Skip to main content

US military offers first-ever announcement of cyber attack on ISIS

us military admits to engaging in cyberattacks against isis cyber mission unit
Army Cyber / Flickr
Leaders of the Department of Defense have officially revealed that the U.S. military is working with Iraqi and Kurdish forces to regain control over Mosul from the Islamic State of Iraq and Syria, alternatively known as ISIS, ISIL, and Daesh. This news comes from Defense One, which covered a briefing Monday afternoon where Defense Secretary Ashton Carter finally admitted to military participation in network-based attacks, and that the cyberwarfare operation is ongoing.

This is quite possibly the first time the U.S. has been open about its engagement in an electronic intervention such as this, according to Ars Technica. Where radio jamming has played a major role in U.S. military history, and electronic attacks were conducted against Iraq in the 1991 Gulf War, computer and network-based attacks have largely remained undisclosed to the public.

Not once before has the Department of Defense formally announced a cyber incursion in an ongoing military undertaking.

Offering more thorough commentary on the operation, Carter added that the attacks were initiated “to interrupt [and] disrupt ISIL’s command and control, to cause them to lose confidence in their networks, to overload their network so that they can’t function, and do all of these things that will interrupt their ability to command and control forces there, control the population and the economy.”

Though the U.S. military has historically kept mum about cyber attacks, it hasn’t left itself entirely powerless. In fact, the bulk of Iraq’s telecommunications infrastructure was built by the United States, while repairing the damage from the Iraq War. With it, both the military and NSA were able to collect intel while combating the inevitable revolts.

Nevertheless, despite vaguely revealing to us the military’s participation in the cyberwarfare coalition, the details offered by the defense secretary remain sparse — and understandably so.

“We don’t want the enemy to know when, where, and how we’re conducting cyber operations,” Carter explained. “We don’t want them to have information that will allow them to adapt over time. We want them to be surprised when we conduct cyber operations.

The intent, he said, is to deceive Daesh into thinking its network connectivity troubles are the result of its own indiscretion, when in reality, it’s being targeted by U.S. forces.

Gabe Carey
Former Digital Trends Contributor
A freelancer for Digital Trends, Gabe Carey has been covering the intersection of video games and technology since he was 16…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more