The Jihadi Threat to Indonesia Fighters Without Borders

Total Page:16

File Type:pdf, Size:1020Kb

The Jihadi Threat to Indonesia Fighters Without Borders OBJECTIVE ·· RELEVANT ·· RIGOROUS || JUNE/JULYFEBRUARY 20202018 · VOLUME 13,11, ISSUE 26 FEATURE ARTICLE FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE A VIEW FROM THE CT FOXHOLE TheFighters Jihadi Without Threat Brigadier General LTC(R) Bryan Price Borders Dagvin Anderson Forecastingto Indonesia new trends in the Iran threat network foreign operations Commander, Former Director, U.S. Special Operations Command Africa KirstenMatthew E. SchulzeLevitt Combating Terrorism Center FEATURE ARTICLE Editor in Chief 1 "Fighters Without Borders"—Forecasting New Trends in Iran Threat Paul Cruickshank Network Foreign Operations Tradecraft Matthew Levitt Managing Editor Kristina Hummel INTERVIEWS EDITORIAL BOARD 9 A View from the CT Foxhole: Brigadier General Dagvin R.M. Anderson, Colonel Suzanne Nielsen, Ph.D. Commander, U.S. Special Operations Command Africa Jason Warner Department Head Dept. of Social Sciences (West Point) 15 A View from the CT Foxhole: An Interview with an Official at Europol's EU Internet Referral Unit Brian Dodwell Amarnath Amarasingam Director, CTC Don Rassler ANALYSIS Director of Strategic Initiatives, CTC 20 The Cyber Threat from Iran after the Death of Soleimani Annie Fixler CONTACT Combating Terrorism Center 30 "Breaking the Walls" Goes Global: The Evolving Threat of Jihadi Prison U.S. Military Academy Assaults and Riots 607 Cullum Road, Lincoln Hall Bennett Clifford and Caleb Weiss West Point, NY 10996 Phone: (845) 938-8495 Following the January 3, 2020, U.S. drone strike that killed Islamic Revo- Email: [email protected] lutionary Guard Corps Quds Force chief General Qassem Soleimani, there Web: www.ctc.usma.edu/sentinel/ is significant concern that Iran may seek to retaliate against U.S. interests in the Middle East, and possibly even in the U.S. homeland. In our feature article, Matthew Levitt SUBMISSIONS forecasts that “Iran and the foreign legion of Shi`a proxies at its disposal are likely to employ new types of operational tradecraft, including deploying cells comprised of operatives from various proxy The CTC Sentinel welcomes submissions. groups and potentially even doing something authorities worry about but have never seen to date, Contact us at [email protected]. namely encouraging Shi`a homegrown violent extremist terrorist attacks.” Annie Fixler assesses Iran will likely not order a major intensification of cyber operations against The views expressed in this report are the United States to avenge Soleimani per se, because “claiming credit [to make clear any attack is in those of the authors and not of the U.S. retaliation] also removes plausible deniability, which is one of the benefits of cyberattacks in the first Military Academy, the Department of the place.” Instead, she argues, the state-sponsored cyber threat from Iran will continue along its current Army, or any other agency of the U.S. elevated trajectory, driven to a significant degree by the Iranian regime’s desire to hit back because Government. of U.S. sanctions. Our feature interview is with Brigadier General Dagvin Anderson, Commander of U.S. Special Operations Command Africa. In our second interview, conducted by Amarnath Amarasingam, an Cover: A supporter of Lebanon's Iran-allied official at Europol’s EU Internet Referral Unit outlines how in November 2019, the unit coordinated Hezbollah movement with a Farsi inscription with messaging platforms, including Telegram, to carry out a major takedown of Islamic State chan- reading "Revenge Severely" written on her nels online. palm, holds a picture of Qassem Soleimani, At a time of continued concern over the security risk posed by the thousands of Islamic State fighters detained in northern Syria, Bennett Clifford and Caleb Weiss assess the global threat posed commander of the Quds Force of the Iranian by jihadi attacks on prisons and jihadi riots inside prisons. They document how from West Africa to Revolutionary Guard, who was killed in a U.S. Southeast Asia, targeting prisons systems in this way has continued to be a priority for the Islamic airstrike in Baghdad, as she attends a mass State and other jihadi groups. “In planning these types of attacks,” they write, “jihadis are interested rally and a televised speech by Hezbollah in restoring their force size, releasing incarcerated jihadi leaders or specialists, and/or creating a Secretary-General Hassan Nasrallah. propaganda win.” (Marwan Naamani/picture alliance via Getty Paul Cruickshank, Editor in Chief Images) FEBRUARY 2020 CTC SENTINEL 1 “Fighters Without Borders”—Forecasting New Trends in Iran Threat Network Foreign Operations Tradecraft By Matthew Levitt death what he aspired toward but failed to achieve in life. Anoth- The threats to U.S. interests in the Middle East, and pos- er departure is more strategic— further solidifying the network of sibly in the U.S. homeland, increased in the