Terrorist attacks have become an ordinary happening in today’s world. The more they happen, the less affected we become and the less willing we become to do something about it. Though, if you give it a little thought, you might realize that terrorists are a Facebook user or a Google search away from you, your household, and your loved ones. Indeed, terrorists are all over social media, using it to achieve the most terrifying objectives.
Social media plays a tremendous role in reaching out to as many people as possible at a low cost. This is an incentive for almost any type of organization, including the less legitimate ones, such as those perpetrating terrorism. According to an article in The Telegraph, terrorist organizations like ISIS and Al-Qaeda have totally embraced the web and are using it at full capacity for propaganda, recruitment, and fundraising.
Social Media Activity
Reportedly, ISIS has a very open approach by being active on most of the social media platforms. According to an article entitled “Terror on Twitter,” P.W. Singer and Emerson Brooking wrote that ISIS’ posting activity has reached a peak of almost 40,000 tweets in one day, in 2014, during their invasion of the Mosul city in Iraq, when they simultaneously launched a Twitter hashtag campaign #AllEyesonISIS. Content such as video and images is uploaded daily by foot soldiers and then shared globally.
In contrast, Al-Qaeda has kept a more reserved presence on social media that relies more on anonymization techniques. The same article mentions:
Within hours, images of ISIS barbarity spread throughout the Arab world, sowing fear among Mosul’s residents and defenders. The social-media campaign gave an air of inevitability to the looming seizure of the city, and the atrocities that would follow. Despite the fact that they outnumbered the attacking ISIS force by 15-to-1, the Iraqi army units defending Mosul disintegrated and fled. A militia of no more than 2,000 ISIS fighters captured a city of 1.5 million.
Another article entitled “Social Media, Recruitment, Allegiance and the Islamic State” by Scott Gates and Sukanya Podder tries to render how the terrorists are using social media nowadays. It seems that ISIS has a media agency, Al Hayat, that has developed “effective virtual propaganda machinery”. They are constantly releasing videos and other materials that show insights into the group’s lifestyle. In some content published, one can see troubling images of children holding decapitated heads, whereas, in others, you see soldiers holding Nutella jars “to demonstrate familiarity with Western lifestyles.” The message that they want to convey is usually about “governance, justice and new construction” by outlining the wrongdoings of the enemy and the lawfulness of ISIS. They are proving semi-professional skills by using “video rather than text.” The group “takes full advantage of the linguistic skills of members, and makes good use of music – all of which appears to resonate with western youth culture.” The authors conclude that the online campaigns carried out by ISIS are “sustained by significant manpower. Linguistic and technical skills are clearly evident.”
ISIS has completely embraced the modern techniques of social media marketing and has taken activities to a whole new level, a level that has not been reached, to this moment, by any other terrorist organization. One of the main achievements is that they have managed to expand their operations way beyond their territory through focused, systematic, and efficient propaganda. Moreover, they manage to recruit adepts from both the Middle East but also Western countries, profiles that have more differences than similarities in terms of incentives for embracing such a direction, as revealed by this article. Usually, the social media campaigns developed by terrorists are used for recruitment (forums, targeted recruitment), intimidation (mass execution videos), coordination (the use of tools that provide anonymity), and propaganda (press releases, tweets, etc.).
On the other hand, there is an intense effort from governments, social media companies, and many others to fight against online terrorism. As for now, it seems that the terrorists still hold the upper hand, by being able to always make the first move while taking advantage of fundamental rights such as freedom of speech and privacy. Therefore, the fight against online terrorism is on a developing trend as more and more organizations and governments adopt at least one fighting method.
There are different ways of fighting terrorism online, and, in particular, on social media, each one of them being more or less suitable for various situations. There is no best or worst solution but multiple methods can be applied in changing circumstances.
Methods for Fighting Online Terrorism
In no particular order:
Technically speaking, content filtering is done by the company owning the social media platform. Almost all of them, especially the most popular ones, provide a way of reporting abusive content and some of them also have anti-terrorism policies. According to some sources such as morningconsult.com and “Terror on Twitter,” YouTube cooperates with highly active human-rights protection groups by making them “trusted flaggers” in order to flag ISIS content.
Twitter has banned “indirect threats of violence” and specified in their policy that service providers take action on any threat or promotion of violence. Facebook proactively removes known jihadists from its service and can “remove content, disable accounts, and work with law enforcement” in cases where there appears to be a “genuine risk of physical harm or direct threats to public safety.” They also have mechanisms allowing all users to flag posts from other users that they find suspicious. At this level of shared policing, all of us can contribute by reporting anything suspicious and making the world a better place.
Counter-attack through positive campaigns
The main concept here is to try to fill social media with positive messages aimed at countering the disinformation spread by terrorists. According to “Terror on Twitter,” the U.S. government manages a series of Facebook, Twitter, YouTube, and Tumblr accounts, such as the “ThinkAgain TurnAway” series, to highlight and counter misinformation spread by ISIS. There are also multiple other examples in this area from other states.
Monitor and track
This is an action typically carried-out by law-enforcement. Government agencies can get input for their actions either through “suspicious” reporting done on social media platforms and their users or through using specialized software that detects dangerous profiles or events through special algorithms.
Governments have started recently to build specialized teams of experts to deal with the new threats. In January 2016, The White House announced a new task force aimed at combating the spread of terrorist networks online “Countering Violent Extremism Task Force.” Although the communication is not very clear on the exact future actions of the group, provisioned activities such as research, analysis, technical assistance, communications, and interventions are pretty much hinting at the areas and type of actions that will be covered.
According to another article from The Guardian, “The British army is creating a special force of Facebook warriors, skilled in psychological operations and use of social media to engage in unconventional warfare in the information age.” Again, the available information is not very clear on what are their exact tasks, but on the British Army website, you can find some basic information together with the fact that they have designated a department called Media Operations and Civil Affairs.
Furthermore, a controversial approach comes from Israel, a country deeply confronted with terrorist activities, that uses social media in trying to foresee future terrorist activities based on “specially developed algorithms to monitor the social media accounts” as stated by The Economist. This way, they are able to build a list of potential suspects, and in some past cases were actually able to stop terrorists before they deployed any attack. A similar initiative has been taken by EUROPOL who established a department called EU Internet Referral Unit. According to their first and only annual report, their job is to coordinate and share the identification tasks (flagging) of terrorist and violent extremist activities, to carry out and support referrals quickly in close cooperation with the industry, and to support the EU member states in the same issues. The report mentions that they have removed 8949 types of content from the web.
An unorthodox approach to fighting terrorism was adopted by Anonymous, the famous hacking organization. In late 2015, after the Paris attacks, Anonymous declared war on ISIS. It’s not the first or the last message posted by Anonymous on this topic but real actions have also been noticed. According to a video published by Al Jazeera, 39,000 Twitter accounts were uncovered by them and most of them closed. In other cases, DDoS and other hacking attacks were reported targeting ISIS websites.
There are also initiatives, although in incipient phases, of regulating the way social media platforms should respond to the terrorist threat. A bill entitled “Requiring Reporting of Online Terrorist Activity Act” was reintroduced in the US Senate in December 2015. As described on the Congress website:
This bill requires an electronic communication or remote computing service company that obtains actual knowledge of terrorist activity to report relevant facts and circumstances to appropriate authorities.
The bill was dropped in the past due to opposition from tech giants under the justification that it “would turn private social media companies into government enforcers,” as stated by the morningconsult.com article mentioned above. Nevertheless, new efforts are made now to revive the bill and pass it.
We might conclude that social media has become a battlefield, following on the trend of overall cyberspace, that has even been declared an operational domain by NATO in June 2016, joining the other already existing four: air, sea, land, and space. We are now assisting a tremendous arms race on social media where platform owners are playing an increasingly important role. Future policies in this area need a lot of attention and coherent development, as social media, as a disruptive innovation, has already started revolutionizing the media and internet industries. In the fight against terrorism, the right balance between law-enforcement, privacy, and freedom of speech must be achieved and protected.