May 23rd, 2012
09:01 AM ET

Senators: Al Qaeda calls for 'electronic jihad'

By CNN Wire Staff

An al Qaeda video calling for "electronic jihad" illustrates the urgent need for cybersecurity standards for the most critical networks in the United States, a group of senators said.

"Internet piracy is an important field of jihad," the narrator of the video says, according to a translation. He advises followers with expertise to "target the websites and information systems of big companies and government agencies of the countries that attack Muslims."

The video calls for cyberattacks against networks such as the electric grid and compares vulnerabilities in the United States' critical cyber networks to the vulnerabilities in the country's aviation system before 9/11, according to a statement Tuesday from the Senate Committee on Homeland Security and Governmental Affairs.

READ FULL STORY HERE


Filed under: Al Qaeda • Cybersecurity • Senate • Terrorism
soundoff (15 Responses)
  1. Ohshi-

    I consider this an indication of the effectiveness of our new re-imagined sniper units, and our drones. Who wouldn't want to drop the AK47 and work behind the safety of a computer screen? There isn't a terrorist abroad who isn't talking in hushed, paranoid voices. I'd wager that it's causing a lot of in-fighting and friction too, especially considering that their most recognized brass have been destroyed by these very tactics. At the end of the day, this is a victory in and of itself because it gets terrorists out of the training fields, reduces their martyrdom to cowardly hermit lifestyle, and at the very least, dramatically stifles their ability (at least psychologically) to move freely, with conviction and pervasiveness.

    May 24, 2012 at 9:21 am | Reply
  2. amarjeet

    Al Qaeda efforts & declaration of e Jihad is a positive proof that they have the backing of some military agency & enough funds. US has to evolve a solid system & monitoring for expenditure verification of its military aid against terrorism to any country including Pakistan.

    May 23, 2012 at 11:01 pm | Reply
  3. dd

    The US needs leadership to manage the complexities of today's world. Obama, is a great domestic terrorist organizer. Let him run Occupy and but an executive in the White House.

    May 23, 2012 at 10:33 pm | Reply
  4. studdmuffins

    It's Y2K all over again. The sky is falling.

    May 23, 2012 at 5:23 pm | Reply
  5. RetiredVet

    Maybe Al Qaeda has stock in Facebook.

    May 23, 2012 at 4:27 pm | Reply
  6. byebye

    Of more concern are terrorist hackers gaining controls of automated systems via the web for nefarious purposes.

    May 23, 2012 at 4:08 pm | Reply
  7. cybercmdr

    The question I have is, why are our critical systems connected to the Internet in the first place? Companies can set up dedicated circuits, or if that is too expensive they can set up encrypted links. If they go the encrypted link route, it should be based on certificates and public/private keys rather than passwords that can be guessed. Why is this so hard?

    May 23, 2012 at 3:39 pm | Reply
  8. svann

    Al Qaeda hacked D3

    May 23, 2012 at 12:57 pm | Reply
    • ThunderfuryBlessedBladeoftheWindseeker

      @svann ^ Bump for importance.

      May 24, 2012 at 12:40 am | Reply
  9. palintwit

    Sarah Palin wrote the book on cybersecurity standards. Our homeland security would do well in consulting with her if they haven't already.

    May 23, 2012 at 12:46 pm | Reply
    • DrGMG

      good one!!

      May 23, 2012 at 2:17 pm | Reply
  10. TRS80

    I've got a TRS-80 they can use.

    May 23, 2012 at 9:58 am | Reply
  11. michaelfury

    http://michaelfury.wordpress.com/2008/08/20/the-ghost-in-the-machines-the-mystery-of-the-wtc-hard-drive-recoveries/

    May 23, 2012 at 9:50 am | Reply
  12. Hahahahahahaha

    Now they are wondering where to buy an iJihad!!!!! Hahahahahahahaha Hint – It's next to the iSheep. Hahahahahaha

    May 23, 2012 at 9:47 am | Reply

Post a comment


 

CNN welcomes a lively and courteous discussion as long as you follow the Rules of Conduct set forth in our Terms of Service. Comments are not pre-screened before they post. You agree that anything you post may be used, along with your name and profile picture, in accordance with our Privacy Policy and the license you have granted pursuant to our Terms of Service.