Overview
Explore the evolution of cyber terrorism in the digital age through this Derbycon 7 conference talk. Delve into the distinctions between cyber terrorism and hacktivism, examining various hacker groups such as Gaza Hackers, Muslim Hack, and Anonymous. Investigate ISIS's technological strategies, including their use of underground forums, social media platforms, and encryption methods for recruitment and communication. Learn about homemade DDoS tools, file sharing techniques, and malware employed by cyber terrorists. Analyze attacks on US government personnel and the creation of kill lists. Gain insights into the operations of cyber terrorist groups and evaluate the level of concern these activities should generate. Understand the impact of kinetic terrorism transitioning to the digital realm and its implications for global security.
Syllabus
Intro
CNN
Cyber Terrorism vs Hacktivism
Gaza Hackers
Muslim Hacker
Anonymous Goes Gaza
Facebook Consistently
Caliphate
Islamic Cyber Army
Sun Caliphate Army
ISIS Sub Groups
ISIS Technology
Underground Forums
Underground Videos
Facebook
Twitter
Encryption
Recruitment
Facebook Pages
JustPasteit
Al Valley on Radio
Contact Info
Communications Messaging
Homemade DDoS Tools
File Sharing
Malware
Domain Tools
Metadata
Attacks
Attack Overview
US Government Personnel
Multiple Kill Lists
The Bark
Cyber Terrorists
Should We Be Concerned