Tagged: cyberterrorism

social media on smartphones

“Fishwrap”: Watch Out for This Cyber Threat on Social Media

Recorded Future has published their latest research, titled “The Discovery of Fishwrap: A New Social Media Information Operation Methodology“. In the report, author Staffan Truvé discusses Recorded Future’s foray into the detection and analysis of influence operations, both by nation states and other actors. As established by RAND Corporation, influence...

2016 – The Year Ransomware Holds America Hostage

2016 – The year of Ransomware. The Institute for Critical Infrastructure Technology (ICIT) released their report regarding the new hostage taking tactic for cyber-criminals. The new form of cyber-hostage-taking, “is less about technological sophistication and more about exploitation of the human element.” The origins of Ransomware stem from the 1989...

Worldwide Threat Assessment of the US Intelligence Community

On February 9, 2016, the Director of National Intelligence, James R. Clapper, Jr., issued a comprehensive report to the Senate Armed Services Committee regarding the United States’ interest in the protection of American lives against Global and Regional threats. The threats that were outlined in this report were: ‘Cyber and...

ICIT Chastises OPM’s Lack of Modern Cybersecurity in an Official Analysis

The Institute for Critical Infrastructure Technology (ICIT) describes itself as a “nonprofit (status pending), non-partisan group of the world’s most innovative experts and companies that provide technologies and solutions to support and protect our nation’s critical infrastructures.” ICIT serves as a go-between for the private sector, federal agencies, and the...

#TerrorismAndTwitter: How Terrorists are Utilizing Social Media and What it Suggests for National Security

According to a new report by Gabriel Weimann of the Woodrow Wilson Center, “Twitter has recently emerged as terrorist’s favorite Internet service, even more popular than self-designed websites or Facebook, to disseminate propaganda and enable internal communication.” In his report titled “New Terrorism and New Media”, Weimann states that the...