Disrupting ISIS Online In Africa

Islamic State has successfully developed online strategies to augment its control of territory in Iraq and Syria, the central manifestation of its material power and an ideological cornerstone for its caliphate. 

Military campaigns in Iraq and Syria have re-taken territory from the Islamic State and damaged it in other ways, including its ability to finance military operations. As counter-attacks continue in the Middle East, the Islamic State’s activities in Africa, especially North Africa, are increasing. 

These activities include a defining characteristic of the Islamic State—its use of the Internet and social media to strengthen its control of territory and advance its extremist agenda. This aspect of the group’s efforts in Africa has garnered less interest than the number of its fighters in North Africa or its territorial foothold in Libya. However, the Islamic State is applying its online strategy in Africa, which raises questions about how to respond to this development.

The Islamic State’s use of the Internet and social media to spread propaganda, radicalize individuals, and recruit adherents and fighters has produced a dangerous form of cyber-facilitated extremism. The Islamic State developed online strategies to augment its control of territory in Iraq and Syria, the central manifestation of its material power and an ideological cornerstone for its caliphate. 

The group exploited opportunities and vulnerabilities in cyberspace even in the Middle East, which is less integrated in global economic affairs and has lower Internet access and usage rates than other parts of the world. Policy efforts, including counter-messaging and counter-content strategies, have struggled against the Islamic State’s online offensive, struggles that informed the US decision to launch military cyberattacks against the group’s online capabilities.

The factors that explain the Islamic State’s cyber-facilitated extremism are appearing in Africa. The Islamic State seeks to control territory in Libya, an objective consistent with the increasing number of its fighters in North Africa. Following its online playbook, the Islamic State is trying to harness social media to strengthen its power and position in Libya. Other groups, particularly Al Shabab in Somalia and Boko Haram in Nigeria, are copying the Islamic State’s social media strategies. Such cyber-facilitated extremism is unfolding as African cyberspace undergoes rapid changes, including efforts to expand Internet access and increase use of social media.

US AFRICOM command is an amagamation of 3 previous operational areas to creat a pan-Afriacn entity.

The 2016 Posture Statement from U.S. Africa Command (AFRICOM) underscores that factors associated with the Islamic State’s brand of cyber-facilitated extremism are emerging in Africa. AFRICOM’s commander, General David M. Rodriguez, identified the Islamic State’s expansion in Libya and its support for terrorist groups in Africa as a threat, highlighting that the Islamic State and African terrorist groups are investing in Internet and social media capabilities to spread their ideology and recruit supporters across Africa. General Rodriguez also described patterns that will affect how African cyberspace develops, including economic growth, urbanization, and a youth bulge (which will accelerate Internet access and use of social media) and entrenched political and economic problems that produce conditions across Africa ripe for violent extremism (which will increase extremist exploitation of cyberspace).

For various reasons, the online aspects of violent extremism within Africa have not gained sustained policy attention. With the Islamic State bringing its cyber-facilitated extremism to the continent, the time has come to formulate better responses. 

As a combatant command that integrates military and civilian capabilities, AFRICOM is well placed to focus on the threat of cyber-facilitated extremism in Africa. 

Countering cyber-facilitated extremism in Africa will differ from what has been attempted against the online activities the Islamic State has undertaken to bolster its position in the Middle East. The territorial losses it has sustained in Iraq and Syria damage the group’s message, and, despite problems, government and private-sector efforts are challenging and disrupting the cyber means the group has used to spread its message. 

With the Islamic State bringing its cyber-facilitated extremism to Africa and with African terrorist groups adopting the Islamic State’s online playbook, the need for a comprehensive approach to the cyber components of violent extremism in Africa is becoming a more pressing policy issue.
DefenseOne: http://bit.ly/1rTFbsy

« US Army's $12bn Mobile Internet Is Vulnerable
US Cyber Bombs On ISIS Change The Nature Cyber War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

Jiran Security

Jiran Security

Jiran Security provides data and application security solution over email, mobile device and endpoints.

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Power and others.

Cognni

Cognni

Cognni (formerly Shieldox) will make your InfoSec think like a human, right out of the box, so you can focus on the bigger picture, keeping the information flow safe.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

Infodas

Infodas

Infodas provides Cybersecurity and IT consulting / system integration services as well as a range of innovative Cybersecurity products to public sector and commercial clients.

drie

drie

drie is an end-to-end cloud services company based in Bahrain, Dubai and London. We enable businesses to adopt, scale on and build for cloud.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Lancera

Lancera

Lancera provides growth accelerating Software Development, Web Presence and Cybersecurity Solutions with a focus on customer happiness.

Air IT

Air IT

Air IT are a responsive, client-focused and award-winning Managed Service Provider, helping clients achieve success and transformation through their IT and communications.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

Keepit

Keepit

Keepit offer all-inclusive, secure, and reliable backup and recovery services for your data.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

at-yet (@-yet)

at-yet (@-yet)

at-yet are an interdisciplinary team of experts. We are all about achieving results, whatever the situation – an acute incident, risk minimisation, safeguarding or data protection.