Close Menu
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
Home»Social Media»How To Win The War Of Social Media
Social Media

How To Win The War Of Social Media

RichardBy RichardDecember 13, 2015No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

anonymous member in mask on computer screen

With threats mounting, an unusual alliance has begun to fight back against ISIS’s social-media war. Governments have launched offices that monitor and refute terrorist propaganda in real time. Companies have set new rules of conduct to prevent ISIS from using their products. Community activists seek to identify and reach out to youth in danger of falling under the sway of ISIS recruiters. And members of the Anonymous hacking collective hunt and destroy ISIS websites in the darkest corners of the Internet. Together, this loose coalition seeks to rob ISIS of one of its most powerful weapons: kicking it out of the very social-media ecosystem that helped give it life.

SUPPRESSION

CONTENT MODERATION

Google, Twitter, and Facebook—platforms intended for free and unfettered speech—have aggressively revised their terms of service to ban jihadist content. Google’s YouTube now deputizes some human-rights groups as “trusted flaggers” to identify ISIS content; Twitter has banned “indirect threats of violence”; Facebook proactively removes known jihadists from its service.

TWITTER ACCOUNT HUNTING

Organized groups of hacktivists hunt down and report ISIS accounts on Twitter; they claim to have eliminated as many as 110,000. They use algorithms to flag these accounts hundreds of times in rapid succession.

DETECTION

Because accounts can be quickly re-created, activists have written programs to search for multiples of similar-sounding Twitter handles. ISIS militants have responded with programs that automatically hide these from activists.

HACKING

DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACKS

Hackers use tens of thousands of linked computers (botnets) to overwhelm ISIS websites, sometimes burning out their physical servers.

DOXXING

Posing as potential recruits, hackers slowly gather data about their ISIS recruiters, using cyber forensics to identify and locate specific individuals. This information is then revealed to the world and passed to local authorities. One such tip, discovered by the hacktivists of Ghost Security, helped avert a July terror attack in Tunisia.

SABOTAGE

Hackers plunge into the deep Web, beyond the reach of normal search engines, to find and eliminate ISIS recruiting centers and bitcoin donation pages. In one instance, the Ghost Security Group (not to be confused with Ghost Security) replaced an ISIS propaganda hub with an advertisement for Viagra and Prozac.

[“source-popsci”]

How To Win The War Of Social Media
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Richard

    Related Posts

    Social Media Growth Strategies for Mumbai Brands: What Actually Works in 2026

    May 1, 2026

    How to Grow Your Brand’s Social Media Following: Proven Strategies That Work

    April 30, 2026

    How to Turn One Email Campaign into a Month of Social Content

    April 23, 2026
    Recent Post
    • Digital Pathways for Education: Enabling Greater Impact for All
    • The Art of Choosing Cabinets: A Comprehensive Guide
    • How to Effectively Manage Your Money
    • True Inclusion in Education Begins with Better Teaching
    • Social Media Growth Strategies for Mumbai Brands: What Actually Works in 2026
    • How to Grow Your Brand’s Social Media Following: Proven Strategies That Work
    • A Step-by-Step Guide to Personal Financial Planning
    • Tag, You’re It: GeForce NOW Makes Game Discovery Smarter With New Labels
    Search
    • Home
    • Privacy Policy
    • Contact Us !
    © 2026 BlogSpotTips. Designed by BlogSpotTips.

    Type above and press Enter to search. Press Esc to cancel.