UK 'biggest audience' In EU For Jihadist Web Content

The murder of James Foley

Online jihadist propaganda attracts more clicks in the UK than any other country in Europe, a report has found.

Britain is the fifth-biggest audience in the world for extremist content after Turkey, the US, Saudi Arabia and Iraq, Policy Exchange's study said.

The think tank suggested the UK public would support new laws criminalising reading content that glorifies terror. The government has told internet companies like Facebook and Google to do more to remove jihadist material. Former US military chief General David Petraeus, who wrote a foreword to the report, said efforts to combat online extremism were "inadequate".

He said the bombing of a London Tube train last week "merely underscored once again the ever-present nature of this threat…There is no doubting the urgency of this matter," he said. "The status quo clearly is unacceptable."

The report suggested new laws to criminalise the "aggravated possession and/or persistent consumption" of extremist ideology - but not to criminalise someone who "stumbles across" jihadist content.

It said images of child abuse were approached in a similar way, with tougher penalties for the most serious cases. Under section 58 of the Terrorism Act 2000, it is currently an offence to possess information that could assist a would-be terrorist, but not material which glorifies terrorism.

Policy Exchange surveyed 2,001 adults in the UK, finding 74% of people supported new laws to criminalise the "persistent consumption" of extremist material online.

Vast Online Presence

Its 130-page report found IS produces more than 100 new articles, videos and newspapers in a week - saying any decline of the terror group in the online space had been "significantly overstated".

"For at least a year, the production of content has continued despite the death of key figures, loss of territory and ongoing fighting," it said.

The jihadist group has retreated from territories it has seized in the Middle East, following pressure from a number of Iraqi and Syrian forces.

IS, also known as Daesh, disseminated its online propaganda across a "vast ecosystem" of platforms, the report found, including file-sharing services, encrypted messaging platforms and social media websites, as well as Facebook, Google and Twitter.

Internet giants say they have made efforts to clamp down on extremist content, with Google describing online extremism as a "critical challenge for us all".

Facebook said it was working "aggressively to remove terrorist content" from its website, and had developed a shared industry database of "hashes" - unique digital footprints - which catalogues violent extremist videos or images. Twitter said that terrorist content had no place on its platform.

Home Secretary Amber Rudd said: "We know that Daesh pose a threat online and this report helps to highlight the scale of the issue.

"I have made it crystal clear to internet bosses that they need to go further and faster to remove terrorist content from their websites and prevent it being uploaded in the first place."

The report suggested the UK government introduce a "sliding scale" of measures to bear down on internet companies - including giving the proposed new commission for countering extremism powers to oversee the removal of online content.

Policy Exchange said 74% of Britons surveyed thought big internet companies should be more pro-active in locating and deleting extremist content.

Martyn Frampton, Policy Exchange's co-head of security and extremism, said governments and security services were playing a "fruitless game of whack-a-mole" by focusing on removing individual pieces of content.

"If the Internet companies won't do what their customers want and take more responsibility for removing this content, then government must take action through additional regulation and legislation," he said.

Mrs. Rudd added: "The Internet cannot be used as a safe space for terrorists and criminals, and industry need to ensure that the services they provide are not being exploited by those who wish to do us harm."

BBC

You Might Also Read: 

Hunters Take Down Terrorists On The Internet:

Terrorism, A Sea Change In Tactics:

Learning About ISIS Intentions Using Open Source Intelligence:

 

« Cybersecurity And Media Companies
Former Spy Chief Takes Top Cybersecurity Job »

Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CDW

CDW

CDW delivers a comprehensive range of IT Solutions and Managed IT services to its customers, allowing them to focus on running their organisation, not managing their IT.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

Cybersecurity & Infrastructure Security Agency (CISA)

Cybersecurity & Infrastructure Security Agency (CISA)

CISA leads the national effort to defend critical infrastructure against the threats of today and to secure against the evolving risks of tomorrow.

FinCom.co

FinCom.co

FinCom.Co is the world’s first automatic AML/ KYC screening system, for comprehensive compliance.

Archivo

Archivo

Archivo is a value added reseller focused on Disaster Recovery as a Service (DRaaS), backup, hyper-convergence, hybrid storage and Cyber security.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Hyperwise Ventures

Hyperwise Ventures

Hyperwise Ventures lead seed investments in startups in the cyber security and enterprise software spaces.