Twitter Steps Up Efforts To Combat ISIS

Electronic screens post prices of Alphabet, Twitter and Facebook stock, Monday, Feb. 1, 2016, at the Nasdaq MarketSite in New York. Alphabet, the parent company of Google, reports quarterly earnings.


AA Font size + Print

Electronic screens post prices of Alphabet, Twitter and Facebook stock, Monday, Feb. 1, 2016, at the Nasdaq MarketSite in New York. Alphabet, the parent company of Google, reports quarterly earnings.

The social media giant says it is increasing efforts to combat extremism on the site.

After pressure from lawmakers and others, Twitter today announced updates and revealed recent efforts to counter violent extremist messages on the site.

They report that they’ve suspended more than 125,000 accounts since the middle of 2015 “for threatening or promoting terrorist acts primarily related to ISIS.”

Another step the company announced is deploying spam-fighting software to identify potential pro-ISIS Twitter accounts, even those that users have not reported for posting explicit or violent content.

“We also look into other accounts similar to those reported,” company officials wrote. “We have already seen results, including an increase in account suspensions and this type of activity shifting off of Twitter.”

That tactic is along the lines of what some in the technology community have been urging. In a conversation with Defense One at SXSW in 2015, data researcher Jonathan Morgan said that Twitter ought to take a more networked approach to ISIS (and other, similar extremist groups), targeting not just individuals who had explicitly violated terms of service by posting violent content but also going after potentially linked accounts.

In its blog post, Twitter also emphasized partnerships with organizations such as People Against Violent Extremism (PAVE) and the Institute for Strategic Dialogue to “empower credible non-governmental voices against violent extremism.”

The moves come after a woman named Tamara Fields filed a complaint against Twitter in a California court in January seeking unspecified damages for “knowingly or with willful blindness” providing material support to ISIS, according to The Hill. Her husband, Loyd Fields, a contractor, was killed in an ISIS attack in Jordan in November. “Without Twitter, the explosive growth of ISIS over the last few years into the most-feared terrorist group in the world would not have been possible,” the complaint reportedly reads.

But Twitter has also been targeted by the extremist group itself. Last March, the group announced a declaration of virtual war on Twitter co-founder Jack Dorsey. In the post today, the company essentially acknowledged the difficult balancing act of trying to remain an open platform that still restricts some types of users and content.

“There is no ‘magic algorithm’ for identifying terrorist content on the internet,” Twitter wrote in the post, “so global online platforms are forced to make challenging judgement calls based on very limited information and guidance. In spite of these challenges, we will continue to aggressively enforce our Rules in this area, and engage with authorities and other relevant organizations to find viable solutions to eradicate terrorist content from the Internet and promote powerful counter-speech narratives.”

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.