UN Calls On Social Media to Act Against ‘Misuse’ by Extremists

Albarnawi-boko-twitter-619x357.png

Boko Haram Twitter Account 

A UN panel that advises the Security Council has called for Internet and social media companies to respond to the exploitation of their services by al-Qaida and other extremist groups who use the web to recruit fighters and spout “increasingly horrific propaganda”.

The panel recommended in a report that these companies brief the Security Council Committee monitoring sanctions against al-Qaida, its affiliates and the Islamic State group on measures they are taking to prevent such misuse.
“A worrisome trend over the past year has been the growth of high-definition digital terror: the use of propaganda, primarily by [Islamic State] and its sympathisers, to spread fear and promote their distorted ideology,” the panel of experts monitoring sanctions against extremist groups and individuals said in its report to the Security Council.

It said the scale of digital activity linked to Isis, and to a lesser extent some al-Qaida affiliates, had strategic implications for how the threat from extremists would evolve in the coming years among the “diverse, dispersed … diaspora of foreign terrorist fighters”.

In recommending that Internet and social media companies brief the sanctions committee, the panel said: “The scale of the digital threat linked to radicalisation, together with the need for concerted action on countering violent extremism, calls for further action by the security council”.

The Internet’s impact on extremist groups is one facet highlighted in the report, which covers the global threats posed by al-Qaida, its affiliates and Isis. Their actions have had an “enormous” human cost in recent months, it says, with major bombings, assassinations and exploitation of several million people in not only Iraq and Syria but also Afghanistan, Libya, Nigeria, Somalia and Yemen.

The panel said al-Qaida remained overshadowed by the attention paid to its splinter, the Islamic State group, which controls large swaths of Syria and Iraq. The grip of al-Qaida leader Ayman al-Zawahiri on affiliates appeared to be weakening, it said, and al-Qaida’s financial position remained precarious compared with that of Islamic State, which “can claim to have achieved what al-Qaida never did: the building of a territorial entity through terrorist violence”.

But al-Qaida and its affiliates still posed a serious threat in many parts of the world, the panel said, becoming more visible and active in Afghanistan over the past six months, while associated groups had grown in number in south and central Asia, and al-Shabaab, its affiliate in Somalia, remaining a major security threat in the Horn of Africa.

Southern Libya remained “a safe haven” for extremists planning attacks in the Maghreb and Sahel regions, and the experts said they have been told of anti-aircraft guns and portable air defence systems in the hands of extremist groups.
Boko Haram had expanded deadly incursions into Cameroon, Chad and Niger but the panel said its ability to maintain long-term control over 20,000 square kilometers of north-eastern Nigeria “will require heavier weaponry, access to natural resources and some ability to sustain a local population”.

It said the Indonesia-based extremist network Jemaah Islamiyah appeared to be reviving and was recruiting professionals including engineers and information specialists, which could pose “a significant long-term threat” to South East Asia.
Guardian: http://bit.ly/1LZfLMz

 

 

« AT&T helped NSA Spy on Domestic Citizens
Social Media and the 'Information War’- Russia is Winning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

SentryBay

SentryBay

SentryBay is a real-time data security company developing technology for PC, mobile, the cloud and IoT.

Matta

Matta

Matta is a cyber security consulting company providing information security services and solutions including vulnerability assessments, penetration testing and emergency response.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Combined Selection Group (CSG)

Combined Selection Group (CSG)

CSG are Global Talent Experts, we operate across 7 specialist sectors, including Information Technology and Cybersecurity, and take a pro-active approach to executive search and headhunting.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

Valid Network

Valid Network

Valid Network DSP is blending traditional cyber security methodologies with blockchain transactions to achieve trust, internal and federated between organizations and stake holders.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

Calamu

Calamu

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.