Session
Theater
Duration (minutes): 60
Format description: We will provide a briefing on the work of CTED and other participating organizations and the theater format best accommodates a larger audience, visibility of speakers, and facilitates Q&A. 60 minutes is enough time for speakers to provide longer briefings and also leave time for (hopefully robust) Q&A with participants. We are open to conducting a 60 minute session with more tailored briefings and fewer Q&A, per IGF discretion.
I. BACKGROUND
Information and communications technologies (ICT) -- including the Internet, social media platforms, other online spaces[1], and related emerging technologies[2] -- while mostly used for beneficial purposes, have also become tools of choice for terrorists such as the Islamic State in Iraq and the Levant (ISIL, also known as Daesh), Al-Qaida, their affiliated groups and supporters, and other designated terrorist organizations. These actors are known to exploit ICT to engage in a wide range of activities for terrorist purposes, including recruitment and incitement to commit terrorist acts, training, planning, networking, securing logistical support, acquiring weapons and their components, fundraising, and the conduct of terrorist operations.
Exponential leaps in the development of new and emerging ICT raise new risks for how terrorists could exploit such technologies to advance their ability to operate and avoid detection. Terrorist actors are already exploiting generative AI, chatbots, decentralized online spaces, cloud-based archives, and a range of other technological tools to reach their audiences and attract new supporters, incite violence, augment reconnaissance and targeting, and avoid detection. While the threat of their misuse for terrorist purposes is apparent, these technologies also have immense potential to be used for social and economic development, as well to be used by States to increase the effectiveness of their counter-terrorism efforts.
The United Nations Security Council has its focused attention on countering the exploitation of ICT for terrorist purposes for over 23 years, adopting 16 counter-terrorism related resolutions and five policy documents on the matter.[3] In resolution 2617 (2021), the Council specifically referenced “[the] Internet, other information and communications technology (ICTs), and other emerging technologies for terrorist purposes”. In the Delhi Declaration adopted by the Security Council’s Counter-Terrorism Committee in October 2022, the Committee gave focus to the need for Member States “to prevent and counter the use of new ICT and other emerging technologies for terrorist purposes”. The Security Council’s Counter-Terrorism Committee (CTC), through its Executive Directorate (CTED), works with United Nations Member States, Global Counter-Terrorism Coordination Compact entities, and other key regional, civil society, and tech sector partners to strengthen States’ implementation of these and other counter-terrorism resolutions through the conduct of assessments, the identification of emerging trends, and the facilitation of targeted knowledge and capacity building.
The Security Council has repeatedly called on Member States to ensure that any measures taken to combat terrorism comply with all their obligations under international law, including international human rights law. This is particularly relevant to the use of ICT and emerging technologies in terrorism prevention and law enforcement efforts for which unintended consequences and potential human rights implications often evolve in tandem with technological adaptations. The mainstreaming of gender perspectives across all aspects of terrorism prevention and counter-terrorism programmes, particularly those to counter the use of ICT and related new and emerging technologies for terrorist purposes, has become increasingly important.
A cooperative approach in partnership with the private sector, civil society, and other stakeholders is stressed in Security Council resolutions 2322 (2016), 2370 (2017), 2395 (2017), 2396 (2017), and 2617 (2021), as well as in the Delhi Declaration. Coordination and cooperation, including the sharing of information, are essential for States to effectively counter-terrorism. The involvement of a broad range of stakeholders (including United Nations entities, international and regional organizations, civil society organizations, academia, and private sector technology partners) can help to ensure that measures and policies developed to prevent and counter the use of ICT and emerging technologies for terrorist purpose are crafted in a comprehensive and holistic manner reflecting whole-of-government and whole-of-society approaches.[4], Collaboration through such partnerships can additionally help States mitigate risks, reduce potential negative impacts, and avoid restrictive responses based on potential risks that could be unnecessary and disproportionate to the advantages brought by these technologies.
II. OBJECTIVE
Panelists will present the work of their organizations on countering the use of ICT and related emerging technologies for terrorist purposes. They will highlight how this work is both an essential component of a multi-stakeholder digital environment and necessary for maintaining peace and encouraging good relations between States, including in the pursuit of technological advances and societal development. Panelists will further address the importance of inclusiveness (all-of-society approach), compliance with international human rights, and the strengthening of partnerships between diverse stakeholders in the design and implementation of State counter-terrorism efforts related to, and reliant upon, ICT and emerging technologies.
[1] ICT and related online spaces can include, inter alia, messaging tools and chat bots, video games and gaming-adjacent platforms and chatrooms; video and audio live-streams and podcasts; the darknet and dark web; online marketplaces; Web 3.0, Web 4.0, the Fediverse and various other decentralized online spaces; Metaverse-type spaces and applications; terrorist operated websites (TOWs) and web-based publications, blogs and electronic books; also digital archives and other digital spaces.
[2] Such as, for example, artificial intelligence (AI) and machine-learning systems and tools including large-language, generative, and fusion models; augmented reality and virtual reality (AR/VR) systems and applications; special computing systems; quantum computing applications; blockchain-supported applications and platforms; cloud-based platforms; voice, gate, and other biometrics cloning technologies; advanced robotics; cyber-threat software (malware); and other nascent cyber technologies.
[3] These include resolutions 1373 (2001), 1624 (2005), 1963 (2010), 2129 (2013), 2178 (2014), 2199 (2015), 2322 (2016), 2331 (2016), 2341 (2017), 2354 (2017), 2370 (2017), 2395 (2017), 2396 (2017), 2462 (2019), 2617 (2021), and 2713 (2023); also the Madrid Guiding Principles (S/2015/939), Statement by the President of the Security Council (S/PRST/2016/6), Comprehensive International Framework to Counter Terrorist Narratives (S/2017/375), Addendum to the [Madrid] Guiding Principles on foreign terrorist fighters (2018) (S/2018/1177), and the Delhi Declaration (2022).
[4] Resolutions 2322 (2016), 2370 (2017), 2395 (2017), 2396 (2017), and 2617 (2021) stress the importance of cooperation with civil society and the private sector. Resolutions 2395 (2017), 2396 (2017), and 2617 (2021) specifically recognize Tech Against Terrorism and the Global Internet Forum to Counter Terrorism (GIFCT); resolution 2617 (2021) additionally notes the Christchurch Call.
🔒CTED
Counter-Terrorism Committee Executive Directorate (CTED)
- EXPERT PANEL
The Expert Panel will consist of representatives from the following organizations and bodies:
- The Counter-Terrorism Committee Executive Directorate (CTED)
- The United Nations Office on Drugs and Crime Terrorism Prevention Branch (UNODC/TPB)
- The Parliamentary Assembly of the Mediterranean (PAM)
- Tech Against Terrorism
- The Global Internet Forum to Counter Terrorism (GIFCT)
- AGENDA
Introduction and Welcoming Remarks |
|
17:00 – 17:15 |
|
Presentations and Discussion |
|
17:15 –17:48 |
MODERATOR / PANELLISTS:
|
17:48 –18:00 |
Q&A / OPEN DISCUSSION |
Onsite: Jennifer Bramlette, Coordinator for Information and Communication Technology
Online: Lisa Letschert, CTED
Rapporteur – Lisa Letschert, Special Assistant to the CTED Executive Director
5. Gender Equality
9. Industry, Innovation and Infrastructure
10. Reduced Inequalities
11. Sustainable Cities and Communities
16. Peace, Justice and Strong Institutions
Targets: Growing ubiquitousness of information and communications technologies (ICT) has resulted in an increasing number of new threats and challenges, including those of a disruptive and destructive nature. At the same time, the benefits of a highly digitized world through increased use of ICT are vast—from supporting sustainable development to promoting inclusiveness and human agency. The malicious use of digital technologies affects all three main pillars of the UN’s work— international peace and security, human rights, and development—and thus constitutes a challenge deserving the attention of the whole UN system. The Security Council has repeatedly called on States to ensure that any measures taken to combat terrorism comply with all their obligations under international law, including international human rights law, international humanitarian law, and refugee law, as applicable. This is particularly relevant to the use of new technology in terrorism prevention and law enforcement efforts for which unintended consequences and potential human rights implications evolve in tandem with technological adaptations. The mainstreaming of gender perspectives across all aspects of terrorism prevention and counter-terrorism programmes, particularly those to counter the use of ICT and related new and emerging technologies for terrorist purposes, has become increasingly important. A cooperative approach in partnership with the private sector, civil society, and other stakeholders is stressed in Security Council resolutions 2322 (2016), 2370 (2017), 2395 (2017), 2396 (2017), and 2617 (2021). Coordination and cooperation, including the sharing of information, are essential for States to effectively counter-terrorism – whether across national administrations, with other States regionally and internationally, or with non-government partners. Strong engagement with the private sector, civil society, academia, and other stakeholders can also help States identify and include international standards and necessary safeguards into counter-terrorism frameworks to help mitigate risks and avoid potential negative impacts. Collaboration through such partnerships can additionally help States avoid restrictive responses based on potential risks that could be unnecessary and disproportionate to the advantages brought by ICT and related new and emerging technologies.
Report
States face a range of challenges when it comes to countering the use of ICT for terrorist purposes. A major capacity gap is a shortage of tech talent working for Governments. There is an ever-widening gap in technological capacity between States. Criminal justice systems are not designed to address crimes committed in online spaces or through ICT means. Most States don’t have laws to deal with crimes committed through or by AI.
Multistakeholderism is not a nice to have, but a need to have in order to understand the 360-degree threat landscape and develop effective solutions to countering terrorism and violent extremism online. A whole-of-society approach involving a broad range of stakeholders -- States, international and regional organizations, the tech sector, civil society, Parliamentarians, academia, community and religious leaders, the media, etc. – is essential.
The tech sector needs to take more responsibility and be held accountable for practices which cause and/or permit the misuse of their platforms and tools, i.e., algorithms that amplify harmful content, unmoderated spaces, the sale of domain names and hosting services to terrorist groups, and AI training data containing extremist/harmful data. States need to work with the tech sector to ensure that online safety & oversight priorities are upheld.
States are encouraged to agree a global “minimum tech standard” for governments. To reach that agreed tech standard, capacity building organizations and donor States – with other stakeholders - could build a comprehensive capacity building framework and deliver technical assistance, training and equipment to less-capable countries to ensure that every State is able to effectively prevent and counter the use of ICT for terrorist purposes.
States and the international community must urgently address ICT and AI-related legal, resource, and operational shortfalls before terrorism threat and vulnerability landscapes become even more complex. Tech companies are also looking to States to develop necessary legal frameworks and guidance on how best to define and build policies around terrorist and violent extremist content online so they can advance their own policies and practices.
The Counter-Terrorism Committee Executive Directorate (CTED) organized and led a multistakeholder open forum on countering the use of Information and Communications Technologies (ICT) for terrorist purposes on day 1 of the IGF 2024. This was both the first time the IGF included a counter-terrorism focused event and the first time CTED has led a side event during the IGF. Panellists included CTED, the Terrorism Prevention Branch of the United Nations Office on Drugs and Crime (UNODC/TPB), the Parliamentary Assembly of the Mediterranean (PAM), Tech Against Terrorism, and the Global Internet Forum to Counter Terrorism (GIFCT).
CTED highlighted the technical aspects of its mandate from the United Nations Security Council to include: preventing and countering the use of ICTs and emerging technologies like artificial intelligence (AI) for terrorist purposes such as recruitment and incitement to commit terrorist acts, and terrorism planning, preparation and financing; countering terrorist narratives online and offline; gathering, processing, and sharing digital data and evidence; and cybersecurity specifically in relation to the protection of critical infrastructure. CTED stressed the necessity for States to respect for human rights, fundamental freedoms and the rule of law in the use of ICT and new technologies when countering terrorism, as well as the inclusion of whole-of-society, whole-of-government and gender-sensitive approaches. CTED emphasized the need for multi-stakeholder cooperation, cross-border collaboration and public-private partnerships.
CTED highlighted that that Member States continue to face a range of challenges in dealing with the use of ICT and emerging technologies for terrorist purposes that stem from (a) the sheer numbers and diversification of users across a multitude of decentralized online spaces and using a myriad of digital tools; (b) the rapid increase, availability and technological capabilities of AI and other emerging tech tools, and; (c) the continued social, economic, and political drivers of violent extremism and terrorism. Many States also face challenges incorporating ICTs into their counter-terrorism systems. A major capacity gap noted by CTED is a shortage of tech talent and cutting-edge equipment in government entities. Another common challenge is that criminal justice systems are not designed to address crimes committed in online spaces or through cyber means. CTED outlined the work it is doing with States and other partners to address these challenges, including through multi-stakeholder activities to develop non-binding guiding principles.
UNODC TPB discussed the work it has undertaken under the Global Initiative on Handling Electronic Evidence across borders. UNODC highlighted that recent terrorist attacks have demonstrated the need for immediate responses to emergency incidents, preservation of data and urgent requests for international cooperation. UNODC has developed tools to facilitate law enforcement officials to obtain e-evidence, to include the Data Disclosure Framework and Standardized Direct Request Forms, and has provided crucial capacity building to States. UNODC has detailed key technical assistance provided to counter terrorist narratives, as well as to build societal resilience to terrorist messaging and other harmful content online through digital, media, and AI literacy training.
PAM explained the work the PAM Secretariat is doing in the areas of AI and ICT, as well as some key steps taken by the Parliamentarians from its 34 Member and associate Parliaments from the Euro-Mediterranean and Gulf regions. PAM stressed that its members are fully committed to fostering dialogue, cooperation, and joint initiatives towards the regulation of AI and Emerging Technologies, thus complementing the efforts of the UN and the international community in this direction. PAM highlighted the work of its Center for Global Studies (PAM-CGS) to publish a report entitled “The Malicious Use of AI and Emerging Technologies by Terrorist and Criminal Groups: Impact on Security, Legislation, and Governance”. PAM-CGS is already working on two new reports, dedicated to the Resilience of Democratic Systems in relation to the Misuse of AI and New Technologies, and The Use of Spywares and their Legislative Regulation. PAM has also established a Permanent Global Parliamentary Observatory on AI and ICT, to serve as a platform to monitor, analyze, promote and advocate for effective legislation, principles, and criteria and publishes a daily and weekly Digest, of news and analyses about trends on AI and Emerging Technologies. PAM drew attention to two important resolutions adopted in May 2024 – one on digitalization, and one on AI.
Tech Against Terrorism described the nature and process of its work. It highlighted that a fundamental paradigm shift is occurring in how we must view terrorist use of the internet - from seeing it merely as a tactical tool for recruitment and radicalization to recognizing it as a strategic battleground for political influence and international standing. Tech Against Terrorism explained that terrorist groups are not just using major platforms but are entrepreneurially creating their own websites and infrastructure, demonstrating that the challenge extends beyond social media content moderation to the very infrastructure of the internet. Tech Against Terrorism's Terrorist Content Analytics Platform (TCAP) identifies and verifies terrorist content online, currently alerting over 140 platforms to support rapid response. However, the scale and sophistication of terrorist activity online demands even greater coordinated attention and resources from both the tech sector and governments. Tech Against Terrorism called for the international community to establish clear frameworks and jurisdictional guidelines regarding terrorist organizations' access to internet infrastructure, particularly with regard to terrorist-operated websites, and to develop improved data sharing mechanisms between stakeholders to better analyze terrorist content across both large and small platforms. Success requires maintaining international consensus on internet governance and ensuring that counter-terrorism efforts adapt to address both tactical and strategic aspects of terrorist operations online.
The GIFCT spoke about how it is configured as an NGO between the operating board (consisting of Meta, Twitter (X), Yahoo, and Microsoft) and the Independent Advisory Committee, and described its research, mentoring, and other workstreams. GIFCT spoke about its work on taxonomy, identifying and cataloging lingo and signals, and its hashing database. It stressed how language not only differs in context, and between groups, but that language and meaning can change rapidly. GIFCT stressed that GIFCT and its member companies see emerging technologies both as needing advanced insights on how bad actors exploit these technologies, but also see concrete opportunities by using emerging technologies in efforts to scale moderation and safety work. AI tooling has been used by larger tech companies in scaled moderation to support translation work, network disruptions, advanced content detection, and to tackle recidivism of bad actors. Smaller and medium companies are learning from larger tech companies through networks like GIFCT. It also underscored that Tech companies are looking to legal frameworks and guidance on how best to define and build policies around terrorist and violent extremist content. The more governments and intergovernmental bodies can articulate their definitions and frameworks, tech companies can advance their own policies and practices.