Feeds

UK's net radicalization plans are 'crude, costly, counter-productive'

Get with the positive, says report - but will that wash?

3 Big data security analytics techniques

Negative government measures to counter online radicalisation are crude, costly and counter-productive, says a report released yesterday - if it's serious about the issue, it needs to harness the positive.

Present measures designed to deny access to radical content on the web or restrict its availability are crude, costly and counter-productive, according to Countering Online Radicalisation. It submits that the way ahead is in positive measures which capitalise on the immense well of goodwill amongst online communities, and in targeting resources widely rather than into a small number of high profile projects.

The report follows a year of research and consultation with government and academics by the International Centre for the Study of Radicalisation and Political Violence (ICSR). The process kicked off almost 14 months ago, with an address by Home Secretary Jacqui Smith, who declared that the internet was no longer a "no-go area for government and the law".

Whether the conclusions are quite what she had in mind is another matter. The report was introduced to a meeting at the Maugham Library, Kings College, by Mike Whine of the Community Security Trust. He likened the process of radicalisation to a conveyor belt, with terrorist activity as one possible end result.

"Fifty thousand websites are reported as being linked to Islamic radicalisation – although we need to remember that the problem this report sets out to address goes much wider," he said. "Far right radicalisation may also prove to be an issue in the years ahead."

The report’s authors, Tim Stevens and Dr Peter Neumann, then ran through the main options available to government. Tim Stevens attacked negative measures, broadly defined as measures designed to restrict access, and including removal (takedown), filtering and hiding of radical sites. He put forward a number of reasons why this approach was unlikely to work and in the end was doomed to be counter-productive.

Negative measures, he said, were "easy to circumvent, often lead to a public backlash, fail to address issues of dynamic content and, in the end, can actually drive the radicalisation they are designed to thwart".

By contrast, Peter Nuemann outlined a four-point plan of positive measures that government should consider undertaking now. These include:

- Deterring producers: the selective use of takedowns in conjunction with prosecutions would signal that individuals engaged in online extremism were not beyond the law

- Empowering online communities: the creation of an internet users' panel to strengthen reporting mechanisms and complaints procedures would enable individual voices to be heard

- Reducing the appeal: more attention must be paid to media literacy and a comprehensive approach in this area is needed

- Promoting positive messages: the establishment of an independent start-up fund would provide seed money for grassroots online projects aimed at countering extremism.

All well and good, but is the government listening? The report’s authors claimed to have been pleasantly surprised by the extent to which Whitehall officials were interested in what they had to say and were buying in to their ideas – although some scepticism was expressed in the question and answer session by a representative from the Department of Culture Media and Sport in respect of the internet user panel.

But what about Wacky Jacqui and Culture Secretary Andy Burnham? Over the last year, both have become enthusiasts for more active government intervention on the internet. Their speeches suggest a preference for high profile government-inspired projects – which are the exact antithesis of what this report suggests. Instead, the expert view seems to be: make use of support that exists; provide a little seed money to lots of individual initiatives; empower rather than control.

Is this a message that government is capable of hearing? Only time will tell. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
EU: Let's cost financial traders $400m a day, because EVIL BANKERS. Right?
Wait 'til this one hits your pension fund where it hurts
Systems meltdown plunges US immigration courts into pen-and-paper stone age
Massive outage could last four weeks, sources claim
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.