ISIS Just Can’t Resist Social Media

“It is obvious that the media war in this century is one of the strongest methods: in fact, it will be 90% of the preparations for the battles to come” Osama Bin Laden. As ISIS overtook much of Iraq and Syria in 2014, the terrorist organisation ran a parallel campaign on the internet from Facebook and Twitter to Telegram and WhatsApp. 

 

Social media offered the militants an opportunity to recruit jihadi followers and spread radical interpretations of Islam using messaging platforms and social networking services popular with teenagers.

There is something important that the militants have risked in their ambitious online venture. In theory, every computer and phone that ISIS used intelligence, law-enforcement, and security agencies could track, passing the information to warplanes stalking the skies of the Middle East.

It emerged last year that the US Air Force was relying on social media to locate and target ISIS command hierarchies. In one incident, a fighter posted a picture of himself in an ISIS operations room with a geotag. American airstrikes hit the military base 22 hours later.

Insurgents across Africa and Asia have struggled to balance the importance of public relations in the Information Age with the dangers of the internet, a cesspool of hackers, informants, and spies. 

“Surveillance has had a role in the liquidation and murder of a large number of insurgents,” said Nasser Abu Sharif, an official of Palestinian Islamic Jihad (PIJ). “Our military policy is not to carry cellphones, but there are unfortunately some fighters who do not abide by these axiomatic rules.”

The militants who must use cellphones and computers, such as propagandists and spokespeople, find themselves most at risk.

“The social media spokespeople of terrorist organisations are often high on the targets list for drone strikes by the US and others,” noted Dan Gettinger, co-director of the Center for the Study of the Drone at Bard College. 

“People like Junaid Hussein, Reyad Khan, and even Anwar al-Awlaki all demonstrated their ability at using the internet and social media to spread their message and encourage attacks against their UK and US homelands and were all killed in drone strikes.”

The Intercept reported that the CIA and the NSA have cooperated to monitor terrorists’ SIM cards through mass surveillance and metadata. One target was al-Awlaki, the Yemeni–American ideologue of al Qaeda in the Arabian Peninsula killed in a 2011 American airstrike.

The leadership of the Taliban has tried to confuse Western intelligence agencies, distributing SIM cards to random fighters and reshuffling them at impromptu meetings.

“We take a range of measures, such as not communicating classified information over the phone,” Zabihullah Mujahid, the Taliban’s primary spokesman, told The Daily Beast over WhatsApp. “Senior leaders don’t talk on the phone to avoid the tracking of their location.” The Taliban only allows Mujahid and secondary spokesman Qari Muhammad Yousuf Ahmadi to talk to the news media to minimize the risk of airstrikes.

“Well-established terrorist organisations are generally quite conscious of the risks of electronic surveillance and interception and take security measures in response, such as frequent swapping of phones or SIM cards,” said Paul R. Pillar, a former executive assistant to the Director of Central Intelligence. 

“Such measures do not preclude them from use of social media and the internet for propaganda and recruitment; cut-outs can be used in posting material so that it is difficult to trace key individuals involved.”

But the Taliban’s commitment to cybersecurity has limits. American intelligence agencies last May assassinated Mullah Akhtar Mansour, the insurgents’ previous leader, by intercepting his mobile devices. 

Mansour’s predecessor, Mullah Muhammad Omar, had avoided a similar fate by living in secrecy; the Taliban even managed to hide news of his 2013 death for two years. Osama bin Laden, Omar’s ally and friend, evaded detection for years by foregoing cellphones, though his aides owned them.

“Any time an individual interacts with information networks, that does present an opportunity for law enforcement or the intelligence community to attempt to identify someone, determine a location, or otherwise gather available electronic information,” observed Susan Hennessey, a former attorney with the NSA.

Taliban spokespeople have lapsed in the past. In 2012, Ahmadi CC’d subscribers to a Taliban email list instead of BCC’ing them, revealing the email addresses of over 400 recipients. In 2014, Zabihullah Mujahid tweeted his location in Pakistan by accident.

“The spread of easy-to-use encryption and other counter-surveillance tools allow these groups to develop complex communications networks and reduces the number of mistakes which might be exploited for collection,” Hennessey told The Daily Beast.

Terrorist organisations prefer application software secured by end-to-end encryption. The putschists in Turkey’s failed coup d’état plotted over WhatsApp. Telegram, an internet messaging platform developed by Russian dissident entrepreneurs, remains a favorite of ISIS.

But both apps come with their own hazards.

Participants in the Taliban’s WhatsApp chatrooms can view the cellphone numbers of all the other members, allowing even the laziest intelligence officer to see with ease who is controlling and following the Taliban’s instant messaging. Gizmodo has also questioned the privacy afforded by Telegram, ranking iMessage as more secure.

As rebels grapple with the pros and cons of media manipulation over the Internet, even states without access to the Western world’s high technology are enjoying the benefits of mass surveillance in their bloody counterinsurgencies. 

Leaders in the Justice and Equality Movement (JEM) and the Sudanese Liberation Movement/Army (SLM/A) alleged that the Sudanese government launched an airstrike in 2011 on Khalil Ibrahim, the most prominent of Darfur’s rebels, after tracking his cellphone.

“The death of Dr. Khalil resulted from the Global Positioning System,” Adam Eissa Abakar, a JEM leader, told The Daily Beast. “When an individual speaks on the telephone, there will be an airstrike within half an hour.”

“The government in Khartoum controls the telecommunications market in Sudan and brought sophisticated surveillance equipment to monitor all calls and messages within the country,” claimed Muhammad Abdulrahman al-Nair, an SLM/A spokesman. 

He asserted that Sudanese intelligence officers had studied computer and network surveillance in China, Iran, Malaysia, Pakistan, Russia, and South Korea. According to him, the Sudanese government relied on Emirati support to locate Ibrahim.

Elsewhere in Africa, failed states depend on Western intelligence sharing to target well-armed insurgents. “We know that our Libyan enemies are watching our phones, but they couldn’t know this technique without Western help,” asserted Muhammad Idris Taher, a press secretary for the Derna Mujahideen Shura Council, a Libyan militia with alleged links to al Qaeda.

Vastly outgunned and out-spent by Western militaries and intelligence services, terrorist organizations have embraced high- and low-tech methods of evasion and subversion.

ISIS fooled Europe intelligence agencies into believing that Abdelhamid Abaaoud, who masterminded suicide attacks in Belgium and France, was still in Syria by using his WhatsApp account there after he left. 

The militants have embraced bitcoin, a cryptocurrency, and the dark web, a system of overlay networks requiring custom software to access.

Palestinians managed to hack Israeli drones, stoking fears of cyberterrorism against Western governments.

For now, however, most terrorists must confront more mundane challenges.

The Ghost Security Group, a hacker organisation tied to Anonymous, keeps harassing the Taliban’s websites. It will take some time before insurgents have the capabilities and technologies to respond in kind.

Intelligence agencies, meanwhile, also rely on more traditional methods of espionage.

“Keeping track of recruitment trends and the substance of messaging is the most useful purpose for intelligence and security services of monitoring social media,” Pillar, the former CIA official, told The Daily Beast. “It is not a matter of pros and cons of doing this versus collecting human intelligence,” he notes. Human intelligence is “necessary to learn of any operational plans.”

The collection of defectors, double agents, and informants, has played a critical role in operations such as the assassination of Osama bin Laden. It can explain the interpersonal relationships that signals intelligence might overlook. Still, human intelligence comes with its own risks. 

A triple agent posing as an informant killed seven Khost-based CIA operatives in a 2009 suicide attack. And there have always been tensions between proponents of human intelligence and signals intelligence: HUMINT vs. SIGINT.

“Successful operations often involve multiple agencies using a variety of specialized methods,” said Hennessey, the former NSA official. 

“For example, a signals intelligence interception might generate a lead which is then investigated and verified through non-SIGINT methods. Or human intelligence sourcing about a terrorist’s identity and approximate location or use of a particular phone or number might be supplemented with more SIGINT metadata information to determine an exact location.”

Insurgents will always need to prepare countermeasures to protect themselves from the informants living among them and the spies watching their cell phones. Then, Western intelligence, law-enforcement, and security agencies reap the benefits of the terrorists’ strategic errors online.

Daily Beast:      Google Launches New Weapon Against Islamic State:      

ISIS Social Media Ops Are Declining:       ISIS Has a New Secure Messaging App:

 


 

« Vladimir Putin & Donald Trump: Relationship Counselling
AI and VR Are About To Transform Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

ThreatHunter.ai

ThreatHunter.ai

ThreatHunter.ai (formerly Milton Security) is a business that tracks down and mitigates attacks in real time using our ARGOS Platform and our Elite Threat Hunters.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

Agesic

Agesic

Agesic is an institution that leads the development of the Digital Government and the Information and Knowledge Society in Uruguay.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

Plexal

Plexal

Plexal is East London's innovation centre and co-working space. We offer startups flexible memberships, giving them access to office space plus all the benefits and support they need to scale.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

SpeQtral

SpeQtral

SpeQtral offers commercial space-based Quantum Key Distribution (QKD) founded on technology developed at the National University of Singapore.

Sayers

Sayers

Sayers is best known for its ability to solve business challenges with IT solutions. Our areas of expertise include cloud, storage, virtualization, security, mobility and networking.

Corinium Global Intelligence

Corinium Global Intelligence

At Corinium, we have been bringing together the brightest minds in data, AI and info sec since 2013, to innovate at the intersection of technological advancements and critical thinking.