How Terrorists may be Hiding in Plain Sight. Cindy Casey, Gwynedd Mercy University

Similar documents
Terrorism in Cyberspace

THE FUTURE OF CYBER TERRORISM

New Strategies for Countering Homegrown Violent Extremism: Preventive Community Policing

NAVAL POSTGRADUATE SCHOOL

Intelligence Bulletin

(U//FOUO) ISIL Social Media Messaging Resonating with Western Youth

Jihadist women, a threat not to be underestimated

The Difference Between Terrorism and Insurgency

Morocco. Hundreds of returned jihadists across the Strait of Gibraltar who intelligence officials fear pose a large, residual threat on Europe s

British fanatics heading to Iraq to join ISIS militants in their HUNDREDS amid fears 'they could bring terror to UK'

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION CRIMINAL COMPLAINT

Past Involvement of IHH in Supporting the Global Jihad and Radical Islam - Additional Information 1

9/11 BEFORE, DAY OF, AND AFTER WHAT HAPPENED AND WHY?

JEFFERSON COLLEGE COURSE SYLLABUS CRJ135 TERRORISM. 3 Credit Hours. Prepared by: Mark A. Byington. Revised Date: January 2009

Blackout. Mini Guide. Spend 48 hours offline for silenced, persecuted Christians. Could you stay quiet?

Documenting the Virtual Caliphates Dr. Mia Bloom #N /30/16-06/30/19

War in Afghanistan War in Iraq Arab Spring War in Syria North Korea 1950-

With friends like these... Is Syria seeing a spill over from Iraq?

For sale: Ancient artifacts. Islamic State offers up what it hasn't smashed

BTJ Report September EXCLUSIVE BTJ's ISIS Response

Anatomy of an Insurgency

Analysis of ISIS's Claims of Responsibility for Terrorist Attacks Carried Out Abroad. Overview 1

Big Data, information and support for terrorism: the ISIS case

I. Conceptual Organization: Evolution & Longevity Framework (Dr. Allison Astorino- Courtois, 3 NSI)

9/11. Before, The Day of, and After. Write a journal entry telling me 5 things that happened on 9/11. Label it Journal #1

Global View Assessments Fall 2013

P.O. Box 3980 New York, NY (212) November 6, 2017

CSAT, LLC APRIL 2017 INFORMATION LETTER/UPDATE: NEW ARTICLES: Dry and Limited Live Fire THE CSAT WAY

STATEMENT OF JARRET BRACHMAN BEFORE THE HOUSE ARMED SERVICES COMMITTEE SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS AND CAPABILITIES

PREVENT. Working in Partnership for the Prevention of Terrorism and Violent Extremism

Leveraging technology in the 21st CHURCH School. Rev. David L. Ferguson

Tech Savvy Militants in the Age of ICT Globalization: Online Radicalization to Violent Extremism in Kenya

Resolved: The United States should adopt a no first strike policy for cyber warfare.

First Address at the Central Intelligence Agency. delivered 20 April 2009, Langley, Virginia

JESUS IS THE ONE WHO INTERCEDES. John 17:1-26

Campion School Model United Nations

22.2 THE EASTERN MEDITERRANEAN. Birthplace of three major world religions Jerusalem:

Volunteer Application

Preventing Nuclear Terrorism

Muslim Public Affairs Council

The Inghamasi: ISIL?s New Way of War

"Military action will bring great costs for the region," Rouhani said, and "it is necessary to apply all efforts to prevent it."

A new religious state model in the case of "Islamic State" O Muslims, come to your state. Yes, your state! Come! Syria is not for

UNITED STATES DISTRICT COURT DISTRICT OF MASSACHUSETTS

Island Model United Nations Military Staff Committee. Military Staff Committee Background Guide ISLAND MODEL UNITED NATIONS

Editorial: Death of Queen Zenobia s Brave Grandson

After beach confrontations, French are debating burkini ban

June The Internet at the Service of Jihad Organizations. Table of Contents. General...2. YouTube...2. Mega Video...6. Facebook...

Iranian Responses to Growing Tensions with Israel and an Initial Assessment of Their Implications from an Iranian Standpoint. Dr.

The events of 9/11/2001 shocked the entire world and made people brace for changing and difficult times ahead.

