Travel Intelligence: Enhancing Counterterrorism and National Security
DOI:
https://doi.org/10.53477/2284-9378-24-05Keywords:
Travel Intelligence, TRAVINT, Counterterrorism, National Security, Hezbollah, Hamas.Abstract
In the contemporary landscape of global security challenges, addressing the intricate dynamics of Counterterrorism and National Security is paramount. This paper emphasizes the pivotal role of Travel Intelligence (TRAVINT) in enhancing Counterterrorism (CT) strategy and improving security measures.
Eventually, through a comparative analysis between theoretical frameworks and practical applications, supplemented by case studies of Hezbollah and Hamas, the study examines the significance of TRAVINT, in proactively identifying and preventing potential Terrorism and National Security.
References
Alsoos, I. 2021. “From jihad to resistance: The evolution of Hamas’s discourse in the framework of Mobilization”. Middle Eastern Studies, 57(5): 833–856. https://doi.org/10.1080/00263206.2021.1897006.
Avon, D., Khatchadourian, A.T. and Todd, J. M. 2012. Hezbollah: A history of the “party of god”, Cambridge, MA: Harvard University Press.
Barnea, A. 2019. “Big Data and counterintelligence in western countries”. International Journal of Intelligence and Counterintelligence, 32(3): 433–447. https://doi:10.1080/08850607.2019.1605804.
Berger, J.M. and Morgan J. 2015. “The ISIS Twitter Census”, The Brookings Project on U.S. Relations with the Islamic World, no.20.
Berti, B. 2015. “Non-state actors as providers of governance: The Hamas government in Gaza between effective sovereignty, centralized authority, and resistance”. The Middle East Journal, 69(1): 9–31. https://doi.org/10.3751/69.1.11.
De Hert, P. and Papakonstantinou, V. 2010. “The EU PNR framework decision proposal: Towards completion of the PNR processing scene in Europe”, Computer Law &; Security Review, 26(4): 368–376. https://doi:10.1016/j.clsr.2010.05.008.
Didier, Bigo. 2006. “Security, Exception, Ban and Surveillance.” King’s College London - War Studies.
Dionigi, F. 2015. Hezbollah, Islamist Politics, and International Society. Palgrave Macmillan.
Dunning, T. 2015. “Islam and resistance: Hamas, ideology and Islamic values in Palestine”. Critical Studies on Terrorism, 8(2): 284–305. https://doi.org/10.1080/17539153.2015.1042304.
European Commission. 2023. Passenger name record (PNR). https://home-affairs.ec.europa.eu/policies/law-enforcement-cooperation/passenger-data_en.
European Parliament. 2016. Regulation establishing a European Travel Information and Authorisation System (ETIAS) and amending Regulations (EU) No 515/2014, (EU) 2016/399, (EU) 2016/794 and (EU) 2016/1624.
Flamer, N. 2022. “Hezbollah and Hamas’s main platforms for recruiting and handling of human sources after 2006”. Middle Eastern Studies, 59(5): 842–854. https://doi.org/10.1080/00263206.2022.2126835.
Frizberg, D. 2023. Advance passenger information (API): Revising the rules, European Parliament.
https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2023)747429.
Frontex. 2012a. Common Integrated Risk Analysis Model a comprehensive update. Warsaw.
__. 2012b. Guidelines for risk analysis units: Structure and tools for the application of CIRAM version 2.0. Warsaw.
__. 2013. Border Control in the Information Age. https://frontex.europa.eu/media-centre/news/focus/border-control-in-the-information-age-udh57L.
__. 2020. Future Group on Travel Intelligence and Border Management. https://www.europol.europa.eu/publications-events/publications/future-group-travel-intelligence-and-border-management#downloads.
Glouftsios, G. and Leese, M. 2022. “Epistemic fusion: Passenger information units and the making of international security”, Review of International Studies, 49(1): 125–142. https://doi:10.1017/s0260210522000365.
Haddad, S. 2005. “A survey of Lebanese Shi’i attitudes towards Hezbollah,” Small Wars & Insurgencies, 16(3): 317–333. https://doi:10.1080/09592310500221286.
Hamm, M. and Spaaij, R. 2017. “Introduction: The age of Lone Wolf terrorism”, The Age of Lone Wolf Terrorism. https://doi:10.7312/hamm18174-002.
Kızılkaya, Z. 2019. “Morality of Hezbollah’s conflicts with Israel,” Critical Studies on Terrorism, 12(3). https://doi:10.1080/17539153.2019.1573037.
Koss, M. 2018. “The Lebanese Hezbollah,” Resistance, Power, and Conceptions of Political Order in Islamist Organizations. https://doi:10.4324/9781315104867-3.
Levitt, M. 2015. Hezbollah the global footprint of Lebanon’s party of god, Washington: Georgetown University Press.
Liu, X., Portney, K. E., Mumpower, J. L. and Vedlitz, A. 2018. “Terrorism risk assessment, recollection bias, and public support for counterterrorism policy and spending”. Risk Analysis, 39(3): 553–570. https://doi.org/10.1111/risa.13203.
Namazov, R. 2022. Application of Advance Passenger Information (API) and Passenger Name Record (PNR) security systems by using travel information. State Customs Committee of Azerbaijan and Kanazawa University of Japan. https://www.border-security-report.com/wp-content/uploads/2022/07/API-PNR-Namazov-research.pdf.
National Counterterrorism Center. 2013. Watch listing Guidance. https://www.eff.org/files/2014/07/24/2013-watchlist-guidance_1.pdf.
Oliveira Martins, B., Lidén, K. and Jumbert, M.G. 2022. ‘Border Security and the digitalisation of sovereignty: Insights from EU Borderwork’, European Security, 31(3): 475–494. https://doi.org/doi:10.1080/09662839.2022.2101884.
Pape, R. 2013. “The strategic logic of suicide terrorism”, Terrorism Studies, 282–310. https://doi:10.4324/9780203717622-29
Priestley, A. and Beauvais, M. 2022. “International experience and good practices in API/PNR, OSCE”. https://www.osce.org/project-coordinator-in-ukraine/510575.
Romanian Parliament. 2019. IPEX | the Platform for EU Interparliamentary Exchange. https://secure.ipex.eu/IPEXL-WEB/download/file/082dbcc568e94e7e0168eba5046a0223. https://ipexl.secure.europarl.europa.eu/IPEXL-WEB/
Rudner, M. 2014. “Intelligence-led air transport security: Pre-screening for watch-lists, no-fly lists to forestall terrorist threats”, International Journal of Intelligence and CounterIntelligence, 28(1): 38–63. doi:10.1080/08850607.2014.962352.
Sen, S. 2015. Bringing back the Palestinian state: Hamas between government and resistance. Middle East Critique, 24(2): 211–225. https://doi.org/10.1080/19436149.2015.1017969.
Shadid, M. K. 1988. “The Muslim Brotherhood movement in the West Bank and Gaza”. Third World Quarterly, 10(2): 658–682. https://doi.org/10.1080/01436598808420076.
Shepherd, A.J.K. 2022. “EU counterterrorism, collective securitization, and the internal-external security nexus”, Collective Securitization and Crisification of EU Policy Change, 117–133. https://doi.org/doi:10.4324/9781003291374-8.
Shulsky, A.N. and Schmitt, G.J. 2009. Silent warfare: Understanding the world of Intelligence. Washington: Potomac Books, Inc.
Silber, Mitchell, and Arvin Bhatt. 2007. Radicalization in the west: The homegrown threat.
New York, NY: NY Police Dept. U.S. Department of Homeland Security Privacy Office. 2015. A Report on the Use and
Transfer of Passenger Name Records between the European Union and the United States. U.S. Department of Homeland Security Privacy Office.
__. 2017. Privacy Impact Assessment Update for the Automated Targeting System DHS/CBP/PIA-006(e). U.S. Department of Homeland Security Privacy Office.
U.S. Government Publishing Office. 2011. Intelligence sharing and terrorist travel: How DHS addresses the mission of providing security, facilitating commerce, and protecting privacy for passengers engaged in International Travel. https://www.govinfo.gov/content/pkg/CHRG-112hhrg73736/html/CHRG-112hhrg73736.htm.
Uslu, N. and Karatas, I. 2020. Evaluating Hamas’ struggle in Palestine. Insight Turkey, 109–124. https://doi.org/10.25253/99.2020221.08.
Wagner, J. 2021. Border Management in transformation: Transnational threats and security policies of European states. Springer.
Downloads
Published
How to Cite
Issue
Section
License
The published articles are subject to copyright law. All rights are reserved to the “Carol I” National Defense University, regardless of whether all or part of the material are considered, especially the rights to translation, reprinting, re-use of illustrations, quotations, broadcasting through the media, reproduction on microfilms or any other way and storage in data banks. Any replicas without the associated fees are authorized provided the source is acknowledged.