Security Council - Counter-Terrorism Committee (CTC) -  information technology /securitycouncil/ctc/tags/%C2%A0information-technology en The 51Թ Counter-Terrorism Committee Executive Directorate (CTED) welcomes major private sector initiative to counter terrorism online /securitycouncil/ctc/news/united-nations-counter-terrorism-committee-executive-directorate-cted-welcomes-major-private <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Today 26 June 2017, Facebook, Microsoft, Twitter, and YouTube announced the formation of the&nbsp;<i>Global Internet Forum to Counter Terrorism</i>, an initiative to make their hosted consumer services hostile to terrorists and violent extremists.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">“I welcome this major initiative, which elevates our existing private-public partnership with these and other companies,”&nbsp;said 51Թ Assistant Secretary-General Jean-Paul Laborde, Executive Director of the Security Council Counter-Terrorism Committee Executive Directorate (CTED).&nbsp;CTED leads ‘Tech Against Terrorism’ (<a href="http://www.techagainstterrorism.org/" style="color:#0563c1; text-decoration:underline">www.techagainstterrorism.org</a>) together with the foundation ICT4Peace.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">“Terrorism is a global threat that can only be defeated by sustained, joint efforts. The 51Թ remains committed to addressing the scourge of terrorism, and we look forward to remaining a key partner to the private sector. The Security Council remains seized of this and other issues that represent serious threats to international peace and security, and its adoption last month of resolution 2354 (2017) provides a comprehensive international framework to counter terrorist narratives,” Mr. Laborde added.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Underlining that the spread of terrorism and violent extremism is a pressing global problem and a critical challenge, these companies have already developed policies and removal practices that enable them to take a hard line against terrorist or violent extremist content on their hosted consumer services. By working together, and through the sharing of the best technological and operational elements of their individual efforts, they believe they can have a greater impact on the threat of terrorist content online.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The new forum builds on initiatives including the&nbsp;EU Internet Forum&nbsp; and the&nbsp;Shared Industry Hash Database; discussions with the UK and other governments; and the conclusions of the recent&nbsp;G7&nbsp; and&nbsp;European Council meetings. It will formalise and structure existing and future areas of collaboration between these companies and foster cooperation with smaller tech companies, civil society groups, and academics, government, as well as supranational bodies such as the EU and the UN.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The scope of the work will evolve over time as needs shift in responding to the ever-evolving terrorist and extremist tactics. Initially, the work will focus on:</span></span></span></span></span></span></p> <ol> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Technological solutions:&nbsp;</span></span></span></b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">these&nbsp;companies will work together to refine and improve existing joint technical work, such as the Shared Industry Hash Database; exchange best practices as they develop and implement new content detection and classification techniques using machine learning; and define standard transparency reporting methods for terrorist content removals.</span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Research:&nbsp;</span></span></span></b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">they will commission research to inform their counter-speech efforts and guide future technical and policy decisions around the removal of terrorist content.</span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Knowledge-sharing:&nbsp;</span></span></span></b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">these companies will work with counter-terrorism experts including governments, civil society groups, academics, as well as other companies to engage in shared learning about terrorism. And through a joint partnership specifically with UN CTED and the ICT4Peace Initiative (<a href="http://www.techagainstterrorism.org/" style="color:#0563c1; text-decoration:underline">techagainstterrorism.org</a>), implementing Security Council resolution 2354 (2017), they&nbsp;are establishing a broad knowledge-sharing network to:</span></span></span></span></span></span></span><br /> <ol style="list-style-type:lower-alpha"> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list 1.0in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><i><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Engage with smaller companies:&nbsp;</span></span></span></i><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">they will help smaller companies develop the technology and processes necessary to tackle terrorist and extremist content online.</span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list 1.0in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><i><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Develop best practices:&nbsp;</span></span></span></i><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">these companies already partner with organizations such as the&nbsp;Center for Strategic and International Studies&nbsp;,&nbsp;Anti-Defamation League&nbsp; and the&nbsp; Global Network Initiative&nbsp; to identify how best to counter extremism and online hate, while respecting freedom of expression and privacy.&nbsp;They&nbsp;can socialise these best practices, and develop additional shared learnings on topics such as community guideline development, and policy enforcement.