Pattern of Life and Temporal Signatures of Hacker Organizations
Observing an organization or person by their activities can provide interesting clues about who and where they actually are. These clues can include targets, methods, tools, language, etc. This is true...
View ArticleHow Inspire Magazine Uniquely Motivates Acts of Terrorism
Note: Massive thanks to Dr. Jarret Brachman for his guidance and support in putting together this post. He’s one of the best out there studying violent extremism, and we recommend that you check out...
View ArticleWhen Governments Throttle the Web: Timeline of Internet Blackouts
Cutting internet access has proven to be a favorite, if ineffective and costly, tactic for under fire dictators in recent years as social movements coalesce on the web. But the larger dominoes of the...
View ArticleIED Trends: Turning Tennis Balls Into Bombs
Terrorists are relentlessly evolving tactics and techniques for IEDs (Improvised Explosive Devices), and analyzing reporting on IEDs can provide insight complementary to HUMINT on emerging militant...
View ArticleOpGTMO Campaign Fuses Cyber and Kinetic Protests
We’ve talked previously about the linkages between cyber intelligence and physical warfare. But when we saw the recently executed Operation Guantanamo (#OpGTMO) campaign by Anonymous that culminated...
View ArticleIslamist Militants Making Southern Libya Home
Algerian terrorist Mokhtar Belmokhtar claims to have planned the two deadly suicide attacks last week in Niger. One of the recent targets was a uranium mine owned by the French company Areva, which...
View ArticleFinding Khamenei’s Favorite to Succeed Ahmadinejad
The election field for Iran’s next president initially stood 686 hopeful candidates wide. The country’s Guardian Council last week narrowed that field down to just 8 final candidates in preparation for...
View ArticleMapping Turkey’s Anti-Government Protests in Real-Time
Police attacks on environmental protesters in Istanbul last Friday sparked anti-government protests across Turkey over the weekend. The map below from Recorded Future shows spreading unrest during the...
View ArticleMust Read: Recorded Future’s Web Intelligence Interview Series
The blogging team here at Analysis Intelligence is inspired by the potential for open source information to reveal intelligence insights. This inspiration is born out of Recorded Future’s belief in Web...
View ArticleContrast in US, Iran Media Coverage of Iranian Presidential Candidates
Our previous post on the Iranian election sought to reveal clues about which Iranian presidential candidate should be considered Supreme Leader Ali Khamenei’s favorite to succeed Ahmadinejad. Another...
View ArticleSEA and Anonymous, Allies by Convenience in Attacks on Turkey
Click for interactive view War sometimes makes strange bedfellows, and the cyber battlefield is proving to be no different. Two prominent hacker collectives (or government organizations depending on...
View ArticleQassam Cyber Fighters DDoS Campaign Against U.S. Banks Slows
The excellent Krebs on Security blog, by former Washington Post writer Brian Krebs, reported last week that the long running campaign of cyber attacks against U.S. banks went quiet ahead of Iran’s...
View ArticleGolan Heights Peacekeeping Force in Flux
Click for interactive view Kidnappings and spillover violence from Syria in the Golan Heights have put the long running United Nations Disengagement Observer Force (UNDOF) in a precarious position...
View ArticleHezbollah in Kano, Evidence of West Africa Ambitions
We’ve previously discussed Hezbollah in Latin America and its global expansion of operations. But the recent capture of an arms cache in Kano, Nigeria and subsequent arrest of three Lebanese-Nigerians...
View ArticlePhilippines, Taiwan Conflict Results in Cyber Firefight
In a familiar looking cyber conflict over sovereignty claims in the South China Sea, hackers from Taiwan and the Philippines have been exchanging fire since the death of a Taiwanese fisherman in May in...
View ArticleDeveloper Portal Hack Highlights String of Attacks on Apple
This post was originally published on Social Media Threat. Recently, Apple made headlines when it announced it’s developer portal had been compromised by hackers, and now a researcher has claimed...
View ArticleThe Convenient Timing of Iran-Linked Hacker Operations
We enjoy revealing patterns in cyber activity on this blog, as you might recall from our hacker workday research. And whether or not you believe the al-Qassam Cyber Fighters (QCF) are tied to the...
View ArticleConflict Breeds Cyber Attacks
In a previous post describing the hacktivist component of a dispute between the governments of Taiwan and the Philippines, we mentioned the increasing conflation of physical and digital action in...
View ArticleSyrian Electronic Army inspired by previous Anonymous hack of Melbourne IT?
Reposted from Social Media Threat. Earlier this week, the New York Times, Twitter, and the Huffington Post UK experienced disruptions to their websites that included visitors being redirected to sites...
View ArticleDiplomatic Meetings as Targets for Syrian Cyber Attacks
The blog Dark Reading recently raised attention to possible retaliatory cyber attacks from Syria should there be military intervention in its civil war. We know that cyber attacks are common alongside...
View Article