Australia Wants Technology Businesses To Act On Extremism

Australian Prime Minister Malcolm Turnbull called on Internet companies to act more quickly to remove extremist content and to seek a solution to the “problem” of encrypted messages.

Speaking in London after the Group of 20 agreed to work with industry on finding a solution, Turnbull told Tech companies, “the ball is in your court”, as governments seek ways to prevent terrorists using the Internet to promote and plan their activities.

“Just as the owner of a locked bank vault cannot resist the order to hand over a document,” Internet companies shouldn’t be able to resist demands from law enforcement for encrypted information, Turnbull said in a speech recently. “We can’t allow ungoverned spaces,” he said. “The internet must remain free and secure, but it cannot be ungoverned.”

Turnbull, who earlier met with embattled UK Prime Minister Theresa May, echoed her call on Internet companies to crackdown on extremists who use their sites to recruit supporters and spread propaganda. While the web is a “transformative and democratic technology,” its freedoms shouldn’t override the need to prevent harm, he said.

“In the fight ahead there is no space for the mush of moral relativism, there is no justification for the murder of innocent children,” Turnbull said. “You must ensure that these dark places can be illuminated by the law so that freedoms cannot be stripped away by the communications your technologies make possible.”

Gulf News:

You Might Also Read:

Australia’s Sharp Turn To Information Warfare:

Australia Implements Mandatory Data Breach Reporting:

 

« Predicting Crime From Open Source Data
US Steps Up Its Cyberwar Capability »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Qubitekk

Qubitekk

Qubitekk has developed quantum cryptography solutions for the machine-to-machine (M2M) communications market.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

Swascan

Swascan

Swascan is the first all-in-one, GDPR Compliant, Cloud Security Suite Platform. GDPR Assessment, Web Application Scan, Network Scan, Code Review.

Accredia

Accredia

Accredia is the national accreditation body for Italy. The directory of members provides details of organisations offering certification services for ISO 27001.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

SIRP Labs

SIRP Labs

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

Secret Intelligence Service (SIS - MI6)

Secret Intelligence Service (SIS - MI6)

The UK’s Secret Intelligence Service, also known as MI6, has three core aims: stopping terrorism, disrupting the activity of hostile states, and giving the UK a cyber advantage.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

ExchangeDefender

ExchangeDefender

ExchangeDefender provides cybersecurity services that secures your company email and data, and guarantees 24/7 email access.

First Focus

First Focus

First Focus is a managed service provider for medium-sized organisations.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Troye Computer Systems

Troye Computer Systems

Troye provide a complete range of digital workspace solutions that empower people to do their very best work in a safe and secure manner anywhere, anytime, using any device.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.

S4E (Security for Everyone)

S4E (Security for Everyone)

At S4E.io, our mission is to democratize digital security, making it accessible, simple, and effective for individuals and businesses of all sizes.