Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night

As terror groups increasingly use the internet to recruit, inspire and direct sympathizers to conduct physical and cyberattacks around the world, the US capital is becoming a more frequent target.

A Kosovo native was sentenced by a court in Northern Virginia recently for hacking into a “protected” computer, extracting and providing more than 1,300 names of government and military personnel directly to the Islamic State of Iraq and the Levant (ISIL) terror group.

The Washington Field Office of the FBI played a key role in finding Ferizi by plunging into the murky depths of the dark web and hunting him down. “No matter how a person supports a terrorist group like ISIL, whether on the battlefield or in the cyber world, the FBI will identify, disrupt and bring them to justice for placing lives at risk,” said Paul Abbate, assistant director in charge of the Washington Field Office of the FBI.  

As terror groups increasingly use the internet to recruit, inspire and direct sympathizers to conduct physical and cyberattacks around the world, the US capital is becoming a more frequent target. (photo: Washington DC Capitol) 

Two days before Ferizi’s sentencing, Abbate said, “We’re certainly aware that this area has been a target and these groups have called for attacks. This is nothing new to us. Threats have been persistent and consistent, but we’re on guard not only here but everywhere.” 

The threat is intensified by the cloak of darkness the internet and encrypted social media applications provide for silver-tongued terrorists who are able to talk sympathizers such as Ferizi into action.

And even though they operate a robust, broad and meticulous counterterrorism program, Abbate and his team worry about missing something or someone. “The unknown is what keeps me up at night,” Abbate said.

The seemingly unending stream of terrorism developments that could affect the region keep him and his team busy at all hours of the day and night.

“We have an existing set of cases and investigations that are ongoing, particularly in our counterterrorism division, but our biggest concern is what’s out there that we don’t know about yet,” Abbate said.

The speed of world events and evolving mobile communications, both driven by technological advances, appear to be assisting terror groups in increasing their targeting, plotting and launching of attacks. 

Even though there have been no successful terror attacks in the DC region since the 9/11 attacks, the number of terrorism cases appears to be increasing in the region, says Dana Boente, US attorney for the Eastern District of Virginia. 

“I believe we’re somewhere in the neighborhood of 15 or 16 cases in the last two years,” said Boente. “Busier or more than normal” is how he characterized the stream of cases his office and WFO have worked this year.

At least eight terrorism cases have been brought in the region since January. Clandestine online activity by terrorists has played a significant role in most of them. The challenge ahead, according to Abbate, is adjusting to the shift in tactics by terror groups. “When we look at terrorist organizations and criminal groups like ISIL operating out there, attempting to spread their message, attempting to recruit and radicalized individuals online, we go into that world with our personnel,” Abbate said.

Without elaborating on sensitive details regarding how they track terrorists online, Abbate said they apply, “traditional investigative techniques that we’ve used throughout history in our organization and in law enforcement.”

The adaptation of social media applications for terrorist purposes “is really has been a game-changer — especially when combined with smartphones,” said Scott Stewart, vice president of tactical analysis at Stratfor, a strategic intelligence firm.

Stewart said social media has proven far more effective for terrorist activity than just using websites, as was the case decades ago.

“I believe this is because of the greater sense of community and connectedness that social media creates,” Stewart said. “Also, unlike early internet sites that you had to access via a computer, social media apps on a smartphone are mobile and go with the person wherever they are, thus enhancing the feeling of community and of always being connected to it.” Abbate added: “It’s critical, particularly with the spread of technology and the rapid dissemination of information through the news media, that we stay up on that, so we can move information at the same speed to get out in front of threats and to stop them before they occur.”

The FBI’s Joint Terrorism Task Force is its central component to fighting all forms terrorism. “The keys,” said Abbate, “as always are the partnerships, the collaboration, the coordination, the information sharing with a wide range of partners both here in D.C., in the US and overseas as well.”

The Joint Terrorism Task Force has about 4,000 members from more than 500 state and local agencies, as well as 55 federal agencies operating around the country. The task force includes a fusion of local, state and federal agencies acting as an integrated force to combat terrorism on a national and international scale.

WTOP

 

« In New Zealand, Hacking Is A Serious Business
How Easy Would It Be To Hack Your Business? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

SilverSky

SilverSky

SilverSky offers a comprehensive suite of products and services that deliver unprecedented simplicity and expertise for compliance and cybersecurity programs.

Futurae Technologies

Futurae Technologies

Futurae - enabling trust and invisible security for your users on all devices and applications. Strong customer authentication (SCA) made easy.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Path Forward IT

Path Forward IT

Path Forward IT has been troubleshooting, architecting, migrating, protecting, and securing IT environments for businesses across the USA since 2002.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

Cytek

Cytek

Cytek is a leading provider of cybersecurity and HIPAA compliance for dental practices and other industries.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.

StepSecurity

StepSecurity

StepSecurity provides a comprehensive security platform for GitHub Actions.