Are Terrorists Winning The Digital Arms Race?

Terrorist groups are embracing a huge number of digital tools to recruit members and plan attacks, putting them a step ahead of governments trying to combat them, a group of counterterrorism experts said.

Twitter removed about 250,000 accounts connected with ISIS in one year, but the terrorist group uses 90 other social media platforms, Rob Wainwright, the director of Europol, said recently.

Terrorist groups have begun to live-stream their attacks, and they are using the Internet to launch "innovative crowdfunding" campaigns, he said at the World Economic Forum in Switzerland.

"The technology is advanced," Wainwright added. "They know what to do, and they know how to use it."

It's imperative that countries start working more closely together to combat terrorism and to develop an online counter-narrative that dissuades potential members from joining groups like ISIS, said members of a panel on terrorism in the digital age.

Governments need to trust each other more and be willing to share their terrorism intelligence, said Prince Turki bin Faisal Al Saud, former director of national intelligence in Saudi Arabia. Terrorism is "a cancer," he said. "The terrorist cell uses these online methods to metastasize."

Raheel Sharif, former chief of staff for the Pakistani army, called for a combination of tough penalties for violent terrorists and de-radicalisation education efforts for others. Pakistan, in recent years, has cut the number of terrorist attacks in the country dramatically, he said.

But Prince Turki emphasized the need for a stronger counter-narrative, on the internet and in schools, churches, and mosques. Tough penalties for terrorists need to avoid collateral damage to innocent people, he said. Counterterrorism efforts cannot "eliminate the terrorist and create 10 others," said Prince Turki, now chairman of the King Faisal Center for Research and Islamic Studies.

Some panelists suggested that a culture of free speech online complicates efforts to fight terrorism. The international community needs to find a balance between freedom of expression and safety, said Yemi Osinbajo, vice president of Nigeria.

"Each person has a ... digital device, and it has tremendous power," he said. "They don't even require any formal agreements. [Anyone] can reach millions of people."

Europol's Wainwright also seemed to suggest some limits on free speech. "We want to enjoy, we want to protect the freedom of the internet, but not to such an extent that there are absolutely no rules of governance," he said.

Panelists disagreed about the effectiveness of current online efforts to craft a counterterrorism message. Efforts in the US and elsewhere to counter online terrorism campaigns have been "singularly unsuccessful," said Louise Richardson, vice chancellor at the University of Oxford.

But Wainwright disagreed, saying some efforts appear to have reduced the number of Europeans and US residents joining ISIS. But more efforts are needed to counter the "fake news" terrorist groups are putting out about themselves, he added.

Computerworld:         Facebook, Twitter and Google Are A 'recruiting platform for terrorism'':

 Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night:

 

« GoggleBox: Moderate Screen Use 'Boosts Teen Wellbeing'
Female Role Models & The Early Days Of Computing »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

GovCERT.HK

GovCERT.HK

GovCERT.HK is the Government Computer Emergency Response Team for Hong Kong.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

Iceberg

Iceberg

Since 2016, Iceberg has redefined how businesses approach hiring in the Cybersecurity and eDiscovery space.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Envelop Risk

Envelop Risk

Envelop Risk is a global specialty cyber insurance firm, combining decades of insurance industry expertise with sophisticated cyber and artificial intelligence-based analytics.

Blackpoint Cyber

Blackpoint Cyber

Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

SecureLayer7

SecureLayer7

SecureLayer7 is an international provider of integrated business information security solutions with an innovative approach to IT security.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

MiC Talent Solutions

MiC Talent Solutions

MiC Talent Solutions provides recruiting, direct hire, augmented staff, and professional service contracting solutions for organizations searching for minority cybersecurity talent.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

Bytium

Bytium

Bytium provides top-tier IT services and solutions designed to empower everyone, from individuals to global corporations. Specializing in cybersecurity and proactive IT management.

Parried

Parried

Parried is a leading Managed IT Services and Cybersecurity provider, known for blending deep technical knowledge with business strategy.