THE CHALLENGE: Social Media as a Tool to Promote Terrorist Planning and Propaganda
In a December 2018 report on National Security, the U.S. Government Accountability Office (GAO) noted that “terrorists could…increase their use of online communications to reach new recruits and disseminate propaganda.”
That finding echoed those of a report just one year earlier from the Office of the Director of National Intelligence (DNI), which noted that technology “will be a double-edged sword,” in that it also “will provide authorities more sophisticated techniques to identify and characterize threats.”
Research of terrorist activity in Syria and Iraq in 2014 noted the use of a variety of social media platforms, with Twitter as the most popular channel. In a three-month period, 59 Twitter accounts of Western fighters in Syria alone had produced a total of 154,119 tweets, with the average account posting 2,612 times. A more recent study found that social media played a role in the radicalization of nearly 70% of Islamist extremists and more than 40% of far-right extremists between 2005 and 2016.
Against this backdrop, a United Nations report found that the significant amount of knowledge about the activities of terrorist organizations found on the Internet, can aid in counter-terrorism efforts, and that new technologies are helping proactively prevent, detect and deter terrorist attacks.
Furthering that analysis, a report from the RAND corporation found that early phase terrorism prevention activities should include online content advocating violence, and messaging to encourage communities to identify radicalized individuals for intervention.
Open Source Intelligence (OS-INT)
is a deep-web listening tool that uses machine learning and artificial intelligence to assess and prioritize risk.
OS-INT scours publicly available data across the entire Internet, correlating names entered into the system with content related to 25 different risk factors, known as Behavioral Affinity Models (BAMs), and cross-referenced with more than 1 million queries into Lumina’s proprietary databases of risk.
Searches provide near-instant results, delivering meaningful, actionable intelligence to identify and prevent risk.
Internet Intelligence’s (NET-INT)
proprietary algorithms continuously identify, monitor, capture, and prioritize IP addresses exhibiting anomalous behavior across multiple risk dimensions.
The system also searches known IP addresses, producing all URLs accessed by the address. Results are nearly instantaneous, and accessed with just three clicks on the computer’s mouse.
The platform collects and stores more than 1 million interactions every day and since its inception has recorded more than 838,000 IP addresses engaged with threat-related risk topics.
Human Intelligence’s (HUM-INT) is powered by the S4 app, a crowd-sourced, mobile application that allows users to confidentially report concerns in real time.
THE SOLUTION: Using AI-Driven Technology to End Online Propaganda and Protect National Security
Radiance provides those charged with protecting national security with timely,
actionable data derived from deep web listening and analysis.
OS-INT includes more than 6,500 terms related to potential national security risks and threats. The platform conducts nearly 135,000 searches across all publicly-available data on the web, correlating names with these terms and cross-referencing over 1 million queries into Lumina’s proprietary databases of risk. Unlike social media monitoring, OS-INT is not reliant on a single platform or social media API, allowing for the continuous ingestion of all open source data. OS-INT pulls all applicable content into a comprehensive report. The results are prioritized, making it easy to further analyze the findings and determine potential risk. A manual web search of this magnitude would take 1 year and 2 months for one person to complete.
NET-INT monitors IP address behavior across 43 pre-categorized behavioral dimensions, including attack planning, cyber tactics, radicalization, and insider threat behavior. NET-INT also screens IP address associated with an entity or person of interest against all IP addresses displaying anomalous behavior collected over the lifespan of the system. NET-INT identifies geographic areas where anomalous online behavior is originating. For IP addresses that can be linked to an individual or an organization, NET-INT can provide real-time insight on what the individual or institution is researching and what data streams are informing their actions.
Radiance’s HUM-INT, or S4 app can be an important tool in addressing the RAND’s findings, helping communities identify radicalized individuals for early intervention before a potential attack occurs.
Learn how we can help protect your organization.
Learn how we can help protect your organization.
Try Radiance Today
Lumina was founded on the idea that technology is a force for good. We optimized our artificial intelligence capabilities to help keep people and places safe and secure. Protecting what matters most is more than what we do. It’s who we are.
501 E Kennedy Blvd, Tampa, FL 33602 (Headquarters)
1440 G Street NW, Washington, DC 20005
Email us at email@example.com