Kenya: Step Up Cyber War Against Al Shabaab

The Cyber war against the al Shabaab needs to be stepped up urgently if there should be any legitimate expectation of defeating them and preventing further loss of lives of people in Kenya, Somalia and the whole region.

While the military assault on the criminal group is on going and has to some degree degraded their capabilities, al Shabaab is still very active in cyber space, recruiting more members and spreading their propaganda to influence the minds of our unsuspecting youths.

It is unbelievable that such a terrorist organisation, which has killed hundreds of Kenyans and Somalis and vows to kill more in future, can be allowed to operate websites to enhance its activities.

Currently, al Shabaab is openly operating a number of websites to spread their toxic ideology of encouraging and justifying attacks inside Kenya, Somalia and the whole region.
There are three most notorious al Shabaab websites currently in active operation and are virtually unchallenged.

All of them are in Somali language, with the exception of one, which also runs a Kiswahili segment targeting and luring Kenyan youth with their glorified messages.

Another mostly posts audio and written material from al Shabaab official radio station Al Andalus, which is still on air in parts of Southern Somalia where the group is still in control.
It is in these dubious websites that the terrorist group often posts their written and audio messages after carrying out attacks, justifying and glorifying the killing of innocent people and encouraging further attacks.

The websites are used to actively recruit the next generation of terrorists by misleading young minds to join their 'noble struggle'.

The group regularly calls for the killing of Islamic religious and political leaders, including those in Kenya, who speak out against them.

So what can be done about these toxic websites and others similar to them that are furthering the evil agenda of terrorism in Kenya and the region?

Law enforcement agencies, especially those involved in cyber counter-terrorism, can have the websites taken down by contacting the companies hosting them. Typically, web-hosting companies host thousands of websites and may not be able to keep track of the activities of all those websites, allowing terrorist groups to take advantage of such loopholes.

In addition, al Shabaab websites are written in Somali and foreign web hosting companies may not be aware of their contents until they are alerted by law enforcement agencies.

But once they realise and confirm that they are hosting dangerous websites, web hosting companies take them down to avoid falling foul of the law, which prohibits hosting websites that promote terrorism and other criminal activities.

Since terrorist groups whose websites are taken down often quickly jump to other unsuspecting web hosting companies to keep their websites online, there is need for dedicated online counter-terrorism teams to prevent them from doing so.

It is time that Kenya, Somalia and countries in the region developed and enhanced their online 'armies' to deny al Shabaab a voice.

This 'army' should ensure that terrorist groups like al Shabaab do not take advantage of their Internet to promote, justify and glorify terrorism and recruit the next generation of killers.
Twitter has consistently and actively prevented al Shabaab and other terrorist groups from misusing their platform to spread terrorism.

In addition, last year, the US law enforcement agencies shut down a notorious pro-Shabaab website.

Al Shabaab may be the only terrorist organisation that is enjoying virtually unchallenged leeway to actively operate websites to promote their evil agenda.

Attempts by other terrorist groups like ISIS, al Qaeda and Boko Haram to take advantage of the Internet for their evil agenda continue to be actively thwarted. Al Shabaab should not be the exception.

All Africa

 

« More CEOs Discover Power of Analytics
Malware Tracks a Smartphone Without Location Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

iLand

iLand

iland is a global cloud service provider of secure and compliant hosting for infrastructure (IaaS), disaster recovery (DRaaS), and backup as a service (BaaS).

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Bigbee Technology

Bigbee Technology

Bigbee Technology are an IT solutions company based in Dar es Salaam founded by a group of professionals from around the globe.

SecureStream Technologies

SecureStream Technologies

SecureStream Technologies have built the IoT SafetyNet - the Network Security Analytics platform to Eliminate Security Threats, Guarantee Privacy, Ensure Compliance, Simply & Easily.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.