Tag Archives: Cyberthreats

09Nov/22

TERRORGRAM: Status dashboard after HARD-RESET

  1. Terrorgram status dashboard after the countermeasures implemented by Telegram, in response to the HARD-RESET publication. The dashboard is composed of 5 sections: 
  • Definition of Terrorgram and a visual insight of its main propaganda production
  • Social network analysis of the Terrorgram’s channels core (every channel is identified with a code)
  • Top domain shared inside the Terrogram 
  • Top domain shared inside the Terrogram with the timeline
  • Languages detection
02Nov/22

TERRORGRAM: the impact on Italian far-right digital ecosystem – by Federico Borgonovo & ITSTIME (It. & Eng. Version)

Versione italiana – Tra il 26 e il 27 ottobre il ventitreenne Luigi Antonio Pennelli è stato arrestato in provincia di Bari per arruolamento con finalità di terrorismo internazionale e di propaganda ed istigazione a delinquere per motivi di discriminazione razziale etnica e religiosa. Continue reading

24Ott/22

TERRORGRAM: from Buffalo to Bratislava – by Federico Borgonovo & Ali Fisher

Between May and October 2022, five supremacist or accelerationist attacks took place: On 14 May Payton Gendron in Buffalo (USA), on 4 July Robert E. Crimo III in Highland Park (USA), on 11 August Ricky Walter Shiffer in Cincinnati (USA), on 26 September Artyom Kazantsev in Izhevsk (Russia), on 12 October Juraj Krajčík in Bratislava (SK) and finally on 13 October Austin Thompson in Raleigh (USA). Continue reading

06Feb/19

Hamas crowdfunding bitcoin: legitimizing cryptocurrencies from a jihadist perspective – by Daniele Maria Barone

On January 29, 2019, Abu Obeida, the spokesman for Izz ad-Din al-Qassam, the armed wing of the Hamas, announced that the group is now accepting donations in bitcoin[i]. An attempt to get around international restrictions on funding the organization, by circumventing the banking system and international anti-money laundering (AML) measures. Continue reading

22Ott/18

Europol – Internet Organized Cyber Crime Threat Assessment 2018: new trends in the obscure sides of FinTech – by Daniele Maria Barone

The latest report of Europol on Internet Organized Cyber Crime (IOCTA 2018)[i] stresses, among other issues, the weak points that modern financial tools and a lack of either an up-to-date legal framework or cooperation among institutions and the private sector, brings to the cybercrime field. Continue reading

16Ago/18

Cyber Jihad and Terrorism Financing: New Methods – Old Rules – by Daniele Maria Barone

On July this year, the Financial Action Task Force (FATF) published a report addressed to the G20 Finance Ministers and Central Banks Governors, summarizing the latest development in anti-money laundering (AML) and terrorism financing (TF) and drawing a short term work program in these fields[i]. Continue reading

02Lug/18

Crime-Terror nexus and Potential Jihadist’s Uses of Cryptocurrencies – by Daniele Maria Barone

This May, the analysis commissioned by the European Parliament TERR Committee[i] about terrorism financing by virtual currencies, “Virtual currencies and terrorist financing: assessing the risks and evaluating responses[ii]”, has depicted the complex nature of the actors generally involved in extremist groups’ online financing. Continue reading

19Giu/18

Contemporary Measures to Counter the Misuse of Cryptocurrencies – by Daniele Maria Barone

As pointed out during the International Conference on terrorism financing “No Money for Terror” held in Paris the 25-26th of April 2018, which has gathered Ministers from 80 countries and nearly 500 experts, a growing number of States is criminalizing terrorism financing as a standalone offense but the number of terrorism-financing cases being successfully prosecuted by UN Member States’ judicial systems is still limited, due to the difficulty of proving the intent that the funds would be used for terrorism purposes[i]. Continue reading

02Dic/15

IS e la guerra ibrida: “Indeed the Polytheists are Filth” – by Marco Maiolino

L’importanza dello strumento comunicativo all’interno della strategia utilizzata dallo Stato Islamico è sottolineata nell’analisi fornita da ITSTIME, ciò che invece è necessario evidenziare nuovamente, è la funzione strategica di tale strumento che, pur essendo estremamente flessibile e utilizzato con versatilità, mantiene alcune traiettorie fondamentali. Continue reading