|
|||||||||
MENUHOMEDAILY BRIEF LATEST POSTS J.M. BERGER ISIS: STATE OF TERROR JIHAD JOE LINKSBlogs of WarHizballah Cavalcade Internet Haganah Jihadology Jihadica Kremlin Trolls Making Sense of Jihad Selected Wisdom Views from the Occident TAGSAmerican TerroristsAnwar Awlaki Al Qaeda AQAP American Al Qaeda Members Inspire Magazine Revolution Muslim OKBOMB |
News, documents and analysis on violent extremismMonday, April 13, 2015
Six Technical Steps for Fighting ISIS on TwitterISIS supporters are pushing back on Twitter suspensions with a series of countermeasures. These steps have allowed it to recover from its low point since suspensions began, although the network is still degraded relative to last September, and to its high point in May and June 2014.Most of the activity in the contested portion of the network at this stage revolves around users who create new accounts after being suspended, or users who create multiple accounts. Between 2,000 and 10,000 accounts are in a constant state of churn, with repeat offenders being knocked down and then creating new accounts, over and over again. Here are six technical steps Twitter can take to offset ISIS supporters' efforts to get around suspensions, if they are not already using them -- and they may well be using some of them, although certain patterns in the data suggest they are not. None of these are perfect solutions to the challenge presented by the ISIS-supporting network and its persistent supporters, but each will help. The goal, as always, is most correctly understood as degrading this network rather than destroying it, which would require different tools. 1. Score new accounts for indicators that the user is a repeat offender. Completely automating the process of detecting and eliminating repeat offenders would result in a substantial amount of collateral damage, in terms of suspending journalists and opponents of ISIS, but accounts can be scored for risk factors, and those scores can be used to help guide suspension decisions, whether proactive or in response to reports. Risk factors include:
These scores can be used in a number of ways. For instance, if an abuse report is received for an account that has a high score on these criteria, the account could be provisionally suspended immediately, as Twitter does with certain accounts that display criteria associated with spam. If the scores can be refined over time to a high degree of accuracy, accounts that pass a certain threshold could be automatically flagged for review.
2. Force developers to associate apps with a unique web page.
When a developer creates a Twitter app, he or she enters a name for the app and a URL for the app's home page, which is then used to identify tweets generated by the app. These can be falsified to make it look like tweets are being sent through ordinary Twitter clients. Twitter can require developers to link to a web page containing a unique identifier in order to better verify the method by which a tweet has been sent. This will allow Twitter and others working against ISIS to get a better view on how ISIS is using technology to manipulate the system, in addition to making more work for those who would abuse the system. This would obviously have additional utility in countering a wide variety of spam and influence operations.
3. Force apps that automatically follow other accounts for a user to post a permanent tweet disclosing this action
This would also help shed light on the methods by which ISIS users speedily follow accounts returning from suspension, and whether this problem needs to be approached from a standpoint of app activity or network activity.
4. Limit Twitter handle changes
One countermeasure being used by ISIS supporters is to frequently change their usernames. While this is not necessarily effective at hiding from Twitter, it can be effective at thwarting activists who seek to report Twitter accounts for abuse. While there are counter-countermeasures available for the most serious ISIS-hunters, the frequent name changes create a higher bar for participation in reporting campaigns. If Twitter wants to continue to handle this problem primarily on the basis of user reporting, it should make it easier for that to happen. And there are very few legitimate reasons for changing usernames on a regular basis, except to promote spam and abuse. Limiting username changes to once a month provides adequate flexibility for those who need the function, while significantly capping abuse.
5. Abuse reports should include userid
I would hope this is already the case, but just in case it's not, user abuse reports should travel with a user who changes his or her screen name.
6. IP or device tagging/banning of offending users
While there are known countermeasures to IP tracking, those countermeasures require an investment of time and resources to implement. Automatically detecting repeat offenders through their IPs would provide some benefit, although not a total solution. Furthermore, there are other device-specific steps that could be taken with repeat offenders. For instance, if someone is using a Twitter smartphone app, that app could be permanently disabled when a user is suspended, or if a user is suspended more than once. Countermeasures could be applied to this approach, of course, but again, the goal here is to increase the cost of participation.
Buy the new book ISIS: The State of Terror by Jessica Stern and J.M. Berger. Buy J.M. Berger's seminal book on American jihadists, Jihad Joe: Americans Who Go to War in the Name of Islam Views expressed on INTELWIRE are those of the author alone.
Tweets referencing this post:loading..
|
BOOKS"...smart, granular analysis..."ISIS: The State of TerrorMore on ISIS: The State of Terror "...a timely warning...""At a time when some politicians and pundits blur the line between Islam and terrorism, Berger, who knows this subject far better than the demagogues, sharply cautions against vilifying Muslim Americans. ... It is a timely warning from an expert who has not lost his perspective." -- New York Times More on Jihad Joe ABOUT![]() RECENTNewest posts!ISIS Strategy, AQ Fractures, Twitter Suspensions, ... Chart: Al Qaeda Fractures, ISIS Gains INTELWIRE Weekly Brief, 4/3/2015, Garissa Attack a... INTELWIRE Weekly Brief, 3/27/15 Intelwire Weekly Brief, 3/20/2015 -- ISIS in Yemen... INTELWIRE Weekly Brief 03/13/15 ISIS: The State of Terror, on sale now INTELWIRE Weekly Brief 03/06/2015 INTELWIRE Weekly Brief 2/27/2015 INTELWIRE Weekly Brief 2/20/15 EXCLUSIVESNew York Pipe Bomb Suspect Linked to Revolution Muslim The Utility of Lone Wolves Interview with Online Jihadist Abu Suleiman Al Nasser A Way Forward for CVE: The Five Ds How Terrorists Use The Internet: Just Like You PATCON: The FBI's Secret War on the Militia Movement Interview About Jihad With Controversial Cleric Bilal Philips Forgeries on the Jihadist Forums U.S. Gave Millions To Charity Linked To Al Qaeda, Anwar Awlaki State Department Secretly Met With Followers of Blind Sheikh State Department Put 'Political Pressure' On FBI To Deport Brother-in-Law Of Osama Bin Laden In 1995 FBI Records Reveal Details Of Nixon-Era Racial Profiling Program Targeting Arabs Gaza Flotilla Official Was Foreign Fighter in Bosnia War U.S. Had 'High Confidence' Of UBL Attack In June 2001 Behind the Handshake: The Rumsfeld-Saddam Meeting |