• Global counter-terrorism database World-Check leaks online

    Global counter-terrorism database World-Check leaks online

    At least one non-authorized person obtained sensitive information following the leak of global counter-terrorism database World-Check, owned by Thomson Reuters. Chris Vickery, a security researcher at the software company MacKeeper, posted on Reddit that a copy of the World-Check database from mid-2014 had come into his possession. “No hacking was involved in my acquisition of this… Read More

  • Cyberterrorism and the role of Silicon Valley Crunch Network

    Cyberterrorism and the role of Silicon Valley

    For the moment, at least, cyberterrorists have not harnessed the technology needed to destroy Western civilization from a basement lab in some remote corner of the world. Although a “cyber-Armageddon” scenario is unlikely any time soon, new technological developments have the potential to allow terrorists to move from low-tech killings aimed at gaining attention and creating fear… Read More

  • From the streets to The Street Crunch Network

    From the streets to The Street

    The past several months have brought a string of terror attacks and violent incidents, which not only claim lives but cause worldwide feelings of fear and vulnerability. It seems that groups of terrorists like ISIS can strike when and where they want. As the authorities ramp up surveillance, such attackers simply adapt and change their tactics. They have learned to be patient and to leave… Read More

  • Education As A Tool For Disrupting Terrorism Crunch Network

    Education As A Tool For Disrupting Terrorism

    Last year will be remembered as one of the biggest years of extremist violence around the world. The west has experienced several brutal tragedies, while those in the Middle East and central Africa have survived unimaginable suffering at the hands of such terrorist groups as Boko Haram and ISIS. Still, education is the enemy of radicalism. Read More

  • Researchers From Arizona State University Take The War Online Back To ISIS Crunch Network

    Researchers From Arizona State University Take The War Online Back To ISIS

    Data analysts and “information cascade” experts are using their skills to frustrate the spread of terrorist ideology from groups like ISIS, who grow increasingly adept at online recruitment. Read More

  • Drones + X

    Drones + X

    Small drones are advancing quickly. They used to be little else but sophisticated remote-controlled toys and people love to complain when we call them ‘drones’ because that implies that they are at least semi-autonomous (and maybe able to bomb a terrorist (and a few innocent bystanders)). But what’s happening now is that the technology is catching up with the term. Drones… Read More

  • Crowdsourcing Dystopia Crunch Network

    Crowdsourcing Dystopia

    Violent extremism starts with an idea and an entrepreneur. On offer is a belief system that promises to upend the status quo, to change the world and take you with it. Investors commit at different levels from different places, but everyone involved belongs to a unified cause. Once in, you’re a team of heroic proportions, larger than life. Read More

  • European Ministers Call For Increased Digital Surveillance After Paris Terror Attacks

    European Ministers Call For Increased Digital Surveillance After Paris Terror Attacks

    And so it begins again; the customary fingerpointing at the Internet as a platform for fueling extremist hatred in the wake of the latest terrorist outrages in Europe — accompanied, in certain corners of the political arena, by calls for greater powers of digital surveillance to preemptively thwart acts of terror. Read More

  • U.K. ISPs Agree To Do More To Filter Extremist Content Online

    U.K. ISPs Agree To Do More To Filter Extremist Content Online

    The U.K. government’s latest crack down on terrorism is once again focusing on the digital sphere, with Prime Minister David Cameron announcing that major Internet companies have agreed to do more to tackle terrorist and extremist material online — by “introducing stricter filters, increased industry standards and better reporting mechanisms”. Read More

  • UK Widens Ban On Dead Mobile Devices On Flights

    UK Widens Ban On Dead Mobile Devices On Flights

    The UK government has issued new aviation security guidelines warning that passengers traveling by plane to or from the UK might now face checks on any electronic devices they are carrying with them to prove their devices can be powered on. Read More

  • Is Our Addiction To Tragedy On Social Media Inspiring Violence?

    Is Our Addiction To Tragedy On Social Media Inspiring Violence?

    If terrorism requires an audience, than the recent mainstream adoption of social media has given violent actors a bigger stage than ever before. There are many reasons people lash out at the world, but I don’t think it’s unreasonable to suggest that becoming the center of the attention could be a factor pushing some to commit atrocities. Our retweets could be delivering their… Read More

  • India’s SMS Hoax Panic: Could It Happen In The U.S.?

    India’s SMS Hoax Panic: Could It Happen In The U.S.?

    Last week tens of thousands of migrants from India’s northeast region fled urban areas as rumor ricocheted through text messages and social media that Muslims would attack them after Ramadan. Fake photos added to the rumors’ credibility. Given how forward button happy we can be in the U.S., I can’t help but wonder if a similar panic could happen here. I spoke with Shlok Vaidya… Read More

  • Airplane Terror Plot Raises Questions Over In-Flight Wi-Fi, Mobile Phone Access

    Last week’s airplane terror incident has raised new concerns over how much sense it makes to have Wi-Fi and the ability to use mobile phones on aircraft. While the companies that provides these entertainment options have said there’s nothing to worry about (well, besides them worrying about losing money), other security experts argue otherwise. Read More

  • Which Cellphone Did The Yemeni Terrorists Use?

    If you look closely at this shot of the bombs allegedly sent from Yemen to Chicago you’ll notice what looks like a small camera up in the corner. Slide down the side and you see the volume buttons and I suspect the silver area is where the battery holder once stuck to the circuit board. It’s clear that this was a phone – probably of modern vintage – so which phone is it? Read More

  • Pentagon partially blames the Internet for that Christmas underpants bomber

    This is the lede, verbatim, from a story that appeared in The Hill yesterday: “The Internet allowed extremists to contact, recruit, train and equip the suspect responsible for the attempted Flight 253 bombing on Christmas Day ‘within weeks,’ a top Pentagon official told lawmakers Wednesday.” What’s the implication, that because someone used the Internet to… Read More

  • On Mr. Sizzly Pants, terrorism, and airline safety

    I’m safely ensconced in a ski hut in Austria but I’ll be traveling back to the US of A shortly and I look forward to not being able to use electronic items in the last hour of my nine hour flight. After all, that is the magic hour, the hour during which most intercontinental planes are circling over US soil and would, therefore, apparently make the biggest impression on a scared… Read More

  • At what point do you start worrying about the RFID tag in your passport?

    Does your passport look like this, with a strange-looking symbol on the bottom? Then you’re in luck, for your passport contains an RFID tag! Now, we’re not exactly the tin foil hat types, but news that one of those security researcher types has managed to copy sensitive data off various passports in San Francisco without the owners’ knowledge does annoy us. What’s worse… Read More

  • Don't tell Google that Google Earth can be used to help terrorists

    The terrorist attacks in Mumbai last year brought any number of technologies “under the microscope”: Twitter can be used by terrorists to coordinate attacks; Google Earth can be used to map out possible attack routes, etc. Too bad Google completely disagrees with this slipshod logic. Read More

  • Google Earth partially blamed for Mumbai terrorist attacks

    The terrorist attacks in Mumbai have once again put Google Earth in an unfavorable light. The one (“baby-faced”) terrorist that police caught has said that the terrorists used Google Earth the help plan the attacks. (That they also used everyday cellphones, GPS and other technologies appears to be lost on the ban happy Indian officials.) In order to prevent future attacks, so the… Read More

  • Lego Terrorist will slay the man-child in you

    Just in time to be horribly inappropriate, some folks have discovered BrickArms, a company that makes cute little Lego men with realistic weapons. Here we have the White Bandit (not, not a terrorist) who is very angry and carries a rifle, what looks like a Luger, and some grenades. Not offensive enough for you? Try the SS man. Read More