Terrorism in Cyberspace

Similar documents
THE FUTURE OF CYBER TERRORISM

(U//FOUO) ISIL Social Media Messaging Resonating with Western Youth

The impact of the withdrawal of the American troops from Syria on the campaign against ISIS (Initial Assessment) Overview

Documenting the Virtual Caliphates Dr. Mia Bloom #N /30/16-06/30/19

The Recent Lone Wolf Attacks: Trend or Anomaly?

Terror Finance and Technology

Assessing ISIS one Year Later

Efforts to carry out electronic Jihad on the part of the Jihadi online forum members

After the Paris Attacks Implications for the Transatlantic Security Debate

A new religious state model in the case of "Islamic State" O Muslims, come to your state. Yes, your state! Come! Syria is not for

Issue Overview: Jihad

TED ANTALYA MODEL UNITED NATIONS 2019

STATEMENT OF JARRET BRACHMAN BEFORE THE HOUSE ARMED SERVICES COMMITTEE SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS AND CAPABILITIES

Ladies and gentlemen, Thanks for giving me the opportunity to talk to you today. Ladies and gentlemen,

The Difference Between Terrorism and Insurgency

Intelligence Bulletin

ICT Jihadi Monitoring Group. AZAN Magazine Profile Analysis

SAUDI ARABIA. and COUNTERTERRORISM FACT SHEET: FIGHTING AND DEFEATING DAESH MAY 2017

Overview 1. On June 29, 2014, ISIS leader Abu Bakr al-baghdadi declared the establishment of the

Islam and Terrorism. Nov. 28, 2016 Clarity in defining the enemy is essential to waging war.

Tech Savvy Militants in the Age of ICT Globalization: Online Radicalization to Violent Extremism in Kenya

Iranian Targets Hit in Syria by the IDF and Responses in Iranian Media

Arije ANTINORI, PhD Coordinator of CRI.ME LAB SAPIENZA UNIVERSITY OF ROME FROM THE ISLAMIC STATE TO THE ISLAMIC STATE OF MIND

The killing of two Al-Qaeda leaders in Iraq and its implications

In the Name of God, Most Gracious, Most Merciful. ((Report on the External Operations))

. 2. Select region - 5. the Islamic State in Iraq and the Levant (ISIL). It seeks to establish a regional,

THE INTERPLAY AND IMPACT OF ORGANISED CRIME AND TERRORISM ON THE PROCESS AND DEVELOPMENT OF THE CONCEPT OF SECURITY: CASE STUDY OF ISIS ABSTRACT

CUFI BRIEFING HISTORY - IDEOLOGY - TERROR

Prime Minister s Foreword

the Middle East (18 December 2013, no ).

Cyber Intelligence. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 4th, 2018 D7-1

Redefined concept #1: Tawhid Redefined concept #2: Jihad

Tuesdays 14:50-17:45 (and a few Fridays) Vestergade 10-A12

Recently, the group released videos showing the killing of two American journalists in Syria.

«Violent Islamist Extremism : The European Experience» Committee on Homeland Security and Government Affairs U.S. Senate Washington, June 27, 2007

Analysis of ISIS's Claims of Responsibility for Terrorist Attacks Carried Out Abroad. Overview 1

MINDS ON ACTIVITY SETTING THE STAGE. News in Review January 2013 Teacher Resource Guide EIGHT DAYS: Israel and Hamas

Understanding Jihadism

Policy Workshop of the EU-Middle East Forum (EUMEF) Middle East and North Africa Program. Deconstructing Islamist Terrorism in Tunisia

PREVENT. Working in Partnership for the Prevention of Terrorism and Violent Extremism

British fanatics heading to Iraq to join ISIS militants in their HUNDREDS amid fears 'they could bring terror to UK'

Topics of the conference include:

The Islamic State's Fallback

Delegate Research Information

March 28, Installation of the camp close to Jabalia, Gaza. March 26, Media command installed prior to the march to host journalists.

The United States proposed a UN General Assembly resolution condemning Hamas and other terrorist organizations in the Gaza Strip.

HIZB UT-TAHRIR [THE ISLAMIC LIBERATION PARTY] IN THE WEST BANK

Al-Qaeda in Yemen: A Return to Hit-and-Run Tactics

NAVAL POSTGRADUATE SCHOOL

U.S. Admits Airstrike in Syria, Meant to Hit ISIS, Killed Syrian Troops

Muhammad Sawalha, senior Hamas operative living in London, continues participating in Hamas-supported political activities.

The public seven radi entering th. (NYPD) released. caliphate, virtual. grounds. Police Department, 2007.

International Terrorism and ISIS

ISIS-inspired Terrorist Attack in the South of France

describes and condemns is an ideology followed by a fraction of over a billion followers.

Cyber jihad as a virtual invitation into terrorism activities: Multimodal critical discourse analysis of Rumiyah and Inspire magazines

How Terrorists may be Hiding in Plain Sight. Cindy Casey, Gwynedd Mercy University

Jihadist women, a threat not to be underestimated

Radical Islam In The House: The Plan To Take America For The Global Islamic State By Kate Mathieson, Michael Coffman READ ONLINE

Operation Pillar of Defense

Intelligence and Terrorism Information Center at the Center for Special Studies (C.S.S.)

Name: Advisory: Period: Introduction to Muhammad & Islam Reading & Questions Monday, May 8

SIMULATION : The Middle East after the territorial elimination of the Islamic state in Iraq and Syria

Changing Borders. UN s 1947 Palestine Partition Plan After the 1949 War After the Six-Day War 1967

ISIS ONLINE: COUNTERING TERRORIST RADICALIZATION & RECRUITMENT ON THE INTERNET & SOCIAL MEDIA

Herzliyan. The IDC. Moving Civilization Forward WINTER 2016 UPDATE

By the Numbers Movie How We Measured the Stats

P.O. Box 3980 New York, NY (212) November 6, 2017

Civil Wars, Violence, and International Responses project The Evolution of Armed Groups: Crafting Effective Responses Workshop 7 November 2017

Is War on the Horizon? A Tale of Two Fronts

Turkey Breaks With Iran and Russia

Resolved: The United States should adopt a no first strike policy for cyber warfare.

Jihadist Brides, Victims of the West

Hezbollah Handled a Palestinian Squad in Tulkarm, Which Planned Terrorist Attacks

Syria: to end a never-ending war. Michel Duclos

Improving Information Operations in Iraq and the Global War on Terror

Anatomy of an Insurgency

The Mind Of Jihad By Laurent Murawiec READ ONLINE

Countering Violent Extremism in the United States and the European Union April 9 10, 2015 Twentieth Century Club

Morocco. Hundreds of returned jihadists across the Strait of Gibraltar who intelligence officials fear pose a large, residual threat on Europe s

ISIS Is Not Waging a War Against Western Civilization

Conference on Peaceful Coexistence, Dialogue and Combating Radicalization

China's Cyber-hacking

Island Model United Nations Military Staff Committee. Military Staff Committee Background Guide ISLAND MODEL UNITED NATIONS

NAVAL POSTGRADUATE SCHOOL THESIS

[Please note: Images may have been removed from this document. Page numbers have been added.]

THE SCOOP WINNING THE NEW WAR OF TERROR The Paris massacre has changed everything: the enemy, the targets and now the way to prevail

Analysis of Rumiyah Magazine

AMBER RUDD ANDREW MARR SHOW 26 TH MARCH 2017 AMBER RUDD

138 th IPU ASSEMBLY AND RELATED MEETINGS. Consideration of requests for the inclusion of an emergency item in the Assembly agenda E#IPU138

THE ASPEN INSTITUTE ASPEN SECURITY FORUM 2016 ISIL AND AL QAEDA: LETHAL ONE-UPMANSHIP. Aspen, Colorado

The Terrorism Threat In 2012: Global Perspective Terrorism Risk And Insurance Markets In 2012 OECD Headquarters Paris, France 5 December 2012

A Look At Dangers Posed by the Islamic State Group

Case 1:17-mj UA Document 1 Filed 11/01/17 Page 1 of 10 17MAG8177

Grade yourself on the OER. Test Friday on Unit 1

Congressional Testimony

So it seems half of France is pleading for common sense and respect to prevail. And the other half wants to carry on with sacrilegious speech and

Overview. Iran is keeping a low profile with regards to the Northern Shield operation carried

THE ISIS CHALLENGE IN LIBYA

FOR PUBLIC RELEASE. IntelCenter. Gaza Response: Analysis of Jihadist Statements & Threatened Targets. v Jan :37 EDT / 22:37 GMT

