In July, Florida resident Tayyab Tahir Ismail was sentenced to 20 years in prison for distributing information pertaining to explosives online.

According to a press release issued by the FBI, Tahir posted bomb making instructions on the Internet, and on a social media platform. His goal was for that information to be used to create a weapon of mass destruction in support of violent jihad.

Social Media, IoT, Attack Planning and Radicalization

Use of the Internet and social media to propagate radical views, share information related to a terror attack or plan for an attack is well documented.

Technology as a Double-Edged Sword

GAO’s findings echoed those of a report just one year earlier from the Office of the Director of National Intelligence (ODNI), which noted that technology “will be a double-edged sword. On the one hand, it will facilitate terrorist communications, recruitment, logistics, and lethality. On the other, it will provide authorities with more sophisticated techniques to identify and characterize threats….”

The RAND Corporation furthers this analysis of technology’s role in prevention activities, finding that early phase terrorism prevention activities should include monitoring online content advocating violence, and messaging to encourage communities to identify radicalized individuals for intervention.

United Nations:  Internet Can Aid in Counter-Terrorism

Against this backdrop, the United Nations recently found that the significant amount of knowledge about terrorist organizations activities on the Internet can aid in counter-terrorism efforts, and that new technologies are helping proactively prevent, detect and deter terrorist attacks.

AI and machine learning are technologies that continue to take center stage in the identification of online threats and prevention of catastrophic events, whether it’s from Islamic or right-wing extremists.

AI Can Help Assess Threats and Enhance Situational Awareness

In fact when it comes to enhancing situational awareness (SA), and better detecting and discerning real attacks from false alarms, the Center for Strategic and International Studies (CSIS) noted that “AI applications for all-source data fusion, front-line analysis, and predictive analytics promise the potential to unlock new insights and effectively enhance strategic SA.”

The organization went on to say that the vast amounts of open-source data available through media, social media and the Internet of Things provides new indicators that are relevant to SA. Importantly, AI data mining can process large amounts of this information quickly and efficiently increase precision in the detail and quality of information collected.  

The Radiance Solution

That’s exactly where technologies like Lumina’s Radiance platform come into play.  Radiance’s Open Source Intelligence (OS-INT) includes more than 6,500 terms related to potential national security risks and threats. The platform conducts nearly 135,000 searches across all publicly-available data on the web, correlating names with these terms and cross-referencing over 1 million queries into Lumina’s proprietary databases of risk.  A search of this magnitude – done manually – would take more than a year to complete.

Learn more about our edge-to-edge risk detection through Radiance OS-INT, Internet Intelligence (NET-INT) and our Human Intelligence (HUM-INT) mobile app, S4.

Try Radiance for free today.