Security Council - Counter-Terrorism Committee (CTC) - ?Human Rights /securitycouncil/ctc/tags/%C2%A0human-rights en Special meeting of the Security Council Counter-Terrorism Committee on Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms /securitycouncil/ctc/news/special-meeting-security-council-counter-terrorism-committee-preventing-exploitation <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-23216" class="file file-image file-image-png"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/23216">16-00152a_web-image.png</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/16-00152a_web-image.png?itok=ATS0f5NN" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Member States continue to face a significant and growing threat from the abuse of information and communication technologies (ICT), in particular the Internet and social media, for terrorist purposes. In a number of resolutions, the Security Council recognizes this risk, and calls upon Member States to adopt necessary measures to prevent and address the threat this represents.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">In its Presidential Statement in May 2016 (S/PRST/2016/6), the Security Council requested its Counter-Terrorism Committee (CTC) to present a proposal for a comprehensive international framework with recommended guidelines and good practices to effectively counter the ways in which terrorist groups use their narratives to encourage, motivate, and recruit others to commit terrorist acts. As part of this work, and following on other initiatives, the Counter-Terrorism Committee will organize a special meeting on “Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms.” Taking place at&nbsp;<b>United Nations headquarters on Thursday 1 December 2016 in Conference room 4</b>, the special meeting is open to Member and Observer States, members of the media including photographers with valid accreditation, United Nations staff and interns, UN entities, intergovernmental organizations, and specialized agencies, as well as invited guests with a valid UN grounds pass. The event will be webcast at&nbsp;<a href="http://webtv.un.org/" style="color:#0563c1; text-decoration:underline" target="_blank">webtv.un.org</a>.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The special meeting will be preceded by a series of preparatory technical sessions, organized by the Counter-Terrorism Committee Executive Directorate (CTED) on Wednesday 30 November and in the morning of Thursday 1 December.</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Additional details can be found below. More information about the special meeting on a similar theme held in December 2015 can be found&nbsp;<a href="/sc/ctc/news/2015/11/19/special-meeting-of-the-counter-terrorism-committee-and-technical-sessions-of-the-counter-terrorism-committee-executive-directorate-on-preventing-and-combating-abuse-of-ict-for-terrorist-purposes-new/" style="color:#0563c1; text-decoration:underline" target="_blank">here</a>.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Please RSVP&nbsp;<a href="https://docs.google.com/forms/d/e/1FAIpQLSdJW52-BKctAEfy6Z1QoNgxh5wQkSR0QipihNZ5yDCcTKqpaQ/viewform?c=0&amp;ampampampw=1" style="color:#0563c1; text-decoration:underline" target="_blank">here</a>.</span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span lang="FR-BE" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Documents</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/concept-note_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Concept note</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted-technical-meeting-agenda-30-november-update.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Agenda, technical meeting</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/ctc-meeting-agenda-30-november-update.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Agenda, CTC special meeting</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/private-sector-engagement-in-responding-to-the-use-of-the-internet-and-ict-for-terrorist-purposes.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">ICT4国产AV report – Private sector engagement in responding to the use of the Internet and ICT for terrorist purposes</a></span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Presentations</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-i-30-nov-arije-antinori-european-counter-terrorism-centre-ectc.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session I 30 Nov – Arije Antinori, European Counter-Terrorism Centre (ECTC)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-i-30-nov-v.s.