Terrorist Activities On Social Media

For nearly 20 years, the financial sector has been required to report suspicions of terrorist-related transactions. Should similar requirements apply to suspicious communications on social media?

In response to the increased use of social media by extremist groups, the G7 called in May ‘for Communication Service Providers and social media companies to substantially increase their efforts to address terrorist content’. Prime Minister Theresa May had previously expressed the view that companies should ‘report this vile content to the authorities and block the users who spread it’.

Expecting private companies to report terrorist-related activities is not unprecedented: consistent with the recommendations of the Financial Action Task Force (FATF), the global standard-setter in the areas of anti-money laundering and counterterrorist financing, financial institutions are required to file a suspicious transaction report if they suspect any funds to be related to terrorist financing.

Accordingly, transaction reports may provide a useful point of reference when considering recent proposals to introduce reporting requirements for certain types of social media content.

For someone on the outside, it might seem odd that, under current rules, transactions suspected of funding terrorist acts have to be reported to authorities, whereas public communications promoting the same acts generally do not. 
After all, the people that propaganda is meant to attract are as critical to terrorist networks as financial resources. Instead of reporting requirements, the communications monitoring regime relies primarily on the authorities’ ability to intercept data, including through bulk powers.

The reasons for the differences between the monitoring regimes for communications and financial transactions go back to their origins.

Current counterterrorist financing regulations have to a large extent been shaped by the pre-existing anti-money laundering framework. The design of anti-money laundering rules had been influenced by the earlier principle of bank secrecy, namely the notion that banks (in certain jurisdictions) are contractually prevented from disclosing information about their customers.
As a result, the monitoring regime for financial transactions has traditionally placed a primary responsibility on financial institutions to act as gatekeepers and decide on a case-by-case basis which transactions need to be reported to the public authorities.

The monitoring regime for communications has also had to be reconciled with privacy concerns, in particular secrecy of correspondence and freedom of speech. Yet, unlike for the financial sector, the infrastructure for communications (for example, postal services and telecommunications networks) has historically fallen within the purview of governments rather than private actors.

Accordingly, the monitoring regime was predicated on the assumption that law enforcement authorities have the ability to intercept most communications and obtain information without private sector involvement. The monitoring regime for communications has therefore focused on defining the circumstances in which authorities are allowed to make use of their ability to intercept communications, rather than on introducing mechanisms for private entities to share information with public authorities.

However, are such traditional distinctions still relevant? Or should monitoring regimes be more closely aligned?
Unlike traditional communications infrastructure, social media networks have largely been developed without government involvement. Rather, they are run by private actors who have the technical ability to limit external access to the content of communications, such as through encryption.

Technological progress has therefore created the room (and possibly the need) for stronger private sector involvement in the monitoring of communications. Conversely, new technologies may in the future reduce the role of traditional financial institutions in transaction monitoring: virtual currencies, such as Bitcoin, allow users to conduct transactions outside the established financial system, without the involvement of any entity subject to reporting requirements.

Social media companies have not only reshaped the structure of communications networks. By offering payment services, such as money transfers among users, they have also blurred the lines between sectors.

In other words, social media companies are now subject to reporting requirements for some of their activities, such as transactions intended to fund terrorist groups, but not for others, including communications promoting a terrorist group.
In addition, from a criminological point of view, the traditional difference between terrorist propaganda and financing has become more difficult to draw as the definition of the latter has been broadened beyond the specific act of funding a terrorist act or organisation.

For example, according to FATF Recommendation 5, terrorist financing offences should also include attempts to collect funds with the intent that these should be used by an individual terrorist or a terrorist organisation.
This suggests that a public fundraising campaign on a social media platform, which could be considered as a form of communication, would need to be reported as a potential terrorist financing offence.

At a time when security authorities are grappling with the technical innovations available to terrorists and are relying increasingly on private sector actors to assist with their identification and disruption efforts, access to information held by these actors is critical. 

In order to ensure that information is shared effectively, the nature of the relationship between the public and private sectors in each of the financial and communications areas needs to be updated to reflect the evolution of their respective roles since regulations were first conceived.

In this context, any discussions on new reporting requirements for social media companies may benefit from the lessons learnt from the regime for suspicious financial transaction reporting.

RUSI:

You Might Also Read:

Scenarios For Predicting Terrorist Attacks:

Facebook, Twitter and Google Are A 'recruiting platform for terrorism':

Facebook Deploys AI To Block Terror Propaganda:

 

 

« Cyber Caliphate's Scorecard
Cybersecurity: The Cold War Online »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

National Cyber-Forensics & Training Alliance (NCFTA)

National Cyber-Forensics & Training Alliance (NCFTA)

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

Cryptovision

Cryptovision

Cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

ECOMPLY

ECOMPLY

ECOMPLY is an all-in-one GDPR Compliance Solution. Efficient data protection management system for businesses and DPOsomply.

Stratejm

Stratejm

Stratejm, a Next Generation Managed Security Services Provider, brings innovation and thought leadership to the fight against cyber criminals.

Acreto

Acreto

Acreto is an end-to-end security infrastructure that protects all your technologies with a single, simple cloud service.

Kintent

Kintent

With Kintent, compliance becomes a habit, is simple to understand and achieve, and is continuously testable so that your customers can see that you are adhering to all your trust obligations.

Sollensys

Sollensys

Sollensys is a leader in commercial blockchain applications. Our flagship product, The Blockchain Archive Server™ is the best defense against the devastating financial loss that ransomware causes.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Park Place Technologies

Park Place Technologies

Park Place Technologies' mission is to drive uptime, performance and value for critical IT infrastructure.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

One Step Secure IT

One Step Secure IT

One Step provide Managed IT Services, Cybersecurity Protections, and Compliance to businesses in the USA nationwide.