Blog Posts Tagged with "terrorism"

7fef78c47060974e0b8392e305f0daf0

Stuxnet, SCADA, Nation State Terrorism and FUD

October 13, 2011 Added by:Infosec Island Admin

With the advent of the “smart” grid, this might in fact make it easier to have a larger percentage of failure within the system itself. Everything being tied together this way and monitored will only serve to make the system more susceptible to a single point of failure...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Al Qaeda’s New Digital Shingle: Al-Fidaa

July 14, 2011 Added by:Infosec Island Admin

While the site is registered in the US, the actual servers are all located in Malaysia. So, once again we see that Malaysia seems to be a hub where the Internet Jihad is concerned. I have to wonder just how well our government gets along with the Malay government...

Comments  (22)

7fef78c47060974e0b8392e305f0daf0

Shamikh1.info: The New Den of Scum and Villainy

July 02, 2011 Added by:Infosec Island Admin

It's anyone’s guess as to the attack's perpetrators, methods, and final outcome until someone from the Al-Qaeda camp speaks up. Meanwhile, the media will continue to spin on MI6 hacking them or those mysterious British hackers that many articles mentioned. “Bollocks” As they say in England...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Game of Whack-A-Mole: Was Al-Shamukh Hacked?

June 30, 2011 Added by:Infosec Island Admin

Who attacked Shamikh and why? There no evidence cited or even hinted at in the real world that MI6 or MI5 for that matter had anything to do with this. For all they know, it could have been The Jester or someone with like technology that DoS’d them and got them yanked offline by their host...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Attack Disrupts Al-Qaeda Communications

June 30, 2011 Added by:Headlines

“Al-Qaeda's online communications have been temporarily crippled... Hacking attacks by amateur cybervigilantes typically involve one technique, be it DDOS or SQLI. This particular event began as a basic domain hijacking, which does tend to happen every so often..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Important Security Tips for Jihobbyists At Majahden

June 29, 2011 Added by:Infosec Island Admin

Majahden have been learning about how psyops, hacking, disinformation, and being pwn3d works. With the new invigoration in the cyber-jihadi community since Osama Bin Laden's demise, they have taken up the gauntlet not only to hack, but to wage a cyber-propaganda campaign like never before...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Terrorism and New Media: The Post Al Qaeda Generation

May 06, 2011 Added by:Ben Rothke

The Internet has revolutionized how we socialize and do business, speeding commerce, facilitating knowledge sharing, and creating networks that could not have existed a decade ago. Unfortunately, terrorists reap the same benefits...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Are Second Biggest Threat to Airline Security

April 01, 2011 Added by:Headlines

"The next generation of cyber threats may directly affect aviation equipment, not simply stealing credit cards and denying travelers access to online booking sites. For the future, cyber-threats will be more diversified and take the form of multi-stage and multi-dimensional attacks..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Social Media and Lone Wolf Terror Attacks

March 17, 2011 Added by:Dan Dieterle

Social media sites that is allowing terror groups to communicate, especially to singular operatives, according to The National’s coverage of a Saudi counter-terrorism conference. Of major concern was how to combat the use of social media sites to recruit and communicate with lone wolf terrorists...

Comments  (0)

959779642e6e758563e80b5d83150a9f

What if al-Qaeda Got Stuxnet?

March 02, 2011 Added by:Danny Lieberman

Given these circumstances, deterrence will necessarily be based more on denying any benefit to attackers than on imposing costs through retaliation. To stay ahead of its pursuers, the United States must constantly adjust and improve its defenses...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Cyberterrorism - As Seen On TV

March 01, 2011 Added by:J. Oquendo

The fact is, cyberterrorism is such an overrated term with no definitive rhyme or reason and it seems that anyone who uses antivirus software nowadays can call themselves a security expert, spread a rumor, embed the term terrorism and cause more damage than some lowly terrorists...

Comments  (1)

7e6249b5c7f6b63c28587c820b16edcb

Reconnaissance Gone Retail and Security - A Challenging Duality

November 03, 2010 Added by:Robert Gezelter

A few years ago, the possession of a notebook computer would have been cause for a warning that electronic devices are not allowed within the building. Now, much, if not all of the facility is equipped with Wi-Fi, and there is an unencrypted Wi-Fi available for patients and visitors...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Privacy, National Security and Internet Traffic

October 07, 2010 Added by:Theresa Payton

I would like to see open and vigorous debate where the voices of both Privacy advocates and National Security & Law Enforcement agencies are heard. By vetting the pros and cons of the issue, I believe the country can craft a law that accommodates the concerns and needs of both sides...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

DTIC and IATAC- Resources for the War on Cyber Terrorism

July 30, 2010 Added by:Jon Stout

Originally developed in World War II as a resource on enemy technology, the DTIC has morphed into a valuable - if underutilized - tool for understanding the technology bases for enemy attacks...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

Al-Qa'eda on the Arabian Peninsula - A Brief Overview of 'Inspire'

July 14, 2010 Added by:

It is important to understand that the EIs continue to use our infrastructure against as they have over the years during physical attacks and currently using social network software and sites to drive awareness and training while building recruitment through online communities and various forms of propaganda...

Comments  (0)

F230c4cd39d680d4cde59248861bdf9d

Neural Network vs. Terrorist Financing?

June 20, 2010 Added by:Michael O'Connor

Historically, to facilitate money laundering criminals opened a legitimate business as a cover, and then used the business account to deposit and legitimize large sums of money. Large deposits into accounts were routinely overlooked by banking institutions and law enforcement alike.

Comments  (2)

Page « < 1 - 2 - 3 > »