Studi Strategici ed Intelligence… for dummies

Quando fare l’hacker può essere pericoloso

Published by Silendo on Agosto 30, 2015

Sicuramente è stato letale per Mr. Hussain, cittadino britannico che militava, se così si può dire, tra le file dei “cyber-warriors” dello Stato Islamico. Hussain, secondo quanto riportato dalla stampa statunitense, avrebbe hackerato i profili (Facebook ma non solo) di decine di militari americani pubblicandone i dati riservati. Inoltre avrebbe contribuito a rafforzare le difese cyber dei membri dell’ISIS sviluppando software per penetrare sistemi informatici. E’ stato ucciso da un drone a Raqqa, in Siria:

Islamic State didn’t build a large cyber force like the U.S.’s National Security Agency or China’s People’s Liberation Army. Instead, it had people like Mr. Hussain, a convicted hacker whose suite of inexpensive digital tools threatened to wreak havoc on even the world’s most-powerful country. Islamic State communications described him as one of the group’s secret weapons, said one person who has seen them.
U.S. officials said they believe Mr. Hussain played an important role in recruiting two American Muslims to open fire in Garland, Texas, this spring on a contest for cartoon depictions of the Prophet Muhammad. He also frequently hacked into U.S. service members’ Facebook accounts to determine personal details and future targets, one of the people familiar with the probe said. […]

Mr. Hussain grew up a book-smart teenager, according to court records and several people familiar with his case. He was planning to study computer science.
Before graduating from high school, however, he joined a group of British teens in a hacking collective called Team Poison. Using the handle “Tr1ck,” Mr. Hussain claimed responsibility for hacking into the email account of an assistant to former Prime Minister Tony Blair. Mr. Blair’s personal details, including his National ID number, the equivalent of a Social Security number, were published online.
A British court found Mr. Hussain guilty and he served a prison sentence.
Birmingham police in July 2013 arrested him for involvement in a street fight. While awaiting trial, he fled to Syria, U.K. officials said. By January 2014, he was communicating online with other British Muslims about how to join Islamic State, according to court documents.
Once living in Islamic State territory, Mr. Hussain re-emerged with a new online persona: Abu Hussain al-Britaini.
U.S. officials began to view Mr. Hussain as a top threat because he was on the leading edge of Islamic State efforts to recruit in the U.S. He would post names, addresses and photos of U.S. troops on his Twitter feed and suggest followers find and kill the person. In several instances, the Federal Bureau of Investigation and Defense Department set up 24-hour watches around targeted service members, a person familiar with the situation said.
Mr. Hussain developed a hacking tool, or malware, that could be used to spy on other machines, called a remote access Trojan, or RAT. He was training other Islamic State members in how to use hacker techniques, people familiar with the case said.
In at least one interaction, according to a Wall Street Journal review of online communications, he discussed the possibility of obtaining a zero-day exploit—hacker jargon for software that takes advantage of flaws in commercial software, such as Microsoft Word, unknown to that developer. Because they are unknown, they are almost impossible to stop. […]

In August, Islamic State supporters lighted up social media over an apparent cyber bombshell. IS Hacking Division claimed responsibility for hacking into the social-media accounts of hundreds of U.S. military members. The group published lists of 1,481 names, departments, email addresses, passwords and phone numbers, warning, “we are in your emails and computer systems, watching and recording your every move, we have your names and addresses, we are in your emails and social media accounts, we are extracting confidential data.”
The hacked list of U.S. military names was retweeted on Aug. 11 by @AbuHu55ain_911, the last known social-media profile on Twitter for Mr. Hussain. […]

Posted in: Blog
Tagged:
cyber-mf, guerriglia, ISIS, siria, usa

Chi Sono

Silendo

Un appassionato di relazioni internazionali e studi strategici. In particolar modo di questioni connesse con l'intelligence.
Per contattarmi:
info@silendo.org

Leggi tutto...

Accedi

Tweet di @Silendo_org

Archivio

Categorie

Tags

affari strategici afganistan algeria al qaeda arabia saudita australia cina criminalità organizzata cyber-mf difesa egitto estremismo francia germania gran bretagna guerriglia hamas hezbollah india intelligence iran iraq ISIS israele italia Leadership e classe dirigente libano libia libri medio-oriente minkiate nato nucleare e risorse energetiche pakistan palestina russia sentimenti sicurezza nazionale siria somalia stati uniti strategic foresight studi di intelligence terrorismo turchia

