Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
CSIS-12

CSIS-12

Ratings: (0)|Views: 12 |Likes:
Published by 404 System Error

More info:

Published by: 404 System Error on May 16, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/28/2013

pdf

text

original

 
SECRET
10/62
20100427
ThisdocumentisclassifiedSECRET·andisthepropertyoftheIntegratedThreatAssessmentCentre(ITAC).PreparedbyITAC,itisderivedfromvarioussourceswithinformationeffectiveasofthedateof'publlcatinn.Itisprovidedtoyouragency/departmentin
confideuce
andmay
befurtherdissem
in
ated
byyouragency/departmenttothosewithappropriatesecurityclearancesandappropriatesecuritysysfems
to
retaintheinformation.
It
mustnotbereclassifiedorreused,inanyway,inwholeorinpart,withouttheconsentoftheoriginator.
Any
feedbackshouldbedirectedviaemail
to
CSIS·ITACContact:ITAC
throughThreat
ManagementCentreat
Le
presentdocumentestcoteSECREl"·nest
la
proprieteduCentreintt\gred'evaltlationdesmenaces(ClEM)
et
aeteprepareparlui.
11
provientde
dfverses
SOLI
fees
et
tiontientdesinformations
valables
a
ladatedepublication.
n
estfourui
il
votreorganlsmeournlnlstere
a
tHre:
confldentlel
et
peutetre\irnOluniq'.16pittvotreorganismeoumlnisterenuxpersonnesquiontlescotesdesecuritenecessairesetles
systMleli
de!lectirite':!Iipropries~b\1r
col\servef
l'information.
n
nedoitetrenireclassifieIiireutilise,de
quelquernanlere
que
ce
soil,
en
tout011
enj1artie,
salis
le
consentemenrdeI'expeditelir,
'I'outcommentairedolt
are
envoye
parcourriel
Ii
CSIS.ITAC'Polt'rcommi.m\qtieravecle
C}fEM,
veulllezpasserpar
Ie
Centredegestinndes
menacesaa
2010G8/G20
SUMMITS
tHREAT
OVERVIEW27APRIL2010
InformationinThisUpdate
isCurrent
to2010042008hOOEDT
cont'd...
KEYPOINTS
Avariety
(jf
demonstrationsareexpectedtotakeplaceduringtheSummits,primarily
in
Torontobut
possibly
elsewhere.
1
 
ITAC/CIEM
10/62
SECRET
INTRODUCTION1.Thisyear's08Summitwillbeheld
in
Huntsville.Ontario.onJune25and26,2010,andwillsegueintothe
020
SummitinTorontoon
rune
26arid
27,2010.
ThisisthefirstinaseriesofreportsbeingissuedbyITACtoalertrecipientstonew'orre-assessedthreatstotheSummits,
2.
Monitoringanddeterminationoftheoverallthreatlevelforthe
08/G20
SU1111nltsare
theresponsibility
of
the
RCMP
NationalSecurityThreatAssessmentSection(NSTAS);RECAPITULATINGADECADEOFSUMMITPROTESTS4.Overthepastdecade,issue-basedextremistshaveemployedblackbloctactics,includingengaginginviolentanddestructivebehaviour,whileprotestingatinternationalforasuchas
2
 
IlAC/CIEM
10/62
SECRET,
G8/G20
Summits.AlthoughtheworstofthesehavemostrecentlyoccurredinEurope,Canadahasnotbeenimmune.5.Summitoppositiontendstoconsistofaneclecticblendofanarchistsandpoliticalandsocialactivists,primarilyfromtheleft-wingideologicalspectrum.Theircausesarevaried
and
occasionallydivergentbutthereisageneralrecognitionthatthey
ban
haveagreaterimpactbyactinginconcertatsucheventswhilerespectinga"diversityoftactics",Cooperationamongdisparategroupsisgenerallyaccomplishedinanon-hierarchical,decentralizedfashion.Itisusuallyfacilitatedbyacoordinatingentity(orentities)usingtheInternetandinformationalsessionstocommunicate,spreadawareness,mobilizeandorganize.Theirmostprevalentmodeofexpressionremainsdemonstrations,civildisobedience,anddirectactionwhichmayinclude'varyingdegreesofviolence.includingvandalism,riotingandstreetfighting,demonstratingwithoutapermit,resisting
arresterecting
barricadesandattackingpolice.6.Muchoftheviolencethat-occurscanltsuallybeattributedtoaproportionallysmallcadreofextremists,typicallyafew
hundred
orless,operatingasaffinitygroups.Groupsorindividualscancoalesceintowhatiscommonlyreferredtoas
::t
blaekbloc,spontaneouslyandwithoutwarning,orinanorchestratedmanner.TheconceptoftheblackblocwasestablishedinEuropeinthe1980s.Thenamecamefrom
thedemonstrators
wearingsimilarblackordarkclothesandconcealingtheirfeatureswhichhelpedthemavoidbeingindividuallyidentified.7.BlackbloctacticsgainedparticularnotorietyinNorthAmericain1999,whenprotestsagainstthemeetingoftheWorldTradeOrganization(WTO)inSeattleturnedviolent.The"BattleofSeattle"wasmarkedbyfivedaysofrioting,withoutletsofmultinationalcorporationsbeingdamagedintargetedattacks.Costsrelated
to
vandalism,lostbusiness,andpolicingduringtheriotswereestimatedatalmostUS$30millionatthetime,andsetthetoneforsecurityrequiredat
subsequent
internationalevents.8.The
Summit
of
the
AmericasinQuebecCityinApril2001attractedwhatwasoneofthelargest
anti-globalization
demonstrationstotakeplacetothatpoint.Duringamajormarchonthefirst
dayof'thesummit,
someprotesterssplitfromthemaingrouptotargetasectionofthesecuritybarriererected
around
the
siteof
theconference.Theysucceededinbringingdownaportionoftheconcrete
and.
chain-linkfenoeandclashedwithpolicewhomovedintosealthebreach.Thissparkedaseriesofconfrontationsleadingintothefollowingdayinwhichextremistsusedteargas,Molotovcocktails,bricks,clubsandbottlesagainstthepolice.Businesseswerealsovandalized.andbonfiressetinthestreets.Damagewasestimatedtohavebeenupto
$100,000,
butmoresignificantly,46policeofficersand.57demonstratorswerereportedinjured,and486peoplewerearrested.The
Summit's
openingdayceremonieswerealsodelayedbyanhourbecauseoftheviolence.
3

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->