Fighting global terrorism is considered to be on the highest place in the agenda of the EU security decision makers and authority officials. European countries, especially after the Madrid and London attacks are struggling to prevent and thwart operations of this huge terror magnitude, sponsored by Al-Qaeda and its affiliates. Yet, it is not true that the security problem for EU countries emerges only from ‘outside inspiration’ and only from the Jihadi menace. In fact domestic, ‘traditional’ left wing terrorist groups do continue to pose a security threat.
In the last decades surveillance and security tools, from cctv to ID cards, have grown to unpredictable levels. From close spaces, such as airports and malls, to urban contexts, our identities have become mere physical features constantly monitored by the penetrating eyes of security devices. The complexity, the nuances and the essential social components of identity are often reduced to ascribed characteristics. Identities have turned into “transparent” and naked bodies, legitimately scrutinised and divided into “pieces”. This simplistic approach could lead either to social exclusion of ethnic groups usually associated with deviant behaviour, or to a more general lack of concern for the integrity and the dignity of the person as a whole. The paper aims at analysing this new and inadequate anthropology of the person by focusing on different examples, such as biometrics and data banks, that emphasise the fragmentation of the body and the risks related to this reductive approach.
DOWNLOAD LINK : Surveillance and identity
The proverb “one picture is worth a thousand words” summarizes the importance of image in the field of communication. The tragic events of September 11, the attacks on Madrid and London highlighted the importance of understanding the ideology and methods of jihadi groups. There is a lack of information on modern imagery associated with political Islam, especially imagery produced by radical and violent extreme Muslim groups. These organizations have had a brief but prolific history in the production and distribution of visual propaganda, and have arguably created their own distinct genre of Internet-based Islamic imagery. Visual propaganda is more than a host for textual messages; it is an expressive medium which communicates ideas just even more effectively than writing. Jihadi imagery is a primary vehicle for the communication and diffusion of jihadi ideas, an essential tool utilized by radical terrorist organizations. Therefore, understanding how these images work, what ideas they convey, why they are employed and what responses they may elicit, is vital to the struggle against the influence of jihadi organizations and their violence. Below are examples of basic Islamic imagery and its symbolisms……..
Il governo giapponese ha investito circa 8 milioni di euro per un progetto sperimentale in 20 regioni del paese. Nei prossimi anni saranno installati dei lettori Rfid (Radio Frequency Identification) sui cancelli delle scuole, ai semafori e sui lampioni dei parchi per “salvaguardare” i minori. Gli Rfid sono in grado di interagire con i tag Wi-fi portati in tasca dagli scolari: in questo modo i genitori saranno informati via sms o su un sito web degli spostamenti dei propri figli.
Since the ‘80s and onwards, the crime victim received particular attention in criminal policy and subsequently also in criminal legislation. This led to legislation protective regarding possible adverse impacts of criminal proceedings and supportive regarding compensation of material and immaterial losses caused. During the ‘70s, terrorism- then found mostly in the form of national, separatist and political terrorism- started to trouble European countries. The policy response was more or less restricted to tailoring police and criminal procedure laws to the new demands placed on law enforcement. It was only after the attack on the World Trade Center on 9/11 with its devastating consequences for civil society and the extreme toll on human lives, that more attention has been devoted to the question of how victims of terrorist attacks can be better accommodated. This process has been accelerated by the terrorist acts in Madrid in 2004 and London in 2005.
È la tecnologia CAN bus e connette sensori e centraline implementando la tecnologia drive-by-wire . La tecnologia drive-by-wire si basa sul concetto di rimozione dei collegamenti meccanici fra i comandi dell’automobile e le parti che fisicamente eseguono questi comandi. In questo modo, al posto che azionare i freni o lo sterzo in modo meccanico, i comandi di sterzo e di frenatura vengono inviati ad una centralina che, dopo averli elaborati, li trasmette agli organi interessati.
Questa mattina, 17 gennaio, la drammatica consueta abitudine induce a prestare poco orecchio alle notizie che arrivano da Baghdad e che informano del consueto macello di uomini. Senonché la strage all’Università mi richiama all’ordine, ancora per una consuetudine – che tuttavia lavora in modo apposto alla prima – la quale mi lega a colleghi e studenti di un Paese lontano in guerra, Paese che studio.
Il vigile del fuoco ha piena consapevolezza dei Sistemi di Protezione Individuale (DPI) che infatti lo proteggono in ambiente ostile, ma smessi quelli, spesso il rischio è che l’ambiente ostile rimanga all’interno del soccorritore, privo questa volta dei D.P.I. necessari alla sua tutela. Le iniziative di seguito proposte, come punto di partenza non certo di arrivo, si potrebbero considerare dei Dispositivi di Protezione Relazionale perché si impegnano a tutelare l’operatore nella sua attività di soccorso.
Relevant documents about critical infrastructures:
E’ finalmente nato l’ Osservatorio per la Sicurezza Nazionale, un network per la Sicurezza Nazionale , promosso da CeMiSS e da Elsag-Finmeccanica, al quale ITSTIME aderisce.
Since 2001 the UK law enforcement have held that it is essential not just to concentrate upon the suspects, means and motives, but also to consider the changing nature of the target. In stark terms, Bin Laden demonstrated the advantages retained by the terrorist:
- the element of surprise and choice of weaponry
- the ability to change targeting at will
- the option of returning to a target, if a previous attack was unsuccessful
- above all, access to individuals who are prepared to die in order to achieve their operational objectives.
There is no greater challenge for a democracy than how to deal with terrorism. The economic, social and political upset which sophisticated terrorist action can bring, threatens the very democracy which protects our liberty. But that liberty may be also exploited in the first place by those supporting, aiding, or engaging in terrorism. The challenge, therefore, is to retain long held and hard won freedoms from the arbitrary use of power or wrongful conviction, while at the same time ensuring that democracy and the rule of law itself are not used as a cover by those who seek to overthrow them. Continue reading