The Intelligence Corner

Our experts’ unique discoveries, observations, and opinions on what’s trending today in Business Risk Intelligence and the Deep & Dark Web.

Search results
Posts of Ken Wolf

An Analysis of Islamic State Propaganda Distribution

May 15, 2018

The success of the Islamic State’s (ISIS) information-warfare strategy relies on the group’s ability to distribute propaganda to targeted audiences online. Moreover, to ensure the longevity of its material, ISIS has taken considerable measures to prevent its content from being removed from the internet. Jihadist groups have a long history of leveraging the internet to […]

Read more

Cyber Jihadists Dabble in DDoS: Assessing the Threat

July 13, 2017

Recent events suggest that while cyber jihadists appear to remain of low skill and under-sophisticated, their toolset is expanding. Between December 2016 and January 2017, two distinct pro-ISIS cyber threat groups experimented with distributed denial of service (DDoS) attacks and achieved limited apparent successes. Although the attacks have since ceased, these actors have expressed interest […]

Read more

Jihadists and Vault 7: What it Means for the Rest of Us

April 17, 2017

The so-called Vault 7 files released by Wikileaks that describe the Central Intelligence Agency’s electronic surveillance and cyber warfare capabilities continue to attract a significant amount of attention. In addition to the numerous reports and news stories about the leaks and associated consequences, some researchers have even gone so far as to draw connections between […]

Read more

Evaluating the Physical Threat from UCC “Kill Lists”

October 28, 2016

In late September 2016, a Maryland man named Nelash Mohamed Das was indicted for attempting to provide material support to ISIS. This indictment was in connection with Das’s plans to attack U.S. military members, one of whom had appeared on a kill list published by pro-ISIS hackers in 2015. On October 9, the United Cyber […]

Read more