Security Council - Counter-Terrorism Committee (CTC) - Internet /securitycouncil/ctc/tags/internet en CTED-initiated process results in High-Level meeting on preventing terrorist use of the Internet /securitycouncil/ctc/news/cted-initiated-process-results-high-level-meeting-preventing-terrorist-use-internet <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-21989" class="file file-image file-image-png"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/21989">print_screen_1.png</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/print_screen_1.png?itok=9JwCq9xv" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">On 20 September 2017, France, Italy, and the United Kingdom co-hosted a high-level United Nations meeting on Preventing terrorist use of the Internet. President Emmanuel Macron of France, Prime Minister Paolo Gentiloni of Italy, Prime Minister Theresa May of the UK, and Senior Vice President and General Counsel of Google Kent Walker opened the meeting, which was held on the margins of the 72nd UN General Assembly. Linked to efforts initiated by the Counter-Terrorism Committee Executive Directorate (CTED) with the industry to prevent and counter terrorism online, this was the first time that world leaders and technology executives at this level addressed the United Nations on the issue.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The high-level meeting sought to encourage governments and civil society groups to engage with the Global Internet Forum for Counter Terrorism (GIFCT), which Mr. Walker represented on the panel of speakers. When GIFCT was launched by Facebook, Microsoft, Twitter, and YouTube on 26 June 2017, the then-Executive Director of CTED welcomed the initiative as elevating “our existing private-public partnership with these and other companies.” The high-level meeting recognized GIFCT as a global focal point in the digital battlespace against terrorists and commended its work in shaping future action needed to address this issue.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">UK Prime Minister May commended the attendance at the event as evidence of the commitment held by governments, companies, and civil society in collaborating to protect citizens against the use of the Internet by terrorists to spread their ideology. Many of the speakers reiterated the importance of a global response to protect citizens from incitement through awareness and continued efforts in countering narratives.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">According to Monika Bickert, Head of Global Policy Management and the Head of Counter-terrorism at Facebook, GIFCT focuses participating companies’ efforts in a number of areas: Improving the means for detecting terrorist content, including through technical solutions like she Shared Industry Hash Database; commissioning research in this area; and sharing knowledge with counter-terrorism experts. “And through a joint partnership [with UN CTED and the ICT4AV Initiative “Tech against terrorism”], we’ll work with smaller companies on all of the above.”</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Ms. Bickert also emphasized that companies like Facebook and Google recognize the importance in helping people challenge extremist narratives in addition to removing content. The United States Department of Homeland Security representative Claire Grady concluded that “we cannot surrender the digital battlespace to violent extremists.”</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The full webcast (in English) of the meeting can be found <a href="http://webtv.un.org/search/high-level-meeting-on-preventing-terrorist-use-of-the-internet/5581788127001/?term=macron&amp;sort=date">here</a>.