TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How the US Hacked ISIS

166 pointsby a0zUover 4 years ago

20 comments

segfaultbuserrover 4 years ago
I fully understand that the operation is classified and details cannot be revealed, but I have to say: the description of the technical details is still a bad Hollywood movie [0]...<p>&gt; After that, the momentum started to build. One team would take screenshots to gather intelligence for later; another would lock ISIS videographers out of their own accounts.<p>&gt; &quot;Reset Successful&quot; one screen would say.<p>&gt; &quot;Folder directory deleted,&quot; said another.<p><i>Folder directory</i>??? Did they also delete the &quot;file document&quot;?<p>&gt; The screens they were seeing on the Ops floor on the NSA campus were the same ones someone in Syria might have been looking at in real time, until someone in Syria hit refresh. Once he did that, he would see: 404 error: Destination unreadable.<p><i>404 error: Destination unreadable</i>??? At least, use &quot;unreachable&quot;...<p>&gt; <i>&quot;Target 5 is done,&quot; someone would yell.</i><p>&gt; <i>Someone else would walk across the room and cross the number off the big target sheet on the wall. &quot;We&#x27;re crossing names off the list. We&#x27;re crossing accounts off the list. We&#x27;re crossing IPs off the list,&quot; said Neil. And every time a number went down they would yell one word: &quot;Jackpot!&quot;</i><p>[0] TV Tropes: Hollywood Hacking is when some sort of convoluted metaphor is used not only to describe hacking, but actually to put it into practice. Characters will come up with rubbish like, &quot;Extinguish the firewall!&quot; and &quot;I&#x27;ll use the Millennium Bug to launch an Overclocking Attack on the whole Internet!&quot; <a href="https:&#x2F;&#x2F;tvtropes.org&#x2F;pmwiki&#x2F;pmwiki.php&#x2F;Main&#x2F;HollywoodHacking" rel="nofollow">https:&#x2F;&#x2F;tvtropes.org&#x2F;pmwiki&#x2F;pmwiki.php&#x2F;Main&#x2F;HollywoodHacking</a>
评论 #24524277 未加载
评论 #24526874 未加载
评论 #24525523 未加载
评论 #24524057 未加载
评论 #24542370 未加载
评论 #24525978 未加载
bashinatorover 4 years ago
Here&#x27;s another account in the form of an extended interview with one of the commanders of US Cyber Command at the time.<p><a href="https:&#x2F;&#x2F;darknetdiaries.com&#x2F;episode&#x2F;50&#x2F;" rel="nofollow">https:&#x2F;&#x2F;darknetdiaries.com&#x2F;episode&#x2F;50&#x2F;</a>
评论 #24525377 未加载
082349872349872over 4 years ago
&gt; &quot;The United States is the country most highly dependent on these technologies,&quot; Deibert said. &quot;And arguably the most vulnerable to these sorts of attacks. I think there should be far more attention devoted to thinking about proper systems of security, to defense.&quot;<p>It&#x27;s all fun and games until someone melts down a reactor.<p>The journalist is probably playing with Cunningham&#x27;s Law, but I distinctly recall the doomsday gap scene ( <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=24481298" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=24481298</a> ) as having been closer to the middle of <i>Dr. Strangelove</i>. The end came after the referent of <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=K10pdj5YOy0" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=K10pdj5YOy0</a> .<p>Bonus clip (note the lack of any source attribution problem in these cases): <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=nZ8oA9-OQrg" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=nZ8oA9-OQrg</a>
joe_the_userover 4 years ago
It&#x27;s kind of odd to think what ISIS&#x27; media operations brought it. Initially they seem to have garner a variety of international recruits, I most from a Muslim background but some not. But either way, a lot of their appeal was an absolute nihilistic rejection of &quot;modernity&quot;. It seems like the appeal involve a kind of fundamental alienation combined with being a flavor of the month - sort of the appeal of leftism but lacking any sense that things can be improved.<p>I suspect shutting down their media probably stopped having an effect through novelty wearing off, all the best recruits being recruited and the world moving on to (inadvertently or not) selling some other reactionary rebellion - and the group being militarily defeated in Syria.
评论 #24525484 未加载
septillianatorover 4 years ago
&gt;Six years ago, it rather famously discovered that China had been hacking into the Dalai Lama&#x27;s computer networks<p>why does china care so much about the dalai lama?
评论 #24524283 未加载
评论 #24533855 未加载
Stierlitzover 4 years ago
Really Hackernews, do you have to repost this neocon BS on a respectable technology forum.<p><a href="https:&#x2F;&#x2F;theintercept.com&#x2F;2018&#x2F;01&#x2F;29&#x2F;isis-iraq-war-islamic-state-blowback&#x2F;" rel="nofollow">https:&#x2F;&#x2F;theintercept.com&#x2F;2018&#x2F;01&#x2F;29&#x2F;isis-iraq-war-islamic-st...</a>
_kbh_over 4 years ago
Heres an account from the view of one of the allies involved in the same operation.<p><a href="https:&#x2F;&#x2F;www.abc.net.au&#x2F;news&#x2F;2019-12-18&#x2F;inside-the-islamic-state-hack-that-crippled-the-terror-group&#x2F;11792958?nw=0" rel="nofollow">https:&#x2F;&#x2F;www.abc.net.au&#x2F;news&#x2F;2019-12-18&#x2F;inside-the-islamic-st...</a>
评论 #24525580 未加载
boomboomsubbanover 4 years ago
So how long until it comes out that this was all a lie, and really they just flipped one of the server admins?
Lotuseaterover 4 years ago
Darknet diaries covered this story in a podcast ages ago. NPR is just recycling the content. Full episode here for those interested: <a href="https:&#x2F;&#x2F;darknetdiaries.com&#x2F;episode&#x2F;50&#x2F;" rel="nofollow">https:&#x2F;&#x2F;darknetdiaries.com&#x2F;episode&#x2F;50&#x2F;</a>
alexpotatoover 4 years ago
For the audio version of this story from a different source, I highly recommend the Darknet Diaries podcast episode: <a href="https:&#x2F;&#x2F;darknetdiaries.com&#x2F;episode&#x2F;50&#x2F;" rel="nofollow">https:&#x2F;&#x2F;darknetdiaries.com&#x2F;episode&#x2F;50&#x2F;</a>
Yc4winover 4 years ago
Not sure if the article mentions it (haven&#x27;t read it yet) but JTF-ARES was the force tasked with sabotage and often it was against targets such as the militants video (propaganda) productions.<p>Edit: Really not sure why I got downvoted, as I provided accurate info?
评论 #24526681 未加载
Aperockyover 4 years ago
&gt; I mean, I’m just guessing here but here’s an attack I think they probably did; first, imagine if they hacked into the phone of one of these ISIS media people and then on that phone, they stole the private decryption keys for that phone. This would be the key used to decrypt messages to that phone. Then, imagine they hacked into the WiFi network that phone was on and somehow captured all the traffic to that phone. Somewhere in that traffic are the private chat messages to that phone and with these private keys, I’m guessing it’s technically possible to decrypt those messages. This would be a pretty complex hack but I bet it’s something that US Cyber Command could do.<p>Yeah.. probably not how it happened.
kursusover 4 years ago
&gt; He asked us to use only his first name to protect his identity<p>There was 80 persons inside one of the most powerful room of the world so they just use his first name to protect his identity.
canada_dryover 4 years ago
TL;DR: &quot;Fire&quot; (from the first sentence) wasn&#x27;t shooting something but the beginning of a cyber exercise. Started with a successful phishing email and got lucky because an ISIS operative was re-using the same password in several places.<p>That article was painfully too long.
encomover 4 years ago
For EU people: <a href="https:&#x2F;&#x2F;archive.ph&#x2F;XZ2Dg" rel="nofollow">https:&#x2F;&#x2F;archive.ph&#x2F;XZ2Dg</a>
jtchangover 4 years ago
In a way doesn&#x27;t this just cause the adversary to adopt better operational practices? Persistent access and monitoring would probably be better long term.
评论 #24522629 未加载
mrpickelsover 4 years ago
US hacked ISIS because US made ISIS
nimbiusover 4 years ago
Friendly reminder: the US basically created ISIS through it&#x27;s hamfisted invasion of Iraq. Cheerleading tbis sort of effort is like congratulating a child when they decide to eat their peas.
评论 #24525755 未加载
评论 #24523561 未加载
评论 #24521613 未加载
评论 #24521608 未加载
评论 #24522001 未加载
评论 #24525725 未加载
评论 #24522800 未加载
评论 #24522607 未加载
评论 #24524882 未加载
评论 #24523197 未加载
评论 #24521976 未加载
Robotbeatover 4 years ago
&quot;ISIS&quot; is an acronym and should be capitalized. (Isis is an Egyptian goddess of no relation to ISIS.)
评论 #24521354 未加载
评论 #24521422 未加载
评论 #24521987 未加载
评论 #24522115 未加载
评论 #24522168 未加载
评论 #24521512 未加载
1vuio0pswjnm7over 4 years ago
What is the point of using an <a href="http:&#x2F;&#x2F;" rel="nofollow">http:&#x2F;&#x2F;</a> URL with a website like NPR. These popular sites all redirect to <a href="https:&#x2F;&#x2F;" rel="nofollow">https:&#x2F;&#x2F;</a><p>Headers will be sent over the wire in the clear before any redirection can occur.<p>A localhost-bound proxy can fix this before the request leaves network interface.<p>I guess the &quot;modern&quot; browser fixes this for everyone else not using a (&quot;modern&quot;) proxy.
评论 #24522261 未加载