Twitter Suspensions Are Muting Islamic State Messaging

The Twitter logo appears on a phone post on the floor of the New York Stock Exchange, Oct. 13, 2015.

Richard Drew/AP

AA Font size + Print

The Twitter logo appears on a phone post on the floor of the New York Stock Exchange, Oct. 13, 2015.

Researchers found that suspending ISIS sympathizers' accounts reduced both the size of their networks and the pace of their activity,

Plagued with complaints from lawmakers and officials that it’s too soft on Islamic State terrorists and their online supporters, Twitter has stepped up the pace and breadth of account suspensions during the past year. And according to new research, its campaign to curb the group’s propaganda reach seems to be working.

According to J.M. Berger and Heather Perez, Twitter’s routine pruning of Islamic State-associated accounts has kept the size of the Islamic State’s propaganda network small, and has particularly damaged the reach and influence of the largest and most prominent accounts.

The researchers’ findings, published Thursday by the George Washington University’s Program on Extremism, temper a general sense of panic among government officials, sparked by the impression that the Islamic State is “winning” a propaganda war against the Western world.

Top lawmakers have lamented the effectiveness of the group’s grassroots-like Twitter apparatus, and have launched shaky attempts to counter it. In doing so, they have painted a picture of a well-oiled propaganda machine that floods Twitter, Facebook, and Telegram with pro-jihadi messages that inspire Westerners to either travel to Iraq and Syria, or commit acts of terrorism at home.

Related: Twitter Steps Up Efforts to Combat ISIS 
Related: 3 Steps to Destroy ISIS on Twitter

Indeed, Islamic State-affiliated accounts have spread violent images, propaganda videos, and calls to action online. But their influence is waning.

Berger and Perez determined that there’s usually an average of only 1,000 easily discoverable English-speaking terrorist accounts at a time, and that the average Islamic State supporter has only 300 to 400 followers. And those accounts appear to be stuck in an echo chamber: They generally only interact with other supporters, rather than spreading their message to new followers.

The researchers monitored a list of ISIS supporters’ accounts—maintained by hand by a particularly active supporter—for a period of nearly four months in 2015, making note of account suspensions and new additions to the list.

At times, Twitter suspended the list members’ accounts at a high pace, sometimes even suspending a user multiple times in one day. But most of the time, only about 2 percent of the list was suspended every day.

Berger has long railed against the “whack-a-mole” thesis of Twitter takedowns—the idea that suspending an online account is a waste of time because new accounts will quickly sprout up to take the place of a deleted one. To test that theory, he and Perez tracked four users as they were repeatedly suspended by Twitter and reemerged every time with a different name.

“We found suspensions typically had a very significant detrimental effect on these repeat offenders, shrinking both the size of their networks and the pace of their activity,” the researchers wrote. “Returning accounts rarely reached their previous heights, even when the pressure of suspension was removed.”

Twitter has further accelerated the pace of its account removals in the months after the researchers’ study period. Just a few weeks ago, the company announced that it has taken down 125,000 terrorist-related accounts since mid-2015. The company also said that staffing increases had led to quicker takedowns.

But a few lawmakers have repeatedly pushed for legislation that would require social-media companies like Twitter and Facebook to do more. A bill from Richard Burr and Dianne Feinstein, the chairman and vice-chair of the Senate Intelligence Committee, would require the platforms to report terrorist activity on their networks to law enforcement. But concerns about freedom-of-speech violations and the potential loss of valuable intelligence from terrorists on Twitter has led opponents in and out of the Senate to speak out against the proposal.

If Twitter can show that its own increasingly aggressive campaigns to stomp out propaganda are working, perhaps it can dodge a legislative intervention—one that would burden social-media companies with heavy reporting duties and bring another platform under government surveillance.

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.