Download presentation
Presentation is loading. Please wait.
Published byClaire Mathews Modified over 8 years ago
1
Countering Terrorist Use of the Internet – a perspective from the United Nations (Lomonosov Moscow State University) 11 November 2010
2
Focus of this presentation: I.Brief Introduction of the UN Global Counter- Terrorism Strategy and the role of the UN Counter-Terrorism Implementation Task Force (CTITF) II.The CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes – work to date III.Upcoming project: developing effective counter- narratives
3
I.1 UN Global Counter-Terrorism Strategy Adopted by all 192 Member States in September 2006 First ever comprehensive framework for tackling the problem of terrorism at the global level Ownership of the Strategy broader than in traditional CT- discussions Scope and substance of the Strategy are unique.
4
I.2 UN Global Counter-Terrorism Strategy The Strategy broadens the scope of efforts by addressing the issue via four equally important pillars: I. Addressing the conditions conducive to the spread of terrorism II. Preventing and combating terrorism III. Building state capacity to prevent and combat terrorism and strengthening to role of the UN system in this regard IV.Ensuring respect for human rights for all and the rule of law as the fundamental basis of the fight against terrorism
5
I.3 UN Global Counter-Terrorism Strategy Mandate for Countering the Use of the Internet for Terrorist Purposes: Pillar 2, Para 12: Member States pledge “to work with the United Nations with due regard confidentiality, respect for human rights and in compliance with other obligations under international law, to explore means to: – a) t o coordinate efforts at the international and regional level to counter terrorism in all its forms and manifestations on the Internet; – b) use the Internet as a tool for countering the spread of terrorism“
6
I. 4 Counter-Terrorism Implementation Task Force (CTITF) and the CTITF Office The CTITF was established by the Secretary-General in 2005 to ensure coordination and coherence in the counter-terrorism efforts of the UN system. It consists of 30 entities of the UN system and INTERPOL working under their respective mandates. The CTITF Office serves as a single point-of-entry for MS on UN counter-terrorism programming, coordinates CTITF projects, raises awareness about the UN Strategy, and supports the 30 entities in their CT-related work.
8
II.1 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes no operational information, but aim is to raise MS- awareness of the threats/challenges as well as identify good practice co-chaired by 1267 AQ/Taliban MT and CTITF Office published report in 2009 providing a framework on which challenges governments have to consider Three-phase project: 2010: legal & technical aspects, and in 2011: counter-narratives
9
II.2 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Legal Response - three key trends: some countries apply existing cybercrime legislation to terrorist use of the Internet; some countries apply existing counter-terrorism legislation to Internet-related acts; some countries have enacted specific legislation on terrorist use of the Internet.
10
II.3 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Challenges Criminalization of available tools/publication of critical information Identity of suspects Automation/scale of activities
11
II.4 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Legal Responses: Internet related attacks illegal content (recruitment/propaganda material) communication financing of terrorism
12
II.5 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Legal Aspects - Conclusions problem not static, legal responses will have to be reviewed and adapted over time global initiatives/harmonization will likely have most impact importance of implementing regional instruments (i.e. CoE) & UN-TOC
13
II.6 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Technical Aspects WG brought together range of ICT experts, including from Member States, academia, and the private sector technology developments represent both a challenge and a valuable tool in global counter-terrorism efforts terrorist websites/chat-rooms (monitor vs. shut-down) role of social networking sites role of data encryption, steganography
14
II.6 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Technical Aspects the volume problem human rights/privacy concerns technology is no panacea in the fight against terrorism
15
III.1 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Next steps: developing counter-narratives third project phase will look at ways of active use of the internet to counter-terrorism understanding the terrorist narrative/recruitment & radicalization process developing effective counter-narratives identifying credible messengers (role of victims and ex- terrorists)
16
For more information please contact: CTITF-Office Jan Neutze Department of Political Affairs United Nations Tel: +1-917-367-5758 Fax: +1-212-963-4199 E-mail: neutze@un.org Web: http://www.un.org/terrorism
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.