Facebook Algorithms Will Identify Terrorists

Facebook founder Mark Zuckerberg has outlined a plan to let Artificial Intelligence (AI) software review content posted on the global social network.

In a letter describing the plan, he said algorithms would eventually be able to spot terrorism, violence, bullying and even prevent suicide.

He admitted Facebook had previously made mistakes in the content it had removed from the website.

But he said it would take years for the necessary algorithms to be developed.

The announcement has been welcomed by an Internet safety charity, which had previously been critical of the way the social network had handled posts depicting extreme violence.

Errors

In his 5,500-word letter discussing the future of Facebook, Mr Zuckerberg said it was impossible to review the billions of posts and messages that appeared on the platform every day.

"The complexity of the issues we've seen has outstripped our existing processes for governing the community," he said. He highlighted the removal of videos related to the Black Lives Matter movement and the historical napalm girl photograph from Vietnam as "errors" in the existing process.

Facebook was also criticised in 2014, following reports that one of the killers of Fusilier Lee Rigby spoke online about murdering a soldier, months before the attack.

"We are researching systems that can read text and look at photos and videos to understand if anything dangerous may be happening.

"This is still very early in development, but we have started to have it look at some content, and it already generates about one third of all reports to the team that reviews content."

"Right now, we're starting to explore ways to use AI to tell the difference between news stories about terrorism and actual terrorist propaganda."

Personal Filtering

Mr Zuckerberg said his ultimate aim was to allow people to post largely whatever they liked, within the law, with algorithms detecting what had been uploaded. Users would then be able to filter their news feed to remove the types of post they did not want to see.

"Where is your line on nudity? On violence? On graphic content? On profanity? What you decide will be your personal settings," he explained. "For those who don't make a decision, the default will be whatever the majority of people in your region selected, like a referendum.

"It's worth noting that major advances in AI are required to understand text, photos and videos to judge whether they contain hate speech, graphic violence, sexually explicit content, and more.”

"At our current pace of research, we hope to begin handling some of these cases in 2017, but others will not be possible for many years."

The plan was welcomed by the Family Online Safety Institute, a member of Facebook's own safety advisory board. The charity had previously criticised the social network for allowing beheading videos to be seen without any warning on its site.

"This letter further demonstrates that Facebook has been responsive to concerns and is working hard to prevent and respond to abuse and inappropriate material on the platform," said Jennifer Hanley, Fosi's vice president of legal and policy.

"I also really like the ability for users to customise their own experiences with these developments. It's important to give users power over their online experiences, and additional tools and controls will be helpful."

BBC:

Google's New AI System Unscrambles Pixelated Faces:

AI Can Win At Poker But Who Is Overseeing Computer Ethics?:

 

Facebook Wants To Eliminate Racially Targeted Advertising:

 

 

« Bitcoin Is Increasing Ransom Attacks
Robot Monitors in Homes of the Elderly »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

Intertek Group

Intertek Group

Intertek Group provides Assurance, Testing, Inspection and Certification services. Activities include cybersecurity testing and certification.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.

iConnect IT Business Solutions DMCC

iConnect IT Business Solutions DMCC

iConnect is a trusted IT Solutions and Technology Services company, proudly serving clients across the Middle East and Africa.