Modern field guide to security and privacy

Centcom Twitter hack and the rewards of digital vandalism

Defacing a Twitter account is hardly a challenging cybercrime. Yet a rash of digital graffiti supporting the Islamic State is giving the militants a public relations victory in its fight with the West taking place on battlefields and online.

|
AP
This screen grab made Monday, Jan. 12, 2015 show the front page of the U.S. Central Command twitter account after it was hacked. The twitter site of the military's U.S. Central Command was taken over Monday by hackers claiming to be working on behalf of the Islamic State militants. American and coalition fighters are launching airstrikes against IS in Iraq and Syria. The site was filled with threats that said "American soldiers, we are coming, watch your back." Other postings appeared to list names and phone numbers of military personnel as well as PowerPoint slides and maps.

When US Central Command’s social media sites were taken over by the "Cyber Caliphate" earlier this week, it marked the third time in recent days in which unknown hackers defaced websites with messages supporting the Islamic State, the jihadi group fighting in Iraq and Syria.

Vandalism of Twitter and YouTube accounts or a TV station website is hardly a challenging cybercrime. Yet this recent rash of digital graffiti, even if it's the work of pranksters, has handed the militants a public relations victory in a fight against the West taking place on battlefields and online.

"It makes the US military look silly," says Ben Fitzgerald, director of the Technology and National Security Program at the Center for New American Security in Washington. "The Cyber Caliphate looks more technologically savvy than Centcom, which isn't the case."

Before unknown hackers took over the Twitter and YouTube accounts belonging to Central Command, or Centcom, similar attacks last week hit the website of WBOC-TV, a local TV station in Salisbury, Md., and a New Mexico daily newspaper. In all three incidents, the attackers posted messages in support of the Islamic State.

While hitting sites and social accounts for small media outfits might not give the Islamic militants or their supporters much credibility, defacing Centcom is a different story. After all, this is the military command post from which the US oversees operations in the Middle East, where American forces have been battling IS militants.

"At the same time it has suffered a series of setbacks on the physical battlefields of Iraq, the ISIS flag got waved in a medium that more people in the West both notice and care about – the social media environment," Peter Singer, a strategist for the New America Foundation, wrote in Wired. "It further stakes ISIS’s claim to prominence among the next generation of jihadis."

Indeed, social media has become an important tool for recruiting fighters to militant movements. In a Monitor article last year, Matthew Olsen, director of the National Counterterrorism Center, was quoted as saying: "Importantly, the group also views itself as the now-leader of a global jihadist movement ... and it uses social media to secure a widespread following."

Still, it's difficult to know who was really behind the recent spate of IS related cybervandalism, and most experts doubt it's anyone directly tied to the militant group.

"It’s very difficult to establish attribution in these cases," said Fitzgerald. "But the most interesting thing I saw on Twitter was a screen grab of who the Cyber Caliphate was following. One of the accounts it followed belonged to Andrew Jackson Jihad, a folk punk band based out of Phoenix, Arizona. There wouldn’t be a lot of fans of a band like that in Syria or Iraq."

But whoever it is, said Stuart Baker, former assistant secretary for policy at the Department of Homeland Security, "It suggests that security wasn't a high enough priority across the command." 

Now, said Mr. Baker, that's likely to change. "We should see less of these attacks because people should be more aware," he said. "Both Twitter and Google have offered two-party authentication tools that can be used to prevent this." 

The FBI is investigating all three attacks.

 

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Centcom Twitter hack and the rewards of digital vandalism
Read this article in
https://www.csmonitor.com/World/Passcode/2015/0114/Centcom-Twitter-hack-and-the-rewards-of-digital-vandalism
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe