->PConnect(script.ftech.net,mi2gl,m4d2e,mi2gl)
 

Al-Jazeera computer network harbours Denial-of-Service agents

news alert

London, UK - 18 January 2005, 9:00 GMT - Al-Jazeera, the at times controversial Arab news satellite channel, has had its computer network compromised by Trojans with built-in mail relay engines since the Arab weekend began on Friday 14th January. The mi2g Intelligence Unit has since then received reports and evidence from reliable sources that 100s of identical emails every hour have been sent from specific Al-Jazeera email accounts that have brought down normal business services at targeted internet accounts in the West as they have been overwhelmed by the Denial of Service (DoS) attacks.

Despite making contact with the individual email accounts at Al-Jazeera that appear to have been unknowingly originating the DoS attacks, no official response has been received to date. The problem has persisted on Saturday and Sunday but seemed to alleviate on Monday morning as email blocks were set-up downstream. The mi2g Intelligence Unit originally discovered the problem when one of its specific emails was not delivered to its regular business contacts on Friday morning because the corporate mail box in question was suspiciously designated "full". That source explained on the phone that they were under a DoS attack from Al-Jazeera's computers. Since then select sources have confirmed the problem in the US, UK and Australia through emails, internet-relay-chat and private bulletin boards. The governments of all three countries support the war on terrorism and the war in Iraq through a joint coalition.

The nearly 72 hours window during which the Denial of Service has been active is particularly worrisome because most corporations update their anti-virus tool kits every 24 hours at least and run scans. The more vigilant ones run the updates and scan regimes every six hours. Furthermore, corporate networks have extra layers of relay filtering and traffic monitoring which especially look out for repeat sends of identical messages and are programmed to stop such anomalous patterns from being executed. In the case of Al-Jazeera none of these preventative measures seem to be in place.

The events of the last three days are demonstrating that Al-Jazeera is running its computer network like a "match-box" organisation in comparison to its Western peer group. What has happened to certain Western businesses as a result of Al-Jazeera's denial of service attack is completely unthinkable in the context of reputable Western media organisations doing the same in 2005 such as Reuters, Bloomberg, Financial Times, CNN, News International etc. The mi2g Intelligence Unit has case history of similar recklessness and social irresponsibility originating from Western news agencies between 1997 and 1999, especially during the NATO-Serbia war and its cyber fallout. However, Western news agencies learnt very fast when they came under pressure from their customers and interlocutors in terms of law suit threats.

Given that Al-Jazeera is running corporate security policies for its network which are lagging behind the West by between six to eight years, it appears relatively easy to bring down their computer network at present or overwhelm their computing facilities. If certain political powers find Al-Jazeera to be a pain in their backside, and there are some who have gone on record to say that they do, there are clear ways as a result of observing the recent DoS attacks that can be utilised to quieten them easily and anonymously. If those ways have not been used to date and are now being tried and tested out, is this because Al-Jazeera is being targeted to serve a particular purpose, where its satellite network or website www.aljazeera.net may be commandeered in the near future to push out very specific messages with an agenda different from the journalists and editors who work at that news agency?

"A news agency's computer network is its printing press,"
said DK Matai, Executive Chairman, mi2g. "It would be unthinkable to have confidence in a news agency whose printing press or TV broadcasting service could be compromised because then one just would not know whether the news story one was reading or listening to was true or injected by a malicious third party."

During late March 2003, when Al-Jazeera had broadcast images of American soldiers captured by Iraqi forces during the early phase of the war, its website was brought down by a Distributed Denial of Service (DDoS) attack.

[ENDS]


mi2g
is at the leading edge of building secure on-line banking, broking and trading architectures. The principal applications of our technology are:

1. D2-Banking;
2. Digital Risk Management; and
3. Bespoke Security Architecture.

mi2g pioneers enterprise-wide security practices and technology to save time and cut cost. We enhance comparative advantage within financial services and government agencies. Our real time intelligence is deployed worldwide for contingency capability, executive decision making and strategic threat assessment.

mi2g Research Methodology: The Frequently Asked Questions (FAQ) List is available from here in pdf. Please note terms and conditions of use listed on www.mi2g.net

Full details of the December 2004 report are available as of 1st January 2005 and can be ordered from here. (To view contents sample please click here).

Renowned worldwide for the ATCA Briefings. Subscribe now.
 
Home - Profile - Values - People - Careers - Partners - Contact Us
D2 Banking - Bespoke Security Architecture - Digital Risk Management - Tools

Intelligence Briefings - Brochures - Case Studies -
SIPS Methodology FAQ (pdf)
Keynote Speeches - Articles - News Feeds - Glossary (pdf)
Terms and Conditions - Privacy Policy