-depth interviews involving forty (40) participants to interrogate the phenomenon. Empirical evidence from the study demonstrated that the evolution of Boko Haram terrorism was a response to socio-economic phlebotomy, political and moral putrescence, and the dehumanization of people that stem from a combination of decades of mismanagement and pervasive corruption by various Nigerian leaders. The study concludes that, as long as the endemic socio-economic problems caused by global capitalism vis-a-vis unequal hegemonic power exchange as expressed in socio-political, ethno-religious and cultural forms persist in the Nigerian society, the terrorism insurgency will recur and remain an inevitable enterprise and indeed a normal social reaction to every undesirable state of affairs. Based on the findings, the study urges the need for the amelioration of the conditions of the vast majority of the Nigerian populace by making socio-economic facilities available to them through the political state.

Keywords: Boko Haram Terrorism, insurgency, socio-economic, religious injunctions

Procedia PDF Downloads 158
398 A Systematic Approach to Defeat Regional Terrorism and Political Violence in Pakistan: Prospects of Youth Employment through China-Pakistan Economic Corridor

Authors: Muhammad Imran

Abstract:

In recent times, terrorism has been a major area of concern globally. Terrorism is ranked the number one concern across many countries, followed by political violence and poverty. The natural response to terrorism and violence across the countries is to increase expenditure on counterterrorism. This project study aims to explore the importance of job creation through the China-Pakistan Economic Corridor (a leading mega-project of the Belt and Road Initiative) to help Pakistan’s socio-economic situation and lead to minimize terrorism and violence across the country and help Chinese companies complete their multi-billion dollar projects peacefully. During the last two decades, Pakistan has been through severe insurgencies, political violence, and terrorism, which also caused a disturbance in delaying many developmental projects, including the CPEC project, and killed dozens of Chinese citizens working in Pakistan. One major area of debate is whether or not economic factors have any role to play in determining the extent of political violence and terrorism in Pakistan. The notion of a China-Pakistan economic corridor across the Karakorum Mountains to Gawadar faces severe challenges. Counterterrorism concerns are likely to be a persistent source of tension across the CPEC projects in different regions across the CPEC route in Pakistan. China’s promise to help industrialize Pakistan will ultimately lead to youth employment and prosperity. We hypothesize that youth unemployment can explain incidences of terrorism in Pakistan in the recent past. One of the main causes of these adverse situations is the unemployment of youth, who can become readily accessible to militant organizations for recruitment and training. This research project builds on existing research investigating the root causes of political violence and terrorism by considering youth unemployment as a measure of economic deprivation. We focus on the terrorism incident count data for 2001–2022, using negative binomial regression models. Literature suggests that, in the exogenous model, youth unemployment tends to increase political violence and domestic terrorism. Given concerns about the endogeneity of youth unemployment in these models, we will use two kinds of corrections: instrumental variables and lagged variables. To control for endogeneity, we intend to incorporate total population, military expenditure, foreign direct investment, and CPEC investment as instrumental variables.

Keywords: regional terrorism, political violence, youth employment, CPEC, belt and road initiative, Pakistan, China

Procedia PDF Downloads 21
397 Counter-Terrorism and Civil Society in Nigeria

Authors: Emeka Thaddues Njoku

Abstract:

Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.

Keywords: counter-terrorism, civil society organizations, freedom, terrorism

Procedia PDF Downloads 354
396 Women and Terrorism in Nigeria: Policy Templates for Addressing Complex Challenges in a Changing Democratic State

Authors: Godiya Pius Atsiya

Abstract:

