Learn all about the ever-increasing influence of ISIS and Cyber Terrorism...Although the use of cyberspace by Jihad organizations is not new, ISIS uses the Internet, and primarily social media, more effectively than any other terrorist organization before it. Here's a link for more information: https://www.concise-courses.com/learn/isis-cyber-terror/
4. PRESIDENT OBAMA
President Obama has frequently highlighted the
need to counter ISIS within Cyberspace. His closing
remarks at the Summit of Countering Violent
Extremism in February 2015 in DC, United States was
as follows:
concise
cybersecurity
5. PRESIDENT OBAMA
President Obama has frequently highlighted the
need to counter ISIS within Cyberspace. His closing
remarks at the Summit of Countering Violent
Extremism in February 2015 in DC, United States was
as follows:
concise
cybersecurity
“....the high quality videos, the online
magazines, the use of social media,
terrorist Twitter accounts – it’s all
designed to target today’s young people
online....”
6. 'Cyber Jihad' is now firmly recognized
as being a viable threat to the security
of those fighting violent extremism, i.e.
the 'west'.
concise
cybersecurity
7. 'Cyber Jihad' is now firmly recognized
as being a viable threat to the security
of those fighting violent extremism, i.e.
the 'west'.
concise
cybersecurity
8. “...the use of modern tech tools and cyberspace in
order to promote Jihad against those classified by
its' followers as enemies of Islam...”
10. You'll often hear the "Cyber Caliphate" be used
when there's a mention of ISIS and Cyber. Also
referred to as the "Islamic State Hacking
Division" or the "United Cyber Caliphate" this is
a loose group of Hacktivists that act as a cyber
army for ISIS.
The "Cyber Caliphate" was started by Junaid
Hussain, a British National, who was later killed
in a US airstrike in Raqqa, Iraq
WHAT IS THE CYBER CALIPHATE?
11. Even in its early days, al-Qaeda consistently demonstrated a clear interest in
making use of the Internet for propaganda purposes.
One of the world’s first ever ‘pro’ al-Qaeda website, Azzam.com, was created
nearly twenty years ago. Ever since, the level of sophistication in the use of
online tools for Jihadist propaganda has grown and continues to grow
significantly.
HISTORY OF CYBER JIHAD
13. Even in its early days, al-Qaeda consistently demonstrated a clear interest in
making use of the Internet for propaganda purposes.
One of the world’s first ever ‘pro’ al-Qaeda website, Azzam.com, was created
nearly twenty years ago. Ever since, the level of sophistication in the use of
online tools for Jihadist propaganda has grown and continues to grow
significantly.
HISTORY OF CYBER JIHAD
14. The ‘pioneer’ of the Cyber Jihad
was Anwar al-Awlaki, the so-called
"bin Laden of the internet". Anwar
al-Awlaki is credited with coining
the term: 'creative terrorism'
HISTORY OF CYBER JIHAD
Anwar al-Awlaki
15. ISIS, as an organization, obviously needs money. Cyber-crime pays and, in
fact, can be considered as being a more reliable source of revenue for the
terrorist organization as opposed to, for example, oil sales - which are now on
the decline.
ISIS’s income has fallen by about a third [mid 2016] compared to the same
time last year. Revenue for the militant group fell to USD 56 million a month in
March from around USD 80 million a month in the middle of 2015; hence
their need to embark on greater cyber crime.
CYBER CRIME & CYBER JIHAD
16. ISIS, as an organization, obviously needs money. Cyber-crime pays and, in
fact, can be considered as being a more reliable source of revenue for the
terrorist organization as opposed to, for example, oil sales - which are now on
the decline.
ISIS’s income has fallen by about a third [mid 2016] compared to the same
time last year. Revenue for the militant group fell to USD 56 million a month in
March from around USD 80 million a month in the middle of 2015; hence
their need to embark on greater cyber crime.
CYBER CRIME & CYBER JIHAD
17. To finance themselves, cyber-jihadists resort to the same
tactics as cybercriminals, conducting phishing attacks or
purchasing online details of stolen credit cards.
This is, for example, how UK born Younis Tsouli, also
know online as ‘Irhabi 007’ and his affiliates generated
some USD 2.5 million. Tsouli was then labeled as being
the “world’s most wanted cyber-jihadist”, and his
conviction was the first under British law for incitement
to commit an act of terrorism through the Internet.
YOUNIS TSOULI (AKA IRHABI 007)
Younis Tsouli
18. Cyber-Jihadists use the internet
to raise funds directly through
donations: Al-Qaeda’s global
fundraising network, for instance,
is built on charities and NGOs
that largely communicate with
their donors through social media
and online forums.
CYBER JIHAD OPERATES LIKE AN NGO
Not all Cyber-Jihad is offensive in
nature...
19. ISIS makes extensive use of
Twitter, Facebook, Tumblr, and
Instagram, and according to
senior American officials,
operatives and supporters of the
organization produce up to
90,000 pro-Jihadi tweets every
day...
PROPAGANDA
20. A recent extensive study found
that ISIS supporters operate at
least 46,000 independent Twitter
accounts, with 200-500 of these
accounts active all day, thereby
helping to disseminate the
organization’s propaganda.
ISIS has approximately 200+
‘highly’ active Twitter accounts
PROPAGANDA
21. The organization has technically competent members, indeed, an mobile app
called ‘Dawn of Glad Tidings,’ which for a while was available for download in
Google and Apple app stores and enabled its supporters to follow the
organization’s activities in real time. ‘Dawn of Glad Tidings’ was marketed as an
“app that gives you news from Syria, Iraq and the Islamic world”.
ISIS’S MOBILE APP
22. In addition to the extensive use of social
media by the organization’s operatives and
supporters, ISIS's cyber Jihad includes
offensive use of online space for attacks on
websites. Jihad organizations often refer to
this offensive activity as a ‘ghazwa’ (raid/
attack, in Arabic) participated in the
seventh century against the infidels.
OFFENSIVE CYBER ATTACKS
23. - ISIS takeover of US Central Command (YouTube Account);
- Over 19,000 French websites DOS’d following Charlie Hebdo attack;
- Twitter handle of Newsweek and the International Business Times website;
- Two local US news stations, a non-profit group supporting military spouses
EXAMPLES OF HACKS
24. FOR THE FULL FREE VIDEO
COURSE PLEASE VISIT
WWW.CONCISE-COURSES.COM/TRAINING/
Valid for Continuing Education!