Recovered IS Document Reveal 22,000 Recruits

Leaked ISIS documnets name Jihadi recruits

Documents obtained by German intelligence thought to contain names of 16 Britons, in information stolen in Syria by fighter disillusioned with Islamic State.

The documents allegedly contain details of 16 British fighters, four from the US and six from Canada, as well as recruits from France and Germany.

More than a dozen Britons and a handful of Americans are among Islamic State fighters reportedly named in a cache of 22,000 documents obtained by German intelligence.

Britons identified in the documents so far had previously been revealed to the public and are dead, killed in US-led strikes, or their whereabouts unknown. Sixteen Britons are thought to be on the list, among them Junaid Hussain and Reyaad Khan.

The documents, thought to be from a border crossing into Syria, are questionnaires of each would-be recruit. There are 23 questions, including names, date and place of birth, hometown, telephone number, education and blood type.

Germany’s interior minister, Thomas de Maizière, confirmed the documents were real and they would facilitate “speedier, clearer investigations and stricter prison sentences” for those returning from Syria and Iraq. De Maizière said the materials help clarify “the underlying structures of this terrorist organisation”.

A spokesperson for the BKA, the German federal police, confirmed that the agency was in possession of the cache of documents, adding that experts determined their authenticity. German officials did not specify how the agency had got the documents, nor how many names had been found within them.

German media reported that the questionnaire asked would-be Isis recruits about any previous experience they had in jihad and whether they were prepared to be suicide bombers.

The existence of the documents was revealed by the Munich-based Süddeutsche Zeitung paper and German broadcasters WDR and NDR. Zaman al-Wasl, a pro-opposition Syrian news website, published examples of the questionnaires recently.

Sky News claimed that it too has obtained copies of what appeared to be the same documents, containing about 22,000 names. It said the they were passed on a memory stick stolen from Isis internal security police by a former Free Syrian Army convert who later became disillusioned with Isis.

The documents held by the German authorities seem to have been collected at the end of 2013. Even the lowest estimate of the numbers that crossed the border in that period indicates the sheer scale of volunteers to Isis. The documents will be useful to intelligence agencies in confirming names and details of people suspected of joining Isis. However, it was reported that there are names not previously known to the intelligence services.

Zaman al-Wasl reported that personal details of 1,736 fighters from 40 countries had been revealed, a quarter were Saudis and the rest predominantly Tunisian, Moroccan and Egyptian.

The documents, written in Arabic and stamped with logos used by Isis, allegedly contain details of 16 British fighters, four from the US and six from Canada, as well as recruits from France and Germany. Intelligence agencies have estimated that about 700 Britons have joined Isis.

Guardian: http://bit.ly/1QMtOeK

« Google's AI Machine To Battle 'Go' Champion
Who Is Winning The Cyber War? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

Lacework

Lacework

Lacework brings speed, scale, and automation to cloud security and allows security and DevOps teams to collaborate on keeping data and applications safe.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Pelion

Pelion

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

Arsen Cybersecurity

Arsen Cybersecurity

Arsen is a French cybersecurity startup, dedicated to enhancing human behaviors in cybersecurity.

Telenor Cyberdefence

Telenor Cyberdefence

Telenor Cyberdefence is a newly established (2024) cloud-born Managed Security Service Provider focused on the Nordic markets.

Fraud.net

Fraud.net

Fraud.net operates the first end-to-end fraud management and revenue enhancement ecosystem specifically built for digital enterprises and fintechs globally.