UK 'biggest audience' In EU For Jihadist Web Content

The murder of James Foley

Online jihadist propaganda attracts more clicks in the UK than any other country in Europe, a report has found.

Britain is the fifth-biggest audience in the world for extremist content after Turkey, the US, Saudi Arabia and Iraq, Policy Exchange's study said.

The think tank suggested the UK public would support new laws criminalising reading content that glorifies terror. The government has told internet companies like Facebook and Google to do more to remove jihadist material. Former US military chief General David Petraeus, who wrote a foreword to the report, said efforts to combat online extremism were "inadequate".

He said the bombing of a London Tube train last week "merely underscored once again the ever-present nature of this threat…There is no doubting the urgency of this matter," he said. "The status quo clearly is unacceptable."

The report suggested new laws to criminalise the "aggravated possession and/or persistent consumption" of extremist ideology - but not to criminalise someone who "stumbles across" jihadist content.

It said images of child abuse were approached in a similar way, with tougher penalties for the most serious cases. Under section 58 of the Terrorism Act 2000, it is currently an offence to possess information that could assist a would-be terrorist, but not material which glorifies terrorism.

Policy Exchange surveyed 2,001 adults in the UK, finding 74% of people supported new laws to criminalise the "persistent consumption" of extremist material online.

Vast Online Presence

Its 130-page report found IS produces more than 100 new articles, videos and newspapers in a week - saying any decline of the terror group in the online space had been "significantly overstated".

"For at least a year, the production of content has continued despite the death of key figures, loss of territory and ongoing fighting," it said.

The jihadist group has retreated from territories it has seized in the Middle East, following pressure from a number of Iraqi and Syrian forces.

IS, also known as Daesh, disseminated its online propaganda across a "vast ecosystem" of platforms, the report found, including file-sharing services, encrypted messaging platforms and social media websites, as well as Facebook, Google and Twitter.

Internet giants say they have made efforts to clamp down on extremist content, with Google describing online extremism as a "critical challenge for us all".

Facebook said it was working "aggressively to remove terrorist content" from its website, and had developed a shared industry database of "hashes" - unique digital footprints - which catalogues violent extremist videos or images. Twitter said that terrorist content had no place on its platform.

Home Secretary Amber Rudd said: "We know that Daesh pose a threat online and this report helps to highlight the scale of the issue.

"I have made it crystal clear to internet bosses that they need to go further and faster to remove terrorist content from their websites and prevent it being uploaded in the first place."

The report suggested the UK government introduce a "sliding scale" of measures to bear down on internet companies - including giving the proposed new commission for countering extremism powers to oversee the removal of online content.

Policy Exchange said 74% of Britons surveyed thought big internet companies should be more pro-active in locating and deleting extremist content.

Martyn Frampton, Policy Exchange's co-head of security and extremism, said governments and security services were playing a "fruitless game of whack-a-mole" by focusing on removing individual pieces of content.

"If the Internet companies won't do what their customers want and take more responsibility for removing this content, then government must take action through additional regulation and legislation," he said.

Mrs. Rudd added: "The Internet cannot be used as a safe space for terrorists and criminals, and industry need to ensure that the services they provide are not being exploited by those who wish to do us harm."

BBC

You Might Also Read: 

Hunters Take Down Terrorists On The Internet:

Terrorism, A Sea Change In Tactics:

Learning About ISIS Intentions Using Open Source Intelligence:

 

« Cybersecurity And Media Companies
Former Spy Chief Takes Top Cybersecurity Job »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Centro de Gestion de Incidentes Informaticos (CGII)

Centro de Gestion de Incidentes Informaticos (CGII)

CGII is the Computer Incident Management Center of the State of Bolivia.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Cymatic

Cymatic

Cymatic has engineered a new approach to web security, designed and built to overcome the limitations of today’s siloed and ineffective security solutions.

Westgate IT

Westgate IT

Westgate IT are a leading provider of IT Support, Cloud and Cyber Security services in the South West of the UK.

Netpoleon Group

Netpoleon Group

Netpoleon is a leading provider of integrated security, networking solutions and value added services.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

Certihash

Certihash

Certihash have developed the world’s first blockchain empowered suite of information security tools based on the NIST cybersecurity framework.