Jihadists and the Internet 2009 Update
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cost of a Cyber Incident)
CO ST OF A CYBER INCIDENT: S YSTEMATIC REVIEW AND C ROSS-VALIDATION OCTOBER 26, 2020 1 Acknowledgements We are grateful to Dr. Allan Friedman, Dr. Lawrence Gordon, Jay Jacobs, Dr. Sasha Romanosky, Matthew Shabat, Kelly Shortridge, Steven Surdu, David Tobar, Brett Tucker and Sounil Yu for the review comments and helpful feedback on the earlier draft of the report. The authors would like to thank CISA staff for support and advice on this project. 2 Table of Contents 1. Objectives .................................................................................................................................................................... 7 2. Results in Brief .......................................................................................................................................................... 8 3. Analysis ...................................................................................................................................................................... 16 3.1. Per-Incident Cost and Loss Estimates .............................................................................................. 18 3.1.1. Cross-Validation: Primary Loss Data for Large and Small Incidents .................................. 20 3.1.2. Reconciliation of Per-Incident Cost Studies .................................................................................. 26 3.1.3. Per-Record Estimates ............................................................................................................................. 29 3.2. Aggregate -
Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. -
Robert Spencer Article
THE SPENCER SPIN “spin” v. Taking informational material, and twisting, slanting, misinterpreting, misquoting, or changing it in an effort to make it support your own personal agenda. See media, propaganda, political campaigns, racists, and Robert Spencer. INTRODUCTION The first things I asked myself in reviewing the mountain of material for this article was what possible conclusions could be reached, and how to organize all this information. Using the standard journalist’s verbiage, the best overarching explanation of such is: WHO: (The target of this article) Robert H. Spencer, aka Robert Bruce Spencer, aka Hugh Fitzgerald, aka Jihad Watch, aka Dhimmi Watch. WHY: Spencer is one of the most prolific writers of anti-Islamic claims, publishing on blogs, online and print journals, writing 6 books, appearing on television on the subject, where he is erroneously proclaimed “a scholar of Islam”, “a scholar of law” and “a scholar of history.” WHAT: What are Spencer’s his exact positions, on what does he support those positions, and what is his motivation for holding those positions? WHEN: Spencer appears to have been engaged in his campaign against Islam since 2002. My research on Spencer covers a period of roughly hours over twelve months. HOW: I utilized the Internet, religious texts, legal texts, theological dissertations, historical analyses; read many hundreds of Spencer’s writings, and engaged in an extended and intense email discussion with Spencer over a period of about 6 months. I maintained an enormous amount of notes and reference material, along with originals of all emails, online articles, references, etc. I then organized the material, found that I had enough to write a book, and went through (as of this writing, which may be before the edition that you are reading), 68 drafts to summarize my findings in a short enough article that you wouldn’t fall asleep reading it. -
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
PERSPECTIVES on TERRORISM Volume 11, Issue 5
ISSN 2334-3745 Volume V, Issue 5 October 2017 PERSPECTIVES ON TERRORISM Volume 11, Issue 5 Table of Contents Welcome from the Editors......................................................................................................1 Articles Countering Violent Extremism in Prisons: A Review of Key Recent Research and Critical Research Gaps.........................................................................................................................2 by Andrew Silke and Tinka Veldhuis The New Crusaders: Contemporary Extreme Right Symbolism and Rhetoric..................12 by Ariel Koch Exploring the Continuum of Lethality: Militant Islamists’ Targeting Preferences in Europe....................................................................................................................................24 by Cato Hemmingby Research Notes On and Off the Radar: Tactical and Strategic Responses to Screening Known Potential Terrorist Attackers................................................................................................................41 by Thomas Quiggin Resources Terrorism Bookshelf.............................................................................................................50 Capsule Reviews by Joshua Sinai Bibliography: Terrorist Organizations: Cells, Networks, Affiliations, Splits......................67 Compiled and selected by Judith Tinnes Bibliography: Life Cycles of Terrorism..............................................................................107 Compiled and selected by Judith -
Sunni – Shi`A Relations and the Implications for Belgium and Europe
FEARING A ‘SHIITE OCTOPUS’ SUNNI – SHI`A RELATIONS AND THE IMPLICATIONS FOR BELGIUM AND EUROPE EGMONT PAPER 35 FEARING A ‘SHIITE OCTOPUS’ Sunni – Shi`a relations and the implications for Belgium and Europe JELLE PUELINGS January 2010 The Egmont Papers are published by Academia Press for Egmont – The Royal Institute for International Relations. Founded in 1947 by eminent Belgian political leaders, Egmont is an independent think-tank based in Brussels. Its interdisciplinary research is conducted in a spirit of total academic freedom. A platform of quality information, a forum for debate and analysis, a melting pot of ideas in the field of international politics, Egmont’s ambition – through its publications, seminars and recommendations – is to make a useful contribution to the decision- making process. *** President: Viscount Etienne DAVIGNON Director-General: Marc TRENTESEAU Series Editor: Prof. Dr. Sven BISCOP *** Egmont - The Royal Institute for International Relations Address Naamsestraat / Rue de Namur 69, 1000 Brussels, Belgium Phone 00-32-(0)2.223.41.14 Fax 00-32-(0)2.223.41.16 E-mail [email protected] Website: www.egmontinstitute.be © Academia Press Eekhout 2 9000 Gent Tel. 09/233 80 88 Fax 09/233 14 09 [email protected] www.academiapress.be J. Story-Scientia NV Wetenschappelijke Boekhandel Sint-Kwintensberg 87 B-9000 Gent Tel. 09/225 57 57 Fax 09/233 14 09 [email protected] www.story.be All authors write in a personal capacity. Lay-out: proxess.be ISBN 978 90 382 1538 9 D/2010/4804/17 U 1384 NUR1 754 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the permission of the publishers. -
The Internet and the Radicalization of Muslim Women
The Internet and the Radicalization of Muslim Women Sergio E. Sanchez California State University, Chico Department of Political Science Chico, CA 95929 [email protected] “to kill one and frighten 10,000 others” - Chinese Proverb Paper prepared for Presentation at the annual meeting of the Western Political Science Association, Seattle, WA, April 2014. Abstract The Internet, with its built in anonymity and continuous availability – 24 hours a day, seven days a week- is for some the perfect venue for chatting, meeting new people, learning about topics of interest, and a source for countless hours of entertainment. Moreover, the Internet allows individuals from all over the country, or the world, who are from different socioeconomic backgrounds but who share similar interests and ideologies to interact and communicate privately. However, the Internet is also a readymade platform for the spread of hate, terror, and other radical ideas and messages, all of which can be transmitted at the speed of light, anonymously, and available on demand. The Internet is, therefore, an ideal venue for women to interact with likeminded individuals or organizations without having to sacrifice or tarnish their standing in the community or among their families. Women from repressive countries such as Saudi Arabia, Egypt, and Palestine can participate in jihad without leaving their homes and without having to meet strange men face-to-face and, consequently, bring shame to their families or themselves – as per traditional Islamic practices. Likewise, women involved or interested in radical environmentalism can meet online, share ideas, and continue their struggle against governments and corporations. Similarly, women involved, or fascinated with, right-wing religious movements or hate groups such as the KKK or neo-Nazis can likewise meet in a private setting, virtually, with little concern that their reputations or image within the community will be tarnished by their surreptitious activities online. -
Violent Jihad in the Netherlands
Violent Jihad in the Netherlands Current trends in the Islamist terrorist threat Violent Jihad in the Netherlands Current trends in the Islamist terrorist threat 2 Contents Foreword 5 Introduction 7 The murder of Theo van Gogh: consequences and effects 7 General trends in the development of jihadism 9 Framework of terms and definitions 10 1 From exogenous threat to home-grown terrorism 13 1.1 What is a jihadist network? 13 1.2 Historical development of network formation 15 1.2.1 The traditional phase: migration of jihadists 15 1.2.2 The proliferation phase: recruitment 16 1.2.3 The ‘home-grown’ phase: radicalisation and jihadisation 17 1.3 Three types of jihadist networks 17 2 Decentralisation and local implantation of international jihad19 2.1Al-Qaeda: from ‘network of gynetworks’ 19 to trademark and ideolo 2.2 Ideology of global violent jihad 21 2.3 Decentralisation of international jihad 22 2.4 Local implantation of international jihad 26 3 Radicalisation and the emergence of local networks 29 3.1Radicalisation, recruitment and jihadisation 29 3.2 The religious context of radicalisation 30 3.3 The socio-political context of radicalisation 33 3.4 The cultural and socio-psychological context of radicalisation 35 3.5 Emergence of local autonomous cells and networks 37 3.6 Backgrounds and functioning of local autonomous networks 38 3.7 The significance of the Hofstad network 39 4 Virtualisation of jihad 43 4.1The Internet as a propulsion of the jihad movement 43 4.2 Al-Qaeda as a virtual database (top-down) 44 4.3 The virtual umma (grass -
Investigating Web Defacement Campaigns at Large
Session 11: Malware and Web ASIACCS’18, June 4–8, 2018, Incheon, Republic of Korea Investigating Web Defacement Campaigns at Large Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini Forward-Looking Threat Research Team - Trend Micro, Inc. ABSTRACT the attack, team affiliation of the defacer(s), or nicknames ofthe Website defacement is the practice of altering the web pages of a supporting actors. Over the years, defacers have abandoned their website after its compromise. The altered pages, called deface pages, interested in defacing for the mere purpose of advertising the com- can negatively affect the reputation and business of the victim site. promise, pursuing defacement more as a mean to broadcast strong Previous research has focused primarily on detection, rather than messages “to the World”—by compromising popular websites. exploring the defacement phenomenon in depth. While investigat- Despite several actors are still driven by the desire of promot- ing several defacements, we observed that the artifacts left by the ing their own reputation, an increasing number of defacers strive defacers allow an expert analyst to investigate the actors’ modus instead to promote their ideologies, religious orientation, political operandi and social structure, and expand from the single deface views, or other forms of activism, often closely following real-world page to a group of related defacements (i.e., a campaign). However, events (e.g., war, elections, crisis, terrorist attacks). We refer to this manually performing such analysis on millions of incidents is te- phenomenon as dark propaganda, to highlight that legitimate re- dious, and poses scalability challenges. From these observations, we sources are abused for pushing the actors’ viewpoints. -
