SlideShare a Scribd company logo
1 of 1
Download to read offline
Report: Britain to Use Google Against Terrorists
The British government may be deploying a new weapon against terrorists: Google.
According to the tech-related news site The Register, the Home Office's Office for Security and
Counter Terrorism plans to work with "approved" Islamist Web sites to "flood the Internet" with pro-
Western viewpoints.
It will train the operators of the pro-Western sites in search-engine optimization, an arcane strategy
that basically makes sure your site is near the top of Google, Yahoo and Microsoft LiveSearch results
pages.
That way, young British Muslims searching online for say, "jihad," will get pro-Western Web sites
instead of Al Qaeda mouthpieces, or so the theory goes.
"In order to support mainstream voices, we work with local partners to help develop their
communication, representational and leadership skills," an unnamed Home Office spokesman told
The Register. "This support could include media training, which can help make their voices heard
more widely, and support the development of skills which allow communities to be more effective in
debate."
In fact, a Google search for "jihad" comes up with only two radical Islamist links out of the first 10
returned. But it's possible the British government effort could make it zero.
Then again, a recent study by the International Center for the Study of Radicalization and Political
Violence (ICSR) doubted that curbing Islamist material online would have much impact on terrorist
activity.
"It is unlikely that any but the most callow wannabe terrorist would use a mainstream search engine
to find banned material," wrote the report entitled "Countering Online Radicalization."
A call and e-mail placed to the Home Office seeking comment were not immediately answered.
o Click here to read the original report in The Register.
o Click here for FOXNews.com's Personal Technology Center.
o Got tech questions? Ask our experts at FoxNews.com's Tech Q&A.

More Related Content

What's hot

Search Engine Optimization In Houston, TX
Search Engine Optimization In Houston, TXSearch Engine Optimization In Houston, TX
Search Engine Optimization In Houston, TXGreg Media, Inc.
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeTrend Micro
 
WTF is Ad Fraud at DAS, 10/22/14
WTF is Ad Fraud at DAS, 10/22/14WTF is Ad Fraud at DAS, 10/22/14
WTF is Ad Fraud at DAS, 10/22/14Digiday
 
Craigslist Plans To Make News
Craigslist Plans To Make NewsCraigslist Plans To Make News
Craigslist Plans To Make Newsgarruloushate9369
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013EMC
 
Diginius - DuckDuckGo, Privacy and the Future of Search
Diginius - DuckDuckGo, Privacy and the Future of Search Diginius - DuckDuckGo, Privacy and the Future of Search
Diginius - DuckDuckGo, Privacy and the Future of Search NateBurke1
 

What's hot (7)

Search Engine Optimization In Houston, TX
Search Engine Optimization In Houston, TXSearch Engine Optimization In Houston, TX
Search Engine Optimization In Houston, TX
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at Large
 
WTF is Ad Fraud at DAS, 10/22/14
WTF is Ad Fraud at DAS, 10/22/14WTF is Ad Fraud at DAS, 10/22/14
WTF is Ad Fraud at DAS, 10/22/14
 
Craigslist Plans To Make News
Craigslist Plans To Make NewsCraigslist Plans To Make News
Craigslist Plans To Make News
 
Prism
PrismPrism
Prism
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013
 
Diginius - DuckDuckGo, Privacy and the Future of Search
Diginius - DuckDuckGo, Privacy and the Future of Search Diginius - DuckDuckGo, Privacy and the Future of Search
Diginius - DuckDuckGo, Privacy and the Future of Search
 

Viewers also liked

Konsumen sebagai pembeli
Konsumen sebagai pembeliKonsumen sebagai pembeli
Konsumen sebagai pembeliandinaprincess
 
Adding new orderset write md
Adding new orderset write mdAdding new orderset write md
Adding new orderset write mdwritemd
 
Mengelola pelatihan persma
Mengelola pelatihan persmaMengelola pelatihan persma
Mengelola pelatihan persmaAnton Muhajir
 
Iklan dan periklanan
Iklan dan periklananIklan dan periklanan
Iklan dan periklanansensend1
 
Lap. koperasi periode Jan - Jul'2011 (Tugas 1)
Lap. koperasi periode Jan - Jul'2011 (Tugas 1)Lap. koperasi periode Jan - Jul'2011 (Tugas 1)
Lap. koperasi periode Jan - Jul'2011 (Tugas 1)Yayu Ferdian
 
