Facebook Deploys AI To Block Terror Propaganda

With attacks on Western targets increasing pressure on Facebook, the giant social network says it's making a new push to crack down on terrorist activity by using sophisticated algorithms to mine words, images and videos to root out and remove extremists' propaganda and messages.

Artificial intelligence can't do the job alone, so Facebook says it has amassed a team of 150, including counter-terrorism experts, who are dedicated to tracking and taking down propaganda and other materials.

It's also collaborating with fellow technology companies and consulting with researchers to keep up with the ever-changing social media tactics of the Islamic State and other terror groups.
"Just as terrorist propaganda has changed over the years, so have our enforcement efforts. We are now really focused on using technology to find this content so that we can remove it before people are seeing it," says Monika Bickert, a former federal prosecutor who runs global policy management, the team that decides what can be posted on Facebook. 
"We want Facebook to be a very hostile environment for terrorists and we are doing everything we can to keep terror propaganda off Facebook."

Sharp criticism from European officials, advertiser boycotts and lawsuits from family members of people killed in terrorist attacks are pushing Facebook, Google, Microsoft and Twitter to find more effective ways to banish terrorist activity.

New video digital fingerprinting technologies called "hashes" are helping flag and intercept extremist videos before they are posted. But these new tools can't yet keep terrorists from gathering on Facebook to recruit and communicate with followers.

In the wake of the London attacks, British Prime Minister Theresa May has accused Facebook and other companies of not doing enough to crack down on terrorist activity. This week May said she and French President Emmanuel Macron were working on a plan that would make Internet companies legally liable for extremist materials on their services.
"They want to hear that social media companies are taking this seriously. We are taking it seriously," Bickert said. "The measures they are talking about, we are already doing."

For years Facebook balanced the threat to free speech with its ongoing efforts to eradicate terrorist propaganda. About a year ago Facebook intensified efforts to combat terrorism, resulting in the removal of a great deal of that activity from its platform, says Seamus Hughes, deputy director of the program on extremism at George Washington University.
"Facebook at some point in the last year planted a flag in the ground and said: Not on our platform," Hughes said.
WhatsApp, Telegram

Even as Facebook makes progress on one terrain, new battlefields emerge. Researchers like Hughes say much of the terrorist activity that has left Facebook has migrated to encrypted messaging services such as Telegram and Facebook-owned WhatsApp. Facebook Live, the real-time streaming service, also presents a new challenge. And terrorists are still lurking out of sight on Facebook in private groups.

Artificial intelligence is already improving Facebook's ability to stop the spread of terrorist content on Facebook such as flagging and intercepting known terrorist videos before they can be uploaded to Facebook, says Brian Fishman, lead policy manager for counterterrorism at Facebook and the author of The Master Plan: ISIS, al-Qaeda, and the Jihadi Strategy for Final Victory. Artificial intelligence is also being used to analyze text that has been removed for supporting or praising terrorist organizations such as the Islamic State and Al Qaeda and their affiliates to detect other content that may be terrorist propaganda. That same technology is being used to ferret out private groups that support terrorism.

Facebook, which relies on its nearly 2 billion users to alert the company to content that violates its rules, says it now finds more than half of accounts that are removed from Facebook for terrorist activity on its own. 

But artificial intelligence has its limits, making human intervention necessary, for example to distinguish between an image in a news article about terrorism and terrorism propaganda.
"There is no switch you can flip. There is no find the terrorist button," Fishman said.

As in the offline world, terrorists tend to operate in clusters, so it identifies pages, groups, posts or profiles supporting terrorism to identify other accounts and content that support terrorism. Facebook is also getting better at keeping these terrorists and their sympathisers from setting up new fake accounts so that Facebook is not engaged in an endless game of whack-a-mole as terrorists create accounts as quickly as they can be deleted, he said. 

Facebook CEO Mark Zuckerberg wrote about the use of artificial intelligence to police content in his nearly 6,000-word community letter in February.
"Artificial intelligence can help provide a better approach," he wrote. "This is still very early in development, but we have started to have it look at some content, and it already generates about one-third of all reports to the team that reviews content for our community."

Zuckerberg also underscored the importance of "protecting individual security and liberty." "We are strong advocates of encryption and have built it into the largest messaging platforms in the world, WhatsApp and Messenger," he wrote.
Facebook and other companies have drawn a hard line on end-to-end encryption, saying the technology has legitimate uses such as for human rights activists and journalists who need to know their communications can only be read by the sender and the recipient. That has caused friction with national security and law enforcement officials because it makes it more difficult for them to access digital data.

When asked about messaging services, Fishman said Facebook is applying what it has learned from terrorist activity and applying it to its family of apps including WhatsApp.
"We don't want this material to be on Facebook and we want to keep the Internet as a whole free from this kind of material, too," Fishman said.

New challenges: Facebook Live, Groups

Facebook groups are another trouble spot. James Hodgkinson, the 66-year-old Illinois man who was killed by police after he opened fire on Republican members of Congress this week, belonged to a Facebook group with the name "Terminate the Republican Party."

A new challenge for counterterrorism efforts at Facebook: Facebook Live, which has seen a sharp uptick in all kinds of violence. Last year, Facebook shut down the account of a suspected terrorist who live-streamed threats to the Euro 2016 soccer tournament after killing a French police captain and his partner and taking the couple's child hostage in their home outside Paris.
"With Facebook Live, as with Facebook in general, the vast majority of people who are using that product are using it for good reasons," Bickert said. "But, as with any product, there will always be some people who use it for bad purposes and so we are trying to learn the best ways of finding that early."

USA Today:

You Might Also Read

Islamic State's Social Media Strategy:

Attitudes To Facebook Are Changing:

Facebook’s Shifting Attitude To Controversy:

Facebook Accused Of Publishing Child Pornography:

Propaganda & Bias In Social Media News:

Google Launches New Weapon Against Islamic State:

 

« IoT Will Change (Almost) Everything In Cybersecurity
Petya: The Latest  Global Ransomware Incident »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

IGX Global

IGX Global

IGX Global is a provider of information network and security integration services and products.

Circadence

Circadence

Circadence offer the only fully immersive, AI-powered, patent-pending, proprietary cybersecurity training platform in the market today.

Entel CyberSecure

Entel CyberSecure

Entel CyberSecure is a portfolio of Cybersecurity solutions and services for the protection, defense, risk management and regulatory compliance of ICT Systems for corporations and Government.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Yellow Brand Protection

Yellow Brand Protection

Yellow Brand Protection operates 24/7 to protect brands' Intellectual Property (IP) from infringements on all kinds of online distribution channels.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Avancer Corporation

Avancer Corporation

Avancer Corporation is a multi-system integrator focusing on Identity and Access Management (IAM) Technology. Founded in 2004.

Cyberfort Group

Cyberfort Group

Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.

Centum Digital

Centum Digital

Centum Digital provide services, products and solutions specialized in communications engineering, control and signal intelligence.

Softsource vBridge

Softsource vBridge

Softsource vBridge are an ICT systems integrator providing specialist technology solutions, professional services, technical expertise and data centre services.