UK government enlists public to spot terror Web sites
IDG News Service - The U.K. public can report terrorism-related Web sites to authorities for removal from the Internet under a new program launched by the British government.
The program is a way in which the government is seeking to enforce the Terrorism Acts of 2000 and 2006, which make it illegal to have or share information that's intended to be useful to terrorists and bans glorifying terrorism or urging people to commit terrorism.
People can report Web sites on Direct.co.uk by filling out a Web-based form. The form includes categories to describe what's on the Web site, such as "terrorist training material" or "hate crimes."
Content deemed illegal by the U.K. includes videos of beheadings, messages that encourage racial or terrorist violence and chat forums revolving around hate crimes, according to information on Direct.co.uk.
The reports are anonymous and are then reviewed by police officers who are part of the new Counter Terrorism Internet Referral Unit, run by the Association of Chief Police Officers (ACPO). A Home Office spokeswoman said that unit would be responsible for determining the intent of the content posted, which would determine whether it is in fact illegal.
But it begs the question of how, for example, chemistry textbooks published by the Massachusetts Institute of Technology -- which have information on poison and explosives -- could be viewed, said Wendy M. Grossman, a member of the Open Rights Group advisory council and a freelance technology writer.
"I suppose the key is 'intended to be useful to terrorists,' and what they're trying to get at is networks of terrorists who educate each other and their recruits," Grossman said. "Bottom line is I don't believe this effort is going to make us any safer, though it may well turn up a few idiots who get prosecuted for, basically, saying stupid things."
Police should review submitted sites fairly quickly, said an ACPO spokeswoman. If the Web site is hosted in the U.K., police would ask the hosting provider to take the site offline. If a site is hosted overseas, then police would engage private industry and other law enforcement agencies, she said.
In October 2007, British police arrested a 17-year-old for possessing a copy of the "The Anarchist Cookbook," a 1970s-era book featuring instructions on homemade bomb-making and other destructive tips.
Last month, a 38-year-old man pleaded not guilty to 12 terrorism-related charges, including four counts of owning information useful to terrorism, according to a BBC news story. One of the counts was for possessing "The Anarchist Cookbook," which is still sold today on Amazon.co.uk.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts