GCHQ Jammed ISIS Drones & Servers

British intelligence chiefs have revealed details of an operation to undermine the Jihadi terrorist group ISIS that began in 2016 when a secret cyber operation was launched to reduce the effects of its fighters on the battlefield, which involved disabling drones, jamming mobile phones and targeting computer servers to block online propaganda.

Details emerged  after Jeremy Fleming, director of the signals intelligence agency GCHQ and General Sir Patrick Sanders, head of UK Strategic Command spoke to Sky News when Fleming and Patrick said that Islamist militants relied on cyber technology for propaganda, command and control, and attack planning.

GCHQ first admitted three years ago that it had launched an offensive against Isis, but has not previously given any details about the operation. While the UK and allies such as the US have acknowledged using offensive cyber, the specifics of their attack capabilities remain highly classified. 

Fleming said the joint military and GCHQ team had “disrupted the communication of the Isis fighters on the battlefield” and piloted new technology to undermine Isis drone technology. He also said the UK had sought to stem the flow of extremist propaganda by “remotely getting to ISIS servers, getting to the places that they stored their material.... we wanted to deceive them and to misdirect them, to make them less effective, less cohesive and sap their morale.”

At the time, Isis was recruiting fighters as it sought to establish a caliphate across large parts of Iraq and Syria. “It was a very cheap and effective way of waging a terrorist warfare,” Sanders explained. “What we wanted to do was to turn that strength, that dependence that they had on the cyber into a vulnerability, and also to undermine the credibility of their information campaign and of their ideology.”

GCHQ first admitted three years ago that it had launched an offensive against Isis, but has not previously given any details about the operation. While the UK and allies such as the US have acknowledged using offensive cyber, the specifics of their attack capabilities remain highly classifiedGCHQ’s cyber tactics were reinforced on the ground by separate military operations involving special forces, the Iraqi military and local resistance groups, although details of these have not been released.

Other nations, including Russia, China, North Korea and Iran have demonstrated their willingness to use these methods.

The operation against ISIS comes to light a few months after the announcement of  the creation of a UK Cyber Force run jointly by the military and spy agencies to tackle adversaries in the digital realm. The team is expected to significantly increase from a few hundred to 3,000 over the next ten years and will build Britain’s offensive cyber capabilities within a combined unit.

While joint cyber operations are already a feature of modern warfare, some critics warn such activities that fall below the threshold of formal conflict risk being shadowy and unaccountable. 

Hathalyoum:         DroneDJ:         PSBE:        Financial Times:       TheNationalNews:      Tech Register:

You Might Also Read: 

Britain Is At Cyber War Every Day:

 

« Cyber Security Is Crucial For Maritime Shipping
Australia Makes Google & Facebook Pay »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tendo Solutions

Tendo Solutions

Tendo Solutions provides intelligence, security, forensics and risk solutions to clients across different sectors and jurisdictions.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

Vanguard Integrity Professionals

Vanguard Integrity Professionals

Vanguard Integrity Professionals is an independent provider of enterprise security software solutions that address complex security and regulatory compliance challenges.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

Randori

Randori

Randori is an attack platform that provides "red-teaming" as a service - basically, staging simulated hack attacks to test for vulnerabilities and gaps in the security response.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Silicon Labs

Silicon Labs

Silicon Labs are a leader in secure, intelligent wireless technology for a more connected world. We provide award-winning hardware and software security to help safeguard connected devices.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

Oduma Solutions

Oduma Solutions

Oduma Solutions is a wholly owned Ghanaian Cybersecurity company that offers information security services to organisations seeking to improve their security posture.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

SecuLore

SecuLore

An innovator in public-safety-focused cybersecurity, SecuLore is dedicated to protecting critical infrastructure from cyber attacks.

RedArx Cyber Group

RedArx Cyber Group

At RedArx Cyber Group, our vision is to empower businesses with cutting-edge, proactive security solutions that safeguard their digital landscapes.

SoteriaSec

SoteriaSec

SoteriaSec is a premier cybersecurity firm providing comprehensive digital forensics and incident response services.