Combating #Extremism: Twitter and online terrorist content - http
-
Upload
khangminh22 -
Category
Documents
-
view
4 -
download
0
Transcript of Combating #Extremism: Twitter and online terrorist content - http
Combating #Extremism: Twitter and
online terrorist content
Thesis for Bachelor of Liberal Arts and Sciences (Social Sciences Major)
Tilburg School of Humanities and Digital Sciences (TSHD)
University College Tilburg
Name: Alina Gabriela Andrei
ANR: 273897
Student no: u1273909
Supervisor: Dr. Marloes van Noorloos
Dr. Jan Hendrik Valgaeren Second reader
3
Table of Contents
1. Introduction ...................................................................................................................................................... 4
1.1 Research Statement ...................................................................................................................................... 4
1.1.2 Methodology ............................................................................................................................................. 8
1.2 Relevance of the study .................................................................................................................................. 9
2. Theoretical Framework.................................................................................................................................. 10
2.1 Foucault and the idea of governmentality ................................................................................................. 10
2.2 Responsibilization Theory .......................................................................................................................... 12
3. The Role of the Internet and Social Media Companies in dealing with online illegal content ................. 18
3.1 The current state of the Internet and (some) dilemmas in the field of online crime control ...................... 18
3.2 Responsibilization of the Social Media Companies ................................................................................... 22
3.3 EU-level initiatives with regards to combating online terrorist content .................................................... 27
3.4 Developments in Twitter’s practices with regards to terrorist content ...................................................... 32
4. Conclusion ....................................................................................................................................................... 38
5. References ....................................................................................................................................................... 41
Online Sources cited: ....................................................................................................................................... 43
4
1. Introduction
1.1 Research Statement
All over the world, individuals rely on the internet to access instantaneous information. This
mainly happens because of the practicality of the internet, whereby almost effortlessly, a
broad selection of content is available just by means of a ‘click’. The wide variety of data on
the web can start from academic documents, news sources, podcasts and documentaries and
move towards more heinous content such as beheading videos, child pornography and other
types of unlawful, illegal content. As Almagor has put it in 2017 “The internet contains some
of the best products of humanity and some of the worst ones. It serves both positive and
negative elements in society” (Almagor, 2017, p.451). Therefore, it is not a surprise that
terrorists (and terrorist organizations) have found the internet to be a “godsend”, because it
offers the desired tools to undergo their recruitment and radicalization processes and
disseminate their content to the broad audience (Tsesis, 2017). The internet has become
highly favorized for sharing extremist- and terrorist content because it has the advantageous
trait of granting (almost) full anonymity of the users. More precisely, as Weimann said in
2010, “decentralized and providing perfect anonymity, it (the internet) cannot be subjected
to control or restrictions and can be accessed by anyone” (Weimann, 2010, p.45). Of course,
it is important to note that the above-mentioned traits of the internet are mainly related to
the Western world, where internet censorship is not in place as it is the case of China, for
example. Another characteristic of the internet in this respect is that the geographical
proximity between individuals does not matter, and communication can happen in real time
no matter where the users are situated. This communication can occur mainly via social media
companies, which are platforms that allow for instantaneous communication by means of
messages, videos, pictures and so on. Social media companies can be seen as the ‘gems’ of
the internet, because audiences world-wide can be reached in a matter of seconds and
information can easily become ‘viral’. These platforms convey the virtual space for debates
on topics that are very important for today’s society, such as for example democracy and
politics. Therefore, for these reasons (and of course, not limited to these), the traits of social
media companies are more special compared to traditional media and the internet.
The current study aims at explaining and comprehending the changing role of the social media
companies in today’s society, and how their responsibility with regards to the content shared
on their platforms has gradually changed over time. Social media companies have become an
important part of today’s society and their rapid growth led to increased responsibility on
their behalf, especially in detecting unlawful content (Almagor, 2017). This shift in
responsibility can be translated into the dilemma this thesis will delve into, namely that
traditionally speaking, states were considered to be in charge with combating any type of
expression that was perceived as a threat and was in violation of the state’s law, such as
incitement to terrorism and terrorist content and ultimately to set the balance between
freedom of speech and overall societal security. But with the growth in the popularity of social
5
media companies, and the fact that these platforms do play a role in disseminating terrorist
content, there is an increase call for the social media companies themselves to take
responsibility upon the content that is shared on their platforms. Therefore, what the current
study aims at, is providing a greater understanding of how the role of a social media company,
namely Twitter has developed over time, i.e. from not assuming any liability with regards to
the content shared on the platform and stressing that the users themselves are fully
responsible of what they decide to share and/or post online (Rules and Regulations Twitter,
2009) towards taking actions with regards to the content and implementing a zero tolerance
policy with respect to extremist and violent speech on their platform (Rules Regulations
Twitter, 2018). By conceptualizing on Garland’s (1996) responsibilization framework, the
present study aims at creating a bridge for further research to be conducted with respect to
the responsibility of today’s main social media companies with regards to the illegal content
that is to be found on their platforms.
While the focus of this thesis is centered around the social media platform of Twitter, a brief
description will be provided before introducing the main research question as well as the sub
questions that will be answered throughout this study. According to Kwak, H., Lee, C., Park,
H., & Moon, S. (2010) Twitter, who launched in 2006, is an instantaneous ‘microblogging’
social platform that allows for communication between users and is perceived to be a
powerful medium of information sharing. The idea of microblogging means that there is a
fixed number of 140 characters limit allowed per ‘tweet’, tweet that could evolve around any
topic and could be further read by both followers and non-followers. One other characteristic
of Twitter is that users can read, follow, re-tweet and so on messages by users that they do
not have in their ‘followers’ list, which further implies that anyone can access all profiles,
without knowing or ‘following’ that specific account per se. Moreover, Twitter is perceived as
a different social media platform compared to Facebook and YouTube for example, because
of its algorithms. Both Facebook and YouTube have algorithms that filter what each user is
seeing according to their interests, which is not the same for Twitter.
Therefore, with respect to the above-mentioned information, the research question of this
study is: “How can the developments in Twitter’s role with regards to combating online
terrorist content over time, be assessed in light of the responsibilization theory?”. The sub-
questions that will be answered in order to arrive at a pertinent answer for the main question
are:
1. What is the responsibilization theory?
2. How is it dealt with online illegal content on the internet and on social media
platforms in general?
From this second question, a following (sub) sub-question will be derived, namely what is the
role of the European Union in combating online illegal content?
6
3. What are the developments in Twitter’s practice with regards to online terrorist
content?
In order to have all the necessary information to fully be able to understand the topic of
interest and to research towards an adequate answer, it is of utmost importance to discuss
the terms of ‘terrorism’ and ‘terrorist content’. Providing a clear definition of terrorism might
seem far-fetched at this point in time, due to the sole reason that academics, heads of many
states and representatives of the main international organizations active nowadays were
unable for so many years to agree on a definition of terrorism. As accurately as it was pointed
out by Alex Schmid (2004), the main issue of terrorism in our contemporary society has to do
with the definitional problems that come along with this term. As the title of his paper,
“Terrorism - The Definitional Problem” (2004) suggests, the fact that for almost two hundred
years agreement on a definition was impossible to be met, portrays the complexity of this
term. But what can be certainly stated is that “terrorism may be the most important word in
the political vocabulary these days” (Schmid, 2004, p.376), fact that did not change for 15
years until today.
What Schmid (2004) further stresses, is that the definitional problem of terrorism and not
being able to find a consensus on what terrorism really is, is more political rather than legal.
He further gives four reasons why terrorism is difficult to define, which are:
1. “Because terrorism is a ‘contested concept’ and political, legal, social science and
popular notions of it are often diverging;
2. Because the definition question is linked to (de-)legitimization and criminalization;
3. Because there are many types of terrorism, with different forms and manifestations;
4. Because the term has undergone changes of meaning in the more than 200 years of
its existence” (Schmid, 2004, p.395).
Taking all these into consideration, a continuous debate will most likely still take place in the
future before achieving a common understanding on the definition of terrorism. Although
there are some agreements in various fields as to what terms shall be included when aiming
at defining this concept, there are disparities between the academic field, the legal one and
the (inter-)governmental definitions, but most of the common- agreed terms used in various
fields are ‘violent acts, intent to spread fear/terror, political character’ (Schmidt, 2004).
Moving towards explaining the second concept that is of great importance and crucial for the
present thesis, namely ‘online terrorist content’, the EU Directive 2017/541 that can be found
in the European Commission’s proposal, namely the regulation of the European Parliament
and of the Council in preventing the dissemination of terrorist content online will be used.
The definition of ‘online terrorist content’ should “capture material and information that
incites, encourages or advocates the commission or contribution to terrorist offences, provides
instructions for the commission of such offences or promotes the participation in activities of
7
a terrorist group. Such information includes in particular text, images, sound recordings and
videos” (EC, 2018, p.15).
8
1.1.2 Methodology
In terms of the methodology of this study, the research question and the sub-questions
derived from it will be answered by reviewing relevant academic literature from different
academic fields such as terrorism studies, criminology studies as well as sociology and
communication studies on the topic of interest as well as delving into reliable news sources
that could convey a broader perspective on the issue at hand. By using academic literature
from various fields of research, the current thesis will have an interdisciplinary background of
theories and literature to understand the current developments of the issue of interest. The
responsibilization theory, which is the core of the theoretical framework and main aspect of
the research question will be explained by means of the literature written by David Garland
(1996;2001), as he is the one who shed light on the concept of responsibilization. Garland’s
“The Limits of the Sovereign State. Strategies of crime control in contemporary society” (1996)
and “The Culture of Control: Crime and social order in contemporary society” (2001) will be
the means through which the theoretical background of this study will be conceptualized,
through a content analysis of his work and reviewing his writings.
Academic literature from terrorism- as well as communication studies will be used to
comprehend the changing role of social media companies, as well as the various standpoints
scholars have on the current dilemma that social media platforms are faced with, namely
taking upon the traditional role of the states of acting and consequently being responsible for
the content that is shared on the platforms. This dilemma will be partly answered by delving
into legal articles such as the European Commission’s proposal of 2018 and other EU-level
relevant documents (e.g. Europol documentation). After assessing the above-mentioned
aspects, the emphasis will be shifted towards the platform of Twitter specifically, in order to
assess their changing role with regards to the shared content on their platform. This will be
researched by means of reviewing academic articles on the topic of Twitter and terrorist
content online, as well as looking at Twitter’s annual reports and publicly available terms and
conditions and private policies available on the official website (Twitter.com), facts that will
be thoroughly explained in chapter 3, section 3.4. Moreover, reliable news sources will be
analyzed in order to gain a better perspective into Twitter’s practice with regards to
combating online terrorist content. The reason Twitter is the platform of choice for assessing
its developments with regards to combating the dissemination of terrorist content is its role
in the discussion about terrorist content online, and because, as research shows, Twitter is
among the preferred platforms for terrorists themselves to disseminate their content and
speech (Almagor, 2017; Jeong, 2016; Al-Rawi et al., 2018 etc.).
9
1.2 Relevance of the study
It is worthy to investigate the developments in Twitter’s role with regards to combating
terrorist content online, as nowadays social media platforms play a big role in the day-to-day
lives of millions of people. The present study is relevant from an academic point of view,
because there is little academic research done at this point in time with regards to the role of
a social media company (in this case, Twitter) in combating terrorist content online generally
speaking, let alone in relation with Garland’s (1996) Responsibilization Theory. Although a
great deal of literature nowadays deals with the pressing issue of terrorism, and consequently
terrorist speech on the online medium, the link between the developments of a social media
platforms along with the responsibilization theory with regards to combating terrorist
content has not been made yet.
This thesis therefore is relevant from an academic point of view because it presents a research
angle that has not been made yet and it provides a greater understanding of how the role of
Twitter has changed over time. As mentioned already, in 2009 Twitter was not taking any
public responsibility with regards to the content shared on the platform and was stressing
that the users are fully responsible of what they decide to make public on Twitter, towards a
different approach that is to be seen from 2018, where Twitter’s rules and regulations have
been adapted towards the implementation of a zero-tolerance policy with regards to
extremist and violent speech on their platform (Rules and Regulations Twitter, 2018).
Consequently, by means of Garland’s (1996) responsibilization theory, the present thesis aims
at setting the scene for further research to be conducted regarding the responsibility of
contemporary social media companies in their battle of combating illegal and terrorist
content online.
It is an important societal development to research into the responsibilization of the social
media companies when it comes to the content that is made publicly available. Today’s
society is gradually more and more digitally active, as ‘scrolling’ on social media platforms are
part of many individuals’ daily routines. Therefore, it is significant, at a societal level to discuss
how to deal with potentially harmful speech on these social media platforms and to assess
whether they could have a prospective negative impact on individuals. Moreover, for further
research it is important to mention that this topic will be relevant in the future as well, as
technology is in a continuous development and the trend is constantly increasing when it
comes to the use (and consequently, abuse) of the social media companies, generally
speaking.
10
2. Theoretical Framework
2.1 Foucault and the idea of governmentality
The idea of responsibility and responsibilization was theorized by many thinkers throughout
the past decades in order to fully assess its applicability and suitability to cotemporary crime
control. Of core interest to this thesis is the development of Garland’s (1996)
responsibilization theory and what he describes to be a (possible) effective strategy in crime
control. But before going in depth with Garland’s framework, Michel Foucault’s work with
respect to governmentality and responsibilization will be first brought to the fore. In his article
titled “’Governmentality’ and the problem of crime: Foucault, criminology, sociology” from
1997, Garland touches upon Foucault’s analysis with respect to the ideas of governmentality
and crime control. He ends his article with what he calls “the limits of ‘governmentality’
analysis” where he presents limitations to Foucault’s framework, whereby he calls his analysis
“to be suggestive rather than substantive” (Garland, 1997, p.195). What it is stressed in
Garland’s work about Foucault’s ideas of governmentality, is that through this whole concept
the idea of governmentality is that of shaping and ultimately controlling individuals conduct
by other means, and not those means of the state alone (Garland, 1997). This shift from the
governing people’s conduct through other means than through the state alone can be linked
to what Hache (2007) portrays as a ‘behavioral transformation’ which takes place “via a
twofold responsibilization strategy” (Hache, 2007, p12.). This transformation implies the idea
that change should occur first in the way individuals think, with regards to responsibilization
in order to have the ability to change the ways in which individuals act. The ‘twofold
responsibilization strategy’ operates both at an individual level, but it also consists of a
“transfer of the State’s traditional responsibility to protect to groups and individuals” (Hache,
2007, p.12).
The French philosopher Michel Foucault coined the term of governmentality in the 1970’s in
one of his courses about power and politics, a term which was “understood in the broad sense
of techniques and procedures for directing human behavior. Government of children,
government of souls and consciences, government of a household, of a state, or of oneself”
(Rose et al., 2009; Foucault 1997, p.82). Through his perception of governmentality, Foucault
creates a merge between the two major concepts of ‘government’ and ‘rationality’ which
have the power to lead and shape individuals’ conduct in society (Lemke, 2002). In her paper,
Hache (2007) examines the connection between Foucault’s ideas of governmentality with the
notion of responsibility perceived as a tool of neo-liberalism ideology. What the author
stresses is that, the shift from classical liberalism towards neo-liberalism represents a
reorganization of the government; in this reorganization, the emphasis is placed on the
allocation of responsibilities to various non-state actors compared to how it used to be the
case in the past, namely that only those official state bodies that had as a sole purpose to deal
with crime control, were in fact responsible for this issue alone (Hache, 2007, p.4). Important
11
to mention regarding the link between governmentality and responsibilization is that, as
mentioned above, it has been resorted to more indirect modes of governing and controlling
individuals. This has, however, another dilemma attached, namely that by having less direct
governance and control from the state agencies, it can lead to blurrier lines when it comes to
the distinction between the roles of the public and the private spheres and individual’s
liberties. Moreover, worth highlighting in this context is the idea that neo-liberal penal theory
brings to the fore the belief that the criminals are not perceived as “abnormal or monsters
but individuals like anyone else who have made a miscalculation” (Hache, 2007, p.11). This
perception implies that one should not aim at correcting offenders who behave in a deviant
way but rather aim at understanding the reasoning behind one’s actions that ultimately have
led to such behavior. This change in perception of the criminal has to do with the shift from
classical criminology to a more modernist approach, where the focus is merely set on the
assumption that one should investigate why a certain person does not behave responsibly
and ultimately, what can be done to change their ways of thinking.
12
2.2 Responsibilization Theory
In his work “The limits of the Sovereign State” David Garland (1996) illustrates an extensive
analysis of the strategies of crime control, with a main focus on the 20th century Great Britain
and other Anglo-American nations, by means of an in-depth conceptualization. The main
aspect of interest for this thesis regarding Garland’s work evolves around his
conceptualization of the responsibilization theory and its applicability to the focal research
question of this thesis. Before he (Garland) begins to introduce his perception of the
responsibilization theory and what this implies, he commences his article by stressing on the
changes in the intensity of the crime rates occurring in the western societies. Striking, as he
calls it, is the fact that the increased crime rates have gradually become “a normal social fact”
(Garland, 1996, p.446) and have become a standard in the everyday life of the individuals.
What is of interest to the author is thus not how this change occurred in the phenomena of
crime but rather how governments and (private) agencies are responding to this
normalization of crime, namely through adaptive strategies, among which is the
responsibilization one. Nonetheless, it is of utmost importance to understand that this was
the reality Garland depicted in the 1996, which was the case (in the United Kingdom) for a
decade already. Thus, it does not reflect the reality of todays’ society, because crime rates
have been dropping in many western states, although with this decrease taking place, crime
may still be regarded as a fact of life for many individuals.
In his article, Garland proceeds in introducing the idea of state sovereignty through what he
titled “The Myth of Sovereign Crime Control”, through which he implies that the basic idea of
the sovereign state having the capability to provide “security, law and order, and crime control
within its territorial boundaries” (Garland, 1996, p.448) has been coined as a myth. What
succeeded to strengthen the perception of an effective sovereign state was the emergence
of the new state forces in the late 19th century which were seen as a cooperation between
the state and the institutions of civil society (e.g. families, neighborhoods, churches, trade
unions and so on) that had ability to reduce the crime rates. Additionally, Garland touches
upon ideas that were found in Foucault’s writings as well, namely that the ‘new criminologies’
deny the previous assumptions that the committed crime steered from a pathological issue
or a faulty upbringing, but rather takes on the premise that “crime becomes a calculated risk
to be calculated (both by the offender and by the potential victim) […] rather than a moral
aberration which needs to be specially explained” (Garland, 1996, p.451). Although Garland
does not connect this directly to the responsibilization practice, he appears to be using the
example on how crime in general has changed both related to the perpetrator as well as the
victim in order to comprehend the reason for criticism of the current way of governing and
the need for adapting new (effective) strategies. This need for adapting new strategies steers
from what he calls “supply side criminology” which, Garland states that it is “aiming to modify
the everyday routines of social and economic life by limiting the supply of opportunities,
shifting risks, redistributing costs and creating disincentives” (Garland, 1996, p.451). He
13
elaborates this statement by means of examples along the lines of “ … replacing cash with
credit cards, building locks into the steering columns of cars (…) encouraging local authorities
to co-ordinate the various agencies that deal with crime and of course, encouraging citizens
to set up Neighborhood Watch schemes” (p.451). With these examples, Garland depicts the
contrast between this new approach and that of the traditional criminology, whereby in the
former one, the state, and consequently the state’s agencies are not the primary actors in the
establishment of crime control. Another contrast to traditional criminology consists in the
portrayal of the criminal subject, which is depicted by Garland as an opportunistic individual
“whose access to social goods must be barred” instead of a person who is perceived as a
societal misfit in need of assistance (p.451). From this point on, Garland reflects upon the
possibility of some new emerging strategies related to these so called new criminologies,
namely the idea that the discourse on the means behind the committed crimes has changed,
as explained above; among these needed strategies, the responsibilization theory will be
further introduced and explained as a (new) mode of governing crime (Garland, 1996, p.452).
Garland depicts the responsibilization practice as a strategy which involves “the central
government seeking to act upon crime not in a direct fashion through state agencies (police,
courts, prisons, social work etc.) but instead by acting indirectly, seeking to activate action on
the part of non-state agencies and organizations” (Garland, 1996, p.452) as a new crime-
prevention approach. Highly relevant terms associated with this strategy are “‘partnership’,
‘inter-agency cooperation’, ‘the multi-agency approach’, ‘activating communities’, creating
‘active citizens’ and ‘help for self-help’” (p.452). From these terms, one can therefore reach
the conclusion that the responsibilization theory has as a core principle the (partial)
delegation of responsibility regarding crime and the prevention of crime on to public and
private organizations and individuals which normally are not bound to the state and to
persuade them in operating accordingly (i.e. responsible). This theory basically stresses the
idea that non-state actors and private agencies are equally responsible for controlling crime
and security. The attempt to appoint private agencies and individuals into taking action
involves a set of methods and techniques to be implemented on behalf of the state, such as
either “stimulating new forms of behavior or stopping established habits” (Garland, 1996,
p.452); afterwards it can be assessed whether individuals and organizations have indeed the
necessary means available (to attempt) to effectively reduce criminal momentum and to
further evaluate whether this responsibility strategy could be prescribed.
Worth mentioning here is that the core idea of the responsibilization practice is on the one
hand to deliver the message that the state alone is highly incapable of effectively preventing
and controlling the increased crime rates and on the other hand that other actors in the
society (e.g. “property owners, residents, retailers, manufacturers, town planners, school
authorities, transport managers, employers, parents and individual citizens”) (Garland, 1996,
p.453) must become aware of their own responsibility with respect to crime prevention and
the increase of opportunities in the area of informal crime control.
14
Garland continues on the same line of reasoning by highlighting that such cooperative
measures which bring along private and public organizations in initiating preventive measures
might be, at times, perceived as forceful and compelling on behalf of the private companies.
He exemplifies this argument by the suggested idea that the government might compel retail
companies themselves to do more in order to reduce shoplifting and retail-related crimes by
warning that consequently the retailers themselves will have to bear the costs of theft-related
prosecutions. This example, he argues, is of support to the idea that such a reverse towards
a system of “private prosecution shows how the responsibilization strategy merges neatly into
strategies of privatization and public expenditure reduction which commanded such support
from conservative governments in the 1980s and 1990s”, which ultimately seems to highlight
Garland’s critical approach. (Garland, 1996, p.453)
It is crucial to be stressed in this context that the responsibilization strategies’ aim is thus not
to load off the state’s function but rather to implement a “new form of governance-at-a-
distance, which represents, in this field at least, a new mode of exercising power. It is a new
mode of governing crime, with its own forms of knowledge, its own objectives, its own
techniques and apparatus” (p.454). Accordingly, the state does not become less in terms of
power because it retains all its previous functions along with the new additional “set of
coordinating and activating roles, which, in time develop into new structures of support,
funding, information exchange and cooperation” (Garland, 1996, p.454). But, simultaneously,
the responsibilization practice slowly deteriorates the impression of the state as the “public’s
representative and primary protector” (p.454) because of the basic involvement of the
citizens and other public or private organizations. Thus, responsibilization as a strategy does
not imply that the state is ‘backing-off’ from its actual duties but rather it implies the idea
that the state acknowledges the need of taking up a new role. By means of such strategy, the
state is therefore testing the effectiveness of the various ways of “acting at a distance, of
activating the governmental powers of private agencies, of coordinating interest and setting
up chains of cooperative action” (p.454) which nonetheless can be perceived as more difficult
compared to the traditional way of issuing commands to state appointed workers.
After assessing the possible benefits of implementing the practice of responsibilization, with
the main benefit being the possibility of reducing the crime rates and dealing with the state’s
inability in solely decreasing these, Garland centers the discussion on what the main problem
related to the strategy is. The author claims that the main problem is that “the
responsibilization of non-state agencies and the routinization of crime prevention are liable to
give rise to huge disparities in the social provision and distribution of security” (Garland, 199,
p.463). In terms of the idea of security, Garland accurately points out that this problem is
likely to occur if security will not be equally provided and guaranteed to all citizens by what
he calls the ‘sovereign state’. In such situation of allocating the needed security based on
“market forces, rather than according to need” (p.463) the gap between the privileged strata
of the society and the poor will increase, thus those who are in need of security will lack the
15
necessary means to ‘purchase’ their security which will nonetheless “propel us towards a
fortified, segregated society” (p.463). By considering the main research question of the
current thesis, this idea could possibly be materialized under the premise that, maybe the
same could be applied for the case of online terrorist content on the social media platforms.
More specifically, if social media companies would undergo the practice of responsibilization,
it might be the case that some forms of illegal content would be regulated, but some forms
would not, thus, the premise is that the market forces could have a role to play in this
situation, that will be further discussed in the conclusion of this thesis.
Furthermore, Garland stressed on the issue that another aspect is decreasing the possibility
to apply the responsibilization practice, namely the fact that for the majority of the non-state
actors and private organizations, reducing crime is not the main objective to pursue. These
actors, that might have the available resources and capabilities of reducing crime rates, have
therefore as a core objective to continue to deliver their main services and increase their
profits instead of choosing to show interest in a form of cooperation for the purpose of
reducing crime rates and tighten control. Another impediment for the prospect of decreasing
crime rates is the state itself, which proved little to no willingness in recalculating costs and
delegating more funds towards initiatives for countering crime. The issue is that the state
proved to be more inclined to pursue policies that are believed to promulgate “punitive
strategies (which are easier to deliver) than to sacrifice economic or social objectives in the
services of crime control” (Garland, 1996, p.464), which only proves to undermine the possible
advancement of social change. Instead of aiming at publicizing policies to promote a vision of
social justice, the implemented penal policies shift “the burden of social control on to
individuals and organizations that are often poorly equipped to carry out this task” (p.466).
Even nowadays, it is still the case that more punitive and obligatory actions have been taken
at the state-level in order to aim at decreasing crime rates. As it will be discussed in the
following chapter, social media companies themselves lack the ability and willingness to
invest the needed funds in areas that could lead to a better control of the content that is to
be found on their platforms and decide to prioritize areas that are not (necessarily) under
‘threat’ (Almagor, 2017).
With the responsibilization practice in mind, another concept that could be of relevance to
this thesis is that of securitization. Introduced by Buzan et al. (1998) securitization is “the
process in which security measures are established in place of previous policies and routines;
it requires the establishment of an existential threat that potentially is devastating enough to
have political effects” (Rasmussen, 2015). Securitization needs thus a clear context in order
for its success to be granted, therefore the “audience” (i.e. both securitizing actors and
citizens) need to accept that the issue at hand is indeed an actual threat (Rasmussen, 2015).
With the process of responsibilization, citizens become more and more aware that it is one’s
personal duty to act and pursue a safe behavior which presents a development that Western
governance tends to adopt, namely prudentialism which implies “increasing individual effort
16
and responsibility” as opposed to welfarism which emphasizes on “collective risk solutions
and collective insurance” (Rasmussen, 2015). As the concept of interest is that of
responsibilization, specifically the responsibilization of social media companies (e.g. Twitter)
with regards to the terrorist content to be found online, the concept of securitization, can be
linked to the threat terrorism as well. Kaunert et al., (2019) pointed out that the idea of
‘collective securitization’ (Kaunert et al., 2019, p.262) is behind the developments at the
European Union’s level with regards to combating the existent terrorist threat, sparked after
the 9/11 events in the USA. What the authors stress is the idea that although the development
did not happen rapidly, there are major areas in which the EU strived in countering the issue.
Thus, an effective relationship built on the concepts of both responsibilization and
securitization, which nonetheless stress on collective efforts for its effectiveness to be
granted, could possibly lead to successful measures in combating the present terrorist threat
and decreasing the problem of crime control in contemporary societies.
After assessing Garland’s work on the responsibilization practice from 1996, the present
thesis will briefly examine his newer work on crime control and establish a possible
relationship with the aforementioned practice of responsibilization. In his book ‘Culture of
Control: Crime and Social order in contemporary society’ (2001) Garland portrays the
evolution of the crime control field and its characteristics. What he states as being a definitory
characteristic of the field of crime control are two “interlocking and mutually conditioning
patterns of action: the formal controls exercised by the state’s criminal justice agencies and
informal social controls that are embedded in everyday activities and interactions of civil
society” (Garland, 2001, p.5). He further stresses that it is important to acknowledge that the
field of crime control “involves the social ordering activities of the authorities and also the
activities of private actors and agencies (…) Too often our attention focuses on the state’s
institutions and neglects the informal social practices upon which state actions depends”
(Garland, 2001, p.6). Garland aims at putting forward the idea that this reconfiguration (of
crime control) involves manifold factors and cannot be pointed just towards the society nor
the governmental bodies, but rather seen as an overall change in responses of crime which
include, but are not limited to, “new practices of controlling behavior and doing justice,
revised conceptions of social order and social control, and altered ways of maintaining social
cohesion and managing group relations” (p.6).
Garland critically discusses this aspect which he calls ‘the commercialization of crime control’
(Garland, 2001, p.17) by pointing out that the line between the private and the public spheres
becomes thinner and thinner. What used to be the case, namely that those state institutions
that were essentially dealing with delivering the appropriate means in the field of criminal
justice were predominantly and solely active (in dealing with crime), is not necessarily in
practice anymore. On the contrary, along with those state institutions that were governing
the criminal field, an emergence of “the activity of citizens, communities, and companies, that
works with a more expansive conception of crime control and that utilizes techniques and
17
strategies that are quite different from those used by traditional criminal justice agencies”
(Garland, 2001, p.17) is to be seen more and more often, whereby the practice of
responsibilization can be seen under the emerging strategies. As his research primarily
focuses on the UK and the USA, Garland has framed that the government, especially in the
UK, aimed to constantly “reach out beyond its own criminal justice organizations and to
activate crime reduction activity on the part of individual citizens, communities, commercial
concerns and other elements of civil society” (Garland, 2001, p.17). This idea brings back to
the main theory that this thesis centers around, namely the responsibilization practice which
Garland introduced in 1996, which in his later work (i.e. Culture of Control, 2001) he applies
it more detailed to the existing policies and practices. The very premise that crime control
was a responsibility that belonged solely to those governmental organizations whose role was
in the criminal justice field had changed in contemporary (British) society. The lines between
the role of the private as well as the public sector become blurrier than ever, because the
public sector undergoes the practice of remodeling its primarily functions so that it merges
with those of the private industries (Garland, 2001, p.18).
The following chapter will analyze and apply the responsibilization practice firstly in a broader
sense, namely to generally speaking online crime relating it to a possible collaboration
between the public and the private sectors and explain what this collaboration implies.
Consequently, Garland’s practice will be applied to social media companies which will set the
scene to further discuss and analyze the main question of this thesis, namely the
developments of Twitter’s actions in combating online terrorist content over time.
18
3. The Role of the Internet and Social Media Companies in dealing
with online illegal content
3.1 The current state of the internet and (some) dilemmas in the field of online crime
control
When crime is inevitable and problematic to regulate as it is, it is even harder to regulate it
when perceived as ‘borderless’. Every nation-state abides to its own laws and regulatory
body, thus when crime occurs, depending on the state’s jurisdictions, it is dealt with
accordingly. But dealing with online crime is harder to regulate because of the trans-
nationality aspect of the issue. Important to emphasize is that under the term of online crime,
this thesis will predominantly refer to the existence of online terrorist content and
propaganda, and not the broad meaning of crime per se.
Every nation state abides to its own rules regarding the possible content that can or cannot
be shared on the internet. The internet as we know it is a place where free speech and
freedom of expression as well as freedom to access information is essential, but not
unlimited. Thus, when unlawful content appears on the internet, based on the respective
state’s legislation and jurisdiction it is dealt with and prosecuted accordingly. There is an
ongoing debate among scholars on the topic of the possibility of an international internet
governance in dealing with online. Important to acknowledge is the fact that currently, such
governance is not existent, but discussion on the topic of an international regulation,
generally speaking becomes more and more present. For example, since the Convention on
Cybercrime of 2001 which was created under the auspices of the Council of Europe, it can be
perceived that there is such type of governance when referring to the European Union
specifically. Although it is not labeled as an international internet governance per se, which is
perceived by scholars to be universally applicable, the Cybercrime Convention of 2001
stresses on an international cooperation to reduce cybercrime. Namely, the Convention
emphasizes that the “Parties shall co-operate with each other, in accordance with the
provision of this chapter, and through the application of relevant international instruments on
international co-operation in criminal matters, arrangements agreed on the basis of uniform
or reciprocal legislation, and domestic laws, to the widest extent possible for the purpose of
investigations or proceedings concerning criminal offences related to computer systems and
data, or for the collection of evidence in electronic form of a criminal offence” (Council of
Europe, Convention on Cybercrime, 2001, p.14). Under the Convention, states’ cooperation
occurs in terms of offering ‘mutual assistance’ as comprehensively as possible with regards
to the investigation of (possible) criminal offences related to data theft and computer
systems, as well as pooling collective effort in obtaining ‘evidence in electronic form of a
criminal offence’ (p.15). Relevant for this thesis is the fact that the European Council’s
Convention on Cybercrime does not include the presence of terrorist content, speech and
19
propaganda on the internet under the prosecuted crimes, but the focus is more on data theft,
child pornography, copy-right sanctions and so on.
Along the same line of reasoning, Mittal & Sharma (2017) provided a review of an
international legal framework to combat cybercrime, starting from the premise that
nowadays, in order to keep the unlawful content and the increase of cybercrime under
control, an international convention is highly necessary. The complexity of today’s cybercrime
is “(…) further complicated by the very nature of the cyber space manifested in anonymity in
space and time, rapidity of actions (…), non-attribution of actions and absence of international
borders” (Mittal & Sharma, 2017, p.1372). Furthermore, the authors stress on the idea that
the only available instrument is the above-mentioned Convention on Cybercrime
implemented by the Council of Europe (2001), which can be only applied to the region of
Europe, but non-members states such as the “the USA, Australia, Canada, Israel, Japan have
also ratified and signed” the convention which conveys even more legitimacy to this tool
available in the global fight against cybercrime (Mittal et al., 2017, p.1372). The two propose
with their research that “the Council of Europe’s Convention on Cybercrime should be the
baseline for framing an International Convention on Cybercrime” (Mittal et.al, 2017, p.1372).
The discussion about this issue of an international form of governing the internet effectively
is still very present because the presence of terrorist speech on the online medium continues
to be strikingly high. In his article titled ‘Ending the Cyber Jihad’ B.R. Davis (2006) stressed on
the issue that “Limiting the ability of terrorist networks to use the Internet as an operational
platform is one of the most significant challenges that lawmakers and national security
experts face” (Davis, 2006, p.125). He proceeds in arguing that those international
organizations that are responsible for regulating the internet in terms of decreasing the
means of terrorist communications should be in collaboration with sovereign states in
diminishing the threat. As an example of such international organization that aims at
regulating the internet, he introduces the Internet Corporation for Assigned Names and
Numbers (‘ICANN’), which is one of the main organizations that holds responsibility “for
Internet Protocol (IP) address space allocation, protocol identifier assignment, generic (gTLD)
and country code (ccTLD) Top-Level Domain name system management, and root server
system management functions” (icann.org/general) and is fully dedicated to ‘preserving the
operational stability of the internet’. Thus, several scholars, among which Davis (2006) as
well, have concluded that maybe, an international internet governance might be the answer
to being able to prosecute the unlawful content existent on the internet and on social media
platforms. Along with the regulatory incentives of ICANN, Davis (2006) stressed that the U.N
General Assembly has engaged with the pressing issue of cyber terrorism crimes, hence the
General Assembly Resolutions 57/238 from 2003 and 58/199 from 2004 aimed at creating a
universally applicable ‘culture’ of cyber security (Davis, 2006, p.164).
20
Furthermore, research on the issue of a broad, international regulatory body of the internet
stresses that a cooperation between the private and the public sectors could be an optimal
solution in decreasing online crime. This regulatory body, which some refer to as, or frame it
as an international internet governance (Callahan, 2017) could be perceived as a utopic
scenario from various points of view, but at the same time highly criticized from other ends.
What current literature suggests related to the possibility of establishing such governance,
and what exactly this governance means refers to a collaboration between the private and
the public sector in bearing responsibilities with regards to instituting regulatory policies
related to the management of the internet (Callahan, 2017). From the various academic
sources that have been analyzed throughout this study, still a debate on the definition and
possibility of achieving such governance is to be seen, due to the many variables involved and
issues regarding (data) privacy regulations and boundaries that each nation state abides to.
Moreover, this type of governance with respect to disseminating online crime (e.g. online
terrorist content) is hardly achievable due to the fact that there is no single definition on what
terrorism is, because of it being such a contested concept, as already discussed. What
academics and policy makers consider crucial in making this international internet
governance a reality is to create international unanimous definition of terrorism that is “broad
enough to receive consensus from the international community, yet specific enough to be
enforceable” (Callahan, 2017). Callahan further elaborates on this issue that such definition
should rather include concrete examples of what constitutes terrorism than for example
aiming at drafting “an overarching definition on the satisfaction of each individual nation-
state” (Callahan, 2017), fact that seems highly implausible to become a reality in the near
future. What needs to be further considered is that besides the aforementioned issue, if not
defined properly, such governance could lead to even more problems on the line of restricting
a wide variety of expressions. This could occur in the case where clear guidelines between
what is allowed and what is considered illegal content are not accordingly implemented.
Because it is such a debated topic, the aim is to present a wide range of opinions before
accurately taking a position whether such an approach to govern the internet could
effectively reduce online crime (i.e. terrorist online content). An interesting stand was
proposed by Goldsmith (2019) who critically assessed previous theories regarding the
sovereignty of the internet, whereby he concludes with the idea that internet regulations that
occur specifically in one nation can have definitory repercussion on how users from a different
nation experience the web (Goldsmith, 2019). He further states that it is hardly possible to
achieve full cooperation, whereby under cooperation he means “mutual restraint in order to
achieve larger reciprocal benefits” (p.823) between sovereign countries with respect to the
governance of the internet because “it takes painstaking negotiations about how each nation
will restrain itself, written specifications about what restraints each side assumes, penalties
for noncompliance, verification mechanisms, and the like. And even then, nations often fail to
achieve or sustain cooperation” (Goldsmith, 2019, p.823). For example, current news sources
show that Russia plans to detach itself from the global internet, which is something no other
21
country has tried before, namely “it’s going to test whether it can disconnect from the rest of
the world electronically, while keeping the internet running for its citizens” (Jee, 2019). If
Russia indeed manages to accomplish this internet detachment, it could potentially “help
Russia resist existing sanctions from the US and the EU, and any potential future measures”
as well as increase Russia’s “long tradition to control the flow of information between citizens”
(Jee, 2019). Thus, this example alone, not to mention the situation China is undergoing with
regards to internet censorship, is considerably decreasing the real possibility of an
international or global internet regulatory body/governance.
Therefore, looking through Garland’s critical lenses and simultaneously having the practice of
responsibilization in mind, it seems that the merge of the private and the public spheres in
combating online crime is still under thorough debate. As Garland has stated in his ’96 paper,
although looking at the practice and making non-state actors responsible in the field of crime
control is something that occurs in todays’ contemporary society, the actual outcomes are
not necessarily the desired ones. The interests of the private sphere will likely never be in
complete harmony with those of the public, namely having the possibility of being able to
access (unrestricted) information, and the right to freedom of expression but at the same
time to fight the threat and harm done by cybercrime, hate- and terrorist speech on the online
medium. Although some believe that the internet could be restrained under one governance
that makes all actors equally responsible in the process of disseminating online crime, strong
criticism still shadows the reality of this practice.
22
3.2 Responsibilization of the Social Media Companies
The internet is a place where unregulated content is often to be found, therefore the need to
‘responsibilize’ all the actors involved in sharing this content is perceived to be necessary.
With the worldwide increase in the use and popularity of social media platforms, there is no
surprise that terrorists use the internet and consequently social media platforms as a means
to spread their content and recruit new members. Moreover, besides terrorist content and
propaganda, social media companies also have to deal with a manifold of unlawful content,
such as (but not limited to) child pornography, extremist- and hate speech, discriminatory
and racial content that is as hard to regulate as the terrorist content online. For example,
research shows that after the crisis that arose in Syria in 2015, ISIS has been actively using
social media platforms such as Facebook, Twitter and YouTube to disseminate its ideology to
their world-wide sympathizers (Awan, 2017). In his study, Awan analyzed “100 different
Facebook pages and 50 Twitter user accounts which generated over 2050 results” which
confirmed his initial hypothesis, namely that “online hate is being used by groups such as ISIS
for a variety of reasons such as recruitment and propaganda” (Awan, p.138-139).
There is a constant debate and effort between companies and state’s organizations to
promulgate and effectively regulate the internet, but due to the state’s inability to cooperate
with private organizations that might have the available resources in helping to combat online
crime (on social media), the attempts to better police the internet and social media as a whole
have been perceived to be unsuccessful (Wu, 2015). The discussion about state’s
unwillingness, generally speaking, in better policing the internet with respect to the vast
illegal content present has been touched upon by other researchers as well, whereby Mittal
et al. (2017) state in their review of the efforts to combat online crime that “the very nature
of the internet-governance structure, titled heavily toward private players, leaves very little in
the hands of the States. The efforts for strengthening international co-operation to combat
cybercrime, including the Convention (here the discussion is brought back to the Council of
Europe’s Convention on Cybercrime, 2001), have miserably failed to tap this private element
of the governance mainly due to the conflict of private and public interest (Mittal et al., 2017,
p.1373). The emerging discussion is whether the States believe that they should take a step
back when dealing with online crime and further transfer the main responsibility to the social
media platforms themselves. This debate will be thoroughly discussed in the sections below.
With their emergence, social media platforms were perceived to be very innovative as they
allowed for instant communication between users world-wide and were basically formed of
any internet platform that allows “communication through images, videos or messages” (Wu,
2015). Important to mention is that the content on the social media platforms can be posted
by means of a username which offers the trait of (partial or full) anonymity of the user and
these images, messages and videos are not only target to a specific person per se but can be
publicly posted. Research shows that after the launch of Facebook and Twitter, the use of
23
social media grew significantly and, especially boomed after their first years of activity
because it became very practical for people to “suddenly be able to quickly post statuses or
‘tweet’ messages as soon as something happened” (Wu, 2015). Looking through available
research and statistics on the usage and growth of social media platforms, it seems that in
2018 Facebook was still the most accessed social media platform world-wide, with 2.27 billion
active users on a monthly basis, followed by YouTube (1.9 billion users), Instagram (1 billion
users) and Twitter (326 million users) (Sharma, 2018). As a result of this growth in social
media’s popularity overall, there is no surprise that terrorist use the internet with the same
ease as the average internet users especially because the internet and its social media
platforms are perceived as “cheap, pervasive, anonymous, unregulated and uncensored”
(Cilluffo, Cardesh & Whithead, 2007). This perception becomes harder and harder to discredit
with the increase in the illegal and terrorist content online, but as it will be portrayed in the
forthcoming section, social media companies are working to diminish this issue from further
evolving.
Nonetheless, current developments displayed progress in the area of what action has been
taken on social media with respect to the issue of online terrorist content as well as more
generally speaking regarding the overall illegal content that is to be found. Not only social
media companies have acknowledged their role in acting more responsible with respect to
the content that it is shared on their platforms, but also the involvement of supra-national
organizations such as the European Union had an impact in this developmental process and
will be discussed in the following sub-chapter with respect to online terrorist content. At the
same time, it can be discussed whether this development in the acknowledgment of the social
media companies of their new role (i.e. a more responsible role) was in fact a reaction towards
the outside pressure put by both the clients and users of these platforms as well as state’s
organizations and supra-national bodies. This discussion is hard to be linked with actual
(academic) facts, because both sides are to be seen as valid.
In his paper “The role of internet intermediaries in tackling terrorism online” (2017), R.C.
