Blog Posts Tagged with "terrorism"

03b2ceb73723f8b53cd533e4fba898ee

Russia deploys a massive surveillance network system

November 03, 2012 Added by:Pierluigi Paganini

DPI is most advanced and intrusive category of inspection tools, it is able to analyze every packet in traffic filtering particular services or contents. Remeber that DPI systems have been adopted by various regimes such Iran and also China used the technology to implement its Great Firewall project...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Cleansing the Internet of Terrorism

October 28, 2012 Added by:Electronic Frontier Foundation

Internet companies under the CleanIT regime would not only be allowed, but in fact obligated to store communications containing “terrorist content,” even when it has been removed from their platform, in order to supply the information to law enforcement agencies...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Social Media as a Cyber Warfare Gamechanger

October 14, 2012 Added by:Don Eijndhoven

Is some creative type with a long exposure to really unconventional warfare getting his cues from a government with a score to settle, and deep pockets to fund the whole thing? It’s a scary thought. If used properly, Social Media might very well be the most refined weapon for asymmetric warfare to date...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

Newest U.S. Counter-Terrorism Strategy: Trolling

August 08, 2012 Added by:Infosec Island Admin

The State Department has given the go ahead to a 20-something to put together a coalition of people across the globe to subtly troll the jihadi’s online in the hope that it will shame them into dropping the notions of radical jihad. Why am I surprised that a hair brained scheme like this would come out of State?

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

The Next War on Terror Will Be (Lost) Online

May 31, 2012 Added by:Ali-Reza Anghaie

Consider we might be putting our cyber soldiers on the wrong line. Sure, there are growing ranks of cyber counter-terrorism practitioners across both private and public space, except that's only to meet the enemy we really want to see - the one that suits perhaps what we're comfortable doing or getting funding for...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

FBI: Al-Qaeda Video Calls for Electronic Jihad against the US

May 24, 2012 Added by:Dan Dieterle

A 6 minute Al Qaeda video translated by the FBI calls for extremist followers to perform cyber attacks against the US. The video states that US computer systems are as vulnerable to electronic warfare as airline security was leading up to the 9/11 attacks...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

AQ, AQAP, BVD Bombs, CIA, INSPIRE, Media, Moles... Oh My

May 09, 2012 Added by:Infosec Island Admin

Al-Qaeda has a plan to leverage the internet even more than they already are. I believe they will continue to put the magazine out and perhaps inspire others to make clones. The ubiquitous nature of the internet will only serve to allow their propaganda to be loosed upon us all...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

AQ Air: Mostly Hot - Not So Interesting

April 12, 2012 Added by:Infosec Island Admin

In the rar file that was uploaded to multiple locker sites were five video files that were taken from the internet and re-purposed for the release. Metadata from the files shows that they were handled on a Windows machine using the following software...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

TeaMp0isoN Claims U.K. Anti-Terrorism Hotline Hack

April 12, 2012 Added by:Headlines

"We did it with ease. Their security is bizarre, it's as if they have no security whatsoever. The security they lack, it's incredible. They use an old phone system. It's pretty much the art of phreaking," a TeaMp0isoN member called 'Detonate' said in an interview...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Jihadi Sites Fall Down, Go Boom... Again

April 08, 2012 Added by:Infosec Island Admin

At first I thought that players in the patriot hacker movement may have been involved, but it seems more so now that all points to a concerted action by governments. The hacking of the sites likely was done via bad installs of PHP and SQL on the boxes that the databases resided on...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Coming Soon: FUD FUD FUD!

April 03, 2012 Added by:Infosec Island Admin

The terrorists may aspire to this, as nebulous as that aspiration can be from an image like the one in question. This in NO WAY means we are doomed or that NYC will be seeing an attack like 9/11 again directly relating to this piece of so called artwork...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

IP Address Leads Police to Shootout with French Terrorist

March 24, 2012 Added by:Dan Dieterle

Elite French special operation RAID Police took down the radical Muslim terrorist Mohamed Merah on Thursday. Merah had contacted one of his victims, a French soldier, on the pretext of buying his scooter. Investigators were able to match Merah to his IP address...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Security for 2012 Olympics Focus of Business Continuity Forum

March 19, 2012 Added by:Headlines

"The market-wide exercise showed that the banking community is prepared to handle some aspects of a cyber attack, but must shore up other areas. I encourage all managers to think about whether they are have adequate, practical plans in place..."

Comments  (2)

850c7a8a30fa40cf01a9db756b49155a

Cyber Security: The Sky is Falling

February 24, 2012 Added by:J. Oquendo

Common sense dictates that there is a lot of money to be made in "cyberlandia", and someone is going to make it by using any boogeyman available. Cyber is the new Gold Rush, however much of what is being portrayed by the media is blown out of proportion and unrealistic...

Comments  (8)

7fef78c47060974e0b8392e305f0daf0

Anonymous, Occupy, Cyber Terrorism, and Jingoistic Rhetoric

February 23, 2012 Added by:Infosec Island Admin

To really have an attack that merits all this hand wringing you would have to have considerable money, time, and effort. Never mind the access that one would need to innumerable systems, and this is not Anonymous even if they made boasts that they could or would do it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US and Netherlands Expand Cybersecurity Coordination

February 22, 2012 Added by:Headlines

The Letter of Intent recognizes expanded coordination between the US and the Netherlands, and outlines several areas to further collaborate on cybersecurity including incident management and response activities, control systems security, and cybersecurity exercises...

Comments  (0)

Page « < 1 - 2 - 3 > »