Hello,

We noticed you're browsing in private or incognito mode.

To continue reading this article, please exit incognito mode or log in.

Not an Insider? Subscribe now for unlimited access to online articles.

Connectivity

Theresa May Wants to End “Safe Spaces” for Terrorists on the Internet. What Does That Even Mean?

In the wake of the U.K.’s most recent terrorist attacks, its prime minister is talking tough on Internet regulation, but what she’s suggesting is impractical.

British prime minister Theresa May addressed the country Sunday, the morning after a terrorist attack in London.

By now, U.K. prime minister Theresa May’s response to terrorist attacks should be familiar: She and the Conservative party like to blame the Internet.

Tragically, there have been three major terrorist attacks in the U.K. in less than three months’ time. After the second, in Manchester, May and others said they would look into finding ways to compel tech companies to put cryptographic “back doors” into their services, so that law enforcement agencies could more easily access suspects’ user data.

May repeated her stance in broaders terms Sunday, following new attacks in London. “The Internet, and the big companies” are providing “safe spaces” for extremism, she said, and new regulations are needed to “regulate cyberspace.” She offered no specifics, but her party’s line, just days from the June 8 national election, is clear: a country that already grants its government some of the most sweeping digital surveillance powers of any democracy needs more and tougher laws to prevent terrorism (see “New U.K. Surveillance Law Will Have Worldwide Implications”).

The trouble is, this kind of talk ignores how the Internet and modern consumer technology works. As Cory Doctorow points out in a detailed look at how you would actually go about creating services with cryptographic holes, the practicalities of such a demand render it ludicrous bordering on impossible. Even if all of the necessary state-mandated technical steps were taken by purveyors of commercial software and devices—like Google or Apple, say—anyone who wanted to could easily skirt their restrictions by running open-source versions of the software, or unlocked phones.

That isn’t to say that May and the Conservatives’ general idea that the government should be able to probe user data as part of an investigation should be dismissed out of hand. The balancing act between national security and digital privacy has become one of the central themes of our digital lives (see “What If Apple Is Wrong?”). And while there are advocates aplenty on both sides, simple answers are hard to come by.

That’s what makes May’s statement Sunday so disappointing. Arguing that undoing encryption will somehow defeat the bad guys once and for all is simplistic and wrong. Pointing fingers at tech companies and painting them as the breeding ground for terrorism is, at best, an unhelpful knee-jerk response to a terrible act of violence.

Sign up for The Download
Your daily dose of what's up in emerging technology

By signing up you agree to receive email newsletters and notifications from MIT Technology Review. You can change your preferences at any time. View our Privacy Policy for more detail.

Yes, terrorist groups like ISIS leverage digital tools to spread their hateful, violent messages (see “Fighting ISIS Online”). And services like Twitter, YouTube, and Facebook have become hugely influential in how people share information. As such, they should be pushed to improve the ability to find and take down extremist content, and ban users that post it.

But this is a problem that will not be solved with heavy-handed pontificating about the dangers of digital life. Take the case of Anjem Choudary, a British lawyer who spent over a decade spewing jihadist polemic, often in person, without breaking any law. According to the New York Times, he may have influenced one of the attackers that struck in London over the weekend. “He was a real-life radical preacher who recruited people face to face,” Peter R. Neumann, a professor of security studies at King’s College London, told the Times. Choudary was “much more important for jihad in Britain than Twitter or Facebook.”

(Read more: BBC, the New York Times, BoingBoing, the Guardian, “What If Apple Is Wrong?,” “Fighting ISIS Online”)

Become an MIT Technology Review Insider for in-depth analysis and unparalleled perspective.

Subscribe today
British prime minister Theresa May addressed the country Sunday, the morning after a terrorist attack in London.
More from Connectivity

What it means to be constantly connected with each other and vast sources of information.

Want more award-winning journalism? Subscribe and become an Insider.
  • Insider Plus {! insider.prices.plus !}* Best Value

    {! insider.display.menuOptionsLabel !}

    Everything included in Insider Basic, plus the digital magazine, extensive archive, ad-free web experience, and discounts to partner offerings and MIT Technology Review events.

    See details+

    Print + Digital Magazine (6 bi-monthly issues)

    Unlimited online access including all articles, multimedia, and more

    The Download newsletter with top tech stories delivered daily to your inbox

    Technology Review PDF magazine archive, including articles, images, and covers dating back to 1899

    10% Discount to MIT Technology Review events and MIT Press

    Ad-free website experience

  • Insider Basic {! insider.prices.basic !}*

    {! insider.display.menuOptionsLabel !}

    Six issues of our award winning print magazine, unlimited online access plus The Download with the top tech stories delivered daily to your inbox.

    See details+

    Print Magazine (6 bi-monthly issues)

    Unlimited online access including all articles, multimedia, and more

    The Download newsletter with top tech stories delivered daily to your inbox

  • Insider Online Only {! insider.prices.online !}*

    {! insider.display.menuOptionsLabel !}

    Unlimited online access including articles and video, plus The Download with the top tech stories delivered daily to your inbox.

    See details+

    Unlimited online access including all articles, multimedia, and more

    The Download newsletter with top tech stories delivered daily to your inbox

/3
You've read of three free articles this month. for unlimited online access. You've read of three free articles this month. for unlimited online access. This is your last free article this month. for unlimited online access. You've read all your free articles this month. for unlimited online access. You've read of three free articles this month. for more, or for unlimited online access. for two more free articles, or for unlimited online access.