- Modern information technologies have loopholes that give hate speech purveyors a stage away from the eyes and ears of both the government and the National Cohesion and Integration Commission.
- First, an enabling legal framework is critical. Second, in the case of online content, the Internet itself is a borderless and anonymous outfit.
- The government can deploy software and techniques that legally intercept Internet traffic by “harvesting” content and filtering it as well as tracking the sources of undesirable social media content.
In the current digital world, the social media creates virtual meeting points for discussion, debate and exchange of information.
On the positive side, it fosters freedom of expression, but the opposite is that it is an avenue for hate speech.
The government has in the past expressed concern about the role of modern technology, especially the phone and the Internet, in disseminating information whose content borders on hate speech.
In the build-up to the controversial 2007 elections, some emails and SMS messages in wide circulation created animosity among tribes and individuals.
Those behind the spreading of the messages took advantage of the information access frontiers of mobile phones and the Internet.
Modern information technologies have loopholes that give hate speech purveyors a stage away from the eyes and ears of both the government and the National Cohesion and Integration Commission.
From politics, terror attacks, corruption scandals, and every day events, the voices on the Internet will never lack a tinge of hate speech. There are active discussions on Facebook, Twitter, and email. If an expert was to filter the content, several hundreds of Internet users would be at pains to explain the impact of their transmitted information.
The Internet and mobile phone technology have played a positive role in democratisation.
However, their dark side cannot be ignored. The case for monitoring online content is a hot subject all over the world. On one hand, it is a means of protection against cyberspace-related threats and on the other, it can be a loophole for unwarranted access to private data through spying.