New Software To Identify ISIS Recruiters

launch-of-isis-page-islamic-state.jpg

ISIS is busy producing many videos to post online, trying to recruit more fighters to join its ranks, which is terrorizing Iraq and Syria. Ironically, the terror organization is using the Internet, which is one of the most western tools available to them, with their emphasis on social media platforms, such as Facebook, Twitter and various chats.

After standing helpless in front of countless Internet accounts spreading propaganda and incapable of blocking each and every one, as more are being created every day, the Russian security services have decided to try a different method.
Russian researchers are now working on some new computer software to locate potential ISIS recruiters online, this to prevent the recruiting efforts from the very start. Researchers are trying build a profile of any particular potential recruiter and then implement it in computer software, which will try to catch the actual ones on social media.

The computer program known as “Laplace’s Demon” has been already monitoring social networks for extremist groups since this spring to prevent calls for mass unrest, and it will be upgraded and will be used in a slightly different manner, starting 2016. 

After the program will begin hunting for social network accounts belonging to potential ISIL recruiters, specialists of the Center will then send the account owners a message in Arabic and then linguistically examine the answer. The user will then be advised to follow a link, which, in turn, will provide the IT-specialists with his IP-address, operating system and browser details. 

With this data, specially trained staff, such as hackers can get full access to their computers. This way, researchers can begin searching for telltale signs, such as misinterpreted quotations of the Koran, which can be identified by religious scholars, as well as a general linguistic analysis undertaken by experts in Arab studies. Few experts suggest that the researchers should focus on a potential victim, which can then be used to help to prevent victims being signed up to the terrorist group, rather than reconstructing a portrait of a recruiter. We should understand why a person is open to recruitment,” Alexei Filatov, Vice President of the International Association of Veterans of the Antiterrorism Alfa Group said.

Russia has been concerned for some time of the ISIS recruitment phenomenon, and mostly of recruiting fighters from its own borders. Last June Deputy Minister of Foreign Affairs, Sergey Syromolotov, said that the number of fighters from Russia and Caucasus in Syria is about 2,200 people. It’s obvious that the current Russian presence in Syria is increasing fear of the soldiers returning home and of the role they might play in inciting terror and guerilla warfare when they do.
I-hls: http://bit.ly/1H4hr5S

« UK Cybercrime & Online Fraud on the Rise
Your Personal Safety. There’s An App For That »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TitanFile

TitanFile

TitanFile is an award-winning, easy and secure way for professionals to communicate without having to worry about security and privacy.

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

Cato Networks

Cato Networks

Cato connects your branch locations, physical and cloud datacenters, and mobile users into a secure and optimized global network in the cloud.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium is a non-profit organization that provides certifications to professionals who perform cryptocurrency-related services.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

Modern Networks

Modern Networks

Modern Networks is a leading provider of IT managed services to the UK’s commercial property sector and medium sized enterprises.