One of the most devastating impacts of terrorism on the Nigerian state is the danger it has posed on women, children and other vulnerable groups. The complexity of terrorism in Nigeria, especially in most parts of Northern Nigeria has entrenched unprecedented security challenges such as refugee crisis, kidnapping, food shortages, increase in death tolls, malnutrition, fear, rape and several other psychological factors. Of particular interest in this paper as it relates to terrorism is the high rate of Internally Displaced Persons(IDPs), with women, children and the aged being the most affected. Empirical evidence arising from recent development in Nigeria’s North-East geo-political zone shows that large numbers of refugees fleeing the Boko Haram attacks have doubled. The attendant consequences of this mass exodus of people in the affected areas are that the victims now suffer untold and unwarranted economic hardship. In another dimension, recent findings have it that most powerless women and young teenage girls have been forcefully conscripted into the Islamic extremist groups and used as shields. In some respect, these groups of people have been used as available tools for suicide bombing and other criminal tendencies, the result of which can be detrimental to social cohesion and integration. This work is a theoretical insight into terrorism discourses; hence, the paper relies on existing works of scholars in carrying out the research. The paper argues that the implications of terrorism on women gender have grounding effects on the moral psyche of women who are supposed to be home managers and custodians of morality in society. The burden of terrorism and all it tends to propagate has literally upturned social lives and hence, Nigeria is gradually being plunged into the Hobesian state of nature. As a panacea to resolving this social malaise, the paper submits that government and indeed, all stakeholders in the nation’s democratic project must expedite action to nip this trend in the bud. The paper sums up with conclusion and other alternative policy measures to mitigate the challenges of terrorism in Nigeria.

Keywords: changing democratic state, policy measures, terrorism, women

Procedia PDF Downloads 200
395 Scenario Based Reaction Time Analysis for Seafarers

Authors: Umut Tac, Leyla Tavacioglu, Pelin Bolat

Abstract:

Human factor has been one of the elements that cause vulnerabilities which can be resulted with accidents in maritime transportation. When the roots of human factor based accidents are analyzed, gaps in performing cognitive abilities (reaction time, attention, memory…) are faced as the main reasons for the vulnerabilities in complex environment of maritime systems. Thus cognitive processes in maritime systems have arisen important subject that should be investigated comprehensively. At this point, neurocognitive tests such as reaction time analysis tests have been used as coherent tools that enable us to make valid assessments for cognitive status. In this respect, the aim of this study is to evaluate the reaction time (response time or latency) of seafarers due to their occupational experience and age. For this study, reaction time for different maneuverers has been taken while the participants were performing a sea voyage through a simulator which was run up with a certain scenario. After collecting the data for reaction time, a statistical analyze has been done to understand the relation between occupational experience and cognitive abilities.

Keywords: cognitive abilities, human factor, neurocognitive test battery, reaction time

Procedia PDF Downloads 275
394 Technical and Legal Definitions in Cyber Terrorism

Authors: Pardis Moslemzadeh Tehrani, Nazura Abdul Manap, Hamed Ladoni Damghani, Rohimi Bin Shapiee

Abstract:

In recent years the speed of new technology has brought forth so many new issues. Cyberspace is among the new technologies that need novel ways to address the various issues that have arisen. While cyberspace is a technical notion that defies a single definition, this new technology requires the adoption and application of new laws. In order to manage issues arising from the existence of cyberspace, proper policies and definitions must be formulated which satisfy both technical and legal aspects. One difficulty in this regard is due to the unique features of cyberspace architecture. This article proposes to define cyberspace and cyber terrorism. This will allow for a more effective and comprehensive addressing of legal issues as they can then be handled better by introducing a new factor to the otherwise ordinary analysis in whichever field is implicated such as the nature and place of use.

Keywords: cyberspace, cyber terrorism, technical definition, legal definition

Procedia PDF Downloads 553
393 Sufism as Therapy of Terrorism and Extremism with Special Reference to the Teaching of Khawaja Ghulam Fareed and Bulleh Shah

Authors: Arshad Munir, Naseem Akhtar

Abstract:

