January - February Newsletter

01/01/2017 | by ICT Staff  
January - February 2017
 ICT is pleased to share with you our most recent activities:
ICT Receives European Union's Horizon 2020 Prestigious Research Grants
The ICT is pleased to have won two of the European Union's prestigious Horizon 2020 program grants. Winning the research grants for two projects, as part of an international consortium, RED-Alert and TRIVALENT, grants ICT a total of 500,000 Euros.

The RED-Alert project will bring data mining and predictive analytics tools to the next level, developing novel natural language processing (NLP), semantic media analysis (SMA), social network analysis (SNA), Complex Event Processing (CEP) and artificial intelligence (AI) technologies. These technologies will be combined for the first time and validated by 6 law enforcement agencies (LEAs) to collect, process, visualize and store online data related to terrorist groups, allowing them to take coordinated action in real-time while preserving the privacy of citizens. The RED-Alert solution will outperform state-of-the-art solutions in terms of number of languages supported, privacy-preserving capabilities, usability, detection performance, real-time capabilities and integration capabilities.

The TRIVALENT project will develop complex multidimensional models, based on theoretical multidisciplinary studies. The project strives to achieve a better understanding of root-causes and related specific characteristics of violent radicalization, defining different categories of radicalized individuals as well as providing a set of early detection indicators.

Horizon 2020 is an extremely competitive framework. This achievement indicates ICT's stature in the international academic world.
ICT held an event in honor of the book of ICT Associate Brig. Gen. (Res.) Gal Hirsch: Defensive Shield - in the presence of Former Minister of Defense Moshe Ya'alon.
During January and February 2017, the ICT hosted a few delegations including a briefing to UK Labor Party Members of Parliament; a delegation of representatives from China and two delegations from Japan. 
ICT Roundtable Discussion with Muriel Domenach, French Secretary General of the Interministerial Committee for the prevention of crime and radicalization.
Chief Supt. (Ret.) Asher Ben Artzi, Lt. Col. Jeremy Bartel and Lt. Col. (Res.) Adv. Uri Ben Yaakov briefed UK and Kazakhstan Army attaches on current issues of counter-terrorism.
Dr. Michael Barak, Senior Researcher and Project Manager, International Institute for Counter-Terrorism (ICT), Interdisciplinary Center (IDC), Herzliya, participated in a Deutsch - Welle conference titled "Media Coverage of Terrorism - A Complicated Symbiosis".

The International Institute for Counter Terrorism (ICT) in cooperation with the IDC International Radio.
This edition of Counter Terrorism Today centered around the refugee crisis in Europe. Mr. Dan Diker interviewed Dr. Liav Orgad, Assistant Professor of Government at the IDC and author of The Cultural Defense of Nations: A Liberal Theory of Majority Rights; Mr. Navonel Voni Glick, Chief Operating Officer at IsraAID, Israel and an expert in disaster relief and humanitarian issues; and Dr. Gil-Ad Ariely, Chief Knowledge Officer at the ICT.
A New Counter-Terrorism Doctrine for President Trump

Prof. Boaz Ganor
The outcome of the US elections surprised many people in the United States and elsewhere in the world. Despite the fact that, during his campaign, President-Elect Donald Trump stressed his intention to resolutely fight terrorism in general, and the Islamic State in particular, neither he nor his advisors have presented a clearly formulated strategy highlighting how he intends to achieve these objectives. The only clue to be gleaned from his statements is that Trump’s counter-terrorism doctrine will be different than that of President Obama. What, then, should Trump’s new counter-terrorism policy be and how should it differ from that of President Obama?
One on One with Mr. Shabtai Shavit
In November 2015, Mr. Shabtai Shavit, Former Head of the Mossad and Chairman of ICT Board of Directors, wrote an article titled, "A New Regional Arrangement in the Middle East". The article emphasized the growing need to "draft a geo-strategic architecture for the future which will best serve the Middle East and the world".

More than a year has passed since Shavit wrote that article and laid the cornerstones for a new arrangement, yet he is still confident that this is feasible and the general idea is valid. Nevertheless, he underlined "the need to comprehend that not only the Middle East is dynamic but the global casing as well", referring, of course, to the new elected President in D.C.
The December 2016 Berlin Vehicular Ramming Attack: An Analysis

 Lt. Col. (Res.) Uri Ben Yaakov, Ms. Arava Lev, Mr. Michel D. Wyss
On Monday evening, December 19, 2016, at 20:02, Anis Amri, a 24-years old Tunisian who had previously pledged allegiance to the Islamic State (IS), drove a semi-truck with a trailer into the Breitscheid Christmas Market, located next to the Kaiser Wilhelm Memorial Church in the heart of Berlin.
Terrorism - Imposters and Deception on the Internet

 Lt. Col. (Res.) Uri Ben Yaakov
Terrorist organizations use the Internet for a wide range of activities, including the dissemination of messages, making contact, recruitment of manpower, fundraising, propaganda, incitement, psychological warfare and intelligence. Cyber-defense activities by terrorist elements include the dissemination of information and guidebooks on the subject, the provision of guidelines regarding modes of action, encryption and transfer to the darknet, which they claim will improve the efficiency of traffic protection and anonymity on the part of the organizations themselves as well as their supporters. Such activities are designed to protect against tracking software used by intelligence agencies, activists and various Internet platforms operating against terrorist organizations on the Internet in general, and on social networks in particular.

In recent months, terrorist elements have become increasingly involved in issues related to Internet deception and imposters in two main domains.