Artificial Intelligence Decodes ISIS

20150811001165074380-original_800x600.jpg?itok=xHdlLBRM&mtime=1439283161

Dr. Paulo Shakarian has a system of data mining that helps understand tactics used by Islamic State. AAP

Researchers in the US have used artificial intelligence to better understand the military strategy of Islamic State extremists.

Analysis established a causal link between air strikes and roadside bomb attacks as well as a connection with the jihadists' use of military tactics. The algorithmic system analysed 2,200 recorded incidents of IS activity from the second half of 2014.

One feature they noticed was spikes in the use of improvised explosive devices (IEDs). Paulo Shakarian at Arizona State University, one of the co-authors of the paper and a former US army officer who served in Iraq in 2006, told the BBC: "When they experience a lot of air strikes against them they shift away from a large infantry-style operation and use IEDs."

Researchers also discovered that the use of vehicle-borne bombs increased prior to large infantry operations by the militants. One example of this occurred in Iraq. "We believe this relationship is because they want to prevent reinforcements from the Iraqi army getting out of Baghdad," explained Dr Shakarian.

A finding that initially baffled the researchers was sharp increases in arrests by Islamic State following Syrian air strikes. Dr Shakarian said they now believed that these might be retaliatory attempts to weed out Syrian intelligence agents who might have played a role in the targeting of the strikes. He added that the tactics of ISIS differed markedly from those of the enemy forces he faced in Iraq nine years ago.

The extremist group, he said, was more complex and dynamic, which was why the nature of their strategies was not always obvious without computational analysis.

Elizabeth Quintana, director of military sciences at the Royal United Services Institute (Rusi), said forces targeting Islamic State were likely to find research like this useful. "The military has access to a lot of information," she said, "They need a way to bring it down to a digestible format. Analytics is definitely the way to do that."
Noel Sharkey, a computer scientist at the University of Sheffield, added that the approach might help predict likely types of attacks. "It suggests that IS has a predictable operational strategy rather than an arbitrary one, or a new one for each attack," he commented. "Of course, the problem is that this could change suddenly and particularly if they noticed that other military forces were acting on their predictability."

Dr Shakarian will present the paper to delegates of KDD 2015, a conference on data analysis, in Sydney, Australia.
BBC: http://http://bbc.in/1gisgKk

« How To Avoid All-Out War in Cyberspace
No. Petition to Pardon Snowden Rejected by Obama »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

ActiveCyber

ActiveCyber

ActiveCyber is a source for news, reviews, learning, and technological innovation in the active cyber defense industry.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Infodas

Infodas

Infodas provides Cybersecurity and IT consulting / system integration services as well as a range of innovative Cybersecurity products to public sector and commercial clients.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

CyGlass

CyGlass

CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.

Cypherleak

Cypherleak

Cypherleak provide Automated Cyber Risk Monitoring & Ai powered cyber recommendations.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.