Girl chronicles Aleppo terror in 'Myriam's Diary' :48:11

Islamic State in Somalia

CUFI BRIEFING HISTORY - IDEOLOGY - TERROR

The killing of two Al-Qaeda leaders in Iraq and its implications

Barbarism in Egypt. Laval University. From the SelectedWorks of Fathi Habashi. Fathi Habashi. May, 2017

USER AWARENESS ON THE AUTHENTICITY OF HADITH IN THE INTERNET: A CASE STUDY

The Terrorism Threat In 2012: Global Perspective Terrorism Risk And Insurance Markets In 2012 OECD Headquarters Paris, France 5 December 2012

Casting Our Nets into Digital Waters

HEADLINES: ISIS AT THE DOOR EPHESIANS 6:10-18 JUNE 7, 2015

THE ISLAMIC STATE INTELLIGENCE BRIEFING 16011

The public seven radi entering th. (NYPD) released. caliphate, virtual. grounds. Police Department, 2007.

UNITED STATES DISTRICT COURT for the District of Colorado

Volusia County Division of Corrections 10/8/2015

Welcome to the 2009 Citizen s Academy! Volusia County Division of Corrections 1. Volusia County Division of Corrections MISSION STATEMENT

The impact of the withdrawal of the American troops from Syria on the campaign against ISIS (Initial Assessment) Overview

The Original NSA Whistleblower

2010 Annual Summary Data and Trends in Terrorism Annual Summary. Data and Trends in Terrorism

War on Terrorism Notes

A Look At Dangers Posed by the Islamic State Group

. 2. Select region - 5. the Islamic State in Iraq and the Levant (ISIL). It seeks to establish a regional,

By the Numbers Movie How We Measured the Stats

June 25, 2017 Hagar & Ishmael

The Case for Church Security

Aug 26, 1920: 19th Amendment adopted (Women get the right to vote

Beyond Iraq and Afghanistan

2. How did President Bashar al-assad respond to the peaceful protests?

Assessing ISIS one Year Later

Overview 1. On June 29, 2014, ISIS leader Abu Bakr al-baghdadi declared the establishment of the

Arabian Knightz: The Ever-Evolving Al-Qaeda Threat. Mitch Silber Director Intelligence Division

Barnabas Prayer Focus

Topics of the conference include:

OPERATION OF ISIS THROUGH SOCIAL MEDIA AND ITS LEGAL IMPLICATIONS IN INDIA

Suspect in Quebec Mosque Attack Quickly Depict... a Moroccan Muslim. He s a White Nationalist.

IMMIGRATION APPEAL TRIBUNAL. Before : Mr D K Allen Vice President Mr A R Mackey Vice President Mrs M E McGregor. and

You. Sharing Jesus. WHAT IS CONNECT US? IMPRESSIVE RESULTS. Dear Concerned Christians and Church Leaders,

x << Preface adding that the whole notion of radicalization is something that didn t loom as large a few months ago... as it does now. And that s the

Iranian Targets Hit in Syria by the IDF and Responses in Iranian Media

FOURTH GRADE. WE LIVE AS CHRISTIANS ~ Your child recognizes that the Holy Spirit gives us life and that the Holy Spirit gives us gifts.

PARENTING FROM THE SCRIPTURES AND SCRIPTURES FOR THE PARENTS

The Harrowing Road to Asylum

Ankit Fadia Torn Apart. July 11, TAUFEEQ ELAHI w w w. t a u f e e q. c o m

Robin Wright. Arab Spring, The Middle East & The World Social, Political, and Communication Change in the Middle East

Terror Finance and Technology

OK GOOGLE, SHOW ME EXTREMISM: ANALYSIS OF YOUTUBE S EXTREMIST VIDEO TAKEDOWN POLICY AND COUNTER-NARRATIVE PROGRAM Introduction

Arise. Koome Ministries Newsletter Dear Friends and Partners, Koome Educates America. Reasons to Pray, Reasons to Give

Agency Info The Administrator is asked to complete and keep current the agency information including web site and agency contact address.

TERRORISM. What actually it is?

Natural Language Processing (NLP) 10/30/02 CS470/670 NLP (10/30/02) 1

Parish Manual. Formed.org

ISIS-inspired Terrorist Attack in the South of France

Transcription:

How Terrorists may be Hiding in Plain Sight Cindy Casey, Gwynedd Mercy University

Introduction Technology has introduced new mediums for criminal and terrorist activities. Video game consoles are sophisticated communication devices with networking capabilities equal to those found in computers. Can be exploited by individuals to plan and commit a variety of criminal and terrorist activities. To cover digital tracks of these activities, techniques, such as steganography, may be utilized to hide or alter evidence.

Media and law enforcement reports document the involvement of gaming consoles in a variety of crimes: Child Exploitation Drug Trafficking Piracy Hacking Identity Theft Swatting Credit Card Fraud Gang Hits Phishing

Encryption Hides the meaning of a message Scrambles or encodes text Keeps the meaning of the communication a secret Message itself is not hidden Steganography Conceals the fact that a message exists Text inserted or hidden in another medium Keeps communication a secret In plain view

Steganography can be traced back to the ancient Greek historian Herodotus (c. 484-c 425 B.C.) Secret messages were tattooed onto a slave s head. Once the slave s hair grew back, he could travel through enemy territory without the communication being discovered. Once the slave arrived at his destination, his head was shaved and the message read. The King of Sparta sent covert messages to the Greeks by writing the message onto a wooden tablet that was then covered with wax so it appeared empty.

Invisible Ink Perhaps the most well-known form of steganography is invisible ink. Invisible ink can be synthetic or organic. Used during Revolutionary War and both World Wars. WWII captured Long Island submarine had handkerchief with contacts on it. Espionage tool during Cold War.

Forms of Steganography Hidden Watermark Audio frequencies Gray images (block technique) Linguistic Network headers Web Pages Snow method (inserting message in trailing space of each line) Substitution: Bits of the host file are replaced with other bits of information The digit furthest to the right, known as the Least Significant Digit (LSD), is replaced The change is minuscule - or undetectable to the human eye

Lowest significant bit in the byte value of an image pixel. The LSB based image steganography embeds the secret in the least significant bits of pixel values of the cover image.

Meet me on some date at some place and time.

Islamic State of Iraq and Syria (ISIS) homegrown tool. Uses steganography to pass discreet messages through images online and spread secret messages. Through propaganda and recruitment, ISIS targets outcasts in their community, minorities in their country, or people who have been discriminated against in the West.

Average jihadist is: Male 26 years-old Single Well-educated Not an expert on the Quran Some studies suggest average Xbox gamer is 30 (younger for Xbox Live)

U.S.-born children of Indian immigrants living in Chicago, Illinois. Ages 19, 17, and 16. Detained at O'Hare International Airport where they were flying to Istanbul to join ISIS. This nation is openly against Islam and Muslims. "I cannot live under a law in which I am afraid to speak my beliefs."

Teen girls from Vienna, 17 year-old Samra and 15 year-old Sabina fled to join ISIS. They appeared on ISIS websites carrying AK-47s and surrounded by groups of armed men. Used as sexual presents for new recruits. Samra was beaten to death by ISIS when she tried to flee. Sabina died fighting in Syria.

Friday, November 13, 2015 Multiple attacks occurring concurrently in six separate locations. At least 3 teams of Islamic State of Iraq and Syria (ISIS) terrorists. 130 people killed and 363 seriously injured. Multiple reports that the ISIS militants communicated via Sony s PlayStation 4 gaming console.

Monday, May 22, 2017 Suicide bomber outside Ariana Grande concert. 22 killed and 116 injured Suicide bomber did not act alone

ISIS gains support and recruit followers around the globe using aggressive social media tactics. Lone wolf operations - launch attacks in regions which would otherwise be too difficult or risky for Syrian militants to travel to. However, these individuals are not acting alone, they are being vetted, trained, instructed, and stay in constant touch with Islamic State cybercoaches

Could Games like Call of Duty, Battlefield, and Grand Theft Auto be used to exchange information? Because these games are mapped by satellites, gamers can even see the exact layout of certain regions to even further their accuracy in the real world. 9/11 attackers used virtualization at the Flight Safety Academy in Vero Beach, Florida to train.

According to Egyptian media: GTA video is meant to raise the morale of the Mujahideen, and the training of children and young teenagers to fight the West, and throw terror into the hearts of opponents of the state. It has been reported that the state of the art ISIS media center is very well-funded. ISIS publishes as many as 90,000 posts per day on social media.

ISIS Uses GTA 5 in Teen Recruitment Video Mocked-up GTA-style trailer features virtual fighters shouting "Allahu Akbar!" as they attack U.S. troops and law enforcement.

In 2016, Microsoft announced on they will ban content 'used to promote terrorist violence or recruit for terrorist groups' on most but not all of its platforms. Terms of service updated to ban content posted by, or in support of, people or organizations on a United Nations list of terrorist entities.

NSA spied on Xbox Live and World of Warcraft to infiltrate terrorist groups. Agency contractor Edward Snowden leaked documents revealing that both the NSA and CIA were spying on online games since 2006. Leaks did not divulge what data was being collected or the methodologies used.

Semaine Suivante French for Next Week

When information-masking techniques are combined with non-traditional communication devices, the chances of interception or discovery are significantly reduced. Although steganography dates back to antiquity, digital steganalysis is a relatively new discipline. It is difficult to identify structural abnormalities or signs of manipulation in digital environments which are still fundamentally undefined. Where digital investigators have traditionally looked for user data, proprietary files must also be diligently examined.

Cindy Casey, Gwynedd Mercy University casey.cindy@gmercyu.edu