Twitter using spam-fighting
technology to seek accounts that promote terrorist activity.
WASHINGTON — Twitter is now using spam-fighting technology to seek out accounts that might be promoting terrorist activity and is examining other accounts related to those flagged for possible removal, the company announced Friday.
The effort signaled attempts by Twitter to automatically identify tweets supporting terrorism, reflecting increased pressure placed by the U.S. government on social media companies to respond to abuse more proactively.
Child pornography has been the only abuse that was automatically flagged for human review on social media, using a different kind of technology.
Twitter also said it has suspended more than 125,000 accounts for threatening or promoting terrorist acts mainly related to Islamic State militants in the last eight months.
Social media has increasingly become a tool for recruitment and radicalization that’s used by the Islamic State and its supporters, who by some accounts have sent tens of thousands of tweets a day.
Tech companies are dedicating more resources to tracking reports of violent threats. Twitter said it has increased the size of its team reviewing reports to reduce their response time “significantly.”
The San Franciscobased company also changed its policy in April, adding language to make clear that “threatening or promoting terrorism” specifically counted as abusive behavior and violated its terms of use.
In January, the White House made good on President Barack Obama’s promise to reach out to Silicon Valley to tackle the use of social media by violent extremist groups.
Those include the Islamic State group, which inspired attackers who killed 14 in San Bernardino, Calif., last December.
A post on one of the killers’ Facebook pages that appeared around the time of the attack included a pledge of allegiance to the leader of the Islamic State.
Facebook found the post — which was under an alias — the day after the attack. The company removed the profile from public view and informed law enforce- ment. But such a proactive effort is fairly uncommon.
The Obama administration sent several top officials to San Jose, Calif., including FBI Director James Comey, Attorney General Loretta Lynch and National Security Agency Director Mike Rogers.
Among issues discussed was how to use technology to help speed the identification of terrorist content, according to a copy of the White House briefing memo.
“We recognize that identifying terrorist content that violates terms of service is far more difficult than identifying images of child pornography, but is there a way to use technology to quickly identify terrorist content? For example, are there technologies used for the prevention of spam that could be useful?” the memo stated.
In late 2015, Twitter began using “proprietary spam-fighting tools” to find accounts that might be violating their terms of service by promoting terrorism, sending them to be reviewed by a team at Twitter. That group also now looks into other accounts similar to those reported to them by other users.