UN Calls On Social Media to Act Against ‘Misuse’ by Extremists

Albarnawi-boko-twitter-619x357.png

Boko Haram Twitter Account 

A UN panel that advises the Security Council has called for Internet and social media companies to respond to the exploitation of their services by al-Qaida and other extremist groups who use the web to recruit fighters and spout “increasingly horrific propaganda”.

The panel recommended in a report that these companies brief the Security Council Committee monitoring sanctions against al-Qaida, its affiliates and the Islamic State group on measures they are taking to prevent such misuse.
“A worrisome trend over the past year has been the growth of high-definition digital terror: the use of propaganda, primarily by [Islamic State] and its sympathisers, to spread fear and promote their distorted ideology,” the panel of experts monitoring sanctions against extremist groups and individuals said in its report to the Security Council.

It said the scale of digital activity linked to Isis, and to a lesser extent some al-Qaida affiliates, had strategic implications for how the threat from extremists would evolve in the coming years among the “diverse, dispersed … diaspora of foreign terrorist fighters”.

In recommending that Internet and social media companies brief the sanctions committee, the panel said: “The scale of the digital threat linked to radicalisation, together with the need for concerted action on countering violent extremism, calls for further action by the security council”.

The Internet’s impact on extremist groups is one facet highlighted in the report, which covers the global threats posed by al-Qaida, its affiliates and Isis. Their actions have had an “enormous” human cost in recent months, it says, with major bombings, assassinations and exploitation of several million people in not only Iraq and Syria but also Afghanistan, Libya, Nigeria, Somalia and Yemen.

The panel said al-Qaida remained overshadowed by the attention paid to its splinter, the Islamic State group, which controls large swaths of Syria and Iraq. The grip of al-Qaida leader Ayman al-Zawahiri on affiliates appeared to be weakening, it said, and al-Qaida’s financial position remained precarious compared with that of Islamic State, which “can claim to have achieved what al-Qaida never did: the building of a territorial entity through terrorist violence”.

But al-Qaida and its affiliates still posed a serious threat in many parts of the world, the panel said, becoming more visible and active in Afghanistan over the past six months, while associated groups had grown in number in south and central Asia, and al-Shabaab, its affiliate in Somalia, remaining a major security threat in the Horn of Africa.

Southern Libya remained “a safe haven” for extremists planning attacks in the Maghreb and Sahel regions, and the experts said they have been told of anti-aircraft guns and portable air defence systems in the hands of extremist groups.
Boko Haram had expanded deadly incursions into Cameroon, Chad and Niger but the panel said its ability to maintain long-term control over 20,000 square kilometers of north-eastern Nigeria “will require heavier weaponry, access to natural resources and some ability to sustain a local population”.

It said the Indonesia-based extremist network Jemaah Islamiyah appeared to be reviving and was recruiting professionals including engineers and information specialists, which could pose “a significant long-term threat” to South East Asia.
Guardian: http://bit.ly/1LZfLMz

 

 

« AT&T helped NSA Spy on Domestic Citizens
Social Media and the 'Information War’- Russia is Winning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

National Crime Agency (NCA)

National Crime Agency (NCA)

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

MindPoint Group (MPG)

MindPoint Group (MPG)

MindPoint Group is a specialist Information Security Consulting firm.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

CyberCareers.gov

CyberCareers.gov

CyberCareers.gov is a platform for Cybersecurity Job Seekers, Federal Hiring Managers and Supervisors, Current Federal Cybersecurity Employees, Students and Universities.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

Cyber Skyline

Cyber Skyline

Cyber Skyline is a revolutionary cloud platform to practice, develop, and measure your team's technical cybersecurity skills.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

GM Sectec

GM Sectec

GM Sectec is the world's largest independent Cyber Defense and Fraud Prevention firm laser focused on payment security.

HaystackID

HaystackID

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help with complex, data-intensive investigations and litigation.