Artificial Intelligence Decodes ISIS

20150811001165074380-original_800x600.jpg?itok=xHdlLBRM&mtime=1439283161

Dr. Paulo Shakarian has a system of data mining that helps understand tactics used by Islamic State. AAP

Researchers in the US have used artificial intelligence to better understand the military strategy of Islamic State extremists.

Analysis established a causal link between air strikes and roadside bomb attacks as well as a connection with the jihadists' use of military tactics. The algorithmic system analysed 2,200 recorded incidents of IS activity from the second half of 2014.

One feature they noticed was spikes in the use of improvised explosive devices (IEDs). Paulo Shakarian at Arizona State University, one of the co-authors of the paper and a former US army officer who served in Iraq in 2006, told the BBC: "When they experience a lot of air strikes against them they shift away from a large infantry-style operation and use IEDs."

Researchers also discovered that the use of vehicle-borne bombs increased prior to large infantry operations by the militants. One example of this occurred in Iraq. "We believe this relationship is because they want to prevent reinforcements from the Iraqi army getting out of Baghdad," explained Dr Shakarian.

A finding that initially baffled the researchers was sharp increases in arrests by Islamic State following Syrian air strikes. Dr Shakarian said they now believed that these might be retaliatory attempts to weed out Syrian intelligence agents who might have played a role in the targeting of the strikes. He added that the tactics of ISIS differed markedly from those of the enemy forces he faced in Iraq nine years ago.

The extremist group, he said, was more complex and dynamic, which was why the nature of their strategies was not always obvious without computational analysis.

Elizabeth Quintana, director of military sciences at the Royal United Services Institute (Rusi), said forces targeting Islamic State were likely to find research like this useful. "The military has access to a lot of information," she said, "They need a way to bring it down to a digestible format. Analytics is definitely the way to do that."
Noel Sharkey, a computer scientist at the University of Sheffield, added that the approach might help predict likely types of attacks. "It suggests that IS has a predictable operational strategy rather than an arbitrary one, or a new one for each attack," he commented. "Of course, the problem is that this could change suddenly and particularly if they noticed that other military forces were acting on their predictability."

Dr Shakarian will present the paper to delegates of KDD 2015, a conference on data analysis, in Sydney, Australia.
BBC: http://http://bbc.in/1gisgKk

« How To Avoid All-Out War in Cyberspace
No. Petition to Pardon Snowden Rejected by Obama »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

RU-CERT

RU-CERT

RU-CERT is the CSIRT / CERT team of the Russian Federation.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

SGCyberSecurity

SGCyberSecurity

SGCyberSecurity is Singapore's No.1 Cyber Security portal. From this platform, you will be able to find useful articles, resources and connect with the security companies for your business needs.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

MASS

MASS

MASS provides world-class capabilities in electronic warfare operational support, cyber security, information management, support to military operations and law enforcement.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

IriusRisk

IriusRisk

IriusRisk is an open Threat Modeling platform that automates and supports creating threat models at design time.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

Department of Homeland Security (DHS)

Department of Homeland Security (DHS)

The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.

Censinet

Censinet

Censinet provides the first and only third-party risk management platform for healthcare organizations to manage the threats to patient care that exist within an expanding ecosystem.