Disrupting ISIS Online In Africa

Islamic State has successfully developed online strategies to augment its control of territory in Iraq and Syria, the central manifestation of its material power and an ideological cornerstone for its caliphate. 

Military campaigns in Iraq and Syria have re-taken territory from the Islamic State and damaged it in other ways, including its ability to finance military operations. As counter-attacks continue in the Middle East, the Islamic State’s activities in Africa, especially North Africa, are increasing. 

These activities include a defining characteristic of the Islamic State—its use of the Internet and social media to strengthen its control of territory and advance its extremist agenda. This aspect of the group’s efforts in Africa has garnered less interest than the number of its fighters in North Africa or its territorial foothold in Libya. However, the Islamic State is applying its online strategy in Africa, which raises questions about how to respond to this development.

The Islamic State’s use of the Internet and social media to spread propaganda, radicalize individuals, and recruit adherents and fighters has produced a dangerous form of cyber-facilitated extremism. The Islamic State developed online strategies to augment its control of territory in Iraq and Syria, the central manifestation of its material power and an ideological cornerstone for its caliphate. 

The group exploited opportunities and vulnerabilities in cyberspace even in the Middle East, which is less integrated in global economic affairs and has lower Internet access and usage rates than other parts of the world. Policy efforts, including counter-messaging and counter-content strategies, have struggled against the Islamic State’s online offensive, struggles that informed the US decision to launch military cyberattacks against the group’s online capabilities.

The factors that explain the Islamic State’s cyber-facilitated extremism are appearing in Africa. The Islamic State seeks to control territory in Libya, an objective consistent with the increasing number of its fighters in North Africa. Following its online playbook, the Islamic State is trying to harness social media to strengthen its power and position in Libya. Other groups, particularly Al Shabab in Somalia and Boko Haram in Nigeria, are copying the Islamic State’s social media strategies. Such cyber-facilitated extremism is unfolding as African cyberspace undergoes rapid changes, including efforts to expand Internet access and increase use of social media.

US AFRICOM command is an amagamation of 3 previous operational areas to creat a pan-Afriacn entity.

The 2016 Posture Statement from U.S. Africa Command (AFRICOM) underscores that factors associated with the Islamic State’s brand of cyber-facilitated extremism are emerging in Africa. AFRICOM’s commander, General David M. Rodriguez, identified the Islamic State’s expansion in Libya and its support for terrorist groups in Africa as a threat, highlighting that the Islamic State and African terrorist groups are investing in Internet and social media capabilities to spread their ideology and recruit supporters across Africa. General Rodriguez also described patterns that will affect how African cyberspace develops, including economic growth, urbanization, and a youth bulge (which will accelerate Internet access and use of social media) and entrenched political and economic problems that produce conditions across Africa ripe for violent extremism (which will increase extremist exploitation of cyberspace).

For various reasons, the online aspects of violent extremism within Africa have not gained sustained policy attention. With the Islamic State bringing its cyber-facilitated extremism to the continent, the time has come to formulate better responses. 

As a combatant command that integrates military and civilian capabilities, AFRICOM is well placed to focus on the threat of cyber-facilitated extremism in Africa. 

Countering cyber-facilitated extremism in Africa will differ from what has been attempted against the online activities the Islamic State has undertaken to bolster its position in the Middle East. The territorial losses it has sustained in Iraq and Syria damage the group’s message, and, despite problems, government and private-sector efforts are challenging and disrupting the cyber means the group has used to spread its message. 

With the Islamic State bringing its cyber-facilitated extremism to Africa and with African terrorist groups adopting the Islamic State’s online playbook, the need for a comprehensive approach to the cyber components of violent extremism in Africa is becoming a more pressing policy issue.
DefenseOne: http://bit.ly/1rTFbsy

« US Army's $12bn Mobile Internet Is Vulnerable
US Cyber Bombs On ISIS Change The Nature Cyber War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Fusion Center - Maryville University

Cyber Fusion Center - Maryville University

Maryville University Cyber Fusion Center is a virtual lab for working on real-world cyber security challenges.

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

FirstPoint Mobile Guard

FirstPoint Mobile Guard

FirstPoint Mobile Guard has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

LGMS - LE Global Services

LGMS - LE Global Services

LGMS is a leading cyber security penetration testing and assessment firm in the Asia Pacific region.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startup Association (ROTSA)

Romanian Tech Startups Association is an umbrella organization that aims to promote, support and represent the interests of tech startups in Romania.

Iris Powered by Generali

Iris Powered by Generali

Iris Powered by Generali is an identity theft resolution provider. Our offering combines expert assistance and support with user-friendly identity protection technology.

Global Market Innovators (GMI)

Global Market Innovators (GMI)

Global Market Innovators (GMI) delivers secure technology solutions to organizations in need.

GTT Communications

GTT Communications

GTT are a global network provider that serves thousands of multinational and national enterprise, government and carrier customers with a portfolio of advanced connectivity and security services.

Dataminr

Dataminr

Dataminr Pulse helps organizations strengthen business resilience with AI-powered, real-time risk and event discovery—and the integrated tools to manage responses.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.