SlideShare a Scribd company logo
1 of 29
Is ISIS Preparing for
a Cyber War?
Rohit Revo,
Security Consultant
Introduction
In this presentation, I will discuss the following points
โ— Who is ISIS and What are their goals?
โ— Cyber Warfare and ISIS
โ— How Non State Actors use Cyber Warfare
โ— History of ISIS Attacks
โ— Analysis of some ISIS cyber attacks
โ— Online Racialization by ISIS
โ— Does ISIS have the cyber capability?
โ— Majority of cyber attacks still coming from Non ISIS
sources
โ— Indirect threats from ISIS
โ— Are ISIS Threats Real
โ— Western Nations counter cyber attacks on ISIS
Who is ISIS and what are their goals?
ISIS is a recent phenomenon in the terrorism space and has occupied
mind-space within a very short period, unlike other terror networks
who took time to establish their global presence. One of the goals of
ISIS is to attack Western interests everywhere, establish an Islamic
caliphate governed by Sharia Law and threaten the world order
claiming authority over all Muslims and non Muslims. ISIS continues to
be the best-funded militant group in the world. [1] Death threats,
torture, mutilations and public executions are their weapons of choice
and they post these acts regularly to social media.
ISIS is a threat โ€˜beyond anything we have ever seenโ€™ (Hagel); a terrorist
organization that is โ€˜uniqueโ€™ in its brutality (Obama) and โ€˜unlike those
we have dealt with beforeโ€™ (Cameron). [2]
Who is ISIS and what are their goals?
Though the total number of ISIS fighters is unclearโ€”foreign fighters
makes up the majority of ISIS ranks with their number estimated at
between 19,000 and 25,000, down from an estimate of 31,000 three
months ago. [3] ISIS has gained affiliates faster than al-Qaeda ever did.
From nothing a year ago, there are now militant groups in nearly 20
countries that have sworn allegiance to ISIS. [4]
As Islamic State continues to build itself, it could face onslaught from
forces led by US, and may not be as powerful in the future and its key
fighters may scatter to other Nation States. However, it will remain a
powerful psychological force. This atomization considerably reduced
the viability of the core al Qaeda in Pakistan, while injecting new life
into its affiliates abroad and ISIS could meet the same fate. [5]
Cyber Warfare
Cyberspace is a unique domain that challenges conventional understandings
of use of force, armed attack and espionage [6] and cyber warfare has been
defined as the 5th domain of warfare. [7] Thus there is a convergence of
traditional and cyber warfare.
Warfighting in Cyberspace the principal effect of cyber warfare is to deny the
enemy freedom of action in cyberspace. [8] Cyber weapons have now replaced
traditional weapons and are being increasingly sought after by Nation States
to establish their superiority over other adversaries.
For non state actors, the barriers of entry for launching cyber warfare is very
low.
Cyber Warfare and ISIS
Internet has amplified terrorist effectiveness by enabling distribution of
shared ideologies to a much wider population. [9] The usage of cyber warfare,
which also includes information warfare, is increasing in conflict zones. Dabiq,
an online magazine published by ISIS is one of the cyberwarfare tools
employed by ISIS.
Surveillance by Western governments and the mining of metadata generated
by ISIS internet usage has forced ISIS to limit the use of internet and cell
phones in conflict zones. ISIS has also advised its members not to use
unencrypted WIFI for communication. This while ISIS is planning to conduct
cyber warfare, it is also a cyberwarfare victim.
Cyber Warfare and ISIS
The possibility that ISIS could use the dark web to coordinate with operatives
to plan and plot a major attack in Europe or the US is disturbing. [10]
Dark Web is a collection of Websites that use anonymisation software such as
Tor to hide identities and is not indexed by Google. [11] ISIS is known to have
ventured into peer-to-peer cryptocurrency exchange Bitcoin asking for
donations. [12]
The usage of cyber warfare, which also includes information warfare, is
increasing in conflict zones. Dabiq, an online magazine published by ISIS is one
of the cyberwarfare tools employed by ISIS.
Online propaganda by ISIS has got it fans on
the Internet. Unlike older terror
organisations, ISIS is making best use of
technology and digital design which makes it
more appealing to younger audiences
globally. Also it is a great way to reach
disgruntled and marginalised youth in
Western countries and appeals to them to
join the ISIS group.
Online propaganda by ISIS has
got it fans on the Internet. Unlike
older terror organisations, ISIS is
making best use of technology
and digital design.
How Non State Actors use Cyber
Warfare?
Supervisory Control and Data Acquisition (SCADA) Systems
connected to the Internet could face cyber attacks by terror
groups who are launching e-jihad on the internet.
After the success of Stuxnet and Estonia attacks, cyber
warfare has caught the attention of non state actors who like
the asymmetrical nature of cyber warfare. The asymmetrical
nature of cyber warfare makes it a favourite tool for terror
groups, vigilante citizens and rogue nations.
How Non State Actors use Cyber
Warfare?
The growth of ISIS has serious implications for global security.
Terrorists generally inflict damage as revenge or as a show of
strength, leveraging it to solicit sponsors and recruits. [14]
ISIS sympathizers and followers could launch cyber attacks to
target Western interests.
ISIS Cyber supporters are increasing in numbers and its
ideology is attracting followers online and this group could use
publicly available malware to launch cyber attacks.
History of ISIS Attacks
ISIS is responsible for at least 90 terrorist attacks in 21
countries other than Iraq and Syria which have killed at least
1,400 people and injured more than 2,000 others. [15] [16]
A close examination of these reveals that ISIS is relying on
traditional physical weapons like car bombs and guns to
conduct terror acts.
None of the attacks can be classified as a cyber attack thus
confirming the limited capabilities of ISIS in cyberwarfare at
this stage.
Analysis of recent ISIS cyber attacks?
ISIS has posted personal information on service members of 1350
US Army members and their families and urging followers to kill
them.
ISIS has also hacked the twitter account hacking of US Central
Command, but this did not result in any major disaster for US,
except public embarrassment.
There is a growing pro-ISIS community of hackers who have so far
had limited success.
A study based on analysis of pro-ISIS hacker collectives,
techniques and tactics, targeting methodology and hacking tools
has found these attacks as comparatively โ€œnovice-levelโ€ and
opportunistic. [17]
Online Racialization by ISIS
ISIS messages on Social media are specifically termed at Muslim
populations in other countries especially Western Nations. It wants to
polarise Western Nations and forcing their immigrant populations to
gravitate towards supporting ISIS ideology.
ISIS has taken over the jihadi ideology franchise from Al-Qaeda and made
terrorism more open source imploring fighters from all across the world to
join the ISIS cause. Its online propaganda and effective use of social media
has given rise to lone-wolf terrorists who get influenced by ISIS to commit
terror acts.
Online Racialization by ISIS
In Australia, there were no al-Qaida linked sympathiser plots in the 2010-
2013 period, but seven IS-linked ones between September 2014 and May
2015. [18]
Does ISIS have the cyber capability?
ISIS hacking capabilities appear rudimentary.
