Become a Member
The Jewish Chronicle

A blockchain terror video could not be deleted by anyone

Jamie Bartlett says

April 15, 2019 15:43
GettyImages-76344095-a-a

By

Jamie Bartlett,

Jamie Bartlett

5 min read

It is an iron law of technology that outsiders are early adopters. As long ago as the mid-1980s, Louis Beam of the Texas KKK spotted that networked computing would be a boon for the movement and set up a bulletin board system.

For most of the 2000s, the far-right British National Party had the most active and best designed website in UK politics. (Back in 2013 it was the first party to gamify its website, offering prizes for mentioning keywords in posts to drive up engagement.)

The same is true of al-Qaeda and Isis — whether it’s producing slick propaganda magazines or hijacking Twitter hashtags, extremist movements are like start-ups: agile, fast and creative.

It’s easy to understand why. In addition to being highly motivated, extremists see in every technology — from the radio to the smartphone to the dark net — new ways to circumnavigate the establishment, reach new audiences and avoid the authorities. The internet is an especially valuable propaganda tool, because of a simple dynamic: it is still easier to upload something than knock it offline. No matter how many moderators Facebook employs, it will never match the number of extremists hoping and plotting to evade the platform’s spam filters or content managers.