1 / 4

STRATEGIC INTELLIGENCE MANAGEMENT

STRATEGIC INTELLIGENCE MANAGEMENT. Chapter 8 - From Local to Global: Community-based Policing and National Security, Pg. 85. Chapter by Fahimeh Tabatabaei , Reza Naserzadeh , Simeon Yates, Babak Akhgar , Eleanor Lockley, David Fortune .

malia
Download Presentation

STRATEGIC INTELLIGENCE MANAGEMENT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. STRATEGIC INTELLIGENCE MANAGEMENT Chapter 8 - From Local to Global: Community-based Policing and National Security, Pg. 85 Chapter by FahimehTabatabaei, Reza Naserzadeh, Simeon Yates, BabakAkhgar, Eleanor Lockley, David Fortune

  2. Section 2: The public, Communication, Risk, and National Security 8. From Local to Global: Community-based Policing and National Security, Pg. 85 • Just as with the development of the PREVENT agenda in the context of community policing, there is a need to develop a range of approaches to identifying and countering online extremist views with credible voices. There is, therefore, a need to identify a common profile of self-radicalized individuals, and also the process of self-radicalization. This will help to detect and monitor vulnerable individuals and their network of associations, to prevent radicalization, to disrupt the self-radicalization process, and to provide an opportunity to de-radicalize individuals before they cause harm. • The Internet has become a significant instrument for extremists and terrorists. They increasingly utilize online environments to inculcate their content and ideology and propaganda and recruit and widen their communication area. However, knowledge of such individuals and group activities is not mature. In particular, presenting short-term solutions, which are manual or semi-automatic, have not been effective. A mixed approach linking technical solutions with community based “policing” and countering of online radical content is needed.

  3. Section 2: The public, Communication, Risk, and National Security 8. From Local to Global: Community-based Policing and National Security, Pg. 85 • The question therefore is how to police a networked society, holding onto the ideals of policing by consent, and bringing in the learning from PREVENT strategies in location-based communities. The obvious context here is the challenge of online radicalization of individuals or groups. In fact, the use of cyberspace to disseminate radical material and messages has become the predominant means that extremists use to recruit individuals to their cause. • This is increasingly so as more global efforts have been made to monitor and disrupt more conventional means and venues of recruitment based in local communities strategies such as PREVENT, or through denying access to specialist events and locations. • There is also a threat that the Internet will be the location for acts of extremist terrorism through acts of cyber crime or cyber terrorism, which may be spawned by the Internet. Such acts may need little resource and impact many areas of social life from the political through to the military, and may have economic, social, and material consequences (Guangrong, 1998; Kshetri, 2005; Chen et al., 2008; Mainz, 2009; Yunos and Hafidz, 2011, p. 20).

  4. Section 2: The public, Communication, Risk, and National Security 8. From Local to Global: Community-based Policing and National Security, Pg. 85 • As data become a critical resource across the world, efficient access to data, data sharing, information extraction from the data, and information utilization are also urgently needed. There have been many efforts to not only integrate the various data sources scattered across several sites, but also to extract information from them to the form of patterns and trends (Del Carmen and Alonso, 2003; Thuraisingham, 2005). Nevertheless, a large amount of work is still needed to integrate the semantics of various systems and applications (Thuraisingham, 2005). • Today all prominent active extremist groups have established at least one form of presence on the Internet. Their activities are very dynamic, as their Web sites appear and vanish in a few days (Lenselink, 2011). The rise of social media has had a further significant impact on the challenge of discovering such content (Correa, 2011).

More Related