โ€˜To date, the attacks attributed or believed to be conducted
by ISIS have been embarrassing, but not necessarily
complex or sophisticatedโ€™ [19]
The cyber terror threat has not materialized so far and the
attacks have been limited to website defacing and DDoS
attacks and stealing of sensitive and personal information.
Jihad-orientated hacktivists typically tactics to date have
extended to include finding and exploiting vulnerabilities in
websites owned by, for example, small businesses, and
defacing or DDoSing their websites. [20]
Does ISIS have the cyber capability?
Till recently the pro-ISIS hacking landscape was
composed of at least five distinct groups that launched
campaigns in support of the terrorist organisation. The
activities of these units overlapped in certain campaigns.
This co-operation culminated in the April 4, 2016,
announcement of a new group called the โ€œUnited Cyber
Caliphateโ€, that came about following the formal merger
of several groups. [21]
This allows ISIS to pool their resources and manpower
and get synergy in its operations. This newly formed
unified group could pose a significant cyber threat in the
future.
Majority of cyber
attacks still coming
from Non ISIS sources
โž” State actors including Russia, China, Iran and
North Korea are considered the greatest
threats to the U.S. in the cyber domain.[22]
Military entities of these nations are
engaging in systematic attacks against
corporations and government networks. [23]
โž” Chinese military unit 61389 has been alleged
to be the source of multiple Advanced
Persistent Threats (APT) cyber attacks. [24]
Majority of cyber
attacks still coming
from Non ISIS sources
โž” There is not much research on the ability of
ISIS to conduct similar cyber attacks.
โž” ISIS has been a victim of cyber espionage.
ISIS has now banned use of unsecured WiFi
to transmit messages, making them wary of
using modern technology.
Indirect threats from
ISIS
ISIS poses a threat to the world order.
ISIS uses the dark web to hide
messages.
ISIS has thrived on the use of social
media and internet usage.
Pro-ISIS cyber actors could use
hacking tools.
Indirect threats from
ISIS
Ability of ISIS ability to radicalize young
populations in Western countries to
conduct attacks. FBI has over 900 open
investigations into homegrown extremists,
the vast majority radicalized by ISIS and a
large number of which relate to individuals
who may be plotting attacks. [25]
Unlike other terror organisations ISIS has
thrived on the use of social media and
internet usage gaining global following and
adulation.
Are ISIS Threats Real
Taking the battle into cyberspace, ISIS
would gain many of the advantages of
asymmetric warfare. [26] The power of the
Islamic State is waning and they are losing
territory. [27]
If ISIS loses its ability to win in combat
operations, it could resort to launching
cyber attacks on civilian infrastructure,
SCADA systems and the ever growing
Internet of Things.
Are ISIS Threats Real
ISIS still prefers the gory theatre of suicide-
bombings to the anonymity of computer
sabotageโ€”for now. [28] This may change in
the future and ISIS may resort to cyber
attacks in the future.
The power of the Islamic State is waning
and they are losing territory and cyber
threats have not matured.
Western Nations counter cyber
attacks on ISIS
UK has signalled that it will carry out offensive cyber warfare.
[29] U.S. intelligence services have already carried out 231
offensive cyber-operations in 2011. [30] Active cyber defence
policy has now been adopted by USA, UK and Australia and
these nations have now publicly announced that they have
used cyber weapons in the past.
A defector has allegedly leaked what appears to be a USB
driveโ€™s worth of ISISโ€™s secret data, including the personal
information of 22,000 ISIS fighters. That personal data
includes the fightersโ€™ names, phone numbers, hometown and
even blood typesโ€”all information they apparently filled out on
forms in the process of signing up to join the violent group.[31]
Western Nations counter cyber
attacks on ISIS
One of those groups Anonymous, has declared it intention to
attack ISIS websites and has also published a guide for those
looking to help get involved in the campaign. [32]
The increasing of cyber warfare by Western forces is putting
ISIS on defensive.
The role of ISISโ€™s beheading videos is a highly illustrative
demonstration of the ever more apparent importance of visual
imagery and visual media in contemporary warfare. [33] ISIS
seems to be sticking to conventional warfare and has so far
not shown the same maturity while using cyber warfare.
Traditional warfare continues to remain the forte of ISIS.
It is concluded that while ISIS is preparing for
a cyber war ISIS has not yet matured in the
area of cyber warfare.
ISIS could ramp up its cyber capabilities in
the near future and move towards launching
cyber weapons.
Conclusion
[1]UK becomes first state to admit to offensive cyber attack capability, Financial Times, http://www.ft.com/intl/cms/s/0/9ac6ede6-28fd-
11e3-ab62-00144feab7de.html#axzz3Fv4mSUMX, 2016, (accessed 11-May-2016).
[2] U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show,
https://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-
show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html, 2013, (accessed 13-May-2016).
[3] Hack Brief: ISIS Data Breach Identifies 22,000 Members, https://www.wired.com/2016/03/hack-brief-isis-data-breach-identifies-
22000-members, 2016, (accessed 11-May-2016).
[4] ISIS Dark Web Propaganda Site Goes Offline After Hackers Replace Content With Ads For Viagra And Prozac,
http://www.ibtimes.com/isis-dark-web-propaganda-site-goes-offline-after-hackers-replace-content-ads-viagra-2201234, 2015, (accessed
11-May-2016).
[5] Friis, Simone Molin. "โ€˜Beyond anything we have ever seenโ€™: beheading videos and the visibility of violence in the war against ISIS."
International Affairs 91.4, (2015), p. 745
[6] Mueller, Benjamin. The Laws of War and Cyberspace on the Need for a Treaty concerning Cyber Conflict. LSE IDEAS, London
School of Economics and Political Science, 2014. p. 4
[7] Are the mouse and keyboard the new weapons of conflict? Economist, http://www.economist.com/node/16478792, 2010, (accessed
1-May-2016).
[8] Alexander, Keith B. Warfighting in cyberspace. National Defense Univ Washington Dc Inst For National Strategic Studies, 2007. p. 60
[9] Goel, Sanjay, Cyberwarfare: connecting the dots in cyber intelligence, Communications of the ACM 54.8 (2011). p. 134
[10] C. Clarke, , I. Porche, The Online Fight Against ISIS, Rand Corporation, http://www.rand.org/blog/2016/04/the-online-fight-against-
isis.html, 2016, (accessed 11-May-2016).
[11] SITE Intelligence Group. Dark Web and Cyber Security, https://ent.siteintelgroup.com/Dark-Web-Cyber-Security, 2016, (accessed
12-May-2016).
References
[12] The Islamic State (or someone pretending to be it) is trying to raise funds using Bitcoin, Washington Post,
https://www.washingtonpost.com/news/worldviews/wp/2015/06/09/the-islamic-state-or-someone-pretending-to-be-it-is-trying-to-raise-
funds-using-bitcoin/, 2015, (accessed 9-May-2016).
