Recovered IS Document Reveal 22,000 Recruits

Leaked ISIS documnets name Jihadi recruits

Documents obtained by German intelligence thought to contain names of 16 Britons, in information stolen in Syria by fighter disillusioned with Islamic State.

The documents allegedly contain details of 16 British fighters, four from the US and six from Canada, as well as recruits from France and Germany.

More than a dozen Britons and a handful of Americans are among Islamic State fighters reportedly named in a cache of 22,000 documents obtained by German intelligence.

Britons identified in the documents so far had previously been revealed to the public and are dead, killed in US-led strikes, or their whereabouts unknown. Sixteen Britons are thought to be on the list, among them Junaid Hussain and Reyaad Khan.

The documents, thought to be from a border crossing into Syria, are questionnaires of each would-be recruit. There are 23 questions, including names, date and place of birth, hometown, telephone number, education and blood type.

Germany’s interior minister, Thomas de Maizière, confirmed the documents were real and they would facilitate “speedier, clearer investigations and stricter prison sentences” for those returning from Syria and Iraq. De Maizière said the materials help clarify “the underlying structures of this terrorist organisation”.

A spokesperson for the BKA, the German federal police, confirmed that the agency was in possession of the cache of documents, adding that experts determined their authenticity. German officials did not specify how the agency had got the documents, nor how many names had been found within them.

German media reported that the questionnaire asked would-be Isis recruits about any previous experience they had in jihad and whether they were prepared to be suicide bombers.

The existence of the documents was revealed by the Munich-based Süddeutsche Zeitung paper and German broadcasters WDR and NDR. Zaman al-Wasl, a pro-opposition Syrian news website, published examples of the questionnaires recently.

Sky News claimed that it too has obtained copies of what appeared to be the same documents, containing about 22,000 names. It said the they were passed on a memory stick stolen from Isis internal security police by a former Free Syrian Army convert who later became disillusioned with Isis.

The documents held by the German authorities seem to have been collected at the end of 2013. Even the lowest estimate of the numbers that crossed the border in that period indicates the sheer scale of volunteers to Isis. The documents will be useful to intelligence agencies in confirming names and details of people suspected of joining Isis. However, it was reported that there are names not previously known to the intelligence services.

Zaman al-Wasl reported that personal details of 1,736 fighters from 40 countries had been revealed, a quarter were Saudis and the rest predominantly Tunisian, Moroccan and Egyptian.

The documents, written in Arabic and stamped with logos used by Isis, allegedly contain details of 16 British fighters, four from the US and six from Canada, as well as recruits from France and Germany. Intelligence agencies have estimated that about 700 Britons have joined Isis.

Guardian: http://bit.ly/1QMtOeK

« Google's AI Machine To Battle 'Go' Champion
Who Is Winning The Cyber War? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

IberLayer

IberLayer

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks email threats.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

Torch.AI

Torch.AI

Torch.AI’s Nexus™ platform changes the paradigm of data and digital workflows, forever solving core impediments caused by the ever-increasing volume and complexity of information.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Labaton Sucharow

Labaton Sucharow

Standing on the horizon of law and technology, our Cybersecurity and Data Privacy Practice helps to protect consumers who have been harmed by businesses’ failures to safeguard their customers' data.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.

Phone Monitoring Service

Phone Monitoring Service

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe.