Five Tech Giants Promise To Stop Terrorist Content

Five global technology companies have pledged to limit terrorist material online. Facebook, Amazon, Google, Twitter and Microsoft will develop shared tools to detect and remove terrorist or extremist content among other measures.

The pledge was made at a Paris summit, which was called after the March terror attack in Christchurch, New Zealand left 51 people dead when the the attack was live-streamed on social media.

French President Emmanuel Macron hosted the event with New Zealand Prime Minister Jacinda Ardern, who has been calling for technology executives to sign a pledge as the "Christchurch Call".

What was pledged?

The firms said they would update their terms of use to "expressly prohibit the distribution of terrorist and violent extremist content". They will develop crisis protocols to respond to emerging or active events such as a terror attack.
The companies said they would also commit to publishing "transparency reports" on the detection and removal of terror or violent extremist content.

Live-stream limits

Before the event Facebook announced curbs on its streaming feature. The tech giant said there would be a "one-strike policy" banning those who violate new Facebook Live rules.

In a statement, Facebook said that anyone sharing "violating content" like a statement from a terrorist group without context would be blocked from using Facebook Live for a set period, such as 30 days. Ms Ardern called the measures a "good first step".

BBC:     Image: Nick Youngson

You Might Also Read:

Terrorists Deploy New Techniques To Counter Digital Forensics:

Microsoft In A Fight To Stop Cyber War:

 

« Big-Data Analytics Risks Becoming Jammed
Huawei Offers A 'No-Spy' Agreement »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

Orange Cyberdefense

Orange Cyberdefense

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations around the globe.

EG-CERT

EG-CERT

EG-CERT is the national Computer Emergency Response Team for Egypt.

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Pelion

Pelion

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

Purple Knight

Purple Knight

Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Zyber 365

Zyber 365

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability.

GovSky

GovSky

GovSky streamlines CMMC compliance, saving time and significantly reducing cost.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.