Google Launches New Weapon Against Islamic State

Google want to push web users searching for jihadist information toward content designed to counter the slick tools of terrorist recruitment.

Before Thomas Evans was killed carrying out a terrorist attack for al Shabab in Kenya, he was radicalised in a red-roofed house in a small English village, right under the noses of his mother and brother.

"It was happening upstairs in our bedroom," Sally Evans said. "He was on his computer." A year after she learned of her son's death through pictures on the Internet, Evans still wonders what could have prevented the 25-year-old's descent into extremism.

More than 3,000 miles away, in a massive Manhattan office building, researchers at Google think they may have found an answer to that question.

Developers at Jigsaw, the tech giant's think-tank, are two months into a pilot project called Redirect, which aims to push web users searching for jihadist information toward content designed to counter the slick tools of terrorist recruitment.

"There are people interested in ISIS' message on one side and there are videos that undermine ISIS' message on the other hand," said Yasmin Green, head of research and development at Jigsaw. "We are using targeted advertising to marry the two."

In traditional targeted advertising, a new mother searching for information on Google about getting a baby to sleep might start seeing ads for blankets and white-noise machines in their feeds.

Through Redirect, someone searching for details about life as an ISIS fighter might be offered links to independently produced videos that detail hardships and dangers instead of the stirring Madison Avenue-style propaganda the terror group puts online.

"So if you were looking for, let's say, material on the social welfare system in the so-called caliphate, you would click on the ad and see the truth about what's happening in Syria and Iraq," Green said. "The long food lines, the devastated suffering, the failure of the Islamic State."

Jigsaw invited NBC News into the lab where its counter-programming project is unfolding and revealed its preliminary results. In the first eight weeks, 300,000 people looking for ISIS information online were redirected.

They watched a combined total of 425,000 minutes of video, which Green said was a surprisingly high level of engagement given the short attention spans of internet users and the ability to just click away from anything dissonant.

The key is subtlety. A disaffected young person wondering if ISIS is the answer to their problems would immediately dismiss a video with a warning from the Department of Homeland Security. Instead, Jigsaw is looking for voices that will be seen as credible, such as imams, and a more measured tone. "We really need to engage them with content that isn't judgmental off the bat," Green said.

Sohail Ahmad said he knows first-hand how effective this approach can be. Raised by Pakistani immigrants in London's East End, his family's own hard-line views were reinforced by online videos and articles selling the idea that a global Muslim brotherhood could be achieved through jihad. "It was through Google searches and it was through using YouTube," Ahmad said.

He became a student preacher, spewing fanaticism and hate. He said he despised America and began seriously thinking about carrying out a lone-wolf bombing attack in London.

He never went through with it, and over time his views shifted. If Redirect had been in effect during his march toward extremism, he might not have gotten so far down the road, or turned back sooner.

"What led me away from radicalism was kind of listening to more relatively moderate scholars and imams," he said. "And if I'd had access to that information, if I'd been exposed to that much earlier, I think I would have turned away from extremism at a much earlier stage as well."

It's no secret that technology has revolutionized terrorism. Militants bombard social media with posts meant to entice the curious and malcontented. Companies that run those sites play a high-stakes game of whack-a-mole trying to remove material and disable accounts that just spring up again.

"For recruiters who are based in conflict zones, they have a unique ability now to reach anybody, anywhere, at any time," said Shiraz Maher, senior research fellow at the International Center for the Study of Radicalization at King's College.

But Rashad Ali, a reformed radical who is now a senior fellow for the Institute of Strategic Dialogue, said tech companies have even more power.

"If you target your ads, we've found that you can go from reaching 500 people to 100,000 people in a matter of weeks," he said. "I think the potential for reaching people who are vulnerable is huge."

Ali said tests he has conducted show that targeted ads can reach subjects on a deeper level, too: A dozen members of a far-right organisation reached out to the makers of one counter-programming video and asked for help leaving the movement. "I've actually got no doubt that it can work," he said. 

"I think what we're seeing now is a recognition that tech companies have a moral obligation to not just stop their platforms being used for recruitment, but where and when they can, to actively prevent the radicalization," Ali added. "As someone who's been radicalised and been involved in recruiting other people, I think this is the least that Google can do."

Google said it responds to requests for users' data from government agencies and courts "on an individual basis."

NBC News:             ISIS Is Tooling Up For Cyber Jihad:            ISIS Social Media Ops Are Declining:

 

« IBM’s Watson Will Use AI To Treat Cancer
On Facebook, Fake US Election News Was More Popular Than Real News »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

RSA Conference

RSA Conference

RSA Conference conducts information security events around the globe that connect you to industry leaders and highly relevant information.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

RBCCPS is an interdisciplinary research and academic centre within the Indian Institute of Science focused on research in cyber-physical systems.

Startup Capital Ventures

Startup Capital Ventures

Startup Capital Ventures is an early stage venture capital firm with a focus on FinTech, Cloud/SaaS, Security, Healthcare IT, and IoT.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Nullify

Nullify

Nullify is your automated security sentry that continuously finds and fixes security issues across your codebase.

Converged Communication Solutions

Converged Communication Solutions

Converged is an independent Internet Service Provider, telephony, IT support and security specialist.

Digital Security Authority (DSA)

Digital Security Authority (DSA)

The establishment of the Digital Security Authority, which incorporates the National CSIRT, is crucial to significantly raising the cybersecurity posture and capabilities of Cyprus.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.

Stack Overflow

Stack Overflow

Founded in 2008, Stack Overflow’s public platform is used by nearly everyone who codes to learn, share their knowledge, collaborate, and build their careers.

Norwegian Data Protection Authority (Datatilsynet)

Norwegian Data Protection Authority (Datatilsynet)

The Norwegian Data Protection Authority (Datatilsynet) is the national data protection authority for Norway.

Trustmi

Trustmi

Trustmi is a leading fintech cybersecurity solution designed to prevent financial losses from fraud and errors, 24/7.