Skip to main content
  1. Home
  2. Computing
  3. Mobile
  4. Social Media
  5. Web
  6. Legacy Archives

Obama calls for tighter cyber security after U.S. Central Command Twitter hack

Add as a preferred source on Google

Unknown hackers claiming to be Islamic State (ISIS) militant supporters took over the U.S. Central Command’s Twitter and YouTube accounts briefly on January 12. The two websites moved quickly to suspend the compromised accounts and prevent further posts. Meanwhile, the U.S. government confirmed the hacks, but stated that no sensitive information was leaked.

The White House is currently monitoring the hack and seeking out those responsible. Two U.S. defense officials told Reuters the attack is an embarrassment, but not a threat to the country or its service members.

Recommended Videos

Updated on 01-13-2015 by Malarie Gokey: Added President Barack Obama’s response to the hack.

“We can confirm that the CENTCOM Twitter and YouTube accounts were compromised earlier today. We are taking appropriate measures to address the matter,” Central Command said in a statement.

President Barack Obama was giving a speech on the importance of cyber security and data protection around the same time the Cyber Caliphate hacked Central Command’s accounts. The next day, Obama cited the recent hack as evidence that the U.S. needs to tighten its cyber security.

“With the Sony attack that took place, with the Twitter account that was hacked by Islamist jihadist sympathizers yesterday, it just goes to show how much more work we need to do — both public and private sector — to strengthen our cybersecurity,” Obama said.

The hackers, called the Cyber Caliphate, issued a statement on Pastebin boasting of the attack. Alongside various threats and messages of support for ISIS, the hackers posted pictures and screenshots of what they claim is sensitive data on the U.S. military, its plans, and service members. The BBC confirmed that at least one of the photos posted by the hackers on Twitter came straight from the Pentagon’s public website. However, the origin of the rest of the information, including lists of top-ranked U.S. generals, military scenarios, as well as data on soldiers and their families, has yet to be discovered.

Twitter quickly shut down the account and removed the offending tweets, which continue to circulate via social media and various news articles. YouTube also suspended Central Command’s account, after the hackers posted two videos, entitled Flames of War ISIS Video and O Soldiers of Truth Go Forth.

Malarie Gokey
As DT's Mobile Editor, Malarie runs the Mobile and Wearables sections, which cover smartphones, tablets, smartwatches, and…
Asus reveals ROG Strix XG129C, a tiny secondary monitor chasing Elgato’s gamer lunch
The secondary display category has been waiting for a product that combines a proper screen, real color accuracy, and gaming ecosystem integration in one tidy package.
Strix XG129C secondary display.

If you’ve ever wished your work desk had a dedicated screen for reviewing your system’s performance, chat windows, or streaming controls, so that you don’t have to disturb your main monitor, Asus has heard you. 

The ROG Strix XG129C is a 12.3-inch secondary display with a touchscreen, designed to sit beneath your primary monitor and handle everything that could be a distraction on your main screen, and it costs $199. 

Read more
Intel’s turnaround is one for the ages, without having much to show for it
Wall Street is betting big on Intel before the results arrive
Logo

Intel’s comeback has become one of the market’s biggest surprises. Its stock has risen nearly 490% over the past year, pushing the company back into record territory and reviving confidence in a chipmaker many had written off.

The problem is that Intel still has little product success to justify that excitement.

Read more
Apple’s Continuity features are so good, they make Windows and Android feel incomplete
Android and Windows try, but Apple's ecosystem is on a whole different level.
Mac iPad iPhone with blurred background

Windows and Android platforms have been trying to catch up to Apple's ecosystem. And honestly, in some areas, they have succeeded. But replicating a feature here and there is very different from pulling off what Apple has built. The seamless, almost invisible way all of Apple's devices work together is genuinely hard to replicate.

Apple calls these Continuity features. You can use these features to seamlessly transition from one device to another, unlock devices without entering passwords, transfer files, and much more. 

Read more