Blog Posts Tagged with "jihadist"


Newest U.S. Counter-Terrorism Strategy: Trolling

August 08, 2012 Added by:Infosec Island Admin

The State Department has given the go ahead to a 20-something to put together a coalition of people across the globe to subtly troll the jihadi’s online in the hope that it will shame them into dropping the notions of radical jihad. Why am I surprised that a hair brained scheme like this would come out of State?

Comments  (0)


On th3j35t3r's Project Looking Glass

July 05, 2012 Added by:ʞɔopuooq ʇuıɐs

There haven’t been a lot of ‘TANGO DOWNS’ over the last few months. I decided that I should concentrate on targeted intelligence gathering. I needed a way to get the real world identity of ‘the marks’ – be it Anons, Jihadists or forum admins. Over the last few months I have been running ‘Project Looking Glass’...

Comments  (3)


Meet a Cyber Special Ops Warrior: th3j35t3r

June 05, 2012 Added by:Laura Walker

Although the Jester is often described as a cyber vigilante, his operations tend to steer shy of retributive justice and drive more toward disruption of enemy operations. His targets are researched, specific, and his mission is consistent. There is also the psychological component to PWNing the enemy...

Comments  (0)


The Next War on Terror Will Be (Lost) Online

May 31, 2012 Added by:Ali-Reza Anghaie

Consider we might be putting our cyber soldiers on the wrong line. Sure, there are growing ranks of cyber counter-terrorism practitioners across both private and public space, except that's only to meet the enemy we really want to see - the one that suits perhaps what we're comfortable doing or getting funding for...

Comments  (0)


Patriot Hackers, Cyber Vigilantes, and Shot Placement

May 25, 2012 Added by:Infosec Island Admin

Governments need to get a handle on this. If they want patriot hacker units, then they will have them and they will be controlled. As opposed to the Batman vigilante model that we now have here. If they did this, there would be plenty of volunteers and it might be a good thing...

Comments  (0)


Krypt3ia's Rebuttal to th3j35t3r: Oh Jokey…

April 24, 2012 Added by:Infosec Island Admin

I fundamentally disagree with Jester’s method and his goals, as much as they have been explained of breaking their communications. I pretty much explained myself in rather clear, albeit terse, language on several occasions including my rant about getting off the lawn...

Comments  (1)


AQ Air: Mostly Hot - Not So Interesting

April 12, 2012 Added by:Infosec Island Admin

In the rar file that was uploaded to multiple locker sites were five video files that were taken from the internet and re-purposed for the release. Metadata from the files shows that they were handled on a Windows machine using the following software...

Comments  (0)


Transcript: Patriot Hacker th3j35t3r Addresses USM Students

April 10, 2012 Added by:Anthony M. Freed

The hacktivist opened himself up to questions regarding his operations, methodologies and motivations - including his campaigns against radical militant websites, his take down of WikiLeaks, his tussles with Anonymous, his military service, and a variety of security issues...

Comments  (4)


Jihadi Sites Fall Down, Go Boom... Again

April 08, 2012 Added by:Infosec Island Admin

At first I thought that players in the patriot hacker movement may have been involved, but it seems more so now that all points to a concerted action by governments. The hacking of the sites likely was done via bad installs of PHP and SQL on the boxes that the databases resided on...

Comments  (0)


IP Address Leads Police to Shootout with French Terrorist

March 24, 2012 Added by:Dan Dieterle

Elite French special operation RAID Police took down the radical Muslim terrorist Mohamed Merah on Thursday. Merah had contacted one of his victims, a French soldier, on the pretext of buying his scooter. Investigators were able to match Merah to his IP address...

Comments  (0)


Th3J35t3r: Don’t Dox The Man, Dox The Actions

March 14, 2012 Added by:Infosec Island Admin

Jester may just be a person or a small group of people with an agenda that includes a media arm seeking attention from the populace, not motivated by altruism or patriotism. If indeed he/they think that they are doing something greater, then he/they are deluding themselves...

Comments  (9)


The Jester Posts PGP Data File from Webkit Exploit Op

March 12, 2012 Added by:Headlines

The Jester posted a link to data exfiltrated during last week's Webkit exploit aimed at mobile device users who scanned the QR-code posted as an avatar on his Twitter account and then were cross-referenced with a database of targeted jihadi and Anonymous operatives...

Comments  (2)


The Jester's QR-Code Pwns Targets with WebKit Exploit

March 09, 2012 Added by:Headlines

The operation was intended to snare unsuspecting targets previously aggregated in a database. Those who scanned the QR-Code were then cross-referenced with known targets, and those targets were subsequently pwned, having their address books, texts and emails exfiltrated...

Comments  (0)


The SANS Report: The Jester: A Lesson in Asymmetric Warfare

March 05, 2012 Added by:Infosec Island Admin

Asymmetric Warfare Or Annoyance? Perhaps Jester has done things in the background we do not know about and he has not reported to the media, perhaps not. Overall though, the most creative thing he has done is to poison the LOIC. THIS was a real coup and I do appreciate that one...

Comments  (4)


Why I Won’t Teach You To Track Terrorists Online

January 17, 2012 Added by:Infosec Island Admin

This is an organic process. I learned by just doing it and in the process of “doing it” I had to learn A LOT of other things apart from technology issues like hacking/security/coding etc. Remember you are dealing with PEOPLE and you have to be adept and reading them...

Comments  (1)


Is Al Qaeda’s Internet Strategy Working?

December 07, 2011 Added by:Stefano Mele

While almost all terrorist organizations have websites, al Qaeda is the first to fully exploit the Internet. This reflects al Qaeda’s unique characteristics. It regards itself as a global movement and therefore depends on a global communications network to reach its perceived constituents...

Comments  (0)

Page « < 1 - 2 > »