ISIS Has Allegedly Doxed 100 US Military Personnel

Normally, when a hacker doxes an individual, it is to make them uncomfortable or in some cases to shame them, as in the case of exposing the secretive e-mails of public officials or corporations. It has traditionally not been done with the express intent of getting someone killed. There have been cases where a snitch has done so much damage that some hackers feel there is no other way to stop them from harming more, as in the case of the occasional death threats against Adrian Lamo.

With Intent To Kill

Now ISIS, which has recently been employing either independently supportive or directly connected hackers to take down websites and compromise social media accounts, as well as other online activities, has reportedly doxed roughly 100 US military personnel with the express intent of getting them killed. By the time we got to the story, all of the data dumps had been removed from the hosting services used to post them, and the Twitter account which had linked to them had been suspended. However, an archive of one of the Pastes was still available. In part, it said:

While the US and its satellites kill our brothers in Syria, Iraq and Afghanistan we broke into your networks and personal devices and know everything about you.

You’ll see no mercy infidels. ISIS is already here, we are in your PCs, in each military base. With Allah’s permission we are in CENTCOM now.

We won’t stop! We know everything about you, your wives and children.

U.S. soldiers! We’re watching you!

It then linked to no longer active data dumps which the Pentagon is reportedly investigating. The validity of the documents is in question, and no names have yet been named as to who is at risk. The ranks of the soldiers in question have also not been disclosed, if they have in fact been doxxed – that is, are these high-ranking officials in the military?

Developing Story

Also unknown is how recent the data is. Soldiers move around a lot, and most of them do not serve the full 20 years to retirement. This writer, for instance, did a three-year enlistment as an Infantryman and deployed to Iraq, long before ISIS was a well-known entity at all.

Via the NSA’s mass surveillance program, it can be presumed that if the social media accounts and Internet connections linked to the #CyberCaliphate movement were based in the US, they’d already be located. It can be further be inferred that if they were communicating with servers based in the United States, then the agency would have the means to know a great deal about them through the same program. But so far the government surveillance programs have proven ineffective at preventing attacks or providing real data to the agencies that could make use of it, leading to criticism even from the biggest proponents of looser interpretations of constitutional privacy protections.

Featured image from Shutterstock.



P. H. Madore has covered the cryptocurrency beat over the course of hundreds of articles for Hacked's sister site, CryptoCoinsNews, as well as some of her competitors. He is a major contributing developer to the Woodcoin project, and has made technical contributions on a number of other cryptocurrency projects. In spare time, he recently began a more personalized, weekly newsletter at