Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

EXCLUSIVE: Crackers Prepare Retaliation for Tuesday's Terrorist Attack
govtech ^ | September 2001 | Shane Peterson

Posted on 09/16/2001 6:48:38 PM PDT by avg_freeper

EXCLUSIVE: Crackers Prepare Retaliation for Tuesday's Terrorist Attack

Massive attack against routers, computer systems planned against Middle East countries suspected of harboring terrorists.
By Shane Peterson - September 2001

NEW YORK -- While the federal government tracks down suspects for questioning in Tuesday's attack against the World Trade Center and the Pentagon, cracker groups and individual crackers said on Friday that they are plotting their own counterattack. The group is calling itself the Dispatchers, and, in a letter posted to the Web on Sept. 12, the group said it has already disabled ISPs in Palestine and is targeting ISPs in Afghanistan with the explicit goal of destroying them.

The Dispatchers, now approximately 300 strong, said they will also go after Pakistan, Iraq and several other Middle Eastern countries.

"Right now, we're trying to get as many computers as possible," said Dawgyg, a cracker from World of Hell. "You remember the Mafiaboy thing? We're basically going to do [the same thing] to their routers and destroy their Internet connections throughout the Middle East. We're not going to deface their pages this time. We're going to down their Internet."

The cracker groups said they are planning a coordinated attack against Internet infrastructure in targeted countries and other critical information systems.

"I've been working, and there's been groups of four, five and six people working on different projects," said Hackah Jak, a 21-year-old cracker from Hackweiser and Project China. "I know of one group that's recently targeted two countries and found the systems that handle their money. It's happening as we speak."

The intensity of the attack should be sufficient to cripple connectivity in targeted countries, Dawgyg said, given the numbers of machines that the crackers have compromised to use in the attack. He said he's got approximately 1,100 machines under his control to use in the attack.

"We have the potential and the power, if we push hard enough, to knock an entire country that we target offline for over a week," Hackah Jak said, adding that the crackers started communicating with each other Tuesday afternoon to develop a game plan on the progression of the attack. "We had a basic idea of how we should go about this from our previous shot at Project China back in April and May when we targeted China."

It's a large-scale attack, with crackers in the UK, Russia, Brazil, Mexico, China, Australia, Canada, India, Egypt, Germany, Holland, Denmark and the United States all taking part in the attack.

The Dispatchers aren't worried about law enforcement taking a dim view of their actions.

"I personally know some law upholders -- I don't want to say where they work or their names -- but I've spoken with them, and they said it's not illegal because it's out of the United States and that they don't have too much of a problem with it," said Hackah Jak. "It's not like we're targeting systems in United States and using them for the attack. My main focus is using their systems to attack each other and disable them."

Though crackers may not be thought of in patriotic terms, Dawgyg said that he and his fellow crackers are enthusiastic about the attack.

"The way most of us see it; most of the hackers are anywhere from 14 years old to 18 years old," he said. "This is the only way we can do anything about [Tuesday's attack]. I read an article the other day about Osama bin Laden using encryption methods developed by the United States and Internet access to communicate to his different groups around the world. If we can prevent him from doing that, he won't be able to contact them, therefore, it will make it harder for him to coordinate such attacks like Tuesday's."

Theoretically, if the crackers could get an IP address or an IP range that Bin Laden uses, Hackah Jak said, they could sniff the packets, decrypt them and send the information to the FBI.


TOPICS: Front Page News; News/Current Events
KEYWORDS:
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 121-139 next last
Usually when this bunch gets motivated we end up paying for it.

But may be, just may be, these are the stirrings of Patriotism.
I hope so. That generation has been searching for something
to fight for.

One thing though, I just don't see how a country like Afghanistan
with no allowed internet connections could be effected.

1 posted on 09/16/2001 6:48:38 PM PDT by avg_freeper
[ Post Reply | Private Reply | View Replies]

To: avg_freeper
Hmmmm.
2 posted on 09/16/2001 6:53:00 PM PDT by CheneyChick
[ Post Reply | Private Reply | To 1 | View Replies]

To: avg_freeper
If I knew how to do it, I'd crack, hack, and virus their computers.
3 posted on 09/16/2001 6:55:26 PM PDT by Dan from Michigan
[ Post Reply | Private Reply | To 1 | View Replies]

To: avg_freeper
I must say when I read this headline I thought, "Cracker?"

It took me twice to read the meaning in the first paragraph and not feel that I should somehow be insulted..

Now then...

