Syrian Electronic Army claims to have hacked U.S. Central Command

TECHi's Author Jesseb Shiloh
Opposing Author Blogs Read Source Article
Last Updated
TECHi's Take
Jesseb Shiloh
Jesseb Shiloh
  • Words 79
  • Estimated Read 1 min

Beware the ides of March, give or take a day. On March 14, the Syrian Electronic Army said it made good on a threat from earlier this month by posting a screen shot of what it says are more than 21,000 documents belonging to U.S. Central Command, also known as CENTCOM, which is responsible for overseeing military operations in the Middle East and other parts of Asia. The screen shot also includes document folders pertaining to several Air Force programs. 

Blogs

Blogs

  • Words 128
  • Estimated Read 1 min
Read Article

After claiming that the U.S. intends to unleash cyber warfare on Syria, the Syrian Electronic Army tweeted “proof” that it breached U.S. Central Command systems in response to “Obama’s decision to attack Syria with electronic warfare.” A few weeks ago, SEA tweeted cyberattack threats to topple CENTCOM like a “house of cards” if the U.S. launched cyberattacks on Syria. A few moments later, SEA added, “In the coming days we will update you with specific details and hundreds of documents that the #SEA has obtained.” Your guess is as good as mine as to whether that means CENTCOM. SEA hackers seem to be almost constantly attacking someone and rarely claim to have compromised an entity without backing it up with screenshots of the breach.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Computerworld

Four months in and net neutrality hasn’t stifled broadband investment
Four months in and net neutrality hasn’t stifled broadband investment

It's been four months since the FCC passed its net neutrality rules, and broadband investment still hasn't suffered. Many opponents…

Microsoft loses money for every smartphone it sells
Microsoft loses money for every smartphone it sells

Microsoft doesn't have a good track record with making money on its hardware, which isn't necessarily a bad thing considering…

Cisco tries to avoid the NSA by shipping equipment to weird places
Cisco tries to avoid the NSA by shipping equipment to weird places

Lets say the American government is interested in spying on you and, while you're pretty sure the company you're getting…

The Tor Network is anticipating a possible attack from law enforcement
The Tor Network is anticipating a possible attack from law enforcement

On Friday, a post on the Tor Project's blog sent out an alarming message: "The Tor Project has learned that…