• Computing for Ebola Challenge

    Researchers at the Network Dynamics and Simulation Science Laboratory (NDSSL) have been using a combination of modeling techniques to predict the spread of the Ebola outbreak. As part of those efforts, the team created an adaptable set of global synthetic populations, allowing for rapid response as the situation continues to unfold. The synthetic populations and other informatics resources are now openly available to aid other researchers and citizen scientists. The NDSSL is hosting a Computing for Ebola Challenge from 3 October to 10 October 2014. The goal of the hackathon is to develop an application to combat the Ebola epidemic. All are welcome to join.

  • Political traffic by Arabs on social media overwhelmingly hostile to, suspicious of U.S.

    Researchers found that a great deal of the political and social traffic by Arabs on social media is deeply hostile to and suspicious of the United States. U.S. officials are concerned that Internet users in the Arab world understand history and current events in ways fundamentally different from the American version. “Suspicion and opposition to U.S. foreign policy appear to be so deep and so widely shared, even by those on opposite sides of other contentious issues, that it’s hard to imagine how the U.S. could begin to rebuild trust,” said one expert.

  • State Department’s social media campaign against ISIS questioned

    The State Departmentis advancing its anti-terrorism efforts on social media by reaching out to vulnerable English-speakers who could be recruited to join the Islamic State (IS). The campaign emphasizes IS’s brutality, and, mockingly, advises would-be recruits to learn “useful new skills” such as “blowing up mosques” and “crucifying and executing Muslims.” Experts say that there is a psychological error in trying to scare people off with threats that something might be exciting and thrilling. “If you challenge a young adult, particularly a male, with the fact that something might be especially difficult or challenging, you’re just exciting them,” says an expert in the psychology of terrorists.

  • Former Jihadists effective in dissuading would-be IS recruits from joining the group: Experts

    Last week British prime minister David Cameron announced new powers, allowing police to seize the passports of terrorist suspects to stop them from returning to the United Kingdom. London mayor Boris Johnson also called for British Jihadists to have their citizenship revoked. Richard Barrett, former counter-terrorism chief at MI5 and MI6, disagrees. He is advocating a passage of return for repentant fighters, saying “Many of the people who have been most successful in undermining the terrorist narrative are themselves ex-extremists.”

  • Social networks aim to curb terror posts

    Social media platforms such as Facebook, YouTube, Twitter, and Instagram have all become a staple of everyday Western lifestyles – and these avenues have also become more interesting for terrorists to exploit to advance their goals. These companies admit, however, that curbing free speech and screening violent and hateful content does involve walking a fine line.

  • ISIS cleverly exploits social media for recruiting, communicating, and instilling fear

    Islamist militants have adopted social media as their primary medium for communicating with the public. Terrorism experts and social media analysts agree that in recent weeks IS has demonstrated a mastery of social media that far exceeds that of al-Qaeda. That use of social media is partly due to the participation of young Western-educated recruits who join IS.

  • Social media grappling with problems posed by terrorists-supporting contents

    Terrorist organizations have adopted social media as a tool for spreading propaganda and recruiting new members. Social media allow terrorist groups to interact with an audience and spread their message to a broader base. Legal scholars warn that as social media networks become the modern space for public discourse, they must be careful about publishing certain content because they could come under legal scrutiny for materially supporting terrorist organizations.

  • ISIS’s appeal to Islamist recruits grows as al Qaeda seen as stale, tired, and ineffectual

    Advances by militant groups like the Islamic State of Iraq and Syria (ISIS) in the midst of turmoil in the Arab world, while al-Qaeda’s aging leaders remain relatively silent, have led would-be terrorists and Islamic scholars to question al-Qaeda’s influence on global Jihad and its would-be fighters. Within the social circles of potential militant recruits, al-Qaeda is increasingly seen as stale, tired, and ineffectual.

  • Canadian “sha’hid” used by ISIS in Jihadi recruitment video

    The Islamic State in Iraq and Syria’s (ISIS) strategy to use English-speaking Westerns and social media to recruit militants is unprecedented. ISIS has used World Cup hashtags on Twitterand Facebookto spread propaganda and generate death threats. The group’s adoption of new media could be seen as a move better to compete with rival militant groups. One of the more popular YouTube ISI video featuring a Canadian of was killed in an attack on a Syrian military airport.

  • Improved performance of facial recognition software

    Who is that stranger in your social media photo? A click on the face reveals the name in seconds, almost as soon as you can identify your best friend. While that handy app is not quite ready for your smart phone, researchers are racing to develop reliable methods to match one person’s photo from millions of images for a variety of applications.

  • Secret raises $10 million at a $50 million valuation

    Secret allows users to post messages to their circles of contacts without identifying themselves as the source of the posted message. The start-up, which was launched in January, has closed a $10 million round of funding at a $50 million post-money valuation. The funding was led by Google Ventures, with participation from KPCB.

  • QR codes threaten Internet security

    Internet security experts have raised concerns about the growing use of Quick Response codes, also known as QR codes. Because the codes can only be read by a machine, such as a smart phone, it is difficult for people to determine what they are about to download. The codes, which are often used in marketing campaigns, could also be used to subscribe people to unwanted services, such as premium SMS.

  • Anonymous messaging apps grow in popularity

    The recent surge in anonymous and ephemeral messaging apps like Backchat, Whipsper, Snapchat, Secret, and Ask.fm is a response to a growing demand for social media networks which allow users to interact without revealing their identify for fear of retribution or long-term stains on their personal records.

  • Social networking makes us smarter now, but more stupid in the long run

    Does improved connectivity to other people through social networks makes us smarter or more stupid? Some say that connectivity allows us acquire information from other people as well as by direct experience. Many pundits say that in the Internet era, in which we have access to a diversity of information, humankind will learn to make more informed decisions. Others, however, suggest having so much information at our fingertips will limit our ability for concentration, contemplation, and reflection. Controlled tests show that both arguments are correct – but on different tike scales: Being able to copy from other people in vast networks means analytical responses rapidly spread – but only by making it easy and commonplace for people to reach analytical response without engaging analytical processing. The researchers conclude that this tendency to copy without thinking “can explain why increased connectivity may eventually make us stupid by making us smarter first.”

  • Expert calls for “surveillance minimization” to restore public trust

    Surveillance minimization — where surveillance is the exception, not the rule — could help rebuild public trust following revelations about the collection of personal data, according to an expert on privacy and surveillance. “Surveillance minimization requires surveillance to be targeted rather than universal, controlled and warranted at the point of data gathering rather than of data access, and performed for the minimum necessary time on the minimum necessary people,” he says.