GDI Risk Advisory Group

Posts Tagged ‘IDF’

Electronic Jihad – The New Terrorism?

In cyber security, cyber terrorism, cyber threats, Defense, Global Economy, Intelligence, Iran, Israel, Libya, multinational corporations, North Korea, Syria, Terrorism on May 24, 2014 at 6:55 am

cyber hoodie pic

March 2014 marked the hacking of 12 Indonesian Government websites by unknown hackers made up of both adventure enthusiasts and radicals. Apart from giving the hackers visibility, the episode crippled critical components of Indonesian government’s daily functioning where e-Governance is depended upon so much. This does not appear to be an isolated episode but enumerates scores of other recent transnational cyber attacks performed by non-state actors for a larger ideological goal.  This new era of ‘Cyber Jihad’ has far reaching implication, and if fully realized, would further underscore the magnitude of threats that it presents to practically every industry and government sector around the world.

The Edge will be presenting a three part series on what some cyber officials are calling the ‘Electronic Jihad’, and how it is shaping the landscape for this new battleground of international terrorism.

PART I – The New Cyber Warriors and their Tactics

Although the traditional purveyors of cyber attacks – states like China, Iran and their supporters continue to dominate state sponsored activities across the global cyber sphere, the existences groups of irregulars and non state actors – script kiddies, anarchists, hacktivists, hostile insiders, criminal elements and independent enthusiasts have added additional challenges, more lethal and ominous for legitimate Governments and multinational corporations to combat than could have been imagined.  The current state of cyberspace warfare will move to control every spectrum of a conventional battlefield – space, energy & power, economic and finance. This lays out an eerie scenario when a state or multinational is presented with evidence that weapons of cyber warfare are available to any warrior in the cyber world and they are available in the public domain.

In the field of intelligence and counter terrorism, capability assessments form an essential part of gaging the threat. Such assessments provide astonishing outcomes, especially when presented with inputs about a power system being attacked such as the case in the US by a cyber jihadist group.  This input was as early as January 2014, at a time when government agencies and regulators around the world have worked tirelessly to institute stringent control measures, cyber security monitoring and information security audits to defend against these very attacks.  Infiltrating these perimeters and conducting attacks on a critical infrastructure demonstrates the extent and capability being harnessed by cyber jihadists.

Counter terror operations are now challenged with the concept of identifying ‘cyber trade craft’, cyber radicalization, and recruitment.  The entire cycle of Spotting, Recruiting and Developing an agent for these activities can be comfortably performed from the confines of one’s home.  Blogs like Jhuf.net (Jamia Hafsa Urdu Forum) and Al Ansar.info have been critically tracking developments in Syria, Iraq, Afghanistan and using these issues to motivate members to fight against intruding western government and corporations.  Membership in the cyber realm is usually a virtual walk-in or referral, in which case both can be entertained using pseudonyms.  As a result, we have a potential candidates in the terror recruitment cycle being indoctrinated to fight in the cyber space, and have his/her identity concealed which keeps the original identity intact.  Ironically, these very recruits are corporate employees, information technology experts, businessmen, educated youths in the real-world.  We thus have the creation of an educated breed fighting a radical cause in an open world notoriously shrouded by fake IP addresses.  Through the creation of fake social media profiles, recruiters are able to conduct targeting, spotting and assessing operations for indoctrination.  Through the use of such tactics as  cyber ‘Dead drops’ – where confidential messages are passed in the cyber world and the use of image and text files, they are able to communicate without the possibility of it being detected.  A bomb attack in Tel Aviv back in January 2013 had traces of planning activities left in the cyber world when jhuf.net members posted a message in .jpg format highlighting the plans to attack Tel Aviv.  This was made more scrupulous by the use of codes in the image or text files.  Agencies tracking keywords to identify a possible attack would have missed the inconspicuous text hiding superficially in an image format.  In the real world, recruitments for these causes is prone to being intercepted by security agencies.  However, cyber ‘handling’ accomplishes not just recruitment but also indoctrination, financing and tasking for a potential acts without ever having a handler and agent come in contact. 

How big is the challenge to secure global cyber infrastructure?  It’s huge and growing by the second.  As new users and new technologies take hold, the scale of the battlefield expands exponentially.  Join us next month for Part II as we examine other players, threats and the tactics being employed by this new breed of terrorists.

From Iraq to Israel: US arms stockpiles grow

In Defense, Iran, Israel, U.S. on September 6, 2010 at 2:37 pm

Israel to use stockpiled US arms

Alleged Weapons Transfer Threatens Mideast Status Quo

As U.S. troops withdraw from Iraq and military resources are directed toward Afghanistan, other activities are taking place in the periphery.  DOD reported earlier this year that US weapons stockpiles in Israel were expanding and that the Obama administration was authorizing Israel use of these weapons in case of emergency.  Of course, this has been standard practice for past administrations over several decades.  The new development in this case comes on the heels of the end of US combat operations in Iraq and includes the transfer of the leftover U.S. weapons from the Iraq combat theatre to the Israeli military.  Now at first blush this may not appear significant.  However, it is noteworthy at a time when Israel is planning its next move to deal with Syria and possibly Iran.   As Syria continues to arm Hezbollah and Russia continues to arm Syria, Israel may need these arms sooner than expected.

Russia and Poland: Cost of Concession

In Clinton, Defense, Intelligence, Iran, Nuclear Arms, Poland, Russia, U.S. on August 13, 2010 at 4:49 pm

Russia Sets Date for Key Iran Nuclear Step

The U.S. has requested that Russia not provide the fuel necessary to launch the Bueshehr Plant until Iran demonstrates that it is not continuing to develop nuclear weapons.  Interestingly enough, Iran pushes further away from the negotiating table and the international media is saying that Russia’s move was already agreed to.  Well, again, the concessions made in Poland on the missile defense system are continuing to pay dividends.  Look for more movement on the Israeli front as they continue developing their long-range strike capabilities.

Israeli Helo Crash Tips Off Iran

In Defense, Intelligence, International Relations, Nuclear Arms on August 4, 2010 at 5:57 am

Six Israeli soldiers die in Romania helicopter crash: Report

On July 26th, an Israeli Sikorsky CH-53 Sea Stallion helicopter – called the Yasour by the Israel Air Force – crashed in Romania, killing six IDF officers and a Romanian officer.  The publicity of Romania’s cooperation with the IDF poses a double-edged sword for Jerusalem.  On one side, the crash reveals a sensitive military relationship that exposes the Romanian political command to backlash by its public.  It further tips Israel’s hand to Iran and Lebanon that it is actively training for long-distance incursions into mountainous terrains.  However, it also should leave no doubt in Ahmadinejad’s head of Israel’s determination to stop his nuclear ambitions.  That said, if the cause of the crash is determined to be human error, then the IDF will need to re-double its training. 

CONTRIBUTOR:  INFINITE REACH is our newest contributor and a former U.S. Intelligence Analyst.  We appreciate his insightful observations and look forward to hearing more from him.