-subrahmanian-university-of-maryland.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session I 30 Nov – V.S. Subrahmanian, University of Maryland</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-cancelled-vidia-arianti-icpvtr.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30 – Vidia Arianti, ICPVTR</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-v-30-nov-maxim-grigoryev-the-foundation-for-the-study-of-democracy.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session V 30 Nov – Maxim Grigoryev, The Foundation for the Study of Democracy</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="https://www.youtube.com/watch?v=YJtpkwt-ifQ&amp;feature=youtu.be" style="color:#0563c1; text-decoration:underline" target="_blank">2016-12-01-Session I 1 Dec – Rafal Rohozinski, CEO and Chief Innovation Officer at SecDev Group, ICT4国产AV</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-12-01-session-v-1-dec-dr.-mahmoud-nagah-ahmed-farag-khalaf-al-azhar-observer.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-12-01-Session V 1 Dec – Dr. Mahmoud Nagah Ahmed Farag Khalaf, Al-Azhar Observer</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/draft-speech-for-cted-jk-dec16-3.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Speech By Jan Kleijssen Director Information Society and Action against Crime Directorate Directorate General Human Rights and Rule of Law – DGI Council of Europe</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/contribution-oif-1erdec2016.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Contribution de Mme Patricia Herdt, Représentante permanente a.i.<br /> de l’Organisation internationale de la Francophonie (OIF) auprès des Nations Unies</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted.speech-by-dr.reham-abdullah-1.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">“International Cooperation and Public-Private Partnership while Respecting International Human Rights” A Speech Delivered by: Dr. Reham Abdullah Salamah</a></span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Media coverage</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/sc/ctc/news/media-coverage#ICTSpecialMeeting2016" style="color:#0563c1; text-decoration:underline" target="_blank">Related media coverage</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231468426001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session III)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-ii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231453278001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session II)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-i-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231417917001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session I)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-v-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5231030818001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session V)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iv-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5230102412001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session IV)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229986185001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session III)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-ii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229934173001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session II)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-i-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229657438001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session I)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Wed, 30 Nov 2016 17:13:00 +0000 BMUSONI 21320 at /securitycouncil/ctc On eve of first-year anniversary of the Madrid guiding principles, side event on foreign terrorist fighters focuses on prosecution, rehabilitation, and reintegration challenges /securitycouncil/ctc/news/eve-first-year-anniversary-madrid-guiding-principles-side-event-foreign-terrorist-fighters <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-family: Roboto; font-size: 12pt;">At a side event held at the United Nations on 1 July 2016 on the theme of foreign terrorist fighters, Member States, UN entities, and civil society representatives discussed prosecution, rehabilitation, and reintegration challenges of this threat. On the eve of the first-year anniversary of a special meeting of the Security Council Counter-Terrorism Committee in Madrid, the side event – which was co-organized by New Zealand and Spain – offered participants a chance to discuss lessons learned and the Madrid guiding principles on stemming the flow of foreign terrorist fighters.