An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Home : News
NEWS | Feb. 1, 2017

Innovation and Adaptation in Jihadist Digital Security

By Dr. Aaron F. Brantly

The importance of the internet to contemporary jihadists as a tool for recruitment, propaganda and operational planning is well established. Less thoroughly studied are the ways in which jihadists work to keep this activity secure from monitoring and disruption, and in particular the ways in which they innovate and adapt to changes in the technological environment. Online forums, training manuals, tweets, blogs, Facebook posts and other forms of communication point towards a jihadist community that is alert to changes in both the technology and the laws and policies of its adversaries. Supporters of the Islamic State, also known as ISIS or ISIL, and resurgent elements of al-Qaeda make use of increasingly decentralized online networks to learn and spread technical knowledge. These communities operate outside of the groups’ zones of physical control, exploit emerging technologies and develop novel technical solutions when their communications and organizational infrastructure is challenged. This cycle of innovation and adaptation, informed by community learning and external information sources, is a challenge to intelligence and law-enforcement efforts to stop potential terrorist attacks.

 

READ MORE

 

PUBLICATIONS
What Does the Future Hold for Jack Voltaic Cyber Exercise?
September 25, 2024

Data Privacy and Security as a National Security Imperative
October 30, 2023

Command by intent can ensure command post survivability
August 29, 2023

The Tipping Point for Army Distributed Command and Control
August 1, 2023

Acknowledging the Realities of the Cyber Workforce
July 20, 2023

The Buzz About Electromagnetic Pulse Weapons
July 19, 2023

Book review: ‘On Disinformation’ by Lee McIntyre
July 19, 2023

IRREGULAR WARFARE PODCAST: EXPLORING CYBER POLICY IN THE DEPARTMENT OF DEFENSE
June 20, 2023

ARE WE ASKING TOO MUCH OF CYBER?
May 3, 2023

West Point hosts Joint Service Academy Cybersecurity Summit as industry, government collaborate to defend against cyber threats
April 13, 2023