GCHQ Jammed ISIS Drones & Servers

British intelligence chiefs have revealed details of an operation to undermine the Jihadi terrorist group ISIS that began in 2016 when a secret cyber operation was launched to reduce the effects of its fighters on the battlefield, which involved disabling drones, jamming mobile phones and targeting computer servers to block online propaganda.

Details emerged  after Jeremy Fleming, director of the signals intelligence agency GCHQ and General Sir Patrick Sanders, head of UK Strategic Command spoke to Sky News when Fleming and Patrick said that Islamist militants relied on cyber technology for propaganda, command and control, and attack planning.

GCHQ first admitted three years ago that it had launched an offensive against Isis, but has not previously given any details about the operation. While the UK and allies such as the US have acknowledged using offensive cyber, the specifics of their attack capabilities remain highly classified. 

Fleming said the joint military and GCHQ team had “disrupted the communication of the Isis fighters on the battlefield” and piloted new technology to undermine Isis drone technology. He also said the UK had sought to stem the flow of extremist propaganda by “remotely getting to ISIS servers, getting to the places that they stored their material.... we wanted to deceive them and to misdirect them, to make them less effective, less cohesive and sap their morale.”

At the time, Isis was recruiting fighters as it sought to establish a caliphate across large parts of Iraq and Syria. “It was a very cheap and effective way of waging a terrorist warfare,” Sanders explained. “What we wanted to do was to turn that strength, that dependence that they had on the cyber into a vulnerability, and also to undermine the credibility of their information campaign and of their ideology.”

GCHQ first admitted three years ago that it had launched an offensive against Isis, but has not previously given any details about the operation. While the UK and allies such as the US have acknowledged using offensive cyber, the specifics of their attack capabilities remain highly classifiedGCHQ’s cyber tactics were reinforced on the ground by separate military operations involving special forces, the Iraqi military and local resistance groups, although details of these have not been released.

Other nations, including Russia, China, North Korea and Iran have demonstrated their willingness to use these methods.

The operation against ISIS comes to light a few months after the announcement of  the creation of a UK Cyber Force run jointly by the military and spy agencies to tackle adversaries in the digital realm. The team is expected to significantly increase from a few hundred to 3,000 over the next ten years and will build Britain’s offensive cyber capabilities within a combined unit.

While joint cyber operations are already a feature of modern warfare, some critics warn such activities that fall below the threshold of formal conflict risk being shadowy and unaccountable. 

Hathalyoum:         DroneDJ:         PSBE:        Financial Times:       TheNationalNews:      Tech Register:

You Might Also Read: 

Britain Is At Cyber War Every Day:

 

« Cyber Security Is Crucial For Maritime Shipping
Australia Makes Google & Facebook Pay »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

ThreatConnect

ThreatConnect

ThreatConnect is an enterprise threat intelligence platform by Cyber Squared bridging incident response, defense, and threat analysis for InfoSec & DFIR teams.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

Consistec Engineering & Consulting

Consistec Engineering & Consulting

Consistec Engineering & Consulting GmbH is an information technology and services company offering solutions for monitoring the security of IT and OT infrastructure.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

SphereX Technologies

SphereX Technologies

SphereX is the first on-chain security solution for Web3 applications.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

LiveAction

LiveAction

LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network.