Threat identification and mitigation in computer mediated communication, including online social network environments
First Claim
1. A method for combating electronic communication that causes an individual to engage in extremist or terrorist activities the method comprising:
- (a) intercepting electronic communication intended for or initiated by the individual over an Internet communication medium;
(b) identifying electronic communication, as intercepted according to step (a), that relate to or describe extremist or terrorist activities as identified by keywords or phrases in the electronic communication;
(c) analyzing content of the electronic communication that relates to extremist or terrorist activities as identified at step (b);
(d) injecting counter-narrative content to the individual'"'"'s communication stream, responsive to content analyzed at step (c), to counter determined content; and
(e) displaying text associated with one or more of steps (a) through (d) on a display screen; and
(f) determining that the individual has progressed beyond a threshold based upon a predetermined multi-variable threat matrix, wherein progress beyond the threshold indicates that additional executions of step (d) have less effect on countering the content analyzed at step (c).
0 Assignments
0 Petitions
Accused Products
Abstract
A method for combating electronic communication that may cause an individual to adopt extremist or terrorist philosophies. The method comprises intercepting electronic communication intended for or initiated by the individual over an Internet communication medium, identifying electronic communication, as intercepted, that relate to extremist or terrorist philosophies, analyzing content of the electronic communication that relates to extremist or terrorist philosophies, injecting counter-narrative content to the individual'"'"'s communication stream to counter determined content, and displaying text associated with one or more of the method steps on a display screen.
31 Citations
1 Claim
-
1. A method for combating electronic communication that causes an individual to engage in extremist or terrorist activities the method comprising:
-
(a) intercepting electronic communication intended for or initiated by the individual over an Internet communication medium; (b) identifying electronic communication, as intercepted according to step (a), that relate to or describe extremist or terrorist activities as identified by keywords or phrases in the electronic communication; (c) analyzing content of the electronic communication that relates to extremist or terrorist activities as identified at step (b); (d) injecting counter-narrative content to the individual'"'"'s communication stream, responsive to content analyzed at step (c), to counter determined content; and (e) displaying text associated with one or more of steps (a) through (d) on a display screen; and (f) determining that the individual has progressed beyond a threshold based upon a predetermined multi-variable threat matrix, wherein progress beyond the threshold indicates that additional executions of step (d) have less effect on countering the content analyzed at step (c).
-
Specification