U.S. Central Command Twitter Account Hacked by ISIS

U.S. Central Command Twitter Account Hacked by ISIS

After a series of unusual tweets were published from the U.S. Central Command Twitter account, it was soon discovered that the account was in fact hacked. This Twitter account has since been suspended but not without some very revealing Tweets going live.

Around 11:30am, CST, the first tweet was published in all caps: “AMERICAN SOLDIERS, WE ARE COMING WATCH YOUR BACK. ISIS.”

Then, the U.S. Central Command’s Twitter account profile became a black-and-white image of a persona wearing a scarf around their head. In white lettering against a black background, “CyberCaliphate” and “I love you isis” was prominently seen at the top of the page.

About an hour later, it was discovered that U.S. Central Command’s YouTube page was apparently hacked as well because it contained ISIS propaganda videos with militant fighters.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities