How
The U.S.
Hacked
ISIS

Illustration: How The U.S. Hacked ISIS

In the fall of 2016, a military unit called Joint Task Force ARES launched a classified military mission called Operation Glowing Symphony to knock ISIS’s media operation off the Internet.

Illustration

Step 1: The Plan

Illustration: <b>Step 1:</b> <i>The Plan</i>

ARES operators discover ISIS is using just 10 core accounts and servers to manage the distribution of nearly all of its content around the world. If ARES could gain access and control those, it would hobble the group’s media operation.

Illustration

Step 2:Cracking The Network

Illustration: <b>Step 2:</b><i>Cracking The Network</i>

Through several methods, ARES operators get into ISIS’s network. They create tantalizing emails — phishing emails — plant malware, open back doors and leave spyware.

Illustration

Step 3: Reconnaissance

Illustration: <b>Step 3:</b> <i>Reconnaissance</i>

ARES operators give themselves credentials and administrator privileges and begin to look around — at emails and their content, at the relationship between ISIS fighters — to inform their target lists.

Illustration

Operators spend months practicing to surgically target ISIS content on overseas servers.

Illustration

Step 4: The Attack

Illustration: <b>Step 4:</b> <i>The Attack</i>

November 2016: ARES operators log in to ISIS accounts, delete content, crash ISIS servers, misconfigure network settings and change passwords.

Illustration

After the hack, ISIS members find themselves locked out of their accounts, frozen in cyberspace.

Illustration

Step 5: Continued Operations

Illustration: <b>Step 5:</b> <i>Continued Operations</i>

Operation Glowing Symphony continues today with a new variety of attacks.

Illustration

ARES is remotely draining cellphone batteries, slowing down the ISIS network and looking for ways to erode ISIS morale and sow discord among fighters.

Illustration

The End

Illustration: The End