ATbar ICT's Publications

Cyber Reviews

The Cyber Desk Review is a periodic report and analysis that addresses two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack). The Cyber Desk Review addresses the growing significance that cyberspace plays as a battlefield in current and future conflicts, as shown in the recent increase in cyber-attacks on political targets, crucial infrastructure, and the Web sites of commercial corporations.


Incitement - Terrorist Attack in Wimbledon

09/07/2017 | by Cyber Desk
On Wednesday, July 5, 2017 a call was posted on a Telegram channel belonging to jihadist operatives to carry out a terrorist attack in Wimbledon similar to the attack that took place at the “Manchester Arena” events hall during a performance by the singer, Ariana Grande. On May 22, 2017 a terrorist carried out a suicide bombing as he mixed in with the audience during the exit from the event. 22 people were killed in the attack and over 50 others were injured. The next day, the Islamic State claimed responsibility for the attack.
See Full Article

CCTA’s Statement Regarding the End of the Raid of al-‘Adnani

11/05/2017 | by Cyber Desk
Yesterday, May 10, 2017, the Caliphate Cyber Terrorism Army (CCTA) hacker group, formerly known as the Cyber Caliphate Army (CCA), released an official statement in which it announced the end of the raid named after Islamic State spokesman, Abu Mohammad al-‘Adnani, who was killed on August 30, 2016.
See Full Article

ICT Cyber-Desk Review: Report #20

01/03/2017 | by Cyber Desk
The main trends identified in the first quarter of 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and international defense policy.
See Full Article

The Use of IoT in Offensive Cyber Activities

23/02/2017 | by Cyber Desk
The realm of cyber-attacks has advanced over the years, both in regards to the scope of the phenomenon and in terms of the technological abilities displayed by the attackers. One recently developing field in this realm is the use of terminal equipment, including communications equipment such as routers and IoT (Internet of Things) devices that are connected to the Internet but are not protected from breaches at a level customary for computers and cellular devices
See Full Article

ICT Cyber-Desk Review: Report #19

16/02/2017 | by Cyber Desk
This report covers the period of October - December 2016
See Full Article