Recovered IS Document Reveal 22,000 Recruits

Leaked ISIS documnets name Jihadi recruits

Documents obtained by German intelligence thought to contain names of 16 Britons, in information stolen in Syria by fighter disillusioned with Islamic State.

The documents allegedly contain details of 16 British fighters, four from the US and six from Canada, as well as recruits from France and Germany.

More than a dozen Britons and a handful of Americans are among Islamic State fighters reportedly named in a cache of 22,000 documents obtained by German intelligence.

Britons identified in the documents so far had previously been revealed to the public and are dead, killed in US-led strikes, or their whereabouts unknown. Sixteen Britons are thought to be on the list, among them Junaid Hussain and Reyaad Khan.

The documents, thought to be from a border crossing into Syria, are questionnaires of each would-be recruit. There are 23 questions, including names, date and place of birth, hometown, telephone number, education and blood type.

Germany’s interior minister, Thomas de Maizière, confirmed the documents were real and they would facilitate “speedier, clearer investigations and stricter prison sentences” for those returning from Syria and Iraq. De Maizière said the materials help clarify “the underlying structures of this terrorist organisation”.

A spokesperson for the BKA, the German federal police, confirmed that the agency was in possession of the cache of documents, adding that experts determined their authenticity. German officials did not specify how the agency had got the documents, nor how many names had been found within them.

German media reported that the questionnaire asked would-be Isis recruits about any previous experience they had in jihad and whether they were prepared to be suicide bombers.

The existence of the documents was revealed by the Munich-based Süddeutsche Zeitung paper and German broadcasters WDR and NDR. Zaman al-Wasl, a pro-opposition Syrian news website, published examples of the questionnaires recently.

Sky News claimed that it too has obtained copies of what appeared to be the same documents, containing about 22,000 names. It said the they were passed on a memory stick stolen from Isis internal security police by a former Free Syrian Army convert who later became disillusioned with Isis.

The documents held by the German authorities seem to have been collected at the end of 2013. Even the lowest estimate of the numbers that crossed the border in that period indicates the sheer scale of volunteers to Isis. The documents will be useful to intelligence agencies in confirming names and details of people suspected of joining Isis. However, it was reported that there are names not previously known to the intelligence services.

Zaman al-Wasl reported that personal details of 1,736 fighters from 40 countries had been revealed, a quarter were Saudis and the rest predominantly Tunisian, Moroccan and Egyptian.

The documents, written in Arabic and stamped with logos used by Isis, allegedly contain details of 16 British fighters, four from the US and six from Canada, as well as recruits from France and Germany. Intelligence agencies have estimated that about 700 Britons have joined Isis.

Guardian: http://bit.ly/1QMtOeK

« Google's AI Machine To Battle 'Go' Champion
Who Is Winning The Cyber War? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

British Assessment Bureau

British Assessment Bureau

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

enSilo

enSilo

enSilo secures customers data on premise or in the cloud. Regardless of the where the threat comes from, enSilo can protect your data.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

ShieldIOT

ShieldIOT

ShieldIOT delivers a complete AI-powered security solution across any IoT device, application and network.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

Green Enterprise Solutions

Green Enterprise Solutions

Green Enterprise Solutions are a Namibian company providing Information and Communication Technology (ICT) services to corporate Namibia.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.

FSP

FSP

FSP is a leading consultancy specialising in Digital, Security and AI solutions. We navigate the complexities of data sensitivity, confidentiality, governance and compliance.