Facebook Algorithms Will Identify Terrorists

Facebook founder Mark Zuckerberg has outlined a plan to let Artificial Intelligence (AI) software review content posted on the global social network.

In a letter describing the plan, he said algorithms would eventually be able to spot terrorism, violence, bullying and even prevent suicide.

He admitted Facebook had previously made mistakes in the content it had removed from the website.

But he said it would take years for the necessary algorithms to be developed.

The announcement has been welcomed by an Internet safety charity, which had previously been critical of the way the social network had handled posts depicting extreme violence.

Errors

In his 5,500-word letter discussing the future of Facebook, Mr Zuckerberg said it was impossible to review the billions of posts and messages that appeared on the platform every day.

"The complexity of the issues we've seen has outstripped our existing processes for governing the community," he said. He highlighted the removal of videos related to the Black Lives Matter movement and the historical napalm girl photograph from Vietnam as "errors" in the existing process.

Facebook was also criticised in 2014, following reports that one of the killers of Fusilier Lee Rigby spoke online about murdering a soldier, months before the attack.

"We are researching systems that can read text and look at photos and videos to understand if anything dangerous may be happening.

"This is still very early in development, but we have started to have it look at some content, and it already generates about one third of all reports to the team that reviews content."

"Right now, we're starting to explore ways to use AI to tell the difference between news stories about terrorism and actual terrorist propaganda."

Personal Filtering

Mr Zuckerberg said his ultimate aim was to allow people to post largely whatever they liked, within the law, with algorithms detecting what had been uploaded. Users would then be able to filter their news feed to remove the types of post they did not want to see.

"Where is your line on nudity? On violence? On graphic content? On profanity? What you decide will be your personal settings," he explained. "For those who don't make a decision, the default will be whatever the majority of people in your region selected, like a referendum.

"It's worth noting that major advances in AI are required to understand text, photos and videos to judge whether they contain hate speech, graphic violence, sexually explicit content, and more.”

"At our current pace of research, we hope to begin handling some of these cases in 2017, but others will not be possible for many years."

The plan was welcomed by the Family Online Safety Institute, a member of Facebook's own safety advisory board. The charity had previously criticised the social network for allowing beheading videos to be seen without any warning on its site.

"This letter further demonstrates that Facebook has been responsive to concerns and is working hard to prevent and respond to abuse and inappropriate material on the platform," said Jennifer Hanley, Fosi's vice president of legal and policy.

"I also really like the ability for users to customise their own experiences with these developments. It's important to give users power over their online experiences, and additional tools and controls will be helpful."

BBC:

Google's New AI System Unscrambles Pixelated Faces:

AI Can Win At Poker But Who Is Overseeing Computer Ethics?:

 

Facebook Wants To Eliminate Racially Targeted Advertising:

 

 

« Bitcoin Is Increasing Ransom Attacks
Robot Monitors in Homes of the Elderly »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

Institute for Cyber Security Innovation - Royal Holloway

Institute for Cyber Security Innovation - Royal Holloway

The Institute for Cyber Security Innovation aims to bring together Academia, Industry and Government to be a catalyst for applied research and innovation in cyber security policy and solutions.

FoxGuard Solutions

FoxGuard Solutions

FoxGuard Solutions develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

Quartz Network

Quartz Network

Quartz Network is a curated community for change-makers, up-and-comers, and professionals who are ready to grow, adapt, and thrive.

Synoptek

Synoptek

Synoptek is a global systems integrator and managed IT services provider (MSP). We offer comprehensive IT management and consultancy services to organizations worldwide.

Uptime Institute

Uptime Institute

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.

Pixee

Pixee

Pixee fixes vulnerabilities, hardens code, squashes bugs, and gives engineers more time to focus on the work that counts.

Mitra Informatics Integration (MII)

Mitra Informatics Integration (MII)

Mitra Informatics Integration is the information communication technology solution business of the Metrodata Group.