Almagor stresses on the role of ‘social networking sites’ (p.427) in effectively fighting
terrorism online. Although Almagor notes that his article is mainly focused on Islamic
terrorism, the reasoning behind his arguments are applicable to other categories of terrorism
as well. His main argument throughout the article is that social media companies shall engage
in a more proactive approach in dealing with the unlawful content on their networks in order
to have a real stand in the fight against modern terrorism, which “relies heavily on the
internet; both modern terrorism and the internet have common features that promote close
relations: they are global and diffusive, they do not require one center, their operation does
not require a very large budget, innovation is important to sustain both, and their operation
can be carried out through clandestine means” (Almagor, 2017, p.428). His proposal regarding
a shift from the current passive role of the social media companies to more of a proactive one
is central to his article, whereby he stressed that this all breaks down to social media
24
companies’ willingness to change and (re-)prioritize their investments (Almagor, 2017). The
main argument on behalf of the social media companies’ passivity with regards to their
assumed role is that it is simply impossible to screen all the available content shared on these
networks and that the available manpower is not enough. The example of YouTube is here
presented, whereby emphasis is put on the fact that “every second, one hour of video is
uploaded to YouTube. If liability concerns compelled YouTube to examine each video before
allowing it to be posted, YouTube could not continue to operate as an open forum for user
expression” (Almagor, 2017, p.432). One might argue that more of a proactive approach on
behalf of the social media companies themselves in dealing with online illegal content is
therefore the answer. It all breaks down to the idea of social media companies’ willingness to
adopt a proactive role with regards to combating illegal content, because generally speaking,
these platforms are indeed proactive in other respects, for example customer service, and
other branches were employees are physically working for the company. Thus, the idea
brought to the fore by Almagor is that social media companies should display more
willingness to invest in the problematic areas, such as combating online terrorist content that
is highly present on their platforms.
Shifting his focus more specifically on Facebook, where hundreds of posts and comments are
shared every hour, Almagor stresses that “Facebook has adopted a policy of continued
passivity on the whole, mitigated by activity when a request is made. This policy (according to
one of his main sources, Milner, whom he thoroughly interviewed regarding Facebook’s
policies at that time) is far more effective than monitoring vast amounts of content. There is
no need to monitor many millions of posts when only a small number of these posts are
problematic” (Almagor, 2017, p.433). Thus, as important as the issue of online terrorist
content and unlawful content in general seems to be for everyone, Facebook was hesitant in
allocating funds to the task of content monitoring specifically and maintained a passive stand.
The main issue that is to be seen here, is that it is mainly due to social media companies’
unwillingness to allocate the necessary funds in actively monitoring the content on their
platforms that leads to their reluctance to fully commit to the battle of fighting online
terrorism (Almagor, 2017). Facebook already uses sophisticated algorithms that tailors the
information that appears on each user’s timeline according to its own preferences and
interest, therefore this research suggests that Facebook engineers should develop a new
algorithm that could effectively spot any type of terrorist and extremist dangerous content
(p.432). The limitations of such algorithms are also made very clear, whereby Almagor
stressed that having people monitoring this content is far more effective than using
algorithms, because messages in general are very sensitive to the context they are put into,
but nonetheless, a new investment in this respect, namely developing even more accurate
algorithms, could be a great start before Facebook decides in investing in manpower for
inspecting the available content (Almagor, 2017). Relevant for understanding the
developments that occurred since Almagor’s research is that Facebook started to control
more in a proactive manner the content that is shared on the platform, whereby in 2018
25
“Facebook removed 14 million pieces of terrorist content” and thoroughly expanded their
algorithms to detect posts that are in violation of the company’s policies, which work across
19 different languages (Coldewey, 2018). Thus, although Almagor (and not only) stressed on
the necessity of investing in human capital in detecting unlawful content online, with the rise
of technology it is therefore possible to make use of such innovative algorithms that could
effectively detect terrorist content. However, one can still emphasize on the ‘merge’ of
human labor alongside these algorithms, because of the simple fact that some content might
be phrased in a more complex manner so that it needs the human capability of judging
whether it is indeed illegal content or not.
The concluding remarks regarding the issue of social media companies adopting a more
proactive stand in the fight against terrorist speech online breaks down to the idea that,
generally speaking, there are many methods to make the detection of illegal content online
possible, but it is a matter of the allocation of resources in the precise ‘troubled’ areas. Many
social media companies are hesitant to allocate these resources in combating the unlawful
content available only until pressured by other companies, supra-national organizations or
even the users themselves: “They relieve themselves of responsibility to combat antisocial and
violent speech to the best of their abilities; most internet intermediaries shy away from
assuming such responsibility as it is the easier and more profitable path to purse” (Almagor,
2017,p.440). Therefore, this failure constitutes more of a question of will to monitor illegal
content rather than a question of the actual ability of these companies in doing the ‘right’
thing (p.436). This brings to the fore another discussion, namely why would social media
companies themselves engage in allocating funds in the area of combating online terrorist
content if state authorities also lack the willingness to invest in this area of expertise. The
answer to such discussion is difficult to achieve and could itself be the core of an entirely
different research, but in order for effective measures to be taken both by state authorities
(e.g. international bodies) and social media companies, incentives are necessary. Research in
this area provided information that for action to be taken on behalf of the social media
companies themselves, outside pressure is most likely needed. Social media companies’ main
target is not necessarily to combat illegal content, or to fight the ‘war on terror’, but rather
to provide the necessary means for their users to have access to instant communication and
such.
As the previous section focused predominantly on the (perceived) need for cooperation
between the public and the private sectors in countering online crime, it is important to
emphasize that the need for such cooperation and collaboration has been acknowledged by
social media companies themselves. The following example will illustrate an effective
collaboration between private and public organizations with the aim of sharing expertise and
striving towards achieving the common goal of fighting terrorist presence online. In a public
blog post made in June 2017, Twitter announced the formation of the Global Internet Forum
to Counter Terrorism along with Facebook, Microsoft and YouTube (Global Public Policy
26
Twitter, 2017). The announcement acknowledges the challenges faced by these four
companies because of the widespread presence of terrorism content (e.g. propaganda) and
violent extremism speech online. Therefore, the four big internet players of the social
medium have collaborated and “developed policies and removal practices that enable (us) to
take a hard line against terrorist or violent extremist content on our hosted consumer services.
We believe that by working together, sharing the best technological and operational elements
of our individual efforts, we can have a greater impact on the threat of terrorist content
online” (Global Public Policy Twitter, 2017). The Global Internet Forum to Counter Terrorism
is therefore an example of cooperation between private companies, such as the above-
mentioned social media companies and other small tech companies, “civil society groups and
academic, governments and supranational bodies such as the European Union and the United
Nation” (Global Public Policy Twitter, 2017). Unfortunately, not much data is available on the
effectiveness of the above-mentioned cooperation. The Global Internet Forum to Counter
Terrorism appears to be involved in funding further research in the area of countering online
terrorist content and consequently developing new technology to disrupt the terrorist agenda
online (GIFCT, 2018).
Connecting the aforementioned information to Garland’s responsibilization practice, one
could state that the Global Internet Forum to Counter Terrorism could, in theory, be a positive
example of the application of Garland’s conceptualization. But due to the fact that little data
is available in terms of indicating clear changes in combating online terrorist content from the
above-mentioned initiative, one can also look at it more critically and assess that these
‘newly’ emerging enterprises to combat terrorism online might after all have their own aims
to pursue, i.e. giving the impression that these big internet players are indeed cooperating,
when in reality the cooperation does not occur as transparent as individuals would like to
think. As Garland critically assessed in his ’96 work, there are situations where the needed
security, in this situation being the effective outcome of the cooperation between the
members of the GIFCT in combating terrorism online, is based “on market forces, rather than
according to need” (Garland, 1996, p.463).
27
3.3 EU-level initiatives with regards to combating online terrorist content
To further apply the theoretical framework of Garland’s (1996) responsibilization practice to
the issue of online terrorist content on the social media platform of Twitter, the present study
will examine some of the European Union’s initiatives with regards to combating online
terrorist content. More specifically, the aim is to analyze current proposals and regulations
put forward by the European Union and EU-level agencies, such as the European Union’s law
enforcement agency Europol, with regards to combating the dissemination of unlawful
content and terrorist content on the internet. Lastly, this section will also present some
perspectives of NGO’s that are active in this sphere in order to illustrate the counter
arguments that have been brought upon the EU’s institutions in dealing with online unlawful
content.
Before going in detail with the European Union’s most recent initiative with regards to the
prevention of the dissemination of terrorist content online which came to life in 2018, it is
important to understand the previous initiatives that led to the EU Commission’s most recent
actions with regards to the issue at hand. The European Unions’ law enforcement agency,
Europol, was perceived as active in the field of countering (online) terrorism. With regards to
online terrorist activity, on the 10th and 11th of April 2017, Europol hosted the first Conference
on Online Terrorist Propaganda and released a report based on the various discussion of the
Europol’s’ European Counter Terrorism Center (ECTC) on topics pertaining to the online
terrorist hazard. During the conference, highly debated was the Islamic State’s (IS) popularity
and well-planned strategy on the online medium. The European Counter Terrorism Center
(ECTC) stressed on the necessity to tackle this challenge, tackling that can be done by means
of the responsibilization of the parties involved, or how the ECTC has put it: “… can only be
achieved through a coordinated and systematic action bringing together law enforcement,
public institutions and the private sector” (Europol.europa.eu).
Likewise, the European Union Internet Referral Unit (EU IRU) based at Europol’s ECTC has as
a main aim to detect and investigate “malicious content on the internet and in social media”
(Europol/EU IRU). Europol’s Internet Referral Unit is comprised of a team of experts with
diverse knowledge in the area of counter-terrorism, ranging from “experts in religiously
inspired terrorism, translators, information and communication technology developers and
law enforcement experts in counter terrorism”, which shows the wide availability of expertise
at hand, to aim at combating the issue of the dissemination of terrorist content online. The
core tasks of the EU IRU are the following:
“Supporting the competent EU authorities by providing strategic and operational
analysis;
Flagging terrorist and violent extremist online content and sharing it with relevant
partners;
28
Detecting and requesting removal of internet content used by smuggling networks to
attract migrants and refugees;
Swiftly carrying out and supporting the referral process, in close cooperation with the
industry”
(Europol.europa.eu/eu-internet-referral-unit-eu-iru)
In terms of the effectiveness of the IRU, it is stated that in December 2017, on average 86%
of the content that has been flagged has been removed, content that was disseminated
“across over 80 platforms in more than 10 languages” (Europol/EU IRU, figures of December
2017).
Now moving to more recent EU level initiatives, in 2018, the European Commission submitted
the ‘Proposal for a Regulation of the European Parliament and of the Council on Preventing
the Dissemination of Terrorist Content Online’ (EC, 2018) to emphasize the great need of
action on behalf of the European Union against terrorist content online. What the commission
considers illegal terrorist content corresponds with the definition drafted by the EU Directive
2017/541, namely “information which is used to incite and glorify the commission of terrorist
offences, encouraging the contribution to and providing instructions for committing terrorist
offences as well as promoting participation in terrorist groups” (EC, 2018, p.3-4). More
specifically, the European Commission’s Proposal states that:
“This Regulation seeks to provide clarity as to the responsibility of hosting service providers
in taking all appropriate, reasonable and proportionate action necessary to ensure the
safety of their services and to swiftly and effectively detect and remove terrorist content
online, taking into account the fundamental importance of the freedom of expression and
information in an open democratic society” (EC, 2018, p.2).
