Recovered IS Document Reveal 22,000 Recruits

Leaked ISIS documnets name Jihadi recruits

Documents obtained by German intelligence thought to contain names of 16 Britons, in information stolen in Syria by fighter disillusioned with Islamic State.

The documents allegedly contain details of 16 British fighters, four from the US and six from Canada, as well as recruits from France and Germany.

More than a dozen Britons and a handful of Americans are among Islamic State fighters reportedly named in a cache of 22,000 documents obtained by German intelligence.

Britons identified in the documents so far had previously been revealed to the public and are dead, killed in US-led strikes, or their whereabouts unknown. Sixteen Britons are thought to be on the list, among them Junaid Hussain and Reyaad Khan.

The documents, thought to be from a border crossing into Syria, are questionnaires of each would-be recruit. There are 23 questions, including names, date and place of birth, hometown, telephone number, education and blood type.

Germany’s interior minister, Thomas de Maizière, confirmed the documents were real and they would facilitate “speedier, clearer investigations and stricter prison sentences” for those returning from Syria and Iraq. De Maizière said the materials help clarify “the underlying structures of this terrorist organisation”.

A spokesperson for the BKA, the German federal police, confirmed that the agency was in possession of the cache of documents, adding that experts determined their authenticity. German officials did not specify how the agency had got the documents, nor how many names had been found within them.

German media reported that the questionnaire asked would-be Isis recruits about any previous experience they had in jihad and whether they were prepared to be suicide bombers.

The existence of the documents was revealed by the Munich-based Süddeutsche Zeitung paper and German broadcasters WDR and NDR. Zaman al-Wasl, a pro-opposition Syrian news website, published examples of the questionnaires recently.

Sky News claimed that it too has obtained copies of what appeared to be the same documents, containing about 22,000 names. It said the they were passed on a memory stick stolen from Isis internal security police by a former Free Syrian Army convert who later became disillusioned with Isis.

The documents held by the German authorities seem to have been collected at the end of 2013. Even the lowest estimate of the numbers that crossed the border in that period indicates the sheer scale of volunteers to Isis. The documents will be useful to intelligence agencies in confirming names and details of people suspected of joining Isis. However, it was reported that there are names not previously known to the intelligence services.

Zaman al-Wasl reported that personal details of 1,736 fighters from 40 countries had been revealed, a quarter were Saudis and the rest predominantly Tunisian, Moroccan and Egyptian.

The documents, written in Arabic and stamped with logos used by Isis, allegedly contain details of 16 British fighters, four from the US and six from Canada, as well as recruits from France and Germany. Intelligence agencies have estimated that about 700 Britons have joined Isis.

Guardian: http://bit.ly/1QMtOeK

« Google's AI Machine To Battle 'Go' Champion
Who Is Winning The Cyber War? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

TeskaLabs

TeskaLabs

TeskaLabs is a software vendor of cybersecurity and data privacy products.

First Point Group (FPG)

First Point Group (FPG)

First Point Group provide a global technological recruitment service worldwide. Within that we have a specialist team of Cyber Security recruiters.

Nihon Cyber Defense

Nihon Cyber Defense

Nihon Cyber Defence’s mission is to provide robust solutions, services and support to governments, corporates and organisations in order to protect them from all forms of cyber warfare.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

LogMeIn

LogMeIn

LogMeIn makes it possible for millions of people and businesses around the globe to do their best work simply and securely—on any device, from any location and at any time.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

Aikido Technology Services

Aikido Technology Services

Aikido Technology Services is a leading-edge technology solutions provider, servicing the Pacific North West USA. We offer affordable IT solutions designed to streamline and secure your business.

CV-Library

CV-Library

Start your job search with 216,931 live UK vacancies on award-winning CV-Library. Register your CV and find local jobs near you today!

Innov8tif

Innov8tif

Innov8tif is an AI company specialised in providing ID assurance solutions — helping digital businesses to prevent frauds by verifying and authenticating customers identity.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.