Connect with us

Intelligence

Cyber Caliphate: What Apps Are the Islamic State Using?

Published

on

As the argument goes, law enforcement agencies must protect the safety of citizens, and to do so, they must be in contact with representatives of the IT sector. This in turn compels the representatives of mail services, messaging apps, and smartphone manufacturers to contact the authorities and disclose user information. However, excesses do occur, and the founder of the Telegram messaging app Pavel Durov refused to provide the FSB with their encryption keys. Telegram was repeatedly accused of being the messaging application of terrorists, and in the context of the messaging service’s being blocked, the discussion surrounding the rights of citizens to engage in private correspondence grew more heated. The example of the Islamic State, however, only goes to show that militants shall not live by Telegram alone: they act much more competently and work to keep a step ahead of law enforcement agencies. What tools do terrorists actually use and how should we fight against the digital technologies of militants?

Different Goals, Different Weapons

The success of Islamic State militants can largely be attributed to brilliant propaganda work. Depending on their goals, militants have been able to resort to various tools for propaganda, recruitment, and communication between group members. Propaganda includes all the usual tools: videos, online magazines, radio stations, brochures, and posters designed for both Arabic and Western audiences.

Western services have played a cruel joke on Western society, facilitating the distribution of propaganda videos like, for example, one of the most popular clips, “Salil as-savarim” (The Sound of Swords) on YouTube and Twitter as well as through file sharing services such as archive.org and justpaste.it. YouTube administrators repeatedly deleted the videos, but they were simply uploaded once again from new accounts with the number of views driven up by reposting them on Twitter. The use of Twitter for these purposes is discussed in detail in the article “Twitter and Jihad: the Communication Strategy of ISIS”, published in 2015. According to the former national security adviser of Iraq, Mowaffak al-Rubaie, it was in large part thanks to Twitter and Facebook that 30,000 Iraqi soldiers lay down their weapons, removed their uniforms, and abandoned Mosul to jihadis without a fight in 2014. [1].

ISIS has taken into account the mistakes of its jihadi predecessors and has skilfully set its own propaganda up against attempts by the foreign press to portray it in a negative light. However, on a deeper, internal level, militants employ other communication tools more reliable than social networks.

Anonymous Networks

In September 2017, political scientist and member of the non-profit RAND Corporation and the International Centre for Counter-Terrorism at The Hague, Colin P. Clarke suggested that ISIS would most likely continue to use encrypted messaging to organize direct terrorist attacks abroad even if the caliphate were to become a “less centralized entity”.

However, terrorists have already resorted to using such tools for some time now. In early 2015, it became known that ISIS had developed a 34-page manual on securing communications. The document, based on a Kuwaiti firm’s manual on cybersecurity, popped up in jihadi forums. The document also listed those applications considered most suitable for use, such as Mappr, a tool for changing the location of a person in photographs. The Avast SecureLine application facilitates the achievement of similar goals, masking the user’s real IP address by specifying, for example, an access point in South Africa or Argentina in place of, say, Syria.

Jihadis have advised using non-American companies such as Hushmail and ProtonMail for email correspondence. Hushmail CEO Ben Cutler acknowledged in comments to Tech Insider that the company had been featured in the manual, but added that “It is widely known that we cooperate fully and expeditiously with authorities pursuing evidence via valid legal channels”. In turn, CEO of Proton Technologies AG Andy Yen mentioned that besides ProtonMail, terrorists likewise made use of Twitter, mobile phones, and rental cars. “We couldn’t possibly ban everything that ISIS uses without disrupting democracy and our way of life,” he emphasized.

For telephone calls, the manual recommended the use of such services as the German CryptoPhone and BlackPhone, which guarantee secure message and voice communications. FireChat, Tin Can and The Serval Project provide communication even without access to the Internet, for example, by using Bluetooth. The programs recommended by terrorists for encrypting files are VeraCrypt and TrueCrypt. The CEO of Idrix (the maker of VeraCrypt) Mounir Idrassi admitted that “Unfortunately, encryption software like VeraCrypt has been and will always be used by bad guys to hide their data”. Finally, the document makes mention of Pavel Durov’s messaging system, Telegram.

It was a massive information campaign that saw Telegram branded with the unofficial stamp of messaging app of terrorists. Foreign politicians played their part. Three days before the attack on the Berlin Christmas Fair in December 2016, senior members of the House Foreign Affairs Committee urged Durov to immediately take steps to block ISIS content, warning him that terrorists were using the platform not only for propaganda, but also to coordinate attacks. Moreover, Michael Smith, an advisor to the US Congress and co-founder of Kronos Advisory, claims that Al-Qaeda also used Telegram to communicate with journalists and spread news to its followers. Against this backdrop, Telegram reported on the blocking of 78 channels used by terrorists. It was this interest and pressure from the authorities that ultimately caused the militants to seek a replacement for this messaging service.

Monitoring Safety

Telegram representatives have repeatedly claimed that their messaging service is the safest in the world thanks to the use of end-to-end encryption. However, this is at very least doublespeak: end-to-end encryption is used only in secret chat rooms and even then possesses obvious shortcomings, as pointed out by Sergey Zapechnikov and Polina Kozhukhova in their article On the Cryptographic Resistance of End-to-End Secure Connections in the WhatsApp and Telegram Messaging Applications [2]. In particular, due to the vulnerability of the SS7 network, which manifests itself through authorization via SMS, it is possible to access chats. Secret chats cannot be hacked, but you can initiate any chat on behalf of the victim. Secondly, developers violated one of the main principles of cryptography – not to invent new protocols independently if protocols with proven resistance assessments that solve the same tasks already exist. Thirdly, the use of the usual Diffie–Hellman numerical protocol and the lack of metadata security, so that you can track message transfer on the server, add any number from the messaging service’s client to the address book, and find out the time a person came online.

In this context, WhatsApp seems more reliable since it uses end-to-end encryption for all chats and generates a shared secret key using the Diffie–Hellman protocol on elliptical curves. Many terrorists have recourse to this messenger. In May 2015, in “The Life of Muhajirun”, the blog of a woman writing about her and her husband’s trip to Germany, the author wrote about how her husband contacted smugglers by WhatsApp while in Turkey.

In the article Hacking ISIS: How to Destroy the Cyber Jihad Malcolm W Nance; Chris Sampson; Ali H Soufan, the authors recount the story of Abderrahim Moutaharrik, who planned an attack on a Milan synagogue with the intent of fleeing afterwards to Syria. He used WhatsApp to coordinate the attack. Italian police were able to identify the criminal after an audio message was sent.

However, jihadis are skeptical about WhatsApp, and not only for reasons of security. In January 2016, a supporter of jihad, security expert Al-Habir al-Takni, published a survey of 33 applications for smartphones, separating them into “safe”, “moderately safe”, and “unreliable”. WhatsApp ended up at the bottom of the rating. In defence of his opinion, the expert mentioned that the messaging service had been purchased by the Israeli Company Facebook (WhatsApp was bought by Mark Zuckerberg in 2014 for $19 billion, the messenger has 1 billion users worldwide).

In the light of complaints about Telegram and WhatsApp and as laws are tightened, terrorists have become preoccupied with the creation of their own application. In January 2016, the Ghost Group, which specializes in the fight against terrorism, uncovered online an instant messaging service created by militants, Alrawi. This Android application cannot be downloaded on Google Play – it is only available on the Dark Web. Alrawi has come to take the place of Amaq — a messaging service providing access to news and propaganda videos, including videos of executions and videos from the battlefield. Unlike Amaq, Alrawi possesses complete encryption. The Ghost report noted that after American drone strikes destroyed the prominent cybersecurity specialist Junaid Hussain in the summer of 2015, the cyber caliphate’s effectiveness declined dramatically. “They currently pose little threat to Western society in terms of data breaches, however that is subject to change at any time” a spokesperson for the hacker group said in a conversation with Newsweek.

The Game to Get Ahead

Jihadis, like hackers, are often a step ahead of the authorities and in tune with the latest technological innovations. Gabriel Weimann, a professor at the University of Haifa in Israel and the world’s foremost researcher of Internet extremism, noted that terrorist groups tend to be the first users of new online platforms and services. As social media companies lag behind in the fight against extremism on their platforms, terrorist groups become more experienced in modifying their own communication strategies. “The learning curve is now very fast, once it took them years to adapt to a new platform or a new media. Now they do it within months,” said G. Weimann.

These words can be confirmed: every popular service, like WhatsApp or Telegram, has alternatives that jihadis are more than willing to make use of. In the above-mentioned article Hacking ISIS: How to Destroy the Cyber Jihad, the authors list dozens of other services jihadis utilize. For example, Edward Snowden’s favourite application, Signal, has open source code, reliably encrypts information, and allows you to exchange messages and calls with subscribers from your phone book. Signal is community sponsored through grants. According to Indian authorities, ISIS member Abu Anas used Signal as a secure alternative to WhatsApp. Another solution, released in 2014, is the messaging service Wickr, created by a group of cyber security and privacy specialists. It was this application that first made it possible to assign a “life” to a message, ranging from a few minutes to several days. Wickr destroys messages not only on smartphones, telephones, and computers, but also on the servers through which correspondence passes. The program has a function to erase the entire history, and after it has been used messages cannot be restored by any means. Australian Jake Bilardi came across an ISIS recruitment message in Telegram and was to meet with a recruiter through Wickr, though he was detained in time.

Surespot, Viber, Skype and the Swedish messaging system Threema are also mentioned. The latter application deserves to be mentioned on its own — Threema received 6 out of a possible 7 points for security from the Electronic Frontier Foundation (a non-profit human rights organization founded in the U.S. with the aim of protecting, in the era of technology, the rights established in the Constitution and the Declaration of Independence). Jihadis have also called the Silent Circle application a preferred app. After learning of this, the developers tightened security requirements, compelled by the fact that one of the creators, Mike Janke, is a former naval officer. Silent Circle now cooperates with governments and intelligence agencies. Though the list doesn’t end there — Junaid Hussain likewise made use of Surespot and Kik.

Militants have a great number of communication tools at their disposal in accordance with the goals they happen to be pursuing.

But if applications are primarily used on smartphones, other programs exist for laptops and PCs, readily used by both Information Security specialists and jihadis; for example, the Tor browser or T.A.I.L.S (The Amnesic Incognito Live System), a Debian-based Linux distribution created to provide privacy and anonymity. All outgoing T.A.I.L.S connections are wrapped in the Tor network, and all non-anonymous ones are blocked. The system leaves no trace on the device on which it was used. T.A.I.L.S. was used by Edward Snowden to expose PRISM, the US State Program, the purpose of which was the mass collection of information sent over telecommunication networks.

It can be concluded that militants have a great number of communication tools at their disposal in accordance with the goals they happen to be pursuing. Banning or blocking these tools will not ensure victory over the terrorists, though that is not to say the methods should be abandoned altogether. The best method to employ is that of having agents infiltrate terrorist ranks to ensure constant online and offline monitoring.

First published in our partner RIAC

  1. Michael Weiss, Hassan: ISIS: Inside the Army of Terror, ANF, Moscow, 2016
  2. Sergey Zapechnikov, Polina Kozhukhova, On the Cryptographic Resistance of End-to-End Secure Connections in the WhatsApp and Telegram Messaging Applications: NRNU MEPhI, Information Technology Security, Volume 24, No. 4, 2017

Continue Reading
Comments

Intelligence

Balochistan `insurgency ‘and its impact on CPEC

Amjed Jaaved

Published

on

A dispute arose between Baloch leader Akber Bugti and then government led by Parvez Musharraf. Bugti was killed. How he was killed remains a mystery. But, his death triggered a lingering `insurgency’, with ebbs and flow in foreign support.

However, there is no let-up in global anti-Pakistan propaganda from Dr. Naila Baloch’s `free Balochistan’ office, working in New Delhi since June 23, 2018. When this office was opened many Bharatya Janata Party parliamentarians and India’s Research and Analysis Wing’s officers attended it.

The office was opened in line with Doval Doctrine that aims at fomenting insurgency in Pakistan’s provinces, including Balochistan and Khyber Pakhtunkhwa. `Free Balochistan’ sponsored offensive posters on taxi cabs and buses in Switzerland and Britain. USA has recently outlawed Balochistan Liberation Army. However, earlier, in 2012, a handful of Republican had moved a pro-separatist bill in US Congress. It demanded `the right to self-determination’ and ` opportunity to choose their own status’ for people of Balochistan.

Pakistan caught a serving Indian Navy officer Kalbushan Jhadav (pseudonym Mubarik Ali) to foment insurgency in Balochistan. Indian investigative journalists Karan Thapar and Praveen Swami suggested that he was a serving officer. India’s security czar,

Along with Baloch insurgents, Pushtun Tahafuzz Movement is being backed up by India. In their over-ebullient speeches, PTM’s leaders openly scold Pakistan’s National Security institutions. Pakistan’s Inter-Services Public Relations had to warn them `not to cross the red line. Yet, sponsored by Pakistan’s enemies they continued their tirade.  While addressing a rally at Orakzai (April 20, 2019), Pakistan’s prime minister expressed sympathy with Pashtun Tahafuzz Movement demands. But he expressed ennui at anti-army slogans shouted by them. Earlier, Pakistan’s senate’s special committee had patiently heard their demands. PTM voices concerns that are exterior to Pashtoon welfare. For instance, Manzoor Pashteen, in his interview (Herald, May 2018, p.48), berates Pak army operations and extols drone strikes. He says, ‘The army did not eliminate even a single Taliban leader.  All the 87 Taliban commanders killed in the last 18 years were eliminated in drone strikes’. At a PTM meeting in Britain, even Malala Yusafzai’s father (Ziauddin), like His Master’s Voice, echoed anti-army sentiments. He said, “Pakistan army and intelligence agencies knew that Fazalullah was a terrorist who continued to operate radio station in Swat’.

For one thing drone strikes amount to aggression. In an article, David Swanson pointed out that any use of military force, be it a drone attack, amounts to a war. The Kellogg-Briand Pact made war a crime in 1928 and various atrocities became criminal acts at Nuremberg and Tokyo.

Genesis of insurgency: Balochistan has been experiencing an armed insurgency since 2005, when veteran Baloch leader Nawab Akbar Bugti became embroiled in a dispute with then-President of Pakistan General Pervez Musharraf. The differences initially centered on royalties from natural gas mined in the resource-rich town of Dera Bugti, in northeast Balochistan. Subsequently, the building of military cantonments in Balochistan, and the development of Gwadar port by China, also became reasons for conflict (The Quint, August 26 2017). On August 26, 2006, Nawab Akbar Bugti was killed in a mountainous region of Balochistan; although the Pakistani government denied killing Bugti, Baloch groups blamed the government for his assassination, and thus the armed insurgency was further intensified (Dawn, August 27 2006).

Baloch insurgents allege that the China is a “partner in crime” with Pakistan’s government in looting the natural resources of Balochistan (The Balochistan Post, November 25 2018). In December 2018, Pakistan officials foiled a plan to attack Chinese workers on the East Bay Expressway in Gwadar, seizing weapons and ammunition that Baloch insurgents had stockpiled for that purpose (Samaa Digital, December 6 2018).

The most active separatist groups in Balochistan are Baloch Liberation Army, Balochistan Liberation Front, Baloch Republican Army, and United Baloch Army.

Balochistan separatist groups are divided into two distinct groups. The first group consists of BLF, UBA and BRA, whereas the second group includes Balochistan Liberation Army and Balochistan National Liberation Front

Emergence of BRAS: In the early hours of April 18, a group of militants in southwestern Pakistan blocked the coastal highway that connects the port of Gwadar, near the Iranian border, to Karachi farther east. The militants stopped six buses near a mountain pass and checked the identity cards of all the passengers. They singled out 14 members of Pakistan’s armed forces, and then executed them all. Hours later, a coalition of three Baloch separatist groups, known as Baloch Raaji Aajoi Sangar, or BRAS, claimed responsibility. The same group had previously owned attack on the Chinese Consulate in Karachi and a bus of Chinese engineers in the town of Dalbandin, north of Gwadar.

Iran’s woes: Iran worries that Pakistan is allowing Saudi Arabia to use Gwadar as a launching pad to destabilize it. Just as Pakistan accuses Iran of harboring Baloch separatists like BRAS, Iran blames Pakistan for giving sanctuary to militant Sunni Baloch groups such as Jaish al-Adl that have attacked Iranian security forces in Iran’s Sistan and Balochistan province.

Active insurgent groups in Balochistan: Balochistan separatist groups are divided into two distinct groups. One sunni funded by Kingdom of Saudi Arabia for attacks in Iran. And the other shia funded by Iran. The main groups are: Baloch Raaji Aajoi Sangar  (involved in attack on Chinese Consulate in Karachi), Baloch Liberation Army, Baloch Liberation Front, , United Baloch Army, Baloch Liberation Tigers, Baloch Nationalists, Baloch Young Tigers, Balochistan Liberation United Front , Balochistan National Army, Lashkar-e-Balochistan, Baloch Republican Party, Baloch Mussalah Diffah Tanzim (Baloch Militant Defense Army), Baloch National Liberation Front, Free Balochistan Army, Baloch Student Organisation, and Baloch Republican Army (BRP). BRP is the political wing of the armed Balochistan Republican Army. However, its central spokesman Sher Mohamad Bugti denies any relation with the BRA.

Strengths and weaknesses: The insurgency draws its sustenance from the popular misconception that China-Pakistan Economic Corridor is detrimental to Baloch interests. When completed, it would follow influx of foreigners. They would grab their land, plunder their resources and change their demography.

Infighting is the main weakness of the insurgency. Unable to harm armed forces, the insurgents began “killing fellow Baloch and non-Baloch settlers, and launching attacks against Sindhi and Pashtun citizens.” Infighting became obvious when the Baloch Liberation Army “killed on of its commanders, Ali Sher, and detained four of its freedom fighters” in 2015,

Solution

Seminars need to be held inside the country, instead of in China, to create awareness in gullible masses. Issues relating to royalty should be settled. Economic deprivation of the people should be reduced.

Sardari (chieftain) system is the bane of economic deprivation: Even when the British government had consented to creation of India and Pakistan as independent states, one thing continually badgered Churchill`s mind. It was concern about downtrodden masses who would groan under tyranny of the nawab, wadera and chaudhri, after the Englishman`s exit from the Sub-Continent. Churchill believed that the Englishman`s legacy to the Sub-Continent was a modicum of justice and rule of law.

No-one better knew the psyche of the feudal lords better than the Englishman himself. Loyalty to the British crown was sine qua non of being a protégé of the British raj. After all, the wadera icons were the Englishman`s own creation. Of all the lords, the conduct of late Akber Bugti baffles one`s wits. His father, Mehrab Khan, was given title of `Sir` by the English rulers and allotted land not only in the Punjab but also in the Sindh province. Akber Bugti, former governor of Balochistan (1972), owned houses in Quetta, Sibi, Jacobabad, Kendkot, Sanghar, besides his native house in Dera Bugti along with about 12,000 acres of land.

The wadera in the yesteryears used to be tyrannical only to the inhabitants of their own constituency, not to the whole country. The situation appears to have changed now. Is it justified to aid or abet blowing up of gas pipelines, shooting at army helicopters, dragging the innocent Punjabi from the Punjab-bound buses and shooting them point-blank, looting buses going to the other provinces.

Will killing innocent passengers lead to forced payment of money by the gas companies, in addition to agreed royalty? By no stretch of logic, such a step could be justified. The matter needs a closer pry by the government into the psyche of our Baluch lords. Why Pak army can`t build cantonments on Pak soil?

The grievance appears to stem from the perception that lion`s share of windfall gains from the multi-billion dollar Gwador port and city project will go to affluent and influential non-Baluchi civilians and non-civilians. Well, that issue could be sorted out at talks.

In terms of area, Balochistan is the largest province of Pakistan. It covers 43.6 per cent of the country`s total area with only 5 per cent of the total population. It is rich in natural resources. Pakistan`s industrial infrastructure mainly depends on the gas and coal of this province. The gas from Dera Bugti meets 60 per cent of Pakistan`s, mainly Punjab`s, domestic and industrial needs. The province has 200 coal mines, which again meet the industrial requirements of Punjab. The province is rich in marble and mineral wealth which is being explored by foreigners under contracts from the Government of Pakistan. Balochistan benefits from the resources of the other provinces just as the other provinces benefit from the resources of Balochistan. The Nawabs received crores of rupees as royalty for the gas transmitted. They are to be blamed for the backwardness of the province. Why don`t they spend a pittance out of the received money on economic development of the province?

Not long ago, gas pipelines in Dera Bugti, the source of the Sui Gas, were frequently attacked by missiles. The government said the attackers were from  Bugti tribe. The Pakistan government had to detail about 50,000 para-military troops to protect sensitive installations in Dera Bugti.

In the Sui-gas-fields area, Akbar Bugti initially owned no land. In collusion with revenue officials he got 7,000 acres transferred in his name. He has been receiving royalty from two gas companies at the rate of Rs. 14,000/- per acre, to the tune of ten crore rupees annually. But this land was the property of the Kalpar tribe.

In 1992 armed Bugti tribesmen forcefully evicted six thousand Kalpars and Masuri Bugtis and occupied their lands, gardens and houses. These people are wandering hither and thither in different districts.

Conclusion

The PTM’s criticism of Pakistan’s armed forces is not fair. They wrogly defend drone attacks. The UN charter maintained war as a crime, but limited it to an ‘aggressive’ war, and gave immunity to any wars launched with the UN approval. If that is indeed the case, did the UN allow drone attacks on Pakistan? Drone attacks on Pakistan’s territory are a clear violation of the country’s sovereignty as an independent state.  Doubtless `patriotism is the last refuge of a scoundrel’. Lest the PTM is dubbed unpatriotic, it should stick on course. And confine itself to its demands.

The root cause of the problem is the medieval sardari system in Balochistan. This system is responsible for suppression of the common man. This system should be abolished. If the Sardars of today had not been constantly loyal to the Englishman, he would have dis-knighted them.

Not all the nawabs are so malevolent, as our Baluch scions of nawabs.

Nawab of Kalabagh tried to abolish the Sardari system by setting up about 40 police stations in Balochistan. However, General Moosa was averse to the policy. The government should seriously consider such steps as would effectively extend its writ in every nook and corner of Balochistan. The Sardari system must be abolished. Meanwhile, a study should be undertaken to evaluate loyalty and political nuisance of the nawab, sardar, waderas, and their ilk. If the Sardars are not loyal to the national interests, what is the fun of propping them up with government`s patronage? Why not take corrective action to cut them to size?

India should stop stoking up insurgencies in Balochistan and Khyber Pakhtunkhwa. Both India and Pakistan are nuclear armed. There is no reason why they should be toujours at daggers drawn.  Entente may flare up into a nuclear Armageddon. India need to shun jingoism, stop its evil machinations in Pakistan, and solve differences through talks.

Continue Reading

Intelligence

Strategy of Cyber Defense Structure in Political Theories

Sajad Abedi

Published

on

Since the principle of defense addresses a wide range of threats, it applies both in the field of justice and in the field of military and strategic affairs. But implementing cyber-defense is only recommended if the risks that can be identified have a direct impact on the security and even survival of a state, so each government is obliged to address any challenges that may arise. To eliminate it. Challenges of identifying the author or authors of an attack, estimating the likely impacts and reconstructions of the attack and setting targets, within the context of public networks and actors, distinguish cyberspace from other spaces in which defense is formed. Defense in cyberspace, while feasible, may not only be limited to existing actions, but unique concepts must be developed and presented.

In fact, some of the challenges in cyber defense are similar to those in other forms of defense. For example, the problem of identifying cyberattacks is reminiscent of the challenge of defending nuclear terrorism. Identifying the effects of a cyber-attack is very similar to identifying the effects of biological weapons. Also, the invisibility of computer weapons is, in many cases, very similar to the challenge posed by biological weapons.

Defensive methodological approaches can therefore be used to define some elements of cyber defense: against the threats of terrorism the concepts of “defense through denial” and “indirect defense” can be conceptualized against biological threats. Applied “symmetrical defense”.

In practice, however, we find that, although governments appear to be heavily dependent on computer systems for their deployment, they are not the same as those charged with using malicious equipment against computer systems. . For this reason, the impact of using cyber defense equipment against them is questionable. In fact, hacker groups that sell or lease knowledge or networks of infected machines to others, often to attack, plan malware or spyware or even to detect security flaws in systems, often the only things they need are a few (powerful) computers and an internet connection. So the question arises whether they can be prevented from doing so only by threatening to respond exclusively to cyber.

The need to establish a balance between action and response and the necessity of influencing the answer itself presents another challenge that must be met with the ability to ensure that the response is repeated and repeated as needed. Some experts believe that cyber defense can disrupt or temporarily disrupt a competitor’s activities, or temporarily disrupt the competitor’s activities, despite the physical (physical) measures that more or less neutralize the competitor; but none of the cyber solutions. It cannot lead to definitive neutralization of the threat.

In such a situation, the impact of the Aztemeric countermeasures point-by-point action cannot be ignored. Therefore, better enforcement of cyber defense against criminal groups – whose realization of financial interests is their top priority – can be resorted to by law enforcement (including actions aimed at the financial interests of the actors). Military responses can also be used if confronted with actors with little reliance on information technology.

Continue Reading

Intelligence

Achieving safety and security in an age of disruption and distrust

MD Staff

Published

on

The ability of citizens and businesses to go about their daily lives with a sense of safety and security is vital to prosperity, but citizens in many countries feel unsafe. Whether it’s because of inadequate responses to natural disasters, terrorist attacks, massive data breaches or the spread of disinformation, trust in governments’ ability to protect society is declining.

To address this requires a new, systemic approach to security that broadens its definition beyond defence and policing. Governments, local authorities and the private sector need to work closely together across all areas that contribute to security. PwC identifies four overlapping domains – physical, economic, digital and social — underpinned by trust, that form the foundation of a secure and prosperous society.

That’s the conclusion of PwC’s new report, Achieving safety and security in an age of disruption and distrust.Itchallenges the traditionally narrow view of physical safety and security, expanding the concept of what security means to include citizens’ basic needs; including food, water and utilities; and the organisations that deliver them.

The report draws on academic research* and case studies to show the necessity and benefits of a collaborative approach to security. It identifies the different elements that cause citizens and businesses to feel unsafe and the players, from private sector communications firms and infrastructure companies to security forces and non-governmental organisations, who need to work together to deliver security in all the domains.

Tony Peake, PwC Global Leader, Government and Public Services, says:“Unless you create a safe and secure environment in which people can go about their daily lives without fear, they won’t be able to work and sustain their families or carve out a decent standard of living.

The breadth of the challenge of delivering security has never been greater, requiring agility in response and innovation in prevention. And while security is a core task of governments, it can’t be achieved in isolation. It needs to be viewed holistically, with governments taking the lead in facilitating collaboration across organisations, sectors and territorial divides to deliver the security that is vital to a functioning society.”

The building blocks of security: physical, digital, social and economic

The report explains how these domains overlap and impact each other, adding to the complexity of delivering security. For example, economic security is closely tied to cyber security and thwarting data theft. Critical infrastructure services like telecommunications, power and transportation systems that rely on technology to operate must be secured both physically and digitally. Border control systems such as passport readers and iris scanning machines rely on digital interfaces that require cyber security.

Peter van Uhm, former Chief of Defence of the Armed Forces of the Netherlands, summarises in his foreword to the report:“It has become increasingly clear that delivering the safety and security that citizens and businesses need to prosper requires ever closer collaborations across borders, sectors and institutions. I learned that (re)building a failed state means realising that everything in a nation is interlinked and that it is all about the hearts and minds of the people. If you want the people to have trust in their society and faith in their future, safety and security in the broadest terms are the prerequisite.”

How governments can safeguard and protect citizens

PwC has identified six key actions that government leaders can take to develop a collaborative, systemic approach to delivering safety and security to their citizens:

1)    Take stock: look at the interplay of the different physical, digital, economic and social domains and spot any weak links across sectors.

2)    Identify and engage the right stakeholders and collaborate to develop a joint agenda and a national and/or local safety and security policy.

3)    Identify what each stakeholder needs to provide in the process and assess their level of interconnectedness to deliver safety and security, e.g. back-up systems for telecommunications failures.

4)    Work with leadership in the different overlapping domains and empower people in the right places to make decisions.

5)    Invest in leaders so that they are skilled in engaging the public and instilling a sense of trust.

6)    Manage carefully the trade-off of security with safeguarding personal data and citizens’ rights.

The recommendations for private sector firms and non-profit organisations include these steps:

1)    Work more closely with trusted governments to improve engagement and collaboration.

2)    Align organisational purpose with the broader societal safety and security agenda.

3)    Develop the capacity and capability to improve safety and security for stakeholders.

Examples of how this works in practice

Crisis readiness and response to a terrorist attack in Sweden

The 2017 Stockholm terrorist attack illustrates the need for collaboration between governments and non-profit partners. This attack was perpetrated by one individual who drove at high speed down a pedestrian street, killing five people and injuring 10 more. A scenario planning exercise between government and security agencies had been carried out several months before the attack and is credited with limiting the number of casualties and the swift arrest of the attacker.

Government authorities and the private sector collaborate to thwart cyber threat

A major cyber attack in Australia, dubbed Cloud Hopper, was identified and mitigated through close collaboration between cyber security experts in both the public and private sectors.

Continue Reading

Latest

Trending

Copyright © 2019 Modern Diplomacy