[14] Goel, Sanjay, Cyberwarfare: connecting the dots in cyber intelligence, Communications of the ACM 54.8 (2011). p. 134
[15] ISIS goes global, CNN, http://edition.cnn.com/2015/12/17/world/mapping-isis-attacks-around-the-world/, 2016, (accessed 5-May-
2016).
[16] Where ISIS Has Directed and Inspired Attacks Around the World,
http://www.nytimes.com/interactive/2015/06/17/world/middleeast/map-isis-attacks-around-the-world.html?_r=0, 2016, (accessed 5-May-
2016).
[17] Pro-ISIS hacking groups are still hooking up, The Register, http://www.theregister.co.uk/2016/04/28/cyber_caliphate/ 2016,
(accessed 1-May-2016).
[18] Hegghammer, Thomas, and Petter Nesser. "Assessing the Islamic Stateโ€™s Commitment to Attacking the West." Perspectives on
Terrorism 9.4 (2015). p. 27
[19] Perlroth, Nicole. Security Experts and Officials Diverge on ISIS as Hacking Threat,
http://www.nytimes.com/2015/12/25/technology/security-experts-and-officials-diverge-on-isis-as-hacking-threat.html, New York Times,
25 Dec. 2015, (accessed 1-May-2016).
[20] Pro-ISIS hacking groups are still hooking up, The Register, http://www.theregister.co.uk/2016/04/28/cyber_caliphate/ 2016,
(accessed 1-May-2016).
[21] Pro-ISIS hacking groups are still hooking up, The Register, http://www.theregister.co.uk/2016/04/28/cyber_caliphate/ 2016,
(accessed 1-May-2016).
[22] ISIS May Try to Launch Cyberattacks against U.S., NSA Chief Warns, DefenseTech, http://www.defensetech.org/2016/04/05/isis-
may-try-to-launch-cyberattacks-nsa-chief-warns/, 2016, (accessed 5-May-2016).
References
[23] Holt, T., Bossler, A., & Seigfried-Spellar, K. Cybercrime and Digital Forensics : An Introduction. London, United Kingdom: Taylor &
Francis Ltd. ISBN: 9781138021303 (Chapter 8). 2015. p. 245
[24] APT1:Exposing One of China's Cyber Espionage Units, Mandiant Intelligence Center Report, 2015, (accessed 5-May-2016).
[25] ISIS Will Strike America, Time, http://time.com/4114805/former-cia-director-isis-will-strike-america/, 2015, (accessed 2-May-2016).
[26] C. Clarke, , I. Porche, The Online Fight Against ISIS, Rand Corporation, http://www.rand.org/blog/2016/04/the-online-fight-against-
isis.html, 2016, (accessed 11-May-2016).
[27] B Jenkins, C Clarke, In the Event of the Islamic State's Untimely Demise, Rand Corporation, http://www.rand.org/blog/2016/05/in-
the-event-of-the-islamic-states-untimely-demise.html, 2016, (accessed 2-May-2016).
[28] Are the mouse and keyboard the new weapons of conflict? Economist, http://www.economist.com/node/16478792, 2010, (accessed
1-May-2016).
[29]UK becomes first state to admit to offensive cyber attack capability, Financial Times, http://www.ft.com/intl/cms/s/0/9ac6ede6-28fd-
11e3-ab62-00144feab7de.html#axzz3Fv4mSUMX, 2016, (accessed 11-May-2016).
[30] U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show,
https://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-
show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html, 2013, (accessed 13-May-2016).
[31] Hack Brief: ISIS Data Breach Identifies 22,000 Members, https://www.wired.com/2016/03/hack-brief-isis-data-breach-identifies-
22000-members, 2016, (accessed 11-May-2016).
[32] ISIS Dark Web Propaganda Site Goes Offline After Hackers Replace Content With Ads For Viagra And Prozac,
http://www.ibtimes.com/isis-dark-web-propaganda-site-goes-offline-after-hackers-replace-content-ads-viagra-2201234, 2015, (accessed
11-May-2016).
[33] Friis, Simone Molin. "โ€˜Beyond anything we have ever seenโ€™: beheading videos and the visibility of violence in the war against ISIS."
International Affairs 91.4, (2015), p. 745
References

More Related Content

Viewers also liked (8)

terrorism in Pakistan
terrorism in Pakistanterrorism in Pakistan
terrorism in Pakistan
ย 
ISIS A Global Threat
ISIS A Global ThreatISIS A Global Threat
ISIS A Global Threat
ย 
ISIS
ISISISIS
ISIS
ย 
Islamic State of Iraq and Syria (ISIS)
Islamic State of Iraq and Syria (ISIS)Islamic State of Iraq and Syria (ISIS)
Islamic State of Iraq and Syria (ISIS)
ย 
geographical location of pakistan
geographical location of pakistangeographical location of pakistan
geographical location of pakistan
ย 
Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)
ย 
Vipin solanki- terrorism in pakistan
Vipin solanki- terrorism in pakistanVipin solanki- terrorism in pakistan
Vipin solanki- terrorism in pakistan
ย 
Who is ISIS?
Who is ISIS?Who is ISIS?
Who is ISIS?
ย 

Recently uploaded

( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
SUHANI PANDEY
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Chandigarh Call girls 9053900678 Call girls in Chandigarh
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
imonikaupta
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
SUHANI PANDEY
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
SUHANI PANDEY
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
SUHANI PANDEY
ย 
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
nilamkumrai
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
SUHANI PANDEY
ย 

Recently uploaded (20)

( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | Girls Are Re...
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
ย 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
ย 
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
ย 

Is ISIS Preparing for a Cyber War

  • 1. Is ISIS Preparing for a Cyber War? Rohit Revo, Security Consultant
  • 2. Introduction In this presentation, I will discuss the following points โ— Who is ISIS and What are their goals? โ— Cyber Warfare and ISIS โ— How Non State Actors use Cyber Warfare โ— History of ISIS Attacks โ— Analysis of some ISIS cyber attacks โ— Online Racialization by ISIS โ— Does ISIS have the cyber capability? โ— Majority of cyber attacks still coming from Non ISIS sources โ— Indirect threats from ISIS โ— Are ISIS Threats Real โ— Western Nations counter cyber attacks on ISIS
  • 3. Who is ISIS and what are their goals? ISIS is a recent phenomenon in the terrorism space and has occupied mind-space within a very short period, unlike other terror networks who took time to establish their global presence. One of the goals of ISIS is to attack Western interests everywhere, establish an Islamic caliphate governed by Sharia Law and threaten the world order claiming authority over all Muslims and non Muslims. ISIS continues to be the best-funded militant group in the world. [1] Death threats, torture, mutilations and public executions are their weapons of choice and they post these acts regularly to social media. ISIS is a threat โ€˜beyond anything we have ever seenโ€™ (Hagel); a terrorist organization that is โ€˜uniqueโ€™ in its brutality (Obama) and โ€˜unlike those we have dealt with beforeโ€™ (Cameron). [2]
  • 4. Who is ISIS and what are their goals? Though the total number of ISIS fighters is unclearโ€”foreign fighters makes up the majority of ISIS ranks with their number estimated at between 19,000 and 25,000, down from an estimate of 31,000 three months ago. [3] ISIS has gained affiliates faster than al-Qaeda ever did. From nothing a year ago, there are now militant groups in nearly 20 countries that have sworn allegiance to ISIS. [4] As Islamic State continues to build itself, it could face onslaught from forces led by US, and may not be as powerful in the future and its key fighters may scatter to other Nation States. However, it will remain a powerful psychological force. This atomization considerably reduced the viability of the core al Qaeda in Pakistan, while injecting new life into its affiliates abroad and ISIS could meet the same fate. [5]
  • 5. Cyber Warfare Cyberspace is a unique domain that challenges conventional understandings of use of force, armed attack and espionage [6] and cyber warfare has been defined as the 5th domain of warfare. [7] Thus there is a convergence of traditional and cyber warfare. Warfighting in Cyberspace the principal effect of cyber warfare is to deny the enemy freedom of action in cyberspace. [8] Cyber weapons have now replaced traditional weapons and are being increasingly sought after by Nation States to establish their superiority over other adversaries. For non state actors, the barriers of entry for launching cyber warfare is very low.
