- Tracking Down Internet Terrorist Propaganda
- Arabic Extremist Group Forum Messages' Characteristics
- Cyber Terrorism Communications and Propaganda
- A Cost-Benefit Analysis of Cyber Terrorism
- Current State of Internet Jihad
- Analysis of the Technical Mujahid - Issue One
- Full List of Hezbollah's Internet Sites
- Steganography and Cyber Terrorism Communications
- Hezbollah's DNS Service Providers from 1998 to 2006
- Mujahideen Secrets Encryption Tool
- Analyses of Cyber Jihadist Forums and Blogs
- Cyber Traps for Wannabe Jihadists
- Inshallahshaheed - Come Out, Come Out Wherever You Are
- GIMF Switching Blogs
- GIMF Now Permanently Shut Down
- GIMF - "We Will Remain"
- Wisdom of the Anti Cyber Jihadist Crowd
- Cyber Jihadist Blogs Switching Locations Again
- Electronic Jihad v3.0 - What Cyber Jihad Isn't
- Electronic Jihad's Targets List
- Teaching Cyber Jihadists How to Hack
- A Botnet of Infected Terrorists?
- Infecting Terrorist Suspects with Malware
- The Dark Web and Cyber Jihad
- Cyber Jihadist Hacking Teams
- Two Cyber Jihadist Blogs Now Offline
- Characteristics of Islamist Websites
- Cyber Traps for Wannabe Jihadists
- Mujahideen Secrets Encryption Tool
- An Analysis of the Technical Mujahid - Issue Two
- Terrorist Groups' Brand Identities
- A List of Terrorists' Blogs
- Jihadists' Anonymous Internet Surfing Preferences
- Sampling Jihadists' IPs
- Cyber Jihadists' and TOR
- A Cyber Jihadist DoS Tool
- GIMF Now Permanently Shut Down
- Mujahideen Secrets 2 Encryption Tool Released
- Terror on the Internet - Conflict of Interest
In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude
Sunday, September 11, 2011
Summarizing 3 Years of Research Into Cyber Jihad
On this very special day, I'd like to honor the fallen by summarizing my research into cyber jihad, a topic I'm still highly passionate about. Enjoy and share it with your social circle!
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment