In the most recent episode of Homeland, Carrie while trying to figure out what direction to go in searching a stolen laptop for intel, is distracted by the computer’s screen saver which is a picture that shows the suspect in a beachfront bar in what appears to be a tropical location. Thinking back, Carrie remembers…
Category: Cyber-Warfare
The Truth about Terrorist and Encryption Technology
Terrorists were using encryption technology to evade detection long before Snowden and the Paris attacks By Natasha Bertrand A wave of coordinated terror attacks that killed at least 130 people in Paris last week have had experts grappling with how French intelligence could have missed an operation that was most likely months in the making….
The Civilian Guide to Fighting ISIS Online
Anonymous Publishes Guide to ‘Fighting ISIS Online’ Since the FBI and CIA Won’t In the wake of the Paris terror attacks, and several high-casualty acts of terrorism from the so-called Islamic State in the past week, Anonymous has come out with a series of guides for getting involved in the hacktivist group’s Operation ISIS…
Where Americans Can Be Tracked Without A Warrant
Since the Paris attacks, there is a growing concern by DHS and the FBI that ISIS are able to communicate via “Dark Comms” or communications that are so highly encrypted they cannot tracked or monitored, common sense would tell you that authorities are going to start casting the “Surveillance” net wider to compensate, meaning more…
TOR Browser Compromised by Feds?
Say it ain’t so! EVER SINCE A Carnegie Mellon talk on cracking the anonymity software Tor was abruptly pulled from the schedule of the Black Hat hacker conference last year, the security community has been left to wonder whether the research was silently handed over to law enforcement agencies seeking to uncloak the internet’s anonymous…
Tradecraft: Geo-Locating by Photos
They say photos say a 1,000 words; well in the 21st Century they can also tell your exact location. -SF Russian soldiers geolocated by photos in multiple Syria locations, bloggers say By Maria Tsvetkova MOSCOW (Reuters) – Three serving or former Russian soldiers have been geolocated by photographs in Syria, including locations near Hama, Aleppo…
Islam Invasion: Islamic State hackers post phone numbers of heads of the CIA and FBI
ISIS is now in the same league as North Korea, China and Russia when it comes to cyber-threats. Welcome to the Fifth Dimension of Warfare folks.-SF “ISIS ‘cyber caliphate’ hacks 54,000 Twitter accounts and posts phone numbers of heads of the CIA and FBI in revenge for the drone attack that killed a British extremist,”…
The Social Science of Online Radicalization
As Charlie Winter noted recently at War on the Rocks, the Islamic State’s robust social media apparatus has been propagating a remarkably effective, multi-faceted communications strategy that incorporates narratives of statehood, military success, and religious legitimacy. The Islamic State’s success in using social media to disseminateits extremist ideas and mobilize tens of thousands of foreign…
It is Time for the U.S. Military to Innovate like Insurgents
These three Army captains built a gun that kills drones. It took them ten hours and cost $150. What can the Army learn from them? The recently concluded meeting of the Association of the United States Army (AUSA) has become a yearly tradition for senior military leaders, congressional staff, and members of foreign armies to…
Facebook Friend or Terrorist: Who’s in Your Online Social Network?
As a law enforcement officer in Northeast Florida, the arrest of a 19-year-old local man named Shelton Thomas Bell got my attention. In January of this year, Bell was sentenced to twenty years in federal prison for conspiring and attempting to provide material support to terrorists. He burned American flags, recruited support locally, conducted “training…