ABSTRACT

Information Warfare: DOD's Response to the Islamic State Hacking Activities [May 10, 2016]   [open pdf - 92KB]

"The Islamic State (IS) has pursued a strategy of accessing U.S. government computer systems for a variety of purposes. IS pursues five primary categories of activity when targeting U.S. computer systems: defacement, distributed denial of service, data theft, disabling websites, and data breaches. The Department of Defense (DOD) is pursuing a number of activities aimed at detecting, deterring, and thwarting IS hacking activities. In May 2015, FBI Director James Comey stated, 'ISIS [Islamic State of Iraq and Syria] is 'waking up' to the idea of using sophisticated malware to cyberattack critical infrastructure in the U.S.' and 'logic tells me it's coming,' and the terror group is 'looking into' developing an advanced cyberattack capability. Some government officials have stated that IS has already undertaken attacks against computers that manage U.S. critical infrastructure processes. In October 2015, Caitlin Durkovich, Assistant Secretary for Infrastructure Protection at the Department of Homeland Security, stated at a conference focused on energy sector issues that 'ISIL is beginning to perpetrate cyberattacks' on the nation's critical infrastructure. At the same conference, Special Agent John Riggi, Section Chief of the FBI's Cyber Division, stated that while IS has 'strong intent (to undertake a cyberattack), thankfully, (they have) low capability.'"

Report Number:
CRS Insight, IN10486
Author:
Publisher:
Date:
2016-05-10
Copyright:
Public Domain
Retrieved From:
Federation of American Scientists: http://www.fas.org/sgp/crs/index.html
Format:
pdf
Media Type:
application/pdf
URL:
Help with citations