Facebook, Twitter and Google Are A 'recruiting platform for terrorism''

Facebook, Twitter and Google and are deliberately failing to stop terrorists from using their websites to promote terrorism because they believe it will "damage their brands", UK MPs have warned.

MPs warned that social media websites are becoming the "vehicle of choice" for spreading terrorist propaganda but websites are policing billions of accounts and messages with just a "few hundred" employees.

 

Recently sentenced British Islamist @anjemchoudary on Twitter

The UK’s Home Affairs select committee accused US technology giants including Google, Facebook and Twitter of "passing the buck" and said that they have become a "recruiting platform for terrorism".

They highlighted the fact that Twitter and YouTube refused to remove posts by Anjem Choudary, the hate preacher convicting of supporting Isil, despite repeated requests by the police.

Keith Vaz, the chairman of the committee, said: "Huge corporations like Google, Facebook and Twitter, with their billion-dollar incomes, are consciously failing to tackle this threat and passing the buck by hiding behind their supranational legal status, despite knowing that their sites are being used by the instigators of terror.

"The companies' failure to tackle this threat has left some parts of the internet ungoverned, unregulated and lawless."

The committee's report states: "It is alarming that these companies have teams of only a few hundred employees to monitor networks of billions of accounts and that Twitter does not even proactively report extremist content to law enforcement agencies.

"These companies are hiding behind their supranational legal status to pass the parcel of responsibility and refusing to act responsibly in case they damage their brands.

"If they continue to fail to tackle this issue and allow their platforms to become the ‘Wild West’ of the internet, then it will erode their reputation as responsible operators."

The report says that internet companies should be required to co-operate with Britain's counter-extremism police and shut down accounts immediately.

It calls on the companies to publish quarterly statistics showing how many sites they have taken down. It also recommended that a specialist police unit set up to target terror-related material online is upgraded into a round-the-clock "central hub".

Mr Vaz added: "The Government must develop an effective counter-narrative to the slick and effective propaganda machine being run by Daesh."

Ben Wallace, the security minister, said that internet companies must "play their part" in fighting extremism.

He said: "Extremism is not something that can be defeated by Government and law enforcement alone, it is vital that everyone plays their part.

"We are working closely with internet companies and want to see a swifter, more automated approach to the identification and removal of content from social media sites, not just in the UK but across the world. " Twitter said last week that it has suspended 235,000 accounts for promoting terrorism in the past six months.

It said: " As noted by numerous third parties, our efforts continue to drive meaningful results, including a significant shift in this type of activity off of Twitter."

Simon Milner, director of policy at Facebook UK, said: "Terrorists and the support of terrorist activity are not allowed on Facebook and we deal swiftly and robustly with reports of terrorism-related content.

"In the rare instances that we identify accounts or material as terrorist, we'll also look for and remove relevant associated accounts and content."

The report also warned that extremists are able to leave the country while on bail despite being barred from travelling because police have failed to confiscate their passports. Siddhartha Dhar, an Isil extremist, fled the UK within days of being released on bail.

"It seemed incredible to us that the only follow-up action for failure to comply was a polite reminder letter from the police," the report says.

Richard Walton, the former head of Scotland Yard's counter terrorism command, today warns that existing British laws would not prevent preachers who followed Choudary's example and acting as "radicalisers".

Writing in The Daily Telegraph he says Choudary's conviction could even help fellow radicals avoid conviction in future by showing them how to remain within the law while promoting their ideology, Mr Walton suggests.

Telegraph:

 

« Hedge Fund Robot Outsmarts Master
Cybersecurity in Aviation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

IntSights

IntSights

IntSights is an intelligence driven security provider offering rapid, accurate cyberthreat intelligence and incident mitigation in real time

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

IT2Trust

IT2Trust

IT2Trust is one of Scandinavia’s leading value-added distributors of business-critical IT solutions within IT security and networking.

Foresite

Foresite

Foresite is a global service provider, delivering a range of managed security and consulting solutions.

Communications Security Establishment (CSE)

Communications Security Establishment (CSE)

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

GreatHorn

GreatHorn

GreatHorn offers the only cloud-native security platform that stops targeted social engineering and phishing attacks on communication tools like O365, G Suite, and Slack.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

Quartz Network

Quartz Network

Quartz Network is a curated community for change-makers, up-and-comers, and professionals who are ready to grow, adapt, and thrive.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

SeQure

SeQure

SeQure is a cutting-edge startup specializing in the development of advanced security infrastructure for artificial intelligence and blockchain.

Multipoint Group

Multipoint Group

Multipoint is an information security and protection solutions company operating in the South EMEA region through value-added distribution channels.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.