EU Cyber Police Take on Islamic State Propaganda

920x920.jpg

EUROPOL Chief Rob Wainwright says Europol to battle Islamic State social media propaganda

European police agency Europol has recently said it was launching a continent-wide cybercrime unit to combat social media accounts promoting jihadist propaganda, particularly those of the Islamic State (IS) group.

The unit, set to start operating from Europol's Hague-based headquarters next month, will comb tens of thousands of social media accounts connected with IS and report them to the companies behind the websites, Europol chief Rob Wainwright said.

The team "will focus on publicly-available material and combine what we see on social media with more traditional intelligence sources," said Wainwright.
Initially consisting of some 15 to 20 members, the cyber squad will focus on key figures the ones that put out thousands of tweets and run accounts used to lure would-be jihadists to Iraq and Syria, as well as to recruit jihadists' brides.

A recent US study identified at least 46,000 Twitter accounts linked to supporters of the IS group, three-quarters of them tweeting in Arabic. Since the IS group called on Muslims to come to the caliphate it declared a year ago, foreign fighter numbers have jumped, with the United Nations reporting a 71 percent spike in the nine months to April.

The International Centre for the Study of Radicalization in London said the number of foreigners fighting in Syria and Iraq topped 20,000 by January 2015, with nearly a fifth of them from Western Europe.
"The IS is the most well connected terrorist organisation that we've seen online," Wainwright pointed out.
"They are manipulating the Internet and social media, which has become a cornerstone in the lives of many young people," he said.

Europol will draw on a decade of experience in monitoring extremist websites and well as "deep knowledge of extremist content and good linguistic capabilities including our knowledge of Arabic," to combat the problem.
Wainwright said once an extremist account had been detected, the companies would be informed and it would be taken down in "a matter of a few hours."

Security Week: http://http://bit.ly/1IuvVvu

 

« RBS Under Pressure over New IT Failure
What We Call Security Isn’t Secure! »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Social-Engineer

Social-Engineer

Social-Engineer is a team of outside–the–box thinkers that share a common focus on human-to-human social engineering.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN) is a not for profit group of professionals in the field of Information Security in Nigeria and Diaspora.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

Verafin

Verafin

Verafin is one of the North American leaders in fraud detection and AML software.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

Diaplous Group

Diaplous Group

Diaplous Group is a leading Maritime Risk Management (MRM) provider, delivering specialized services to an ever-broadening portfolio of shipping, oil & gas, energy and construction industries.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

Cygna Labs

Cygna Labs

Cygna Labs is a software developer and one of the top three global DDI (DNS, DHCP, and IP address management) vendors.

Cyber Guru

Cyber Guru

Cyber Guru is an effective cybersecurity awareness training platform, enabling organisations to increase their resistance to cyber-attacks by changing employee behaviour.

Taktika

Taktika

Taktika stands at the forefront of cybersecurity defense, offering cutting-edge integration and managed Security Operations Center (SOC) services.