Search Details

Word: hijacking (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...distribution network. The cornerstone of Lukashenko's regime has been his ability to run the economy on cheap Russian gas as well as to sell expensive products refined from cheap Russian crude oil to other customers in Europe. If Russia goes ahead with the cutoff, Belarus threatens to hijack gas designated for European customers that run in pipelines through its territory. Immediately affected would be neighbors like Poland and Lithuania as well the Russian Baltic Sea enclave of Kaliningrad...

Author: /time Magazine | Title: Belarus Heads Toward a New Year's Face-off With Putin | 12/28/2006 | See Source »

...CONVICTED. Mounir el-Motassadeq, 32, friend of three of the Sept. 11 hijackers; of being an accessory to murder in the 2001 attacks, overturning a 2004 decision clearing him due to lack of evidence; by a German appeals court; in Karlsruhe. The presiding judge said the fact that el-Motassadeq did not know the exact timing or targets of the attack was "irrelevant" because he knew of a plot to hijack airliners. El-Motassadeq, at liberty in Hamburg awaiting the verdict, faces up to 15 years in prison...

Author: /time Magazine | Title: Milestones | 11/20/2006 | See Source »

...address, which can be thought of, in simple terms, as a telephone number. Hizballah essentially added an extension on that telephone line allowing their traffic to flow. Hizballah then gets the word out through e-mail and blogs that it can be found at that IP address and the hijack is complete. If the hijack is not detected, the IP address can be linked to a new domain name and that opens up the site to anyone who might search online for Al-Manar content. Hizballah uses these Web sites to run recruitment videos and post bank account numbers where...

Author: /time Magazine | Title: How Hizballah Hijacks the Internet | 8/8/2006 | See Source »

...Hijackings are normally quickly discovered by the Society for Internet Research, an informal consortium of self-described "freelance counterterrorists" who sit in home offices and dens tracking jihadist activity on the Internet. In turn, they alert the media or simply call the hijacked company. Alerted to the south Texas hijack, the cable company's communications provider reported the incident to U.S. authorities and the IP address was shut down...

Author: /time Magazine | Title: How Hizballah Hijacks the Internet | 8/8/2006 | See Source »

...game is Aaron Weisburd, 42, a computer programmer who operates one of the Society's projects from his home office in southern Illinois. His Web site, Internet Haganah - the name is an homage to Israeli paramilitary fighters - tracks Hizballah and other groups as they wander the Web. Weisburd's hijack logs go back for several years and include the latest Hizballah hijacks since fighting began. "Notice to the jihadis in the audience," he writes on his site. "You can't hide...

Author: /time Magazine | Title: How Hizballah Hijacks the Internet | 8/8/2006 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | Next