Skip links

Terrorism & Cyber-Space

Cyber Toufan al-Aksa Hacker Group Join the Cease Fire

On November 22nd, Cyber Toufan al-Aksa hacker group released a press statement on their official Telegram channel, declaring they will halt their ongoing operations against Israel in cyberspace in light of the Israel-Hamas ceasefire. They expressed their intent to resume operations after the ceasefire, with

Hamas Media Campaign: “Al Aqsa Flood”

On 07 OCTOBER 2023, Hamas, the Palestinian terrorist group based in the Gaza Strip, began a devastating and coordinated attack that shook Israel. Beginning at approximately 0630 (UTC+03), Hamas launched a massive rocket barrage targeting civilian areas while simultaneously Hamas terrorist operatives initiated infiltration operations,

Twitter

Big Tech Becomes Alt-Tech

Elon Musk’s purchase of Twitter, considered part of the Big-Tech ecosystem, heralds an alarming change regarding online disinformation. Statements about removing censorship and allowing free speech, accompanied by solid end-to-end encryption and weakening the enforcement of online content monitoring, are prominent warning signs for democracy

Trends in Cyber-Terrorism 2021

Cyberspace has become one of the main arenas for state warfare. It is also largely used by non-state actors or state sponsored actors, including criminal networks and terrorist organisations. In recent years, their operations in cyberspace have become a real challenge for global security. Throughout

The Dead Drops of Online Terrorism

Summary: With the proliferation, spread, and impact of violent extremist and terrorist content on the Internet and social media, governments, and security agencies have increased their countermeasures online. In response, terrorists and violent extremists have similarly altered their behavior by changing tactics and migrating to

Cyber Report April-June 2011

Executive Summary Throughout the period under review (April-June 2021), terror activity continued to permeate through the cyber arena. Jihadist terrorist groups continued their efforts spanning from operational to defensive and offensive actions. Terror groups have also been continuing the trend of using various social media

Cyber Report January-March 2021

The first quarter of 2021 has shown a continuation of efforts by terrorist organizations to utilize cyber space for a variety of purposes. As such , January saw an escalation in the far right extremism movement with the inauguration of United States President Joe Biden.

Assessing the Cyber Threat to the Train Industry

Over recent decades we have witnessed several successful attacks and attempts by terrorist organizations to strike trains around the world. Most of these attacks were carried out in Asia and Europe where the rail infrastructure is a common means of transportation. An attack and/or successful

Use of the ZeroNet Network by the Islamic State

During the month of September 2016, members of Cyber Kahilafah began to promote and advertise the use of a technology called ZeroNet, which enables decentralized Web site hosting using a peer-to-peer (P2P) network. The obvious advantage of this technology, which was initially released in 2015,

Killing Lists – The Evolution of Cyber Terrorism?

Over the past year, there have been increasing calls warning of the possible danger of a successful cyber-attack by the Islamic State against the West. In the beginning of April 2016, Admiral Michael Rogers, Commander of the US Cyber Command, claimed that the IS could

Analysis of Cyber Trends 2016

The potential of cyberspace, including the Internet, was first recognized by terrorist organizations over a decade ago but in recent years there has been a significant increase in the scope of Internet use and in the level of sophistication with which it is used. At

The Use of IoT in Offensive Cyber Activities

The realm of cyber-attacks has advanced over the years, both in regards to the scope of the phenomenon and in terms of the technological abilities displayed by the attackers. One recently developing field in this realm is the use of terminal equipment, including communications equipment

ICT Cyber-Desk Report: Op-Israel 2017

Op-Israel is the name given to a campaign of cyber-attacks carried out by hackers identified withthe international anarchic group ‘Anonymous’, and with pro-Palestinian hacker groups, againstIsraeli Internet sites with the goal “to disconnect Israel from the cyber world”.

ICT Cyber-Desk Review: Report #20

The main trends identified in the first quarter of 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and international defense policy.

ICT Cyber-Desk Review: Report #21

The main trends identified during the month of April 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and counter-measures to protect against cyber-crime.