Explore the evolution of cyber terrorism in the digital age through this Derbycon 7 conference talk. Delve into the distinctions between cyber terrorism and hacktivism, examining various hacker groups such as Gaza Hackers, Muslim Hack, and Anonymous. Investigate ISIS's technological strategies, including their use of underground forums, social media platforms, and encryption methods for recruitment and communication. Learn about homemade DDoS tools, file sharing techniques, and malware employed by cyber terrorists. Analyze attacks on US government personnel and the creation of kill lists. Gain insights into the operations of cyber terrorist groups and evaluate the level of concern these activities should generate. Understand the impact of kinetic terrorism transitioning to the digital realm and its implications for global security.