Jun 14

- Even Toilets Aren’t Safe as Hackers Target Home Devices (Bloomberg, June 10, 2014):

Come home to a hot iron and smoldering clothes this afternoon? Soon, it may not be a sign of forgetfulness, but rather evidence that you’ve been hacked.

In coming years, your smartphone will be able to lock your house, turn on the air conditioning, check whether the milk is out of date, or even heat up your iron. Great news, except that all that convenience could also let criminals open your doors, spy on your family or drive your connected car to their lair.

“As these technologies become more sophisticated, it opens up a broader spectrum of threats,” said Gunter Ollmann, chief technology officer of IOActive, a tech security firm in Seattle. A world of connected devices makes it possible “for the bad guys to have permanent entry into your household.”

What the industry calls “the Internet of things” has been heralded as the next wave of tech riches. By 2020, some 26 billion such devices may be connected to the Internet, up from 3 billion today, researcher Gartner Inc. (IT) estimates. That’s almost four times the number of smartphones, tablets and PCs that will be in use.

The vision is to connect almost everything — from cars to fridges, lamps, even toilets. Forget to flush? There’s an app for that. Continue reading »

Tags: , ,

May 19

- China Responds To “Ridiculous” Hacking Charges, Warns “Will Harm Relations With US”, Demands US “Rectify Mistake” (ZeroHedge, May 19, 2014):

While we wait (in vain) for the US to lob sanctions at China for doing what Russia has done and amass a military presence on its border with Vietnam, here is what China had to say about the earlier announcement by the DOJ charging China with espionage and “penetrating” US companies (if having nothing to add regarding the NSA). From the wires:

  • CHINA FOREIGN MINISTRY SAYS CHARGES HARM RELATIONS WITH U.S.
  • CHINA FOREIGN MINISTRY SAYS CHINA HAS ALREADY PROTESTED TO U.S., URGES U.S. TO IMMEDIATELY RECTIFY MISTAKE
  • CHINA FOREIGN MINISTRY ‘STRONGLY REFUTES’ U.S. CHARGES
  • CHINA FOREIGN MINISTRY SAYS U.S. MADE UP FACTS IN SPYING CASE
  • CHINA FOREIGN MINISTRY URGES U.S. TO `CORRECT ITS MISTAKES’
  • CHINA SAYS U.S. VIOLATES BASIC PRINCIPLES OF INTL RELATIONSHIPS
  • CHINA FOREIGN MINISTRY CALLS CHARGES `BASELESS,’ `RIDICULOUS’
  • CHINA FOREIGN MINISTRY URGES U.S. TO `WITHDRAW CHARGES’

And the enigmatic:

  • CHINA TO MAKE FURTHER RESPONSES ACCORDING TO DEVELOPMENTS

Full Statement from China’s Foreign Ministry: Continue reading »

Tags: , , , , , , ,

Apr 28

- Hackers find first post-retirement Windows XP-related vulnerability (Computerworld, April 27, 2014):

Internet Explorer 6, 7 and 8 arent being exploited yet, but harbor a critical flaw

Computerworld – Microsoft on Saturday told customers that cyber-criminals are exploiting an unpatched and critical vulnerability in Internet Explorer (IE) using “drive-by” attacks.

“Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11,” the company said in a security advisory.

Continue reading »

Tags: , , , , , ,

Apr 07

anonymous-israel-cyber-attack-.si

- #OpIsrael: Anonymous attacks hundreds of Israeli websites (RT, April 6, 2014):

Hundreds of websites of Israeli ministries and organizations came under attack by Anonymous early Monday as part of the hacktivist group’s anti-Israel operation, dubbed #OpIsrael.

“On April 7, 2014, we call upon our brothers and sisters to hack, deface, hijack, database leak, admin takeover, and DNS terminate the Israeli Cyberspace by any means necessary” the group said in a statement.

The move is an act of protest against Israel’s policies, including those against Palestine.

“The further assault on the people of Gaza, who have been flooded by your sewage, terrorized by your military apparatus, and left to die at the border while waiting for medical attention will NOT be tolerated anymore,” the statement read.

“We will not stop until the police state becomes a free state and Palestine is free.” Continue reading »

Tags: , , , , , , , ,

Mar 12

- Isn’t It Ironic: Mt.Gox Hacker Demands Ransom From Exchange Users To Not Reveal Their Personal Data (ZeroHedge, March 11, 2014)

The bankruptcy of the once largest Bitcoin exchange may be history, but now the real drama begins.

