海角大神

Modern field guide to security and privacy

Opinion: How to beat ISIS on Twitter

Social media companies such as Twitter need to do more to keep terrorists from using their platforms as digital mouthpieces and that means prioritizing national security matters over some users' privacy concerns.

|
Dado Ruvic/Reuters

Islamic State and its supporters are managing the听most aggressive and effective online recruitment and听incitement campaign of any terrorist group in history.

This situation highlights a monumental intelligence failure. Indeed, it's stunning to consider there's no clear policy that could contain the online influence capacity of a terrorist group striving to show it is a more competent nemesis to the US and its allies than al Qaeda.

Nowhere is this failure more evident than on social media. Islamic State members have converted social media platforms managed by American companies like Twitter into cyber sanctuaries, from which the terrorist group amplifies narratives engineered to stimulate plots听to kill Americans and our allies. As the terrorism caseload managed by the FBI suggests the Islamic State is accelerating the radicalization process that culminates in violence,听it鈥檚 time to get more serious about denying terrorists access to these tools.

According to the US National Counterterrorism Center, Islamic State militants demonstrate a听听On Twitter, propagandists, recruiters, and supporters use thousands of accounts to build and reinforce support for the group. Even though Twitter has suspended many Islamic State-linked accounts, its听.听

This week, posts by听听exemplify Islamic State's social media savvy, along with just how comfortable Islamic State members are on Twitter. A British national, Ms. Jones has been听branded a specially designated global terrorist by the US. Not only did she听use a Twitter account to听听against Britain, and to听听who covers the Islamic State; she did it after following FBI, Pentagon, and US Central Command (USCENTCOM) Twitter accounts.听

Jones'听late husband Junaid Hussain, who was killed in a drone strike in Syria during 2015, headed up Islamic State's Hacking Division when it breached USCENTCOM's Twitter account.

Since听2014,听Islamic State members have used social media to encourage Muslims to either听emigrate to the 鈥渃aliphate鈥 to help the group defend and expand its territorial holdings, or kill the group鈥檚 enemies at home.

In an address posted online in May, Abu Mohamed al-Adnani, who doubles as the group鈥檚 spokesman and manager of its terrorist operations in the West, advised supporters to execute attacks in the US, rather than joining the group in the caliphate. Now the go-to site for links to Islamic State leaders' missives,听Twitter is an echo chamber for these directives.

Undermining and discrediting these messages isn't something the intelligence community and law enforcement can manage on their own.听Yet it would be quite easy to disrupt the Islamic State propaganda machine if Twitter and other social media companies changed the way they do business.听

For instance, Twitter could block anyone from posting content when their account is听accessed through a virtual private network (VPN).听听that the intelligence community can use online activities to track听terrorist elements, the Islamic State听encourages supporters to use VPNs听to mask their physical locations when online.听

Denying posting capabilities unless geolocation settings are enabled on a device would be another useful measure.听

Alternatively, social media companies such as Twitter could charge a monthly fee for users who either wish to access their accounts when using VPNs, or post content when geolocations settings are disabled. By restricting payment options to debit and credit cards issued by major financial institutions, Twitter and other companies would further deter illicit actors from converting their technologies into tools used to support criminal activity, or to threaten our national security.

But rather than emphasize disruption of the Islamic State鈥檚 online activities by effectively encouraging social media companies to pursue these measures 鈥 or telling Congress there may be a need to compel them to do so 鈥 the intelligence community has opted to monitor terrorists' online activities. Yet perhaps听听to limit national security managers鈥 capabilities to do that听will result in a new听strategy.

Privacy advocates will surely听cry foul about听these proposed measures. Some of their arguments are legitimate, even if they dually serve to benefit terrorists and many other actors who enjoy an absence of such policies when using social media for illicit purposes.

Indeed, one can imagine terrorists like Sally Jones are most appreciative of their enthusiasm. But the rest of us must prioritize听our national security over the privacy concerns of some social media users.

Michael S. Smith II is cofounder and COO of Kronos Advisory. Mr. Smith has served as a contributing expert to the Congressional Anti-Terrorism Caucus and the Congressional Taskforce on Terrorism and Unconventional Warfare. Follow him on Twitter听.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
海角大神 was founded in 1908 to lift the standard of journalism and uplift humanity. We aim to 鈥渟peak the truth in love.鈥 Our goal is not to tell you what to think, but to give you the essential knowledge and understanding to come to your own intelligent conclusions. Join us in this mission by subscribing.
QR Code to Opinion: How to beat ISIS on Twitter
Read this article in
/World/Passcode/Passcode-Voices/2016/0527/Opinion-How-to-beat-ISIS-on-Twitter
QR Code to Subscription page
Start your subscription today
/subscribe