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The joint declaration by the three Heads of State/Government (in French) is available <a href="http://www.elysee.fr/communiques-de-presse/article/declaration-du-royaume-uni-de-la-france-et-de-l-italie-lors-de-la-reunion-de-haut-niveau-sur-la-prevention-de-l-utilisation-d-internet-par-les-terroristes-new-york-le-20-septembre-201/">here</a>.</span></span></span></span></span></span></p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Thu, 21 Sep 2017 14:07:00 +0000 BMUSONI 20171 at /securitycouncil/ctc Launch of “Tech Against Terrorism” — a partnership between technology companies, governments, and UN CTED /securitycouncil/ctc/news/launch-%E2%80%9Ctech-against-terrorism%E2%80%9D-%E2%80%94-partnership-between-technology-companies-governments-and-un <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">(</span></span></span><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">BRUSSELS) Technology can be used for good or for malicious purposes. Information and communications technologies (ICT) used for terrorist activities are often indistinguishable from regular usage. Also cross-border complexities of the Internet make addressing related issues challenging, particularly in the area of terrorist content.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">“Tech Against Terrorism” is a new initiative launched on the margins of RightsCon (a major global event convened around issues related to the Internet and human rights) in Brussels that aims to help Member States and technology and communication companies with these and related issues. Smaller tech and social media companies face particular challenges — be they human, financial, or management-related — in developing and implementing measures to address terrorist activities online.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The second phase of a joint project between the United Nations Counter-Terrorism Committee Executive Directorate (CTED) and the Swiss NGO ICT4AV, with the support of ICT industry leaders, “Tech Against Terrorism” seeks to build bridges between public and private partners, ultimately leading to the development of a normative framework of self-regulation that can guide responses to terrorists’ use of the Internet, in compliance with international law standards.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The “Tech Against Terrorism” project will work with Member States and technology and communication companies to:<br /> – Provide resources and guidance<br /> – Offer a think tank environment and encourage peer learning and support from others who have faced similar challenges<br /> – Develop links between startups and larger businesses, government, and academia.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">More from ICT4AV:&nbsp;<a href="http://ict4peace.org/?p=4868" style="color:#0563c1; text-decoration:underline">http://ict4peace.org/?p=4868</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">———————————————–<br /> For additional information, please contact Mattias Sundholm of the United Nations Counter-Terrorism Committee Executive Directorate (CTED) at sundholm [at]&nbsp;<a href="http://www.un.org/" style="color:#0563c1; text-decoration:underline">un.org</a>.</span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Fri, 31 Mar 2017 09:18:00 +0000 BMUSONI 20795 at /securitycouncil/ctc Special meeting of the Counter-Terrorism Committee and technical sessions of the Counter-Terrorism Committee Executive Directorate on preventing and combating abuse of ICT for terrorist purposes, New York, 16-17 December 2015 /securitycouncil/ctc/news/special-meeting-counter-terrorism-committee-and-technical-sessions-counter-terrorism-0 <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-24312" class="file file-image file-image-jpeg"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/24312">cted_ict_website_600px2_1.jpg</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/cted_ict_website_600px2_1.jpg?itok=64SFn5O5" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">How can terrorists be stopped from exploiting the Internet and social media?</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><i><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Special meeting of the Security Council Counter-Terrorism Committee and its Executive Directorate 16-17 December 2015</span></span></span></i></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><v:rect filled="f" href="/sc/ctc/wp-content/uploads/2015/11/twitter-icon.png" id="Rectangle_x0020_248" o:button="t" o:gfxdata="UEsDBBQABgAIAAAAIQC75UiUBQEAAB4CAAATAAAAW0NvbnRlbnRfVHlwZXNdLnhtbKSRvU7DMBSF<br /> dyTewfKKEqcMCKEmHfgZgaE8wMW+SSwc27JvS/v23KTJgkoXFsu+P+c7Ol5vDoMTe0zZBl/LVVlJ<br /> gV4HY31Xy4/tS3EvRSbwBlzwWMsjZrlprq/W22PELHjb51r2RPFBqax7HCCXIaLnThvSAMTP1KkI<br /> +gs6VLdVdad08ISeCho1ZLN+whZ2jsTzgcsnJwldluLxNDiyagkxOquB2Knae/OLUsyEkjenmdzb<br /> mG/YhlRnCWPnb8C898bRJGtQvEOiVxjYhtLOxs8AySiT4JuDystlVV4WPeM6tK3VaILeDZxIOSsu<br /> ti/jidNGNZ3/J08yC1dNv9v8AAAA//8DAFBLAwQUAAYACAAAACEArTA/8cEAAAAyAQAACwAAAF9y<br /> ZWxzLy5yZWxzhI/NCsIwEITvgu8Q9m7TehCRpr2I4FX0AdZk2wbbJGTj39ubi6AgeJtl2G9m6vYx<br /> jeJGka13CqqiBEFOe2Ndr+B03C3WIDihMzh6RwqexNA281l9oBFTfuLBBhaZ4ljBkFLYSMl6oAm5<br /> 8IFcdjofJ0z5jL0MqC/Yk1yW5UrGTwY0X0yxNwri3lQgjs+Qk/+zfddZTVuvrxO59CNCmoj3vCwj<br /> MfaUFOjRhrPHaN4Wv0VV5OYgm1p+LW1eAAAA//8DAFBLAwQUAAYACAAAACEAMC80dyQDAAAMBwAA<br /> HwAAAGNsaXBib2FyZC9kcmF3aW5ncy9kcmF3aW5nMS54bWykVV1P2zAUfZ+0/2D5YW8hSUlLkxEQ<br /> tA1CYhui43lyHbexcOxgux9s2n/ftZPSUqZpgjy01/b18Tn3wz4939QCrZg2XMkcx0cRRkxSVXK5<br /> yPH99yIYYmQskSURSrIcPzGDz88+fjgl2UKTpuIUAYI0GclxZW2ThaGhFauJOVINk7A2V7omFoZ6<br /> EZaarAG5FmEvigZhTbjEZzuoMbEELTV/A5RQ9IGVIyJXxACkoNn+TMdR0Pcjk0yurnQzbW61Y06/<br /> rm414mWOIXKS1BAiHHYLnRsMw4Ndix3AZq5r56/mc7TxKE/u12OwjUUUJnuD6LgP+BSWOrs9o/r2<br /> l120mvxzH5BpDwVjj4hpHA25eq2sl0ARtNruGIViWAiG3KTbUAkuH0aC04cuyPp/YgxqOWVjRZc1<br /> k7atBs0EsVCGpuKNwUhnLqr6uowxsgtbaB/cT49LZT//mAkiH1rbhQqU+ER0gd9KMM0NlIVBUo0q<br /> YM0uTAP8ocxBznZKa7WuGCmNm36GahF82nZgkOjZ+osqIcdkaZWX//b0PaeBZI029oqpGjkDNANJ<br /> D05WN8a2nLYuPkeq4EL4ChDyxQRgtjNQObDVrbka8i31K43SyXAyTIKkN5gESTQeBxfFKAkGRXzS<br /> Hx+PR6Nx/NudGydZxcuSSXfMtr3j5FVea061Mmpuj6iqwzal2xaHlMbRrsGNErx0cI6S0YvZSGi0<br /> IiLHhf+6yO+5hS9p+ByDlgNJcS+JLntpUAyGJ0FSJP0gPYmGQRSnl+kgStJkXLyUdMMle78ktM5x<br /> 2u/1fZb2SB9oi/z3WhvJam6ZRoLXOR4+O0EzQSFOZOlTawkXrb0XCkd/FwpI9zbRYJruSrKbqW9l<br /> u7lU5ZML2Az+oXi1guKCawSuezAqpX9itIZLPMfmcUk0w0hcS+iDNE4ScLN+kPRPejDQ+yuz/RUi<br /> KUDl2GLUmiMLI9iybDRfVHBS7MMk1QU0zZx3Bd1ycuyEsVP7JJhX7ZkzWd4STe6AM/Q5PERMBvfT<br /> Lo7gAWJ34paGTRt3L7WN0qr34QDHg3fAb+3eLffY7I/P/gAAAP//AwBQSwMEFAAGAAgAAAAhAJJ9<br /> h+AdBwAASSAAABoAAABjbGlwYm9hcmQvdGhlbWUvdGhlbWUxLnhtbOxZS28bNxC+F+h/WOy9sWS9<br /> YiNyYMly3MQvREqKHCmJ2mXMXS5Iyo5uRXLqpUCBtOihAXrroSgaoAEa9NIfY8BBm/6IDrkvUqLi<br /> B1wgKGwBxu7sN8PhzOzM7PDO3WcR9Y4xF4TFbb96q+J7OB6xMYmDtv9osP3Zbd8TEsVjRFmM2/4M<br /> C//uxqef3EHrI0qSIUN8PAhxhD0QFIt11PZDKZP1lRUxAjISt1iCY3g2YTxCEm55sDLm6AQWiOjK<br /> aqXSXIkQif0NkCiVoB6Ff7EUijCivK/EYC9GEax+MJmQEdbY8VFVIcRMdCn3jhFt+yBzzE4G+Jn0<br /> PYqEhAdtv6L//JWNOytoPWOicgmvwbet/zK+jGF8tKrX5MGwWLReb9Sbm4V8DaByEddr9Zq9ZiFP<br /> A9BoBDtNdbFltla79QxrgNJLh+yt1latauEN+bUFnTcb6mfhNSiVX1/Ab293wYoWXoNSfGMB3+is<br /> dbZs+RqU4psL+FZlc6vesuRrUEhJfLSArjSatW6+2wIyYXTHCV9r1Ldbq5nwEgXRUESXWmLCYrks<br /> 1iL0lPFtACggRZLEnpwleIJGEJNdRMmQE2+XBCEEXoJiJoBcWa1sV2rwX/3q+kp7FK1jZHArvUAT<br /> sUBS+nhixEki2/59kOobkLO3b0+fvzl9/vvpixenz3/N1taiLL4dFAcm3/ufvvnn1Zfe37/9+P7l<br /> t+nS83hh4t/98tW7P/78kHjYcWmKs+9ev3vz+uz7r//6+aVD+iZHQxM+IBEW3j4+8R6yCDbo0B8P<br /> +eU4BiEiJsdmHAgUI7WKQ35PhhZ6f4YocuA62LbjYw6pxgW8N31qKdwP+VQSh8QHYWQB9xijHcad<br /> Vnig1jLMPJjGgXtxPjVxDxE6dq3dRbHl5d40gRxLXCK7IbbUPKQolijAMZaeesaOMHbs7gkhll33<br /> yIgzwSbSe0K8DiJOkwzI0IqmkmmHROCXmUtB8Ldlm73HXodR16638LGNhHcDUYfyA0wtM95DU4ki<br /> l8gBiqhp8F0kQ5eS/RkfmbiekODpAFPm9cZYCBfPAYf9Gk5/AGnG7fY9OotsJJfkyCVzFzFmIrfY<br /> UTdEUeLC9kkcmtjPxRGEKPIOmXTB95j9hqh78AOKl7r7McGWu8/PBo8gw5oqlQGinky5w5f3MLPi<br /> tz+jE4RdqWaTR1aK3eTEGR2daWCF9i7GFJ2gMcbeo88dGnRYYtm8VPp+CFllB7sC6z6yY1Xdx1hg<br /> Tzc3i3lylwgrZPs4YEv02ZvNJZ4ZiiPEl0neB6+bNu9BqYtcAXBAR0cmcJ9Avwfx4jTKgQAZRnAv<br /> lXoYIquAqXvhjtcZt/x3kXcM3sunlhoXeC+BB1+aBxK7yfNB2wwQtRYoA2aAoMtwpVtgsdxfsqji<br /> qtmmTr6J/dKWboDuyGp6IhKf2wHN9T6N/673gQ7j7IdXjpftevodt2ArWV2y01mWTHbm+ptluPmu<br /> psv4mHz8Tc0WmsaHGOrIYsa66Wluehr/f9/TLHufbzqZZf3GTSfjQ4dx08lkw5Xr6WTK5gX6GjXw<br /> SAc9euwTLZ36TAilfTmjeFfowY+A75nxNhAVn55u4mIKmIRwqcocLGDhAo40j8eZ/ILIsB+iBKZD<br /> VV8JCUQmOhBewgQMjTTZKVvh6TTaY+N02FmtqsFmWlkFkiW90ijoMKiSKbrZKgd4hXitbaAHrbkC<br /> ivcyShiL2UrUHEq0cqIykh7rgtEcSuidXYsWaw4tbivxuasWtADVCq/AB7cHn+ltv1EHFmCCeRw0<br /> 52Plp9TVuXe1M6/T08uMaUUANNh5BJSeXlO6Lt2e2l0aahfwtKWEEW62EtoyusETIXwGZ9GpqBdR<br /> 47K+XitdaqmnTKHXg9Aq1Wjd/pAWV/U18M3nBhqbmYLG3knbb9YaEDIjlLT9CQyN4TJKIHaE+uZC<br /> NIDjlpHk6Qt/lcyScCG3kAhTg+ukk2aDiEjMPUqitq+2X7iBxjqHaN2qq5AQPlrl1iCtfGzKgdNt<br /> J+PJBI+k6XaDoiyd3kKGT3OF86lmvzpYcbIpuLsfjk+8IZ3yhwhCrNGqKgOOiYCzg2pqzTGBw7Ai<br /> kZXxN1eYsrRrnkbpGErpiCYhyiqKmcxTuE7lhTr6rrCBcZftGQxqmCQrhMNAFVjTqFY1LapGqsPS<br /> qns+k7KckTTLmmllFVU13VnMWiEvA3O2vFqRN7TKTQw5zazwaeqeT7lrea6b6xOKKgEGL+znqLoX<br /> KAiGauVilmpK48U0rHJ2RrVrR77Bc1S7SJEwsn4zFztnt6JGOJcD4pUqP/DNRy2QJnlfqS3tOtje<br /> Q4k3DKptHw6XYTj4DK7geNoH2qqirSoaXMGZM5SL9KC47WcXOQWep5QCU8sptRxTzyn1nNLIKY2c<br /> 0swpTd/TJ6pwiq8OU30vPzCFGpYdsGa9hX36v/EvAAAA//8DAFBLAwQUAAYACAAAACEAB0eGuQcB<br /> AAD3AQAAKgAAAGNsaXBib2FyZC9kcmF3aW5ncy9fcmVscy9kcmF3aW5nMS54bWwucmVsc6yRwWrD<br /> MAyG74O9g/E9dlzYGKNJL92gh11G9wDGVhPTRDa2srRvP7VlbIXCLrsYZMmf/v/3cnUYB/EJuYSI<br /> jTSqlgLQRR+wa+TH9rV6kqKQRW+HiNDIIxS5au/vlu8wWOJHpQ+pCKZgaWRPlJ61Lq6H0RYVEyB3<br /> djGPlrjMnU7W7W0HelHXjzr/Zsj2iik2vpF54xdSbI+JN//NjrtdcLCObhoB6cYKTawLGGhzB9RI<br /> pS43l9Mo1ir1bRnmP2X0bCgPAfc/Uk7uCkc3z7Oa8BxVcdqR03OqXEQ6OZrSEK0v7Mw8aGM0zYEI<br /> chV4QCXsvnFv0XNgLwfuoT1b0lff1X4BAAD//wMAUEsBAi0AFAAGAAgAAAAhALvlSJQFAQAAHgIA<br /> ABMAAAAAAAAAAAAAAAAAAAAAAFtDb250ZW50X1R5cGVzXS54bWxQSwECLQAUAAYACAAAACEArTA/<br /> 8cEAAAAyAQAACwAAAAAAAAAAAAAAAAA2AQAAX3JlbHMvLnJlbHNQSwECLQAUAAYACAAAACEAMC80<br /> dyQDAAAMBwAAHwAAAAAAAAAAAAAAAAAgAgAAY2xpcGJvYXJkL2RyYXdpbmdzL2RyYXdpbmcxLnht<br /> bFBLAQItABQABgAIAAAAIQCSfYfgHQcAAEkgAAAaAAAAAAAAAAAAAAAAAIEFAABjbGlwYm9hcmQv<br /> dGhlbWUvdGhlbWUxLnhtbFBLAQItABQABgAIAAAAIQAHR4a5BwEAAPcBAAAqAAAAAAAAAAAAAAAA<br /> ANYMAABjbGlwYm9hcmQvZHJhd2luZ3MvX3JlbHMvZHJhd2luZzEueG1sLnJlbHNQSwUGAAAAAAUA<br /> BQBnAQAAJQ4AAAAA<br /> " stroked="f" style="width:20.5pt; height:20.5pt; v-text-anchor:top" target="&quot;_blank&quot;"> <v:fill o:detectmouseclick="t"> <o:lock aspectratio="t" v:ext="edit"> <w:wrap type="none"> <w:anchorlock> </w:anchorlock></w:wrap></o:lock></v:fill></v:rect><img id="_x0000_i1025" src="" style="width:20.5pt; height:20.5pt" /><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="https://twitter.com/hashtag/RECLAIMINGTHEWEB?src=hash" style="color:#0563c1; text-decoration:underline" target="_blank">#RECLAIMINGTHEWEB</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Webcast recordings of the event can be viewed here:</span></span></span></span></span></span></p> <ul> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/part-1-preventing-terrorists-from-exploiting-the-internet-and-social-media/4665962159001" style="color:#0563c1; text-decoration:underline" target="_blank">Preventing