Find us on
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Jeanne Shaheen |
![]() |
Lisa Monaco |
![]() |
John Stewart |
![]() |
M. Todd Henderson |
![]() |
Dr. Elizabeth Bowman |
![]() |
Dr. Fabio Pierazzi |
![]() |
V.S. Subrahmanian |
![]() |
Rand Beers ('64) |
![]() |
Wanna See Something REALLY Scary? |
![]() |
Salvatore J. Stolfo |
![]() |
STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System Professor Dan Wallach |
![]() |
Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact? Ben MillerChief Threat Officer, Dragos, Inc. Tuesday May 2, 2017 Kemeny 007, 4:30 PM |
![]() |
Factual Echo Chambers? Fact-checking and Fake News in Election 2016. Professor Brendan Nyhan |
![]() |
Professor Dickie George |
![]() |
A Nation Under Attack: Advanced Cyber-Attacks in Ukraine Ukrainian Cybersecurity Researchers |
ISTS Information Pamphlet
Discussions between law enforcement, the private sector, and academia revealed that there is a lack of authoritative unclassified materials concerning the use of cyber technology by Islamic terrorist groups. To meet this need, the Technical Analysis Group prepared a report detailing how cyber technologies are exploited by these hostile groups. Our research presents clear, factual evidence that Islamic terrorist groups are using information technologies to facilitate propaganda, recruitment and training, fundraising, communications, and targeting operations.
The open source materials used in the report include court testimony, indictments, government reports, academic reports, actual information from websites associated with terrorist groups (both from the organization itself and from sympathizer and affiliated groups), Congressional testimony, and the open media. This document uses these materials to present a clear picture for those who require awareness- level training in this domain, and provides a starting point for further research and analysis.
The report has made a significant impact for American law enforcement. As of June 2004 over 2500 copies of the report have been downloaded from the ISTS web site, and over 1700 law enforcement and cyber security professionals have been briefed on the findings. Further, the report has been as a foundation for Federal Law Enforcement Training Center course on investigating terrorism fundraising.