Facebook, Twitter and Google Are A 'recruiting platform for terrorism''

Facebook, Twitter and Google and are deliberately failing to stop terrorists from using their websites to promote terrorism because they believe it will "damage their brands", UK MPs have warned.

MPs warned that social media websites are becoming the "vehicle of choice" for spreading terrorist propaganda but websites are policing billions of accounts and messages with just a "few hundred" employees.

 

Recently sentenced British Islamist @anjemchoudary on Twitter

The UK’s Home Affairs select committee accused US technology giants including Google, Facebook and Twitter of "passing the buck" and said that they have become a "recruiting platform for terrorism".

They highlighted the fact that Twitter and YouTube refused to remove posts by Anjem Choudary, the hate preacher convicting of supporting Isil, despite repeated requests by the police.

Keith Vaz, the chairman of the committee, said: "Huge corporations like Google, Facebook and Twitter, with their billion-dollar incomes, are consciously failing to tackle this threat and passing the buck by hiding behind their supranational legal status, despite knowing that their sites are being used by the instigators of terror.

"The companies' failure to tackle this threat has left some parts of the internet ungoverned, unregulated and lawless."

The committee's report states: "It is alarming that these companies have teams of only a few hundred employees to monitor networks of billions of accounts and that Twitter does not even proactively report extremist content to law enforcement agencies.

"These companies are hiding behind their supranational legal status to pass the parcel of responsibility and refusing to act responsibly in case they damage their brands.

"If they continue to fail to tackle this issue and allow their platforms to become the ‘Wild West’ of the internet, then it will erode their reputation as responsible operators."

The report says that internet companies should be required to co-operate with Britain's counter-extremism police and shut down accounts immediately.

It calls on the companies to publish quarterly statistics showing how many sites they have taken down. It also recommended that a specialist police unit set up to target terror-related material online is upgraded into a round-the-clock "central hub".

Mr Vaz added: "The Government must develop an effective counter-narrative to the slick and effective propaganda machine being run by Daesh."

Ben Wallace, the security minister, said that internet companies must "play their part" in fighting extremism.

He said: "Extremism is not something that can be defeated by Government and law enforcement alone, it is vital that everyone plays their part.

"We are working closely with internet companies and want to see a swifter, more automated approach to the identification and removal of content from social media sites, not just in the UK but across the world. " Twitter said last week that it has suspended 235,000 accounts for promoting terrorism in the past six months.

It said: " As noted by numerous third parties, our efforts continue to drive meaningful results, including a significant shift in this type of activity off of Twitter."

Simon Milner, director of policy at Facebook UK, said: "Terrorists and the support of terrorist activity are not allowed on Facebook and we deal swiftly and robustly with reports of terrorism-related content.

"In the rare instances that we identify accounts or material as terrorist, we'll also look for and remove relevant associated accounts and content."

The report also warned that extremists are able to leave the country while on bail despite being barred from travelling because police have failed to confiscate their passports. Siddhartha Dhar, an Isil extremist, fled the UK within days of being released on bail.

"It seemed incredible to us that the only follow-up action for failure to comply was a polite reminder letter from the police," the report says.

Richard Walton, the former head of Scotland Yard's counter terrorism command, today warns that existing British laws would not prevent preachers who followed Choudary's example and acting as "radicalisers".

Writing in The Daily Telegraph he says Choudary's conviction could even help fellow radicals avoid conviction in future by showing them how to remain within the law while promoting their ideology, Mr Walton suggests.

Telegraph:

 

« Hedge Fund Robot Outsmarts Master
Cybersecurity in Aviation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Group-IB

Group-IB

Group-IB is a leading provider of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigating high-tech crimes, and protecting intellectual property.

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

National Cybersecurity Competence Centre (NC3)

National Cybersecurity Competence Centre (NC3)

NC3 has been established in response to growing demands for practically applicable products and solutions for ensuring cybersecurity of critical and non-critical information infrastructures.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

FAIR Institute

FAIR Institute

The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

Cybolt

Cybolt

Cybolt helps companies, organizations, and governments manage digital risks and live in an environment of confidence and certainty.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

Synagex

Synagex

Synagex Modern IT is a simple IT and cybersecurity solution for businesses.

Foghorn Consulting

Foghorn Consulting

Foghorn can analyze your cloud to enhance performance and security, while reducing costs. Based on AWS’ 6 Pillars, our AWS WAFR Certified Engineers Will Identify Areas of Improvement.