ISIS's Threat: A Cyber War Against America

WireAP_a138cf62f9ae473fb3d4df1a260f1e44_16x9_992.jpg

Attorney General Loretta Lynch 

Islamic State (ISIS) poses a direct threat to America, US Attorney General Loretta Lynch said recently, with the greatest danger being the possibility that the terror group develop cyber warfare capabilities.
"Concern that ISIS or any of our foreign enemies might develop that capacity...is the thing that keeps me and many of my colleagues in law enforcement up at night," Lynch told ABC's "This Week" TV show.

Lynch warned that ISIS has "a different model from other terrorist groups," making it difficult to halt its attempts to instigate terror attacks on American soil. The key difference, she said, is that ISIS has over 20,000 English-language Twitter followers. The organization recruits people to attack on their behalf and then takes credit, she said.
"I think that it makes it harder to predict," she said. "I think it makes it harder to determine who's going to succumb to the propaganda."

Lynch also admitted that stopping "lone wolf attacks" is very difficult for federal agents, taking as an example Muhammod Youssuf Abdulazeez's attack in Chattanooga, Tennessee on July 16, in which he murdered five marines.
"That he was not on law enforcement's radar illustrates the concern that we have of individuals who are outside the mainstream, yet tap into these strands of thought or schools of thought that lead them to violence," said Lynch.

While authorities have not publicly announced the motive of Abdulazeez's attack on army sites, his father was a Palestinian Arab who previously was on the US terrorist watch list, and the young Abdulazeez reportedly was "upset" about last summer's war in Gaza.

He also posted cryptic Islamic posts before the attack and previously spent several months in the Middle East.
Republican presidential candidate Senator Ted Cruz (R-TX) condemned the American response to the attack, declaring it a radical Islamic "act of war."
Ein News: http://bit.ly/1UkRWFl

« 3D Xpoint Memory: Faster-than-flash Storage
Machine 2 Machine: Where will that leave us? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

Cyber Academy

Cyber Academy

Cyber Academy is one of the first institutions in the SE Europe region that provides a hands-on program in cyber security, blockchain and AI.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

Kubus Hitam

Kubus Hitam

Kubus Hitam are a research-based company focused on cyber security. we strongly believe that innovation and safety are the two keywords for the future business market.

ELLIO Technology

ELLIO Technology

ELLIO Technology is a cybersecurity company that reduces alert overload, improves incident response, and helps security teams target serious attackers who pose a real threat.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.