Blog Posts Tagged with "terrorism"

7fef78c47060974e0b8392e305f0daf0

Social Media Monitoring: A Rubric for Control

February 21, 2012 Added by:Infosec Island Admin

We have become a watched commodity via all means of communication. Programs have been put together with the veneer of protecting us from another 9/11 and perhaps some of them were made with the best of intentions, but this idea of monitoring social media is half baked...

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

The Need for a Special Forces Offensive Cyber Group

February 21, 2012 Added by:Dan Dieterle

Nation State hackers are active in attacking and compromising military, government and defense contractor sites. Terrorists are using social media sites to recruit, train and spread their poison. In essence we are in a Cyber Cold War. We need a Cyber Special Forces group...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Game Theory, Anonymous Causality, and 2012

February 05, 2012 Added by:Infosec Island Admin

Over the last year we have seen an evolution within Anonymous and its various movements. The latest being the AntiSec movement, the more cohesive core of Anonymous, one that has a set group of leaders at its center, leaders with an agenda... Anarchy....

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

Acts of Terrorism vs. Cyber Threats: New Offense Scenarios

February 02, 2012 Added by:Pierluigi Paganini

“I do not think today it is necessarily the number one threat, but it will be tomorrow... Counterterrorism... with the FBI is the present number one priority. But down the road, the cyberthreat, which cuts across all programs, will be the number one threat to the country...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senate Testimony: Cyber Security as a Strategic Concern

February 02, 2012 Added by:Headlines

Testimony offered before the Senate Select Committee on Intelligence included threats to cybersecurity, the third item addressed, signifying that intrusions by state-sponsored China and Russia and independent actors like Anonymous and Lulzsec continue to be a concern...

Comments  (0)

37d5f81e2277051bc17116221040d51c

2012 Threats: Are You Ready?

January 30, 2012 Added by:Robert Siciliano

Attackers from all over the world have set their focus on critical life supporting utilities such as water and power to hold those utilities hostage for payment or to disable them to cause terror. Unfortunately, many industrial and national infrastructure networks are vulnerable...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Shifting Digital Sands of Online Jihad

January 21, 2012 Added by:Infosec Island Admin

It seems that Anonymous has potentially sparked these guys to think like them and perhaps even use their tactics instead of continuing just to shake their fingers at us as they yell. This would be an interesting paradigm change in the global Salafi movement as well as the tactics of AQ...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Why I Won’t Teach You To Track Terrorists Online

January 17, 2012 Added by:Infosec Island Admin

This is an organic process. I learned by just doing it and in the process of “doing it” I had to learn A LOT of other things apart from technology issues like hacking/security/coding etc. Remember you are dealing with PEOPLE and you have to be adept and reading them...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

AntiSec, Stratfor, and the Coming Insurrection

January 04, 2012 Added by:Infosec Island Admin

It may be that you invited a stranger into your home and said stranger, as I warned at DEFCON, may not have your interests in mind. The idea of Anonymous I think has been co-opted by those who have a larger political agenda that is not your own. It may be one that will do you harm...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Iranian Ambassador Discusses Cyber Attacks on US Targets

December 14, 2011 Added by:Infosec Island Admin

Iranian Ambassador Mohammad Hassan Ghadiri discusses the potential for state sponsored attacks on the White House, FBI, CIA, and nuclear power plant systems within the US. The video shows the ambassador talking also asking about how to further the attacks by making certain contacts...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cyber Security and Illegal Information Operations

December 13, 2011 Added by:Joel Harding

The Concept of Convention on International Information Security was released in 2011 by the Shanghai Cooperative Organization, consisting of China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan. This concept was floated to the UN as a construct for international cybersecurity...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Paradigm Shifts: The Network as a Battle Space for Jihad

December 07, 2011 Added by:Infosec Island Admin

Recent events with ICS and SCADA system vulnerabilities has shown that there is a potential for online mischief that AQ could leverage. These types of attacks would further the tenets that OBL laid out with regard to a “Death of a Thousand Cuts” type of warfare against the US...

Comments  (7)

7fef78c47060974e0b8392e305f0daf0

Anonymous and AntiSec: Mixing Metaphors Can Lead to Trouble

December 01, 2011 Added by:Infosec Island Admin

It seems that much of the recent OP’s like Robin Hood are just dysfunctional ideas. And the videos are getting closer to the jihadi videos that AQ has been putting out over the years. The same graphics, the same music, the same metaphor and rhetoric with a tinge of threat...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Hezbollah Cyber Army: War in Hyperspace?

November 29, 2011 Added by:Infosec Island Admin

The whole idea of a Cyber Jihad is a notion that should not just be sloughed off as rhetoric. I do think that if the VEVAK are involved (and they would want a hand in this I am sure) they could in fact get some real talent and reign in the ranks to do some real damage down the road...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

AT&T Hackers Funded Terrorist Group that Struck India

November 28, 2011 Added by:Headlines

“The hackers were working on commission for a terrorist group linked to Muhammad Zamir, according to the Philippine police. Zamir, a Pakistani, was arrested in Italy in 2007, where he was running a call center and allegedly buying information from Filipino hackers"...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Should We Strike Iran? How About the Information War?

November 16, 2011 Added by:Joel Harding

A pre-emptive information strike would only cause the Iranians to involuntarily spasm and deploy suicide teams to attack US and other targets worldwide. Anything less would just be posturing for political purposes and could possibly result in more senseless deaths...

Comments  (0)

Page « < 1 - 2 - 3 > »