Disrupting ISIS Online In Africa

Islamic State has successfully developed online strategies to augment its control of territory in Iraq and Syria, the central manifestation of its material power and an ideological cornerstone for its caliphate. 

Military campaigns in Iraq and Syria have re-taken territory from the Islamic State and damaged it in other ways, including its ability to finance military operations. As counter-attacks continue in the Middle East, the Islamic State’s activities in Africa, especially North Africa, are increasing. 

These activities include a defining characteristic of the Islamic State—its use of the Internet and social media to strengthen its control of territory and advance its extremist agenda. This aspect of the group’s efforts in Africa has garnered less interest than the number of its fighters in North Africa or its territorial foothold in Libya. However, the Islamic State is applying its online strategy in Africa, which raises questions about how to respond to this development.

The Islamic State’s use of the Internet and social media to spread propaganda, radicalize individuals, and recruit adherents and fighters has produced a dangerous form of cyber-facilitated extremism. The Islamic State developed online strategies to augment its control of territory in Iraq and Syria, the central manifestation of its material power and an ideological cornerstone for its caliphate. 

The group exploited opportunities and vulnerabilities in cyberspace even in the Middle East, which is less integrated in global economic affairs and has lower Internet access and usage rates than other parts of the world. Policy efforts, including counter-messaging and counter-content strategies, have struggled against the Islamic State’s online offensive, struggles that informed the US decision to launch military cyberattacks against the group’s online capabilities.

The factors that explain the Islamic State’s cyber-facilitated extremism are appearing in Africa. The Islamic State seeks to control territory in Libya, an objective consistent with the increasing number of its fighters in North Africa. Following its online playbook, the Islamic State is trying to harness social media to strengthen its power and position in Libya. Other groups, particularly Al Shabab in Somalia and Boko Haram in Nigeria, are copying the Islamic State’s social media strategies. Such cyber-facilitated extremism is unfolding as African cyberspace undergoes rapid changes, including efforts to expand Internet access and increase use of social media.

US AFRICOM command is an amagamation of 3 previous operational areas to creat a pan-Afriacn entity.

The 2016 Posture Statement from U.S. Africa Command (AFRICOM) underscores that factors associated with the Islamic State’s brand of cyber-facilitated extremism are emerging in Africa. AFRICOM’s commander, General David M. Rodriguez, identified the Islamic State’s expansion in Libya and its support for terrorist groups in Africa as a threat, highlighting that the Islamic State and African terrorist groups are investing in Internet and social media capabilities to spread their ideology and recruit supporters across Africa. General Rodriguez also described patterns that will affect how African cyberspace develops, including economic growth, urbanization, and a youth bulge (which will accelerate Internet access and use of social media) and entrenched political and economic problems that produce conditions across Africa ripe for violent extremism (which will increase extremist exploitation of cyberspace).

For various reasons, the online aspects of violent extremism within Africa have not gained sustained policy attention. With the Islamic State bringing its cyber-facilitated extremism to the continent, the time has come to formulate better responses. 

As a combatant command that integrates military and civilian capabilities, AFRICOM is well placed to focus on the threat of cyber-facilitated extremism in Africa. 

Countering cyber-facilitated extremism in Africa will differ from what has been attempted against the online activities the Islamic State has undertaken to bolster its position in the Middle East. The territorial losses it has sustained in Iraq and Syria damage the group’s message, and, despite problems, government and private-sector efforts are challenging and disrupting the cyber means the group has used to spread its message. 

With the Islamic State bringing its cyber-facilitated extremism to Africa and with African terrorist groups adopting the Islamic State’s online playbook, the need for a comprehensive approach to the cyber components of violent extremism in Africa is becoming a more pressing policy issue.
DefenseOne: http://bit.ly/1rTFbsy

« US Army's $12bn Mobile Internet Is Vulnerable
US Cyber Bombs On ISIS Change The Nature Cyber War »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

Inavate Consulting

Inavate Consulting

Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry.

CybExer Technologies

CybExer Technologies

CybExer provide an on-premise, easily deployable solution for complex technical cyber security exercises based on experience in military grade ranges.

ICS-CSR

ICS-CSR

ICS-CSR is a research conference bringing together researchers with an interest in the security of industrial control systems.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

eCloudvalley Digital Technology

eCloudvalley Digital Technology

eCloudvalley Digital Technology is a born-in-the-cloud partner focused entirely on AWS services across APAC region.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

Databarracks

Databarracks

Databarracks deliver award winning IT resilience and continuity services. We help organisations get the most out of the cloud and protect their data, wherever it lives.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

IntelliBridge

IntelliBridge

IntelliBridge supports our nation’s most critical missions by solving complex technology, intelligence, and mission support challenges.

TrustFour

TrustFour

TrustFour is a pioneer in workload and non-human identity security, providing innovative solutions for compliance, remediation, post quantum resiliency, and advanced threat defense.