The hacker collective known as Anonymous first declared war on Islamic State (formerly known as ISIS) supporters back in the Summer of 2014 with [Operation NO2ISIS](http://www.forbes.com/sites/jasperhamill/2014/06/27/anonymous-hacktivists-prepare-for-strike-against-isis-supporters/) which promised to target the online infrastructure of those countries sponsoring Islamic State militants. This declaration followed the hacking of an Anonymous Twitter account, @TheAnonMessage, which was then used to post photos of a terrorist assault near Baghdad. At the time, an Anonymous spokesperson stated that "these savages who have no religion or morality are bent on burning everything in their path, killing and pillaging as they go. They must be stopped." Because Islamic …

Member Avatar
Member Avatar
+4 forum 9

American technology companies are by implication evil, and aiding terrorist groups such as Islamic State/ISIS according to a number of highly influential but terribly ill-informed Western players. Apple and Google have become the command and control networks of choice for terrorists and implementing full-device encryption by default will help Islamic State to plan future attacks, if we are to believe certain spy masters and career politicians. I use the term 'terribly ill-informed' wisely, and am aware that I will no doubt get plenty of flack from those who think the head of the UK Government Communications Headquarters (GCHQ) or Director …

Member Avatar
Member Avatar
+4 forum 2

If it were not bad enough that the Iowa Division of Homeland Security official website was hacked, defaced and forced to close down temporarily it appears that another Iowa state government resource was also compromised a few weeks before. At the end of January the Iowa Racing and Gaming Commission suffered a database breach which had the potential to impact upon the data of some 80,000 folk. While the Homeland Security hack is said, following forensic examination, not to have exposed any sensitive information it does surely expose something of a disregard for security within state government. According to data …

Member Avatar
Member Avatar
+1 forum 2

Moazzam Begg, former [URL="http://www.daniweb.com/blogs/entry2863.html"]Guantanamo Bay[/URL] detainee, is set to go back to the now closed suspected terrorist prison camp. But this time his stay will be purely virtual, on the Xbox 360. As strange as it might sound, a new computer game is being developed based upon life in Guantanamo Bay according to reports. 41 year old Brit Begg spent the best part of two years there, detained as a terror suspect. He was eventually released without charge. Game play will not, however, revolve around lengthy political campaigning, nor indeed water boarding or other torture activity. There is no word …

Member Avatar
Member Avatar
+0 forum 1

I am no great fan of the concept of National ID Cards, although my reasoning is not so much based upon distrusting the 'if you've done nothing wrong you have nothing to fear' argument nor even the 'big brother invasion of privacy' paranoia which seems to grip most of the mainstream media in the UK whenever the subject is mentioned. I do admit that both of these things do play a part in my dislike of ID Cards though, but the real deal clincher for me has always been a bit more pragmatic: the UK Government is really crap at …

Member Avatar
+0 forum 0

[URL="http://www.foxnews.com/story/0,2933,444089,00.html"]Fox News[/URL] is ominously warning about the potential of Twittering terrorists. The U.S. Army's 304th Military Intelligence Battalion released in mid-October [URL="http://www.fas.org/irp/eprint/mobile.pdf"]a report [/URL]describing how a number of social media and other technologies, including Twitter, could be used by terrorists. After all, “Twitter has also become a social activism tool for socialists, human rights groups, communists, vegetarians, anarchists, religious communities, atheists, political enthusiasts, hacktivists and others to communicate with each other and to send messages to broader audiences,” according to the report. Not to mention [URL="http://www.daniweb.com/blogs/entry2689.html"]Presidential candidates[/URL] and [URL="http://www.daniweb.com/blogs/entry2923.html"]Republicans[/URL]. This is not news; Clay Shirky's book [URL="http://www.herecomeseverybody.org/"]Here Come Everybody[/URL] talks …

Member Avatar
+0 forum 0

[URL="http://www.newscientist.com/blog/technology/2008/06/always-read-small-print.html"]According to the New Scientist[/URL] it appears that Apple has decided to cover all bases when it comes to how iTunes is used. Apparently, buried deep within the [URL="http://developer.apple.com/softwarelicensing/agreements/pdf/itunesqtsitelicense.pdf"]iTunes End User License Agreement[/URL] is this little gem of a clause: "Licensee also agrees that Licensee will not use the Apple Software for any purposes prohibited by United States law, including, without limitation, the development, design, manufacture or production of nuclear, missiles, or chemical or biological weapons." So there you have it, in black and white, straight from the lawyer's mouth as it were: iTunes should not be used to help …

Member Avatar
Member Avatar
+0 forum 2

A CIA analyst speaking at the SANS 2008 SCADA and Process Control Summit in New Orleans has admitted that hackers have not only been able to penetrate the power grids of several countries, but also successfully cut power to several cities, all from the relative safety of the Internet. Central Intelligence Agency analyst Tom Donahue was quick to point out that all the attacks were external to the United States, but not so quick to provide specifics of the incidents. According to reports Donahue claimed the objective was simple criminal extortion rather than being driven by a terrorist agenda. Conference …

Member Avatar
Member Avatar
+0 forum 1

GPS satellite navigation devices have become an indispensable part of everyday life for millions of drivers the world over. Without these little technological route planning miracles, many of us would literally crash and burn as we struggled to regain control over that map while driving too fast and drinking a large cup of coffee simultaneously. OK, so that might be exaggerating things a little, but the truth is that most 21st Century drivers are dependent upon satellite navigation to get from A to B. Efficiency is the key here, and systems that incorporate Radio Data System (RDS) Traffic Message Channel …

Member Avatar
Member Avatar
+0 forum 2

[URL="http://www.itpro.co.uk/news/107043/alqaeda-plot-to-blow-up-uk-internet.html"]Reports[/URL] have come in over the weekend of a series of dawn raids by the Metropolitan Police on a number of terrorist suspects with Al-Qaeda connections in London. All the suspects have been arrested. The raids follow the seizure of computer files last year suggesting that the target of their planned attack was none other than Telehouse Europe. Located in the Docklands area of London, this is the biggest Internet hub in Europe and the majority of UK Internet traffic flows through it. The damning discovery follows on from a similar operation earlier last year when the UK secret service, …

Member Avatar
+0 forum 0

The biggest test of Internet homeland security went pretty much unnoticed this week. Yet it represents the most serious attack on the Internet itself for five years. On the 6th February a 12 hour concerted Distributed Denial of Service attack took place aimed at the DNS root servers that manage global Internet traffic. DNS is the Domain Name System that translates between the easy to remember URLs we all use, such as daniweb.com, and the much less memorable underlying IP address in numeric form. Think of it as being a huge distributed database system and you are pretty much in …

Member Avatar
+0 forum 0

I was caught up in the travel nightmare that has been unraveling in the UK this week, the result of a major gambit in the ongoing ‘war on terror’ being foiled. Like many business travelers, I had been due to fly, short haul across into mainland Europe, when the news broke that flights were being cancelled and cabin baggage severely restricted on those planes still flying. The purpose of my trip was to attend a press conference, demo a new hardware product, interview the CEO, then fly home, and submit my copy about it all. Copy that requires me to …

Member Avatar
Member Avatar
+0 forum 2

The End.