UN Calls On Social Media to Act Against ‘Misuse’ by Extremists

Albarnawi-boko-twitter-619x357.png

Boko Haram Twitter Account 

A UN panel that advises the Security Council has called for Internet and social media companies to respond to the exploitation of their services by al-Qaida and other extremist groups who use the web to recruit fighters and spout “increasingly horrific propaganda”.

The panel recommended in a report that these companies brief the Security Council Committee monitoring sanctions against al-Qaida, its affiliates and the Islamic State group on measures they are taking to prevent such misuse.
“A worrisome trend over the past year has been the growth of high-definition digital terror: the use of propaganda, primarily by [Islamic State] and its sympathisers, to spread fear and promote their distorted ideology,” the panel of experts monitoring sanctions against extremist groups and individuals said in its report to the Security Council.

It said the scale of digital activity linked to Isis, and to a lesser extent some al-Qaida affiliates, had strategic implications for how the threat from extremists would evolve in the coming years among the “diverse, dispersed … diaspora of foreign terrorist fighters”.

In recommending that Internet and social media companies brief the sanctions committee, the panel said: “The scale of the digital threat linked to radicalisation, together with the need for concerted action on countering violent extremism, calls for further action by the security council”.

The Internet’s impact on extremist groups is one facet highlighted in the report, which covers the global threats posed by al-Qaida, its affiliates and Isis. Their actions have had an “enormous” human cost in recent months, it says, with major bombings, assassinations and exploitation of several million people in not only Iraq and Syria but also Afghanistan, Libya, Nigeria, Somalia and Yemen.

The panel said al-Qaida remained overshadowed by the attention paid to its splinter, the Islamic State group, which controls large swaths of Syria and Iraq. The grip of al-Qaida leader Ayman al-Zawahiri on affiliates appeared to be weakening, it said, and al-Qaida’s financial position remained precarious compared with that of Islamic State, which “can claim to have achieved what al-Qaida never did: the building of a territorial entity through terrorist violence”.

But al-Qaida and its affiliates still posed a serious threat in many parts of the world, the panel said, becoming more visible and active in Afghanistan over the past six months, while associated groups had grown in number in south and central Asia, and al-Shabaab, its affiliate in Somalia, remaining a major security threat in the Horn of Africa.

Southern Libya remained “a safe haven” for extremists planning attacks in the Maghreb and Sahel regions, and the experts said they have been told of anti-aircraft guns and portable air defence systems in the hands of extremist groups.
Boko Haram had expanded deadly incursions into Cameroon, Chad and Niger but the panel said its ability to maintain long-term control over 20,000 square kilometers of north-eastern Nigeria “will require heavier weaponry, access to natural resources and some ability to sustain a local population”.

It said the Indonesia-based extremist network Jemaah Islamiyah appeared to be reviving and was recruiting professionals including engineers and information specialists, which could pose “a significant long-term threat” to South East Asia.
Guardian: http://bit.ly/1LZfLMz

 

 

« AT&T helped NSA Spy on Domestic Citizens
Social Media and the 'Information War’- Russia is Winning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Defense Advanced Research Projects Agency (DARPA)

Defense Advanced Research Projects Agency (DARPA)

DARPA's mission is to develop breakthrough technologies for national security. The Information Innovation Office undertakes cyber security activities.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Korea Information Security Industry Association (KISIA)

Korea Information Security Industry Association (KISIA)

KISIA is a non-profit organization for the information security industry in Korea.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group, Ltd. (STIGroup) is an innovative firm that provides CyberSecurity consulting, secure IT engineering, managed security services, and human capital solutions.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

CyberGuard Technologies

CyberGuard Technologies

CyberGuard Technologies provides a suite of fully managed end-to-end security services from its 24/7 UK security operations centre.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

Metallic.io

Metallic.io

Metallic (formerly TrapX) is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and other threats.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.