Facebook, Twitter and Google Are A 'recruiting platform for terrorism''

Facebook, Twitter and Google and are deliberately failing to stop terrorists from using their websites to promote terrorism because they believe it will "damage their brands", UK MPs have warned.

MPs warned that social media websites are becoming the "vehicle of choice" for spreading terrorist propaganda but websites are policing billions of accounts and messages with just a "few hundred" employees.

 

Recently sentenced British Islamist @anjemchoudary on Twitter

The UK’s Home Affairs select committee accused US technology giants including Google, Facebook and Twitter of "passing the buck" and said that they have become a "recruiting platform for terrorism".

They highlighted the fact that Twitter and YouTube refused to remove posts by Anjem Choudary, the hate preacher convicting of supporting Isil, despite repeated requests by the police.

Keith Vaz, the chairman of the committee, said: "Huge corporations like Google, Facebook and Twitter, with their billion-dollar incomes, are consciously failing to tackle this threat and passing the buck by hiding behind their supranational legal status, despite knowing that their sites are being used by the instigators of terror.

"The companies' failure to tackle this threat has left some parts of the internet ungoverned, unregulated and lawless."

The committee's report states: "It is alarming that these companies have teams of only a few hundred employees to monitor networks of billions of accounts and that Twitter does not even proactively report extremist content to law enforcement agencies.

"These companies are hiding behind their supranational legal status to pass the parcel of responsibility and refusing to act responsibly in case they damage their brands.

"If they continue to fail to tackle this issue and allow their platforms to become the ‘Wild West’ of the internet, then it will erode their reputation as responsible operators."

The report says that internet companies should be required to co-operate with Britain's counter-extremism police and shut down accounts immediately.

It calls on the companies to publish quarterly statistics showing how many sites they have taken down. It also recommended that a specialist police unit set up to target terror-related material online is upgraded into a round-the-clock "central hub".

Mr Vaz added: "The Government must develop an effective counter-narrative to the slick and effective propaganda machine being run by Daesh."

Ben Wallace, the security minister, said that internet companies must "play their part" in fighting extremism.

He said: "Extremism is not something that can be defeated by Government and law enforcement alone, it is vital that everyone plays their part.

"We are working closely with internet companies and want to see a swifter, more automated approach to the identification and removal of content from social media sites, not just in the UK but across the world. " Twitter said last week that it has suspended 235,000 accounts for promoting terrorism in the past six months.

It said: " As noted by numerous third parties, our efforts continue to drive meaningful results, including a significant shift in this type of activity off of Twitter."

Simon Milner, director of policy at Facebook UK, said: "Terrorists and the support of terrorist activity are not allowed on Facebook and we deal swiftly and robustly with reports of terrorism-related content.

"In the rare instances that we identify accounts or material as terrorist, we'll also look for and remove relevant associated accounts and content."

The report also warned that extremists are able to leave the country while on bail despite being barred from travelling because police have failed to confiscate their passports. Siddhartha Dhar, an Isil extremist, fled the UK within days of being released on bail.

"It seemed incredible to us that the only follow-up action for failure to comply was a polite reminder letter from the police," the report says.

Richard Walton, the former head of Scotland Yard's counter terrorism command, today warns that existing British laws would not prevent preachers who followed Choudary's example and acting as "radicalisers".

Writing in The Daily Telegraph he says Choudary's conviction could even help fellow radicals avoid conviction in future by showing them how to remain within the law while promoting their ideology, Mr Walton suggests.

Telegraph:

 

« Hedge Fund Robot Outsmarts Master
Cybersecurity in Aviation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Bounga Informatics

Bounga Informatics

Bounga Informatics provides Digital Forensics, E-Discovery, and Endpoint Security software, hardware, and training in Singapore and other countries in Asia Pacific.

AlAnsari Technical Solutions (ATS)

AlAnsari Technical Solutions (ATS)

ATS is a Kuwait based company specialised in delivering hardware/software, Virtualisation, IP Telephony / Unified Communication, Networking and professional IT services and solutions.

Stellar Cyber

Stellar Cyber

Stellar Cyber makes Open XDR, the only comprehensive security platform providing maximum protection of applications and data wherever they reside.

Stripe OLT

Stripe OLT

At Stripe OLT, we provide complete business technology solutions - Our team has an unrivalled reputation as a Microsoft Gold Partner, specialising in secure, cloud-first technology.

Mosaic Insurance

Mosaic Insurance

Mosaic is a next-generation global specialty insurer distinguished by an exceptional team, agile technology, and a structure that combines Lloyd’s of London strength with a global distribution network

Air IT

Air IT

Air IT are a responsive, client-focused and award-winning Managed Service Provider, helping clients achieve success and transformation through their IT and communications.

NVISIONx

NVISIONx

NVISIONx data risk governance platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes and storage costs.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Verastel

Verastel

Specializing in the niche space of proactive cyber-defense, and adaptive resilience, team Verastel is bolstering enterprise digital security like never before.