Site Motto

This is a non-commercial site brought to you with the aim of creating awareness about the challenge of terrorism. Daily News on the War on the Jihad.

Breaking News

Islamists seek to organize hackers' jihad in cyberspace

A Web forum for Muslim extremists is calling on its members to organize an Islamist hackers' army to carry out Internet attacks against the U.S. government.

The site has posted tips, software and links to other resources to help would-be cyber-terrorists.

So-called keystroke logs -- which record every letter typed into a computer -- were among the programs offered for download on al- Farooq - a cyber terror site. The software can be used to learn passwords and log-in information.

Photo credits: newsfactor

_____________________

The Jamestown Foundation, a District-based nonprofit with a history of extensive ties to the CIA, said that it has monitored postings on a new section of an extremist bulletin board called al- Farooq.

According to Jeffrey Poole, a researcher for the foundation, the forum "represents a how-to manual for the disruption and/or destruction of enemy electronic resources, including e-mail, Web sites and computer hardware."

The new section was set up two weeks ago, according to a briefing written by Mr. Poole and distributed by the foundation, which added that one member of the forum has called for the creation of an Islamist organization, which he dubbed "Jaish al-Hacker al-Islami," the Islamic Hacker's Army.

The would-be Islamist cyber-terrorist, who calls himself "Achrafe," pointed out that organization of large numbers of attackers is a key force multiplier in some forms of Web warfare -- such as denial-of- service attacks in which the target's servers are bombarded with so many requests for information from other parts of the Internet that they effectively are shut down.

The foundation described in detail a "hacker library" maintained on the al-Farooq site, offering special software that can be used to steal passwords; tools and tips on anonymous Web surfing; and programs the site says can destroy or disable a target computer if installed on it.

Ron Gula, a former National Security Agency official who worked on computer security issues, said that many of the hacking efforts made by such groups are "amateurish" and "lost in the background noise" of other hackers and Internet criminals. "Between 1 and 5 percent of the Internet is infected [with viruses, spyware, worms or other malicious software] at any one time," Mr. Gula said.

So-called keystroke logs -- which record every letter typed into a computer -- were among the programs offered for download on al- Farooq. The software can be used to learn passwords and log-in information.

Once the program is clandestinely installed on a computer, typically via a virus or an unwitting download, the records of the key strokes are transmitted to the hacker, giving him access to password-protected computer systems.

Story Credits: Shaun Waterman writing in the Washingtontimes

__________________________________________________

Discuss this article

Google
Search WWW Search waronjihad.org Search historyofjihad.org

______________________________________________________________________ ____________

________________________________________

Send your feedback to:

- The WaronJihad team

______________________________________________

______________________________________________

Letters to the Editor
Read Letters to the Editor

______________________________________________

Free Hit Counter
Thanks for visiting