In August 2012 Boko Haram reportedly hacked the personnel records databases of Nigeria’s secret service. The individual who successfully compromised the covert-personnel data system indicated the breach was executed in the name of Boko Haram and as a response to Nigeria’s handling of interactions with the group
. The retaliatory attack revealed the names, addresses, bank information and family members of current and former personnel assigned to the country’s spy agency. The attack would not have tremendous significance in and of itself. However, it represents a substantial shift in tactics for a group whose name connotes an anti-Western stance. Until recently Boko Haram attack strategy was far from technological. However, since its association with Al Qaeda, Boko Haram has demonstrated a vastly changed approach to executing its attacks. Attacks are now more violent and reflect the markings of training by al Qaeda personnel. Given that cyber space has been part of the terrorists’ warfare tool kit since 1998 when the Tamil Tigers executed a distributed denial of service attack,  and al Qaeda has used the Internet as a vital communication vehicle since 1996, Boko Haram’s incorporation of cyber into its arsenal is almost inevitable. More importantly though, Boko Haram’s access to an individual who can execute such a successful attack is indicative of the cyber arsenal workforce capability available to any group or nation that wants to employ it. Boko Haram’s tactic advancement clearly demonstrates that Nigeria and its neighboring Sahel region neighbors are ripe for exploitation as a cyber warfare hub.
Cyber warfare is experiencing a boon. The success of activities like Ghostnet, Stuxnet, Byzantine Hades, and Titan Rain has shown that the demand for such products will not slow anytime soon. Nation-states have begun to incorporate cyber warfare against opponents’ cyber space attacks into their national security strategy. However, the reality is that nations executing these attacks do not always want to be identified as the perpetrators. Case in point- after a student from the University of Electronic Science and Technology of China executed a vast nation-state intrusion called “Ghostnet,” several media accounts of the attack wondered if China was involved. China denied any knowledge of the attacks and the sensitive information retrievals from 103 invaded national security databases remained unclaimed. The Chinese continued their public stance of denying culpability when a report on corporate intrusions specifically named the Chinese Peoples Liberation Army’s Unit 61398. According to the report investigators traced several intrusions into United States (U.S.) corporate and government secure information technology systems to the PLA unit.
Just as China prefers a public stance of denial, so might other nations. Public response to Ghostnet and Stuxnet made it apparent nations would not always want it known that they were perpetrators of an attack. It was clear that for nation-states to continue to incorporate this new weapon, they had to accommodate the sensitive diplomatic nature of such attacks by finding an alternate approach. But we have to acknowledge that their appetites for these attacks will not diminish. If anything, they will grow. What could this mean? If we use Boko Haram as an example, we can suggest an alternate approach that leverages the chaotic political situation and burgeoning supply of talented cyber personnel within Nigeria and the Sahel. Executing attacks from this third-party cyber location, offers attack perpetrators and the cyber arms industry the ability to outsource, just as manufacturing does.
If we use the impact of improvised explosive devices on Afghanistan and and Iraq as an example, Nigeria and the Sahel can offer resources for “niggling” attacks that target nation-states with “improvised explosive device” level attacks. These attacks would cause damage that is cumulatively significant, but individually not. The costs could remain low, as the readily available workforce functions in a region with an average annual income of $1180 (U.S. dollars). The nation-states employing this workforce will have a great cost-benefit ratio and the workforce itself will achieve success in their chosen field. While the Vice Chancellor of Osun State University is not pleased that the stated goal of computer science students was “making money in cyber crime” the reality is perpetrators of cyber warfare can use the demographic of Nigeria and the Sahel to train recruits and execute attacks without impunity. The Sahel has an economic environment that is conducive to cyber crime activities, an exploitable sophisticated cyber highway, and an area where officials are more focused on political distractors than enforcing information communication technology regulations.
Nation-state with Sufficient Political Distractors
Nigeria and its Sahel neighbors have many cultural influences, particularly from a tribal perspective. In addition, there are many natural resources available for state use to contribute to the country’s gross national product. But while this should be a positive, they are heavily affected by the corruption and direct disregard demonstrated by government leaders. As a result, unemployment is high, there is minimal foreign investment, and the black market runs the shadow economy with money laundering, bank fraud and identify theft running rampant. These factors contribute significantly to many of the nations in the region ranking high on the Failed State Index, from a total perspective and reflecting a high economic decline total., 
Modern Fiber-Optic Information Communication Infrastructure
In the year 2000 only 4.5 million of Africa’s one billion people were categorized as Internet users. That was a little more than .42%. However, as the continent, its resources, and potential 2050 workforce were combined to become opportunities for investors, it became apparent to these investors, and the African nations where this workforce lives, that tremendous improvements to the continent’s information highway were imperative.
Those improvements started with the Eastern Africa Submarine System (EASS) fiber-optic cable proposal in 2003. Other improvements were the 2009 fiber-optic submarine cable system Seacom, the 2010 Western Africa cable system, and the 2014 projected finish “connectivity” project. The continent now boasts over 15% Internet users, with some individual states experiencing much higher usage. World bank nations that recognized this need and invested in the highway’s improvements include Brazil, Russia, India and China (BRIC). South Africa joined the effort when it became a part of BRIC in 2010.
With these state of the art advancements, countries like Mozambique, Tanzania, Kenya, Somalia and the Sudan enjoy connectivity via mobile telephone technology to almost anywhere in the world. The continent is now seen as an attractive foreign investment destination pursued by more than the initial chance takers. Residents of almost any state can access mobile technology, changing the definition of “remote Africa” and the number of marginalized populations.
But these same potential economy-boosting continental links also serve as the tool for cyber criminals to advance their entrepreneurial skills.
Cyber Warfare Attacks
The attacks executed by the perpetrators of Stuxnet, Ghostnet, and even Flame, were initially conceived and deployed incognito. Flame functioned for almost two years before discovery; and when found, the United States did not initially acknowledge its role. The negative international response to Flame and Ghostnet was enough for nation-states to realize that today’s military strategy-international diplomacy equilibrium demands a more discreet employment of this new weapon. One that does not jeopardize current diplomatic relations or upset conventional weapons partners. The nations left vulnerable after each of these attacks also recognized that they would be at a disadvantage if they did not begin to include strategic cyber offensive and defensive operations into their national defense blueprint. While the Flame attack was directly attributed to the United States, the Ghostnet attack was never conclusively identified as China directed. The young researcher identified as Ghostnet’s perpetrator was a well-known hacker who never implicated any other person or entity in the effort.
What if a nation-state employed the tactic and this type of workforce on a future attack? That is: if a nation-state employed a third-party entity that is willing to NOT implicate the nation-state, could that nation-state successfully execute such a cyber warfare attack and not have to face the wrath of its international partners?
Rafal Rohozinksi, one of the investigators of Ghostnet and cofounder of Information Warfare Monitor, has suggested that such outsourcing could become a wave of the future. Rohozinksi cites the factors that could contribute to the trend. Nations need an alternative that offers anonymity, preserves current diplomatic balances and employs resources that are outside the nation’s jurisdiction. To ensure anonymity remains throughout the event and its investigation, local resources from a jurisdiction that not prone to enforcing International Communications Technology (ICT) rules and regulations.
According to a 2011 Harvard School of Public Health assessment Africa is expected to contribute 49% of the world’s 2050 population growth. Rohozinski insists this 2050 workforce will have a demographic that is conducive to cyber crime: young, talented, from a developing nation, possessing a value system that has previously, and would in the future, support participation in or instigation of acts of cyber crime.
If Rohozinski is correct, then we have to recognize that developing nations without strong ICT rules and regulation enforcement, nations with civil unrest or nations that lack services could serve as third party locations and perpetrator source.
The perpetrator source could easily begin with the University students who have professed a desire to work in the cyber crime industry. These University students have already participated in attacks that focus necessary to execute such missions, one potential source of such attacks could very well be outside the borders of the
Taken together these factors make Africa attractive to almost any investor, especially any who inhabit the shadowy world of cyber crime. To hacking investors the limited resources needed to establish a presence is particularly inviting. There is already an experienced cyber crime workforce, a reduced enforcement of ICT rules and regulations, a strong malware history and an economic environment that makes the potential very attractive. As a business venture, there are few negatives.
Which Cyber Crimes?
Criminal use of the region’s Information highway already include electronic mail scams, scam letters that range from purchase of real estate, disbursement of money from wills, to sale of crude oil at below market prices. Communication usually occurs through electronic message via fax, e-mail or cell phone. Verification is difficult so victims ultimately pay the fees without evidence to validate the claim of the perpetrator.
While these types of cyber crime are perpetrated on a large scale in countries like Nigeria, the crimes themselves are not target specific. The perpetrators initiate several scams at a time so that the perpetrator financially benefits, on average, from some, if not all, of the scams. No one victim is regarded as the single important prey.
Given the ideal conditions the region offers for third party cyber warfare attacks, several questions must be answered for national security strategists to understand the threat they could potentially face: would these same Nigerian or Sahel region cyber crime perpetrators initiate their perfected scams for another entity? Are they willing to expand their skill set and advance into target specific entities? Finally, if they were willing to initiate target specific entities, would they execute an attack on infrastructure? If they initiate the crime, is there a limit to the type of crimes they will launch?
There is already a perception/acceptance of students who “steal trade secrets, research documents or supplier’s agreements. A cyber warfare or cyber espionage Internet malware, its indicators and its codes are available on the web, but are the already cyber crime literate workforce members motivated to execute these types of attacks? If the Boko Haram attack is an indication, they very well may be. An almost unencumbered access to high quality information communication technology, combined with the computer literate young of 2050, make it wise for potential target nations to understand the threat this region could represent for them. They must accept the reality that the opportunity this new industry offers the Sahel’s employment-opportunity-constrained workforce, and the potential to earn a living far above the current $1180 (U.S dollars) annual income, make the Sahel’s attractiveness as a cyber warfare third-party haven almost irresistible. 
The Sahel is already home to a variety of illicit activities, and adding cyber warfare to that list is not far fetched. Nation-states could benefit from expanding their repertoire of weapons, terrorist actors could include it in this arsenal against the West, and both would achieve their goals and objectives without significant infrastructure modifications. This could redefine cyber crime if both the nation-state and the terrorist actors, reconcile their value system with incorporating this approach to expanding their warfare arsenal.
These perpetrators of ill intent (whether nation-state or terrorist actor) recognize that, in today’s world, their victims do not have the option of “no presence on the web.” They can, therefore, inflict damage, pinpoint attacks, and execute attacks without significant cost. Their potential victims must therefore learn how to counter this attack approach while minimizing negative impact on the already fragile economies of the Sahel and, even, Nigeria.
The nations in the region, themselves, have to also include this consideration as they develop their law enforcement approach to information communication technology regulation enforcement. Each nation already has shadow economies from the illicit crime and that economy feeds, houses, and clothes many of its citizens. The governments of the area have to form a coalition with investing countries and identify alternates for these potential “failed state mercenaries and their robust cyber warfare attack tools. We underestimated Boko Haram in the past. We should not underestimate the bellwether Boko Haram’s cyber attack may represent.
(*)Exploring Nigeria’s Vulnerability in cyber warfare
By Denise N. Baken and Ioannis Mantzikos
Speech prepared for Society for the Study of Terrorism Conference 27-28 June 2013, University of East London
Adedayo, Olugbenga. “Secondary School Students’ Perceptions of Incidences of Internet Crimes Among School Age Children in Oyo and Ondo States, Nigeria (dissertation).” University of Ibadan, Nigeria, 2008. http://www.kaspersky.com/images/secondary_school_students_perceptions_of_incidences_of_internet_crimes_among_school_age_children_in_oyo_and_on-10-75860.pdf.
Adeniran, Adebusuyi. “The Internet and Emergence of Yahoo boys sub-Culture in Nigeria.” International Journal of Cyber Criminology 2, no. 2 (December 2008): 368–381.
Adigun, Bashir. “AP Exclusive: Nigeria Secret Police Details Leaked.” Salon, August 30, 2012. http://www.salon.com/2012/08/30/ap_exclusive_nigeria_secret_police_details_leaked/.
“Africa Internet Usage, Facebook and Population Statistics.” Internet World Stats: Usage and Population Statistics, June 30, 2012. http://internetworldstats.com/stats1.htm.
Baken, Denise, and Ioannis Mantzikos. “Cyberspace Improvised Explosive Device and the Failed State Catapult-The Strategic Symbiotic Relationship Failed State Status Offers Nation-State Cyberwarfare Arsenals.” In New-Old Salafi/Al Qaeda Threats.
Washington, DC: Association fro the Study of the Middle East and Africa, 2012.
Denning, Dorothy. “Cyberterrorism – Testimony Before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives.” Georgetown University, May 23, 2000. http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html.
Li, Hao. “World Population to Top 9 Billion by 2050, 49% Growth from Africa.” International Business Times, July 29, 2011. http://www.ibtimes.com/world-population-top-9-billion-2050-49-growth-africa-820105.
Mills, Elinor. “Report: Countries Prepping for Cyberwar.” CNN, November 17, 2009. http://articles.cnn.com/2009-11-17/tech/cnet.cyberwar.internet_1_south-korea-cyberwarfare-cyberattack?_s=PM:TECH.
Osman, Osman Dahir. “Submarine Fiber Optic Route to Somalia.” Hiiraan Online. September 27, 2007. http://www.hiiraan.com/news2/2007/sept/submarine_fiber_optic_route_to_somalia.aspx.
Panel on Cyber Crime. 41st St Gallen Symposium. University of St. Gallen, Switzerland, 2011. http://www.youtube.com/watch?v=DpRYXRNWka0&feature=youtube_gdata_player.
Shuaib, Shuaib. “allAfrica.com: Nigeria: Cyber Crime, Our Biggest Problem – VC.” News. allAfrica.com, September 1, 2010. http://allafrica.com/stories/201009010416.html.
“The Failed States Index 2012 Interactive Grid.” FFP The Fund for Peace, June 18, 2012. http://www.fundforpeace.org/global/?q=fsi-grid2012.
“UNICEF – At a Glance: Nigeria – Statistics.” UNICEF. Accessed February 20, 2013. http://www.unicef.org/infobycountry/nigeria_statistics.html.
 Bashir Adigun, “AP Exclusive: Nigeria Secret Police Details Leaked,” Salon, August 30, 2012, http://www.salon.com/2012/08/30/ap_exclusive_nigeria_secret_police_details_leaked/.
 Dorothy Denning, “Cyberterrorism – Testimony Before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives,” Georgetown University, May 23, 2000,
 Elinor Mills, “Report: Countries Prepping for Cyberwar,” CNN, November 17, 2009, http://articles.cnn.com/2009-11-17/tech/cnet.cyberwar.internet_1_south-korea-cyberwarfare-cyberattack?_s=PM:TECH.
 Denise Baken and Ioannis Mantzikos, “Cyberspace Improvised Explosive Device and the Failed State Catapult-The Strategic Symbiotic Relationship Failed State Status Offers Nation-State Cyberwarfare Arsenals,”
in New-Old Salafi/Al Qaeda Threats (presented at the 5th Annual ASMEA Conference-History and the “New” Middle East and Africa, Washington, DC: Association fro the Study of the Middle East and Africa, 2012).
 Shuaib Shuaib, “allAfrica.com: Nigeria: Cyber Crime, Our Biggest Problem – VC,” news, allAfrica.com, September 1, 2010, http://allafrica.com/stories/201009010416.html.
 Baken and Mantzikos, “Cyberspace Improvised Explosive Device and the Failed State Catapult-The Strategic Symbiotic Relationship Failed State Status Offers Nation-State Cyberwarfare Arsenals.”
 The Failed State Index rates several indicators, one of which is economic decline. The maximum number a country receive for any indicator is 10.
 “The Failed States Index 2012 Interactive Grid,” FFP The Fund for Peace, June 18, 2012, http://www.fundforpeace.org/global/?q=fsi-grid2012.
 Osman Dahir Osman, “Submarine Fiber Optic Route to Somalia,” Hiiraan Online, September 27, 2007, http://www.hiiraan.com/news2/2007/sept/submarine_fiber_optic_route_to_somalia.aspx.
 “Africa Internet Usage, Facebook and Population Statistics.”
 Panel on Cyber Crime, 41st St Gallen Symposium (University of St. Gallen, Switzerland, 2011), http://www.youtube.com/watch?v=DpRYXRNWka0&feature=youtube_gdata_player.
 Hao Li, “World Population to Top 9 Billion by 2050, 49% Growth from Africa,” International Business Times, July 29, 2011, http://www.ibtimes.com/world-population-top-9-billion-2050-49-growth-africa-820105.
 Panel on Cyber Crime.
 “UNICEF – At a Glance: Nigeria – Statistics,” UNICEF, accessed February 20, 2013, http://www.unicef.org/infobycountry/nigeria_statistics.html.
Balancing Counter-Terrorism Measures with International Human Rights
In his statement at a special meeting of the Security Council’s Counter-Terrorism Committee on 6 March 2003, the Former Secretary-General Kofi Annan has noted:
“….Our responses to terrorism, as well as our efforts to thwart it and prevent it, should uphold the human rights that terrorists aim to destroy. Respect for human rights, fundamental freedoms, and the rule of law are essential tools in the effort to combat terrorism – not privileges to be sacrificed at a time of tension.”
Acts of terrorism are one of the gravest forms of human rights violations that can potentially shake up the spirit of society. People acquire a hateful approach towards the terrorists and those involved in terrorist activities. Moreover, governments do not hesitate to take all possible hardest actions against terrorism to secure their citizens and nation. It can be understood that any counter-terrorist measure taken to satisfy this sentiment of society will more likely be appreciated rather than being criticized. In the wake of this situation, it becomes crucial for the state and its agencies to observe the human rights laws while enacting and exercising the anti-terrorist measures (OHCHR 2008). It has been found that there exists a continuous struggle between national security interests and the protection of the human rights of individuals. In numerous cases, European and American Courts have preferred human rights over the draconian legislative provisions to curb terrorism. When one is dealing with terrorism, measures taken for counter-terrorism shall give high regard to human rights. If States fail to achieve this balance, they will ultimately defeat the success of their counter-actions. Thus, it is to be remembered that one should not become a demon that they are fighting.
Understanding International Human Rights
Human rights are the core universal values available to every individual and group being a human. It provides fundamental freedoms to individuals and protects them from the arbitrary use of power by the state (OHCHR 2008). International human rights are the rights reflected under various core international human rights treaties and customary international law. It includes the Universal Declaration of Human Rights, International Covenant on Civil and Political Rights, International Covenant on Economic, Social and Cultural Rights, and others. Moreover, the prohibition of genocide, torture, and slavery is widely recognized as peremptory norms from which no derogation is possible. All the concerned state parties are under an obligation to protect human rights enshrined under these instruments. They shall not take any action in the breach of their commitments.
The immense importance of human rights raises a few considerations before the state. Whether human rights can be compromised in the name of national security? How should states deal with a situation where human rights fall between their national security or other interests? This short note will try to reflect on these essential issues.
What Is Terrorism?
There exists no universal definition of the term ‘terrorism’ (Acharya 2009); however, General Assembly has tried to define it as “criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, religious or any other nature that may be invoked to justify them” (UNGA 1995). This term finds its mention under International Humanitarian Law that prohibits ‘terrorism’ and ‘acts of terrorism’ committed during an armed attack (Kaponyi 2007). During peacetime, such acts are dealt with under national laws, international criminal law, and human rights laws. Terrorism has been observed as a criminal act rather than an act of war (Acharya 2009); however, this definition is still evolving.
Terrorism is a controversial term, and its meaning differs from context to context and time to time. A person or group who acts as a terrorist for some might be a hero for others. However, it should be presumed that all such violence and destruction that constitutes terrorism and terrorist activities are done in the breach of human rights. These activities cause severe injury to the life and liberty of the individuals and the unity and integrity of the nation (Kaponyi 2007). In the interest of humanity, the state needs to adopt counter-terrorism measures in its legislation and enforcement actions to prevent and suppress terrorist activities while observing the rule of law.
Interaction Between Counter-Terrorism Measures And International Human Rights
There exists an unavoidable link between counter-terrorism measures and international human rights (Kielsgard 2013). Acts of terrorism provide legal justification to the threatened state to take actions that can cause severe human rights abuses. The interplay between these two concepts aims to address three dimensions of human rights: concerning the victims of the terrorist attacks, concerning the suspected terrorists, and concerning the people subjected to terrorism (Kaponyi 2007). The first category requires the right to life and dignity and the right to justice. The second category talks about the right to life, the presumption of innocence until proven guilty, the right to a fair trial, freedom from arbitrary detention, torture and degrading treatment, and the right to asylum. The third category talks about the right to life, right to information, freedom of association, strike, and expression. It is to be noted that the list of these rights are not exclusive and may include other related rights. Therefore, the state’s actions must not defy its international human rights commitments in the guise of national security. There have been instances when courts have curtailed unnecessary and vague security measures found in infringement of human rights.
In Hamdan v Rumsfeld US Supreme Court held that the structure and procedures of the Military Commissions been set up to try detainees of Guantanamo Bay violates the Uniform Code of Military Justice and Common Article 3 of Four Geneva Conventions, 1949. It was a landmark case that restrained the Presidential power vis-à-vis the treatment of Guantanamo Bay prisoners (Philips 2006). In Hamdi v Rumsfeld Supreme Court rules, US citizens detained as enemy combatants have the right to due process and the ability to challenge their enemy combatant status. However, in Rasul v Bush Supreme Court provided that it has jurisdiction to hear habeas corpus petitions foreign nationals detained at Guantanamo Bay. This case attracted several petitions from foreign citizens challenging the basis of their detention. To prevent a large number of petitions from detainees, the US government came up with Military Commission Act in 2006 that bars foreign nationals from challenging their detention that was ultimately held unconstitutional by the US Supreme Court in the case of Boumediene v Bush. It can be observed that the Supreme Court has generally prioritized human rights over its national security issues (Wald 2010).
Similarly, the Court of Appeal in Miranda v Secretary of State for the Home Department found arbitrary ‘stop powers used against journalistic information’ contained under Schedule 7 of the Terrorism Act, 2000 of the UK to violate freedom of expression provided under Article 10 of the European Convention of Human Rights. In another case of Gillan and Quinton v United Kingdom European Court of Human Rights held blanket power to stop and search under Section 44 of the Terrorism Act, 2000 to violate the right to respect for private life that later got repealed and replaced by the legislature.
Counter-terrorism measures provide incentives to the government authorities to reinterpret their law justifying interrogation, detention, and ‘targeted killing’ (Sanders 2017). It provides immunity and legitimacy to their acts of human rights abuses with the least accountability. Under its ‘War on Terror’ against the Taliban Government in Afghanistan, the US has denied applying human rights and humanitarian law to the detainees at Guantanamo Bay and termed them as “enemy combatant” (Duffy 2005). However, from the International Humanitarian Law perspective, it can be counter-argued that the US is detaining combatants by creating a category based on a weak claim supported by reliable facts. They are arrested for an indefinite period without providing them the rights of prisoners. From the International Human Rights approach, a State is obliged to fulfill its international commitments over the persons who are present under its authority and control. This global outreach of the subject founds its applicability even in the areas beyond national jurisdiction, thus holding the US responsible for Guantanamo Bay that lies outside US territory.
Counter-terrorism measures are abused on the pretext of discrimination (Kaponyi 2007). General Assembly Resolution and UN Council on Human Rights Resolution prohibit discrimination that treats people from one ethnic or racial origin, religion or belief, disability different from the others. The creation of plausible legality of human rights violations by the state establishes a requirement to promote human rights (Sanders 2017). Where the UN General Assembly and Security Council have taken several counter-terrorism measures to combat terrorism, UN bodies also aim to respect human rights even in emergency cases. Law is undoubtedly evident that counter-terrorism measures cannot be fulfilled without considering human rights (Kielsgard 2013). States should respect human rights along with its counter-terrorism and security measures.
The real issue lies in determining the legality of counter-terrorist measures that occasionally fall short of the state’s international commitments under its human rights regime. It has been observed that the absence of any definition of terrorism provides ample scope for the state to interpret the term ‘terrorism’ with a political bias favoring its interest (Kaponyi 2007). Further, a State can easily justify its actions in the name of national security that denies human rights to the individual and ultimately raises questions on the rule of law (Duffy 2005). Under the case laws, judges have shown an inclination to respect the international commitments on human rights regime. However, this cannot be said affirmatively for the legislature and enforcing authorities. It is not the counter-terrorism measures, but their abuse is problematic. Arbitrary and poorly-implemented counter-terrorism measures have their consequences. Co-lateral damage must be proportional. Since both counter-terrorism measures and human rights are important issues for a country; thus, it is essential that a balance be struck between them. It should be noted that fight against terror and the observance of human rights must go hand in hand. The State’s responsibility is to respect human rights and not use counter-terrorism measures as a justification for their violation.
- Acharya, Upendra D. (2009): “War on Terror or Terror Wars: The Problem in Defining Terrorism,” Denver Journal of International Law and Policy, Vol 37, pp 653.
- Boumediene v Bush (2008): 553 U.S. 723
- Duffy, Helen (2005): The “War on Terror” and the Framework of International Law, Cambridge University Press
- General Assembly, Protection of human rights and fundamental freedoms while countering terrorism, A/RES/58/187 (2003)
- General Assembly Resolution, U.N. Doc. A/RES/49/60 (Feb. 17, 1995)
- Gillan and Quinton v United Kingdom (2010): ECHR 28 (2010)
- Hamdan v Rumsfeld (2006): 548 U.S. 557 (2006)
- Hamdi v Rumsfeld (2004): 542 U.S. 507
- Kaponyi, Elisabeth K. (2007): “Upholding Human Rights in the fight against terrorism,” Society and Economy, Vol 29, pp 1.
- Kielsgard, Mark D. (2013): “Counter-Terrorism and Human Rights: Uneasy Marriage, Uncertain Future,”Journal Jurisprudence, Vol 19, pp 163.
- Miranda v Secretary of State for the Home Department (2014): EWHC 255 (2014);
- Office of the United Nations High Commissioner for Human Rights (2008): “Human Rights, Terrorism and Counter-Terrorism” <https://www.ohchr.org/Documents/Publications/Factsheet32EN.pdf>
- Philips, Dennis (2006): “Hamdan v Rumsfeld: The Bush Administration and ‘The Rule of Law’,” Australian Journal of American Studies Vol 25, pp 40.
- Rasul v Bush (2004): 542 U.S. 466
- Sanders, Rebecca (2017): “Human rights abuses at the limits of the law: Legal instabilities and vulnerabilities in the ‘Global War on Terror’,” Review of International Studies Vol 44, pp 2.
- UN Commission on Human Rights, Commission on Human Rights Resolution 2003/68: Protection of human rights and fundamental freedoms while countering terrorism, E/CN.4/RES/2003/68 (2003)
- Wald, Patricia (2010): “National Security versus Human Rights: An uneven playing field,” American Society of International Law, Vol 104, pp 458.
