Twitter Steps Up Efforts To Combat ISIS

Twitter the social media giant says it is increasing efforts to combat extremism on the site.
    
After pressure from lawmakers and others, Twitter today announced updates and revealed recent efforts to counter violent extremist messages on the site.

They report that they’ve suspended more than 125,000 accounts since the middle of 2015 “for threatening or promoting terrorist acts primarily related to ISIS.”

Another step the company announced is deploying spam-fighting software to identify potential pro-ISIS Twitter accounts, even those that users have not reported for posting explicit or violent content.
“We also look into other accounts similar to those reported,” company officials wrote. “We have already seen results, including an increase in account suspensions and this type of activity shifting off of Twitter.”

That tactic is along the lines of what some in the technology community have been urging. In a conversation with Defense One at SXSW in 2015, data researcher Jonathan Morgan said that Twitter ought to take a more networked approach to ISIS (and other, similar extremist groups), targeting not just individuals who had explicitly violated terms of service by posting violent content but also going after potentially linked accounts.

In its blog post, Twitter also emphasized partnerships with organizations such as People Against Violent Extremism (PAVE) and the Institute for Strategic Dialogue to “empower credible non-governmental voices against violent extremism.”

The moves come after a woman named Tamara Fields filed a complaint against Twitter in a California court in January seeking unspecified damages for “knowingly or with willful blindness” providing material support to ISIS, according to The Hill. Her husband, Lloyd Fields, a contractor, was killed in an ISIS attack in Jordan in November. “Without Twitter, the explosive growth of ISIS over the last few years into the most-feared terrorist group in the world would not have been possible,” the complaint reportedly reads.

Twitter has also been the target of extremist groups and last March, the group announced a declaration of virtual war on Twitter co-founder Jack Dorsey. In the post today, the company essentially acknowledged the difficult balancing act of trying to remain an open platform that still restricts some types of users and content.

“There is no ‘magic algorithm’ for identifying terrorist content on the internet,” Twitter wrote in the post, “so global online platforms are forced to make challenging judgement calls based on very limited information and guidance. In spite of these challenges, we will continue to aggressively enforce our Rules in this area, and engage with authorities and other relevant organizations to find viable solutions to eradicate terrorist content from the Internet and promote powerful counter-speech narratives.”

DefenseOne: http://bit.ly/1okY8ST

« New Microchip Increases Military Intelligence
US Agreement With The UK Allows Data Access To Private Companies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

Nok Nok Labs

Nok Nok Labs

Nok Nok is a market leader in next generation authentication for cloud, mobile and IoT applications.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

SynerLeap

SynerLeap

SynerLeap is ABB's innovation growth hub. Our aim is to help startups accelerate and expand across industries, ranging from industrial automation and robotics to grid technologies and smart cities.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

DKBInnovative

DKBInnovative

DKBinnovative is a best-practice driven IT management firm that provides secure, reliable IT solutions to productivity-focused clients around the globe.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

Drumz

Drumz

Drumz plc is an investment company whose investing policy is to invest principally but not exclusively in the technology sector within Europe.

MyTurn Career LLC

MyTurn Career LLC

Looking for a rewarding career in cybersecurity? Explore a wide range of cybersecurity jobs and opportunities in this rapidly evolving field.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.