The war has started and the full extent of the collateral damage is still unreported.  Hackers around the world are attacking core services  in a planned attack to thwart justice.  Among the lists of the injured parties are Mastercard, Paypal, Twitter, and Facebook.  Moreover, it has also been reported that the core DNS servers are under attack. These core servers are the backbone of the internet as we know it.  Without core DNS servers, domain names do not exist and a sequence of 4 numbers between 0 and 254 called an IP address would be needed to access any internet services.

It is believed that these hackers are using bot-nets to launch their attacks. What we do know is that the criminal organization known as Pirate Bay which is providing search technologies to locate illegal copies of software, music and videos on torrents  is one of the groups responsible for these attacks [ see related article ].  The group publicly announced on their web site that they were joining the attacks.

These hackers are truly global terrorists and should be treated as such! These attacks could be easily stopped with military action by tracing these attacks back to their original source using military forces and computer experts. Starting with the companies being attacked, technologies can be used to identify where the attacks are coming from. It is likely that most attacks are coming from computers infected with Trojans and viruses which are often controlled from a central point. Local law enforcement could enter people’s houses who are being used for these attacks, and use the infected computers to identify the sources of the attacks. These hackers could then be immediately charged with crimes of terrorism which puts them behind bars and far from the computers they need to sustain these attacks.  The difficulty is that, this would need to be a joint effort by every country with internet capability.

Now that we know there is nothing to fear from these terrors as the world’s governments have the ability to win the war, the next question is what started the war?  Wikileaks is a web site which started the war by publishing sensitive private communications between world diplomats.  Much of what was released directly threatened global peace by exposing old wounds which countries have been trying to recover from. Diplomacy is about putting aside these old wounds and building improved relationships, and sometimes building these relationships requires some amount of backstabbing.  Who among us has never been in the situation where, in order to patch up a relationship with a friend after a fight, has not had to talk bad about another of our friends?  The global community is not much different than this.  There is no real malice against those who are being spoken about badly; it is all an effort to repair relationships.  Wikileaks has released these types of private communications to the world, thereby attempting to cause international conflict.  Efforts have been made to stop Wikileaks by cutting off their funding sources and closing their international bank accounts.  The global terrorist hacker networks  have seen this as an opportunity to unify the hacker community in an all-out attack against the world.  They are using propaganda about what is being done to stop Wikileaks to enrage and unite the global hacking community into an all-out war.

So where do social networks come into this? Twitter was accused by these hackers of limiting the spreading of the propaganda and was therefore included in propaganda releases as potential targets.  It is reasonable to believe that other social networks being attacked are for similar reasons.

Lastly I would like to invite you to help end this global war! Update your virus scanners and install anti-spyware software. Protect your computer as best you can, and tell all of your friends and families to do the same. If these hackers can’t infiltrate our computers, they will not have the ability to launch these attacks, and let our law enforcement officials take care of the rest!


COPYRIGHT – You may freely distribute this article as long as you credit the original author and the web site