UN Calls On Social Media to Act Against ‘Misuse’ by Extremists

Albarnawi-boko-twitter-619x357.png

Boko Haram Twitter Account 

A UN panel that advises the Security Council has called for Internet and social media companies to respond to the exploitation of their services by al-Qaida and other extremist groups who use the web to recruit fighters and spout “increasingly horrific propaganda”.

The panel recommended in a report that these companies brief the Security Council Committee monitoring sanctions against al-Qaida, its affiliates and the Islamic State group on measures they are taking to prevent such misuse.
“A worrisome trend over the past year has been the growth of high-definition digital terror: the use of propaganda, primarily by [Islamic State] and its sympathisers, to spread fear and promote their distorted ideology,” the panel of experts monitoring sanctions against extremist groups and individuals said in its report to the Security Council.

It said the scale of digital activity linked to Isis, and to a lesser extent some al-Qaida affiliates, had strategic implications for how the threat from extremists would evolve in the coming years among the “diverse, dispersed … diaspora of foreign terrorist fighters”.

In recommending that Internet and social media companies brief the sanctions committee, the panel said: “The scale of the digital threat linked to radicalisation, together with the need for concerted action on countering violent extremism, calls for further action by the security council”.

The Internet’s impact on extremist groups is one facet highlighted in the report, which covers the global threats posed by al-Qaida, its affiliates and Isis. Their actions have had an “enormous” human cost in recent months, it says, with major bombings, assassinations and exploitation of several million people in not only Iraq and Syria but also Afghanistan, Libya, Nigeria, Somalia and Yemen.

The panel said al-Qaida remained overshadowed by the attention paid to its splinter, the Islamic State group, which controls large swaths of Syria and Iraq. The grip of al-Qaida leader Ayman al-Zawahiri on affiliates appeared to be weakening, it said, and al-Qaida’s financial position remained precarious compared with that of Islamic State, which “can claim to have achieved what al-Qaida never did: the building of a territorial entity through terrorist violence”.

But al-Qaida and its affiliates still posed a serious threat in many parts of the world, the panel said, becoming more visible and active in Afghanistan over the past six months, while associated groups had grown in number in south and central Asia, and al-Shabaab, its affiliate in Somalia, remaining a major security threat in the Horn of Africa.

Southern Libya remained “a safe haven” for extremists planning attacks in the Maghreb and Sahel regions, and the experts said they have been told of anti-aircraft guns and portable air defence systems in the hands of extremist groups.
Boko Haram had expanded deadly incursions into Cameroon, Chad and Niger but the panel said its ability to maintain long-term control over 20,000 square kilometers of north-eastern Nigeria “will require heavier weaponry, access to natural resources and some ability to sustain a local population”.

It said the Indonesia-based extremist network Jemaah Islamiyah appeared to be reviving and was recruiting professionals including engineers and information specialists, which could pose “a significant long-term threat” to South East Asia.
Guardian: http://bit.ly/1LZfLMz

 

 

« AT&T helped NSA Spy on Domestic Citizens
Social Media and the 'Information War’- Russia is Winning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

Cyber Senate

Cyber Senate

Cyber Senate is dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

Rublon

Rublon

Rublon protects endpoints, networks and applications by providing trusted access via two-factor authentication (2FA).

Kleiner Perkins

Kleiner Perkins

For five decades, Kleiner Perkins has made history by partnering with some of the most ingenious and forward-thinking founders in technology and life sciences.

VIQU Recruitment

VIQU Recruitment

VIQU Recruitment was formed with the primary focus of providing 'Smarter People Solutions' to the UK’s professional IT & Cyber Security markets.

TrustMAPP

TrustMAPP

TrustMAPP automates cybersecurity & privacy assessments, with universal workflow, allowing teams to generate analytics and recommendations to align priorities for improvement.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.

Ever Nimble

Ever Nimble

Ever Nimble are award-winning experts in IT support, cybersecurity, and cloud technology. Our proactive approach will enhance your security and protect you from cyber security threats.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.

Barquin Solutions

Barquin Solutions

Barquin Solutions is a full-service information technology consulting firm focused on supporting U.S. federal government agencies and their partners.

National Renewable Energy Laboratory (NREL) - USA

National Renewable Energy Laboratory (NREL) - USA

NREL is transforming energy through research, development, commercialization, and deployment of renewable energy and energy efficiency technologies.

Core42

Core42

Core42 provides a full-spectrum of AI enablement solutions covering cloud, data, cybersecurity and digital services designed for customer success.