161,168 research outputs found

    ISIS in America: A Sociohistorical Analysis

    Get PDF
    During the summer of 2014, the terrorist organization Islamic State (commonly referred to as Islamic State in Iraq and Syria, or ISIS) garnered international attention after its unprecedented territorial acquisitions and violence in the Middle East. Today, ISIS vies with al-Qaeda for leadership of the global Islamic Extremist movement and has extended its violence all over the world, including the United States. U.S. based supporters generally choose to engage with the ideology in one of three categories: as a foreign fighter, domestic plotter, or domestic non-plotter. Despite this threat, there is very little quantitative research concerning U.S. ISIS supporters and the incidents they plan. Utilizing data from the American Terrorism Study (ATS), the current study compares ISIS perpetrators across the three support type categories, as well as ISIS and al-Qaeda and Associated Movements (AQAM) affiliated persons and incidents in the United States. I conducted Chi Square and Conjunctive Analysis of Case Configurations to determine significant differences. The analysis indicated significant difference across ISIS support types with regard to gender and age of the individuals, and suggested common patterns in the types of individuals who choose to leave the U.S. or stay and engage in violence. Additional analysis indicated significant differences in the residency status and race between ISIS and AQAM perpetrators. Finally, results showed that, although ISIS and AQAM incidents have different configurations concerning targets, weapons, and group size, their success rates are relatively the same. In conclusion, there are important differences between ISIS and AQAM affiliated persons and incidents that may merit considering them as separate entities rather than together under the umbrella of Islamic Extremist

    The ISIS Project: Real Experience with a Fault Tolerant Programming System

    Get PDF
    The ISIS project has developed a distributed programming toolkit and a collection of higher level applications based on these tools. ISIS is now in use at more than 300 locations world-wise. The lessons (and surprises) gained from this experience with the real world are discussed

    The ISIS project: Fault-tolerance in large distributed systems

    Get PDF
    The semi-annual status report covers activities of the ISIS project during the second half of 1989. The project had several independent objectives: (1) At the level of the ISIS Toolkit, ISIS release V2.0 was completed, containing bypass communication protocols. Performance of the system is greatly enhanced by this change, but the initial software release is limited in some respects. (2) The Meta project focused on the definition of the Lomita programming language for specifying rules that monitor sensors for conditions of interest and triggering appropriate reactions. This design was completed, and implementation of Lomita is underway on the Meta 2.0 platform. (3) The Deceit file system effort completed a prototype. It is planned to make Deceit available for use in two hospital information systems. (4) A long-haul communication subsystem project was completed and can be used as part of ISIS. This effort resulted in tools for linking ISIS systems on different LANs together over long-haul communications lines. (5) Magic Lantern, a graphical tool for building application monitoring and control interfaces, is included as part of the general ISIS releases

    Fast casual multicast

    Get PDF
    A new protocol is presented that efficiently implements a reliable, causally ordered multicast primitive and is easily extended into a totally ordered one. Intended for use in the ISIS toolkit, it offers a way to bypass the most costly aspects of ISIS while benefiting from virtual synchrony. The facility scales with bounded overhead. Measured speedups of more than an order of magnitude were obtained when the protocol was implemented within ISIS. One conclusion is that systems such as ISIS can achieve performance competitive with the best existing multicast facilities--a finding contradicting the widespread concern that fault-tolerance may be unacceptably costly

    The ISIS Twitter census: defining and describing the population of ISIS supporters on Twitter

    Get PDF
    Presents a demographic snapshot of ISIS supporters on Twitter by analysing a sample of 20,000 ISIS-supporting Twitter accounts, mapping the locations, preferred languages, and the number and type of followers of these accounts. Overview Although much ink has been spilled on ISIS’s activity on Twitter, very basic questions about the group’s social media strategy remain unanswered. In a new analysis paper, J.M. Berger and Jonathon Morgan answer fundamental questions about how many Twitter users support ISIS, who and where they are, and how they participate in its highly organized online activities. Previous analyses of ISIS’s Twitter reach have relied on limited segments of the overall ISIS social network. The small, cellular nature of that network—and the focus on particular subsets within the network such as foreign fighters—may create misleading conclusions. This information vacuum extends to discussions of how the West should respond to the group’s online campaigns. Berger and Morgan present a demographic snapshot of ISIS supporters on Twitter by analyzing a sample of 20,000 ISIS-supporting Twitter accounts. Using a sophisticated and innovative methodology, the authors map the locations, preferred languages, and the number and type of followers of these accounts. Among the key findings: From September through December 2014, the authors estimate that at least 46,000 Twitter accounts were used by ISIS supporters, although not all of them were active at the same time.  Typical ISIS supporters were located within the organization’s territories in Syria and Iraq, as well as in regions contested by ISIS. Hundreds of ISIS-supporting accounts sent tweets with location metadata embedded.  Almost one in five ISIS supporters selected English as their primary language when using Twitter. Three quarters selected Arabic. ISIS-supporting accounts had an average of about 1,000 followers each, considerably higher than an ordinary Twitter user. ISIS-supporting accounts were also considerably more active than non-supporting users. A minimum of 1,000 ISIS-supporting accounts were suspended by Twitter between September and December 2014. Accounts that tweeted most often and had the most followers were most likely to be suspended. Much of ISIS’s social media success can be attributed to a relatively small group of hyperactive users, numbering between 500 and 2,000 accounts, which tweet in concentrated bursts of high volume. Based on their key findings, the authors recommend social media companies and the U.S government work together to devise appropriate responses to extremism on social media. Approaches to the problem of extremist use of social media, Berger and Morgan contend, are most likely to succeed when they are mainstreamed into wider dialogues among the broad range of community, private, and public stakeholders

    Three lepton signatures from tZq interactions in the SM and top-FCNC at the CMS experiment at \sqrt{s} = 8 TeV

    Full text link
    The search for a top quark in association with a Z boson can be performed in both top pair production as well as single top production. Targeting the three lepton final state, the search can be used to identify the standard model (SM) process of a single top quark associated with a Z boson and to search for flavour changing neutral current (FCNC) interactions. The presented analysis uses a data sample corresponding to an integrated luminosity of 19.719.7 fb1^{-1} recorded by the CMS experiment at the LHC in proton collisions at s=8\sqrt{s}=8 TeV. The cross section for the SM tZq production is measured to be σ(tZqlνbl+lq)=107+8\sigma(tZq\rightarrow l\nu bl^+ l^- q)= 10^{+8}_{-7} fb with a significance of 2.4σ2.4 \sigma. Exclusion limits at 95%\% confidence level on the branching ratio of a top quark decaying to a Z boson and an up or charm quark are determined to be BR(tZu)<0.022%BR(t \rightarrow Zu) < 0.022\% and BR(tZc)<0.049%BR(t \rightarrow Zc) < 0.049\% respectively.Comment: Presented at the 9th International Workshop on Top Quark Physics, Olomouc, Czech Republic, September 19-23, 201

    Ion mass spectrometer experiment for ISIS-2 spacecraft

    Get PDF
    The International Satellite for Ionospheric Studies (ISIS) program of NASA was the longest duration program in NASA history. A number of satellites were flown under this program, the last being called ISIS-2, which was launched on April 1, 1971 and operated successfully for over 13 years. An experiment called the Ion Mass Spectrometer (IMS) was flown on the ISIS-2 spacecraft. It operated for 10 years providing a large data base of positive ion composition and ion flow velocities along the orbit of the satellite, the latter being circular at 1400 km with a 90 degree inclination. The data were processed and reside in the National Space Sciences Data Center
    corecore