Sunday November 18, 2018
Home World Truth Uncover...

Truth Uncovered: The Origin of ISIS

0
//
Islamic State
Pic source: euphrates.org ISIS members
Republish
Reprint

“Declare Allah the greatest! Allah is the greatest”. Well these are the lines recited by the most wealthy terror group, “ISIS or the Islamic State”. The name ‘ISIS’ is really trending among the people globally. We know ISIS was not formed in a single day. Where does the Islamic State came from? Who created them? You need to know the truth.

Today, ISIS is the biggest threat to national security of any country. Known for the mass execution, ISIS is the most brutal savage group with the prime motto clearly indicated in the first line of the article.

To know the origin of the Islamic State we need to understand the two major story lines. First one, the US action which destroyed Iraq, toppled Saddam Hussein, and completely damaged the Iraqi society. Many people who lived under Saddam were seen as enemies, US military treated them very badly. So, US created conditions in Iraq to get ISIS start in.

The other story is to understand that even with Saddam gone; ISIS couldn’t have risen to power. ISIS begun as a small insurgent group in Iraq in 2006, they had no money, no real ability to recruit but they did work to create limited problems to US military. In 2009, ISIS shifted their focus from Iraq to the civil war in Syria. There also they struggled to gain popularity because of the two largest groups, Al-Qaeda and Free Syrian Army (FSA) fighting against the President Bashar-Al-Assad. In June 2013, northern General of FSA asked International help in order to make their rebel a success to overthrow the Syrian President. Well, within just a matter of weeks of plea by Syrian General; the US, the Saudis, Jordan, Qatar, Turkey and Israel began providing weapons, training and money to the FSA.

In Sept 2013, American media started reporting that Central Intelligence Agency (CIA) funded weapons have started flowing to Syrian rebels. Weapons were not American made but funded and organized by CIA. The weapons that insisted to be used by freedom fighters were in hands of ISIS in less than a year.

So, where these fighters came from? Actually from the Free Syrian Army, the group with a motto to help US in overthrowing ‘Assad’ started giving and selling weapons and sending fighters to join with the new group called the Islamic State. It was in June 2014 when suddenly after being no name group in Syria; ISIS emerged heavily armed, trained by US and coalition special forces. Crossing back the Syrian border to Iraq, capturing the northern part of the country, ISIS became the new face of terror. The fact is that ISIS was able to grow fast because of all the US military equipment they seized that was left in Iraq after the war. Also, media ignored the videos and posts made by ISIS with the US military equipments.

Who is responsible for the creation of ISIS? It’s the product of direct action of America. First the action of creating a power vacuum in Iraq and secondly are the mean violent jihadists hoping they would overthrow a leader in a neighboring Middle East country. USA is responsible for the formation of the wealthiest terror group. ISIS make a profit 2 million dollars daily by selling oils. Also, US used to send funds of several hundred million dollars to Free Syrian Army to fight ISIS after knowing that the latter is the biggest suppliers of fighters and weapons to the terror group.

US government is a victim of its own insane policies and Americans are the hostage as they are the tax payers.

Here is a video from Youtube:

Click here for reuse options!
Copyright 2016 NewsGram

Next Story

Heavy Cyber Attacks From Russia, US, China In India

These honeypots are developed to deceive even elite hackers and appear to be serving a specific purpose or organisation.

0
cloudhopper,cyber attacks
A man holds a laptop computer as cyber code is projected on him in this illustration picture. VOA

India has been the target of over 4.3 lakh cyber attacks from five countries including China, Russia and the US while more than 73,000 attacks were initiated from India between January and June this year, says a Finnish cybersecurity company.

According to F-Secure’s honeypot data, Russia, the US, China, the Netherlands and Germany targeted India with 436,090 attacks. This is nearly 12 times more than which originated from India.

Honeypots are basically decoy servers that emulate the real IT environment of a business enterprise.

cyber attacks
Due to its nature, the chip is physically unclonable and can, thus, render the device invulnerable to hijacking, counterfeiting or replication by cyber-criminals. Pixabay

Russia accounted for most cyber attacks on India (255,589), followed by the US (103,458), China (42,544), the Netherlands (19,169) and 15,330 attacks from Germany.

On the other hand, the top five countries that were targeted by Indian cyber attackers were Austria, the Netherlands, the UK, Japan, and Ukraine — a total of 36,563.

F-Secure gave the break-up: Austria (12,540), the Netherlands (9,267), the UK (6,347), Japan (4,701) and 3,708 attacks targeted Ukraine’s businesses.

“The relatively higher number of inbound attacks on Indian honeypots reflects how the fast-digitising country is becoming more lucrative for global cyber criminals,” Leszek Tasiemski, Vice President of cyber security products R&D at F-Secure, said in a statement on Sunday.

Cryptocurrency, cyber attacks
Experts: Cyber attacks Growing Increasingly Sophisticated. Pixabay

“We are gathering and analysing all the pertinent data to ensure that our customers stay protected given the dynamically evolving threat landscape,” he added.

To track these cyber attacks, F-Secure has deployed 41 honeypots across the globe.

“Our public honeypots are a valuable source of threat intelligence and an integral part of the infrastructure that powers our various security offerings, including our Rapid Detection and Response Service,” Tasiemski said.

Honeypots are set up explicitly to grab attention of attackers. They are used to gain critical insights on attack types, popular targets, sources, volume and TTPs (Tactics, Techniques and Procedures).

Such insights are collected by deliberately allowing potential attackers to gain unauthorized access to the emulated services of a server and then studying the attack path to the point that the attacker realizes it is a honeypot, F-secure said.

Also Read: U.S. Government Warns People Against China-Linked Hacking Group

These honeypots are developed to deceive even elite hackers and appear to be serving a specific purpose or organisation.

They enable F-Secure to collect the latest malware samples or shell scripts and new hacking techniques.

The research data is then processed to further benefit F-Secure customers via product enhancements and threat intelligence reports. (IANS)