Executive Summary Throughout the period under review (April-June 2021), terror activity continued to permeate through the cyber arena. Jihadist terrorist groups continued their efforts spanning from operational to defensive and offensive actions. Terror groups have also been continuing the trend of using various social media
The first quarter of 2021 has shown a continuation of efforts by terrorist organizations to utilize cyber space for a variety of purposes. As such , January saw an escalation in the far right extremism movement with the inauguration of United States President Joe Biden.
This report covers the period of December 2012
This report covers the period of January 2013
This report covers the period of Fabruary-April 2013
This report covers the period of March-July 2013
This report covers the period of June-September 2013
This report covers the period of October-November 2013
This report covers the period of December 2013 – January 2014
This report covers the period of February – March 2014
This report covers the period of April – June 2014
This report covers the period of July – September 2014
This report covers the period of October – December 2014
This report covers the period of January – March 2015
This report covers the period of April – June 2015
This report covers the period of July – September 2015
Over recent decades we have witnessed several successful attacks and attempts by terrorist organizations to strike trains around the world. Most of these attacks were carried out in Asia and Europe where the rail infrastructure is a common means of transportation. An attack and/or successful
This report covers the period of October – December 2015.
This report covers the period of January – March 2016.
During the month of September 2016, members of Cyber Kahilafah began to promote and advertise the use of a technology called ZeroNet, which enables decentralized Web site hosting using a peer-to-peer (P2P) network. The obvious advantage of this technology, which was initially released in 2015,
Over the past year, there have been increasing calls warning of the possible danger of a successful cyber-attack by the Islamic State against the West. In the beginning of April 2016, Admiral Michael Rogers, Commander of the US Cyber Command, claimed that the IS could
The potential of cyberspace, including the Internet, was first recognized by terrorist organizations over a decade ago but in recent years there has been a significant increase in the scope of Internet use and in the level of sophistication with which it is used. At
The information gathered by our team over the last few months indicates that terrorist groups are fundraising to finance their activities by placing commercial advertising on Websites used by jihadist elements to store information and messages. Similar efforts were discovered back in 2006, in the
This report covers the period of April-June 2016
This report covers the period of July-September 2016
This report covers the period of October – December 2016
The realm of cyber-attacks has advanced over the years, both in regards to the scope of the phenomenon and in terms of the technological abilities displayed by the attackers. One recently developing field in this realm is the use of terminal equipment, including communications equipment
Op-Israel is the name given to a campaign of cyber-attacks carried out by hackers identified withthe international anarchic group ‘Anonymous’, and with pro-Palestinian hacker groups, againstIsraeli Internet sites with the goal “to disconnect Israel from the cyber world”.
Yesterday, May 10, 2017, the Caliphate Cyber Terrorism Army (CCTA) hacker group, formerly known as the Cyber Caliphate Army (CCA), released an official statement in which it announced the end of the raid named after Islamic State spokesman, Abu Mohammad al-‘Adnani, who was killed on
The main trends identified in the first quarter of 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and international defense policy.
On Wednesday, July 5, 2017 a call was posted on a Telegram channel belonging to jihadist operatives to carry out a terrorist attack in Wimbledon similar to the attack that took place at the “Manchester Arena” events hall during a performance by the singer, Ariana
The main trends identified during the month of April 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and counter-measures to protect against cyber-crime.
This report covers the period of May 2017.
This report covers the period of June-August 2017.
Sporadic evidence of terrorists’ use of digital currency has been in existence since 2012 and there is no doubt that in recent months this trend has been growing and taking shape and now holds a prominent presence online. ICT’s Cyber-Desk reviewed documented cases of jihadists’
This report covers the period of September-November 2017.
This report covers the period of December 2017.
In the modern era of 2017, cyberspace constitutes an integral part of daily life. Its many benefits make it possible to perform a wide range of actions more easily than ever before. As a global and cross-border entity, the Internet enables a broad distribution that
The evolution of cyber crime has lead to more sophisticated attacks in Africa, from password theft to credit card fraud and attacks on entire computer networks, with hundreds of millions of African cyber attacks on an annual basis. Serainu ranked the government and banking sectors as being
This report covers the period of January-March, 2018.
Introduction The Cyber Space has become an important factor in the modern terrorism strategy. Not only are terrorists using the internet to advance their goals, they are also innovating and adapting to changes in the technological environment. In order to fight terrorism effectively, we
This report covers the period of April-June 2018.
Chinese hacker groups have become professional, strategic, and operate with improved tactics. They once were considered very bold with little regard for operational security, but now they are strategically controlled.
This report covers the period of July-September 2018.
The cyber domain is composed of cellular technologies, space-based communications, and intranets, in addition to the internet of networked computers. Cyberspace often has a physical infrastructure layer which is dictated by the financial laws of rival capitals along with partisan laws of control and self-governing
This report covers the period of January-March 2019.
This report covers the period of April – June 2019
This report covers the period of July – September 2019