  • 6. Cyber Warfare and ISIS Internet has amplified terrorist effectiveness by enabling distribution of shared ideologies to a much wider population. [9] The usage of cyber warfare, which also includes information warfare, is increasing in conflict zones. Dabiq, an online magazine published by ISIS is one of the cyberwarfare tools employed by ISIS. Surveillance by Western governments and the mining of metadata generated by ISIS internet usage has forced ISIS to limit the use of internet and cell phones in conflict zones. ISIS has also advised its members not to use unencrypted WIFI for communication. This while ISIS is planning to conduct cyber warfare, it is also a cyberwarfare victim.
  • 7. Cyber Warfare and ISIS The possibility that ISIS could use the dark web to coordinate with operatives to plan and plot a major attack in Europe or the US is disturbing. [10] Dark Web is a collection of Websites that use anonymisation software such as Tor to hide identities and is not indexed by Google. [11] ISIS is known to have ventured into peer-to-peer cryptocurrency exchange Bitcoin asking for donations. [12] The usage of cyber warfare, which also includes information warfare, is increasing in conflict zones. Dabiq, an online magazine published by ISIS is one of the cyberwarfare tools employed by ISIS.
  • 8. Online propaganda by ISIS has got it fans on the Internet. Unlike older terror organisations, ISIS is making best use of technology and digital design which makes it more appealing to younger audiences globally. Also it is a great way to reach disgruntled and marginalised youth in Western countries and appeals to them to join the ISIS group.
  • 9. Online propaganda by ISIS has got it fans on the Internet. Unlike older terror organisations, ISIS is making best use of technology and digital design.
  • 10. How Non State Actors use Cyber Warfare? Supervisory Control and Data Acquisition (SCADA) Systems connected to the Internet could face cyber attacks by terror groups who are launching e-jihad on the internet. After the success of Stuxnet and Estonia attacks, cyber warfare has caught the attention of non state actors who like the asymmetrical nature of cyber warfare. The asymmetrical nature of cyber warfare makes it a favourite tool for terror groups, vigilante citizens and rogue nations.
  • 11. How Non State Actors use Cyber Warfare? The growth of ISIS has serious implications for global security. Terrorists generally inflict damage as revenge or as a show of strength, leveraging it to solicit sponsors and recruits. [14] ISIS sympathizers and followers could launch cyber attacks to target Western interests. ISIS Cyber supporters are increasing in numbers and its ideology is attracting followers online and this group could use publicly available malware to launch cyber attacks.
  • 12. History of ISIS Attacks ISIS is responsible for at least 90 terrorist attacks in 21 countries other than Iraq and Syria which have killed at least 1,400 people and injured more than 2,000 others. [15] [16] A close examination of these reveals that ISIS is relying on traditional physical weapons like car bombs and guns to conduct terror acts. None of the attacks can be classified as a cyber attack thus confirming the limited capabilities of ISIS in cyberwarfare at this stage.
  • 13. Analysis of recent ISIS cyber attacks? ISIS has posted personal information on service members of 1350 US Army members and their families and urging followers to kill them. ISIS has also hacked the twitter account hacking of US Central Command, but this did not result in any major disaster for US, except public embarrassment. There is a growing pro-ISIS community of hackers who have so far had limited success. A study based on analysis of pro-ISIS hacker collectives, techniques and tactics, targeting methodology and hacking tools has found these attacks as comparatively โ€œnovice-levelโ€ and opportunistic. [17]
  • 14. Online Racialization by ISIS ISIS messages on Social media are specifically termed at Muslim populations in other countries especially Western Nations. It wants to polarise Western Nations and forcing their immigrant populations to gravitate towards supporting ISIS ideology. ISIS has taken over the jihadi ideology franchise from Al-Qaeda and made terrorism more open source imploring fighters from all across the world to join the ISIS cause. Its online propaganda and effective use of social media has given rise to lone-wolf terrorists who get influenced by ISIS to commit terror acts.
  • 15. Online Racialization by ISIS In Australia, there were no al-Qaida linked sympathiser plots in the 2010- 2013 period, but seven IS-linked ones between September 2014 and May 2015. [18]
  • 16. Does ISIS have the cyber capability? ISIS hacking capabilities appear rudimentary. โ€˜To date, the attacks attributed or believed to be conducted by ISIS have been embarrassing, but not necessarily complex or sophisticatedโ€™ [19] The cyber terror threat has not materialized so far and the attacks have been limited to website defacing and DDoS attacks and stealing of sensitive and personal information. Jihad-orientated hacktivists typically tactics to date have extended to include finding and exploiting vulnerabilities in websites owned by, for example, small businesses, and defacing or DDoSing their websites. [20]
  • 17. Does ISIS have the cyber capability? Till recently the pro-ISIS hacking landscape was composed of at least five distinct groups that launched campaigns in support of the terrorist organisation. The activities of these units overlapped in certain campaigns. This co-operation culminated in the April 4, 2016, announcement of a new group called the โ€œUnited Cyber Caliphateโ€, that came about following the formal merger of several groups. [21] This allows ISIS to pool their resources and manpower and get synergy in its operations. This newly formed unified group could pose a significant cyber threat in the future.
  • 18. Majority of cyber attacks still coming from Non ISIS sources โž” State actors including Russia, China, Iran and North Korea are considered the greatest threats to the U.S. in the cyber domain.[22] Military entities of these nations are engaging in systematic attacks against corporations and government networks. [23] โž” Chinese military unit 61389 has been alleged to be the source of multiple Advanced Persistent Threats (APT) cyber attacks. [24]
  • 19. Majority of cyber attacks still coming from Non ISIS sources โž” There is not much research on the ability of ISIS to conduct similar cyber attacks. โž” ISIS has been a victim of cyber espionage. ISIS has now banned use of unsecured WiFi to transmit messages, making them wary of using modern technology.
  • 20. Indirect threats from ISIS ISIS poses a threat to the world order. ISIS uses the dark web to hide messages. ISIS has thrived on the use of social media and internet usage. Pro-ISIS cyber actors could use hacking tools.
  • 21. Indirect threats from ISIS Ability of ISIS ability to radicalize young populations in Western countries to conduct attacks. FBI has over 900 open investigations into homegrown extremists, the vast majority radicalized by ISIS and a large number of which relate to individuals who may be plotting attacks. [25] Unlike other terror organisations ISIS has thrived on the use of social media and internet usage gaining global following and adulation.
  • 22. Are ISIS Threats Real Taking the battle into cyberspace, ISIS would gain many of the advantages of asymmetric warfare. [26] The power of the Islamic State is waning and they are losing territory. [27] If ISIS loses its ability to win in combat operations, it could resort to launching cyber attacks on civilian infrastructure, SCADA systems and the ever growing Internet of Things.
  • 23. Are ISIS Threats Real ISIS still prefers the gory theatre of suicide- bombings to the anonymity of computer sabotageโ€”for now. [28] This may change in the future and ISIS may resort to cyber attacks in the future. The power of the Islamic State is waning and they are losing territory and cyber threats have not matured.
  • 24. Western Nations counter cyber attacks on ISIS UK has signalled that it will carry out offensive cyber warfare. [29] U.S. intelligence services have already carried out 231 offensive cyber-operations in 2011. [30] Active cyber defence policy has now been adopted by USA, UK and Australia and these nations have now publicly announced that they have used cyber weapons in the past. A defector has allegedly leaked what appears to be a USB driveโ€™s worth of ISISโ€™s secret data, including the personal information of 22,000 ISIS fighters. That personal data includes the fightersโ€™ names, phone numbers, hometown and even blood typesโ€”all information they apparently filled out on forms in the process of signing up to join the violent group.[31]
  • 25. Western Nations counter cyber attacks on ISIS One of those groups Anonymous, has declared it intention to attack ISIS websites and has also published a guide for those looking to help get involved in the campaign. [32] The increasing of cyber warfare by Western forces is putting ISIS on defensive. The role of ISISโ€™s beheading videos is a highly illustrative demonstration of the ever more apparent importance of visual imagery and visual media in contemporary warfare. [33] ISIS seems to be sticking to conventional warfare and has so far not shown the same maturity while using cyber warfare. Traditional warfare continues to remain the forte of ISIS.
  • 26. It is concluded that while ISIS is preparing for a cyber war ISIS has not yet matured in the area of cyber warfare. ISIS could ramp up its cyber capabilities in the near future and move towards launching cyber weapons. Conclusion
  • 27. [1]UK becomes first state to admit to offensive cyber attack capability, Financial Times, http://www.ft.com/intl/cms/s/0/9ac6ede6-28fd- 11e3-ab62-00144feab7de.html#axzz3Fv4mSUMX, 2016, (accessed 11-May-2016). [2] U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show, https://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents- show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html, 2013, (accessed 13-May-2016). [3] Hack Brief: ISIS Data Breach Identifies 22,000 Members, https://www.wired.com/2016/03/hack-brief-isis-data-breach-identifies- 22000-members, 2016, (accessed 11-May-2016). [4] ISIS Dark Web Propaganda Site Goes Offline After Hackers Replace Content With Ads For Viagra And Prozac, http://www.ibtimes.com/isis-dark-web-propaganda-site-goes-offline-after-hackers-replace-content-ads-viagra-2201234, 2015, (accessed 11-May-2016). [5] Friis, Simone Molin. "โ€˜Beyond anything we have ever seenโ€™: beheading videos and the visibility of violence in the war against ISIS." International Affairs 91.4, (2015), p. 745 [6] Mueller, Benjamin. The Laws of War and Cyberspace on the Need for a Treaty concerning Cyber Conflict. LSE IDEAS, London School of Economics and Political Science, 2014. p. 4 [7] Are the mouse and keyboard the new weapons of conflict? Economist, http://www.economist.com/node/16478792, 2010, (accessed 1-May-2016). [8] Alexander, Keith B. Warfighting in cyberspace. National Defense Univ Washington Dc Inst For National Strategic Studies, 2007. p. 60 [9] Goel, Sanjay, Cyberwarfare: connecting the dots in cyber intelligence, Communications of the ACM 54.8 (2011). p. 134 [10] C. Clarke, , I. Porche, The Online Fight Against ISIS, Rand Corporation, http://www.rand.org/blog/2016/04/the-online-fight-against- isis.html, 2016, (accessed 11-May-2016). [11] SITE Intelligence Group. Dark Web and Cyber Security, https://ent.siteintelgroup.com/Dark-Web-Cyber-Security, 2016, (accessed 12-May-2016). References
  • 28. [12] The Islamic State (or someone pretending to be it) is trying to raise funds using Bitcoin, Washington Post, https://www.washingtonpost.com/news/worldviews/wp/2015/06/09/the-islamic-state-or-someone-pretending-to-be-it-is-trying-to-raise- funds-using-bitcoin/, 2015, (accessed 9-May-2016). [14] Goel, Sanjay, Cyberwarfare: connecting the dots in cyber intelligence, Communications of the ACM 54.8 (2011). p. 134 [15] ISIS goes global, CNN, http://edition.cnn.com/2015/12/17/world/mapping-isis-attacks-around-the-world/, 2016, (accessed 5-May- 2016). [16] Where ISIS Has Directed and Inspired Attacks Around the World, http://www.nytimes.com/interactive/2015/06/17/world/middleeast/map-isis-attacks-around-the-world.html?_r=0, 2016, (accessed 5-May- 2016). [17] Pro-ISIS hacking groups are still hooking up, The Register, http://www.theregister.co.uk/2016/04/28/cyber_caliphate/ 2016, (accessed 1-May-2016). [18] Hegghammer, Thomas, and Petter Nesser. "Assessing the Islamic Stateโ€™s Commitment to Attacking the West." Perspectives on Terrorism 9.4 (2015). p. 27 [19] Perlroth, Nicole. Security Experts and Officials Diverge on ISIS as Hacking Threat, http://www.nytimes.com/2015/12/25/technology/security-experts-and-officials-diverge-on-isis-as-hacking-threat.html, New York Times, 25 Dec. 2015, (accessed 1-May-2016). [20] Pro-ISIS hacking groups are still hooking up, The Register, http://www.theregister.co.uk/2016/04/28/cyber_caliphate/ 2016, (accessed 1-May-2016). [21] Pro-ISIS hacking groups are still hooking up, The Register, http://www.theregister.co.uk/2016/04/28/cyber_caliphate/ 2016, (accessed 1-May-2016). [22] ISIS May Try to Launch Cyberattacks against U.S., NSA Chief Warns, DefenseTech, http://www.defensetech.org/2016/04/05/isis- may-try-to-launch-cyberattacks-nsa-chief-warns/, 2016, (accessed 5-May-2016). References
