Disrupting ISIS Online In Africa

Islamic State has successfully developed online strategies to augment its control of territory in Iraq and Syria, the central manifestation of its material power and an ideological cornerstone for its caliphate. 

Military campaigns in Iraq and Syria have re-taken territory from the Islamic State and damaged it in other ways, including its ability to finance military operations. As counter-attacks continue in the Middle East, the Islamic State’s activities in Africa, especially North Africa, are increasing. 

These activities include a defining characteristic of the Islamic State—its use of the Internet and social media to strengthen its control of territory and advance its extremist agenda. This aspect of the group’s efforts in Africa has garnered less interest than the number of its fighters in North Africa or its territorial foothold in Libya. However, the Islamic State is applying its online strategy in Africa, which raises questions about how to respond to this development.

The Islamic State’s use of the Internet and social media to spread propaganda, radicalize individuals, and recruit adherents and fighters has produced a dangerous form of cyber-facilitated extremism. The Islamic State developed online strategies to augment its control of territory in Iraq and Syria, the central manifestation of its material power and an ideological cornerstone for its caliphate. 

The group exploited opportunities and vulnerabilities in cyberspace even in the Middle East, which is less integrated in global economic affairs and has lower Internet access and usage rates than other parts of the world. Policy efforts, including counter-messaging and counter-content strategies, have struggled against the Islamic State’s online offensive, struggles that informed the US decision to launch military cyberattacks against the group’s online capabilities.

The factors that explain the Islamic State’s cyber-facilitated extremism are appearing in Africa. The Islamic State seeks to control territory in Libya, an objective consistent with the increasing number of its fighters in North Africa. Following its online playbook, the Islamic State is trying to harness social media to strengthen its power and position in Libya. Other groups, particularly Al Shabab in Somalia and Boko Haram in Nigeria, are copying the Islamic State’s social media strategies. Such cyber-facilitated extremism is unfolding as African cyberspace undergoes rapid changes, including efforts to expand Internet access and increase use of social media.

US AFRICOM command is an amagamation of 3 previous operational areas to creat a pan-Afriacn entity.

The 2016 Posture Statement from U.S. Africa Command (AFRICOM) underscores that factors associated with the Islamic State’s brand of cyber-facilitated extremism are emerging in Africa. AFRICOM’s commander, General David M. Rodriguez, identified the Islamic State’s expansion in Libya and its support for terrorist groups in Africa as a threat, highlighting that the Islamic State and African terrorist groups are investing in Internet and social media capabilities to spread their ideology and recruit supporters across Africa. General Rodriguez also described patterns that will affect how African cyberspace develops, including economic growth, urbanization, and a youth bulge (which will accelerate Internet access and use of social media) and entrenched political and economic problems that produce conditions across Africa ripe for violent extremism (which will increase extremist exploitation of cyberspace).

For various reasons, the online aspects of violent extremism within Africa have not gained sustained policy attention. With the Islamic State bringing its cyber-facilitated extremism to the continent, the time has come to formulate better responses. 

As a combatant command that integrates military and civilian capabilities, AFRICOM is well placed to focus on the threat of cyber-facilitated extremism in Africa. 

Countering cyber-facilitated extremism in Africa will differ from what has been attempted against the online activities the Islamic State has undertaken to bolster its position in the Middle East. The territorial losses it has sustained in Iraq and Syria damage the group’s message, and, despite problems, government and private-sector efforts are challenging and disrupting the cyber means the group has used to spread its message. 

With the Islamic State bringing its cyber-facilitated extremism to Africa and with African terrorist groups adopting the Islamic State’s online playbook, the need for a comprehensive approach to the cyber components of violent extremism in Africa is becoming a more pressing policy issue.
DefenseOne: http://bit.ly/1rTFbsy

« US Army's $12bn Mobile Internet Is Vulnerable
US Cyber Bombs On ISIS Change The Nature Cyber War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Farsight Security

Farsight Security

Farsight Security provides the world’s largest real-time actionable threat intelligence on how the Internet is changing.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

Nihon Cyber Defense

Nihon Cyber Defense

Nihon Cyber Defence’s mission is to provide robust solutions, services and support to governments, corporates and organisations in order to protect them from all forms of cyber warfare.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

boxxe

boxxe

boxxe create flexible IT infrastructures, collaborative global workspaces and data clarity, all underpinned by world-leading security.

Guardian Digital

Guardian Digital

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported.

BugDazz

BugDazz

BugDazz pentest as a service (PTaaS) platform helps bringing in real-time results, detail coverage, & easy remediation workflows with compliance-ready reports.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

Redington

Redington

Redington offer products and services in solution areas including digital transformation, hybrid infrastructure and cybersecurity.