Understanding Israel: Cyber Warfare

cyber crime and security

Presented by S.A. Ayesha Shadoon K. Kowsalya

Presentation Transcript

Slide 2:What is Cybercrime? Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs Cybercrime is nothing but where the computer used as an object or subject of crime Online activities are just as vulnerable to crime and can compromise personal safety just as effectively as common everyday crimes. Lawmakers, law enforcement, and individuals need to know how to protect themselves and the persons for which they are responsible. Continue reading

Al-Qaeda Communications Provide Insights Into What Terrorists Want

Tue Jan 25 08:09:56 2011 Pacific Time
DURHAM, N.C., Jan. 25 (AScribe Newswire) —
Without any formal direct contact with terrorist organizations, it is difficult for Western nations to answer two fundamental but important questions: What do terrorists want, and how do they plan to achieve it? New research examining communications among Al-Qaeda members provides some insights into the core values and beliefs of the world’s most dangerous terrorist organization, and could help in designing strategies and policies aimed at preventing future terror attacks.
Gregory Keeney, a student in the Master of Management Studies program at Duke University’s Fuqua School of Business, and Detlof von Winterfeldt, former director of the International Institute for Applied Systems Analysis, analyzed the writings and verbal statements of Al-Qaeda’s members and spiritual leaders, primarily from 1998 to 2008. Their findings are included in “Identifying and Structuring the Objectives of Terrorists,” published in the December 2010 issue of Risk Analysis, a journal from the Society for Risk Analysis. Their research was supported by a grant from the U.S. Department of Homeland Security through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE).
Keeney and von Winterfeldt distinguish between several different types of objectives: means objectives (guiding short-term, day-to-day actions); fundamental objectives (guiding medium- to long-term actions); and strategic objectives (guiding all decisions leading to end goals). “We found only a few strategic objectives, several fundamental objectives and a large number of means objectives,” Keeney said. “For example, one of Al-Qaeda’s strategic objectives is to inspire and incite Muslims to attack the enemies of Islam. But this likely won’t be achieved without first maintaining support from the Muslim masses. Therefore, maintaining the support of Muslims is a fundamental objective because it contributes to the strategic objective of attacking Islam’s enemies.” Analysis of Al-Qaeda verbal statements and writings — including speeches and audio transcripts of Osama Bin Laden and Ayman al-Zawahiri — reveals five major strategic objectives:
1) Inspire and incite Islamic movements and the Muslim masses of the world to attack the enemies of Islam;
2) Expel Western powers from the Middle East;
3) Destroy Israel;
4) Establish Islamic religious authority in the Middle East; and
5) Extend Islamic authority and religion into new areas of the world.
Among the fundamental objectives identified by Keeney and von Winterfeldt are Al-Qaeda’s desire to maintain its status as Continue reading

WikiLeaks? A Whole Lot of Nothing Going On

The news-free content of the leaked documents points to this being more about

Julian Assange‘s vanity and finances than his politics.

Worse, the video was released to coincide with a fundraising appeal (the organization had only collected $370,000 of their estimated $600,000 operating budget), strongly suggesting the group was creating controversy merely to profit from it.

The newest release, the so-called “Afghan War Diary, 2004-2010,” is a document dump of over 91,000 classified military documents from our war in Afghanistan against the Taliban and al-Qaeda. The UK’s Guardian, Germany’s Der Spiegel, and the New York Times have had teams of reporters pouring over embargoed copies of the files for weeks. Sadly, what they found offers very little in the way of news, revelations, or even entertainment. Continue reading

Why Wasn’t American Al-Qaeda Ghostwriter on No-Fly List?

U.S. citizen Samir Khan, believed to have written al-Qaeda‘s online recruiting magazine, managed to flee the country on a plane last year. We’ve known of him since 2007.

via Pajamas Media » Why Wasn’t American Al-Qaeda Ghostwriter on No-Fly List?.

Soldiers ‘could fight terrorism on Britain's streets’

London Terror
Image by Xochistlahuaca via Flickr

The UK‘s armed forces could be used on the streets of the Britain to confront the threat of terrorism, under the terms of a strategic defence review (SDR) announced yesterday.

Two of the six “key questions” to be considered by the SDR will focus on domestic threats which “cannot be separated from international security”, according to a Green Paper setting out the grounds for a full scale review to start after the General Election.

Decisions need to be made on the “balance between focusing on our territory and region and engaging threats at a distance” and “what contribution the armed forces should make in ensuring security and contributing to resilience within the UK”. Continue reading

Jemaah Islamiyah: A renewed struggle?

by Noor Huda Ismail and Carl Ungerer

Thursday, 16 July 2009

This Policy Analysis examines the shifting patterns of leadership and patronage in Jemaah Islamiyah. It argues that leadership tensions and recent prison releases raise the possibility that splinter groups might now seek to re-energise the movement through violent attacks.

Download PDF

http://www.aspi.org.au/publications/publication_details.aspx?ContentID=219&pubtype=9


Reblog this post [with Zemanta]