ISIS, The Pentagon & The Lone Wolf Syndrome

As the counter-terrorism battle moves online, DARPA (Defense Advanced Research Projects Agency) seeks to track how ISIS spreads its ideas, and how well US ripostes are working.

Multiple motivations may have been at play in the Orlando killer’s attack at the Pulse night club in Orlando. While it is possible to overstate the influence of the Islamic State, it is impossible to ignore ISIS messaging as at least one contributing factor. President Obama has said that the killer “appears to have absorbed” messages from ISIS, whose propaganda, “videos, their postings are pervasive and more easily accessible than we want.” 

And if we go back in recent history to Al Qaeda – Bin Laden said… 

“It is obvious that the media war in this century is one of the strongest methods: in fact, it will be 90% of the preparations for the battles to come”

“Even if Osama Bin Laden is captured or killed, the uprising has started, praise be to Allah.”

If the online world is part of the battlefield, a new Pentagon program is building tools to evaluate how the battle is going.

“From phony news on Web sites to terrorist propaganda on social media to recruitment videos posted by extremists, conflict in the information domain is becoming a ubiquitous addition to traditional battlespaces. Given the pace of growth in social media and other networked communications, this bustling domain of words and images, once relegated to the sidelines of strategic planning, is poised to become ever more critical to national security and military success around the globe,” reads the program description for the Quantitative Crisis Response, or QCR, from the Defense Advanced Research Projects Agency, or DARPA. 

DARPA posted the program description this week, several days after Michael Lumpkin, director of the State Department’s Global Engagement Center, or GEC, revealed the program in an interview with Defense One.  

“Many tools are available today to reveal whether rockets and bombs hit their targets or otherwise achieved their tactical goals. But no such tools are available to rigorously assess the effects of the volleys of information that are traded through social media and other communications channels,” reads the description.

The new program seeks to develop “automated digital tools that can help operational partners better understand how information is being used by adversaries and to quantitatively predict and assess—in real time and at scale—the effects of those campaigns and of countermeasures.”

In other words, it seeks to better understand how information propaganda from groups like ISIS is working, as well as the effectiveness of counter responses.

The program’s director is Wade Shen, a former associate group leader in the Human Language Technology Group at MIT’s Lincoln Laboratory, where he worked on ways to distinguish one person’s language patterns from another. At DARPA, he’s served as a program manager for the MEMEx program, a search engine for the Dark Web.  

The problem of individuals “absorbing” Islamic state propaganda and engaging in lone-wolf attacks appears to be growing. On May 21, ISIS spokesperson Abu Muhammad al-Adnani issued an audio recording urging followers across the globe to attack civilian targets in the West.

“Let it be known to you that [spilling] the blood [of people living] in the country of the crusaders and combatants is not forbidden. There is no such thing as innocents” there, he said, according to a translation provided by the Middle East Media Research Institute.

On June 13, the Congressional Research Service published a report on Islamic State radicalization. They found that five of 13 violent Muslim-extremist attacks that have occurred in the United States since 9/11 were related to ISIS.  

“It does not appear that any of the suspects in either the five IS-inspired attacks or the eight others had sustained, substantive, in-person contact with foreign terrorist organizations. In essence, these attacks involved do-it-yourself—DIY—terrorists. Largely isolated from the operational support of terrorist organizations, they acquired violent skills (however rudimentary) by themselves or relied on abilities that they had developed prior to becoming violent jihadists,” the CRS report said.

Some of these attacks, such as the San Bernardino and Orlando massacres, made international headlines. Others were less widely reported. On Jan. 7, Edward Archer shot a police officer in Philadelphia and then pledged allegiance to the Islamic State. Last November, University of California student Faisal Mohammad stabbed a fellow student; five months later, “the FBI announced that its investigation of the incident uncovered evidence that Mohammad may have been inspired by Islamic State propaganda,” the CRS report said.

The evolution of ISIS cyberwar

British militant and hacker Junaid Hussain aka Abu Hussain Al Britani was believed to be the driving force behind IS's cyber and social media growth and strategies. The hacker who went by online pseudonym "TriCk" was the founding member of a relatively unknown hacktivist group called "TeaMpOisoN" before he graduated to becoming one of the most prominent members and recruiters for IS.

"The series of forums, communication channels, and appropriated cyber defensive instructional materials, referred to as the 'ISIS help desk', was devised under his suggestion. Even though he was not a key member of the leadership, Hussain's contribution to the cyber capabilities of the terrorist organisation made him the third most valuable target in IS," ICIT explains.

ISIS as a cyber threat

"The success of the Isis propaganda campaign is influencing how other groups use the internet. In much the same manner that newspapers' popularity declined in favour of online media, static propaganda publications are declining in favour of robust, dynamic multiplatform campaigns," ICIT stated.

DefenseOne

IBTimes

 

« The Future Of Policing In The Digital Age
Intelligent Robots And Automation Encroaching On All Industry Sectors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

Cyber Exec

Cyber Exec

Cyber Exec is an executive search firm dedicated to global talent acquisition in Cyber Security, Information Technology, Defense...

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

Deductive Labs

Deductive Labs

Deductive Labs consulting services help customers with their technology, security and automation challenges.

MSG Systems

MSG Systems

MSG are committed to intelligent IT and industry solutions and offer independent consulting on all aspects of information security.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

Teramind

Teramind

Teramind provides a user-centric security approach to monitor employee behavior in order to identify suspicious activity, detect possible threats, monitor efficiency, and ensure industry compliance.

Auxilium Cyber Security

Auxilium Cyber Security

Auxilium Cyber Security is independent information security consultancy company.

Octiga

Octiga

Octiga is an office 365 cloud security provider. It offers Office 365 monitoring, incident response and recovery tools.

Kriptos

Kriptos

Kriptos helps businesses improve their cybersecurity, risk, and compliance strategies by locating critical information through a technology that automatically classifies and labels documents using AI.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

Twilio

Twilio

Twilio are the customer layer for the internet, powering the most engaging interactions companies build for their customers. We provide simple tools that solve hard problems.