Google Launches New Weapon Against Islamic State

Google want to push web users searching for jihadist information toward content designed to counter the slick tools of terrorist recruitment.

Before Thomas Evans was killed carrying out a terrorist attack for al Shabab in Kenya, he was radicalised in a red-roofed house in a small English village, right under the noses of his mother and brother.

"It was happening upstairs in our bedroom," Sally Evans said. "He was on his computer." A year after she learned of her son's death through pictures on the Internet, Evans still wonders what could have prevented the 25-year-old's descent into extremism.

More than 3,000 miles away, in a massive Manhattan office building, researchers at Google think they may have found an answer to that question.

Developers at Jigsaw, the tech giant's think-tank, are two months into a pilot project called Redirect, which aims to push web users searching for jihadist information toward content designed to counter the slick tools of terrorist recruitment.

"There are people interested in ISIS' message on one side and there are videos that undermine ISIS' message on the other hand," said Yasmin Green, head of research and development at Jigsaw. "We are using targeted advertising to marry the two."

In traditional targeted advertising, a new mother searching for information on Google about getting a baby to sleep might start seeing ads for blankets and white-noise machines in their feeds.

Through Redirect, someone searching for details about life as an ISIS fighter might be offered links to independently produced videos that detail hardships and dangers instead of the stirring Madison Avenue-style propaganda the terror group puts online.

"So if you were looking for, let's say, material on the social welfare system in the so-called caliphate, you would click on the ad and see the truth about what's happening in Syria and Iraq," Green said. "The long food lines, the devastated suffering, the failure of the Islamic State."

Jigsaw invited NBC News into the lab where its counter-programming project is unfolding and revealed its preliminary results. In the first eight weeks, 300,000 people looking for ISIS information online were redirected.

They watched a combined total of 425,000 minutes of video, which Green said was a surprisingly high level of engagement given the short attention spans of internet users and the ability to just click away from anything dissonant.

The key is subtlety. A disaffected young person wondering if ISIS is the answer to their problems would immediately dismiss a video with a warning from the Department of Homeland Security. Instead, Jigsaw is looking for voices that will be seen as credible, such as imams, and a more measured tone. "We really need to engage them with content that isn't judgmental off the bat," Green said.

Sohail Ahmad said he knows first-hand how effective this approach can be. Raised by Pakistani immigrants in London's East End, his family's own hard-line views were reinforced by online videos and articles selling the idea that a global Muslim brotherhood could be achieved through jihad. "It was through Google searches and it was through using YouTube," Ahmad said.

He became a student preacher, spewing fanaticism and hate. He said he despised America and began seriously thinking about carrying out a lone-wolf bombing attack in London.

He never went through with it, and over time his views shifted. If Redirect had been in effect during his march toward extremism, he might not have gotten so far down the road, or turned back sooner.

"What led me away from radicalism was kind of listening to more relatively moderate scholars and imams," he said. "And if I'd had access to that information, if I'd been exposed to that much earlier, I think I would have turned away from extremism at a much earlier stage as well."

It's no secret that technology has revolutionized terrorism. Militants bombard social media with posts meant to entice the curious and malcontented. Companies that run those sites play a high-stakes game of whack-a-mole trying to remove material and disable accounts that just spring up again.

"For recruiters who are based in conflict zones, they have a unique ability now to reach anybody, anywhere, at any time," said Shiraz Maher, senior research fellow at the International Center for the Study of Radicalization at King's College.

But Rashad Ali, a reformed radical who is now a senior fellow for the Institute of Strategic Dialogue, said tech companies have even more power.

"If you target your ads, we've found that you can go from reaching 500 people to 100,000 people in a matter of weeks," he said. "I think the potential for reaching people who are vulnerable is huge."

Ali said tests he has conducted show that targeted ads can reach subjects on a deeper level, too: A dozen members of a far-right organisation reached out to the makers of one counter-programming video and asked for help leaving the movement. "I've actually got no doubt that it can work," he said. 

"I think what we're seeing now is a recognition that tech companies have a moral obligation to not just stop their platforms being used for recruitment, but where and when they can, to actively prevent the radicalization," Ali added. "As someone who's been radicalised and been involved in recruiting other people, I think this is the least that Google can do."

Google said it responds to requests for users' data from government agencies and courts "on an individual basis."

NBC News:             ISIS Is Tooling Up For Cyber Jihad:            ISIS Social Media Ops Are Declining:

 

« IBM’s Watson Will Use AI To Treat Cancer
On Facebook, Fake US Election News Was More Popular Than Real News »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

Resilience First

Resilience First

Resilience First is a not-for-profit organisation, led and funded by business to strengthen collective business resilience in all areas, including cyber security.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

Safe Security

Safe Security

Safe Security (formerly Lucideus) provides Cyber risk assessment services and platforms to multiple Fortune 500 companies and governments across the globe.

Altipeak Security

Altipeak Security

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, healthcare and more.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Ontinue

Ontinue

Ontinue ION is an MXDR service that provides Nonstop SecOps through five key capabilities that enable your organization to respond to attacks and continuously reduce risk.

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.