Skip to main content

US military offers first-ever announcement of cyber attack on ISIS

us military admits to engaging in cyberattacks against isis cyber mission unit
Army Cyber / Flickr
Leaders of the Department of Defense have officially revealed that the U.S. military is working with Iraqi and Kurdish forces to regain control over Mosul from the Islamic State of Iraq and Syria, alternatively known as ISIS, ISIL, and Daesh. This news comes from Defense One, which covered a briefing Monday afternoon where Defense Secretary Ashton Carter finally admitted to military participation in network-based attacks, and that the cyberwarfare operation is ongoing.

This is quite possibly the first time the U.S. has been open about its engagement in an electronic intervention such as this, according to Ars Technica. Where radio jamming has played a major role in U.S. military history, and electronic attacks were conducted against Iraq in the 1991 Gulf War, computer and network-based attacks have largely remained undisclosed to the public.

Recommended Videos

Not once before has the Department of Defense formally announced a cyber incursion in an ongoing military undertaking.

Please enable Javascript to view this content

Offering more thorough commentary on the operation, Carter added that the attacks were initiated “to interrupt [and] disrupt ISIL’s command and control, to cause them to lose confidence in their networks, to overload their network so that they can’t function, and do all of these things that will interrupt their ability to command and control forces there, control the population and the economy.”

Though the U.S. military has historically kept mum about cyber attacks, it hasn’t left itself entirely powerless. In fact, the bulk of Iraq’s telecommunications infrastructure was built by the United States, while repairing the damage from the Iraq War. With it, both the military and NSA were able to collect intel while combating the inevitable revolts.

Nevertheless, despite vaguely revealing to us the military’s participation in the cyberwarfare coalition, the details offered by the defense secretary remain sparse — and understandably so.

“We don’t want the enemy to know when, where, and how we’re conducting cyber operations,” Carter explained. “We don’t want them to have information that will allow them to adapt over time. We want them to be surprised when we conduct cyber operations.

The intent, he said, is to deceive Daesh into thinking its network connectivity troubles are the result of its own indiscretion, when in reality, it’s being targeted by U.S. forces.

Gabe Carey
Former Digital Trends Contributor
A freelancer for Digital Trends, Gabe Carey has been covering the intersection of video games and technology since he was 16…
Your Netgear router might be an open door for hackers
The Netgear Nighthawk XR1000v2 router placed on a desk next to its packaging box

Netgear has released a security advisory addressing two critical vulnerabilities affecting Nighthawk Pro Gaming routers and certain Wi-Fi 6 access points. The company strongly recommends that users update their devices' firmware promptly to mitigate potential risks.

The first vulnerability, identified as PSV-2023-0039, is a Remote Code Execution (RCE) flaw. This security issue allows attackers to execute arbitrary code on affected devices remotely, potentially leading to unauthorized control over the router. The second vulnerability, PSV-2021-0017, is an authentication bypass flaw, which enables attackers to circumvent authentication mechanisms and gain unauthorized access to the device's management interface.

Read more
Turns out, it’s not that hard to do what OpenAI does for less
OpenAI's new typeface OpenAI Sans

Even as OpenAI continues clinging to its assertion that the only path to AGI lies through massive financial and energy expenditures, independent researchers are leveraging open-source technologies to match the performance of its most powerful models -- and do so at a fraction of the price.

Last Friday, a unified team from Stanford University and the University of Washington announced that they had trained a math and coding-focused large language model that performs as well as OpenAI's o1 and DeepSeek's R1 reasoning models. It cost just $50 in cloud compute credits to build. The team reportedly used an off-the-shelf base model, then distilled Google's Gemini 2.0 Flash Thinking Experimental model into it. The process of distilling AIs involves pulling the relevant information to complete a specific task from a larger AI model and transferring it to a smaller one.

Read more
New MediaTek Chromebook benchmark surfaces with impressive speed
Asus Chromebook CX14

Many SoCs are being prepared for upcoming 2025 devices, and a recent benchmark suggests that a MediaTek chipset could make Chromebooks as fast as they have ever been this year.

Referencing the GeekBench benchmark, ChromeUnboxed discovered the latest scores of the MediaTek MT8196 chip, which has been reported on for some time now. With the chip being housed on the motherboard codenamed ‘Navi,’ the benchmark shows the chip excelling in single-core and multi-core benchmarks, as well as in GPU, NPU, and some other tests run.

Read more