Feeds

US.gov warns script kiddies to stay out of cyberwar

Patriotic hacking could backfire

  • alert
  • submit to reddit

Top three mobile application threats

US script kiddies were warned this week that "patriotic" hacking attacks against America's enemies are not to be condoned, and might even backfire.

An alert by the National Infrastructure Protection Center (NIPC) this week warns that "global hacking activities are likely to increase" as a result of heightened tensions between the United States and Iraq.

"Recent experience has shown that during a time of increased international tension, illegal cyber activity: spamming, web defacements, denial of service attacks etc., often escalates," it asserts.

No evidence is given for this dubious claim but, undaunted, the NIPC presses on to speculate on the possible motives of would-be attackers.

We could see political activism targeting Iraq or those sympathetic to Iraq by "patriot" hackers or attacks against US systems by those opposed to conflict, either in America or overseas. Then again we fight see "criminal activity masquerading or using the current crisis to further personal goals", the NIPC speculates.

The NIPC notice offers a solemn injunction: "Regardless of the motivation, the NIPC reiterates such activity is illegal and punishable as a felony. The US Government does not condone so-called "patriotic hacking" on its behalf."

Furthermore, such patriotic hackers can be deceived into launching attacks against US systems by hacking tools designed by the enemy, the NIPC warns.

So the message to the US script kiddie community is clear: step back son, and leave this cyberwar to the experts.

Meanwhile system admins are encouraged to batten down their security hatches. ®

Related Stories

Do it with spanners - how the Iraq cyber attack will work
Gulf War 2 - The Flash movie
Security experts duped by Slammer 'jihad' rot
US.mil launches Operation Desert Spam

External Links

NIPC Encourages Heightened Cyber Security as Iraq - US Tensions Increase

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.