When Caricature Meets Resistance
Chapter 9 When Caricature Meets Resistance Eva Beate Strømsted Self-censorship? Yes. There wasn’t much of it before, but today it [the satire] is drenched in self-censorship. I feel it affects almost everything I draw now. Earlier I just made a drawing with my opinion, and it got published. But now I think: ‘Okay, if I make it this way, it will not get published.’ Eventually I make a drawing that will be accepted (Cartoonist 3). According to Freedberg (1991), humans have always worshiped and feared images, giving pictures powerful and magical influence, ruining and censoring them. With regards to the art of cartoons, its aesthetics have been seen as a strong political weapon. It is especially within the last decade’s dramatic developments that the thoughts of the Norwegian cartoonist in the above quote must be located. In Paris 7 January 2015, two Islamists, Saïd and Chérif Kouachi, connected to Al-Qaida’s branch in Yemen, forced their way into the office of the French satirical magazine Charlie Hebdo. Armed with assault rifles and other weapons, they killed 12 people and injured 11 others, all because of Charlie Hebdo’s drawings of Muhammad (Samuelsen 2015). However, the magazine has always published cartoons insulting whomever, often in a completely disrespectful manner, and the assassinations at Charlie Hebdo must be seen as an extension of the cartoon controversy that started ten years earlier. In 2005, Flemming Rose, the culture editor of the Danish newspaper, Jyllands- Posten, wanted to contribute to the debate about criticism of Islam and self-censorship among European artists. -
Windows Live
Microsoft Your potential. Our passion,"' Windows Live MICROSOFT ONLINE SERVICES •Lsw-EMerccmcnt Use Onty- Law Enforcement Hotline: (425) 722-1299 MSN & windows Live Services: Hotmail & Passport Requests: FAX: (425) 727-3490 FAX: (650) 693-7061 Microsoft Corporation Microsoft Corporation Attention: Attention: Online Services Custodian of Records online Services custodian of Records One Microsoft Way 1065 la Avenida, Building 4 Redmond, WA 98052-6399 Mountain View, CA 94043 Summary of Record Retention Policies Hotmail & MSN E-mail IP Logs 60 days + initial sign in MSN internet Access Connection Logs 60 da\s MSN Groups—US (IP) Logs 60 days MSN Groups — inactive Status 30 days of non-activity MSN Groups — Content Deletion 30 days (!>i)5!~iu:«:iiv[- or ilbaDk'U) MSN Spaces — IIS (IP) Logs 60 days MSN Spaces — Content Deletion 90 days (after ifis;il>leil) Windows Live Messenger Conversations None Passport Varies depending on connection and date range EMERGENCY REQUESTS Microsoft online Services will respond to emergency requests outside of normal business hours if the emergency involves "the immediate danger of death or physical injury to any person..." as defined in 18 u.S.C. § 2702(c)(4) and (b)(8). Emergencies are limited to situations like kidnapping, murder threats, bomb threats, terrorist threats, etc. Legal Documentation Required for Customer Account information and content The Electronic communications Privacy Act (ECPAi (18 u.S.c. § 2701 through 2712) governs what legal documentation is required in order for Microsoft's online services records custodians to disclose customer account information and e-mail content. For most Microsoft Online services: Basic Subscriber information may be Disclosed with a Subpoena. -
Donald Trump, the Changes: Aanti
Ethnic and Racial Studies ISSN: 0141-9870 (Print) 1466-4356 (Online) Journal homepage: https://www.tandfonline.com/loi/rers20 Donald Trump, the anti-Muslim far right and the new conservative revolution Ed Pertwee To cite this article: Ed Pertwee (2020): Donald Trump, the anti-Muslim far right and the new conservative revolution, Ethnic and Racial Studies, DOI: 10.1080/01419870.2020.1749688 To link to this article: https://doi.org/10.1080/01419870.2020.1749688 © 2020 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group Published online: 17 Apr 2020. Submit your article to this journal Article views: 193 View related articles View Crossmark data Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=rers20 ETHNIC AND RACIAL STUDIES https://doi.org/10.1080/01419870.2020.1749688 Donald Trump, the anti-Muslim far right and the new conservative revolution Ed Pertwee Department of Sociology, London School of Economics, London, UK ABSTRACT This article explores the “counter-jihad”, a transnational field of anti-Muslim political action that emerged in the mid-2000s, becoming a key tributary of the recent far- right insurgency and an important influence on the Trump presidency. The article draws on thematic analysis of content from counter-jihad websites and interviews with movement activists, sympathizers and opponents, in order to characterize the counter-jihad’s organizational infrastructure and political discourse and to theorize its relationship to fascism and other far-right tendencies. Although the political discourses of the counter-jihad, Trumpian Republicanism and the avowedly racist “Alt-Right” are not identical, I argue that all three tendencies share a common, counterrevolutionary temporal structure.