Imam, Hussein e gli altri predicatori erranti: la via dei Balcani per colpire l’Italia

Imam, Hussein e gli altri predicatori erranti: la via dei Balcani per colpire l’Italia

Articolo di Gabriele Moroni, pubblicato oggi su Il Giorno. È il 2012 e la mappa aggiornata dell’Antiterrorismo copre l’intera penisola per dedicare una preoccupata riflessione alle strutture di culto “clandestine”, non ufficiali, e a quelle spacciate per associazioni para-culturali. Sarebbero circa 200, dalla Valle d’Aosta alla Sicilia le strutture “ombra” dove si farebbe del proselitismo, di cui 12 tenute sotto osservazione a Napoli. La base dell’indottrinamento rimane al Nord, con circa 45 fra soggetti e ritrovi…

Read More

Counter-terrorism in Italy: prevention and control over the territory

Counter-terrorism in Italy: prevention and control over the territory

Following the former General Director of Department of Information for the Security, Giampiero Massolo,”we learned a severest lesson during the years of our terrorism”. “We had gathered experience – he says – on how critical it is maintaining a regular dialogue, at operational level, between the intelligence and the police forces. The key word of effective counter-terrorism policies is the prevention and control over the territory. From this point of view – he clarifies –…

Read More

The distribution platforms of ISIS propaganda – UGC, websites, file hosting

The distribution platforms of ISIS propaganda –                                                                                                                                                                                                                                                                                                                                                                  UGC, websites, file hosting

The skill that ISIS has acquired over the years in exploiting the web for propaganda is well known and extensively analyzed from various point of views. However, the majority of researches have been focused on the instant communication’s platforms (Tweeter, Facebook, etc.) because of their power to spread quickly and “stick” strongly. Social Networks are usually, and rightly, identified as the main medium through which ISIS’ propaganda is disseminated, but they are not always appropriate…

Read More

AQ 9/11 Anniversary Message

AQ 9/11 Anniversary Message

The content of video speech of Al-Zawahiri, released in the eve of the 15th anniversary of the Twin Towers attack, is keeping the AQ communication model, revealing a wide and distinctive political strategy. His warning (“As long as your crimes continue, then the events of Sept 11 will be repeated a thousand times, Allah permitting”) plays as a perpetual sentence and a continued reappropriation of that attack. He declares that “The anniversary of 9/11 that…

Read More

20,000 ISIS military uniforms seized in Spain

20,000 ISIS military uniforms seized in Spain

A “Follow Merchandise” investigation Last March, the Policía Nacional seized 20,000 military uniforms found in three shipping containers bound for Syria and Iraq’s areas controlled by ISIS and Jabhat al-Nusra. The shipment, stopped in the port of Algeciras and Valencia, was declared as secondhand clothing and travelled under the guise of humanitarian aid. The container seized in Algeciras was shipped from Jedda, Saudi Arabia, but uniforms came from a not specified “NATO country” (see full…

Read More

Digilantes – GhostSec & Co

Digilantes – GhostSec & Co

I recently came across some articles on the so-called “digilantes” and, in particular, one of their declination named GhostSec, a sort of hacktivist group dedicated to eliminate the online islamic extremist contents. Following information available on their activities, 59,000 Twitter accounts, 1,300 YouTube propaganda videos and 130 standalone sites would have been disabled as a result of GhostSec’s tip-offs. According to Michael S. Smith, the principal of national security company Kronos Advisory, the information GhostSec…

Read More

The Ashley Madison case

The Ashley Madison case

Some days ago, Forbes published an article of Jason Bloomberg (http://www.forbes.com/sites/jasonbloomberg/2015/07/23/ashley-madison-extortion-attack-critical-lessons-for-enterprise-cybersecurity/3/) highlighting some important lessons learned from this case. All the organizations are vulnerable to attack, but also “they have already been attacked”. So the real question to pose “is not when the attack might occur, but how long hackers have been inside a network and how best to mitigate further damage”. “Hackers are usually thieves, looking for financial gain. Some times they are vandals,…

Read More

ISIS and the lonely young American – Comment on the NYT article

ISIS and the lonely young American – Comment on the NYT article

I have just finished reading this article http://www.nytimes.com/2015/06/28/world/americas/isis-online-recruiting-american.html appeared on the NYT few days ago. Going through the story, I noticed many intersting and meanigful elements which could well represent the procedure used by AQ and then ISIS to recruit new blood. 1. “Look for people who are isolated and if they are not isolated already, then isolate them”. In fact, Alex, the 23-years-old girl come in contact with the Islamic recruiters, tells that “My…

Read More

Reclutamento jihad: l’amo del web

Reclutamento jihad: l’amo del web

Da qualche tempo, i gruppi qaedisti sono stati incorporati, per joint-venture, assorbimento o confluenza di comodo, nell’ISIS che, mettendo in atto strategie militari espansionistiche per realizzare il grande progetto del Califfato, sta dimostrando una maggior capacità di reclutamento, specialmente attraverso il suo apparato mass-mediatico. Il web, in particolare, si è rivelato uno strumento potente, sapientemente utilizzato non più solo per diffondere i messaggi/ordini del “capo”, ma anche per creare modelli socioculturali, veicolati attraverso immagini seducenti,…

Read More

The nexus between terrorism and Latin America drug-trafficking networks

The nexus between terrorism and Latin America drug-trafficking networks

Abstract During the last ten years, drug trafficking, transnational gangs and other criminal organizations have grown in size and strength and, according to Drug Enforcement Administration (DEA), Al Qaeda groups in West Africa were charging protection fees to cocaine drug-trafficking groups affiliated with the Revolutionary Armed Forces of Colombia (FARC). Terrorist group operatives would also be linked to Mexican drug cartels and would receiving training, weapons and cash from sources in Latin America. The interconnection…

Read More
1 2