Are Terrorists Winning The Digital Arms Race?

Terrorist groups are embracing a huge number of digital tools to recruit members and plan attacks, putting them a step ahead of governments trying to combat them, a group of counterterrorism experts said.

Twitter removed about 250,000 accounts connected with ISIS in one year, but the terrorist group uses 90 other social media platforms, Rob Wainwright, the director of Europol, said recently.

Terrorist groups have begun to live-stream their attacks, and they are using the Internet to launch "innovative crowdfunding" campaigns, he said at the World Economic Forum in Switzerland.

"The technology is advanced," Wainwright added. "They know what to do, and they know how to use it."

It's imperative that countries start working more closely together to combat terrorism and to develop an online counter-narrative that dissuades potential members from joining groups like ISIS, said members of a panel on terrorism in the digital age.

Governments need to trust each other more and be willing to share their terrorism intelligence, said Prince Turki bin Faisal Al Saud, former director of national intelligence in Saudi Arabia. Terrorism is "a cancer," he said. "The terrorist cell uses these online methods to metastasize."

Raheel Sharif, former chief of staff for the Pakistani army, called for a combination of tough penalties for violent terrorists and de-radicalisation education efforts for others. Pakistan, in recent years, has cut the number of terrorist attacks in the country dramatically, he said.

But Prince Turki emphasized the need for a stronger counter-narrative, on the internet and in schools, churches, and mosques. Tough penalties for terrorists need to avoid collateral damage to innocent people, he said. Counterterrorism efforts cannot "eliminate the terrorist and create 10 others," said Prince Turki, now chairman of the King Faisal Center for Research and Islamic Studies.

Some panelists suggested that a culture of free speech online complicates efforts to fight terrorism. The international community needs to find a balance between freedom of expression and safety, said Yemi Osinbajo, vice president of Nigeria.

"Each person has a ... digital device, and it has tremendous power," he said. "They don't even require any formal agreements. [Anyone] can reach millions of people."

Europol's Wainwright also seemed to suggest some limits on free speech. "We want to enjoy, we want to protect the freedom of the internet, but not to such an extent that there are absolutely no rules of governance," he said.

Panelists disagreed about the effectiveness of current online efforts to craft a counterterrorism message. Efforts in the US and elsewhere to counter online terrorism campaigns have been "singularly unsuccessful," said Louise Richardson, vice chancellor at the University of Oxford.

But Wainwright disagreed, saying some efforts appear to have reduced the number of Europeans and US residents joining ISIS. But more efforts are needed to counter the "fake news" terrorist groups are putting out about themselves, he added.

Computerworld:         Facebook, Twitter and Google Are A 'recruiting platform for terrorism'':

 Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night:

 

« GoggleBox: Moderate Screen Use 'Boosts Teen Wellbeing'
Female Role Models & The Early Days Of Computing »

Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

WEBINAR: How to build a secure access service edge (SASE) model in AWS

WEBINAR: How to build a secure access service edge (SASE) model in AWS

Thursday, 21 October, 2021 - In this webinar, SANS and AWS Marketplace will explore SASE and share how organizations can move to a SASE model to enhance security for modern infrastructures.

Computer Weekly

Computer Weekly

ComputerWeekly provides the latest news and analysis through its website and weekly digital magazine, as well as award-winning, exclusive premium content.

40Cloud

40Cloud

FortyCloud is a Cloud Security Broker providing an abstract security layer for cloud infrastructure deployments that is decoupled from the underlying cloud infrastructure.

Seagate

Seagate

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Aspisec

Aspisec

Aspisec is a cybersecurity company specialized in Firmware Security and Critical Infrastructure Protection.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.