Modern field guide to security and privacy

Opinion: How to beat ISIS on Twitter

Social media companies such as Twitter need to do more to keep terrorists from using their platforms as digital mouthpieces and that means prioritizing national security matters over some users' privacy concerns.

|
Dado Ruvic/Reuters

Islamic State and its supporters are managing the most aggressive and effective online recruitment and incitement campaign of any terrorist group in history.

This situation highlights a monumental intelligence failure. Indeed, it's stunning to consider there's no clear policy that could contain the online influence capacity of a terrorist group striving to show it is a more competent nemesis to the US and its allies than al Qaeda.

Nowhere is this failure more evident than on social media. Islamic State members have converted social media platforms managed by American companies like Twitter into cyber sanctuaries, from which the terrorist group amplifies narratives engineered to stimulate plots to kill Americans and our allies. As the terrorism caseload managed by the FBI suggests the Islamic State is accelerating the radicalization process that culminates in violence, it’s time to get more serious about denying terrorists access to these tools.

According to the US National Counterterrorism Center, Islamic State militants demonstrate a "particular affinity for Twitter." On Twitter, propagandists, recruiters, and supporters use thousands of accounts to build and reinforce support for the group. Even though Twitter has suspended many Islamic State-linked accounts, its global network of devotees is undeterred

This week, posts by Sally Jones exemplify Islamic State's social media savvy, along with just how comfortable Islamic State members are on Twitter. A British national, Ms. Jones has been branded a specially designated global terrorist by the US. Not only did she use a Twitter account to issue terroristic threats against Britain, and to harass a New York Times journalist who covers the Islamic State; she did it after following FBI, Pentagon, and US Central Command (USCENTCOM) Twitter accounts. 

Jones' late husband Junaid Hussain, who was killed in a drone strike in Syria during 2015, headed up Islamic State's Hacking Division when it breached USCENTCOM's Twitter account.

Since 2014, Islamic State members have used social media to encourage Muslims to either emigrate to the “caliphate” to help the group defend and expand its territorial holdings, or kill the group’s enemies at home.

In an address posted online in May, Abu Mohamed al-Adnani, who doubles as the group’s spokesman and manager of its terrorist operations in the West, advised supporters to execute attacks in the US, rather than joining the group in the caliphate. Now the go-to site for links to Islamic State leaders' missives, Twitter is an echo chamber for these directives.

Undermining and discrediting these messages isn't something the intelligence community and law enforcement can manage on their own. Yet it would be quite easy to disrupt the Islamic State propaganda machine if Twitter and other social media companies changed the way they do business. 

For instance, Twitter could block anyone from posting content when their account is accessed through a virtual private network (VPN). Since militants understand that the intelligence community can use online activities to track terrorist elements, the Islamic State encourages supporters to use VPNs to mask their physical locations when online. 

Denying posting capabilities unless geolocation settings are enabled on a device would be another useful measure. 

Alternatively, social media companies such as Twitter could charge a monthly fee for users who either wish to access their accounts when using VPNs, or post content when geolocations settings are disabled. By restricting payment options to debit and credit cards issued by major financial institutions, Twitter and other companies would further deter illicit actors from converting their technologies into tools used to support criminal activity, or to threaten our national security.

But rather than emphasize disruption of the Islamic State’s online activities by effectively encouraging social media companies to pursue these measures — or telling Congress there may be a need to compel them to do so — the intelligence community has opted to monitor terrorists' online activities. Yet perhaps Twitter’s recent decision to limit national security managers’ capabilities to do that will result in a new strategy.

Privacy advocates will surely cry foul about these proposed measures. Some of their arguments are legitimate, even if they dually serve to benefit terrorists and many other actors who enjoy an absence of such policies when using social media for illicit purposes.

Indeed, one can imagine terrorists like Sally Jones are most appreciative of their enthusiasm. But the rest of us must prioritize our national security over the privacy concerns of some social media users.

Michael S. Smith II is cofounder and COO of Kronos Advisory. Mr. Smith has served as a contributing expert to the Congressional Anti-Terrorism Caucus and the Congressional Taskforce on Terrorism and Unconventional Warfare. Follow him on Twitter @MichaelSSmithII.

 

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Opinion: How to beat ISIS on Twitter
Read this article in
https://www.csmonitor.com/World/Passcode/Passcode-Voices/2016/0527/Opinion-How-to-beat-ISIS-on-Twitter
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe