After the recent Paris Terrorist attacks the Anonymous Hacking network has declared a war on the ISIS. The network released a YouTube video on Monday vowing a collective vengeance against the Islamic State for the attacks in Paris on Friday that left 129 dead and hundreds critically injured. Millions of people so far have watched the Anonymous video.
A hooded figure in black wearing the signature Guy Fawkes mask said in French, “Anonymous everywhere in the world is going to hold you down. You should know that we will find you and we will not let you go. We will launch the biggest operation ever against you. Expect massive cyber attacks. War is declared. Get prepared.”
So what will this Anonymous “war” on the Islamic State include?
It may include bringing down the terrorist networks websites, mounting DOS attacks, making secret email IDs and Twitter accounts public and vandalising their websites.
Does Anonymous declaration of war against the Islamic State actually help the Islamic State?
Security experts believe that the Anonymous attacks on the Islamic State websites and communication channels could eventually end up helping the Islamic State. Their communications, their emails and their social networking handles are used by spies to track them down and intercept their messages. After the video, even the Islamic State media cell has gotten active.
In the messaging service Telegram the Islamic State affiliates have posted this: “The # Anonymous hackers threatened… That they will carry out a major hack operation on the Islamic State (idiots). So U should follow the instructions below to avoid being hacked.”
The instructions include not opening unknown links and emails and changing computers and mobile phones frequently.
The French cyber security expert Olivier Laurelli expresses concern over the Anonymous attack on the Islamic State. He told AFP, “It’s counter-productive to close accounts. It renders police investigators blind and dead for certain things.”
According to the security agencies, it is critical to be able to identify connections and communications between different terror groups and if these connections are severed or used more securely by the terror network it will only hamper the investigations. “Besides,” says Laurelli, “this is all very temporary. An account closed here, is just another one opened over there.”