Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night

As terror groups increasingly use the internet to recruit, inspire and direct sympathizers to conduct physical and cyberattacks around the world, the US capital is becoming a more frequent target.

A Kosovo native was sentenced by a court in Northern Virginia recently for hacking into a “protected” computer, extracting and providing more than 1,300 names of government and military personnel directly to the Islamic State of Iraq and the Levant (ISIL) terror group.

The Washington Field Office of the FBI played a key role in finding Ferizi by plunging into the murky depths of the dark web and hunting him down. “No matter how a person supports a terrorist group like ISIL, whether on the battlefield or in the cyber world, the FBI will identify, disrupt and bring them to justice for placing lives at risk,” said Paul Abbate, assistant director in charge of the Washington Field Office of the FBI.  

As terror groups increasingly use the internet to recruit, inspire and direct sympathizers to conduct physical and cyberattacks around the world, the US capital is becoming a more frequent target. (photo: Washington DC Capitol) 

Two days before Ferizi’s sentencing, Abbate said, “We’re certainly aware that this area has been a target and these groups have called for attacks. This is nothing new to us. Threats have been persistent and consistent, but we’re on guard not only here but everywhere.” 

The threat is intensified by the cloak of darkness the internet and encrypted social media applications provide for silver-tongued terrorists who are able to talk sympathizers such as Ferizi into action.

And even though they operate a robust, broad and meticulous counterterrorism program, Abbate and his team worry about missing something or someone. “The unknown is what keeps me up at night,” Abbate said.

The seemingly unending stream of terrorism developments that could affect the region keep him and his team busy at all hours of the day and night.

“We have an existing set of cases and investigations that are ongoing, particularly in our counterterrorism division, but our biggest concern is what’s out there that we don’t know about yet,” Abbate said.

The speed of world events and evolving mobile communications, both driven by technological advances, appear to be assisting terror groups in increasing their targeting, plotting and launching of attacks. 

Even though there have been no successful terror attacks in the DC region since the 9/11 attacks, the number of terrorism cases appears to be increasing in the region, says Dana Boente, US attorney for the Eastern District of Virginia. 

“I believe we’re somewhere in the neighborhood of 15 or 16 cases in the last two years,” said Boente. “Busier or more than normal” is how he characterized the stream of cases his office and WFO have worked this year.

At least eight terrorism cases have been brought in the region since January. Clandestine online activity by terrorists has played a significant role in most of them. The challenge ahead, according to Abbate, is adjusting to the shift in tactics by terror groups. “When we look at terrorist organizations and criminal groups like ISIL operating out there, attempting to spread their message, attempting to recruit and radicalized individuals online, we go into that world with our personnel,” Abbate said.

Without elaborating on sensitive details regarding how they track terrorists online, Abbate said they apply, “traditional investigative techniques that we’ve used throughout history in our organization and in law enforcement.”

The adaptation of social media applications for terrorist purposes “is really has been a game-changer — especially when combined with smartphones,” said Scott Stewart, vice president of tactical analysis at Stratfor, a strategic intelligence firm.

Stewart said social media has proven far more effective for terrorist activity than just using websites, as was the case decades ago.

“I believe this is because of the greater sense of community and connectedness that social media creates,” Stewart said. “Also, unlike early internet sites that you had to access via a computer, social media apps on a smartphone are mobile and go with the person wherever they are, thus enhancing the feeling of community and of always being connected to it.” Abbate added: “It’s critical, particularly with the spread of technology and the rapid dissemination of information through the news media, that we stay up on that, so we can move information at the same speed to get out in front of threats and to stop them before they occur.”

The FBI’s Joint Terrorism Task Force is its central component to fighting all forms terrorism. “The keys,” said Abbate, “as always are the partnerships, the collaboration, the coordination, the information sharing with a wide range of partners both here in D.C., in the US and overseas as well.”

The Joint Terrorism Task Force has about 4,000 members from more than 500 state and local agencies, as well as 55 federal agencies operating around the country. The task force includes a fusion of local, state and federal agencies acting as an integrated force to combat terrorism on a national and international scale.

WTOP

 

« In New Zealand, Hacking Is A Serious Business
How Easy Would It Be To Hack Your Business? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

Inseego

Inseego

Inseego provides Enterprise SaaS solutions and IoT & Mobile solutions, which together form the backbone of intelligent, reliable and secure IoT services with deep business intelligence.

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

C-MRiC collaborates on initiatives, ranging from national cyber security, enterprise security, information assurance, protection strategy, climate control to health and life sciences.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Deepnet Security

Deepnet Security

Deepnet Security is a leading vendor in Multi-Factor Authentication (MFA) and Identity & Access Management (IAM).

Inflexor Ventures

Inflexor Ventures

Inflexor Ventures is a technology focused venture capital firm that invests in early stage companies from seed to Series-A+ stages.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

Citadel Cyber Security

Citadel Cyber Security

Citadel is a leading 'One Stop Shop' provider of consulting services in cyber and information security. Our experts operate in hundreds of business organizations in Israel and around the world.

NARIS

NARIS

NARIS is the leading provider of an integrated Governance, Risk and Compliance platform called NARIS GRC.

AdvIntel

AdvIntel

AdvIntel is a next-generation threat prevention and loss prevention company launched by a team of certified investigators, reverse engineers, and security experts.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.