Connect with us

Terrorism

Exploring Nigeria’s Vulnerability in cyber warfare

Published

on

In August 2012 Boko Haram reportedly hacked the personnel records databases of Nigeria’s secret service.  The individual who successfully compromised the covert-personnel data system indicated the breach was executed in the name of Boko Haram and as a response to Nigeria’s handling of interactions with the group

.[1]   The retaliatory attack revealed the names, addresses, bank information and family members of current and former personnel assigned to the country’s spy agency. The attack would not have tremendous significance in and of itself.  However, it represents a substantial shift in tactics for a group whose name connotes an anti-Western stance. Until recently Boko Haram attack strategy was far from technological.  However, since its association with Al Qaeda, Boko Haram has demonstrated a vastly changed approach to executing its attacks.  Attacks are now more violent and reflect the markings of training by al Qaeda personnel.  Given that cyber space has been part of the terrorists’ warfare tool kit since 1998 when the Tamil Tigers executed a distributed denial of service attack, [2] and al Qaeda has used the Internet as a vital communication vehicle since 1996, Boko Haram’s incorporation of cyber into its arsenal is almost inevitable.  More importantly though, Boko Haram’s access to an individual who can execute such a successful attack is indicative of the cyber arsenal workforce capability available to any group or nation that wants to employ it.  Boko Haram’s tactic advancement clearly demonstrates that Nigeria and its neighboring Sahel region neighbors are ripe for exploitation as a cyber warfare hub.

Cyber warfare is experiencing a boon.  The success of activities like Ghostnet, Stuxnet, Byzantine Hades, and Titan Rain has shown that the demand for such products will not slow anytime soon. Nation-states have begun to incorporate cyber warfare against opponents’ cyber space attacks into their national security strategy.[3] However, the reality is that nations executing these attacks do not always want to be identified as the perpetrators.  Case in point- after a student from the University of Electronic Science and Technology of China executed a vast nation-state intrusion called “Ghostnet,” several media accounts of the attack wondered if China was involved.  China denied any knowledge of the attacks and the sensitive information retrievals from 103 invaded national security databases remained unclaimed.   The Chinese continued their public stance of denying culpability when a report on corporate intrusions specifically named the Chinese Peoples Liberation Army’s Unit 61398.  According to the report investigators traced several intrusions into United States (U.S.) corporate and government secure information technology systems to the PLA unit.

Just as China prefers a public stance of denial, so might other nations. Public response to Ghostnet and Stuxnet made it apparent nations would not always want it known that they were perpetrators of an attack.  It was clear that for nation-states to continue to incorporate this new weapon, they had to accommodate the sensitive diplomatic nature of such attacks by finding an alternate approach.  But we have to acknowledge that their appetites for these attacks will not diminish.  If anything, they will grow. What could this mean? If we use Boko Haram as an example, we can suggest an alternate approach that leverages the chaotic political situation and burgeoning supply of talented cyber personnel within Nigeria and the Sahel.  Executing attacks from this third-party cyber location, offers attack perpetrators and the cyber arms industry the ability to outsource, just as manufacturing does.[4]

If we use the impact of improvised explosive devices on Afghanistan and and Iraq as an example, Nigeria and the Sahel can offer resources for “niggling” attacks that target nation-states with “improvised explosive device” level attacks.  These attacks would cause damage that is cumulatively significant, but individually not.[5] The costs could remain low, as the readily available workforce functions in a region with an average annual income of $1180 (U.S. dollars). The nation-states employing this workforce will have a great cost-benefit ratio and the workforce itself will achieve success in their chosen field.[6] While the Vice Chancellor of Osun State University is not pleased that the stated goal of computer science students was “making money in cyber crime”[7] the reality is perpetrators of cyber warfare can use the demographic of Nigeria and the Sahel to train recruits and execute attacks without impunity.  The Sahel has an economic environment that is conducive to cyber crime activities, an exploitable sophisticated cyber highway, and an area where officials are more focused on political distractors than enforcing information communication technology regulations.

Nation-state with Sufficient Political Distractors

Nigeria and its Sahel neighbors have many cultural influences, particularly from a tribal perspective.  In addition, there are many natural resources available for state use to contribute to the country’s gross national product. But while this should be a positive, they are heavily affected by the corruption and direct disregard demonstrated by government leaders.  As a result, unemployment is high, there is minimal foreign investment, and the black market runs the shadow economy with money laundering, bank fraud and identify theft running rampant.  These factors contribute significantly to many of the nations in the region ranking high on the Failed State Index, from a total perspective and reflecting a high economic decline total.[8], [9]

Modern Fiber-Optic Information Communication Infrastructure

In the year 2000 only 4.5 million of Africa’s one billion people were categorized as Internet users.  That was a little more than .42%. However, as the continent, its resources, and potential 2050 workforce were combined to become opportunities for investors, it became apparent to these investors, and the African nations where this workforce lives, that tremendous improvements to the continent’s information highway were imperative.

Those improvements started with the Eastern Africa Submarine System (EASS) fiber-optic cable proposal in 2003.[10]   Other improvements were the 2009 fiber-optic submarine cable system Seacom, the 2010 Western Africa cable system, and the 2014 projected finish “connectivity” project. The continent now boasts over 15% Internet users, with some individual states experiencing much higher usage.[11] World bank nations that recognized this need and invested in the highway’s improvements include Brazil, Russia, India and China (BRIC). South Africa joined the effort when it became a part of BRIC in 2010.

With these state of the art advancements, countries like Mozambique, Tanzania, Kenya, Somalia and the Sudan enjoy connectivity via mobile telephone technology to almost anywhere in the world.  The continent is now seen as an attractive foreign investment destination pursued by more than the initial chance takers. Residents of almost any state can access mobile technology, changing the definition of “remote Africa” and the number of marginalized populations.

But these same potential economy-boosting continental links also serve as the tool for cyber criminals to advance their entrepreneurial skills.

Cyber Warfare Attacks

The attacks executed by the perpetrators of Stuxnet, Ghostnet, and even Flame, were initially conceived and deployed incognito.  Flame functioned for almost two years before discovery; and when found, the United States did not initially acknowledge its role.  The negative international response to Flame and Ghostnet was enough for nation-states to realize that today’s military strategy-international diplomacy equilibrium demands a more discreet employment of this new weapon.  One that does not jeopardize current diplomatic relations or upset conventional weapons partners. The nations left vulnerable after each of these attacks also recognized that they would be at a disadvantage if they did not begin to include strategic cyber offensive and defensive operations into their national defense blueprint.  While the Flame attack was directly attributed to the United States, the Ghostnet attack was never conclusively identified as China directed. The young researcher identified as Ghostnet’s perpetrator was a well-known hacker who never implicated any other person or entity in the effort.

What if a nation-state employed the tactic and this type of workforce on a future attack?  That is: if a nation-state employed a third-party entity that is willing to NOT implicate the nation-state, could that nation-state successfully execute such a cyber warfare attack and not have to face the wrath of its international partners?

Rafal Rohozinksi, one of the investigators of Ghostnet and cofounder of Information Warfare Monitor, has suggested that such outsourcing could become a wave of the future.  Rohozinksi cites the factors that could contribute to the trend.  Nations need an alternative that offers anonymity, preserves current diplomatic balances and employs resources that are outside the nation’s jurisdiction.  To ensure anonymity remains throughout the event and its investigation, local resources from a jurisdiction that not prone to enforcing International Communications Technology (ICT) rules and regulations.[12]

According to a 2011 Harvard School of Public Health assessment Africa is expected to contribute 49% of the world’s 2050 population growth.[13] Rohozinski insists this 2050 workforce will have a demographic that is conducive to cyber crime: young, talented, from a developing nation, possessing a value system that has previously, and would in the future, support participation in or instigation of acts of cyber crime.[14]

If Rohozinski is correct, then we have to recognize that developing nations without strong ICT rules and regulation enforcement, nations with civil unrest or nations that lack services could serve as third party locations and perpetrator source.

The perpetrator source could easily begin with the University students who have professed a desire to work in the cyber crime industry.  These University students have already participated in attacks that focus necessary to execute such missions, one potential source of such attacks could very well be outside the borders of the

Taken together these factors make Africa attractive to almost any investor, especially any who inhabit the shadowy world of cyber crime. To hacking investors the limited resources needed to establish a presence is particularly inviting.  There is already an experienced cyber crime workforce, a reduced enforcement of ICT rules and regulations, a strong malware history and an economic environment that makes the potential very attractive.  As a business venture, there are few negatives.

Which Cyber Crimes?

Criminal use of the region’s Information highway already include electronic mail scams, scam letters that range from purchase of real estate, disbursement of money from wills, to sale of crude oil at below market prices. Communication usually occurs through electronic message via fax, e-mail or cell phone. Verification is difficult so victims ultimately pay the fees without evidence to validate the claim of the perpetrator.

While these types of cyber crime are perpetrated on a large scale in countries like Nigeria, the crimes themselves are not target specific.  The perpetrators initiate several scams at a time so that the perpetrator financially benefits, on average, from some, if not all, of the scams.  No one victim is regarded as the single important prey.

 Given the ideal conditions the region offers for third party cyber warfare attacks, several questions must be answered for national security strategists to understand the threat they could potentially face: would these same Nigerian or Sahel region cyber crime perpetrators initiate their perfected scams for another entity? Are they willing to expand their skill set and advance into target specific entities?  Finally, if they were willing to initiate target specific entities, would they execute an attack on infrastructure?  If they initiate the crime, is there a limit to the type of crimes they will launch?

There is already a perception/acceptance of students who “steal trade secrets, research documents or supplier’s agreements.  A cyber warfare or cyber espionage Internet malware, its indicators and its codes are available on the web, but are the already cyber crime literate workforce members motivated to execute these types of attacks? If the Boko Haram attack is an indication, they very well may be.  An almost unencumbered access to high quality information communication technology, combined with the computer literate young of 2050, make it wise for potential target nations to understand the threat this region could represent for them.  They must accept the reality that the opportunity this new industry offers the Sahel’s employment-opportunity-constrained workforce, and the potential to earn a living far above the current $1180 (U.S dollars) annual income, make the Sahel’s attractiveness as a cyber warfare third-party haven almost irresistible. [15]

Conclusion

The Sahel is already home to a variety of illicit activities, and adding cyber warfare to that list is not far fetched. Nation-states could benefit from expanding their repertoire of weapons, terrorist actors could include it in this arsenal against the West, and both would achieve their goals and objectives without significant infrastructure modifications. This could redefine cyber crime if both the nation-state and the terrorist actors, reconcile their value system with incorporating this approach to expanding their warfare arsenal.

These perpetrators of ill intent (whether nation-state or terrorist actor) recognize that, in today’s world, their victims do not have the option of “no presence on the web.” They can, therefore, inflict damage, pinpoint attacks, and execute attacks without significant cost. Their potential victims must therefore learn how to counter this attack approach while minimizing negative impact on the already fragile economies of the Sahel and, even, Nigeria.

The nations in the region, themselves, have to also include this consideration as they develop their law enforcement approach to information communication technology regulation enforcement.  Each nation already has shadow economies from the illicit crime and that economy feeds, houses, and clothes many of its citizens.  The governments of the area have to form a coalition with investing countries and identify alternates for these potential “failed state mercenaries and their robust cyber warfare attack tools.  We underestimated Boko Haram in the past.  We should not underestimate the bellwether Boko Haram’s cyber attack may represent.

(*)Exploring Nigeria’s Vulnerability in cyber warfare

By Denise N. Baken and Ioannis Mantzikos

Speech prepared for Society for the Study of Terrorism Conference 27-28 June 2013, University of East London

Bibliography

Adedayo, Olugbenga. “Secondary School Students’ Perceptions of Incidences of Internet Crimes Among School Age Children in Oyo and Ondo States, Nigeria (dissertation).” University of Ibadan, Nigeria, 2008. http://www.kaspersky.com/images/secondary_school_students_perceptions_of_incidences_of_internet_crimes_among_school_age_children_in_oyo_and_on-10-75860.pdf.

Adeniran, Adebusuyi. “The Internet and Emergence of Yahoo boys sub-Culture in Nigeria.” International Journal of Cyber Criminology 2, no. 2 (December 2008): 368–381.

Adigun, Bashir. “AP Exclusive: Nigeria Secret Police Details Leaked.” Salon, August 30, 2012. http://www.salon.com/2012/08/30/ap_exclusive_nigeria_secret_police_details_leaked/.

“Africa Internet Usage, Facebook and Population Statistics.” Internet World Stats: Usage and Population Statistics, June 30, 2012. http://internetworldstats.com/stats1.htm.

Baken, Denise, and Ioannis Mantzikos. “Cyberspace Improvised Explosive Device and the Failed State Catapult-The Strategic Symbiotic Relationship Failed State Status Offers Nation-State Cyberwarfare Arsenals.” In New-Old Salafi/Al Qaeda Threats.
Washington, DC: Association fro the Study of the Middle East and Africa, 2012.

Denning, Dorothy. “Cyberterrorism – Testimony Before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives.” Georgetown University, May 23, 2000. http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html.

Li, Hao. “World Population to Top 9 Billion by 2050, 49% Growth from Africa.” International Business Times, July 29, 2011. http://www.ibtimes.com/world-population-top-9-billion-2050-49-growth-africa-820105.

Mills, Elinor. “Report: Countries Prepping for Cyberwar.” CNN, November 17, 2009. http://articles.cnn.com/2009-11-17/tech/cnet.cyberwar.internet_1_south-korea-cyberwarfare-cyberattack?_s=PM:TECH.

Osman, Osman Dahir. “Submarine Fiber Optic Route to Somalia.” Hiiraan Online. September 27, 2007. http://www.hiiraan.com/news2/2007/sept/submarine_fiber_optic_route_to_somalia.aspx.

Panel on Cyber Crime. 41st St Gallen Symposium. University of St. Gallen, Switzerland, 2011. http://www.youtube.com/watch?v=DpRYXRNWka0&feature=youtube_gdata_player.

Shuaib, Shuaib. “allAfrica.com: Nigeria: Cyber Crime, Our Biggest Problem – VC.” News. allAfrica.com, September 1, 2010. http://allafrica.com/stories/201009010416.html.

“The Failed States Index 2012 Interactive Grid.” FFP The Fund for Peace, June 18, 2012. http://www.fundforpeace.org/global/?q=fsi-grid2012.

“UNICEF – At a Glance: Nigeria – Statistics.” UNICEF. Accessed February 20, 2013. http://www.unicef.org/infobycountry/nigeria_statistics.html.

[1] Bashir Adigun, “AP Exclusive: Nigeria Secret Police Details Leaked,” Salon, August 30, 2012, http://www.salon.com/2012/08/30/ap_exclusive_nigeria_secret_police_details_leaked/.

[2] Dorothy Denning, “Cyberterrorism – Testimony Before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives,” Georgetown University, May 23, 2000,
http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html.

[3] Elinor Mills, “Report: Countries Prepping for Cyberwar,” CNN, November 17, 2009, http://articles.cnn.com/2009-11-17/tech/cnet.cyberwar.internet_1_south-korea-cyberwarfare-cyberattack?_s=PM:TECH.

[4] Denise Baken and Ioannis Mantzikos, “Cyberspace Improvised Explosive Device and the Failed State Catapult-The Strategic Symbiotic Relationship Failed State Status Offers Nation-State Cyberwarfare Arsenals,”
in New-Old Salafi/Al Qaeda Threats (presented at the 5th Annual ASMEA Conference-History and the “New” Middle East and Africa, Washington, DC: Association fro the Study of the Middle East and Africa, 2012).

[5] Ibid.

[6] Shuaib Shuaib, “allAfrica.com: Nigeria: Cyber Crime, Our Biggest Problem – VC,” news, allAfrica.com, September 1, 2010, http://allafrica.com/stories/201009010416.html.

[7] Baken and Mantzikos, “Cyberspace Improvised Explosive Device and the Failed State Catapult-The Strategic Symbiotic Relationship Failed State Status Offers Nation-State Cyberwarfare Arsenals.”

[8] The Failed State Index rates several indicators, one of which is economic decline.  The maximum number a country receive for any indicator is 10.

[9] “The Failed States Index 2012 Interactive Grid,” FFP The Fund for Peace, June 18, 2012, http://www.fundforpeace.org/global/?q=fsi-grid2012.

[10] Osman Dahir Osman, “Submarine Fiber Optic Route to Somalia,” Hiiraan Online, September 27, 2007, http://www.hiiraan.com/news2/2007/sept/submarine_fiber_optic_route_to_somalia.aspx.

[11] “Africa Internet Usage, Facebook and Population Statistics.”

[12] Panel on Cyber Crime, 41st St Gallen Symposium (University of St. Gallen, Switzerland, 2011), http://www.youtube.com/watch?v=DpRYXRNWka0&feature=youtube_gdata_player.

[13] Hao Li, “World Population to Top 9 Billion by 2050, 49% Growth from Africa,” International Business Times, July 29, 2011, http://www.ibtimes.com/world-population-top-9-billion-2050-49-growth-africa-820105.

[14] Panel on Cyber Crime.

[15] “UNICEF – At a Glance: Nigeria – Statistics,” UNICEF, accessed February 20, 2013, http://www.unicef.org/infobycountry/nigeria_statistics.html.

Terrorism

Stateless and Leftover ISIS Brides

Sagar N

Published

on

By

While the World is busy fighting the pandemic and the economic devastation caused by it, one of the important problem that has been pushed to dormancy, is the status of the ISIS(Islamic State of Iraq and Syria) brides. The Pandemic has crippled the capacity of the law enforcement and exploiting this the ISIS executed attacks in Maldives, Iraq, and the Philippines. The United Nations Secretary-General Antonio Guterres has warned that terrorists are exploiting the COVID-19 Pandemic. Albeit the ISIS has been defeated, approximately ten thousand of them are in ISIS detention centres in Northern Syria under Kurds. Most of these detention centres are filled by women and children, who are relatives or widows of the ISIS fighters. With their native states denouncing them, the status of the stateless women and children is unclear.

As it stands today states’ counter-terrorism approach has been primarily targeting male militants but women also have played a role in strengthening these terrorist organizations. Women involvement in militant organizations has increased as they perform several activities like birthing next-generation militants/jihadists, managing the logistics and recruiting the new members to the organizations. The world did not recognize women as key players in terrorist organizations until the 1980s when females held major roles in guerilla wars of southern America. Women have either willingly or unwillingly held a variety of roles in these extremist organizations and Islamist terrorist organizations like Hamas and al-Qaeda women do simply provide moral support.

According to the media reports since the US withdrawal from Iraq in 2006 female suicide attacks have been increased and they have been extensively part of ISIS. The ISIS had a female brigade which they called as Al-Khansaa which was established to perform search activities in the state. Both foreign and domestic recruits in the Islamic state have participated in brutal torture. A recently acquired logbook from a guesthouse in Syria provides important information about 1100 females who joined the organization, the western women who are called as ‘the muhajirat’.

When the people from rest of the world joined organizations such as ISIS, they burnt their passports and rejected their national identity. Especially women from western countries who were radicalized online based on their phenomenon ‘ISIS brides/Jihadi brides’ to marry terrorists. Since Islamic State isnot recognized by the world these marriages are not legally valid, apart from this a number of these brides have experienced sexual torture and extreme violence.

While the erstwhile members of the extremist organizations like ISIS and others are left adrift the one challenging question remaining is should states and their societies keep them and reengage or rehabilitate or prosecute them. How firmly the idea of their erstwhile organization is stuck in their minds and especially the followers who crossed the world to join remains a concern to many. The U.S backed Kurdish forces across turkey border hold thousands of these left-behind women and children in their centre. Hundreds of foreign women and children who were once part of an aspirant state, The caliphate are now floating around the concentration camps in Syria, Turkey and Kurdish detention centres and prisons. Many are waiting to return to their origin countries. They pose a unique challenge to their native states like whether to include them or not and even if they include how to integrate adults who at least for a time part of these terrorist organizations and what to do with children who are too young to understand the politics and obstacles keeping them in camps and detention centres where resources are scarce. Women present a problem because its hard to know what kind of crimes they have committed beyond the membership of the terrorist organization.

It is no secret that women also have been part of insurgency across the world, like in ISIS,LTTE,PIRA and PFLP. The responsibility of women in ISIS includes wife to ISIS soldiers, birthing the next generation of jihad and advancing ISIS’ global reach through online recruiting. The International Center for Study of Radicalization (ICAR) estimates that out of 40000 people joined ISIS from 80 different countries nearly 8000 are women and children. After the defeat of ISIS and such extreme organization those who are left behind possess the ideological commitment and practical skills which again a threat upon return to home countries.

The states across the world are either revoking the citizenship or ignore their responsibility. The most famous case of Shamima  Begum a UK citizen married to an ISIS fighter whose citizenship was revoked by the UK government. In other cases like HodaMuthana of the USA and Iman Osman of Tunisia have been the same case. As recently as Tooba Gondal an ISIS bride who now in a detention camp in northern Syria begged to go home in the UK in a public apology.

The American president Donald Trump issued a statement saying women who joined ISIS cannot return. The NATO deputy head said “…returning ISIS fighters and brides must face full rigours of the law”. Revoking the citizenship and making someone stateless is illegal under international law and it is also important to know how gendered these cases are because the UK have successfully prosecuted Mohammad Uddin and the USA has also done it so. Stripping off their citizenship itself a punishment before proper trail and the only good out of it would state can take their hands off in dealing with cases. Samantha Elhassani the only American who repatriated from Iraq so far and pleaded guilty for supporting ISIS. Meanwhile, France is trying to route its citizens who joined the ISIS and extradited few who are under trial in Bagdad.

As experts and political analysts say “countries should take responsibility for their own citizens” because failure to do so will also make the long term situation more dangerous as jihadists will try to a hideout and turn into militant groups for their protection. The children, the second-generation ISIS need cultural centres and rehabilitation centres and this is an international problem. These women known as jihadists brides suffer from a post-traumatic stress disorder and many are pregnant or multiple children born in ISIS territory.

In some countries travelling abroad to join the insurgencies in North Africa and Syria was not always a criminal act, Sweden criminalized such act recently but to prosecute them proof of offences committed in the conflict zone is difficult to collect and most countries in the world do not allow the pre-trial detention for more than 14 days. With problems of different national Lawson extradition and capital punishment and to prosecute them in conflict countries is also a challenge for states. Since Kurdish forces have signalled that they cannot bring all the prisoners into justice the home countries will have to act or else it might create a long term dangerous situation. With the civil war in Syria is about to end it is time to address these issues because since there are more ISIS fighters in Kurdish prisons and detention centres they could be influenced to join rebels who are fighting the regime of Assad in last standing province of Idlib.

If the governments reject the repatriation applications then they will be signalling that their action is essential for national security and thus asserting that failed or poorly resourced states are better equipped to handle potential extremists. The criminal system in Iraq is corrupt and human rights violations have been reported and which creates the risk of further radicalization. One should not forget that even citizenship of Osama bin laden was also stripped but which did not stop him from forming al-Qaeda in Afghanistan. If the citizens commit crimes and forget their responsibility then the states must bring them to justice instead of stripping citizenship. The states must come with a solution for this problem before its too late, setting up an international tribunal to deal with these cases would be a great start but these tribunals are time-consuming and expensive.

States must act as a responsible actor in the international system. Jihadist terrorism is a global problem and states must act together to deal with it because with nearly 40000 fighters joining caliphate from across the world it only shows how global and deeply rooted the phenomenon is. Instead of stripping their citizens’ citizenship, states must find a way to act together for the peace and security of the international community.

Continue Reading

Terrorism

COVID-19: Game-changer for international peace and security

Newsroom

Published

on

In Iraq, children look over a wall at clouds of smoke from burning oil wells, the result of oil fires set by ISIL. © UNICEF/Lindsay Mackenzie

The world has “entered a volatile and unstable new phase” in terms of the impact of COVID-19 on peace and security, the UN chief told a virtual meeting with world leaders on Wednesday.

Speaking at one of a series of international meetings among heads of State to enhance global cooperation in fighting terrorism and violent extremism, as part of the Aqaba Process, Secretary-General António Guterres said the pandemic was more than a global health crisis.

“It is a game-changer for international peace and security”, he spelled out, emphasizing that the process can play a key role in “promoting unity and aligning thinking” on how to beat back the pandemic.

Warning lights flashing

Mr. Guterres maintained that the coronavirus has exposed the basic fragility of humankind, laid bare systemic and entrenched inequalities, and thrust into the spotlight, geopolitical challenges and security threats.

“The warning lights are flashing”, he said, pointing out that as the virus is “exacerbating grievances, undermining social cohesion and fueling conflicts”, it is also likely to “act as a catalyst in the spread of terrorism and violent extremism”.

Moreover, international tensions are being driven by supply chain disruptions, protectionism and growing nationalism – with rising unemployment, food insecurity and climate change, helping to fuel political unrest.

A generation in crosshairs

The UN chief also noted that a generation of students is missing school.

“A whole generation…has seen its education disrupted”, he stated. “Many young people are experiencing a second global recession in their short lives.”

He explained that they feel left out, neglected and disillusioned by their prospects in an uncertain world.

Wanted: Global solidarity 

The pandemic has highlighted vulnerabilities to emerging threats such as bioterrorism and cyber-attacks on critical infrastructure.

