Our team weighs in on the tactics and motivations behind jihadist groups and terror attacks.

Blog > Terrorism

Pro-ISIS Jihadists Dabble in Encryption, Prove Under-Sophisticated

Jihadi actors have been experimenting with encrypted communication technologies since as early as 2008. Through the development of proprietary encrypted communication tools and the growing adoption of various cyber technologies, these actors have demonstrated an increased interest in obfuscating their digital fingerprints. This interest is underscored through discussions on top jihadi web forums, where members […]

Read more

Turkish Organizations Exploited in Terror Finance Scheme

September 20, 2016

New evidence supports allegations that jihadists are exploiting Turkish organizations to launder donations to armed groups involved in the Syrian civil war. While closely studying a network of websites that operate as an online portal for Turkic Islamist rebel groups, Flashpoint analysts noted a recent article from a Turkic jihadist publication about a first-hand visit […]

Read more

American Woman Purportedly Living in ISIS Territory Posts a “Message to America” on Telegram

April 22, 2016

On April 14, a purported American woman living in Islamic State (ISIS) territory, released a “Message to America” via a channel on the encrypted messaging app Telegram, threatening, “We will continue to stomp you, as you come nearer and nearer. And we can’t wait to have you in our hands, as we behead you and give you a taste of the punishment that is awaiting for you after your death.”

Read more

Islamic State-Linked Hacker and Abu Hussain Al Britani Associate Arrested for Leak of U.S. Military and Government Personnel Information

By FP_Analyst
October 15, 2015

On October 15, federal prosecutors in the U.S. unsealed a criminal complaint charging Kosovo citizen Ardit Ferizi, aka “Th3Dir3ctorY,” with providing material support to The Islamic State and committing “computer hacking and identity theft violations in conjunction with the theft and release of personally identifiable information (PII) of U.S. service members and federal employees”.

Read more