Internet intermediaries and counter-terrorism: Between self-regulation and outsourcing law enforcement

Krisztina Huszti-Orban

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Recent years have seen increasing pressure on Internet intermediaries that provide a platform for and curate third-party content to monitor and police, on behalf of the State, online content generated or disseminated by users. This trend is prominently motivated by the use of ICTs by terrorist groups as a tool for recruitment, financing, and planning operations. States and international organizations have long called for enhanced cooperation between the public and private sectors to aid efforts to counter terrorism and violent extremism. However, as the Special Rapporteur on Freedom of Expression noted in his latest report to the Human Rights Council, 'the intersection of State behaviour and corporate roles in the digital age remains somewhat new for many States'. Detailed information on the means and modalities of content control exercised by online platforms is scarce. Terms of service and community standards are commonly drafted in terms that do not provide sufficiently clear guidance on the circumstances under which content may be blocked, removed or restricted, or access to a service may be restricted or terminated. Users have limited possibilities to challenge decisions to restrict material or access to a service. Moreover, as private bodies, such platforms are generally subject to limited democratic or independent oversight. At the same time, having private actors such as social media companies increasingly undertake traditionally public interest tasks in the context of Internet governance is likely unavoidable, as public authorities frequently lack the human or technical resources to satisfactorily perform these tasks. Against this background, this paper aims to examine ways to define the contours of the division of responsibilities in countering terrorism and violent extremism between the public and private spheres. It addresses ways to ensure that Internet intermediaries carry out quasi-enforcement and quasi-adjudicative tasks in a manner compliant with international human rights norms and standards.

Original languageEnglish (US)
Title of host publication2018 10th International Conference on Cyber Conflict
Subtitle of host publicationCyCon X: Maximising Effects, CyCon 2018
EditorsTomas Minarik, Lauri Lindstrom, Raik Jakschis
PublisherNATO CCD COE Publications
Pages227-243
Number of pages17
ISBN (Electronic)9789949990429
DOIs
StatePublished - Jul 5 2018
Event10th International Conference on Cyber Conflict: CyCon X: Maximising Effects, CyCon 2018 - Tallinn, Estonia
Duration: May 30 2018Jun 1 2018

Publication series

NameInternational Conference on Cyber Conflict, CYCON
Volume2018-May
ISSN (Print)2325-5366
ISSN (Electronic)2325-5374

Conference

Conference10th International Conference on Cyber Conflict: CyCon X: Maximising Effects, CyCon 2018
Country/TerritoryEstonia
CityTallinn
Period5/30/186/1/18

Bibliographical note

Funding Information:
This work was supported by the UK’s Economic and Social Research Council [grant number ES/ M010236/1].

Publisher Copyright:
© 2018 NATO CCD COE.

Keywords

  • freedom of expression
  • human rights
  • Internet intermediaries
  • terrorism
  • violent extremism

Fingerprint

Dive into the research topics of 'Internet intermediaries and counter-terrorism: Between self-regulation and outsourcing law enforcement'. Together they form a unique fingerprint.

Cite this