The ISIS Cyber Jihad Audiobook By Michele Di Salvo cover art

The ISIS Cyber Jihad

Virtual Voice Sample

$0.00 for first 30 days

Try for $0.00
Access a growing selection of included Audible Originals, audiobooks, and podcasts.
You will get an email reminder before your trial ends.
Audible Plus auto-renews for $7.95/mo after 30 days. Upgrade or cancel anytime.

The ISIS Cyber Jihad

By: Michele Di Salvo
Narrated by: Virtual Voice
Try for $0.00

$7.95 a month after 30 days. Cancel anytime.

Buy for $3.99

Buy for $3.99

Confirm purchase
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use, License, and Amazon's Privacy Notice. Taxes where applicable.
Cancel
Background images

This title uses virtual voice narration

Virtual voice is computer-generated narration for audiobooks.

About this listen

This e-book begins with an update of four chapters on the communication (not only) of ISIS o-line, in light of the military and geopolitical developments of recent months and the (many) new documents that have emerged and collected. The next question we asked ourselves is quite simple and started from some assumptions: the extraordinary network branching of activists and supporters, the presence of a real global network, the knowledge of sophisticated cryptographic systems, the know-how of the CD. "Syrian electronic army" (one of the best global hacker networks) and many connected networks we have tried to map. We wondered how this whole network, as well as for propaganda, could be used for some specific activities: cell financing abroad and money displacement, and logistics organization. The following survey tells about what I found and links up with global recycling and counterfeiting networks. As I have specified "in this public version of this part of the research I will deliberately omit some passages: this is an investigation with the aim of describing and contributing to explaining a phenomenon and a system (one of the systems) of financing and above all of displacement of money in a very difficult way to be traced through an experience - in this case direct and personal - and does not want to be a vademecum for anyone, nor an invitation "to do the same". Another reason for the omissions is to prevent the disclosure of certain information, active contacts, could in any way and form undermine the work of investigation and investigation of who is in charge of this task and for this reason the full material has been made available to institutional subjects in charge of national and international security investigations. Precisely for this reason I avoided reporting direct contacts, exchanging emails, accounts and telephone numbers - just as they are "blacked out" in the attached images. 1. Isis, from a "liquid" state to a territorial organization 2. A battle for fundamentalist identity hegemony 3. The "flash war" 2.0 4. Global propaganda 5. ISIS cyber-soldiers networks 6. The connection with the Nigerian network 7. The ISIS network and funding sources 8. An untraceable transfer of money transfer 9. The network of false identities What we can not deny is that having enlisted in their ranks fighters and Western sympathizers ISIS knows our systems, our social networks, our social networks, our payment systems, the limits we have in research and analysis . Take advantage of the weaknesses and vulnerabilities of a Western world with Western mind and logic. We have created money transfer systems, and earn commissions on remittances that immigrants pay to their families in poor countries. They exploit this system - knowing country by country limits and thresholds and modes of operation - to use it as a weapon. We have created anonymous prepaid cards and offshore accounts to facilitate electronic commerce, but also talvate currency export and tax evasion. And they use these systems as a weapon, identifying their vulnerabilities and uses that had not been imagined by us. We have created social networks, we have imagined the social spheres and the groups of belonging. They know our social networks, are "born" in the social era and have imagined systems with sealed chambers to avoid social mapping, imagined by marketing, and neutralized by digital guerrilla. [to this I have dedicated an entire chapter that incorporates the jihadist document "invade facebook"]. Freedom & Security Politics & Government Terrorism War & Crisis
No reviews yet