Pakistan’s fight against terrorism inside its borders
When Pakistan first appeared on the map, it had little to no idea how its neighbors would harness its land. It came quite clear after the separation of East Pakistan that the land of the pure would require more foresight in dealing with those around it. They might even need to fight to maintain peace on its soil.
Since the birth of Pakistan, it has been subjected to different fights to maintain its status. With all its struggles, finding peace for the valley, and balancing its economy, the country has faced many turbulences. It has proven itself against all sorts of malicious endeavors. Some that had the potential to harm its name in the international society.
It was 9/11 that not only shook the whole world but this nook of the Asian continent as it plunged into instability. It seems like someone was busy hiding a terrorist network in Pakistan. From terrorism attacks on the APS school to the attack on the five-star PC in Gwadar. The country has been struggling to keep its face clear even though it has suffered from Islamophobia in the international community.
Pakistan and its army have been heading strong and determined to keep the citizens of Pakistan safe along with protecting the people on the globe who accept the hostility of the country to open its land for tourism. Since 2010 the country has been busy weeding out terrorist organizations. Many casualties have been taken as the roots of terrorism were attacked. The blood of martyrs has colored the land, but success has come in bits and pieces. The country was not facing armed militia but organized troops funded by the neighbors.
The terrorist funding trail reveals India’s involvement. These are no more allegations, and evidence of 22 billion PKR expenditure for the nourishment of such networks in Pakistan are available. This is quite a question, especially when keeping in mind the economy of the country. Besides, Narendra Modi’s support for extremism is simply a dot that needs to be connected.
The attack on APS was the boiling point for the whole nation. When every eye cried. Investigations were made to let the world know that Pakistan will not tolerate terrorism of any sort. Peace will be kept, and any intention against it will be answered with unpleasant outcomes. It has been, and the number of terrorism incidents has remarkably gone down.
As per the UN charter, the intrusive involvement by patronizing any country’s domestic issues is a clear violation. With ISIS contributing their share to terrorism in further Asia, it has been investigated that Indian intelligence agencies are trying to knit a scarf of deception by linking ISIS by creating “Daesh-e-Pakistan.”Adding firmness to their plan, they have already admitted 30 Indian militants in this organization and relocated them to camps along the Pakistan-Afghanistan border. Two Indian agency representatives were responsible for handing over these militants to Daesh commander Sheikh Abdul Rahim.
The geographical advantage that Pakistan holds brought a ray of sunshine with the CPEC project. But as the country started working on its economy’s progress, the state has witnessed countable heart-wrenching fights against terrorist groups. While Pakistan struggles to keep global security and safety and fights against incendiary of this terrorism, Indian state policy has internalized terrorism as an instrument. With Modi’s incumbency, the Kashmir valley has burned, but Muslims in Delhi face their wrath.
Hence, the policy was not a joke, it was a serious mission, and satisfactory amounts were sent to sub-nationals through humanitarian assistance to cause unrest in Balochistan. With Peshawar police attack on 11 May 2020 to target killing and eventually linking with a suicide attack on Mardan Judicial Complex in 2016. Pakistan has been highly receptive to all intelligence gathered to averting a colossal attack on 14 August 2020. Maj Fermin Das, an official from Indian intelligence, was found to be the mastermind behind the planning of this attack. This person was operating from Afghanistan, which failed obviously!
It’s been no secret to everyone with Indian involvement in creating instability in Jammu Kashmir. Gilgit Baltistan is not far from it, sharing the same boundaries. Out of 60 implanted IEDs, 22 were successfully diffused, but 38 exploded and took 13 civilian lives and 48 military personnel. The explosives used in those IEDs have been traced back to, you guessed it, India.
No matter how many times Pakistan will try to keep out the pest from its soil, they seem to be crawling back inside. Safety is not just the issue of Pakistan but is the issue of the whole world. Countries funding their neighbors to keep unrest in the continent requires global attention, and determined action should be taken.
Jihadist terrorism in the EU since 2015
Europe has experienced a series of terror attacks since 2015. Who are the terrorists? Why and how do they act?
Jihadist terrorism is not new in the EU, but there has been a new wave of islamist attacks since 2015. What do jihadist terrorists want? Who are they? How do they attack?
What is jihadist terrorism?
The goal of jihadist groups is to create an Islamic state governed only by Islamic law – Sharia. They reject democracy and elected parliaments because in their opinion God is the sole lawgiver.
Europol defines Jihadism as “a violent ideology exploiting traditional Islamic concepts. Jihadists legitimise the use of violence with a reference to the classical Islamic doctrine on jihad, a term which literally means ‘striving’ or ‘exertion’, but in Islamic law is treated as religiously sanctioned warfare”.
The al-Qaeda network and the so-called Islamic state are major representatives of jihadist groups. Jihadism is a sub-set of Salafism, a revivalist Sunni movement.
Who are the jihadi terrorists?
According to Europol, jihadist attacks in 2018 were carried out primarily by terrorists who grew up and were radicalised in their home country, not by so-called foreign fighters (individuals that travelled abroad to join a terrorist group).
In 2019, nearly 60% of jihadi attackers had the citizenship of the country in which the attack or plot took place.
Radicalisation of home-grown terrorists has speeded up as lone wolves are radicalised by online propaganda, while their attacks are inspired rather than ordered by terrorist groups such as al-Qaeda or IS.
Europol explains that these terrorists may not necessarily be very religious: they may not read the Quran or regularly attend mosque and they often have a rudimentary and fragmented knowledge of Islam.
In 2016, a significant number of the individuals reported to Europol for terrorism were low-level criminals, suggesting people with a criminal history or socialised in a criminal environment may be more susceptible to radicalisation and recruitment.
Europol draws the conclusion that “religion may thus not be the initial or primary driver of the radicalisation process, but merely offer a ‘window of opportunity’ to overcome personal issues. They may perceive that a decision to commit an attack in their own country may transform them from ‘zero’ to ‘hero’.”
The 2020 Europol report shows that most jihadi terrorists were young adults. Almost 70% of them were aged 20 to 28 years old and 85% were male.
How do jihadi terrorists attack?
Since 2015, jihadist attacks have been committed by lone actors and groups. Lone wolves use mainly knives, vans and guns. Their attacks are simpler and rather unstructured. Groups use automatic rifles and explosives in complex and well-coordinated attacks.
In 2019, almost all completed or failed attacks were by lone actors, while most foiled plots involved multiple suspects.
There has been a tendency for jihadist terrorists to favour attacks against people, rather than buildings or institutional targets, in order to trigger an emotional response from the public.
Terrorists do not discriminate between Muslim and non-Muslim and attacks have aimed for the maximum of casualties, such as in London, Paris, Nice, Stockholm, Manchester, Barcelona and Cambrils.
The EU’s fight against terrorism
EU measures to prevent new attacks are wide-ranging and thorough. They span from cutting the financing of terrorism, tackling organised crime, and strengthening border controls to addressing radicalisation and improving police and judicial cooperation on tracing suspects and pursuing perpetrators.
For example, MEPs adopted new rules to make the use of guns and the creation of home-made bombs more difficult for terrorists.
Europol, the EU’s police agency, has been given additional powers. It can set up specialised units more easily, such as the European Counter Terrorism Centre created in January 2016. It can also exchange information with private companies in some cases and ask social media to remove pages runs by IS.
In July 2017, the European Parliament created a special committee on terrorism to evaluate how to better fight terrorism at EU level. MEPs produced a report with concrete measures they want the European Commission to include in new legislation.
Central African Republic: Diversifying the economy to build resilience and foster growth
According to the latest economic update for the Central African Republic (CAR), which was published today by the World Bank,...
World must not accept slavery in 21st century
Commemorating the International Day for the Abolition of Slavery, the United Nations Secretary-General highlighted the impact of the contemporary forms...
Covid crisis deepens energy efficiency slowdown, intensifying need for urgent action
The already sluggish pace of global progress on energy efficiency is set to slow further this year as a result...
In Latin America, farmers use microfinance to fight climate change
Sonia Gómez has spent her entire life around agriculture. She grew up on her parents’ plantation in the fertile mountains...
COVID-19 could see over 200 million more pushed into extreme poverty
An additional 207 million people could be pushed into extreme poverty by 2030, due to the severe longterm impact of the...
Addressing the infodemic should be the key priority of a Biden administration
The 2020 election underlined the growing tribalism in the United States with many seeing it as a referendum on the soul, identity, and future...
Foreign fighters a ‘serious crisis’ in Libya
The 20,000 foreign fighters now in Libya represent “a serious crisis” and “a shocking violation of Libyan sovereignty”, UN Acting...
Africa3 days ago
Scientific and trade cooperation between China and Africa
Defense3 days ago
The Need to Reorient New Delhi in the Indo-Pacific
Economy3 days ago
Future Economy: Micro-Manufacturing & Micro-Exports
Americas2 days ago
Exit the Clowns: Post-Trump America
Middle East2 days ago
Covid-19 Vaccine: A Mutual Partnership between Morocco and China
Americas2 days ago
Biden’s victory: An Opportunity for Transatlantic Reconciliation after Trump and Brexit?
Arts & Culture2 days ago
The Handmaid’s Tale: Making a drama out of a crisis
Human Rights3 days ago
Global Experts To Convene Online To Discuss Values In A Post-Covid World