The U.S. is likely conducting cyber operations similar to the one by an Israeli cyberintelligence company reported last week, but experts say the U.S. could still be doing more to take down the Islamic State online.

Intsights, an Israeli cyberintelligence firm, reportedly hacked into the Islamic State's Telegram internal communications group and found that the terrorist group was calling for followers to attack U.S. military bases in the Middle East, including Kuwait, Bahrain and Saudi Arabia, the Times of Israel reported.

Asked if the threats had changed U.S. force protection posture in the region, Capt. Jeff Davis, a Pentagon spokesman, said, "We already have very high security at all of our facilities there. We track many threats like this, most of them aspirational."

The Telegram group on the dark web issued a call for an attack in Normandy several months ago, before an attack on a church in that part of France killed an 85-year-old local priest.

Intsights declined to talk to the Washington Examiner about its findings.

"We are currently not giving any more interviews regarding this subject," Dana Ben David said in an email.

Jeffrey Eisenach, a visiting scholar at the American Enterprise Institute, said the U.S. is likely conducting similar cyber missions. The public just doesn't hear about them.

"We have every reason to believe the U.S. is doing it, is doing it aggressively and is doing it effectively, in collaboration with other intelligence services, but is not contracting out the task as much as collaborating with others when they can be helpful to us," Eisenach said. "I think the [National Security Agency] is really extremely effective in gathering intelligence through cyber means."

Justin Johnson, an analyst at the Heritage Foundation, said that while reporting on the hack could shut that window into the Islamic State's communications, there's probably some value to calling attention to cyber efforts against ISIS.

"That's often the case with any of these cyber exploits. To some degree, at some point if you use the knowledge you're gaining, it closes that particular avenue of information," he said.

The U.S. cyber strategy against the Islamic State is twofold: one mission allows for surveillance, like the kind of information gathering conducted by the Israelis. The other allows the U.S. to go on the offense and attack the Islamic State's ability to communicate and recruit online.

The offensive capability was just green-lighted this year, a move Eisenach said should have come much sooner.

"There are many people in NSA and cyber community who think that we should be more aggressive and more on the proactive front to use our offensive capabilities to degrade enemies," he said. "As far as ISIS is concerned, waiting until spring of 2016 to turn that capacity loose on ISIS was a mistake."

In addition to more aggressive cyber action, Eisenach called for some rewriting of policy that is outdated in today's fast-moving cyber warfare environment.

"We're fighting a 21st century war with 20th century doctrine and strategies," he said. "We have law enforcement and treaties and diplomatic complaints and lots of tools that may have worked reasonably well in an environment where bad things happened over series of weeks or months. … Now the enemy hits us thousands of times a second. It doesn't do much good to strike back a month later."