Search: Terrorism,ISIS,Cybersecurity (2 materials)

Philip Ingram: Using HUMINT in Cyberspace Is Best to Fight Extremists Online

... before, some 3 years later, leaving to set up my own company and get into journalism and consulting specialising in intelligence, terrorism, defence, security and geopolitics. I now run my own company called Grey Hare Media providing expert content for global ... ... terrorist organisations. It is a new company, but to prove our capability, we penetrated 140 invitation-only groups associated with ISIS on Telegram. We had also infiltrated their previous activities on the Dark Web and on Twitter. This has given me a unique ...

21.06.2018

Islamic State after ISIS. Colonies without Metropole or Cyber Activism?

... affected the organization’s strategy? There are two competing answers to this question. The first possible answer is that ISIS’ plan is similar to that of the Great Britain in 1940, when the government of Winston Churchill was facing the prospect ... ... the administrations of Barack Obama and Donald Trump. In your opinion, will cryptocurrencies become a significant source of terrorism funding? Some experts believe that pressure on traditional methods of financing may facilitate this process. In the ...

13.02.2018

Poll conducted

  1. In your opinion, what are the US long-term goals for Russia?
    U.S. wants to establish partnership relations with Russia on condition that it meets the U.S. requirements  
     33 (31%)
    U.S. wants to deter Russia’s military and political activity  
     30 (28%)
    U.S. wants to dissolve Russia  
     24 (22%)
    U.S. wants to establish alliance relations with Russia under the US conditions to rival China  
     21 (19%)
For business
For researchers
For students