ICT Report on Cyber Terrorism – February 2013

ICT Report on Cyber Terrorism – February 2013

This post is also available in: heעברית (Hebrew)

1

This report covers two main subjets: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse);  cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack). The following are among the issues covered in this report:

  • In a manifesto published by Al-Furqan in February, 2013, Sheikh Abu Sa’ad al-‘Amili, a prominent Salafi-jihadist, discusses possible causes for lulls in the activity of several prominent jihadist Web forums, and proposes ways to increase the forums’ activity.
  • The Global Islamic Media Front (GIMF) published a new encoding program, Asrar Al-Dardasha [The Secrets of Chatting], for use in communications among mujahideen.
  • Islamic legal scholar Abu Mundhir al-Shanqiti, the head of the Fatwa Committee of the Salafi-jihadist portal Minbar Al-Tawhid wal-Jihad, publishe a fatwa permitting hacking into US commercial Web sites, and offering a religious justification for cyber-attacks against the infidel.
  • Several Palestinian groups issue guidelines for hackers.
  • The international conglomerate of hackers known as “Anonymous” launches hostile cyber-operations against Israel, Palestine and Baluchistan (a Pakistani province) – among other countries.
  • An Egyptian telecommunications undersea cable is sabotaged, disrupting Internet service in that country and highlighting growing threats to international Internet service.
  • The Web sites of American Express and other US financial institutions are hacked, temporarily disrupting their service.
  • The Cyber-Desk Team extensively reviews phishing as a tool of cyber-attack, as illustrated by an analysis of a watering hole attack on the ICT’s own Web site.
  • This Newsletter’s Case Study highlights a series of increasingly serious attacks on computer networks in South Korea, and compares the relative dangers of denial of service (DDoS) and “denial of computer” (DDoC) attacks.
  • In this issue, Guest Contributor Swapnil Kishore reviews governments’ use of “patriotic hackers” to counteract cyber crime.

i-HLS Israel Homeland Security

By:  ICT’s Cyber-Desk

Press this link for the full article (PDF)

9026254_s