ISIS, The Pentagon & The Lone Wolf Syndrome

As the counter-terrorism battle moves online, DARPA (Defense Advanced Research Projects Agency) seeks to track how ISIS spreads its ideas, and how well US ripostes are working.

Multiple motivations may have been at play in the Orlando killer’s attack at the Pulse night club in Orlando. While it is possible to overstate the influence of the Islamic State, it is impossible to ignore ISIS messaging as at least one contributing factor. President Obama has said that the killer “appears to have absorbed” messages from ISIS, whose propaganda, “videos, their postings are pervasive and more easily accessible than we want.” 

And if we go back in recent history to Al Qaeda – Bin Laden said… 

“It is obvious that the media war in this century is one of the strongest methods: in fact, it will be 90% of the preparations for the battles to come”

“Even if Osama Bin Laden is captured or killed, the uprising has started, praise be to Allah.”

If the online world is part of the battlefield, a new Pentagon program is building tools to evaluate how the battle is going.

“From phony news on Web sites to terrorist propaganda on social media to recruitment videos posted by extremists, conflict in the information domain is becoming a ubiquitous addition to traditional battlespaces. Given the pace of growth in social media and other networked communications, this bustling domain of words and images, once relegated to the sidelines of strategic planning, is poised to become ever more critical to national security and military success around the globe,” reads the program description for the Quantitative Crisis Response, or QCR, from the Defense Advanced Research Projects Agency, or DARPA. 

DARPA posted the program description this week, several days after Michael Lumpkin, director of the State Department’s Global Engagement Center, or GEC, revealed the program in an interview with Defense One.  

“Many tools are available today to reveal whether rockets and bombs hit their targets or otherwise achieved their tactical goals. But no such tools are available to rigorously assess the effects of the volleys of information that are traded through social media and other communications channels,” reads the description.

The new program seeks to develop “automated digital tools that can help operational partners better understand how information is being used by adversaries and to quantitatively predict and assess—in real time and at scale—the effects of those campaigns and of countermeasures.”

In other words, it seeks to better understand how information propaganda from groups like ISIS is working, as well as the effectiveness of counter responses.

The program’s director is Wade Shen, a former associate group leader in the Human Language Technology Group at MIT’s Lincoln Laboratory, where he worked on ways to distinguish one person’s language patterns from another. At DARPA, he’s served as a program manager for the MEMEx program, a search engine for the Dark Web.  

The problem of individuals “absorbing” Islamic state propaganda and engaging in lone-wolf attacks appears to be growing. On May 21, ISIS spokesperson Abu Muhammad al-Adnani issued an audio recording urging followers across the globe to attack civilian targets in the West.

“Let it be known to you that [spilling] the blood [of people living] in the country of the crusaders and combatants is not forbidden. There is no such thing as innocents” there, he said, according to a translation provided by the Middle East Media Research Institute.

On June 13, the Congressional Research Service published a report on Islamic State radicalization. They found that five of 13 violent Muslim-extremist attacks that have occurred in the United States since 9/11 were related to ISIS.  

“It does not appear that any of the suspects in either the five IS-inspired attacks or the eight others had sustained, substantive, in-person contact with foreign terrorist organizations. In essence, these attacks involved do-it-yourself—DIY—terrorists. Largely isolated from the operational support of terrorist organizations, they acquired violent skills (however rudimentary) by themselves or relied on abilities that they had developed prior to becoming violent jihadists,” the CRS report said.

Some of these attacks, such as the San Bernardino and Orlando massacres, made international headlines. Others were less widely reported. On Jan. 7, Edward Archer shot a police officer in Philadelphia and then pledged allegiance to the Islamic State. Last November, University of California student Faisal Mohammad stabbed a fellow student; five months later, “the FBI announced that its investigation of the incident uncovered evidence that Mohammad may have been inspired by Islamic State propaganda,” the CRS report said.

The evolution of ISIS cyberwar

British militant and hacker Junaid Hussain aka Abu Hussain Al Britani was believed to be the driving force behind IS's cyber and social media growth and strategies. The hacker who went by online pseudonym "TriCk" was the founding member of a relatively unknown hacktivist group called "TeaMpOisoN" before he graduated to becoming one of the most prominent members and recruiters for IS.

"The series of forums, communication channels, and appropriated cyber defensive instructional materials, referred to as the 'ISIS help desk', was devised under his suggestion. Even though he was not a key member of the leadership, Hussain's contribution to the cyber capabilities of the terrorist organisation made him the third most valuable target in IS," ICIT explains.

ISIS as a cyber threat

"The success of the Isis propaganda campaign is influencing how other groups use the internet. In much the same manner that newspapers' popularity declined in favour of online media, static propaganda publications are declining in favour of robust, dynamic multiplatform campaigns," ICIT stated.

DefenseOne

IBTimes

 

« The Future Of Policing In The Digital Age
Intelligent Robots And Automation Encroaching On All Industry Sectors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Endace

Endace

Endace is a leader in network visibility, network recording and packet capture solutions for security, network and application performance monitoring.

Clifford Chance

Clifford Chance

Clifford Chance are one of the world's pre-eminent law firms with resources across five continents. Practice areas include Cyber Security & Information Protection

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Cyber Discovery

Cyber Discovery

Cyber Discovery, the UK Government's Cyber Schools Programme, is a learning programme designed to give young people the opportunity to learn the skills needed to enter the cyber security profession.

National Cyber Security Centre (NCSC) - New Zealand

National Cyber Security Centre (NCSC) - New Zealand

The role of the NCSC is to help New Zealand’s most significant public and private sector organisations to protect their information systems from advanced cyber-borne threats.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

Startup Capital Ventures

Startup Capital Ventures

Startup Capital Ventures is an early stage venture capital firm with a focus on FinTech, Cloud/SaaS, Security, Healthcare IT, and IoT.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

Critical Start

Critical Start

Critical Start provides Managed Detection and Response services, endpoint security, threat intelligence, penetration testing, risk assessments, and incident response.

Mobileum

Mobileum

Mobileum is a leading provider of Telecom analytics for roaming, security and risk management and end-to-end domestic and roaming testing solutions.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.