{{AfC submission|||ts=20251202235258|u=ArchiveSignalObserver|ns=118}}
{{AfC submission|||ts=20251202235258|u=ArchiveSignalObserver|ns=118}}
{{AFC submission|d|ai|u=ArchiveSignalObserver|ns=118|decliner=Wikishovel|declinets=20251202225341|ts=20251202221934}}
{{AFC submission|d|ai|u=ArchiveSignalObserver|ns=118|decliner=Wikishovel|declinets=20251202225341|ts=20251202221934}}
{{AI-generated|date=December 2025}}
{{AI-generated|date=December 2025}}
{{Infobox organization
{{Infobox organization
| name = CtrlSec
| name = CtrlSec
|
|
This may take 8 weeks or more, since drafts are reviewed in no specific order. There are 2,160 pending submissions waiting for review.
Where to get help
Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. |
Where to get help
Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. This draft has been resubmitted and is currently awaiting re-review. |
|
CtrlSec (short for Controlling Section) was a hacktivist group active from 2015 to 2023.[1] The group used **crowdsourcing to fight** ISIS recruitment and propaganda online, primarily on Twitter.[2]
The name CtrlSec is inspired by the London Controlling Section, a secret World War II group created by Winston Churchill in 1941 to handle military deception.[2] Mikro started CtrlSec so volunteers could **monitor and report** extremist accounts.[2]
History and Affiliation
[edit]
CtrlSec began in early 2015 when Mikro decided to address extremist content on social media.[3]
The group collaborated with other hacktivist entities, including Anonymous and GhostSec, but **remained independent**.[4] CtrlSec participated in the #OpISIS movement, contributing after the November 2015 Paris attacks (#OpParis) and the 2016 Brussels bombings (#OpBrussels).[4]
On 17 January 2023, CtrlSec announced its shutdown on Twitter.
Lara Abdallat, a Jordanian activist and former Miss Jordan (2010), served as the spokesperson for CtrlSec.[3] She was quoted in interviews stating the group’s objective was to eliminate ISIS and Boko Haram’s online presence in order to “save lives.”[3] She also stated, “I felt this more intensely” than giving birth when hearing a plot was foiled, and that their hacktivism would only be used “in a humanitarian way.”[3]
Operations and Methodology
[edit]
CtrlSec used crowdsourced intelligence.[4] Volunteers identified pro-ISIS accounts, **put them on public blacklists** on platforms like Pastebin, and were instructed to report the accounts themselves to maintain legal compliance.[4]
Scale of Impact: In March 2015, CtrlSec helped publish a list of **9,200** accounts linked to ISIS.[3]
Impact and Analysis
[edit]
Intelligence and Academic Use
Researchers frequently used CtrlSec’s data.[5] For example, Dr. Tamar Mitts, an Assistant Professor at Columbia University, analyzed data collected by CtrlSec on around 15,000 ISIS followers in Europe.[5] The study specifically examined the link between local anti-Muslim hostility and pro-ISIS radicalization on Twitter.[6]
CtrlSec’s data contributed to the **ISIS2015-21 dataset**, a long-term project on online extremism hosted on Harvard Dataverse.[7] The data tables specifically included accounts reported under the “CtrlSec” column, and the group’s real-time identification of accounts was valuable for researchers collecting data before Twitter suspensions occurred.[7]
Thwarted Attacks
Media coverage, including the Vice Cyberwar series, documented that CtrlSec collaborated with **GhostSec**, directly sharing intelligence.[1] GhostSec used this shared data to assist law enforcement in disrupting ISIS plots.[4] This cooperation included providing information that was used by authorities to make arrests in **Tunisia in 2015** and contributing to intelligence streams related to planned arrests in **New York in 2015**.[4]
Media and Expert Reception
Mikro and CtrlSec were featured in the Vice Media series Cyberwar (Season 1, Episode 10), which covered the digital opposition to ISIS.“Anonymous vs. ISIS”. Cyberwar. Season 1. Episode 10. 2016. VICELAND. E.T. Brooking wrote in Foreign Policy that hacktivist groups such as CtrlSec were effective in identifying extremist content when official moderation systems were inadequate.[2]
Timeline of events associated with Anonymous
Cyberwarfare
GhostSec
Terrorism and social media
- ^ a b “Anonymous vs. ISIS”. Cyberwar. Season 1. Episode 10. 2016. VICELAND.
- ^ a b c d Brooking, Emerson T. (March 3, 2015). “The U.S. Government Should Pay Anonymous in Bitcoin to Fight ISIS. Seriously”. Foreign Policy. Retrieved 2025-12-02.
- ^ a b c d e Noman, Natasha (July 22, 2015). “This Jordanian Left Her Life as a Beauty Queen to Be an Islamic State-Fighting Hacktivist”. Mic. Retrieved 2025-12-02.
- ^ a b c d e f Smith, Jack (December 4, 2015). “Anonymous Divided: Inside the Two Warring Hacktivist Cells Fighting ISIS Online”. Mic. Retrieved 2025-12-02.
- ^ a b Mitts, Tamar (November 13, 2019). “From Isolation to Radicalization: Anti-Muslim Hostility and Support for ISIS in the West”. Columbia University SIPA. Retrieved 2025-12-02.
- ^ Mitts, Tamar (2017). “From Isolation to Radicalization: Anti-Muslim Hostility and Support for ISIS in the West”. American Political Science Review. 111 (3): 435–448. doi:10.1017/S000305541700021X. Retrieved 2025-12-02.
- ^ a b Younes, Ali (February 2, 2022). “A Longitudinal Dataset of Twitter ISIS Users”. arXiv (Cornell University). Retrieved 2025-12-02.
Official CtrlSec Twitter account
Mikro’s official Twitter account





