Your browser does not support JavaScript. Please to enable it.

Terms & Conditions

The idea you wish to view belongs to a community that requires acceptance of terms and conditions.


    Help to Improve This Idea.


    Prev | Next

    Proposal to crack the different types of encryption and to set an effective online-community policing to counter online terrorist communications in Global South.

    by Wilbert Fils PIERRE-LOUIS 11/15/2019 04:52 PM GMT

    • {{:upVoteCount}}
    Username * ()

        Move idea from "Submission and Collaboration" stage to:


          Which workspace template do you wish to use?

          I accept the terms and conditions (see side bar). I understand all content I am submitting must be licensed under an open-source software or Creative Commons license as described in the Terms and Conditions:




          Over the past four decades, cyber terrorists have been using the Internet as an advanced communication tool in which to quickly spread and organize their members and resources, causing an online radicalization through the use of social media in Global south. For instance, by using the instantaneous spread of information provided by the Internet, several terrorist’s groups have been able to quickly share information, coordinate attacks, spread propaganda, raise funds, and find new recruits for their cause in Africa. This was mainly possible by using co encryption.


          I- Encrypted communications in Africa

          Online communication terrorism was mainly possible by uses of encryption. As powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, a range of criminal actors including Islamist terrorists are exploiting the technology to communicate and store information to cause damage and important loss. Today, al-Shabaab, Boko Haram, ISIL and other violent extremist groups in Africa use Twitter, Facebook, YouTube and other social media channels to broadcast their messages, inspire followers, and recruit new fighters to unprecedented levels.

          There is end-to-end encryption, which has been the most usable encryption by Islamist terrorists in global South. The online messaging app Telegram was one of the earliest systems to support end-to-end encryption, and terrorists groups such as the Islamic State took advantage of it.  These days, the feature has been added to most messaging apps, such as Signal, Wickr, and even Apple’s own iMessage. Recently, Facebook’s WhatsApp3 and Google4 announced they will be supporting Signal’s end-to-end encryption protocol which is a risk for online terrorism in Africa and other vulnerable countries.

          A topical issue is the fact that the “source code” itself behind end-to-end encryption is now widely available online, which means that short of shutting down the internet, there is nothing that can be done to stop individuals, including terrorists, from creating and customizing their own encryption software.

          2- Cyber-terrorism and radicalization on Social Media

          Radicalization and Cyber-terrorism is becoming more and more prominent on social media today. As the internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups and use it to further their objectives.



          There are several ways we can fight against online terrorist communications based in Global South, mostly in Africa.

          1) limit the access or remove the source code of end-to-end encryption from the internet.

          It might seem literally impossible. But there are intelligence services such as NSA and others, which own tools that can track and remove it from the internet. The source code of end-to-end encryption allows terrorists to create their own software with the encryption features they want and cause meaningful damages and loss in Africa.

          2) Using of "0dayn exploits"

          0days are the archetypal cyber weapon. Intelligence services, such as NSA, use it to gain control of the computer or any devices used by terrorists. The virus can acquire all the information from the phone and unable the encryption. This technique gets away from remote signals detection to find a target. This could be helpful to help track cyber-terrorists in Global South.

          3) Online-community policing

          One of the best solutions to counter cyber-terrorism and violent extremism on social media in Africa, is to set an online community policing. Online-community policing of social-media can take the form of both the online presence of state-police as well as participatory user reporting of terrorists/extremists’ user-accounts and content. This will help in the cessation of online terrorism and violent extremism. A government will be able determine the type of content and accounts that cause the most harm and approved their subsequent removal.

          4) Reinforcing Global Cyber norms

          Now, terrorists can express themselves freely and anonymously online, much of the legal frameworks are becoming obsolete. Yet, governments have responded leisurely. There is a growing demand for responsible and accountable online governance to review and reinforce the global norms of cyber-security and jurisdiction. Suspending accounts for suspected terrorist. This will be possible by a partnership between the goverment the private partnerships that control the majority of the world's information flows. Mixed together, they will provide sustainable counter-terrorism solutions in Africa, South / South East Asia regions.

          "A global effort is needed, where we all help each other by sharing knowledge. Norway, for example, can contribute by helping countries with emerging cyber strategies to develop suitable legislation, strengthen educational opportunities and establish standards for the purchase and usage of software,"  Niels Nagelhus Schia

          Co-authors to your solution

          John Schneider Recule / Lazar Marcson / Insky Pierre-Louis

          Link to your documentation or presentation.

          Link to an online working solution or prototype

          Link to a video or screencast of your proposal or prototype.

          Link to your source code, data, images, or other assets.

 Oct.pdf /


          Move this Idea

          Select a Category

          Close this idea

          When closing an idea, you must determine whether the idea has exited successfully or unsuccessfully.

          Copy idea to another community

          Add Team Members

            Maximum number of team members allowed: 15

            Help to Improve This Idea.

            User Tasks ?
            Required for graduation.
            Task Assigned to Due Date Status
            Review Panel 12/30/2019 Incomplete
            No ideas found!
            No activities yet.