CONFERENCE Cyber AI & Automation Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

US Military Claimed ‘Success’ in Hacking ISIS: Documents

The US military claims to have “successfully” disrupted the online propaganda efforts of the Islamic State in a hacking operation dating back at least to 2016, according to declassified national security documents released Tuesday.

The US military claims to have “successfully” disrupted the online propaganda efforts of the Islamic State in a hacking operation dating back at least to 2016, according to declassified national security documents released Tuesday.

The heavily redacted, previously top secret documents said the US Cyber Command “successfully contested ISIS in the information domain” and limited its online efforts on radicalization and recruitment “by imposing time and resource costs” on the jihadist group.

The documents released by the National Security Archive at George Washington University offer the most detailed look at “Operation Glowing Symphony,” the first offensive hacking operation acknowledged by the Pentagon.

The assessment pointed to a “significant reduction” in the online campaign waged by ISIS, but added that the Cyber Command efforts were slowed by a “lengthy and difficult” process for approving its operations.

It said that, given the expectation of “more frequent and widely scoped cyber operations,” better procedures should be in place to “help expedite the request and approval process.”

Officials have previously acknowledged the use of offensive cyber weapons as part of the US arsenal, but the newly released documents offer the most detailed assessment of the moves against ISIS by a joint task force created in 2016 by president Barack Obama.

According to a statement from the university archive, “Glowing Symphony” was initially approved for a 30-day window in late 2016 but a July 2017 administrative message extended the operation, and it was unclear if it is continuing.

The documents released under a Freedom of Information Act request “reveal the unprecedented complexity of the operation, resulting challenges in coordination and deconfliction, and assessments of effectiveness,” the GWU archive said.

Advertisement. Scroll to continue reading.

The hacking operation represents the US response to concerns about how extremist groups had been using social media and online services to promote their cause, often seeking to spread propaganda for recruitment and radicalization.

According to the university archive, the latest documents and public comments by Cyber Command chief General Paul Nakasone offer clues to how the joint task force operates and what it may do in response to efforts to disrupt the US election campaign.

Nakasone said in a 2019 interview that another task force called the Russia Small Group had been formed  to be able to “rapidly to address a threat” to the campaign.

RelatedPentagon Working to ‘Take Out’ Islamic State’s Internet

Related: US Military Conducts Cyber Attacks on Islamic State

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Don’t miss this Live Attack demonstration to learn how hackers operate and gain the knowledge to strengthen your defenses.

Register

Join us as we share best practices for uncovering risks and determining next steps when vetting external resources, implementing solutions, and procuring post-installation support.

Register

People on the Move

Shanta Kohli has been named CMO at Sysdig.

Cloud security firm Sysdig has appointed Sergej Epp as CISO.

F5 has appointed John Maddison as Chief Product Marketing and Technology Alliances Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.