SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Napoli (Italy)
January 28th, 2016
Pierluigi PAGANINI
The Role Of Technology In Modern Terrorism
AGENDA
Analisi Rischi
Scenario Corrente
Cyber spazio e
Terrorismo
Cyber Terrorismo
Current Scenario
Terrorismo, a global alert
3
• Terrorism, it is global alert in major capitals
worldwide
• Paris, Istanbul, Jakarta and Ouagadougou
(Burkina Faso), terrorism is a global threat.
• Analysts fear possible attacks even in places of
limited interest.
• Technology plays a crucial role for the modern
terrorist threat.
• Cyber space, a new territory of confrontation
for a threat that has no boundaries.
• Lone Wolves attacks in cyberspace
Current Scenario
Media and Terrorism
4
“Terrorist attacks are often carefully choreographed to attract the attention
of the electronic media and the international press. Terrorism is aimed at
the people watching, not at the actual victims. Terrorism is a theater”.
(Brian Jenkins, International Terrorism – A new kind of Warfare 1974)
Who are the terrorists in the Internet?
5Scenario Corrente
Hamas (the Islamic Resistance Movement), the Lebanese Hizbollah (Party of
God), the Egyptian Al-Gama'a al Islamiyya (Islamic Group, IG), the Popular
Front for the Liberation of Palestine (PLFP), the Palestinian Islamic Jihad, the
Peruvian Tupak-Amaru (MRTA) and ‘The Shining Path’ (Sendero Luminoso),
the Kahane Lives movement, the Basque ETA movement, the Real IRA
(RIRA), Supreme Truth (Aum Shinrikyo), the Colombian National Liberation
Army (ELN-Colombia), the Liberation Tigers of Tamil Eelam (LTTE), the Armed
Revolutionary Forces of Colombia (FARC), the Popular Democratic
Liberation Front Party in Turkey (DHKP/C), the Kurdish Workers’ Party (PKK),
the Zapatista National Liberation Army (ELNZ), the Japanese Red Army
(JRA), the Islamic Movement of Uzbekistan (IMU), the Mujahedin, the
Chechens, Pakistan-based Lashkar-e-Taiba and Al-Qaeda.
Terrorism in the cyberspace
6
Presence of Terrorists in the Internet
• In 1998: 12 websites containing
terrorist material
• In 2003: 2,650 websites
containing terrorist material
• In September 2015: 9,800
websites containing terrorist
material
Prof. Gabriel Weimann - 06 Nov 15
Current Scenario
Significant increase of the number of website in the Deep Web
What are the advantages?
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Cyberspace and
Terrorism
7
Simple access Poor control
Interactive
Anonymity
Cheap
What are the possible uses?
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Cyberspace and
Terrorism
8
• Propaganda
• Psychological warfare
• Recruitment and mobilization
• Fundraising
• Data Mining, information gathering
• Secure communications
• Cyber attacks
• Software distribution (e.g., mobile app)
• Buying false documents
• Training
Social media & propaganda
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Internet
Propaganda
9
• Using images with high emotional impact.
• It reaches not Arab people, and it is easily accessible
to young people.
• Easy dissemination of content (easy sharing through
email, messaging and mobile apps)
YouTube, Twitter and Facebook, crucial option for propaganda activities.
Social media and propaganda
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Internet
Propaganda
10
http://gawker.com/how-isis-makes-its-blood-sausage-1683769387
Training Material
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Narrowcasting 11
• Narrowcasting is the transmission of content restricted to specific
categories of users.
• Intelligence experts are worrying about distribution of content to
teenagers
 Websites using a ‘comic-
style’, lauding the Jihad
 Videos and Animations
 Computer "games"
 Online Quiz
 Infographics
Training material
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Narrowcasting 12
ISIS - propaganda Infographic
Social media
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Social media 13
Tweets related to the IS - (Feb.2015)
• Saudi Arabia and Egypt
recorded highest increase, a
clear sign of interest in the IS
• Importance Social media
analysis for business
intelligence
• PSYOPS
Source Recorderd Future - https://www.recordedfuture.com/isis-twitter-growth/
Training Material
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Training 14
• Manuals for a safe use of social media
and communication systems
• Propaganda material (e.g.
Encyclopedia of Jihad)
• Manuals for preparations Weapons
(i.e. chemical weapons, bombs)
• Instructions for kidnappings and
techniques of torture.
• Training Techniques
Information about targets.
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Information
Gathering 15
• Collecting information on
targets
• Analysis of open sources
• Passive Reconnaissance
• Availability of maps, images
and much more (e.g.,
Google Maps, Images from
worldc.am, etc.)
Information about targets
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Information
Gathering 16
Encrypt communications
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Encrypted
communications
17
• Tashfeen al-Jawwal, mobile application developed by the group Global
Islamic Media Front (GIMF) and released in September 2013.
• Asrar al-Ghurabaa, program for encryption of the information developed by
the group Islamic State of Iraq and Al-Sham and released in Nov. 2013.
• Amn al-Mujahid, software developed by the group Al-Fajr
TechnicalCommittee in December 2013.
Mujahideen Secrets - Al-Qaeda (2007)
Mobile Applications(2015)
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Encrypted
communications
18
Nasher App August (2015)
Amaq Agency Android app 2016
Gruppi su Telegram
Counterfeit documents
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Acquisto
Documenti Falsi
19
In the abyss of the Internet
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Deep Web & Dark
Web
20
Pseudo anonymity offered by darknet makes the dark web an ideal
environment for various activities such as:
• Propaganda
• Purchasing wepons
• Purchasing stolen card data
• Counterfeit documents
• Recruiting
• Download Mobile Apps used
for secure communications
• Purchase of malicious code
• Fund-raising (??)
• Doxing
Predominant technological component
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Over the network 21
The Islamic State has an R & D team which prepares missiles and
hi-tech bombs
“The Islamic State is the first extremist group that has a credible
offensive cyber capability,” said F-Secure Chief Research
Officer Hyppönen, speaking last week at the Wall Street Journal’s
WSJDLive conference in Laguna Beach, Calif. “Clearly, this situation
isn’t getting better. It’s getting worse.”
• The use of hacking technique to sabotage critical infrastructure.
• Hacking of systems containing sensitive information.
• Possibility of destabilizing political context through cyber attacks
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Cyber Terrorism
Cyber terrorism
22
• Low investment
• Organizational phase simpler and difficult to
detect
• Ability to create extensive damage like
traditional terrorist attack
• Different repercussions cyber attack (e.g.,
political, economic, social, technological).
• Risks associated with militarization of
cyberspace and reverse engineering of
cyber weapons
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Cyber Terrorism
What benefits?
23
Lorem ipsum dolor sit amet, consectetur
adipisicing elit, sed do eiusmod tempor
Cyber Terrorism
Hacking and Intelligence
24
• The ISIS is trying to infiltrate the
Indian hacking community.
• The terror organization offered
up to $ 10,000 to hack
government websites.
• Intense propaganda activities in
the area.
• Over 30,000 individuals in
contact with members of the
organization in Syria and Iraq.
• 12 arrests and 94 websites
blocked local intelligence.
All against all
Risk Analysis 25
The Global Risks Report 2016 11th
Edition – World Economic Forum
Cyber attacks - high impact
events with high probability
Terrorist attacks- high
impact events with high
probability of occurrence
Risk Analysis 26
The Global Risks Report 2016 11th
Edition – World Economic Forum
Risks Strongly correlated
A cyber terrorist attack could
have the following repercussions:
Cyber attacks
Terrorist attacks
• Geopolitics
• Economic
• Technological
• Social
• Environmental
A look to the future
New Trends 27
• Possible cyber attacks launched
by isolated cells
• Disclosure of sensitive data
• Cyber-terrorism on a large scale
• Cyber attacks against critical
infrastructure
• "Narrowcasting" (restricted
transmission of information)
About me 28
About Pierluigi Paganini:
Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in
identity management, member of the ENISA (European Union Agency for
Network and Information Security) Threat Landscape Stakeholder Group, he
is also a collaborator at the GIPAF group, Italian Ministry of Economy and
Finance - Administrative Prevention of Payment Card Fraud (GIPAF). Security
Evangelist, Security Analyst and Freelance Writer.
Editorial manager at Tech Economy for the Security Notes Channel and
Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security
expert with over 20 years experience in the field, he is Certified Ethical Hacker
at EC Council in London. The passion for writing and a strong belief that
security is founded on sharing and awareness lead Pierluigi to find the security
blog "Security Affairs" named a Top National Security Resource for US.
Pierluigi is a member of the Dark Reading Editorial team and he is regular
contributor for some major publications in the cyber security field such as
Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News
Magazine and for many other Security magazines.
Author of the Books "The Deep Dark Web" and “Digital Virtual Currency
and Bitcoin”, coming soon the new book "Spy attack”
Ing. Pierluigi Paganini
Chief Information Security Officer Bit4id
ppa@bit4id.com
www.bit4id.com
Founder Security Affairs
http://securityaffairs.co/wordpress
pierluigi.paganini@securityaffairs.co
Thank you

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Ppt ..terrorism
Ppt ..terrorismPpt ..terrorism
Ppt ..terrorism
 
[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type
 
Terrorism
TerrorismTerrorism
Terrorism
 
C04.8 terrorism and the media
C04.8 terrorism and the mediaC04.8 terrorism and the media
C04.8 terrorism and the media
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Covert action
Covert actionCovert action
Covert action
 
Terrorism in india
Terrorism in indiaTerrorism in india
Terrorism in india
 
Terrorism in INDIA
Terrorism in INDIATerrorism in INDIA
Terrorism in INDIA
 
Introduction To Terrorism
Introduction To TerrorismIntroduction To Terrorism
Introduction To Terrorism
 
Terrorism in Pakistan
Terrorism in PakistanTerrorism in Pakistan
Terrorism in Pakistan
 
Terrorism
TerrorismTerrorism
Terrorism
 
Global Terrorism Challenges & Response
Global Terrorism Challenges & ResponseGlobal Terrorism Challenges & Response
Global Terrorism Challenges & Response
 
Terrorism
TerrorismTerrorism
Terrorism
 
UK Counter Terrorism Case Study
UK Counter Terrorism Case Study UK Counter Terrorism Case Study
UK Counter Terrorism Case Study
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 

Andere mochten auch

Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technologypradhansushil
 
Study on e government and the reduction of administrative burden - 2014 год
Study on e government and the reduction of administrative burden - 2014 годStudy on e government and the reduction of administrative burden - 2014 год
Study on e government and the reduction of administrative burden - 2014 годVictor Gridnev
 
Terrorism in modern world and its influence on politics
Terrorism in modern world and its influence on politicsTerrorism in modern world and its influence on politics
Terrorism in modern world and its influence on politicsRuhull
 
Modern Mass Media and International Terrorism
Modern Mass Media and International TerrorismModern Mass Media and International Terrorism
Modern Mass Media and International TerrorismAgnieszka Stępińska
 
The Kite Runner
The Kite RunnerThe Kite Runner
The Kite Runnerjprevo211
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpacedCameron Banks
 
General Open Quiz v-2.0
General Open Quiz v-2.0General Open Quiz v-2.0
General Open Quiz v-2.0koolkinks
 
Effect based operation
Effect based operationEffect based operation
Effect based operationWahid haque
 
Effects Based Operations A Guide For Practitioners
Effects Based Operations A Guide For PractitionersEffects Based Operations A Guide For Practitioners
Effects Based Operations A Guide For PractitionersDouglas Webster
 
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...IBMGovernmentCA
 
Moving your hr applications to the oracle cloud
Moving your hr applications to the oracle cloudMoving your hr applications to the oracle cloud
Moving your hr applications to the oracle cloudCedar Consulting
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni
 

Andere mochten auch (20)

Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technology
 
Study on e government and the reduction of administrative burden - 2014 год
Study on e government and the reduction of administrative burden - 2014 годStudy on e government and the reduction of administrative burden - 2014 год
Study on e government and the reduction of administrative burden - 2014 год
 
Terrorism in modern world and its influence on politics
Terrorism in modern world and its influence on politicsTerrorism in modern world and its influence on politics
Terrorism in modern world and its influence on politics
 
International Crisis Group - Hope and hard reality
International Crisis Group -  Hope and hard realityInternational Crisis Group -  Hope and hard reality
International Crisis Group - Hope and hard reality
 
Qatar italy Gateway
Qatar italy GatewayQatar italy Gateway
Qatar italy Gateway
 
Modern Mass Media and International Terrorism
Modern Mass Media and International TerrorismModern Mass Media and International Terrorism
Modern Mass Media and International Terrorism
 
ICSID
ICSIDICSID
ICSID
 
The Kite Runner
The Kite RunnerThe Kite Runner
The Kite Runner
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
 
General Open Quiz v-2.0
General Open Quiz v-2.0General Open Quiz v-2.0
General Open Quiz v-2.0
 
Bomb threatmanagement
Bomb threatmanagementBomb threatmanagement
Bomb threatmanagement
 
Effect based operation
Effect based operationEffect based operation
Effect based operation
 
Clausewitz and terrorism
Clausewitz and terrorismClausewitz and terrorism
Clausewitz and terrorism
 
Effects Based Operations A Guide For Practitioners
Effects Based Operations A Guide For PractitionersEffects Based Operations A Guide For Practitioners
Effects Based Operations A Guide For Practitioners
 
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter ...
 
Moving your hr applications to the oracle cloud
Moving your hr applications to the oracle cloudMoving your hr applications to the oracle cloud
Moving your hr applications to the oracle cloud
 
Alliansens Lilla Röda
Alliansens Lilla RödaAlliansens Lilla Röda
Alliansens Lilla Röda
 
Buku panduan segak
Buku panduan segakBuku panduan segak
Buku panduan segak
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealed
 

Ähnlich wie The Role Of Technology In Modern Terrorism

Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threatsisc2dfw
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social TakeoverZeroFOX
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidentsassanesignate
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 

Ähnlich wie The Role Of Technology In Modern Terrorism (20)

Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Cyber propaganda
Cyber propagandaCyber propaganda
Cyber propaganda
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

The Role Of Technology In Modern Terrorism

  • 1. Napoli (Italy) January 28th, 2016 Pierluigi PAGANINI The Role Of Technology In Modern Terrorism
  • 2. AGENDA Analisi Rischi Scenario Corrente Cyber spazio e Terrorismo Cyber Terrorismo
  • 3. Current Scenario Terrorismo, a global alert 3 • Terrorism, it is global alert in major capitals worldwide • Paris, Istanbul, Jakarta and Ouagadougou (Burkina Faso), terrorism is a global threat. • Analysts fear possible attacks even in places of limited interest. • Technology plays a crucial role for the modern terrorist threat. • Cyber space, a new territory of confrontation for a threat that has no boundaries. • Lone Wolves attacks in cyberspace
  • 4. Current Scenario Media and Terrorism 4 “Terrorist attacks are often carefully choreographed to attract the attention of the electronic media and the international press. Terrorism is aimed at the people watching, not at the actual victims. Terrorism is a theater”. (Brian Jenkins, International Terrorism – A new kind of Warfare 1974)
  • 5. Who are the terrorists in the Internet? 5Scenario Corrente Hamas (the Islamic Resistance Movement), the Lebanese Hizbollah (Party of God), the Egyptian Al-Gama'a al Islamiyya (Islamic Group, IG), the Popular Front for the Liberation of Palestine (PLFP), the Palestinian Islamic Jihad, the Peruvian Tupak-Amaru (MRTA) and ‘The Shining Path’ (Sendero Luminoso), the Kahane Lives movement, the Basque ETA movement, the Real IRA (RIRA), Supreme Truth (Aum Shinrikyo), the Colombian National Liberation Army (ELN-Colombia), the Liberation Tigers of Tamil Eelam (LTTE), the Armed Revolutionary Forces of Colombia (FARC), the Popular Democratic Liberation Front Party in Turkey (DHKP/C), the Kurdish Workers’ Party (PKK), the Zapatista National Liberation Army (ELNZ), the Japanese Red Army (JRA), the Islamic Movement of Uzbekistan (IMU), the Mujahedin, the Chechens, Pakistan-based Lashkar-e-Taiba and Al-Qaeda.
  • 6. Terrorism in the cyberspace 6 Presence of Terrorists in the Internet • In 1998: 12 websites containing terrorist material • In 2003: 2,650 websites containing terrorist material • In September 2015: 9,800 websites containing terrorist material Prof. Gabriel Weimann - 06 Nov 15 Current Scenario Significant increase of the number of website in the Deep Web
  • 7. What are the advantages? Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Cyberspace and Terrorism 7 Simple access Poor control Interactive Anonymity Cheap
  • 8. What are the possible uses? Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Cyberspace and Terrorism 8 • Propaganda • Psychological warfare • Recruitment and mobilization • Fundraising • Data Mining, information gathering • Secure communications • Cyber attacks • Software distribution (e.g., mobile app) • Buying false documents • Training
  • 9. Social media & propaganda Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Internet Propaganda 9 • Using images with high emotional impact. • It reaches not Arab people, and it is easily accessible to young people. • Easy dissemination of content (easy sharing through email, messaging and mobile apps) YouTube, Twitter and Facebook, crucial option for propaganda activities.
  • 10. Social media and propaganda Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Internet Propaganda 10 http://gawker.com/how-isis-makes-its-blood-sausage-1683769387
  • 11. Training Material Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Narrowcasting 11 • Narrowcasting is the transmission of content restricted to specific categories of users. • Intelligence experts are worrying about distribution of content to teenagers  Websites using a ‘comic- style’, lauding the Jihad  Videos and Animations  Computer "games"  Online Quiz  Infographics
  • 12. Training material Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Narrowcasting 12 ISIS - propaganda Infographic
  • 13. Social media Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Social media 13 Tweets related to the IS - (Feb.2015) • Saudi Arabia and Egypt recorded highest increase, a clear sign of interest in the IS • Importance Social media analysis for business intelligence • PSYOPS Source Recorderd Future - https://www.recordedfuture.com/isis-twitter-growth/
  • 14. Training Material Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Training 14 • Manuals for a safe use of social media and communication systems • Propaganda material (e.g. Encyclopedia of Jihad) • Manuals for preparations Weapons (i.e. chemical weapons, bombs) • Instructions for kidnappings and techniques of torture. • Training Techniques
  • 15. Information about targets. Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Information Gathering 15 • Collecting information on targets • Analysis of open sources • Passive Reconnaissance • Availability of maps, images and much more (e.g., Google Maps, Images from worldc.am, etc.)
  • 16. Information about targets Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Information Gathering 16
  • 17. Encrypt communications Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Encrypted communications 17 • Tashfeen al-Jawwal, mobile application developed by the group Global Islamic Media Front (GIMF) and released in September 2013. • Asrar al-Ghurabaa, program for encryption of the information developed by the group Islamic State of Iraq and Al-Sham and released in Nov. 2013. • Amn al-Mujahid, software developed by the group Al-Fajr TechnicalCommittee in December 2013. Mujahideen Secrets - Al-Qaeda (2007)
  • 18. Mobile Applications(2015) Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Encrypted communications 18 Nasher App August (2015) Amaq Agency Android app 2016 Gruppi su Telegram
  • 19. Counterfeit documents Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Acquisto Documenti Falsi 19
  • 20. In the abyss of the Internet Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Deep Web & Dark Web 20 Pseudo anonymity offered by darknet makes the dark web an ideal environment for various activities such as: • Propaganda • Purchasing wepons • Purchasing stolen card data • Counterfeit documents • Recruiting • Download Mobile Apps used for secure communications • Purchase of malicious code • Fund-raising (??) • Doxing
  • 21. Predominant technological component Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Over the network 21 The Islamic State has an R & D team which prepares missiles and hi-tech bombs
  • 22. “The Islamic State is the first extremist group that has a credible offensive cyber capability,” said F-Secure Chief Research Officer Hyppönen, speaking last week at the Wall Street Journal’s WSJDLive conference in Laguna Beach, Calif. “Clearly, this situation isn’t getting better. It’s getting worse.” • The use of hacking technique to sabotage critical infrastructure. • Hacking of systems containing sensitive information. • Possibility of destabilizing political context through cyber attacks Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Cyber Terrorism Cyber terrorism 22
  • 23. • Low investment • Organizational phase simpler and difficult to detect • Ability to create extensive damage like traditional terrorist attack • Different repercussions cyber attack (e.g., political, economic, social, technological). • Risks associated with militarization of cyberspace and reverse engineering of cyber weapons Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Cyber Terrorism What benefits? 23
  • 24. Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Cyber Terrorism Hacking and Intelligence 24 • The ISIS is trying to infiltrate the Indian hacking community. • The terror organization offered up to $ 10,000 to hack government websites. • Intense propaganda activities in the area. • Over 30,000 individuals in contact with members of the organization in Syria and Iraq. • 12 arrests and 94 websites blocked local intelligence.
  • 25. All against all Risk Analysis 25 The Global Risks Report 2016 11th Edition – World Economic Forum Cyber attacks - high impact events with high probability Terrorist attacks- high impact events with high probability of occurrence
  • 26. Risk Analysis 26 The Global Risks Report 2016 11th Edition – World Economic Forum Risks Strongly correlated A cyber terrorist attack could have the following repercussions: Cyber attacks Terrorist attacks • Geopolitics • Economic • Technological • Social • Environmental
  • 27. A look to the future New Trends 27 • Possible cyber attacks launched by isolated cells • Disclosure of sensitive data • Cyber-terrorism on a large scale • Cyber attacks against critical infrastructure • "Narrowcasting" (restricted transmission of information)
  • 28. About me 28 About Pierluigi Paganini: Pierluigi Paganini is Chief Information Security Officer at Bit4Id, firm leader in identity management, member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group, he is also a collaborator at the GIPAF group, Italian Ministry of Economy and Finance - Administrative Prevention of Payment Card Fraud (GIPAF). Security Evangelist, Security Analyst and Freelance Writer. Editorial manager at Tech Economy for the Security Notes Channel and Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness lead Pierluigi to find the security blog "Security Affairs" named a Top National Security Resource for US. Pierluigi is a member of the Dark Reading Editorial team and he is regular contributor for some major publications in the cyber security field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”, coming soon the new book "Spy attack” Ing. Pierluigi Paganini Chief Information Security Officer Bit4id ppa@bit4id.com www.bit4id.com Founder Security Affairs http://securityaffairs.co/wordpress pierluigi.paganini@securityaffairs.co