New Software To Identify ISIS Recruiters

launch-of-isis-page-islamic-state.jpg

ISIS is busy producing many videos to post online, trying to recruit more fighters to join its ranks, which is terrorizing Iraq and Syria. Ironically, the terror organization is using the Internet, which is one of the most western tools available to them, with their emphasis on social media platforms, such as Facebook, Twitter and various chats.

After standing helpless in front of countless Internet accounts spreading propaganda and incapable of blocking each and every one, as more are being created every day, the Russian security services have decided to try a different method.
Russian researchers are now working on some new computer software to locate potential ISIS recruiters online, this to prevent the recruiting efforts from the very start. Researchers are trying build a profile of any particular potential recruiter and then implement it in computer software, which will try to catch the actual ones on social media.

The computer program known as “Laplace’s Demon” has been already monitoring social networks for extremist groups since this spring to prevent calls for mass unrest, and it will be upgraded and will be used in a slightly different manner, starting 2016. 

After the program will begin hunting for social network accounts belonging to potential ISIL recruiters, specialists of the Center will then send the account owners a message in Arabic and then linguistically examine the answer. The user will then be advised to follow a link, which, in turn, will provide the IT-specialists with his IP-address, operating system and browser details. 

With this data, specially trained staff, such as hackers can get full access to their computers. This way, researchers can begin searching for telltale signs, such as misinterpreted quotations of the Koran, which can be identified by religious scholars, as well as a general linguistic analysis undertaken by experts in Arab studies. Few experts suggest that the researchers should focus on a potential victim, which can then be used to help to prevent victims being signed up to the terrorist group, rather than reconstructing a portrait of a recruiter. We should understand why a person is open to recruitment,” Alexei Filatov, Vice President of the International Association of Veterans of the Antiterrorism Alfa Group said.

Russia has been concerned for some time of the ISIS recruitment phenomenon, and mostly of recruiting fighters from its own borders. Last June Deputy Minister of Foreign Affairs, Sergey Syromolotov, said that the number of fighters from Russia and Caucasus in Syria is about 2,200 people. It’s obvious that the current Russian presence in Syria is increasing fear of the soldiers returning home and of the role they might play in inciting terror and guerilla warfare when they do.
I-hls: http://bit.ly/1H4hr5S

« UK Cybercrime & Online Fraud on the Rise
Your Personal Safety. There’s An App For That »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

National Cyber Security Centre (NCSC) - Norway

National Cyber Security Centre (NCSC) - Norway

NCSC is part of the Norwegian Security Authority, and is Norway's national cyber security hub and the national CERT.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

Japan Information Security Audit Association (JASA)

Japan Information Security Audit Association (JASA)

JASA is non-profit association active in developing and managing the quality of Information Security Auditing and Auditors in Japan.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

National Center for Manufacturing Sciences (NCMS)

National Center for Manufacturing Sciences (NCMS)

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

Silent Sector

Silent Sector

Silent Sector is a cybersecurity services company that specializes in providing a wide range of managed security services.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

PCI Security Standards Council (PCI SSC)

PCI Security Standards Council (PCI SSC)

The PCI Security Standards Council is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.

NASK

NASK

NASK is a National Research Institute under the supervision of the Chancellery of the Prime Minister of Poland. Our key activities involve ensuring security online.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.