Strategic virtual terrorist groups operate to Daesh

Virtual mercenaries are always selling works to invade the most secure infraestructire and security agencies to steal important information and data.

Daesh now have virtual support of some of those crackers, with full range capability to steal information and give the data to the group, in order to have a better plan to the future attacks.

The Cyber Warfare complexity is beyond the understanding still of the hybrid warfare. Traditional military personal still promotes geographical position to face on battle, simulates security, impose territory conquering and diplomacy, but with the technology inserted in war, Revolution in Military Affairs and cybernetic infraestructure, virtual money, the difficulty to find the real locations of 'virtual terrorists' is raising more and more to new security levels, in capability that the cyber-military personal have a difficulty and be hijacked to ambushes, with the stealing of data and fake news, disinformation and fake data spread.

Fake news became the first level of psyops done by terrorists. Than the infiltration of new information and infiltration of personal. Than the contract of cyber warfare terrorists to promote stealing of data, make the infraestructure unsecure in cyvbernetic level, than promotes unsecure at the physical borders, promoting weakenes and fragility, raising instability at the military and security level.

The constant raise of security level goes in a fast capability, some countries still cannot understand or cannot have the technological capacity to it, but with criminal activities, moeny launering in charge of virtual crimes, promote a vaccuum proccess at the cybernetic security and the physical, cannot understanding or calculating still which could be the next explosion.

Honesty, the capability of a State promoted by a geopolitical influence with no geographical place goes beyond the traditional strategic military understanding, this is when the cyber military personal and the asymmetric warfare scholars and military happens to be, at this gap between the faillure and the momentum.

Resultado de imagem para cyberwar isis

New ISIS Cyber Campaign Announced as Supporters Share U.S. Agency Vulnerabilities
https://www.hstoday.us/subject-matter-areas/counterterrorism/new-isis-cyber-campaign-announced-as-supporters-share-u-s-agency-vulnerabilities/

A group operating under ISIS’ hacking division announced in a Friday statement a new campaign “to destroy your websites, your devices and your data,” while an ISIS supporters’ IT help desk highlighted a Senate report revealing cybersecurity failures and vulnerabilities at several government agencies.

At the beginning of the year, the new Caliphate Cyber Shield was announced as “an extension of the United Cyber Caliphate (UCC).” In March, Kim Anh Vo, 20, of Hephzibah, Ga., was arrested on allegations that she joined the UCC in 2016 and disseminated propaganda including “kill lists” with mass quantities of personal identifying information on Americans. In 2018, the UCC threatened to kill gray-hat #OpISIS hackers, including Anonymous hacktivists, who had been waging a lengthy online campaign to take down ISIS social media accounts and websites; the UCC claimed in the threat that “you know very well that your strongest branch has joined us.”

The CCS founding statement pledged allegiance to Abu Bakr al-Baghdadi and declared the launch of “your brothers in the shield of the electronic caliphate (CCS) to start work for the sake of Allah and support his religion.”

Last week’s CCS message distributed in ISIS forums announced “a new phase of our struggle, and of the history of the cyber warfare.”

“We penetrate the accounts of the soldiers and officers of the Rafidha [Shiites], the Crusaders, the Jews and the murtaddin [apostates], and collect their data. We penetrate websites that Allah makes easy for us to penetrate. We monitor and allure infiltrated spies to able to hack their accounts and warn Muslims from them and the files they publish, as well as spreading the security awareness and explain some of the secret methods used by the Crusader coalition to spy on supporters and follow them, whatever you have mobilized against us, the enemies of God,” the statement declared.

“O enemies of Allah, no matter how much you gather against us, no matter how many you killed and captured of us, Almighty Allah will replace them with whom are harder than us on you,” CCS continued. “We are but a small part of the army, which will be prepared by the Islamic State to destroy your websites, your devices and your data, by Allah’s permission. We bring glad tidings of what [is] yet to harm you, for the best outcome is for the pious.”

Separately, the latest cybersecurity bulletin from the Electronic Horizon Foundation led with the story on a 10-year review of cybersecurity compliance flaws at the departments of Homeland Security, State, Transportation, Housing and Urban Development, Agriculture, Health and Human Services, and Education, as well as the Social Security Administration.

The bipartisan report from the Senate Homeland Security and Governmental Affairs Permanent Subcommittee on Investigations found during a 10-month investigation that the agencies failed to comply with basic cybersecurity protocols and seven of the eight left Americans’ personally identifiable information vulnerable. “After a decade of negligence, our federal agencies have failed at implementing basic cybersecurity practices, leaving classified, personal, and sensitive information unsafe and vulnerable to theft,” said Chairman Rob Portman (R-Ohio). “The federal government can, and must, do a better job of shoring up our defenses against the rising cybersecurity threats.”

The EHF weekly tech bulletin also featured stories on Facebook handing over data on hate speech suspects to French courts, an Android spyware campaign in the Middle East that spread through Telegram and WhatsApp (both favored ISIS platforms), and vulnerabilities in iPhone apps and Microsoft Word.

Two weeks ago, the EHF — which launched in January 2016 as an IT help desk of sorts to walk ISIS supporters through how to encrypt their communications and otherwise avoid detection online while coordinating with and recruiting jihadists — highlighted the vulnerability of some million devices to the “BlueKeep” Microsoft flaw dubbed “potentially wormable” by the National Security Agency.

“It is time to face the electronic surveillance, educate the mujahideen about the dangers of the Internet, and support them with the tools, directives and security explanations to protect their electronic security, so that they don’t commit security mistakes that can lead to their bombardment and killing,” the group said in its founding announcement.

The EHF has since released a series of print and video tutorials covering a range of mobile security and dark web how-tos.

Last year, the group began distributing the weekly “Tech News Bulletin” including “the most important cyber security news.”


Bridget Johnson is the Managing Editor for Homeland Security Today. A veteran journalist whose news articles and analyses have run in dozens of news outlets across the globe, Bridget first came to Washington to be online editor and a foreign policy writer at The Hill. Previously she was an editorial board member at the Rocky Mountain News and syndicated nation/world news columnist at the Los Angeles Daily News. Bridget is a senior fellow specializing in terrorism analysis at the Haym Salomon Center. She is a Senior Risk Analyst for Gate 15, a private investigator and a security consultant. She is an NPR on-air contributor and has contributed to USA Today, The Wall Street Journal, New York Observer, National Review Online, Politico, New York Daily News, The Jerusalem Post, The Hill, Washington Times, RealClearWorld and more, and has myriad television and radio credits including Al-Jazeera and SiriusXM.

Comentários

Postagens mais visitadas