Al Qaeda Hacker Attack Scheduled To Begin November 11th - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Enterprise Applications
News
10/31/2007
06:03 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Al Qaeda Hacker Attack Scheduled To Begin November 11th

An Israeli news site claims Bin Laden's cyber legions are retaliating against Western surveillance programs.

An Israeli Web site is warning that al Qaeda hackers will attack Western, Jewish, Israeli, Muslim apostate, and Shiite Web sites starting on Sunday, November 11th.

"...al Qaeda is retaliating against Western intelligence agencies' tactics, which detect new terrorist sites and zap them as soon as they appear," reports DEBKAfile, a news site based in Israel.

"Until now, the jihadists kept dodging the assault by throwing up dozens of new sites simultaneously," the news report said. "This kept the trackers busy and ensured that some of the sites survived, while empty pages were promptly replaced. But as al Qaeda's cyber wizards got better at keeping its presence on the Net for longer periods, so too did Western counter-attackers at knocking them down. Now Bin Laden's cyber legions are fighting back. The electronic war they have declared could cause considerable trouble on the world's Internet."

How disruptive the attack will be has yet to be determined. It's not clear where DEBKAfile is getting its information and those in the government who worry about such things don't appear to be more worried than usual.

A U.S. Secret Service agent who forwarded the report to a security mailing list cautioned that the news did not constitute an official USSS advisory and a spokesperson for the USSS said, "We didn't send out the bulletin."

The Department of Homeland Security reiterated that message and declined to characterize how or whether the DEBKAfile report was being viewed by the US security community.

"We take all threats, credible or not, seriously," said a spokesperson for the Department of Homeland Security. "...I'm not aware of any imminent threats against the homeland at this time, but we're mindful that there are those in the world who'd wish to do us harm."

DEBKAfile identifies itself as "a self-supporting Internet publication devoted to independent, investigative reporting and forward analysis in the fields of international terrorism, intelligence, international conflict, Islam, military affairs, security and politics."

It claims, "Our articles are regularly quoted and credited by a host of international television, radio and print media."

Indeed, DEBKA file has been recognized by Forbes and Wired News for its reporting.

Wikipedia, itself a suspect source, is less charitable, noting, "Some reports can be wildly inaccurate, such as claims of the exact point during the 2003 invasion of Iraq when Saddam Hussein would use nuclear and biological weapons, which never happened. This most likely stems from the unidentified sources' possible political or military bias. As such, Debka can not be entirely relied upon for accurate reports."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Commentary
Rethinking Technology Road Maps for the Second Half of 2020
Andrew Froehlich, President & Lead Network Architect, West Gate Networks,  7/2/2020
Commentary
The Best Way to Get Started with Data Analytics
John Edwards, Technology Journalist & Author,  7/8/2020
News
IT Trade Shows Go Virtual: Your 2020 List of Events
Jessica Davis, Senior Editor, Enterprise Apps,  5/29/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
Slideshows
Flash Poll