Google Launches New Weapon Against Islamic State

Google want to push web users searching for jihadist information toward content designed to counter the slick tools of terrorist recruitment.

Before Thomas Evans was killed carrying out a terrorist attack for al Shabab in Kenya, he was radicalised in a red-roofed house in a small English village, right under the noses of his mother and brother.

"It was happening upstairs in our bedroom," Sally Evans said. "He was on his computer." A year after she learned of her son's death through pictures on the Internet, Evans still wonders what could have prevented the 25-year-old's descent into extremism.

More than 3,000 miles away, in a massive Manhattan office building, researchers at Google think they may have found an answer to that question.

Developers at Jigsaw, the tech giant's think-tank, are two months into a pilot project called Redirect, which aims to push web users searching for jihadist information toward content designed to counter the slick tools of terrorist recruitment.

"There are people interested in ISIS' message on one side and there are videos that undermine ISIS' message on the other hand," said Yasmin Green, head of research and development at Jigsaw. "We are using targeted advertising to marry the two."

In traditional targeted advertising, a new mother searching for information on Google about getting a baby to sleep might start seeing ads for blankets and white-noise machines in their feeds.

Through Redirect, someone searching for details about life as an ISIS fighter might be offered links to independently produced videos that detail hardships and dangers instead of the stirring Madison Avenue-style propaganda the terror group puts online.

"So if you were looking for, let's say, material on the social welfare system in the so-called caliphate, you would click on the ad and see the truth about what's happening in Syria and Iraq," Green said. "The long food lines, the devastated suffering, the failure of the Islamic State."

Jigsaw invited NBC News into the lab where its counter-programming project is unfolding and revealed its preliminary results. In the first eight weeks, 300,000 people looking for ISIS information online were redirected.

They watched a combined total of 425,000 minutes of video, which Green said was a surprisingly high level of engagement given the short attention spans of internet users and the ability to just click away from anything dissonant.

The key is subtlety. A disaffected young person wondering if ISIS is the answer to their problems would immediately dismiss a video with a warning from the Department of Homeland Security. Instead, Jigsaw is looking for voices that will be seen as credible, such as imams, and a more measured tone. "We really need to engage them with content that isn't judgmental off the bat," Green said.

Sohail Ahmad said he knows first-hand how effective this approach can be. Raised by Pakistani immigrants in London's East End, his family's own hard-line views were reinforced by online videos and articles selling the idea that a global Muslim brotherhood could be achieved through jihad. "It was through Google searches and it was through using YouTube," Ahmad said.

He became a student preacher, spewing fanaticism and hate. He said he despised America and began seriously thinking about carrying out a lone-wolf bombing attack in London.

He never went through with it, and over time his views shifted. If Redirect had been in effect during his march toward extremism, he might not have gotten so far down the road, or turned back sooner.

"What led me away from radicalism was kind of listening to more relatively moderate scholars and imams," he said. "And if I'd had access to that information, if I'd been exposed to that much earlier, I think I would have turned away from extremism at a much earlier stage as well."

It's no secret that technology has revolutionized terrorism. Militants bombard social media with posts meant to entice the curious and malcontented. Companies that run those sites play a high-stakes game of whack-a-mole trying to remove material and disable accounts that just spring up again.

"For recruiters who are based in conflict zones, they have a unique ability now to reach anybody, anywhere, at any time," said Shiraz Maher, senior research fellow at the International Center for the Study of Radicalization at King's College.

But Rashad Ali, a reformed radical who is now a senior fellow for the Institute of Strategic Dialogue, said tech companies have even more power.

"If you target your ads, we've found that you can go from reaching 500 people to 100,000 people in a matter of weeks," he said. "I think the potential for reaching people who are vulnerable is huge."

Ali said tests he has conducted show that targeted ads can reach subjects on a deeper level, too: A dozen members of a far-right organisation reached out to the makers of one counter-programming video and asked for help leaving the movement. "I've actually got no doubt that it can work," he said. 

"I think what we're seeing now is a recognition that tech companies have a moral obligation to not just stop their platforms being used for recruitment, but where and when they can, to actively prevent the radicalization," Ali added. "As someone who's been radicalised and been involved in recruiting other people, I think this is the least that Google can do."

Google said it responds to requests for users' data from government agencies and courts "on an individual basis."

NBC News:             ISIS Is Tooling Up For Cyber Jihad:            ISIS Social Media Ops Are Declining:

 

« IBM’s Watson Will Use AI To Treat Cancer
On Facebook, Fake US Election News Was More Popular Than Real News »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cloud Industry Forum (CIF)

Cloud Industry Forum (CIF)

Cloud Industry Forum is a non-profit industry body that champions and advocates the adoption and use of Cloud-based services by businesses and individuals.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

Silent Sector

Silent Sector

Silent Sector is a cybersecurity services company that specializes in providing a wide range of managed security services.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

MTI

MTI

MTI is a solutions and service provider, specialising in data & cyber security, datacentre modernisation, modern workplace, IT managed services and IT transformation services.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.

AKS iQ

AKS iQ

AKS iQ leads the RegTech sector with AI, automating regulatory compliance in the banking industry and ensuring paperless TBML and CFT adherence in finance.

Kerberus Cyber Security

Kerberus Cyber Security

Kerberus Cyber Security (formerly MintDefense) is a leading innovator in Web3 user security, dedicated to safeguarding digital assets and transactions through its flagship product, Sentinel3.