The European Union’s proposal corresponds with the EU Directive 2017/541 by proposing as
a main aim to harmonize the legislations of each Member State with regards to criminalizing
and prosecuting (online) terrorist offences. Furthermore, as Article 21 of the Directive on
Combating Terrorism emphasizes that Member States are responsible for taking the right
measures in guaranteeing the removal of the online terrorist content, the Commission’s
Proposal states that “(it) covers not only material inciting terrorism but also material for
recruitment or training purposes, reflecting other offences related to terrorist activities” (EC,
2018, p.3). This is as well covered by the EU Directive, whereby both state that each Member
State has the freedom in choosing what measure needs to be taken. Among these
(preventative) measures, it is proposed for Member States to introduce removal orders which
can be issued by the competent bodies of authority in the respective Member State under
the form of a judicial or administrative decision. In such cases of removal, the hosting service
providers are obliged to remove (or at least restrict the access to) the respective content in
the time span of an hour since the decision was officially taken and adopt proactive measure
29
in accordance with the level of risk linked to the removal of the specific terrorist content.
Among the proposed proactive measures, the Regulation includes “deploying automatic
detection tools” (p.4). Moreover, the Regulation at hand obliges Member States to guarantee
that their state authorities have the necessary means available to intervene when online
terrorist content is to be found. Member States are also “obliged to inform and cooperate
with each other and make use of any channels set up by Europol to ensure coordination with
regards to removal orders and referrals” (p.4). In order for the Commission to ensure that the
hosting service providers and consequently the Union’s Member States effectively implement
the proposed Regulation, penalties are to be applied in particular events. For example,
Member States should adopt “rules on penalties, including, where appropriate, fining
guidelines” (p.21) in the case where hosting service providers fail to abide repeatedly to the
obligations of removing or disabling online terrorist content within the amounted hour since
the removal order was received.
The Commission acknowledges the trans-nationality of the issue at hand and stresses that
“given the cross-border dimension of the problems addressed, the measures included in the
proposal need to be adopted at the Union level in order to achieve the objectives. The internet
is by its nature cross-border, and content hosted in one Member State can normally be
accessed from any other Member State” (EC, 2018, p.5). Terrorist content online, be it
specifically on social media or on generally speaking the online medium has the aim “to incite
individuals to carry out terrorist attacks, including by equipping them with detailed
instructions on how to inflict maximum harm. Further propaganda is commonly released after
such atrocities whereby they glorify in these acts, and encourage others to follow” (EC, 2018,
p.8). Thus, this regulation proposed by the European Commission seeks to protect the public
security with the aim of diminishing access towards such content that indorses numerous
violations and posits a real threat. The potential negative impact that this proposal could have
in relation with the fundamental human rights can affect the following areas:
a. “Rights of the content provider: right to freedom of expression; right to protection of
personal data; right to respect of private family life, the principle of non-discrimination
and the right to an effective remedy;
b. Rights of the service provider: right to freedom of conduct a business, right to an
effective remedy;
c. Rights of all citizens: and rights to freedom of expression and information” (EC, 2018,
p.8)
As acknowledged by the European Commission, the present proposal could potentially have
a negative impact on some of the basic and fundamental rights. This fact was brought to the
fore by several international non-governmental organizations, such as EDRi (European Digital
Rights), which is perceived active in the field of defending the freedom of pression and rights
on the online medium. On the 18th of March 2019, EDRi, along other NGOs drafted an open
30
letter towards the Members of the European Parliament with respect to the regulation on
terrorist content online which “endangers freedom of expression” (EDRi, 2019, Open letter).
The main points of criticism in the letter were around the issue of the definitions of terrorist
content and of hosting service providers and the “unworkable deadlines for content removal”
which is perceived as being extremely shorts for hosting service providers to be able to
comply with the removal orders. With this short and unrealistic span of one hour, EDRi
stressed that it could lead to the removal of legal content online due to the time pressure on
behalf of the enterprises obeying to the orders. In the open letter, the NGOs stress that “this
draft Regulation risks undermining current efforts and could have a strong impact on
European citizens’ fundamental rights” (EDRi.org, 2019, Open Letter).
Henceforth, the above-mentioned proposal aims at operating as a regulatory means with
regards to terrorist content online. Although some regulations are already in place, whereby
states and social media companies have various procedures and policies that are
independently implemented by nation states, the EU’s aim is to harmonize and implement all
of the above as a standard for all the companies operating in the European Union. As stressed
by the European Commission, the misuse of the internet and social media platforms have
serious consequences not only for the service providers that are accommodating such
content on their platforms, but for the average users and generally speaking for the society
as a whole. These consequences can relate to the distrust between the service providers and
the users that nonetheless lead to more severe consequences such as possible (permanent)
damages to the business as a whole. Therefore, it is of utmost importance to responsibilize
these online service providers in being aware on the shared content on their platforms in
order to “protect their services from misuse by terrorists and to help tackle terrorist content
disseminated through their services” (EC, 2018, p.13-14).
As the responsibilization practice is mainly based on the shared responsibility of the public
and private agencies in controlling crime (Garland, 1996), one can state that the European
Commission is taking stands in applying this practice with the discussed proposal. The
European Commission aims with the 2018 proposal to standardize the existing rules and
regulations regarding the online content and oblige all the Member State to obey to this, as
well as urging social media companies themselves to take a more proactive role with regards
to the issue at hand.
In concluding this section of the present thesis, Garland’s conceptions on the practice of
responsibilization (1996) might seem along the same line of reasoning with the European
Commission’s proposal. Although not implemented yet, and still at the level of proposal, this
can be seen as a way the EU is ‘passing’ the responsibility towards the hosting service
providers in obliging to undergo the presented measures in combating the dissemination of
online terrorist content. The link with what Garland has stated in his ’96 work, namely that
states are more inclined to adopt more ‘punitive measures’ that are easier to be delivered,
31
can to a certain extent be stated about the European Commission’s proposal as well. Criticism
regarding the ‘unrealistic’ one-hour deadline for content removal has been emphasized as
well as the lack of properly defining the concepts of core interest to the proposal. Critical
discussions regarding what the exact role of these companies should be is also widely present
in the public debate, therefore it is at the EU Commission’s latitude the extent to which it will
be reacted to the present criticism and whether the European Parliament will adopt the
Proposal as it was drafted in 2018 or make amendments. Important to note with respect to
the issue of responsibilization is that Garland could not have foreseen almost two decades
ago, in the late 1990’s, how social media companies would grow and develop and ultimately
become such important and big players in today’s society.
32
3.4 Developments in Twitter’s practices with regards to terrorist content
After assessing both the private and the public spheres, as well as what social media
companies and EU-level organizations are doing in combatting online crime by having the
responsibilization practice in mind, it is time to center the remaining of this thesis in the
direction of the core research theme, namely the developments in Twitter’s role with regards
to terrorist content. Furthermore, these developments will be assessed in light of the
responsibilization practice and analyze whether Garland’s critical conclusions are applicable
to the present issue, fact that will be thoroughly discussed in the conclusion section. Some of
the main developments in Twitter policies with regards to terrorist presence on the social
media platform will be explained by analyzing their official terms and conditions. Afterwards,
academic research and news articles will be evaluated with regards to Twitter’s actual
practice.
Central in understanding Twitter’s developments with regards to combatting terrorist
content on its platform, it is important to see the evolution in Twitter’s Terms of Service,
available on the Twitter website from 2009 until the most current form of these terms from
2018. Clear general developments can be seen from the first versions of these terms of service
until the most current one, firstly with respect to the length of the documents and secondly
with respect to the elaborations regarding each of the sections. The first ten versions of these
terms (starting from 2009 until January 2016) portrayed no difference in the rules and
regulations based on the country the user is accessing the social media platform from,
whereby from September 2016 up until today there are specific rules for the United States
and for users from the European continent. Interesting to see is the fact that Twitter does not
present the rules and regulations applicable beyond the European continent and the USA on
the official website. This can be perceived as a limitation with regards to the rules and
regulation of the Arabic countries and China for example, which can either be due to language
issues or a different IP address is needed to access those specific terms and conditions.
Although these rules are overlapping, it is important that Twitter acknowledged the
differences in terms of laws, rules and regulations with respect to data privacy between
Europe and the USA. Moreover, starting from the first version of the Twitter rules until the
most current ones, little is changed in terms of Twitter’s perceived responsibility with regards
to unlawful content. Under the first general conditions it is stressed that, first of all, the user
has full responsibility of all the data and information posted on the platform and second of
all, it is stated that “We may, but have no obligation to, remove Content and accounts
containing Content that we determine in our sole discretion are unlawful, offensive,
threatening, libelous, defamatory, obscene or otherwise objectionable or violates any party’s
intellectual property or these Terms of Use” (Twitter.com, Version 1, Terms of use, 2009). The
same principle is to be found under the majority of the versions, with a slight difference in
phrasing, but nonetheless it is important to stress that Twitter claims no obligation or liability
33
in taking any direct actions with regards to the content online, even though under some
circumstances the platform will remove inappropriate content.
Looking at the current public security measures on Twitter’s website (Twitter.com, 2018),
there is a high emphasize on a zero-tolerance policy against any type of discriminatory
speech, be it racially, sexually or religiously, as well as any content related to the promotion
of terrorism. A specific section related to violent extremist groups may be found under the
rules and regulations section, which states: “You may not make specific threats of violence or
wish for the serious physical harm, death, or diseases of an individual or group of people. This
includes, but is not limited to, threatening or promoting terrorism. You also may not affiliate
with organizations that, whether by their own statements or activity both on and off the
platform- use or promote violence against civilians to further their causes” (Twitter Help
Center/rules-and-policies/violent-groups). As a consequence of the above-mentioned
situation taking place, the respective account(s) will be permanently suspended. Under
violent extremist group, Twitter developed a list of criteria that serves at understanding what
the company regards as violent extremist groups, therefore when all of the following criteria
are met, actions (e.g. permanent suspension of the account(s)) will be taken. The criteria put
forward by Twitter are:
“identify through their stated purpose, publications, or actions as an extremist group”
“have engaged in, or currently engaging in, violence (and/or promotion of violence) as
a means to further their cause”
“target civilians in their acts (and/or promotion) of violence”
(Public Manual Rules and Policies Twitter Help Center/rules-and-policies/violent groups)
Besides these criteria, Twitter stresses that first of all, this policy does not apply to any military
or governmental bodies and exempted are those groups who are engaging in peaceful
resolutions as well as groups with a representative body elected through democratic
practices. Secondly, there is also certain behavior that Twitter considers when establishing
whether an account is affiliated with a violent extremist group, such as:
“stating or suggesting that an account represents or is part of a violent extremist
group”
“providing or distributing services (e.g. financial, media, propaganda) in furtherance
of progressing a violent extremist group’s stated goal”
“engaging in or promoting acts for the violent extremist group”
“recruiting for the violent extremist group”
(Public Manual Rules and Policies Twitter Help Center/rules-and-policies/violent-groups)
In conclusion, Twitter states that if the above-mentioned criteria are met and such behavior
is spotted by both first person and bystander accounts, those accounts belonging or affiliated
34
with violent extremist groups will be permanently suspended (The Twitter Rules). What will
be further discussed in the following sections is that, although Twitter is becoming more and
more active with suspending accounts, research shows that the risk (and the practice) of new
emerging accounts being created is seemingly high.
Twitter communicates the changes in the global public policies, as well as updates on current
matters the company is working on or plans to adopt to the public. These communications
take place under the form of the ‘Twitter Blog’, which can be accessed publicly from the main
page of the platform. In 2016, a blog post titled “An update on our efforts to combat violent
extremism”, Twitter offers insights and statistics on the suspended accounts, the way in which
the company responds to reported accounts and the overall progress in combating this issue
on the platform. Twitter stressed in the blog that it is an ongoing developing process in
improving its technology and finding viable ways to combat the issue in such a manner that it
will survive the ‘test of time’. The company is in collaboration with other organizations and
experts and stated that “there is no one magic algorithm for identifying terrorist content on
the Internet” but they sustain the need of utilizing and developing new forms of technology
to help in identifying such accounts (Twitter Blog, 2016). In 2017, Twitter released data in a
public statement for a well-recognized online newspaper (The Guardian, 2018) with one of
their biannual transparency reports. In this report Twitter acknowledges the intense usage of
the social platform for wrongful purposes and stated that in a span of six months (between
July and December 2017) the company banned approximatively 270.000 accounts world-wide
for promoting terrorism and various extremist content. Worth mentioning is the fact that
emphasis is put on the debate between the limits of free speech, especially whether legally
speaking there can be such limits to begin with and the “complex relationship between private
companies and the public interest” sparked from the discussion whether suspending terrorist
accounts on social media is indeed an effective approach countering the extremist activity
online (Berger & Morgen, 2015, p.2).This goes back to the previous discussion in section in
3.2 where Almagor (2017) stresses that the effectiveness of such algorithms could not be
compared with human beings checking the validity of the content, due to the importance of
the context in which these messages appear. Thus, not having individuals looking at these
messages before removing or suspending might lead to both false-positive and false-negative
results that will not be beneficial for anybody in the end. By relying solely on (new) technology
and algorithms to detect illegal messages on the platform, it could be very difficult to state
accurately whether the content is actually illegal or not because it is a very fine line even for
experts to take stand on what exactly is incitement to terrorism and what is not.
Other research was based on the effectiveness of the suspension of Twitter accounts whereby
the overall sentiment was that it is quite ineffective as more accounts emerge in the
aftermath of the suspended ones. Berger and Morgan developed a comprehensive study in
2015 with the goal of creating an overview of The Islamic State’s success in exploiting the
social media medium by sending propaganda and aiming to reach people ‘vulnerable to
35
radicalization’, whereby the focus of their study is solely concentrated on Twitter (Berger &
Morgen, 2015). The research sample was one of 20.000 ISIS related Twitter accounts and
statistical data was collected in 2014, between the months of September until December
(p.54). At the same time Berger & Morgen collected their statistical data, Twitter led “an
aggressive campaign of suspension” (p.55) whereby one important finding was that at the
beginning of the research “the primary ISIS hashtag – the group’s name in Arabic- went from
registering in 40.000 tweets per day or more around the time suspensions began (September
2014), to less than 5.000 on a typical day in February” (p.56). This finding then (partially)
supports the effectiveness of account-suspension measure taken by Twitter and is a clear
impediment for ISIS’s network ability to grow. What Berger & Morgen further discuss is the
idea that it is unlikely to examine from the available data whether the decrease in ISIS online
activity on Twitter is solely based on the suspension of the accounts, or ultimately users
simply decided to merge to another social media platform; but they concluded that
nonetheless this suspension rate had a positive effect for the company, in terms of having
less unlawful content on the platform (Berger & Morgen, 2015). Lastly, a valid point made by
the two researchers stresses that Twitter usually suspends those accounts who are visibly
affiliated with ISIS, by monitoring “the content of the tweets and user reports” (p.57) but those
accounts who have not as large of a number of followers and are perceived as smaller have a
higher change of not being suspended (p.56).
In a paper published in 2018 in the International Journal of Cyber Warfare and Terrorism by
Al-Rawi et al., the Islamic State’s social media content on Twitter was examined. This research
looked into “over 50 million tweets posted by more than 8 million unique users that referenced
the keywords ‘ISIS’ or ‘ISIL’” (Al-Rawi et al., 2018, p.1) on Twitter, by taking into account both
English and Arabic language tweets, fact that gives more accuracy and uniqueness to the
study. The researchers made use of several interviews with Islamic State’s terrorist fighters
to emphasize on the role Twitter has in disseminating ISIS propaganda, whereby a striking
statement made by one of the interviewees was “Your tweets are your weapons” (p.4) in
relation to those who tweet for ISIS with the aim to “educate its followers on the use of Twitter
(…)” (Al-Rawi et al., 2018, p.4; O’Neil, 2016). Al-Rawi (et al.) acknowledge the same as Berger
& Morgen (2015), and other researchers as well did, namely that after being largely banned
on Twitter, ISIS related accounts active on Twitter have largely decreased, although new ones
emerge. But the emergence of the newer accounts does not occur so rapidly as before the
censoring begun. For example, other data shows that “from mid-2015 to early 2016, Twitter
shut down over 125,000 ISIS-linked accounts” (Jeong, 2016). Banning the terrorist
organization from social media “had an impact on the group’s presence, and its media
production decreased considerably: specifically, from August 2016, there were 194 post from
ISIS-linked media production units which were far fewer than the 761 posts found in August
of the previous year before censoring began” (Al-Rawi et al., 2018, p.5). To better understand
how ISIS operates on the social media platform of Twitter, it is important to mention that the
terrorist organization was active with a little amount of ‘official’ ISIS accounts that ‘tweet
36
official statements and updates’ but mostly from decentralized accounts that are belonging
to jihadi sympathizers and other followers (Al-Rawi et al.,2018).
With the above-mentioned information in mind, one can conclude that the (perceived)
responsibility in Twitter’s practice was not highly emphasized under the first versions of the
official terms and conditions presented on the website from around 2009, but clear changes
have been made over time, until the most recent public policy data retrieved from 2018,
where developments can be seen with regards to Twitter’s most current practices. By linking
the official terms and conditions and public policies together with the academic research
available on the developments of Twitter with regards to combating online terrorist content,
it appears that voluntarily, Twitter did take some actions before 2018 already. In 2015, Berger
& Morgen conducted an extensive research based on terrorist content and terrorist affiliated
accounts on Twitter, where they concluded that an increase number of accounts were
suspended. Under the official terms and conditions, Twitter did not assume any liability in
2014 to act and assume responsibility with respect to what users decided to post, therefore
this can only lead to the assumption that in practice, Twitter seemed to perceive these actions
(i.e. suspending accounts in 2014) to be voluntary and not their ‘responsibility’ per se. Judging
solely from the terms and conditions and the public rules made available by the social media
company, there are disparities to be seen between Twitter’s approach and the actual image
it wants to portray to its wide audience. Regarding these disparities, it can be argued that
although Twitter highly stresses on zero-tolerance policy with respect to extremist terrorist
speech on the platform, there is still unlawful content present and maybe, Twitter could do
even more with regards to the issue at hand.
Nonetheless, with respect to Twitter’s actions towards unlawful content, and the immediate,
permanent suspension of the respective accounts, it is important to acknowledge that this
alone is already a big step towards a ‘safer’ and more responsible platform, because not all
social media companies that are faced with the problem of terrorist content, do take such
severe measure as suspending accounts. Moreover, in a (Vox) news article about Twitter’s
efforts detecting abusive and illegal content, it was stressed that Twitter’s main source of
finding illegal content was coming from users themselves, but now it has improved its
algorithms (Wagner, 2019). Moreover, what the article further stated with regards to
Twitter’s algorithms was that “Algorithms designed to improve safety are the only way Twitter
is going to keep pace with the volume of tweets people share every day. Twitter is far from
“healthy,” but it may be getting a little closer to cleaning up its act” (Wagner, 2019).
In conceptualizing his responsibilization practice (1996) Garland could not have imagined the
important role a platform like Twitter could have in the public debate. With more than 300
million monthly users (Wagner, 2019), Twitter holds a relevant role in terms of what
information is shared, under which conditions, and hence how accurate is the respective
information that reaches the public. At the same time, with having such a big role in today’s
37
society, it could be argued that Twitter, by becoming more responsible concerning the shared
content on the platform, could end up contradicting Garland’s conception with regards to the
possible advancements of social change, and how states were at that time undermining these
possibilities (of the advancement of societal change). Of course, Garland (1996) related this
issue (p.464-466) towards the state, but again he could not have foreseen that Twitter, for
example, could be perceived as an almost ‘state-like institution’, metaphorically speaking,
with regards to the influence and ‘power’ it has.
38
4. Conclusion
The present study has explored the role of Twitter’s developments with regards to combating
terrorist content over time in light of Garland’s (1996) responsibilization practice. Other issues
of interest such as whether a possible establishment of an international (or global) internet
governance in combating online crime would be a good approach and to what extent is the
European Union active in the role of countering the dissemination of online illegal content
were investigated throughout the present study. Considering all the presented information
and making use of Garland’s (1996) responsibilization practice, one can fully apply his
concluding criticism towards the case of Twitter. As Garland has accurately pointed out, one
core aspect regarding the responsibilization of the non-state actors and private organizations
for the prospect of reducing crime rates breaks down to the fact that most of the time, these
private organizations have other aims to prioritize beside that of reducing crime (Garland,
1996). Thus, by applying this theory to the issue at hand, one can see in Twitter’s
developments that it became, both in theory and in practice, more responsible towards the
terrorist content shared on the platform, but at the same time this issue is still present and
highly unlikely to be completely eradicated. The question that rises here, is what exactly has
made Twitter to change and take upon a more responsible stance towards the problem of the
unlawful content on the platform. The idea that with complex issues come along complex
answers is relatable to the case of Twitter’s developments as well, because there is not one
single factor that has led to Twitter becoming more responsible. Manifold factors had a role
in this development, such as, on the one hand, it can be argued that the public pressure (e.g.
new sources, users, other social media companies) played a role in Twitter taking more of a
proactive position in managing its content. Having a seat at the table of the big internets’
players, Twitter needs to consider the outside feedback in order to improve its platform and
continue to deliver according to user’s expectations. Various actors (i.e. online news sources)
started to put Twitter ‘on the spot’ with respect to the issue of online terrorist content on the
platform, therefor the social media company was more or less obliged to react. As it was
presented in the previous section, one reaction on behalf of Twitter was to improve its
content-detection algorithms as well as emphasizing in its official terms and conditions that
unlawful content is not acceptable on the platform. On the other hand, besides the outside
pressure it can be argued that states and authorities had an impact on this development as
well. Although the European Commission’s Proposal is still at the level of proposal, with the
possible implementation of such regulation, Twitter could face even more pressure (legally
speaking). If ratified, an instrument like the EC’s proposal would make social media
companies, consequently Twitter, to take on a bigger, and more responsible role with regards
to combating online terrorist content.
Important to keep in mind is that Twitter is a business whereby the main goal is to make profit
and gain competitive advantage over other social media platforms, thus reducing crime is not
necessarily one of the main goals of the company. Although not perceived as a main goal,
39
combating terrorist content on its platform is emphasized in the last couple of years and effort
in that respect can be seen from the high number of suspended accounts (section 3.4).
