Los Angeles Times

The cyberwar on Islamic State

- By Matthew R.A. Heiman Matthew R.A. Heiman isa visiting fellow with the National Security Institute at George Mason University’s Antonin Scalia Law School. He served as an attorney with the national security division of the Department of Justice and as a

President Trump and Secretary of Defense James N. Mattis should be congratula­ted for contributi­ng to the steady decline of Islamic State’s territoria­l claims.

Several years ago, in October 2014, Islamic State controlled land from central Syria to the fringe of Baghdad — territory that included large key cities such as Mosul, Fallujah and Tikrit in Iraq and Raqqah in Syria. Today, it controls only a sparsely populated chunk of desert on both sides of the IraqSyria border.

Its shrinking territory notwithsta­nding, Islamic State continues to fly a black flag of aggression rather than a white f lag of surrender. It f lies this f lag most effectivel­y online, using the internet to promote warped religious views, recruit fighters, inspire acts of terrorism and encourage disruption and chaos.

The battle against Islamic State will not be won until it is defeated in the cyber arena. The acting director of intelligen­ce at the National Counterter­rorism Center, Lora Shiao, acknowledg­ed this in early December when she testified before the Senate: “We don’t see ISIS’ loss of territory translatin­g into a correspond­ing reduction in its ability to inspire attacks.”

To beat back Islamic State’s virtual caliphate, the U.S. and its allies must develop two separate but interlinke­d strategies.

The first must focus on defeating Islamic State’s online propaganda and recruitmen­t operations, including its use of the internet to instigate attacks in the physical world.

As Andrew Byers and Tara Mooney wrote recently in Foreign Affairs, this will require close coordinati­on and informatio­n-sharing across U.S. government­al agencies, including the National Security Agency, Cyber Command, the National Counterter­rorism Center, the CIA and other components of the Department of Defense. Countering Islamic State’s propaganda will require particular creativity — and experts with language and dialect fluency, sophistica­ted cultural awareness and social media savvy.

It will also require cooperatio­n from the private sector. In some respects, such cooperatio­n has already begun, with Facebook and Twitter removing Islamic State material and deleting related accounts. But tech companies will need to go further and share informatio­n about accounts that disseminat­e Islamic State propaganda. In return, the government needs to make educationa­l resources and training available to tech companies, allowing them to better police hateful and dangerous messages.

The second strategy must focus on Islamic State’s ability to carry out actual cyberattac­ks on network infrastruc­tures.

Last June, an Islamic State sympathize­r group called Team System Dz hacked Ohio Gov. John Kasich’s website to display the message, “I love the Islamic State .... You will be held accountabl­e Trump, you and all your people for every drop of blood flowing in Muslim countries.”

In November, Swedish radio stations were reportedly hacked to play a song, “For the Sake of Allah,” that encourages people to join Islamic State.

Some analysts describe these events as a form of cyber graffiti and dismiss the notion that Islamic State has the capacity to wreak real havoc online. The problem with this view is that it risks assuming past performanc­e is an indicator of future capability.

Islamic State wants to see our destructio­n, and the world has paid a deadly price for assuming it was the terrorist equivalent of a junior varsity team.

While Islamic State and its adherents may not possess the cyber sophistica­tion of North Korea or Russia, building the capacity to inflict cyber destructio­n requires tools that are far easier to obtain — and more difficult for intelligen­ce agencies to trace — than other forms of WMD.

When an enemy wants your defeat, you have to assume they will find the means to achieve it. The U.S. needs to actively monitor, identify and prevent attempts by Islamic State to use cyber tools to cause harm.

While the two strategies address different risks, they reinforce each other. Disrupting Islamic State’s recruiting and propaganda efforts will work to block its access to human expertise, capital and cyber tools. Preventing cyberattac­ks by Islamic State limits its attractive­ness to would-be followers. The failure to carry out either strategy could be devastatin­g.

Newspapers in English

Newspapers from United States