• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechPointCloud

What Counterterrorism Gurus Say About Propaganda in the Age of Social Media

By
Jonathan Vanian
Jonathan Vanian
Down Arrow Button Icon
By
Jonathan Vanian
Jonathan Vanian
Down Arrow Button Icon
September 15, 2016, 4:23 PM ET
by Tom Weber for Getty Images

With terrorists using social media services and Internet technologies to spread propaganda and gain recruits, U.S. Counterterrorism experts are trying to get help from the private sector to combat the messaging.

That’s one of the themes discussed by U.S. National security officers about technology and terrorism during a conference on Thursday in San Francisco hosted by Internet-security and performance company CloudFlare.

Although the general public might believe that many recent terrorist attacks are carried out by people who feel isolated from the rest of the world, many of these attackers “feel anything but alone,” said Jen Easterly, a special assistant to President Obama and the senior director of counterterrorism at the national security council. Easterly said that recent terrorism attacks in places like San Bernardino and Orlando were carried out by people who were “all affiliated in some way to ISIL.”

ISIL refers to the terrorist organization called The Islamic State of Iraq and the Levant, and it’s a also known as ISIS. This group’s reliance on technology is much more sophisticated than the terrorist organization Al-Qaeda, Easterly said, and it’s using social media to spread its message, which includes glossy-recruiting videos that resemble those created by the U.S. Military. The lone actors responsible for recent massacres were emboldened by the ISIL-created media they consumed. Although they never physically interacted with the group in places like Iraq and Saudi Arabia, they felt a sense of belonging to ISIL, she said.

John Mulligan, the deputy director of the National Counterterrorism Center, said that the rise of “home-grown actors” has made for a much more unpredictable national security environment and is “extremely difficult” for the government to combat on its own.

Easterly said that after the San Bernadino shootings late last fall, President Obama called on her and her group to facilitate a meeting between government officials and technology companies to address the rise of domestic terrorists and ICIL recruiting. She noted that the U.S. Government was working on a “mechanism” to share the information they have on terrorists so that tech companies can figure out ways to prevent communications or the spread of propaganda via their services. Easterly did not elaborate on the specifics of the meeting nor which tech companies participated besides CloudFlare, but said the companies “clearly don’t want that stuff on their system.”

“Our capacity to counter these measures is often very limited,” said Mulligan in reference to the need for assistance from technology companies.

Get Data Sheet, Coins2Day’s technology newsletter.

Easterly commended technology companies like Twitter (TWTR), Microsoft (MSFT), and Google (GOOG), which she said have all recently implemented or are experimenting with ways to prevent terrorists from communicating with others on their services.

For example, Twitter in July removed terrorist-related tweets on its social messaging service that supported the terrorist attacks in France in which a man drove a truck into a big crowd, killing dozens of people.

Google, through its technology incubator Jigsaw, is also testing technology that displays anti-ICIL messaging and videos on YouTube as well as Google Search when people type in keywords or certain phrases that could indicate someone is looking for pro-ICIL literature and media. Easterly said Google chose to create this technology on its own and that “we don’t tell anybody what to do” in regards to creating specific ways to stop ICIL propaganda.

Still, the two counterterrorism officers conceded that that there is a rift between government and technology companies regarding the balance between national security and privacy. Many companies are hesitant to trust the government when dealing with sensitive data in light of high-profile revelations on government spying activities, like those brought to light by whistleblower Edward Snowden.

For more about cybersecurity, watch:

The topic of encryption is also a sensitive topic. The FBI, for example, wantedApple (AAPL) to create technology to circumvent the tough encryption technology built into a disputed iPhone used by one of the San Bernardino shooters. Numerous technology company sided with Apple on the matter, but ultimately the FBI said it was able to crack into the phone without assistance from Apple.

Easterly said there is no easy solution to pleasing both sides and the topic will carry over to the next Administration after Obama leaves office, remarking, “The American people are going to have to weigh in on that debate.”

About the Author
By Jonathan Vanian
LinkedIn iconTwitter icon

Jonathan Vanian is a former Coins2Day reporter. He covered business technology, cybersecurity, artificial intelligence, data privacy, and other topics.

See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.