How Dangerous Is ISIS In The Cyber Domain?

The Islamic State group and other militant organisations have been creating precedents in terms of discussing cyber activities almost from the start. 

Most cyber operations by militant organisations have been on a fairly low level and merely aspirational, according to John Mulligan, deputy director of the US National Counterterrorism Center.

From a practical standpoint, cyber activity to date has been largely confined to groups such as ISIS finding information and generating kill lists related to security or military personnel. This is achieved through some low-level hacking and the exploitation of low-hanging fruit. The US government has seen some low-level defacement of websites, he added, but nothing critical.

The gap between the perception that entities able to do the most harm in cyberspace, to include sophisticated nation-states, probably have lesser intent and entities with more nefarious intent have lesser capability is closing, former Director of National Intelligence, James Clapper, told the Senate Armed Services Committee in May.

Terrorists, criminals and hacktivists are going to exploit technology, “and so that comfort that we may have taken in the past is something we shouldn’t count on,” he said. Echoing this sentiment, Mulligan noted: “We shouldn’t make the same mistake in terms of underestimating their ability to again adapt their cyber abilities,” he said.  From a military perspective, Mulligan said ISIS is a loose connection of broadly independent, functioning entities that lack a degree of predictability and uniformity. 

When it comes to ISIS’ hacking cohorts, such as the so-called Cyber Caliphate, they are for the most part considered sympathisers rather than members of ISIS. The United States’ concern, he said, is the individuals who are competent in the cyber arena and may be operating below the horizon, making them more difficult to detect.

This can include those undertaking official support tasks, networks of supporters retweeting ISIS propaganda and those that add value to the overall effort but are difficult to detect. These networks, Mulligan said, are believed to be globally dispersed.
“What’s really unique about ISIS is the fact that they have a deep understanding of the linkage between the media world, particularly social media, and the operational world,” Mulligan said. “They have very successfully been able to use media to amplify the effects of their operational activities.”

ISIS understands the broad range of commercial technological applicability, and social media allows the group to conduct global operations, Mulligan said. 

The militant group can conduct financial transactions, facilitate logistical movements, and organise in a dispersed, remote way. Organisations such as ISIS delegate to individual’s degrees of responsibility and accountability, allowing them to display their initiative.

I-HLS

You Might Also Read

Learning About ISIS Intentions Using Open Source Intelligence:

Interpol/Group-IB Unmasking Pro-ISIS Hackers:

Cyber Caliphate's Scorecard:
 

« Will Cyber Warfare Remove Kim From N. Korea?
New AI Claims To Determine If You Are Gay Or Straight. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets is a global series of summits focusing on cyber security for critical infrastructure.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

The main objective of the Hub is to bring cybersecurity and other advanced technologies closer to companies and as a result help to increase their performance as Industry 4.0.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

3Lines Venture Capital

3Lines Venture Capital

3Lines Venture Capital invests in exceptional founders and startups working on broad disruptive themes of Future of Work, AI enabled enterprises, and Industry 4.0.

Policy Monitor

Policy Monitor

Policy Monitor is a cyber security company founded by experts with extensive experience in operational and risk management.

Nullify

Nullify

Nullify is your automated security sentry that continuously finds and fixes security issues across your codebase.

Ark Infotech

Ark Infotech

Ark Infotech is a provider of cloud management services, selective support services, and technology solutions.