Download the full article Key Findings There is a growing trend of hacktivism activities in Southeast Asia, including Web site defacement, distributed denial-of-service (DDoS) attacks and information leaks. One group that operates using this strategy is the United Cyber Caliphate (UCC) collective, which operates
This report covers the period of July-September 2018.
Electronic jihad refers to two aspects. The first is operative, and deals with incitement and encouragement for the idea ofjihad, such as propaganda, financing and media. The second is technical, and deals with cyberattacks and cyber defense.
An Examination of a Potential Connection between the Trafficking of Women on the Darknet and the Financing of Terrorism Human trafficking constitutes a key component of the terrorist strategy to subjugate and enslave vulnerable populations, promote ideology and increase the recruitment of activists. In addition, human trafficking
The cyber domain is composed of cellular technologies, space-based communications, and intranets, in addition to the internet of networked computers. Cyberspace often has a physical infrastructure layer which is dictated by the financial laws of rival capitals along with partisan laws of control and self-governing
Written by Dr. Michael Barak and Nadine Liv
Download the full article The term “pre-crime” was coined in the film “Minority Report”, in which a criminal event that has not yet occurred is predicted, and a special police unit called “pre-crime” places the would-be offender in preventive detention in order to prevent
In January 2018, the ICT published a document reviewing the use of virtual currency by jihadists. A year later, we re-examined the developments that took place in this arena in the test cases described in the 2018 document, and we documented additional cases that occurred
This report covers the period of January-March 2019.
While monitoring Bitcoin address 1LaNXgq2ctDEa4fTha6PTo8sucqzieQctq, an irregular increase in the scope of activity has been identified compared to a previous review. A deeper review showed that the same address served a seemingly legitimate financial website by the name of cash4ps, which has been active in
This report covers the period of April – June 2019
This report covers the period of July – September 2019
This report covers the period of January – March 2020
The potential of cyberspace was identified by terror organizations over a decade ago. However, in recent years there is a significant uptick in the use of the internet and the sophistication of such use. Where initially terror organizations utilized static websites, then later incorporated basic
This report covers the period of July-December 2020