Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Confronting
Terror-affiliated Hacktivists
By Meg King and Grayson Clary
SUMMARY
The cyberthreat posed by terror groups today looks less like war than
hacktivismthe use of online subversion or sabotage, often by loosely
networked actors, to boost a political agenda. Within these opportunistic
webs of affiliation, whether a hacker has an operational link to a terrorist
organization is largely irrelevant. Any sympathizer can use digital tools to
deface websites for propaganda value, encourage acts of violence, or cause
economic disruption. In response, firms and governments can do more to
improve defenses, educate users, and monitor hacktivist capabilities.
Cyberattacks traditionally have required significant financial and technical resources available only to
nation-states, their proxies, or major criminal syndicates. Terrorist digital arsenals remain immature by
comparison. However, the rise of loosely organized hacktivist groups illustrates a new dimension to
the cyberthreat posed by prominent terrorist organizations, from al-Qaeda to the Islamic State of Iraq
and al-Sham (ISIS). A cyber 9/11 is unlikely in the near future, but we are witnessing an important
shift: terror groups increasingly benefit from the ad-hoc support of digital sympathizers.
Even without an operational link to a designated group, these supporters can cause
substantive damage. They can deface prominent web platformsand this kind of
cybervandalism scores propaganda points while attracting attention
and new recruits to a cause. They can disrupt online services to
cause real economic pain, through either sabotage (direct digital
These threats are easy to scale: with more money, more talent, and more time.
2)
These threats are asymmetric: they do damage but conserve terrorist resources.
3) The targets are very soft: most Americans practice terrible cybersecurity.
4) The talent pool is growing: well-known, capable figures (e.g., ISISs Junaid
Hussain) have set their sights on recruiting digital natives within Western
governments and firms.
Loose connections
Terror groups unambiguously seek cyberassistance. In 2011, As-Sahabal-Qaedas media
armreleased a video calling talented coders to its cause: In todays world, there is
room for covert Mujahideen who operate innovatively out of their own homes, villages
and cities this is the field of electronic Jihad. But the relationships that connect selfidentified jihadist hackers with the groups they support, as well as the ties between
hacktivists themselves, remain largely unclear. Responsibility for intrusions has been
claimed under many names, including CyberCaliphate, the Islamic State Hacking Division,
Team System Dz, Global Islamic Caliphate, FallaGa, and Z Company Hacking Crew.
We know little about the set-up of any of these groups; there may be hardly any there
there. One factor distinguishing hacktivism from cyberwar is a lack of command-andcontrol. We have every reason to suspect that electronic jihad is at present a leaderless
movement: lone wolves and wolf packs cooperate as opportunities arise, affiliating
often but forming few permanent commitments. Some of these hackers have no doubt
connected in Syria, where both ISIS and al-Qaeda affiliates enjoy safe haven. Some of
them, by contrast, probably meet only online. Others may never have had contact with a
known jihadist at all, and instead are self-radicalized and digitally armed.
WILSON BRIEFS
The integration of
cyberespionage with
conventional terror activity is
a new frontier for hackers.
WILSON BRIEFS
Meg King is director of the Wilson Centers Digital Futures Project. Grayson Clary is
assistant to the director, president, and CEO of the Wilson Center.
@TheWilsonCenter
facebook.com/WoodrowWilsonCenter
www.wilsoncenter.org
WILSON BRIEFS