SlideShare a Scribd company logo
1 of 24
ISIS & CYBER TERRORISM
FOR THE FULL FREE VIDEO
COURSE PLEASE VISIT
WWW.CONCISE-COURSES.COM/TRAINING/
Valid for Continuing Education!
concise
cybersecurity
PRESIDENT OBAMA
President Obama has frequently highlighted the
need to counter ISIS within Cyberspace. His closing
remarks at the Summit of Countering Violent
Extremism in February 2015 in DC, United States was
as follows:
concise
cybersecurity
PRESIDENT OBAMA
President Obama has frequently highlighted the
need to counter ISIS within Cyberspace. His closing
remarks at the Summit of Countering Violent
Extremism in February 2015 in DC, United States was
as follows:
concise
cybersecurity
“....the high quality videos, the online
magazines, the use of social media,
terrorist Twitter accounts – it’s all
designed to target today’s young people
online....”
'Cyber Jihad' is now firmly recognized
as being a viable threat to the security
of those fighting violent extremism, i.e.
the 'west'.
concise
cybersecurity
'Cyber Jihad' is now firmly recognized
as being a viable threat to the security
of those fighting violent extremism, i.e.
the 'west'.
concise
cybersecurity
“...the use of modern tech tools and cyberspace in
order to promote Jihad against those classified by
its' followers as enemies of Islam...”
WHAT IS THE CYBER CALIPHATE?
You'll often hear the "Cyber Caliphate" be used
when there's a mention of ISIS and Cyber. Also
referred to as the "Islamic State Hacking
Division" or the "United Cyber Caliphate" this is
a loose group of Hacktivists that act as a cyber
army for ISIS.
The "Cyber Caliphate" was started by Junaid
Hussain, a British National, who was later killed
in a US airstrike in Raqqa, Iraq
WHAT IS THE CYBER CALIPHATE?
Even in its early days, al-Qaeda consistently demonstrated a clear interest in
making use of the Internet for propaganda purposes.
One of the world’s first ever ‘pro’ al-Qaeda website, Azzam.com, was created
nearly twenty years ago. Ever since, the level of sophistication in the use of
online tools for Jihadist propaganda has grown and continues to grow
significantly.
HISTORY OF CYBER JIHAD
HISTORY OF CYBER JIHAD (SCREENSHOT OF AZZAM.COM)
Even in its early days, al-Qaeda consistently demonstrated a clear interest in
making use of the Internet for propaganda purposes.
One of the world’s first ever ‘pro’ al-Qaeda website, Azzam.com, was created
nearly twenty years ago. Ever since, the level of sophistication in the use of
online tools for Jihadist propaganda has grown and continues to grow
significantly.
HISTORY OF CYBER JIHAD
The ‘pioneer’ of the Cyber Jihad
was Anwar al-Awlaki, the so-called
"bin Laden of the internet". Anwar
al-Awlaki is credited with coining
the term: 'creative terrorism'
HISTORY OF CYBER JIHAD
Anwar al-Awlaki
ISIS, as an organization, obviously needs money. Cyber-crime pays and, in
fact, can be considered as being a more reliable source of revenue for the
terrorist organization as opposed to, for example, oil sales - which are now on
the decline.
ISIS’s income has fallen by about a third [mid 2016] compared to the same
time last year. Revenue for the militant group fell to USD 56 million a month in
March from around USD 80 million a month in the middle of 2015; hence
their need to embark on greater cyber crime.
CYBER CRIME & CYBER JIHAD
ISIS, as an organization, obviously needs money. Cyber-crime pays and, in
fact, can be considered as being a more reliable source of revenue for the
terrorist organization as opposed to, for example, oil sales - which are now on
the decline.
ISIS’s income has fallen by about a third [mid 2016] compared to the same
time last year. Revenue for the militant group fell to USD 56 million a month in
March from around USD 80 million a month in the middle of 2015; hence
their need to embark on greater cyber crime.
CYBER CRIME & CYBER JIHAD
To finance themselves, cyber-jihadists resort to the same
tactics as cybercriminals, conducting phishing attacks or
purchasing online details of stolen credit cards.
This is, for example, how UK born Younis Tsouli, also
know online as ‘Irhabi 007’ and his affiliates generated
some USD 2.5 million. Tsouli was then labeled as being
the “world’s most wanted cyber-jihadist”, and his
conviction was the first under British law for incitement
to commit an act of terrorism through the Internet.
YOUNIS TSOULI (AKA IRHABI 007)
Younis Tsouli
Cyber-Jihadists use the internet
to raise funds directly through
donations: Al-Qaeda’s global
fundraising network, for instance,
is built on charities and NGOs
that largely communicate with
their donors through social media
and online forums.
CYBER JIHAD OPERATES LIKE AN NGO
Not all Cyber-Jihad is offensive in
nature...
ISIS makes extensive use of
Twitter, Facebook, Tumblr, and
Instagram, and according to
senior American officials,
operatives and supporters of the
organization produce up to
90,000 pro-Jihadi tweets every
day...
PROPAGANDA
A recent extensive study found
that ISIS supporters operate at
least 46,000 independent Twitter
accounts, with 200-500 of these
accounts active all day, thereby
helping to disseminate the
organization’s propaganda.
ISIS has approximately 200+
‘highly’ active Twitter accounts
PROPAGANDA
The organization has technically competent members, indeed, an mobile app
called ‘Dawn of Glad Tidings,’ which for a while was available for download in
Google and Apple app stores and enabled its supporters to follow the
organization’s activities in real time. ‘Dawn of Glad Tidings’ was marketed as an
“app that gives you news from Syria, Iraq and the Islamic world”.
ISIS’S MOBILE APP
In addition to the extensive use of social
media by the organization’s operatives and
supporters, ISIS's cyber Jihad includes
offensive use of online space for attacks on
websites. Jihad organizations often refer to
this offensive activity as a ‘ghazwa’ (raid/
attack, in Arabic) participated in the
seventh century against the infidels.
OFFENSIVE CYBER ATTACKS
- ISIS takeover of US Central Command (YouTube Account);
- Over 19,000 French websites DOS’d following Charlie Hebdo attack;
- Twitter handle of Newsweek and the International Business Times website;
- Two local US news stations, a non-profit group supporting military spouses
EXAMPLES OF HACKS
FOR THE FULL FREE VIDEO
COURSE PLEASE VISIT
WWW.CONCISE-COURSES.COM/TRAINING/
Valid for Continuing Education!

More Related Content

Viewers also liked

Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Jorge Sebastiao
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins ResumePaul Mullins
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015AFCEA International
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)Valeriu Margescu
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Jorge Sebastiao
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502Bill Hagestad II
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsMikko Jakonen
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...AFCEA International
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Ulrich Janßen
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)TBSS Group
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
 

Viewers also liked (20)

Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
The Panama Papers Hack
The Panama Papers HackThe Panama Papers Hack
The Panama Papers Hack
 
HA10 – Task 1
HA10 – Task 1HA10 – Task 1
HA10 – Task 1
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins Resume
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
 

Similar to ISIS and Cyber Terrorism

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Bjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of mediaBjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of mediaRai University
 
How ISIS games twitter
How ISIS games twitterHow ISIS games twitter
How ISIS games twitterCHSGmedia
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxbudbarber38650
 
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docxgilbertkpeters11344
 
Isis In Libya - Winning the Propaganda War
Isis In Libya - Winning the Propaganda WarIsis In Libya - Winning the Propaganda War
Isis In Libya - Winning the Propaganda Warmovelibyaforward
 
Descriptive Writing Examples Pdf. Descriptive Essay. 20
Descriptive Writing Examples Pdf. Descriptive Essay. 20Descriptive Writing Examples Pdf. Descriptive Essay. 20
Descriptive Writing Examples Pdf. Descriptive Essay. 20Valerie Burroughs
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterJulie Davis
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
ISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERRORISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERRORAlay Thakkar
 
Us intelligence officer 'every single terrorist attack in us was a false fla...
Us intelligence officer  'every single terrorist attack in us was a false fla...Us intelligence officer  'every single terrorist attack in us was a false fla...
Us intelligence officer 'every single terrorist attack in us was a false fla...RepentSinner
 

Similar to ISIS and Cyber Terrorism (19)

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
Bjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of mediaBjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of media
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
How ISIS games twitter
How ISIS games twitterHow ISIS games twitter
How ISIS games twitter
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docx
 
Demi-PDF
Demi-PDFDemi-PDF
Demi-PDF
 
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
 
Isis In Libya - Winning the Propaganda War
Isis In Libya - Winning the Propaganda WarIsis In Libya - Winning the Propaganda War
Isis In Libya - Winning the Propaganda War
 
Descriptive Writing Examples Pdf. Descriptive Essay. 20
Descriptive Writing Examples Pdf. Descriptive Essay. 20Descriptive Writing Examples Pdf. Descriptive Essay. 20
Descriptive Writing Examples Pdf. Descriptive Essay. 20
 
567 bruce
567 bruce567 bruce
567 bruce
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
ISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERRORISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERROR
 
ISIS
ISISISIS
ISIS
 
Us intelligence officer 'every single terrorist attack in us was a false fla...
Us intelligence officer  'every single terrorist attack in us was a false fla...Us intelligence officer  'every single terrorist attack in us was a false fla...
Us intelligence officer 'every single terrorist attack in us was a false fla...
 

More from London School of Cyber Security

How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 
Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?London School of Cyber Security
 
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsChanging the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsLondon School of Cyber Security
 

More from London School of Cyber Security (19)

Silk Road & Online Narcotic Distribution
Silk Road & Online Narcotic DistributionSilk Road & Online Narcotic Distribution
Silk Road & Online Narcotic Distribution
 
Ashely Madison Hack
Ashely Madison HackAshely Madison Hack
Ashely Madison Hack
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and TrainingHow To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
What Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSSWhat Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSS
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 
Crowdsourced Vulnerability Testing
Crowdsourced Vulnerability TestingCrowdsourced Vulnerability Testing
Crowdsourced Vulnerability Testing
 
Memory forensics and incident response
Memory forensics and incident responseMemory forensics and incident response
Memory forensics and incident response
 
Gauntlt Rugged By Example
Gauntlt Rugged By ExampleGauntlt Rugged By Example
Gauntlt Rugged By Example
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?
 
Sploitego
SploitegoSploitego
Sploitego
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Blind XSS
Blind XSSBlind XSS
Blind XSS
 
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsChanging the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
 
Sploitego
SploitegoSploitego
Sploitego
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

ISIS and Cyber Terrorism

  • 1. ISIS & CYBER TERRORISM
  • 2. FOR THE FULL FREE VIDEO COURSE PLEASE VISIT WWW.CONCISE-COURSES.COM/TRAINING/ Valid for Continuing Education!
  • 4. PRESIDENT OBAMA President Obama has frequently highlighted the need to counter ISIS within Cyberspace. His closing remarks at the Summit of Countering Violent Extremism in February 2015 in DC, United States was as follows: concise cybersecurity
  • 5. PRESIDENT OBAMA President Obama has frequently highlighted the need to counter ISIS within Cyberspace. His closing remarks at the Summit of Countering Violent Extremism in February 2015 in DC, United States was as follows: concise cybersecurity “....the high quality videos, the online magazines, the use of social media, terrorist Twitter accounts – it’s all designed to target today’s young people online....”
  • 6. 'Cyber Jihad' is now firmly recognized as being a viable threat to the security of those fighting violent extremism, i.e. the 'west'. concise cybersecurity
  • 7. 'Cyber Jihad' is now firmly recognized as being a viable threat to the security of those fighting violent extremism, i.e. the 'west'. concise cybersecurity
  • 8. “...the use of modern tech tools and cyberspace in order to promote Jihad against those classified by its' followers as enemies of Islam...”
  • 9. WHAT IS THE CYBER CALIPHATE?
  • 10. You'll often hear the "Cyber Caliphate" be used when there's a mention of ISIS and Cyber. Also referred to as the "Islamic State Hacking Division" or the "United Cyber Caliphate" this is a loose group of Hacktivists that act as a cyber army for ISIS. The "Cyber Caliphate" was started by Junaid Hussain, a British National, who was later killed in a US airstrike in Raqqa, Iraq WHAT IS THE CYBER CALIPHATE?
  • 11. Even in its early days, al-Qaeda consistently demonstrated a clear interest in making use of the Internet for propaganda purposes. One of the world’s first ever ‘pro’ al-Qaeda website, Azzam.com, was created nearly twenty years ago. Ever since, the level of sophistication in the use of online tools for Jihadist propaganda has grown and continues to grow significantly. HISTORY OF CYBER JIHAD
  • 12. HISTORY OF CYBER JIHAD (SCREENSHOT OF AZZAM.COM)
  • 13. Even in its early days, al-Qaeda consistently demonstrated a clear interest in making use of the Internet for propaganda purposes. One of the world’s first ever ‘pro’ al-Qaeda website, Azzam.com, was created nearly twenty years ago. Ever since, the level of sophistication in the use of online tools for Jihadist propaganda has grown and continues to grow significantly. HISTORY OF CYBER JIHAD
  • 14. The ‘pioneer’ of the Cyber Jihad was Anwar al-Awlaki, the so-called "bin Laden of the internet". Anwar al-Awlaki is credited with coining the term: 'creative terrorism' HISTORY OF CYBER JIHAD Anwar al-Awlaki
  • 15. ISIS, as an organization, obviously needs money. Cyber-crime pays and, in fact, can be considered as being a more reliable source of revenue for the terrorist organization as opposed to, for example, oil sales - which are now on the decline. ISIS’s income has fallen by about a third [mid 2016] compared to the same time last year. Revenue for the militant group fell to USD 56 million a month in March from around USD 80 million a month in the middle of 2015; hence their need to embark on greater cyber crime. CYBER CRIME & CYBER JIHAD
  • 16. ISIS, as an organization, obviously needs money. Cyber-crime pays and, in fact, can be considered as being a more reliable source of revenue for the terrorist organization as opposed to, for example, oil sales - which are now on the decline. ISIS’s income has fallen by about a third [mid 2016] compared to the same time last year. Revenue for the militant group fell to USD 56 million a month in March from around USD 80 million a month in the middle of 2015; hence their need to embark on greater cyber crime. CYBER CRIME & CYBER JIHAD
  • 17. To finance themselves, cyber-jihadists resort to the same tactics as cybercriminals, conducting phishing attacks or purchasing online details of stolen credit cards. This is, for example, how UK born Younis Tsouli, also know online as ‘Irhabi 007’ and his affiliates generated some USD 2.5 million. Tsouli was then labeled as being the “world’s most wanted cyber-jihadist”, and his conviction was the first under British law for incitement to commit an act of terrorism through the Internet. YOUNIS TSOULI (AKA IRHABI 007) Younis Tsouli
  • 18. Cyber-Jihadists use the internet to raise funds directly through donations: Al-Qaeda’s global fundraising network, for instance, is built on charities and NGOs that largely communicate with their donors through social media and online forums. CYBER JIHAD OPERATES LIKE AN NGO Not all Cyber-Jihad is offensive in nature...
  • 19. ISIS makes extensive use of Twitter, Facebook, Tumblr, and Instagram, and according to senior American officials, operatives and supporters of the organization produce up to 90,000 pro-Jihadi tweets every day... PROPAGANDA
  • 20. A recent extensive study found that ISIS supporters operate at least 46,000 independent Twitter accounts, with 200-500 of these accounts active all day, thereby helping to disseminate the organization’s propaganda. ISIS has approximately 200+ ‘highly’ active Twitter accounts PROPAGANDA
  • 21. The organization has technically competent members, indeed, an mobile app called ‘Dawn of Glad Tidings,’ which for a while was available for download in Google and Apple app stores and enabled its supporters to follow the organization’s activities in real time. ‘Dawn of Glad Tidings’ was marketed as an “app that gives you news from Syria, Iraq and the Islamic world”. ISIS’S MOBILE APP
  • 22. In addition to the extensive use of social media by the organization’s operatives and supporters, ISIS's cyber Jihad includes offensive use of online space for attacks on websites. Jihad organizations often refer to this offensive activity as a ‘ghazwa’ (raid/ attack, in Arabic) participated in the seventh century against the infidels. OFFENSIVE CYBER ATTACKS
  • 23. - ISIS takeover of US Central Command (YouTube Account); - Over 19,000 French websites DOS’d following Charlie Hebdo attack; - Twitter handle of Newsweek and the International Business Times website; - Two local US news stations, a non-profit group supporting military spouses EXAMPLES OF HACKS
  • 24. FOR THE FULL FREE VIDEO COURSE PLEASE VISIT WWW.CONCISE-COURSES.COM/TRAINING/ Valid for Continuing Education!