The companies shall use the same technology that is used to automatically retrieve offline copyrighted material, say sources at Reuters .
The technology looks for so-called hashes, a kind of digital fingerprint that identifies videos. That fingerprint is compared with previously deleted videos, extremist recordings being re-shared are automatically deleted.
Extremist videos that can not be shared previously recognized also by the system, but will not be achieved automatically offline. Achieving this will require the intervention of an employee, but that is no longer solely dependent on users to manually report an extremist video.
People Work
The sources of Reuters will not say how many people work there is in watching videos that are similar to previously deleted videos under the systems. Also, they do not want to say how large the database extremist videos is used to automatically discover new recordings.
The new technology may need to be refined, which companies may also mutually exchange knowledge. Still, Internet companies would in the case of extremist videos set clear boundaries less than in cases of copyright and child pornography for instance, where the law is clearly violated. Lead to a different approach for each company.
In the case of extremist videos sites take into account inter alia the freedom of expression and the role that companies play in maintaining independent of government. Moreover, the techniques used by businesses are not openly discussed would, in part out of concern that terrorists manipulate learn software or repressive regimes use technology to censor opponents.
Call
April would be Internet companies including YouTube, Twitter and Facebook have had a consultation on ways to block extremist manifestations. Facebook does not want to substantive discussions on the talks, but says it is working with other companies to remove material that violates the anti-terrorism policy.
YouTube does not want to comment on the talks. Twitter says it is still evaluating the calls and determine its position on the case. White House welcomes initiatives from Internet companies to better respond to the threat that terrorists online form
No comments:
Post a Comment