{"id":13018,"date":"2016-11-29T21:27:21","date_gmt":"2016-11-29T21:27:21","guid":{"rendered":"http:\/\/thevoiceoflondon.co.uk\/?p=13018"},"modified":"2016-11-29T21:27:21","modified_gmt":"2016-11-29T21:27:21","slug":"how-isis-is-changing-the-way-we-fight-wars","status":"publish","type":"post","link":"https:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/how-isis-is-changing-the-way-we-fight-wars\/","title":{"rendered":"How ISIS is changing the way we fight wars"},"content":{"rendered":"<h3 class=\"p1\"><span class=\"s1\">Smartphones and laptops are becoming as valuable as AK-47s<\/span><\/h3>\n<h4 class=\"p3\"><span class=\"s1\">Reporter: Joseph Carey | Sub-Editor: Jack Leslie<\/span><\/h4>\n<p class=\"p3\"><span class=\"s1\">War always spurs the development of new technologies, from the first use of the tank at the Battle of the Somme to the development of radar and its use in World War Two. But technology\u00a0has always played a supplementary role to more traditional on foot combat. In recent years, this philosophy has completely changed, making war on the cyber front a completely different entity to anything happening on the ground. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">The issue of cyber warfare is a new and interesting one. The Voice of London spoke to Cedric Leighton, a military analyst for CNN, and Anthony Cuthbertson, a technology writer for Newsweek on the tactics of ISIS and how even technologies we use every day, like social media, is playing its part in war.<\/span><\/p>\n<p class=\"p3\" style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-13983\" src=\"http:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-content\/uploads\/sites\/64\/2016\/11\/Cedric-Leighton.jpg\" alt=\"cedric-leighton\" width=\"160\" height=\"160\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13984\" src=\"http:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-content\/uploads\/sites\/64\/2016\/11\/Anthony-Cuthbertson.jpeg\" alt=\"anthony-cuthbertson\" width=\"160\" height=\"160\" \/><\/p>\n<p class=\"p3\" style=\"text-align: center\"><em>Cedric Leighton (left) and Anthony Cuthbertson (right)<\/em><\/p>\n<p class=\"p3\"><span class=\"s1\">At the start of the year the <a href=\"http:\/\/www.bizjournals.com\/washington\/blog\/fedbiz_daily\/2016\/03\/why-the-pentagon-is-finally-acknowledging-the-u-s.html\"><span class=\"s2\">US formally acknowledged<\/span><\/a> for the first time they were launching cyber-attacks to combat terrorism, this statement has been followed up by defense secretary Michael Fallon <a href=\"http:\/\/www.bbc.co.uk\/news\/uk-37721147\"><span class=\"s2\">acknowledging that the UK<\/span><\/a> is also launching its own brand of cyber-attacks in order to weaken ISIS further in the battle to take back Mosul.<\/span><\/p>\n<p class=\"p3\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13021\" src=\"http:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-content\/uploads\/sites\/64\/2016\/11\/isis.jpg\" alt=\"isis\" width=\"974\" height=\"546\" \/><\/p>\n<p class=\"p3\" style=\"text-align: center\"><em>Day Donaldson\u00a0&#8211; Flickr<\/em><\/p>\n<p class=\"p3\"><span class=\"s1\">Leighton was keen to explain that the US sees the expansion into cyber warfare as a very serious effort to combat terrorism:<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u201cWhen you look at the way the defense budget for example is structured in the US, the way in which the defense department makes requests for funds and you see the one area that has seen an increase in the budget has been the cyber area\u2026In many cases people are advocating for a fifth military service that would be a cyber force.\u201d<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">The cyber war is being fought on social media and messaging apps predominantly \u2014 the big powers of the world know this and are reacting to it, especially when they are looking to push ISIS back on the ground at the same time:<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u201cThe way in which the US is doing it [cyber-attacks] is actually a multifaceted approach, one part is just responding to the social media aspect of it, there are tens of thousands of Twitter accounts that belong to ISIS affiliate people and are active on Twitter, on Facebook and other social media venues\u2026What the US also knows is that ISIS is using different messaging apps to send orders to different elements of the fighting forces that ISIS has.\u201d Explained Leighton.\u00a0<\/span><\/p>\n<p class=\"p3\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13022\" src=\"http:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-content\/uploads\/sites\/64\/2016\/11\/cyber-warfare-2.jpg\" alt=\"cyber-warfare-2\" width=\"640\" height=\"360\" \/><\/p>\n<p class=\"p3\" style=\"text-align: center\"><em>Wikimedia Commons<\/em><\/p>\n<p class=\"p3\"><span class=\"s1\">Cutherbertson explained that just like the divisions of the military in most countries, ISIS also has its own division of people dedicated to cyber warfare:<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u201cISIS has the CCA, which is the caliphate cyber army, and they\u2019re carrying out attacks on websites. They\u2019re trying to hack military and government targets. There are also vigilantes who do not seem to have a side, the likes of anonymous that have taken things into their own hands to try and target ISIS through cyber means.\u201d<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Although ISIS claims to have high hacking talent, Cuthbertson explained that, so far, the attacks by ISIS on websites have been very low level:<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u201cThe targets (by ISIS) are very low level, one was a laminate flooring company in the UK for example, another one was a solar company, a company that sold solar cells. They have had a few gaffs, a few mistakes where they announced they were going to take down Google and the site they actually took down was a Google ad site, a very small company. That is potentially embarrassing for them.\u201d<\/span><\/p>\n<p class=\"p3\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13023\" src=\"http:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-content\/uploads\/sites\/64\/2016\/11\/social-media-.jpg\" alt=\"social-media\" width=\"1280\" height=\"928\" \/><\/p>\n<p class=\"p3\" style=\"text-align: center\"><em>Pixelkult &#8211; Pixabay<\/em><\/p>\n<p class=\"p3\"><span class=\"s1\">Where ISIS is excelling is in their use of messaging apps to communicate and organise attacks. Governments are doing their best to try and gain access to these messages although the encrypted nature of most of these apps makes this difficult according to Leighton:<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u201cIf you can\u2019t get into the body of the message [with regard to encrypted messaging services] then what you can do is you can look for message externals. That means for example \u2018who is talking to whom\u2019, how they\u2019re connected to other people, and in essence it\u2019s that chaining mechanism that becomes important.\u201d<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Cuthbertson has been following ISIS on social media and encrypted messaging systems for months, he has noticed a shift in the tactics of the terrorist organisation:<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u201cThey [ISIS] migrated away from Twitter, which they were using before because every account was getting shut down, and now they\u2019ve moved to Telegram.\u201d<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Telegram is an app that prides itself on encryption \u2014 the marketing for the application advertises the fact the messages you send have the ability to self destruct if it\u2019s believed someone outside of the conversation thread has gained access to the content.<\/span><\/p>\n<p class=\"p3\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13019\" src=\"http:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-content\/uploads\/sites\/64\/2016\/11\/Telegram-messages-.png\" alt=\"telegram-messages\" width=\"720\" height=\"614\" \/><\/p>\n<p class=\"p3\"><span class=\"s1\">Both Cuthbertson and Leighton acknowledge that the cyber attacks by ISIS so far have been relatively low level, they are currently hacking small websites and performing rush tactics like finding a shared story on Facebook and flooding it with terrorist propaganda. Cyber warfare is still in its infancy, that\u2019s why the world is taking it seriously now and rooting out the problems that exits, however minute. The world is moving to a more digital stance on warfare and it won\u2019t be long before a computer is picked over an AK-47 for getting things done. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smartphones and laptops are becoming as valuable as AK-47s Reporter: Joseph Carey | Sub-Editor: Jack Leslie War always spurs the development of new technologies, from the first use of the tank at the Battle of&#8230;<\/p>\n","protected":false},"author":476,"featured_media":13020,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[82,121,123],"tags":[1661,3220,5723,6124,6136],"class_list":["post-13018","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifestyle","category-tech","category-technology","tag-cyber-warfare","tag-isis","tag-social-media","tag-telegram","tag-terrorism"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-json\/wp\/v2\/posts\/13018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-json\/wp\/v2\/users\/476"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-json\/wp\/v2\/comments?post=13018"}],"version-history":[{"count":0,"href":"https:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-json\/wp\/v2\/posts\/13018\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-json\/wp\/v2\/media\/13020"}],"wp:attachment":[{"href":"https:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-json\/wp\/v2\/media?parent=13018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-json\/wp\/v2\/categories?post=13018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.westminster.ac.uk\/thevoiceoflondon\/wp-json\/wp\/v2\/tags?post=13018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}