This screen grab from the State Department's "Think Again Turn Away" page was taken on Sept. 20, 2014.

This screen grab from the State Department's "Think Again Turn Away" page was taken on Sept. 20, 2014. AP Photo

Three Steps To Destroy ISIS on Twitter

Data scientists say Twitter has done much to thwart ISIS, but offer these simple steps to degrade the group and its massive online following.

AUSTIN, Texas – For the Islamic State, or ISIS, the social media site Twitter, with its 288 million users, remains core to the group’s recruiting, messaging and communication. A new report estimates there are possibly as many as 90,000 Twitter accounts that support ISIS, fueling the popular narrative that Twitter is helpless to cleanse itself of the Islamic State

But the seminal analysis of public Twitter data about ISIS released last week shows that the company has achieved considerable success in increasing the organizational costs to ISIS of operating on Twitter. It also revealed a few simple steps that Twitter can take right now to make online life much harder for ISIS.

The new report from author J.M Berger and data scientist Jonathon Morgan, of the crowd-data intelligence group Ushahidi, shows that the size of the ISIS universe on Twitter was approximately 46,000 pro-ISIS accounts between October and November. Berger and Morgan discussed the report this week at the popular South by Southwest Interactive, or SXSW, conference in Austin, Texas.

They began with a sample of 450 accounts that they could identify as pro-ISIS. They then tracked those accounts’ interactions with other accounts and discovered a network of 46,000 (but perhaps as many as 90,000 accounts at the most) linked to ISIS and likely representing ISIS supporters.

They also randomly sampled 2 million accounts. To explore this dataset, the researchers used a different machine learning-based tactic, which resulted in somewhat noisier results.

They can’t get Katy Perry followers.
Jonathon Morgan of the crowd-data intelligence group Ushahidi

Instead of looking solely at the content of tweets, which is a common technique for investigating ISIS Twitter usage, Berger and Morgan looked instead at the behavior of the Tweeters: followings,  retweets, tweets with replies, etc. All the data was freely available so their research excluded direct messages and private account data.

A snapshot of the Twitter jihadist

ISIS supporters on Twitter are highly active compared to other Twitter users. More than 80 percent tweeted while Berger and Morgan collected the data. ISIS tweeting, however, is likely to occur in spurts.

ISIS followers are D-Listers Who Cluster For Each Other. The average pro-ISIS Twitter account has more followers than does your typical Twitter user, but fewer followers than high influencers on the site. The average pro-ISIS Twitter account has about 1000 followers, compared to a site average of 200 per user. But that doesn’t mean pro-ISIS supporting Twitter accounts are truly popular, if you take a wider view of “popularity.”

“Really there are no ISIS followers with more than 100,000 followers,” Morgan told the crowd at SXSW. He added that after a large sweep in September that saw a high number of ISIS affiliated accounts suspended, there was no ISIS account with more than 50,000 followers and very few with more than 20,000.  “They can’t win the big numbers. They can’t get Katy Perry followers. They can perform really well on the ground level,” said Morgan.

It’s a dense network. That means that one particular ISIS supporter is more likely to know many others and that’s not necessarily true of other groups of such size.

They don’t just tweet beheadings and propaganda. The vast majority of hashtags used among the group were ISIS references but the second most common related to account suspensions. Some 18,000 pro-ISIS Twitter accounts have been suspended according to Berger and Morgan.

The research also shows that only approximately 20 percent of pro-ISIS supporters selected English as their primary language when using Twitter with 75 percent selecting Arabic.

Saudi Arabia was the most popular location for pro-ISIS Tweeters, followed by Syria, Iraq and the United States.

It’s useful data from a social science perspective. But what does it mean for the actual fight against ISIS? Berger and Morgan maintain the data show that a slight shift in the way that Twitter deals with ISIS on Twitter could effectively destroy the militant group’s influence on the site.

Three steps to destroy ISIS on Twitter

1. Take a networked approach to identifying pro-ISIS accounts for suspension. The data suggests that Twitter is still relying on user reports to target accounts for suspension rather than analyzing network behavior. The result is an approach to terms of service enforcement that many refer to as whack-a-mole: Suspend an account and watch it pop up under a different name.

