Islamic State On The Internet

Police in Northern Ireland are leading a bid to improve the detection of terrorist content on the internet. Project TENSOR is aimed at tackling the threat posed by Islamic State and other extremists. 

In the background, UK Prime Minister Theresa May’s warning that the fight was shifting from the “battlefield to the Internet”.

The project seeks to develop a platform offering Law Enforcement Agencies fast and reliable planning and prevention functionalities for the early detection of terrorist activities, radicalisation and recruitment, according to its website.

According to The Belfast Telegraph, Police Service of Northern Ireland (PSNI) deputy chief constable Drew Harris said: “Terrorists and criminals use the Internet to connect with each other, source tools and techniques, and grow support for their ideology. In that way, we see technology utilised in a dangerous way, a way which has the potential to threaten the safety and security of communities across Europe.
“Indeed, we have seen the terrible impact of terrorism in Europe, in London, Manchester, Nice, Paris and Brussels.
“The research undertaken in the TENSOR project will play an important part in working to increase the capability of law enforcement agencies to prevent and detect the use of the Internet by terrorists and increase community safety.”

The work is part of Horizon 2020, which describes itself as the biggest European Union research and innovation programme ever. It is supported by multiple organisations across Europe, with 16 partners from seven European countries involved in the research and innovation.

Professor Babak Akhgar, TENSOR technical and scientific lead, added: “The TENSOR project will provide law enforcement agencies with state-of-the-art capacities to combat violent radicalisation inspired by online content. The project can also enhance law enforcement agencies’ ability to identify and analyse terrorist-generated content in order to protect citizens.
“The legal and ethical framework of the project will provide a safeguarding mechanism to ensure that the TENSOR solutions are shaped by the privacy and data protection laws that protect the freedom of citizens across Europe in their use of the Internet.”

Meanwhile, Facebook announced it now has more than 150 people who are mainly focused on fighting terrorism on the social network, including a mix of academics, analysts and former law enforcement agents, according to the company’s blog. 
Within this team alone, specialists speak nearly 30 languages. This team has “significantly grown” over the last year.

I-HLS:

You Might Also Read:

Scenarios For Predicting Terrorist Attacks:

Facebook Deploys AI To Block Terror Propaganda:

 

« Insurance: How Cyber Risks Are Evolving
Australia’s Sharp Turn To Information Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

Brainwave GRC

Brainwave GRC

Brainwave GRC is a leading European software provider focused on Identity Analytics and intelligence to strengthen IT security and compliance.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

CypherEye

CypherEye

CypherEye is a next generation trust platform that advances the current state of Multi-factor Authentication (MFA) to enable highly secure, private and auditable cyber-transactions.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.

Velotix

Velotix

Velotix empowers organizations to maximize the value of their data while ensuring security and compliance in a rapidly evolving regulatory landscape.

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.