4 posted on 09/16/2001 6:56:23 PM PDT by IncPen
[ Post Reply | Private Reply | To 1 | View Replies]

To: avg_freeper
Whoops, when I saw this was about "crackers" I thought it would be about the ignorant, dimwitted, sh!t-for-brains fools attacking AMERICANS of Arab descent, Muslims, Sikhs, or anyone that wore a turban and just LOOKED like they might be the enemy even though they were good, loyal American citizens - or that it might be about said ignorant, dimwitted, sh!t-for-brains fools firebombing mosques, temples and schools here in the U.S.

My mistake...

5 posted on 09/16/2001 6:56:24 PM PDT by StoneColdGOP
[ Post Reply | Private Reply | To 1 | View Replies]

To: avg_freeper
Biggest mistake these people make - telling their enemy what they plan to do.

It's like witnessing a murder and running up to the murderer and pointing your finger in their face and saying, I saw what you did, and I'm going to report you to the police.

I wonder how many of these people will lose their life because they could not keep this secret!

6 posted on 09/16/2001 6:56:40 PM PDT by Sueann
[ Post Reply | Private Reply | To 1 | View Replies]

To: avg_freeper
I'm all for it. Go kick some a$$, my computer-loving friends.
7 posted on 09/16/2001 6:58:15 PM PDT by July 4th
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dan from Michigan
Yes but it could be counter productive if our guys are tracking the bad guys through those ISPs.
8 posted on 09/16/2001 6:59:28 PM PDT by Texasforever
[ Post Reply | Private Reply | To 3 | View Replies]

To: avg_freeper
Looking at this headline, I thought you meant "poor, white trash" and not "computer hackers."
9 posted on 09/16/2001 6:59:58 PM PDT by xm177e2
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sueann
Don't underestimate this bunch...they can do what they say they can do and most likely not get caught [almost certainly not by their targets]...
10 posted on 09/16/2001 7:00:09 PM PDT by SurferDoc
[ Post Reply | Private Reply | To 6 | View Replies]

To: SurferDoc
Bump...take 'em down!
11 posted on 09/16/2001 7:03:10 PM PDT by 6ppc
[ Post Reply | Private Reply | To 10 | View Replies]

To: all
I got spam in my e-mail from someone at a place called Arabia.com., trying to sell me electronics, or some such nonsense. Went and looked at it. Strange place.
12 posted on 09/16/2001 7:03:12 PM PDT by Tuscaloosa Goldfinch
[ Post Reply | Private Reply | To 8 | View Replies]

To: StoneColdGOP
Yea, I thought the term Cracker was a little strange my self.

The term sounds British but its obviously an American web sight.

13 posted on 09/16/2001 7:03:39 PM PDT by avg_freeper
[ Post Reply | Private Reply | To 5 | View Replies]

To: avg_freeper
Great! Let the ping-storms begin! Cry havoc, and unleash the buffer overflows!
14 posted on 09/16/2001 7:04:39 PM PDT by neutrino (neutrino)
[ Post Reply | Private Reply | To 1 | View Replies]

To: avg_freeper
Follow the Money it is nothing but 1's and 0's stuck in somebody's computer connected to a network somewhere in the world.
15 posted on 09/16/2001 7:05:08 PM PDT by dts32041
[ Post Reply | Private Reply | To 1 | View Replies]

To: avg_freeper
By the way this is my first posting.

Luker for a long time.

16 posted on 09/16/2001 7:05:18 PM PDT by avg_freeper
[ Post Reply | Private Reply | To 13 | View Replies]

To: Texasforever
My thoughts, too. Let our guys hack & track before you shut it down. The horse left the barn, closing the door now won't help us catch him.
17 posted on 09/16/2001 7:05:33 PM PDT by bubbafree
[ Post Reply | Private Reply | To 8 | View Replies]

To: avg_freeper
This is good, but when we get around to hacking his bank accounts we will really cripple him :-)
18 posted on 09/16/2001 7:05:44 PM PDT by fnord
[ Post Reply | Private Reply | To 1 | View Replies]

To: avg_freeper
Well, this should only take about 6 minutes. They only have about 11 computers in that God forsaken brush heap.
19 posted on 09/16/2001 7:05:54 PM PDT by Lizzy W
[ Post Reply | Private Reply | To 1 | View Replies]

To: avg_freeper
Cracker, I believe, is the proper term for those who hack with malicious intent. "Hacker" is reserved for those who do it for fun with no intent to destroy, or to help out companies by hacking and letting them know where security flaws are.
20 posted on 09/16/2001 7:06:22 PM PDT by July 4th
[ Post Reply | Private Reply | To 13 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 121-139 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson