Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night

As terror groups increasingly use the internet to recruit, inspire and direct sympathizers to conduct physical and cyberattacks around the world, the US capital is becoming a more frequent target.

A Kosovo native was sentenced by a court in Northern Virginia recently for hacking into a “protected” computer, extracting and providing more than 1,300 names of government and military personnel directly to the Islamic State of Iraq and the Levant (ISIL) terror group.

The Washington Field Office of the FBI played a key role in finding Ferizi by plunging into the murky depths of the dark web and hunting him down. “No matter how a person supports a terrorist group like ISIL, whether on the battlefield or in the cyber world, the FBI will identify, disrupt and bring them to justice for placing lives at risk,” said Paul Abbate, assistant director in charge of the Washington Field Office of the FBI.  

As terror groups increasingly use the internet to recruit, inspire and direct sympathizers to conduct physical and cyberattacks around the world, the US capital is becoming a more frequent target. (photo: Washington DC Capitol) 

Two days before Ferizi’s sentencing, Abbate said, “We’re certainly aware that this area has been a target and these groups have called for attacks. This is nothing new to us. Threats have been persistent and consistent, but we’re on guard not only here but everywhere.” 

The threat is intensified by the cloak of darkness the internet and encrypted social media applications provide for silver-tongued terrorists who are able to talk sympathizers such as Ferizi into action.

And even though they operate a robust, broad and meticulous counterterrorism program, Abbate and his team worry about missing something or someone. “The unknown is what keeps me up at night,” Abbate said.

The seemingly unending stream of terrorism developments that could affect the region keep him and his team busy at all hours of the day and night.

“We have an existing set of cases and investigations that are ongoing, particularly in our counterterrorism division, but our biggest concern is what’s out there that we don’t know about yet,” Abbate said.

The speed of world events and evolving mobile communications, both driven by technological advances, appear to be assisting terror groups in increasing their targeting, plotting and launching of attacks. 

Even though there have been no successful terror attacks in the DC region since the 9/11 attacks, the number of terrorism cases appears to be increasing in the region, says Dana Boente, US attorney for the Eastern District of Virginia. 

“I believe we’re somewhere in the neighborhood of 15 or 16 cases in the last two years,” said Boente. “Busier or more than normal” is how he characterized the stream of cases his office and WFO have worked this year.

At least eight terrorism cases have been brought in the region since January. Clandestine online activity by terrorists has played a significant role in most of them. The challenge ahead, according to Abbate, is adjusting to the shift in tactics by terror groups. “When we look at terrorist organizations and criminal groups like ISIL operating out there, attempting to spread their message, attempting to recruit and radicalized individuals online, we go into that world with our personnel,” Abbate said.

Without elaborating on sensitive details regarding how they track terrorists online, Abbate said they apply, “traditional investigative techniques that we’ve used throughout history in our organization and in law enforcement.”

The adaptation of social media applications for terrorist purposes “is really has been a game-changer — especially when combined with smartphones,” said Scott Stewart, vice president of tactical analysis at Stratfor, a strategic intelligence firm.

Stewart said social media has proven far more effective for terrorist activity than just using websites, as was the case decades ago.

“I believe this is because of the greater sense of community and connectedness that social media creates,” Stewart said. “Also, unlike early internet sites that you had to access via a computer, social media apps on a smartphone are mobile and go with the person wherever they are, thus enhancing the feeling of community and of always being connected to it.” Abbate added: “It’s critical, particularly with the spread of technology and the rapid dissemination of information through the news media, that we stay up on that, so we can move information at the same speed to get out in front of threats and to stop them before they occur.”

The FBI’s Joint Terrorism Task Force is its central component to fighting all forms terrorism. “The keys,” said Abbate, “as always are the partnerships, the collaboration, the coordination, the information sharing with a wide range of partners both here in D.C., in the US and overseas as well.”

The Joint Terrorism Task Force has about 4,000 members from more than 500 state and local agencies, as well as 55 federal agencies operating around the country. The task force includes a fusion of local, state and federal agencies acting as an integrated force to combat terrorism on a national and international scale.

WTOP

 

« In New Zealand, Hacking Is A Serious Business
How Easy Would It Be To Hack Your Business? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

AirCUVE

AirCUVE

AirCUVE provide authentication and access control solutions for networks and mobile security.

Deductive Labs

Deductive Labs

Deductive Labs consulting services help customers with their technology, security and automation challenges.

World Wide Technology (WWT)

World Wide Technology (WWT)

WWT is a technology solution provider in the areas of big data, collaboration, computing and cloud, mobility, networking, security and storage.

FinlayJames

FinlayJames

FinlayJames supports cyber security companies to meet the increasing demand and pressure on them by finding top talent within the industry for their sales, marketing and technical teams.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Zero Networks

Zero Networks

With Zero Network, you can achieve affordable, airtight network access security at scale.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

Integrity

Integrity

Integrity is a PCI QSA and ISO 27001 certified company specialized in Information Security and IT Consulting.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Psybersafe

Psybersafe

Psybersafe is a hands-on, behaviour-changing training system that keeps your people and your business cyber safe.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Fernao Group

Fernao Group

Fernao offer you all solutions from a single source - from cyber security, business resilience and digital infrastructure to cloud technologies and pentesting.