'Anonymous' Claims to Have Hacked NATO


The now-infamous hacker group known as Anonymous is showing no fear. Just two days after a series of international raids put nearly two dozen members behind bars, Anonymous has claimed to have breached the databases of the North Atlantic Treaty Organization (NATO) and walked away with about 1GB of confidential data.

Anonymous said in a tweet that it accessed the restricted material using a simple injection technique, and asked followers to wait a few days for the release of some “interesting” data. The group later posted links to two restricted NATO documents, one of which is related to “outsourcing CIS in Kosovo (2008).”

The hacker collective added that it cannot publish all of the data that it pilfered because it would be “irresponsible,” which suggests that the group got its hands on some highly sensitive material.

An unnamed NATO official confirmed to the AP that security experts are looking into the claims, and condemned the leaking of classified documents that could put member nations in peril.

The group’s actions follow a string of hacker arrests in the U.S. and Europe. The coordinated effort was the result of an investigation into the role Anonymous played in the alleged distributed denial of service (DDoS) attacks on PayPal earlier this year.

Deputy assistant FBI director Steven Chabinsky told NPR that the arrests were meant to “send a message that chaos on the Internet is unacceptable.”

“[Even if] hackers can be believed to have social causes, it’s entirely unacceptable to break into websites and commit unlawful acts,” he added.

Anonymous got wind of Chabinsky’s comments on Thursday and issued a statement of their own, detailing what they find to be unacceptable.

The hackers’ gripes include governments lying to and inducing fear in citizens, large corporations conspiring with governments and lobby conglomerates who push their own agenda for profit.

“These governments and corporations are our enemy,” the group said,” and we will continue to fight them, with all methods we have at our disposal, and that certainly includes breaking into their websites and exposing their lies.”

Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO West 2011, taking place Sept. 13-15, 2011, in Austin, Texas. ITEXPO offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations. It’s also where service providers learn how to profitably roll out the services their subscribers are clamoring for – and where resellers can learn about new growth opportunities. To register, click here.

Beecher Tuttle is a TechZone360 contributor. He has extensive experience writing and editing for print publications and online news websites. He has specialized in a variety of industries, including health care technology, politics and education. To read more of his articles, please visit his columnist page.

Edited by Jennifer Russell

TechZone360 Contributor

Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More