</span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list 1.0in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><i><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Counterspeech</span></span></span></i><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">: all of these companies have robust counterspeech initiatives in place (e.g., YouTube’s&nbsp;Creators for Change, Jigsaw’sRedirect Method, Facebook’s P2P and OCCI, Microsoft’s partnership with the&nbsp;Institute for Strategic Dialogue for counter-narratives on Bing, and Twitter’s global NGO training programme). The forum they have now established allows them to learn from and contribute to one another’s counterspeech efforts, and discuss how to further empower and train civil society organisations and individuals who may be engaged in similar work and support ongoing efforts, such as the Civil society empowerment project (CSEP).</span></span></span></span></span></span></span></li> </ol> </li> </ol> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">These companies will be hosting a series of learning workshops in partnership with UN CTED/ICT4Peace in Silicon Valley and around the world to drive these areas of collaboration.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Further information on all of the above initiatives will be shared in due course.</span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Mon, 26 Jun 2017 18:11:00 +0000 BMUSONI 20477 at /securitycouncil/ctc 51Թ Security Council Counter-Terrorism Committee holds special meeting on preventing exploitation of the Internet and social media for terrorist purposes /securitycouncil/ctc/news/united-nations-security-council-counter-terrorism-committee-holds-special-meeting-preventing <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-23213" class="file file-image file-image-jpeg"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/23213">706377-sc-pm-01_12_2016-16.56.16.jpg</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/706377-sc-pm-01_12_2016-16.56.16.jpg?itok=xSEBHT8E" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-family: Roboto; font-size: 12pt;">Exploitation of the Internet and social media for terrorist purposes can only be defeated through sustained and comprehensive action involving the active participation and collaboration of Member States, international and regional organizations, civil society, and the private sector. This was a common theme expressed by of a number of participants in a special meeting of the Counter-Terrorism Committee, held at the 51Թ in New York on 1 December 2016.</span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">“We must work together to promote dialogue among all stakeholders in order to find effective ways to prevent the exploitation of information and communication technologies for terrorist purposes,” H.E. Amr Abdellatif Aboulatta, Ambassador and Permanent Representative of Egypt to the 51Թ, said in his closing statement. Ambassador Aboulatta is Chair of the Counter-Terrorism Committee of the Security Council.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The meeting –&nbsp;<i>Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms&nbsp;</i>– was held against the backdrop of the significant and growing threat posed to Member States by the exploitation of ICT, in particular the Internet and social media, for terrorist purposes. In a number of resolutions, the Security Council has recognized this threat and called upon Member States to take the measures needed to deliver an effective response. The formal meeting was preceded by technical sessions on the same theme organized by the Executive Directorate of the Counter-Terrorism Committee (CTED) on 30 November and 1 December 2016.</span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Representatives of the private sector underscored their commitment to preventing the exploitation of ICT for terrorist purposes. Maryam Mujica, Public Policy Team Manager for Twitter, highlighted that the company “has suspended over 360,000 accounts for threatening or promoting terrorist acts” since mid-2015.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Participants in the special meeting and the accompanying technical sessions included Member States, international and regional organizations, 51Թ entities, the private sector, academia, faith-based leaders, and civil society representatives. Having relevant actors from various sectors gathered in the same room provided an opportunity for dialogue and for a frank discussion about challenges and ways forward.</span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span lang="FR-BE" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Documents</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/concept-note_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Concept note</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted-technical-meeting-agenda-30-november-update.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Agenda, technical meeting</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/ctc-meeting-agenda-30-november-update.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Agenda, CTC special meeting</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/private-sector-engagement-in-responding-to-the-use-of-the-internet-and-ict-for-terrorist-purposes.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">ICT4Peace report – Private sector engagement in responding to the use of the Internet and ICT for terrorist purposes</a></span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Presentations</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-i-30-nov-arije-antinori-european-counter-terrorism-centre-ectc.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session I 30 Nov – Arije Antinori, European Counter-Terrorism Centre (ECTC)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-i-30-nov-arije-antinori-european-counter-terrorism-centre-ectc.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session I 30 Nov – V.S. Subrahmanian, University of Maryland</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-cancelled-vidia-arianti-icpvtr.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30 – Vidia Arianti, ICPVTR</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-v-30-nov-maxim-grigoryev-the-foundation-for-the-study-of-democracy.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session V 30 Nov – Maxim Grigoryev, The Foundation for the Study of Democracy</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="https://www.youtube.com/watch?v=YJtpkwt-ifQ&amp;feature=youtu.be" style="color:#0563c1; text-decoration:underline" target="_blank">2016-12-01-Session I 1 Dec – Rafal Rohozinski, CEO and Chief Innovation Officer at SecDev Group, ICT4Peace</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-12-01-session-v-1-dec-dr.-mahmoud-nagah-ahmed-farag-khalaf-al-azhar-observer.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-12-01-Session V 1 Dec – Dr. Mahmoud Nagah Ahmed Farag Khalaf, Al-Azhar Observer</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/draft-speech-for-cted-jk-dec16-3.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Speech By Jan Kleijssen Director Information Society and Action against Crime Directorate Directorate General Human Rights and Rule of Law – DGI Council of Europe</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/contribution-oif-1erdec2016.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Contribution de Mme Patricia Herdt, Représentante permanente a.i.<br /> de l’Organisation internationale de la Francophonie (OIF) auprès des Nations Unies</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted.speech-by-dr.reham-abdullah-1.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">“International Cooperation and Public-Private Partnership while Respecting International Human Rights” A Speech Delivered by: Dr. Reham Abdullah Salamah</a></span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Media coverage</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/sc/ctc/news/media-coverage#ICTSpecialMeeting2016" style="color:#0563c1; text-decoration:underline" target="_blank">Related media coverage</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231468426001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session III)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-ii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231453278001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session II)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-i-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231417917001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session I)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-v-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5231030818001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session V)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iv-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5230102412001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session IV)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229986185001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session III)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-ii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229934173001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session II)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-i-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229657438001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session I)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Wed, 07 Dec 2016 17:13:00 +0000 BMUSONI 21317 at /securitycouncil/ctc Special meeting of the Security Council Counter-Terrorism Committee on Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms /securitycouncil/ctc/news/special-meeting-security-council-counter-terrorism-committee-preventing-exploitation <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-23216" class="file file-image file-image-png"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/23216">16-00152a_web-image.png</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/16-00152a_web-image.png?itok=ATS0f5NN" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Member States continue to face a significant and growing threat from the abuse of information and communication technologies (ICT), in particular the Internet and social media, for terrorist purposes. In a number of resolutions, the Security Council recognizes this risk, and calls upon Member States to adopt necessary measures to prevent and address the threat this represents.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">In its Presidential Statement in May 2016 (S/PRST/2016/6), the Security Council requested its Counter-Terrorism Committee (CTC) to present a proposal for a comprehensive international framework with recommended guidelines and good practices to effectively counter the ways in which terrorist groups use their narratives to encourage, motivate, and recruit others to commit terrorist acts. As part of this work, and following on other initiatives, the Counter-Terrorism Committee will organize a special meeting on “Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms.” Taking place at&nbsp;<b>51Թ headquarters on Thursday 1 December 2016 in Conference room 4</b>, the special meeting is open to Member and Observer States, members of the media including photographers with valid accreditation, 51Թ staff and interns, UN entities, intergovernmental organizations, and specialized agencies, as well as invited guests with a valid UN grounds pass. The event will be webcast at&nbsp;<a href="http://webtv.un.org/" style="color:#0563c1; text-decoration:underline" target="_blank">webtv.un.org</a>.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The special meeting will be preceded by a series of preparatory technical sessions, organized by the Counter-Terrorism Committee Executive Directorate (CTED) on Wednesday 30 November and in the morning of Thursday 1 December.</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Additional details can be found below. More information about the special meeting on a similar theme held in December 2015 can be found&nbsp;<a href="/sc/ctc/news/2015/11/19/special-meeting-of-the-counter-terrorism-committee-and-technical-sessions-of-the-counter-terrorism-committee-executive-directorate-on-preventing-and-combating-abuse-of-ict-for-terrorist-purposes-new/" style="color:#0563c1; text-decoration:underline" target="_blank">here</a>.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Please RSVP&nbsp;<a href="https://docs.google.com/forms/d/e/1FAIpQLSdJW52-BKctAEfy6Z1QoNgxh5wQkSR0QipihNZ5yDCcTKqpaQ/viewform?c=0&amp;ampampampw=1" style="color:#0563c1; text-decoration:underline" target="_blank">here</a>.</span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span lang="FR-BE" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Documents</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/concept-note_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Concept note</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted-technical-meeting-agenda-30-november-update.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Agenda, technical meeting</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/ctc-meeting-agenda-30-november-update.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Agenda, CTC special meeting</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/private-sector-engagement-in-responding-to-the-use-of-the-internet-and-ict-for-terrorist-purposes.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">ICT4Peace report – Private sector engagement in responding to the use of the Internet and ICT for terrorist purposes</a></span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Presentations</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-i-30-nov-arije-antinori-european-counter-terrorism-centre-ectc.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session I 30 Nov – Arije Antinori, European Counter-Terrorism Centre (ECTC)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-i-30-nov-v.s.-subrahmanian-university-of-maryland.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session I 30 Nov – V.S. Subrahmanian, University of Maryland</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-cancelled-vidia-arianti-icpvtr.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30 – Vidia Arianti, ICPVTR</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-v-30-nov-maxim-grigoryev-the-foundation-for-the-study-of-democracy.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session V 30 Nov – Maxim Grigoryev, The Foundation for the Study of Democracy</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="https://www.youtube.com/watch?v=YJtpkwt-ifQ&amp;feature=youtu.be" style="color:#0563c1; text-decoration:underline" target="_blank">2016-12-01-Session I 1 Dec – Rafal Rohozinski, CEO and Chief Innovation Officer at SecDev Group, ICT4Peace</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-12-01-session-v-1-dec-dr.-mahmoud-nagah-ahmed-farag-khalaf-al-azhar-observer.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-12-01-Session V 1 Dec – Dr. Mahmoud Nagah Ahmed Farag Khalaf, Al-Azhar Observer</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/draft-speech-for-cted-jk-dec16-3.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Speech By Jan Kleijssen Director Information Society and Action against Crime Directorate Directorate General Human Rights and Rule of Law – DGI Council of Europe</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/contribution-oif-1erdec2016.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Contribution de Mme Patricia Herdt, Représentante permanente a.i.<br /> de l’Organisation internationale de la Francophonie (OIF) auprès des Nations Unies</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted.speech-by-dr.reham-abdullah-1.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">“International Cooperation and Public-Private Partnership while Respecting International Human Rights” A Speech Delivered by: Dr. Reham Abdullah Salamah</a></span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Media coverage</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/sc/ctc/news/media-coverage#ICTSpecialMeeting2016" style="color:#0563c1; text-decoration:underline" target="_blank">Related media coverage</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231468426001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session III)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-ii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231453278001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session II)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-i-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231417917001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session I)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-v-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5231030818001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session V)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iv-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5230102412001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session IV)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229986185001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session III)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-ii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229934173001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session II)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-i-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229657438001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session I)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Wed, 30 Nov 2016 17:13:00 +0000 BMUSONI 21320 at /securitycouncil/ctc