First, over the weekend, allegations surfaced that not the whole truth may have been revealed during the heartfelt announcement by Mt. Gox CEO, Mark Karpeles, who claimed that $400 million in Bitcoin were stolen by hackers. As Forbes reported, hackers took over the Reddit account and personal blog of Mark Karpeles, to reveal that the exchange he ran had actually kept at least some of the bitcoins that the company had said were stolen from users.

Continue reading »

Tags: , ,

Mar 10

FYI.


Japanese reports blame collapse of the company on hackers overloading the website

bitcoin-111
Unlike traditional currencies, which are backed by central banks, Bitcoin is created by complex interactions between a large network of computers across the globe.

- Bitcoin exchange MtGox ‘faced 150,000 hack attacks every second’ (Telegraph, March 9, 2014):

Troubled Bitcoin exchange MtGox was reportedly attacked 150,000 times per second by hackers in the days leading up to its collapse last month.

The Tokyo-based exchange, which filed for bankruptcy protection in February, was hit with crippling distributed denial-of-service (DDoS) attacks, according to the Yomiuri Shimbun newspaper.

During DDoS attacks, hackers take control of multiple computers to send a flood of data to the target, causing servers to crash and making websites unavailable.

Lawyers for MtGox said that during the attacks, which lasted for several days, 750,000 Bitcoins belonging to customers were stolen, worth an estimated $575m (£344m).

Continue reading »

Tags: , , , ,

Jan 20

- Computer Security Expert Claims he Hacked the ObamaCare Website in 4 Minutes (Liberty Blitzkrieg, Jan 20, 2014):

The hits just keep on coming for ObamaCare. It was less than two weeks ago that I highlighted the potential premium rate death spiral that ObamaCare faces due to the fact that only old and sick people are signing up for the program. Now it seems there are further security related concerns plaguing the site, as cyber-security expert David Kennedy recently claimed that “gaining access to 70,000 personal records of Obamacare enrollees via HealthCare.gov took about 4 minutes.”

It’s actually hard to be this incompetent if you tried.

More from the Washington Times:

Continue reading »

Tags: , , , , , , , , , ,

Jan 19

- Microsoft’s secret battle against the Tor botnet (The Daily Dot, Jan 16, 2014):

In August 2013, 4 million infected computers woke up and waited instructions from their master.

The pathogen was Sefnit, a nasty bit of malware that makes infected computers mine bitcoins. Once the computers woke up, they worked under the command of Ukranian and Israeli hackers named Scorpion and Dekadent. The malware communicated with the two by downloading Tor, the powerful anonymizing software, and talking over encrypted channels. It was the first time a botnet, as a collection of slave computers is called, used Tor in such a potentially powerful way.

By using an unconventional method to exploit Windows, the hackers unwittingly forced Microsoft to show a hand few knew it had: The ability to remotely remove progams en masse from people’s computers, without them even knowing it.

Continue reading »

Tags: , , , , , , , , ,

Dec 31

nsa_seal

- Inside TAO: Documents Reveal Top NSA Hacking Unit (Der Spiegel, Dec 29, 2013):

Part 1: Documents Reveal Top NSA Hacking Unit

The NSA’s TAO hacking unit is considered to be the intelligence agency’s top secret weapon. It maintains its own covert network, infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by those it is targeting.

In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn’t budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.

Continue reading »

Tags: , , , , , , , , , , , , ,

Dec 11

- NSA uses Google cookies to pinpoint targets for hacking (Washington Post, Dec 10, 2013):

A slide from an internal NSA presentation indicating that the agency uses at least one Google cookie as a way to identify targets for exploitation. (Washington Post)

The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using “cookies” and location data to pinpoint targets for government hacking and to bolster surveillance.

The agency’s internal presentation slides, provided by former NSA contractor Edward Snowden, show that when companies follow consumers on the Internet to better serve them advertising, the technique opens the door for similar tracking by the government. The slides also suggest that the agency is using these tracking techniques to help identify targets for offensive hacking operations.

Continue reading »

Tags: , , , , , , , , , , , , , , ,

Sep 26

:-)

- LA officials may delay school iPad rollout after students hack them in a week (engadget, Sep 26, 2013):

Just a week after it began the first phase of putting iPads in the hands of all 640,000 students in the region, the Los Angeles school district already has a fight on its hands. In a matter of days, 300 children at Theodore Roosevelt High School managed to work around protective measures placed on the Apple tablets, giving them complete access to features — including Facebook, Twitter and other apps — that should otherwise have been blocked.

Continue reading »

Tags: , , , , , ,

Sep 24

- Hackers Breach iPhone 5S Fingerprint Security (ZeroHedge, Sep 23, 2013):

Dubbed as a “game-changer” despite being around on devices for years (Motorola Atrix anyone); a ‘paradigm’ shift in mobile payment security; and a revolution in handheld devices by any and all investors bullish of the stocks; Appl’s fingerprint-scanning TouchID is everything you want it to be – apart from secure. As Der Spiegel reports, the well-respected German hacker group Chaos Computer Club (CCC) has thrown a wrench in the works by bypassing the smartphone’s much-heralded fingerprint scanner just two days after launch. The CCC, as the clip below illustrates, successfully bypassed the biometric security system, called TouchID, using “easy everyday means.” So, the question now is – will the NYPD demand everyone downgrade their phones?

Via Der Spiegel,

It is supposed to represent a major step forward in mobile phone security by replacing the password. But the fingerprint sensor on Apple’s new iPhone 5S has already been compromised just two days after it went on sale. The German hacker organization Chaos Computer Club (CCC) says it has successfully bypassed the biometric security system, called TouchID, using “easy everyday means.”

the CCC said in a blog post, it wanted to demonstrate how fingerprint biometrics is “unsuitable as [an] access control method and should be avoided.”

Such fingerprint technology has been around for a while — it was included as a feature on the Motorola Atrix smartphone, launched in 2011 — but TouchID has been reported as a significant step forward. That assertion is categorically denied by the CCC, with a hacker known as Starbug, who was responsible for bypassing the fingerprint security, saying: “In reality, Apple’s sensor has just a higher resolution compared to the sensors so far. So we only needed to ramp up the resolution of our fake.”

“It is plain stupid to use something that you can’t change and that you leave everywhere every day as a security token,” he said, referring to fingerprints.

Tags: , , , ,

Sep 14

- Hackers For Government Hire: A Growing and Deeply Disturbing Industry (Liberty Blitzkrieg, Sep 14, 2014):

Wikileaks recently continued the release of what they refer to as the “Spy Files.” These files provide a look into some of the companies behind the rapid commercialization of the spy equipment industry, who’s clients include repressive governments and dictatorial regimes around the world. In a press release announcing these files Wikileaks states:

Across the world, mass surveillance contractors are helping intelligence agencies spy on individuals and ‘communities of interest’ on an industrial scale.

The Wikileaks Spy Files reveal the details of which companies are making billions selling sophisticated tracking tools to government buyers, flouting export rules, and turning a blind eye to dictatorial regimes that abuse human rights.

One of the companies highlighted is an Italian based company called Hacking Team, a firm I had never heard of or read about until I came across an article from The Verge yesterday. What I read was pretty terrifying.

The Verge explains that: Continue reading »

Tags: , , , , , ,

Aug 03

General tells Black Hat convention surveillance programmes respect privacy and are vital for national security




- NSA director Keith Alexander defends surveillance tactics in speech to hackers (Guardian, July 31, 2013):

The director of the National Security Agency has tried to dampen the current outcry over US government surveillance programmes by insisting such programmes respect Americans’ privacy. He also said that he is unable to intercept his own daughters’ emails.

General Keith Alexander told a conference of hackers on Wednesday that extensive surveillance had disrupted dozens of terrorist attacks but that technical and policy restrictions protected the privacy of ordinary Americans.

“The assumption is our people are just out there wheeling and dealing. Nothing could be further from the truth. We have tremendous oversight over these programmes. We can audit the actions of our people 100%, and we do that,” he said.
Continue reading »

Tags: , , , , , , , , , , , , ,

Jul 27

- Famed hacker Barnaby Jack dies a week before hacking convention (Reuters, July 26, 2013):

Barnaby Jack, a celebrated computer hacker who forced bank ATMs to spit out cash and sparked safety improvements in medical devices, died in San Francisco, a week before he was due to make a high-profile presentation at a hacking conference.

The New Zealand-born Jack, 35, was found dead on Thursday evening by “a loved one” at an apartment in San Francisco’s Nob Hill neighborhood, according to a police spokesman. He would not say what caused Jack’s death but said police had ruled out foul play.

