Search results for: policing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 75

Search results for: policing

15 Impact of Social Crisis on Property Market Performance and Evolving Strategy for Improved Property Transactions in Crisis Prone Environment: A Case Study of North Eastern Nigeria

Authors: Abdur Raheem, Ado Yakub

Abstract:

Urban violence in the form of ethnic and religious conflicts have been on the increase in many African cities in the recent years of which most of them are the result of intense and bitter competition for political power, the control of limited economic, social and environmental resources. In Nigeria, the emergence of the Boko Haram insurgency in most parts of the north eastern parts have ignited violence, bloodshed, refuge exodus and internal migration. Not only do the persistent attacks of the sect create widespread insecurity and fear, it has also stifled normal processes of trade and investments most especially real property investment which is acclaimed to accelerate the economic cycle, thus the need to evolve strategies for an improved property market in such areas. This paper, therefore, examines the impact of these social crisis on effective and efficient utilization of real properties as a resource towards the development of the economy, using a descriptive analysis approach where particular emphasis was based on trends in residential housing values; volume of estimated property transactions and real estate investment decisions by affected individuals. Findings indicate that social crisis in the affected areas have been a clog on the wheels of property development and investment as properties worth hundreds of millions have been destroyed thereby having great impact on property values. Based on these findings, recommendations were made to include the need to strategically continue investing in property during such times, the need for Nigerian government to establish an active conflict monitoring and management unit for prompt response, encourage community and neighbourhood policing to ameliorate security challenges in Nigeria.

Keywords: social crisis, property market, economy, resources, north-eastern Nigeria

Procedia PDF Downloads 291
14 Investigation of Online Child Sexual Abuse: An Account of Covert Police Operations Across the Globe

Authors: Shivalaxmi Arumugham

Abstract:

Child sexual abuse (CSA) has taken several forms, particularly with the advent of internet technologies that provide pedophiles access to their targets anonymously at an affordable rate. To combat CSA which has far-reaching consequences on the physical and psychological health of the victims, a special act, the Protection of Children from Sexual Offences (POCSO) Act, was formulated amongst the existing laws. With its latest amendment criminalizing various online activities about child pornography also known as child sexual abuse materials in 2019, tremendous pressure is speculated on law enforcement to identify offenders online. Effective investigations of CSA cases help in not only to detect perpetrators but also in preventing the re-victimization of children. Understanding the vulnerability of the child population and that the offenders continue to develop stealthier strategies to operate, it is high time that traditional investigation, where the focus is on apprehending and prosecuting the offender, must make a paradigm shift to proactively investigate to prevent victimization at the first place. One of the proactive policing techniques involves understanding the psychology of the offenders and children and operating undercover to catch the criminals before a real child is victimized. With the fundamental descriptive approach to research, the article attempts to identify the multitude of issues associated with the investigation of child sexual abuse cases currently in practice in India. Then, the article contextualizes the various covert operations carried out by numerous law enforcement agencies across the globe. To provide this comprehensive overview, the paper examines various reports, websites, guidelines, protocols, judicial pronouncements, and research articles. Finally, the paper presents the challenges and ethical issues that are to be considered before getting into undercover operations either in the guise of a pedophile or as a child. The research hopes to contribute to the making of standard operating protocols for investigation officers and other relevant policymakers in this regard.

Keywords: child sexual abuse, cybercrime against children, covert police operations, investigation of CSA

Procedia PDF Downloads 68
13 [Keynote Speech]: Curiosity, Innovation and Technological Advancements Shaping the Future of Science, Technology, Engineering and Mathematics Education

Authors: Ana Hol

Abstract:

We live in a constantly changing environment where technology has become an integral component of our day to day life. We rely heavily on mobile devices, we search for data via web, we utilise smart home sensors to create the most suited ambiences and we utilise applications to shop, research, communicate and share data. Heavy reliance on technology therefore is creating new connections between STEM (Science, Technology, Engineering and Mathematics) fields which in turn rises a question of what the STEM education of the future should be like? This study was based on the reviews of the six Australian Information Systems students who undertook an international study tour to India where they were given an opportunity to network, communicate and meet local students, staff and business representatives and from them learn about the local business implementations, local customs and regulations. Research identifies that if we are to continue to implement and utilise electronic devices on the global scale, such as for example implement smart cars that can smoothly cross borders, we will need the workforce that will have the knowledge about the cars themselves, their parts, roads and transport networks, road rules, road sensors, road monitoring technologies, graphical user interfaces, movement detection systems as well as day to day operations, legal rules and regulations of each region and country, insurance policies, policing and processes so that the wide array of sensors can be controlled across country’s borders. In conclusion, it can be noted that allowing students to learn about the local conditions, roads, operations, business processes, customs and values in different countries is giving students a cutting edge advantage as such knowledge cannot be transferred via electronic sources alone. However once understanding of each problem or project is established, multidisciplinary innovative STEM projects can be smoothly conducted.

Keywords: STEM, curiosity, innovation, advancements

Procedia PDF Downloads 168
12 Mothers and Moneymakers: A Case Study of How Citizen-Women Shape U.S. Marriage Migration Politics Online

Authors: Gina Longo

Abstract:

Social media, internet technology, and affordable travel have created avenues like tourism and internet chatrooms for Western women to meet foreign partners without paid, third-party intermediaries in regions like the Middle East/North Africa (MENA) and Sub-Saharan Africa (SSA), where men from mid-level developing countries meet and marry Western women and try to relocate. Foreign nationals who marry U.S. citizens have an expedited track to naturalization. U.S. immigration officials require that “green card” petitioning couples demonstrate that their relationships are “valid and subsisting” (i.e., for love) and not fraudulent (i.e., for immigration papers). These requirements are ostensibly gender- and racially-neutral, but migration itself is not; black and white women petitioners who seek partners from these regions and solicit advice from similar others about the potential obstacles to their petitions’ success online. Using an online ethnography and textual analysis of conversation threads on a large on-line immigration forum where U.S. petitioners exchange such information, this study examines how gendered and racialized standards of legitimacy are applied to family and sexuality and used discursively online among women petitioners differently to achieve “genuineness” and define “red flags” indicating potential marriage fraud. This paper argues that forum-women members police immigration requests even before cases reach an immigration officer, and use this social media platform to reconstruct gendered and racialized hierarchies of U.S. citizenship. Women petitioners use the formal criteria of U.S. immigration in ways that reveal gender and racial ideologies, expectations for conformity to a gendered hegemonic family ideal, and policing of women’s sexual agency, fertility, and desirability. These intersectional norms shape their online discussions about the suitability of marriages and of the migration of non-citizen male partners of color to the United States.

Keywords: marriage fraud, migration, online forums, women

Procedia PDF Downloads 95
11 Role of Vigilante in Crime Control in Bodija Market

Authors: Obadiah Nwabueze

Abstract:

Bodija market is classified as Central Business District (CBD) of Ibadan North Local Government Area of Oyo State (Nigeria) because of socio economic activities, so Crime is a peculiar social issue that causes insecurity. The law enforcement agencies tasked with crime prevention and control such as the Nigerian Police have insufficient manpower, and a resultant effect is the emergence of Vigilante groups as citizen’s response to crime control and prevention (self-help). The research design adopted for this study is a case study design exploring Vigilante activities in Bodija Market. The study utilizes both quantitative and qualitative approach, sources of data includes primary and secondary sources. A sample of 127 respondents randomly picked from the 4 sections of Bodija Market through questionnaire, comprising of 50 male and 77 females which alienates issues of gender bias in addition to the 4 in-depth interview, making a total of 131 respondents. Statistical package for Social Sciences (SPSS) was used. The descriptive statistics of simple frequency, percentage, charts and graphs were computed for the analysis. Finding in the study shows that the market vigilante is able to deter and disrupt criminal activities through strategic spiritual intelligence (SSI), use of charm and juju, physical presence in strategic locations vulnerable to crime occurrence. Findings in the study also show that vigilantes collaborate with the police by assisting them in surveillance, tracking down criminals, identifying black spots, acting as informants to the police, arrest and handover criminal to police. Their challenges include poor equipment, motivation, unhealthy rivalry between the vigilante and the police. The study recommends that the government should support vigilantes with logistics and training, including patrol vehicle and radio communication. The study also recommends the integration of the informal mechanism (juju and charm) of crime detection and prevention into the formal policing strategy, an office should be created in the force commands for use of SSI.

Keywords: central business district, CBD, charm, Juju, strategic spiritual intelligence, SSI

Procedia PDF Downloads 210
10 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria

Authors: Adebisi A. Sunday, Babajide Adeokin

Abstract:

The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.

Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer

Procedia PDF Downloads 100
9 Consolidating a Regime of State Terror: A Historical Analysis of Necropolitics and the Evolution of Policing Practices in California as a Former Colony, Frontier, and Late-Modern Settler Society

Authors: Peyton M. Provenzano

Abstract:

This paper draws primarily upon the framework of necropolitics and presents California as itself a former frontier, colony, and late-modern settler society. The convergence of these successive and overlapping regimes of state terror is actualized and traceable through an analysis of historical and contemporary police practices. At the behest of the Spanish Crown and with the assistance of the Spanish military, the Catholic Church led the original expedition to colonize California. The indigenous populations of California were subjected to brutal practices of confinement and enslavement at the missions. After the annex of California by the United States, the western-most territory became an infamous frontier where new settlers established vigilante militias to enact violence against indigenous populations to protect their newly stolen land. Early mining settlements sought to legitimize and fund vigilante violence by wielding the authority of rudimentary democratic structures. White settlers circulated petitions for funding to establish a volunteer company under California’s Militia Law for ‘protection’ against the local indigenous populations. The expansive carceral practices of Los Angelinos at the turn of the 19th century exemplify the way in which California solidified its regime of exclusion as a white settler society. Drawing on recent scholarship that queers the notion of biopower and names police as street-level sovereigns, the police murder of Kayla Moore is understood as the latest manifestation of a carceral regime of exclusion and genocide. Kayla Moore was an African American transgender woman living with a mental health disability that was murdered by Berkeley police responding to a mental health crisis call in 2013. The intersectionality of Kayla’s identity made her hyper-vulnerable to state-sanctioned violence. Kayla was a victim not only of the explicitly racial biopower of police, nor the regulatory state power of necropolitics but of the ‘asphyxia’ that was intended to invisibilize both her life and her murder.

Keywords: asphyxia, biopower, california, carceral state, genocide, necropolitics, police, police violence

Procedia PDF Downloads 107
8 Internationalization of Higher Education in Malaysia-Rationale for Global Citizens

Authors: Irma Wani Othman

Abstract:

The internationalization of higher education in Malaysia mainly focuses to place the implementation of the strategic, comprehensive and integrated range of stakeholders in order to highlight the visibility of Malaysia as a hub of academic excellence. While the concept of 'global citizenship' is used as a two-pronged strategy of aggressive marketing by universities which includes; (i) the involvement of the academic expatriates in stimulating international activities of higher education and (ii) an increase in international student enrollment capacity for the enculturation of science and the development of first class mentality. In this aspect, aspirations for a transnational social movement through global citizenship status to establish the identity of the university community without borders (borderless universities) - regardless of skin colour, thus rationalize and liberalize the universal principles of life and cultural traditions of a nation. The education system earlier referred by the spirit of nationalism is now progressing due to globalization, hence forming a system of higher education that is relevant and generated by the need of all time. However, debates arose when the involvement of global citizenship is said to threaten the ultimate university autonomy in determining the direction of academic affairs and governance of their human resources. Stemming from this debate, this study aims to explore the experience of 'global citizenship' that the academic expatriates and international students in shaping the university's strategic needs and interests which are in line with the transition of contemporary higher education. The objective of this study is to examine the acculturation experience of the global citizen in the form of transnational higher education system and suggest policy and policing IHE which refers directly to the experience of the global citizen. This study offers a detailed understanding of how the university communities assess their expatriation experience, thus becoming useful information for learning and transforming education. The findings also open an advanced perspective on the international mobility of human resources and the implications on the implementation of the policy of internationalization of higher education. The contribution of this study is expected to give new input, thus shift the focus of contextual literature for the internationalization of the education system. Instead of focusing on the purpose of generating income of a university, to a greater understanding of subjective experience in utilizing international human resources hence contributing to the prominent transnational character of higher education.

Keywords: internationalization, global citizens, Malaysia higher education, academic expatriate, international students

Procedia PDF Downloads 265
7 The Dismantling of the Santa Ana Riverbed Homeless Encampment: A Case Study

Authors: Shasta Bula

Abstract:

This research provides the first case study of the Santa Ana riverbed homeless encampment. It contributes valuable information about the little-studied factors contributing to the formation and dismantling of transient homeless encampments. According to the author’s best knowledge, this is the discussion of three reoccurring characteristics of homeless camps: camps form a self-governing system, camps are viewed by the community as unsavory places, and the campers are viewed as being unable or unwilling to participate in normal society. Three theories are proposed as explanations for these characteristics: the social capital theory as a reason for homeless campers to develop a system of self-government, the aesthetics theory as rationale for camps being viewed as unsavory places, and the theory of vulnerable and inevitable inequality as a reason why campers are seen as being unable or unwilling to participate in normal society. Three hypotheses are introduced to assess these theories: The encampment was created because it provided inhabitants a sense of safety and autonomy. It was dismantled due to its highly visible location and lack of adherence to the Orange County consumption and leisure aesthetic. Most homeless people from this encampment relocated approximately thirty miles east to Riverside County to avoid harassment by police. An extensive review of interviews with camp inhabitants revealed that fifty-one percent resided in the camp because it gave them a sense of safety and autonomy. An examination of Anaheim city council meeting meetings showed that thirty-eight percent of complaints were related to aesthetic concerns. Analysis of population reports from the U.S. Department of Housing and Urban Development indicated that there was a notable increase in homelessness in Orange County the year after the camp was dismantled. These results reflect that the social capital theory is an applicable explanation for the homeless being drawn to set up camp as a collective. The aesthetics theory can be used to explain why a third of residents complained about the encampment. Camp residents did not move East to Riverside after the camp was dismantled. Further investigation into the enforcement of anti-camping ordinances needs to be conducted to evaluate if policing contributed to the vulnerability of the homeless.

Keywords: poverty, social relations, transformation of urban settlements, urban anthropology

Procedia PDF Downloads 63
6 A Critical Discourse Analysis of ‘Youth Radicalisation’: A Case of the Daily Nation Kenya Online Newspaper

Authors: Miraji H. Mohamed

Abstract:

The purpose of this study is to critique ‘radicalisation’ and more particularly ‘youth radicalisation’ by exploring its usage in online newspapers. ‘Radicalisation’ and ‘extremism’ have become the most common terms in terrorism studies since the 9/11 attacks. Regardless of the geographic location, when the word terrorism is used the terms ‘radicalisation’ and ‘extremism’ always follow to attempt to explore the journey of the perpetrators towards violence. These terms have come to represent a discourse of dominantly pejorative traits often used to describe spaces, groups, and processes identified as problematic. Even though ambiguously defined they feature widely in government documents, political statements, news articles, academic research, social media platforms, religious gatherings, and public discussions. Notably, ‘radicalisation’ and ‘extremism’ have been closely conflated with the term youth to form ‘youth radicalisation’ to refer to a discourse of ‘youth at risk’. The three terms largely continue to be used unquestioningly and interchangeably hence the reason why they are placed in single quotation marks to deliberately question their conventional usage. Albeit this comes timely in the Kenyan context where there has been a proliferation of academic and expert research on ‘youth radicalisation’ (used as a neutral label) without considering the political, cultural and socio-historical contexts that inform this label. This study seeks to draw these nuances by employing a genealogical approach that historicises and deconstructs ‘youth radicalisation’; and by applying a Discourse-Historical Approach (DHA) of Critical Discourse Analysis to analyse Kenyan online newspaper - The Daily Nation between 2015 and 2018. By applying the concept of representation to analyse written texts, the study reveals that the use of ‘youth radicalisation’ as a discursive strategy disproportionately affects young people especially those from cultural/ethnic/religious minority groups. Also, the ambiguous use of ‘radicalisation’ and ‘youth radicalisation’ by the media reinforces the discourse of ‘youth at risk’ which has become the major framework underpinning Countering Violent Extremism (CVE) interventions. Similarly, the findings indicate that the uncritical use of ‘youth radicalisation’ has been used to serve political interests; and has become an instrument of policing young people, thus contributing to their cultural shaping. From this, it is evident that the media could thwart rather than assist CVE efforts. By exposing the political nature of the three terms through evidence-based research, this study offers recommendations on how critical reflective reporting by the media could help to make CVE more nuanced.

Keywords: discourse, extremism, radicalisation, terrorism, youth

Procedia PDF Downloads 100
5 Phenomenology of Child Labour in Estates, Farms and Plantations in Zimbabwe: A Comparative Analysis of Tanganda and Eastern Highlands Tea Estates

Authors: Chupicai Manuel

Abstract:

The global efforts to end child labour have been increasingly challenged by adages of global capitalism, inequalities and poverty affecting the global south. In the face the of rising inequalities whose origin can be explained from historical and political economy analysis between the poor and the rich countries, child labour is also on the rise particularly on the global south. The socio-economic and political context of Zimbabwe has undergone serious transition from colonial times through the post-independence normally referred to as the transition period up to the present day. These transitions have aided companies and entities in the business and agriculture sector to exploit child labour while country provided conditions that enhance child labour due to vulnerability of children and anomic child welfare system that plagued the country. Children from marginalised communities dominated by plantations and farms are affected most. This paper explores the experiences and perceptions of children working in tea estates, plantations and farms, and the adults who formerly worked in these plantations during their childhood to share their experiences and perceptions on child labour in Zimbabwe. Childhood theories that view children as apprentices and a human rights perspectives were employed to interrogate the concept of childhood, child labour and poverty alleviation strategies. Phenomenological research design was adopted to describe the experiences of children working in plantations and interpret the meanings they have on their work and livelihoods. The paper drew form 30 children from two plantations through semi-structured interviews and 15 key informant interviews from civil society organisations, international labour organisation, adults who formerly worked in the plantations and the personnel of the plantations. The findings of the study revealed that children work on the farms as an alternative model for survival against economic challenges while the majority cited that poverty compel them to work and get their fees and food paid for. Civil society organisations were of the view that child rights are violated and the welfare system of the country is malfunctional. The perceptions of the majority of the children interviewed are that the system on the plantations is better and this confirmed the socio-constructivist theory that views children as apprentices. The study recommended child sensitive policies and welfare regime that protects children from exploitation together with policing and legal measures that secure child rights.

Keywords: child labour, child rights, phenomenology, poverty reduction

Procedia PDF Downloads 220
4 Ambivilance, Denial, and Adaptive Responses to Vulnerable Suspects in Police Custody: The New Limits of the Sovereign State

Authors: Faye Cosgrove, Donna Peacock

Abstract:

This paper examines current state strategies for dealing with vulnerable people in police custody and identifies the underpinning discourses and practices which inform these strategies. It has previously been argued that the state has utilised contradictory and conflicting responses to the control of crime, by employing opposing strategies of denial and adaptation in order to simultaneously both display sovereignty and disclaim responsibility. This paper argues that these contradictory strategies are still being employed in contemporary criminal justice, although the focus and the purpose have now shifted. The focus is upon the ‘vulnerable’ suspect, whose social identity is as incongruous, complex and contradictory as his social environment, and the purpose is to redirect attention away from negative state practices, whilst simultaneously displaying a compassionate and benevolent countenance in order to appeal to the voting public. The findings presented here result from intensive qualitative research with police officers, with health care professionals, and with civilian volunteers who work within police custodial environments. The data has been gathered over a three-year period and includes observational and interview data which has been thematically analysed to expose the underpinning mechanisms from which the properties of the system emerge. What is revealed is evidence of contemporary state practices of denial relating to the harms of austerity and the structural relations of vulnerability, whilst simultaneously adapting through processes of ‘othering’ of the vulnerable, ‘responsibilisation’ of citizens, defining deviance down through diversionary practices, and managing success through redefining the aims of the system. The ‘vulnerable’ suspect is subject to individual pathologising, and yet the nature of risk is aggregated. ‘Vulnerable’ suspects are supported in police custody by private citizens, by multi-agency partnerships, and by for-profit organisations, while the state seeks to collate and control services, and thereby to retain a veneer of control. Late modern ambivalence to crime control and the associated contradictory practices of abjuration and adjustment have extended to state responses to vulnerable suspects. The support available in the custody environment operates to control and minimise operational and procedural risk, rather than for the welfare of the detained person, and in fact, the support available is discovered to be detrimental to the very people that it claims to benefit. The ‘vulnerable’ suspect is now subject to the bifurcated logics employed at the new limits of the sovereign state.

Keywords: custody, policing, sovereign state, vulnerability

Procedia PDF Downloads 133
3 Understanding Evidence Dispersal Caused by the Effects of Using Unmanned Aerial Vehicles in Active Indoor Crime Scenes

Authors: Elizabeth Parrott, Harry Pointon, Frederic Bezombes, Heather Panter

Abstract:

Unmanned aerial vehicles (UAV’s) are making a profound effect within policing, forensic and fire service procedures worldwide. These intelligent devices have already proven useful in photographing and recording large-scale outdoor and indoor sites using orthomosaic and three-dimensional (3D) modelling techniques, for the purpose of capturing and recording sites during and post-incident. UAV’s are becoming an established tool as they are extending the reach of the photographer and offering new perspectives without the expense and restrictions of deploying full-scale aircraft. 3D reconstruction quality is directly linked to the resolution of captured images; therefore, close proximity flights are required for more detailed models. As technology advances deployment of UAVs in confined spaces is becoming more common. With this in mind, this study investigates the effects of UAV operation within active crimes scenes with regard to the dispersal of particulate evidence. To date, there has been little consideration given to the potential effects of using UAV’s within active crime scenes aside from a legislation point of view. Although potentially the technology can reduce the likelihood of contamination by replacing some of the roles of investigating practitioners. There is the risk of evidence dispersal caused by the effect of the strong airflow beneath the UAV, from the downwash of the propellers. The initial results of this study are therefore presented to determine the height of least effect at which to fly, and the commercial propeller type to choose to generate the smallest amount of disturbance from the dataset tested. In this study, a range of commercially available 4-inch propellers were chosen as a starting point due to the common availability and their small size makes them well suited for operation within confined spaces. To perform the testing, a rig was configured to support a single motor and propeller powered with a standalone mains power supply and controlled via a microcontroller. This was to mimic a complete throttle cycle and control the device to ensure repeatability. By removing the variances of battery packs and complex UAV structures to allow for a more robust setup. Therefore, the only changing factors were the propeller and operating height. The results were calculated via computer vision analysis of the recorded dispersal of the sample particles placed below the arm-mounted propeller. The aim of this initial study is to give practitioners an insight into the technology to use when operating within confined spaces as well as recognizing some of the issues caused by UAV’s within active crime scenes.

Keywords: dispersal, evidence, propeller, UAV

Procedia PDF Downloads 136
2 Pyramid of Deradicalization: Causes and Possible Solutions

Authors: Ashir Ahmed

Abstract:

Generally, radicalization happens when a person's thinking and behaviour become significantly different from how most of the members of their society and community view social issues and participate politically. Radicalization often leads to violent extremism that refers to the beliefs and actions of people who support or use violence to achieve ideological, religious or political goals. Studies on radicalization negate the common myths that someone must be in a group to be radicalised or anyone who experiences radical thoughts is a violent extremist. Moreover, it is erroneous to suggest that radicalisation is always linked to religion. Generally, the common motives of radicalization include ideological, issue-based, ethno-nationalist or separatist underpinning. Moreover, there are number of factors that further augments the chances of someone being radicalised and may choose the path of violent extremism and possibly terrorism. Since there are numbers of factors (and sometimes quite different) contributing in radicalization and violent extremism, it is highly unlikely to devise a single solution that could produce effective outcomes to deal with radicalization, violent extremism and terrorism. The pathway to deradicalization, like the pathway to radicalisation, is different for everyone. Considering the need of having customized deradicalization resolution, this study proposes a multi-tier framework, called ‘pyramid of deradicalization’ that first help identifying the stage at which an individual could be on the radicalization pathway and then propose a customize strategy to deal with the respective stage. The first tier (tier 1) addresses broader community and proposes a ‘universal approach’ aiming to offer community-based design and delivery of educational programs to raise awareness and provide general information on possible factors leading to radicalization and their remedies. The second tier focuses on the members of community who are more vulnerable and are disengaged from the rest of the community. This tier proposes a ‘targeted approach’ targeting the vulnerable members of the community through early intervention such as providing anonymous help lines where people feel confident and comfortable in seeking help without fearing the disclosure of their identity. The third tier aims to focus on people having clear evidence of moving toward extremism or getting radicalized. The people falls in this tier are believed to be supported through ‘interventionist approach’. The interventionist approach advocates the community engagement and community-policing, introducing deradicalization programmes to the targeted individuals and looking after their physical and mental health issues. The fourth and the last tier suggests the strategies to deal with people who are actively breaking the law. ‘Enforcement approach’ suggests various approaches such as strong law enforcement, fairness and accuracy in reporting radicalization events, unbiased treatment by law based on gender, race, nationality or religion and strengthen the family connections.It is anticipated that the operationalization of the proposed framework (‘pyramid of deradicalization’) would help in categorising people considering their tendency to become radicalized and then offer an appropriate strategy to make them valuable and peaceful members of the community.

Keywords: deradicalization, framework, terrorism, violent extremism

Procedia PDF Downloads 229
1 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 68