• No_Ads
Science & technology
Beware of terrorists on social mediaPublish Date: Dec 03, 2013
Beware of terrorists on social media
  • mail
  • img

By Angela Ndagano

How well do I know my Facebook Friends?  Is the Facebook group I am part of used to spread Terrorism propaganda?  Who is posting strange videos on my wall? These are some of the questions every social media user should keep in mind as they go about their business. Terrorists are on Social media!

In 2012, a study conducted by Gabriel Weimann from the University of Haifa, a public Research university in Israel found that nearly 90% of organized terrorism on the internet takes place via social media.  The study revealed that terror groups use social media platforms like Twitter, Facebook, YouTube and internet forums to spread their messages and recruit members. The study further revealed that the social media was enabling the terror organizations to take initiatives by making 'Friend' requests, uploading video clips, and the like.

In the same year, a report by the United Nations office on Drugs and Crime, titled “The Use of Internet for terrorist purposes’’ revealed that Terrorist groups and their supporters use the Internet to recruit, finance, train and incite followers to commit acts of terrorism, as well as to spread propaganda and gather and disseminate information for terrorist purposes.

But long before the studies, back in October 2005, Scotland Yard officers in West London arrested 22-year-old, Younis Tsouli.  Tsouli alias Irhaby 007 was celebrated by other online terrorists for his hacking prowess and his ability to securely distribute information. It is widely believed that Irhaby 007 passed this knowledge along to other online jihadists through web postings such as his "Seminar for Hacking Websites," creating a network of technology-savvy terrorist disciples.

During the recent attack on Westgate shopping mall in Kenya, Al-Shabaab Militants made use of Twitter to claim responsibility for the attack. The account was shut down but hours later an account with details of real-time updates of the siege resurfaced—it was later shut down.

Like most Social networking sites, Twitter prohibits activity if users publish or post direct, specific threats of violence against others but the problem is that doesn't actively monitor the content in search of the above threats. Instead, it relies on users to report in case they notice violations to the rules. Therefore, you are responsible for whatever content is displayed on your account.

So, with Uganda under threat of terrorist attack, it is important for people not only to be vigilant on streets but also on the Internet.  After all, social networking is now part of our daily lives.

According to Julius Kamugasa, a Software developer with HRP solutions,  Terrorists can take advantage of social networking sites because they have applications like games that are normally developed by third parties and whenever you add an application, you are granting it access to your account.

“Many people forget to whom they've granted access, so it is important to take time to review your apps and other add-ons and revoke access from any you don't use or don't remember installing,’’ Kamugasa explains.

He adds that every user should take time to regularly review their privacy and other account settings on social sites to ensure they meet the current expectations and needs.

“For users who share computers, it’s important to turn on browser security features like In private browsing for internet explorer which is one of the mostly used browsers. This enables you to surf the web without leaving a trail in internet explorer and prevents anyone else who might be using the computer from seeing where you visited and what you looked at on the web”, he adds.

Kamugasa points out tracking protection as another in built feature that can help users stay in control of their privacy.

“With Tracking Protection lists you can choose which third party sites can receive your information and track you online. You can block content from websites that might have an impact on your privacy. Surprisingly all these tools come preinstalled and are free though a few people make use of them”.


The statements, comments, or opinions expressed through the use of New Vision Online are those of their respective authors, who are solely responsible for them, and do not necessarily represent the views held by the staff and management of New Vision Online.

New Vision Online reserves the right to moderate, publish or delete a post without warning or consultation with the author.Find out why we moderate comments. For any questions please contact digital@newvision.co.ug

  • mail
  • img
blog comments powered by Disqus
Also In This Section
First Earth-sized planet found in
An international team of researchers has discovered the first Earth-sized planet within the "habitable zone" of another star in a hunt for potential life in outer space....
Chrome Remote Desktop arrives on Android
GOOGLE launched a Chrome Remote Desktop app for Android, which lets you remotely control your computer using your smartphone or tablet. You can download the new app now directly from Google Play...
Samsung patents Google Glass rival
SAMSUNG Galaxy Glass, the company’s upcoming Google Glass rival, has been teased by a patent filing which shows off the headset’s mono-display design...
Samsung Galaxy S5 review
THE Samsung Galaxy S5 is official with a ton of new features and improvements. But does it live up to the hype?...
Facebook received 28,147 gov
FACEBOOK revealed the number of data requests it received from various law enforcement agencies around the world in the second half of last year: 28,147 impacting 38,256 accounts...
Samsung looks to life beyond the smartphone
AFTER years of record profit growth, tech giant Samsung Electronics looks to be at a commercial crossroads as it searches for a new growth driver to counter slowing sales...
WIll the national ID registration process be completed in the scheduled 4 months timeframe?
Can't Say
follow us
subscribe to our news letter