Read Time:25 Second

ISIS was able to secure a highly sought after document detailing how to identify drones. The document (below), circulating on #Daesh social media channels and groups clearly puts the drones at risk of destruction. The perpetrators translated the artifact to Arabic, proudly distributing the stolen material.

ISIS cyber capabilities have grown to the point where such documents are no longer safe. Stored behind extensive security, this document should be a wake up call for information security professionals charged with protecting sensitive data.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
%d bloggers like this: