The Clean IT dialogue resulted in a problem analysis of terrorist use of the Internet, a set of nine general principles that determine conditions for any action taken to reduce terrorist use of the Internet and a list of best practices. As Clean IT is not set up as a binding form of cooperation, any future implementation can only be voluntary and according to existing laws and regulations.
The final Clean IT document (pdf) was published on January 21, 2013.
The best practices in the Clean IT report do not raise immediate human right concerns at this stage. In future, however, much depends on how the Best Practices are interpreted, how they are implemented in practice, and how they relate to other practices. The University of Tilburg was asked to scan for possible threats to human rights that might occur by future implementation of the best practices. The researchers conclude that some best practices should be accompanied by clear procedures and guarantees, yet that others do raise significant questions.The report can be downloaded here. The projectteam recommends reading this report before any future implementation,
Documents from others: Terrorist use of the Internet
Please find below a list of public papers, reports and articles about the terrorist use of the Internet. These papers are not produced by the Clean IT project and do not reflect the opinions of the participants.
- 2004 E-Terror
- 2006 Hezbollah use of the Internet
- 2006 Terrorism and Internet
- 2006 Jihadis and Internet
- 2007 Jihadism online
- 2007 Internet-savvy U.S. and Middle Eastern extremist groups
- 2008 Terrorist use of the Internet
- 2008 Virtual caliphate
- 2009 Internet radicalisation South East Asia
- 2009 Online radicalisation
- 2009 Recruitment and radicalisation
- 2009 Terrorism and the Internet
- 2009 Jihadis and the Internet update
- 2009 How Jihadis adapt to the web
- 2009 Terrorist financing on the Internet
- 2009 Online propaganda by Jihadis (in Spanish)
- 2010 Global extremist organisations
- 2010 Radical websites in Indonesia
- 2010 Virtual Jihad (in German)
- 2010 Racist and Violent Games on White Supremacist Web Sites
- 2011 Use of the Internet for Counter Terrorist purposes
- 2011 Role of Internet for terrorists (in Spanish)
- 2012 Jihadism on the Web
- 2012 Terrorists Using Social Online Networking
- 2012 Use of the Internet for Terrorist Purposes
Documents about the project
The project outline, which describes the project goals. A more compact version can be downloaded as a factsheet.
Progress reports:
- The progress report dated November 2011
- The progress report dated March 2012
- The progress report dated May 2012
Application of the project and communications with the European Commission (names of the people involved are blacked out):
- Project application (July 2010)
- About the application (March 2011)
- Start of the project (May 2011)
- Grant Agreement (August 2011)
- Project update and minor adjustments (January 2012)
- Project adjustments (March 2012)
- Amendment to the Grant Agreement (July 2012)
- Change of locations workshop 4 and conference 2 (October 2012)
The letter that our Minister of Security and Justice sent to his colleagues to invite them to become a supporting government partner for the Clean IT project.