Terrorists from Exploiting the Internet and Social Media (Part 1)</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/part-2-preventing-terrorists-from-exploiting-the-internet-and-social-media/4665729008001" style="color:#0563c1; text-decoration:underline" target="_blank">Preventing Terrorists from Exploiting the Internet and Social Media (Part 2)</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/jeffrey-feltman-dpa-preventing-terrorists-from-exploiting-the-internet-and-social-media/4665798478001" style="color:#0563c1; text-decoration:underline" target="_blank">Jeffrey Feltman (DPA) – Preventing Terrorists from Exploiting the Internet and Social Media</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/ivan-%C5%A0imonovi%C4%87-ohchr-preventing-terrorists-from-exploiting-the-internet-and-social-media/4665839285001" style="color:#0563c1; text-decoration:underline" target="_blank">Ivan Šimonović (OHCHR) – Preventing Terrorists from Exploiting the Internet and Social Media</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/part-3-preventing-terrorists-from-exploiting-the-internet-and-social-media/4666179613001" style="color:#0563c1; text-decoration:underline" target="_blank">Preventing Terrorists from Exploiting the Internet and Social Media (Part 3)</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/part-4-preventing-terrorists-from-exploiting-the-internet-and-social-media/4666264687001" style="color:#0563c1; text-decoration:underline" target="_blank">Preventing Terrorists from Exploiting the Internet and Social Media (Part 4)</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/watch/jean-paul-laborde-cted-and-humera-khan-muflehun-on-terrorism-online-media-stakeout-17-december-2015/4665964600001" style="color:#0563c1; text-decoration:underline" target="_blank">Jean-Paul Laborde (CTED) and Humera Khan (Muflehun) on Terrorism Online – Media Stakeout (17 December 2015)</a></span></span></span></span></span></span></span></li> </ul> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Terrorist groups continue to utilize the Internet and social media to facilitate their activities, including incitement to commit terrorist acts, radicalization to violence, recruitment, training, planning, collection of information, communication, preparation, financing, and execution of attacks. Surpassing Al-Qaida, the terrorist organization that calls itself the Islamic State in Iraq and the Levant (ISIL) has successfully used the Internet to broadcast its ideology and to recruit foreign terrorist fighters on an unprecedented scale – with currently some 30,000 foreign fighters coming from over 100 countries.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">On 17 December 2015, the Security Council Counter-Terrorism Committee (CTC) will hold a special meeting on Preventing terrorists from exploiting the Internet and social media to recruit terrorists and incite terrorist acts, while respecting human rights and fundamental freedoms. This meeting will be complemented by CTED-organized thematic sessions (16-17 December), which will all take place in Conference room 1. The meeting will feature panellists from inter alia Facebook, Google, Microsoft, Twitter, and Weibo, as well as the Chief Prosecutor of Paris, and civil society activists engaging with terrorist recruiters on the digital frontlines.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The briefing is open to Member and Observer States, United Nations entities, intergovernmental organizations, and specialized agencies. The event is also open to members of the media, including photographers, with a valid accreditation to the United Nations in New York.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/chair-summary-and-plan-of-action.