Blogroll

  • Affari Internazionali
  • Agentura
  • American Enterprise Institute
  • ANSSI
  • AOL Defense
  • Arms Control Wonk
  • Asia Centre
  • Asia Times
  • Aspen Institute Italia
  • ASPI
  • Atlantic Council
  • Baker Institute
  • Banca d'Italia
  • BBC
  • Belfer Center
  • Bellingcat
  • Bertelsmann Foundation
  • BESA Center
  • Bibliografia sull'intelligence
  • Bloomberg
  • Bloomberg View
  • Brookings Institution
  • Bruegel
  • Carnegie Endowment
  • Carnegie Middle East Center
  • Carnegie Moscow Center
  • CASD
  • Center for a New American Security
  • Center for Economic Policy Research
  • Center for European Reform
  • Center for Naval Analyses
  • Center for Nonproliferation Studies
  • Centre d'Analyse Stratégique
  • Centro Einaudi
  • Centro Studi Confindustria
  • CEPR
  • CF2R
  • Chatham House
  • China Leadership Monitor
  • CISAC
  • Combating Terrorism Center
  • Comparative Strategy
  • COPASIR
  • Corriere della Sera
  • Council on Foreign Relations
  • CSBA
  • CSFRS
  • CSI – CIA
  • CSIS
  • CSS
  • CSS Strategic Trends Analysis
  • Danger Room
  • DCAF
  • Defence News
  • East online
  • ECFR
  • ECIR
  • Economist
  • Egmont Institute
  • Epistemes
  • EsadeGeo
  • ESPAS
  • EU Institute for Security Studies
  • Eurasianet
  • European Policy Centre
  • Fareed Zakaria
  • FAS
  • FAS – CRS
  • FAS – DNI
  • Fas – Strategic Security Blog
  • Financial Times
  • Foreign Affairs
  • Foreign Policy
  • Foreign Policy – National Security
  • FPRI
  • FRS
  • FSI – Stanford
  • Geneva Centre for Security Policy
  • German Council on Foreign Relations
  • German Marshall Fund
  • Global Trends 2030
  • Globalsecurity.org
  • Governo italiano
  • H-Net
  • Harvard International Review
  • HCSS
  • Heritage Foundation
  • Horizon Scanning Centre
  • Horizon Scanning Centre – Toolkit
  • House Armed Services Committee
  • House Committee on Homeland Security
  • House Committee on International Relations
  • House Intelligence Committee
  • HSPI
  • Hudson Institute
  • IAEA
  • IDSA
  • IEA
  • IFRI
  • IHEDN
  • IISS
  • IMF
  • INET
  • Infinity Journal
  • Infoguerre
  • INSS – Israele
  • INSS – USA
  • Institute for Government
  • Intelligence & National Security
  • Intelligence Studies Section
  • IntellNews
  • International Crisis Group
  • International Journal of Intelligence and Counterintelligence
  • International Security
  • International Security Studies
  • IRIS
  • ISIS
  • Istituto Affari Internazionali
  • Istituto Italiano di Studi Strategici
  • Jamestown Foundation
  • JFK School of Government
  • JFQ
  • Joshua Rogin
  • Journal of Military and Strategic Studies
  • Journal of Strategic Security
  • Journal of Strategic Studies
  • Kings of War
  • Lowy Institute
  • LSE IDEAS Blog
  • Macro Polo
  • McKinsey Global Institute
  • Mercator Institute
  • Merlin
  • Military Review
  • Miller Center
  • MIT Center
  • Munich Security Conference
  • National Bureau of Asian Research
  • National Defense Intelligence College
  • National Intelligence Council
  • National Interest Online
  • National Security Archive
  • National Security Journal
  • Naval War College Review
  • NCTC
  • New America Foundation
  • New York Times
  • Newsweek
  • Nixon Center
  • Notre Europe
  • OCSE
  • ODNI
  • On Think Tanks
  • Orbis
  • Oxford Analytica
  • Oxford Intelligence Group
  • Papers – APSA
  • Papers – ISA
  • Parameters
  • Perspectives on Terrorism
  • Peter Bergen
  • Peterson Institute
  • Proceedings
  • Project 2049
  • Project Syndicate
  • Public Intelligence
  • RAND
  • Real Instituto Elcano
  • Reuters
  • Robert Kaplan
  • RSIS
  • RUSI
  • Secrecy News
  • Security Studies
  • Senate Armed Services Committee
  • Senate Committee on Foreign Relations
  • Senate Committee on Homeland Security
  • Senate Committee on Intelligence
  • Sentinel
  • SGDSN
  • Silicon Continent
  • SIPRI
  • SISR – Intelligence italiana
  • Source&Methods
  • South Asia Analysis Group
  • Spiegel International
  • Stephen Walt
  • Stimson Center
  • Strategic & Defence Studies Centre
  • Strategic Studies Institute
  • Strategic Studies Quarterly
  • Strategika
  • Stratfor
  • Studies in Conflict & Terrorism
  • Terrorism and Political Violence
  • The Back Channel
  • The Diplomat
  • The Interpreter
  • The Overoholt Group
  • The Strategist
  • The Strategy Bridge
  • Time
  • Transatlantic Academy
  • U.S.-China Commission
  • UN Millennium Project
  • Venus in Arms
  • VOX
  • Wall Street Journal
  • War on the Rocks
  • Washington Institute for Near East Policy
  • Washington Post
  • WCFIA – Harvard
  • Wilson International Center
  • World Economic Forum
Locations of visitors to this page
© 2025 SILENDO Design & Dev by Artemida Srl