The determination of the Sufi is to effort towards unity. His main purpose is to bring humanity, separated as it is into so many different units, closer together in the deeper understanding of life. His mission is to bring about brotherhood among races, nations and faiths and to respect one another's faith, scripture and teacher. Sufi is to confer sympathy on these lives, to impart love, compassion and kindheartedness on all creations. The Sufi message is the resonance of the same Divine message which has always come and will always come to inform humanity. It is the continuation of all the pronounced religions which have come at several times and it is amalgamation of them all, which was the wish of all the prophets. Pakistan, who came into being in the name of Islam unfortunately, have linked with terrorism. It is a disgrace that in contemporary day Pakistan, mullahism and the recent cancer of Talibanisation are gradually eating into what had kept us integral as a society. Terrorism has grown-up to develop a prime safety pressure to the area. The terrorism has deadly caused decrease in overseas and local investment, exports, physical infrastructure, and wealth stock ultimately leading to damage of the socio-economic status of Pakistan. Main reasons are ignorance about the actual teaching of Islam both by Muslim and non-Muslim, exploitation by the religious and political influential, sectarianism and extremism, lack of tolerance and broadmindedness and reaction and retortion by the sufferer. The key treatment and therapy of the abovementioned illnesses exist in the messages of Sufism.

Keywords: sufism, love, Pakistan, terrorism

Procedia PDF Downloads 271
392 The Fifth Political Theory and Countering Terrorism in the Post 9/11 Era

Authors: Rana Eijaz Ahmad

Abstract:

This paper is going to explain about the Fifth Political Theory that challenges all existing three plus one (Capitalism, Marxism and Fascism + Fourth Political Theory) theories. It says, ‘it is human ambiance evolve any political system to survive instead of borrowing other imported thoughts to live in a specific environment, in which Legitimacy leads to authority and promotes humanism.’ According to this theory, no other state is allowed to dictate or install any political system upon other states. It is the born right of individuals to choose a political system or a set of values that are going to make their structures and functions efficient enough to support the system harmony and counter the negative forces successfully. In the post 9/11 era, it is observed that all existing theories like Capitalism, Marxism, Fascism and Fourth Political Theory remained unsuccessful in resolving the global crisis. The so-called war against terrorism is proved as a war for terrorism and creates a vacuum on the global stage, worsening the crisis. The fifth political theory is an answer to counter terrorism in the twenty-first century. It calls for accountability of the United Nations for its failure in sustaining peace at global level. Therefore, the UN charter is supposed to be implemented in its true letter and spirit. All independent sovereign states have right to evolve their own system to carry out a political system that suits them best for sustaining harmony at home. This is the only way to counter terrorism. This paper is comprised of mixed method. Qualitative, quantitative and comparative methods will be used along with secondary sources. The objective of this paper is to create knowledge for the benefit of human beings with a logical and rational argument. It will help political scientists and scholars in conflict management and countering terrorism on pragmatic grounds.

Keywords: capitalism, fourth political theory, fifth political theory, Marxism, fascism

Procedia PDF Downloads 345
391 The Potential Role of University Libraries in the Fight against Terrorism in Upper Egypt

Authors: Essam Mansour

Abstract:

The purpose of this study is to explore the potential role of South Valley University (SVU) libraries’ manpower, collections and services in the fight against terrorism in the Upper Egypt. A quantitative research methodology was used in the form of a survey sent to 127 library staff at the SVU. The survey was undertaken from June to July 2015 with a response rate 73.2%. Printed materials were the most adequate collections in the SVU libraries. Other materials, such as CDs/DVDs, audiovisual materials, microfilm and microfiche, online resources and electronic materials respectively were inadequate at SVU libraries. Few of the services provided by SVU libraries were characterized as adequate services, some are inadequate and other services do not exist. The average of the facilities provided by SVU libraries was somewhat adequate. Activities, such as holding social field trips, holding training workshops and holding academic field trip were, at least, somewhat adequate to SVU libraries. SVU libraries had no a significant role in fighting terrorism in the Upper Egypt. There is no a relationship between the SVU library staff’s professional characteristics and the potential role that their libraries may play in the fight against this phenomenon. As a result of the lack of SVU libraries’ collections, services, facilities and activities, this study concluded that that such role could not be achieved. Almost all the library staff admitted that this severe lack has affected the provision of library patrons and members of the library community to these collections and services, which help in countering the threat of terrorism. Despite the significance of all these problems faced by SVU libraries in the fight against terrorism, it was found that the inadequacy of the library opening hours is significantly correlated with the professional characteristics of the library staff, particularly their job title and work experience.

Keywords: terrorism, national security, university libraries, south valley university, Egypt, survey

Procedia PDF Downloads 229
390 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.

Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law

Procedia PDF Downloads 354
389 Nuclear Terrorism and Proliferation: A Conceptual Clarification

Authors: Uche A. Nnawulezi

Abstract:

This paper analyzes the advancing nature of nuclear terrorism and proliferation in the global environment and its attendant impacts. It analyzes discourse and practice with respect to the general prohibition on the utilization of fissionable radioactive materials. Thus, there has been a few ideological, reasonable and academic recommendations of policies aimed at eliminating nuclear weapons which its ultimate nightmare has remained an assault including nuclear explosion in densely populated urban areas. Likewise, this paper concentrates on safety measures aimed at preventing nuclear assaults which should not just concentrate on endeavors to prevent terrorists from exploding nuclear gadgets but should be more concerned on endeavors aimed at preventing the acquisition of nuclear weapons in the first place. The author of this paper has pointed out that the non-proliferation treaty should be vigorously supported as well as the Comprehensive Test Ban Treaty brought into force. This paper depended unequivocally on secondary sources, for example, textbooks, journals, articles, and periodicals. It concludes that the fundamental proposals made in this paper if completely used shall remain a cornerstone of efforts made in preventing the spread of nuclear weapons. At last, the only way is to eliminate stockpiles of nuclear weapons in the world or else the likelihood of nuclear terrorism remains a nightmare.

Keywords: nuclear, terrorism, proliferation, global environment

Procedia PDF Downloads 225
388 The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia

Authors: Aulia Dwi Nastiti

Abstract:

A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet.

Keywords: communication pattern, counterterrorism, darknet, extremist groups, terrorism

Procedia PDF Downloads 267
387 A Computational Cost-Effective Clustering Algorithm in Multidimensional Space Using the Manhattan Metric: Application to the Global Terrorism Database

Authors: Semeh Ben Salem, Sami Naouali, Moetez Sallami

Abstract:

The increasing amount of collected data has limited the performance of the current analyzing algorithms. Thus, developing new cost-effective algorithms in terms of complexity, scalability, and accuracy raised significant interests. In this paper, a modified effective k-means based algorithm is developed and experimented. The new algorithm aims to reduce the computational load without significantly affecting the quality of the clusterings. The algorithm uses the City Block distance and a new stop criterion to guarantee the convergence. Conducted experiments on a real data set show its high performance when compared with the original k-means version.

Keywords: pattern recognition, global terrorism database, Manhattan distance, k-means clustering, terrorism data analysis

Procedia PDF Downloads 349
386 Preliminary Design of Maritime Energy Management System: Naval Architectural Approach to Resolve Recent Limitations

Authors: Seyong Jeong, Jinmo Park, Jinhyoun Park, Boram Kim, Kyoungsoo Ahn

Abstract:

Energy management in the maritime industry is being required by economics and in conformity with new legislative actions taken by the International Maritime Organization (IMO) and the European Union (EU). In response, the various performance monitoring methodologies and data collection practices have been examined by different stakeholders. While many assorted advancements in operation and technology are applicable, their adoption in the shipping industry stays small. This slow uptake can be considered due to many different barriers such as data analysis problems, misreported data, and feedback problems, etc. This study presents a conceptual design of an energy management system (EMS) and proposes the methodology to resolve the limitations (e.g., data normalization using naval architectural evaluation, management of misrepresented data, and feedback from shore to ship through management of performance analysis history). We expect this system to make even short-term charterers assess the ship performance properly and implement sustainable fleet control.

