GCHQ Jammed ISIS Drones & Servers

British intelligence chiefs have revealed details of an operation to undermine the Jihadi terrorist group ISIS that began in 2016 when a secret cyber operation was launched to reduce the effects of its fighters on the battlefield, which involved disabling drones, jamming mobile phones and targeting computer servers to block online propaganda.

Details emerged  after Jeremy Fleming, director of the signals intelligence agency GCHQ and General Sir Patrick Sanders, head of UK Strategic Command spoke to Sky News when Fleming and Patrick said that Islamist militants relied on cyber technology for propaganda, command and control, and attack planning.

GCHQ first admitted three years ago that it had launched an offensive against Isis, but has not previously given any details about the operation. While the UK and allies such as the US have acknowledged using offensive cyber, the specifics of their attack capabilities remain highly classified. 

Fleming said the joint military and GCHQ team had “disrupted the communication of the Isis fighters on the battlefield” and piloted new technology to undermine Isis drone technology. He also said the UK had sought to stem the flow of extremist propaganda by “remotely getting to ISIS servers, getting to the places that they stored their material.... we wanted to deceive them and to misdirect them, to make them less effective, less cohesive and sap their morale.”

At the time, Isis was recruiting fighters as it sought to establish a caliphate across large parts of Iraq and Syria. “It was a very cheap and effective way of waging a terrorist warfare,” Sanders explained. “What we wanted to do was to turn that strength, that dependence that they had on the cyber into a vulnerability, and also to undermine the credibility of their information campaign and of their ideology.”

GCHQ first admitted three years ago that it had launched an offensive against Isis, but has not previously given any details about the operation. While the UK and allies such as the US have acknowledged using offensive cyber, the specifics of their attack capabilities remain highly classifiedGCHQ’s cyber tactics were reinforced on the ground by separate military operations involving special forces, the Iraqi military and local resistance groups, although details of these have not been released.

Other nations, including Russia, China, North Korea and Iran have demonstrated their willingness to use these methods.

The operation against ISIS comes to light a few months after the announcement of  the creation of a UK Cyber Force run jointly by the military and spy agencies to tackle adversaries in the digital realm. The team is expected to significantly increase from a few hundred to 3,000 over the next ten years and will build Britain’s offensive cyber capabilities within a combined unit.

While joint cyber operations are already a feature of modern warfare, some critics warn such activities that fall below the threshold of formal conflict risk being shadowy and unaccountable. 

Hathalyoum:         DroneDJ:         PSBE:        Financial Times:       TheNationalNews:      Tech Register:

You Might Also Read: 

Britain Is At Cyber War Every Day:

 

« Cyber Security Is Crucial For Maritime Shipping
Australia Makes Google & Facebook Pay »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

Lacuna Talent

Lacuna Talent

Lacuna Talent delivers the combined power of Via Resource, the international Cyber Security recruiter, and Lacuna Talent, the Specialist AI/Data recruiter.

IPVanish

IPVanish

IPVanish has its roots in over 15 years of network management, IP services, and content delivery services. Now we're bringing these finely honed skills to VPN.

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

XLAB

XLAB

XLAB is an R&D company with a strong research background in the fields of distributed systems, cloud computing, security and dependability of systems.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Codean

Codean

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

Databarracks

Databarracks

Databarracks deliver award winning IT resilience and continuity services. We help organisations get the most out of the cloud and protect their data, wherever it lives.

Tracer

Tracer

Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.