Social networks

  • PrivacySocial media firms pledging to keep users anonymous still collect users’ information

    Social media firm Whisperprides itself on offering anonymity in a market where the biggest players are often considered too transparent. Its co-founder, Michael Heyward, a tech entrepreneur, describes the company as “the first completely anonymous social network,” an alternative to Facebookand Twitter. It now emerges that Whisper’s back-end systems that retain digital libraries of texts and photographs sent by users, and in some cases the location information of users.

  • TerrorismISIS and al-Qaeda use social media, Web platforms differently to achieve different ends

    The Internet has contributed to the popularity of both al-Qaeda and the Islamic State (ISIS) among would-be jihadists, but the two terror groups use social media and Web platforms differently. Al-Qaeda has been spreading its message via the Internet for nearly two decades, while ISIS is a relative newcomer. Both groups use social media to recruit fighters, but ISIS has successfully developed content that Internet users are likely to share and repost. Such content in the form of violent videos and graphic imagery target young, disillusioned Westerners who are prime for radicalization.

  • EbolaComputing for Ebola Challenge

    Researchers at the Network Dynamics and Simulation Science Laboratory (NDSSL) have been using a combination of modeling techniques to predict the spread of the Ebola outbreak. As part of those efforts, the team created an adaptable set of global synthetic populations, allowing for rapid response as the situation continues to unfold. The synthetic populations and other informatics resources are now openly available to aid other researchers and citizen scientists. The NDSSL is hosting a Computing for Ebola Challenge from 3 October to 10 October 2014. The goal of the hackathon is to develop an application to combat the Ebola epidemic. All are welcome to join.

  • Social mediaPolitical traffic by Arabs on social media overwhelmingly hostile to, suspicious of U.S.

    Researchers found that a great deal of the political and social traffic by Arabs on social media is deeply hostile to and suspicious of the United States. U.S. officials are concerned that Internet users in the Arab world understand history and current events in ways fundamentally different from the American version. “Suspicion and opposition to U.S. foreign policy appear to be so deep and so widely shared, even by those on opposite sides of other contentious issues, that it’s hard to imagine how the U.S. could begin to rebuild trust,” said one expert.

  • TerrorismState Department’s social media campaign against ISIS questioned

    The State Departmentis advancing its anti-terrorism efforts on social media by reaching out to vulnerable English-speakers who could be recruited to join the Islamic State (IS). The campaign emphasizes IS’s brutality, and, mockingly, advises would-be recruits to learn “useful new skills” such as “blowing up mosques” and “crucifying and executing Muslims.” Experts say that there is a psychological error in trying to scare people off with threats that something might be exciting and thrilling. “If you challenge a young adult, particularly a male, with the fact that something might be especially difficult or challenging, you’re just exciting them,” says an expert in the psychology of terrorists.

  • TerrorismFormer Jihadists effective in dissuading would-be IS recruits from joining the group: Experts

    Last week British prime minister David Cameron announced new powers, allowing police to seize the passports of terrorist suspects to stop them from returning to the United Kingdom. London mayor Boris Johnson also called for British Jihadists to have their citizenship revoked. Richard Barrett, former counter-terrorism chief at MI5 and MI6, disagrees. He is advocating a passage of return for repentant fighters, saying “Many of the people who have been most successful in undermining the terrorist narrative are themselves ex-extremists.”

  • Social networksSocial networks aim to curb terror posts

    Social media platforms such as Facebook, YouTube, Twitter, and Instagram have all become a staple of everyday Western lifestyles – and these avenues have also become more interesting for terrorists to exploit to advance their goals. These companies admit, however, that curbing free speech and screening violent and hateful content does involve walking a fine line.

  • TerrorismISIS cleverly exploits social media for recruiting, communicating, and instilling fear

    Islamist militants have adopted social media as their primary medium for communicating with the public. Terrorism experts and social media analysts agree that in recent weeks IS has demonstrated a mastery of social media that far exceeds that of al-Qaeda. That use of social media is partly due to the participation of young Western-educated recruits who join IS.

  • TerrorismSocial media grappling with problems posed by terrorists-supporting contents

    Terrorist organizations have adopted social media as a tool for spreading propaganda and recruiting new members. Social media allow terrorist groups to interact with an audience and spread their message to a broader base. Legal scholars warn that as social media networks become the modern space for public discourse, they must be careful about publishing certain content because they could come under legal scrutiny for materially supporting terrorist organizations.

  • TerrorismISIS’s appeal to Islamist recruits grows as al Qaeda seen as stale, tired, and ineffectual

    Advances by militant groups like the Islamic State of Iraq and Syria (ISIS) in the midst of turmoil in the Arab world, while al-Qaeda’s aging leaders remain relatively silent, have led would-be terrorists and Islamic scholars to question al-Qaeda’s influence on global Jihad and its would-be fighters. Within the social circles of potential militant recruits, al-Qaeda is increasingly seen as stale, tired, and ineffectual.

  • TerrorismCanadian “sha’hid” used by ISIS in Jihadi recruitment video

    The Islamic State in Iraq and Syria’s (ISIS) strategy to use English-speaking Westerns and social media to recruit militants is unprecedented. ISIS has used World Cup hashtags on Twitterand Facebookto spread propaganda and generate death threats. The group’s adoption of new media could be seen as a move better to compete with rival militant groups. One of the more popular YouTube ISI video featuring a Canadian of was killed in an attack on a Syrian military airport.

  • BiometricsImproved performance of facial recognition software

    Who is that stranger in your social media photo? A click on the face reveals the name in seconds, almost as soon as you can identify your best friend. While that handy app is not quite ready for your smart phone, researchers are racing to develop reliable methods to match one person’s photo from millions of images for a variety of applications.

  • Venture capitalSecret raises $10 million at a $50 million valuation

    Secret allows users to post messages to their circles of contacts without identifying themselves as the source of the posted message. The start-up, which was launched in January, has closed a $10 million round of funding at a $50 million post-money valuation. The funding was led by Google Ventures, with participation from KPCB.

  • CybersecurityQR codes threaten Internet security

    Internet security experts have raised concerns about the growing use of Quick Response codes, also known as QR codes. Because the codes can only be read by a machine, such as a smart phone, it is difficult for people to determine what they are about to download. The codes, which are often used in marketing campaigns, could also be used to subscribe people to unwanted services, such as premium SMS.

  • PrivacyAnonymous messaging apps grow in popularity

    The recent surge in anonymous and ephemeral messaging apps like Backchat, Whipsper, Snapchat, Secret, and Ask.fm is a response to a growing demand for social media networks which allow users to interact without revealing their identify for fear of retribution or long-term stains on their personal records.