Anonymous #OpISIS: Can Cyber Warfare Win the War on Terror?

Applied Technology Institute (ATI Courses) offers a variety of courses on Cyber Security, Communications & Networking.  This is our take on the recent activities of the most famed Hacktivist group to date called  Anonymous. The horrors of the Paris attacks have prompted a new wave of hate and determination among the cyberwarfare group of unknown size. Anonymous will […]
Applied Technology Institute (ATI Courses) offers a variety of courses on Cyber Security, Communications & Networking.  This is our take on the recent activities of the most famed Hacktivist group to date called  Anonymous. The horrors of the Paris attacks have prompted a new wave of hate and determination among the cyberwarfare group of unknown size. Anonymous will not forgive. Anonymous will not forget. Expect them. With the news of this declaration of war, many questions are rising. Will Anonymous succeed? Are cyberattacks what is needed in the face of the ever-expanding terrorist organization? Will it do more harm than good? Cyberattacks have taken many forms in the past, often focusing on taking control of online accounts, websites or databases and causing ridicule or putting a full stop to any of the targeted organization’s operations. The online hacker group has been famous for coming from all over the world to unite over one cause, be it the taking down of a government, as in their recent launch of Operation North Korea, or publishing and thereby shutting down harmful websites, such as child pornography websites in a ploy known as Operation DarkNet. Anonymous had a key role in kickstarting Arab Spring protests with their involvement in Operation Tunisia, which served to fight online censorship and awaken Tunisian activism in the face of their repressive government. What are its plans to destroy Daesh? Operation Ice ISIS, which vowed to execute “coordinated cyberattacks against extremist Jihadi websites and governments such as Turkey and Saudi Arabia who funded and supported ISIS”, had already been initiated in late September of last year.  Among criticism and fear of putting the cyberattackers in extreme danger, however, this operation resorted to using knowledge as a weapon. The goal became to spread the fact that ISIS does not represent a religion, and that the 1.6 billion Muslims in the world do not condone the abominable actions being carried out by the extremist group. The operation was revived after the Charlie Hebdo attacks in January of this year. Consecutive videos were published as part of #OpIsis (in FebruaryMarch, and April). The operation seemed somewhat successful, as Anonymous publicized the taking down of ISIS websites and published ISIS database information. Will this suffice to take down Daesh, one of the most feared terrorist organizations of the 21st century? According to them, the answer lies in their identity. They represent everyone and everything:
“We Are: Muslims, Christians, Jews… We Are hackers, crackers, hacktivists, phishers, agents, spies, or just the guy from next door. We Are students, administrators, workers, clerks, unemployed, rich, poor. We are young, or old, gay or straight. We wear smart clothes or rugs, we are hedonists, ascetics, joy riders or activists. We come from all races, countries, religions, and ethnicity.” (taken from the Anonymous Official Youtube channel)
This is particularly important in the face of ISIS, an extremist organization claiming to represent one of the largest religions of the world and aiming to destroy all those who do not believe in the same God they do. Unlike national governments, which hide behind specific ideologies, languages, and other exclusionary factors, Anonymous has the power to attract anyone from anywhere in the world, regardless of their language or religion. ISIS has also often been known to make wide use of the Internet and social media in its recruiting campaigns, as well as in its mission to spread fear across the globe. This widespread use of social media such as Facebook, Twitter, and Youtube accounts, has been crucial in the war that Anonymous has waged, as seen with results of #OpIsis earlier in the year. Already, Operation Paris has resulted in the shutting down of multiple ISIS Twitter accounts, most likely used to recruit youth into the extremist group. Will Anonymous be able to maintain a strong identity and ideology as well as support in its endeavor to destroy ISIS? Please comment below. For more cyber warfare news please visit The Cyber Wire.


Sign Up For ATI Courses eNewsletter

Cyber warfare on the rise. ATI offers information.

Year 2011 proved to be the record year for cyber attacks.  Security experts have discovered the biggest series of cyber attacks to date, involving the infiltration of the networks of 72 organizations including the United Nations, governments and companies around the world. The graph shows many of the main Cyber Events of this tremendous 2011 […]
Year 2011 proved to be the record year for cyber attacks.  Security experts have discovered the biggest series of cyber attacks to date, involving the infiltration of the networks of 72 organizations including the United Nations, governments and companies around the world. The graph shows many of the main Cyber Events of this tremendous 2011 up to June 16, 2011. Additional attacks were discovered against U.S. Defense Contractors (L-3 on April 6th, and Northrop Grumman on May 26th) as well. Cyber acts are a growing problem. Other companies that suffered cyber attacks later in the year were Sega video game software developer, and the biggest security breach of the year: Zappos online shoe and apparel shop. Would you information to protect your company against this modern day threat? Applied Technology Institute, LLC offers a new Cyber Warfare-Theory and Fundamentals course on April 3-4, 2012 in Columbia, MD. This two-day course is intended for technical and programmatic staff involved in the development, analysis, or testing of Information Assurance, Network Warfare, Network-Centric, and NetOPs systems. The course will provide perspective on emerging policy, doctrine, strategy, and operational constraints affecting the development of cyber warfare systems. This knowledge will greatly enhance participants’ ability to develop operational systems and concepts that will produce integrated, controlled, and effective cyber effects at each warfare level. U.S. citizenship required for students registered in this course. You will learn the following:
  • What are the relationships between cyber warfare, information assurance, information operations, and network-centric warfare?
  • How can a cyber warfare capability enable freedom of action in cyberspace?
  • What are legal constraints on cyber warfare?
  • How can cyber capabilities meet standards for weaponization?
  • How should cyber capabilities be integrated with military exercises?
  • How can military and civilian cyberspace organizations prepare and maintain their workforce to play effective roles in cyberspace?
  • What is the Comprehensive National Cybersecurity Initiative (CNCI)?
From this course you will obtain in-depth knowledge and awareness of the cyberspace domain, its functional characteristics, and its organizational inter-relationships enabling your organization to make meaningful contributions in the domain of cyber warfare through technical consultation, systems development, and operational test & evaluation. Call today for registration at 410-956-8805 or 888-501-2100 or access registration page on our website at.  Any ATI course can be presented as an on-site at your facility.  For general questions please email us at ATI@ATIcourses.com ATI specializes in short course technical training Our mission here at the Applied Technology Institute (ATI) is to provide expert training and the highest quality professional development in space, communications, defense, sonar, radar, and signal processing. We are not a one-size-fits-all educational facility. Our short classes include both introductory and advanced courses.
Sign Up For ATI Courses eNewsletter