ATbar ICT's Publications
Loading Google Search

Cyber Reviews

The Cyber Desk Review is a periodic report and analysis that addresses two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack). The Cyber Desk Review addresses the growing significance that cyberspace plays as a battlefield in current and future conflicts, as shown in the recent increase in cyber-attacks on political targets, crucial infrastructure, and the Web sites of commercial corporations.


The Use of IoT in Offensive Cyber Activities

23/02/2017 | by Cyber Desk
The realm of cyber-attacks has advanced over the years, both in regards to the scope of the phenomenon and in terms of the technological abilities displayed by the attackers. One recently developing field in this realm is the use of terminal equipment, including communications equipment such as routers and IoT (Internet of Things) devices that are connected to the Internet but are not protected from breaches at a level customary for computers and cellular devices
See Full Article

ICT Cyber-Desk Review: Report #19

16/02/2017 | by Cyber Desk
This report covers the period of October - December 2016
See Full Article

ICT Cyber-Desk Review: Report #18

23/01/2017 | by Cyber Desk
This report covers the period of July-September 2016
See Full Article

Terrorism - Imposters and Deception on the Internet

16/01/2017 | by Ben Yaakov, Uri (Lt. Col. Res.)

Terrorist organizations use the Internet for a wide range of activities, including the dissemination of messages, making contact, recruitment of manpower, fundraising, propaganda, incitement, psychological warfare and intelligence. Cyber-defense activities by terrorist elements include the dissemination of information and guidebooks on the subject, the provision of guidelines regarding modes of action, encryption and transfer to the darknet, which they claim will improve the efficiency of traffic protection and anonymity on the part of the organizations themselves as well as their supporters. Such activities are designed to protect against tracking software used by intelligence agencies, activists and various Internet platforms operating against terrorist organizations on the Internet in general, and on social networks in particular.

See Full Article

ICT Cyber-Desk Review: Report #17

13/12/2016 | by Cyber Desk
This report covers the period of April-June 2016
See Full Article