“The world faces grave security challenges that no single country or organization can address alone”, upheld the Secretary-General, “there is an urgent need for global unity and solidarity”.

Recalling the UN’s Virtual Counter-Terrorism Week in July, he reminded that participants called for a “reinvigorated commitment to multilateralism to combat terrorism and violent extremism”.

However, a lack of international cooperation to tackle the pandemic has been “startling”, Mr. Guterres said, highlighting national self-interest, transactional information sharing and manifestations of authoritarianism. 

‘Put people first’

The UN chief stressed that “we must not return to the status quo ante“.

He outlined the need to put people first, by enhancing information sharing and technical cooperation “to prevent terrorists exploiting the pandemic for their own nefarious goals” and thinking “long-term solutions rather than short-term fixes”.

“This includes upholding the rights and needs of victims of terrorism…[and] the repatriation of foreign terrorist fighters, especially women and children,  and their dependents to their countries of origin”, he elaborated.

Closing window 

Meanwhile, the risk of COVID-19 is exacerbating the already dire security and humanitarian situation in Syrian and Iraqi camps housing refugees and the displaced.

“The window of opportunity is closing so we must seize the moment”, the UN chief said. “We cannot ignore our responsibilities and leave children to fend for themselves and at the mercy of terrorist exploitation”.

He also expressed confidence that the Aqaba Process will continue to “strengthen international counter-terrorism cooperation, identify and fill capacity gaps, and address evolving security threats associated with the pandemic”, and offered the UN’s “full support”.

Post-COVID rebuilding 

The Secretary-General also addressed the Centenary Summit of the International Organization of Employers (IOE) on how private and public sector cooperation can help drive post-COVID change. 

He lauded the IOE’s “significant contributions” to global policymaking for economic and social progress, job creation and a mutually beneficial business environment, calling it “an important pillar of the International Labour Organization (ILO) since its earliest days”.  

“Today, our primary task is to defeat the pandemic and rebuild lives, livelihoods, businesses, and economies”, he told the virtual Summit.

In building back, he underscored that workers and small business be protected, and everyone be given the opportunity to fulfil their potential. 

Businesses input

The UN chief urged businesses to engage with the multilateral system to create a “conducive global environment for decent work, investment, and sustainability”; and with the UN at the national level, to help ensure that multilateralism “works on the ground”.    

He also encouraged them to actively participate in national and global public-private dialogue and initiatives, stressing, “there must be space for them to do so”. 

Tripartite cooperation

ILO chief Guy Ryder highlighted the need for “conscious policy decisions and tripartite cooperation to overcome transformational challenges”, such as technological change and climate change, as well as COVID-19. 

Mr. Ryder also flagged that employers must continue to collaborate in social dialogue and maintain their commitment to both multilateralism and the ILO.

The IOE represents more than 50 million companies and is a key partner in the international multilateral system for over 100 years as the voice of business at the ILO, across the UN, the G20 richest countries and other emerging forums.

Continue Reading

Terrorism

Traumas of terrorism cannot be erased, but victims’ voices must never be forgotten

Newsroom

Published

on

In remembering and honouring all victims of terrorism, Secretary-General António Guterres said the UN stands by those who grieve and those who “continue to endure the physical and psychological wounds of terrorist atrocities”.

“Traumatic memories cannot be erased, but we can help victims and survivors by seeking truth, justice and reparation, amplifying their voices and upholding their human rights”, he stressed.

Keep spotlight on victims, even amid pandemic

This year’s commemoration takes place against the backdrop of the COVID-19 pandemic, when vital services for victims, such as criminal justice processes and psychosocial support, have been interrupted, delayed or ended as Governments focus attention and resources on fighting the pandemic.

Moreover, many memorials and commemorations have been cancelled or moved online, hampering the ability of victims to find solace and comfort together. 

And the current restrictions have also forced the first-ever UN Global Congress of Victims of Terrorism has to be postponed until next year.

“But it is important that we keep a spotlight on this important issue,” stressed the UN chief.

“Remembering the victims of terrorism and doing more to support them is essential to help them rebuild their lives and heal”, said Mr. Guterres, including work with parliamentarians and governments to draft and adopt legislation and national strategies to help victims.

The Secretary-General vowed that “the UN stands in solidarity with all victims of terrorism – today and every day” and underscored the need to “ensure that those who have suffered are always heard and never forgotten”.

Terrorism unjustifiable

General Assembly President Tijjani Muhammad-Bande saluted the resilience of terrorist survivors and called the day “an opportunity to honour the memories of the innocent civilians who have lost their lives as a result of terrorist acts around the world”.

“Terrorism, in all forms and manifestations, can never be justified”, he stated. “Acts of terrorism everywhere must be strongly condemned”.
The UN commits to combating terrorism and the Assembly has adopted resolutions to curb the scourge while working to establish and maintain peace and security globally. 

Strengthen assistance

Mechanisms for survivors must be strengthened to safeguard a “full recovery, rehabilitation and re-integration into society through long-term multi-dimensional support”, stated the UN official.

“Together we can ensure that you live a full life defined by dignity and freedom. You are not alone in this journey. You are not forgotten”, concluded the Assembly president.

‘Human dimension’ 

Closing the event, Vladimir Voronkov, chief of the UN Office of Counter-Terrorism, maintained that victims represent “the very human dimension of terrorism”.

While terrorists try to depersonalize victims by reducing them to mere numbers or statistics, Mr. Voronkov maintained that “we have a responsibility to do the exact opposite”.

“We must see victims’ hopes, dreams and daily lives that have been shattered by terrorist violence – a shattering that carries on long after the attack is over”, he stated. “We must ensure their human rights are upheld and their needs are met”.

Reaffirming humanity

While acknowledging the “terrible reality of terrorism”, Mr. Voronkov flagged that the survivors shine as “examples of resilience, and beacons of hope, courage and solidarity in the face of adversity”.

In reaffirming “our common humanity”, he urged everyone to raise awareness of victims needs and rights.

“Let us commit to showing them that they are not alone and will never be forgotten”, concluded the Counter-Terrorism chief.

Survivors remember

At the virtual event, survivors shared their stories while under lockdown, agreeing that the long-term impacts of surviving any kind of an attack is that the traumatic experience never really goes away.

Tahir from Pakistan lost his wife in attack against the UN World Food Programme (WFP) office in Islamabad.  

“If you have an accident, you know how to cope with it. Terminal illness, you know how to cope with it. But there is no coping mechanism for a person who dies in an act of terror”, he said.

Meanwhile Nigeel’s father perished in the 1998 US Embassy attack in Kenya, when he was just months years old. 

The 22 year-old shared: “When you are growing, it really doesn’t have a heavy impact on you, but as life starts to unfold, mostly I’ll find myself asking if I do this and my dad was around, would he be proud of me?”

And Julie, from Australia, lost her 21-year-old daughter in the 2017 London Bridge attack.

“The Australian police came to our house and said ‘we have a body, still not confirmed’, so they recommended that we fly to London”, she recalled. “I can’t describe how devastating as a parent to lose a child in these circumstances is for the rest of your life”.

Continue Reading

Publications

Latest

Newsdesk1 hour ago

Most countries failing to protect women from COVID-19 economic and social fallout

The COVID-19 pandemic is “hitting women hard”, but most nations are failing to provide sufficient social and economic protection for...

South Asia3 hours ago

Regional Power politics and Pakistan foreign policy

“Under the shadow of Growing antagonism among Regional Powers, Pakistan needs to formulate  pragmatic foreign policy by staying between the...

Tech News6 hours ago

Technological Revolution Accelerated by Coronavirus Crisis in Latin America

Latin America and the Caribbean is in the midst of a “Fourth Industrial Revolution” of technological innovation which requires enhancing...

Newsdesk7 hours ago

Progress on Sudan political transition, but challenges remain

Political developments in Sudan continue to move along a positive trajectory, while planning for a UN mission to assist the...

International Law9 hours ago

Why Human Rights Abuses Threaten Regional and Global Security

Human rights scholars (Brysk, 2009, Mullerson 1997, Chirot and McCauley 2010) argue that discrimination against people on the basis of...

Europe11 hours ago

An Austro-Franco-German Proposal for a European Post Covid-19 Recovery Programme

The conference named “75 years of Europe’s Collective Security and Human Rights System”, which took place on the 1st of...

Russia13 hours ago

Did Russia-China Relations Successfully Pass the “COVID,” “Hong Kong,” “India” and “Belarus” Tests?

Russia-China relations have been steadily improving since at least 2013, when the leaders of both countries presented a joint statement...

Trending