Twitter Steps Up Efforts To Combat ISIS

Twitter the social media giant says it is increasing efforts to combat extremism on the site.
    
After pressure from lawmakers and others, Twitter today announced updates and revealed recent efforts to counter violent extremist messages on the site.

They report that they’ve suspended more than 125,000 accounts since the middle of 2015 “for threatening or promoting terrorist acts primarily related to ISIS.”

Another step the company announced is deploying spam-fighting software to identify potential pro-ISIS Twitter accounts, even those that users have not reported for posting explicit or violent content.
“We also look into other accounts similar to those reported,” company officials wrote. “We have already seen results, including an increase in account suspensions and this type of activity shifting off of Twitter.”

That tactic is along the lines of what some in the technology community have been urging. In a conversation with Defense One at SXSW in 2015, data researcher Jonathan Morgan said that Twitter ought to take a more networked approach to ISIS (and other, similar extremist groups), targeting not just individuals who had explicitly violated terms of service by posting violent content but also going after potentially linked accounts.

In its blog post, Twitter also emphasized partnerships with organizations such as People Against Violent Extremism (PAVE) and the Institute for Strategic Dialogue to “empower credible non-governmental voices against violent extremism.”

The moves come after a woman named Tamara Fields filed a complaint against Twitter in a California court in January seeking unspecified damages for “knowingly or with willful blindness” providing material support to ISIS, according to The Hill. Her husband, Lloyd Fields, a contractor, was killed in an ISIS attack in Jordan in November. “Without Twitter, the explosive growth of ISIS over the last few years into the most-feared terrorist group in the world would not have been possible,” the complaint reportedly reads.

Twitter has also been the target of extremist groups and last March, the group announced a declaration of virtual war on Twitter co-founder Jack Dorsey. In the post today, the company essentially acknowledged the difficult balancing act of trying to remain an open platform that still restricts some types of users and content.

“There is no ‘magic algorithm’ for identifying terrorist content on the internet,” Twitter wrote in the post, “so global online platforms are forced to make challenging judgement calls based on very limited information and guidance. In spite of these challenges, we will continue to aggressively enforce our Rules in this area, and engage with authorities and other relevant organizations to find viable solutions to eradicate terrorist content from the Internet and promote powerful counter-speech narratives.”

DefenseOne: http://bit.ly/1okY8ST

« New Microchip Increases Military Intelligence
US Agreement With The UK Allows Data Access To Private Companies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

Black Duck Software

Black Duck Software

Black Duck Hub allows organizations to manage open source code security as well as license compliance risks.

NSIDE Attack Logic

NSIDE Attack Logic

NSIDE Attack Logic simulates real-world cyber attacks to detect vulnerabilities in corporate networks and systems.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

Renesas Electronics

Renesas Electronics

Renesas Electronics delivers trusted embedded design innovation with solutions that enable billions of connected, intelligent devices to enhance the way people work and live - securely and safely.

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

C-MRiC collaborates on initiatives, ranging from national cyber security, enterprise security, information assurance, protection strategy, climate control to health and life sciences.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

Seraphic Security

Seraphic Security

Seraphic Security provides attack protection to enable safe browsing for employees or contractors, as well as advanced governance controls to enforce enterprise policies across devices.

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

Hexiosec

Hexiosec

Hexiosec (formerly Red Maple Technologies) is a technical consultancy and product company founded and run by engineers from the UK Intelligence and Defence communities.

Buguard

Buguard

Buguard is a multi-award-winning supplier of Application Security Assessments and GRC services.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.

InterSources

InterSources

InterSources is a trusted partner, leading the way in Cloud Security, Cybersecurity, PLG Consulting, Digital Transformation, and Professional Services.