Getting Tech in the Fight

By Steven Stalinsky

Steven Stalinsky has been Executive Director of the Middle East Media Research Institute (MEMRI) since 1999. His latest research centers on terrorist use of the Internet and can be found at MEMRI's Cyber Jihad Lab.  He is the author of the upcoming book American Traitor - The Rise and Fall of Al-Qaeda's U.S. Born Leader Adam Gadahn.

Since before 9/11, Al-Qaeda and other jihadi groups have been quietly investing in cyber jihad, which is now disseminated and promoted by a new, Internet-savvy generation. Jihadis have advanced from primitive password-protected websites to freely available social media platforms. Al-Qaeda, and now the Islamic State (ISIS), have infested YouTube, Twitter, Instagram, Tumblr, Yahoo’s Flickr, and the Internet Archive, and adopt new social media – Ask.fm, Vimeo, Vidme, VK.com, and SoundCloud, to name a few – almost as quickly as they emerge. They also depend on apps available on Google Play and iTunes for Apple. Jihadis’ online presence now consumes U.S. and other Western governments’ counterterrorism efforts, and it should be of concern to the business community, which has remained largely silent on this issue.

American tech companies have been instrumental in helping to spread jihadi ideology. Anyone can follow, “like,” “friend,” tweet, and re-tweet content by ISIS as well as submit questions to it, view photos posted by it, and conduct dialogue with it. There is also an effort to recruit activists with computer and Internet skills to help hack government and bank websites, hijack drones and other aircraft, and carry out various cyber crimes, such as leaking personal details of military, government, and business leaders or stealing customer data.  Just recently, it was announced that a Kosovoan hacker was arrested in Malaysia on a U.S. warrant alleging he hacked into the computer system of a U.S. company, stole personal information of 1,351 service members, and passed it on to several ISIS figures.

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” —Sept. 2018, Studies in Intelligence, Vol. 62

Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Subscriber+

Categorized as:InternationalTagged with:

Related Articles

How Safe Would We Be Without Section 702?

SUBSCRIBER+EXCLUSIVE INTERVIEW — A provision of the Foreign Intelligence Surveillance Act that has generated controversy around fears of the potential for abuse has proven to be crucial […] More

Search

Close