ATbar ICT's Publications
Loading Search Engine

Cyber Reviews

The Cyber Desk Review is a periodic report and analysis that addresses two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack). The Cyber Desk Review addresses the growing significance that cyberspace plays as a battlefield in current and future conflicts, as shown in the recent increase in cyber-attacks on political targets, crucial infrastructure, and the Web sites of commercial corporations.

Use of the ZeroNet Network by the Islamic State

09/10/2016 | by Cyber Desk

During the month of September 2016, members of Cyber Kahilafah began to promote and advertise the use of a technology called ZeroNet, which enables decentralized Web site hosting using a peer-to-peer (P2P) network. The obvious advantage of this technology, which was initially released in 2015, lies in the fact that a Web site’s data is stored on several computers simultaneously (as opposed to a central storage server) and, therefore, it is difficult to remove from the Internet. Web sites on this network can be accessed by installing an application tailored to a variety of computer operating systems. In addition, ToR can be used in order to increase users’ level of anonymity and to encrypt information traffic.

See Full Article

ICT Cyber-Desk Review: Report #16

13/09/2016 | by Cyber Desk
This report covers the period of January - March 2016.
See Full Article

"Killing Lists" – The Evolution of Cyber Terrorism?

15/07/2016 | by Cyber Desk
Over the past year, there have been increasing calls warning of the possible danger of a successful cyber-attack by the Islamic State against the West. In the beginning of April 2016, Admiral Michael Rogers, Commander of the US Cyber Command, claimed that the IS could easily carry out cyber-attacks against the US. The IS operates on the Internet as a platform for a very wide variety of uses but also views the space as an arena for battle. In the past, the organization carried out a number of successful cyber-attacks, including breaches of social network accounts as well as the theft and leak of information, such as lists containing the personal details of security forces.
See Full Article

ICT Cyber-Desk Review: Report #15

21/06/2016 | by Cyber Desk

This report covers the period of October - December 2015.

See Full Article

Assessing the Cyber Threat to the Train Industry

07/04/2016 | by Cyber Desk

Over recent decades we have witnessed several successful attacks and attempts by terrorist organizations to strike trains around the world. Most of these attacks were carried out in Asia and Europe where the rail infrastructure is a common means of transportation. An attack and/or successful threat against train function is liable to disrupt the country’s normal activity, damage its economy and even harm people.

Written by Nir Tordjman and Oren Elimelech

See Full Article