Keywords: data normalization, energy management system, naval architectural evaluation, ship performance analysis

Procedia PDF Downloads 427
385 Bibliometric Analysis of Risk Assessment of Inland Maritime Accidents in Bangladesh

Authors: Armana Huq, Wahidur Rahman, Sanwar Kader

Abstract:

Inland waterways in Bangladesh play an important role in providing comfortable and low-cost transportation. However, a maritime accident takes away many lives and creates unwanted hazards every year. This article deals with a comprehensive review of inland waterway accidents in Bangladesh. Additionally, it includes a comparative study between international and local inland research studies based on maritime accidents. Articles from inland waterway areas are analyzed in-depth to make a comprehensive overview of the nature of the academic work, accident and risk management process and different statistical analyses. It is found that empirical analysis based on the available statistical data dominates the research domain. For this study, major maritime accident-related works in the last four decades in Bangladesh (1981-2020) are being analyzed for preparing a bibliometric analysis. A study of maritime accidents of passenger's vessels during (1995-2005) indicates that the predominant causes of accidents in the inland waterways of Bangladesh are collision and adverse weather (77%), out of which collision due to human error alone stands (56%) of all accidents. Another study refers that the major causes of waterway accidents are the collision (60.3%) during 2005-2015. About 92% of this collision occurs due to direct contact with another vessel during this period. Rest 8% of the collision occurs by contact with permanent obstruction on waterway roots. The overall analysis of another study from the last 25 years (1995-2019) shows that one of the main types of accidents is collisions, with about 50.3% of accidents being caused by collisions. The other accident types are cyclone or storm (17%), overload (11.3%), physical failure (10.3%), excessive waves (5.1%), and others (6%). Very few notable works are available in testing or comparing the methods, proposing new methods for risk management, modeling, uncertainty treatment. The purpose of this paper is to provide an overview of the evolution of marine accident-related research domain regarding inland waterway of Bangladesh and attempts to introduce new ideas and methods to abridge the gap between international and national inland maritime-related work domain which can be a catalyst for a safer and sustainable water transportation system in Bangladesh. Another fundamental objective of this paper is to navigate various national maritime authorities and international organizations to implement risk management processes for shipping accident prevention in waterway areas.

Keywords: inland waterways, safety, bibliometric analysis, risk management, accidents

Procedia PDF Downloads 160
384 Adopting a New Policy in Maritime Law for Protecting Ship Mortgagees Against Maritime Liens

Authors: Mojtaba Eshraghi Arani

Abstract:

Ship financing is the vital element in the development of shipping industry because while the ship constitutes the owners’ main asset, she is considered a reliable security in the financiers’ viewpoint as well. However, it is most probable that a financier who has accepted a ship as security will face many creditors who are privileged and rank before him for collecting, out of the ship, the money that they are owed. In fact, according to the current rule of maritime law, which was established by “Convention Internationale pour l’Unification de Certaines Règles Relatives aux Privilèges et Hypothèques Maritimes, Brussels, 10 April 1926”, the mortgages, hypotheques, and other charges on vessels rank after several secured claims referred to as “maritime liens”. Such maritime liens are an exhaustive list of claims including but not limited to “expenses incurred in the common interest of the creditors to preserve the vessel or to procure its sale and the distribution of the proceeds of sale”, “tonnage dues, light or harbour dues, and other public taxes and charges of the same character”, “claims arising out of the contract of engagement of the master, crew and other persons hired on board”, “remuneration for assistance and salvage”, “the contribution of the vessel in general average”, “indemnities for collision or other damage caused to works forming part of harbours, docks, etc,” “indemnities for personal injury to passengers or crew or for loss of or damage to cargo”, “claims resulting form contracts entered into or acts done by the master”. The same rule survived with only some minor change in the categories of maritime liens in the substitute conventions 1967 and 1993. The status que in maritime law have always been considered as a major obstacle to the development of shipping market and has inevitably led to increase in the interest rates and other related costs of ship financing. It seems that the national and international policy makers have yet to change their mind being worried about the deviation from the old marine traditions. However, it is crystal clear that the continuation of status que will harm, to a great extent, the shipowners and, consequently, the international merchants as a whole. It is argued in this article that the raison d'être for many categories of maritime liens cease to exist anymore, in view of which, the international community has to recognize only a minimum category of maritime liens which are created in the common interests of all creditors; to this effect, only two category of “compensation due for the salvage of ship” and “extraordinary expenses indispensable for the preservation of the ship” can be declared as taking priority over the mortgagee rights, in anology with the Geneva Convention on the International Recognition of Rights in Aircrafts (1948). A qualitative method with the concept of interpretation of data collection has been used in this manuscript. The source of the data is the analysis of international conventions and domestic laws.

Keywords: ship finance, mortgage, maritime liens, brussels convenion, geneva convention 1948

Procedia PDF Downloads 45
383 Terrorist Financing through Ilegal Fintech Hacking: Case Study of Rizki Gunawan

Authors: Ishna Indika Jusi, Rifana Meika

Abstract:

Terrorism financing method in Indonesia is developing at an alarming rate, to the point, it is now becoming more complex than before. Terrorists traditionally use conventional methods like robberies, charities, and courier services to fund their activities; today terrorists are able to utilize modern methods in financing their activities due to the rapid development in financial technology nowadays; one example is by hacking an illegal Fintech Company. Therefore, this research is conducted in order to explain and analyze the consideration behind the usage of an illegal fintech company to finance terrorism activities and how to prevent it. The analysis in this research is done by using the theory that is coined by Michael Freeman about the reasoning of terrorists when choosing their financing method. The method used in this research is a case study, and the case that is used for this research is the terrorism financing hacking of speedline.com in 2011 by Rizki Gunawan. Research data are acquired from interviews with the perpetrators, experts from INTRAC (PPATK), Special Detachment 88, reports, and journals that are relevant to the research. As a result, this study found that the priority aspects in terms of terrorist financing are security, quantity, and simplicity while obtaining funds.

Keywords: Fintech, illegal, Indonesia, technology, terrorism financing

Procedia PDF Downloads 141
382 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy

Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi

Abstract:

Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.

Keywords: terrorism, economy, Boko Haram, Nigeria

Procedia PDF Downloads 233
381 Evolving Maritime Geopolitics of the Indo-Pacific

Authors: Pragya Pandey

Abstract:

A major discussion in the 21st -century international affairs has been around the shifting economic and political center of gravity to Asia. In the maritime realm, it translates into a shift in focus from the Atlantic to the Pacific-Indian Ocean region or what is now popularly called the Indo-Pacific region. The Indo-Pacific is rapidly eclipsing once dominant Asia-Pacific as center of trade, investment, competition and cooperation. The growing inter-connectivity between the Indian Ocean and the Pacific Ocean is bringing forth the ‘confluence of the two seas’. Therefore, the Indo-Pacific strategic arc is acquiring greater salience in consonance with the changing realities of the time. The region is undergoing unprecedented transformation in its security outlook. At present, the region is at an interesting historic epoch- witnessing the simultaneous rise India and China, their economic growth, naval modernization and power projection capabilities, alongside the continued presence of the United States, particularly with its rebalancing strategy. Besides the interplay among the three major stakeholders, other regional players like Japan, Australia, and Indonesia, would play a crucial role in the geopolitical re-arrangement of the Indo-Pacific region. The region will be the future theater of activities to determine the shifts and distribution of sea power, by the virtue of its strategic location, intrinsic value of the energy resources and significant maritime trade routes of the region. Therefore, the central theme of the paper would be to scrutinize the maritime security environment of the region against the backdrop of the tricky geopolitical landscape, contributing to the change in the regional and global balance of power.

