Hacking ISIS

Title:                     Hacking ISIS

Author:                Malcolm Nance

Nance, Malcolm W. (2017) and Chris Sampson; foreword by Ali H. Soufan. Hacking ISIS: How to Destroy The Cyber Jihad. New York, NY : Skyhorse Publishing

LCCN:    2017015409

HV6433.I722 N36 2017

Summary

  • Hacking ISIS will explain and illustrate in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world. More, the book will map out the cyberspace level tactics on how ISIS spreads its terrifying content, how it distributes tens of thousands of pieces of propaganda daily and is winning the battle in Cyberspace and how to stop it in its tracks. Hacking ISIS is uniquely positioned to give an insider’s view into how this group spreads its ideology and brainwashes tens of thousands of followers to join the cult that is the Islamic State and how average computer users can engage in the removal of ISIS from the internet — Publisher’s website.

Contents

  • The keys to the cyber caliphate — Understanding the cyber battlespace — History of the cyber jihad — The ISIS cyber hierarchy — The ISIS cyber fighters — Software of the global jihad — Jihadi cyber warfare units — The hackers, wannabees & fembots — Jihadi murder & cyber media — ISIS digital and strategic communications tool kit — All is great in the caliphate — The anti-ISIS cyber army — Tracking ISIS in cyberspace — The ghost caliphate — Appendix A. ISIS magazine issues — Appendix B. Al-Hayat video database.

LC Subjects

Date Posted:      August 16, 2017

Reviewed in The Intelligencer[1]

Malcolm Nance, NBC News/ MSNBC terrorism analyst and author, and Christopher Sampson, cyber-terrorist expert have spent years collecting and exploiting terrorism media. For two years, their Terror Asymmetries Project has been attacking and exploiting intelligence found on ISIS Dark Web operations.

Hacking ISIS explains how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities, and disseminates their brutal social media to the world. The book maps out the cyberspace-level tactics on how ISIS spreads its appealing content, how it distributes tens of thousands of pieces of propaganda daily, and is winning the battle in cyberspace and how to stop it in its tracks.

[1] Reviewed in The Intelligencer: Journal of U.S. Intelligence Studies (22, 3, Winter 2016-17, pp. 140-141).

This entry was posted in Cybersecurity and tagged , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s