CYBER TERRORISM: A CASE STUDY OF ISLAMIC STATE

In today’s postmodern world with the latest and top notch internet technologies in the market, if it has become easy and accessible for everyone to communicate with others sitting at the other corner of the world, it has also given rise to the cybercrimes including cyber terrorism which has not only provided grave threats to the whole world but also posed a question of whether with the manipulation of cyber space, cyber terrorists can damage or destroy the physical infrastructure of its target. Owing to easy access to everyone and strong damage done as compared to traditional terrorism, today terrorists are relying on cyber terrorism as well. The Islamic State (IS) has emerged as one of the brutal and violent terrorist organizations which hired cyber experts and manipulated cyber space to the extent that today they are most active and professional cyber users’ terrorist organization of the world. The main focus of the paper is to highlight the basic definition of cyber terrorism, how often it is different from traditional terrorism, use of cyber terrorism, how cyber terrorism can be manipulated through various latest tools and techniques and how Islamic State (ISIS) is using cyber space to spread its message.


Introduction
The presence of terrorist organizations in cyberspace is not a new phenomenon as they have been showing their existence online since their very own inception. However, their reliance on cyberspace operations has tremendously increased since last two decades. The cyber terrorism threat has evolved into a multi-faceted and complex riddle where various ideological dogmas are turning the world into a cyber-war.
During 1998, half of thirty organizations which were designated as "Foreign Terrorist Organizations" under the US Effective Death Penalty Act of 1996 and US Anti-Terrorism maintained online presence through the developed websites. 1  It has been said that the First World War was the chemists' war, because the mustard gas and chlorine were employed for the first time, and that the Second World War was the physicists' war, because the atom bomb was detonated. Similarly, it has been argued that the Third World War would be the mathematicians' war, because mathematicians will have control over the next great weapon of warinformation war. 2 The cyber terrorism threat-prone landscape of ISIS is multi-layered and multidimensional. They have online presence and they are fighting this asymmetric war successfully. The paper will discuss the online recruitment procedure of the organization and how they manipulate the cyber space in order to achieve political gains. Much research has been done on conventional terrorism, its causes and aftermath. There are many researchers who researched and concluded that cyber terrorism may not pose serious threats in future and that it is more than a virtual game instead of physical terrorism. This paper attempts to highlight the misuse of cyber space by terrorist organizations focusing on Islamic State (IS) presence online.

Theoretical Framework
The study can be best described by the postmodern game theory as it is about opponents who wage war in unconventional situations and postmodern fashion. The game theory was enunciated by Emile Borel in 1921 which was further expanded by the mathematician John von Neumann in 1928 in 'a theory of parlor games'. 3 The cyber terrorists and cyber experts both use tactics that are not common in traditional conflicts. The cyber terrorism is a war between two main protagonists of cyberspace. One looks towards manipulating the cyber space while other strives to protect it. The game theory best suits it as this theory is related to the study of power and control involving two or more actors with same or opposite interests.
Game theory offers a variety of new ideas and mechanism for defense and cyber-attacks. There is wide collection of perspectives for mocking-up the cyber warrior behavior but cyber hacker can change its behaviour according to the diversity of environment and community. In game theory, the cyber hackers use same methods of attack but during the attack, they keep on using different tactics to overcome or control the target. In cyber terrorism, a terrorist tries to gain more control over the object and they will be successful if they are able to cause more damage to the target. Game theory mostly deals with the conflict and cooperation between two or more actors. The actors are dependent on each other and they can be anyone i.e. an individual or a group of individuals, an agent or a group of agents. The theory tries to develop a basic structure to make people understand strategic scenarios. 4 There are three types of outcomes which are produced when applied on players. These outcomes are Nash equilibrium, zero-sum game, positive-sum game and negative-sum game. 5

Nash equilibrium
John Nash gave the idea of Nash Equilibrium in 1950 which is the core concept of game theory. It is mostly used to envisage the outcome of strategic interaction of two agents in given circumstances. They both play their part and primary actions. 6 The central idea of this theory is to recommend a strategy to each player which cannot be improved upon by the player unilaterally. Since both players in the game theory are rational so it becomes reasonable for each player to act upon and expect the opponent to follow the recommendations. 7

Zero-Sum Game
The basic interests of actors are conflicting in zero-sum game. It is regardless of the final result, the victory of one opponent is balanced by the total number of losses by other opponent. This is known as zero sums because when one actor subtracts the total number of losses from total gains, the answer comes as zero. In this game, actor A can gain the outcome at the expense of actor B. At the same time, the losses and gains of both actors are sum to the same value. 8