Keywords: China, geopolitics, India, United States

Procedia PDF Downloads 226
380 Appliance of the Analytic Hierarchy Process Methodology for the Selection of a Small Modular Reactors to Enhance Maritime Traffic Decarbonisation

Authors: Sara Martín, Ying Jie Zheng, César Hueso

Abstract:

International shipping is considered one of the largest sources of pollution in the world, accounting for 812 million tons of CO2 emissions in the year 2018. Current maritime decarbonisation is based on the implementation of new fuel alternatives, such as LNG, biofuels, and methanol, among others, which are less polluting as well as less efficient. Despite being a carbon-free and highly-developed technology, nuclear propulsion is hardly discussed as an alternative. Scientifically, it is believed that Small Modular Reactors (SMR) could be a promising solution to decarbonized maritime traffic due to their small dimensions and safety capabilities. However, as of today, there are no merchant ships powered by nuclear systems. Therefore, this project aims to understand the challenges of the development of nuclear-fuelled vessels by analysing all SMR designs to choose the most suitable one. In order not to fall into subjectivities, the Analytic Hierarchy Process (AHP) will be used to make the selection. This multiple-criteria evaluation technique analyses complex decisions by pairwise comparison of a number of evaluation criteria that can be applied to each SMR. The state-of-the-art 72 SMRs presented by the International Atomic Energy Agency (IAEA) will be analysed and ranked by a global parameter, calculated by applying the AHP methodology. The main target of the work is to find an adequate SMR system to power a ship. Top designs will be described in detail, and conclusions will be drawn from the results. This project has been conceived as an effort to foster the near-term development of zero-emission maritime traffic.

Keywords: international shipping, decarbonization, SMR, AHP, nuclear-fuelled vessels

Procedia PDF Downloads 89
379 ASEAN Our Eyes: A Strategic Information Exchange Platform on Counter-Terrorism

Authors: Nila Febri Wilujeng, Helda Risman

Abstract:

Enjoying stable security within its region for the last 50 years, ASEAN nowadays contends with the global context emerging dynamically, which brings about multidimensional challenges and threats such as terrorism, radicalism, armed rebellion, hijacking, and other non-traditional threats. Dealing with these circumstances, ASEAN member states tighten its capacity by enhancing regional cooperation and strategic information exchange among ASEAN member states so-called ASEAN Our Eyes. This initiative adopted for the sake of forestalling any possible threat posed by violent extremism, radicalization, and terrorism through timely strategic information exchange among ASEAN member states. By using qualitative method, this paper will utilize regional security complex and international cooperation theories in analyzing the process to examine ASEAN Our Eyes based on its terms of reference. As a result, it portrays that ASEAN Our Eyes is able to undermine the gaps in the realm of strategic information exchange in monitoring the movement of violent extremism, radicalism, foreign terrorist fighters, and crime-terror nexus. However, it remains premature as a strategic measure to encounter those threats in the years to come.

Keywords: regional cooperation, counter-terrorism, ASEAN our eyes, strategic information exchange

Procedia PDF Downloads 173
378 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 252
377 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces

Authors: Igor Pejic

Abstract:

The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.

Keywords: asymmetrical warfare, conventional forces, security, terrorism

Procedia PDF Downloads 235
376 Growing Acts of Terrorism in Local Conflicts: A Dire Need for International Attention

Authors: Yusuf Abubakar Mamud

Abstract:

Highlighting the imperatives of local conflicts considering the dangerous dimensions of terrorism they are assuming in Africa has not attracted serious academic and political attention. The discourse about conflict in Africa was discussed within five identified conflict zones in the continent. The threats from these local conflicts are diverse and complex and the acts of terrorism in these local conflicts are driven by certain attitudes and behaviours linked to the African leadership. The paper examined and noted that the current conflict resolution model of the African Union (AU) was robust with requisite institutions to address the trends in local conflicts. However, it was observed that the AU peace and security framework lacked the requisite structural and technical capabilities to proactively address the drivers of local conflicts in Africa. It was found that the persistence of local conflicts in the African region may deny her the opportunities of achievement of the targets envisioned in the Sustainable Development Goals (SDGs). Consequently, the paper called on the international community to support Africa through provision of capacity. It urged the African leaders themselves to develop the political will to ensure that all issues concerning peace and security in the continent were guided by the provisions of the AU Constitutive Act. The need to strengthen the APRM in the light of the current trends in local conflicts was also highlighted.

Keywords: conflicts, local conflicts, terrorism, sustainable development

Procedia PDF Downloads 251
375 Global and Domestic Response to Boko Haram Terrorism on Cameroon 2014-2018

Authors: David Nchinda Keming

Abstract:

The present study is focused on both the national and international collective fight against Boko Haram terrorism on Cameroon and the rule played by the Lake Chad Basin Countries (LCBCs) and the global community to suffocate the sect’s activities in the region. Although countries of the Lake Chad Basin include: Cameroon, Chad, Nigeria and Niger others like Benin also joined the course. The justification for the internationalisation of the fight against Boko Haram could be explained by the ecological and international climatic importance of the Lake Chad and the danger posed by the sect not only to the Lake Chad member countries but to global armed, civil servants and the international political economy. The study, therefore, kick start with Cameroon’s reaction to Boko Haram’s terrorist attacks on its territory. It further expounds on Cameroon’s request on bilateral diplomacy from members of the UN Security Council for an international collective support to staple the winds of the challenging sect. The study relies on the hypothesis that Boko Haram advanced terrorism on Cameroon was more challenging to the domestic military intelligence thus forcing the government to seek for bilateral and multilateral international collective support to secure its territory from the powerful sect. This premise is tested internationally via (multilateral cooperation, bilateral response, regional cooperation) and domestically through (solidarity parade, religious discourse, political manifestations, war efforts, the vigilantes and the way forward). To accomplish our study, we made used of the mixed research methodologies to interpret the primary, secondary and tertiary sources consulted. Our results reveal that the collective response was effectively positive justified by the drastic drop in the sect’s operations in Cameroon and the whole LCBCs. Although the sect was incapacitated, terrorism remains an international malaise and Cameroon hosts a fertile ground for terrorists’ activism. Boko Haram was just weakened and not completely defeated and could reappear someday even under a different appellation. Therefore, to absolutely eradicate terrorism in general and Boko Haram in particular, LCBCs must improve their military intelligence on terrorism and continue to collaborate with advanced experienced countries in fighting terrorism.

Keywords: Boko Haram, terrorism, domestic, international, response

Procedia PDF Downloads 130
374 The Crossroads of Corruption and Terrorism in the Global South

Authors: Stephen M. Magu

Abstract:

The 9/11 and Christmas bombing attacks in the United States are mostly associated with the inability of intelligence agencies to connect dots based on intelligence that was already available. The 1998, 2002, 2013 and several 2014 terrorist attacks in Kenya, on the other hand, are probably driven by a completely different dynamic: the invisible hand of corruption. The World Bank and Transparency International annually compute the Worldwide Governance Indicators and the Corruption Perception Index respectively. What perhaps is not adequately captured in the corruption metrics is the impact of corruption on terrorism. The World Bank data includes variables such as the control of corruption, (estimates of) government effectiveness, political stability and absence of violence/terrorism, regulatory quality, rule of law and voice and accountability. TI's CPI does not include measures related to terrorism, but it is plausible that there is an expectation of some terrorism impact arising from corruption. This paper, by examining the incidence, frequency and total number of terrorist attacks that have occurred especially since 1990, and further examining the specific cases of Kenya and Nigeria, argues that in addition to having major effects on governance, corruption has an even more frightening impact: that of facilitating and/or violating security mechanisms to the extent that foreign nationals can easily obtain identification that enables them to perpetuate major events, targeting powerful countries' interests in countries with weak corruption-fighting mechanisms. The paper aims to model interactions that demonstrate the cost/benefit analysis and agents' rational calculations as being non-rational calculations, given the ultimate impact. It argues that eradication of corruption is not just a matter of a better business environment, but that it is implicit in national security, and that for anti-corruption crusaders, this is an argument more potent than the economic cost / cost of doing business argument.

Keywords: corruption, global south, identification, passports, terrorism

Procedia PDF Downloads 393