Government unveils auto-blocking tool for extremist content
Amber Rudd suggests legislation could force ISPs to adopt the technology
The UK government has unveiled a tool it believes will accurately detect extremist content and block it from the internet.
In an interview with the BBC in Silicon Valley where she would be meeting with giant tech firms, the Home Secretary Amber Rudd explained this would help smaller companies who struggle to block extremist content as did not "rule out taking legislative action" to force tech companies in using it.
This comes during a time of increased acknowledgement that tech firms need to do more to combat online extremism - a major recruiting tool in a new age of postmodern warfare where terrorists use social media to create, reach and intimidate large audiences.
Recently, Facebook's head of news feed Adam Mosseri admitted to Recode in the wake of Unilever's threat to boycott adverts if they didn't clamp down on extremism "it's on us to make sure we deliver and meet whatever expectations they have."
The blocking tool was developed by an artificial intelligence company in London called ASI Data Science, with the government injecting 600,000 of public funds into supporting the tool.
It was run by thousands of hours of content produced by ISIS which the government believes will automatically mould the tool for analysing, recognising and ultimately blocking extremist content.
According to ASI Data Science, the tool can detect at least 94% of ISIS' content and anything the software was unsure in marking as extremist content would be flagged up for human decision.
Amber Rudd told BBC that she remains convinced the "best way to take real action, to have the best outcomes, is to have an industry-led forum".
Her statement reflects a wider effort on the part of the government to actively root out online extremism - however, often prompting criticism and ridicule for suggesting policies that would either curb civil liberties and encryption or simply be impractical to implement.
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now