Check-in and access this session from the IGF Schedule.

IGF 2024 Open Forum #68 Countering the use of ICT for terrorist purposes

    Theater
    Duration (minutes): 60
    Format description: We will provide a briefing on the work of CTED and other participating organizations and the theater format best accommodates a larger audience, visibility of speakers, and facilitates Q&A. 60 minutes is enough time for speakers to provide longer briefings and also leave time for (hopefully robust) Q&A with participants. We are open to conducting a 60 minute session with more tailored briefings and fewer Q&A, per IGF discretion.

    Description

    I.     BACKGROUND

         Information and communications technologies (ICT) -- including the Internet, social media platforms, other online spaces[1], and related emerging technologies[2] -- while mostly used for beneficial purposes, have also become tools of choice for terrorists such as the Islamic State in Iraq and the Levant (ISIL, also known as Daesh), Al-Qaida, their affiliated groups and supporters, and other designated terrorist organizations. These actors are known to exploit ICT to engage in a wide range of activities for terrorist purposes, including recruitment and incitement to commit terrorist acts, training, planning, networking, securing logistical support, acquiring weapons and their components, fundraising, and the conduct of terrorist operations.

         Exponential leaps in the development of new and emerging ICT raise new risks for how terrorists could exploit such technologies to advance their ability to operate and avoid detection.  Terrorist actors are already exploiting generative AI, chatbots, decentralized online spaces, cloud-based archives, and a range of other technological tools to reach their audiences and attract new supporters, incite violence, augment reconnaissance and targeting, and avoid detection.  While the threat of their misuse for terrorist purposes is apparent, these technologies also have immense potential to be used for social and economic development, as well to be used by States to increase the effectiveness of their counter-terrorism efforts.

         The United Nations Security Council has its focused attention on countering the exploitation of ICT for terrorist purposes for over 23 years, adopting 16 counter-terrorism related resolutions and five policy documents on the matter.[3] In resolution 2617 (2021), the Council specifically referenced “[the] Internet, other information and communications technology (ICTs), and other emerging technologies for terrorist purposes”. In the Delhi Declaration adopted by the Security Council’s Counter-Terrorism Committee in October 2022, the Committee gave focus to the need for Member States “to prevent and counter the use of new ICT and other emerging technologies for terrorist purposes”. The Security Council’s Counter-Terrorism Committee (CTC), through its Executive Directorate (CTED), works with United Nations Member States, Global Counter-Terrorism Coordination Compact entities, and other key regional, civil society, and tech sector partners to strengthen States’ implementation of these and other counter-terrorism resolutions through the conduct of assessments, the identification of emerging trends, and the facilitation of targeted knowledge and capacity building.

         The Security Council has repeatedly called on Member States to ensure that any measures taken to combat terrorism comply with all their obligations under international law, including international human rights law. This is particularly relevant to the use of ICT and emerging technologies in terrorism prevention and law enforcement efforts for which unintended consequences and potential human rights implications often evolve in tandem with technological adaptations. The mainstreaming of gender perspectives across all aspects of terrorism prevention and counter-terrorism programmes, particularly those to counter the use of ICT and related new and emerging technologies for terrorist purposes, has become increasingly important.

         A cooperative approach in partnership with the private sector, civil society, and other stakeholders is stressed in Security Council resolutions 2322 (2016), 2370 (2017), 2395 (2017), 2396 (2017), and 2617 (2021), as well as in the Delhi Declaration. Coordination and cooperation, including the sharing of information, are essential for States to effectively counter-terrorism.  The involvement of a broad range of stakeholders (including United Nations entities, international and regional organizations, civil society organizations, academia, and private sector technology partners) can help to ensure that measures and policies developed to prevent and counter the use of ICT and emerging technologies for terrorist purpose are crafted in a comprehensive and holistic manner reflecting whole-of-government and whole-of-society approaches.[4]Collaboration through such partnerships can additionally help States mitigate risks, reduce potential negative impacts, and avoid restrictive responses based on potential risks that could be unnecessary and disproportionate to the advantages brought by these technologies.

    II.     OBJECTIVE

         Panelists will present the work of their organizations on countering the use of ICT and related emerging technologies for terrorist purposes.  They will highlight how this work is both an essential component of a multi-stakeholder digital environment and necessary for maintaining peace and encouraging good relations between States, including in the pursuit of technological advances and societal development. Panelists will further address the importance of inclusiveness (all-of-society approach), compliance with international human rights, and the strengthening of partnerships between diverse stakeholders in the design and implementation of State counter-terrorism efforts related to, and reliant upon, ICT and emerging technologies.

     


    [1] ICT and related online spaces can include, inter alia, messaging tools and chat bots, video games and gaming-adjacent platforms and chatrooms; video and audio live-streams and podcasts; the darknet and dark web; online marketplaces; Web 3.0, Web 4.0, the Fediverse and various other decentralized online spaces; Metaverse-type spaces and applications; terrorist operated websites (TOWs) and web-based publications, blogs and electronic books; also digital archives and other digital spaces.

    [2] Such as, for example, artificial intelligence (AI) and machine-learning systems and tools including large-language, generative, and fusion models; augmented reality and virtual reality (AR/VR) systems and applications; special computing systems; quantum computing applications; blockchain-supported applications and platforms; cloud-based platforms; voice, gate, and other biometrics cloning technologies; advanced robotics; cyber-threat software (malware); and other nascent cyber technologies.

    [3] These include resolutions 1373 (2001), 1624 (2005), 1963 (2010), 2129 (2013), 2178 (2014), 2199 (2015), 2322 (2016), 2331 (2016), 2341 (2017), 2354 (2017), 2370 (2017), 2395 (2017), 2396 (2017), 2462 (2019), 2617 (2021), and 2713 (2023); also the Madrid Guiding Principles (S/2015/939), Statement by the President of the Security Council (S/PRST/2016/6), Comprehensive International Framework to Counter Terrorist Narratives (S/2017/375), Addendum to the [Madrid] Guiding Principles on foreign terrorist fighters (2018) (S/2018/1177), and the Delhi Declaration (2022).

    [4] Resolutions 2322 (2016), 2370 (2017), 2395 (2017), 2396 (2017), and 2617 (2021) stress the importance of cooperation with civil society and the private sector.  Resolutions 2395 (2017), 2396 (2017), and 2617 (2021) specifically recognize Tech Against Terrorism and the Global Internet Forum to Counter Terrorism (GIFCT); resolution 2617 (2021) additionally notes the Christchurch Call.

    Organizers

    🔒CTED
    Counter-Terrorism Committee Executive Directorate (CTED)

    Speakers
    1. EXPERT PANEL

         The Expert Panel will consist of representatives from the following organizations and bodies:

    • The Counter-Terrorism Committee Executive Directorate (CTED)
    • The United Nations Office on Drugs and Crime Terrorism Prevention Branch (UNODC/TPB)
    • The Parliamentary Assembly of the Mediterranean (PAM)
    • Tech Against Terrorism
    • The Global Internet Forum to Counter Terrorism (GIFCT)
    1. AGENDA

    Introduction and Welcoming Remarks

    17:00 – 17:15

    • Assistant Secretary-General Ms. Natalia Gherman, Executive Director, Counter-Terrorism Committee Executive Director
    • Honourable Pedro Roque (Portugal), Vice-President, Parliamentary Assembly of the Mediterranean (PAM)

    Presentations and Discussion

     

     

     

     

    17:15 –17:48

    MODERATOR / PANELLISTS:

    • Ms. Jennifer Bramlette, Coordinator for Information and Communication Technology (ICT), United Nations Security Council Counter-Terrorism Committee Executive Directorate (CTED) Moderator
    • Ms. Arianna Lepore, Coordinator, Global Initiative on Electronic Evidence, Terrorism Prevention Branch, United Nations Office on Drugs and Crime (UNODC)
    • Mr. Adam Hadley CBE, Executive Director, Tech Against Terrorism (virtual)
    • Dr. Erin Saltman, Membership & Programs Director, Global Internet Forum to Counter Terrorism (GIFCT) (virtual)

    17:48 –18:00

    Q&A / OPEN DISCUSSION

     

    Onsite Moderator

    Onsite: Jennifer Bramlette, Coordinator for Information and Communication Technology

    Online Moderator

    Online: Lisa Letschert, CTED

    Rapporteur

    Rapporteur – Lisa Letschert, Special Assistant to the CTED Executive Director

    SDGs

    5. Gender Equality
    9. Industry, Innovation and Infrastructure
    10. Reduced Inequalities
    11. Sustainable Cities and Communities
    16. Peace, Justice and Strong Institutions

    Targets: Growing ubiquitousness of information and communications technologies (ICT) has resulted in an increasing number of new threats and challenges, including those of a disruptive and destructive nature. At the same time, the benefits of a highly digitized world through increased use of ICT are vast—from supporting sustainable development to promoting inclusiveness and human agency. The malicious use of digital technologies affects all three main pillars of the UN’s work— international peace and security, human rights, and development—and thus constitutes a challenge deserving the attention of the whole UN system. The Security Council has repeatedly called on States to ensure that any measures taken to combat terrorism comply with all their obligations under international law, including international human rights law, international humanitarian law, and refugee law, as applicable. This is particularly relevant to the use of new technology in terrorism prevention and law enforcement efforts for which unintended consequences and potential human rights implications evolve in tandem with technological adaptations. The mainstreaming of gender perspectives across all aspects of terrorism prevention and counter-terrorism programmes, particularly those to counter the use of ICT and related new and emerging technologies for terrorist purposes, has become increasingly important. A cooperative approach in partnership with the private sector, civil society, and other stakeholders is stressed in Security Council resolutions 2322 (2016), 2370 (2017), 2395 (2017), 2396 (2017), and 2617 (2021). Coordination and cooperation, including the sharing of information, are essential for States to effectively counter-terrorism – whether across national administrations, with other States regionally and internationally, or with non-government partners. Strong engagement with the private sector, civil society, academia, and other stakeholders can also help States identify and include international standards and necessary safeguards into counter-terrorism frameworks to help mitigate risks and avoid potential negative impacts. Collaboration through such partnerships can additionally help States avoid restrictive responses based on potential risks that could be unnecessary and disproportionate to the advantages brought by ICT and related new and emerging technologies.

    Key Takeaways (* deadline at the end of the session day)

    States face a range of challenges when it comes to countering the use of ICT for terrorist purposes. A major capacity gap is a shortage of tech talent working for Governments. There is an ever-widening gap in technological capacity between States. Criminal justice systems are not designed to address crimes committed in online spaces or through ICT means. Most States don’t have laws to deal with crimes committed through or by AI.

    Multistakeholderism is not a nice to have, but a need to have in order to understand the 360-degree threat landscape and develop effective solutions to countering terrorism and violent extremism online. A whole-of-society approach involving a broad range of stakeholders -- States, international and regional organizations, the tech sector, civil society, Parliamentarians, academia, community and religious leaders, the media, etc. – is essential.

    The tech sector needs to take more responsibility and be held accountable for practices which cause and/or permit the misuse of their platforms and tools, i.e., algorithms that amplify harmful content, unmoderated spaces, the sale of domain names and hosting services to terrorist groups, and AI training data containing extremist/harmful data. States need to work with the tech sector to ensure that online safety & oversight priorities are upheld.

    Call to Action (* deadline at the end of the session day)

    States are encouraged to agree a global “minimum tech standard” for governments. To reach that agreed tech standard, capacity building organizations and donor States – with other stakeholders - could build a comprehensive capacity building framework and deliver technical assistance, training and equipment to less-capable countries to ensure that every State is able to effectively prevent and counter the use of ICT for terrorist purposes.

    States and the international community must urgently address ICT and AI-related legal, resource, and operational shortfalls before terrorism threat and vulnerability landscapes become even more complex. Tech companies are also looking to States to develop necessary legal frameworks and guidance on how best to define and build policies around terrorist and violent extremist content online so they can advance their own policies and practices.