Skip to main content

ISIS Has the Capacity to Strike U.S. Critical Infrastructure

Comment: This article was written a year ago. But the current developments in US now with the EOs - banning 7 Muslims majority countries and refugees will give reasons for ISIS to launch attacks on American soil is imminent.
Kuala Lumpur, 2017

By Bobby Shields
Contributing Writer

February 19, 2016

The Islamic State in Iraq and Syria (ISIS) has the organizational capacity to execute a cyber attack that physically disrupts, damages or destroys its opponents’ critical infrastructure assets. Only a well-coordinated and sophisticated cyber attack can evade the United States’ expansive yet vulnerable industrial cyber defenses, but ISIS’s centralized organizational structure, advanced recruitment strategy, and multiple revenue streams render the terrorist network capable of executing such an attack. To defeat the cyber threat posed by ISIS, the United States and its allies must accelerate their advances in Iraq and Syria, recapture ISIS-held territory, and destroy the organization’s centralized hierarchy. Additionally, the coalition must improve coordination with the private sector to strengthen critical infrastructure cyber defenses.
U.S. critical infrastructure assets are vulnerable to cyber attacks. The proliferation of low-cost cyber weapons and the frequency at which they target U.S. entities makes it nearly impossible for the United States to repel all cyber threats. Many observers believe the United States is increasingly at risk of cyber intrusions, which could gain access to computer systems that control, for example, power plants or public water systems.
The difficulties associated with protecting these assets are exacerbated by critical infrastructure owners and operators. The vast majority of owners and operators are private sector actors, and often they do not follow industry best practices for cyber security. For instance, lax reporting requirements deter owners and operators from reporting breaches, and industrial control systems use mostly commercial-off-the-shelf defenses that many experts find inadequate. Furthermore, a December 2015 cyber attack against a Ukrainian power grid that caused a power outage has intensified concerns in the United States about vulnerabilities within its own industrial control systems. Does ISIS have the capacity to exploit these vulnerabilities and physically impact a critical infrastructure asset?
ISIS has formed a highly centralized and hierarchical command structure within its occupied territory. ISIS’s centralized framework functions similarly to a nation-state, avoiding coordination pitfalls that decentralized terrorist networks experience. First, ISIS’s forces can conduct face-to-face interactions within their headquarters. This mitigates communication and coordination errors that plague most decentralized networks, and limits the chance that sensitive communiqués will be intercepted. Second, ISIS can use its centralized headquarters to train and evaluate a greater number of skilled operatives. Third, ISIS’s clear hierarchy can streamline decision-making and assuage internal conflict endemic in decentralized networks.2 These attributes give ISIS a state-like organizational capacity to coordinate and execute a complex and sophisticated cyber attack operation.
ISIS seems to have taken advantage of its centralized hierarchy to form a cyber attack force. In August 2015, its “Islamic State Hacking Division”hacked into the social media accounts of hundreds of U.S. military members. Later in 2015, the group hacked over 54,000 Twitter accounts. Though hacking sites is not nearly as complex as penetrating and manipulating industrial controls, these incidents illustrate ISIS’s capacity to create an organized and capable cyber division within its hierarchy.
ISIS also utilizes its centralized hierarchy and online acumen to create high-quality recruiting material. Propaganda is a top priority for ISIS, which has highly capable teams of both al Qaeda media veterans and young recruits well-versed in social media to bait potential fighters into joining the organization. ISIS media groups like the Al-Hayat Media Center have also produced professional-grade videos and advertisements that are often translated into several languages. The combination of a professional media team and a structured propagation operation has yielded a high output of propaganda: hundreds of videos in six different languages, daily radio broadcasts, and 2 million Twitter mentions per month. As of December 2015, ISIS had recruited at least 27,000 soldiers to supplement the military that it has drawn from native populations. These figures showcase ISIS’s success in using online communications to attract global recruits to fight for a transnational cause.
ISIS’s expansive online recruiting strategy has translated to high-skill cyber recruits. Many terrorist experts believe that ISIS’s recruitment has specifically targeted cyber warriors. For example, Junaid Hussain departed Britain in 2013 to become the top cyber expert in the Islamic State Hacking Division. He sharpened the terror group's defenses against Western surveillance, built hacking tools to penetrate computer systems, and even expressed interest in obtaining zero-day exploits (malware) to target previously unknown software vulnerabilities. U.S. and allied defense officials perceived Hussain as such a threat that they killed him in an August 2015 air strike, and have recently targeted other cyber operatives. That Hussain was not just a member, but a leader of the Islamic State Hacking Division suggests he worked with several other skilled recruits to conduct cyber operations. In addition, a Palestinian hacker organization recently pledged allegiance to ISIS’s leader, and ISIS created an online forum to provide followers tools to wage cyber terror campaigns. ISIS, therefore, already has several skilled cyber operatives—though their specific skill sets and capabilities are unclear.
ISIS uses territorial control to diversify its revenues stream, and higher levels of funding support sophisticated tactics like cyber attacks. Oil exports are ISIS’s largest revenue source,6 and the organization has raised additional tens of millions of dollars in antiquities trades. Natural gas exports, if at full capacity, could generate some $979M per year.Taxes, extortion and asset seizure from a citizenry of 10 million people generate up to $360M per year. Other revenue-generating ventures include agriculture; criminal activities (including ransoms); phosphate, cement, and sulfur sales; and (relatively modest) external support. ISIS reported a $2 billion budget for 2015. Though ISIS devotes significant funds to operate its state-like apparatus, it still anticipated a $250 million surplus for war-fighting. At the time of this writing, ISIL has not reported a 2016 budget, but we can assume air strikes against its economic infrastructure (e.g. oil) have significantly diminished its financial capacity. ISIL’s war-fighting surplus has probably subsequently decreased, yet it most likely remains in the hundreds of million of dollars. ISIS needs only to devote a fraction of these funds to purchase increasingly inexpensive cyber weapons.
ISIS must maintain its territorial occupation to sustain these diversified revenue streams and adequately fund a year-long cyber attack campaign. However, U.S. strikes against ISIS infrastructure, especially oil and gas facilities, have damaged ISIS’s revenue potential. The Pentagon estimated in January 2016 that air strikes had helped reduce ISIS barrel output per day from 45,000 to 34,000, dropping daily revenues below $1M per day. Further, as of February 2016, U.S.-backed forces have taken 40% of ISIS-controlled territory in Iraq and 20% in Syria, reclaiming economic sources from which ISIS had generated revenue. ISIS’s capacity to fund cyber operations will decrease with further territorial loss.
Therefore, the United States must intensify efforts to end ISIS’s territorial occupation in Iraq and Syria, while increasing engagement with private sector actors to bolster industrial control defenses. The less territory ISIS possesses and the less centralized its organization, the less capacity it has to execute a cyber attack against a U.S. critical infrastructure asset. However, the longer the caliphate exists, the larger and more advanced its cyber threat will grow.
Source: www.iar-gwu.

Comments

Popular posts from this blog

Terrorism in Africa

According to state.gov, ISIS was defeated a few years ago. However, the organization's presence and existence remain conspicuous in Africa. Ongoing conflicts in Somalia, Ethiopia, Mozambique, Nigeria, and Burkina Faso demonstrate that ISIS has shifted its focus away from Iraq and Syria. Although ISIS lacks a clear hierarchy like Al-Qaeda, its followers and supporters wholeheartedly believe in its strong ideology. In 2014, the United States led the formation of a broad international coalition known as 'The Global Coalition to Defeat ISIS' to combat the organization during the height of the Syrian and Iraqi conflict. The primary objectives of this 83-member coalition are to degrade and defeat ISIS, which poses a threat to international peace and security. ISIS has brought thousands of foreign fighters from around the world to combat zones like Syria and Iraq, and it has used technology to promote its violent extremist ideology and instigate terrorist attacks. For example, t

Sedition Act 1948 should have been repealed a long time ago. But why?

THE Sedition Act 1948 is a legislative measure that was enacted in Malaysia during the colonial era, designed to curb any form of speech or expression that was deemed to be seditious in nature with the aim of maintaining public order and security. The Sedition Act has been subject to much debate and criticism, with some arguing that it is a violation of freedom of speech and expression. Despite this, the Act remains in force in Malaysia to this day, albeit with some amendments made over the years. Although I concur with the abolition of this Act, it is imperative that a comparable new legislation be enacted to address the escalating prevalence of racially and religiously bigoted remarks that have been unsettling our distinctive multicultural and multi-religious society as of late. An instance that exemplifies the prudent decision-making of the governing body is the substitution of the Internal Security Act of 1960 with the Security Offences (Special Measures) Act 2012 (SOSMA). This rep

THE HISTORY OF TERRORISM: MORE THAN 200 YEARS OF DEVELOPMENT

The history of terrorism dates back at least 1500 years when Jewish resistance groups (66 - 72 A.D.) known as Zealots killed Roman soldiers and destroyed Roman property. The term assassin comes from a Shi'ite Muslim sect (Nizari Isma'ilis - also known as hashashins "hashish-eaters") fighting Sunni Muslims (1090 - 1275) and during Medieval Christendom resisting occupation during the Crusades (1095-1291). The hashashins were known to spread terror in the form of murder, including women and children. The brotherhood of Assassins committed terror so as to gain paradise and seventy-two virgins if killed and to receive unlimited hashish while on earth. The modern development of terrorism began during the French Revolution's Reign of Terror (1793 - 1794). During this period the term terrorism was first coined. Through the past two hundred years, terrorism has been used to achieve political ends and has developed as a tool for liberation, oppression, and i