  • 29. [23] Holt, T., Bossler, A., & Seigfried-Spellar, K. Cybercrime and Digital Forensics : An Introduction. London, United Kingdom: Taylor & Francis Ltd. ISBN: 9781138021303 (Chapter 8). 2015. p. 245 [24] APT1:Exposing One of China's Cyber Espionage Units, Mandiant Intelligence Center Report, 2015, (accessed 5-May-2016). [25] ISIS Will Strike America, Time, http://time.com/4114805/former-cia-director-isis-will-strike-america/, 2015, (accessed 2-May-2016). [26] C. Clarke, , I. Porche, The Online Fight Against ISIS, Rand Corporation, http://www.rand.org/blog/2016/04/the-online-fight-against- isis.html, 2016, (accessed 11-May-2016). [27] B Jenkins, C Clarke, In the Event of the Islamic State's Untimely Demise, Rand Corporation, http://www.rand.org/blog/2016/05/in- the-event-of-the-islamic-states-untimely-demise.html, 2016, (accessed 2-May-2016). [28] Are the mouse and keyboard the new weapons of conflict? Economist, http://www.economist.com/node/16478792, 2010, (accessed 1-May-2016). [29]UK becomes first state to admit to offensive cyber attack capability, Financial Times, http://www.ft.com/intl/cms/s/0/9ac6ede6-28fd- 11e3-ab62-00144feab7de.html#axzz3Fv4mSUMX, 2016, (accessed 11-May-2016). [30] U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show, https://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents- show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html, 2013, (accessed 13-May-2016). [31] Hack Brief: ISIS Data Breach Identifies 22,000 Members, https://www.wired.com/2016/03/hack-brief-isis-data-breach-identifies- 22000-members, 2016, (accessed 11-May-2016). [32] ISIS Dark Web Propaganda Site Goes Offline After Hackers Replace Content With Ads For Viagra And Prozac, http://www.ibtimes.com/isis-dark-web-propaganda-site-goes-offline-after-hackers-replace-content-ads-viagra-2201234, 2015, (accessed 11-May-2016). [33] Friis, Simone Molin. "โ€˜Beyond anything we have ever seenโ€™: beheading videos and the visibility of violence in the war against ISIS." International Affairs 91.4, (2015), p. 745 References

Editor's Notes

  1. REFERENCES [1] How America is beating ISIS in Iraq and Syria, The Week, http://theweek.com/articles/621251/how-america-beating-isis-iraq-syria, 2016, (accessed 2 May 2016). [2] Friis, Simone Molin. "โ€˜Beyond anything we have ever seenโ€™: beheading videos and the visibility of violence in the war against ISIS." International Affairs 91.4, (2015), p. 731
  2. REFERENCES [3] Foreign Fighters and Those Who Return, The Sourfan Group, http://soufangroup.com/tsg-intelbrief-foreign-fighters-and-those-who-return, 2016, (accessed 2-May-2016). [4] ISIS Will Strike America, Time, http://time.com/4114805/former-cia-director-isis-will-strike-america/, 2015, (accessed 2-May-2016). [5] B Jenkins, C Clarke, In the Event of the Islamic State's Untimely Demise, Rand Corporation, http://www.rand.org/blog/2016/05/in-the-event-of-the-islamic-states-untimely-demise.html, 2016, (accessed 2-May-2016).
  3. REFERENCES [6] Mueller, Benjamin. The Laws of War and Cyberspace on the Need for a Treaty concerning Cyber Conflict. LSE IDEAS, London School of Economics and Political Science, 2014. p. 4 [7] Are the mouse and keyboard the new weapons of conflict? Economist, http://www.economist.com/node/16478792, 2010, (accessed 1-May-2016). [8] Alexander, Keith B. Warfighting in cyberspace. National Defense Univ Washington Dc Inst For National Strategic Studies, 2007. p. 60
  4. REFERENCES [9] Goel, Sanjay, Cyberwarfare: connecting the dots โ€จin cyber intelligence, Communications of the ACM 54.8 (2011). p. 134
  5. REFERENCES [10] C. Clarke, , I. Porche, The Online Fight Against ISIS, Rand Corporation, http://www.rand.org/blog/2016/04/the-online-fight-against-isis.html, 2016, (accessed 11-May-2016). [11] SITE Intelligence Group. Dark Web and Cyber Security, https://ent.siteintelgroup.com/Dark-Web-Cyber-Security, 2016, (accessed 12-May-2016). [12] The Islamic State (or someone pretending to be it) is trying to raise funds using Bitcoin, Washington Post, https://www.washingtonpost.com/news/worldviews/wp/2015/06/09/the-islamic-state-or-someone-pretending-to-be-it-is-trying-to-raise-funds-using-bitcoin/, 2015, (accessed 9-May-2016).
  6. Online propaganda by ISIS has got it fans on the Internet. Unlike older terror organisations, ISIS is making best use of technology and digital design which makes it more appealing to younger audiences globally. Also it is a great way to reach disgruntled and marginalised youth in Western countries and appeals to them to join the ISIS group. REFERENCES Image 1 http://www.scmp.com/news/china/diplomacy-defence/article/1880370/china-confirms-first-time-islamic-state-has-executed Image 2 http://jihadology.net/category/dabiq-magazine/
  7. Supervisory Control and Data Acquisition (SCADA) Systems connected to the Internet could face cyber attacks by terror groups who are launching e-jihad on the internet. After the success of Stuxnet and Estonia attacks, cyber warfare has caught the attention of non state actors who like the asymmetrical nature of cyber warfare. The asymmetrical nature of cyber warfare makes it a favourite tool for terror groups, vigilante citizens and rogue nations. The growth of ISIS has serious implications for global security. Terrorists generally inflict damage as revenge or as a show of strength, leveraging it to solicit sponsors and recruits. [1] REFERENCES [14] Goel, Sanjay, Cyberwarfare: connecting the dots โ€จin cyber intelligence, Communications of the ACM 54.8 (2011). p. 134
  8. Since declaring its caliphate in June 2014, ISIS is responsible for at least 90 terrorist attacks in 21 countries other than Iraq and Syria which have killed at least 1,400 people and injured more than 2,000 others. [1] [2] A close examination of these reveals that ISIS is relying hard on traditional physical weapons like car bombs and guns to conduct terror acts, which generates better publicity for the group. While cyber attacks can cause devastation and financial losses, ISIS is keen to get media publicity for its terror acts as retribution in cyber attacks is difficult and ISIS may not be able to claim credit for such attacks. None of the above attacks can be classified as a cyber attack thus confirming the limited capabilities of ISIS in cyberwarfare at this stage. REFERENCES [15] ISIS goes global, CNN, http://edition.cnn.com/2015/12/17/world/mapping-isis-attacks-around-the-world/, 2016, (accessed 5-May-2016). [16] Where ISIS Has Directed and Inspired Attacks Around the World, http://www.nytimes.com/interactive/2015/06/17/world/middleeast/map-isis-attacks-around-the-world.html?_r=0, 2016, (accessed 5-May-2016).
  9. ISIS has posted personal information on service members of 1350 US Army members and their families and urging followers to kill them. ISIS has also hacked the twitter account hacking of US Central Command, but this did not result in any major disaster for US, except public embarrassment. There is a growing pro-ISIS community of hackers who have so far had limited success. A study based on analysis of pro-ISIS hacker collectives, techniques and tactics, targeting methodology and hacking tools has found these attacks as comparatively โ€œnovice-levelโ€ and opportunistic.[1] REFERENCES [17] Pro-ISIS hacking groups are still hooking up, The Register, http://www.theregister.co.uk/2016/04/28/cyber_caliphate/ 2016, (accessed 1-May-2016).
  10. ISIS messages on Social media are specifically termed at Muslim populations in other countries especially Western Nations. It wants to polarise Western Nations and forcing their immigrant populations to gravitate towards supporting ISIS ideology. ISIS has taken over the jihadi ideology franchise from Al-Qaeda and made terrorism more open source imploring fighters from all across the world to join the ISIS cause. Its online propaganda and effective use of social media has given rise to lone-wolf terrorists who get influenced by ISIS to commit terror acts. In Australia, there were no al-Qaida linked sympathiser plots in the 2010-2013 period, but seven IS-linked ones between September 2014 and May 2015. [1] REFERENCES [18] Hegghammer, Thomas, and Petter Nesser. "Assessing the Islamic Stateโ€™s Commitment to Attacking the West." Perspectives on Terrorism 9.4 (2015). p. 27
  11. ISIS hacking capabilities appear rudimentary. โ€˜To date, the attacks attributed or believed to be conducted by ISIS have been embarrassing, but not necessarily complex or sophisticatedโ€™ [1] The cyber terror threat has not materialized so far and the attacks have been limited to website defacing and DDoS attacks and stealing of sensitive and personal information. Jihad-orientated hacktivists typically tactics to date have extended to include finding and exploiting vulnerabilities in websites owned by, for example, small businesses, and defacing or DDoSing their websites. [2] Till recently the pro-ISIS hacking landscape was composed of at least five distinct groups that launched campaigns in support of the terrorist organisation. The activities if these units overlapped in certain campaigns. This co-operation culminated in the April 4, 2016, announcement of a new group called the โ€œUnited Cyber Caliphateโ€, that came about following the formal merger of several groups. [3] This allows ISIS to pool their resources and manpower and get synergy in its operations. This newly formed unified group could pose a significant cyber threat in the future. REFERENCES [19] Perlroth, Nicole. Security Experts and Officials Diverge on ISIS as Hacking Threat, http://www.nytimes.com/2015/12/25/technology/security-experts-and-officials-diverge-on-isis-as-hacking-threat.html, New York Times, 25 Dec. 2015, (accessed 1-May-2016). [20] Pro-ISIS hacking groups are still hooking up, The Register, http://www.theregister.co.uk/2016/04/28/cyber_caliphate/ 2016, (accessed 1-May-2016).
  12. ISIS hacking capabilities appear rudimentary. โ€˜To date, the attacks attributed or believed to be conducted by ISIS have been embarrassing, but not necessarily complex or sophisticatedโ€™ [1] The cyber terror threat has not materialized so far and the attacks have been limited to website defacing and DDoS attacks and stealing of sensitive and personal information. Jihad-orientated hacktivists typically tactics to date have extended to include finding and exploiting vulnerabilities in websites owned by, for example, small businesses, and defacing or DDoSing their websites. [2] Till recently the pro-ISIS hacking landscape was composed of at least five distinct groups that launched campaigns in support of the terrorist organisation. The activities if these units overlapped in certain campaigns. This co-operation culminated in the April 4, 2016, announcement of a new group called the โ€œUnited Cyber Caliphateโ€, that came about following the formal merger of several groups. [3] This allows ISIS to pool their resources and manpower and get synergy in its operations. This newly formed unified group could pose a significant cyber threat in the future. REFERENCES [21] Pro-ISIS hacking groups are still hooking up, The Register, http://www.theregister.co.uk/2016/04/28/cyber_caliphate/ 2016, (accessed 1-May-2016). Image URL: https://www.wired.com/wp-content/uploads/2015/01/isis-header.jpg
  13. State actors including Russia, China, Iran and North Korea are considered the greatest threats to the U.S. in the cyber domain. [1] Military entities of these nations are engaging in systematic attacks against corporations and government networks [2]. Chinese military unit 61389 has been alleged to be the source of multiple Advanced Persistent Threats (APT) cyber attacks. [3] There is not much research on the ability of ISIS to conduct similar cyber attacks. ISIS has been a victim of cyber espionage as terrorist locations have been tracked after their use of Internet and online devices. ISIS has now banned use of unsecured WiFi to transmit messages, making them wary of using modern technology. ISIS Cyber supporters are increasing in numbers and its ideology is attracting followers online and this group could use publicly available malware to launch cyber attacks. REFERENCES [22] ISIS May Try to Launch Cyberattacks against U.S., NSA Chief Warns, DefenseTech, http://www.defensetech.org/2016/04/05/isis-may-try-to-launch-cyberattacks-nsa-chief-warns/, 2016, (accessed 5-May-2016). [23] Holt, T., Bossler, A., & Seigfried-Spellar, K. Cybercrime and Digital Forensics : An Introduction. London, United Kingdom: Taylor & Francis Ltd. ISBN: 9781138021303 (Chapter 8). 2015. p. 245 [24] APT1:Exposing One of China's Cyber Espionage Units, Mandiant Intelligence Center Report, 2015, (accessed 5-May-2016).
  14. State actors including Russia, China, Iran and North Korea are considered the greatest threats to the U.S. in the cyber domain. [1] Military entities of these nations are engaging in systematic attacks against corporations and government networks [2]. Chinese military unit 61389 has been alleged to be the source of multiple Advanced Persistent Threats (APT) cyber attacks. [3] There is not much research on the ability of ISIS to conduct similar cyber attacks. ISIS has been a victim of cyber espionage as terrorist locations have been tracked after their use of Internet and online devices. ISIS has now banned use of unsecured WiFi to transmit messages, making them wary of using modern technology. REFERENCES [21] ISIS May Try to Launch Cyberattacks against U.S., NSA Chief Warns, DefenseTech, http://www.defensetech.org/2016/04/05/isis-may-try-to-launch-cyberattacks-nsa-chief-warns/, 2016, (accessed 5-May-2016). [2] Holt, T., Bossler, A., & Seigfried-Spellar, K. Cybercrime and Digital Forensics : An Introduction. London, United Kingdom: Taylor & Francis Ltd. ISBN: 9781138021303 (Chapter 8). 2015. p. 245 [3] APT1:Exposing One of China's Cyber Espionage Units, Mandiant Intelligence Center Report, 2015, (accessed 5-May-2016).
