Facebook Algorithms Will Identify Terrorists

Facebook founder Mark Zuckerberg has outlined a plan to let Artificial Intelligence (AI) software review content posted on the global social network.

In a letter describing the plan, he said algorithms would eventually be able to spot terrorism, violence, bullying and even prevent suicide.

He admitted Facebook had previously made mistakes in the content it had removed from the website.

But he said it would take years for the necessary algorithms to be developed.

The announcement has been welcomed by an Internet safety charity, which had previously been critical of the way the social network had handled posts depicting extreme violence.

Errors

In his 5,500-word letter discussing the future of Facebook, Mr Zuckerberg said it was impossible to review the billions of posts and messages that appeared on the platform every day.

"The complexity of the issues we've seen has outstripped our existing processes for governing the community," he said. He highlighted the removal of videos related to the Black Lives Matter movement and the historical napalm girl photograph from Vietnam as "errors" in the existing process.

Facebook was also criticised in 2014, following reports that one of the killers of Fusilier Lee Rigby spoke online about murdering a soldier, months before the attack.

"We are researching systems that can read text and look at photos and videos to understand if anything dangerous may be happening.

"This is still very early in development, but we have started to have it look at some content, and it already generates about one third of all reports to the team that reviews content."

"Right now, we're starting to explore ways to use AI to tell the difference between news stories about terrorism and actual terrorist propaganda."

Personal Filtering

Mr Zuckerberg said his ultimate aim was to allow people to post largely whatever they liked, within the law, with algorithms detecting what had been uploaded. Users would then be able to filter their news feed to remove the types of post they did not want to see.

"Where is your line on nudity? On violence? On graphic content? On profanity? What you decide will be your personal settings," he explained. "For those who don't make a decision, the default will be whatever the majority of people in your region selected, like a referendum.

"It's worth noting that major advances in AI are required to understand text, photos and videos to judge whether they contain hate speech, graphic violence, sexually explicit content, and more.”

"At our current pace of research, we hope to begin handling some of these cases in 2017, but others will not be possible for many years."

The plan was welcomed by the Family Online Safety Institute, a member of Facebook's own safety advisory board. The charity had previously criticised the social network for allowing beheading videos to be seen without any warning on its site.

"This letter further demonstrates that Facebook has been responsive to concerns and is working hard to prevent and respond to abuse and inappropriate material on the platform," said Jennifer Hanley, Fosi's vice president of legal and policy.

"I also really like the ability for users to customise their own experiences with these developments. It's important to give users power over their online experiences, and additional tools and controls will be helpful."

BBC:

Google's New AI System Unscrambles Pixelated Faces:

AI Can Win At Poker But Who Is Overseeing Computer Ethics?:

 

Facebook Wants To Eliminate Racially Targeted Advertising:

 

 

« Bitcoin Is Increasing Ransom Attacks
Robot Monitors in Homes of the Elderly »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Travelers

Travelers

Travelers is a leading writer of US commercial property casualty insurance and one of the world’s largest global insurers for cyber insurance.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

Blackpoint Cyber

Blackpoint Cyber

Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

Finite State

Finite State

Finite State enables product security teams to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management.

Highen Fintech

Highen Fintech

Highen is a blockchain software development company with offices in the United States and development centers in India.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.