• Why Jihad Watch?
  • About Robert Spencer and Staff Writers
  • FAQ
  • Books
  • Muhammad
  • Islam 101
  • Privacy

Jihad Watch

Exposing the role that Islamic jihad theology and ideology play in the modern global conflicts

Islamic State hacks CENTCOM Twitter feed as Obama addresses nation on cyber security

Jan 12, 2015 1:08 pm By Robert Spencer

Centcom hacked“ISIS is already here, we are in your PCs, in each military base. With Allah’s permission we are in CENTCOM now.” They love taunting the weak, and with the Obama Administration, they have so very many targets.

“Islamic State Hacks CENTCOM Twitter Feed as Obama Talks Cybersecurity,” by Lachlan Markay, Washington Free Beacon, January 12, 2015 12:49 pm

As President Barack Obama addressed the nation regarding national cyber security efforts, hackers claiming to represent the Islamic State (IS) took over the Twitter account of the Pentagon division in charge of the Middle East.

Hackers with the Islamic State, also known as ISIS or ISIL, posted links on U.S. Central Command’s official Twitter page to what it claimed was “confidential data from your mobile devices.”

“ISIS is already here, we are in your PCs, in each military base. With Allah’s permission we are in CENTCOM now,” said one tweet sent from CENTCOM’s account.

The apparent hack came as President Obama addressed the nation regarding cyber security. He is expected to propose two pieces of cyber security legislation and to address the effort in his upcoming State of the Union address.

The hackers subsequently tweeted images of spreadsheets containing the home addresses, phone numbers, and email addresses of dozens of current and former senior U.S. military officers.

“AMERICAN SOLDIERS, WE ARE COMING WATCH YOUR BACK,” one tweet stated.

Hackers appear to have also compromised CENTCOM’s official YouTube page, where they posted a pair of IS propaganda videos.

Share this:

  • Click to share on Facebook (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to print (Opens in new window)
  • Click to email this to a friend (Opens in new window)
  • More
  • Click to share on Skype (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on Pinterest (Opens in new window)

Follow me on Facebook

Filed Under: Featured, Internet jihad, Islamic State (aka ISIS, ISIL, Daesh), Jihad in the U.S. Tagged With: CENTCOM


Learn more about RevenueStripe...

Comments

  1. Mitch says

    Jan 12, 2015 at 1:31 pm

    Did the Islamic State operative “hack” the Twitter feed — or did he merely log in? More than likely, he collects a paycheck from the Defense Department.

    • mariam rove says

      Jan 12, 2015 at 1:41 pm

      Hi Mitch! I am not computer savvy what exactly is the difference and which one can harm us more? Thank you. M

      • Bettina says

        Jan 12, 2015 at 2:49 pm

        Mariam, I think logging in means signing on for the ability to post comments, whereas hacking means the ability to pose as a legitimate author of the site, and to have intimate access to many or all confidential files — including the dangerous spreadsheets mentioned above.
        We here can log into JW, but have no power to transgress its inner works.

        • mariam rove says

          Jan 12, 2015 at 2:52 pm

          Got it! Thank you. M

      • somehistory says

        Jan 12, 2015 at 3:38 pm

        Hacking can be done by remote with bots or other malware. It can also be made to appear to be the legitimate site when in actuality, it is a fake site.
        In this case, it seems they have given themselves the *authority* to go in to the inner workings. People on the job have log ins to whatever authority they are given by site admin. A hacker gives himself the authority.

        Logging in to post a comment is not the same as either hacking or logging in on the job with site admin given authority. A person on the job could log in and then make changes to the site, or post pics, etc. if they have the authority to do so given as part of their job. It is also possible to *hack* as am employee, going into parts of the system they have not been given authority. So, it might be people on the outside or from the inside via employment.

    • Aubrey Mason says

      Jan 13, 2015 at 10:56 am

      Robert Spencer,

      Please read today’s DC Clothesline…. Anonymous tracked the hack back to Maryland – and believes it may have come from the NSA…. coincidentally at the very same time mr obama starts talking to the press about his new “cyber security program” (which Congress hasn’t funded or even spoken about).

      Then consider the administration prior to mr obama’s regime and the “patriot act” and the timeline of how it was “enacted”……

      I believe we are witnessing another “false flag” event designed to support things Americans categorically do not want……

  2. Ashley says

    Jan 12, 2015 at 1:35 pm

    The same thought crossed my mind, Mitch…

  3. AnneCrockett says

    Jan 12, 2015 at 1:51 pm

    Yet somehow the USA cannot muster the computer power to compromise ISIS twitter feeds and post Charlie Hebdo cartoons.

  4. pongidae rex says

    Jan 12, 2015 at 2:12 pm

    I used to be a contractor sysadmin at secure Intel sites in US. Unlike the traitor Snowden, I was utterly appalled at the amateurish approach to network security in these facilities. The passwords to priviliged access to networks were a total joke; I wouldn’t trust my email account to the passwords they used. Hopefully, things have changed but this story is not encouraging.

    • cathy says

      Jan 12, 2015 at 6:15 pm

      As far as security goes Social security numbers use to be private…. and no one was suppose to ask for or get your info (by law),.until doctor offices, employment agencies, job sites, department stores, car dealers, random drawings for prizes, emailing application…and the list is endless where this number was requested. Best one was years back I went to a miitary base ( selling off old computer hardware) that was advertised in the newspaper. I didn’t buy anything…but I know people walked out with harddrives…..now that is hacking. One question to the smart people out there who know this stuff…..can’t you reverse hack? Corporations, technology companies, banks are the most vulnerable. Banks should not use thumbprints….that is just electronic data i think. yes or no? Back to couriers yikes.cl
      ‘

  5. Tova says

    Jan 12, 2015 at 2:13 pm

    A little too coincidental in timing to me.

  6. Angemon says

    Jan 12, 2015 at 2:15 pm

    The apparent hack came as President Obama addressed the nation regarding cyber security.

    For all we know Obama gave them the username and password.

  7. Bettina says

    Jan 12, 2015 at 3:08 pm

    And speaking of Obozo, the ‘gent’ is getting swamped with lots of flack from some media, esp. Fox News, for being MIA in Paris, or not even sending Carry or Biden as a sign of respect and honor.
    All he did was show up at the French embassy and utter the usual platitudes from his usual catatonic state in the face of ISLAMIC terrorism.
    WHAT A LOSER!!!

  8. Tired out American says

    Jan 12, 2015 at 4:13 pm

    For all we know, this could have been deliberately allowed to give government more excuses to suppress “extremism” The argument goes “look, even these nuts are trying to get into military websites”

    So down comes the hammer on extremists, and Robert’s Jihad Watch disappears, since he fits in their definition of extremist.

    Come on everyone, think!!! All this ginning up of violence is to give more “valid” excuses for the crushing of freedoms, and Jihad Watch will be among the first to disappear, under the guise of stirring up animosity to a religion.

  9. Anon says

    Jan 12, 2015 at 5:18 pm

    Many times it’s an inside job. You know, a “moderate” with a college degree or “certification” doing network upgrades, etc., who doesn’t “look like” a jihadist according to Obama’s team and guidelines. For example, the network admin many months ago wasn’t wearing a full black garb with a shiny thing on his belt so he passed all security clearances. This kind of thing is usually planned for many months and put together a piece at a time. Slow jihad. I once applied to work at a (can’t say) location many years ago and strict psychological tests and exams were required and that was decades ago. Now with “affirmative” “action” there’s probably some requirement that 10% of all network staff must be from an Islamic country no questions asked. I’m exaggerating but you get the point. It’s hopefully a huge embarrassment for the slim-down-military fire-generals O-bama regime – he and his “cabinet” should be impeached.

  10. cathy says

    Jan 12, 2015 at 6:51 pm

    In response to anon and inside job, do you remember Louie Gohmert alerting Congress about his concerns that members of the MB (consultants)were getting access to ” sensitive computers” they should not be using. It was on C-span about a year ago. Exposure, facts about ideology is the only corrective response we have hopefully it is not too late. cl

    • pumbar says

      Jan 12, 2015 at 8:11 pm

      Username: POTUS
      Password: kermitthefrog

      or something like that.

  11. i sum Charlie Martel says

    Jan 13, 2015 at 10:26 pm

    Well, you can’t blame ISIS for being homophobic and erogenous: SOLDIERS, WE ARE COMING WATCH YOUR BACK.

FacebookYoutubeTwitterLog in

Subscribe to the Jihad Watch Daily Digest

You will receive a daily mailing containing links to the stories posted at Jihad Watch in the last 24 hours.
Enter your email address to subscribe.

Please wait...

Thank you for signing up!
If you are forwarding to a friend, please remove the unsubscribe buttons first, as they my accidentally click it.

Subscribe to all Jihad Watch posts

You will receive immediate notification.
Enter your email address to subscribe.
Note: This may be up to 15 emails a day.

Donate to JihadWatch
FrontPage Mag

Search Site

Translate

The Team

Robert Spencer in FrontPageMag
Robert Spencer in PJ Media

Articles at Jihad Watch by
Robert Spencer
Hugh Fitzgerald
Christine Douglass-Williams
Andrew Harrod
Jamie Glazov
Daniel Greenfield

Contact Us

Terror Attacks Since 9/11

Archives

  • 2020
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2019
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2018
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2017
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2016
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2015
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2014
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2013
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2012
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2011
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2010
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2009
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2008
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2007
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2006
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2005
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2004
    • December
    • November
    • October
    • September
    • August
    • July
    • June
    • May
    • April
    • March
    • February
    • January
  • 2003
    • December
    • November
    • October
    • March

All Categories

You Might Like

Learn more about RevenueStripe...

Recent Comments

  • Michael Copeland on Iranian Kurdistan: Muslim brothers behead their sister in honor killing over her romantic relationship
  • Walter Sieruk on Iranian top dogs approve bill to end UN nuclear inspections, increase enrichment
  • Dude on Muslim cleric: ‘We welcomed the takeover of ISIS because they wanted to implement the Sharia’
  • Infidel on Uighur leader: ‘We’re actually quite worried’ about what Biden might let China get away with
  • Infidel on Uighur leader: ‘We’re actually quite worried’ about what Biden might let China get away with

Popular Categories

dhimmitude Sharia Jihad in the U.S ISIS / Islamic State / ISIL Iran Free Speech

Robert Spencer FaceBook Page

Robert Spencer Twitter

Robert Spencer twitter

Robert Spencer YouTube Channel

Books by Robert Spencer

Jihad Watch® is a registered trademark of Robert Spencer in the United States and/or other countries - Site Developed and Managed by Free Speech Defense

Content copyright Jihad Watch, Jihad Watch claims no credit for any images posted on this site unless otherwise noted. Images on this blog are copyright to their respective owners. If there is an image appearing on this blog that belongs to you and you do not wish for it appear on this site, please E-mail with a link to said image and it will be promptly removed.

Our mailing address is: David Horowitz Freedom Center, P.O. Box 55089, Sherman Oaks, CA 91499-1964

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.