Skip links

Terrorism & Cyber-Space

ICT Cyber-Desk Report: Cyber threats on African subjects

The evolution of cyber crime has lead to more sophisticated attacks in Africa, from password theft to credit card fraud and attacks on entire computer networks, with hundreds of millions of African cyber attacks on an annual basis. Serainu ranked the government and banking sectors as being

ICT Cyber-Desk Report: Kybernetiq

Introduction   The Cyber Space has become an important factor in the modern terrorism strategy. Not only are terrorists using the internet to advance their goals, they are also innovating and adapting to changes in the technological environment. In order to fight terrorism effectively, we

IS-Supporting Hacktivists in Southeast Asia

Download the full article Key Findings   There is a growing trend of hacktivism activities in Southeast Asia, including Web site defacement, distributed denial-of-service (DDoS) attacks and information leaks. One group that operates using this strategy is the United Cyber Caliphate (UCC) collective, which operates

United Cyber Caliphate

Electronic jihad refers to two aspects. The first is operative, and deals with incitement and encouragement for the idea ofjihad, such as propaganda, financing and media. The second is technical, and deals with cyberattacks and cyber defense.

IRGC Cyber-Warfare Capabilities

The cyber domain is composed of cellular technologies, space-based communications, and intranets, in addition to the internet of networked computers. Cyberspace often has a physical infrastructure layer which is dictated by the financial laws of rival capitals along with partisan laws of control and self-governing

Crime Prediction Technologies

Download the full article   The term “pre-crime” was coined in the film “Minority Report”, in which a criminal event that has not yet occurred is predicted, and a special police unit called “pre-crime” places the would-be offender in preventive detention in order to prevent

Jihadists Use of Virtual Currency 2

In January 2018, the ICT published a document reviewing the use of virtual currency by jihadists. A year later, we re-examined the developments that took place in this arena in the test cases described in the 2018 document, and we documented additional cases that occurred

Identifying Money Transfers and Terror Finance Infrastructure

While monitoring Bitcoin address 1LaNXgq2ctDEa4fTha6PTo8sucqzieQctq, an irregular increase in the scope of activity has been identified compared to a previous review. A deeper review showed that the same address served a seemingly legitimate financial website by the name of cash4ps, which has been active in

Cyber Report 33 – April-June 2020

The potential of cyberspace was identified by terror organizations over a decade ago. However, in recent years there is a significant uptick in the use of the internet and the sophistication of such use. Where initially terror organizations utilized static websites, then later incorporated basic