Recovered IS Document Reveal 22,000 Recruits

Leaked ISIS documnets name Jihadi recruits

Documents obtained by German intelligence thought to contain names of 16 Britons, in information stolen in Syria by fighter disillusioned with Islamic State.

The documents allegedly contain details of 16 British fighters, four from the US and six from Canada, as well as recruits from France and Germany.

More than a dozen Britons and a handful of Americans are among Islamic State fighters reportedly named in a cache of 22,000 documents obtained by German intelligence.

Britons identified in the documents so far had previously been revealed to the public and are dead, killed in US-led strikes, or their whereabouts unknown. Sixteen Britons are thought to be on the list, among them Junaid Hussain and Reyaad Khan.

The documents, thought to be from a border crossing into Syria, are questionnaires of each would-be recruit. There are 23 questions, including names, date and place of birth, hometown, telephone number, education and blood type.

Germany’s interior minister, Thomas de Maizière, confirmed the documents were real and they would facilitate “speedier, clearer investigations and stricter prison sentences” for those returning from Syria and Iraq. De Maizière said the materials help clarify “the underlying structures of this terrorist organisation”.

A spokesperson for the BKA, the German federal police, confirmed that the agency was in possession of the cache of documents, adding that experts determined their authenticity. German officials did not specify how the agency had got the documents, nor how many names had been found within them.

German media reported that the questionnaire asked would-be Isis recruits about any previous experience they had in jihad and whether they were prepared to be suicide bombers.

The existence of the documents was revealed by the Munich-based Süddeutsche Zeitung paper and German broadcasters WDR and NDR. Zaman al-Wasl, a pro-opposition Syrian news website, published examples of the questionnaires recently.

Sky News claimed that it too has obtained copies of what appeared to be the same documents, containing about 22,000 names. It said the they were passed on a memory stick stolen from Isis internal security police by a former Free Syrian Army convert who later became disillusioned with Isis.

The documents held by the German authorities seem to have been collected at the end of 2013. Even the lowest estimate of the numbers that crossed the border in that period indicates the sheer scale of volunteers to Isis. The documents will be useful to intelligence agencies in confirming names and details of people suspected of joining Isis. However, it was reported that there are names not previously known to the intelligence services.

Zaman al-Wasl reported that personal details of 1,736 fighters from 40 countries had been revealed, a quarter were Saudis and the rest predominantly Tunisian, Moroccan and Egyptian.

The documents, written in Arabic and stamped with logos used by Isis, allegedly contain details of 16 British fighters, four from the US and six from Canada, as well as recruits from France and Germany. Intelligence agencies have estimated that about 700 Britons have joined Isis.

Guardian: http://bit.ly/1QMtOeK

« Google's AI Machine To Battle 'Go' Champion
Who Is Winning The Cyber War? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

Business Intelligence Associates (BIA)

Business Intelligence Associates (BIA)

BIA's TotalDiscovery is a defensible and cost-effective corporate preservation and legal compliance software solution.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Bulletproof Cyber

Bulletproof Cyber

Bulletproof offer a range of security services, from penetration testing and vulnerability assessments to 24/7 security monitoring, and consultancy.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

Anect

Anect

Anect is a leading provider of ICT security and services for hybrid and cloud solutions.

Mitre ATT&CK

Mitre ATT&CK

MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Corelight

Corelight

Corelight is the most powerful network visibility solution for information security professionals.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

MAUSHIELD

MAUSHIELD

MAUSHIELD is the national platform for sharing cyber threat information and intelligence that can help organisations to improve their cybersecurity posture, minimize risks and prevent cyber-attacks.

Nexer

Nexer

Nexer is a modern tech company with expertise in strategy, technology and communication with a strong vision.

Blackwell Security

Blackwell Security

Blackwell is a driving force in healthcare cybersecurity, transforming how security operations are conducted within this critical sector.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.