New Software To Identify ISIS Recruiters

launch-of-isis-page-islamic-state.jpg

ISIS is busy producing many videos to post online, trying to recruit more fighters to join its ranks, which is terrorizing Iraq and Syria. Ironically, the terror organization is using the Internet, which is one of the most western tools available to them, with their emphasis on social media platforms, such as Facebook, Twitter and various chats.

After standing helpless in front of countless Internet accounts spreading propaganda and incapable of blocking each and every one, as more are being created every day, the Russian security services have decided to try a different method.
Russian researchers are now working on some new computer software to locate potential ISIS recruiters online, this to prevent the recruiting efforts from the very start. Researchers are trying build a profile of any particular potential recruiter and then implement it in computer software, which will try to catch the actual ones on social media.

The computer program known as “Laplace’s Demon” has been already monitoring social networks for extremist groups since this spring to prevent calls for mass unrest, and it will be upgraded and will be used in a slightly different manner, starting 2016. 

After the program will begin hunting for social network accounts belonging to potential ISIL recruiters, specialists of the Center will then send the account owners a message in Arabic and then linguistically examine the answer. The user will then be advised to follow a link, which, in turn, will provide the IT-specialists with his IP-address, operating system and browser details. 

With this data, specially trained staff, such as hackers can get full access to their computers. This way, researchers can begin searching for telltale signs, such as misinterpreted quotations of the Koran, which can be identified by religious scholars, as well as a general linguistic analysis undertaken by experts in Arab studies. Few experts suggest that the researchers should focus on a potential victim, which can then be used to help to prevent victims being signed up to the terrorist group, rather than reconstructing a portrait of a recruiter. We should understand why a person is open to recruitment,” Alexei Filatov, Vice President of the International Association of Veterans of the Antiterrorism Alfa Group said.

Russia has been concerned for some time of the ISIS recruitment phenomenon, and mostly of recruiting fighters from its own borders. Last June Deputy Minister of Foreign Affairs, Sergey Syromolotov, said that the number of fighters from Russia and Caucasus in Syria is about 2,200 people. It’s obvious that the current Russian presence in Syria is increasing fear of the soldiers returning home and of the role they might play in inciting terror and guerilla warfare when they do.
I-hls: http://bit.ly/1H4hr5S

« UK Cybercrime & Online Fraud on the Rise
Your Personal Safety. There’s An App For That »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Synovum

Synovum

Synovum was formed with the intention to provide high quality advice, consultancy, training and project management services to clients in all sectors of industry.

Intercede

Intercede

Intercede is a cybersecurity company specializing in digital identities, derived credentials and access control, enabling digital trust in a mobile world.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

Cyber Execs

Cyber Execs

Cyber Execs is a Cyber Security Consultancy & Executive Recruitment firm.

Global Security Network (GSN)

Global Security Network (GSN)

GSN focuses on specialized IT Security solutions & services for the military, law enforcement, critical infrastructure and oil & gas sectors in the Middle East.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.

TerraZone

TerraZone

TerraZone is a global cyber security and privacy solutions provider to governments and enterprises.