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Chair summary and plan of action</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/concept-note_ict_specialmeeting_2015.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Concept Note</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/special-meeting-of-the-ctc-ict-2015-tentative-agenda-final.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Special Meeting Agenda</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted-technical-meeting-on-ict-agenda-final.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Technical Meeting Agenda</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/ict-meeting-2015-logistical-note1.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Logistical Note</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/ict-meeting-2015-list-of-hotels.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">List of Hotels</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Thu, 19 Nov 2015 22:29:00 +0000 BMUSONI 22356 at /securitycouncil/ctc CTED delegation meets with the Director of the Executive Committee of the Regional Anti-Terrorist Structure of the Shanghai Cooperation Organization /securitycouncil/ctc/news/cted-delegation-meets-director-executive-committee-regional-anti-terrorist-structure-shanghai <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">On 16 April 2015, on the margins of a three-day follow-up visit to the Republic of Uzbekistan, the delegation representing the Security Council Counter-Terrorism Committee met with the Director of the Executive Committee of the Regional Anti-Terrorist Structure of the Shanghai Cooperation Organization (RATS SCO), Mr. Zhang Xinfeng.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Following up to&nbsp;<a href="/sc/ctc/news/2014/10/24/counter-terrorism-committee-welcomes-close-cooperation-with-the-regional-anti-terrorist-structure-of-the-shanghai-cooperation-organization/" style="color:#0563c1; text-decoration:underline" target="_blank"><b>discussions held in New York in October 2014</b></a>, parties discussed regional responses to the current threats and challenges, including: foreign terrorist fighters, terrorists’ abuse of the Internet, and violent extremism and radicalization that lead to terrorism. An estimated 2,500 persons from SCO Member States have left to participate in terrorist activities in Syria and Iraq, some with families and children. The Executive Directorate of CTC (CTED) briefed RATS SCO on global initiatives, including the upcoming special meetings of the Counter-Terrorism Committees.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">In addition to experts from CTED, the delegation also included representatives from other United Nations bodies and partner international and regional organisations. The delegation was led by CTED Deputy Executive Director, Mr. Weixiong Chen.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">RATS SCO, headquartered in Tashkent (Uzbekistan), is a permanent organ of the Shanghai Cooperation Organization which serves to promote cooperation of Member States against terrorism, separatism, and extremism, which it refers to as “the three evil forces.” RATS SCO includes six Member States (the Republic of Kazakhstan, the People’s Republic of China, the Kyrgyz Republic, the Russian Federation, the Republic of Tajikistan, and the Republic of Uzbekistan), five observers, and three dialogue partners. More information is available&nbsp;<a href="http://ecrats.org/ru/news/4960.html" style="color:#0563c1; text-decoration:underline" target="_blank"><b>here.</b></a></span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Tue, 21 Apr 2015 14:07:00 +0000 BMUSONI 22623 at /securitycouncil/ctc