Wednesday, May 27, 2020

TASTE OF FREEDOM: A DISPATCH FROM A HIGH-THREAT PHILIPPINES


By: Jomar T. Sadie, PGDip-TS
LEAPS Academy Philippines
Area: Human Trafficking

Basra, Iraq - It was barely over a year ago, when we were pulling all stops sorting things out with prison officials in order to extract one kababayan Jocelyn Capate and bring her back home. She burst into tears the moment she saw us that morning of 03 April 2019. And more so when we told her she's flying home the same day, mere hours after her release from jail.

Joyce's ordeal started in July of 2018 when she was promised a job in Dubai. Instead of arriving in the UAE however, she ended up in Iraq using a Kurdistan visa. Such a visa is easy to acquire online. For three days, Joyce was transported by car from Erbil to Basra, a journey that should have been only 8 hours long at most. This is because the visa she holds is not valid for travel to the rest of Iraq.

During that trip, she was transferred from one car to another at least five times in order to avoid inspection at various checkpoints that pepper their route. She is among the luckier ones. At least twenty (21) other Filipinos experienced traveling the same route from July to December of 2018. Some were detained, two were allegedly kidnapped, and several were molested during the 3-day journey.

Last October, Joyce managed to escape. She ran away to escape the maltreatment she was enduring from her employers in Basra. But it was a dangerous trip. She traveled via taxi to Baghdad amidst the protest and violence that erupted in that city during that month. She stayed in the Embassy for a few months along with other Filipinos who were victims of human trafficking.

By December, we were sending home 22 victims of human trafficking. This was no easy feat, but no one heard about this. We couldn't celebrate. Joyce was left behind even with her duly processed exit visa dated 10 December 2018. Her employer had filed a case against her, as if fate deemed it, a day before her flight. She was detained at the airport. She was so close to getting home. And she was devastated. We couldn't fully rejoice for the 21, because even if the men and I are rough around the edges, "No one gets left behind" is not just lip service but a mantra we take to heart at the Embassy.

Because of the case filed by her former employer, Joyce was locked up for five months. Frustrated with the situation, but still keeping true to the spirit of diplomacy, the Philippine Embassy in Iraq transmitted a strongly worded note verbale to the Iraqi Ministry of Foreign Affairs stating, among others, that the Baghdad Philippine Embassy aspires to regularize Filipino workers in Iraq as well as combat human trafficking, but Capate’s prolonged detention made it difficult to advance these advocacies.

The central government took notice and responded; thus, Joyce was released. I remember looking at Joyce enjoying a cigarette in the other vehicle within our heavily guarded convoy that's running fast to the airport. I see her finally free. And she is celebrating with that cigarette, windows open. I roll down my window and light a stick to join the celebration. And damn, what a celebration! I wrote personal thank you letters to those who helped us, without friends, it is impossible to bear Iraq.

I remember writing this then and I say it now “To those, who are eyeing jobs in Dubai or Erbil with shady details, may this story serve as a warning to always be careful. If the offer is too good to be true, it is not true. And to those recruiters who are feeding off the blood and sweat of your very own Kababayans, we sincerely wish that you live long, may you never be hungry, may you never be cold in bed or without a bed, and may you never be left alone, for the world is round, and life is long and you'll never know that twist of fate when it's your turn to be behind bars wanting and waiting for kind words. We are happy to be the first one to wish you well. See you there.”

*****

Find related articles at:

www.pccmleaps.org
www.criminologysolutions.com

Sunday, May 24, 2020

TERRORISM AND BIOLOGICAL WARFARE


By: ANTON STEVE P. LIM, R.N., PGDip-TS
LEAPS Academy Philippines | PG Diploma in Terrorism Studies

 Introduction

The current definition of terrorism emphasizes that its primary aim is to threaten and terrorize large groups of humans, governments, armies, or society as a whole. Thus, one may assume, in the context of a socio-historical analysis of bioterrorism, that it involves the use of various biological agents by all kinds of actors or groups, including political or military actors and official states, motivated by different reasons (be they political, religious, or other ideological objectives), in order to attain such objectives.

The use of biological agents such as viruses, bacteria, fungi, or their toxins to cause disease or death among human population, food crops and livestock, or to terrorize society and manipulate the government, has increased much possibilities in recent times. It could be by any means of any method, covert or overt, for the transmission of disease from one human to another or to the desired target. For instance, measles, influenza, avian flu, smallpox, plague, and viral hemorrhagic fevers. Bioterrorist agents of major concern have been categorized as A, B and C based on the priority of the agents, and all posing risk to societal security.

The Threat of Bioterrorism

The threat of bioterrorism, in which biological agents are used by extremists as weapons against civilian populations, is a matter of great concern. Nations and dissident groups exist that have both the motivation and access to skills to selectively cultivate some of the most dangerous pathogens and to deploy them as agents in acts of terrorism. Although a bioterrorist attack is difficult to predict, the consequences of a successful attack could be devastating and cannot be ignored.

Bioterrorism and its effects can impose heavy demands on the public health care system which will be called upon to handle the consequences. It causes public health emergency. Early detection and rapid investigation are the keys to contain the attacks. An effective public health care system with strong disease surveillance, rapid epidemiological and laboratory investigation, efficient medical management, information, education and communication will be required to counter any act of covert or overt bioterrorist attack. Thus, the role of public health epidemiologist is critical not only in determining the scope and magnitude of the attack but also in effective implementation of interventions. The most important step in any case of bioterrorist attack is the identification of the event. This can be achieved by generating knowledge about it, having high degree of critical awareness and having a good surveillance system to assist quick detection.

Historical Backgrounder

Contagious diseases and other biological weapons were recognized for their potential impact on armies or people as early as the 14th century BC. The Hittites documented examples of Biological Warfare (BW) by sending diseased rams, possibly infected with bacterial disease tularaemia, to their enemies to weaken them.

In the 4th century BC, the Greek historian Herodotus relates that Scythian archers used to infect their arrows by dipping them in a mixture of decomposing cadavers of adders and human blood – a mixture which might have contained Clostridium perfringens and Clostridium tetani, as well as snakes’ venom.

During the 3rd century BC, the military commander Hannibal of Cartagena set fire to the enemy’s fleet with pots full of venomous snakes. Similar examples are reported by historians and anthropologists of the use of arrows or other vessels infected with different products extracted from animal parts or plants in order to attack the human enemy.

The use of arrows for the transmission of plague were documented in history. For instance, in 1346, the Mongols, by throwing diseased cadavers with catapults against their enemies. The attacking enemy army experienced an epidemic of bubonic plague. Similar examples of the use of the technique of catapulting infected cadavers can be found throughout the modern period, from the siege of the Bohemian City of Carolstein by Lithuanian troops in 1422 to the siege of the Swedish army in Reval (Estonia) in 1710 by the Russians.

In brief, here are some featured events in the history of Biological Warfare:

  • 14th century BC - the Hittites send rams infected with tularaemia to their enemies
  • 4th century BC - according to Herodotus, Scythian archers infect their arrows by dipping them into decomposing cadavers
  • 1155 - Barbarossa poisons water wells with human bodies, Tortona (Italy)
  • 1346 - Mongols hurl bodies of plague victims over the walls of the besieged city of Caffa (Crimea)
  • 1422 - Lithuanian army hurls manure made of infected victims into the town of Carolstein (Bohemia)
  • 1495 - Spanish mix wine with blood of leprosy patients to sell to their French foes, Naples (Italy)
  • 1650 - Polish army fires saliva from rabid dogs towards their enemies
  • 1710 - Russian army catapult plague cadavers over the Swedish troops in Reval (Estonia)
  • 1763 - British officers distribute blankets from smallpox hospital to Native Americans
  • 1797 - The Napoleonic armies flood the plains around Mantua (Italy), to enhance the spread of malaria among the enemy
  • 1863 - Confederates sell clothing from yellow fever and smallpox patients to Union troops during the American Civil War
During the subsequent centuries, smallpox represented the most effective, if purposefully used, biological weapon. Introduced in the American continent by the European colonizers, it was explicitly used several times as a way to infect Native Americans during the so called ‘Conquest of the West’.

