GCHQ reveals ISIS was the target of its first major cyber attack

Outcome of offensive operations ranged from denying online services to destroying equipment

Aerial shot of GCHQ's building

The UK conducted its first massive-scale cyber attack against ISIS, systematically degrading its online infrastructure, GCHQ's new director has revealed.

These operations, conducted last year, significantly contributed towards suppressing online terrorist propaganda and hindered ISIS' ability to coordinate attacks, Jeremy Fleming confirmed while making his first public speech as GCHQ director.

Advertisement - Article continues below

In his talk in Manchester, the former MI5 agent outlined how GCHQ has been growing its online counterterrorism capabilities for more than a decade, with action taken leading to significant shifts in the fight on the ground.

"Daesh's ability to inspire, direct and enable attacks, and the simple tactics they use make stopping attacks much, much harder." Fleming said. "But the UK's CT team -- led by MI5 and the Police, supported by GCHQ, MI6 and the Military -- is evolving fast to match this threat."

He continued: "These operations have made a significant contribution to coalition efforts to suppress Daesh propaganda, hindered their ability to coordinate attacks, and protected coalition forces on the battlefield.

"But cyber is only one part of the wider international response. This is the first time the UK has systematically and persistently degraded an adversary's online efforts as part of a wider military campaign. Did it work? I think it did."

Marking the end of CyberUK 2018, the National Cyber Security Centre's (NCSC) flagship event on cybersecurity, Fleming used his speech to outline the shifting geopolitical and technological landscapes, as well as GCHQ's role in countering cyber threats.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The outcome of such cyber attacks, not limited to operations against ISIS, range from denying online services, disrupting a specific online activity, deterring an individual or a group, or even destroy equipment and networks.

He also used the speech to highlight the growing threat of Russia, particularly in light of recent events that are "particularly stark and shocking."

"We'll continue to expose Russia's unacceptable cyber behaviour, so they're held accountable for what they do, and to help Government and industry protect themselves," he said. "The UK will continue to respond to malicious cyber activity in conjunction with international partners such as the United States."

The revelation follows news that GCHQ spies had "over-achieved" in 2017, according to a report by Parliament's Intelligence and Security Committee (ISC).

The ISC report celebrated the fact GCHQ had delivered on the first of three stages in its mission to bolster its cyber capabilities, with an official confirming the agency had developed almost twice as many potential hacks than its targets.

Advertisement - Article continues below

Meanwhile, efforts to combat the spread of online terrorist propaganda have also taken the form of tools such as an auto-blocker for extremist content which Home Secretary Amber Rudd suggested Internet Service Providers (ISPs) could be forced to adopt while speaking in Silicon Valley in February.

Tools such as the auto-blocker, which its developers ASI Data Science said could be configured to detect 94% of extremist video uploads, are increasingly likely to comprise the main weapons in the fight against ISIS moving forwards.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/28170/what-is-cyber-warfare
Security

What is cyber warfare?

16 Mar 2020

Most Popular

Visit/security/privacy/355155/zoom-kills-facebook-integration-after-data-transfer-backlash
privacy

Zoom kills Facebook integration after data transfer backlash

30 Mar 2020
Visit/security/data-breaches/355173/marriott-hit-by-data-breach-exposing-personal-data-of-52-million
data breaches

Marriott data breach exposes personal data of 5.2 million guests

31 Mar 2020
Visit/security/cyber-crime/355171/fbi-warns-of-zoom-bombing-hackers-amidst-coronavirus-usage-spike
cyber crime

FBI warns of ‘Zoom-bombing’ hackers amid coronavirus usage spike

31 Mar 2020
Visit/data-insights/data-management/355170/oracle-cloud-courses-are-free-during-coronavirus-lockdown
data management

Oracle cloud courses are free during coronavirus lockdown

31 Mar 2020