GCHQ Jammed ISIS Drones & Servers

British intelligence chiefs have revealed details of an operation to undermine the Jihadi terrorist group ISIS that began in 2016 when a secret cyber operation was launched to reduce the effects of its fighters on the battlefield, which involved disabling drones, jamming mobile phones and targeting computer servers to block online propaganda.

Details emerged  after Jeremy Fleming, director of the signals intelligence agency GCHQ and General Sir Patrick Sanders, head of UK Strategic Command spoke to Sky News when Fleming and Patrick said that Islamist militants relied on cyber technology for propaganda, command and control, and attack planning.

GCHQ first admitted three years ago that it had launched an offensive against Isis, but has not previously given any details about the operation. While the UK and allies such as the US have acknowledged using offensive cyber, the specifics of their attack capabilities remain highly classified. 

Fleming said the joint military and GCHQ team had “disrupted the communication of the Isis fighters on the battlefield” and piloted new technology to undermine Isis drone technology. He also said the UK had sought to stem the flow of extremist propaganda by “remotely getting to ISIS servers, getting to the places that they stored their material.... we wanted to deceive them and to misdirect them, to make them less effective, less cohesive and sap their morale.”

At the time, Isis was recruiting fighters as it sought to establish a caliphate across large parts of Iraq and Syria. “It was a very cheap and effective way of waging a terrorist warfare,” Sanders explained. “What we wanted to do was to turn that strength, that dependence that they had on the cyber into a vulnerability, and also to undermine the credibility of their information campaign and of their ideology.”

GCHQ first admitted three years ago that it had launched an offensive against Isis, but has not previously given any details about the operation. While the UK and allies such as the US have acknowledged using offensive cyber, the specifics of their attack capabilities remain highly classifiedGCHQ’s cyber tactics were reinforced on the ground by separate military operations involving special forces, the Iraqi military and local resistance groups, although details of these have not been released.

Other nations, including Russia, China, North Korea and Iran have demonstrated their willingness to use these methods.

The operation against ISIS comes to light a few months after the announcement of  the creation of a UK Cyber Force run jointly by the military and spy agencies to tackle adversaries in the digital realm. The team is expected to significantly increase from a few hundred to 3,000 over the next ten years and will build Britain’s offensive cyber capabilities within a combined unit.

While joint cyber operations are already a feature of modern warfare, some critics warn such activities that fall below the threshold of formal conflict risk being shadowy and unaccountable. 

Hathalyoum:         DroneDJ:         PSBE:        Financial Times:       TheNationalNews:      Tech Register:

You Might Also Read: 

Britain Is At Cyber War Every Day:

 

« Cyber Security Is Crucial For Maritime Shipping
Australia Makes Google & Facebook Pay »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Globalscape

Globalscape

Globalscape is a leader in secure data exchange solutions.

edgescan

edgescan

edgescan is a cloud-based continuous vulnerability management and penetration testing solution.

Soracom

Soracom

Soracom offers secure, scalable, cloud-native connectivity developed specifically for the Internet of Things.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

MorganFranklin Consulting

MorganFranklin Consulting

MorganFranklin Consulting is a management advisory firm that works with businesses and government to address complex and transformational technology and business objectives including cybersecurity.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

Avrem Technologies

Avrem Technologies

Avrem Technologies is a business IT and cybersecurity consulting firm. We design, implement, manage and monitor the networks, servers, computers and software that our clients rely on each day.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.

HYCU

HYCU

HYCU was born of the need to simplify data protection and provide equivalent levels of backup and recovery support across on premises, public cloud, and SaaS workloads.