The Coming Golden Age of Crime | The Technology Behind IS-Inspired Plots | GOP Wants $100B Defense Bump for Iron Dome, and more

student activist and former political prisoner,” the flyer states, adding that Karajah will speak to students about his “arrest, detention, and torture in the Israeli military judicial system.””

“Students Against Nazi Extremism” Warn Tesla Owners To Sell Their Cars – Or Else  (Graig Graziosi, Independent)
A group calling itself “Students Against Nazi Extremism” is reportedly issuing threats to Tesla owners to sell their vehicles or they will be vandalized, according to a local media report. Lost Coast Outpost reports that residents in Humboldt County in northern California found notes left on their Teslas saying “no Nazis in America.” At least one of the notes was tied to a brick, according to local media reports. The group mailed a supposed manifesto to the news outlet claiming responsibility for the notes. The manifesto also issued threats to Tesla owners in Rohnert Park in Sonoma County north of San Francisco, Hayward in Alameda County in the city’s East Bay, and Seaside in Monterey County.”

The New Orleans Attack: The Technology Behind IS-Inspired Plots  (Clara Broekaert and Dr. Colin Clarke, GNET)
The use of technology by terrorists and violent extremists is a perennially trendy issue in counterterrorism (CT) research—and for good reason. Identifying, monitoring, and assessing technological advancements and understanding how these innovations can be or have already been leveraged for malicious purposes is a key component to effectively disrupting terrorist plots. Attempting to stay and remain ahead of emerging technologies and the novel ways in which they might be employed has become an essential component in redressing the “failure of imagination” that led to the 9/11 attacks that saw US domestic commercial flights transformed into lethal weapons by a foreign terrorist organization. 
Islamic State (IS) and supporters inspired by the group have strategically used technology across a wide spectrum, often combining low- to high-tech tools for a variety of purposes, including recruitment, radicalization, fundraising, financial transactions, attacks, logistical operations, and operational security. The New Orleans IS-inspired New Year’s Day attack, which tragically killed 14 people and injured dozens more, has shown again that attackers use tools across the technological spectrum, often in combination, to maximise lethality and minimize detection of the plot before execution, while also reflecting the conditions in which they operate. This Insight explores the New Orleans, Louisiana (NOLA) attack in the context of technology selection in IS external plots, depending on factors such as resources, technical proficiency, location, operational security considerations, and symbolic value.