Artificial Intelligence Decodes ISIS

20150811001165074380-original_800x600.jpg?itok=xHdlLBRM&mtime=1439283161

Dr. Paulo Shakarian has a system of data mining that helps understand tactics used by Islamic State. AAP

Researchers in the US have used artificial intelligence to better understand the military strategy of Islamic State extremists.

Analysis established a causal link between air strikes and roadside bomb attacks as well as a connection with the jihadists' use of military tactics. The algorithmic system analysed 2,200 recorded incidents of IS activity from the second half of 2014.

One feature they noticed was spikes in the use of improvised explosive devices (IEDs). Paulo Shakarian at Arizona State University, one of the co-authors of the paper and a former US army officer who served in Iraq in 2006, told the BBC: "When they experience a lot of air strikes against them they shift away from a large infantry-style operation and use IEDs."

Researchers also discovered that the use of vehicle-borne bombs increased prior to large infantry operations by the militants. One example of this occurred in Iraq. "We believe this relationship is because they want to prevent reinforcements from the Iraqi army getting out of Baghdad," explained Dr Shakarian.

A finding that initially baffled the researchers was sharp increases in arrests by Islamic State following Syrian air strikes. Dr Shakarian said they now believed that these might be retaliatory attempts to weed out Syrian intelligence agents who might have played a role in the targeting of the strikes. He added that the tactics of ISIS differed markedly from those of the enemy forces he faced in Iraq nine years ago.

The extremist group, he said, was more complex and dynamic, which was why the nature of their strategies was not always obvious without computational analysis.

Elizabeth Quintana, director of military sciences at the Royal United Services Institute (Rusi), said forces targeting Islamic State were likely to find research like this useful. "The military has access to a lot of information," she said, "They need a way to bring it down to a digestible format. Analytics is definitely the way to do that."
Noel Sharkey, a computer scientist at the University of Sheffield, added that the approach might help predict likely types of attacks. "It suggests that IS has a predictable operational strategy rather than an arbitrary one, or a new one for each attack," he commented. "Of course, the problem is that this could change suddenly and particularly if they noticed that other military forces were acting on their predictability."

Dr Shakarian will present the paper to delegates of KDD 2015, a conference on data analysis, in Sydney, Australia.
BBC: http://http://bbc.in/1gisgKk

« How To Avoid All-Out War in Cyberspace
No. Petition to Pardon Snowden Rejected by Obama »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LiveVault

LiveVault

LiveVault delivers fully automated, turnkey, backup over the Internet or a private network connection for uninterrupted remote data protection.

National Cyber Security Centre (NCSC) - New Zealand

National Cyber Security Centre (NCSC) - New Zealand

The role of the NCSC is to help New Zealand’s most significant public and private sector organisations to protect their information systems from advanced cyber-borne threats.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.

Diligent

Diligent

Diligent's SaaS GRC platform gives leaders a connected view of governance, risk, compliance and ESG across their organization.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.

SECTA5

SECTA5

SECTA5 is a cybersecurity company building a next-generation Continuous Threat and Exposure Management platform, leveraging the expertise of offensively trained cyber defenders.

Stern Cybersecurity

Stern Cybersecurity

Stern Cybersecurity offers a robust defense against the ever-evolving landscape of digital threats.

SignPath

SignPath

SignPath provides leading-edge software and SaaS services that ensure code integrity from development to distribution.