Facebook Deserves To Be Broken-Up

Facebook has been accused of "auto-generating" extremist content, including a celebratory jihadist video and a business page for al-Qaeda. The material was uncovered by an anonymous whistleblower who filed an official complaint to US regulators. Similar content for self-identified Nazis and white supremacist groups was also found online.

Facebook said it had got better at deleting extreme content but its systems were not perfect.

Content Creators

The whistleblower's study lasted five months and monitored pages of 3,000 people who liked or connected to organisations listed as terrorist groups by the US government. The study found that groups such as the Islamic State group and al-Qaeda were "openly" active on the social network.

In addition, it found that Facebook's own tools were automatically creating fresh content for the proscribed groups by producing "celebration" and "memories" videos when pages racked up enough views or "likes", or had been active for a certain number of months.

The local business page for al-Qaeda generated by Facebook's tools had 7,410 "likes" and gave the group "valuable data" it could use when recruiting people or seeking out supporters, the complaint said. On the local business page, Facebook's algorithms populated the page with job descriptions that users put in their profiles. It also copied images, branding and flags used by the group.

Similar content was automatically produced for white supremacist and Nazi groups active on Facebook.
The complaint has been filed with the US Securities and Exchange Commission, alleging Facebook has misled shareholders by claiming to remove extremist content while letting it persist on the site.

John Kostyack, director of the US National Whistleblower Centre, which released the study on behalf of the whistleblower, said he was "grateful" that the "disturbing information" had been released.

"We hope that SEC takes prompt action to impose meaningful sanctions on Facebook," he said in a statement.
In a statement, Facebook said: "After making heavy investments, we are detecting and removing terrorism content at a far higher success rate than even two years ago.

"We don't claim to find everything and we remain vigilant in our efforts against terrorist groups around the world."

The study is the latest in a series of mis-steps for Facebook, which has faced repeated criticism over the way it handles hate speech and extremist content.

Facebook co-founder Chris Hughes, said it is time to break up Facebook, which now has almost 3 billion users, in an editorial published in the New York Times.

84% of social media advertising goes to Facebook and it is now worth over half a Trillion dollars, which is the combined worth of over sixty-five countries in the world.  

"The government must hold Mark Zuckerberg accountable," he wrote.

“America was built on the idea that power should not be concentrated in any one person, because we are all fallible. That’s why the founders created a system of checks and balances. They didn’t need to foresee the rise of Facebook to understand the threat that gargantuan companies would pose to democracy.

New York Times:      BBC:   

You Might Also Read: 

AOC Gives Up On Facebook:


 

« Snowden Accuses CIA Of 'A PR Fix'
MS Word Uses An AI Editor To Improve Your Writing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.

CyberCX

CyberCX

CyberCX provides services from strategic consulting, security testing and training to world-class managed services and engineering solutions.

SideChannel

SideChannel

At SideChannel, we match companies with an expert virtual CISO (vCISO), so your organization can assess cyber risk and ensure cybersecurity compliance.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

XONA Systems

XONA Systems

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

SOCRadar

SOCRadar

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI).

National Cybersecurity Competence Center (NC3) - Luxembourg

National Cybersecurity Competence Center (NC3) - Luxembourg

The purpose of the is to strengthen the Country's ecosystem facing cyber Luxembourg National Cybersecurity Competence Centerthreats and risks.

SSL2BUY

SSL2BUY

SSL2BUY is a leading SSL certificate provider, authorized to sell top CA brands like Comodo, DigiCert, GlobalSign, Thawte, GeoTrust and more.