The San Francisco Medical Examiner’s Office said it was conducting an autopsy, although it could be a month before the cause of death is determined.

Jack was one of the world’s most prominent “white hat” hackers – those who use their technical skills to find security holes before criminals can exploit them.

His genius was finding bugs in the tiny computers embedded in equipment, such as medical devices and cash machines. He often received standing ovations at conferences for his creativity and showmanship while his research forced equipment makers to fix bugs in their software.

Jack had planned to demonstrate his techniques to hack into pacemakers and implanted defibrillators at the Black Hat hackers convention in Las Vegas next Thursday. He told Reuters last week that he could kill a man from 30 feet away by attacking an implanted heart device.

Continue reading »

Tags: , , , ,

May 30

- Monsanto website downed as Anonymous claims hack (RT, MAy 30, 2013):

Hackers from the Anonymous collective claimed to have infiltrated the website for the biotech giant Monsanto, which has been the subject of recent international protests.

The cyber-attack was carried out as part of #OpMonsanto, an attempt to demonstrate against Monsanto’s reach into every aspect of the food industry, from nature to farmers to consumers. The corporation’s main website, Monstanto.com, appeared to have been briefly disabled Wednesday night.

Continue reading »

Tags: , , , , ,

May 28

Update:

- Here Is The Very Long List Of U.S. Weapons Designs And Technologies Compromised By Chinese Hackers


The charge by a defense panel comes a month visit by China’s president to Calif.


Chinese hackers have allegedly compromised the designs of top weapons systems, including the F-35 Joint Strike Fighter, The Washington Post reports. This photo from Northrop Grumman Corp., shows a pre-production model of the F-35 Joint Strike Fighter.

- Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies (Washington Post, May 28, 2013):

Designs for many of the nation’s most sensitive advanced weapons systems have been compromised by Chinese hackers, according to a report prepared for the Pentagon and to officials from government and the defense industry.Among more than two dozen major weapons systems whose designs were breached were programs critical to U.S. missile defenses and combat aircraft and ships, according to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board.

Tags: , , , , , , , , , , ,

Apr 23

- Hacked AP Twitter Account Reports Of Two Explosions At White House, Obama Injured (ZeroHedge, April 23, 2013)

Tags: , , , , , ,

Apr 16

- Update: DARPA Cyber Chief Peiter “Mudge” Zatko Heads To Google (The Security Ledger, April 14, 2013):

Noted hacker and innovator Peiter “Mudge” Zatko, a project manager for cyber security research at DARPA for the past three years- will be setting up shop in the Googleplex, according to a post on his Twitter feed.

Zatko, who earned fame as a founding member of the early 1990s Boston-area hacker confab The L0pht and later as a division scientist at government contractor BBN Technologies, announced his departure from DARPA following a three-year stint as a Program Manager in DARPA’s Information Innovation Office on Friday. “Given what we all pulled off within the USG, let’s see if it can be done even better from outside. Goodbye DARPA, hello Google!” he Tweeted. Continue reading »

Tags: , , , ,

Mar 30

Gordon Duff is a Marine Vietnam veteran, a combat infantryman, and Senior Editor at Veterans Today. His career has included extensive experience in international banking along with such diverse areas as consulting on counter insurgency, defense technologies or acting as diplomatic representative for UN humanitarian and economic development efforts. Gordon Duff has traveled to over 80 nations. His articles are published around the world and translated into a number of languages. He is regularly on TV and radio, a popular and sometimes controversial guest.

- Horror in Israel: 30,000 Mossad spies exposed (Press TV, by Gordon Duff, March 30, 2013):

Last week, the hacker organization “Anonymous,” symbolized by the famous “Guy Fawkes” mask, hacked Israel’s Mossad.

The hack, initially exposing a hidden network of 30,000 covert operatives, some openly labeled “hitman,” came only days after Israel admitted to their 2010 act of piracy and terrorism against the Freedom Flotilla.

Now the Israeli regime has filled the internet with threats against “Anonymous,” if detailed information on their terror cells is leaked.

After all, who is better to carry out acts of terrorism than an organization with 30,000 covert operatives around the world, almost all trained in use of explosives and demolition, building IEDs, car bombs, kidnapping and assassination and with a long and very public history of, not just murdering people but getting away with it as well.

