Jeff Bardin | Treadstone 71
To what extent do jihadi groups use the Internet as a weapon; a resource; and/or a target? What is more likely to occur? Where are the skills to do this being acquired? The use of our infrastructure against us is a reality and continues to grow.
There is a cyber threat from jihadi groups with the ability and the desire to utilize computers for illegal and harmful purposes. Jihadis show a growing understanding of the critical role that information technology plays in the day-to-day operations of our economy and national security. Their recruitment efforts have expanded to include young people studying mathematics, computer science and engineering in an effort to move from the limited physical attacks to attacks against our technical systems. This webinar demonstrates some of the tools in use while covering the actual sites in use. Through established personas and online access to jihadi social networking sites, this seminar provides actual documents tools available to Extremist Islamist groups. Jeff will provide an overview of jihadi activities in preparation for some very revealing discussions coming up at Hacker Halted in Miami later this summer.