EU Cyber Police Take on Islamic State Propaganda

920x920.jpg

EUROPOL Chief Rob Wainwright says Europol to battle Islamic State social media propaganda

European police agency Europol has recently said it was launching a continent-wide cybercrime unit to combat social media accounts promoting jihadist propaganda, particularly those of the Islamic State (IS) group.

The unit, set to start operating from Europol's Hague-based headquarters next month, will comb tens of thousands of social media accounts connected with IS and report them to the companies behind the websites, Europol chief Rob Wainwright said.

The team "will focus on publicly-available material and combine what we see on social media with more traditional intelligence sources," said Wainwright.
Initially consisting of some 15 to 20 members, the cyber squad will focus on key figures the ones that put out thousands of tweets and run accounts used to lure would-be jihadists to Iraq and Syria, as well as to recruit jihadists' brides.

A recent US study identified at least 46,000 Twitter accounts linked to supporters of the IS group, three-quarters of them tweeting in Arabic. Since the IS group called on Muslims to come to the caliphate it declared a year ago, foreign fighter numbers have jumped, with the United Nations reporting a 71 percent spike in the nine months to April.

The International Centre for the Study of Radicalization in London said the number of foreigners fighting in Syria and Iraq topped 20,000 by January 2015, with nearly a fifth of them from Western Europe.
"The IS is the most well connected terrorist organisation that we've seen online," Wainwright pointed out.
"They are manipulating the Internet and social media, which has become a cornerstone in the lives of many young people," he said.

Europol will draw on a decade of experience in monitoring extremist websites and well as "deep knowledge of extremist content and good linguistic capabilities including our knowledge of Arabic," to combat the problem.
Wainwright said once an extremist account had been detected, the companies would be informed and it would be taken down in "a matter of a few hours."

Security Week: http://http://bit.ly/1IuvVvu

 

« RBS Under Pressure over New IT Failure
What We Call Security Isn’t Secure! »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Lima Networks

Lima Networks

LIMA design and deliver IT Infrastructure solutions and services including managed Security Monitoring services.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Kirkland & Ellis

Kirkland & Ellis

Kirkland & Ellis LLP is an international law firm with offices in the USA, Europe and Asia. Practice areas include Data Security & Privacy.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Cybersecurity Association of Maryland (CAMI)

Cybersecurity Association of Maryland (CAMI)

CAMI’s mission is to create a global cybersecurity marketplace in Maryland and generate thousands of high-pay jobs through the cybersecurity industry.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

bluedog Security Monitoring

bluedog Security Monitoring

Sentinel from bluedog provides powerful and affordable internal network monitoring.

ePLDT

ePLDT

ePLDT delivers best-in-class digital business solutions that include Cloud, Cyber Security, purpose-built Data Center facilities and Managed IT Services.

Secure-CAV Consortium

Secure-CAV Consortium

Secure-CAV is a technology-led consortium funded by Innovate UK to drive the development of cybersecurity solutions for connected and autonomous vehicles.

IoTeX

IoTeX

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

WhiteJar

WhiteJar

WhiteJar offers an innovative approach to modern cybersecurity needs, empowering Ethical Hackers within its unique crowd platform.

BalkanID

BalkanID

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl.

Incognia

Incognia

Incognia have created a ubiquitous private identity based on location behavior, that enables a personalized frictionless experience with mobile apps and connected devices.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.