Online Platforms Fail to Prevent Circulation of Buffalo Shooting Video

May 27, 2022

Once again, the Internet proves that even the vilest content cannot be contained. It is a fact racist terrorists have learned to exploit to spread fear, hatred, and inspiration for more violence. The Washington Post reports, “Only 22 Saw the Buffalo Shooting Live. Millions Have Seen it Since.” Writers Drew Harwell and Will Oremus tell us:

“When the Buffalo gunman broadcast the shooting in real time Saturday on the live-streaming site Twitch, only 22 people were watching, and company officials said they’d removed it with remarkable speed — within two minutes of the first gunshots. But all it took was for one viewer to save a copy and redistribute it online. A jumble of video-hosting sites, extremist message boards and some of Silicon Valley’s biggest names did the rest, ensuring millions of people would view the video. One copy made its way onto the little-known video site Streamable, where, thanks to links posted on much larger sites, it was viewed more than 3 million times before it was removed. One link to that copy on Facebook received more than 500 comments and 46,000 shares; Facebook did not remove it for more than 10 hours. ‘Terrorism is theater,’ said Emerson T. Brooking, senior fellow at the Atlantic Council’s Digital Forensic Research Lab, which researches how information spreads online. ‘The purpose of terrorism is always to reach the greatest number of people possible with the most horrific or spectacular attack that you can perform.'”

Several ideas have been floated to combat the spread of this grisly propaganda. Some are trying to wield digital fingerprint technology for good by using it to filter content. Then there was the “hate clusters” concept. Major tech companies even set up a Global Internet Forum to Counter Terrorism, a system meant to automatically block terrorist videos that was based on tech originally used to block footage of child sexual abuse. Clearly, none of these measures are working. Will the answer be found, and implemented, before the next attack?

Cynthia Murrell, May 27, 2022

Comments

Comments are closed.

  • Archives

  • Recent Posts

  • Meta