MENU

HOME

DAILY BRIEF

LATEST POSTS

J.M. BERGER

ISIS: STATE OF TERROR

JIHAD JOE

LINKS

Blogs of War

Hizballah Cavalcade

Internet Haganah

Jihadology

Jihadica

Kremlin Trolls

Making Sense of Jihad

Selected Wisdom

Views from the Occident

TAGS

American Terrorists

Anwar Awlaki

Al Qaeda

AQAP

American Al Qaeda Members

Inspire Magazine

Revolution Muslim

OKBOMB


News, documents and analysis on violent extremism


Monday, April 13, 2015
 

Six Technical Steps for Fighting ISIS on Twitter

ISIS supporters are pushing back on Twitter suspensions with a series of countermeasures. These steps have allowed it to recover from its low point since suspensions began, although the network is still degraded relative to last September, and to its high point in May and June 2014.

Most of the activity in the contested portion of the network at this stage revolves around users who create new accounts after being suspended, or users who create multiple accounts. Between 2,000 and 10,000 accounts are in a constant state of churn, with repeat offenders being knocked down and then creating new accounts, over and over again.

Here are six technical steps Twitter can take to offset ISIS supporters' efforts to get around suspensions, if they are not already using them -- and they may well be using some of them, although certain patterns in the data suggest they are not.

None of these are perfect solutions to the challenge presented by the ISIS-supporting network and its persistent supporters, but each will help. The goal, as always, is most correctly understood as degrading this network rather than destroying it, which would require different tools.

1. Score new accounts for indicators that the user is a repeat offender.  

Completely automating the process of detecting and eliminating repeat offenders would result in a substantial amount of collateral damage, in terms of suspending journalists and opponents of ISIS, but accounts can be scored for risk factors, and those scores can be used to help guide suspension decisions, whether proactive or in response to reports. Risk factors include:

  • Account's bio, profile or first tweets state outright that the user's previous account was suspended. This is a no-brainer.
  • Significant number of other users tweet that the account was previously suspended. 
  • Account handle is a previously suspended account handle with a consecutive number attached.
  • Account adds followers at a pace much faster than the typical new user. 
  • Account changes username more than once a month (more on this below). 
  • Account immediately follows or is followed by large number of other accounts that have been frequently reported for abuse but not suspended. 
  • New followers or following selected by app rather than human selection.
These scores can be used in a number of ways. For instance, if an abuse report is received for an account that has a high score on these criteria, the account could be provisionally suspended immediately, as Twitter does with certain accounts that display criteria associated with spam. If the scores can be refined over time to a high degree of accuracy, accounts that pass a certain threshold could be automatically flagged for review. 

2. Force developers to associate apps with a unique web page. 

When a developer creates a Twitter app, he or she enters a name for the app and a URL for the app's home page, which is then used to identify tweets generated by the app. These can be falsified to make it look like tweets are being sent through ordinary Twitter clients. Twitter can require developers to link to a web page containing a unique identifier in order to better verify the method by which a tweet has been sent. This will allow Twitter and others working against ISIS to get a better view on how ISIS is using technology to manipulate the system, in addition to making more work for those who would abuse the system. This would obviously have additional utility in countering a wide variety of spam and influence operations. 

3. Force apps that automatically follow other accounts for a user to post a permanent tweet disclosing this action

This would also help shed light on the methods by which ISIS users speedily follow accounts returning from suspension, and whether this problem needs to be approached from a standpoint of app activity or network activity. 

4. Limit Twitter handle changes 

One countermeasure being used by ISIS supporters is to frequently change their usernames. While this is not necessarily effective at hiding from Twitter, it can be effective at thwarting activists who seek to report Twitter accounts for abuse. While there are counter-countermeasures available for the most serious ISIS-hunters, the frequent name changes create a higher bar for participation in reporting campaigns. If Twitter wants to continue to handle this problem primarily on the basis of user reporting, it should make it easier for that to happen. And there are very few legitimate reasons for changing usernames on a regular basis, except to promote spam and abuse. Limiting username changes to once a month provides adequate flexibility for those who need the function, while significantly capping abuse. 

5. Abuse reports should include userid

I would hope this is already the case, but just in case it's not, user abuse reports should travel with a user who changes his or her screen name. 

6. IP or device tagging/banning of offending users 

While there are known countermeasures to IP tracking, those countermeasures require an investment of time and resources to implement. Automatically detecting repeat offenders through their IPs would provide some benefit, although not a total solution. Furthermore, there are other device-specific steps that could be taken with repeat offenders. For instance, if someone is using a Twitter smartphone app, that app could be permanently disabled when a user is suspended, or if a user is suspended more than once. Countermeasures could be applied to this approach, of course, but again, the goal here is to increase the cost of participation. 


Buy the new book ISIS: The State of Terror by Jessica Stern and J.M. Berger.

Buy J.M. Berger's seminal book on American jihadists, Jihad Joe: Americans Who Go to War in the Name of Islam


Views expressed on INTELWIRE are those of the author alone.


     



     

Tweets referencing this post:

loading..



BOOKS

"...smart, granular analysis..."

ISIS: The State of Terror
"Jessica Stern and J.M. Berger's new book, "ISIS," should be required reading for every politician and policymaker... Their smart, granular analysis is a bracing antidote to both facile dismissals and wild exaggerations... a nuanced and readable account of the ideological and organizational origins of the group." -- Washington Post

More on ISIS: The State of Terror

"...a timely warning..."

Jihad Joe: Americans Who Go to War in the Name of Islam:
"At a time when some politicians and pundits blur the line between Islam and terrorism, Berger, who knows this subject far better than the demagogues, sharply cautions against vilifying Muslim Americans. ... It is a timely warning from an expert who has not lost his perspective." -- New York Times

More on Jihad Joe

ABOUT

INTELWIRE is a web site edited by J.M. Berger. a researcher, analyst and consultant covering extremism, with a special focus on extremist activities in the U.S. and extremist use of social media. He is a non-resident fellow with the Brookings Institution, Project on U.S. Relations with the Islamic World, and author of the critically acclaimed Jihad Joe: Americans Who Go to War in the Name of Islam, the only definitive history of the U.S. jihadist movement, and co-author of ISIS: The State of Terror with Jessica Stern.

RECENT

Newest posts!

ISIS Strategy, AQ Fractures, Twitter Suspensions, ...

Chart: Al Qaeda Fractures, ISIS Gains

INTELWIRE Weekly Brief, 4/3/2015, Garissa Attack a...

INTELWIRE Weekly Brief, 3/27/15

Intelwire Weekly Brief, 3/20/2015 -- ISIS in Yemen...

INTELWIRE Weekly Brief 03/13/15

ISIS: The State of Terror, on sale now

INTELWIRE Weekly Brief 03/06/2015

INTELWIRE Weekly Brief 2/27/2015

INTELWIRE Weekly Brief 2/20/15

EXCLUSIVES


New York Pipe Bomb Suspect Linked to Revolution Muslim

The Utility of Lone Wolves

Interview with Online Jihadist Abu Suleiman Al Nasser

A Way Forward for CVE: The Five Ds

How Terrorists Use The Internet: Just Like You

PATCON: The FBI's Secret War on the Militia Movement

Interview About Jihad With Controversial Cleric Bilal Philips

Forgeries on the Jihadist Forums

U.S. Gave Millions To Charity Linked To Al Qaeda, Anwar Awlaki

State Department Secretly Met With Followers of Blind Sheikh

State Department Put 'Political Pressure' On FBI To Deport Brother-in-Law Of Osama Bin Laden In 1995

FBI Records Reveal Details Of Nixon-Era Racial Profiling Program Targeting Arabs

Gaza Flotilla Official Was Foreign Fighter in Bosnia War

U.S. Had 'High Confidence' Of UBL Attack In June 2001

Behind the Handshake: The Rumsfeld-Saddam Meeting