</span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">In his opening remarks, Assistant Secretary-General and Executive Director of the Counter-Terrorism Committee Executive Directorate (CTED) Jean-Paul Laborde stressed that as Dae’sh is losing territory on the battlefield in Syria and Iraq, there will be an increase in foreign terrorist fighters returning to their countries of origin. “The involvement of FTF returnees in terrorist plots increases the rate of execution of those plots by 61 per cent and the rate of fatalities by 129 per cent,” he said. “These new and emerging threats demonstrate that the Counter-Terrorism Committee must continue to counter the threats posed, and the United Nations Counter-Terrorism bodies be coordinated in their responses and approaches.”</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Several speakers addressed the benefits of rehabilitation and reintegration, including reducing prison-based recruitment, and enabling intervention before serious criminal conduct occurs. Moreover, they called for rehabilitation and reintegration to be integrated within judicial and prosecutorial strategies. As Mr. Luigi Marini, Legal Advisor, Permanent Mission of Italy to the United Nations, highlighted “there needs to be a balance between opportunity, rule of law, rehabilitation, and the criminal justice system, in order to identify and analyse threats to national security.”</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Speakers further underlined the importance of having individualised and adaptive measures in order to avoid a one-size-fits-all approach. Mr. Chris O’Donnell, DDR Policy and Planning Officer in the Office of Rule of Law and Security Institutions (OROLSI) in the Department of 国产AVkeeping Operations (DPKO) of the United Nations, provided an example of an alternative to incarceration. He described a rehabilitation programme in Somalia that provides vocational training, community engagement, and religious outreach for returning al-Shabab fighters. Moreover, Dr. Bibi Van Ginkel, Senior Resarch Fellow, Clingendael Institute and the International Centre for Counter-Terrorism (ICCT), called for “Member States to take into consideration the role that the military can potentially play as first responders in evidence collection.”</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Other experts, such as Mr. David Scharia, Senior Legal Officer with CTED, spoke about the ways in which “Member States can develop a broad set of legal tools and work with prosecutors and investigators to avoid binary options. Prosecution, rehabilitation and reintegration should be all part of one holistic FTF strategy” Mr. Scharia also called for risk-based evidence and stressed the importance of different “exit points during the criminal proceedings” in which Government officials and local communities can assist people to move away from the radicalisation process.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Speakers stressed the importance of the 35 Guiding Principles, adopted in Madrid last year and later endorsed by the Security Council, as an important and effective tool to countering terrorism.</span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Fri, 01 Jul 2016 16:13:00 +0000 BMUSONI 21939 at /securitycouncil/ctc S/2016/50 – Global survey of the implementation of Security Council resolution 1624 (2005) by Member States /securitycouncil/ctc/news/s201650-%E2%80%93-global-survey-implementation-security-council-resolution-1624-2005-member-states <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Security Council resolution 1624 (2005) is aimed primarily at the threat posed by incitement to commit a terrorist act or acts.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://www.un.org/en/ga/search/view_doc.asp?symbol=S/2016/50&amp;referer=http://www.un.org/en/documents/index.html&amp;Lang=A" style="color:#0563c1; text-decoration:underline" target="_blank"><span style="font-family:&quot;Times New Roman&quot;,serif">????</span></a>&nbsp;<a href="http://www.un.org/en/ga/search/view_doc.asp?symbol=S/2016/50&amp;referer=http://www.un.org/en/documents/index.html&amp;Lang=C" style="color:#0563c1; text-decoration:underline" target="_blank"><span lang="ZH-CN" style="font-family:DengXian">中文</span></a>&nbsp;<a href="http://www.un.org/en/ga/search/view_doc.asp?symbol=S/2016/50&amp;referer=http://www.un.org/en/documents/index.html&amp;Lang=E" style="color:#0563c1; text-decoration:underline" target="_blank">English</a>&nbsp;<a href="http://www.un.org/en/ga/search/view_doc.asp?symbol=S/2016/50&amp;referer=http://www.un.org/en/documents/index.html&amp;Lang=F" style="color:#0563c1; text-decoration:underline" target="_blank">Fran?ais</a>&nbsp;<a href="http://www.un.org/en/ga/search/view_doc.asp?symbol=S/2016/50&amp;referer=http://www.un.org/en/documents/index.html&amp;Lang=R" style="color:#0563c1; text-decoration:underline" target="_blank">Русский</a>&nbsp;<a href="http://www.un.org/en/ga/search/view_doc.asp?symbol=S/2016/50&amp;referer=http://www.un.org/en/documents/index.html&amp;Lang=S" style="color:#0563c1; text-decoration:underline" target="_blank">Espa?ol</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Thu, 03 Mar 2016 19:11:00 +0000 BMUSONI 22203 at /securitycouncil/ctc Special meeting of the Counter-Terrorism Committee and technical sessions of the Counter-Terrorism Committee Executive Directorate on preventing and combating abuse of ICT for terrorist purposes, New York, 16-17 December 2015 /securitycouncil/ctc/news/special-meeting-counter-terrorism-committee-and-technical-sessions-counter-terrorism-committee <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-24309" class="file file-image file-image-jpeg"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/24309">cted_ict_website_600px2.jpg</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/cted_ict_website_600px2.jpg?itok=rLusnjea" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">How can terrorists be stopped from exploiting the Internet and social media?</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><i><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Special meeting of the Security Council Counter-Terrorism Committee and its Executive Directorate 16-17 December 2015</span></span></span></i></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><v:rect filled="f" href="/sc/ctc/wp-content/uploads/2015/11/twitter-icon.png" id="Rectangle_x0020_242" o:button="t" o:gfxdata="UEsDBBQABgAIAAAAIQC75UiUBQEAAB4CAAATAAAAW0NvbnRlbnRfVHlwZXNdLnhtbKSRvU7DMBSF<br /> dyTewfKKEqcMCKEmHfgZgaE8wMW+SSwc27JvS/v23KTJgkoXFsu+P+c7Ol5vDoMTe0zZBl/LVVlJ<br /> gV4HY31Xy4/tS3EvRSbwBlzwWMsjZrlprq/W22PELHjb51r2RPFBqax7HCCXIaLnThvSAMTP1KkI<br /> +gs6VLdVdad08ISeCho1ZLN+whZ2jsTzgcsnJwldluLxNDiyagkxOquB2Knae/OLUsyEkjenmdzb<br /> mG/YhlRnCWPnb8C898bRJGtQvEOiVxjYhtLOxs8AySiT4JuDystlVV4WPeM6tK3VaILeDZxIOSsu<br /> ti/jidNGNZ3/J08yC1dNv9v8AAAA//8DAFBLAwQUAAYACAAAACEArTA/8cEAAAAyAQAACwAAAF9y<br /> ZWxzLy5yZWxzhI/NCsIwEITvgu8Q9m7TehCRpr2I4FX0AdZk2wbbJGTj39ubi6AgeJtl2G9m6vYx<br /> jeJGka13CqqiBEFOe2Ndr+B03C3WIDihMzh6RwqexNA281l9oBFTfuLBBhaZ4ljBkFLYSMl6oAm5<br /> 8IFcdjofJ0z5jL0MqC/Yk1yW5UrGTwY0X0yxNwri3lQgjs+Qk/+zfddZTVuvrxO59CNCmoj3vCwj<br /> MfaUFOjRhrPHaN4Wv0VV5OYgm1p+LW1eAAAA//8DAFBLAwQUAAYACAAAACEAkkyg5SMDAAAMBwAA<br /> HwAAAGNsaXBib2FyZC9kcmF3aW5ncy9kcmF3aW5nMS54bWykVVtv2yAUfp+0/4B42JvrS5009uZW<br /> bRJXlbqtarbniWASo2JwgVy6af99B+w0aTpN0+aH5ACHj+87F/hwsW0EWjNtuJIFjk8ijJikquJy<br /> WeCvX8pghJGxRFZEKMkK/MQMvjh/++YDyZeatDWnCBCkyUmBa2vbPAwNrVlDzIlqmYS1hdINsTDU<br /> y7DSZAPIjQiTKBqGDeESn++hJsQStNL8H6CEog+sGhO5JgYgBc0PZ3qOgv4/Msnl+lq3s/ZOO+b0<br /> 0/pOI14VGCInSQMhwmG/0LvBMDzatdwDbBe6cf5qsUBbj/Lkfj0G21pEYTIZRqcDwKew1NvdGfXn<br /> 3+yi9fSP+4BMdygYB0RM62jI9WtlSZrstN0zCsWwFAy5SbehFlw+jAWnD32Q9d/EGNRyyiaKrhom<br /> bVcNmglioQxNzVuDkc5dVPVNFWNkl7bUPrjvHlfKvv82F0Q+dLYLFSjxiegDv5Ng2lsoC4OkGtfA<br /> ml2aFvhDmYOc3ZTWalMzUhk3/QzVIfi07cEg0fPNR1VBjsnKKi//39P3nAaSt9rYa6Ya5AzQDCQ9<br /> OFnfGttx2rn4HKmSC+ErQMgXE4DZzUDlwFa35mrIt9SPLMqmo+koDdJkOA3SaDIJLstxGgzL+Gww<br /> OZ2Mx5P4pzs3TvOaVxWT7phde8fpq7w2nGpl1MKeUNWEXUp3LQ4pjaN9gxsleOXgHCWjl/Ox0GhN<br /> RIFL//WRP3ALX9LwOQYtR5LiJI2ukiwoh6OzIC3TQZCdRaMgirOrbBilWTopX0q65ZL9vyS0KXA2<br /> SAY+Swekj7RF/nutjeQNt0wjwZsCj56doJmgEKey8qm1hIvOPgiFo78PBaR7l2gwTX8l2e3Mt7Ld<br /> XqnqyQVsDv9QvFpBccE1Atc9GLXS3zHawCVeYPO4IpphJG4k9EEWpym4WT9IB2cJDPThyvxwhUgK<br /> UAW2GHXm2MIItqxazZc1nBT7MEl1CU2z4H1Bd5wcO2HszD4J5lV75kxWd0STe+AMfQ4PEZPB11kf<br /> R/AAsXtxK8NmrbuXukbp1PtwgOPRO+C39u+We2wOx+e/AAAA//8DAFBLAwQUAAYACAAAACEAkn2H<br /> 4B0HAABJIAAAGgAAAGNsaXBib2FyZC90aGVtZS90aGVtZTEueG1s7FlLbxs3EL4X6H9Y7L2xZL1i<br /> I3JgyXLcxC9ESoocKYnaZcxdLkjKjm5FcuqlQIG06KEBeuuhKBqgARr00h9jwEGb/ogOuS9SouIH<br /> XCAobAHG7uw3w+HM7Mzs8M7dZxH1jjEXhMVtv3qr4ns4HrExiYO2/2iw/dlt3xMSxWNEWYzb/gwL<br /> /+7Gp5/cQesjSpIhQ3w8CHGEPRAUi3XU9kMpk/WVFTECMhK3WIJjeDZhPEISbnmwMuboBBaI6Mpq<br /> pdJciRCJ/Q2QKJWgHoV/sRSKMKK8r8RgL0YRrH4wmZAR1tjxUVUhxEx0KfeOEW37IHPMTgb4mfQ9<br /> ioSEB22/ov/8lY07K2g9Y6JyCa/Bt63/Mr6MYXy0qtfkwbBYtF5v1JubhXwNoHIR12v1mr1mIU8D<br /> 0GgEO011sWW2Vrv1DGuA0kuH7K3WVq1q4Q35tQWdNxvqZ+E1KJVfX8Bvb3fBihZeg1J8YwHf6Kx1<br /> tmz5GpTimwv4VmVzq96y5GtQSEl8tICuNJq1br7bAjJhdMcJX2vUt1urmfASBdFQRJdaYsJiuSzW<br /> IvSU8W0AKCBFksSenCV4gkYQk11EyZATb5cEIQRegmImgFxZrWxXavBf/er6SnsUrWNkcCu9QBOx<br /> QFL6eGLESSLb/n2Q6huQs7dvT5+/OX3+++mLF6fPf83W1qIsvh0UBybf+5+++efVl97fv/34/uW3<br /> 6dLzeGHi3/3y1bs//vyQeNhxaYqz716/e/P67Puv//r5pUP6JkdDEz4gERbePj7xHrIINujQHw/5<br /> 5TgGISImx2YcCBQjtYpDfk+GFnp/hihy4DrYtuNjDqnGBbw3fWop3A/5VBKHxAdhZAH3GKMdxp1W<br /> eKDWMsw8mMaBe3E+NXEPETp2rd1FseXl3jSBHEtcIrshttQ8pCiWKMAxlp56xo4wduzuCSGWXffI<br /> iDPBJtJ7QrwOIk6TDMjQiqaSaYdE4JeZS0Hwt2Wbvcdeh1HXrrfwsY2EdwNRh/IDTC0z3kNTiSKX<br /> yAGKqGnwXSRDl5L9GR+ZuJ6Q4OkAU+b1xlgIF88Bh/0aTn8Aacbt9j06i2wkl+TIJXMXMWYit9hR<br /> N0RR4sL2SRya2M/FEYQo8g6ZdMH3mP2GqHvwA4qXuvsxwZa7z88GjyDDmiqVAaKeTLnDl/cws+K3<br /> P6MThF2pZpNHVord5MQZHZ1pYIX2LsYUnaAxxt6jzx0adFhi2bxU+n4IWWUHuwLrPrJjVd3HWGBP<br /> NzeLeXKXCCtk+zhgS/TZm80lnhmKI8SXSd4Hr5s270Gpi1wBcEBHRyZwn0C/B/HiNMqBABlGcC+V<br /> ehgiq4Cpe+GO1xm3/HeRdwzey6eWGhd4L4EHX5oHErvJ80HbDBC1FigDZoCgy3ClW2Cx3F+yqOKq<br /> 2aZOvon90pZugO7IanoiEp/bAc31Po3/rveBDuPsh1eOl+16+h23YCtZXbLTWZZMdub6m2W4+a6m<br /> y/iYfPxNzRaaxocY6shixrrpaW56Gv9/39Mse59vOpll/cZNJ+NDh3HTyWTDlevpZMrmBfoaNfBI<br /> Bz167BMtnfpMCKV9OaN4V+jBj4DvmfE2EBWfnm7iYgqYhHCpyhwsYOECjjSPx5n8gsiwH6IEpkNV<br /> XwkJRCY6EF7CBAyNNNkpW+HpNNpj43TYWa2qwWZaWQWSJb3SKOgwqJIputkqB3iFeK1toAetuQKK<br /> 9zJKGIvZStQcSrRyojKSHuuC0RxK6J1dixZrDi1uK/G5qxa0ANUKr8AHtwef6W2/UQcWYIJ5HDTn<br /> Y+Wn1NW5d7Uzr9PTy4xpRQA02HkElJ5eU7ou3Z7aXRpqF/C0pYQRbrYS2jK6wRMhfAZn0amoF1Hj<br /> sr5eK11qqadModeD0CrVaN3+kBZX9TXwzecGGpuZgsbeSdtv1hoQMiOUtP0JDI3hMkogdoT65kI0<br /> gOOWkeTpC3+VzJJwIbeQCFOD66STZoOISMw9SqK2r7ZfuIHGOodo3aqrkBA+WuXWIK18bMqB020n<br /> 48kEj6TpdoOiLJ3eQoZPc4XzqWa/Olhxsim4ux+OT7whnfKHCEKs0aoqA46JgLODamrNMYHDsCKR<br /> lfE3V5iytGueRukYSumIJiHKKoqZzFO4TuWFOvqusIFxl+0ZDGqYJCuEw0AVWNOoVjUtqkaqw9Kq<br /> ez6TspyRNMuaaWUVVTXdWcxaIS8Dc7a8WpE3tMpNDDnNrPBp6p5PuWt5rpvrE4oqAQYv7Oeouhco<br /> CIZq5WKWakrjxTSscnZGtWtHvsFzVLtIkTCyfjMXO2e3okY4lwPilSo/8M1HLZAmeV+pLe062N5D<br /> iTcMqm0fDpdhOPgMruB42gfaqqKtKhpcwZkzlIv0oLjtZxc5BZ6nlAJTyym1HFPPKfWc0sgpjZzS<br /> zClN39MnqnCKrw5TfS8/MIUalh2wZr2Fffq/8S8AAAD//wMAUEsDBBQABgAIAAAAIQAHR4a5BwEA<br /> APcBAAAqAAAAY2xpcGJvYXJkL2RyYXdpbmdzL19yZWxzL2RyYXdpbmcxLnhtbC5yZWxzrJHBasMw<br /> DIbvg72D8T12XNgYo0kv3aCHXUb3AMZWE9NENraytG8/tWVshcIuuxhkyZ/+//dydRgH8Qm5hIiN<br /> NKqWAtBFH7Br5Mf2tXqSopBFb4eI0MgjFLlq7++W7zBY4kelD6kIpmBpZE+UnrUurofRFhUTIHd2<br /> MY+WuMydTtbtbQd6UdePOv9myPaKKTa+kXnjF1Jsj4k3/82Ou11wsI5uGgHpxgpNrAsYaHMH1Eil<br /> LjeX0yjWKvVtGeY/ZfRsKA8B9z9STu4KRzfPs5rwHFVx2pHTc6pcRDo5mtIQrS/szDxoYzTNgQhy<br /> FXhAJey+cW/Rc2AvB+6hPVvSV9/VfgEAAP//AwBQSwECLQAUAAYACAAAACEAu+VIlAUBAAAeAgAA<br /> EwAAAAAAAAAAAAAAAAAAAAAAW0NvbnRlbnRfVHlwZXNdLnhtbFBLAQItABQABgAIAAAAIQCtMD/x<br /> wQAAADIBAAALAAAAAAAAAAAAAAAAADYBAABfcmVscy8ucmVsc1BLAQItABQABgAIAAAAIQCSTKDl<br /> IwMAAAwHAAAfAAAAAAAAAAAAAAAAACACAABjbGlwYm9hcmQvZHJhd2luZ3MvZHJhd2luZzEueG1s<br /> UEsBAi0AFAAGAAgAAAAhAJJ9h+AdBwAASSAAABoAAAAAAAAAAAAAAAAAgAUAAGNsaXBib2FyZC90<br /> aGVtZS90aGVtZTEueG1sUEsBAi0AFAAGAAgAAAAhAAdHhrkHAQAA9wEAACoAAAAAAAAAAAAAAAAA<br /> 1QwAAGNsaXBib2FyZC9kcmF3aW5ncy9fcmVscy9kcmF3aW5nMS54bWwucmVsc1BLBQYAAAAABQAF<br /> AGcBAAAkDgAAAAA=<br /> " stroked="f" style="width:20.5pt; height:20.5pt; v-text-anchor:top" target="&quot;_blank&quot;"> <v:fill o:detectmouseclick="t"> <o:lock aspectratio="t" v:ext="edit"> <w:wrap type="none"> <w:anchorlock> </w:anchorlock></w:wrap></o:lock></v:fill></v:rect><img id="_x0000_i1025" src="" style="width:20.5pt; height:20.5pt" /><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="https://twitter.com/hashtag/RECLAIMINGTHEWEB?src=hash" style="color:#0563c1; text-decoration:underline" target="_blank">#RECLAIMINGTHEWEB</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Webcast recordings of the event can be viewed here:</span></span></span></span></span></span></p> <ul> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/part-1-preventing-terrorists-from-exploiting-the-internet-and-social-media/4665962159001" style="color:#0563c1; text-decoration:underline" target="_blank">Preventing Terrorists from Exploiting the Internet and Social Media (Part 1)</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/part-2-preventing-terrorists-from-exploiting-the-internet-and-social-media/4665729008001" style="color:#0563c1; text-decoration:underline" target="_blank">Preventing Terrorists from Exploiting the Internet and Social Media (Part 2)</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/jeffrey-feltman-dpa-preventing-terrorists-from-exploiting-the-internet-and-social-media/4665798478001" style="color:#0563c1; text-decoration:underline" target="_blank">Jeffrey Feltman (DPA) – Preventing Terrorists from Exploiting the Internet and Social Media</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/ivan-%C5%A0imonovi%C4%87-ohchr-preventing-terrorists-from-exploiting-the-internet-and-social-media/4665839285001" style="color:#0563c1; text-decoration:underline" target="_blank">Ivan ?imonovi? (OHCHR) – Preventing Terrorists from Exploiting the Internet and Social Media</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/part-3-preventing-terrorists-from-exploiting-the-internet-and-social-media/4666179613001" style="color:#0563c1; text-decoration:underline" target="_blank">Preventing Terrorists from Exploiting the Internet and Social Media (Part 3)</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/part-4-preventing-terrorists-from-exploiting-the-internet-and-social-media/4666264687001" style="color:#0563c1; text-decoration:underline" target="_blank">Preventing Terrorists from Exploiting the Internet and Social Media (Part 4)</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/watch/jean-paul-laborde-cted-and-humera-khan-muflehun-on-terrorism-online-media-stakeout-17-december-2015/4665964600001" style="color:#0563c1; text-decoration:underline" target="_blank">Jean-Paul Laborde (CTED) and Humera Khan (Muflehun) on Terrorism Online – Media Stakeout (17 December 2015)</a></span></span></span></span></span></span></span></li> </ul> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Terrorist groups continue to utilize the Internet and social media to facilitate their activities, including incitement to commit terrorist acts, radicalization to violence, recruitment, training, planning, collection of information, communication, preparation, financing, and execution of attacks. Surpassing Al-Qaida, the terrorist organization that calls itself the Islamic State in Iraq and the Levant (ISIL) has successfully used the Internet to broadcast its ideology and to recruit foreign terrorist fighters on an unprecedented scale – with currently some 30,000 foreign fighters coming from over 100 countries.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">On 17 December 2015, the Security Council Counter-Terrorism Committee (CTC) will hold a special meeting on Preventing terrorists from exploiting the Internet and social media to recruit terrorists and incite terrorist acts, while respecting human rights and fundamental freedoms. This meeting will be complemented by CTED-organized thematic sessions (16-17 December), which will all take place in Conference room 1. The meeting will feature panellists from inter alia Facebook, Google, Microsoft, Twitter, and Weibo, as well as the Chief Prosecutor of Paris, and civil society activists engaging with terrorist recruiters on the digital frontlines.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The briefing is open to Member and Observer States, United Nations entities, intergovernmental organizations, and specialized agencies. The event is also open to members of the media, including photographers, with a valid accreditation to the United Nations in New York.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/chair-summary-and-plan-of-action_1.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Chair summary and plan of action</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/concept-note_ict_specialmeeting_2015_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Concept Note</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/special-meeting-of-the-ctc-ict-2015-tentative-agenda-final_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Special Meeting Agenda</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted-technical-meeting-on-ict-agenda-final_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Technical Meeting Agenda</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/ict-meeting-2015-logistical-note1_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Logistical Note</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/ict-meeting-2015-list-of-hotels_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">List of Hotels</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Thu, 19 Nov 2015 22:29:00 +0000 BMUSONI 22353 at /securitycouncil/ctc In a first for the Counter-Terrorism Committee, the Security Council body holds open briefing on the role of women in countering terrorism and violent extremism /securitycouncil/ctc/news/first-counter-terrorism-committee-security-council-body-holds-open-briefing-role-women <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Despite