We noticed you're browsing in private or incognito mode.

To continue reading this article, please exit incognito mode or log in.

Not a subscriber? Subscribe now for unlimited access to online articles.


Facebook and Google May Be Fighting Terrorist Videos with Algorithms

Silicon Valley companies have come under fire for not doing enough to fight terrorism, but a new report suggests that’s starting to change.


Google and Facebook have both reportedly started to automate the process of removing extremist videos from their websites. While neither company has confirmed the practice, sources tell Reuters that the companies are using techniques similar to those used to identify and remove copyrighted material from the Internet.

The process that Google and Facebook are believed to be using to take down extremist content is known as “hashing.” This is a mathematical operation that takes a long stream of data of arbitrary length, like a video clip or string of DNA, and assigns it a specific value of a fixed length, known as a hash. The same files or DNA strings will be given the same hash, allowing computers to quickly and easily spot duplicates.

In the past, the likes of YouTube and Dropbox have used the technique to spot copyrighted files: the copyright owner simply provides the hash of the material it wishes to protect, and the website removes files uploaded to its servers if they share that hash. According to Reuters, Facebook and YouTube are using the same approach to block extremist video that is being “re-upped” to their sites.

What’s less clear is how extremist videos are identified in the first place. Some may be reported by regular users. But it’s not known how much human effort these sites expend trawling through video to find potentially extremist content, nor whether there are automated processes in place to mine videos and spot unwelcome footage. At the time of writing, neither Google nor Facebook has responded to us with comment.

The initiatives come as politicians have increasingly called on Silicon Valley to help in the fight against terrorism. Last year, Hillary Clinton asked tech companies to “disrupt” ISIS online, while more recently officials from the Obama administration met with senior executives from Facebook, Twitter, Microsoft, LinkedIn, YouTube, and Apple to plot how they could “make it harder for terrorists to [use] the Internet to recruit, radicalize, and mobilize followers to violence.” This month, Clinton reiterated that as president, she would “work with our great tech companies … to [do] a better job intercepting ISIS’s communications, tracking and analyzing social-media posts, and mapping jihadist networks.”

Facebook and Google certainly have enough data to profile each and every user in minute detail—so, the politicians argue, they could also use it to identify patterns in data that could be used to single out terrorist threats, too. Taking down re-upped videos is not the same thing, of course. But it might be a sign that Silicon Valley is beginning to pay attention to the voices emanating from Washington.

(Read more: Reuters, “What Google and Facebook Can Do to Fight ISIS,” “What Role Should Silicon Valley Play in Fighting Terrorism?,” “Can a Social-Media Algorithm Predict a Terror Attack?”)

Hear more from Google at EmTech Digital.

Register now
More from Connectivity

What it means to be constantly connected with each other and vast sources of information.

Want more award-winning journalism? Subscribe to All Access Digital.
  • All Access Digital {! insider.prices.digital !}*

    {! insider.display.menuOptionsLabel !}

    The digital magazine, plus unlimited site access, our online archive, and The Download delivered to your email in-box each weekday.

    See details+

    12-month subscription

    Unlimited access to all our daily online news and feature stories

    Digital magazine (6 bi-monthly issues)

    Access to entire PDF magazine archive dating back to 1899

    The Download: newsletter delivered daily

You've read of three free articles this month. for unlimited online access. You've read of three free articles this month. for unlimited online access. This is your last free article this month. for unlimited online access. You've read all your free articles this month. for unlimited online access. You've read of three free articles this month. for more, or for unlimited online access. for two more free articles, or for unlimited online access.