Главная
Study mode:
on
1
Intro
2
CNN
3
Cyber Terrorism vs Hacktivism
4
Gaza Hackers
5
Muslim Hacker
6
Anonymous Goes Gaza
7
Facebook Consistently
8
Caliphate
9
Islamic Cyber Army
10
Sun Caliphate Army
11
ISIS Sub Groups
12
ISIS Technology
13
Underground Forums
14
Underground Videos
15
Facebook
16
Twitter
17
Encryption
18
Recruitment
19
Facebook Pages
20
JustPasteit
21
Al Valley on Radio
22
Contact Info
23
Communications Messaging
24
Homemade DDoS Tools
25
File Sharing
26
Malware
27
Domain Tools
28
Metadata
29
Attacks
30
Attack Overview
31
US Government Personnel
32
Multiple Kill Lists
33
The Bark
34
Cyber Terrorists
35
Should We Be Concerned
Description:
Explore the evolution of cyber terrorism in the digital age through this Derbycon 7 conference talk. Delve into the distinctions between cyber terrorism and hacktivism, examining various hacker groups such as Gaza Hackers, Muslim Hack, and Anonymous. Investigate ISIS's technological strategies, including their use of underground forums, social media platforms, and encryption methods for recruitment and communication. Learn about homemade DDoS tools, file sharing techniques, and malware employed by cyber terrorists. Analyze attacks on US government personnel and the creation of kill lists. Gain insights into the operations of cyber terrorist groups and evaluate the level of concern these activities should generate. Understand the impact of kinetic terrorism transitioning to the digital realm and its implications for global security.

Kinetic to Digital - Terrorism in the Digital Age

Add to list
0:00 / 0:00