UK 'biggest audience' In EU For Jihadist Web Content

The murder of James Foley

Online jihadist propaganda attracts more clicks in the UK than any other country in Europe, a report has found.

Britain is the fifth-biggest audience in the world for extremist content after Turkey, the US, Saudi Arabia and Iraq, Policy Exchange's study said.

The think tank suggested the UK public would support new laws criminalising reading content that glorifies terror. The government has told internet companies like Facebook and Google to do more to remove jihadist material. Former US military chief General David Petraeus, who wrote a foreword to the report, said efforts to combat online extremism were "inadequate".

He said the bombing of a London Tube train last week "merely underscored once again the ever-present nature of this threat…There is no doubting the urgency of this matter," he said. "The status quo clearly is unacceptable."

The report suggested new laws to criminalise the "aggravated possession and/or persistent consumption" of extremist ideology - but not to criminalise someone who "stumbles across" jihadist content.

It said images of child abuse were approached in a similar way, with tougher penalties for the most serious cases. Under section 58 of the Terrorism Act 2000, it is currently an offence to possess information that could assist a would-be terrorist, but not material which glorifies terrorism.

Policy Exchange surveyed 2,001 adults in the UK, finding 74% of people supported new laws to criminalise the "persistent consumption" of extremist material online.

Vast Online Presence

Its 130-page report found IS produces more than 100 new articles, videos and newspapers in a week - saying any decline of the terror group in the online space had been "significantly overstated".

"For at least a year, the production of content has continued despite the death of key figures, loss of territory and ongoing fighting," it said.

The jihadist group has retreated from territories it has seized in the Middle East, following pressure from a number of Iraqi and Syrian forces.

IS, also known as Daesh, disseminated its online propaganda across a "vast ecosystem" of platforms, the report found, including file-sharing services, encrypted messaging platforms and social media websites, as well as Facebook, Google and Twitter.

Internet giants say they have made efforts to clamp down on extremist content, with Google describing online extremism as a "critical challenge for us all".

Facebook said it was working "aggressively to remove terrorist content" from its website, and had developed a shared industry database of "hashes" - unique digital footprints - which catalogues violent extremist videos or images. Twitter said that terrorist content had no place on its platform.

Home Secretary Amber Rudd said: "We know that Daesh pose a threat online and this report helps to highlight the scale of the issue.

"I have made it crystal clear to internet bosses that they need to go further and faster to remove terrorist content from their websites and prevent it being uploaded in the first place."

The report suggested the UK government introduce a "sliding scale" of measures to bear down on internet companies - including giving the proposed new commission for countering extremism powers to oversee the removal of online content.

Policy Exchange said 74% of Britons surveyed thought big internet companies should be more pro-active in locating and deleting extremist content.

Martyn Frampton, Policy Exchange's co-head of security and extremism, said governments and security services were playing a "fruitless game of whack-a-mole" by focusing on removing individual pieces of content.

"If the Internet companies won't do what their customers want and take more responsibility for removing this content, then government must take action through additional regulation and legislation," he said.

Mrs. Rudd added: "The Internet cannot be used as a safe space for terrorists and criminals, and industry need to ensure that the services they provide are not being exploited by those who wish to do us harm."

BBC

You Might Also Read: 

Hunters Take Down Terrorists On The Internet:

Terrorism, A Sea Change In Tactics:

Learning About ISIS Intentions Using Open Source Intelligence:

 

« Cybersecurity And Media Companies
Former Spy Chief Takes Top Cybersecurity Job »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

Ciklum

Ciklum

Ciklum provide specialist software QA and testing services including Security QA and Performance QA, QA Automation and Manual QA.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

Marcus Donald People

Marcus Donald People

Marcus Donald People is a UK IT recruitment specialist covering the following sectors: Infrastructure & Cloud, Information Security, Development, Business transformation.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

e.Kraal Innovation Hub

e.Kraal Innovation Hub

e.Kraal is a Cybersecurity Innovation Hub whose mission is to secure the future of Cybersecurity in Kenya by accelerating innovation and creativity in the cyberspace ecosystem.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.