SlideShare a Scribd company logo
1 of 24
ISIS & CYBER TERRORISM
FOR THE FULL FREE VIDEO
COURSE PLEASE VISIT
WWW.CONCISE-COURSES.COM/TRAINING/
Valid for Continuing Education!
concise
cybersecurity
PRESIDENT OBAMA
President Obama has frequently highlighted the
need to counter ISIS within Cyberspace. His closing
remarks at the Summit of Countering Violent
Extremism in February 2015 in DC, United States was
as follows:
concise
cybersecurity
PRESIDENT OBAMA
President Obama has frequently highlighted the
need to counter ISIS within Cyberspace. His closing
remarks at the Summit of Countering Violent
Extremism in February 2015 in DC, United States was
as follows:
concise
cybersecurity
“....the high quality videos, the online
magazines, the use of social media,
terrorist Twitter accounts – it’s all
designed to target today’s young people
online....”
'Cyber Jihad' is now firmly recognized
as being a viable threat to the security
of those fighting violent extremism, i.e.
the 'west'.
concise
cybersecurity
'Cyber Jihad' is now firmly recognized
as being a viable threat to the security
of those fighting violent extremism, i.e.
the 'west'.
concise
cybersecurity
“...the use of modern tech tools and cyberspace in
order to promote Jihad against those classified by
its' followers as enemies of Islam...”
WHAT IS THE CYBER CALIPHATE?
You'll often hear the "Cyber Caliphate" be used
when there's a mention of ISIS and Cyber. Also
referred to as the "Islamic State Hacking
Division" or the "United Cyber Caliphate" this is
a loose group of Hacktivists that act as a cyber
army for ISIS.
The "Cyber Caliphate" was started by Junaid
Hussain, a British National, who was later killed
in a US airstrike in Raqqa, Iraq
WHAT IS THE CYBER CALIPHATE?
Even in its early days, al-Qaeda consistently demonstrated a clear interest in
making use of the Internet for propaganda purposes.
One of the world’s first ever ‘pro’ al-Qaeda website, Azzam.com, was created
nearly twenty years ago. Ever since, the level of sophistication in the use of
online tools for Jihadist propaganda has grown and continues to grow
significantly.
HISTORY OF CYBER JIHAD
HISTORY OF CYBER JIHAD (SCREENSHOT OF AZZAM.COM)
Even in its early days, al-Qaeda consistently demonstrated a clear interest in
making use of the Internet for propaganda purposes.
One of the world’s first ever ‘pro’ al-Qaeda website, Azzam.com, was created
nearly twenty years ago. Ever since, the level of sophistication in the use of
online tools for Jihadist propaganda has grown and continues to grow
significantly.
HISTORY OF CYBER JIHAD
The ‘pioneer’ of the Cyber Jihad
was Anwar al-Awlaki, the so-called
"bin Laden of the internet". Anwar
al-Awlaki is credited with coining
the term: 'creative terrorism'
HISTORY OF CYBER JIHAD
Anwar al-Awlaki
ISIS, as an organization, obviously needs money. Cyber-crime pays and, in
fact, can be considered as being a more reliable source of revenue for the
terrorist organization as opposed to, for example, oil sales - which are now on
the decline.
ISIS’s income has fallen by about a third [mid 2016] compared to the same
time last year. Revenue for the militant group fell to USD 56 million a month in
March from around USD 80 million a month in the middle of 2015; hence
their need to embark on greater cyber crime.
CYBER CRIME & CYBER JIHAD
ISIS, as an organization, obviously needs money. Cyber-crime pays and, in
fact, can be considered as being a more reliable source of revenue for the
terrorist organization as opposed to, for example, oil sales - which are now on
the decline.
ISIS’s income has fallen by about a third [mid 2016] compared to the same
time last year. Revenue for the militant group fell to USD 56 million a month in
March from around USD 80 million a month in the middle of 2015; hence
their need to embark on greater cyber crime.
CYBER CRIME & CYBER JIHAD
To finance themselves, cyber-jihadists resort to the same
tactics as cybercriminals, conducting phishing attacks or
purchasing online details of stolen credit cards.
This is, for example, how UK born Younis Tsouli, also
know online as ‘Irhabi 007’ and his affiliates generated
some USD 2.5 million. Tsouli was then labeled as being
the “world’s most wanted cyber-jihadist”, and his
conviction was the first under British law for incitement
to commit an act of terrorism through the Internet.
YOUNIS TSOULI (AKA IRHABI 007)
Younis Tsouli
Cyber-Jihadists use the internet
to raise funds directly through
donations: Al-Qaeda’s global
fundraising network, for instance,
is built on charities and NGOs
that largely communicate with
their donors through social media
and online forums.
CYBER JIHAD OPERATES LIKE AN NGO
Not all Cyber-Jihad is offensive in
nature...
ISIS makes extensive use of
Twitter, Facebook, Tumblr, and
Instagram, and according to
senior American officials,
operatives and supporters of the
organization produce up to
90,000 pro-Jihadi tweets every
day...
PROPAGANDA
A recent extensive study found
that ISIS supporters operate at
least 46,000 independent Twitter
accounts, with 200-500 of these
accounts active all day, thereby
helping to disseminate the
organization’s propaganda.
ISIS has approximately 200+
‘highly’ active Twitter accounts
PROPAGANDA
The organization has technically competent members, indeed, an mobile app
called ‘Dawn of Glad Tidings,’ which for a while was available for download in
Google and Apple app stores and enabled its supporters to follow the
organization’s activities in real time. ‘Dawn of Glad Tidings’ was marketed as an
“app that gives you news from Syria, Iraq and the Islamic world”.
ISIS’S MOBILE APP
In addition to the extensive use of social
media by the organization’s operatives and
supporters, ISIS's cyber Jihad includes
offensive use of online space for attacks on
websites. Jihad organizations often refer to
this offensive activity as a ‘ghazwa’ (raid/
attack, in Arabic) participated in the
seventh century against the infidels.
OFFENSIVE CYBER ATTACKS
- ISIS takeover of US Central Command (YouTube Account);
- Over 19,000 French websites DOS’d following Charlie Hebdo attack;
- Twitter handle of Newsweek and the International Business Times website;
- Two local US news stations, a non-profit group supporting military spouses
EXAMPLES OF HACKS
FOR THE FULL FREE VIDEO
COURSE PLEASE VISIT
WWW.CONCISE-COURSES.COM/TRAINING/
Valid for Continuing Education!

