Client Briefing: The Terrorist Attacks in Brussels. April 1, 2016

Size: px
Start display at page:

Download "Client Briefing: The Terrorist Attacks in Brussels. April 1, 2016"

Transcription

1 ! Client Briefing: The Terrorist Attacks in Brussels April 1, 2016

2 Introduction In the wake of the March 22 ISIS terrorist attacks in Brussels, Belgium, the specter of further episodes of violence aimed at so-called soft targets and the rise of jihadi recruitment in Europe and the West looms greater than ever. The latest attacks in Brussels appear increasingly connected to the November 13, 2015, attacks in Paris which means that the ISIS operatives behind them formed a transnational active network, not merely a sleeper cell. The steady flow of online propaganda produced by ISIS has given the group unprecedented reach into Western communities, allowing the recruitment of thousands of European and North American citizens to its ranks, and the rapid adoption of new technology to further its goals. Of specific concern is what this escalation means for the security and stability of Western Europe and the U.S. To understand the comparative urgency of threat particularly faced by various countries in Europe, one need only look to the relative numbers of how many nationals from each of those countries are estimated to have traveled abroad to Syria and Iraq with the intention of joining armed militant groups. While ISIS has certainly succeeded in winning the sympathies of small networks of homegrown extremists in the United States with its viral online propaganda, only a tiny fraction of such American recruits have ever actually made it to the frontlines in the Levant never mind the significant added step of then returning home with the advanced training and expertise necessary to carry out attacks on the scale of Paris or Brussels. Thus, the primary threat to the U.S. homeland from ISIS remains homegrown violent extremists, as evidenced by shootings in Garland, Texas and San Bernardino, California. While these extremists have been heavily influenced and in some cases explicitly directed to take action by ISIS representatives in the Middle East, they are far more dispersed, less organized, and less sophisticated than the broad and complex network responsible for recent events in France and Belgium. Regardless of whether we speak of those recruited directly or indirectly by ISIS, critical communications are now taking place almost exclusively in an online medium whether through commercial social media platforms like Twitter, proprietary password-protected ISIS chat forums, or even more secretive methods like exchanging encrypted messages on Telegram or further, via private server hosting space leased from tech companies in Turkey. Flashpoint s subject matter experts have assessed these concerns in light of the unfolding story, compartmentalizing the discussion based on areas of concern, as follows: " 2 of 7"

3 Chatter and Threats in the Jihadi Deep & Dark Web Flashpoint analysts have noticed an uptick in chatter mentioning Western Europe, including France and Belgium, in jihadi Deep Web forums. Since the November 13, 2015 ISIS attacks in Paris, Belgium was mentioned 400 times in messages on Arabic language jihadi web forums, compared to 220 times in the entire year preceding the day of the attacks. Pro-ISIS jihadists have issued multiple messages throughout the past year, inciting attacks in France and recently in Belgium. Shortly after the attacks in Brussels, users on the top ISIS Deep Web forums posted a range of messages, many reporting the attacks minute by minute from media sources, others praising them and even provoking further attacks on soft targets. One user discussion suggested launching attacks at European hospitals and universities, indicating that they are easier, less scrutinized, and would cause the maximum impact as compared to targeting airports. Thus, the likelihood of these attacks recurring is high. Repercussions and Expectations With three terrorist attacks in Paris and one in Brussels, and a number of foiled plots and counter terrorism raids since last year, jihadi terrorists continue to focus on striking Western Europe. This is especially alarming in European countries that have become a source of ISIS fighters. Belgium reportedly has the highest ratio per capita of fighters who joined ISIS from Western Europe, making it an especially attractive country to strike. The Brussels attacks were followed by counterterrorism raids believed to be linked to the same terror network, leading to further evidence that more plots were in the pipeline. As Belgium continues to deal with the tragedy and sits on high alert, other European countries will implement intensified measures against possible terror plots. Other countries at risk include France (again), Germany, Norway, Holland, and the UK, all of which are sources of thousands of ISIS fighters. Italy and Spain are also at risk. ISIS s faction in Libya would likely focus on attacking in Italy due to the colonial historical links. Spain would likely face jihadist issues from radicalized North Africans. The Element of Foreign Fighters ISIS has attracted thousands of fighters from Europe to its ranks in Iraq and Syria, a number of them committed suicide bombing attacks and others were featured in flashy " 3 of 7"

4 video releases aimed at recruitment. In the wake of the Paris attacks, ISIS released over a dozen videos featuring French militants praising the attacks and vowing to launch more. Similarly, post Brussels, ISIS has followed the same trend launching a coordinated video campaign, in which Belgian fighters were featured praising the attacks and promising more in the future. As of March 28, ISIS has released five videos featuring Belgian fighters in the latest campaign; one of them featured a wanted Belgian known as Abu Hunaifah Al-Beljiki, a co-founder of the radical Islamist group Shariah4Belgium, which has rallied for the implementation of radical Sharia law in the country. This is one piece of evidence linking radical jihadi activists in Belgium to ISIS ranks. Most concerning, there appears to have been a massive intelligence failure in France and Belgium and across other countries which might have helped the Paris-Brussels network operate more freely. In the case of Paris, the ring leader Abdulhamid Abaaoud traveled between Syria and Western Europe twice without the intelligence going through the cables to the right channels. In the case of Brussels, Salah Abdesalam, the last surviving operative from the Paris attacks, drove through the border into Belgium hours after the attacks in Paris unfolded, and hid in that country for over four months. The links between the Belgian and French cells became clearer when authorities indicated that there is evidence linking Abdesalam to the Belgian attacks, and the Belgian alleged bomb-maker to explosives used in Paris. The possibility of further ISIS attacks in Western Europe would likely be facilitated, directed, financed, or linked to ISIS fighters from those countries. They know the language, the sites, the travel routes, and, many times, ways to avoid detection by law enforcement. They are a perfect leader or guide for the Western operatives. New and Encryption Technology and Hacktivism Most of ISIS s Deep Web forums have implemented additional cyber security measures within the past year, such as Cloudflare s services to protect against malicious cyber attacks. To ensure that its message has reached the wider masses more securely versus using Twitter, which amplified suspending jihadi accounts ISIS s media units have resorted to using the encrypted messaging platform Telegram. The end-to-end encrypted software allows users to join channels that distribute propaganda and other material more securely and while on the go. Furthermore, to ensure a higher level of security, the ISIS distribution channels have turned their channels into private mode. In this mode, channels can only be joined via temporary private invitation links. " 4 of 7"

5 Telegram has also become a beacon for private jihadi militant channels, where manuals on bomb-making and weapon training are frequently distributed. Other relevant channels put out guidelines on implementing best OpSec and InfoSec. New-age pro-isis online jihadists are tapping into all the freely available secure online communication tools, from VPNs and proxies, to secure messaging platforms, to encrypted services. On Telegram, in addition to the channel functionality, the platform offers group chat and peer-to-peer conversation functions. Flashpoint analysts have seen firsthand individuals exploiting this option to recruit fighters and facilitate travel to ISIS s main operational territories. In addition to the platform s role in media and online coordination, its lesser advertised functions allow physical coordination, something that could even be used to help coordinate future attacks. We are also seeing how the attacks are shaping the Telegram landscape, with ISIS supportive and official channels starting to cater more heavily to a Belgian/French audience. To this end, ISIS s official Telegram channel just launched its Dutch language version and various other channels are now releasing links to ISIS material that has been translated in to Dutch and French. Other channels are trying to expand upon the battle waged on the ground in Brussels by coordinating an online battle, offering guidance on attacks targeting anti-isis social media accounts (primarily on Facebook and Twitter). In addition to providing specific targets, these channels are posting content for attacks, consisting of lengthy messages to be posted by the group s supporters on anti-isis targeted social media accounts. The majority of these messages express the coordinated ISIS narrative that showcases Belgium as the aggressor, focusing heavily on its role in the U.S.-led coalition. Part of this online battle includes the hijacking of mainstream hashtags associated with the Brussels event, including #Brussels, #BrusselsAttack, and #Bruxelles. ISIS and its supporters have employed a similar strategy in the past, hijacking trending hashtags from the Olympics and World Cup. Directed by the aforementioned Telegram channels, ISIS supporters are encouraged to flood the trending hashtags with ISIS supportive content, namely official propaganda. By doing so, these actors hope to control the narrative and overshadow unflattering reports. Also, on a basic level, utilizing these trending hashtags affords ISIS increased visibility to a wider audience. Expanding upon its existing strategy to evade the platform s scrutiny of its accounts, ISIS official and supportive channels are also changing their names to seemingly mundane titles, in an attempt to bypass those monitoring its activity and avoid suspension. For example, a channel dedicated to coordinating the aforementioned online battle just changed its name to FOOTBALL GAME TIMES. " 5 of 7"

6 Furthermore, pro-isis hacking groups appear to be on the rise, expanding from one group at the end of 2014 to six groups today, including Sons Caliphate Army (SCA), Rabitat Al Ansar, Islamic State Hacking Division (ISHD), and Islamic Cyber Army (ICA). They have set their sights on targeting governmental, financial, and media websites. While the level of sophistication of these groups is not high, they are expressing huge interest in developing their cyber skills. The specter of recruiting external talent overseas is also very plausible. Summary and Conclusion The greatest physical threat of organized ISIS terrorist attacks is centered in countries with comparatively large numbers of nationals per capita who have traveled to Syria and Iraq including Belgium, France, Holland, Austria, Sweden, Denmark, the United Kingdom, and Germany. The primary physical threat in North America posed by ISIS originates from homegrown violent extremists recruited through online social media and propaganda who largely focus on carrying out mass shooting sprees. Both homegrown ISIS supporters as well as trained operatives directly dispatched by the group are primarily focused on carrying out attacks on soft targets, including prominent media personalities and executives, Western companies, transportation, tourist sites, concerts and sports events, and other gatherings of large crowds. Homegrown ISIS activists often focus on specific targets and methods that are highly familiar to them, both in the physical as well as the virtual medium in the form of cyber attacks. Such cyber attacks focus on any available weak targets most often private companies with compromised access credentials that can be tangentially associated with Russia, Europe, or the United States. Pro-ISIS hackers typically deface websites to post messages in support of the group to gain notoriety and spread their propaganda. Small or medium-sized companies should monitor each page to ensure a subsection of the website has not been defaced with pro-isis messages. ISIS supporters online have also spent enormous efforts on doxing and data-mining information on U.S. military servicemen and women that is eventually published as ISIS hit lists on the web. Much of this information is creatively harvested from social media and other open sources. In contrast, ISIS-directed operatives tend to rely heavily on physical attacks using firearms and TATP-based explosive devices concealed in vests, jackets, and suitcases. Only rarely have ISIS homegrown supporters in North America attempted to build such complex devices, and based on known information, never successfully. " 6 of 7"

7 Both homegrown ISIS supporters as well as trained ISIS operatives now significantly rely on various forms of encrypted communication technology in an attempt to guard against outside snooping by law enforcement or intelligence agencies. Measures adopted by Twitter and other prominent online commercial social media platforms have not prevented ISIS from continuing its efforts to hijack the discourse take place on those platforms, nor from using those platforms as a mechanism to further distribute recruitment material and propaganda. " 7 of 7"

Assessment of the Terror Threat to Denmark

Assessment of the Terror Threat to Denmark 19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals

More information

Assessment of the terror threat to Denmark

Assessment of the terror threat to Denmark 28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Bankrolling Terror: The Funding & Financing of ISIS

Bankrolling Terror: The Funding & Financing of ISIS November 2015 Introduction Following the Paris attacks and ISIS subsequent claim of credit, questions have emerged regarding the group's ability to pull off such a sophisticated plot in the West, particularly

More information

Introduction. Special Conference. The Exploitation Of Media By Terrorist Groups

Introduction. Special Conference. The Exploitation Of Media By Terrorist Groups Forum: Issue: Student Officer: Position: Special Conference The Exploitation Of Media By Terrorist Groups Deniz Gokce Co-Chair Introduction Terrorist groups have been using social media to reach a wider

More information

INTELLIGENCE ASSESSMENT

INTELLIGENCE ASSESSMENT INTELLIGENCE ASSESSMENT (U//FOUO) Future ISIL Operations in the West Could Resemble Disrupted Belg Plot 13 May 2015 Office of Intelligence and Analysis IA-0-15 (U) Warning: This document is (U//FOUO).

More information

Achieving business resilience in a volatile political environment through Terrorism and Political Violence insurance

Achieving business resilience in a volatile political environment through Terrorism and Political Violence insurance Achieving business resilience in a volatile political environment through Terrorism and Political Violence insurance This article was written by Thiagarajan Natarajan, Senior Underwriter Specialty Lines

More information

Changes in modus operandi of Islamic State terrorist attacks

Changes in modus operandi of Islamic State terrorist attacks Europol Public Information Changes in modus operandi of Islamic State terrorist attacks Review held by experts from Member States and Europol on 29 November and 1 December 2015 The Hague, 18 January 2016

More information

TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5

TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5 January 2015 TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5 Introduction On January 7, 2015 France endured a three day terror attack. In the aftermath, two separate parties

More information

Delegations will find in Annex a concept note on the creation of a EU Internet Referral Unit at Europol.

Delegations will find in Annex a concept note on the creation of a EU Internet Referral Unit at Europol. Council of the European Union Brussels, 16 March 2015 (OR. en) 7266/15 LIMITE JAI 178 COSI 32 ENFOPOL 66 CYBER 17 COTER 49 NOTE From: To: Subject: EUROPOL Standing Committee on operational cooperation

More information

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on TESTIMONY BY AMBASSADOR J. COFER BLACK COORDINATOR FOR COUNTERTERRORISM DEPARTMENT OF STATE BEFORE THE SENATE FOREIGN RELATIONS SUBCOMMITTEE ON EUROPE MARCH 31, 2004 Thank you Mr. Chairman and members

More information

Outsmarting digital opponents. Using public safety technology to confront online threats to national security

Outsmarting digital opponents. Using public safety technology to confront online threats to national security Outsmarting digital opponents Using public safety technology to confront online threats to national security Outsmarting digital opponents 3 Digital technologies have changed everything. Governments,

More information

The White House CVE Summit

The White House CVE Summit The White House CVE Summit February 17-20/2015 Washington DC 1. CVE Roundtable with Vice- President Biden + three American cities (17 th feb.) 2. Meeting with Homeland Security & IA (18 th feb.) Presentation:

More information

Current Threat to the U.S. from Cyber Espionage & Cyberterrorism

Current Threat to the U.S. from Cyber Espionage & Cyberterrorism UNCLASSIFIED//FOUO Current Threat to the U.S. from Cyber Espionage & Cyberterrorism Presented by SSA Elvis Chan FBI San Francisco Overall Classification: UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOUO

More information

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors May 2013 Contents Section Slide Numbers Executive Summary 4 Market

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

Ohio Families First:

Ohio Families First: OHIO HEART AND SOUL www.tedstrickland.com Ohio Families First: Defeating Terrorism & Keeping Americans Safe On 9/11, our country was attacked on our home soil, and none of us who lived through that day

More information

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

Surviving the Era of Hack Attacks Cyber Security on a Global Scale Surviving the Era of Hack Attacks Cyber Security on a Global Scale Dr. Adriana Sanford ASU Lincoln Professor of Global Corporate Compliance and Ethics Clinical Associate Professor of Law and Ethics This

More information

Examples of International terrorist attacks since 9/11

Examples of International terrorist attacks since 9/11 PAPER ONE INTERNATIONAL TERRORISM: THE THREAT Any discussion of the Government s strategy to reduce the threat from international terrorism to the UK and its citizens must begin with the nature of the

More information

epp european people s party

epp european people s party Protecting refugees - securing the EU s external borders - sting up action against irregular migration Adopted by the EPP Summit 23 September 2015 01 Protecting refugees - securing the EU s external borders

More information

Ageing OECD Societies

Ageing OECD Societies ISBN 978-92-64-04661-0 Trends Shaping Education OECD 2008 Chapter 1 Ageing OECD Societies FEWER CHILDREN LIVING LONGER CHANGING AGE STRUCTURES The notion of ageing societies covers a major set of trends

More information

OSCE Meeting on the Relationship Between Racist, Xenophobic and Anti-Semitic Propaganda on the Internet and Hate Crimes. Paris, France June 16, 2004

OSCE Meeting on the Relationship Between Racist, Xenophobic and Anti-Semitic Propaganda on the Internet and Hate Crimes. Paris, France June 16, 2004 PC.DEL/507/04 16 June 2004 ENGLISH only OSCE Meeting on the Relationship Between Racist, Xenophobic and Anti-Semitic Propaganda on the Internet and Hate Crimes Paris, France June 16, 2004 Public and Private

More information

Australian Citizenship

Australian Citizenship Australian Citizenship Your Right, Your Responsibility 1 Commonwealth of Australia 2014 All material presented in this publication is provided under a Creative Commons Attribution 3.0 Australia licence

More information

Seminar on Current Developments in Monetary and Financial Law Washington, D.C., October 23-27, 2006

Seminar on Current Developments in Monetary and Financial Law Washington, D.C., October 23-27, 2006 Seminar on Current Developments in Monetary and Financial Law Washington, D.C., October 23-27, 2006 The views expressed in this paper are those of the author(s) only, and the presence of them, or of links

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

2. Adapting and Evolving to Stay Ahead of the Threat

2. Adapting and Evolving to Stay Ahead of the Threat Mark F. Giuliano Deputy Director, Federal Bureau of Investigation Statement for the Record The Washington Institute for Near East Policy Wednesday, May 28, 2014 1. Introduction Good afternoon. Thank you

More information

SECURITY / INTELLIGENCE / CONSULTING

SECURITY / INTELLIGENCE / CONSULTING SECURITY / INTELLIGENCE / CONSULTING Hayes Group International (HGI) is a global security and intelligence consulting and advisory firm specializing in emerging and frontier markets. Focused on development

More information

The Plight of Christians in the Middle East. Supporting Religious Freedom, Pluralism, and Tolerance During a Time of Turmoil

The Plight of Christians in the Middle East. Supporting Religious Freedom, Pluralism, and Tolerance During a Time of Turmoil AP PHOTO/HUSSEIN MALLA The Plight of Christians in the Middle East Supporting Religious Freedom, Pluralism, and Tolerance During a Time of Turmoil By Brian Katulis, Rudy deleon, and John Craig March 2015

More information

Reducing Cyber Risk in Your Organization

Reducing Cyber Risk in Your Organization Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than

More information

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12 Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,

More information

CONTEST: The United Kingdom s Strategy for Countering Terrorism

CONTEST: The United Kingdom s Strategy for Countering Terrorism CONTEST: The United Kingdom s Strategy for Countering Terrorism July 2011 Introduction 3 1.01. This is the third published version of the United Kingdom s counter-terrorism strategy, CONTEST. This new

More information

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Why a Network-based Security Solution is Better than Using Point Solutions Architectures Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone

More information

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist

More information

STRATEGIC DIRECTION 2011-2016

STRATEGIC DIRECTION 2011-2016 Amnesty International UK STRATEGIC DIRECTION 2011-2016 I am delighted to be able to present Amnesty International UK s (AIUK) Strategic Direction to the 2011 Annual General Meeting. The document sets out

More information

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure

More information

FBI CHALLENGES IN A CYBER-BASED WORLD

FBI CHALLENGES IN A CYBER-BASED WORLD FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top

More information

GfK 2016 Tech Trends 2016

GfK 2016 Tech Trends 2016 1 Contents 1 2 3 Evolving behavior today s connected consumers Driving you forward 10 tech trends for 2016 Growth from knowledge turning research into smart business decisions 2 Evolving behavior today

More information

ONLINE MARKETING TIPS & TACTICS TO BOOST YOUR SMALL BUSINESS

ONLINE MARKETING TIPS & TACTICS TO BOOST YOUR SMALL BUSINESS ONLINE MARKETING TIPS & TACTICS TO BOOST YOUR SMALL BUSINESS 1 TABLE OF CONTENTS INTRODUCTION...3 CHAPTER 1: THE SIGNIFICANCE OF DIGITAL MARKETING...4 CHAPTER 2: DIGITAL MARKETING TACTICS AND STRATEGIES:

More information

GLOBAL TOURISM - Geography Explained Fact Sheet

GLOBAL TOURISM - Geography Explained Fact Sheet Billion (US$) GLOBAL TOURISM - Geography Explained Fact Sheet Introduction With almost all the leading tourist destination countries having reported their international tourism receipts for 2006, the WTO

More information

Tech Report. Targeted attack on. France s TV5Monde

Tech Report. Targeted attack on. France s TV5Monde Tech Report Targeted attack on France s TV5Monde May 05, 2015 Tabel of Content Introduction... 3 Attack Outline... 3 Findings #1: Njrat and Njworm, based in the Middle East... 6 Findings #2: Source code

More information

CONTENTS: bul BULGARIAN LABOUR MIGRATION, DESK RESEARCH, 2015

CONTENTS: bul BULGARIAN LABOUR MIGRATION, DESK RESEARCH, 2015 215 2 CONTENTS: 1. METHODOLOGY... 3 a. Survey characteristics... 3 b. Purpose of the study... 3 c. Methodological notes... 3 2. DESK RESEARCH... 4 A. Bulgarian emigration tendencies and destinations...

More information

SOCIAL ADVERTISING BENCHMARK REPORT THE SALESFORCE MARKETING CLOUD. Metrics from 1+ Trillion Facebook* Ad Impressions Made Through Our Platform

SOCIAL ADVERTISING BENCHMARK REPORT THE SALESFORCE MARKETING CLOUD. Metrics from 1+ Trillion Facebook* Ad Impressions Made Through Our Platform THE SALESFORCE MARKETING CLOUD SOCIAL ADVERTISING BENCHMARK REPORT Metrics from 1+ Trillion Facebook* Ad Impressions Made Through Our Platform *All trademarks, service marks, and trade names are the property

More information

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY Page0 Page1 Available as of January 1, 2014 Law Enforcement / Public Safety Courses Introduction to Terrorism Terrorism can range from complex plots to small scale attacks and can take many forms. Often,

More information

Social Media Guidelines & Sample Content

Social Media Guidelines & Sample Content Social Media Guidelines & Sample Content Facebook, Twitter, and LinkedIn are among the most powerful platforms through which you, and the Grads of Life campaign supporters in your community, can exchange

More information

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in 1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies

More information

UNESCO s ROLE IN PROMOTING EDUCATION AS A TOOL TO PREVENT VIOLENT EXTREMISM SUMMARY

UNESCO s ROLE IN PROMOTING EDUCATION AS A TOOL TO PREVENT VIOLENT EXTREMISM SUMMARY Executive Board Hundred and ninety-seventh session 197 EX/46 PARIS, 7 October 2015 Original: English Item 46 of the provisional agenda UNESCO s ROLE IN PROMOTING EDUCATION AS A TOOL TO PREVENT VIOLENT

More information

THE OECD S PROJECT ON HARMFUL TAX PRACTICES: 2006 UPDATE ON PROGRESS IN MEMBER COUNTRIES

THE OECD S PROJECT ON HARMFUL TAX PRACTICES: 2006 UPDATE ON PROGRESS IN MEMBER COUNTRIES THE OECD S PROJECT ON HARMFUL TAX PRACTICES: 2006 UPDATE ON PROGRESS IN MEMBER COUNTRIES PART I: INTRODUCTION 1. Today s more open, competitive commercial environment has benefited households and businesses

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

Location Skills Audit

Location Skills Audit Location Skills Audit Powerful Intelligence for a Powerful Economy Brussels, November 2008 Skills, Skills, Skills We need to draw on the world's smartest, most creative minds. Increasingly, we are finding

More information

QUICKSTART RULES Turn Order Rolling Dice 10s Damage Number Caps

QUICKSTART RULES Turn Order Rolling Dice 10s Damage Number Caps QUICKSTART RULES The actual rules of Terror Network are a little more involved, but here is a simplified rules section to get you started. Terror Network puts you into the role of a counter-terrorism agent.

More information

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities

More information

Mass Marketing Fraud Affecting Canadian Businesses 2015-10-30

Mass Marketing Fraud Affecting Canadian Businesses 2015-10-30 Mass Marketing Fraud Affecting Canadian Businesses 2015-10-30 About The CAFC The Canadian Anti-Fraud Centre (CAFC) is an international call centre specializing in central sourcing complaints on mass marketing

More information

Analyzing the Impact of Social Media From Twitter to Facebook

Analyzing the Impact of Social Media From Twitter to Facebook Analyzing the Impact of Social Media From Twitter to Facebook Analyzing the Impact of Social Media: From Twitter to Facebook Engaging and monitoring the new world of social media are the big first steps,

More information

RUAG Cyber Security. More security for your data

RUAG Cyber Security. More security for your data RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making

More information

Executive summary. Table of Contents. How closer ties between management, operations and training make for higher impact learning, faster

Executive summary. Table of Contents. How closer ties between management, operations and training make for higher impact learning, faster White Paper Integrated learning How closer ties between management, operations and training make for higher impact learning, faster Executive summary Today, more than ever, organizations are focused on

More information

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS Due to the authority vested in the European Centre for Information Policy and Security (ECIPS) Decree / Statute

More information

Training Courses Catalog 2015

Training Courses Catalog 2015 Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction

More information

McKinsey Problem Solving Test Practice Test A

McKinsey Problem Solving Test Practice Test A McKinsey Problem Solving Test Practice Test A 2013 APTMetrics, Inc. 1 Instructions McKinsey Problem Solving Test Practice Test Overview and Instructions This practice test has been developed to provide

More information

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document

More information

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

Manifesto for Education Empowering Educators and Schools

Manifesto for Education Empowering Educators and Schools Manifesto for Education Empowering Educators and Schools As the world faces new challenges with the growing threat of violent extremism, schools and educators are confronted with expressions and sentiments

More information

HOMELAND SECURITY INTELLIGENCE RPAD 556

HOMELAND SECURITY INTELLIGENCE RPAD 556 HOMELAND SECURITY INTELLIGENCE RPAD 556 Dr. James E. Steiner Public Service Professor Rockefeller College The University at Albany, SUNY 423 State Street 518 708 4183 Office hours: by appointment Course

More information

EPP ANTI-TERRORISM PACT

EPP ANTI-TERRORISM PACT EPP ANTI-TERRORISM PACT 1 The EPP Group views terrorism as a global threat that needs to be tackled on local, national, European, regional and global levels. To strengthen our citizen s security, to defend

More information

Policy Instruments & (Side)-Effects

Policy Instruments & (Side)-Effects Policy Instruments & (Side)-Effects EU Parl. LIBE Hearing on the fight against terrorism and the challenges for EU internal security Quirine Eijkman, Centre for Terrorism and Counter-Terrorism Faculty

More information

USEFUL TERMS Crowdfunding getfunding.com.au Rewards Keep It All Campaigns All or Nothing Campaigns

USEFUL TERMS Crowdfunding getfunding.com.au Rewards Keep It All Campaigns All or Nothing Campaigns This guide is based on years of experience assisting people to raise funding and attract funding opportunities to projects. We have assisted individuals, small and medium size businesses, inventors, and

More information

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU. Council of the European Union Brussels, 16 March 2015 (OR. en) 7272/15 LIMITE JAI 180 COSI 34 ENFOPOL 68 CYBER 18 COTER 50 DAPIX 41 NOTE From: To: Subject: Europol Standing Committee on operational cooperation

More information

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK REMARKS AT THE PARLIAMENTARY INTELLIGENCE SECURITY FORUM JUNE 20, 2016 VIENNA, AUSTRIA Good morning. I would like to thank Congressman

More information

Syria: Civil-military relations during civil war

Syria: Civil-military relations during civil war Military Studies Magazine Syria: Civil-military relations during civil war by major Lars Cramer-Larsen Royal Danish Defence College & professor Bertel Heurlin University of Copenhagen Photo: Colourbox

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

Terror in Europe: Safeguarding U.S. Citizens at Home and Abroad

Terror in Europe: Safeguarding U.S. Citizens at Home and Abroad Zarate: Testimony, Senate Homeland Security Committee 04/05/2016 1 Statement before the Senate Homeland Security & Governmental Affairs Committee Terror in Europe: Safeguarding U.S. Citizens at Home and

More information

UNDERSTAND HOW B2B IT AUDIENCES CONSUME information. Insight. a guide for the B2B technology marketer. Tel: +44 (0) 2034 4053188 www.pulsecomms.

