Twitter Suspensions Are Muting Islamic State Messaging

The Twitter logo appears on a phone post on the floor of the New York Stock Exchange, Oct. 13, 2015.

Richard Drew/AP

AA Font size + Print

The Twitter logo appears on a phone post on the floor of the New York Stock Exchange, Oct. 13, 2015.

Researchers found that suspending ISIS sympathizers' accounts reduced both the size of their networks and the pace of their activity,

Plagued with complaints from lawmakers and officials that it’s too soft on Islamic State terrorists and their online supporters, Twitter has stepped up the pace and breadth of account suspensions during the past year. And according to new research, its campaign to curb the group’s propaganda reach seems to be working.

According to J.M. Berger and Heather Perez, Twitter’s routine pruning of Islamic State-associated accounts has kept the size of the Islamic State’s propaganda network small, and has particularly damaged the reach and influence of the largest and most prominent accounts.

The researchers’ findings, published Thursday by the George Washington University’s Program on Extremism, temper a general sense of panic among government officials, sparked by the impression that the Islamic State is “winning” a propaganda war against the Western world.

Top lawmakers have lamented the effectiveness of the group’s grassroots-like Twitter apparatus, and have launched shaky attempts to counter it. In doing so, they have painted a picture of a well-oiled propaganda machine that floods Twitter, Facebook, and Telegram with pro-jihadi messages that inspire Westerners to either travel to Iraq and Syria, or commit acts of terrorism at home.

Related: Twitter Steps Up Efforts to Combat ISIS 
Related: 3 Steps to Destroy ISIS on Twitter

Indeed, Islamic State-affiliated accounts have spread violent images, propaganda videos, and calls to action online. But their influence is waning.

Berger and Perez determined that there’s usually an average of only 1,000 easily discoverable English-speaking terrorist accounts at a time, and that the average Islamic State supporter has only 300 to 400 followers. And those accounts appear to be stuck in an echo chamber: They generally only interact with other supporters, rather than spreading their message to new followers.

The researchers monitored a list of ISIS supporters’ accounts—maintained by hand by a particularly active supporter—for a period of nearly four months in 2015, making note of account suspensions and new additions to the list.

At times, Twitter suspended the list members’ accounts at a high pace, sometimes even suspending a user multiple times in one day. But most of the time, only about 2 percent of the list was suspended every day.

Berger has long railed against the “whack-a-mole” thesis of Twitter takedowns—the idea that suspending an online account is a waste of time because new accounts will quickly sprout up to take the place of a deleted one. To test that theory, he and Perez tracked four users as they were repeatedly suspended by Twitter and reemerged every time with a different name.

“We found suspensions typically had a very significant detrimental effect on these repeat offenders, shrinking both the size of their networks and the pace of their activity,” the researchers wrote. “Returning accounts rarely reached their previous heights, even when the pressure of suspension was removed.”

Twitter has further accelerated the pace of its account removals in the months after the researchers’ study period. Just a few weeks ago, the company announced that it has taken down 125,000 terrorist-related accounts since mid-2015. The company also said that staffing increases had led to quicker takedowns.

But a few lawmakers have repeatedly pushed for legislation that would require social-media companies like Twitter and Facebook to do more. A bill from Richard Burr and Dianne Feinstein, the chairman and vice-chair of the Senate Intelligence Committee, would require the platforms to report terrorist activity on their networks to law enforcement. But concerns about freedom-of-speech violations and the potential loss of valuable intelligence from terrorists on Twitter has led opponents in and out of the Senate to speak out against the proposal.

If Twitter can show that its own increasingly aggressive campaigns to stomp out propaganda are working, perhaps it can dodge a legislative intervention—one that would burden social-media companies with heavy reporting duties and bring another platform under government surveillance.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.