New Software To Identify ISIS Recruiters

launch-of-isis-page-islamic-state.jpg

ISIS is busy producing many videos to post online, trying to recruit more fighters to join its ranks, which is terrorizing Iraq and Syria. Ironically, the terror organization is using the Internet, which is one of the most western tools available to them, with their emphasis on social media platforms, such as Facebook, Twitter and various chats.

After standing helpless in front of countless Internet accounts spreading propaganda and incapable of blocking each and every one, as more are being created every day, the Russian security services have decided to try a different method.
Russian researchers are now working on some new computer software to locate potential ISIS recruiters online, this to prevent the recruiting efforts from the very start. Researchers are trying build a profile of any particular potential recruiter and then implement it in computer software, which will try to catch the actual ones on social media.

The computer program known as “Laplace’s Demon” has been already monitoring social networks for extremist groups since this spring to prevent calls for mass unrest, and it will be upgraded and will be used in a slightly different manner, starting 2016. 

After the program will begin hunting for social network accounts belonging to potential ISIL recruiters, specialists of the Center will then send the account owners a message in Arabic and then linguistically examine the answer. The user will then be advised to follow a link, which, in turn, will provide the IT-specialists with his IP-address, operating system and browser details. 

With this data, specially trained staff, such as hackers can get full access to their computers. This way, researchers can begin searching for telltale signs, such as misinterpreted quotations of the Koran, which can be identified by religious scholars, as well as a general linguistic analysis undertaken by experts in Arab studies. Few experts suggest that the researchers should focus on a potential victim, which can then be used to help to prevent victims being signed up to the terrorist group, rather than reconstructing a portrait of a recruiter. We should understand why a person is open to recruitment,” Alexei Filatov, Vice President of the International Association of Veterans of the Antiterrorism Alfa Group said.

Russia has been concerned for some time of the ISIS recruitment phenomenon, and mostly of recruiting fighters from its own borders. Last June Deputy Minister of Foreign Affairs, Sergey Syromolotov, said that the number of fighters from Russia and Caucasus in Syria is about 2,200 people. It’s obvious that the current Russian presence in Syria is increasing fear of the soldiers returning home and of the role they might play in inciting terror and guerilla warfare when they do.
I-hls: http://bit.ly/1H4hr5S

« UK Cybercrime & Online Fraud on the Rise
Your Personal Safety. There’s An App For That »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

Cynet

Cynet

Cynet simplifies security by providing a rapidly deployed, comprehensive platform for detection, prevention and automated response to advanced threats with near-zero false positives.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Sky Republic

Sky Republic

Sky Republic offers a Smart Contract Platform to integrate and synchronize business networks beyond EDI and API.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

Omnipotech

Omnipotech

Omnipotech is a complete managed service provider. From desktop to datacenter, all the technology support you need, under one umbrella.

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.

Barquin Solutions

Barquin Solutions

Barquin Solutions is a full-service information technology consulting firm focused on supporting U.S. federal government agencies and their partners.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).