UNDERSTAND HOW B2B IT AUDIENCES CONSUME information. Insight. a guide for the B2B technology marketer. Tel: +44 (0) 2034 4053188 www.pulsecomms. Insight Balancing your content distribution strategy across paid, earned and owned channels Insight UNDERSTAND HOW B2B IT AUDIENCES CONSUME information a guide for the B2B technology marketer 1 Tel: +44

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Good morning. It is my pleasure to be here today as we begin. this workshop on improving regional responses to transnational

Good morning. It is my pleasure to be here today as we begin. this workshop on improving regional responses to transnational REMARKS BY AMBASSADOR SCOTT DELISI Africa Center for Strategic Studies Sheraton Hotel Rwenzori Ballroom January 28, 2013, 11:30 a.m. [Protocol list of invitees] All protocols observed. Good morning. It

More information

Tourism trends in Europe and in Mediterranean Partner Countries, 2000-2006

Tourism trends in Europe and in Mediterranean Partner Countries, 2000-2006 Industry, trade and services Author: Ulrich SPÖREL, Volker TÄUBE Statistics in focus 95/28 Tourism trends in Europe and in Mediterranean Partner Countries, 2-26 Tourism is a growth industry in Europe and

More information

STATEMENT OF ROBERT S

STATEMENT OF ROBERT S STATEMENT OF ROBERT S. MUELLER, III DIRECTOR OF THE FEDERAL BUREAU OF INVESTIGATION BEFORE THE UNITED STATES HOUSE OF REPRESENTATIVES COMMITTEE ON APPROPRIATIONS SUBCOMMITTEE ON COMMERCE, JUSTICE, SCIENCE

More information

Becoming an Agile Digital Detective

Becoming an Agile Digital Detective February 2012 IBM Enterprise Content Management software Becoming an Agile Digital Detective Page 2 Web-based social networks connect and empower people to find like-minded individuals to quickly fuel

More information

A Commander s Perspective on Building the Capacity of Foreign Countries Military Forces

A Commander s Perspective on Building the Capacity of Foreign Countries Military Forces STATEMENT OF GENERAL JAMES L. JONES, USMC COMMANDER, UNITED STATES EUROPEAN COMMAND BEFORE THE HOUSE ARMED SERVICES COMMITTEE ON APRIL 7, 2006 A Commander s Perspective on Building the Capacity of Foreign

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Budget Amendment Justification. Department of State, Foreign Operations, and Related Programs

Budget Amendment Justification. Department of State, Foreign Operations, and Related Programs Budget Amendment Justification Department of State, Foreign Operations, and Related Programs FISCAL YEAR 2015 This page intentionally left blank. Budget Amendment Justification Department of State, Foreign

More information

14244/15 EB/dk 1 DGD 1C LIMITE EN

14244/15 EB/dk 1 DGD 1C LIMITE EN Council of the European Union Brussels, 23 November 2015 (OR. en) 14244/15 LIMITE COSI 148 ENFOPOL 355 NOTE From: To: Subject: Europol Standing Committee on Operational Cooperation on Internal Security

More information

International IPTV Consumer Readiness Study

International IPTV Consumer Readiness Study International IPTV Consumer Readiness Study Methodology The Accenture International IPTV Study is based on structured telephone interviews using a standard questionnaire and quantitative analysis methods

More information

Internet and Cyber Terrorism

Internet and Cyber Terrorism Internet and Cyber Terrorism Knoxville Division UNLCASSIFIED In the wake of the September 11 attacks, Usama Bin Ladin (UBL) said, hundreds of Muslim scientists are with me who would use their knowledge

More information

CHOOSE THE RIGHT ONE!

CHOOSE THE RIGHT ONE! The social intelligence company CHOOSE THE RIGHT ONE! GROUPING SOCIAL MEDIA MONITORING TOOLS Whitepaper The social intelligence company BRIEF Monitoring social media! Do I need this? How do I get started?

More information

Name. September 11, 2001: A Turning Point

Name. September 11, 2001: A Turning Point Name Directions: For the following questions(s), use this passage adapted from Mark Kishlansky s, Patrick Geary s, and Patricia O Brien s text, Civilization in the West. September 11, 2001: A Turning Point

More information

Linkages Between Terrorist and Organized Crime Groups in Nuclear Smuggling

Linkages Between Terrorist and Organized Crime Groups in Nuclear Smuggling Linkages Between Terrorist and Organized Crime Groups in Nuclear Smuggling A Case Study of Chelyabinsk Oblast PONARS Policy Memo No. 392 Robert Orttung and Louise Shelley American University December 2005

More information

Good afternoon. It is a pleasure to be joining you for the Predictive Analytics World for Government conference.

