EXCLUSIVE – Sound and Picture
Officials at the Pentagon declared launching e-attacks on IS by a group following to the Pentagon called “Cyber command”. This group was created in 2010 to carry out e-tasks, such as the US government counter-attacks on terrorist groups. However, the attacks form and targets were not declared.
Observers of IS activities are aware that the e-war between IS and western governments is not new, it is a competitive war since the start of IS, as the war extended to include groups of hackers who took sides, yet this war has not made the significant impact that the Ministry of defense would declare.
An expert, who preferred not to mention his name, said to “Sound and Picture”: “The influence that governments can make is limited to social media and websites, as the maximum that these governments were able to do was to close some of IS’s accounts and pages on Facebook and Twitter, and some websites in which IS releases its publications. Nevertheless, IS in turn has created hundreds of backup accounts which they activate immediately when deactivating any account.”
IS often tries to attract technical experts from around the world by providing many temptations, “Junaid Hussein” was only one of these electronic brains that IS was able to depolarize. Abu Khalid, a man close to IS, said: “Junaid was one of IS’s best technical experts, he was responsible of the security for many of IS’s sites and accounts, as he was one of the persons who were skillfully engaged in the e-war and was able to cause a lot of losses to Pentagon, where he led a group called “Cyber Caliphate” that hacked Pentagon’s account on Twitter”. It is worth mentioning that Junied was killed in an air strike targeted him in August 2015.
IS, from its side, is well aware of the ability of western governments to confront IS electronically and this evoked it to isolate all its financial, military and oil institutions from internet, where it depends on manual work in managing its vital institutions, whereupon transferring money is physical, not electronic, managing facilities is direct, and sending commands is done through the deployed members. Ahmed, a familiar person with IS’s institutions, said to “Sound and Picture”: “IS does not use technology at all in the vital institutions fearing penetration. At the same time it does not trust its members to the extent of relying on them for transferring large amounts of money or significant orders. Therefore, IS does not leave large amounts of money under the management of a single person, for IS has suffered earlier of several cases of stealing and fleeing. Consequently, IS transfers funds that exceed a certain amount through members appointed by IS leaders and send orders secretly through delegates to vital institutions. “
The electronic insulation Which IS tries to superimpose on its vital institutions does not mean that it stopped developing its electronic capabilities. On the contrary, IS started significantly to develop its capabilities, Khalid said to “Sound and Picture”, “IS brought a number of experts from Iraq to install a radar system which IS used in an experiment with seized regime planes. These experts have a high level of training and skills and they are currently working on the development of anti-aircraft missile system, using some seized devices in addition to bringing the missing pieces form Iraq, which indicates the great development happening in IS’s IT capabilities”.
IS is totally aware of the danger of the internet to it and to the governments at the same time, so it is trying to acclimatize its institutions to be Impenetrable, and trying to inflict maximum losses to others as an attempt to compensate for its losses on the ground with technological victories. So, Will the governments be able to incur IS losses electronically as on the ground?