Friday, July 1, 2016

Why ISIS Is Planning Attacks In India

It has become perfectly clear to us that the ultimate goal of ISIS is to attack and cripple the United States. Thanks to IBM, AT&T, CHI, Anne Inc., Microsoft And A Whole List of Other American Companies who have outsourced their IT departments to India, the opportunity to do just that has been handed to them on a silver platter.
India is truly the Holy Grail to ISIS because so much of our Critical Infrastructure is now controlled from there. In previous articles I’ve talked about how America’s IT infrastructure is vulnerable to attack through India. In this article I will detail what I consider to be the most likely strategies groups such as ISIS will use to achieve that goal. But before I do that I want to emphasize that any ISIS attack will likely involve a combination of several strategies to maximize damage and loss of life.

See: Islamic State Threats In Bangladesh - Denials And Delusions

01. The first and most obvious mode of attack is likely to be the recruitment of employees who are already working inside an IT support center. Given the relatively low wages paid in India and the high potential that ISIS members and or sympathizers are already in place inside these control centers this would be the easiest way for ISIS to initiate attacks on U.S. Infrastructure.

The Method of Attack. There are two main attack strategies that are easiest to employ. One where an admin creates a number of fictitious Active Directory Admin accounts using IBM Endpoint Manager or SCCM and granting VPN privileges. This would enable an attacker to brick thousands of computers, and mobile devices simply by running a fairly uncomplicated PowerShell script. Essentially the attacker would initiate a script that would delete the boot files inside the operating system and reboot the machine. Once the reboot cycle is initiated the machine would be rendered useless. Two, use the same approach to simply wipe the device and reboot. With an empty hard drive again any computer will be rendered useless. These methods are really simple ways to kill computers remotely. I will talk about more sophisticated attack methods in later installments.

See Also:

02. Direct Armed Assault. A direct armed assault on an IT control center would be difficult to achieve but could be accomplished under certain circumstances. The most likely scenario would be if the territory where the IT Control center is located were to be occupied by ISIS fighters.
The Method of Attack. The methods of attack are quite simple. A combination of brute force which could include battering rams, explosives, armored vehicles and internal cooperation are used until the facilities security measures are defeated. Once inside the building its relatively easy to use the support centers equipment to shut down computer networks in any number of U.S. Locations. Factually speaking millions of computers, mobile devices, servers and networking devices can be rendered useless in a matter of minutes. I emphasize that the most desirable methods of attack leave facilities intact so they can be used to initiate further attacks.

See Also:

The Scope of the Damage. In the space of a few minutes any business that depends on an extensive computer network (Walt-Mart, Kroger) can be brought to a standstill. If the attack is focused on one or more of the IBM facilities in Hyderabad. By attacking IBM, it is possible to cripple AT&T which means shutting down Cellular Communications, Internet Communications, & Home Phone Services, plus a whole host of other critical services supported by the internet.

Loss of Internet Service over wide geographic areas could cripple Emergency Services. Essential Infrastructure such as Electricity and Water as well as Sewage. Would be hit the hardest. 911 Call centers would be immobilized cutting off access to ambulance service, fire services, police, and traffic control. These services alone will leave the government with no alternative but to enact martial law to contain the resulting chaos. Imagine every traffic light in town knocked out during rush hour. accidents everywhere, with no way to call for help.

Loss of Internet Service will also guarantee that stores will be unable to sell products to the public. When you realize that stores now depend on the internet for every electronic transaction it’s easy to see how bad it can get fast. Even if you have cash it’s going to be worthless because nearly all stores ring up every sale on an internet connected cash register which will be useless under the above circumstances. We already know what can happen when the Food Stamp system goes down even for a short amount of time. This would be a million times worse.

Businesses Will Be Shut Down. Gas stations won’t be able to sell gas and if they don’t have electricity there may be no way to pump gas from their underground storage tanks. Even if the gas station has a backup generator it will eventually run out of something to sell because in a crises people go into panic mode fast and this will be no exception. Also once the gas runs out there will be no way to get more because the supply chain is also dependent on the internet.

Why an Attack Based In India Is So Dangerous. To start with we need to point out that it took years to move all our IT control centers to India. And in the event of an attack on our tech infrastructure those control centers have become inseparable from our stateside technology. Once ISIS has control of a facility in India we simply have no easy way to take control from here. Additionally, restoring millions of computers servers and mobile devices requires a minimal infrastructure and must in most cases be done on machine at a time by a tech in person on site. Moving our IT Infrastructure back stateside would be a monumental task in the best of times but now its almost impossible.

Since IBM has fired almost all of its desk side support personnel in the U.S. there is almost no one left to tackle the task of relocation and restoration. And even then IT recruiters depend on some basic infrastructure to mobilize manpower. Separated personnel would need to be on boarded and that would be nearly impossible once the basic infrastructure is unavailable. 

Collateral Damage Its also commonly understood that once critical infrastructure goes down riots and looting happen which makes restoration of services even more difficult. In any case the government would absolutely lose control and have to declare martial law. This is the most dangerous part of the disaster.

The Best Ways to Avoid All the Above !

01.Bring our IT Control centers back to the U.S and put American IT Professionals back to work protecting America. We need to do this before its too late !

02. Stop U.S. Companies from placing sensitive infrastructure control centers in dangerous territories. Putting our IT control centers in India was an insane idea to start with and it has put us all in danger. This has to stop now!

03. Enforce our existing laws limiting the export of sensitive technology overseas. This should be a no brainer, but apparently many U.S. Companies have been getting away with murder lately and the laws are not being evenly enforced.

Everything I’ve said in this article is based on my 16 years of experience in spanning in 3 countries. I’ve seen the shape our IT infrastructure is in firsthand and its appalling. America has been betrayed by its own government and its greedy corporate elitists who only care about filling their own pockets.

It’s Time To Fight Back.  

Follow me on Twitter and let’s come together to defend our country and our future. Follow me at and 

No comments:

Post a Comment