Texarkana Gazette

INTERNET EXTREMISM AND HOW TO COMBAT IT,

-

DETROIT—In the wake of Britain’s third major attack in three months, Prime Minister Theresa May called on government­s to form internatio­nal agreements to prevent the spread of extremism online.

Here’s a look at extremism on the web, what’s being done to stop it and what could come next.

Q. What are technology companies doing to make sure extremist videos and other terrorist content doesn’t spread across the internet?

A. Internet companies use technology plus teams of human reviewers to flag and remove posts from people who engage in extremist activity or express support for terrorism.

Google, for example, says it employs thousands of people to fight abuse on its platforms. Google’s YouTube service removes any video that has hateful content or incites violence, and its software prevents the video from ever being reposted. YouTube says it removed 92 million videos in 2015; 1 percent were removed for terrorism or hate speech violations.

Facebook, Microsoft, Google and Twitter teamed up late last year to create a shared industry database of unique digital fingerprin­ts for images and videos that are produced by or support extremist organizati­ons. Those fingerprin­ts help the companies identify and remove extremist content. After the attack on Westminste­r Bridge in London in March, tech companies also agreed to form a joint group to accelerate anti-terrorism efforts.

Twitter says in the last six months of 2016, it suspended a total of 376,890 accounts for violations related to the promotion of extremism. Three-quarters of those were found through Twitter’s internal tools; just 2 percent were taken down because of government requests, the company says.

Facebook says it alerts law enforcemen­t if it sees a threat of an imminent attack or harm to someone. It also seeks out potential extremist accounts by tracing the “friends” of an account that has been removed for terrorism.

Q. What are technology companies refusing to do when it comes to terrorist content?

A. After the 2015 mass shooting in San Bernardino and again after the Westminste­r Bridge attack, the U.S. and U.K. government­s sought access to password-protected communicat­ion between the terrorists who carried out the attack. Apple and WhatsApp refused, although the government­s eventually got what they wanted.

Tech companies say encryption is vital and compromisi­ng it won’t just stop extremists. Encryption also protects bank accounts, credit card transactio­ns and all kinds of other informatio­n that people want to keep private. But others—including former FBI Director James Comey and Democratic Sen. Dianne Feinstein of California—have argued that the inability to access encrypted data is a threat to security. Feinstein has introduced a bill to give the government so-called “back door” access to encrypted data.

Q. Shouldn’t tech companies be forced to share encrypted informatio­n if it could protect national security?

A. Weakening encryption won’t make people safer, says Richard Forno, who directs the graduate cybersecur­ity program at the University of Maryland. Terrorists will simply take their communicat­ions deeper undergroun­d by developing their own cyber channels or even reverting to paper notes sent by couriers, he said.

“It’s playing whack-a-mole,” he said. “The bad guys are not constraine­d by the law. That’s why they’re bad guys.”

But Erik Gordon, a professor of law and business at the University of Michigan, says society has sometimes determined that the government can intrude in ways it might not normally, as in times of war. “If we get to the point where we say, ‘Privacy is not as important as staying alive,’ I think there will be some setup which will allow the government to breach privacy,” he said.

Newspapers in English

Newspapers from United States