Blog Posts Tagged with "counter-terrorism"

48062676f7b2fc521b0b32a3c6494469

Money Laundering Scenes In -The Digital World

November 20, 2012 Added by:gaToMaLo r. amores

By denying terrorist and criminals groups access to their money, authorities can stop them buying munitions and paying for suicide bombers. This approach has been highly successful in identifying and dismantling terrorist networks. Now they need to adapt and learn how this new DC works because it cannot be stopped...

Comments  (1)

959779642e6e758563e80b5d83150a9f

The Best Cybersecurity Strategy May be Counter-Terror

September 03, 2012 Added by:Danny Lieberman

The problem with a defensive cyber-security strategy is that it does not address the root cause of threats.

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Newest U.S. Counter-Terrorism Strategy: Trolling

August 08, 2012 Added by:Infosec Island Admin

The State Department has given the go ahead to a 20-something to put together a coalition of people across the globe to subtly troll the jihadi’s online in the hope that it will shame them into dropping the notions of radical jihad. Why am I surprised that a hair brained scheme like this would come out of State?

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

The Next War on Terror Will Be (Lost) Online

May 31, 2012 Added by:Ali-Reza Anghaie

Consider we might be putting our cyber soldiers on the wrong line. Sure, there are growing ranks of cyber counter-terrorism practitioners across both private and public space, except that's only to meet the enemy we really want to see - the one that suits perhaps what we're comfortable doing or getting funding for...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Patriot Hackers, Cyber Vigilantes, and Shot Placement

May 25, 2012 Added by:Infosec Island Admin

Governments need to get a handle on this. If they want patriot hacker units, then they will have them and they will be controlled. As opposed to the Batman vigilante model that we now have here. If they did this, there would be plenty of volunteers and it might be a good thing...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Discloses Cyber Attacks on Al-Qaeda Websites

May 24, 2012 Added by:Headlines

"Within 48 hours, our team plastered the same sites with altered versions of the ads that showed the toll al Qaida attacks have taken on the Yemeni people... Together, they will work to pre-empt, discredit and outmanoeuvre extremist propaganda,” Hillary Clinton proclaimed...

Comments  (2)

7ddc1f3000a13e4dfec28074e9e7b658

Counter Terrorism Guidelines Give Authorities Vast Access to Info

April 17, 2012 Added by:Electronic Frontier Foundation

Attorney General Holder recently signed expansive guidelines for terrorism analysts, allowing the NCTC to mirror federal databases containing personal information and hold onto the it for an extended period even if the person is not suspected of involvement in terrorism...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

Who Fights for the Users? Part II: FBI's AntiSec

March 15, 2012 Added by:Ali-Reza Anghaie

News is rampant with speculation that the FBI created AntiSec as a sting operation. I'm going to a further extreme to explore this - yes, conspiratorial. Cans of conspiracy worms get opened and they can't ever be closed. Something Government should strive to avoid...

Comments  (2)