Category Archives: Cybercrime

UNODC Jordan Workshop

Terrorism is not new phenomenon; however, the radical Islamic terrorism appeared in the Middle East following the failure of the so-called “Arab Spring” poses significant threat to Middle East countries. Terrorist groups like ISIS, Al-Qaeda and their affiliates are using new technologies such as social media, encryption, and dedicated manuals for “Open-source Jihad” which increased the sophistication of those new groups and challenged law enforcement and intelligence agencies in the region. With the help of Twitter, Facebook, YouTube and other social media tools, global jihadists can share their contribution of jihadi media, literature, videos, and graphic arts. These free and open tools allowed even non-jihadists to participate, engage and share their thoughts within global jihadi environment. The emergence of open-source jihad created what is so called online “Jihadosphere”, similar to Arabic “blogosphere”[1] for activists. The new generations of Jihadists are harnessing social media in propaganda, fundraising[2], recruitment and communications as well as information gathering. They use social media to collect physical addresses, phone numbers, and private information related to the target, such as family members and their connections. Law enforcement agencies in MENA need to realize that many aspects of the terror threat have been changing due to internet technology and new possibilities of cyber-connected world.  These new developments require cultural shift in entrenched attitudes and approaches in law enforcement agencies across the region.

In this context, The UNODC Terrorism Prevention Branch (TPB) hosted a National Workshop in Jordan for Yemeni Law Enforcement in May 2017 to enhance their capabilities to secure evidence for counter-terrorism investigations. Yemeni law enforcement and intelligence agencies  face sophisticated situation due to conflicts and the presence of AQAP. To address this issue, special training funded by the Japanese Government was delivered by UNODC with the participation of international experts.

It was great opportunity to deliver dedicated session on Open-source Intelligence and to meet dedicated colleagues from the UNODC TPB, Zouhair Racheha and Mohamed Fouda, and also one of the well-known experts on the international legal issues related to digital evidence, Dan Dan Suter.

 

[1] Mapping the Arabic Blogosphere: Politics, Culture and Dissent published by BERKMAN CENTER 2009:
https://cyber.harvard.edu/publications/2009/Mapping_the_Arabic_Blogosphere

[2] Emerging Terrorist Financing Risks – FATF, October 2015

 

Cyber Security Is Everyone’s Responsibility

Dr El-Guindy

 

 

 

 

New Senior Member and ISSA Egypt Chapter President Mohamed N. El-Guindy has taken to the airwaves, interviewed with newspapers and magazines, participated in NGOs and governmental initiatives, and much more in his struggles to advance the state of cybersecurity in Egypt and the region, and his efforts are starting to pay off ISSA asked El-Guindy if he would be willing to comment on the state of infosec in Egypt, some of the challenges Egypt faces, what he has been doing to improve the environment, and his advice to other ISSA chapter leaders. Here is what he had to say:

Read full interview, click here

“This interview was taken from the February 2015 issue of the ISSA Journal©. It has been made available with permission of ISSA international™. Published monthly, the Journal is an ISSA members-only benefit. For more information, visit www.issa.org,” or email Editor@issa.org.  

3rd Annual Cyber Security for Energy & Utilities

Cyber Security EnergyGCC’s critical infrastructure is complex and diverse, combining systems in both cyberspace and the physical world from oil and gas fields, power plants, aluminum plants, communication networks and the massive electrical grids that power industries and subsequently nation’s economies. Protection of vital assets, systems, and networks remains a top priority driven from a political level to an industrial level across the globe and more specifically now in the GCC. Developing cyber security programs with the ever evolving landscape is more important than just having a standard IT security program. “Evolve with the landscape or lose the game” is the new mantra adopted by major companies. A few recent catastrophic cyber-attacks on major companies show that in spite of having the best security systems, the level of cyber vulnerability to attacks cannot be ignored at any given point of time.

Register now to learn more about Middle East Cyber Security issues related to Energy and Utilities.

Download free research below:

Cyber Crime Challenges in the Middle East

Middle East Cyber Security Threat Report 2014