Security Council - Counter-Terrorism Committee (CTC) -  social media /securitycouncil/ctc/tags/%C2%A0social-media en 51Թ Security Council Counter-Terrorism Committee holds special meeting on preventing exploitation of the Internet and social media for terrorist purposes /securitycouncil/ctc/news/united-nations-security-council-counter-terrorism-committee-holds-special-meeting-preventing <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-23213" class="file file-image file-image-jpeg"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/23213">706377-sc-pm-01_12_2016-16.56.16.jpg</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/706377-sc-pm-01_12_2016-16.56.16.jpg?itok=xSEBHT8E" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-family: Roboto; font-size: 12pt;">Exploitation of the Internet and social media for terrorist purposes can only be defeated through sustained and comprehensive action involving the active participation and collaboration of Member States, international and regional organizations, civil society, and the private sector. This was a common theme expressed by of a number of participants in a special meeting of the Counter-Terrorism Committee, held at the 51Թ in New York on 1 December 2016.</span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">“We must work together to promote dialogue among all stakeholders in order to find effective ways to prevent the exploitation of information and communication technologies for terrorist purposes,” H.E. Amr Abdellatif Aboulatta, Ambassador and Permanent Representative of Egypt to the 51Թ, said in his closing statement. Ambassador Aboulatta is Chair of the Counter-Terrorism Committee of the Security Council.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The meeting –&nbsp;<i>Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms&nbsp;</i>– was held against the backdrop of the significant and growing threat posed to Member States by the exploitation of ICT, in particular the Internet and social media, for terrorist purposes. In a number of resolutions, the Security Council has recognized this threat and called upon Member States to take the measures needed to deliver an effective response. The formal meeting was preceded by technical sessions on the same theme organized by the Executive Directorate of the Counter-Terrorism Committee (CTED) on 30 November and 1 December 2016.</span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Representatives of the private sector underscored their commitment to preventing the exploitation of ICT for terrorist purposes. Maryam Mujica, Public Policy Team Manager for Twitter, highlighted that the company “has suspended over 360,000 accounts for threatening or promoting terrorist acts” since mid-2015.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Participants in the special meeting and the accompanying technical sessions included Member States, international and regional organizations, 51Թ entities, the private sector, academia, faith-based leaders, and civil society representatives. Having relevant actors from various sectors gathered in the same room provided an opportunity for dialogue and for a frank discussion about challenges and ways forward.</span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span lang="FR-BE" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Documents</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/concept-note_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Concept note</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted-technical-meeting-agenda-30-november-update.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Agenda, technical meeting</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/ctc-meeting-agenda-30-november-update.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Agenda, CTC special meeting</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/private-sector-engagement-in-responding-to-the-use-of-the-internet-and-ict-for-terrorist-purposes.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">ICT4Peace report – Private sector engagement in responding to the use of the Internet and ICT for terrorist purposes</a></span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Presentations</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-i-30-nov-arije-antinori-european-counter-terrorism-centre-ectc.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session I 30 Nov – Arije Antinori, European Counter-Terrorism Centre (ECTC)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-i-30-nov-arije-antinori-european-counter-terrorism-centre-ectc.