Jihad Watch has been hacked

by 1389 on February 15, 2013

in 1389 (blog admin), e-jihad, malware, Spencer and Geller

Jihad Watch: Tech difficulties update

(h/t: Always On Watch)

Please Stand By

I really don’t have all that much to report, but I wanted to let you know I’m working on it. The situation is very much the same: the comments feature is still not working, it is still very difficult to post articles at all, and other features of the site are non-functional..

Several tech experts are working on the problem. Some malicious code has been found, which makes it likely that the site was hacked, although this hacking was not a conventional one: no eradication of the main page and its replacement by a taunting message, as is the usual practice. In fact, the malicious code is apparently (if I understand the explanation correctly, which is chancy at best, since I’m no techie) slow-acting, unfolding over time. We are looking into how it got there, and who planted it.

In any case, all I can say now is that we’re working on it and will have the site fully operational as soon as possible. This kind of action just shows yet again how desperately insecure and thuggish the enemies of freedom are — they can’t refute us, so they try to shut us down. And how many Leftist and Islamic supremacist sites do you ever hear about getting hacked?

Finally, thank you all very much for your many, many emails of concern and support.


{ 3 comments… read them below or add one }

1 Always On Watch February 16, 2013 at 6:39 am

I glad to see that you are posting this information.

As of a few minutes ago, Jihad Watch is still down. Mr. Spencer isn’t tweeting anything, either.

2 maria June 27, 2013 at 7:55 am

I am waiting for your news. Mr Spencer. You are one of the best new reporter I know.
I hope you are OK.

3 1389 June 27, 2013 at 8:06 am

@Maria,

This is an old post. Mr. Spencer and his site are just fine.

Unfortunately, Spencer and Geller have been banned from the UK.

Leave a Comment

{ 1 trackback }

Previous post:

Next post: