How the Islamic State Gets Its Drones
A sophisticated supply chain of shell companies, false identities, and IT entrepreneurs backed the Islamic State’s drone fleet. Continue reading How the Islamic State Gets Its Drones
Collaborate Disseminate
A sophisticated supply chain of shell companies, false identities, and IT entrepreneurs backed the Islamic State’s drone fleet. Continue reading How the Islamic State Gets Its Drones
An ISIS follower tried to radicalize hundreds of strangers worldwide, until one of his targets captured the messages and gave them to police. Continue reading ISIS recruiter caught by Facebook screenshot
The U.S. military has gotten better at countering ISIS’ digital operations over the last six months, according to Lieutenant General Paul Nakasone, commanding general of Army Cyber Command. “I think what we are learning is in terms of being able to counter a message, being able to attack a brand — in this case the brand of ISIS — and then, the other thing is, how do we do this with the speed and accuracy that is able to get at an adversary that six months ago was moving uncontested in cyberspace,” Nakasone said during a Senate Armed Services subcommittee hearing. “I think we’ve learned those things over the last six months. I think we as a department have done much better.” ISIS shares propaganda, communicates with allies and spreads other messaging via the internet. In the past, the group’s successful use of social media has been linked to terrorist […]
The post U.S. cyber warriors are getting better at fighting ISIS online, says top general appeared first on Cyberscoop.
Continue reading U.S. cyber warriors are getting better at fighting ISIS online, says top general
Third parties say that Islamic State traffic on Twitter has plummeted by 45% over the past 2 years. Continue reading Twitter takes down 235K extremist accounts
Authorities say that the alleged jihadis seem to have been radicalized over social media, specifically using Facebook. Continue reading Blabbing on social media foils terrorists’ rocket attack plan
Another woman named after the Egyptian goddess of health, marriage, and wisdom has been told that her name’s verboten. Continue reading Facebook blocks another woman named Isis because of her name
Kill lists have traditionally focused on perceived religious deviants and political/economic targets, but a new wave of pro-IS kill lists has embraced random civilians as targets. Continue reading When ISIS Hackers Call You Out By Name
The terror group’s forays in social tech may prove to be a high-risk, high-cost experiment. Continue reading ISIS’s Mobile App Developers Are in Crisis Mode
The disillusioned ex-fighter brought with him a stolen USB drive containing names, addresses, and phone numbers of Islamic State jihadis. Continue reading IS defector steals USB stick revealing 22K members identities
This weekend Vago Muradian interviewed Lt Gen (ret) David Deptula, most famous for his involvement as a key planner for the Desert Storm air campaign.I recommend watching the entire video, which is less than 8 minutes long. Three aspects caught my atte… Continue reading Lt Gen David Deptula on Desert Storm and Islamic State