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session I 30 Nov – V.S. Subrahmanian, University of Maryland</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-cancelled-vidia-arianti-icpvtr.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30 – Vidia Arianti, ICPVTR</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-v-30-nov-maxim-grigoryev-the-foundation-for-the-study-of-democracy.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session V 30 Nov – Maxim Grigoryev, The Foundation for the Study of Democracy</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="https://www.youtube.com/watch?v=YJtpkwt-ifQ&amp;feature=youtu.be" style="color:#0563c1; text-decoration:underline" target="_blank">2016-12-01-Session I 1 Dec – Rafal Rohozinski, CEO and Chief Innovation Officer at SecDev Group, ICT4Peace</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-12-01-session-v-1-dec-dr.-mahmoud-nagah-ahmed-farag-khalaf-al-azhar-observer.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-12-01-Session V 1 Dec – Dr. Mahmoud Nagah Ahmed Farag Khalaf, Al-Azhar Observer</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/draft-speech-for-cted-jk-dec16-3.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Speech By Jan Kleijssen Director Information Society and Action against Crime Directorate Directorate General Human Rights and Rule of Law – DGI Council of Europe</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/contribution-oif-1erdec2016.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Contribution de Mme Patricia Herdt, Représentante permanente a.i.<br /> de l’Organisation internationale de la Francophonie (OIF) auprès des Nations Unies</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted.speech-by-dr.reham-abdullah-1.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">“International Cooperation and Public-Private Partnership while Respecting International Human Rights” A Speech Delivered by: Dr. Reham Abdullah Salamah</a></span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Media coverage</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/sc/ctc/news/media-coverage#ICTSpecialMeeting2016" style="color:#0563c1; text-decoration:underline" target="_blank">Related media coverage</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231468426001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session III)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-ii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231453278001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session II)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-i-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231417917001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session I)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-v-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5231030818001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session V)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iv-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5230102412001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session IV)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229986185001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session III)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-ii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229934173001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session II)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-i-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229657438001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session I)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Wed, 07 Dec 2016 17:13:00 +0000 BMUSONI 21317 at /securitycouncil/ctc Special meeting of the Security Council Counter-Terrorism Committee on Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms /securitycouncil/ctc/news/special-meeting-security-council-counter-terrorism-committee-preventing-exploitation <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-23216" class="file file-image file-image-png"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/23216">16-00152a_web-image.png</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/16-00152a_web-image.png?itok=ATS0f5NN" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Member States continue to face a significant and growing threat from the abuse of information and communication technologies (ICT), in particular the Internet and social media, for terrorist purposes. In a number of resolutions, the Security Council recognizes this risk, and calls upon Member States to adopt necessary measures to prevent and address the threat this represents.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">In its Presidential Statement in May 2016 (S/PRST/2016/6), the Security Council requested its Counter-Terrorism Committee (CTC) to present a proposal for a comprehensive international framework with recommended guidelines and good practices to effectively counter the ways in which terrorist groups use their narratives to encourage, motivate, and recruit others to commit terrorist acts. As part of this work, and following on other initiatives, the Counter-Terrorism Committee will organize a special meeting on “Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms.” Taking place at&nbsp;<b>51Թ headquarters on Thursday 1 December 2016 in Conference room 4</b>, the special meeting is open to Member and Observer States, members of the media including photographers with valid accreditation, 51Թ staff and interns, UN entities, intergovernmental organizations, and specialized agencies, as well as invited guests with a valid UN grounds pass. The event will be webcast at&nbsp;<a href="http://webtv.un.org/" style="color:#0563c1; text-decoration:underline" target="_blank">webtv.un.org</a>.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The special meeting will be preceded by a series of preparatory technical sessions, organized by the Counter-Terrorism Committee Executive Directorate (CTED) on Wednesday 30 November and in the morning of Thursday 1 December.</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Additional details can be found below. More information about the special meeting on a similar theme held in December 2015 can be found&nbsp;<a href="/sc/ctc/news/2015/11/19/special-meeting-of-the-counter-terrorism-committee-and-technical-sessions-of-the-counter-terrorism-committee-executive-directorate-on-preventing-and-combating-abuse-of-ict-for-terrorist-purposes-new/" style="color:#0563c1; text-decoration:underline" target="_blank">here</a>.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Please RSVP&nbsp;<a href="https://docs.google.com/forms/d/e/1FAIpQLSdJW52-BKctAEfy6Z1QoNgxh5wQkSR0QipihNZ5yDCcTKqpaQ/viewform?c=0&amp;ampampampw=1" style="color:#0563c1; text-decoration:underline" target="_blank">here</a>.</span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span lang="FR-BE" style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Documents</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/concept-note_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Concept note</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted-technical-meeting-agenda-30-november-update.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Agenda, technical meeting</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/ctc-meeting-agenda-30-november-update.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Agenda, CTC special meeting</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/private-sector-engagement-in-responding-to-the-use-of-the-internet-and-ict-for-terrorist-purposes.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">ICT4Peace report – Private sector engagement in responding to the use of the Internet and ICT for terrorist purposes</a></span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Presentations</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-i-30-nov-arije-antinori-european-counter-terrorism-centre-ectc.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session I 30 Nov – Arije Antinori, European Counter-Terrorism Centre (ECTC)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-i-30-nov-v.s.-subrahmanian-university-of-maryland.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session I 30 Nov – V.S. Subrahmanian, University of Maryland</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-cancelled-vidia-arianti-icpvtr.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30 – Vidia Arianti, ICPVTR</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-11-30-session-v-30-nov-maxim-grigoryev-the-foundation-for-the-study-of-democracy.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-11-30-Session V 30 Nov – Maxim Grigoryev, The Foundation for the Study of Democracy</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="https://www.youtube.com/watch?v=YJtpkwt-ifQ&amp;feature=youtu.be" style="color:#0563c1; text-decoration:underline" target="_blank">2016-12-01-Session I 1 Dec – Rafal Rohozinski, CEO and Chief Innovation Officer at SecDev Group, ICT4Peace</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/2016-12-01-session-v-1-dec-dr.-mahmoud-nagah-ahmed-farag-khalaf-al-azhar-observer.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">2016-12-01-Session V 1 Dec – Dr. Mahmoud Nagah Ahmed Farag Khalaf, Al-Azhar Observer</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/draft-speech-for-cted-jk-dec16-3.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Speech By Jan Kleijssen Director Information Society and Action against Crime Directorate Directorate General Human Rights and Rule of Law – DGI Council of Europe</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/contribution-oif-1erdec2016.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Contribution de Mme Patricia Herdt, Représentante permanente a.i.<br /> de l’Organisation internationale de la Francophonie (OIF) auprès des Nations Unies</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted.speech-by-dr.reham-abdullah-1.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">“International Cooperation and Public-Private Partnership while Respecting International Human Rights” A Speech Delivered by: Dr. Reham Abdullah Salamah</a></span></span></span></span></span></span></p> <div align="center" style="text-align:center; margin-bottom:11px"> <hr align="center" noshade="noshade" size="2" style="color:#6d6d6d" width="100%" /></div> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Media coverage</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/sc/ctc/news/media-coverage#ICTSpecialMeeting2016" style="color:#0563c1; text-decoration:underline" target="_blank">Related media coverage</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231468426001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session III)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-ii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231453278001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session II)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-i-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-01-dec-2016/5231417917001" style="color:#0563c1; text-decoration:underline" target="_blank">Special meeting of the Counter-Terrorism Committee: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session I)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-v-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5231030818001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (1 December 2016: Session V)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iv-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5230102412001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session IV)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-iii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229986185001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session III)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-ii-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229934173001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session II)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/session-i-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms-30-nov-2016/5229657438001" style="color:#0563c1; text-decoration:underline" target="_blank">CTED-organized meeting: Preventing the exploitation of information and communication technologies (ICT) for terrorist purposes, while respecting human rights and fundamental freedoms (30 November 2016: Session I)</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Wed, 30 Nov 2016 17:13:00 +0000 BMUSONI 21320 at /securitycouncil/ctc CTED delivers keynote address at 2nd World Internet Conference /securitycouncil/ctc/news/cted-delivers-keynote-address-2nd-world-internet-conference <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-24300" class="file file-image file-image-jpeg"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/24300">cted_worldinternetconference-e1456508521726.jpg</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/cted_worldinternetconference-e1456508521726.jpg?itok=5RF47msf" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.5pt"><span style="line-height:107%"><span style="font-family:Roboto">CTED representative at the Forum</span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">CTED delivered a keynote address at the 2<sup>nd</sup>&nbsp;World Internet Conference in Wuzhen, China.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The Conference, opened by the Chinese President on 16 December 2015, attracted representatives from 120 countries and 20 international and regional organizations.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Mr. Weixiong Chen, CTED Deputy Executive Director, informed participants about UN efforts to prevent and counter abuse of the Internet and social media by terrorists.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">He highlighted the challenges faced by the international community, in particular the targeting of youth to spread violent extremism.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">“This is a battle without gunpowder and smoke, but it is the most daunting challenge we currently face”, he said.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The UN serves as a vital platform for the exchange of views and sharing of good practices in this area.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Mr. Chen stressed the need for Governments and other stakeholders to continue to work together to find practical ways to prevent and counter the dissemination of violent extremist narratives via information and communications technology.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The Conference, based permanently in Wuzhen, is designed to enable participants from around the world to explore the opportunities and challenges presented by the rapidly expanding and diversifying world of digital communications.</span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Fri, 18 Dec 2015 19:11:00 +0000 BMUSONI 22341 at /securitycouncil/ctc Special meeting of the Counter-Terrorism Committee and technical sessions of the Counter-Terrorism Committee Executive Directorate on preventing and combating abuse of ICT for terrorist purposes, New York, 16-17 December 2015 /securitycouncil/ctc/news/special-meeting-counter-terrorism-committee-and-technical-sessions-counter-terrorism-committee <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-24309" class="file file-image file-image-jpeg"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/24309">cted_ict_website_600px2.jpg</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/cted_ict_website_600px2.jpg?itok=rLusnjea" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">How can terrorists be stopped from exploiting the Internet and social media?</span></span></span></b></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><i><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Special meeting of the Security Council Counter-Terrorism Committee and its Executive Directorate 16-17 December 2015</span></span></span></i></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><v:rect filled="f" href="/sc/ctc/wp-content/uploads/2015/11/twitter-icon.png" id="Rectangle_x0020_242" o:button="t" o:gfxdata="UEsDBBQABgAIAAAAIQC75UiUBQEAAB4CAAATAAAAW0NvbnRlbnRfVHlwZXNdLnhtbKSRvU7DMBSF<br /> dyTewfKKEqcMCKEmHfgZgaE8wMW+SSwc27JvS/v23KTJgkoXFsu+P+c7Ol5vDoMTe0zZBl/LVVlJ<br /> gV4HY31Xy4/tS3EvRSbwBlzwWMsjZrlprq/W22PELHjb51r2RPFBqax7HCCXIaLnThvSAMTP1KkI<br /> +gs6VLdVdad08ISeCho1ZLN+whZ2jsTzgcsnJwldluLxNDiyagkxOquB2Knae/OLUsyEkjenmdzb<br /> mG/YhlRnCWPnb8C898bRJGtQvEOiVxjYhtLOxs8AySiT4JuDystlVV4WPeM6tK3VaILeDZxIOSsu<br /> ti/jidNGNZ3/J08yC1dNv9v8AAAA//8DAFBLAwQUAAYACAAAACEArTA/8cEAAAAyAQAACwAAAF9y<br /> ZWxzLy5yZWxzhI/NCsIwEITvgu8Q9m7TehCRpr2I4FX0AdZk2wbbJGTj39ubi6AgeJtl2G9m6vYx<br /> jeJGka13CqqiBEFOe2Ndr+B03C3WIDihMzh6RwqexNA281l9oBFTfuLBBhaZ4ljBkFLYSMl6oAm5<br /> 8IFcdjofJ0z5jL0MqC/Yk1yW5UrGTwY0X0yxNwri3lQgjs+Qk/+zfddZTVuvrxO59CNCmoj3vCwj<br /> MfaUFOjRhrPHaN4Wv0VV5OYgm1p+LW1eAAAA//8DAFBLAwQUAAYACAAAACEAkkyg5SMDAAAMBwAA<br /> HwAAAGNsaXBib2FyZC9kcmF3aW5ncy9kcmF3aW5nMS54bWykVVtv2yAUfp+0/4B42JvrS5009uZW<br /> bRJXlbqtarbniWASo2JwgVy6af99B+w0aTpN0+aH5ACHj+87F/hwsW0EWjNtuJIFjk8ijJikquJy<br /> WeCvX8pghJGxRFZEKMkK/MQMvjh/++YDyZeatDWnCBCkyUmBa2vbPAwNrVlDzIlqmYS1hdINsTDU<br /> y7DSZAPIjQiTKBqGDeESn++hJsQStNL8H6CEog+sGhO5JgYgBc0PZ3qOgv4/Msnl+lq3s/ZOO+b0<br /> 0/pOI14VGCInSQMhwmG/0LvBMDzatdwDbBe6cf5qsUBbj/Lkfj0G21pEYTIZRqcDwKew1NvdGfXn<br /> 3+yi9fSP+4BMdygYB0RM62jI9WtlSZrstN0zCsWwFAy5SbehFlw+jAWnD32Q9d/EGNRyyiaKrhom<br /> bVcNmglioQxNzVuDkc5dVPVNFWNkl7bUPrjvHlfKvv82F0Q+dLYLFSjxiegDv5Ng2lsoC4OkGtfA<br /> ml2aFvhDmYOc3ZTWalMzUhk3/QzVIfi07cEg0fPNR1VBjsnKKi//39P3nAaSt9rYa6Ya5AzQDCQ9<br /> OFnfGttx2rn4HKmSC+ErQMgXE4DZzUDlwFa35mrIt9SPLMqmo+koDdJkOA3SaDIJLstxGgzL+Gww<br /> OZ2Mx5P4pzs3TvOaVxWT7phde8fpq7w2nGpl1MKeUNWEXUp3LQ4pjaN9gxsleOXgHCWjl/Ox0GhN<br /> RIFL//WRP3ALX9LwOQYtR5LiJI2ukiwoh6OzIC3TQZCdRaMgirOrbBilWTopX0q65ZL9vyS0KXA2<br /> SAY+Swekj7RF/nutjeQNt0wjwZsCj56doJmgEKey8qm1hIvOPgiFo78PBaR7l2gwTX8l2e3Mt7Ld<br /> XqnqyQVsDv9QvFpBccE1Atc9GLXS3zHawCVeYPO4IpphJG4k9EEWpym4WT9IB2cJDPThyvxwhUgK<br /> UAW2GHXm2MIItqxazZc1nBT7MEl1CU2z4H1Bd5wcO2HszD4J5lV75kxWd0STe+AMfQ4PEZPB11kf<br /> R/AAsXtxK8NmrbuXukbp1PtwgOPRO+C39u+We2wOx+e/AAAA//8DAFBLAwQUAAYACAAAACEAkn2H<br /> 4B0HAABJIAAAGgAAAGNsaXBib2FyZC90aGVtZS90aGVtZTEueG1s7FlLbxs3EL4X6H9Y7L2xZL1i<br /> I3JgyXLcxC9ESoocKYnaZcxdLkjKjm5FcuqlQIG06KEBeuuhKBqgARr00h9jwEGb/ogOuS9SouIH<br /> XCAobAHG7uw3w+HM7Mzs8M7dZxH1jjEXhMVtv3qr4ns4HrExiYO2/2iw/dlt3xMSxWNEWYzb/gwL<br /> /+7Gp5/cQesjSpIhQ3w8CHGEPRAUi3XU9kMpk/WVFTECMhK3WIJjeDZhPEISbnmwMuboBBaI6Mpq<br /> pdJciRCJ/Q2QKJWgHoV/sRSKMKK8r8RgL0YRrH4wmZAR1tjxUVUhxEx0KfeOEW37IHPMTgb4mfQ9<br /> ioSEB22/ov/8lY07K2g9Y6JyCa/Bt63/Mr6MYXy0qtfkwbBYtF5v1JubhXwNoHIR12v1mr1mIU8D<br /> 0GgEO011sWW2Vrv1DGuA0kuH7K3WVq1q4Q35tQWdNxvqZ+E1KJVfX8Bvb3fBihZeg1J8YwHf6Kx1<br /> tmz5GpTimwv4VmVzq96y5GtQSEl8tICuNJq1br7bAjJhdMcJX2vUt1urmfASBdFQRJdaYsJiuSzW<br /> IvSU8W0AKCBFksSenCV4gkYQk11EyZATb5cEIQRegmImgFxZrWxXavBf/er6SnsUrWNkcCu9QBOx<br /> QFL6eGLESSLb/n2Q6huQs7dvT5+/OX3+++mLF6fPf83W1qIsvh0UBybf+5+++efVl97fv/34/uW3<br /> 6dLzeGHi3/3y1bs//vyQeNhxaYqz716/e/P67Puv//r5pUP6JkdDEz4gERbePj7xHrIINujQHw/5<br /> 5TgGISImx2YcCBQjtYpDfk+GFnp/hihy4DrYtuNjDqnGBbw3fWop3A/5VBKHxAdhZAH3GKMdxp1W<br /> eKDWMsw8mMaBe3E+NXEPETp2rd1FseXl3jSBHEtcIrshttQ8pCiWKMAxlp56xo4wduzuCSGWXffI<br /> iDPBJtJ7QrwOIk6TDMjQiqaSaYdE4JeZS0Hwt2Wbvcdeh1HXrrfwsY2EdwNRh/IDTC0z3kNTiSKX<br /> yAGKqGnwXSRDl5L9GR+ZuJ6Q4OkAU+b1xlgIF88Bh/0aTn8Aacbt9j06i2wkl+TIJXMXMWYit9hR<br /> N0RR4sL2SRya2M/FEYQo8g6ZdMH3mP2GqHvwA4qXuvsxwZa7z88GjyDDmiqVAaKeTLnDl/cws+K3<br /> P6MThF2pZpNHVord5MQZHZ1pYIX2LsYUnaAxxt6jzx0adFhi2bxU+n4IWWUHuwLrPrJjVd3HWGBP<br /> NzeLeXKXCCtk+zhgS/TZm80lnhmKI8SXSd4Hr5s270Gpi1wBcEBHRyZwn0C/B/HiNMqBABlGcC+V<br /> ehgiq4Cpe+GO1xm3/HeRdwzey6eWGhd4L4EHX5oHErvJ80HbDBC1FigDZoCgy3ClW2Cx3F+yqOKq<br /> 2aZOvon90pZugO7IanoiEp/bAc31Po3/rveBDuPsh1eOl+16+h23YCtZXbLTWZZMdub6m2W4+a6m<br /> y/iYfPxNzRaaxocY6shixrrpaW56Gv9/39Mse59vOpll/cZNJ+NDh3HTyWTDlevpZMrmBfoaNfBI<br /> Bz167BMtnfpMCKV9OaN4V+jBj4DvmfE2EBWfnm7iYgqYhHCpyhwsYOECjjSPx5n8gsiwH6IEpkNV<br /> XwkJRCY6EF7CBAyNNNkpW+HpNNpj43TYWa2qwWZaWQWSJb3SKOgwqJIputkqB3iFeK1toAetuQKK<br /> 9zJKGIvZStQcSrRyojKSHuuC0RxK6J1dixZrDi1uK/G5qxa0ANUKr8AHtwef6W2/UQcWYIJ5HDTn<br /> Y+Wn1NW5d7Uzr9PTy4xpRQA02HkElJ5eU7ou3Z7aXRpqF/C0pYQRbrYS2jK6wRMhfAZn0amoF1Hj<br /> sr5eK11qqadModeD0CrVaN3+kBZX9TXwzecGGpuZgsbeSdtv1hoQMiOUtP0JDI3hMkogdoT65kI0<br /> gOOWkeTpC3+VzJJwIbeQCFOD66STZoOISMw9SqK2r7ZfuIHGOodo3aqrkBA+WuXWIK18bMqB020n<br /> 48kEj6TpdoOiLJ3eQoZPc4XzqWa/Olhxsim4ux+OT7whnfKHCEKs0aoqA46JgLODamrNMYHDsCKR<br /> lfE3V5iytGueRukYSumIJiHKKoqZzFO4TuWFOvqusIFxl+0ZDGqYJCuEw0AVWNOoVjUtqkaqw9Kq<br /> ez6TspyRNMuaaWUVVTXdWcxaIS8Dc7a8WpE3tMpNDDnNrPBp6p5PuWt5rpvrE4oqAQYv7Oeouhco<br /> CIZq5WKWakrjxTSscnZGtWtHvsFzVLtIkTCyfjMXO2e3okY4lwPilSo/8M1HLZAmeV+pLe062N5D<br /> iTcMqm0fDpdhOPgMruB42gfaqqKtKhpcwZkzlIv0oLjtZxc5BZ6nlAJTyym1HFPPKfWc0sgpjZzS<br /> zClN39MnqnCKrw5TfS8/MIUalh2wZr2Fffq/8S8AAAD//wMAUEsDBBQABgAIAAAAIQAHR4a5BwEA<br /> APcBAAAqAAAAY2xpcGJvYXJkL2RyYXdpbmdzL19yZWxzL2RyYXdpbmcxLnhtbC5yZWxzrJHBasMw<br /> DIbvg72D8T12XNgYo0kv3aCHXUb3AMZWE9NENraytG8/tWVshcIuuxhkyZ/+//dydRgH8Qm5hIiN<br /> NKqWAtBFH7Br5Mf2tXqSopBFb4eI0MgjFLlq7++W7zBY4kelD6kIpmBpZE+UnrUurofRFhUTIHd2<br /> MY+WuMydTtbtbQd6UdePOv9myPaKKTa+kXnjF1Jsj4k3/82Ou11wsI5uGgHpxgpNrAsYaHMH1Eil<br /> LjeX0yjWKvVtGeY/ZfRsKA8B9z9STu4KRzfPs5rwHFVx2pHTc6pcRDo5mtIQrS/szDxoYzTNgQhy<br /> FXhAJey+cW/Rc2AvB+6hPVvSV9/VfgEAAP//AwBQSwECLQAUAAYACAAAACEAu+VIlAUBAAAeAgAA<br /> EwAAAAAAAAAAAAAAAAAAAAAAW0NvbnRlbnRfVHlwZXNdLnhtbFBLAQItABQABgAIAAAAIQCtMD/x<br /> wQAAADIBAAALAAAAAAAAAAAAAAAAADYBAABfcmVscy8ucmVsc1BLAQItABQABgAIAAAAIQCSTKDl<br /> IwMAAAwHAAAfAAAAAAAAAAAAAAAAACACAABjbGlwYm9hcmQvZHJhd2luZ3MvZHJhd2luZzEueG1s<br /> UEsBAi0AFAAGAAgAAAAhAJJ9h+AdBwAASSAAABoAAAAAAAAAAAAAAAAAgAUAAGNsaXBib2FyZC90<br /> aGVtZS90aGVtZTEueG1sUEsBAi0AFAAGAAgAAAAhAAdHhrkHAQAA9wEAACoAAAAAAAAAAAAAAAAA<br /> 1QwAAGNsaXBib2FyZC9kcmF3aW5ncy9fcmVscy9kcmF3aW5nMS54bWwucmVsc1BLBQYAAAAABQAF<br /> AGcBAAAkDgAAAAA=<br /> " stroked="f" style="width:20.5pt; height:20.5pt; v-text-anchor:top" target="&quot;_blank&quot;"> <v:fill o:detectmouseclick="t"> <o:lock aspectratio="t" v:ext="edit"> <w:wrap type="none"> <w:anchorlock> </w:anchorlock></w:wrap></o:lock></v:fill></v:rect><img id="_x0000_i1025" src="" style="width:20.5pt; height:20.5pt" /><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="https://twitter.com/hashtag/RECLAIMINGTHEWEB?src=hash" style="color:#0563c1; text-decoration:underline" target="_blank">#RECLAIMINGTHEWEB</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Webcast recordings of the event can be viewed here:</span></span></span></span></span></span></p> <ul> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/part-1-preventing-terrorists-from-exploiting-the-internet-and-social-media/4665962159001" style="color:#0563c1; text-decoration:underline" target="_blank">Preventing Terrorists from Exploiting the Internet and Social Media (Part 1)</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/part-2-preventing-terrorists-from-exploiting-the-internet-and-social-media/4665729008001" style="color:#0563c1; text-decoration:underline" target="_blank">Preventing Terrorists from Exploiting the Internet and Social Media (Part 2)</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/jeffrey-feltman-dpa-preventing-terrorists-from-exploiting-the-internet-and-social-media/4665798478001" style="color:#0563c1; text-decoration:underline" target="_blank">Jeffrey Feltman (DPA) – Preventing Terrorists from Exploiting the Internet and Social Media</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/ivan-%C5%A0imonovi%C4%87-ohchr-preventing-terrorists-from-exploiting-the-internet-and-social-media/4665839285001" style="color:#0563c1; text-decoration:underline" target="_blank">Ivan Šimonović (OHCHR) – Preventing Terrorists from Exploiting the Internet and Social Media</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/part-3-preventing-terrorists-from-exploiting-the-internet-and-social-media/4666179613001" style="color:#0563c1; text-decoration:underline" target="_blank">Preventing Terrorists from Exploiting the Internet and Social Media (Part 3)</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/meetings-events/watch/part-4-preventing-terrorists-from-exploiting-the-internet-and-social-media/4666264687001" style="color:#0563c1; text-decoration:underline" target="_blank">Preventing Terrorists from Exploiting the Internet and Social Media (Part 4)</a></span></span></span></span></span></span></span></li> <li style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="http://webtv.un.org/watch/jean-paul-laborde-cted-and-humera-khan-muflehun-on-terrorism-online-media-stakeout-17-december-2015/4665964600001" style="color:#0563c1; text-decoration:underline" target="_blank">Jean-Paul Laborde (CTED) and Humera Khan (Muflehun) on Terrorism Online – Media Stakeout (17 December 2015)</a></span></span></span></span></span></span></span></li> </ul> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Terrorist groups continue to utilize the Internet and social media to facilitate their activities, including incitement to commit terrorist acts, radicalization to violence, recruitment, training, planning, collection of information, communication, preparation, financing, and execution of attacks. Surpassing Al-Qaida, the terrorist organization that calls itself the Islamic State in Iraq and the Levant (ISIL) has successfully used the Internet to broadcast its ideology and to recruit foreign terrorist fighters on an unprecedented scale – with currently some 30,000 foreign fighters coming from over 100 countries.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">On 17 December 2015, the Security Council Counter-Terrorism Committee (CTC) will hold a special meeting on Preventing terrorists from exploiting the Internet and social media to recruit terrorists and incite terrorist acts, while respecting human rights and fundamental freedoms. This meeting will be complemented by CTED-organized thematic sessions (16-17 December), which will all take place in Conference room 1. The meeting will feature panellists from inter alia Facebook, Google, Microsoft, Twitter, and Weibo, as well as the Chief Prosecutor of Paris, and civil society activists engaging with terrorist recruiters on the digital frontlines.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The briefing is open to Member and Observer States, 51Թ entities, intergovernmental organizations, and specialized agencies. The event is also open to members of the media, including photographers, with a valid accreditation to the 51Թ in New York.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/chair-summary-and-plan-of-action_1.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Chair summary and plan of action</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/concept-note_ict_specialmeeting_2015_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Concept Note</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/special-meeting-of-the-ctc-ict-2015-tentative-agenda-final_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Special Meeting Agenda</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/cted-technical-meeting-on-ict-agenda-final_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Technical Meeting Agenda</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/ict-meeting-2015-logistical-note1_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">Logistical Note</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto"><a href="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/ict-meeting-2015-list-of-hotels_0.pdf" style="color:#0563c1; text-decoration:underline" target="_blank">List of Hotels</a></span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Thu, 19 Nov 2015 22:29:00 +0000 BMUSONI 22353 at /securitycouncil/ctc Counter-Terrorism Committee visit to Italy focuses on foreign terrorist fighter threat, law enforcement and border control challenges /securitycouncil/ctc/news/counter-terrorism-committee-visit-italy-focuses-foreign-terrorist-fighter-threat-law <div class="field field-name-field-featured-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><div id="file-24537" class="file file-image file-image-jpeg"> <h2 class="element-invisible"><a href="/securitycouncil/ctc/file/24537">rome_may_2015_cropped.jpg</a></h2> <div class="content"> <img class="panopoly-image-original img-responsive" src="/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/styles/panopoly_image_original/public/news_articles/rome_may_2015_cropped.jpg?itok=XrZG7_Wk" alt="" /> </div> </div> </div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:10.5pt"><span style="line-height:107%"><span style="font-family:Roboto">The delegation visiting Italy</span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The Counter-Terrorism Committee (CTC) on 22 May 2015 concluded a three-day focussed assessment visit to Italy. The visit, conducted on the Committee’s behalf by its Executive Directorate (CTED), focused on legal and operational aspects of Italy’s implementation of Security Council resolutions 1373 (2001), 1624 (2005) and 2178 (2014).</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">Italy’s recently enacted Decree Law on foreign terrorist fighters (FTFs), international counter-terrorism cooperation, financial law and practice, law enforcement, and border management was a major focus of discussion.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The Italian authorities shared their experiences and good practices in countering terrorism (including the FTF phenomenon) and demonstrated how they keep abreast of international and regional best codes, standards and practices. New global and regional threats and challenges, including terrorists’ abuse of the Internet and social media, were also discussed.<br /> It was emphasized that the global terrorist threat could be countered through effective exchange of information and international cooperation in criminal matters.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">The delegation identified good practices applied by Italy and discussed technical assistance matters. The delegation also reiterated the importance of continuing to effectively implement all relevant Security Council resolutions, with Italy reaffirming its commitment to its constructive dialogue on counter-terrorism with the 51Թ, and with CTC/CTED in particular.</span></span></span></span></span></span></p> <p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Roboto">In addition to CTED experts, the visiting delegation included a member of the Expert Group of the Security Council “1540 Committee,” as well as representatives of Europol, INTERPOL, the International Organization for Migration, the Terrorism Prevention Branch of the 51Թ Office on Drugs and Crime, and the World Customs Organization.</span></span></span></span></span></span></p> <p style="margin-bottom:11px">&nbsp;</p> <p style="margin-bottom:11px">&nbsp;</p> </div></div></div><div class="field field-name-field-front-page-article field-type-list-boolean field-label-above"><div class="field-label">Front Page Article:&nbsp;</div><div class="field-items"><div class="field-item even"></div></div></div> Thu, 28 May 2015 18:11:00 +0000 BMUSONI 22602 at /securitycouncil/ctc