ISIS, The Pentagon & The Lone Wolf Syndrome

As the counter-terrorism battle moves online, DARPA (Defense Advanced Research Projects Agency) seeks to track how ISIS spreads its ideas, and how well US ripostes are working.

Multiple motivations may have been at play in the Orlando killer’s attack at the Pulse night club in Orlando. While it is possible to overstate the influence of the Islamic State, it is impossible to ignore ISIS messaging as at least one contributing factor. President Obama has said that the killer “appears to have absorbed” messages from ISIS, whose propaganda, “videos, their postings are pervasive and more easily accessible than we want.” 

And if we go back in recent history to Al Qaeda – Bin Laden said… 

“It is obvious that the media war in this century is one of the strongest methods: in fact, it will be 90% of the preparations for the battles to come”

“Even if Osama Bin Laden is captured or killed, the uprising has started, praise be to Allah.”

If the online world is part of the battlefield, a new Pentagon program is building tools to evaluate how the battle is going.

“From phony news on Web sites to terrorist propaganda on social media to recruitment videos posted by extremists, conflict in the information domain is becoming a ubiquitous addition to traditional battlespaces. Given the pace of growth in social media and other networked communications, this bustling domain of words and images, once relegated to the sidelines of strategic planning, is poised to become ever more critical to national security and military success around the globe,” reads the program description for the Quantitative Crisis Response, or QCR, from the Defense Advanced Research Projects Agency, or DARPA. 

DARPA posted the program description this week, several days after Michael Lumpkin, director of the State Department’s Global Engagement Center, or GEC, revealed the program in an interview with Defense One.  

“Many tools are available today to reveal whether rockets and bombs hit their targets or otherwise achieved their tactical goals. But no such tools are available to rigorously assess the effects of the volleys of information that are traded through social media and other communications channels,” reads the description.

The new program seeks to develop “automated digital tools that can help operational partners better understand how information is being used by adversaries and to quantitatively predict and assess—in real time and at scale—the effects of those campaigns and of countermeasures.”

In other words, it seeks to better understand how information propaganda from groups like ISIS is working, as well as the effectiveness of counter responses.

The program’s director is Wade Shen, a former associate group leader in the Human Language Technology Group at MIT’s Lincoln Laboratory, where he worked on ways to distinguish one person’s language patterns from another. At DARPA, he’s served as a program manager for the MEMEx program, a search engine for the Dark Web.  

The problem of individuals “absorbing” Islamic state propaganda and engaging in lone-wolf attacks appears to be growing. On May 21, ISIS spokesperson Abu Muhammad al-Adnani issued an audio recording urging followers across the globe to attack civilian targets in the West.

“Let it be known to you that [spilling] the blood [of people living] in the country of the crusaders and combatants is not forbidden. There is no such thing as innocents” there, he said, according to a translation provided by the Middle East Media Research Institute.

On June 13, the Congressional Research Service published a report on Islamic State radicalization. They found that five of 13 violent Muslim-extremist attacks that have occurred in the United States since 9/11 were related to ISIS.  

“It does not appear that any of the suspects in either the five IS-inspired attacks or the eight others had sustained, substantive, in-person contact with foreign terrorist organizations. In essence, these attacks involved do-it-yourself—DIY—terrorists. Largely isolated from the operational support of terrorist organizations, they acquired violent skills (however rudimentary) by themselves or relied on abilities that they had developed prior to becoming violent jihadists,” the CRS report said.

Some of these attacks, such as the San Bernardino and Orlando massacres, made international headlines. Others were less widely reported. On Jan. 7, Edward Archer shot a police officer in Philadelphia and then pledged allegiance to the Islamic State. Last November, University of California student Faisal Mohammad stabbed a fellow student; five months later, “the FBI announced that its investigation of the incident uncovered evidence that Mohammad may have been inspired by Islamic State propaganda,” the CRS report said.

The evolution of ISIS cyberwar

British militant and hacker Junaid Hussain aka Abu Hussain Al Britani was believed to be the driving force behind IS's cyber and social media growth and strategies. The hacker who went by online pseudonym "TriCk" was the founding member of a relatively unknown hacktivist group called "TeaMpOisoN" before he graduated to becoming one of the most prominent members and recruiters for IS.

"The series of forums, communication channels, and appropriated cyber defensive instructional materials, referred to as the 'ISIS help desk', was devised under his suggestion. Even though he was not a key member of the leadership, Hussain's contribution to the cyber capabilities of the terrorist organisation made him the third most valuable target in IS," ICIT explains.

ISIS as a cyber threat

"The success of the Isis propaganda campaign is influencing how other groups use the internet. In much the same manner that newspapers' popularity declined in favour of online media, static propaganda publications are declining in favour of robust, dynamic multiplatform campaigns," ICIT stated.

DefenseOne

IBTimes

 

« The Future Of Policing In The Digital Age
Intelligent Robots And Automation Encroaching On All Industry Sectors »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Infineon Technologies

Infineon Technologies

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

Qatar Computing Research Institute (QCRI)

Qatar Computing Research Institute (QCRI)

QCRI perform cutting-edge research in such areas as Arabic language technologies, social computing, data analytics, distributed systems, cyber security and computational science and engineering.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

CyberSure

CyberSure

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

O'Reilly Media

O'Reilly Media

O’Reilly’s help professionals learn best practices and discover emerging trends that will shape the future of the tech industry.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

Trickest

Trickest

Trickest enables Enterprises, MSSPs, and Ethical Hackers to build automated offensive security workflows from prototype to production.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.