-Caveat Lector-

http://uk.news.yahoo.com/030328/152/dwhdq.html

Friday March 28, 09:35 AM

FBI to investigate Al-Jazeera Web hijack
By Robert Lemos, CNET News.com


Visitors to both the Arabic and English versions of the Al-Jazeera
Web site on Thursday were greeted with an American flag and a
pro-US message, the work of an apparent online vandal.

The FBI has opened an investigation into the attack on Al-Jazeera's
Web site, a representative with the bureau has said. The Middle
Eastern news service was the victim of a domain hijacking. The
actual defacement appeared on a free Web site service provided by
NetWorld Connections. Technically known as a "redirect," the hack
caused Web browsers that attempted to go to www.aljazeera.net --
as well as the English-language site -- to be surreptitiously
redirected to the content hosted on NetWorld's servers.

The NetWorld service detected a spike in traffic early on Thursday
morning, and an email from a security specialist confirmed that
visitors to Al-Jazeera were being redirected to NetWorld's service,
said Ken Bowman, chief executive of the Salt Lake City company.
"We pulled down the content immediately," Bowman said. He added
that VeriSign, which administers the domain registry, eliminated the
redirect later in the morning. "They never even touched (Al-
Jazeera's) site," he said.

The problem has been corrected by eliminating the redirect and
reinstating the correct addresses for Al-Jazeera's sites. However,
the changes take time, up to three days, to filter throughout the
Internet. Moreover, even without the redirect issue, Al-Jazeera's
sites may remain unreachable as they continue to come under
attack by online vandals flooding the news outlet's network with
data.

A representative of VeriSign couldn't immediately answer questions
regarding how the domain had been hijacked.

VeriSign maintains the Internet registry for the .com, .net, .cc and .tv
top-level domains and administers the authoritative database for all
domain names registered in those top-level domains.

The records from the whois database -- the distributed directory that
holds information about each domain -- indicated early on Thursday
that online vandals had managed to forge new domain records.
Such records typically describe the services that are offered by a
particular domain, such as Web, mail and file hosting.

Instead, VeriSign's records pertaining to Al-Jazeera had apparently
been replaced by data that pointed to name servers hosted by
MyDomain.com. Those name servers in turn referred Web requests
to the defacement site located at NetWorld.

"MyDomain has learned from NavLink, the company that hosts the
aljazeera.net Web site from its data centres in France, that Al-
Jazeera's domain name account at Network Solutions (a subsidiary
of VeriSign) was compromised," MyDomain.com said in a statement
on Thursday. "NavLink has confirmed...that it has regained access
to the account at Network Solutions and changed the name servers
back to the correct settings."

Email messages to NavLink requesting comment weren't
immediately answered. MyDomain believed that changes would take
as long as 72 hours to filter out to all parts of the Internet.

The defacement is the latest in a flurry of activity surrounding the
Middle Eastern news service.

Al-Jazeera has had to contend with both technical problems and
attacks this entire week.

The Arab satellite TV network launched its English-language Web
site on Monday, attracting significant media coverage. The site
hosts the station's controversial video coverage, which has included
images of US soldiers killed and taken prisoner.

The controversy and resulting media coverage has also made the
site a target of a number of online miscreants.

"Let Freedom Ring!" stated Thursday's defacement, featuring a
large American flag and signed by a vandal with the handle "Patriot"
and claiming to be part of a group called the Freedom Cyber Force
Militia. "GOD BLESS OUR TROOPS!!!"

NetWorld's Bowman said the site had been created using a free
hosting service that the company offers. He also explained that,
because the service is free, the company doesn't keep very rigorous
watch on the activities.

"All the supplied information was fictitious," he said, quashing any
possibility of aiding in a law enforcement investigation. "It's is a free
site, so we don't track any data. We don't track the Internet
addresses or anything else. It would take a staff of about 500 to do
so."

Bowman said they are analysing what happened and may change
the way the free portion of the site is administered to prevent future
incidents.

One security expert familiar with the defacement scene said that he
had never heard of a group called Freedom Cyber Force Militia.
"We didn't hear about many other defacers who hacked right
(before) the war," the administrator of Zone-H.org, a popular
security and defacement news site, said in an email interview. "I
guess a lot of IT (security) professionals took the chance of this war
to remove some rust from their fingers," said the administrator, who
goes by the handle SyS64738.

 --

Outgoing mail is certified virus free
Scanned by Norton AntiVirus

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http://archive.jab.org/[EMAIL PROTECTED]/
 <A HREF="http://archive.jab.org/[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to