Word: hizballah
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...Burton said shutting the sites down is a "double-edged sword." As a former U.S. counterterrorism official, he sees the value of keeping the sites up so intelligence services can collect "forensic" evidence. "It's important to see what they are saying," he says, noting that Hizballah has resource bases in Indonesia and the tri-border area (Brazil, Argentina, Paraguay) of South America. Given Hizballah's links to Iran, which offers its operatives diplomatic cover around the world, according to Burton, monitoring Hizballah's Internet presence is vital as part of the "cat and mouse" game with Western intelligence...
...recent hijacking of a South Texas cable operator is a case study in how Hizballah moves in. The Texas cable company has an agreement with a New York-based satellite communications aggregator, which moves feeds to a variety of customers from throughout the world, including Lebanon. A technician in New York made an "improper connection," according to an official with the cable company's communications provider who detailed the hijack for TIME. That opening was detected by Hizballah...
...Israelis tighten the noose on Hizballah in Lebanon, these communication nodes become critical," said Fred Burton, a former U.S. counterterrorism official and now vice president of Stratfor, a security consulting and forecasting company in Austin, Tex. In today's asymmetrical warfare, the Internet is vital to groups like Hizballah who use it to recruit, raise money, communicate and propagandize, Burton said, including transmissions from Hizballah leader Sheikh Hassan Nasrallah...
...Manar, widely considered a mouthpiece for Hizballah and categorized as a terrorist group by the U.S., linked to the small cable company's IP (Internet Protocol) address, which can be thought of, in simple terms, as a telephone number. Hizballah essentially added an extension on that telephone line allowing their traffic to flow. Hizballah then gets the word out through e-mail and blogs that it can be found at that IP address and the hijack is complete. If the hijack is not detected, the IP address can be linked to a new domain name and that opens...
...Perhaps, the most famous player of the "whack-a-mole" game is Aaron Weisburd, 42, a computer programmer who operates one of the Society's projects from his home office in southern Illinois. His Web site, Internet Haganah - the name is an homage to Israeli paramilitary fighters - tracks Hizballah and other groups as they wander the Web. Weisburd's hijack logs go back for several years and include the latest Hizballah hijacks since fighting began. "Notice to the jihadis in the audience," he writes on his site. "You can't hide...