Feeds

UK's net radicalization plans are 'crude, costly, counter-productive'

Get with the positive, says report - but will that wash?

Combat fraud and increase customer satisfaction

Negative government measures to counter online radicalisation are crude, costly and counter-productive, says a report released yesterday - if it's serious about the issue, it needs to harness the positive.

Present measures designed to deny access to radical content on the web or restrict its availability are crude, costly and counter-productive, according to Countering Online Radicalisation. It submits that the way ahead is in positive measures which capitalise on the immense well of goodwill amongst online communities, and in targeting resources widely rather than into a small number of high profile projects.

The report follows a year of research and consultation with government and academics by the International Centre for the Study of Radicalisation and Political Violence (ICSR). The process kicked off almost 14 months ago, with an address by Home Secretary Jacqui Smith, who declared that the internet was no longer a "no-go area for government and the law".

Whether the conclusions are quite what she had in mind is another matter. The report was introduced to a meeting at the Maugham Library, Kings College, by Mike Whine of the Community Security Trust. He likened the process of radicalisation to a conveyor belt, with terrorist activity as one possible end result.

"Fifty thousand websites are reported as being linked to Islamic radicalisation – although we need to remember that the problem this report sets out to address goes much wider," he said. "Far right radicalisation may also prove to be an issue in the years ahead."

The report’s authors, Tim Stevens and Dr Peter Neumann, then ran through the main options available to government. Tim Stevens attacked negative measures, broadly defined as measures designed to restrict access, and including removal (takedown), filtering and hiding of radical sites. He put forward a number of reasons why this approach was unlikely to work and in the end was doomed to be counter-productive.

Negative measures, he said, were "easy to circumvent, often lead to a public backlash, fail to address issues of dynamic content and, in the end, can actually drive the radicalisation they are designed to thwart".

By contrast, Peter Nuemann outlined a four-point plan of positive measures that government should consider undertaking now. These include:

- Deterring producers: the selective use of takedowns in conjunction with prosecutions would signal that individuals engaged in online extremism were not beyond the law

- Empowering online communities: the creation of an internet users' panel to strengthen reporting mechanisms and complaints procedures would enable individual voices to be heard

- Reducing the appeal: more attention must be paid to media literacy and a comprehensive approach in this area is needed

- Promoting positive messages: the establishment of an independent start-up fund would provide seed money for grassroots online projects aimed at countering extremism.

All well and good, but is the government listening? The report’s authors claimed to have been pleasantly surprised by the extent to which Whitehall officials were interested in what they had to say and were buying in to their ideas – although some scepticism was expressed in the question and answer session by a representative from the Department of Culture Media and Sport in respect of the internet user panel.

But what about Wacky Jacqui and Culture Secretary Andy Burnham? Over the last year, both have become enthusiasts for more active government intervention on the internet. Their speeches suggest a preference for high profile government-inspired projects – which are the exact antithesis of what this report suggests. Instead, the expert view seems to be: make use of support that exists; provide a little seed money to lots of individual initiatives; empower rather than control.

Is this a message that government is capable of hearing? Only time will tell. ®

SANS - Survey on application security programs

More from The Register

next story
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.