Transcription:

SESSION ID: Terrorism in Cyberspace Matt Olsen Co-founder and President, Business Development IronNet Cybersecurity Former Director, National Counterterrorism Center

Global Jihadist Movement Evolution of jihadist groups Rise of ISIS Continued relevance of al-qaida Strategic objectives Tactical adaptation Development of offensive cyber capabilities 2

The Rise of ISIS If you can kill a disbelieving American or European or any other disbeliever from the disbelievers waging war, including the citizens of the countries that entered into a coalition against the Islamic State, then rely upon Allah, and kill him in any manner or way however it may be. Smash his head with a rock, or slaughter him with a knife, or run him over with your car, or throw him down from a high place, or choke him, or poison him. Mohammmad al-adnani, September 22, 2014 3

The Rise of ISIS

Threat to Europe 5

Threat to Europe

Threat to the United States ISIS inspired attacks in the United States

Increase in Violent Attacks

Nation-State Actors Nation-state level cyber capabilities Russia Iran North Korea The evolution of attacks: disruptive to destructive Broader geopolitical context Current conflicts 9

Increasing Sophistication of Attacks Evolution of attacks from Nation-state actors

Where do terrorist groups fall on the cyber threat spectrum?

Terrorist Use of the Internet Propaganda Inspire Magazine Dabiq Rumiyah Recruitment Online forums Direct communications Mobilization and Command-and-Control Encrypted texts 12

Definition Cyberterrorism is the use of cyber capabilities to conduct enabling, disruptive, and destructive militant operations in cyberspace to create and exploit fear through violence or the threat of violence in the pursuit of political change. 13

Evolution of ISIS Cyber Capabilities Early organization Leadership Structure Capabilities 14

ISIS Cyber: Early Organization 2014: Takeover of Twitter accounts CENTCOM and Newsweek 15

ISIS Cyber: Early Organization Junaid Hussain, British national, fled the UK to join ISIS in 2013 16

ISIS Cyber: Early Organization The Islamic State Hacking Division emerged in early 2015 Affiliated with the Cyber Caliphate Hacking attacks launched in support of ISIS: Generated publicity for ISIS Attacks not sophisticated

ISIS Case Study: Ardit Ferizi June 2015: Ferizi gained system administrator access to a U.S. company with identifying information about 1300 military and government personnel Ferizi provided the personal information to Junaid Hussain to publish a hit list for ISIS 18

ISIS Case Study: Ardit Ferizi Hussain posted a Tweet with a document: We are in your emails and computer systems, watching and recording your every move, we have your names and addresses passing on your personal information to the soldiers of the khilafah, who soon with the permission of Allah will strike at your necks in your own lands! Ferizi sentenced to 20 years for material support to ISIS 19

ISIS Cyber: Increasing Capabilities September 2015, the self-proclaimed "Islamic Cyber Army" (ICA) hacking group tweets its first official statement.

ISIS Cyber: Increasing Capabilities We send this message to America and Europe; we are the hackers of the Islamic State, the electronic war has not begun yet.

Merger of Jihadist Groups April 2016, the Caliphate Cyber Army (CCA) announces the creation of a new collective under the name United Cyber Caliphate.

Merger of Jihadist Groups After relying on Almighty Allah and by his grace, incorporation between Islamic State Hackers Teams...To expand in our operations. To hit em deeper. We announce our new #Team #UnitedCyberCaliphate.

Cyberterrorism: Looking Ahead Organization shows signs of consolidation and coordination Sophisticated use of social media and propaganda has spurred development of offensive cyber capabilities ISIS targets: Government Financial entities Media Use of publicly available hacking tools 24

Cyberterrorism: Looking Ahead Recruitment of savvy hackers Gaza Hacking Forum primary jihadi hacking forum Skill level remains low compared to nation-states Upward trajectory looking to improve skills and amplify preexisting strategies 25

Cyberterrorism: Looking Ahead Threat of combined kinetic and cyber attacks Jihadists have discussed aspirations to target critical infrastructure Launching damaging cyberattacks does not require a large team, and by recruiting or training a group with a higher level of skill, jihadists could have asymmetric impact. 26

Lessons for Government and Companies Lessons of 9/11 applied to cyber threats Team effort Build expertise Harden defenses What you can do today Threat awareness Cooperation with federal agencies and first responders Resilience 27