Two experts told BenarNews last week – citing security sources whom they declined to identify – that the trio and one other Uyghur convict had been deported to China, where authorities are believed to have held close to 2 million Uyghurs and other Muslim minorities in internment camps, which the United States and several other nations have sharply criticized.
Amnesty International says it has obtained videos showing Mozambic’s security forces torturing and abusing militants. The advocacy group is calling for independent investigations, but the spokesperson for Mozambique’s Defense Ministry says the videos shouldn’t be taken seriously
Kidnapping and hostage-taking is a criminal strategy used by terrorist and religious extremism to inflict heavy psychological burden on family relations, and to expose challenges of human security by the state and its security machinery. The profile of those or individual abducted, generates an anxiety and fear to the community; how secured is the community?
The phenomenal case to be examine in relation to international and national norm is that of Islamist militant Khalid Sheikh Mohammed, al-Qaeda’s brainbox and architect of the September 11 attacks on the World Trade Center and the Pentagon in 2001.
On September 24, 2014, the United Nations Security Council, expressing grave concern about the increasing threat posed by foreign terrorist fighters and by individuals who are recruited by the so-called Islamic State (IS, also known as ISIL or ISIS); the Al-Nusrah Front; and other cells, unanimously adopted Resolution No. 2178 of 2014 condemning such groups and individuals. The Resolution was adopted under chapter VII of the UN Charter and is binding on the Member States
The availability of security device and software in the black market is a prerequisite for the perpetration of cybercrimes such as credit card theft, online scams or identity theft. Cybercriminals and terrorists have a great advantage to coordinate large scale attacks and crimes with the help of information and communication technologies with minimal effort such as generating funds from small value transactions in order to finance terrorist attacks (Webb & Tomalewicz, 2016). The speed and anonymity of cyber-attacks makes it distinctive among perpetrators (terrorists, criminals, and nation states). Jihadist tendencies usually require little finance, for example the United Nations evaluated London bombings in 2005 at around $14,000, while the French Finance Minister Michel Sapin evaluated that of the Paris attacks in November 2015 to approximately $32,000. Contrary to coordinated attacks of 9/11 which were reported to have cost between $400,000 and $500,000 according to the final report of the National Commission on Terrorist Attacks. There has been a large increase in the volume of cyber-attacks by organised criminal networks
The NIA found that the youth chemicals like ammonium powder for making IEDs, batteries, clothing and other accessories were bought by him from Amazon using his online shopping account on the retailer’s platform. He disclosed to the NIA sleuths that he was acting on the directions of Pakistan based terrorist organization Jaish-e-Mohammad
Kenya has stepped up security on the road that connects northeast Lamu County to the rest of Kenya after al-Shabab terrorists killed three people on a public bus in January. The attack is the second on public transportation near the border with Somalia in as many months
Salahuddin Salehin is wanted for murder in Bangladesh and for a bomb blast at an Indian temple in 2018. He fled to India after escaping from a prison van in 2014 when militants mounted a daring daylight rescue that killed a police officer and wounded two others
Islamic State militants have increased their activity in some northern Iraqi provinces. Local residents say IS recently kidnapped and threatened to kill civilians in the area, forcing many to flee their homes