Berger says that relying on user reports for terms of service enforcement has actually proven somewhat effective. When highly followed accounts are shut down, the replacement accounts can’t ramp up to as many followers and spend more time talking about getting suspended as opposed to tweeting ISIS propaganda, recruiting messages, etc. The preponderance of hashtags related to suspensions suggests that dealing with Twitter cops is becoming a high cost activity for ISIS forcing them to hop around from account to account, “instead of showing pictures of beheadings, which is what they would prefer to be doing,” said Berger. He also observed that after a major suspension purge of ISIS in September, “the number of new [ISIS] accounts that were created started to drop dramatically.”

But, says Morgan, Twitter basically “stumbled” into the success it’s achieved. If Twitter were to undertake a broad survey of the behavior of those accounts, modeling who was most likely to interact with whom (and other factors) as opposed to responding to specific reports and tweets, Twitter would have a much better chance of identifying pro-ISIS accounts early and effectively. There’s a chance for misidentifying people on the basis of similarities rather than hard evidence, but Morgan reported that the false positive rate for his network model was 6 to 7 percent.

2. Outsource counter-messaging to a party that can actually be effective. Not long after ISIS became extremely active on Twitter, the State Department launched a counter-messaging campaign in both Arabic and Urdu in 2011 called “Think Again Turn Away.” The foreign language versions of the program, the existence of which was not widely known, were moderately successful, according to Berger.

The fundamental problem lies in the fact that the State Department, by virtue of being an official arm of the United States government, is limited in the way it can communicate with groups like the Islamic State on open platforms like Twitter. The potential downside far exceeds the upside. “You have a lot of people watching to see if you’re going to lose the argument,” said Berger. Yet, engagement and actual interaction is the point of social media. The State Department, thus, is limited to ineffective, one-way message pushing. Other Western ISIS watchers such as Rita Katz, director of the SITE Intelligence Group have called the State Department initiative an “embarrassment” at best and a potential, legitimizing boost to ISIS at worst. 

“I think it’s worth exploring for Twitter to partner with organizations that are open to starting some sort of counter narrative. Right now, those counter-narrative approaches are occurring piecemeal,” said Morgan.

It’s an area where Twitter could possibly “take the lead” by identifying social media marketing firms that can more effectively engage ISIS on Twitter.

3. Twitter should become more like Facebook and YouTube. The report notes that both Facebook and YouTube “have already instituted policy changes specific to extremism.” Both have proven themselves more willing to tackle extremist groups at the community and affiliate level, rather than just at the individual level.

Facebook recently posted an expanded explanation of its community standards policies, which state, “We remove content that expresses support for groups that are involved in the violent or criminal behavior mentioned above. Supporting or praising leaders of those same organizations, or condoning their violent activities, is not allowed.” They also issue a Government Global Request Report detailing when they cooperate with law enforcement agencies and under what circumstances.

Twitter, conversely, doesn’t have a stated policy related to supporting, endorsing or marketing for extremist groups. It has a policy for law enforcement, stating “requests for the contents of communications (e.g., Tweets, Direct Messages, photos) require a valid search warrant from an agency with proper jurisdiction over Twitter.”

“For Twitter, I think as a policy, they could be more explicit about what is and what isn’t allowed on their platform,” said Morgan. Twitter’s current approach to dealing with law enforcement, governments and ISIS is, he said, “very cloak and dagger.”

None of these three measures by themselves will defeat ISIS. But they could degrade the group’s ability to raise funds and maintain its public face, which is key to the group’s ability to operate. “Its recruiting is dependent on images of the strength of the organization, which is not what it seems,” says Berger.

More importantly, says Morgan, the same methods that he and Berger use to understand ISIS can help researchers trying to study all the groups that come after them.

“We can take radicalization and make it a numbers game,” said Morgan. “We’re right on the brink of being able to quantify things that were almost mystical at one point…. Twitter could almost certainly eliminate ISIS from Twitter if they chose. But it’s an open question as to whether or not that would actually be a good idea because there’s some utility in degrading the network so that they aren’t as good at recruiting people. There’s also an intelligence benefit and an opportunity for discovering people who are in the process of being radicalized. If we can quantify that radicalization process then that’s actually a way we could go about countering it.”

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.