- The Strategist - https://aspistrategist.ru -

Islamic State: hacking, rhetoric and responses

Posted By on August 28, 2015 @ 11:00

[1]A fortnight ago, a group purporting to be the Islamic State Hacking Division released the names, email addresses, passwords and telephone numbers of almost 1,500 individuals [2], the majority of whom are reportedly US Defence personnel. The group’s ‘hit list’, which included the personal details of eight Australians, was posted online and accompanied by threats that the information would be used to ‘strike at your necks in your own land’.

Contrary to the common perceptions of the hacking incident, Islamic State (ISIS) hasn’t pulled off a show-stopping display of cyber-strength, and we shouldn’t be reaching for a response. Indeed, a misinformed response to the recent display could inadvertently serve to increase the potency of ISIS’s propaganda.

It’s important to view the hack in the context of ISIS cyber ‘events’ in 2015. This isn’t the first time ISIS has gone after the US Department of Defense—a group of ISIS sympathisers named ‘Cyber Caliphate’ briefly hacked Central Command [3]’s Twitter and YouTube accounts back in January. A previous data dump by the Islamic State Hacking Division also occurred in March when ISIS hackers released the home addresses and photos of [4] 100 US military personnel [5]. Two months later, ‘Cyber Caliphate’ released a video [6] of a hooded figure threatening ‘electronic war’ on the US and Europe.

Such events are granted a reasonably high profile and receive significant attention in media and policy circles. For example, when ASIO Director General Duncan Lewis raised his concerns over ISIS’s use of cyberspace in February, The Daily Telegraph ran the headline [7] ‘Australia Declares Cyber War on Islamic State’s Social Media Propagandists’. Channel Nine also discussed the ‘Cyber Jihad [8]’ and foreshadowed that Australia was set to announce a cyberwar on ISIS. American media exhibited a similar reaction in May in the wake of Cyber Caliphate’s video, with Beltway outlet The Hill running the story ‘ISIS Preps for Cyber War’ [9].

Unsurprisingly, the same pattern is evident in the response to ISIS’s cyber activity the other week. Media outlets have given a lot of oxygen to the issue, with feverish talk focusing on the ‘Australian ‘hit list [10]’’ and Islamic State’s cyber capabilities. The incident was so over-hyped that Australia’s senior ISIS militant, Neil Prakash [11], boasted on Twitter that ‘cyber war got ‘em shook’. Political leaders have weighed in on the issue, with Prime Minister Tony Abbott deeming [12] the incident proof that ISIS’s cyber capabilities pose a ‘very sophisticated and deadly threat’ to Australia. Dan Tehan, Chair of the Parliamentary Joint Committee on Intelligence and Security, has emphasised the strategic imperative of Australia winning this ‘online war’.

However, it’s important that we develop a realistic understanding of what actually happened in order to avoid overblown rhetoric. This attack was of a low level of sophistication [13] and may have actually involved no hacking at all—inconsistent data structures and presence of duplicates in the ‘hit list’ suggest that the database had been pieced together from different sources [14]. It also seems that the list is comprised mostly of data already available online, simply repackaged and paired with a threatening narrative. Some of the information was already leaked [15] in 2013, while other data had been intentionally made available online by the relevant agencies.

Much of the remaining information was expired or simply falsified. Emails listed don’t match the official military configuration currently in use, and instead resemble an out of date [16] format that hasn’t been used for several years. A Pentagon spokesperson [2] pointed out that the passwords provided would not fulfil the military’s strength requirements—some were only three characters long. (In fact, they wouldn’t even satisfy the security standards of popular webmail services.) In light of these factors, US Army General Ray Odierno affirmed [17] that neither this, nor previous data breaches with similar traits, were authentic.

