Facebook Deploys AI To Block Terror Propaganda

With attacks on Western targets increasing pressure on Facebook, the giant social network says it's making a new push to crack down on terrorist activity by using sophisticated algorithms to mine words, images and videos to root out and remove extremists' propaganda and messages.

Artificial intelligence can't do the job alone, so Facebook says it has amassed a team of 150, including counter-terrorism experts, who are dedicated to tracking and taking down propaganda and other materials.

It's also collaborating with fellow technology companies and consulting with researchers to keep up with the ever-changing social media tactics of the Islamic State and other terror groups.
"Just as terrorist propaganda has changed over the years, so have our enforcement efforts. We are now really focused on using technology to find this content so that we can remove it before people are seeing it," says Monika Bickert, a former federal prosecutor who runs global policy management, the team that decides what can be posted on Facebook. 
"We want Facebook to be a very hostile environment for terrorists and we are doing everything we can to keep terror propaganda off Facebook."

Sharp criticism from European officials, advertiser boycotts and lawsuits from family members of people killed in terrorist attacks are pushing Facebook, Google, Microsoft and Twitter to find more effective ways to banish terrorist activity.

New video digital fingerprinting technologies called "hashes" are helping flag and intercept extremist videos before they are posted. But these new tools can't yet keep terrorists from gathering on Facebook to recruit and communicate with followers.

In the wake of the London attacks, British Prime Minister Theresa May has accused Facebook and other companies of not doing enough to crack down on terrorist activity. This week May said she and French President Emmanuel Macron were working on a plan that would make Internet companies legally liable for extremist materials on their services.
"They want to hear that social media companies are taking this seriously. We are taking it seriously," Bickert said. "The measures they are talking about, we are already doing."

For years Facebook balanced the threat to free speech with its ongoing efforts to eradicate terrorist propaganda. About a year ago Facebook intensified efforts to combat terrorism, resulting in the removal of a great deal of that activity from its platform, says Seamus Hughes, deputy director of the program on extremism at George Washington University.
"Facebook at some point in the last year planted a flag in the ground and said: Not on our platform," Hughes said.
WhatsApp, Telegram

Even as Facebook makes progress on one terrain, new battlefields emerge. Researchers like Hughes say much of the terrorist activity that has left Facebook has migrated to encrypted messaging services such as Telegram and Facebook-owned WhatsApp. Facebook Live, the real-time streaming service, also presents a new challenge. And terrorists are still lurking out of sight on Facebook in private groups.

Artificial intelligence is already improving Facebook's ability to stop the spread of terrorist content on Facebook such as flagging and intercepting known terrorist videos before they can be uploaded to Facebook, says Brian Fishman, lead policy manager for counterterrorism at Facebook and the author of The Master Plan: ISIS, al-Qaeda, and the Jihadi Strategy for Final Victory. Artificial intelligence is also being used to analyze text that has been removed for supporting or praising terrorist organizations such as the Islamic State and Al Qaeda and their affiliates to detect other content that may be terrorist propaganda. That same technology is being used to ferret out private groups that support terrorism.

Facebook, which relies on its nearly 2 billion users to alert the company to content that violates its rules, says it now finds more than half of accounts that are removed from Facebook for terrorist activity on its own. 

But artificial intelligence has its limits, making human intervention necessary, for example to distinguish between an image in a news article about terrorism and terrorism propaganda.
"There is no switch you can flip. There is no find the terrorist button," Fishman said.

As in the offline world, terrorists tend to operate in clusters, so it identifies pages, groups, posts or profiles supporting terrorism to identify other accounts and content that support terrorism. Facebook is also getting better at keeping these terrorists and their sympathisers from setting up new fake accounts so that Facebook is not engaged in an endless game of whack-a-mole as terrorists create accounts as quickly as they can be deleted, he said. 

Facebook CEO Mark Zuckerberg wrote about the use of artificial intelligence to police content in his nearly 6,000-word community letter in February.
"Artificial intelligence can help provide a better approach," he wrote. "This is still very early in development, but we have started to have it look at some content, and it already generates about one-third of all reports to the team that reviews content for our community."

Zuckerberg also underscored the importance of "protecting individual security and liberty." "We are strong advocates of encryption and have built it into the largest messaging platforms in the world, WhatsApp and Messenger," he wrote.
Facebook and other companies have drawn a hard line on end-to-end encryption, saying the technology has legitimate uses such as for human rights activists and journalists who need to know their communications can only be read by the sender and the recipient. That has caused friction with national security and law enforcement officials because it makes it more difficult for them to access digital data.

When asked about messaging services, Fishman said Facebook is applying what it has learned from terrorist activity and applying it to its family of apps including WhatsApp.
"We don't want this material to be on Facebook and we want to keep the Internet as a whole free from this kind of material, too," Fishman said.

New challenges: Facebook Live, Groups

Facebook groups are another trouble spot. James Hodgkinson, the 66-year-old Illinois man who was killed by police after he opened fire on Republican members of Congress this week, belonged to a Facebook group with the name "Terminate the Republican Party."

A new challenge for counterterrorism efforts at Facebook: Facebook Live, which has seen a sharp uptick in all kinds of violence. Last year, Facebook shut down the account of a suspected terrorist who live-streamed threats to the Euro 2016 soccer tournament after killing a French police captain and his partner and taking the couple's child hostage in their home outside Paris.
"With Facebook Live, as with Facebook in general, the vast majority of people who are using that product are using it for good reasons," Bickert said. "But, as with any product, there will always be some people who use it for bad purposes and so we are trying to learn the best ways of finding that early."

USA Today:

You Might Also Read

Islamic State's Social Media Strategy:

Attitudes To Facebook Are Changing:

Facebook’s Shifting Attitude To Controversy:

Facebook Accused Of Publishing Child Pornography:

Propaganda & Bias In Social Media News:

Google Launches New Weapon Against Islamic State:

 

« IoT Will Change (Almost) Everything In Cybersecurity
Petya: The Latest  Global Ransomware Incident »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Digital Gurus Recruitment

Digital Gurus Recruitment

Digital Gurus provide specialist recruitment services in areas including IT and information security

iTrinegy

iTrinegy

iTrinegy is a world leader in Application Risk Management offering solutions to mitigate all networked application deployment risks

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

AVR International

AVR International

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

Archivo

Archivo

Archivo is a value added reseller focused on Disaster Recovery as a Service (DRaaS), backup, hyper-convergence, hybrid storage and Cyber security.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

TekSek Cyber Security

TekSek Cyber Security

Preparing you for tomorrow's security threats.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

National Cryptologic Foundation (NCF)

National Cryptologic Foundation (NCF)

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Rocky Mountain Cybersecurity

Rocky Mountain Cybersecurity

Rocky Mountain Cybersecurity's mission is to provide value by dramatically improving the cybersecurity posture of our clients and business partners.

ICS

ICS

ICS is a leading provider of outsourced IT services, cybersecurity, communications, and distributed workforce solutions throughout the US.

CypherEye

CypherEye

CypherEye is a next generation trust platform that advances the current state of Multi-factor Authentication (MFA) to enable highly secure, private and auditable cyber-transactions.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.