Feeds

We've cracked into bin Laden's bank – UK hackers

Sudanese Tease

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

A group of British hackers has claimed to have broken into the systems of banks in the Sudan, and extracted information on accounts related to Osama's bin Laden terrorist network.

Young Intelligent Hackers Against Terror (Yihat) claims to have obtained data on accounts held by members of Al Qaeda, including bin Laden, held at the AlShamal Islamic Bank.

Yihat, which is fronted by millionaire ex-hacker Kim Schmitz, told Newsbytes that the information obtained has been turned over to the FBI, but this remains unconfirmed and details of the hack are sketchy.

Schmitz last month announced a $10 million reward for "information leading directly to the apprehension or conviction of Osama Bin Laden and/or his terroristic [sic] cells", something he denies was a publicity stunt.

The information that Al Qaeda had bank accounts at the AlShamal Islamic Bank came from a Sudanese banker, in response to the bounty offer, Schmitz claims.

Schmitz, who was jailed for hacking NASA, Pentagon, and Citibank systems in the early 1990s, is acting as a spokesman for Yihat, and states that he played no part in the hack, which (whatever its motives) would be illegal. ®

Remote control for virtualized desktops

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.