It appears that ISIS weren’t actually successful in gaining access to sensitive data, so what was the purpose of this dramatic stunt? Possibly to generate fear and project the impression of power and capabilities far beyond what the group actually possesses. In that sense, the Islamic State Hacking Division would probably count their efforts as a job well done. What they lack in cyber capabilities they more than make up for in social manipulation and fear-mongering.

So we should consider the power of rhetoric. Mischaracterisation of an event can contribute to a public narrative that puts pressure on governments to respond in a certain way. Unlike more traditional arenas of conflict, cyberspace isn’t yet governed by entrenched norms of legality and proportionality. The absence of such a toolkit may leave room for the public narrative to guide responses to these new threats in a formative way. As a result, our political leaders and media should be cautious in making statements and cases which lean too heavily on the perceived cyber proficiencies of ISIS and their terrorist brethren.

Overly dramatic labelling has the potential to inflate public perceptions of ISIS’s power and influence, so exacerbating fears and potentially serving as a boost for the organisation. Creating an elevated threat by way of political or media-driven rhetoric serves ISIS’s strategy nicely by lending unwarranted credibility which can be harnessed for recruitment.

In a time of diverse and legitimate cyber threats, it is prudent for all players in the debate to tread carefully when it comes to both public rhetoric and public policy.



Article printed from The Strategist: https://aspistrategist.ru

URL to article: /islamic-state-hacking-rhetoric-and-responses/

URLs in this post:

[1] Image: https://aspistrategist.ru/wp-content/uploads/2015/08/5126411969_0faa162ee3_z.jpg

[2] 1,500 individuals: http://www.militarytimes.com/story/military/pentagon/2015/08/12/isis-hacking-group-tweets-support-lone-wolf-attacks-military-personnel/31550919/

[3] Central Command: https://www.washingtonpost.com/news/the-switch/wp/2015/01/12/the-centcom-hack-that-wasnt/

[4] photos of: http://motherboard.vice.com/read/isis-hacker-i-didnt-just-use-google-i-hacked-the-pentagon

[5] 100 US military personnel: http://www.reuters.com/article/2015/03/21/us-mideast-crisis-threat-idUSKBN0MH0QQ20150321

[6] video: http://www.ibtimes.com/isis-affiliated-hackers-threaten-cyberattacks-electronic-war-us-europe-1917320

[7] headline: http://www.dailytelegraph.com.au/news/nsw/australia-declares-cyber-war-on-islamic-states-social-media-propagandists/story-fni0cx12-1227219902546

[8] Cyber Jihad: http://www.9jumpin.com.au/show/today/videos/4055243667001/

[9] ISIS Preps for Cyber War’: http://thehill.com/policy/cybersecurity/242280-isis-preps-for-cyber-war

[10] hit list: http://www.smh.com.au/national/islamic-state-posts-australian-hit-list-after-hacking-addresses-mobile-numbers-20150812-gixrmz.html

[11] Neil Prakash: https://au.news.yahoo.com/a/29246676/islamic-state-shares-australian-hit-list-targeted-in-widespread-hack/

[12] deeming: http://www.abc.net.au/news/2015-08-13/australians-reportedly-on-islamic-state-hit-list/6693374

[13] low level of sophistication: http://www.skynews.com.au/video/program_featured/2015/08/16/i-s--hacking--highly-unsophisticated-.html

[14] different sources: http://www.gizmodo.com.au/2015/08/isis-sucks-at-hacking/

[15] already leaked: http://www.troyhunt.com/2015/08/an-analysis-of-isis-hit-list-of-hacked.html

[16] out of date: http://www.scmagazine.com/the-pentagon-said-the-namesemails-and-passwords-uploaded-to-twitter-by-a-group-calling-itself-the-islamic-state-hacking-division-appear-to-be-not-only-out-of-date-and-incorrectly-formatted/article/432623/

[17] affirmed: http://www.theguardian.com/world/2015/aug/13/isis-hacking-division-releases-details-of-1400-americans-and-urges-attacks

Copyright © 2024 The Strategist. All rights reserved.