the growing awareness of women playing an important role in terrorism and violent extremism – including as suicide bombers – the potential for women to act as a vital resource in policy and planning on countering violent extremism (CVE) has traditionally remained largely untapped. In 2013, this began to change, when the Security Council reaffirmed the Council’s intention to increase its attention to women, peace and security issues in all relevant thematic areas of work on its agenda, including in threats to international peace and security caused by terrorist acts (resolution 2129). A more recent Security Council resolution, 2178 (2014) on stemming the flow of foreign terrorist fighters, encourages Member States to engage relevant local communities in developing strategies to counter the violent extremist narrative that can incite terrorist acts and address the conditions conducive to the spread of violent extremism, which can be conducive to terrorism, including by empowering inter alia youth, families, and women. And in its Presidential Statement of 28 October 2014&nbsp;<a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/n1459265_en.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">(S/PRST/2014/21)</a>, the Council noted that violent extremism is frequently targeting women and girls, which can lead to serious human rights violations and abuses against them, and encouraged Member States to engage with women and women’s organizations in developing CVE strategies.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">As a concrete follow-up, the Counter-Terrorism Committee on 9 September 2015 organized, for the first time ever, an open briefing on&nbsp;<i>The role of women in countering terrorism and violent extremism</i>. Three women’s activists from three regions affected by terrorism and violent extremism – Hanaa Edwar from Iraq; Pastor Esther Ibanga from Nigeria; and Sureya Roble from Kenya – shared their testimonies with the Committee in New York. Other speakers included Chair of the Counter-Terrorism Committee, H.E. Ambassador Raimonda Murmokaité, Permanent Representative of Lithuania to the United Nations; Jean-Paul Laborde, Assistant Secretary-General and Executive Director of the Counter-Terrorism Committee Executive Directorate (CTED); and Yannick Glemarec, Assistant Secretary-General for Policy and Programme with UN Women. Moderator was Professor Jayne Huckerby with Duke University.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Describing the abduction of Yazidi women and girls by ISIS in her home country Iraq, Ms. Edwar said that “</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">[They] were assaulted in practices reminiscent of practices in previous eras of history, such as the sale of women into sexual slavery, rape, torture, murder, not to mention the psychological violence of humiliation, threats, and forcing them to convert to Islam. At least more than 3,000 of the abducted women and girls are still being held.” Ms. Edwar also pointed out that out of the 2,070 citizens executed in Mosul last July and August some 300 were women.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">“Although the estimated number of foreign women who have joined ISIS is only 10 percent of the total number of Western men fighting, it is still significant that women are joining an organization that a majority of the world deems oppressive towards women and extraordinarily violent,” Ms. Roble remarked.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Panellists, as well as numerous Member States, took the floor to point out the positive and proactive role that women can play to build resilience to radicalization to violence and conflict, inter alia through their influence on the family, community, and Government. Women’s inclusion is therefore an indispensable component of any comprehensive counter-terrorism strategy.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">“Even though in Nigeria, as well as most African nations, the involvement of women in security issues is not only seen as an alien culture but also a taboo and sometimes quite offensive to the men, women civil society groups tap into the needs of communities, where women and children are disproportionally impacted by terrorism,” Pastor Ibanga said.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The open briefing on this theme being a first, the Counter-Terrorism Committee and CTED will continue its work on the role of women in countering terrorism and violent extremism.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">A webcast of the open briefing is available&nbsp;<a href="http://webtv.un.org/meetings-events/watch/the-role-of-women-in-countering-terrorism-and-violent-extremism-open-briefing-of-the-counter-terrorism-committee/4474290840001" style="color:#0563c1; text-decoration:underline" target="_blank">here</a>; a webcast of a press briefing held earlier the same day can be accessed&nbsp;<a href="http://webtv.un.org/watch/the-role-of-women-in-countering-terrorism-and-violent-extremism-press-conference/4473529116001#full-text" style="color:#0563c1; text-decoration:underline" target="_blank">here</a>.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Brief bios of the three participating women’s activists</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">An advocate for women’s rights and equality and for peace and democracy in Iraq,&nbsp;<b>Ms. Hanaa Edwar</b>&nbsp;is the Secretary-General of the Iraqi Al-Amal Association (IAA), an NGO working to improve the socio-economic conditions of the Iraqi people, and founder of the Iraqi Women’s Network (IWN), which represents over 80 Iraqi women’s groups.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Ms. Esther Ibanga</span></span></span></b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">&nbsp;is a Christian Pastor and interfaith peace activist who works in Plateau State, a highly volatile region of central Nigeria. In response to the ethno-religious conflicts that have afflicted the region since 1994, Pastor Ibanga has become a leader of a strong coalition of diverse women’s groups united in their desire for peace.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Ms. Sureya Roble</span></span></span></b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">&nbsp;is a women’s rights activist and national vice chairperson of the Mombasa-based Maendeleo ya Wanawake Organization (MYWO), a non-profit voluntary women’s organization working to improve the quality of life of rural Kenyan communities, especially for women and youth.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-agenda.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing Agenda</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-concept-note.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing Concept Note</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-australian-statement.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing – Statement by Australia</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-statement-by-ms.-nelly-sihloh-counsellor-head-of-human-rights-division-permanent-mission-of-israel-to-the-united-nations.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing – Statement by Ms. Nelly Sihloh, Counsellor, Head of Human Rights Division, Permanent Mission of Israel to the United Nations</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-norwegian-statement.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing – Statement by Norway</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-spain-speaking-points.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing – Speaking Points from Spain</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-statement-by-sweden.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing – Statement by Sweden</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-us-statement.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing – Statement by United States</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-intervention-by-eu-delegation-to-the-un.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing – Intervention by EU Delegation to the UN</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-ohchr-remarks.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing – Remarks by OHCHR</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-wilpf-and-gjc-civil-society-intervention.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing – Intervention by WILPF and GJC Civil Society</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-intervention-by-hanaa-edwar.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing – Intervention by Hanaa Edwar</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-statement-by-pastor-esther-ibanga.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing – Statement by Pastor Esther Ibanga</a><br /> <a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/open-briefing-statement-by-sureya-roble.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Open Briefing – Statement by Sureya Roble</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Wed, 09 Sep 2015 14:07:00 +0000 BMUSONI 22488 at /securitycouncil/ctc