|
|||||||||
MENUHOMEDAILY BRIEF LATEST POSTS J.M. BERGER ISIS: STATE OF TERROR JIHAD JOE LINKSBlogs of WarHizballah Cavalcade Internet Haganah Jihadology Jihadica Kremlin Trolls Making Sense of Jihad Selected Wisdom Views from the Occident TAGSAmerican TerroristsAnwar Awlaki Al Qaeda AQAP American Al Qaeda Members Inspire Magazine Revolution Muslim OKBOMB |
News, documents and analysis on violent extremismMonday, July 11, 2011
Google's Process For Extremist ContentGoogle managed to associate its name with "countering violent extremism" pretty thoroughly last month by hosting a Summit Against Violent Extremism in Dublin. I've thoroughly expressed my skepticism about CVE elsewhere.My question for today is: What's Google doing to clean up its own house? Between Blogger and YouTube, Google itself is one of the key distributors of radical content online. The company was recently asked by Sen. Joseph Lieberman to answer a series of questions about its internal efforts to control this content. Here are some samples of what it said: Read the full document Blogger’s policies prohibit threatening content, content that promotes “dangerous and illegal activities,” contains hate speech, or inciteful material that encourages “violent action against another person or group of people.” Similar to YouTube, when material of this nature is reported to Blogger, review teams take action to remove the content quickly.It's kind of hard to believe that no one has reported Blogger site Islam Policy by now, and even harder to believe that IP's content doesn't violate the terms of service outlined about. Video is uploaded you YouTube at the rate of 35 hours per minute. Because of the massive scale of the platform, it is not possible to pre-screen content. To ensure that our policies are followed, we have a community policing system in place whereby users report prohibited material by selecting the “Flag” link under every video. Our policy review team reviews flagged videos 24 hours a day, seven days a week, removing material that violates our Guidelines. In addition, we have a Help & Safety Tool that lets users contact us about threatening comments. A staff of specialists is on hand around the clock taking action to remove and, when appropriate, report such comments. I get this. I really do. But I am just guessing that the engineers over at Google have found ways to flag uploads for pornographic and snuff content in real time. I admit this is an assumption, but it's based on the fact that we never see news stories about widespread problems with kids stumbling across such content on YouTube. I'm guessing people try to upload porn to YouTube about 1,000 times more often than jihadist propaganda. Aren't there ways to deal with this? Google has also taken it upon itself to anoint certain Muslim Americans as "helpful moderates" and give them a technological edge. Google has sought out and worked with groups and individuals who lead Muslim American communities in order to better educate them about using technology to project their messages. Working with personnel from key government agencies and the New America Foundation, we have I outlined my objections to this practice in the CVE rant I referenced above. I suspect Google will encounter the same pitfalls that the US Government experienced if it thinks it can figure out who is helpful and who is not. Read the rest of the document here I remain highly skeptical that Big Brother -- whether corporate, non-profit or government -- can "help" Muslims deal with a problem whose scale, nature and scope is not well-understood. CVE is about fostering "good Muslims," counterterrorism is about disrupting people who are planning to kill innocents. The answers Google provided to the HLS subcommittee are big on reassurance and light on details. What the company can do -- and arguably isn't doing well enough -- is disrupt clearly extremist content on a consistent basis. It deserves at least as much attention as fighting porn. For more about online extremism, check out J.M. Berger's new book, Jihad Joe: Americans Who Go to War in the Name of Islam, on sale everywhere. Labels: CVE, Google, Homeland-Security Views expressed on INTELWIRE are those of the author alone.
Tweets referencing this post:loading..
|
BOOKS"...smart, granular analysis..."ISIS: The State of TerrorMore on ISIS: The State of Terror "...a timely warning...""At a time when some politicians and pundits blur the line between Islam and terrorism, Berger, who knows this subject far better than the demagogues, sharply cautions against vilifying Muslim Americans. ... It is a timely warning from an expert who has not lost his perspective." -- New York Times More on Jihad Joe ABOUT![]() RECENTNewest posts!What Is Al Qaeda, Part 1 Jihad Joe Reading And Signing At Porter Square Boo... Terrorist acts, terrorist thoughts Happy Birthday Inspire! Tommy Corrigan Passes Away In Latest Filing, FBI Says It Can't Find OKC Bombi... Sunday Reading: The New York Times Review of 'Jiha... The Jihadist Who Wasn't New "Jihad Joe" Cases Develop On Both Coasts, Mela... Jihad Joe Review At Zenpundit: "A Book To Admire" EXCLUSIVESNew York Pipe Bomb Suspect Linked to Revolution Muslim The Utility of Lone Wolves Interview with Online Jihadist Abu Suleiman Al Nasser A Way Forward for CVE: The Five Ds How Terrorists Use The Internet: Just Like You PATCON: The FBI's Secret War on the Militia Movement Interview About Jihad With Controversial Cleric Bilal Philips Forgeries on the Jihadist Forums U.S. Gave Millions To Charity Linked To Al Qaeda, Anwar Awlaki State Department Secretly Met With Followers of Blind Sheikh State Department Put 'Political Pressure' On FBI To Deport Brother-in-Law Of Osama Bin Laden In 1995 FBI Records Reveal Details Of Nixon-Era Racial Profiling Program Targeting Arabs Gaza Flotilla Official Was Foreign Fighter in Bosnia War U.S. Had 'High Confidence' Of UBL Attack In June 2001 Behind the Handshake: The Rumsfeld-Saddam Meeting |