ATbar ICT's Publications

Cyber Desk

Dr. Eitan AzaniCyberspace has become an important battlefield, and an integral part of current and future conflicts. Recent years have seen increasing cyber-attacks on political targets, crucial infrastructure, and the Web sites of commercial corporations. These attacks, which are also, increasingly, receiving international attention, are perpetrated by nation-state actors (which do not take responsibility for them); groups of hackers (such as Anonymous); criminal organizations; and lone hackers. Nation-state actors are becoming ever more aware of the cyber threat, and are assessing its effect on their national security. To this end, many of them are finding (and funding) ways to develop the defense mechanisms to cope with the threat, as well as their own offensive capabilities.

Terrorist organizations are also a part of this dynamic, mutable environment. During the past two years, global jihad groups have also been honing their ability to act in cyberspace. They are extending their activities from “typical” use of the Internet for communication, recruitment of operatives, fundraising, propagandizing, incitement to hatred and violence, intelligence gathering, and psychological warfare, to attacks on the enemy’s critical infrastructure cyber warfare techniques. Increasingly, terrorist organizations are integrating the information available to them from the virtual world with that available to them in the real world, and using the former to develop offensive capabilities in the latter. This they call “electronic jihad”.

Given these developments, and as part our belief that “sharing information increases our ability to confront terrorism”, the International Institute for Counter-Terrorism (ICT) of the Interdisciplinary Center (IDC), Herzliya has decided to disseminate a periodic report and analysis of information gathered by our cyber-terrorism desk. 

This new publication joins the ICT's series of publications:

  • A bi-monthly report of the Jihadi Website Monitoring Group (JWMG), which summarizes and analyzes jihadist discourse on Web sites and forums, blogs and chat rooms.
  • A monthly database report summarizing and analyzing terrorism-related events worldwide.

This and forthcoming cyber-desk newsletters will address two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack).

In addition, through our Collaboration with the Lauder School of Government, Diplomacy and Strategy, we offer a 10 credits specialization in Cyber-Terrorism as part of our MA Program in Government with Specialization in Counter-Terrorism.

For all of Cyber Desk publication click here

ICT Cyber-Desk Report: Kybernetiq

03/12/2018 | by Cyber Desk
See Full Article

ICT Cyber-Desk Report: Chinese Hacker Groups

06/11/2018 | by Cyber Desk
Chinese hacker groups have become professional, strategic, and operate with improved tactics. They once were considered very bold with little regard for operational security, but now they are strategically controlled.
See Full Article

ICT Cyber-Desk Report: Cyber threats on African subjects

06/11/2018 | by Cyber Desk
The evolution of cyber crime has lead to more sophisticated attacks in Africa, from password theft to credit card fraud and attacks on entire computer networks, with hundreds of millions of African cyber attacks on an annual basis. Serainu ranked the government and banking sectors as being most vulnerable to cybercrime in Africa (2016). 96% of African organisations including banks, spend on average less than $5,000 on cyber security annually.
See Full Article

ICT Cyber-Desk Review: Report #27

01/07/2018 | by Cyber Desk
This report covers the period of April-June 2018.
See Full Article

ICT Cyber-Desk Review: Report #26

04/06/2018 | by Cyber Desk
This report covers the period of January-March, 2018.
See Full Article