Al-Jazeera computer network harbours Denial-of-Service
agents
London, UK - 18 January 2005, 9:00 GMT - Al-Jazeera, the at times
controversial Arab news satellite channel, has had its computer network compromised
by Trojans with built-in mail relay engines since the Arab weekend began on
Friday 14th January. The mi2g Intelligence Unit has since then received
reports and evidence from reliable sources that 100s of identical emails every
hour have been sent from specific Al-Jazeera email accounts that have brought
down normal business services at targeted internet accounts in the West as
they have been overwhelmed by the Denial of Service (DoS) attacks.
Despite making contact with the individual email accounts at Al-Jazeera that
appear to have been unknowingly originating the DoS attacks, no official response
has been received to date. The problem has persisted on Saturday and Sunday
but seemed to alleviate on Monday morning as email blocks were set-up downstream.
The mi2g Intelligence Unit originally discovered the problem when one
of its specific emails was not delivered to its regular business contacts
on Friday morning because the corporate mail box in question was suspiciously
designated "full". That source explained on the phone that they
were under a DoS attack from Al-Jazeera's computers. Since then select sources
have confirmed the problem in the US, UK and Australia through emails, internet-relay-chat
and private bulletin boards. The governments of all three countries support
the war on terrorism and the war in Iraq through a joint coalition.
The nearly 72 hours window during which the Denial of Service has been active
is particularly worrisome because most corporations update their anti-virus
tool kits every 24 hours at least and run scans. The more vigilant ones run
the updates and scan regimes every six hours. Furthermore, corporate networks
have extra layers of relay filtering and traffic monitoring which especially
look out for repeat sends of identical messages and are programmed to stop
such anomalous patterns from being executed. In the case of Al-Jazeera none
of these preventative measures seem to be in place.
The events of the last three days are demonstrating that Al-Jazeera is running
its computer network like a "match-box" organisation in comparison
to its Western peer group. What has happened to certain Western businesses
as a result of Al-Jazeera's denial of service attack is completely unthinkable
in the context of reputable Western media organisations doing the same in
2005 such as Reuters, Bloomberg, Financial Times, CNN, News International
etc. The mi2g Intelligence Unit has case history of similar recklessness
and social irresponsibility originating from Western news agencies between
1997 and 1999, especially during the NATO-Serbia war and its cyber fallout.
However, Western news agencies learnt very fast when they came under pressure
from their customers and interlocutors in terms of law suit threats.
Given that Al-Jazeera is running corporate security policies for its network
which are lagging behind the West by between six to eight years, it appears
relatively easy to bring down their computer network at present or overwhelm
their computing facilities. If certain political powers find Al-Jazeera to
be a pain in their backside, and there are some who have gone on record to
say that they do, there are clear ways as a result of observing the recent
DoS attacks that can be utilised to quieten them easily and anonymously. If
those ways have not been used to date and are now being tried and tested out,
is this because Al-Jazeera is being targeted to serve a particular purpose,
where its satellite network or website www.aljazeera.net
may be commandeered in the near future to push out very specific messages
with an agenda different from the journalists and editors who work at that
news agency?
"A news agency's computer network is its printing press,"
said DK Matai, Executive Chairman,
mi2g. "It would be unthinkable to
have confidence in a news agency whose printing press or TV broadcasting service
could be compromised because then one just would not know whether the news
story one was reading or listening to was true or injected by a malicious
third party."
During late March 2003, when Al-Jazeera had broadcast images of American soldiers
captured by Iraqi forces during the early phase of the war, its website was
brought down by a Distributed Denial of Service (DDoS) attack.
[ENDS]
mi2g is at the leading edge of building secure on-line banking, broking
and trading architectures. The principal applications of our technology are:
1. D2-Banking;
2. Digital Risk Management; and
3. Bespoke Security Architecture.
mi2g pioneers enterprise-wide security practices and technology to
save time and cut cost. We enhance comparative advantage within financial
services and government agencies. Our real time intelligence is deployed worldwide
for contingency capability, executive decision making and strategic threat
assessment.
mi2g Research Methodology: The Frequently Asked Questions (FAQ) List
is available from here in pdf. Please
note terms and conditions of use listed on
www.mi2g.net
Full details of the December 2004 report are available as of 1st January
2005 and can be ordered from here.
(To view contents sample please click here).