The idea you wish to view belongs to a community that requires acceptance of terms and conditions.
on
Introduction
Over the past four decades, cyber terrorists have been using the Internet as an advanced communication tool in which to quickly spread and organize their members and resources, causing an online radicalization through the use of social media in Global south. For instance, by using the instantaneous spread of information provided by the Internet, several terrorist’s groups have been able to quickly share information, coordinate attacks, spread propaganda, raise funds, and find new recruits for their cause in Africa. This was mainly possible by using co encryption.
I- Encrypted communications in Africa
Online communication terrorism was mainly possible by uses of encryption. As powerful encryption increasingly becomes embedded in electronic devices and online messaging apps, a range of criminal actors including Islamist terrorists are exploiting the technology to communicate and store information to cause damage and important loss. Today, al-Shabaab, Boko Haram, ISIL and other violent extremist groups in Africa use Twitter, Facebook, YouTube and other social media channels to broadcast their messages, inspire followers, and recruit new fighters to unprecedented levels.
There is end-to-end encryption, which has been the most usable encryption by Islamist terrorists in global South. The online messaging app Telegram was one of the earliest systems to support end-to-end encryption, and terrorists groups such as the Islamic State took advantage of it. These days, the feature has been added to most messaging apps, such as Signal, Wickr, and even Apple’s own iMessage. Recently, Facebook’s WhatsApp3 and Google4 announced they will be supporting Signal’s end-to-end encryption protocol which is a risk for online terrorism in Africa and other vulnerable countries.
A topical issue is the fact that the “source code” itself behind end-to-end encryption is now widely available online, which means that short of shutting down the internet, there is nothing that can be done to stop individuals, including terrorists, from creating and customizing their own encryption software.
2- Cyber-terrorism and radicalization on Social Media
Radicalization and Cyber-terrorism is becoming more and more prominent on social media today. As the internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups and use it to further their objectives.
Solutions
There are several ways we can fight against online terrorist communications based in Global South, mostly in Africa.
1) limit the access or remove the source code of end-to-end encryption from the internet.
It might seem literally impossible. But there are intelligence services such as NSA and others, which own tools that can track and remove it from the internet. The source code of end-to-end encryption allows terrorists to create their own software with the encryption features they want and cause meaningful damages and loss in Africa.
2) Using of "0dayn exploits"
0days are the archetypal cyber weapon. Intelligence services, such as NSA, use it to gain control of the computer or any devices used by terrorists. The virus can acquire all the information from the phone and unable the encryption. This technique gets away from remote signals detection to find a target. This could be helpful to help track cyber-terrorists in Global South.
3) Online-community policing
One of the best solutions to counter cyber-terrorism and violent extremism on social media in Africa, is to set an online community policing. Online-community policing of social-media can take the form of both the online presence of state-police as well as participatory user reporting of terrorists/extremists’ user-accounts and content. This will help in the cessation of online terrorism and violent extremism. A government will be able determine the type of content and accounts that cause the most harm and approved their subsequent removal.
4) Reinforcing Global Cyber norms
Now, terrorists can express themselves freely and anonymously online, much of the legal frameworks are becoming obsolete. Yet, governments have responded leisurely. There is a growing demand for responsible and accountable online governance to review and reinforce the global norms of cyber-security and jurisdiction. Suspending accounts for suspected terrorist. This will be possible by a partnership between the goverment the private partnerships that control the majority of the world's information flows. Mixed together, they will provide sustainable counter-terrorism solutions in Africa, South / South East Asia regions.
"A global effort is needed, where we all help each other by sharing knowledge. Norway, for example, can contribute by helping countries with emerging cyber strategies to develop suitable legislation, strengthen educational opportunities and establish standards for the purchase and usage of software," Niels Nagelhus Schia
John Schneider Recule / Lazar Marcson / Insky Pierre-Louis
https://wilbert-fils-pierre-louis-43.webself.net/project
https://www.undp.org/content/dam/rba/docs/Reports/UNDP-RAND-Social-Media-Africa-Research-Report_final_3 Oct.pdf / https://www.osce.org/secretariat/107810
Help to Improve This Idea.