Spy agencies deploy extra staff to analyze ‘treasure trove’ of ISIS computer data

Iraqi forces in MosulWestern military and intelligence agencies are deploying extra analysts to comb through unprecedented amounts of digital data collected from Iraqi regions that have recently been recaptured from the Islamic State. The information is contained in thousands of laptops, hard drives, flash drives and cell phones left behind by retreating Islamic State forces in and around the northern Iraqi city of Mosul.

In an article published this week, the United Kingdom’s Secretary of State for Defense, Sir Michael Fallon, said he had authorized a significant increase in numbers of military intelligence analysts deployed to the Middle East, in response to “a trove of data” captured from the Islamic State. He added that the amount of digital data was expected to increase even further “when Mosul falls”. The British intelligence analysts will join hundreds of American specialists —including analysts, linguists and computer technicians— who are stationed in neighboring Jordan and have for over a year been analyzing digital and printed data captured from the Islamic State. Much of that information is eventually disseminated to allied intelligence agencies.

The largest collection of digital data and documents captured from the Islamic State dates from last summer, when Kurdish Peshmerga forces seized nearly 1,000 electronic devices belonging to the militant group. The material was found in and around the city of Manbij, near Aleppo in northwestern Syria. By late August, the Kurds had collected 20 terabytes of computer data and more than 120,000 documents stored on 1,200 devices that once belonged to ISIS officials or operatives. According to Western officials, the data led to intelligence operations against the Islamic State in 15 countries in North and South America, Europe, the Middle East, Africa and Southeast Asia. In November of this year, Iraqi forces operating south of Mosul captured the digital archives of the Islamic State’s Agricultural and Animal Resources Authority. In addition to an extensive notary archive, the collection included information on the Islamic State’s commercial transactions with entities in neighboring countries, and was described by Iraqi government sources as “a real treasure”.

According to the British government, digital data and printed documents currently being gathered from Islamic State strongholds in and around Mosul are expected to provide critical intelligence on the group’s structure and chain of command. They are also likely to give insights on the existence of Islamic State cells abroad, and will most likely help international prosecutors build legal cases against Islamic State commanders in the near future.

Author: Joseph Fitsanakis | Date: 15 December 2016 | Permalink

One Response to Spy agencies deploy extra staff to analyze ‘treasure trove’ of ISIS computer data

  1. Jones says:

    Good news article. From a cryptographers’ view point and given ISIS’s reputation for strict adherence to security and secretiveness, one would think much of digital data acquired stored on “laptops or external hard drive devices”, would have been encrypted using, i.e., at least AES -128 or 256 despite import export restrictions on strong encryption. The AES protocol has not been broken – insofar as we know; not factoring in improper implementation. However, if much of data acquired was stored on mobile devices, then encryption attempts could be rendered useless, exposing a treasure trove of data.

We welcome informed comments and corrections. Comments attacking or deriding the author(s), instead of addressing the content of articles, will NOT be approved for publication.

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: