Title: Hacking ISIS
Author: Malcolm Nance
Nance, Malcolm W. (2017) and Chris Sampson; foreword by Ali H. Soufan. Hacking ISIS: How to Destroy The Cyber Jihad. New York, NY : Skyhorse Publishing
HV6433.I722 N36 2017
- Hacking ISIS will explain and illustrate in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world. More, the book will map out the cyberspace level tactics on how ISIS spreads its terrifying content, how it distributes tens of thousands of pieces of propaganda daily and is winning the battle in Cyberspace and how to stop it in its tracks. Hacking ISIS is uniquely positioned to give an insider’s view into how this group spreads its ideology and brainwashes tens of thousands of followers to join the cult that is the Islamic State and how average computer users can engage in the removal of ISIS from the internet — Publisher’s website.
- The keys to the cyber caliphate — Understanding the cyber battlespace — History of the cyber jihad — The ISIS cyber hierarchy — The ISIS cyber fighters — Software of the global jihad — Jihadi cyber warfare units — The hackers, wannabees & fembots — Jihadi murder & cyber media — ISIS digital and strategic communications tool kit — All is great in the caliphate — The anti-ISIS cyber army — Tracking ISIS in cyberspace — The ghost caliphate — Appendix A. ISIS magazine issues — Appendix B. Al-Hayat video database.
Date Posted: August 16, 2017
Reviewed in The Intelligencer
Malcolm Nance, NBC News/ MSNBC terrorism analyst and author, and Christopher Sampson, cyber-terrorist expert have spent years collecting and exploiting terrorism media. For two years, their Terror Asymmetries Project has been attacking and exploiting intelligence found on ISIS Dark Web operations.
Hacking ISIS explains how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities, and disseminates their brutal social media to the world. The book maps out the cyberspace-level tactics on how ISIS spreads its appealing content, how it distributes tens of thousands of pieces of propaganda daily, and is winning the battle in cyberspace and how to stop it in its tracks.
 Reviewed in The Intelligencer: Journal of U.S. Intelligence Studies (22, 3, Winter 2016-17, pp. 140-141).