Skip links

Terrorism & Cyber-Space

Trends in Cyber-Terrorism 2021

Cyberspace has become one of the main arenas for state warfare. It is also largely used by non-state actors or state sponsored actors, including criminal networks and terrorist organisations. In recent years, their operations in cyberspace have become a real challenge for global security. Throughout

The Dead Drops of Online Terrorism

Summary: With the proliferation, spread, and impact of violent extremist and terrorist content on the Internet and social media, governments, and security agencies have increased their countermeasures online. In response, terrorists and violent extremists have similarly altered their behavior by changing tactics and migrating to

Cyber Report April-June 2011

Executive Summary Throughout the period under review (April-June 2021), terror activity continued to permeate through the cyber arena. Jihadist terrorist groups continued their efforts spanning from operational to defensive and offensive actions. Terror groups have also been continuing the trend of using various social media

Cyber Report January-March 2021

The first quarter of 2021 has shown a continuation of efforts by terrorist organizations to utilize cyber space for a variety of purposes. As such , January saw an escalation in the far right extremism movement with the inauguration of United States President Joe Biden.

Assessing the Cyber Threat to the Train Industry

Over recent decades we have witnessed several successful attacks and attempts by terrorist organizations to strike trains around the world. Most of these attacks were carried out in Asia and Europe where the rail infrastructure is a common means of transportation. An attack and/or successful

Use of the ZeroNet Network by the Islamic State

During the month of September 2016, members of Cyber Kahilafah began to promote and advertise the use of a technology called ZeroNet, which enables decentralized Web site hosting using a peer-to-peer (P2P) network. The obvious advantage of this technology, which was initially released in 2015,

Killing Lists – The Evolution of Cyber Terrorism?

Over the past year, there have been increasing calls warning of the possible danger of a successful cyber-attack by the Islamic State against the West. In the beginning of April 2016, Admiral Michael Rogers, Commander of the US Cyber Command, claimed that the IS could

Analysis of Cyber Trends 2016

The potential of cyberspace, including the Internet, was first recognized by terrorist organizations over a decade ago but in recent years there has been a significant increase in the scope of Internet use and in the level of sophistication with which it is used. At

The Use of IoT in Offensive Cyber Activities

The realm of cyber-attacks has advanced over the years, both in regards to the scope of the phenomenon and in terms of the technological abilities displayed by the attackers. One recently developing field in this realm is the use of terminal equipment, including communications equipment

ICT Cyber-Desk Report: Op-Israel 2017

Op-Israel is the name given to a campaign of cyber-attacks carried out by hackers identified withthe international anarchic group ‘Anonymous’, and with pro-Palestinian hacker groups, againstIsraeli Internet sites with the goal “to disconnect Israel from the cyber world”.

ICT Cyber-Desk Review: Report #20

The main trends identified in the first quarter of 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and international defense policy.

ICT Cyber-Desk Review: Report #21

The main trends identified during the month of April 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and counter-measures to protect against cyber-crime.

ICT Cyber-Desk Report: Cyber threats on African subjects

The evolution of cyber crime has lead to more sophisticated attacks in Africa, from password theft to credit card fraud and attacks on entire computer networks, with hundreds of millions of African cyber attacks on an annual basis. Serainu ranked the government and banking sectors as being

ICT Cyber-Desk Report: Kybernetiq

Introduction   The Cyber Space has become an important factor in the modern terrorism strategy. Not only are terrorists using the internet to advance their goals, they are also innovating and adapting to changes in the technological environment. In order to fight terrorism effectively, we