Chapter 11, How do we respond to the security impacts of globalisation? Flashcards

1
Q

Transnational

A

Something that extends beyond national boundaries or involves more than one country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Terrorism

A

Terrorism is the intentional use of violence by individuals or groups to cause fear and intimidate others in order to achieve certain political or social objectives.
These objectives are often rooted in certain ideologies (e.g. white supremist).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Self-radicalised

A

A situation where an individual has developed very extreme beliefs that most people would find shocking or disturbing. This usually happens when individuals are exposed to, or consume, extremist content online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vigilance

A

Keeping a careful watch for possible danger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security in Singapore

A
  • Security refers to the state of being safe and being free from danger or threat. It is a basic human need and is an essential condition for countries to survive and thrive.
  • There are 2 main ones:
    1. Traditional security concerns
    2. Non-traditional security concerns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Traditional security concerns

A
  • Related to national security (e.g. defending own borders and territories).
  • Countries ensure security by with building good relations with other countries through diplomacy and/or building military capabilities to deter potential aggressors.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-traditional security concerns

A
  • Include food, water and energy security
  • These are resources needed by any country to survive and function well. In the globalised world, many countries import these resources from other countries to address the non-traditional security concerns they face
  • Concerns are transnational in nature.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transnational terrorism

A
  • Arises when terrorists attack beyond their country’s borders to achieve their objectives and operations.
  • This is enabled by globalization – as the world becomes more interconnected, the technological infrastructure and digital networks that facilitate global flows of people, goods, money and information also become available to terrorist groups and individuals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical impacts of transnational terrorism

A
  • Terrorist attack such as bombings can lead to immediate physical impacts such as injuries, deaths and the destruction of properties.
  • These physical impacts are possible as due to technological advances from globalisation, the technological infrastructure and digital networks that facilitate global flows of people, goods, money and information also become available to terrorist groups and individuals to organize attacks.
  • For example, in September 2001, within 102 minutes, 19 terrorists from Al Qaeda hijacked 4 American aeroplanes and crashed them into various locations in the United States.
  • Al Qaeda used the idea of a global “holy war” to encourage extremist Islamic groups in different countries to engage in terrorism.
  • The motive of these attacks was to take revenge for America’s military involvement in the Middle East.
  • The attacks killed over 3000 people, resulted in over 25,000 injuries and caused infrastructure and property damage accounting to US$10 billion.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Feelings of distrust and fear due to transnational terrorism

A
  • Feelings of distrust and suspicion by others may happen to individuals of similar religious and ethnic backgrounds as the terrorists, even if they do not share the same extreme beliefs as the terrorists.
  • They may also be the target of hate crimes.
  • This is because terrorist attacks can lead to injuries, deaths and the destruction of properties.
  • For example, on the night of 13 November 2015 in Paris, Islamic State of Iraq and Syria militant gunmen and suicide bombers attacked a concert hall, a major stadium, restaurants and bars almost simultaneously. After the attacks, people started to discriminate and carry out hate crimes against others who “look like terrorists” or had a similar religious background as the gunmen. One of the victims of the hate crimes was a British Sikh in Poland. He was assaulted and spat on because he looked like a “terrorist.”
  • Over time, these feelings can lead to disunity and tensions among different communities.
  • They can disrupt and destabilise the country
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Self-radicalisation

A
  • The transnational nature of terrorism has led to some individuals becoming influenced by the extreme ideologies of terrorist groups through the internet.
  • These individuals may operate on their own, with little
    or no instruction from transnational terrorist organizations.
  • For example, a 16-year-old Singaporean was detained under Singapore’s Internal Security Act in December 2020. He was a Protestant Christian of Indian ethnicity.
  • He had made detailed plans and preparations to conduct terrorist attacks against Muslims in Singapore.
  • He was influenced by the Christchurch attacker who livestreamed his attacks of 2 mosques in Christchurch, New Zealand on 15 March 2020.
  • This is a reminder that the threat of online radicalization, and together with social media pervading, brings the danger of extremist ideologies at home.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Impacts of cyber threats in general 🖥️

A
  • Cyber threats refer to unauthorized access to online information systems and data.
  • Advancements in digital technology has made it easier for people to access and store
    information online.
  • Cyber-attacks can be carried out by countries, organizations or individuals.
  • The most common types of cyber threats include website defacement, phishing and malware
    infection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Impact of cyber threats on countries

A
  • Advancements in digital technology has made it easier for people to access and store information online.
  • The more reliant actors are on digital information systems and connectivity, the more exposed they will be to cyber threats.
  • For example, with the increasing trend of ransomware incidents occurring globally, Singapore is not spared. In February 2021, hackers stole the personal data of 129,000 Singtel customers and bank accounts details of former Singtel employees.
  • Being a highly digitalized society with high internet usage, Singapore is vulnerable to ransomware attacks.
  • This increases the risk of identity fraud as the identity of a person can be stolen.
  • The loss or compromise of the computer system will weaken the availability of the essential services in Singapore.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Impacts of cyber threats on Individuals

A
  • Advancements in digital technology has made it easier for people to access and store information online.
  • Individuals who are less familiar with digital technology may be more vulnerable to cybercrimes.
  • Certain population groups such as the elderly may be targets of cybercrimes. They are likely to have money and are perceived as easier prey as they may not be aware of ways to keep themselves safe online.
  • For example, nearly four in 10 people here reported being victims of at least one cyber-security incident last year, according to findings from the Cyber Security Agency of Singapore’s (CSA) Cybersecurity Awareness Survey released in 2021.
  • This increases the cyber threats that include website defacement, phishing and malware infection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Individuals’ responses to transnational terrorism

A
  • Individuals can exercise vigilance by watching out for tell-tale signs of self-radicalisation in others.
  • Self-radicalised individuals do not belong to any particular gender, age, race, ethnicity, nationality or socio-economic group, making them hard to detect until they carry out their attacks.
  • For example, according to an article about the process of self-radicalisation of a Singaporean youth, self radicalised individuals usually be reading radical websites and be convinced the use of violence was permissible against disbelievers. They will use private web browsers to mask any digital footprints and used code words to mask communications online.
  • When there are sufficient grounds for suspicion, individuals can take action by informing the relevant authorities or report suspicious items or characters.
  • By doing so, they can save their loved ones from harming themselves and others.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Individuals’ responses to cyber threats

A
  • Individuals can take simple actions such as maintaining *social media hygiene, raising awareness on scams to protect themselves online. *
  • For example, individuals can set strong passwords and use 2 factor authentication to secure their accounts against hackers.
  • They do not need to be cybersecurity experts to keep themselves safe.
  • As each individual plays a part to protect themselves online, they collectively contribute to the security of Singapore’s cyber landscape.
  • Potential cyber criminals will also think twice before their attacks as it will be difficult to spot computers vulnerable to cyber-attacks. This will prevent substantial losses and damage.
17
Q

Security measures by governments for transnational terrorism

A
  1. Monitoring and surveillance infrastructure for stricter security checks
  2. Use of biometrics to verify fraud
  3. Implementing laws
18
Q

Border management measures for transnational terrorism

A
  1. Monitoring and surveillance infrastructure for stricter security checks
    - Tech innovations are installed at land and sea borders, such as body and baggage scanners, X-ray imaging equipment.
    - For example, a state-of-the-art advanced technology scanner was installed at Miami International airport to screen checked baggage.
  2. Use of biometrics to verify identity
    - Mitigates risk of identity fraud.
    - Biometric data include facial features, fingerprints, iris patterns.
    - For example, facial and iris recognition system was installed Dubai international airport, the world’s busiest airport for international travel.

These efforts ensure that countries remain vigilant in the face of potential transnational terrorist threats. Potential terrorists will think twice, as they are not able to enter the country or deliver tools to launch a terrorist attack.

19
Q

Laws implemented for transnational terrorism

A

a. In Singapore, the **Internal Security Act (ISA) ** enables the Singapore government to act decisively and swiftly against dangers to the security of Singapore.
b. ISA allows authorities to impose preventive detention against individuals who pose a threat to Singapore.
c. They also establish a mentoring programme in 2016, in which a mentor continues to see to a youth’s rehabilitation needs after their release. Upon their release, they can find employment or pursue their studies.

Detaining suspected terrorists keeps Singapore safe as potential terrorist will not have a chance to materialise their terrorist plans before getting caught.
With a good social support, they remain resilient to radical influences.

20
Q

What countries do to prevent cyber security threats?

A
  • Countries can set up dedicated agencies with the expertise and resources needed to investigate and handle cyber threats. For example, the Cyber Security Agency of Singapore (CSA).
  • CSA oversees and coordinates all aspects of cybersecurity for the nation. Through the Singapore Cybersecurity Strategy 2021 plan, Singapore seeks to do the following to protect our cyberspace:
    a. Enable a safer cyberspace: The Go Safe Pop-up exhibition is part of outreach to schools, libraries and community spaces to raise awareness of the importance of cybersecurity among students and members of the public.
    b. Build resilient infrastructure: Protecting Singapore’s Critical Information Infrastructure (CII) through strengthening the security and resilience of our digital systems and networks that support the delivery of essential services.
    c. Enhance international cyber cooperation: Enhancing international cyber cooperation through contributing to international efforts to fight cross border cyber threats.

These measures can increase the expertise of the government to deal with cyber-attacks. Potential cyber criminals will also think twice before launching attacks, as their chances of success and getting away with it is low.

21
Q

Cooperation among countries against Transnational Terrorism

A

The fight against transnational terrorism is best countered by working together, as there are threats faced by many countries.

  • Participating in international counter- terrorism cooperation: For example, in 2018, defence ministers from ASEAN member states officially adopted the “Our Eyes” Initiative (OEI) to enhance strategic information sharing on terrorism and radicalism so that countries are able to respond swiftly during terrorist incidents.

Potential terrorist will think twice as they will find it difficult to plan attacks on Singapore in another country without being discovered and caught. Timely sharing of intelligence on terrorist suspects will disrupt terrorist plans and operations in other countries, making the world a safer place for everyone.

22
Q

Cooperation among countries against Cyber Threats

A
  • Countries cooperate with one another to counter cyber threats, as many cybercrimes today can originate beyond a country’s borders.
  • E.g. In 2018, officers from Singapore, Malaysia and Hong Kong Special Administrative Region took part in a joint operation to crack down on a criminal organisation involved in almost S$20 million worth of Internet love scams.
  • This can improve the region’s competency in responding to cyber security challenges. Potential cyber criminals will also find it harder to launch attacks in the region, as they will be detected and thwarted early from the close sharing of intelligence in this region.