Kenya: Step Up Cyber War Against Al Shabaab

The Cyber war against the al Shabaab needs to be stepped up urgently if there should be any legitimate expectation of defeating them and preventing further loss of lives of people in Kenya, Somalia and the whole region.

While the military assault on the criminal group is on going and has to some degree degraded their capabilities, al Shabaab is still very active in cyber space, recruiting more members and spreading their propaganda to influence the minds of our unsuspecting youths.

It is unbelievable that such a terrorist organisation, which has killed hundreds of Kenyans and Somalis and vows to kill more in future, can be allowed to operate websites to enhance its activities.

Currently, al Shabaab is openly operating a number of websites to spread their toxic ideology of encouraging and justifying attacks inside Kenya, Somalia and the whole region.
There are three most notorious al Shabaab websites currently in active operation and are virtually unchallenged.

All of them are in Somali language, with the exception of one, which also runs a Kiswahili segment targeting and luring Kenyan youth with their glorified messages.

Another mostly posts audio and written material from al Shabaab official radio station Al Andalus, which is still on air in parts of Southern Somalia where the group is still in control.
It is in these dubious websites that the terrorist group often posts their written and audio messages after carrying out attacks, justifying and glorifying the killing of innocent people and encouraging further attacks.

The websites are used to actively recruit the next generation of terrorists by misleading young minds to join their 'noble struggle'.

The group regularly calls for the killing of Islamic religious and political leaders, including those in Kenya, who speak out against them.

So what can be done about these toxic websites and others similar to them that are furthering the evil agenda of terrorism in Kenya and the region?

Law enforcement agencies, especially those involved in cyber counter-terrorism, can have the websites taken down by contacting the companies hosting them. Typically, web-hosting companies host thousands of websites and may not be able to keep track of the activities of all those websites, allowing terrorist groups to take advantage of such loopholes.

In addition, al Shabaab websites are written in Somali and foreign web hosting companies may not be aware of their contents until they are alerted by law enforcement agencies.

But once they realise and confirm that they are hosting dangerous websites, web hosting companies take them down to avoid falling foul of the law, which prohibits hosting websites that promote terrorism and other criminal activities.

Since terrorist groups whose websites are taken down often quickly jump to other unsuspecting web hosting companies to keep their websites online, there is need for dedicated online counter-terrorism teams to prevent them from doing so.

It is time that Kenya, Somalia and countries in the region developed and enhanced their online 'armies' to deny al Shabaab a voice.

This 'army' should ensure that terrorist groups like al Shabaab do not take advantage of their Internet to promote, justify and glorify terrorism and recruit the next generation of killers.
Twitter has consistently and actively prevented al Shabaab and other terrorist groups from misusing their platform to spread terrorism.

In addition, last year, the US law enforcement agencies shut down a notorious pro-Shabaab website.

Al Shabaab may be the only terrorist organisation that is enjoying virtually unchallenged leeway to actively operate websites to promote their evil agenda.

Attempts by other terrorist groups like ISIS, al Qaeda and Boko Haram to take advantage of the Internet for their evil agenda continue to be actively thwarted. Al Shabaab should not be the exception.

All Africa

 

« More CEOs Discover Power of Analytics
Malware Tracks a Smartphone Without Location Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

Experian

Experian

Experian provide software solutions to help organizations prevent identity fraud and crime.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

CYDES

CYDES

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors.

Brighterion

Brighterion

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Maltego Technologies

Maltego Technologies

Maltego is a comprehensive tool for graphical link analyses that offers real-time data mining and information gathering. Applications include cybersecurity threat intelligence and incident response.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

Scope AI

Scope AI

Scope AI is an innovative technology company specializing in quantum security and machine learning.