This is my personal view and comments on the issues and events that I feel a need to talk about or express my view. You don't have to agree, but lets carry on a adult, discussion and maybe you will see it the right way, mine. ;)
Oppps maybe they should be more careful..
Published on July 13, 2004 By ShadowWar In Current Events
The state of Arkansas unknowingly helped the al-Qaida terrorist network distribute propaganda promoting violence against the United States.

Laura Mansfield, associate director of the Northeast Intelligence Network, first noticed the postings yesterday while monitoring a forum on an Arabic-language Internet bulletin board frequented by al- Qaida sympathizers.


The Ansar forum received notoriety for releasing the video of the beheading of American citizen Nicholas Berg in Iraq.

From July 9 to mid-morning yesterday, a self-proclaimed U.S.-based al-Qaida sympathizer known as "Irhabi 007," or Terrorist 007, listed a large number of video and audio files for download by fellow sympathizers, Mansfield reported to WorldNetDaily.

The files were located on an anonymous FTP server at the Arkansas Department of Highways and Transportation in two directories called "007" and "ALQA3EDAH."

Among them were files highly sought after by jihadis, including the al-Qaida films "Badr al Riyadh," "American Hell in Iraq," "Russian Hell," "Martyrs of the Confrontation" and "Wills of Martyrs." Also posted were the Berg beheading video and many audio and video clips of various al-Qaida leaders, including Osama Bin Laden, Ayman al-Zawahiri and Abu Musa'ab al-Zarqawi.

The files were located at ftp://www.ahtd.state.ar.us/incoming/GIS/007 and at ftp://www.ahtd.state.ar.us/incoming/GIS/ALQA3EDAH

Mansfield reported the postings to the Joint Terrorism Task Force at 3:20 a.m. Eastern time and by noon yesterday, the directories and files no longer were accessible.

"Terrorist 007" has a history of appropriating anonymous FTP space, Mansfield noted.

Earlier this year, he briefly was observed distributing al-Qaida films from a server belonging to George Washington University.

The theft of bandwidth and server space is a relatively new tactic for al-Qaida and its sympathizers, Mansfield said. Last month, Silicon Valley Land Surveying Inc., a California company, was the victim of a similar hijacking when al-Qaida appropriated web space and bandwidth to show a video of American hostage Paul Johnson, who later was beheaded.

Mansfield explained the jihadis have resorted to hijacking websites as the demand for their videos and audios on the Internet exceeds the meager allocations provided by the free web hosting companies they use for many of their websites.

Free website providers are chosen also because of the relative anonymity they provide. Purchasing web space requires placing a credit card on file for payment, which allows law enforcement to trace the purchaser more easily.

Randy Ort, public affairs officer for the Arkansas State Highway and Transportation Department, said the files in question were located on an unsecured FTP server. He denied the security of the state website was ever at risk.

Ort said the department notified law enforcement authorities as soon as he learned of the unauthorized intrusion. All access to the FTP server was closed as soon as the discovery was brought to his attention, he said.

Ort also insisted taxpayers of Arkansas would not bear the cost of the bandwidth charges because the website is part of a fiber-optic interstate system.

Mansfield advises anyone concerned about servers being compromised in a similar manner to turn off anonymous FTP access.

THIS ARTICLE COMES FROM www.worldnetdaily.com . If you want to read it, although it is here in its whole unedited glory, go there and read it again. Here is a link in case typing in the URL is to much workLink

Comments
on Jul 13, 2004
Very, very interesting article. I also find it interesting that you seem to blame the government because their web-site was hacked, even though the article (which you quoted without attribution or link) also mentioned a University web-site and a private corporation's web-site that were compromised in the same way, and further went on to say that other sites could also be at risk if they had anonymous FTP access enabled. Additionally, I don't think that the timeframe of "July 9 to mid-morning yesterday" (when was yesterday, for the article?) is that long of a time period considering the frequency of security checks. Their response time to removing the data also seemed appropriate to me.
on Jul 14, 2004
Very, very interesting article. I also find it interesting that you seem to blame the government because their web-site was hacked, even though the article (which you quoted without attribution or link) also mentioned a University web-site and a private corporation's web-site that were compromised in the same way, and further went on to say that other sites could also be at risk if they had anonymous FTP access enabled. Additionally, I don't think that the timeframe of "July 9 to mid-morning yesterday" (when was yesterday, for the article?) is that long of a time period considering the frequency of security checks. Their response time to removing the data also seemed appropriate to me


Pseudo my man, I am not blaming anyone. Again I overestimated the open mindedness of the JU readers. This Article was from www.worldnetdaily.com (a simple web search would have told anyone this). The author of this article did not seem to me to be to critical. I don't see anywhere in the article blame being laid on anyone. But I guess if your looking to blame someone you acn read it that way if you wish. Personally I think its kind of hunorous that they keep using Government web sites. The Governments internet security policy is not the greatest, as is widely known in the Internet/ Computer Crime circle. But I do not blame the Government agency cited in the article, as there are many things you can not control or see into the future. Your assertation that I blame someone is a little over the top. Also just for the readers, anonymous FTP's are fairly easy targets for those that want to use them for illegal uses. I will edit the article to make sure anyone can find the orginal...
on Jul 14, 2004

same tactic and technique as crackers who use not-too-secure ftp space to store and distribute warez right?  if it wasnt university or gov site space, theyd find commercial ftp space.   if the file name isn't changed frequently, should be able to run search using an ftp engine and find other locations.  (actually i just ran one using the first ftp search engine i turned up and found 42 .../007 directories)

on Jul 14, 2004
(actually i just ran one using the first ftp search engine i turned up and found 42 .../007 directories)


Very intersting kingbee.. thanks for the info..
on Jul 14, 2004
Pseudo my man, I am not blaming anyone. Again I overestimated the open mindedness of the JU readers. This Article was from www.worldnetdaily.com (a simple web search would have told anyone this). The author of this article did not seem to me to be to critical. I don't see anywhere in the article blame being laid on anyone. But I guess if your looking to blame someone you acn read it that way if you wish.


Perhaps I had read too much into what you had posted. Let's see... you posted an article, without comment. Silly me to think that the article seemed to speak for you. I'm certain that by reading your insightful cut-and-pastings, I can become open-minded as much as someone who can see right through my facade and be able to tell that I'm looking to blame someone. Allow me to slink off and hang my head in shame.

FWIW, I read "The state of Arkansas unknowingly helped the al-Qaida terrorist network" as being at least mildly blaming of the government agency in question. I thought perhaps that "maybe they should be more careful" was in the same vein as well.


Finally, I wasn't so much concerned with reading the article as originally posted on some other web-site (I hadn't accused you of editing it or anything like that), but that you had quoted an entire article without giving credit to either the original author or the site from which you had acquired it.