  15. As a terrorist group, ISIS poses a threat to the world order. That threat today is largely indirect which is the ability of ISIS ability to radicalize young populations in Western countries to conduct attacks there. FBI has over 900 open investigations into homegrown extremists, the vast majority radicalized by ISIS and a large number of which relate to individuals who may be plotting attacks. [1] Investigators believe ISIS uses the dark web to hide their messages from national intelligence by using encrypted messaging. They communicate over everything from apps to gaming platforms. Experts predict that the way theyโ€™re going about it makes it a challenge for security agencies to track ISIS communications.[2] Unlike other terror organisations ISIS has thrived on the use of social media and internet usage gaining global following and adulation. Pro-ISIS cyber actors could use hacking tools from publicly available including custom malware. REFERENCES [1] ISIS Will Strike America, Time, http://time.com/4114805/former-cia-director-isis-will-strike-america/, 2015, (accessed 2-May-2016). [2] Experts reveal how ISIS is using the dark web to stay undetected, http://wtnh.com/2015/11/19/experts-reveal-how-isis-is-using-the-dark-web-to-stay-undetected/, 2015, (accessed 2-May-2016).
  16. As a terrorist group, ISIS poses a threat to the world order. That threat today is largely indirect which is the ability of ISIS ability to radicalize young populations in Western countries to conduct attacks there. FBI has over 900 open investigations into homegrown extremists, the vast majority radicalized by ISIS and a large number of which relate to individuals who may be plotting attacks. [1] Investigators believe ISIS uses the dark web to hide their messages from national intelligence by using encrypted messaging. They communicate over everything from apps to gaming platforms. Experts predict that the way theyโ€™re going about it makes it a challenge for security agencies to track ISIS communications.[2] [2] Experts reveal how ISIS is using the dark web to stay undetected, http://wtnh.com/2015/11/19/experts-reveal-how-isis-is-using-the-dark-web-to-stay-undetected/, 2015, (accessed 2-May-2016). Unlike other terror organisations ISIS has thrived on the use of social media and internet usage gaining global following and adulation. Pro-ISIS cyber actors could use hacking tools from publicly available including custom malware. REFERENCES [25] ISIS Will Strike America, Time, http://time.com/4114805/former-cia-director-isis-will-strike-america/, 2015, (accessed 2-May-2016).
  17. Taking the battle into cyberspace, ISIS would gain many of the advantages of asymmetric warfare.[1] The power of the Islamic State is waning and they are losing territory.[2] If ISIS loses its ability to win in combat operations, it could resort to launching cyber attacks on civilian infrastructure, SCADA systems and the ever growing Internet of Things. ISIS still prefers the gory theatre of suicide-bombings to the anonymity of computer sabotageโ€”for now. [6] This may change in the future and ISIS may resort to cyber attacks in the future. The power of the Islamic State is waning and they are losing territory and cyber threats have not matured. cyber actors could use hacking tools REFERENCES [26] C. Clarke, , I. Porche, The Online Fight Against ISIS, Rand Corporation, http://www.rand.org/blog/2016/04/the-online-fight-against-isis.html, 2016, (accessed 11-May-2016). [27] B Jenkins, C Clarke, In the Event of the Islamic State's Untimely Demise, Rand Corporation, http://www.rand.org/blog/2016/05/in-the-event-of-the-islamic-states-untimely-demise.html, 2016, (accessed 2-May-2016).
  18. REFERENCES [28] Are the mouse and keyboard the new weapons of conflict? Economist, http://www.economist.com/node/16478792, 2010, (accessed 1-May-2016).
  19. UK has signalled that it will carry out offensive cyber warfare. [1] U.S. intelligence services have already carried out 231 offensive cyber-operations in 2011. [2] Active cyber defence policy has now been adopted by USA, UK and Australia and these nations have now publicly announced that they have used cyber weapons in the past. A defector has allegedly leaked what appears to be a USB driveโ€™s worth of ISISโ€™s secret data, including the personal information of 22,000 ISIS fighters. That personal data includes the fightersโ€™ names, phone numbers, hometown and even blood typesโ€”all information they apparently filled out on forms in the process of signing up to join the violent group.[3] One of those groups Anonymous, has declared it intention to attack ISIS websites and has also published a guide for those looking to help get involved in the campaign.[4] The increasing of cyber warfare by Western forces is putting ISIS on defensive. The role of ISISโ€™s beheading videos is a highly illustrative demonstration of the ever more apparent importance of visual imagery and visual media in contemporary warfare. [5] ISIS seems to be sticking to conventional warfare and has so far not shown the same maturity while using cyber warfare. Traditional warfare continues to remain the forte of ISIS. REFERENCES [29]UK becomes first state to admit to offensive cyber attack capability, Financial Times, http://www.ft.com/intl/cms/s/0/9ac6ede6-28fd-11e3-ab62-00144feab7de.html#axzz3Fv4mSUMX, 2016, (accessed 11-May-2016). [30] U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show, https://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html, 2013, (accessed 13-May-2016). [31] Hack Brief: ISIS Data Breach Identifies 22,000 Members, https://www.wired.com/2016/03/hack-brief-isis-data-breach-identifies-22000-members, 2016, (accessed 11-May-2016).
  20. UK has signalled that it will carry out offensive cyber warfare. [1] U.S. intelligence services have already carried out 231 offensive cyber-operations in 2011. [2] Active cyber defence policy has now been adopted by USA, UK and Australia and these nations have now publicly announced that they have used cyber weapons in the past. A defector has allegedly leaked what appears to be a USB driveโ€™s worth of ISISโ€™s secret data, including the personal information of 22,000 ISIS fighters. That personal data includes the fightersโ€™ names, phone numbers, hometown and even blood typesโ€”all information they apparently filled out on forms in the process of signing up to join the violent group.[3] One of those groups Anonymous, has declared it intention to attack ISIS websites and has also published a guide for those looking to help get involved in the campaign.[4] The increasing of cyber warfare by Western forces is putting ISIS on defensive. The role of ISISโ€™s beheading videos is a highly illustrative demonstration of the ever more apparent importance of visual imagery and visual media in contemporary warfare. [5] ISIS seems to be sticking to conventional warfare and has so far not shown the same maturity while using cyber warfare. Traditional warfare continues to remain the forte of ISIS. REFERENCES [32] ISIS Dark Web Propaganda Site Goes Offline After Hackers Replace Content With Ads For Viagra And Prozac, http://www.ibtimes.com/isis-dark-web-propaganda-site-goes-offline-after-hackers-replace-content-ads-viagra-2201234, 2015, (accessed 11-May-2016). [33] Friis, Simone Molin. "โ€˜Beyond anything we have ever seenโ€™: beheading videos and the visibility of violence in the war against ISIS." International Affairs 91.4, (2015), p. 745
  21. It is concluded that while ISIS is preparing for a cyber war, ISIS has not yet matured in the area of cyber warfare, preferring to stick to traditional warfare. The cyber capabilities of ISIS are in nascent stage and ISIS itself is a victim of cyber attacks. However, given the rapid rise of ISIS, this group can ramp up its cyber capabilities in the near future and move towards launching cyber weapons.