Quantum computing could help fight terrorism, says UK gov

Counter-terrorism strategy embraces tech, but warns of future extremist digital capabilities

Machine learning and analytics are set to play key roles in the UK government's new counter-terrorism strategy, unveiled yesterday.

Technological developments are helping terrorists co-ordinate and spread propaganda, the government's CONTEST report states, but makes clear that technology can help keep the UK safe as well.

The report, a review of the UK's counter-terrorism strategy in light of last year's London and Manchester attacks, outlines innovations as diverse as cryptocurrencies, drones and stronger encryption as aiding extremists' bids to launch attacks.

Advertisement - Article continues below

"As the threat evolves so must our response," said home secretary Sajid Javid. "Ultimately, our approach is about ensuring that there are no safe spaces for terrorists to operate - internationally, in the UK or online."

The new strategy will seek to use AI to "filter and identify crucial information", and even use machine learning with quantum computing to find relevant data from huge datasets.

It will also deploy new screening and detection technologies at airports, borders and in crowded places.

"The threat from cyber terrorism may increase in the future, but the current technical capability of terrorists is judged to be low," the report reads.

New legislation will underpin the revised strategy, updating terrorism offences to reflect new practices online, and making it an offence to repeatedly view streamed terrorist video content.

Advertisement
Advertisement - Article continues below

The government will also beef up the sentencing framework for terrorism, increasing the maximum penalty for some offences.

Advertisement - Article continues below

It also promised "robust action" to leave terrorists with no safe places online to spread propaganda, and it will work with the tech sector on software that can identify and remove terrorist content before it's widely seen.

The Home Office has already created an AI tool with London-based ASI Data Science to detect terrorist content in online videos, sporting a 99.9% success rate with 95% of Daesh propaganda, it revealed in February.

In a reference to the government's long-held stance that messaging tools must create backdoors to allow security services to intercept suspicious conversations, the report said that "we do not want unfettered access to communications, but we must ensure our agencies are able to access the information they need to keep us safe".

The review referred to the Investigatory Powers Act (IPA), saying the government wants to protect police powers within a "robust legal framework", citing rules like forcing telecoms companies to keep histories of websites people visit, and the requirement for them to remove encryption when a request to do so is authorised by the home secretary and a judicial commissioner.

However, the IPA's central tenets of keeping people's browsing histories, emails and phone usage were found to be unlawful in a judicial review that reached the High Court in April. The government has until 1 November to rewrite it.

Image: Shutterstock

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/ethical-hacking/356252/poorly-secured-banking-apps-lead-to-cyber-threats
ethical hacking

Mobile banking apps are exposing user data to attackers

26 Jun 2020
Visit/security/malware/356231/most-malware-came-through-https-connections-in-q1-2020
malware

Most malware came through HTTPS connections in Q1 2020

25 Jun 2020
Visit/security/phishing/356211/phishing-attacks-target-unsuspecting-wells-fargo-customers
phishing

Phishing attacks target unsuspecting Wells Fargo customers

24 Jun 2020
Visit/security/hacking/356210/trump-administration-wants-to-enhance-the-security-of-gov-sites
hacking

Trump administration wants to enhance the security of .gov sites

24 Jun 2020

Most Popular

Visit/mobile/google-android/356373/over-2-dozen-additional-android-apps-found-stealing-user-data
Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020
Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/cloud/356260/the-road-to-recovery
Sponsored

The road to recovery

30 Jun 2020