UN Calls On Social Media to Act Against ‘Misuse’ by Extremists

Albarnawi-boko-twitter-619x357.png

Boko Haram Twitter Account 

A UN panel that advises the Security Council has called for Internet and social media companies to respond to the exploitation of their services by al-Qaida and other extremist groups who use the web to recruit fighters and spout “increasingly horrific propaganda”.

The panel recommended in a report that these companies brief the Security Council Committee monitoring sanctions against al-Qaida, its affiliates and the Islamic State group on measures they are taking to prevent such misuse.
“A worrisome trend over the past year has been the growth of high-definition digital terror: the use of propaganda, primarily by [Islamic State] and its sympathisers, to spread fear and promote their distorted ideology,” the panel of experts monitoring sanctions against extremist groups and individuals said in its report to the Security Council.

It said the scale of digital activity linked to Isis, and to a lesser extent some al-Qaida affiliates, had strategic implications for how the threat from extremists would evolve in the coming years among the “diverse, dispersed … diaspora of foreign terrorist fighters”.

In recommending that Internet and social media companies brief the sanctions committee, the panel said: “The scale of the digital threat linked to radicalisation, together with the need for concerted action on countering violent extremism, calls for further action by the security council”.

The Internet’s impact on extremist groups is one facet highlighted in the report, which covers the global threats posed by al-Qaida, its affiliates and Isis. Their actions have had an “enormous” human cost in recent months, it says, with major bombings, assassinations and exploitation of several million people in not only Iraq and Syria but also Afghanistan, Libya, Nigeria, Somalia and Yemen.

The panel said al-Qaida remained overshadowed by the attention paid to its splinter, the Islamic State group, which controls large swaths of Syria and Iraq. The grip of al-Qaida leader Ayman al-Zawahiri on affiliates appeared to be weakening, it said, and al-Qaida’s financial position remained precarious compared with that of Islamic State, which “can claim to have achieved what al-Qaida never did: the building of a territorial entity through terrorist violence”.

But al-Qaida and its affiliates still posed a serious threat in many parts of the world, the panel said, becoming more visible and active in Afghanistan over the past six months, while associated groups had grown in number in south and central Asia, and al-Shabaab, its affiliate in Somalia, remaining a major security threat in the Horn of Africa.

Southern Libya remained “a safe haven” for extremists planning attacks in the Maghreb and Sahel regions, and the experts said they have been told of anti-aircraft guns and portable air defence systems in the hands of extremist groups.
Boko Haram had expanded deadly incursions into Cameroon, Chad and Niger but the panel said its ability to maintain long-term control over 20,000 square kilometers of north-eastern Nigeria “will require heavier weaponry, access to natural resources and some ability to sustain a local population”.

It said the Indonesia-based extremist network Jemaah Islamiyah appeared to be reviving and was recruiting professionals including engineers and information specialists, which could pose “a significant long-term threat” to South East Asia.
Guardian: http://bit.ly/1LZfLMz

 

 

« AT&T helped NSA Spy on Domestic Citizens
Social Media and the 'Information War’- Russia is Winning »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

ThreatGen

ThreatGen

ThreatGEN™ works with your team to improve your resiliency and industrial cybersecurity capabilities through an innovative and modernized approach to training and services.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

European Healthcare Fraud & Corruption Network (EHFCN)

European Healthcare Fraud & Corruption Network (EHFCN)

EHFCN is the only organisation dedicated to combating fraud, corruption and waste in the healthcare sector across Europe.

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

AutoRABIT

AutoRABIT

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security.

Protectt.ai Labs

Protectt.ai Labs

Protectt.ai Labs is India’s first mobile security start up building awareness & providing solutions for mobile app, device & transaction security.

Port443

Port443

Port443 specialises in providing Security Orchestration, Automation and Remediation (SOAR) "as a service".

Covenant Technologies

Covenant Technologies

Make Covenant Technologies the only choice for your IT and cybersecurity recruitment needs. We deliver quality candidates at the forefront of the cybersecurity and IT industry.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

Gleam Cloud Security Solutions (GCSS)

Gleam Cloud Security Solutions (GCSS)

GCSS Security is an information security firm providing cyber security protection with a highly skilled and experienced team focused on technology that creates best-in-class customer experiences.

Cloudaeris

Cloudaeris

Cloudaeris is a trusted Microsoft Partner, and we've got what it takes to make your business more efficient and agile.

Kali Linux

Kali Linux

Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing.

Lattica

Lattica

Lattica provides a cryptography solution for privacy-preserving interaction with AI services.