текстовий процесор 1 урок
текстовий процесор 1 уроктекстовий процесор 1 урок
текстовий процесор 1 урок1cana1
 
Trinhanhtuan
TrinhanhtuanTrinhanhtuan
TrinhanhtuanSon Dien
 
Tugas softskill perilaku konsumen
Tugas softskill perilaku konsumenTugas softskill perilaku konsumen
Tugas softskill perilaku konsumenheribertusdwi
 
Vida sexual en la menopausia
Vida sexual en la menopausiaVida sexual en la menopausia
Vida sexual en la menopausiaMeditaciones
 
Give motorcyclists the respect they deserve
Give motorcyclists the respect they deserve  Give motorcyclists the respect they deserve
Give motorcyclists the respect they deserve Steven Schwartzapfel
 
20140228私立短期大学図書館協議会 近畿地区研修会 講師
20140228私立短期大学図書館協議会 近畿地区研修会 講師20140228私立短期大学図書館協議会 近畿地区研修会 講師
20140228私立短期大学図書館協議会 近畿地区研修会 講師Masahiko Inoue
 
Fis4 it informacion cursos de escuela FIS ULima
Fis4 it informacion cursos de escuela FIS ULimaFis4 it informacion cursos de escuela FIS ULima
Fis4 it informacion cursos de escuela FIS ULimajebric
 

Viewers also liked (20)

Konsumen sebagai pembeli
Konsumen sebagai pembeliKonsumen sebagai pembeli
Konsumen sebagai pembeli
 
Iberoamericana
IberoamericanaIberoamericana
Iberoamericana
 
Review pemasaran 2014
Review pemasaran 2014Review pemasaran 2014
Review pemasaran 2014
 
Adding new orderset write md
Adding new orderset write mdAdding new orderset write md
Adding new orderset write md
 
UEM Presentation
UEM PresentationUEM Presentation
UEM Presentation
 
Mengelola pelatihan persma
Mengelola pelatihan persmaMengelola pelatihan persma
Mengelola pelatihan persma
 
Biaya Overhead Pabrik
Biaya Overhead PabrikBiaya Overhead Pabrik
Biaya Overhead Pabrik
 
Iklan dan periklanan
Iklan dan periklananIklan dan periklanan
Iklan dan periklanan
 
Lap. koperasi periode Jan - Jul'2011 (Tugas 1)
Lap. koperasi periode Jan - Jul'2011 (Tugas 1)Lap. koperasi periode Jan - Jul'2011 (Tugas 1)
Lap. koperasi periode Jan - Jul'2011 (Tugas 1)
 
текстовий процесор 1 урок
текстовий процесор 1 уроктекстовий процесор 1 урок
текстовий процесор 1 урок
 
Trinhanhtuan
TrinhanhtuanTrinhanhtuan
Trinhanhtuan
 
Juegos Linux
Juegos LinuxJuegos Linux
Juegos Linux
 
3 probabilitas
3 probabilitas3 probabilitas
3 probabilitas
 
Stokholm
StokholmStokholm
Stokholm
 
Tugas softskill perilaku konsumen
Tugas softskill perilaku konsumenTugas softskill perilaku konsumen
Tugas softskill perilaku konsumen
 
Vida sexual en la menopausia
Vida sexual en la menopausiaVida sexual en la menopausia
Vida sexual en la menopausia
 
Give motorcyclists the respect they deserve
Give motorcyclists the respect they deserve  Give motorcyclists the respect they deserve
Give motorcyclists the respect they deserve
 
20140228私立短期大学図書館協議会 近畿地区研修会 講師
20140228私立短期大学図書館協議会 近畿地区研修会 講師20140228私立短期大学図書館協議会 近畿地区研修会 講師
20140228私立短期大学図書館協議会 近畿地区研修会 講師
 
Bonus k webinary
Bonus k webinaryBonus k webinary
Bonus k webinary
 
Fis4 it informacion cursos de escuela FIS ULima
Fis4 it informacion cursos de escuela FIS ULimaFis4 it informacion cursos de escuela FIS ULima
Fis4 it informacion cursos de escuela FIS ULima
 

Similar to Report: Britain to Use Google Against Terrorists

Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docxCase Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docxtidwellveronique
 
Doc 1) Discuss this document with an economist and Christian View.docx
Doc 1) Discuss this document with an economist and Christian View.docxDoc 1) Discuss this document with an economist and Christian View.docx
Doc 1) Discuss this document with an economist and Christian View.docxelinoraudley582231
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital AgeYogeshIJTSRD
 
Corporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friCorporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friAlleneMcclendon878
 
Gmail Hacking in China
Gmail Hacking in ChinaGmail Hacking in China
Gmail Hacking in ChinaHGM1
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...Nicholas Tancredi
 
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Nicholas Tancredi
 
The removal of a russian app raises new concerns for apple and google
The removal of a russian app raises new concerns for apple and googleThe removal of a russian app raises new concerns for apple and google
The removal of a russian app raises new concerns for apple and googleaditi agarwal
 
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docxDiscussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docxcuddietheresa
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsCharles Mok
 
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...Dick Pirozzolo, APR
 
The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Ana...
The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Ana...The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Ana...
The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Ana...suyu22
 
IDT585-Book Review2
IDT585-Book Review2IDT585-Book Review2
IDT585-Book Review2mollysun323
 

Similar to Report: Britain to Use Google Against Terrorists (20)

War-of-Keywords
War-of-KeywordsWar-of-Keywords
War-of-Keywords
 
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docxCase Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
Case Assignment 10.3 Google Meets The Great Firewall of ChinaTh.docx
 
The Role of Social Media in Da'awah
The Role of Social Media in Da'awahThe Role of Social Media in Da'awah
The Role of Social Media in Da'awah
 
Doc 1) Discuss this document with an economist and Christian View.docx
Doc 1) Discuss this document with an economist and Christian View.docxDoc 1) Discuss this document with an economist and Christian View.docx
Doc 1) Discuss this document with an economist and Christian View.docx
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital Age
 
AI is already writing books, websites and online recipes
AI is already writing books, websites and online recipesAI is already writing books, websites and online recipes
AI is already writing books, websites and online recipes
 
Corporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friCorporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best fri
 
Gmail Hacking in China
Gmail Hacking in ChinaGmail Hacking in China
Gmail Hacking in China
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
 
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
 
The removal of a russian app raises new concerns for apple and google
The removal of a russian app raises new concerns for apple and googleThe removal of a russian app raises new concerns for apple and google
The removal of a russian app raises new concerns for apple and google
 
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docxDiscussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
 
Filtering final
Filtering finalFiltering final
Filtering final
 
Filteringfinal
FilteringfinalFilteringfinal
Filteringfinal
 
Search
SearchSearch
Search
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
Cyber Security from China’s Perspective – What the Experts Say – Boston Globa...
 
Mike Kicklighter
Mike KicklighterMike Kicklighter
Mike Kicklighter
 
The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Ana...
The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Ana...The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Ana...
The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Ana...
 
IDT585-Book Review2
IDT585-Book Review2IDT585-Book Review2
IDT585-Book Review2
 

Report: Britain to Use Google Against Terrorists

  • 1. Report: Britain to Use Google Against Terrorists The British government may be deploying a new weapon against terrorists: Google. According to the tech-related news site The Register, the Home Office's Office for Security and Counter Terrorism plans to work with "approved" Islamist Web sites to "flood the Internet" with pro- Western viewpoints. It will train the operators of the pro-Western sites in search-engine optimization, an arcane strategy that basically makes sure your site is near the top of Google, Yahoo and Microsoft LiveSearch results pages. That way, young British Muslims searching online for say, "jihad," will get pro-Western Web sites instead of Al Qaeda mouthpieces, or so the theory goes. "In order to support mainstream voices, we work with local partners to help develop their communication, representational and leadership skills," an unnamed Home Office spokesman told The Register. "This support could include media training, which can help make their voices heard more widely, and support the development of skills which allow communities to be more effective in debate." In fact, a Google search for "jihad" comes up with only two radical Islamist links out of the first 10 returned. But it's possible the British government effort could make it zero. Then again, a recent study by the International Center for the Study of Radicalization and Political Violence (ICSR) doubted that curbing Islamist material online would have much impact on terrorist activity. "It is unlikely that any but the most callow wannabe terrorist would use a mainstream search engine to find banned material," wrote the report entitled "Countering Online Radicalization." A call and e-mail placed to the Home Office seeking comment were not immediately answered. o Click here to read the original report in The Register. o Click here for FOXNews.com's Personal Technology Center. o Got tech questions? Ask our experts at FoxNews.com's Tech Q&A.