Terrorists’ Social Media Output Under Scrutiny

jade-helm-15-minerva.jpg

The Israeli anti-terror organizations are using special “filters” to try and get pre-warning about terror groups from social media. 

A United Nations panel asked social-media companies such as Twitter and Facebook to respond to how terrorist groups use their networks to spread propaganda or recruit members with increasing success.

As these terrorist groups, such as ISIS or al-Qaeda, evolve their social-media skills, Arizona State University (ASU) will be part of a team monitoring their advancements and trying to determine how their online actions can be negated. ASU is leading a group project that has been awarded a Minerva grant to study of what types of information go viral online, and what types of actions or responses can halt the spread of viral information.

The Minerva Initiative is a Department of Defense-sponsored, university-based social-science research initiative launched by the secretary of Defense in 2008. It focuses on areas of strategic importance to US national security.

An ASU release reports that this grant will allow the team, which includes people from the US Military Academy and Britain’s University of Exeter, to study information cascades, trends marked by people ignoring their own knowledge or information in favor of suggestions from other people’s actions, as they relate to the social-media posts of terrorist networks.
“The first phase of the project is we are trying to understand what goes viral. Viral messages are driven by two things, what type of content, and what type of network. The right content and the right types of networks are going to resonate and spread and maybe gain new followers,” said Hasan Davulcu, the project’s principal investigator.
Once they understand the information cascade, Davulcu said they might be able to determine how to counter the viral messages. But, he says, this study will not include developing content to thwart online terrorism. Rather, the team will be observing what organic information created by social-media users tends to halt terrorists’ viral content.
iHLS: http://bit.ly/1UTH7Lq

« Security Engineer Location: Sao Paolo
Laptop Warriors: A British ‘Cyber Defence League’? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

HoxHunt

HoxHunt

HoxHunt is an automated cyber training program that transforms the way your employees react and respond to the growing amount of phishing emails.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

Kleiner Perkins

Kleiner Perkins

For five decades, Kleiner Perkins has made history by partnering with some of the most ingenious and forward-thinking founders in technology and life sciences.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Cenobe Cyber Security

Cenobe Cyber Security

Cenobe provides customized solutions to keep you ahead of potential threats and ensure the security of your organization's systems and data.

Prembly

Prembly

Prembly are a compliance and security infrastructure company.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.