Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night

As terror groups increasingly use the internet to recruit, inspire and direct sympathizers to conduct physical and cyberattacks around the world, the US capital is becoming a more frequent target.

A Kosovo native was sentenced by a court in Northern Virginia recently for hacking into a “protected” computer, extracting and providing more than 1,300 names of government and military personnel directly to the Islamic State of Iraq and the Levant (ISIL) terror group.

The Washington Field Office of the FBI played a key role in finding Ferizi by plunging into the murky depths of the dark web and hunting him down. “No matter how a person supports a terrorist group like ISIL, whether on the battlefield or in the cyber world, the FBI will identify, disrupt and bring them to justice for placing lives at risk,” said Paul Abbate, assistant director in charge of the Washington Field Office of the FBI.  

As terror groups increasingly use the internet to recruit, inspire and direct sympathizers to conduct physical and cyberattacks around the world, the US capital is becoming a more frequent target. (photo: Washington DC Capitol) 

Two days before Ferizi’s sentencing, Abbate said, “We’re certainly aware that this area has been a target and these groups have called for attacks. This is nothing new to us. Threats have been persistent and consistent, but we’re on guard not only here but everywhere.” 

The threat is intensified by the cloak of darkness the internet and encrypted social media applications provide for silver-tongued terrorists who are able to talk sympathizers such as Ferizi into action.

And even though they operate a robust, broad and meticulous counterterrorism program, Abbate and his team worry about missing something or someone. “The unknown is what keeps me up at night,” Abbate said.

The seemingly unending stream of terrorism developments that could affect the region keep him and his team busy at all hours of the day and night.

“We have an existing set of cases and investigations that are ongoing, particularly in our counterterrorism division, but our biggest concern is what’s out there that we don’t know about yet,” Abbate said.

The speed of world events and evolving mobile communications, both driven by technological advances, appear to be assisting terror groups in increasing their targeting, plotting and launching of attacks. 

Even though there have been no successful terror attacks in the DC region since the 9/11 attacks, the number of terrorism cases appears to be increasing in the region, says Dana Boente, US attorney for the Eastern District of Virginia. 

“I believe we’re somewhere in the neighborhood of 15 or 16 cases in the last two years,” said Boente. “Busier or more than normal” is how he characterized the stream of cases his office and WFO have worked this year.

At least eight terrorism cases have been brought in the region since January. Clandestine online activity by terrorists has played a significant role in most of them. The challenge ahead, according to Abbate, is adjusting to the shift in tactics by terror groups. “When we look at terrorist organizations and criminal groups like ISIL operating out there, attempting to spread their message, attempting to recruit and radicalized individuals online, we go into that world with our personnel,” Abbate said.

Without elaborating on sensitive details regarding how they track terrorists online, Abbate said they apply, “traditional investigative techniques that we’ve used throughout history in our organization and in law enforcement.”

The adaptation of social media applications for terrorist purposes “is really has been a game-changer — especially when combined with smartphones,” said Scott Stewart, vice president of tactical analysis at Stratfor, a strategic intelligence firm.

Stewart said social media has proven far more effective for terrorist activity than just using websites, as was the case decades ago.

“I believe this is because of the greater sense of community and connectedness that social media creates,” Stewart said. “Also, unlike early internet sites that you had to access via a computer, social media apps on a smartphone are mobile and go with the person wherever they are, thus enhancing the feeling of community and of always being connected to it.” Abbate added: “It’s critical, particularly with the spread of technology and the rapid dissemination of information through the news media, that we stay up on that, so we can move information at the same speed to get out in front of threats and to stop them before they occur.”

The FBI’s Joint Terrorism Task Force is its central component to fighting all forms terrorism. “The keys,” said Abbate, “as always are the partnerships, the collaboration, the coordination, the information sharing with a wide range of partners both here in D.C., in the US and overseas as well.”

The Joint Terrorism Task Force has about 4,000 members from more than 500 state and local agencies, as well as 55 federal agencies operating around the country. The task force includes a fusion of local, state and federal agencies acting as an integrated force to combat terrorism on a national and international scale.

WTOP

 

« In New Zealand, Hacking Is A Serious Business
How Easy Would It Be To Hack Your Business? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perforce Software

Perforce Software

Perforce helps companies build complex software products more collaboratively, securely, and efficiently.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

Inavate Consulting

Inavate Consulting

Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Cognyte

Cognyte

Cognyte are a market leader in security analytics software that empowers governments and enterprises with Actionable Intelligence for a safer world.

Apptega

Apptega

Apptega is an award-Winning Cybersecurity and Compliance Platform. Our mission is to make cybersecurity and compliance easy for everyone.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

Heartland Business Systems (HBS)

Heartland Business Systems (HBS)

Heartland Business Systems serves commercial, public sector and small to medium business with results-driven and dedicated information technology services.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

Apex

Apex

We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built for the new AI era and are creating capabilities to safely enable AI.