Feeds

Sun's Facebook-slapping hits wrong target

Paedo-threat coverage risks more restrictions for all

Designing a Defense for Mobile Applications

Comment A series of negative stories about Facebook by The Sun newspaper could lead to yet more government intervention directing how individuals are allowed to interact with the internet.

The Sun has seen a host of anti-Facebook stories run over the last 12 months, paralleled by positive coverage of near-rival, MySpace.

Last week, under the heading "Disgracebook", The Sun reported the tragic story of Ashleigh Hall, aged 17, who allegedly met her end after meeting an individual she befriended through Facebook.

The Sun quoted Ashleigh’s mother, Andrea, as saying: "It is time somebody introduced controls which stop people putting up false information. The people who run Facebook have a responsibility."

This is then followed by an expert highlighting the problem of paedophiles creating false profiles on social networking sites, and reports that Facebook and Twitter are the only major social networking sites not members of the Internet Watch Foundation (IWF), which they further claim "attempts to police the web and monitors content it considers dangerous."

Finally, they reference an earlier story claiming Twitter had refused to censor child porn on its site.

In a follow-up piece this week, The Sun reported that Facebook was now applying to join the IWF. Headlined "The Sun gets website to call in ‘net cops’", it is clear that The Sun is claiming a victory in this case.

Much of this appears to miss the point - but by sensationalising the story and linking it to solutions that do not apply, The Sun opens the way for populist political intervention.

An example of how this pressure may work lies with the campaign for "Sarah's Law" - a demand that parents of young children be allowed to know about the identity of paedophiles in their area. Whilst this campaign, spearheaded by the Sun's sister paper, the News of the World, has had limited success, it has without doubt contributed to political initiatives around data sharing in this area.

The IWF is not an internet police force. As they have made clear in countless interviews, their role in the UK is twofold. First, where they encounter certain categories of (mainly child abuse) material hosted on a UK site, they refer it to the appropriate authorities – usually the relevant police force - for further action.

Where material is hosted overseas and it potentially breaks UK law, they add the URL for the page containing that material to its block list, and then feed it out through the majority of UK ISP’s. The offending image is blocked irrespective of whether the site hosting it has "joined" the IWF.

The IWF role in respect of social networking sites is limited. They would be the first to admit that their success in removing indecent content from fixed URL’s has seen those with an interest in such material moving on to virtual networks or, even on to social networking sites such as Facebook.

Application security programs and practises

Next page: Bootnote

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.