Below summarizes the use of biological agents during the historic wars:

Category A
  • Anthrax - Bacillus anthracis - World War I; World War II; Soviet Union, 1979; Japan, 1995; USA, 2001
  • Haemorrhagic - Marburg virus - Soviet bioweapons programme
  • Plague - Yersinia pestis - Fourteenth-century Europe; World War II
  • Smallpox - Variola major - Eighteenth-century North America
  • Tularaemia - Francisella tularensis - World War II

Category B
  • Cholera - Vibrio cholerae - World War II
  • Encephalitis – Alphaviruses - World War II
  • Food poisoning - Salmonella species, Shigella species - World War II; USA, 1990s
  • Glanders - Burkholderia mallei - World War I; World War II
  • Typhus - Rickettsia prowazekii - World War II
  • Various toxic syndromes - Various bacteria - World War II

Classification of Bioterrorism Agents

To determine the risks from various agents, the Centers for Disease Control and Prevention (CDC) considers their effect on human health, the degree of contagiousness or method of transfer to humans, and the availability and effectiveness of vaccines and therapies to prevent and treat illness. The level of threat from specific agents is reviewed and revised periodically. New high-risk pathogens may be added to the list as they are discovered. It is also possible that the relative level of threat could change. For example, if an effective vaccine is developed against a particular agent, its level of threat would decrease, whereas if an agent becomes resistant to current therapies, its level of threat could increase. 

The classification into Categories A, B, and C is based on the ability of the agent to be disseminated, the mortality rate of the agent, the actions required for public health preparedness, and the capability of causing public panic.

  • Category A consists of the agents that are considered the highest risk, and much of the biodefense research effort is directed towards these agents. It poses the highest risk to national security; can be easily disseminated or transmitted from person to person; result in high mortality rates and could have a major public health impact; require special public health preparedness actions; have potential to cause public panic and social disruption.
Examples - Anthrax, Botulism, Dengue, Ebola, Hantavirus, Lassa, Marburg, Plague, Smallpox, Tularemia

  • Category B agents are ones that could conceivably threaten water and food safety. It poses the second highest risk to national security; are moderately easy to disseminate; result in moderate morbidity rates and low mortality rates; require enhanced diagnostic capacity and disease surveillance.
Examples - Caliciviruses, Chikungunya, Cholera, E. coli O157:H7, Hepatitis A, Ricin toxin, Salmonella, Typhus fever, Yellow fever, Zika

  • Category C includes pathogens that are considered emerging infectious disease threats and which could be engineered for mass dissemination; are easily produced and disseminated; have potential for high morbidity and mortality rates and major health impact.
Examples - Antimicrobial Resistance, Hendra, Influenza (highly pathogenic strains), MERS, Nipah, Prions, Rabies, SARS, Tickborne encephalitis, Tuberculosis

Public Health Emergency Preparedness and Response

The responsibilities of public health agencies are surveillance of infectious diseases, detection and investigation of outbreaks, identification of etiologic agents and their modes of transmission and the development of prevention and control strategies.

Maintaining effective disease surveillance and communication systems are fundamental components of an adequate public health infrastructure. Ensuring adequate epidemiologic and laboratory capacity are prerequisites to effective surveillance systems. One approach to early detection is “syndrome surveillance”, in which electronic symptom data are captured early in the course of illness and analyzed for signals that might indicate an outbreak requiring public health investigation and response. Syndrome surveillance has been used for early detection of outbreaks to follow the size, spread and tempo of outbreaks, to monitor disease trends and to provide reassurance that an outbreak has not occurred. Syndrome surveillance systems seek to use existing health data in real time to provide immediate analysis and feedback to those charged with investigation and follow-up of potential outbreaks.

Exposure to the agents of bioterrorism by use of vaccines and antibiotics has dramatic potential for saving lives and expense. The public health approach to bioterrorism must begin with the development of local and state-level plans. Close collaboration between the clinical and public health communities is also critical. To effectively respond to an emergency or disaster, health departments must engage in preparedness activities.
Completion of the following five phases of activities prior to an incident are essential for successful response to a bioterrorist attack.

  1. Preparedness Phase - includes actions to be taken by different agencies to ensure required state of preparedness. These include evaluation of the laboratory facilities and upgrading the same, evaluating the hospital preparedness in emergency response and case management in case of an imminent attack, conduct training of health professionals, rapid response team (RRT) and quick response medical team (QRMT) who would be the first responders, work out the legal provision and their implications, ensure that requirement of safe drinking water is met, ensure availability of adequate stocks of medicines and vaccines, coordinate with security organization, organize mock drills for health professionals, government departments, animal husbandry, security, law enforcing and other agencies so as to assess their preparedness levels to act in case of an attack, prepare contact details so that communications is unhampered during an attack. Public should be kept aware about imminent attacks so that voluntary reporting is encouraged. It is important to carry out review of situation based on current information of threat perception.
  1. Early Warning Phase - in the surveillance system, this includes activities like case definitions, notification, compilation and interpretation of epidemiological data. Early detection and rapid investigation by public health epidemiologist is critical in determining the scope and magnitude of the attack and to implement effective interventions.
  1. Notification Phase - it is mandatory to report any unusual syndrome or usual syndromes in unusual numbers to appropriate authorities. The activities in this phase include rapid epidemiological investigations, quick laboratory support for confirmation of diagnosis, quarantine, isolation, keeping health care facilities geared for impending casualty management and evolving public health facilities for control.
  1. Response Phase - activities include rapid epidemiological investigation, quick laboratory support, mass casualty management and initiation of preventive, curative and specific control measures for containing the further spread of the disease.
In order to achieve them, following steps can be followed:

    1. Assess the situation - Initiate the response by assessing the situation in terms of time, place and person distribution of those affected, routes of transmission, its impact on critical infrastructure and health facilities, the agencies and organizations involved in responding to the event, communicate to the public health responders, local, state and national level emergency operation centers for event management etc.
    2. Contact key health personnel - Contact and coordinate with personnel within the health department that have emergency response roles and responsibilities. Record all contacts and follow-up actions.
    3. Develop action plan - Develop initial health response objectives that are specific, measurable and achievable. Establish an action plan based on the assessment of the situation. Assign responsibilities and record all actions.
    4. Implementation of the action plan - RRTs/QRMTs investigate the outbreak/increase in the disease incidence, collect samples and send it to the identified state/national laboratory for testing. Hospitals are alerted for receiving the patients and their treatment. If necessary tented hospitals are set up. Methods to control the disease and quarantine measures are instituted. Once the disease is identified, treatment protocols are sent to all concerned by the fastest possible means. Standard operating procedures (SOP) for laboratory testing is made by the identified laboratory and the same is sent to all the hospital laboratories and district hospitals for implementation. Laboratory reagents are distributed to the concerned laboratories. Public is taken into confidence to prevent any panic. The list of ‘Do's and Don'ts’ are circulated thorough the print and electronic media. Hospitals ensure appropriate isolation, quarantine, waste disposal and personal protective measures. All contaminated clothing and equipment are carefully disposed of by incineration. An impact assessment team assesses the impact of the attacks on humans, animals and plants.
  1. Recovery Phase - the setbacks suffered as a result of the bioterrorist attack are restored and lessons learnt in this phase are incorporated in the future preparedness plans. The damage done to the public health facilities and the essential items utilized during the response phase are replenished. Public advisories are issued regarding restoration of normalcy. The RRTs compile and analyze data to identify the deficiencies experienced in the implementation of the response measures. The necessary modifications are then incorporated in the contingency plan for future.
Final Thoughts

Despite the advances in scientific research on bacteriology and, more generally, in biology and medicine, definitive conclusions regarding the effective use of biological attacks in the history of humankind remain difficult to handle. The lack of microbiological and epidemiological data, the weight of political propaganda and issues about military secrecy make the problem particularly difficult to solve for the historical researcher. However, the recurring use of biological weapons (be it speculative or real), which emerged long before the scientific revolution of microbiology at the end of the 19th century, is a striking characteristic of human history.

Biological warfare is a potential threat on the battlefield of daily life. It is vital for neurologists and other health-care practitioners to be familiar with biological and toxic agents that target the nervous system. Most illnesses caused by biological warfare agents are not commonly considered neurological diseases; however, many of these agents may present with headache, meningitis, or mental status changes, in addition to fever and other symptoms and signs.

Bioterrorism remains a legitimate threat for both domestics and international terrorist groups. The government should conduct a timely surveillance, awareness of syndromes resulting to bioterrorism, epidemiologic investigation, and laboratory diagnostics capacities, ability to rapidly disseminate critical information on a need-to-know and need-to-share basis. Managing public information to the media is also vital. Ensuring the adequate supply of medicines availability. Standard operating procedures on the level of health care will go a long way in minimizing the mortality and morbidity of bioterrorism attack.

*****

References and Suggested Readings:

  • Sharma R., India wakes up to threat of bioterrorism. BMJ. 2001;323:714.
  • Lane HC, Fuci AS. Microbial Bioterrorism. In: Kasper DL, Braunwald E, editors. Harrison's Principle of Internal Medicine. 16th ed. McGraw Hill; New York: 2005. pp. 1279–1288.
  • Centres for Diseases Control and Prevention. Emergency Preparedness and Response: Bioterrorism Overview. http://www.bt.cdc.gov/bioterrorism/overview.asp.
  • Gupta ML, Sharma A. Pneumonic plague, northern India. Emerg Infect Dis. 2002 http://www.cdc.gov/content/13/4/664.htm 2007
  • Borio L, Inglesby T, Peters CJ, Schmaljohn AL, Hughes JM, Jahrling PB. Haemorrhagic fever viruses as biological weapons: medical and public health management. JAMA. 2002;287:391–405.
  • Torok TJ, Tauxe RV, Wise RP, Livengood JR, Sokolow R, Mauvais S. A large community outbreak of salmonellosis caused by intentional contamination of restaurant salad bars. JAMA. 1997;278:389–395.
  • Bioterrorist agents: Differential diagnosis, initial laboratory tests, and public health actions. http://www.stanfordhospital.com/PDF//BTAgentsDifferentialDiagnosis.pdf.
  • J Lederberg (Ed.), Biological weapons. Limiting the threat, The MIT Press, Cambridge, MA (1999)
  • GW Christopher, TJ Cieslak, JA Pavlin, EM EitzenBiological warfare: a historical perspective
  • SI Trevisatano, ‘Hittite plaque’ an epidemic of tularemia and the first record of biological warfare Med Hypotheses, 69 (2007)
  • MD GrmekLesruses de guerre dans l'Antiquité Rev Etud Grec, 92 (1979)
  • OC EnehBiological weapons—agents for life and environmental destruction Res J Environ Toxicol, 6 (2012)

Find similar articles at:

www.criminologysolutions.com

Saturday, May 9, 2020

YOUNG BLOOD: Youth's Vulnerability on Terrorist Exploitation


By: Vince Christian T. Tapia | LEAPS Academy Philippines
PG Diploma in Terrorism Studies

Introduction

Dr. Jose P. Rizal quoted “Ang Kabataan ang Pag-asa ng Bayan/ The youth is the hope of the motherland”, sounds cliché, but it is the truth. The youth is the backbone of the nation, playing an important role in the development of society. They are adaptable and information-hungry, considering all kinds of opinion decluttering the landscape of question to find value. Adolescents are intrinsically rebellious, and self-centered; in which terrorist group may utilize to commit and achieve their goal. As Henley stated, “conflict is planting the seeds of future hate in the next generation…If we don’t do something about the way these kids are being raised, we might be dealing with them as adults on the battlefield.”.

The youth is a vital source for most terrorist groups, as they are easily deceived to commit conflicts. Reports show that most terrorist groups have vast number of youth membership. This is because the youths are better at evading security, which serves as a tactical advantage. In armed conflict, there are young, but evidently able-bodied fighters. They effectively fight guns with guns to prove their prowess, point to the group and the society.

Philippine authorities have launched a campaign of “Hands off our Children” in September of 2019. It seeks to help families look for their teenage loved ones who have been recruited by left-leaning youth groups. The youth members showed rebellious action against their parents and they condition the parent’s minds to simply accept the fact that their kids are already rebellious. According to Social Psychology of Cults, some groups indoctrinates the “blind” youth members, exploited by their leaders to perceive and execute their grievances towards the enemies of their group. Members are bound to preserve the organization by all means, a sign which they call a misguided altruism.

Based on reports, the exploitation of youth by armed groups remains extensive in countries affected by violent extremism, even though it is a war crime for any armed group to recruit or use children under the age of 15. Global efforts are exerted to save the youth from terrorist exploitation knowing the youth’s vulnerability. The Philippine counter-extremism worked with religious leaders to mainstream their teachings and help deradicalize youth who are ripe targets for recruitment.

Addressing Youth Vulnerability to Terrorist Recruitment

By way of scrutiny of reports, daily news, and situational awareness analysis, the vulnerability factors associated with youth fighter recruitment are presented as follows:

Geographic Proximity to Conflict - Proximity to violent extremist groups is a significant risk factor for both forced and voluntary recruitment into terrorist groups. The Communist oriented New People’s Army (NPA) insurgent groups from 1960s recruited youth nationwide to join the Communist Party of the Philippines-New People’s Army (CPP-NPA). They are inherently voluntary for indoctrinating student activist who uses idealism and dynamism to encourage armed rebellion against the State. They are also forced youth member who fights for the promised wages and support for their family; they are typically from the 1930s owner-tenant-poverty condition leading to agrarian revolution of overthrowing the Philippine government. These are common motivators that drive youth involvement in political violence generally.

These dynamics indicate the central importance of physically securing civilian populations as a way of disrupting terrorist recruitment. This is especially true of soft targets such as residential schools.

Social or Political Marginalization – Individuals’ feelings of exclusion from their community or society (whether real or perceived) play a role in terrorist recruitment. A research project called the Youth Survey in Violent Extremism in Mindanao concluded that there is a consistent strength of violence for Islam’s belief of being under attack. It showed significant results of them not giving trust in Government due aspects of government neglecting them, historical marginalization of Moro and Christians, and feeling that one’s community is threatened of Globalization. Terrorist groups have positioned themselves as an alternative community that promises young people a voice, a sense of belonging, and opportunity to participate in something greater than themselves.

It is deemed so important to understand the local social, cultural, and political context drivers of extremism on target population in resolving disputes. International and Local organizations, including the World Bank and the United Nations, emphasize integrating young people into decision-making processes as a way to counter this sense of disaffection.  

Permissive Family and Social Networks – Selective recruitment often occurs through family networks, peers, or social institutions (including educational institutions). Weak family structures can make young people more vulnerable to terrorist recruitment. During the 2017 ISIS inspired siege in the Southern Philippines, some youth in Mindanao engages in ruthless battles with the armed forces. There are evidences that family and social networks played a larger role in guiding radicalization and membership in armed groups than any specific grievances or social and economic factors did - connecting with a family who are socially and politically marginalized community, having their predecessor to commit violent extremism.

Surprisingly, family as well serve as the important source of resiliency against violent extremism. Risk assessments made by USAID on violent extremism highlighted the central role that families play in young people’s lives and indicated the need for incorporating families into terrorism prevention efforts. It suggests that family ties, and women’s roles in families, create psychological barriers for husbands, sons, or other male relatives to join violent extremist groups. Others have asserted that women may serve as motivators for male family members to join. Thus, understanding the role of gender at the local level is fundamental.

Vulnerability to Propaganda – Youth are often seen as especially vulnerable to terrorist propaganda. People’s political beliefs and values are shaped in part by events and issues of their time. Evidence collected from people who experience depression from previous war are politically motivated to commit violent extremism. The Cohort Model from the Vietnam war shares that young adults who grew profoundly during this event showed the impact on their identity development.

In the Philippines, fragments of 1970’s NPA archive, showed signs of urban resistance found after a year of martial law declaration, appearing as well beginning in the church, the schools, and spreading quickly to industrial factories. Jose Ma. Sison took charge in building the urban underground networks and the first units of the New People’s Army (NPA), the CPP’s armed guerrilla force. He recalls that as a result of the student protests of the 1970-72 period, “a proliferation of mass organizations…yielded a large number of militant mass activists and party cadres who volunteered to join the party and the NPA in the countryside”. NPA’s ideology still prospers up to this time despite counter measure efforts by the government.

The UN has now put efforts to mitigate the impact of terrorist propaganda are often focused on media. But it is important to remember that educational institutions may facilitate radicalization. Introducing critical thinking and media literacy skills into school curricula is seen as an important way to reduce the vulnerability of youth to propaganda. Youth resilience to radicalization includes programs that amplify leaders’ voices and foster coordination between educators and religious leaders. Efforts to teach the youth why violent extremism is wrong are seen as one of the most effective measures to prevent terrorism.

***

Suggested Readings:


Find related articles at:

Tuesday, May 5, 2020

PANDEMIC TERRORISM (3rd Series)


A Toss Coin COVID-19 Aftermath

By: Emerjhon D. Hernandez | LEAPS Academy Philippines
PG Diploma in Terrorism Studies
May 2020 Edition

The focal point on the different positions of the COVID-19 pandemic has narrowed the globe. The international community seems to be compressed having an eye on the ball on the wide-spreading disease producing a speedy and continuous increase of mortality. While the center point is the response in overcoming the crisis, efforts from several States have also been established to determine the root cause of the disease. Questions have been arising if the coronavirus was naturally acquired or laboratory driven. Others wanted to explore the possibility of intent to develop and spread the virus for depopulation. Some are eyeing on it as well-planned strategy of a certain State to destroy economies of others in achieving hegemony. Some are also inclined considering it as a terroristic course of action.

Studying where the virus came from or why it exists now has a great significance. But the present response is much more important not only in handling the pandemic but also in addressing its surrounding effects in order to avoid future occurrences of other crises brought by it, particularly terroristic events.

Issues on the Origin of Coronavirus

Scrutinizing the origin of COVID-19, many studies came up with only two contradicting results. One has closed that the coronavirus disease is a product of natural evolution as held by its likelihood and connection with the first known severe illness caused by a coronavirus that emerged with the 2003 Severe Acute Respiratory Syndrome (SARS) epidemic in China and the second outbreak that started out in 2012 in Saudi Arabia with the Middle East Respiratory Syndrome (MERS). But theories also existed proposing that the virus was a laboratory driven and engineered. This is much more becoming an interest of research since China, the origin country of the virus, reported to have shown dishonesty in providing the figures of infected individuals in their territory and hampered the circulation of some reports that might have been necessary for World Health Organization’s global response.

On discussing rumors to depopulate and to destroy economies, speculations have also passed on around the world that the virus was applied as a biological weapon. One position of the story insisted that this was broached by the US to depopulate China while the other side hypothesized that it was China’s action to put down the economic systems of the states in the Western world, particularly that of the US. Both issues have no evidence to date to believe in.

While no research has thus far been generally admitted, the factor that the virus was a weapon of mass destruction used by terrorist groups has seemed to be not involved into account. But, terrorism should not be put aside in the present state of affairs. Experts from the International Centre for Political Violence and Terrorism Research (ICPVTR), a think tank within the S. Rajaratnam School of International Studies (RSIS) in Singapore, reported that terrorists have exploited the coronavirus pandemic to spread their ideology.

Despite the pandemic, terrorists are trying to take use the ensuing chaos to their welfare. In fact, with so many people home and on the internet all day, jihadist groups see this as a chance for recruitment. It might potentially increase the chances of radicalization as more people pass time on social media at home looking for answers amid uncertainties, exposing themselves to terrorist propaganda. If this could bring success to the extremist, then terrorism, not the present pandemic might wreak havoc around the world.

COVID-19 and Terrorism

Terrorism factors are at crucial to be considered today. With governments, military and intelligence agencies allocating massive amounts of resources to the defeat of coronavirus, there is some concern that they could drop the ball regarding terrorist threats. The effect of COVID -19 is like a wound in which the external damaged part is the only visible. Government forces across the globe should provide effort to address the other side effects of this crisis. If it happens to be hoax, that the virus was used as a bioweapon, then terrorist groups to advantage of the situation to produce their greatest weapon in the future.

There are some reports announcing that ISIS has called for more attacks in the West during the pandemic, telling followers this is a good chance to “regroup and plan new operations”. While confronting the pandemic, the US State Department explained that the state is considering steps to defend against the risk posed by ISIS, Al-Qaeda, and other terrorist groups. Despite encouraging allies to overwhelm terrorism and having cooperation to the greatest extent possible in the current environment, it remains inevitable to have difficulties in operating in the prevailing conditions. Though terrorists are too susceptible to contagious disease, they are considering that efforts against them would give way as governments might not desire to deploy troops into faraway lands affected by the virus.

Considering suicide bombing as one of the tactics employed by the terrorist groups to produce terror, COVID-19 pandemic could also be employed as a tool by them. Stories are already spreading that some infected individuals are deliberately coughing on some others to further propagate the disease. In the United States, coughing attacks may be prosecuted as an act of terrorism. Two people in the US have been charged with terrorism offenses after claiming they were intentionally trying to spread COVID-19. In the United Kingdom, a man was recently jailed for coughing on police, stating that he hoped to infect them with the virus so that they would pass it on to their children.

Two Pronged Principles

Mix and Match – Aside from health concerns in the present global situation, security forces from different States around the world must lend the same amount of their attention to other aspects of security, particularly to the threats of violent extremism. Prioritizing one aspect over the others will pave the way for more vulnerabilities since bad elements could use such “others” as chances to strike. It is known to us that in terrorism, taking advantage of the opportunities is the name of the game. During this this time of pandemic, collecting and mixing different information on aspects of security provides us to discover possible match for what could be done today and tomorrow by terrorist groups.

Mold and Bold – Despite the stress of the pandemic that stretches the global community to an extreme damaging degree, nations must display an indestructible image to the terrorist groups. If the latter perceives counter-terrorism units as more molded by the difficulties and bolder than before, it would bring a reduction of confidence and desire for them to perpetrate terroristic moves. This would be true if resilient and progressive efforts in combating terrorism are widely presented. Continuous international and domestic conventions, training, and seminars coupled with quick response in arresting and prosecuting violators of anti-terror laws of different countries, are some of the major contributing factors. In other words, if the global community is much more responsive to the threats of terrorism while enduring a battle for another crisis, prevention would still prevail.

It is imperative to anticipate future occurrences of different nature and embrace security. When the world puts smaller and limited attention on the pandemic, the riskier it becomes, the greater the exposure to terrorism. Assuming that the pandemic ends soon, another will likely to happen. When security forces are be less prepared, a greater danger awaits, especially when terror groups are involved.

The aftermath might be something like a toss coin. Flipping the coin would be a representation of uncertain future preparedness due to disregarding and mishandling of terrorism threats in times of the pandemic. If the coin lands with heads, counter-terrorism might still be effective. If it lands with tails, terrorism might be more than the world’s effort against them.

*****

Recommended Readings: