Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Getting Tech in the Fight

Since before 9/11, Al-Qaeda and other jihadi groups have been quietly investing in cyber jihad, which is now disseminated and promoted by a new, Internet-savvy generation. Jihadis have advanced from primitive password-protected websites to freely available social media platforms. Al-Qaeda, and now the Islamic State (ISIS), have infested YouTube, Twitter, Instagram, Tumblr, Yahoo's Flickr, and the Internet Archive, and adopt new social media – Ask.fm, Vimeo, Vidme, VK.com, and SoundCloud, to name a few – almost as quickly as they emerge. They also depend on apps available on Google Play and iTunes for Apple. Jihadis’ online presence now consumes U.S. and other Western governments' counterterrorism efforts, and it should be of concern to the business community, which has remained largely silent on this issue.

American tech companies have been instrumental in helping to spread jihadi ideology. Anyone can follow, "like," "friend," tweet, and re-tweet content by ISIS as well as submit questions to it, view photos posted by it, and conduct dialogue with it. There is also an effort to recruit activists with computer and Internet skills to help hack government and bank websites, hijack drones and other aircraft, and carry out various cyber crimes, such as leaking personal details of military, government, and business leaders or stealing customer data.  Just recently, it was announced that a Kosovoan hacker was arrested in Malaysia on a U.S. warrant alleging he hacked into the computer system of a U.S. company, stole personal information of 1,351 service members, and passed it on to several ISIS figures.

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Related Articles

The Downward Spiral of Western Counterintelligence

OPINION — Counterintelligence is one of the most vital functions of the intelligence community, helping protect against foreign threats. [...] More

An Urgent Call to Close the Loopholes on Chips and China

EXPERT PERSPECTIVE / OPINION -- The core lessons from the Cold War should guide us as we face the new “Axis of Aggressors” today. First among these, [...] More

Report for Monday, June 30, 2025

8:29 America/Chicago Monday, June 30 [...] More

A Good NATO Summit, Though Russia Won a Round

EXPERT Q&A — NATO leaders convened in The Hague this week for a summit aiming to strengthen the alliance's defenses, with the ever encroaching threat [...] More

NATO Wins Will Have an Impact

CIPHER BRIEF EXPERT Q&A — NATO leaders convened at The Hague this week and agreed to raise the alliance’s defense spending target to 5% GDP, marking [...] More

Dead Drop: June 27

THIS WEEK: SURPRISES, SECRETS AND SPY COCKTAILS: This week’s best collection of national security gossip is filled with surprises, secrets and a [...] More

NATO Lures Trump Back - at a Cost

NATO Lures Trump Back - at a Cost

CIPHER BRIEF REPORTING – The stakes at this week’s NATO summit were sky-high – support for Ukraine, a shoring up of Europe’s defenses, and the [...] More

Report for Friday, June 27, 2025

8:11 America/Chicago Friday, June 27 [...] More

The Zbig Biography: No Small Feat!

BOOK REVIEW: Zbig: The Life of Zbigniew Brzezinski, America's Great Power Prophet by Edward LuceAvid Reader Press / Simon & SchusterReviewed by: [...] More