Jason Sands

43%
Flag icon
Twitter tried to act, but ISIS clung to it like a cancer. Militants developed scripts that automatically regenerated their network when a connection was severed. They made use of Twitter blocklists—originally developed to fight harassment by bunching together and blocking notorious trolls—to hide their online activities from users who hunted them. (ISIS media teams soon added us to this list.) Some
Likewar: The Weaponization of Social Media
Rate this book
Clear rating
Open Preview