ISIS, The Pentagon & The Lone Wolf Syndrome

As the counter-terrorism battle moves online, DARPA (Defense Advanced Research Projects Agency) seeks to track how ISIS spreads its ideas, and how well US ripostes are working.

Multiple motivations may have been at play in the Orlando killer’s attack at the Pulse night club in Orlando. While it is possible to overstate the influence of the Islamic State, it is impossible to ignore ISIS messaging as at least one contributing factor. President Obama has said that the killer “appears to have absorbed” messages from ISIS, whose propaganda, “videos, their postings are pervasive and more easily accessible than we want.” 

And if we go back in recent history to Al Qaeda – Bin Laden said… 

“It is obvious that the media war in this century is one of the strongest methods: in fact, it will be 90% of the preparations for the battles to come”

“Even if Osama Bin Laden is captured or killed, the uprising has started, praise be to Allah.”

If the online world is part of the battlefield, a new Pentagon program is building tools to evaluate how the battle is going.

“From phony news on Web sites to terrorist propaganda on social media to recruitment videos posted by extremists, conflict in the information domain is becoming a ubiquitous addition to traditional battlespaces. Given the pace of growth in social media and other networked communications, this bustling domain of words and images, once relegated to the sidelines of strategic planning, is poised to become ever more critical to national security and military success around the globe,” reads the program description for the Quantitative Crisis Response, or QCR, from the Defense Advanced Research Projects Agency, or DARPA. 

DARPA posted the program description this week, several days after Michael Lumpkin, director of the State Department’s Global Engagement Center, or GEC, revealed the program in an interview with Defense One.  

“Many tools are available today to reveal whether rockets and bombs hit their targets or otherwise achieved their tactical goals. But no such tools are available to rigorously assess the effects of the volleys of information that are traded through social media and other communications channels,” reads the description.

The new program seeks to develop “automated digital tools that can help operational partners better understand how information is being used by adversaries and to quantitatively predict and assess—in real time and at scale—the effects of those campaigns and of countermeasures.”

In other words, it seeks to better understand how information propaganda from groups like ISIS is working, as well as the effectiveness of counter responses.

The program’s director is Wade Shen, a former associate group leader in the Human Language Technology Group at MIT’s Lincoln Laboratory, where he worked on ways to distinguish one person’s language patterns from another. At DARPA, he’s served as a program manager for the MEMEx program, a search engine for the Dark Web.  

The problem of individuals “absorbing” Islamic state propaganda and engaging in lone-wolf attacks appears to be growing. On May 21, ISIS spokesperson Abu Muhammad al-Adnani issued an audio recording urging followers across the globe to attack civilian targets in the West.

“Let it be known to you that [spilling] the blood [of people living] in the country of the crusaders and combatants is not forbidden. There is no such thing as innocents” there, he said, according to a translation provided by the Middle East Media Research Institute.

On June 13, the Congressional Research Service published a report on Islamic State radicalization. They found that five of 13 violent Muslim-extremist attacks that have occurred in the United States since 9/11 were related to ISIS.  

“It does not appear that any of the suspects in either the five IS-inspired attacks or the eight others had sustained, substantive, in-person contact with foreign terrorist organizations. In essence, these attacks involved do-it-yourself—DIY—terrorists. Largely isolated from the operational support of terrorist organizations, they acquired violent skills (however rudimentary) by themselves or relied on abilities that they had developed prior to becoming violent jihadists,” the CRS report said.

Some of these attacks, such as the San Bernardino and Orlando massacres, made international headlines. Others were less widely reported. On Jan. 7, Edward Archer shot a police officer in Philadelphia and then pledged allegiance to the Islamic State. Last November, University of California student Faisal Mohammad stabbed a fellow student; five months later, “the FBI announced that its investigation of the incident uncovered evidence that Mohammad may have been inspired by Islamic State propaganda,” the CRS report said.

The evolution of ISIS cyberwar

British militant and hacker Junaid Hussain aka Abu Hussain Al Britani was believed to be the driving force behind IS's cyber and social media growth and strategies. The hacker who went by online pseudonym "TriCk" was the founding member of a relatively unknown hacktivist group called "TeaMpOisoN" before he graduated to becoming one of the most prominent members and recruiters for IS.

"The series of forums, communication channels, and appropriated cyber defensive instructional materials, referred to as the 'ISIS help desk', was devised under his suggestion. Even though he was not a key member of the leadership, Hussain's contribution to the cyber capabilities of the terrorist organisation made him the third most valuable target in IS," ICIT explains.

ISIS as a cyber threat

"The success of the Isis propaganda campaign is influencing how other groups use the internet. In much the same manner that newspapers' popularity declined in favour of online media, static propaganda publications are declining in favour of robust, dynamic multiplatform campaigns," ICIT stated.

DefenseOne

IBTimes

 

« The Future Of Policing In The Digital Age
Intelligent Robots And Automation Encroaching On All Industry Sectors »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

NetGuardians

NetGuardians

NetGuardians is a leading Fintech company recognized for its unique approach to fraud and risk assurance solutions.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Halcyon Knights

Halcyon Knights

Halcyon Knights is a specialist executive search and IT recruitment agency in the APAC region. Areas of specialisation include cybersecurity.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

WebSec

WebSec

WebSec is a cybersecurity firm based in Amsterdam (NL) and Wyoming (US), specializing in offensive security services including penetration testing, red teaming, and tailored security assessments.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

Diversified Technical Services Inc. (DTSI)

Diversified Technical Services Inc. (DTSI)

DTSI provides a wide range of technology solutions for Federal Agencies, the Department of Defense, and commerical organizations with capabilities including Cyber Security and DevSecOps.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.

AC3

AC3

AC3 is a leading secure cloud services provider, focused on turning your technology challenges into real results.