Artificial Intelligence Decodes ISIS

20150811001165074380-original_800x600.jpg?itok=xHdlLBRM&mtime=1439283161

Dr. Paulo Shakarian has a system of data mining that helps understand tactics used by Islamic State. AAP

Researchers in the US have used artificial intelligence to better understand the military strategy of Islamic State extremists.

Analysis established a causal link between air strikes and roadside bomb attacks as well as a connection with the jihadists' use of military tactics. The algorithmic system analysed 2,200 recorded incidents of IS activity from the second half of 2014.

One feature they noticed was spikes in the use of improvised explosive devices (IEDs). Paulo Shakarian at Arizona State University, one of the co-authors of the paper and a former US army officer who served in Iraq in 2006, told the BBC: "When they experience a lot of air strikes against them they shift away from a large infantry-style operation and use IEDs."

Researchers also discovered that the use of vehicle-borne bombs increased prior to large infantry operations by the militants. One example of this occurred in Iraq. "We believe this relationship is because they want to prevent reinforcements from the Iraqi army getting out of Baghdad," explained Dr Shakarian.

A finding that initially baffled the researchers was sharp increases in arrests by Islamic State following Syrian air strikes. Dr Shakarian said they now believed that these might be retaliatory attempts to weed out Syrian intelligence agents who might have played a role in the targeting of the strikes. He added that the tactics of ISIS differed markedly from those of the enemy forces he faced in Iraq nine years ago.

The extremist group, he said, was more complex and dynamic, which was why the nature of their strategies was not always obvious without computational analysis.

Elizabeth Quintana, director of military sciences at the Royal United Services Institute (Rusi), said forces targeting Islamic State were likely to find research like this useful. "The military has access to a lot of information," she said, "They need a way to bring it down to a digestible format. Analytics is definitely the way to do that."
Noel Sharkey, a computer scientist at the University of Sheffield, added that the approach might help predict likely types of attacks. "It suggests that IS has a predictable operational strategy rather than an arbitrary one, or a new one for each attack," he commented. "Of course, the problem is that this could change suddenly and particularly if they noticed that other military forces were acting on their predictability."

Dr Shakarian will present the paper to delegates of KDD 2015, a conference on data analysis, in Sydney, Australia.
BBC: http://http://bbc.in/1gisgKk

« How To Avoid All-Out War in Cyberspace
No. Petition to Pardon Snowden Rejected by Obama »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp is the world’s largest network of multi-corporate backed accelerators helping startups scale internationally.

Dcode

Dcode

Dcode connects the tech industry and government to drive commercial innovation in the federal market.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

AnaVation

AnaVation

AnaVation is a trusted partner delivering high-value, cost-effective solutions that solve the most complex technical and analytical problems for our customers.

Sparrow

Sparrow

Sparrow specializes in application security testing solutions to cope with new technology trends such as cloud, mobile, and DevSecOps.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Abertay cyberQuarter

Abertay cyberQuarter

The Abertay cyberQuarter is a cybersecurity research and development centre housed within Abertay University.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

VulnCheck

VulnCheck

VulnCheck helps organizations outpace adversaries with vulnerability intelligence that predicts avenues of attack with speed and accuracy.