She would also probably become the most powerful woman in ISIS changing her into a key operational figure.

The government websites were used to obtain the names.

It was what a second U.S. military official called lame.

British widow of deceased leader of ISIS campaign wants to run ISIS’s hackers

Women lose the house.

They lose all the original benefits they had.

He was also suspected to be behind the hacking of U.S. Central Commands social media feeds this summer.

spot_img

He had significant technical skills and expressed a strong desire to kill Americans.

At that time, he just 18 years old and was sentenced to a six-month jail term.

He left for Syria in 2013.

She posted under her Twitter handle @UmmHussain102 until it was shut down in 2014.

Further, she also made fun of the U.S.-led coalition effort.

Infact, she even quoted ISIS leader Abu Bakr al Baghdadi.

She wrote last year So take up arms, take up arms, O soldiers of the Islamic State!

And fight, fight Amir Al Mumineen Abu Bakr al Bagdadi.

While living in ISIS, she is said to have became a grandmother to a little boy last year.

However, she has never confirmed this.

U.S. military and intelligence officials are observing her to see her next move.

Junaids notoriety, connections, and experiencedespite his ageoffered a skill set not easily found among extremists.

The U.S. officials are not impressed until now.

The officials said, on her part, there is no proof of technically proficient hacking.

While she has no training in code, she is also believed to not have a high school degree.

Infact, even the most sophisticated computer experts within ISIS have yet to pull off a major hack.

Instead they have carried out bundled information and fruitful Internet searches.

Until now, the most effective hack has been of CENTCOMs Twitter accounts earlier this summer.

Despite everything, the groups persistence along with its aggressive social media campaign helped its online charm.

However, observers said that since Hussains death, there has been a deterioration in ISIS hacking effort.

Its not clear what going beneath the surface.

Resource:The Daily Beast

Read More

source: www.techworm.net