Kenya: Step Up Cyber War Against Al Shabaab

The Cyber war against the al Shabaab needs to be stepped up urgently if there should be any legitimate expectation of defeating them and preventing further loss of lives of people in Kenya, Somalia and the whole region.

While the military assault on the criminal group is on going and has to some degree degraded their capabilities, al Shabaab is still very active in cyber space, recruiting more members and spreading their propaganda to influence the minds of our unsuspecting youths.

It is unbelievable that such a terrorist organisation, which has killed hundreds of Kenyans and Somalis and vows to kill more in future, can be allowed to operate websites to enhance its activities.

Currently, al Shabaab is openly operating a number of websites to spread their toxic ideology of encouraging and justifying attacks inside Kenya, Somalia and the whole region.
There are three most notorious al Shabaab websites currently in active operation and are virtually unchallenged.

All of them are in Somali language, with the exception of one, which also runs a Kiswahili segment targeting and luring Kenyan youth with their glorified messages.

Another mostly posts audio and written material from al Shabaab official radio station Al Andalus, which is still on air in parts of Southern Somalia where the group is still in control.
It is in these dubious websites that the terrorist group often posts their written and audio messages after carrying out attacks, justifying and glorifying the killing of innocent people and encouraging further attacks.

The websites are used to actively recruit the next generation of terrorists by misleading young minds to join their 'noble struggle'.

The group regularly calls for the killing of Islamic religious and political leaders, including those in Kenya, who speak out against them.

So what can be done about these toxic websites and others similar to them that are furthering the evil agenda of terrorism in Kenya and the region?

Law enforcement agencies, especially those involved in cyber counter-terrorism, can have the websites taken down by contacting the companies hosting them. Typically, web-hosting companies host thousands of websites and may not be able to keep track of the activities of all those websites, allowing terrorist groups to take advantage of such loopholes.

In addition, al Shabaab websites are written in Somali and foreign web hosting companies may not be aware of their contents until they are alerted by law enforcement agencies.

But once they realise and confirm that they are hosting dangerous websites, web hosting companies take them down to avoid falling foul of the law, which prohibits hosting websites that promote terrorism and other criminal activities.

Since terrorist groups whose websites are taken down often quickly jump to other unsuspecting web hosting companies to keep their websites online, there is need for dedicated online counter-terrorism teams to prevent them from doing so.

It is time that Kenya, Somalia and countries in the region developed and enhanced their online 'armies' to deny al Shabaab a voice.

This 'army' should ensure that terrorist groups like al Shabaab do not take advantage of their Internet to promote, justify and glorify terrorism and recruit the next generation of killers.
Twitter has consistently and actively prevented al Shabaab and other terrorist groups from misusing their platform to spread terrorism.

In addition, last year, the US law enforcement agencies shut down a notorious pro-Shabaab website.

Al Shabaab may be the only terrorist organisation that is enjoying virtually unchallenged leeway to actively operate websites to promote their evil agenda.

Attempts by other terrorist groups like ISIS, al Qaeda and Boko Haram to take advantage of the Internet for their evil agenda continue to be actively thwarted. Al Shabaab should not be the exception.

All Africa

 

« More CEOs Discover Power of Analytics
Malware Tracks a Smartphone Without Location Data »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

tietoevry

tietoevry

Tietoevry creates digital advantage for businesses and society. We are a leading digital services and software company with local presence and global capabilities.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Belle de Mai Incubator

Belle de Mai Incubator

Belle de Mai Incubator supports and funds innovative startup ideas in digital industries.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Covenant Technologies

Covenant Technologies

Make Covenant Technologies the only choice for your IT and cybersecurity recruitment needs. We deliver quality candidates at the forefront of the cybersecurity and IT industry.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.

ColCERT

ColCERT

ColCERT is the national cybersecurity emergency response team of Colombia.