• No_Ads
Science & technology
Beware of terrorists on social mediaPublish Date: Dec 03, 2013
Beware of terrorists on social media
  • mail
  • img
newvision

By Angela Ndagano

How well do I know my Facebook Friends?  Is the Facebook group I am part of used to spread Terrorism propaganda?  Who is posting strange videos on my wall? These are some of the questions every social media user should keep in mind as they go about their business. Terrorists are on Social media!

In 2012, a study conducted by Gabriel Weimann from the University of Haifa, a public Research university in Israel found that nearly 90% of organized terrorism on the internet takes place via social media.  The study revealed that terror groups use social media platforms like Twitter, Facebook, YouTube and internet forums to spread their messages and recruit members. The study further revealed that the social media was enabling the terror organizations to take initiatives by making 'Friend' requests, uploading video clips, and the like.

In the same year, a report by the United Nations office on Drugs and Crime, titled “The Use of Internet for terrorist purposes’’ revealed that Terrorist groups and their supporters use the Internet to recruit, finance, train and incite followers to commit acts of terrorism, as well as to spread propaganda and gather and disseminate information for terrorist purposes.

But long before the studies, back in October 2005, Scotland Yard officers in West London arrested 22-year-old, Younis Tsouli.  Tsouli alias Irhaby 007 was celebrated by other online terrorists for his hacking prowess and his ability to securely distribute information. It is widely believed that Irhaby 007 passed this knowledge along to other online jihadists through web postings such as his "Seminar for Hacking Websites," creating a network of technology-savvy terrorist disciples.

During the recent attack on Westgate shopping mall in Kenya, Al-Shabaab Militants made use of Twitter to claim responsibility for the attack. The account was shut down but hours later an account with details of real-time updates of the siege resurfaced—it was later shut down.

Like most Social networking sites, Twitter prohibits activity if users publish or post direct, specific threats of violence against others but the problem is that doesn't actively monitor the content in search of the above threats. Instead, it relies on users to report in case they notice violations to the rules. Therefore, you are responsible for whatever content is displayed on your account.

So, with Uganda under threat of terrorist attack, it is important for people not only to be vigilant on streets but also on the Internet.  After all, social networking is now part of our daily lives.

According to Julius Kamugasa, a Software developer with HRP solutions,  Terrorists can take advantage of social networking sites because they have applications like games that are normally developed by third parties and whenever you add an application, you are granting it access to your account.

“Many people forget to whom they've granted access, so it is important to take time to review your apps and other add-ons and revoke access from any you don't use or don't remember installing,’’ Kamugasa explains.

He adds that every user should take time to regularly review their privacy and other account settings on social sites to ensure they meet the current expectations and needs.

“For users who share computers, it’s important to turn on browser security features like In private browsing for internet explorer which is one of the mostly used browsers. This enables you to surf the web without leaving a trail in internet explorer and prevents anyone else who might be using the computer from seeing where you visited and what you looked at on the web”, he adds.

Kamugasa points out tracking protection as another in built feature that can help users stay in control of their privacy.

“With Tracking Protection lists you can choose which third party sites can receive your information and track you online. You can block content from websites that might have an impact on your privacy. Surprisingly all these tools come preinstalled and are free though a few people make use of them”.

 

The statements, comments, or opinions expressed through the use of New Vision Online are those of their respective authors, who are solely responsible for them, and do not necessarily represent the views held by the staff and management of New Vision Online.

New Vision Online reserves the right to moderate, publish or delete a post without warning or consultation with the author.Find out why we moderate comments. For any questions please contact digital@newvision.co.ug

  • mail
  • img
blog comments powered by Disqus
Also In This Section
Facebook launches Newswire for journalists
FACEBOOK has launched FB Newswire, the company announced today, which is a product of a partnership with News Corp-owned Storyful and which promises to offer journalists a repository...
NASA astronaut shares spacewalk selfie
DURING Wednesday's fast-track spacewalk, NASA astronaut Rick Mastracchio complained that his arms were too short to take a selfie. But that didn't stop him from trying, or from sharing the results...
WhatsApp passes 500 million active users
WHATSAPP while announcing that the app has 500 million active users, has been adding around 25 million new active users every month, a pace that isn’t slowing...
Twitter’s new design available for all
AFTER announcing its new Facebook-inspired profile pages earlier this month, Twitter is finally rolling out the new look to all of its users...
Twitter blocks accounts critical of Turkish gov’t
TWITTER appears to have blocked two anonymous accounts that were used to release secretly recorded conversations implicating Turkish Prime Minister Recep Tayyip Erdogan and senior government officials...
Galaxy S5 fingerprint sensor hacked
THE fingerprint security on Samsung's flagship Galaxy S5 phone has been hacked by a German team, who warn that its implementation is less secure...
WIll the national ID registration process be completed in the scheduled 4 months timeframe?
Yes
No
Can't Say
follow us
subscribe to our news letter