More Related Content

What's hot

Globalization Hand out
Globalization Hand out Globalization Hand out
Globalization Hand out Jimmy Pasttor
 
Saudi Arabian cultural and heritage festival
Saudi Arabian cultural and heritage festival Saudi Arabian cultural and heritage festival
Saudi Arabian cultural and heritage festival Yazeed Mas
 
E.s.p 10 (garciano)
E.s.p 10 (garciano)E.s.p 10 (garciano)
E.s.p 10 (garciano)axelespanola
 
Reproductive Health and Population
Reproductive Health and PopulationReproductive Health and Population
Reproductive Health and PopulationRalph Bawalan
 
"CHINA-BANGLADESH" Trade Relations!!
"CHINA-BANGLADESH" Trade Relations!!"CHINA-BANGLADESH" Trade Relations!!
"CHINA-BANGLADESH" Trade Relations!!Farabi Ahmed
 
pros and Cons of Globalization
pros and Cons of Globalizationpros and Cons of Globalization
pros and Cons of Globalizationnoor ul ain
 
Globalization:pros and cons
Globalization:pros and consGlobalization:pros and cons
Globalization:pros and consefendievaz
 
Human security presentation
Human security presentationHuman security presentation
Human security presentationsaleemsaha007
 
Diskriminasyon at Karahasan.pdf
Diskriminasyon at Karahasan.pdfDiskriminasyon at Karahasan.pdf
Diskriminasyon at Karahasan.pdfjeffrielbuan3
 

What's hot (17)

Globalization Hand out
Globalization Hand out Globalization Hand out
Globalization Hand out
 
Saudi Arabian cultural and heritage festival
Saudi Arabian cultural and heritage festival Saudi Arabian cultural and heritage festival
Saudi Arabian cultural and heritage festival
 
E.s.p 10 (garciano)
E.s.p 10 (garciano)E.s.p 10 (garciano)
E.s.p 10 (garciano)
 
Boko Haram Conflict
Boko Haram ConflictBoko Haram Conflict
Boko Haram Conflict
 
Switzerland (1)
Switzerland (1)Switzerland (1)
Switzerland (1)
 
Reproductive Health and Population
Reproductive Health and PopulationReproductive Health and Population
Reproductive Health and Population
 
"CHINA-BANGLADESH" Trade Relations!!
"CHINA-BANGLADESH" Trade Relations!!"CHINA-BANGLADESH" Trade Relations!!
"CHINA-BANGLADESH" Trade Relations!!
 
Neoliberal
NeoliberalNeoliberal
Neoliberal
 
Poverty Essay
Poverty EssayPoverty Essay
Poverty Essay
 
pros and Cons of Globalization
pros and Cons of Globalizationpros and Cons of Globalization
pros and Cons of Globalization
 
History of foreign aid
History of foreign aidHistory of foreign aid
History of foreign aid
 
Globalization:pros and cons
Globalization:pros and consGlobalization:pros and cons
Globalization:pros and cons
 
Inter faith harmony
Inter faith harmonyInter faith harmony
Inter faith harmony
 
Economic Globalization
Economic GlobalizationEconomic Globalization
Economic Globalization
 
the bottom billion
the bottom billionthe bottom billion
the bottom billion
 
Human security presentation
Human security presentationHuman security presentation
Human security presentation
 
Diskriminasyon at Karahasan.pdf
Diskriminasyon at Karahasan.pdfDiskriminasyon at Karahasan.pdf
Diskriminasyon at Karahasan.pdf
 

Viewers also liked

Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Jorge Sebastiao
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins ResumePaul Mullins
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015AFCEA International
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)Valeriu Margescu
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Jorge Sebastiao
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502Bill Hagestad II
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsMikko Jakonen
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...AFCEA International
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Ulrich Janßen
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)TBSS Group
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
 

Viewers also liked (20)

Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
The Panama Papers Hack
The Panama Papers HackThe Panama Papers Hack
The Panama Papers Hack
 
HA10 – Task 1
HA10 – Task 1HA10 – Task 1
HA10 – Task 1
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins Resume
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
 
Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
 

Similar to ISIS and Cyber Terrorism

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESJenny O'Meara
 
Bjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of mediaBjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of mediaRai University
 
How ISIS games twitter
How ISIS games twitterHow ISIS games twitter
How ISIS games twitterCHSGmedia
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxbudbarber38650
 
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docxgilbertkpeters11344
 
Isis In Libya - Winning the Propaganda War
Isis In Libya - Winning the Propaganda WarIsis In Libya - Winning the Propaganda War
Isis In Libya - Winning the Propaganda Warmovelibyaforward
 
Descriptive Writing Examples Pdf. Descriptive Essay. 20
Descriptive Writing Examples Pdf. Descriptive Essay. 20Descriptive Writing Examples Pdf. Descriptive Essay. 20
Descriptive Writing Examples Pdf. Descriptive Essay. 20Valerie Burroughs
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterJulie Davis
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
ISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERRORISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERRORAlay Thakkar
 
Us intelligence officer 'every single terrorist attack in us was a false fla...
Us intelligence officer  'every single terrorist attack in us was a false fla...Us intelligence officer  'every single terrorist attack in us was a false fla...
Us intelligence officer 'every single terrorist attack in us was a false fla...RepentSinner
 

Similar to ISIS and Cyber Terrorism (19)

Future_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RESFuture_Radicals_Study_Guide_HIGH_RES
Future_Radicals_Study_Guide_HIGH_RES
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
Bjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of mediaBjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of media
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
How ISIS games twitter
How ISIS games twitterHow ISIS games twitter
How ISIS games twitter
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docx
 
Demi-PDF
Demi-PDFDemi-PDF
Demi-PDF
 
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
 
Isis In Libya - Winning the Propaganda War
Isis In Libya - Winning the Propaganda WarIsis In Libya - Winning the Propaganda War
Isis In Libya - Winning the Propaganda War
 
Descriptive Writing Examples Pdf. Descriptive Essay. 20
Descriptive Writing Examples Pdf. Descriptive Essay. 20Descriptive Writing Examples Pdf. Descriptive Essay. 20
Descriptive Writing Examples Pdf. Descriptive Essay. 20
 
567 bruce
567 bruce567 bruce
567 bruce
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
ISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERRORISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERROR
 
ISIS
ISISISIS
ISIS
 
Us intelligence officer 'every single terrorist attack in us was a false fla...
Us intelligence officer  'every single terrorist attack in us was a false fla...Us intelligence officer  'every single terrorist attack in us was a false fla...
Us intelligence officer 'every single terrorist attack in us was a false fla...
 

More from London School of Cyber Security

How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 
Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?London School of Cyber Security
 
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsChanging the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsLondon School of Cyber Security
 

More from London School of Cyber Security (19)

Silk Road & Online Narcotic Distribution
Silk Road & Online Narcotic DistributionSilk Road & Online Narcotic Distribution
Silk Road & Online Narcotic Distribution
 
Ashely Madison Hack
Ashely Madison HackAshely Madison Hack
Ashely Madison Hack
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and TrainingHow To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
What Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSSWhat Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSS
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 
Crowdsourced Vulnerability Testing
Crowdsourced Vulnerability TestingCrowdsourced Vulnerability Testing
Crowdsourced Vulnerability Testing
 
Memory forensics and incident response
Memory forensics and incident responseMemory forensics and incident response
Memory forensics and incident response
 
Gauntlt Rugged By Example
Gauntlt Rugged By ExampleGauntlt Rugged By Example
Gauntlt Rugged By Example
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?
 
Sploitego
SploitegoSploitego
Sploitego
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Blind XSS
Blind XSSBlind XSS
Blind XSS
 
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsChanging the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
 
Sploitego
SploitegoSploitego
Sploitego
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 

Recently uploaded

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

ISIS and Cyber Terrorism

  • 1. ISIS & CYBER TERRORISM
  • 2. FOR THE FULL FREE VIDEO COURSE PLEASE VISIT WWW.CONCISE-COURSES.COM/TRAINING/ Valid for Continuing Education!
  • 4. PRESIDENT OBAMA President Obama has frequently highlighted the need to counter ISIS within Cyberspace. His closing remarks at the Summit of Countering Violent Extremism in February 2015 in DC, United States was as follows: concise cybersecurity
  • 5. PRESIDENT OBAMA President Obama has frequently highlighted the need to counter ISIS within Cyberspace. His closing remarks at the Summit of Countering Violent Extremism in February 2015 in DC, United States was as follows: concise cybersecurity “....the high quality videos, the online magazines, the use of social media, terrorist Twitter accounts – it’s all designed to target today’s young people online....”
  • 6. 'Cyber Jihad' is now firmly recognized as being a viable threat to the security of those fighting violent extremism, i.e. the 'west'. concise cybersecurity
  • 7. 'Cyber Jihad' is now firmly recognized as being a viable threat to the security of those fighting violent extremism, i.e. the 'west'. concise cybersecurity
  • 8. “...the use of modern tech tools and cyberspace in order to promote Jihad against those classified by its' followers as enemies of Islam...”
  • 9. WHAT IS THE CYBER CALIPHATE?
  • 10. You'll often hear the "Cyber Caliphate" be used when there's a mention of ISIS and Cyber. Also referred to as the "Islamic State Hacking Division" or the "United Cyber Caliphate" this is a loose group of Hacktivists that act as a cyber army for ISIS. The "Cyber Caliphate" was started by Junaid Hussain, a British National, who was later killed in a US airstrike in Raqqa, Iraq WHAT IS THE CYBER CALIPHATE?
  • 11. Even in its early days, al-Qaeda consistently demonstrated a clear interest in making use of the Internet for propaganda purposes. One of the world’s first ever ‘pro’ al-Qaeda website, Azzam.com, was created nearly twenty years ago. Ever since, the level of sophistication in the use of online tools for Jihadist propaganda has grown and continues to grow significantly. HISTORY OF CYBER JIHAD
  • 12. HISTORY OF CYBER JIHAD (SCREENSHOT OF AZZAM.COM)
  • 13. Even in its early days, al-Qaeda consistently demonstrated a clear interest in making use of the Internet for propaganda purposes. One of the world’s first ever ‘pro’ al-Qaeda website, Azzam.com, was created nearly twenty years ago. Ever since, the level of sophistication in the use of online tools for Jihadist propaganda has grown and continues to grow significantly. HISTORY OF CYBER JIHAD
  • 14. The ‘pioneer’ of the Cyber Jihad was Anwar al-Awlaki, the so-called "bin Laden of the internet". Anwar al-Awlaki is credited with coining the term: 'creative terrorism' HISTORY OF CYBER JIHAD Anwar al-Awlaki
  • 15. ISIS, as an organization, obviously needs money. Cyber-crime pays and, in fact, can be considered as being a more reliable source of revenue for the terrorist organization as opposed to, for example, oil sales - which are now on the decline. ISIS’s income has fallen by about a third [mid 2016] compared to the same time last year. Revenue for the militant group fell to USD 56 million a month in March from around USD 80 million a month in the middle of 2015; hence their need to embark on greater cyber crime. CYBER CRIME & CYBER JIHAD
  • 16. ISIS, as an organization, obviously needs money. Cyber-crime pays and, in fact, can be considered as being a more reliable source of revenue for the terrorist organization as opposed to, for example, oil sales - which are now on the decline. ISIS’s income has fallen by about a third [mid 2016] compared to the same time last year. Revenue for the militant group fell to USD 56 million a month in March from around USD 80 million a month in the middle of 2015; hence their need to embark on greater cyber crime. CYBER CRIME & CYBER JIHAD
  • 17. To finance themselves, cyber-jihadists resort to the same tactics as cybercriminals, conducting phishing attacks or purchasing online details of stolen credit cards. This is, for example, how UK born Younis Tsouli, also know online as ‘Irhabi 007’ and his affiliates generated some USD 2.5 million. Tsouli was then labeled as being the “world’s most wanted cyber-jihadist”, and his conviction was the first under British law for incitement to commit an act of terrorism through the Internet. YOUNIS TSOULI (AKA IRHABI 007) Younis Tsouli
  • 18. Cyber-Jihadists use the internet to raise funds directly through donations: Al-Qaeda’s global fundraising network, for instance, is built on charities and NGOs that largely communicate with their donors through social media and online forums. CYBER JIHAD OPERATES LIKE AN NGO Not all Cyber-Jihad is offensive in nature...
  • 19. ISIS makes extensive use of Twitter, Facebook, Tumblr, and Instagram, and according to senior American officials, operatives and supporters of the organization produce up to 90,000 pro-Jihadi tweets every day... PROPAGANDA
  • 20. A recent extensive study found that ISIS supporters operate at least 46,000 independent Twitter accounts, with 200-500 of these accounts active all day, thereby helping to disseminate the organization’s propaganda. ISIS has approximately 200+ ‘highly’ active Twitter accounts PROPAGANDA
  • 21. The organization has technically competent members, indeed, an mobile app called ‘Dawn of Glad Tidings,’ which for a while was available for download in Google and Apple app stores and enabled its supporters to follow the organization’s activities in real time. ‘Dawn of Glad Tidings’ was marketed as an “app that gives you news from Syria, Iraq and the Islamic world”. ISIS’S MOBILE APP
  • 22. In addition to the extensive use of social media by the organization’s operatives and supporters, ISIS's cyber Jihad includes offensive use of online space for attacks on websites. Jihad organizations often refer to this offensive activity as a ‘ghazwa’ (raid/ attack, in Arabic) participated in the seventh century against the infidels. OFFENSIVE CYBER ATTACKS
  • 23. - ISIS takeover of US Central Command (YouTube Account); - Over 19,000 French websites DOS’d following Charlie Hebdo attack; - Twitter handle of Newsweek and the International Business Times website; - Two local US news stations, a non-profit group supporting military spouses EXAMPLES OF HACKS
  • 24. FOR THE FULL FREE VIDEO COURSE PLEASE VISIT WWW.CONCISE-COURSES.COM/TRAINING/ Valid for Continuing Education!