Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night

As terror groups increasingly use the internet to recruit, inspire and direct sympathizers to conduct physical and cyberattacks around the world, the US capital is becoming a more frequent target.

A Kosovo native was sentenced by a court in Northern Virginia recently for hacking into a “protected” computer, extracting and providing more than 1,300 names of government and military personnel directly to the Islamic State of Iraq and the Levant (ISIL) terror group.

The Washington Field Office of the FBI played a key role in finding Ferizi by plunging into the murky depths of the dark web and hunting him down. “No matter how a person supports a terrorist group like ISIL, whether on the battlefield or in the cyber world, the FBI will identify, disrupt and bring them to justice for placing lives at risk,” said Paul Abbate, assistant director in charge of the Washington Field Office of the FBI.  

As terror groups increasingly use the internet to recruit, inspire and direct sympathizers to conduct physical and cyberattacks around the world, the US capital is becoming a more frequent target. (photo: Washington DC Capitol) 

Two days before Ferizi’s sentencing, Abbate said, “We’re certainly aware that this area has been a target and these groups have called for attacks. This is nothing new to us. Threats have been persistent and consistent, but we’re on guard not only here but everywhere.” 

The threat is intensified by the cloak of darkness the internet and encrypted social media applications provide for silver-tongued terrorists who are able to talk sympathizers such as Ferizi into action.

And even though they operate a robust, broad and meticulous counterterrorism program, Abbate and his team worry about missing something or someone. “The unknown is what keeps me up at night,” Abbate said.

The seemingly unending stream of terrorism developments that could affect the region keep him and his team busy at all hours of the day and night.

“We have an existing set of cases and investigations that are ongoing, particularly in our counterterrorism division, but our biggest concern is what’s out there that we don’t know about yet,” Abbate said.

The speed of world events and evolving mobile communications, both driven by technological advances, appear to be assisting terror groups in increasing their targeting, plotting and launching of attacks. 

Even though there have been no successful terror attacks in the DC region since the 9/11 attacks, the number of terrorism cases appears to be increasing in the region, says Dana Boente, US attorney for the Eastern District of Virginia. 

“I believe we’re somewhere in the neighborhood of 15 or 16 cases in the last two years,” said Boente. “Busier or more than normal” is how he characterized the stream of cases his office and WFO have worked this year.

At least eight terrorism cases have been brought in the region since January. Clandestine online activity by terrorists has played a significant role in most of them. The challenge ahead, according to Abbate, is adjusting to the shift in tactics by terror groups. “When we look at terrorist organizations and criminal groups like ISIL operating out there, attempting to spread their message, attempting to recruit and radicalized individuals online, we go into that world with our personnel,” Abbate said.

Without elaborating on sensitive details regarding how they track terrorists online, Abbate said they apply, “traditional investigative techniques that we’ve used throughout history in our organization and in law enforcement.”

The adaptation of social media applications for terrorist purposes “is really has been a game-changer — especially when combined with smartphones,” said Scott Stewart, vice president of tactical analysis at Stratfor, a strategic intelligence firm.

Stewart said social media has proven far more effective for terrorist activity than just using websites, as was the case decades ago.

“I believe this is because of the greater sense of community and connectedness that social media creates,” Stewart said. “Also, unlike early internet sites that you had to access via a computer, social media apps on a smartphone are mobile and go with the person wherever they are, thus enhancing the feeling of community and of always being connected to it.” Abbate added: “It’s critical, particularly with the spread of technology and the rapid dissemination of information through the news media, that we stay up on that, so we can move information at the same speed to get out in front of threats and to stop them before they occur.”

The FBI’s Joint Terrorism Task Force is its central component to fighting all forms terrorism. “The keys,” said Abbate, “as always are the partnerships, the collaboration, the coordination, the information sharing with a wide range of partners both here in D.C., in the US and overseas as well.”

The Joint Terrorism Task Force has about 4,000 members from more than 500 state and local agencies, as well as 55 federal agencies operating around the country. The task force includes a fusion of local, state and federal agencies acting as an integrated force to combat terrorism on a national and international scale.

WTOP

 

« In New Zealand, Hacking Is A Serious Business
How Easy Would It Be To Hack Your Business? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer is a global law firm with a track record of successfully supporting the world's leading corporations, financial institutions and governments.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Fyde

Fyde

Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

Readynez

Readynez

Readynez is the digital skills concierge service that helps you ensure your workforce has the tech skills and resources needed to stay ahead of the digital curve.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

Pixee

Pixee

Pixee fixes vulnerabilities, hardens code, squashes bugs, and gives engineers more time to focus on the work that counts.

iTRUSTXForce

iTRUSTXForce

iTRUSTXForce is a global provider of DigitalX (cybersecurity, privacy, and digital trust) services. We offer comprehensive services that focus on delivering outcomes for our clients.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.