New Software To Identify ISIS Recruiters

launch-of-isis-page-islamic-state.jpg

ISIS is busy producing many videos to post online, trying to recruit more fighters to join its ranks, which is terrorizing Iraq and Syria. Ironically, the terror organization is using the Internet, which is one of the most western tools available to them, with their emphasis on social media platforms, such as Facebook, Twitter and various chats.

After standing helpless in front of countless Internet accounts spreading propaganda and incapable of blocking each and every one, as more are being created every day, the Russian security services have decided to try a different method.
Russian researchers are now working on some new computer software to locate potential ISIS recruiters online, this to prevent the recruiting efforts from the very start. Researchers are trying build a profile of any particular potential recruiter and then implement it in computer software, which will try to catch the actual ones on social media.

The computer program known as “Laplace’s Demon” has been already monitoring social networks for extremist groups since this spring to prevent calls for mass unrest, and it will be upgraded and will be used in a slightly different manner, starting 2016. 

After the program will begin hunting for social network accounts belonging to potential ISIL recruiters, specialists of the Center will then send the account owners a message in Arabic and then linguistically examine the answer. The user will then be advised to follow a link, which, in turn, will provide the IT-specialists with his IP-address, operating system and browser details. 

With this data, specially trained staff, such as hackers can get full access to their computers. This way, researchers can begin searching for telltale signs, such as misinterpreted quotations of the Koran, which can be identified by religious scholars, as well as a general linguistic analysis undertaken by experts in Arab studies. Few experts suggest that the researchers should focus on a potential victim, which can then be used to help to prevent victims being signed up to the terrorist group, rather than reconstructing a portrait of a recruiter. We should understand why a person is open to recruitment,” Alexei Filatov, Vice President of the International Association of Veterans of the Antiterrorism Alfa Group said.

Russia has been concerned for some time of the ISIS recruitment phenomenon, and mostly of recruiting fighters from its own borders. Last June Deputy Minister of Foreign Affairs, Sergey Syromolotov, said that the number of fighters from Russia and Caucasus in Syria is about 2,200 people. It’s obvious that the current Russian presence in Syria is increasing fear of the soldiers returning home and of the role they might play in inciting terror and guerilla warfare when they do.
I-hls: http://bit.ly/1H4hr5S

« UK Cybercrime & Online Fraud on the Rise
Your Personal Safety. There’s An App For That »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

Team8

Team8

Team8 is Israel’s most prestigious cybersecurity think tank and venture creation foundry.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

Odyssey

Odyssey

Odyssey is an ISO 27001 certified, Cyber -Security, Infrastructure and Risk Management Solutions integrator and a Managed Security Services Provider.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Electrosoft Services

Electrosoft Services

Electrosoft provide mature, innovative technology-based services and solutions to power critical IT programs and keep our nation safe from cybersecurity attacks.

Traced

Traced

TRACED is changing the detection paradigm. Empowering defenders to go on the offense to engage cyber attackers before they compromise your organization.

Secjur

Secjur

Secjur is a provider of AI-based compliance tools that aim to put compliance, data protection, information security and whistleblowing on autopilot.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

Emircom

Emircom

Emircom is one of the Middle East's leading independent providers of IT infrastructure services, helping clients to drive growth and deliver measurable outcomes.

Techtron Business IT Services

Techtron Business IT Services

TECHTRON has been providing business IT services since 2004. Our focus is on SMBs and we are good at it. Our customers trust us, they love our high levels of service, and they love what we stand for.