EC mulls internet terrorist database

Powered by SC Magazine
 

European governments outline partnership with internet industry.

Internet users could contribute to an official blacklist of suspected terrorist content under the European Commission's budding 'Clean IT' project.

The project aims to create a text that commits the internet industry (web hosts, search engines and ISPs, among others) to helping governments weed out content that incites acts of terror.

Partners met in Berlin this week for the fourth Clean IT conference, led by the Dutch Ministry of Security and Justice and its peers in Belgium, Germany, Spain and the UK.

But Klaasen, Program Manager at the Netherland’s National Coordinator for Counterterrorism and Security, told iTnews that the organisations had so far developed 13 “best practice” proposals for governments and the internet industry.

A final version of the text is expected to be delivered in early 2013.

Flagging

Among those 13 courses of action is a proposal for a system that will allow users to ‘flag’ content they believe to be illegal when surfing the web. These alarms would be sent for review to the service provider and in turn, a government agency.

Participants in the talks were yet to narrow down how such a flagging system might work from a technical perspective, but Klaasen expected it to be among the proposals in the final Clean IT text.

Ideally, the solution would be built into popular web browsers (Mozilla Firefox, Microsoft Internet Explorer, Apple Safari, Google Chrome etc) such that users could flag suspicious material regardless of where it is hosted.

An easier but less comprehensive system would be to compel the world’s most popular content hosts – such as Google/YouTube or Amazon – to interface existing flagging systems with those of law enforcement agencies.

“Flagging happens already on some sites,” Klaasen told iTnews. “Many users already flag content they find concerning on services like YouTube. But many of those flags don’t reach law enforcement.”

Referral, notice and takedown

A related ‘best practice’ proposal calls for governments to establish ‘referral units’ – teams of experts that analyse flagged content to assess its legal status.

Internet content or access providers in Europe are already compelled to forward material to law enforcement if they feel its illegality is crystal clear. But often the line between dissenting content and terrorist content is blurry.

“We can't expect an ISP has the right level of knowledge of terrorist content to know if something is illegal or not,” Klaasen said.

“So we have to find a clever way to share the expertise within the Government with the ISPs.”

Any content deemed illegal is dealt with by a third proposal, for a notice and takedown scheme.

The Clean IT standard is being coordinated with a notice and takedown scheme being managed by the European Commissioner’s Director General of Markets.

Terrorist content database

One of the more recent “best practice” proposals put on the agenda has not yet been published within the draft text.

It has been proposed that an as-yet undecided authority create a database of content that has been deemed illegal and removed from a server under the flagging, notice and takedown mechanisms.

“Usually when illegal material is found on a server hosted by an Internet company and is removed, it pops up two days later somewhere else,” Klaasen said.

“So why not try and create a database where internet companies can check it to see if it's known illegal material? There are many known YouTube videos, for example, with content like be-headings. You don’t need to watch them to know if they are illegal or not.”

Again the focus of the discussions has not been on the technical requirements of such a database, but on more fundamental legal principles.

“The database is just an idea at this stage,” Klaasen said.

“Again it raises questions. If you have such a database, who is responsible for it? Is there a trusted organisation to maintain it? There are really important questions that we’ll look to address.”

Several more proposals are expected to be added to the draft text of Clean IT before a conference in London in September and the delivery of the final text next year.

Copyright © iTnews.com.au . All rights reserved.


EC mulls internet terrorist database
 
 
 
Top Stories
Frugality as a service: the Amazon story
Behind the scenes, Amazon Web Services is one lean machine.
 
Negotiating with the cloud email megavendors
[Blog post] Lessons from Woolworths’ mammoth migration.
 
Qld govt to move up to 149k staff onto Office 365
Australia's largest deployment, outside of the universities.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...