Continue reading »

Tags: , , , , ,

Mar 14


National Security Agency Director Gen. Keith Alexander

- Pentagon creates 13 offensive cyber teams for worldwide attacks (RT, March 13, 2013):

The head of the United States Cyber Command says the US is developing 40 new teams of cyber-agents that will both protect America’s critical infrastructure from hackers and as well as launch attacks against the country’s adversaries.

Gen. Keith Alexander, who leads both the Cyber Command and the National Security Agency, told the US Senate Armed Services Committee on Tuesday that the 40 online support teams should be ready for action by 2015, with 13 of those units existing specifically to attack other countries.

Alexander has been reluctant to go into detail about how the newly-designed teams will engage in cyber battle with America’s enemies, but he did say that the 13 squads of offensive fighters won’t be sitting around waiting for hackers from abroad to strike first. The NSA chief described the groups as ‘‘defend-the-nation’’ teams but also stressed that their role will be one that puts them on both sides of the action. Continue reading »

Tags: , , , , , , , , , , , ,

Feb 10

- Hacker reveals George W. Bush’s naked self-portraits (The Raw Story, Feb 8, 2013):

Personal information stolen from several email accounts belonging to people close to the Bush family reveals the nation’s 43rd president has developed an affinity for painting himself bathing, of all things.

Photos included in an information dump turned over to The Smoking Gun include President George H.W. Bush in the hospital, the elder Bush posing with President Bill Clinton, a family photo of former Florida Gov. Jeb Bush and even President George W. Bush posing with a cardboard cutout of himself wearing a mustache and beret.

Three of the images also show paintings Bush created, including one of himself in the shower, another of himself in a bath, and a third of him crouched over a canvas depicting a church.

A hacker going by the name “Guccifer” claimed the stolen messages include addresses, phone numbers and email addresses that go directly to both former presidents and their families, along with a security code for a gate outside the younger Bush’s home in Dallas.

Continue reading »

Tags: , , , , , ,

Feb 10

Investigation launched into how Guccifer posted photos and personal emails of ex-US president George HW Bush online


George HW Bush: the emails were said to contain details of the state of the ex-president’s health and his family’s phone numbers. Photograph: Getty Images

- George Bush’s family emails hacked (Guardian, Feb 8, 2013):

An investigation has been launched into how a hacker managed to access the email accounts of the former US president George HW Bush and members of his family.

A number of Bush family photographs and personal emails were posted online by the hacker, who goes by the name of Guccifer.

Continue reading »

Tags: , , , , ,

Feb 04

- Anonymous Claims It Hacked Fed, Releases Confidential Banker Information (ZeroHedge, Feb 4, 2013):

A year and a half ago, when the hacker group Anonymous launched its anti-Bernanke, anti-Fed campaign dubbed Operation Empire State Rebellion (or OpESR), we stated, rhetorically and jokingly, that “perhaps in the aftermath of the IMF “very major breach” by anonymous hackers, it is really time to make sure all external access points to FedWire and FedLine are truly safe and sound. It will be very sad if it is uncovered that this source of externally accessible portal to hundreds of billions in emergency Fed funding has been somehow compromised. Just imagine the loss of confidence in the system… Why, a global distributed attack would really stretch the Fed’s 1,200-strong police force quite thin.” It appears that either FedWire or FedLine may not have been “truly safe and sound” after all.

Continue reading »

Tags: , , , , , , , , , , ,

Feb 02

- Fairewinds: Website is under verified DDS attack — Another nuclear expert’s site had similar problems — Both involved with San Onofre issue — “What is the nuke industry hiding?” (ENENews, Feb 1, 2013)

Tags: , , ,

Jan 26

Related info:

- Anonymous Calls For Civil War To Overthrow The US Government (Video)


- Hackers take over federal website, threatens ‘war’ on U.S. government (Washington Times, Jan 26, 2013):

A group of computer hackers, angry over the suicide of an Internet freedom activist who had been under investigation from the Obama administration’s Justice Department, took over a federal website early Saturday and announced it is “declaring war on the U.S. government.”

The group, which calls itself Anonymous, took over the website of the U.S. Justice Department’s Sentencing Commission, www.ussc.gov, and threatened to release sensitive government data and use computer-code based “warheads” against other sites.

Continue reading »

Tags: , , , , , , , ,

Jan 16

- Internet Activist’s Prosecutor Linked To Another Hacker’s Death (BuzzFeed, Jan 15, 2013):

Prosecutor Stephen Heymann has been blamed for contributing to Swartz’s suicide. Back in 2008, young hacker Jonathan James killed himself in the midst of a federal investigation led by the same prosecutor.

