Government unveils auto-blocking tool for extremist content

Amber Rudd suggests legislation could force ISPs to adopt the technology

The UK government has unveiled a tool it believes will accurately detect extremist content and block it from the internet.

In an interview with the BBC in Silicon Valley where she would be meeting with giant tech firms, the Home Secretary Amber Rudd explained this would help smaller companies who struggle to block extremist content as did not "rule out taking legislative action" to force tech companies in using it.

This comes during a time of increased acknowledgement that tech firms need to do more to combat online extremism - a major recruiting tool in a new age of postmodern warfare where terrorists use social media to create, reach and intimidate large audiences.

Recently, Facebook's head of news feed Adam Mosseri admitted to Recode in the wake of Unilever's threat to boycott adverts if they didn't clamp down on extremism "it's on us to make sure we deliver and meet whatever expectations they have."

Advertisement
Advertisement - Article continues below

The blocking tool was developed by an artificial intelligence company in London called ASI Data Science, with the government injecting 600,000 of public funds into supporting the tool.

It was run by thousands of hours of content produced by ISIS which the government believes will automatically mould the tool for analysing, recognising and ultimately blocking extremist content.

According to ASI Data Science, the tool can detect at least 94% of ISIS' content and anything the software was unsure in marking as extremist content would be flagged up for human decision.

Amber Rudd told BBC that she remains convinced the "best way to take real action, to have the best outcomes, is to have an industry-led forum".

Her statement reflects a wider effort on the part of the government to actively root out online extremism - however, often prompting criticism and ridicule for suggesting policies that would either curb civil liberties and encryption or simply be impractical to implement.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/mobile/mobile-phones/354273/pablo-escobars-brother-launches-budget-foldable-phone
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019
Visit/network-internet/wifi-hotspots/354283/industrial-wi-fi-6-trial-reveals-blistering-speeds
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019