Are Terrorists Winning The Digital Arms Race?

Terrorist groups are embracing a huge number of digital tools to recruit members and plan attacks, putting them a step ahead of governments trying to combat them, a group of counterterrorism experts said.

Twitter removed about 250,000 accounts connected with ISIS in one year, but the terrorist group uses 90 other social media platforms, Rob Wainwright, the director of Europol, said recently.

Terrorist groups have begun to live-stream their attacks, and they are using the Internet to launch "innovative crowdfunding" campaigns, he said at the World Economic Forum in Switzerland.

"The technology is advanced," Wainwright added. "They know what to do, and they know how to use it."

It's imperative that countries start working more closely together to combat terrorism and to develop an online counter-narrative that dissuades potential members from joining groups like ISIS, said members of a panel on terrorism in the digital age.

Governments need to trust each other more and be willing to share their terrorism intelligence, said Prince Turki bin Faisal Al Saud, former director of national intelligence in Saudi Arabia. Terrorism is "a cancer," he said. "The terrorist cell uses these online methods to metastasize."

Raheel Sharif, former chief of staff for the Pakistani army, called for a combination of tough penalties for violent terrorists and de-radicalisation education efforts for others. Pakistan, in recent years, has cut the number of terrorist attacks in the country dramatically, he said.

But Prince Turki emphasized the need for a stronger counter-narrative, on the internet and in schools, churches, and mosques. Tough penalties for terrorists need to avoid collateral damage to innocent people, he said. Counterterrorism efforts cannot "eliminate the terrorist and create 10 others," said Prince Turki, now chairman of the King Faisal Center for Research and Islamic Studies.

Some panelists suggested that a culture of free speech online complicates efforts to fight terrorism. The international community needs to find a balance between freedom of expression and safety, said Yemi Osinbajo, vice president of Nigeria.

"Each person has a ... digital device, and it has tremendous power," he said. "They don't even require any formal agreements. [Anyone] can reach millions of people."

Europol's Wainwright also seemed to suggest some limits on free speech. "We want to enjoy, we want to protect the freedom of the internet, but not to such an extent that there are absolutely no rules of governance," he said.

Panelists disagreed about the effectiveness of current online efforts to craft a counterterrorism message. Efforts in the US and elsewhere to counter online terrorism campaigns have been "singularly unsuccessful," said Louise Richardson, vice chancellor at the University of Oxford.

But Wainwright disagreed, saying some efforts appear to have reduced the number of Europeans and US residents joining ISIS. But more efforts are needed to counter the "fake news" terrorist groups are putting out about themselves, he added.

Computerworld:         Facebook, Twitter and Google Are A 'recruiting platform for terrorism'':

 Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night:

 

« GoggleBox: Moderate Screen Use 'Boosts Teen Wellbeing'
Female Role Models & The Early Days Of Computing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

ABB

ABB

ABB is a pioneering technology leader in industrial digitalization. Services include cyber security for industrial control systems IoT.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

RISE

RISE

RISE is an independent, State-owned research institute, which offers unique expertise and over 100 testbeds and demonstration environments for future-proof technologies, products and services.

CSC Digital Brand Services

CSC Digital Brand Services

Our brand protection and security expertise give our customers peace of mind that no matter how fast the digital world changes, their intellectual property and digital assets will be secure.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

Censinet

Censinet

Censinet provides the first and only third-party risk management platform for healthcare organizations to manage the threats to patient care that exist within an expanding ecosystem.

HWG Sababa

HWG Sababa

HWG Sababa is a cybersecurity provider that offers a comprehensive suite of strategic managed security solutions, services, and consultancy.

Board of Cyber

Board of Cyber

Board of Cyber offers Security Rating: a fast, non-intrusive, continuous, 100% automated solution to evaluate the cyber performance of an organization.

Novem CS

Novem CS

Novem CS are bespoke cyber security specialists providing a highly effective and specialised approach to solving your cyber security challenges.