Terrorists’ Social Media Output Under Scrutiny

jade-helm-15-minerva.jpg

The Israeli anti-terror organizations are using special “filters” to try and get pre-warning about terror groups from social media. 

A United Nations panel asked social-media companies such as Twitter and Facebook to respond to how terrorist groups use their networks to spread propaganda or recruit members with increasing success.

As these terrorist groups, such as ISIS or al-Qaeda, evolve their social-media skills, Arizona State University (ASU) will be part of a team monitoring their advancements and trying to determine how their online actions can be negated. ASU is leading a group project that has been awarded a Minerva grant to study of what types of information go viral online, and what types of actions or responses can halt the spread of viral information.

The Minerva Initiative is a Department of Defense-sponsored, university-based social-science research initiative launched by the secretary of Defense in 2008. It focuses on areas of strategic importance to US national security.

An ASU release reports that this grant will allow the team, which includes people from the US Military Academy and Britain’s University of Exeter, to study information cascades, trends marked by people ignoring their own knowledge or information in favor of suggestions from other people’s actions, as they relate to the social-media posts of terrorist networks.
“The first phase of the project is we are trying to understand what goes viral. Viral messages are driven by two things, what type of content, and what type of network. The right content and the right types of networks are going to resonate and spread and maybe gain new followers,” said Hasan Davulcu, the project’s principal investigator.
Once they understand the information cascade, Davulcu said they might be able to determine how to counter the viral messages. But, he says, this study will not include developing content to thwart online terrorism. Rather, the team will be observing what organic information created by social-media users tends to halt terrorists’ viral content.
iHLS: http://bit.ly/1UTH7Lq

« Security Engineer Location: Sao Paolo
Laptop Warriors: A British ‘Cyber Defence League’? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium was created to encourage use-inspired research, training and technology awareness in cybersecurity.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

Austrian Institute of Technology (AIT)

Austrian Institute of Technology (AIT)

AIT is Austria's largest research and technology organisation and a specialist in the key infrastructure issues of the future including data science and cybersecurity.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

ValueMentor

ValueMentor

ValueMentor is a leading cyber security service provider in the Middle East. We enable clients to reduce risk by taking a strategic approach to cybersecurity.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Force Majeure

Force Majeure

Force Majeure specializes in cybersecurity, incident response, and digital forensics, with experience spanning more than a decade.

HunCERT

HunCERT

HunCERT's mission is to assist Hungarian Internet Service Providers in applying appropriate procedures to address the risks of computer network incidents and to respond to such incidents.

ReasonLabs

ReasonLabs

ReasonLabs have created a next-generation anti-virus that is enterprise grade, yet accessible to any personal device around the world.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.

Insight Enterprises

Insight Enterprises

Insight is a leading solutions integrator, helping you navigate today’s ever-changing business environment with teams of technical experts and decades of industry experience.