In Twitter Hack, Pentagon Learns Perils of Social Media Exposure

Advertisement
By Reuters | Updated: 14 January 2015 10:35 IST
If so-called "cyber-jihadists" want to launch another social media attack on America's military, they will have plenty of targets: the U.S. Army alone lists more than 2,000 links to feeds on Facebook, Twitter, YouTube and other accounts.

In the wake of Monday's breach of US Central Command's Twitter and YouTube feeds by apparent sympathizers of the Islamic State militant group, U.S. officials updated passwords and some distributed tip-sheets to help bolster online security.

But they showed no sign of shifting a social media strategy that has seen thousands of Facebook, Twitter and other accounts blossom as the world's most powerful military establishes an Internet presence that matches the global reach of its forces.

That large online profile carries unique risks for the military.

Advertisement

"It's their public face," said Ben FitzGerald at the Center for a New American Security think tank.

Advertisement

"So someone sitting in Baghdad isn't going to necessarily pick up the nuance that this is a non-military network and not a significant hack. So they're looking silly and they're looking weak."

The U.S. Department of Defense has "thousands and thousands" of social media accounts, said Colonel Steve Warren, a Pentagon spokesman. They are seen as a fast and effective way for the U.S. military to communicate with its own personnel and families about everything from on-base social events to power outages.

Advertisement

"We are certainly looking at our systems and will refine them as needed," said Warren.

Although a review of the incident was under way, he said, there had been no specific department-wide instructions issued since Monday to strengthen security across social media.

Advertisement

The Twitter and YouTube breach is far different than the one in 2008, when malware believed to have been crafted by a foreign intelligence service infiltrated Central Command's internal computer systems.

That attack was a dramatic illustration of the risks to military and defense-related networks critical to U.S. security, and triggered a massive expansion of cyber-defense efforts.

Monday's hack also did not lead to any theft or disclosure of classified information, officials said. But it delivered a highly symbolic blow by compromising the social media accounts of the military command overseeing sensitive operations in Iraq and Syria during a time of conflict.

It was a reminder of the perils of social media for an institution that prides itself on its vast security and image of unrivalled global power.

"Watch your back"
The hackers posted what officials said appeared to be authentic, but unclassified, rosters of current and retired top brass, including some private email addresses. They also posted messages, including: "American soldiers, we are coming, watch your back."

Unlike most high-profile accounts, the Twitter feeds used by Central Command were not "verified," which would have added another layer of security and required harder-to-break government email accounts to be set up, officials told Reuters.

Still, it is unclear such steps would have prevented the hack, which is being investigated by the FBI and the military.

A source familiar with the inquiries said investigators were examining whether cyber-attackers sent "phishing" messages that tricked Central Command personnel into revealing shared logins and password information.

President Barack Obama said Tuesday's hack and others show "how much more work we need to do, both public and private sector, to strengthen our cyber-security."

Still, hacking into Central Command's Twitter feed is far easier - and entirely different - than gaining access to its internal networks, something the military has devoted vast resources to defending, analysts say.

"It's really not that difficult to gain access to someone else's social media or e-mail account," said Michael Smith, principal and chief operating officer of Kronos Advisory, a private intelligence group focused on counterterrorism.

Smith said such incidents occurred often at Twitter.

In 2013 hackers took control of the Associated Press Twitter account and sent a false tweet about explosions in the White House that briefly sent U.S. financial markets reeling.

"Hacking a Twitter is about the equivalent of spray-painting a subway car," a former senior U.S. intelligence official said.

Senator Dan Coats, a member of the Senate Select Committee on Intelligence, said the incident highlighted cyber-security risks. But he said the solution was better cooperation between the public and private sectors, not retrenchment from social media.

"If the U.S. military - or State Department, White House, members of Congress - stayed off Twitter, YouTube and other social media sites because of the vulnerabilities inherent in those services, then the terrorists win," Coats said.

© Thomson Reuters 2015

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus 15R With 7,400mAh Battery, Snapdragon 8 Gen 5 Debuts at This Price
  2. OnePlus Pad Go 2 Launched in India With 10,050mAh Battery, 5G Connectivity
  3. Gemini 3 Flash Arrives as Google's Latest High-Speed, Low-Cost AI Model
  4. Apple's iPhone 18 Pro, iPhone Fold May Feature a Relocated Selfie Camera
  5. OnePlus 15R Review
  6. Dhurandhar OTT Release Date: What We Know So Far
  7. OnePlus 15, Nord CE 5 Prices Slashed During Community Sale: See Offers
  8. Realme 16 Pro+ 5G Listed on Certification Website With These Specifications
  9. Honor Win, Win RT Features Teased; Will Launch in China on This Date
  10. Google's Pixel Phones Get a Second December Update With These Fixes
  1. Xiaomi 17 Ultra Launch Timeline Confirmed; Will Feature Leica-Tuned Cameras: Expected Features, Specifications
  2. Apple's App Store to Introduce Additional Ads Across Search Queries in 2026
  3. Google Pixel Phones Reportedly Receive Second December Update With Fixes for Battery, Touch Issues
  4. Google Releases Gemini 3 Flash, Outperforms 3 Pro Model in Speed and Coding Performance
  5. James Webb Space Telescope Could Help Reveal Dark Matter in a Way Scientists Did Not Anticipate
  6. Interstellar Comet 3I/ATLAS Nears Earth on Dec. 19, Offering Rare Insights Into Cosmic Visitors
  7. Europe’s Ariane 6 Rocket Lifts Off With First Galileo Satellites, Boosting Europe’s Navigation Network
  8. NASA’s Parker Solar Probe Observes Solar Wind Making ‘U-Turn’, Shedding Light on Space Weather
  9. ESA Reveals City-Size ‘Cosmic Butterfly’ Crater on Mars Containing Signs of Ancient Water
  10. The Holy Grail of Eris OTT Release: Know When and Where to Watch it Online
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.