Good afternoon. It is a pleasure to be joining you for the Predictive Analytics World for Government conference. JENNIFER SHASKY CALVERY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK PREDICTIVE ANALYTICS WORLD FOR GOVERNMENT WASHINGTON, DC OCTOBER 13, 2015 Good afternoon. It is a pleasure to be joining you for the

More information

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS

UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS 1 DIPLOMATIC SECURITY PROTECTS The Bureau of Diplomatic Security is the security and law enforcement arm of

More information

Hacker Intelligence Initiative, Monthly Trend Report #5

Hacker Intelligence Initiative, Monthly Trend Report #5 October 2011 Hacker Intelligence Initiative, Monthly Trend Report #5 Hacker Intelligence Summary Report Monitoring Hacker Forums As a part of Imperva s hacker intelligence initiative, we monitor hacker

More information

Digital Marketing Capabilities

Digital Marketing Capabilities Digital Marketing Capabilities Version : 1.0 Date : 17-Apr-2015 Company Framework Focus on ROI 2 Introduction SPACECOS is a leading IT services and marketing solutions provider. We provide the winning

More information

Content Security: Protect Your Network with Five Must-Haves

Content Security: Protect Your Network with Five Must-Haves White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as

More information

CIVIL SERVICE NATIONALITY RULES GUIDANCE ON CHECKING ELIGIBILITY

CIVIL SERVICE NATIONALITY RULES GUIDANCE ON CHECKING ELIGIBILITY CIVIL SERVICE NATIONALITY RULES GUIDANCE ON CHECKING ELIGIBILITY Employment Practice Division Civil Service Capability Group Cabinet Office November 2007 1 CIVIL SERVICE NATIONALITY RULES GUIDANCE ON CHECKING

More information

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006)

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, 15-16 June 2006) Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting (Moscow, 15-16 June 2006) At their meeting in Moscow on 15-16 June 2006 the G8 Justice and Home Affairs Ministers

More information

EXHIBITION REPRESENTATION PACK:

EXHIBITION REPRESENTATION PACK: EXHIBITION REPRESENTATION PACK: SPEND LESS, ACHIEVE MORE! * NO SALES COMMISSIONS CHARGED *NO EXTRA HIDDEN FEES AVAILABLE IN: BELGIUM FINLAND GERMANY THE NETHERLANDS SWEDEN RUSSIA 788-790 Finchley Road,

More information

Overview of the OECD work on transfer pricing

Overview of the OECD work on transfer pricing Overview of the OECD work on transfer pricing Written contribution to the Conference Alternative Methods of Taxation of Multinationals (13-14 June 2012, Helsinki, Finland) by Marlies de Ruiter, Head of

More information

Migration into Europe: What Must be Done?

Migration into Europe: What Must be Done? Migration into Europe: What Must be Done? Professor Janne Haaland Matlary, Dept of Political Science, University of Oslo and the Norwegian Military Command and Staff College «The Future of the Asylum and

More information

Hedayah E-Newsletter 25 NOV 8 DEC 6 DEC. Updates. Activities. Upcoming Activities

Hedayah E-Newsletter 25 NOV 8 DEC 6 DEC. Updates. Activities. Upcoming Activities Hedayah E-Newsletter Updates Upcoming Activities 24- NOV 6 DEC - 25 NOV 8 DEC Counter Terrorism Interreligious Alliance Conference CVE Research Conference 2015 *Dates subject to change or cancellation

More information

The Advanced Cyber Attack Landscape

The Advanced Cyber Attack Landscape The Advanced Cyber Attack Landscape FireEye, Inc. The Advanced Cyber Attack Landscape 1 Contents Executive Summary 3 Introduction 4 The Data Source for this Report 5 Finding 1 5 Malware has become a multinational

More information

IPA Global Publishing Statistics. Rüdiger Wischenbart

IPA Global Publishing Statistics. Rüdiger Wischenbart IPA Global Publishing Statistics Rüdiger Wischenbart 1 International Publishers Association The 20 Largest Publishing Markets A list of the 20 largest publishing markets therefore highlights complex dynamics

More information

skills mismatches & finding the right talent incl. quarterly mobility, confidence & job satisfaction

skills mismatches & finding the right talent incl. quarterly mobility, confidence & job satisfaction skills mismatches & finding the right talent incl. quarterly mobility, confidence & job satisfaction Randstad Workmonitor Global Press Report wave 3-2012 Randstad Holding nv September 2012 content Chapter

More information

Federal Bureau of Investigation

Federal Bureau of Investigation Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United

More information