Latest VideosSee all videos »

The great data centre opportunity on Australia's doorstep
The great data centre opportunity on Australia's doorstep
Scott Noteboom, CEO of LitBit speaking at The Australian Data Centre Strategy Summit 2014 in the Gold Coast, Queensland, Australia. http://bit.ly/1qpxVfV Scott Noteboom is a data centre engineer who led builds for Apple and Yahoo in the earliest days of the cloud, and who now eyes Asia as the next big opportunity. Read more: http://www.itnews.com.au/News/372482,how-do-we-serve-three-billion-new-internet-users.aspx#ixzz2yNLmMG5C
Interview: Karl Maftoum, CIO, ACMA
Interview: Karl Maftoum, CIO, ACMA
To COTS or not to COTS? iTnews asks Karl Maftoum, CIO of the ACMA, at the CIO Strategy Summit.
Susan Sly: What is the Role of the CIO?
Susan Sly: What is the Role of the CIO?
AEMO chief information officer Susan Sly calls for more collaboration among Australia's technology leaders at the CIO Strategy Summit.
Meet the 2014 Finance CIO of the Year
Meet the 2014 Finance CIO of the Year
Credit Union Australia's David Gee awarded Finance CIO of the Year at the iTnews Benchmark Awards.
Meet the 2014 Retail CIO of the Year
Meet the 2014 Retail CIO of the Year
Damon Rees named Retail CIO of the Year at the iTnews Benchmark Awards for his work at Woolworths.
Robyn Elliott named the 2014 Utilities CIO of the Year
Robyn Elliott named the 2014 Utilities CIO of the Year
Acting Foxtel CIO David Marks accepts an iTnews Benchmark Award on behalf of Robyn Elliott.
Meet the 2014 Industrial CIO of the Year
Meet the 2014 Industrial CIO of the Year
Sanjay Mehta named Industrial CIO of the Year at the iTnews Benchmark Awards for his work at ConocoPhillips.
Meet the 2014 Healthcare CIO of the Year
Meet the 2014 Healthcare CIO of the Year
Greg Wells named Healthcare CIO of the Year at the iTnews Benchmark Awards for his work at NSW Health.
Meet the 2014 Education CIO of the Year
Meet the 2014 Education CIO of the Year
William Confalonieri named Healthcare CIO of the Year at the iTnews Benchmark Awards for his work at Deakin University.
Meet the 2014 Government CIO of the Year
Meet the 2014 Government CIO of the Year
David Johnson named Government CIO of the Year at the iTnews Benchmark Awards for his work at the Queensland Police Service.
Q and A: Coalition Broadband Policy
Q and A: Coalition Broadband Policy
Malcolm Turnbull and Tony Abbott discuss the Coalition's broadband policy with the press.
AFP scalps hacker 'leader' inside Australia's IT ranks.
AFP scalps hacker 'leader' inside Australia's IT ranks.
The Australian Federal Police have arrested a Sydney-based IT security professional for hacking a government website.
NBN Petition Delivered To Turnbull's Office
NBN Petition Delivered To Turnbull's Office
UTS CIO: IT teams of the future
UTS CIO: IT teams of the future
UTS CIO Chrissy Burns talks data.
New UTS Building: the IT within
New UTS Building: the IT within
The IT behind tomorrow's universities.
iTnews' NBN Panel
iTnews' NBN Panel
Is your enterprise NBN-ready?
Introducing iTnews Labs
Introducing iTnews Labs
See a timelapse of the iTnews labs being unboxed, set up and switched on! iTnews will produce independent testing of the latest enterprise software to hit the market after installing a purpose-built test lab in Sydney. Watch the installation of two DL380p servers, two HP StoreVirtual 4330 storage arrays and two HP ProCurve 2920 switches.
The True Cost of BYOD
The True Cost of BYOD
iTnews' Brett Winterford gives attendees of the first 'Touch Tomorrow' event in Brisbane a brief look at his research into enterprise mobility. What are the use cases and how can they be quantified? What price should you expect to pay for securing mobile access to corporate applications? What's coming around the corner?
Ghost clouds
Ghost clouds
ACMA chair Chris Chapman says there is uncertainty over whether certain classes of cloud service providers are caught by regulations.
Was the Snowden leak inevitable?
Was the Snowden leak inevitable?
Privacy experts David Vaile (UNSW Cyberspace Law and Policy Centre) and Craig Scroggie (CEO, NextDC) claim they were not surprised by the Snowden leaks about the NSA's PRISM program.
Latest Comments
Polls
Which bank is most likely to suffer an RBS-style meltdown?





   |   View results
ANZ
  21%
 
Bankwest
  9%
 
CommBank
  11%
 
National Australia Bank
  17%
 
Suncorp
  24%
 
Westpac
  19%
TOTAL VOTES: 1455

Vote