Another point of discussion here could evolve around the idea that because of the terrorist
content and propaganda on its platform, Twitter might actually risk losing legitimacy and
popularity among other platforms. This fear of losing amongst other social media platforms
might leave Twitter in a state of ‘crisis’, whereby the platform might eventually suspend an
increased number of accounts that were untruthfully associated with terrorist content just to
be ‘on the safe side’, fact which although plausible, is not the core of the present discussion.
Essential to consider here is that Garland conceptualized the responsibilization theory in
1996, therefore he could not have foreseen the immense role social media companies will
play in today’s society and ultimately how they would have a role in shaping contemporary
public debate. To quote Almagor (2017) on the important role that social media companies
have nowadays, the following illustrates it very accurately, namely “Facebook and Google
have more power than presidents and prime ministers. Power without responsibility is
dangerous, corrosive and undermines our well-being” (p.452). Consequently, because
everything centers around social media companies, they are unlikely to evade their
responsibility when it comes to illegal content on their platforms, which brings about another
discussion, namely that of whether social media companies should be the ones responsible
to draw the line between illegal content and freedom of expression, or whether this should
be solely the task of the states to legally prosecute. This can be linked to the discussion
presented in the introduction of this thesis that was centered around terrorism as a
‘contested concept’ (Schmid, 2004), because a main issue in itself is the difficulty to accurately
define terrorist speech (and terrorist content). With the increase of technology and the new
emerging detection algorithms, the question is whether social media companies can
accurately define such content and provide a reliable balance between the ‘false-positives’
and ‘false-negatives’ results that come along with using these algorithms. From the analyzed
news sources and academic literature, it can be concluded that this is a risk social media
companies are willingly assuming by making use of technological detection mechanism for
analyzing the content on their platforms. As stated, Twitter is different from other social
media companies because for example, YouTube and Facebook have algorithms that decide
based on the user’s preferences what it appears on the feed, whereby with Twitter this is not
the case. Twitter used to rely on users to spot and ‘flag’ suspicious accounts but as stated in
Wagner’s (2019) Vox’s article, Twitter is starting to adapt more proactive means of detection
(i.e. new content detection algorithms).
With the growing awareness of the existent threat of illegal content online and terrorist
propaganda, the roles of social media companies should be more than ever defined and
clarified. As Almagor (2017) stressed in his paper, “Better cooperation is required between
internet intermediaries and governments. Indeed, to have effective results in fighting highly
dangerous phenomena such as terrorism, cooperation is vital. Businesses are expected and
40
obligated to act responsibly in a way that would benefit their communities and avoid or
minimize harm to their stakeholders” (Almagor, 2017, p.452). Social media companies, and
internet platforms in general have been given the task, indirectly speaking, “to balance
between freedom of expression and social responsibility” because the internet, as innovative
as it is, is open for “use and abuse” (Almagor, 2017, p.452). This task, traditionally speaking,
did not belong to social media companies but was only entrusted to courts and authorities,
but with the immense role that social media companies have nowadays, it can be argued that
it is something necessary. Simultaneously, one has to bear in mind that entrusting social
media companies with more and more of these complex tasks could also lead to a situation
where these companies are overwhelmed with all the responsibilities that are being assigned
to them and fail to deliver according to what it is expected.
In conclusion, I believe that terrorists (and terrorist organizations) along with their supporters
and devotees will always find new means and alternative methods (or even alternative social
media platforms) to spread their desired messages and propaganda online. But because of
this sole reason, the need for new emerging strategies to limit, if not fully counter the
dissemination of such content online should be further stressed and researched on. In 1996,
Garland believed that although put in practice, society back then was not fully ready to make
use of the strategy of responsibilization, but it is possible that by now, over two decades later,
merging governmental, scholarly, public and corporate efforts in finding effective means to
counter the issue of online crime, will shed new perspectives regarding his criticism and the
effectiveness of the practice. Moreover, I argue that although social media companies are key
in shaping public and political debate nowadays, overestimating their capabilities and
ascribing too much responsibility outside of their initial competences could have possible
negative impacts. Therefore, I believe that nowadays emphasis should be centered towards
managing to concede on a general definition of terrorism and terrorist content so that general
agreement can be reached with regards to what exactly needs to be regulated and combated,
thus little room for ‘false-positives’ and ‘false-negatives’ would be available.
41
5. References
Al-Rawi, A., & Groshek, J. (2018). Jihadist Propaganda on Social Media: An Examination of ISIS Related
Content on Twitter. International Journal of Cyber Warfare and Terrorism (IJCWT), 8(4), 1-15.
Awan, I. (2017). Cyber-extremism: Isis and the power of social media. Society, 54(2), 138-149.
Berger, J. M., & Morgan, J. (2015). The ISIS Twitter Census: Defining and describing the population of ISIS
supporters on Twitter. The Brookings Project on US Relations with the Islamic World, 3(20), 4-1.
Callahan, G. (2017). Attacking ISIL on Twitter: Addressing ethical responsibility in the weaponization of social
media. Intersect: The Stanford Journal of Science, Technology, and Society, 10(2).
Cohen-Almagor, R. (2017). The Role of Internet Intermediaries in Tackling Terrorism
Online. Fordham L. Rev., 86, 425.
Coldewey, D. (2018). Facebook removed 14 million pieces of terrorist content this year, and the numbers are
rising. Retrieved from https://techcrunch.com/2018/11/08/facebook-removed- 14-million-pieces-of-
terrorist-content-this-year-and-the-numbers-are-rising/?guccounter=1
Council of Europe, Convention on Cybercrime, ETS No. 185.
Cilluffo, F. J., Cardash, S. L., & Whitehead, A. J. (2006). Radicalization: Behind bars and beyond
borders. Brown J. World Aff., 13, 113.
Davis, B. R. (2006). Ending the Cyber Jihad: Combating Terrorist Exploitation of the Internet with the Rule of Law
and Improved Tools for Cyber Governance. CommLaw Conspectus, 15, 119.
European Commission, Proposal for a Regulation on Preventing the Dissemination of Terrorist Content Online,
COM (2018) 640 final.
Garland, D. (2001). The culture of control: Crime and social order in contemporary society.
Garland, D. (1997). Governmentality' and the problem of crime: Foucault, criminology, sociology. Theoretical
criminology, 1(2), 173-214.
Garland, D. (1996). THE LIMITS OF THE SOVEREIGN STATE Strategies of Crime Control in Contemporary
Society. The British journal of criminology, 36(4), 445-471.
Goldsmith, J. (2019). Sovereign Difference and Sovereign Deference on the Internet. Past, Present.
Hache, E. (2007). Is responsibility a tool of neo-liberal governmentality? Raisons politiques, (4), 49-65.
Hill, R. (2016): Internet governance, multi-stakeholder models, and the IANA transition: shining
example or dark side?, Journal of Cyber Policy, DOI: 10.1080/23738871.2016.1227866
Jeong, S. (2016). Twitter: We’ve Blocked 125,000 ISIS Accounts Since Mid-2015. Motherboard.
Retrieved from http://motherboard.vice.com/read/twitter-we-blocked-125000-isis-
accounts-since-mid-2015
42
Jee, C. (2019, March 22). Russia wants to cut itself off from the global internet. Here's what that really
means. Retrieved from https://www.technologyreview.com/s/613138/russia-wants-to-cut-
itself-off-from-the-global-internet-heres-what-that-really-means/
Kaunert, C., & Léonard, S. (2019). The collective securitisation of terrorism in the European
Union. West European Politics, 42(2), 261-277.
Kwak, H., Lee, C., Park, H., & Moon, S. (2010, April). What is Twitter, a social network or a news media?,
In Proceedings of the 19th international conference on World wide web (pp. 591-600). AcM.
Lemke, T. (2002). Foucault, governmentality, and critique. Rethinking marxism, 14(3), 49-64.
Mittal I.P.S., S., & Sharma, P. P. (2017). A Review of International Legal Framework to Combat
Cybercrime. SSRN Electronic Journal. doi:10.2139/ssrn.2978744
O’Neill, P.H. (2016, February 2). How ISIS trains militants in online security. The Daily Dot. Retrieved
from http://www.dailydot.com/layer8/isis-aef-nsa-snowden-video/
Rasmussen, J. (2015). ‘Should each of us take over the role as watcher? ’Attitudes on Twitter towards the
2014 Norwegian terror alert. Journal of Multicultural Discourses, 10(2), 197-213.
Rose, N., O'Malley, P., & Valverde, M. (2009). Governmentality. Annu. Rev. Law Soc. Sci., 2, 83-104.
Schmid, A. (2004). Terrorism-the definitional problem. Case W. Res. J. Int'l L., 36, 375.
Sharma, R (2018). 100 Social Media Statistics 2019 Infographic for Business. Statusbrew Blog
Tsesis, A. (2017). Social media accountability for terrorist propaganda. Fordham L. Rev., 86, 605.
Wagner, K. (2019, April 16). Twitter says it's getting better at detecting abusive tweets without your
help. Retrieved from https://www.vox.com/2019/4/16/18410931/twitter-abuse-update-
health-technology-harassment
Weimann, G. (2010). Terror on facebook, twitter, and youtube. The Brown Journal of World
Affairs, 16(2), 45-54.
Wu, P. (2015). Impossible to regulate: Social media, terrorists, and the role for the UN. Chi. J. Int'l L., 16, 281.
43
Online Sources cited:
European Digital Rights Associations (EDRi)
https://edri.org/about/
https://edri.org/eu-internet-forum-document-pool/
EDRi Open Letter
https://edri.org/open-letter-regulation-on-terrorist-content-online-endangers-freedom-of-expression/
Europol Conference on online terrorist Propaganda
https://www.europol.europa.eu/newsroom/news/europol-hosts-conference-online-terrorist-propaganda
Europol Main Reports EU Terrorism situation
https://www.europol.europa.eu/activities-services/main-reports/eu-terrorism-situation-and-trend-report
EU Internet Referral Unit – EU IRU
https://www.europol.europa.eu/about-europol/eu-internet-referal-unit-eu-iru
Global Internet Forum to Counter Terrorism
https://blog.twitter.com/en_us/topics/company/2017/Global-Internet-Forum-to-Counter-Terrorism.html
https://www.gifct.org/press/global-internet-forum-counter-terrorism-update-our-efforts-use-technology-
support-smaller-companies-and-fund-research-fight-terrorism-online/
General Assembly Resolution 57/239,2003 U.N. Doc
https://www.itu.int/ITU-D/cyb/cybersecurity/docs/UN_resolution_57_239.pdf
General Assembly Resolution 58/199, 2004 U.N. Doc
https://www.itu.int/ITU-D/cyb/cybersecurity/docs/UN_resolution_58_199.pdf
Internet Corporation for Assigned Names and Numbers (ICANN)
https://icann.org/general
Social Media Statistics
https://blog.statusbrew.com/social-media-statistics-2019/
The Guardian
https://www.theguardian.com/technology/2018/apr/05/twitter-bans-270000-accounts-to-counter-terrorism-
advocacy
Twitter Blog
https://blog.twitter.com/official/en_us/a/2016/an-update-on-our-efforts-to-combat-violent-extremism.html).
Twitter Rules
https://help.twitter.com/en/rules-and-policies/violent-groups
Twitter Terms of Service (Previous)
https://twitter.com/en/tos/previous