UN Secretary General Ban Ki-moon, left, with US president Barack Obama, speaks about ISIL. A new coalition led by Saudi Arabia has been announced to combat the group. (AP Photo/Kevin Hagen)
UN Secretary General Ban Ki-moon, left, with US president Barack Obama, speaks about ISIL. A new coalition led by Saudi Arabia has been announced to combat the group. (AP Photo/Kevin Hagen)

Complex threat requires alliance



In a rare appearance before assembled journalists for Saudi Arabia’s young defence minister, Prince Mohammed bin Salman made a surprise announcement. The kingdom, he said, would form a 34-state military coalition of Islamic countries to combat terrorism, headquartered in Riyadh.

ISIL, of course, would be top of the hit list. That is a welcome move. We have often argued that ISIL is a borderless enemy and must be fought Syria and Iraq. As the Saudi minister pointed out, it is primarily the Islamic world that has been damaged by the “disease” of extremism, even though allies in the West have also been attacked.

In the Middle East alone, four states are currently destabilised (Syria, Iraq, Yemen and Libya) and it is vital that those states are put back together. Defeating extremists in those countries is the first and most vital step – and it is not one that can be accomplished by one country alone.

ISIL has been cunning, exploiting divisions in the crowded and complex societies of Syria and Iraq. It has reasoned, not always incorrectly, that the competing ambitions of various Syrian fighter factions, Iraqi communities, as well as countries like Turkey, would enable it to carve out and defend an area.

That is to say nothing of the ideology, which has festered in the area ISIL controls, but has also been exported around the world. Few seem immune to it: Europeans and Arabs, Africans and Americans have all succumbed. That makes it even more essential that the alliance goes after this disease wherever it is found.

For now, the enemy is obvious, and members of the coalition can easily agree on their goals. Further down the line, the coalition will need a clearer definition of what terrorism means to them.

In his press conference, Prince Salman gave a long list of other places affected by terrorism: Sinai, Yemen, Libya, Mali, Nigeria, Pakistan and Afghanistan, suggesting that the coalition may set its sights on providing assistance and coordination, or even getting involved, in all those countries. That will require clear rules of engagement, to keep the coalition together.

The military alliance is a positive step and much needed – fighting extremism will be a long road and will require many partners.

Greatest of All Time
Starring: Vijay, Sneha, Prashanth, Prabhu Deva, Mohan
Director: Venkat Prabhu
Rating: 2/5
57%20Seconds
%3Cp%3E%3Cstrong%3EDirector%3A%3C%2Fstrong%3E%20Rusty%20Cundieff%0D%3Cbr%3E%3Cstrong%3EStars%3A%20%3C%2Fstrong%3EJosh%20Hutcherson%2C%20Morgan%20Freeman%2C%20Greg%20Germann%2C%20Lovie%20Simone%0D%3Cbr%3E%3Cstrong%3ERating%3A%20%3C%2Fstrong%3E2%2F5%0D%3Cbr%3E%0D%3Cbr%3E%3C%2Fp%3E%0A
Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

Our legal columnist

Name: Yousef Al Bahar

Advocate at Al Bahar & Associate Advocates and Legal Consultants, established in 1994

Marital status: Single

Education: Mr Al Bahar was born in 1979 and graduated in 2008 from the Judicial Institute. He took after his father, who was one of the first Emirati lawyers