Google, like Anonymous, Joins Fight against Israel

Google Palestine

Those who don’t know history are destined to repeat it.” – Edmund Burke (1729-1797)

Since its inception again as a nation, Israel has been in a battle to have the right to do just one thing, exist. In this battle for legitimacy as a nation it has faced invasions from Muslim countries and constant rocket attacks by militant Islamic groups. Now it would seem that search engine giant Google has entered the fight against Israel.

Since Israel’s re-creation in 1948, they have been in a constant battle to simply survive. Not only have they faced unending physical threats, but waves of online attacks too. Militant groups have joined in with Hacktivists groups like Anonymous to put constant pressure on Israel’s online presence. Last month Israeli systems were hammered in a co-ordinated denial of service attack called #OpIsrael.

Many of these groups believe that they are helping the Islamic Palestinian people gain their freedom to form a state called “Palestine”. They believe (falsely) that creating a “Two State Solution” will bring peace to the Middle East and protect the Palestinians from “Israeli aggression”.

FOLLOW THE LEADER

Just this week, Google jumped into the political arena on the Palestinian’s side by changing their “Google Palestinian Territories” site to simply say Google Palestine. A small name change, that has very large political repercussions.

In this case, we are following the lead of the UN, Icann [Internet Corporation for Assigned Names and Numbers], ISO [International Organisation for Standardisation] and other international organisations,” Google Spokesman Nathan Tyler, told the BBC.

Well beyond just “following the lead of the UN“, the move was a direct blow to Israel and it’s right to exist peacefully. Google also decided to side against their home nation as the UN recognizes Palestine as a state, but the US does not.

As you will see recognizing Palestine as a state, and the whole creation of a “Two State Solution” will not bring peace to the Middle East.

As it has been done before, and it failed…

THE BRITISH MANDATE

After WWI it was agreed that the British Mandate Palestine, land that Britain took control of from turkey, would be divided into two countries. At first Israel was to be given the entire land (reminiscent of the land promised to Israel by God in Genesis 15:18-21) but after strong Islamic objection, it was agreed between Islamic authorities and Britain that a two state solution would bring peace to the Middle East.

Jewish Palestinians would be given a small section of land (which would be eventually be called Israel) and the Muslim Palestinians were given a very large section of land called Trans-Jordan.

IsraelAndTransjordan

ISLAMIC NAZI SS TROOPS

Not all of the Muslim leaders fell in line with this decision. Radical Islamic leaders believed that Israel should not exist and began resisting the change. By the time WWII came around some of these leaders joined in with Germany to place Muslim troops in Nazi SS divisions.

Amin al Husseini bei bosnischen SS-Freiwilligen

After WWII members of these Islamic Nazi troops banned together to form many of the radical Islamic groups which still fight the legitimacy of Israel to exist.

PALESTINE AS A LAUNCHING POINT FOR TERROR

Radical Islamic fighters swarm into these “disputed Palestinian territories” to continue the fight against Israel by constantly firing mortars and rockets into their cities. According to Wikipedia, “as of November 2012, over 2,256 rockets had been launched at Israel from Gaza since January 2012.”

CONCLUSION

Google has decided to use it’s clout to support the creation of a Palestinian state.

As you can see, Google’s choice to side politically with the UN, along with Anonymous and radical Islamic groups, is a huge blow to both peace in the Middle East and Israel’s daily fight to simply survive.

Update 5/5

Okay, now I understand a little bit better, Google has business interests in Palestine:

“Palestinians have such a unique position,” says Gisel Kordestani, Google’s director of new business development. “They’re well educated. They have strong English-language skills. With 88 million people in the [Middle East and North African] region getting online, they have the opportunity to build something for the Arab world.”

Google stands to benefit from whatever is built. Currently less than 1% of the searchable content online is in Arabic. If it grows, Google can sell ads against the new content.

Google Taps Palestine For New Business Development

As they say, follow the money…

Advertisements

Hacktivists jump into North Korea DDoS and Defacement War

N Korea Anonymous

As North Korea’s militaristic threats against the US increase, so do the website attacks. But it would seem that so far, N. Korea is on the receiving end as hacktivists jump into the fray.

There has been a flood of activity over the last few days, though mostly one sided.

On April 2nd, the US Forces Korea military website went down with a Gateway error:

US_Korea_Website

As this article is written, the site is still down:

US_Korea_Website 2

The official word so far is that it is an internal server issue and not related to a cyber attack.

But North Korean sites seem to be a different story. Apparently the hacktivist group “Anonymous” has been very busy indeed. As of today anyone visiting N. Korea’s Twitter page will see this:

Twitter Hacked

Tango Down, cute! And a look at their latest tweets:

N Korea Twitter

And their Flickr page:

N Korea Flickr

Hmm… Some of those images don’t seem to follow the party line, especially the caricature of “Dear Leader”. Though the Flickr page seems to have been corrected since this morning.

Pro-North Korea news site Uriminzokkiri.com and several others also seem to be currently offline:

N Korea Websites Down

It would appear that the Uriminzokkiri site hasn’t been hacked, but is down possibly due to a Distributed Denial of Service attack (DDoS), a flood of network traffic that ties it up and effectively takes it offline.

It seems that the majority of attacks are coming from the hacktivist group “Anonymous”.  One anonymous post contains a list of their demands towards North Korea:

We demand:
– N.K. government to stop making nukes and nuke-threats
– Kim Jong-un to resign
– it’s time to install a free direct democracy in North Korea
– uncensored internet access for all the citizens!

And to Kim Jong-un:

So you feel the need to create large nukes and threaten half the world with them?
So you’re into demonstrations of power?, here is ours:
– We are inside your local intranets (Kwangmyong and others)
– We are inside your mailservers
– We are inside your webservers

The post also contained what seemed to be account information from one of the hacked websites.

The popular patriot hacker “The Jester” also claimed that he took down several websites that Anonymous claimed credit for in this tweet:

North Korea Jester

So what does this all mean? Is this the beginnings of a cyber war?

LOL, no…

Though DDoS attacks are irritating and do disrupt website usage, they are not a deadly attack. Sorry main stream media, this is not a “Cyber War”. Nor is defacing a Twitter account or other social media site a devastating military attack.

Sure the website owner loses face and obviously has security issues, but it is more of a Psyops type message than a kinetic attack where property is damaged and lives are in danger.

And while several North Korean websites have been downed or defaced, it is not the focal point of the North’s power (The country only has like 35 websites total…).

Let’s not forget that they have the world’s fourth largest army, have created tunnels that run under the North/South border that possibly could hold thousands of troops and have nuclear tipped missiles aimed at the US and her allies.

Anonymous embeds Asteroid Game in Government Sites, Threatens to release “Warheads”

In an odd turn of events over the last couple of days, looks like Anonymous hacked into the DOJ Sentencing Commission website and defaced it. Then later re-hacked it and embedded a game of Asteroids into the site (see above).

The Hacktivist group Anonymous claimed they attacked the DOJ site in response to the suicide of coder and activist Aaron Swartz. USSC.gov is down again now, but anonymous revealed via twitter that another government site (United States Probation Department for the Eastern District of Michigan) was also hacked and including the same game:

Anonymous Asteroids

(The Michigan website seemed to have removed the game at the time of this writing.)

According to reports, Anonymous also used the Sentencing Commission website to host a 1.3 GB file that Anonymous claimed was a “Warhead” file. An encrypted file with information that Anonymous threatened to release if their demands to the DOJ were not met.

It seems from some reports though that the file was a fake and contained an outdated list of names and addresses of people who were in the witness protection program.

It is pretty concerning that Anonymous is able to gain access to these high profile government sites. It was just announced that the military is planning to increase it cyber force by 5 fold, looks like the DHS may need to increase staffing to help secure government sites.

Hacktivists Targeting DNS Servers & an Effective DNS Offensive Counter-Measure

Denial of Service (DoS) attacks used to be the main tool in the Hacktivists toolbox. For the most part, they are not very hi-tech and anyone can run the software to attack websites to aid in their preferred “cause”. But as the recent hacktivism attacks in Israel (and now Pakistan) have shown, DNS server attacks are now all the rage.

DNS SERVERS TARGETED

Why deface one website, when you can just hack the server that holds the IP address to the victim’s site (or sites)! Changing the registered domain name for a website allows you to point the domain name, like Google.pk to ANY server that you want. So, if you can hack the DNS registrar that holds the records for an entire country, you can change any of the servers that you like to point to any website that you want.

Luckily the pranksters behind these attacks have just been redirecting these hijacked websites to a bragging page, “This site hacked by …” They seem to be in it to bring attention to their group, or a political cause, instead of doing serious damage.

Hacking into DNS registrar servers is the hard part, creating a website that looks like any one of the ones that was hacked is trivial. It only takes a few seconds to create a clone of a website that looks and acts like the real one, but could serve malware or other malicious functions. So far it seems that these hackers are more interested in just getting across a message.

Just in it for the “Lulz”.

But with the apparent ease that this is happening, you can see the dangers if the hacktivists were a more malicious group. Say like Nation State hackers who want to infect groups of systems from a target nation. Or gather pertinent credentials from users who think they are on a legitimate website, and not a spoofed one reached via DNS manipulation.

As you can see locking down these important DNS systems better be a top priority of EVERY nation.

OFFENSIVE COUNTER MEASURE

As mentioned earlier, Denial of Service attacks have not gone away and are still used en mass to tie up websites to make them unavailable. Many times Denial of Service attacks are nothing more than normal communication with a website, but multiplied over many times, from multiple users to tie up a server.

But can anything be done to stop this flood of traffic aimed at a site by thousands if not tens of thousands of attacking machines? Sure there is, according to the popular Patriot Hacker Jester, just reflect the traffic back at the attackers!

During the latest Israel/ Gaza conflict, the hacker group Anonymous jumped in on the Hama’s side and attacked many Israeli websites. So of course, The Jester responded by shutting down 3 Hamas sites and their TV Channel. In response, according to The Jester’s website, Anonymous targeted his website.

So Jester just redirected his DNS server to point back at one of their servers, effectively forcing them to DoS their own server!

His website is protected by “CloudFlare” a popular proxy service that protects users from many attacks. When he saw the incoming attack, he simply told CloudFlare to point his website name “jesterscourt.mil.nf” to one that was supported by Anonymous:

“So I simply redirected my domain name to the Occupy ‘movement’s main website. Known as ‘occupytogether.org’. Remember #Anonhamas are big supporters of the Occupy Movement and many of their ‘members’ are also members of the Occupy Movement. Fair game.”

Denial of Service attacks can last for days or longer. Did the technique work?

Apparently, it did:

The Jester also talks about automatting this process, so when a DoS attack is detected, it automatically forwards the flood of traffic to a list of Anonymous supported sites.

It has been an interesting week. New DNS attacks and apparently new effective offensive counter measures. Will the average corporate website defend itself with The Jester’s techniques?

Probably not, but I could foresee some country’s government sites just might.

Well, maybe off the record…  🙂