{"id":291,"date":"2013-12-02T12:56:02","date_gmt":"2013-12-02T12:56:02","guid":{"rendered":"http:\/\/blogs.kent.ac.uk\/unikentcomp-news\/?p=291"},"modified":"2017-11-23T11:22:14","modified_gmt":"2017-11-23T11:22:14","slug":"blocking-extremist-sites-is-not-the-same-as-fighting-child-porn","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2013\/12\/02\/blocking-extremist-sites-is-not-the-same-as-fighting-child-porn\/","title":{"rendered":"Blocking extremist sites is not the same as fighting child porn"},"content":{"rendered":"<p>Expert comment by\u00a0<a href=\"http:\/\/theconversation.com\/profiles\/eerke-boiten-104676\">Eerke Boiten<\/a><em>, School of Computing<\/em><\/p>\n<p>Fresh from its success calling on search engines to block access to child porn, the UK government is turning its attention to terrorism. Ministers are poised to call on internet service providers to\u00a0<a href=\"http:\/\/www.theguardian.com\/uk-news\/2013\/nov\/27\/ministers-order-isps-block-terrorist-websites\">block access to websites that contain extremist views<\/a>.<\/p>\n<p>The government first\u00a0<a href=\"http:\/\/www.publications.parliament.uk\/pa\/cm201314\/cmhansrd\/cm131023\/debtext\/131023-0001.htm\">set out its intentions<\/a>\u00a0last month when is said its Extremism Task Force would seek to \u201ccounter extremist narrative, including by blocking online sites\u201d.<\/p>\n<p>Only a week ago, the implementation of filters in search engines in order to combat child porn\u00a0<a href=\"https:\/\/theconversation.com\/blocks-just-move-child-porn-under-the-counter-20531\">raised concerns on censorship<\/a>. This latest step may well vindicate these fears.<\/p>\n<p>To start with the good news, the proposed technical method to achieve this appears reasonable. A specialist taskforce is to monitor internet content and, with the help of the public, flag up dubious websites. They will then follow up by potentially having the websites taken down and instigate criminal prosecution where appropriate. This seems like a sound strategy against websites representing illegal activity.<\/p>\n<p>The technique is already applied in the context of copyright infringement with some success and has been used by the\u00a0<a href=\"https:\/\/www.iwf.org.uk\/\">Internet Watch Foundation<\/a>\u00a0for many years to take on child porn sites.<\/p>\n<p>Experts such as Jim Gamble, former head of the Child Exploitation &amp; Online Protection Centre, have argued that this is much more effective and to the point than\u00a0<a href=\"http:\/\/www.itv.com\/news\/2013-06-18\/google-have-been-working-hard-to-clean-up-their-act-on-child-abuse-images\/\">installing search filters<\/a>. With extremism, as with child porn, one might still argue that the hardened criminals will know ways of circumventing simplistic internet controls, through use of ToR, VPNs, and encryption in general.<\/p>\n<p>Unfortunately terrorism is a much more problematic area to police than child porn. The use of the\u00a0<a href=\"http:\/\/www.popcenter.org\/problems\/child_pornography\/PDFs\/Taylor_etal_2001.pdf\">numbered scales<\/a>\u00a0that categorise severity of images of child porn images is well established in criminal courts. The definition and scope of extremism and terrorism is much harder to characterise, and is highly subjective even in mainstream politics. Consider the public and political views on Nelson Mandela in Western Europe over the past 40 years, for example.<\/p>\n<p>A critical point here, as so often, is going to be oversight. Who would be in charge of deciding what is terrorism and extremism? How would they be accountable? It has\u00a0<a href=\"http:\/\/www.theguardian.com\/uk-news\/2013\/nov\/27\/ministers-order-isps-block-terrorist-websites\">been suggested<\/a>\u00a0that responsibility might be placed with the Police\u2019s Counter Terrorism Internet Referral Unit. This seems likely: its\u00a0<a href=\"http:\/\/www.acpo.police.uk\/ACPOBusinessAreas\/PREVENT\/TheCounterTerrorismInternetReferralUnit.aspx\">web portal<\/a>\u00a0already bears great similarity to<a href=\"https:\/\/www.iwf.org.uk\/\">the IWF\u2019s<\/a>.<\/p>\n<p>Do the UK public trust accountability in the police sector? Trust in intelligence services in general, and the degree to which they are being held accountable through democratic processes, must certainly be at an all-time low.<\/p>\n<p>A lack of belief in oversight is not the main worry, though. David Miranda was\u00a0<a href=\"http:\/\/www.theguardian.com\/law\/2013\/nov\/07\/david-miranda-detention-court\">detained under Terrorism legislation<\/a>\u00a0in response to the Guardian\u2019s Snowden revelations, and terrorism legislation is routinely used to control protest demonstrations. We need to worry about this government abusing \u201cterrorism\u201d to suppress legitimate enquiry and protest, and for that reason alone we should not give them any more control of our biggest avenue of free speech: the internet.<\/p>\n<p><em>Eerke Boiten is a senior lecturer in the School of Computing at the University of Kent, and Director of the University&#8217;s interdisciplinary Centre for Cyber Security Research. He receives funding from EPSRC for the CryptoForma Network of Excellence on Cryptography and Formal Methods.<\/em><\/p>\n<p>This article was originally published at\u00a0<a href=\"http:\/\/theconversation.com\/\">The Conversation<\/a>. Read the\u00a0<a href=\"http:\/\/theconversation.com\/blocking-extremist-sites-is-not-the-same-as-fighting-child-porn-20930\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Expert comment by\u00a0Eerke Boiten, School of Computing Fresh from its success calling on search engines to block access to child porn, the UK government is &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/2013\/12\/02\/blocking-extremist-sites-is-not-the-same-as-fighting-child-porn\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":5321,"featured_media":36,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[124,122],"tags":[37339,57886,142771],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/users\/5321"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/posts\/291\/revisions\/292"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media\/36"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unikentcomp-news\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}