Blog Posts Tagged with "terrorism"


Stuxnet, SCADA, Nation State Terrorism and FUD

October 13, 2011 Added by:Infosec Island Admin

With the advent of the “smart” grid, this might in fact make it easier to have a larger percentage of failure within the system itself. Everything being tied together this way and monitored will only serve to make the system more susceptible to a single point of failure...

Comments  (2)


Al Qaeda’s New Digital Shingle: Al-Fidaa

July 14, 2011 Added by:Infosec Island Admin

While the site is registered in the US, the actual servers are all located in Malaysia. So, once again we see that Malaysia seems to be a hub where the Internet Jihad is concerned. I have to wonder just how well our government gets along with the Malay government...

Comments  (22)

7fef78c47060974e0b8392e305f0daf0 The New Den of Scum and Villainy

July 02, 2011 Added by:Infosec Island Admin

It's anyone’s guess as to the attack's perpetrators, methods, and final outcome until someone from the Al-Qaeda camp speaks up. Meanwhile, the media will continue to spin on MI6 hacking them or those mysterious British hackers that many articles mentioned. “Bollocks” As they say in England...

Comments  (0)


The Game of Whack-A-Mole: Was Al-Shamukh Hacked?

June 30, 2011 Added by:Infosec Island Admin

Who attacked Shamikh and why? There no evidence cited or even hinted at in the real world that MI6 or MI5 for that matter had anything to do with this. For all they know, it could have been The Jester or someone with like technology that DoS’d them and got them yanked offline by their host...

Comments  (0)


Hacker Attack Disrupts Al-Qaeda Communications

June 30, 2011 Added by:Headlines

“Al-Qaeda's online communications have been temporarily crippled... Hacking attacks by amateur cybervigilantes typically involve one technique, be it DDOS or SQLI. This particular event began as a basic domain hijacking, which does tend to happen every so often..."

Comments  (1)


Important Security Tips for Jihobbyists At Majahden

June 29, 2011 Added by:Infosec Island Admin

Majahden have been learning about how psyops, hacking, disinformation, and being pwn3d works. With the new invigoration in the cyber-jihadi community since Osama Bin Laden's demise, they have taken up the gauntlet not only to hack, but to wage a cyber-propaganda campaign like never before...

Comments  (0)


Terrorism and New Media: The Post Al Qaeda Generation

May 06, 2011 Added by:Ben Rothke

The Internet has revolutionized how we socialize and do business, speeding commerce, facilitating knowledge sharing, and creating networks that could not have existed a decade ago. Unfortunately, terrorists reap the same benefits...

Comments  (0)


Hackers Are Second Biggest Threat to Airline Security

April 01, 2011 Added by:Headlines

"The next generation of cyber threats may directly affect aviation equipment, not simply stealing credit cards and denying travelers access to online booking sites. For the future, cyber-threats will be more diversified and take the form of multi-stage and multi-dimensional attacks..."

Comments  (0)


Social Media and Lone Wolf Terror Attacks

March 17, 2011 Added by:Dan Dieterle

Social media sites that is allowing terror groups to communicate, especially to singular operatives, according to The National’s coverage of a Saudi counter-terrorism conference. Of major concern was how to combat the use of social media sites to recruit and communicate with lone wolf terrorists...

Comments  (2)


What if al-Qaeda Got Stuxnet?

March 02, 2011 Added by:Danny Lieberman

Given these circumstances, deterrence will necessarily be based more on denying any benefit to attackers than on imposing costs through retaliation. To stay ahead of its pursuers, the United States must constantly adjust and improve its defenses...

Comments  (0)


Cyberterrorism - As Seen On TV

March 01, 2011 Added by:J. Oquendo

The fact is, cyberterrorism is such an overrated term with no definitive rhyme or reason and it seems that anyone who uses antivirus software nowadays can call themselves a security expert, spread a rumor, embed the term terrorism and cause more damage than some lowly terrorists...

Comments  (1)


Reconnaissance Gone Retail and Security - A Challenging Duality

November 03, 2010 Added by:Robert Gezelter

A few years ago, the possession of a notebook computer would have been cause for a warning that electronic devices are not allowed within the building. Now, much, if not all of the facility is equipped with Wi-Fi, and there is an unencrypted Wi-Fi available for patients and visitors...

Comments  (0)


Privacy, National Security and Internet Traffic

October 07, 2010 Added by:Theresa Payton

I would like to see open and vigorous debate where the voices of both Privacy advocates and National Security & Law Enforcement agencies are heard. By vetting the pros and cons of the issue, I believe the country can craft a law that accommodates the concerns and needs of both sides...

Comments  (0)


DTIC and IATAC- Resources for the War on Cyber Terrorism

July 30, 2010 Added by:Jon Stout

Originally developed in World War II as a resource on enemy technology, the DTIC has morphed into a valuable - if underutilized - tool for understanding the technology bases for enemy attacks...

Comments  (0)


Al-Qa'eda on the Arabian Peninsula - A Brief Overview of 'Inspire'

July 14, 2010 Added by:

It is important to understand that the EIs continue to use our infrastructure against as they have over the years during physical attacks and currently using social network software and sites to drive awareness and training while building recruitment through online communities and various forms of propaganda...

Comments  (0)


Neural Network vs. Terrorist Financing?

June 20, 2010 Added by:Michael O'Connor

Historically, to facilitate money laundering criminals opened a legitimate business as a cover, and then used the business account to deposit and legitimize large sums of money. Large deposits into accounts were routinely overlooked by banking institutions and law enforcement alike.

Comments  (2)

Page « < 1 - 2 - 3 > »