wake of the Shi`a militant groups Soleimani quilted together under the Quds January 3, 2020, U.S. drone strike that killed Islamic Rev- Force. Iranian Supreme Leader Ali Khamenei has described the olutionary Guard Corps Quds Force chief General Qassem Quds Force as Tehran’s “fighters without borders,” but given the Soleimani and Iraqi Shi`a militia commander Abu Mahdi Quds Force’s control of this network of Shi`a foreign fighters, the al-Muhandis. While the primary overt objective of Iran term more aptly applies to the Quds Force and the Shi`a militant networks under its control.4 Hezbollah has already stepped in to and its proxies post-Soleimani will likely be to push all help guide Iraq’s various Shi`a militias, at least temporarily.5 Other U.S. military forces out of Iraq and the region, they will changes will likely be tactical, increasingly focused on trying to en- undoubtedly also want to avenge Soleimani’s death. And hance operational security and the potential to carry out terrorist as Hezbollah leader Hassan Nasrallah has made clear, all operations with reasonable deniability. Iranian proxy militant groups will be expected to play their This article focuses on the areas of tactical adjustment that the parts in this campaign. When they do, Iran and the foreign Quds Force, Hezbollah, and other Shi`a militant groups might legion of Shi`a proxies at its disposal are likely to employ make to enhance their international terrorist attack capabilities. new types of operational tradecraft, including deploying First, the article explains why U.S. authorities are so animated by cells comprised of operatives from various proxy groups the potential threat of a terrorist attack against U.S. interests, possi- and potentially even doing something authorities worry bly in the homeland, following the Soleimani drone strike. Second, about but have never seen to date, namely encouraging it forecasts and assesses in turn two specific lines of operational ef- fort that authorities fear Iran and its proxies (led by the Quds Force Shi`a homegrown violent extremist terrorist attacks. and Hezbollah) are developing for future operations: (a) Deploying teams including non-Iranian and non-Leba- peaking in the wake of the January 3, 2020, U.S. drone nese Shi`a militants from around the world and representing strike in Baghdad that killed the commander of Iran’s a variety of Iranian proxy groups to carry out international Quds Force, Major General Qassem Soleimani, Hez- terror operations at Iran’s behest; and bollah Secretary-General Hassan Nasrallah made clear that the response to the Soleimani assassination would (b) Developing and encouraging a terrorist trend common in be carried out by the full range of Shi`a militant groups beholden the world of Sunni extremism but not yet seen in the context S 1 to Iran far into the future. In the post-Soleimani era, Nasrallah of Shi`a extremism—Shi`a homegrown violent extremism intimated, operations by Iran and its web of proxy groups would (HVE). also deviate from traditional tactics. “Whoever thinks that this dear martyrdom will be forgotten is mistaken, and we are approaching The Threat to the United States a new era,” he said.2 U.S. law enforcement and intelligence agencies long assessed that To be sure, much of the established modus operandi honed over Iran and its proxy groups were unlikely to carry out an attack in the years of training and practice by the Quds Force and Hezbollah U.S. homeland, unless the United States took direct action under- will continue to feature prominently in Iranian and Iranian proxy mining their interests. operations.3 But Nasrallah’s vague pledge to modernize begs the For example, a 1994 FBI report, issued in the wake of the Hez- question: What might be expected of a “new era” of international bollah bombing targeting the AMIA Jewish community center in operations carried out by Iran and its proxy forces? Buenos Aires a few months earlier, downplayed the likelihood of One difference from past operations is opportunistic—priori- Hezbollah attacking U.S. interests, unless the United States took tizing the effort to push U.S. forces out of the Middle East. Iran actions directly threatening Hezbollah. “The Hezbollah leadership, will likely leverage Soleimani’s assassination to achieve with his based in Beirut, Lebanon, would be reluctant to jeopardize the rel- atively safe environment its members enjoy in the United States by committing a terrorist act within the U.S. borders,” it assessed. Dr. Matthew Levitt is the Fromer-Wexler fellow and director of The “However, such a decision could be initiated in reaction to a per- Washington Institute’s Reinhard Program on Counterterrorism ceived threat from the United States or its allies against Hezbollah and Intelligence. He has served as a counterterrorism official with interests.”6 the FBI and Treasury Department, and is the author of Hezbol- In 2002, the FBI informed the Senate Select Committee on In- lah: The Global Footprint of Lebanon’s Party of God.
Recommended publications
  • Nina Koennemann Bann They Come from Behind the Wall: the So-Called Smokers. Nina Koennemann Observes Them As If They Were the La
    Films & Windows I-IV 07.06. - 25.08. 2012 Films & Windows (IV) Nina Koennemann & Flame Opening Reception: 09.08.2012 / 19.00 - 22.00 CET Nina Koennemann Bann They come from behind the wall: the so-called smokers. Nina Koennemann observes them as if they were the last - or newly discovered - specimens of their kind. Their shoes, their lair, the way in which they separate ash from ember and how they dispose of waste. The traces that they leave behind in the cityscape; a cityscape in which they them- selves appear only in traces. A granite block and a film frame, in which visible and invisible dividing lines of the various quadrants, zones and outskirts overlap each other, forming the city as a semi-transparent area. The era of the cigarette, which began with the rise of industrial production and mass consumption, their ordering of time into brief intervals-the length of a smoke-is shown here entering its last phase. The semi-worldliness of smoking, last bound to bars and juke joints, finds the reverberation of a waking dream in the reflections of people, their body parts and passenger cars in the granite surface. This can mean the bisection of the world in the exact doubling of the material factors, or it's interpreted as a means of escape, an extension of space. -Katha Schulte Flame In May 2012 over a thousand computers in countries in the Middle East were infected by Flame malware. The virus is the latest in a series of cyberweapons (following Stuxnet in 2010, Duqu in 2011 and Mahdi in February 2012) and, because of its large and expensive scale, is speculated to be designed by governments for espionage purposes rather than hacker or cybercriminal activity.
    [Show full text]
  • A WAY FORWARD with IRAN? Options for Crafting a U.S. Strategy
    A WAY FORWARD WITH IRAN? Options for Crafting a U.S. Strategy THE SOUFAN CENTER FEBRUARY 2021 A WAY FORWARD WITH IRAN? OPTIONS FOR CRAFTING A U.S. STRATEGY A WAY FORWARD WITH IRAN? Options for Crafting a U.S. Strategy THE SOUFAN CENTER FEBRUARY 2021 Cover photo: Associated Press Photo/Photographer: Mohammad Berno 2 A WAY FORWARD WITH IRAN? OPTIONS FOR CRAFTING A U.S. STRATEGY CONTENTS List of Abbreviations 4 List of Figures 5 Key Findings 6 How Did We Reach This Point? 7 Roots of the U.S.-Iran Relationship 9 The Results of the Maximum Pressure Policy 13 Any Change in Iranian Behavior? 21 Biden Administration Policy and Implementation Options 31 Conclusion 48 Contributors 49 About The Soufan Center 51 3 A WAY FORWARD WITH IRAN? OPTIONS FOR CRAFTING A U.S. STRATEGY LIST OF ABBREVIATIONS BPD Barrels Per Day FTO Foreign Terrorist Organization GCC Gulf Cooperation Council IAEA International Atomic Energy Agency ICBM Intercontinental Ballistic Missile IMF International Monetary Fund IMSC International Maritime Security Construct INARA Iran Nuclear Agreement Review Act INSTEX Instrument for Supporting Trade Exchanges IRGC Islamic Revolutionary Guard Corps IRGC-QF Islamic Revolutionary Guard Corps - Qods Force JCPOA Joint Comprehensive Plan of Action MBD Million Barrels Per Day PMF Popular Mobilization Forces SRE Significant Reduction Exception 4 A WAY FORWARD WITH IRAN? OPTIONS FOR CRAFTING A U.S. STRATEGY LIST OF FIGURES Figure 1: Iran Annual GDP Growth and Change in Crude Oil Exports 18 Figure 2: Economic Effects of Maximum Pressure 19 Figure 3: Armed Factions Supported by Iran 25 Figure 4: Comparison of Iran Nuclear Program with JCPOA Limitations 28 5 A WAY FORWARD WITH IRAN? OPTIONS FOR CRAFTING A U.S.
    [Show full text]
  • The Iranian Cyber Threat
    The Iranian Cyber Threat May 2021 0 Contents Introduction .............................................................................................................................................. 2 Cyber Retaliation ..................................................................................................................................... 2 Iran’s National Security Strategy .............................................................................................................. 4 Laying the Groundwork ........................................................................................................................... 5 Structure ................................................................................................................................................... 5 Defense ................................................................................................................................................... 6 Offense .................................................................................................................................................... 6 History of Iranian Cyber Attacks and Incidents ........................................................................................... 7 The Attacks .............................................................................................................................................. 8 Iranian Cyber Army .................................................................................................................................
    [Show full text]
  • Volume XV, Issue 1 February 2021 PERSPECTIVES on TERRORISM Volume 15, Issue 1
    ISSN 2334-3745 Volume XV, Issue 1 February 2021 PERSPECTIVES ON TERRORISM Volume 15, Issue 1 Table of Content Welcome from the Editors...............................................................................................................................1 Articles Bringing Religiosity Back In: Critical Reflection on the Explanation of Western Homegrown Religious Terrorism (Part I)............................................................................................................................................2 by Lorne L. Dawson Dying to Live: The “Love to Death” Narrative Driving the Taliban’s Suicide Bombings............................17 by Atal Ahmadzai The Use of Bay’ah by the Main Salafi-Jihadist Groups..................................................................................39 by Carlos Igualada and Javier Yagüe Counter-Terrorism in the Philippines: Review of Key Issues.......................................................................49 by Ronald U. Mendoza, Rommel Jude G. Ong and Dion Lorenz L. Romano Variations on a Theme? Comparing 4chan, 8kun, and other chans’ Far-right “/pol” Boards....................65 by Stephane J. Baele, Lewys Brace, and Travis G. Coan Research Notes Climate Change—Terrorism Nexus? A Preliminary Review/Analysis of the Literature...................................81 by Jeremiah O. Asaka Inventory of 200+ Institutions and Centres in the Field of Terrorism and Counter-Terrorism Research.....93 by Reinier Bergema and Olivia Kearney Resources Counterterrorism Bookshelf: Eight Books
    [Show full text]
  • Iran I Stany Zjednoczone
    IRAN I STANY ZJEDNOCZONE – GENEZA, STAN OBECNY I PERSPEKTYWY IRAN I STANY ZJEDNOCZONE – geneza, stan obecny i perspektywy Autor: dr Robert Czulda, Jakub Gajda Program Polityka Międzynarodowa Warszawa 2019 SPIS TREŚCI I. Polityka Stanów Zjednoczonych wobec Iranu 7 II. Perspektywa państwa członkowskiego Unii Europejskiej 16 III. Wnioski i rekomendacje 17 Bliskie nawiązanie relacji amerykańsko-irańskich wizerunek Stanów Zjednoczonych w Iranie. Od przypada na lata czterdzieste XX wieku. W 1942 tego momentu nawet umiarkowani Irańczycy nie roku, podczas brytyjsko-sowieckiej okupacji Iranu, ufają Zachodowi sądząc, że ani Wielka Brytania, w kraju tym pojawili się pierwsi amerykańscy ani Stany Zjednoczone nie dbają o pomyślność ich żołnierze. W późniejszej fazie szach Iranu narodu, lecz jedynie o własne interesy. Mohammad Reza Pahlawi zbliżył się politycznie i gospodarczo do Stanów Zjednoczonych, widząc w Dzięki wsparciu i namowom Stanów Zjednoczonych nich geostrategiczną przeciwwagę dla mocarstw pod koniec lat pięćdziesiątych Iran zainicjował dominujących od kilku stuleci w regionie Bliskiego cywilny program jądrowy. Wiązało się to z planem i Środkowego Wschodu: spadkobiercy Rosji – monarchy, aby przekształcić Iran w regionalne Związku Sowieckiego i Wielkiej Brytanii. Po II mocarstwo. Jednym z elementów tej strategii była wojnie światowej Iran stał się dla Amerykanów budowa nowoczesnych sił zbrojnych. Ambitne plany ważnym przyczółkiem na Bliskim Wschodzie, Pahlawiego wpisywały się w strategię Stanów dającym możliwość regionalnego oddziaływania,
    [Show full text]
  • Intelligence Community Presidentially Appointed Senate Confirmed Officials (PAS) During the Administrations of Presidents George W
    Intelligence Community Presidentially Appointed Senate Confirmed Officials (PAS) During the Administrations of Presidents George W. Bush, Barack H. Obama, and Donald J. Trump: In Brief May 24, 2021 Congressional Research Service https://crsreports.congress.gov R46798 Intelligence Community Presidentially Appointed Senate Confirmed Officials (PAS) Contents Introduction ..................................................................................................................................... 1 Methodology ................................................................................................................................... 2 Tables Table 1. George W. Bush Administration-era Nominees for IC PAS Positions............................... 2 Table 2. Obama Administration-era Nominees for IC PAS Positions ............................................. 5 Table 3. Trump Administration Nominees for IC PAS Positions .................................................... 7 Contacts Author Information ........................................................................................................................ 10 Congressional Research Service Intelligence Community Presidentially Appointed Senate Confirmed Officials (PAS) Introduction This report provides three tables that list the names of those who have served in presidentially appointed, Senate-confirmed (PAS) positions in the Intelligence Community (IC) during the last twenty years. It provides a comparative perspective of both those holding IC PAS positions who have
    [Show full text]
  • The Cyberpeace Institute Foreword 2 Acknowledgements 5
    March 2021 The CyberPeace Institute Foreword 2 Acknowledgements 5 Part 1: Setting the Scene 7 Disclaimer Introduction 9 The opinions, findings, and conclusions and recommendations in Signposting – How to read the Report 11 this Report reflect the views and opinions of the CyberPeace Institute Key Findings 15 alone, based on independent and discrete analysis, and do not indicate Recommendations 19 endorsement by any other national, regional or international entity. Part 2: Understanding the Threat Landscape 27 The designations employed and the presentation of the material in this publication do not express any opinion whatsoever on the part of the Chapter 1 Background 29 CyberPeace Institute concerning the legal status of any country, territory, 1.1 A convergence of threats to healthcare 29 city or area of its authorities, or concerning the delimitation of its 1.2 Healthcare as a target of choice 30 frontiers or boundaries. 1.3 Cybersecurity in the healthcare sector 32 Copyright Notice Chapter 2 Victims, Targets and Impact 35 2.1 A diversity of victims – the people 36 The concepts and information contained in this document are the 2.2 A typology of targets – healthcare organizations 38 property of the CyberPeace Institute, an independent non-profit 2.3 A variety of impacts on victims and targets 41 foundation headquartered in Geneva, unless otherwise indicated within the document. This document may be reproduced, in whole or in part, Chapter 3 Attacks 51 provided that the CyberPeace Institute is referenced as author and 3.1 Disruptive attacks – ransomware’s evolving threat to healthcare 52 copyright holder. 3.2 Data breaches – from theft to cyberespionage 57 3.3 Disinformation operations – an erosion of trust 59 © 2021 CyberPeace Institute.
    [Show full text]
  • March 2020 MLM
    VOLUME XI, ISSUE 3, MARCH 2020 THE JAMESTOWN FOUNDATION The Past as Escape from The GNA’s Latest Defection: A Precedent: Is Pakistan: TTP Profile of the AQAP’s New the Taliban’s Spokesperson Tripoli Emir: Who is Military Chief Militiaman- Ehsan ullah Khalid Batarfi? Sirajuddin Turned-Diplomat BRIEF Ehsan Fled Mohamed Shaeban Haqqani Ready from Custody ‘al-Mirdas’ for Peace? LUDOVICO SUDHA JOHN FOULKES FARHAN ZAHID DARIO CRISTIANI CARLINO RAMACHANDRAN VOLUME XI, ISSUE 3 | MARCH 2020 Bashir Qorgab—al-Shabaab Veteran al-Shabaab (Radio Muqdisho, March 7; Commander Killed in U.S. Airstrike Jerusalem Post, March 8). John Foulkes Qorgab was born sometime between 1979 and 1982, and was a senior al-Shabaab leader for On February 22, an airstrike carried out by U.S. over a decade, having been one of ten members Africa Command killed a senior al-Shabaab of al-Shabaab’s executive council, as of 2008. leader, Bashir Mohamed Mahamoud (a.k.a. On April 13, 2010, the United States placed Bashir Qorgab) (Radio Muqdisho, March 7). As Qorgab on the list of specially designated global a senior operational commander in the Somali terrorists. The U.S. State Department’s Reward militant group, Qorgab is believed to have been for Justice program offered $5 million for involved in the planning of the attack on the information that led to his arrest in June 2012, military base Camp Simba and its Manda Bay pointing to the fact that he led a mortar attack airstrip used by U.S. and Kenyan forces. The against the then-Transitional Federal attack killed one U.S.
    [Show full text]
  • Internal Conflict Resolution Between Government of Indonesia and Separatist Movement in Papua Using Horse-Trading Mechanism
    Society, 7 (2), 83-100, 2019 P-ISSN: 2338-6932 | E-ISSN: 2597-4874 https://society.fisip.ubb.ac.id Internal Conflict Resolution between Government of Indonesia and Separatist Movement in Papua using Horse-Trading Mechanism Sekar Wulan Febrianti 1 , Ajeng Sekar Arum 1,* , Windy Dermawan 1 , and Akim 1 1 Department of International Relations, Faculty of Social and Political Sciences, Padjadjaran University, 45363 West Java, Indonesia * Corresponding Author: [email protected] ARTICLE INFO ABSTRACT Publication Info: The study aims to analyze the process of internal conflict Literature Review resolution between the Government of Indonesia and the separatist movement in Papua (Free Papua Movement How to cite: (Indonesian: Organisasi Papua Merdeka or OPM)) using a Febrianti, S. W., Arum, A. S., horse-trading mechanism. This study was qualitative method Dermawan, W., & Akim, A. (2019). by discussing the Free Papua Movement background and the Internal Conflict Resolution Between conflict, then discussing the conflict process of timeline Government of Indonesia and analysis tool to understand the development of its movement Separatist Movement in Papua using based on chronological order, and discussing the conflict Horse-Trading Mechanism. Society, resolutions that have been carried out with conflict mapping 7(2), 83-100. analysis tool to understand the actors that involved and their DOI : 10.33019/society.v7i2.86 objectives. The conflict is the result of complexity among historical backgrounds, ideology, and a sense of injustice in Copyright © 2019. Owned by Papua, on the other hand, the international community has Author(s), published by Society increasingly supported Papua. Horse-trading has been used to resolve the conflict of Free Papua Movement and the Government of Indonesia, yet it has not yet reached a new resolution.
    [Show full text]
  • Summary of Information on Jihadist Websites the First Half of August 2015
    ICT Jihadi Monitoring Group PERIODIC REVIEW Bimonthly Report Summary of Information on Jihadist Websites The First Half of August 2015 International Institute for Counter Terrorism (ICT) Additional resources are available on the ICT Website: www.ict.org.il This report summarizes notable events discussed on jihadist Web forums during the first half of August 2015. Following are the main points covered in the report: Following a one-year absence, Sheikh Ayman al-Zawahiri re-emerges in the media in order to give a eulogy in memory of Mullah Omar, the leader of the Islamic Emirate of Afghanistan, and to swear allegiance to its new leader, Mullah Akhtar Mohammad Mansoor. Al-Zawahiri vows to work to apply shari’a and continue to wage jihad until the release of all Muslim occupied lands. In addition, he emphasized that the Islamic Emirate of Afghanistan is the only legitimate emirate. The next day, Mullah Akhtar Mohammad Mansoor announces that he accepted al- Zawahiri’s oath of allegiance. In addition, various Al-Qaeda branches and jihadist organizations that support Al-Qaeda gave eulogies in memory of Mullah Omar. Hamza bin Laden, the son of former Al-Qaeda leader, Osama bin Laden, renews his oath of allegiance to the leader of the Taliban in Afghanistan, Ayman al-Zawahiri, and praises the leaders of Al-Qaeda branches for fulfilling the commandment to wage jihad against the enemies of Islam. In reference to the arena of jihad in Syria, he recommends avoiding internal struggles among the mujahideen in Syria and he calls for the liberation of Al-Aqsa Mosque from the Jews.
    [Show full text]
  • The Iranian Cyber Threat
    The Iranian Cyber Threat May 2020 0 Contents Introduction ............................................................................................................................................ 1 Structure ................................................................................................................................................. 4 History of Iranian Cyber Attacks and Incidents ......................................................................................... 6 Conclusions ........................................................................................................................................... 11 Introduction In the early morning hours of January 3, 2020, Iran’s Islamic Revolutionary Guard Corps (IRGC) Quds Force commander Qassem Soleimani was killed in a U.S. drone strike that targeted his convoy immediately after landing at Baghdad’s international airport. Iranian leaders vowed “harsh retaliation” for the attack, and followed up on this threat by firing a salvo of over a dozen ballistic missiles at two Iraqi air bases housing U.S. troops in the early morning hours of January 8, wounding over 100 soldiers. While Iran has not yet taken additional major acts of revenge, it has signaled that it is likely to strike U.S. interests again at a future time of its choosing. Iran’s Supreme Leader, Ayatollah Ali Khamenei, intoned that while the ballistic missile attack represented a “slap on the face” for the U.S., “military action like this (ballistic missile) attack is not sufficient,” vowing to refuse to enter negotiations and to continue to confront the U.S. until its influence is expelled from the region. In the intervening period, Iran’s leaders have maintained a steady drumbeat of threatening rhetoric aimed at the U.S., with Soleimani’s successor, Esmail Qaani, for instance vowing to “hit his enemy in a manly fashion.” With U.S.-Iran tensions heightened, the U.S. national security apparatus has cautioned that one avenue for retaliation Iran is likely to pursue is launching offensive cyber attacks targeting the U.S.
    [Show full text]
  • A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks
    (IJACSA) International Journal of Advanced Computer Science and Applications Vol. 8, No. 10, 2017 A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks Milad Taleby Ahvanooey*, Prof. Qianmu Li*, Mahdi Rabbani, Ahmed Raza Rajput School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, P.O. Box 210094 P.R. China. Abstract—Nowadays, the usage of smartphones and their desktop usage (desktop usage, web usage, overall is down to applications have become rapidly popular in people’s daily life. 44.9% in the first quarter of 2017). Further, based on the latest Over the last decade, availability of mobile money services such report released by Kaspersky on December 2016 [3], 36% of as mobile-payment systems and app markets have significantly online banking attacks have targeted Android devices and increased due to the different forms of apps and connectivity increased 8% compared to the year 2015. In all online banking provided by mobile devices, such as 3G, 4G, GPRS, and Wi-Fi, attacks in 2016, have been stolen more than $100 million etc. In the same trend, the number of vulnerabilities targeting around the world. Although Android OS becomes very popular these services and communication networks has raised as well. today, it is exposing more and more vulnerable encounter Therefore, smartphones have become ideal target devices for attacks due to having open-source software, thus everybody malicious programmers. With increasing the number of can develop apps freely. A malware writer (or developer) can vulnerabilities and attacks, there has been a corresponding ascent of the security countermeasures presented by the take advantage of these features to develop malicious apps.
    [Show full text]