Artificial Intelligence Decodes ISIS

20150811001165074380-original_800x600.jpg?itok=xHdlLBRM&mtime=1439283161

Dr. Paulo Shakarian has a system of data mining that helps understand tactics used by Islamic State. AAP

Researchers in the US have used artificial intelligence to better understand the military strategy of Islamic State extremists.

Analysis established a causal link between air strikes and roadside bomb attacks as well as a connection with the jihadists' use of military tactics. The algorithmic system analysed 2,200 recorded incidents of IS activity from the second half of 2014.

One feature they noticed was spikes in the use of improvised explosive devices (IEDs). Paulo Shakarian at Arizona State University, one of the co-authors of the paper and a former US army officer who served in Iraq in 2006, told the BBC: "When they experience a lot of air strikes against them they shift away from a large infantry-style operation and use IEDs."

Researchers also discovered that the use of vehicle-borne bombs increased prior to large infantry operations by the militants. One example of this occurred in Iraq. "We believe this relationship is because they want to prevent reinforcements from the Iraqi army getting out of Baghdad," explained Dr Shakarian.

A finding that initially baffled the researchers was sharp increases in arrests by Islamic State following Syrian air strikes. Dr Shakarian said they now believed that these might be retaliatory attempts to weed out Syrian intelligence agents who might have played a role in the targeting of the strikes. He added that the tactics of ISIS differed markedly from those of the enemy forces he faced in Iraq nine years ago.

The extremist group, he said, was more complex and dynamic, which was why the nature of their strategies was not always obvious without computational analysis.

Elizabeth Quintana, director of military sciences at the Royal United Services Institute (Rusi), said forces targeting Islamic State were likely to find research like this useful. "The military has access to a lot of information," she said, "They need a way to bring it down to a digestible format. Analytics is definitely the way to do that."
Noel Sharkey, a computer scientist at the University of Sheffield, added that the approach might help predict likely types of attacks. "It suggests that IS has a predictable operational strategy rather than an arbitrary one, or a new one for each attack," he commented. "Of course, the problem is that this could change suddenly and particularly if they noticed that other military forces were acting on their predictability."

Dr Shakarian will present the paper to delegates of KDD 2015, a conference on data analysis, in Sydney, Australia.
BBC: http://http://bbc.in/1gisgKk

« How To Avoid All-Out War in Cyberspace
No. Petition to Pardon Snowden Rejected by Obama »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Global Learning Systems (GLS)

Global Learning Systems (GLS)

Global Learning Systems provides security awareness and compliance training programs for employees that effectively promote behavior change and protect your organization.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

Cyber Security Centre - Daffodil International University

Cyber Security Centre - Daffodil International University

Cyber Security Centre, DIU is a non-profitable organization which is focused on applied research in cyber security.

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.