ISIS, The Pentagon & The Lone Wolf Syndrome

As the counter-terrorism battle moves online, DARPA (Defense Advanced Research Projects Agency) seeks to track how ISIS spreads its ideas, and how well US ripostes are working.

Multiple motivations may have been at play in the Orlando killer’s attack at the Pulse night club in Orlando. While it is possible to overstate the influence of the Islamic State, it is impossible to ignore ISIS messaging as at least one contributing factor. President Obama has said that the killer “appears to have absorbed” messages from ISIS, whose propaganda, “videos, their postings are pervasive and more easily accessible than we want.” 

And if we go back in recent history to Al Qaeda – Bin Laden said… 

“It is obvious that the media war in this century is one of the strongest methods: in fact, it will be 90% of the preparations for the battles to come”

“Even if Osama Bin Laden is captured or killed, the uprising has started, praise be to Allah.”

If the online world is part of the battlefield, a new Pentagon program is building tools to evaluate how the battle is going.

“From phony news on Web sites to terrorist propaganda on social media to recruitment videos posted by extremists, conflict in the information domain is becoming a ubiquitous addition to traditional battlespaces. Given the pace of growth in social media and other networked communications, this bustling domain of words and images, once relegated to the sidelines of strategic planning, is poised to become ever more critical to national security and military success around the globe,” reads the program description for the Quantitative Crisis Response, or QCR, from the Defense Advanced Research Projects Agency, or DARPA. 

DARPA posted the program description this week, several days after Michael Lumpkin, director of the State Department’s Global Engagement Center, or GEC, revealed the program in an interview with Defense One.  

“Many tools are available today to reveal whether rockets and bombs hit their targets or otherwise achieved their tactical goals. But no such tools are available to rigorously assess the effects of the volleys of information that are traded through social media and other communications channels,” reads the description.

The new program seeks to develop “automated digital tools that can help operational partners better understand how information is being used by adversaries and to quantitatively predict and assess—in real time and at scale—the effects of those campaigns and of countermeasures.”

In other words, it seeks to better understand how information propaganda from groups like ISIS is working, as well as the effectiveness of counter responses.

The program’s director is Wade Shen, a former associate group leader in the Human Language Technology Group at MIT’s Lincoln Laboratory, where he worked on ways to distinguish one person’s language patterns from another. At DARPA, he’s served as a program manager for the MEMEx program, a search engine for the Dark Web.  

The problem of individuals “absorbing” Islamic state propaganda and engaging in lone-wolf attacks appears to be growing. On May 21, ISIS spokesperson Abu Muhammad al-Adnani issued an audio recording urging followers across the globe to attack civilian targets in the West.

“Let it be known to you that [spilling] the blood [of people living] in the country of the crusaders and combatants is not forbidden. There is no such thing as innocents” there, he said, according to a translation provided by the Middle East Media Research Institute.

On June 13, the Congressional Research Service published a report on Islamic State radicalization. They found that five of 13 violent Muslim-extremist attacks that have occurred in the United States since 9/11 were related to ISIS.  

“It does not appear that any of the suspects in either the five IS-inspired attacks or the eight others had sustained, substantive, in-person contact with foreign terrorist organizations. In essence, these attacks involved do-it-yourself—DIY—terrorists. Largely isolated from the operational support of terrorist organizations, they acquired violent skills (however rudimentary) by themselves or relied on abilities that they had developed prior to becoming violent jihadists,” the CRS report said.

Some of these attacks, such as the San Bernardino and Orlando massacres, made international headlines. Others were less widely reported. On Jan. 7, Edward Archer shot a police officer in Philadelphia and then pledged allegiance to the Islamic State. Last November, University of California student Faisal Mohammad stabbed a fellow student; five months later, “the FBI announced that its investigation of the incident uncovered evidence that Mohammad may have been inspired by Islamic State propaganda,” the CRS report said.

The evolution of ISIS cyberwar

British militant and hacker Junaid Hussain aka Abu Hussain Al Britani was believed to be the driving force behind IS's cyber and social media growth and strategies. The hacker who went by online pseudonym "TriCk" was the founding member of a relatively unknown hacktivist group called "TeaMpOisoN" before he graduated to becoming one of the most prominent members and recruiters for IS.

"The series of forums, communication channels, and appropriated cyber defensive instructional materials, referred to as the 'ISIS help desk', was devised under his suggestion. Even though he was not a key member of the leadership, Hussain's contribution to the cyber capabilities of the terrorist organisation made him the third most valuable target in IS," ICIT explains.

ISIS as a cyber threat

"The success of the Isis propaganda campaign is influencing how other groups use the internet. In much the same manner that newspapers' popularity declined in favour of online media, static propaganda publications are declining in favour of robust, dynamic multiplatform campaigns," ICIT stated.

DefenseOne

IBTimes

 

« The Future Of Policing In The Digital Age
Intelligent Robots And Automation Encroaching On All Industry Sectors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

RU-CERT

RU-CERT

RU-CERT is the CSIRT / CERT team of the Russian Federation.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

Hogan Lovells

Hogan Lovells

Hogan Lovells is an international business law firm with offices across Europe, Asia and the USA. Practice areas include Privacy & Cybersecurity.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

DART Consulting & Training

DART Consulting & Training

DART is a leading cyber training and consultancy company. We enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams.

Zyxel Networks

Zyxel Networks

Zyxel Networks is a leading provider of secure, AI-powered networking solutions for small to medium businesses (SMBs) and the enterprise edge.