US Cyber Command Hacked ISIS

The US military claims to have "successfully" disrupted the online propaganda efforts of the Islamic State in a hacking operation dating back at least to 2016, according to declassified national security documents released on Jan 21st. Operation Inherent Resolve began in 2016 and it was aimed to combat ISIS and was physically lead by US military forces. 

But what was not publicised at the time was the cyberattacks on ISIS by the US military, Australia and other allies who launched what's been described as the largest offensive cyber operation in US military history. US government documents that have been made public recently show that while a US Cyber Command operation that disrupted ISIS computer networks was largely successful. However, there were significant shortcomings 

Documents obtained through FOIA (Freedom of Information Act) requests and made public recently reveal that while successful, the US Cyber Command's campaign to hack ISIS faced some issues, such as lacking the storage space to store all the information stolen from ISIS accounts. According to the recently released documents, Cyber Command was simply not prepared to handle the amount of data it had collected. Operators were found to be having trouble collecting data, interagency deconfliction issues, difficulty vetting targets, and, in at least one case, a close call with the operation being discovered by the adversary. 

The six heavily-redacted documents published by the National Security Archive at the George Washington University in Washington, DC, reveal the conclusions of a 120-day assessment US Cyber Command conducted after the completion of Operation Glowing Symphony.

The command did not have the capability to handle the terabytes of data that it collected, despite the fact that operation had planned to pull data once it had infiltrated ISIS-used servers and use it to further the mission.The newly released documents offer the most detailed assessment of the moves against ISIS by a joint task force created in 2016 by president Barack Obama. Carried out in November 2016, Operation Glowing Symphony was a classified offensive cyber operation executed by Joint Task Force Ares (JTF-Ares).

The operation's primary task was to disrupt ISIS' online presence and propaganda efforts, by hacking or hijacking online social media accounts, and taking down websites and servers used by the terrorist group to spread propaganda materials and recruit new members.

According to a 120-day post-mortem assessment of Operation Glowing Symphony, US Cyber Command did not anticipate the magnitude of the data they would eventually end up exfiltrating from compromised ISIS infrastructure. "The assessment reveals that a key challenge to exploitation was storage of the data itself, an indication of the operation's scope relative to USCYBERCOM's capacity at the time," said Michael Martelle, analyst for the National Security Archive. 

A recommendation included in the 120-day post-mortem assessment was that US Cyber Command's Capabilities Development Group (CDG) develop new data storage solutions for future operations. But data storage was just one of the technical and bureaucratic issues that JTF-Ares faced at the time. Other issues mentioned in the assessment include challenges in coordination with other coalition members and US government agencies, and a lengthy and overly complex process for vetting suspects, which made it difficult to engage time-sensitive targets.

National Security Archive:       ZDNet:       CyberScoop:       Channel News Asia:      Dark Net Diaries:     ABC News:

You Might Also Read:

European Police Launch Global Attack On Islamic State:

Islamic State Likely To Switch To Cyber Warfare:

UK 'biggest audience' In EU For Jihadist Web Content:

 

« Protecting Children In The Digital Age
Electric Grids Targeted For Cyber Attacks »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

Excellium Services

Excellium Services

Excellium’s Professional Services team combines expertise and experience that complements your in-house security resources.

Cynterra

Cynterra

Cynterra is a next generation cloud cyber security and data analytical service provider offering cloud security compliance, data protection, visibility and threat protection services.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

International Association of Security Awareness Professionals (IASAP)

International Association of Security Awareness Professionals (IASAP)

IASAP provides a members-only virtual sharing platform where security awareness professionals engage in a lively, year-round exchange of information and ideas.

Schneider Downs

Schneider Downs

Schneider Downs & Co. provides accounting, tax and business advisory services through innovative thought leaders who deliver their expertise to meet the individual needs of each client.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

ISSQUARED

ISSQUARED

ISSQUARED is a leading provider of Cyber Security, Cloud, Infrastructure, Consulting and Digital Transformation services.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

Fivecast

Fivecast

Fivecast is enabling a safer world. We help organizations around the world explore masses of data to uncover actionable insights.