Twitter Steps Up Efforts To Combat ISIS

Twitter the social media giant says it is increasing efforts to combat extremism on the site.
    
After pressure from lawmakers and others, Twitter today announced updates and revealed recent efforts to counter violent extremist messages on the site.

They report that they’ve suspended more than 125,000 accounts since the middle of 2015 “for threatening or promoting terrorist acts primarily related to ISIS.”

Another step the company announced is deploying spam-fighting software to identify potential pro-ISIS Twitter accounts, even those that users have not reported for posting explicit or violent content.
“We also look into other accounts similar to those reported,” company officials wrote. “We have already seen results, including an increase in account suspensions and this type of activity shifting off of Twitter.”

That tactic is along the lines of what some in the technology community have been urging. In a conversation with Defense One at SXSW in 2015, data researcher Jonathan Morgan said that Twitter ought to take a more networked approach to ISIS (and other, similar extremist groups), targeting not just individuals who had explicitly violated terms of service by posting violent content but also going after potentially linked accounts.

In its blog post, Twitter also emphasized partnerships with organizations such as People Against Violent Extremism (PAVE) and the Institute for Strategic Dialogue to “empower credible non-governmental voices against violent extremism.”

The moves come after a woman named Tamara Fields filed a complaint against Twitter in a California court in January seeking unspecified damages for “knowingly or with willful blindness” providing material support to ISIS, according to The Hill. Her husband, Lloyd Fields, a contractor, was killed in an ISIS attack in Jordan in November. “Without Twitter, the explosive growth of ISIS over the last few years into the most-feared terrorist group in the world would not have been possible,” the complaint reportedly reads.

Twitter has also been the target of extremist groups and last March, the group announced a declaration of virtual war on Twitter co-founder Jack Dorsey. In the post today, the company essentially acknowledged the difficult balancing act of trying to remain an open platform that still restricts some types of users and content.

“There is no ‘magic algorithm’ for identifying terrorist content on the internet,” Twitter wrote in the post, “so global online platforms are forced to make challenging judgement calls based on very limited information and guidance. In spite of these challenges, we will continue to aggressively enforce our Rules in this area, and engage with authorities and other relevant organizations to find viable solutions to eradicate terrorist content from the Internet and promote powerful counter-speech narratives.”

DefenseOne: http://bit.ly/1okY8ST

« New Microchip Increases Military Intelligence
US Agreement With The UK Allows Data Access To Private Companies »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

Riverside Research

Riverside Research

Riverside Research is a not-for-profit organization chartered to advance scientific research in areas including Trusted & Resilient Systems.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

Zeusmark

Zeusmark

Zeusmark are a digital brand security company. We enable companies to successfully defend their brands, revenue and consumers online.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Cympire

Cympire

Cympire significantly increases an organisation’s Cyber Resilience through continuous Training and Assessment. Cyber Security Training Platform. Cloud-based and fully customizable Cyber Range.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

vCISO Services

vCISO Services

vCISO Services is a small, specialized, veteran-owned firm focused on the needs of SMBs only.

Cisilion

Cisilion

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

Domotz

Domotz

Domotz enables IT teams to monitor and manage their networks remotely, while ensuring that the security and the operational efficiency of their organizations are properly maintained.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.