Terrorists’ Social Media Output Under Scrutiny

jade-helm-15-minerva.jpg

The Israeli anti-terror organizations are using special “filters” to try and get pre-warning about terror groups from social media. 

A United Nations panel asked social-media companies such as Twitter and Facebook to respond to how terrorist groups use their networks to spread propaganda or recruit members with increasing success.

As these terrorist groups, such as ISIS or al-Qaeda, evolve their social-media skills, Arizona State University (ASU) will be part of a team monitoring their advancements and trying to determine how their online actions can be negated. ASU is leading a group project that has been awarded a Minerva grant to study of what types of information go viral online, and what types of actions or responses can halt the spread of viral information.

The Minerva Initiative is a Department of Defense-sponsored, university-based social-science research initiative launched by the secretary of Defense in 2008. It focuses on areas of strategic importance to US national security.

An ASU release reports that this grant will allow the team, which includes people from the US Military Academy and Britain’s University of Exeter, to study information cascades, trends marked by people ignoring their own knowledge or information in favor of suggestions from other people’s actions, as they relate to the social-media posts of terrorist networks.
“The first phase of the project is we are trying to understand what goes viral. Viral messages are driven by two things, what type of content, and what type of network. The right content and the right types of networks are going to resonate and spread and maybe gain new followers,” said Hasan Davulcu, the project’s principal investigator.
Once they understand the information cascade, Davulcu said they might be able to determine how to counter the viral messages. But, he says, this study will not include developing content to thwart online terrorism. Rather, the team will be observing what organic information created by social-media users tends to halt terrorists’ viral content.
iHLS: http://bit.ly/1UTH7Lq

« Security Engineer Location: Sao Paolo
Laptop Warriors: A British ‘Cyber Defence League’? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

Canadian Centre for Cyber Security (CCCS)

Canadian Centre for Cyber Security (CCCS)

The Cyber Centre is the single unified source of expert advice, guidance, services and support on cyber security for government, critical infrastructure, the private sector and the public.

Mi-Token

Mi-Token

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

Intuity

Intuity

The Intuity suite of services provides companies with a complete awareness of their security status and helps them in an efficient, efficient and sustainable improvement process.

Tecnalia Research & Innovation

Tecnalia Research & Innovation

Tecnalia is the largest center of applied research and technological development in Spain, a benchmark in Europe and a member of the Basque Research and Technology Alliance.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Salt Cybersecurity

Salt Cybersecurity

Salt Cybersecurity offer a four-pronged approach to information security that includes Custom Security Policy, Vulnerability Assessment, Threat Detection, and Security Awareness Training.

Dynamic Quest

Dynamic Quest

Dynamic Quest is a managed IT, cloud and security services companies, providing a comprehensive range of technology services including cybersecurity, backup and disaster recovery.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

IT-Seal

IT-Seal

IT-Seal GmbH specializes in sustainable security culture and awareness training.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.