One of the prosecutors in the case of the online pioneer who killed himself this weekend, Aaron Swartz, was accused in 2008 of driving another hacker to suicide.

Some of Swartz’s friends have accused Assistant United States Attorney Stephen Heymann of contributing to Swartz’s suicide, with his unwillingness to compromise on the prosecution of Swartz in a case involving scholarly journal articles.

Back in 2008, another young hacker, Jonathan James, killed himself after being named a suspect in another Heymann case.

Continue reading »

Tags: , , , , , , ,

Jan 14

- Hackers say coming air traffic control system lets them hijack planes (Network World, Jan 13, 2013):

FAA says it can spot hacking attempts, but won’t allow independent ‘stress tests’

CSO – An ongoing multibillion-dollar overhaul of the nation’s air traffic control (ATC) system is designed to make commercial aviation more efficient, more environmentally friendly and safer by 2025.

But some white-hat hackers are questioning the safety part. The Next Generation Air Transportation System (NextGen) will rely on Global Positioning Systems (GPS) instead of radar. And so far, several hackers have said they were able to demonstrate the capability to hijack aircraft by spoofing their GPS components.

The Federal Aviation Administration (FAA) has declared that it already has multiple measures to detect fake signals. But it has so far not allowed any independent testing of the system.

Continue reading »

Tags: , , , ,

Jan 13

- As NSA Pairs With Banks To “Fight Hackers”, Will It Also Gain Access To Every American’s Financial Details? (ZeroHedge, Jan 13, 2013):

Just because there was not enough encroachment by the government into virtually every area of private life, here is another “collaboration” that will further enmesh big brother into every aspect of private life, in this case private financial life, because as the WaPo reports, “major U.S. banks have turned to the National Security Agency for help protecting their computer systems after a barrage of assaults that have disrupted their Web sites, according to industry officials. The attacks on the sites, which started about a year ago but intensified in September, have grown increasingly sophisticated, officials said. The NSA, the world’s largest electronic spying agency, has been asked to provide technical assistance to help banks further assess their systems and to better understand the attackers’ tactics.”

And while we salute the great diversionary pretext that “Iranian hackers” pose a greater risk to the stability of the US financial system than, say, the ongoing monetization of US debt at a pace of $85 billion per month, which has made the Fed’s DV01 rise to a mindboggling $2.75 billion, or idiot pundits who claim all American problems can be resolved with one coin, we can’t help but wonder what happens when the most intrusive of US spy agencies, one which as reported last year is free “to intercept, decipher, analyze, and store” virtually every electronic communication in the entire world, now has full explicit access to all bank data, and, incidentally, every American’s financial snapshot at any given moment?

More on the official spin: Continue reading »

Tags: , , , , , , , , , , , , ,

Nov 17

- Israel Releases Another Gaza Pinpoint Strike Video, Anonymous Retaliates By Taking Down IDF Blog (ZeroHedge, Nov 17, 2012):

In what is becoming an increasingly more confusing conflict – is it truly an ideological war, or merely an extended attempt to generate empathy via social networking, together with a full-blown conflict on twitter - Israel continued its pinpoint strikes in Gaza overnight, taking out the house of a high-ranking Hamas operative, together with the release of commemorative video showing the explosion moments after the event. The clip is below. What is more curious is that the global hacker group Anonymous has already picked its side, and yesterday launched a massive attack named #OpIsrael, which has so far hacked 700 Israeli websites. From RT: “The hackers reportedly took down websites ranging from high-profile governmental structures such as the Foreign Ministry to local tourism companies’ pages. The biggest attack as of now has been the Israeli Foreign Ministry’s international development program, titled Mashav. Anonymous announced on Twitter they’ve hacked into the program’s database, with the website remaining inaccessible at the moment.” And most notably, Anonymous also took down the primary nexus used by Israel’s to boast about its military exploits: the blog of the Israel Defense Forces, which has been down for half a day now.While Israel has demonstrated superiority in sheer physical military strength, the reality, as the StuxNet stories over the past 2 years have shown, that the real war will be fought on line and in various mainframes. The problem is that when dealing with a massive decentralized, cloud of hacker attacks originating from everywhere in the globe, just whom will Israel retaliate against in this 21st century equivalent of guerrilla warfare?

The latest explosion:

IDF’s blog as of right now:

Tags: , , , , , , , , , ,