Internet

By Tom Ascott Everyone has seen a meme, whether they know it or not. They’re everywhere on Facebook, Twitter and Instagram. The most popular ones make it off the Internet and show up in newspapers, television shows or films. You’ve almost certainly seen Pepe the Frog, and if you haven’t seen the classic ‘Woman yelling…

By Dr. William Allchorn In late January this year, the outgoing director general of the UK’s domestic intelligence agency, Sir Andrew Parker, suggested that technology was one of the biggest challenges facing the UK’s Security Services. Sir Andrew said he was particularly interested in artificial intelligence “because of our need to be able to make sense of…

By Daniel Baldino & Kosta Lucas The Internet’s precise role in the process of radicalisation remains vexing. You can lead a person to a bomb-making manual, but you can’t make them use it. Radicalisation is a social process. It refers to a means by which an individual or group embraces an extreme ideology and rejects…

Welcome to Vol. 5 Iss. 3 of the VOX-Pol Newsletter. If you have colleagues or friends who may be interested in the content of our newsletter, or any events or research carried out by VOX-Pol, please forward this to them and encourage them to subscribe via our website. In particular, please update any interested colleagues about…

By Lorand Bodo On 25–26 April 2018, a major multinational digital content takedown operation was conducted against the Islamic State (IS). The operation targeted the major online media outlets directly associated with IS. The operation was reportedly successful in collecting digital evidence about IS activities, including the seizure of servers located in Canada, the Netherlands…

The second conference of Europol’s European Counter Terrorism Centre (ECTC) Advisory Group took place at their headquarter’s in The Hague on 17 – 18 April. VOX-Pol Coordinator Prof. Maura Conway presented new research on ‘The Jihadi Online Ecology (Beyond ISIS)’ at the conference, which attracted more than 100 participants from a diverse range of backgrounds,…

We have published a number of recent Blog posts–see HERE, HERE, and HERE–that address issues around content regulation and intermediary liability. We therefore thought the below would be a timely intervention. The piece is excerpted from Stanford University’s Center for Internet and Society’s Law, Borders, and Speech Conference Proceedings Volume, where it appears as an appendix.…

Content removal on social media platforms often takes place through semi-automated or automated processes. Algorithms are widely used for content filtering and content removal processes1, including on social media platforms, directly impacting freedom of expression and raising rule of law concerns (e.g. questions of legality, legitimacy and proportionality). While large social media platforms like Google or Facebook have…

The Swiss Institute of Comparative Law held an international conference entitled ‘The Legal Framework for Countering Terrorist and Violent Extremist Content Online’ today, 8 December 2017. The conference was organised in collaboration with the UN Counter-Terrorism Committee Executive Directorate (UN CTED), the Swiss foundation ICT4Peace, and the Ethics and Communication Law Centre of the Università…

The Global Internet Forum to Counter Terrorism held an event this morning, 6 December 2017, at Google’s Brussels’ offices.  The event featured representatives from GIFCT founder companies, Google, Facebook, Microsoft, and Twitter, along with the EU Commission, EUROPOL, ICT4Peace, CDT, and others.  The first panel discussion and Q&A included stakeholders from agencies engaged in the…