UK 'biggest audience' In EU For Jihadist Web Content

The murder of James Foley

Online jihadist propaganda attracts more clicks in the UK than any other country in Europe, a report has found.

Britain is the fifth-biggest audience in the world for extremist content after Turkey, the US, Saudi Arabia and Iraq, Policy Exchange's study said.

The think tank suggested the UK public would support new laws criminalising reading content that glorifies terror. The government has told internet companies like Facebook and Google to do more to remove jihadist material. Former US military chief General David Petraeus, who wrote a foreword to the report, said efforts to combat online extremism were "inadequate".

He said the bombing of a London Tube train last week "merely underscored once again the ever-present nature of this threat…There is no doubting the urgency of this matter," he said. "The status quo clearly is unacceptable."

The report suggested new laws to criminalise the "aggravated possession and/or persistent consumption" of extremist ideology - but not to criminalise someone who "stumbles across" jihadist content.

It said images of child abuse were approached in a similar way, with tougher penalties for the most serious cases. Under section 58 of the Terrorism Act 2000, it is currently an offence to possess information that could assist a would-be terrorist, but not material which glorifies terrorism.

Policy Exchange surveyed 2,001 adults in the UK, finding 74% of people supported new laws to criminalise the "persistent consumption" of extremist material online.

Vast Online Presence

Its 130-page report found IS produces more than 100 new articles, videos and newspapers in a week - saying any decline of the terror group in the online space had been "significantly overstated".

"For at least a year, the production of content has continued despite the death of key figures, loss of territory and ongoing fighting," it said.

The jihadist group has retreated from territories it has seized in the Middle East, following pressure from a number of Iraqi and Syrian forces.

IS, also known as Daesh, disseminated its online propaganda across a "vast ecosystem" of platforms, the report found, including file-sharing services, encrypted messaging platforms and social media websites, as well as Facebook, Google and Twitter.

Internet giants say they have made efforts to clamp down on extremist content, with Google describing online extremism as a "critical challenge for us all".

Facebook said it was working "aggressively to remove terrorist content" from its website, and had developed a shared industry database of "hashes" - unique digital footprints - which catalogues violent extremist videos or images. Twitter said that terrorist content had no place on its platform.

Home Secretary Amber Rudd said: "We know that Daesh pose a threat online and this report helps to highlight the scale of the issue.

"I have made it crystal clear to internet bosses that they need to go further and faster to remove terrorist content from their websites and prevent it being uploaded in the first place."

The report suggested the UK government introduce a "sliding scale" of measures to bear down on internet companies - including giving the proposed new commission for countering extremism powers to oversee the removal of online content.

Policy Exchange said 74% of Britons surveyed thought big internet companies should be more pro-active in locating and deleting extremist content.

Martyn Frampton, Policy Exchange's co-head of security and extremism, said governments and security services were playing a "fruitless game of whack-a-mole" by focusing on removing individual pieces of content.

"If the Internet companies won't do what their customers want and take more responsibility for removing this content, then government must take action through additional regulation and legislation," he said.

Mrs. Rudd added: "The Internet cannot be used as a safe space for terrorists and criminals, and industry need to ensure that the services they provide are not being exploited by those who wish to do us harm."

BBC

You Might Also Read: 

Hunters Take Down Terrorists On The Internet:

Terrorism, A Sea Change In Tactics:

Learning About ISIS Intentions Using Open Source Intelligence:

 

« Cybersecurity And Media Companies
Former Spy Chief Takes Top Cybersecurity Job »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Foresite

Foresite

Foresite is a global service provider, delivering a range of managed security and consulting solutions.

Data Shepherd

Data Shepherd

Data Shepherds primary focus is to protect your business. We achieve this by offering extensive and unique expertise in innovative IT and Cyber security solutions.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

Findcourses.co.uk

Findcourses.co.uk

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

Falcongaze

Falcongaze

Falcongaze SecureTower is a comprehensive DLP solution for the protection of business against internal threats.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

Firmus

Firmus

As the leading penetration testing services provider in Malaysia, Firmus evaluates the ability of your internal or external information assets to withstand attacks.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

SCS Technology Solutions

SCS Technology Solutions

SCS Technology Solutions has become the preferred partner for top performing organisations across Lincolnshire for IT support and consultancy.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.

VirtualMetric

VirtualMetric

VirtualMetric delivers performance-driven IT monitoring and log management solutions that simplify complex environments.