US Air Force located an ISIS command by analyzing a selfie

The US Air Force bombed an ISIS HeadQuarter after tracking location through the analysis of the imaged posted on social media platforms.

ISIS members make professional use of social media for propaganda and to recruit new sympathizers, but intelligence agencies are trying to exploit every little mistake to track down the terrorist cells.

Air Force General Hawk Carlisle, head of US Air Combat Command, told a conference that analysts at the 361st Intelligence, Surveillance and Reconnaissance Group were able to locate a group of ISIS militant by analyzing metadata contained in a selfie snapped and posted online by an ISIS fighter standing outside a command-and-control building in the Middle East.


“The [airmen are] combing through social media and they see some moron standing at this command,” Carlisle said at the speech, Air Force Times reports. “And in some social media, open forum, bragging about command and control capabilities for Da’esh. And these guys go ‘ah, we got an in.'”

The intelligence analysts succeeded to locate the position of the building based on the metadata contained in the images posted online, and just 22 hours later the discovery of the position the Air Force bombed the area dropping three Joint Direct Attack Munitions (JDAM) used in surgical attacks.

“Through social media. It was a post on social media. Bombs on target in 22 hours,” declared Carlisle, “It was incredible work, and incredible airmen doing this sort of thing.”

The events demonstrate the importance to monitor online activities of the ISIS militants, last week, US Congress’s House Homeland Security Committee heard that ISIS is overseeing social media platform reaching thousands of sympathizers.

Michael Steinbach, assistant director in the FBI’s Counterterrorism Division, warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS, it urges a law to give them more powers.

According to Steinbach, the Bureau admitted its inability to monitor encrypted online conversations, these communications are ordinarily exploited by the ISIS for propaganda and to recruit new militants.

Steinbach reported to the House Homeland Security Committee that encrypted communications allow the establishment of an “afforded a free zone by which to recruit, radicalize, plot and plan.”

Steinbach explained that law enforcement agencies did not know the volume of the hidden online messages.

“We’re past going dark in certain instances. We are dark,” said Steinbach.

The new generation of terrorists has great cyber capabilities, they mastered social media and the intelligence needs the instrument to fight them on the same battlefield, including the Dark Web.

Pierluigi Paganini

FAIR USE NOTICE: Under the "fair use" act, another author may make limited use of the original author's work without asking permission. Pursuant to 17 U.S. Code § 107, certain uses of copyrighted material "for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright." As a matter of policy, fair use is based on the belief that the public is entitled to freely use portions of copyrighted materials for purposes of commentary and criticism. The fair use privilege is perhaps the most significant limitation on a copyright owner's exclusive rights. Cyber Defense Media Group is a news reporting company, reporting cyber news, events, information and much more at no charge at our website Cyber Defense Magazine. All images and reporting are done exclusively under the Fair Use of the US copyright act.

Global InfoSec Awards 2022

We are in our 10th year, and these awards are incredibly well received – helping build buzz, customer awareness, sales and marketing growth opportunities, investment opportunities and so much more.


10th Anniversary Exclusive Top 100 CISO Conference & Innovators Showcase