Positive-Sum Game and Negative-Sum Game
In positive-sum game, all actors can get benefited from the activities and actions of all players. This is regardless of the fact that who gets more benefit and who gets less benefit. In this situation, one actor loses but the other actor gains as a result. In negativesum game, every actor gets affected by the actions taken by other actors. The actions taken by all actors affect each actor like one actor is gaining and other actor is losing and outcome would be overall loss. 9

Historical Perspective of Cyber Terrorism
The cyber battlefield is real. It is a place where computers are used instead of gun, data pockets instead of bullets and firewalls are used instead of barbed wire. 10 The global security today faces severe challenges and terrorism is one of them. The deliberated assassinations, destruction of man and material, mutilation of innocent, bombings, illegitimate and unlawful attacks against public and private infrastructure, killing of hostages and all other barbaric acts of killing have become a routine happening around the world. No one and nothing is safe from terrorist acts today. Such terrorism has posed serious threats to the international security and existence of states and international order. Since the fear of terrorism has imprisoned the whole world, international community is compelled to join hands together and wage war against it. The state-of-theart technology, modern weaponry of mass destruction and most importantly a grave threat of cyber-terrorism may bring out a perilous situation in the world. 11 There are many forms of terrorism specifically biological, nuclear and chemical terrorism. There is a hot debate among international community that whether cyberterrorism is posing serious threats to international security or not. In order to better determine this, there is a strong need to understand cyber-terrorism.

Defining Cyber-Terrorism
A senior research fellow Barry Collin, at the Institute for Security and Intelligence in California first coined the term 'cyber-terrorism' in 1980s. He referred to cyber-terrorism as the linkage of cyber space and terrorism. 12 The working definition of cyber-terrorism was given by Mark Pollitt, special agent for FBI: Cyber-terrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by sub national groups or clandestine agents. 13 Politically motivated attacks that cause serious harm, such as severe economic hardship or sustained loss of power or water, might also be characterized as cyber-terrorism. 14 There is no single definition of cyber terrorism yet which is universally accepted. There are a few definitions which focus on the intention of cyber terrorists, other focus on the manipulation of information technology by them. There are also a few security experts who define it in terms of the consolidated effect of any attack whereas a destructive and disruptive result, huge amount of fear can be generated similar to a traditional terrorist attack. Under such attacks, which can lead to the injury, death airplane crashes, extended power outrages, major loss of economy or water contamination are defined as cyberterrorism. 15 Few experts define cyber terrorism as a form of physical attack which can distort physical infrastructure's computerized nodes including electric power grid, telecommunication or internet without even touching a keyboard. Few other assertions suggest cyber terrorism as a form of terrorism which has the ability to cut across all kinds of infrastructure protection and it cannot be executed without physical damage to the property because these two operate interdependently. To further explain this concept, it may be said that cyber terrorism is the use of computer as targets or weapons, used by politically motivated national or international individuals or a group of individuals or clandestine agents who cause or threaten violence and fear for influencing audience of a particular area. It may also be done to pressurize the government to amend in its policies as per the wish of these politically driven groups. 17 This definition encompasses all three models of cyber-terrorism i.e. electronic attack (EA), physical and computer network attack (CAN). 18 There are two ways to explain cyber terrorism in general which are as follows: 1. Effects-based: This kind of cyber terrorism is done when the result of computer attacks are as destructive and disruptive as compared to traditional terrorism and create grave fear.
2. Intend-based: This kind of cyber terrorism is done when politically motivated or unlawful attacks are done to coerce the existing government to achieve a political objective or create great damage to economic infrastructure. 19

Aim of Cyber Terrorism
The basic aim of cyber terrorism is most likely the same as of traditional terrorism i.e. "to create terror" among populace and for coercion of existing regime. Cyber terrorist activities include political, religious, financial, ideological and similar kind of acts. It is now transferred to the modern means of networking and creates serious threats to general public as well as private infrastructures. 20

The History of Cyber-Terrorism
The history of cyber-terrorism is not so long as it has emerged in the past few decades as a global security threat. The targets of cyber-terrorism mainly consist of critical infrastructures i.e. electric power grids, transportation, telecommunications, oil and gas distribution, financial institutions and air traffic control system. A distributed denial of service (DDoS) network attack was launched in Feb 2000. The famous websites like CNN, eBay, Yahoo, ZDNet, Amazon and Datek were attacked. There were millions of individuals who were unable to access these websites which resulted in financial loss and decrease of sense of security offered by these websites. 21  He also hacked credit card information of many officials of state departments and also screenshot of conversation of US servicemen. Later the Islamic State Hacking Division (ISHD) accepted the hacking responsibility. It has also been observed during the research that ISHD remained unsuccessful in maintaining positive branding of ISIS. 28

Islamic Cyber Army
In late 2015, a cyber-hackers group tweeted its official statement self-proclaiming them 'Islamic Cyber Army' (ICA They offered all cyber hackers and supporters of Islamic State (ISIS) to come together and join hands and work against crusaders electronically. Discussing their targets, they said that they will attack on every possible target including banks, airports, nuclear bases, recruited staff, infrastructure, and all other critical systems which are connected via internet. They also sent messages to the United States of America stating that 'we will not 26  forget your war against Islam and killing of Sheikh-ul-Mujahedeen Osama. They have always focused on USA as their target and all alliances of USA. In their final threat, they declared: O disbelievers Your Fate will be killing, homelessness and misery know that…this [is] only the beginning and [we] will slaughter your necks over your land soon." And they ended their statement with: "America will not enjoy security and safety until we live it… 30 This group was highly active on the fourteenth anniversary of 11 September attacks and they also issued a countdown saying "two hours and 24 hours left" with hashtags #Islamic Cyber Army and #America Under Attack. 31 Under the same hashtag, they issued a statement on the eve of September 11 stating 'we are in your home Obama and we have stolen data of legislative personnel of White House.

Sons Caliphate Army (SCA)
This cyber terrorist group emerged in early 2016 named them as 'Sons Caliphate Army (SCA). Later on in April, they announced themselves as merger of Caliphate Cyber Army (CCA). They seem to be more inclined towards CCA as its creation announcement was advertised on CCA's telegram channel. Both of them have strong communication and coordination as compared to other cyber networks of Islamic State (ISIS). These two are also planning to constitute 'The United Cyber Caliphate'. In their first unprofessional video titled 'Flames of Ansar', they claimed to hack more than 15000 twitter accounts and face book accounts. They also claimed that they hijacked Twitter's official website and it remained unavailable for two hours. This is now an umbrella cyber organization under the patronage of which cyber terrorists are manipulating cyber space and this is at the moment strongest cyber terrorist's networks around the globe.

Techniques, Tactics & Procedures (TTPs)
It is still difficult to identify the tools, techniques and tactics of which Islamic State (ISIS) supporters are using. On the basis of cyber-attacks they launch, following can be figured out: Islamic State hackers are observed coordinating their activities and campaigns in private using encrypted messages and communication platforms before launching a formal attack. In majority of cases, they pre-declare their intent to launch an attack using hashtags for galvanizing support from the audience.
It is also very important to note down the timings and dates of attack which are mostly at the time significant dates i.e. September 11 anniversaries. These dates and timings are highly important for Jihadi terrorists as they ensure full media coverage and security agitation which allow them to get huge traffic on social media.
With regards to communication techniques and tools, it has also been observed that they use online encrypted platforms such as Telegram and Surespot. It is still difficult to say whether these tools are in-house developed or custom-made tools but on the basis of their attacks, these tools may be divided into two groups; hacking tools which are used to penetrate into a computer system externally resulting in compromising the system from inside. The second group of hacking tools is easily taken from publicly open source as they can be used successfully. For creating proprietary tools, it needs hard efforts and resources to develop a private tools kit which should be equal or better than already available tools.

The Future of ISIS's Cyber Capabilities
There is no doubt in it that Islamic State cyber capabilities have grown tremendously since its inception and it has the largest network of cyber hackers and cyber terrorists who are constantly busy in launching attacks on American and European targets. They will keep on sending DDoS attacks and keep on defacing websites. It is also true that they are working on improving their cyber capabilities by making advanced tools and infiltrating into others' system without any risk. It also depends largely on the cyber hackers' ability to bring top notch technological techniques with modern equipment as Junaid Hussain has set the precedence for all to follow.

Manipulation of Cyber Space
Islamic State's social media strategy is a 'double-edged sword' according to Farwell. 35 As IS is getting successful in gaining territory though displacements, violence and warfare, the social media strategy remains active and based on sophisticated tools.

Publicity and Propaganda
The internet has provided huge gaps to terrorists for carrying out their operations and activities. It was a big question for terrorist groups to win publicity for their activities and causes. The transition from traditional media to modern media and latest technological tools has provided space to these terrorists for spreading their message across to capture attention of the audience. The Islamic State (IS) has not only increased its presence online by manipulating many social media platforms including Facebook and twitter but has also taken help from contact sharing mechanism like Just Paste and messaging apps like Surespot and Telegram. The important point for IS's online presence is that it did not centralize its social media unit. They spread across many continents. The organizations' closest peers are not only terrorist's groups but western brands, publishing outfits and marketing companies cooperate with IS in order to get more customers and to boost user engagements. 36 It not only provides them an opportunity to frame how different audiences perceive them but also gives them an open space to manipulate their enemies. 37

Recruitment and Mobilization
Cyber space has not only been used for raising funds but it has also been manipulated by Islamic State for getting recruits and for mobilizing supporters from one place to another. 38 The figures show that there are more than three thousand individuals from West who have left their countries and migrated to join ISIS. The internet space has provided an open space to the organization to connect to the world through social media. The initial communication converted to association which can lead to one-to-one chat using many social media tools such as Text Secure, Chat Secure and Red phone. 39 Besides, women have been recruited in ISIS more frequently. There is one very famous female jihadi website related to ISIS with the name of Umm Layth. It not only motivated girls from west to be radicalized but also motivated them to leave their houses and join ISIS. The three British girls had links with Umm Layth who were to join ISIS in Feb 2014. 40

International Organizations to counter cyber terrorism
In today's world, cyber terrorism has become an international challenge and many international organizations have joined hands together to combat it. Due to dependency on physical infrastructure by mostly states, not all states are willing to share its cyber security information with other states. There are legal frameworks available but still there are loopholes in the system of cyber security in general. There are many pacts, treaties, agreements available against cyber insecurity.

Mutual Legal Assistance Treaties
Mutual Legal Assistance Treaties (MLATs) are treaties which usually apply to the list of activities related to cyber-crimes in which state parties need to help one another by providing evidence, information and other form of assistance when requested to ask. These agreements apply in situations where criminal has used cyber systems for carrying out their activities. 41 The agreements related to cyber-crimes and cyber security generally consist of treaties, universally accepted rules of conduct and the UN Charter and Geneva Conventions.
It is important to mention here that under the UN Charter, cyber-attacks or cyber exploitation which has same effects equivalent to that of physical use are considered 'armed attacks'. The U.N has reported to have this proposed as main principle while discussing with Russia and some other states. 42 So far international and many regional organizations have been very active in preparing legal framework on cybercrimes and cyber terrorism.

United Nations
There are various UN institutions which have provided tremendous efforts to combat cyber-crimes and cyber terrorism. The United Nations General Assembly Resolution in 2000 addressed many ways how states can struggle hard to combat the misuse of information technology or manipulation of cyber space. One of the resolutions 57/239 adopted in 2002 is all about setting up cyber security global culture. 43

The Security Council's Counter-Terrorism Committee
The Security Council's Counter-Terrorism Committee in United Nations is the sole committee and main body to work for the promotion of collective response on counterterrorism activities. It was established on 8 th September 2001 in Resolution 1373 (2001) by the Security Council. It was basically adopted and executed after the 9/11 attacks in USA. It says that all actions, methods, principles and practices of cyber terrorism are against the purpose of United Nations and calls for all nations to gather and join hands against international threat.

G8 Group of States
In 1997, a subgroup on high level cyber-crimes, the G8 Group of States was set up. It has ten core principles for countering computer related crimes. The purpose of its establishment was to ensure that no terrorist can receive safe havens in any state of the world. 44

Asian Pacific Economic Cooperation (APEC)
The leaders and ministers of Asian Pacific Economic Cooperation (APEC) have made a commitment to try to implement a comprehensive list of rules and laws related to cybercrimes, cyber security.

Organization of American States (OAS)
This organization was made in 1999 and it consists of experts from government. The main purpose of this organization was to prepare inter-American legal structure for countering cyber-terrorism. It was officially taken up in 2002 after 9/11 incident. 46

Conclusion
Whenever a cyber-exploitation or attack occurs between one or more groups or countries, this is not a consideration about how to combat in terms of reprisal or punishment. Rather focus is more on which criteria or technique to use for countermeasures. For the existing threat from Islamic State (ISIS) cyber experts, there is a strong requirement for deciding countermeasures for the attack, decision criteria from where to launch and determination of facing it, countering it with logical techniques and joining hands internationally to combat it. 47 We agree with the notion that there have been various incidents of cyber manipulation on many infrastructures which have also given rise to economic and social sufferings thus making it successful for the cyber terrorist. 48 To avoid cyber -terrorism, continuous development in security advancements tools and technologies cannot be shunned at any stage; treaties among nations related to cyber security prevention are also important, as time is not far when terrorists will be using cyber space to destroy or damage physical infrastructure through the manipulation of cyber space. 49 The Islamic State cyber threat is undoubtedly the strongest of its kind and international organizations and all nations must come together on a serious note for the complete eradication of the cyber system of Islamic State, because Islamic State (ISIS) cyber experts are focused, professionals, top notch and they know when and how to hit the enemy. Their cyber terrorism strategies are two-fold and they are not only enhancing the sophistication of cyber techniques but considering cyber war as important as traditional warfare. It is also essential for all governments to narrow down the technological gaps related to cyber terrorism and cyber security. Seeking mutual information sharing among different countries for the solution of information security is also required. It should also be noted that existing laws for physical terrorism cannot be used for information technology environment. Thus, there is a dire need for the legal framework to be made for implementation on cyber terrorism activities. 50