After taunting U.S. military personnel and their families by claiming to have stolen their personal information, Islamic State supporters have said their next act would be to “strike at your necks.”
The self-proclaimed “Islamic State Hacking Division” claims it hacked into U.S. military computers and released the personal information of military and government personnel, including alleged names, addresses, military-issued email addresses, passwords and credit card information. The hackers called for the information released through a Twitter account to be used for lone wolf attacks in the U.S. against servicemen and women.
“O Crusaders, as you continue your agression [sic] towards the Islamic State and your bombing campaign against the Muslims, know that we are in your emails and computer systems, watching and recording your every move, we have your names and addresses, we are in your emails and social media accounts, we are extracting confidential data and passing on your personal information to the soldiers of the khilafah [caliphate], who soon with the permission of Allah will strike at your necks in your own lands!,” read the message.
Advertisement – story continues below
A spokesman for the US Department of Defense confirmed that authorities are “looking into” the leak and added: “We are aware of the report. Cannot confirm credibility at this time. The safety of our service members is always a primary concern. We encourage our personnel to exercise appropriate OPSEC (operation security) and force protection procedures.”
The veracity of the most recent claim is unclear. However, an Australian legislator whose name was also on the list told the media he was seeking protection for his family.
This week’s alleged hacking mirrors a similar one made earlier this year, when the group said that it had published names, photos and addresses of U.S. service members. This claim was found to be exaggerated and the information to already be freely available.
Advertisement - story continues below
What do you think? Scroll down to comment below.