Are Terrorists Winning The Digital Arms Race?

Terrorist groups are embracing a huge number of digital tools to recruit members and plan attacks, putting them a step ahead of governments trying to combat them, a group of counterterrorism experts said.

Twitter removed about 250,000 accounts connected with ISIS in one year, but the terrorist group uses 90 other social media platforms, Rob Wainwright, the director of Europol, said recently.

Terrorist groups have begun to live-stream their attacks, and they are using the Internet to launch "innovative crowdfunding" campaigns, he said at the World Economic Forum in Switzerland.

"The technology is advanced," Wainwright added. "They know what to do, and they know how to use it."

It's imperative that countries start working more closely together to combat terrorism and to develop an online counter-narrative that dissuades potential members from joining groups like ISIS, said members of a panel on terrorism in the digital age.

Governments need to trust each other more and be willing to share their terrorism intelligence, said Prince Turki bin Faisal Al Saud, former director of national intelligence in Saudi Arabia. Terrorism is "a cancer," he said. "The terrorist cell uses these online methods to metastasize."

Raheel Sharif, former chief of staff for the Pakistani army, called for a combination of tough penalties for violent terrorists and de-radicalisation education efforts for others. Pakistan, in recent years, has cut the number of terrorist attacks in the country dramatically, he said.

But Prince Turki emphasized the need for a stronger counter-narrative, on the internet and in schools, churches, and mosques. Tough penalties for terrorists need to avoid collateral damage to innocent people, he said. Counterterrorism efforts cannot "eliminate the terrorist and create 10 others," said Prince Turki, now chairman of the King Faisal Center for Research and Islamic Studies.

Some panelists suggested that a culture of free speech online complicates efforts to fight terrorism. The international community needs to find a balance between freedom of expression and safety, said Yemi Osinbajo, vice president of Nigeria.

"Each person has a ... digital device, and it has tremendous power," he said. "They don't even require any formal agreements. [Anyone] can reach millions of people."

Europol's Wainwright also seemed to suggest some limits on free speech. "We want to enjoy, we want to protect the freedom of the internet, but not to such an extent that there are absolutely no rules of governance," he said.

Panelists disagreed about the effectiveness of current online efforts to craft a counterterrorism message. Efforts in the US and elsewhere to counter online terrorism campaigns have been "singularly unsuccessful," said Louise Richardson, vice chancellor at the University of Oxford.

But Wainwright disagreed, saying some efforts appear to have reduced the number of Europeans and US residents joining ISIS. But more efforts are needed to counter the "fake news" terrorist groups are putting out about themselves, he added.

Computerworld:         Facebook, Twitter and Google Are A 'recruiting platform for terrorism'':

 Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night:

 

« GoggleBox: Moderate Screen Use 'Boosts Teen Wellbeing'
Female Role Models & The Early Days Of Computing »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Managed Security Solutions (MSS)

Managed Security Solutions (MSS)

MSS deliver consultancy services and managed security services for IT departments who may lack the time, resources, or expertise themselves.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Gallarus Industry Solutions

Gallarus Industry Solutions

Gallarus leads innovation within industrial Manufacturing, Production and Management Systems, including Cyber Security solutions specifically developed to protect against the latest cyber criminality.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

Razorpoint Cybersecurity

Razorpoint Cybersecurity

Razorpoint’s world-class security experts have provided advanced, effective cybersecurity expertise to corporate and public-sector organizations around the world.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.

Nexsan

Nexsan

Nexsan offers versatile and robust data storage solutions tailored to adapt seamlessly across a diverse range of sectors, ensuring reliable performance for critical data management.

Cyber Security Centre for the Isle of Man (CSC)

Cyber Security Centre for the Isle of Man (CSC)

The Cyber Security Centre for the Isle of Man is responsible for the delivery of the Isle of Man National Cyber Security Strategy.

DeepStrike

DeepStrike

DeepStrike is a leading cybersecurity firm specializing in human-powered, high-quality penetration testing designed to protect businesses from evolving cyber threats.