Currently set to No Index

Is ISIS a Threat to World Web Security?

In response to the air strikes and military presence brought about by the United States, the FBI has issued a warning that ISIS and other extremist groups may initiate cyber attacks in retaliation. While they are stating that the recent threats are “nonspecific and probably aspirational”, there are several reasons why Americans should be concerned for their Internet security.

Terrorist Funding

Bringing in as much as $3 million per day in revenue, ISIS is officially one of the richest terrorist groups in history. According to US intelligence officials, the organization receives a great deal of money from wealthy donors, mafia-like looting, levying taxes on the areas it takes over, and the proceeds from about a dozen oil fields that they have captured in the Middle East.

While operating a caliphate is expensive, many governing officials are becoming increasingly aware of the billions that the Islamic State currently has in their possession. While they may not have the technological abilities to act out a large cyber attack themselves, they certainly have the funding to potentially outsource a destructive online occurrence.

ISIS’s Threats and Actions Through Social Media

ISIS is no stranger to social media. The terrorist organization has used it to recruit members, instill scare tactics, and distribute other terrorist information. According to the FBI, there have been four potential threats made to the United States through twitter mentioning cyber attacks:

  1. At the beginning of 2014, @AnonArabObs stated his support for ISL, and offered guidance in making use of several hacking tools. He also made the call for cyber attacks in both Israel and the United States.
  1. Tunisian Hackers Team, which is a well-known hacktivist group, threated a DDoS (Distributed Denial of Service) attack on America’s financial sector. A DDoS attack is one where it prohibits authorized users from accessing machines or network resources, and they have said that they would activate this assault unless US troops were extracted from Islamic lands.
  1. One of the most well known hackers over the pond is Abu Hussain Al Britani, and the British media has classified him as a current ISL fighter in Syria. He had previously hacked into Tony Blair’s email account and served a six-month prison sentence in the UK back in 2012.
  1. In September 2014, Twitter removed several accounts that were in support of ISIL. In retaliation, user @Dawlamoon threatened several Twitter employees by name, encouraging people to take action against them.
RELATED:   Will Google Give Ranking Preference to Websites Based On Security, Rather Than Content?

In addition to these specific threats against the country as a whole, ISIS has also been known to use social media as a way to terrify the world. Some of their other well-known actions have included the beheading of American journalists James Foley and Steven Sotloff, which were filmed and posted on a file-sharing site as “Messages to America”. They have also recorded and shared several mass executions, including one of 250 Syrian soldiers in August 2014. While these executions are some of the most notable and horrific, they are just the tip of the iceberg as the number of broadcast killings by ISIS continues to climb.

Intentions With Cyber Terrorism

As the main goal of ISIS has been to take over the area between Syria and Iraq, one may wonder what they would have to gain by committing a cyber attack on the US. In addition to using an online attack as retaliation to the government, they may have a few additional motives in mind for the future.

RELATED:   Managed Web Hosting For Novice Users

Although they currently have a large monetary structure, they may use America’s financial institutions to continue to fund their growth and expansion. Hacking into one of the country’s large banks to transfer funds could instantly bolster their cash flow.

Another reason that ISIS may seek to attack the US is to attract further awareness to their cause. As they continue to take over and control desert regions in the Middle East, they may search for new ways to show strength and power to their adversaries. According to John Cohen, the counterterrorism coordinator at the Department of Homeland Security, “ISIS is continually looking for new ways to carry out high impact visibility events to bring attention to their cause.”  He goes on to speculate that, “… they are looking at the results of major cyber breaches such as Target or Home Depot and against critical infrastructure, and thinking about them as a potential avenue.”

How Other Enemy Forces Could Join In 

While it seems that ISIS and their supporters hold the majority of the technological knowledge and ability, there is an additional risk that other ill intended countries may begin to take part in their cyber terrorism.

According to the Institute for National Security Studies, a special report was published in London in 2012 insinuating that technological information from North Korea and Iran could potentially leak to terrorist organizations. While they may not complete the actual hacking process, it is possible that they could provide information to ISIS assisting them in completing their attack.

RELATED:   Premium Web Hosting and Security Features Available in the Public Domain

Protecting Yourself From Cyber Terrorism

While the largest dangers lie with large banks, corporations, and government entities, there are a few steps that you can take in order to protect yourself from potential hacks and cyber harassment. The FBI recommends taking the following precautions to protect your information and assets:

  • Have a backup strategy for any proprietary or sensitive data. It is a good idea to keep backup copies offsite in a secure location that are not available to access from local networks.
  • Analyze links and email attachments prior to opening them, especially if they come from unknown senders.
  • Make sure to regularly mirror all of your critical system files and information.
  • Create and maintain strong, difficult to hack passwords. For optimum security, do not use the same password for multiple accounts or websites. You should also create and implement a schedule to regularly change your passwords for important websites.
  • When you are finished using classified data and files, make sure to back up your information and remove it from your active hard drives.

If you are concerned about cyber terrorism, one of the best ways to protect yourself is by being aware of the potential threat. If you sense a disturbance with one of your important accounts or files, do not hesitate to contact your local law enforcement to take a closer look.

Top image ©GL Stock Images

How to Find a Successful Name For Your New Blog?
How to Find a Successful Name For Your New Blog?

One of the most important decisions you can make to ensure your blog is among the best is to select a name. While there are more than 500 million blogs available...

How-to Start a Blog – Review of the Best 10 Blogging Platforms
How-to Start a Blog – Review of the Best 10 Blogging Platforms

If you want to start a blog as fast as possible, then you need to consider choosing a blogging platform. Thankfully, there are some excellent free and paid blogging platforms...

How Referral Marketing Can Benefit Web Hosts
How Referral Marketing Can Benefit Web Hosts

Even if the niche of web hosts are fully loaded with a lot of companies they are still one of the easiest to promote because you could write your own...

Broken Links: How to Find, Fix, and Benefit from Broken Links
Broken Links: How to Find, Fix, and Benefit from Broken Links

Links are what holds the web together. Essentially, the web is named as such because of the ability for pages and sites to link to other sources and relevant information....

Brand Value & the Most Powerful Brands (with Infographic)
Brand Value & the Most Powerful Brands (with Infographic)

Brand value – everyone wants it, however, only few are able to achieve it. The subject of “brand value” holds a significant position amongst marketers, executives, and entrepreneurs. Let’s discuss...

Reasons why your business should shift to Cloud hosting
Reasons why your business should shift to Cloud hosting

Cloud hosting has been on the rise since its inception. The improvement to your website performance and business efficiency that comes with Cloud hosting is almost tangible.

Why We Love the IT Support Career?
Why We Love the IT Support Career?

In almost all of my posts I was talking about the stressful side of the IT – the long hours, end user issues, migrations, midnight calls and the like. But...

IT Manager: Ways To Show Your Appreciation To Your Team
IT Manager: Ways To Show Your Appreciation To Your Team

Surely your team struggled hard and made things happen. You cannot say “this is what you get paid for” and just leave – you cannot keep your IT staff that...

1 Comment

  • Avatar for AnnaMarie AnnaMarie says:

    This day and age is truly scary. Everything we do revolves around the internet from banking to the electric grid. God Forbid that the terrorist gets into the power grid main frame! All we can do is take your advice and protect ourselves! While we are on the subject….keep some cash stashed as an emergency fund, it is much easier f or the economy to tank if some one chooses to wipe out our bank accounts!

Leave a Reply

Your email address will not be published. Required fields are marked *