Twitter closes accounts of Somali militant group Al Shabaab

As Twitter closes accounts, the group opens others

Twitter is continuing efforts to close the accounts of Al Shabaab after the Somali Islamic militant group used the site to threaten the life of the country's president, Hassan Sheikh Mohamud.

The militant group said in a Twitter message that it attacked a presidential convoy last week, though the presidency denies such an attack took place. Twitter shut the account of the group, which then opened another account under a different name, @HSM_Press, according to press reports. That account, however, has also been shuttered.

Earlier this year, Al Shabaab used the microblogging site to link videos of Kenyan hostages, mock rivals and claim responsibility for several bombings in Kenya. The group also used Twitter to announce the killing of a French hostage.

This resulted in the closure of the group's first Twitter account.

Al Shabaab's first Twitter account, which had thousands of followers, was opened in 2011 after neighboring Kenya sent troops to help fight insurgents. The Kenyan troops backed by the African Union forces have been battling Al Shabaab and forced the group out of Somalia's main towns over the past two years but the group is still said to be controlling many parts of southern and central Somalia.

Al Shabaab wants to impose its strict version of Sharia, or Islamic law, across the East African nation.

Twitter has told media outlets that it has suspended the group's account but that it does not comment on individual accounts.

The closing of Al Shabaab's Twitter account comes at a time when many African governments are enacting laws that will regulate and in some cases ban the use of social media networks.

Social media networks are viewed by politicians in the region as tools for fueling instability, following social unrest in North Africa and the Middle East.

Analysts say the use of social media network by Al Shabaab to threaten violence and advance their agenda may give a stronger case for many African governments to impose restrictions on the use of social media networks.

"We are already grappling with ideas by many African governments to regulate or even block the use of social media networks. I'm afraid what is happening in Somalia might provide a stronger case for these governments to move even faster," said Amos Kalunga, telecom analyst at the Computer Society of Zambia.

Zambia, Gambia and Malawi are some of the countries in the region that are working to regulate the use of social media networks.

In Gambia, the National Assembly, the country's legislative body, has already passed a law that imposes stiff punishment on persons found guilty of using the Internet to spread false news. Under the law, offenders will be jailed up to 15 years or fined an amount of US$90,000. The Gambian government intends to use the law to silence critical Gambian Internet users, online activists, online newspaper and bloggers within the country.

Join the CSO newsletter!

Error: Please check your email address.

Tags securityAl Shabaabinternet

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Michael Malakata

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts