Are Terrorists Winning The Digital Arms Race?

Terrorist groups are embracing a huge number of digital tools to recruit members and plan attacks, putting them a step ahead of governments trying to combat them, a group of counterterrorism experts said.

Twitter removed about 250,000 accounts connected with ISIS in one year, but the terrorist group uses 90 other social media platforms, Rob Wainwright, the director of Europol, said recently.

Terrorist groups have begun to live-stream their attacks, and they are using the Internet to launch "innovative crowdfunding" campaigns, he said at the World Economic Forum in Switzerland.

"The technology is advanced," Wainwright added. "They know what to do, and they know how to use it."

It's imperative that countries start working more closely together to combat terrorism and to develop an online counter-narrative that dissuades potential members from joining groups like ISIS, said members of a panel on terrorism in the digital age.

Governments need to trust each other more and be willing to share their terrorism intelligence, said Prince Turki bin Faisal Al Saud, former director of national intelligence in Saudi Arabia. Terrorism is "a cancer," he said. "The terrorist cell uses these online methods to metastasize."

Raheel Sharif, former chief of staff for the Pakistani army, called for a combination of tough penalties for violent terrorists and de-radicalisation education efforts for others. Pakistan, in recent years, has cut the number of terrorist attacks in the country dramatically, he said.

But Prince Turki emphasized the need for a stronger counter-narrative, on the internet and in schools, churches, and mosques. Tough penalties for terrorists need to avoid collateral damage to innocent people, he said. Counterterrorism efforts cannot "eliminate the terrorist and create 10 others," said Prince Turki, now chairman of the King Faisal Center for Research and Islamic Studies.

Some panelists suggested that a culture of free speech online complicates efforts to fight terrorism. The international community needs to find a balance between freedom of expression and safety, said Yemi Osinbajo, vice president of Nigeria.

"Each person has a ... digital device, and it has tremendous power," he said. "They don't even require any formal agreements. [Anyone] can reach millions of people."

Europol's Wainwright also seemed to suggest some limits on free speech. "We want to enjoy, we want to protect the freedom of the internet, but not to such an extent that there are absolutely no rules of governance," he said.

Panelists disagreed about the effectiveness of current online efforts to craft a counterterrorism message. Efforts in the US and elsewhere to counter online terrorism campaigns have been "singularly unsuccessful," said Louise Richardson, vice chancellor at the University of Oxford.

But Wainwright disagreed, saying some efforts appear to have reduced the number of Europeans and US residents joining ISIS. But more efforts are needed to counter the "fake news" terrorist groups are putting out about themselves, he added.

Computerworld:         Facebook, Twitter and Google Are A 'recruiting platform for terrorism'':

 Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night:

 

« GoggleBox: Moderate Screen Use 'Boosts Teen Wellbeing'
Female Role Models & The Early Days Of Computing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

Interpol

Interpol

Interpol is the world’s largest international police organization. It is committed to the global fight against cybercrime, as well as tackling cyber-enabled crimes.

Cyber Security Centre - University of Hertfordshire

Cyber Security Centre - University of Hertfordshire

The Cyber Security Centre provides training, teaching and research in the fast paced topics of cyber security and digital forensics.

ForgeRock

ForgeRock

ForgeRock, the leader in digital identity, delivers comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Information Network Security Agency (INSA)

Information Network Security Agency (INSA)

INSA's vision is to realize a globally competent National Cyber capability which plays a key role in protecting the national interests of Ethiopia.

LSEC

LSEC

LSEC is a not for profit organization that has the objective to promote Information Security and the expertise in BeNeLux and Europe.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

Kasada

Kasada

Kasada provides bot detection and mitigation for enterprise web applications. Stop the bots before they reach your site and web applications.

Technology Innovation & Startup Centre (TISC)

Technology Innovation & Startup Centre (TISC)

TISC is a startup incubator at the Indian Institute of Technology Jodhpur (IITJ) and we back deep-tech startups.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Utimaco

Utimaco

UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions.

CYMAR

CYMAR

CYMAR The “CYBER” Smart Solution to offer sustainability and bring resilience to Global SMART Terminals and protect the supply chain of the World’s economy.

Moonsense

Moonsense

Moonsense is on a mission to level the playing field in the fight against online fraud.