ATbar ICT's Publications

Cyber Reviews

The Cyber Desk Review is a periodic report and analysis that addresses two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack). The Cyber Desk Review addresses the growing significance that cyberspace plays as a battlefield in current and future conflicts, as shown in the recent increase in cyber-attacks on political targets, crucial infrastructure, and the Web sites of commercial corporations.

Cyber Report no. 24 September-November 2017

05/03/2018 | by Cyber Desk
This report covers the period of September-November 2017.
See Full Article

Jihadists’ Use of Virtual Currency

30/01/2018 | by Cyber Desk

Sporadic evidence of terrorists’ use of digital currency has been in existence since 2012 and there is no doubt that in recent months this trend has been growing and taking shape and now holds a prominent presence online. ICT’s Cyber-Desk reviewed documented cases of jihadists’ use of virtual currency. 

See Full Article

Cyber Report no. 23 June-August 2017

01/09/2017 | by Cyber Desk
This report covers the period of June-August 2017.
See Full Article

Incitement - Terrorist Attack in Wimbledon

09/07/2017 | by Cyber Desk
On Wednesday, July 5, 2017 a call was posted on a Telegram channel belonging to jihadist operatives to carry out a terrorist attack in Wimbledon similar to the attack that took place at the “Manchester Arena” events hall during a performance by the singer, Ariana Grande. On May 22, 2017 a terrorist carried out a suicide bombing as he mixed in with the audience during the exit from the event. 22 people were killed in the attack and over 50 others were injured. The next day, the Islamic State claimed responsibility for the attack.
See Full Article

Cyber Review No. 22

01/06/2017 | by Cyber Desk

The ICT’s Cyber-Terrorism Activities report for May 2017 reviews six areas: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; international response; and a case study of East Asia.

See Full Article