ATbar Cyber Report 33 - April-June 2020

Cyber Report 33 - April-June 2020

04/03/2021 | by Cyber Desk  

Download the full article

The potential of cyberspace was identified by terror organizations over a decade ago. However, in recent years there is a significant uptick in the use of the internet and the sophistication of such use. Where initially terror organizations utilized static websites, then later incorporated basic interactive elements, and today, through social media and various applications, these organization are active online and offer fully interactive experiences for their users. ISIS is considered a trail blazer as far as online innovation is concerned.

The traditional hierarchal structure typical of terror organizations has been undergoing dynamic changes in recent years, including changes to command and control structures. Thus, next to the hierarchal organizational structure in territories controlled by the terror organizations, one can observe the formation of an online arena in area not under the physical control of the terror organization. Such online structure is made possible due to increasing use of the internet and its accessibility worldwide.

In the period reviewed in this document (April-June 2020) terror activity in cyberspace has been identified in three major aspects:

Operational – Jihadi organizations continue to use cyberspace to recruit operatives (there is an expansion of jihadi propaganda activity to multiple social media platform, due to the removal of some 2,000 ISIS supporting Telegram channels in November 2019) and raise funds (increased use of jihadi activity of social media, especially in the Idlib region).

Defense – No major development has been identified as far as the online defense strategies of jihadi organizations and they keep disseminating content on security, encryption, privacy and anonymity, and instructions for safe use of mobile devices.

Offense – terror organizations continue their efforts to improve their offensive capabilities, especially in relation to hacking social media accounts, defacing websites and planting malware. It seems that al-Qaeda in the Arabian Peninsula wishes to motivate Muslims to put an effort towards cyber-attacks against the west.

 

Far-right – in recent years, and especially lately due to the COVID-19 pandemic one can observe increasing far-right activity online. One of the major manifestations of this process relates to the transition from using “soft violence” to “hard violence”. The internet is one of the major platforms contributing to success of this phenomenon and it serves, like with the jihadi organizations, as a major operative tool.

Far-right organizations are active in cyberspace and are making essentially the same use of it as the jihadi terrorist organizations (operational, defense, offense). Therefore, this report will expand and present the prominent trends and uses made by far-right organizations in cyberspace.

 

In the period reviewed in this document (April-June 2020) far-right activity in cyberspace has been identified in three major aspects:

Operational – Far-right organizations keep using cyberspace to disseminate propaganda, radicalization, recruitment, and inspiration if lone wolf attacks.

Defense – In the period reviewed one observed far-right organizations disseminating content on security, encryption, privacy and anonymity, warnings of imposters and instructions for safe use of mobile devices.

Offense – in the period reviewed we observed a trend of encouragement of kinetic attacks as well as cyber ones, yet their capabilities have not yet matured and they are still low, especially in relation hacking social media accounts (i.e. Doxxing) and Zoombombing to threaten and intimidate organizations, prayer centers and minority schools.

In the space of global response to cyber threats we see activity on the part of governments attempting to quell cyberattacks and remain up to date in their cybersecurity departments by implementing new regulations and policies and by responding swiftly and effectively to cyberattacks.

Download Full Publication Download