The article examines the recent media jihad campaign “Supporting Ribat and Jihad” conducted by the Islamic State and its online supporters, focusing on the concept of media jihad and its significance in response to deplatforming efforts. The article also explores the Islamic State’s transition from
The article explores the benefits, challenges, and potential impact of ChatGPT, an advanced chatbot powered by artificial intelligence. It appears that at this stage, it can be said that large language models (LLMs) and artificial intelligence (AI) models like ChatGPT have achieved a dramatic technological
This paper aims to raise awareness among policymakers and security forces regarding the exploitation of social media platforms by far-right actors to denounce the indictment of former President Donald Trump. The study was conducted over a one-month monitoring period from 18 MARCH to 18 APRIL
Elon Musk’s purchase of Twitter, considered part of the Big-Tech ecosystem, heralds an alarming change regarding online disinformation. Statements about removing censorship and allowing free speech, accompanied by solid end-to-end encryption and weakening the enforcement of online content monitoring, are prominent warning signs for democracy
The following article describes Afaq’s role in Islamic State’s cyber defense arena over the years; the recent cyber-attack on the foundation; and the implications of the attack. Download
Cyberspace has become one of the main arenas for state warfare. It is also largely used by non-state actors or state sponsored actors, including criminal networks and terrorist organisations. In recent years, their operations in cyberspace have become a real challenge for global security. Throughout
Summary Throughout the latter quarter of 2021, online supporters of the Islamic State engaged in a campaign of incitement, calling on individuals to plan and execute individual-initiative (lone-wolf) attacks against western targets. While the campaign called for individual-initiative attacks in many western countries, supporters of
Summary: With the proliferation, spread, and impact of violent extremist and terrorist content on the Internet and social media, governments, and security agencies have increased their countermeasures online. In response, terrorists and violent extremists have similarly altered their behavior by changing tactics and migrating to
Executive Summary Throughout the period under review (April-June 2021), terror activity continued to permeate through the cyber arena. Jihadist terrorist groups continued their efforts spanning from operational to defensive and offensive actions. Terror groups have also been continuing the trend of using various social media
The first quarter of 2021 has shown a continuation of efforts by terrorist organizations to utilize cyber space for a variety of purposes. As such , January saw an escalation in the far right extremism movement with the inauguration of United States President Joe Biden.
This report covers the period of December 2012
This report covers the period of January 2013
This report covers the period of Fabruary-April 2013
This report covers the period of March-July 2013
This report covers the period of June-September 2013
This report covers the period of October-November 2013
This report covers the period of December 2013 – January 2014
This report covers the period of February – March 2014
This report covers the period of April – June 2014
This report covers the period of July – September 2014
This report covers the period of October – December 2014
This report covers the period of January – March 2015
This report covers the period of April – June 2015
This report covers the period of July – September 2015
Over recent decades we have witnessed several successful attacks and attempts by terrorist organizations to strike trains around the world. Most of these attacks were carried out in Asia and Europe where the rail infrastructure is a common means of transportation. An attack and/or successful
This report covers the period of October – December 2015.
This report covers the period of January – March 2016.
During the month of September 2016, members of Cyber Kahilafah began to promote and advertise the use of a technology called ZeroNet, which enables decentralized Web site hosting using a peer-to-peer (P2P) network. The obvious advantage of this technology, which was initially released in 2015,
Over the past year, there have been increasing calls warning of the possible danger of a successful cyber-attack by the Islamic State against the West. In the beginning of April 2016, Admiral Michael Rogers, Commander of the US Cyber Command, claimed that the IS could
The potential of cyberspace, including the Internet, was first recognized by terrorist organizations over a decade ago but in recent years there has been a significant increase in the scope of Internet use and in the level of sophistication with which it is used. At
The information gathered by our team over the last few months indicates that terrorist groups are fundraising to finance their activities by placing commercial advertising on Websites used by jihadist elements to store information and messages. Similar efforts were discovered back in 2006, in the
This report covers the period of April-June 2016
This report covers the period of July-September 2016
This report covers the period of October – December 2016
The realm of cyber-attacks has advanced over the years, both in regards to the scope of the phenomenon and in terms of the technological abilities displayed by the attackers. One recently developing field in this realm is the use of terminal equipment, including communications equipment
Op-Israel is the name given to a campaign of cyber-attacks carried out by hackers identified withthe international anarchic group ‘Anonymous’, and with pro-Palestinian hacker groups, againstIsraeli Internet sites with the goal “to disconnect Israel from the cyber world”.
Yesterday, May 10, 2017, the Caliphate Cyber Terrorism Army (CCTA) hacker group, formerly known as the Cyber Caliphate Army (CCA), released an official statement in which it announced the end of the raid named after Islamic State spokesman, Abu Mohammad al-‘Adnani, who was killed on
The main trends identified in the first quarter of 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and international defense policy.
On Wednesday, July 5, 2017 a call was posted on a Telegram channel belonging to jihadist operatives to carry out a terrorist attack in Wimbledon similar to the attack that took place at the “Manchester Arena” events hall during a performance by the singer, Ariana
The main trends identified during the month of April 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and counter-measures to protect against cyber-crime.
This report covers the period of May 2017.
This report covers the period of June-August 2017.
Sporadic evidence of terrorists’ use of digital currency has been in existence since 2012 and there is no doubt that in recent months this trend has been growing and taking shape and now holds a prominent presence online. ICT’s Cyber-Desk reviewed documented cases of jihadists’
This report covers the period of September-November 2017.
This report covers the period of December 2017.
In the modern era of 2017, cyberspace constitutes an integral part of daily life. Its many benefits make it possible to perform a wide range of actions more easily than ever before. As a global and cross-border entity, the Internet enables a broad distribution that
The evolution of cyber crime has lead to more sophisticated attacks in Africa, from password theft to credit card fraud and attacks on entire computer networks, with hundreds of millions of African cyber attacks on an annual basis. Serainu ranked the government and banking sectors as being