PrisonPlanet Forum

Globalization and the plan for New Word Order => Sciences + Technology => Computers => : StemCell August 30, 2008, 02:58:54 PM

: HACKING ATTACKS
: StemCell August 30, 2008, 02:58:54 PM
First city hall then the Tehama County Sheriff's Department.

These local Web sites are two of the 250,000 sites and counting that have been affected by a vulnerability in Microsoft Servers.

Until this week, searching for the TCSD on Google would yield a warning that "This site may harm your computer." But the problem was resolved almost immediately after it appeared in the first days of August, said Rich Moulton, whose Redding-based Computer Logistics services the TCSD.

"It was never a situation where it was a danger to anybody," Moulton said. "It was caught immediately and rendered harmless."

Had the hack been a worm or virus it would have still been kept from escaping because of the way the servers are set up, Moulton said. As for Google's warning, that will disappear as Google's systems automatically update.

Bill Hoblin, vice president of Computer Logistics, said the exploit works by adding or "injecting" data into an SQL (pronounced "sequel") database used to store Web site information, ranging from credit card numbers and passwords to pictures and text.

The data can do something as simple as redirect the user to another Web site but the latest efforts, thought to be from Russian hackers, are more complicated. In this hack a program hidden in the SQL feeds the data of visitors back to Russia ­ but the program is stopped by just about any anti-virus software, Hoblin said.

By comparison, Turkish hackers, whose redirects preceded the Russian hacks, "were just malicious."

"The Russians are more calculating," Hoblin said.

Previously the site for the city of Red Bluff was rendered inaccessible the weekend of Aug. 2, before coming back up and being temporarily blocked by Google.

Should the Sheriff Department's site be blocked by Google again, readers can reach the site by putting the address directly into the address bar, or searching for it with another browser, such as yahoo.com.
: How the government infected your computer with windows
: nofakenews April 18, 2009, 12:38:47 PM
FBI Spyware Has Been Snaring Extortionists and Hackers

A sophisticated FBI-produced spyware program has played a crucial behind-the-scenes role in federal investigations into extortion plots, terrorist threats and hacker attacks in cases stretching back at least seven years, newly declassified documents show.

As first reported by Wired.com, the software, called a "computer and internet protocol address verifier," or CIPAV, is designed to infiltrate a target's computer and gather a wide range of information, which it secretly sends to an FBI server in eastern Virginia. The FBI's use of the spyware surfaced in 2007 when the bureau used it to track e-mailed bomb threats against a Washington state high school to a 15-year-old student.

But the documents released Thursday under the Freedom of Information Act show the FBI has quietly obtained court authorization to deploy the CIPAV in a wide variety of cases, ranging from major hacker investigations, to someone posing as an FBI agent online. Shortly after its launch, the program became so popular with federal law enforcement that Justice Department lawyers in Washington warned that overuse of the novel technique could result in its electronic evidence being thrown out of court in some cases.

"While the technique is of indisputable value in certain kinds of cases, we are seeing indications that it is being used needlessly by some agencies, unnecessarily raising difficult legal questions (and a risk of suppression) without any countervailing benefit," reads a formerly-classified March 7, 2002 memo from the Justice Department's Computer Crime and Intellectual Property Section.

The documents, which are heavily redacted, do not detail the CIPAV's capabilities, but an FBI affidavit in the 2007 case indicate it gathers and reports a computer's IP address; MAC address; open ports; a list of running programs; the operating system type, version and serial number; preferred internet browser and version; the computer's registered owner and registered company name; the current logged-in user name and the last-visited URL.

After sending the information to the FBI, the CIPAV settles into a silent "pen register" mode, in which it lurks on the target computer and monitors its internet use, logging the IP address of every server to which the machine connects.

The documents shed some light on how the FBI sneaks the CIPAV onto a target's machine, hinting that the bureau may be using one or more web browser vulnerabilities. In several of the cases outlined, the FBI hosted the CIPAV on a website, and tricked the target into clicking on a link. That's what happened in the Washington case, according to a formerly-secret planning document for the 2007 operation. "The CIPAV will be deployed via a Uniform Resource Locator (URL) address posted to the subject's private chat room on MySpace.com."

In a separate February 2007, Cincinnati-based investigation of hackers who'd successfully targeted an unnamed bank, the documents indicate the FBI's efforts may have been detected. An FBI agent became alarmed when the hacker he was chasing didn't get infected with the spyware after visiting the CIPAV-loaded website. Instead, the hacker "proceeded to visit the site 29 more times," according to a summary of the incident. "In these instances, the CIPAV did not deliver its payload because of system incompatibility."

The agent phoned the FBI's Special Technologies Operations Unit for "urgent" help, expressing "the valid concern that the Unsub hackers would be 'spooked.'" But two days later the hacker, or a different one, visited the site again and "the system was able to deliver a CIPAV and the CIPAV returned data."

The software's primary utility appears to be in tracking down suspects that use proxy servers or anonymizing websites to cover their tracks. That's illustrated in several cases in the documents, including the 2004 hunt for a saboteur who cut off telephone, cable TV and internet service for thousands of Boston residents. The man's name is redacted from the documents, but the description of the case matches that of Danny Kelly, an unemployed Massachusetts engineer.

According to court records, Kelly deliberately cut a total of 18 communications cables belong to Comcast, AT&T, Verizon and others over a three month period. In anonymous extortion letters to Comcast and Verizon, Kelly threatened to increase the sabotage if the companies didn't begin paying him $10,000-a-month in protection money. He instructed the companies to deposit the cash in a new bank account and post the account information to a web page he could access anonymously.

When the FBI tried to track him down from his visits to the web page, they found he was routing through a German-based anonymizer. The FBI obtained a warrant to use the CIPAV on Feb. 10, 2005, and was apparently successful. Kelly went on to plead guilty to extortion, and was sentenced to five years probation.

The CIPAV also played a previously-unreported role in an investigation of a prolific computer hacker who made headlines after penetrating thousands of computers at Cisco, various U.S. national laboratories, and NASA's Jet Propulsion Laboratory in 2005. The FBI agent leading the case sought approval to plant a CIPAV through an undercover operative posing as a Defense Department contractor "with a computer network connected to JPL's computer network," according to one document. The FBI linked the intrusions to known 16-year-old hacker in Sweden.

And in 2005, FBI agents on the Innocent Images task force hit a wall when trying to track a sexual predator who'd begun threatening the life of a teenage girl he'd met for sex. The man's IP addresses were "from all over the world" -- a sign of web proxy use. The bureau sought and won court approval to use the CIPAV on Aug. 9, 2005.

Other cases are less weighty. In another 2005 case, someone was unwisely using the name of the chief of the FBI's Buffalo, New York office to harass people online. The FBI got a warrant to use the spyware to track down the fake agent.

Additional cases include:

In March 2006, the FBI investigated a hacker who took over a Hotmail user's account and acquired personal information. The hacker tried to extort the owner out of $10,000, demanding the victim create and fund an E-Gold account and e-mail the password to the hacker. The FBI obtained a search warrant allowing them to send the intruder a CIPAV instead, to uncover his or her location.
In October 2005, an undercover agent working a case described as "WMD (bomb & anthrax)" communicated with the suspect via Hotmail, and sought approval from Washington to use a CIPAV to locate the subject's computer.
In December 2005, FBI agents sought to use the spyware to track down another extortionist who sent an e-mail to a casino threatening violence.
In June 2005, an intruder deleted a database at an unnamed company and demanded payment to restore it. The FBI prepared a search warrant affidavit and was ready to ask a judge for authorization to deliver the CIPAV through the hacker's Yahoo e-mail account. They were briefly thwarted when the intruder stopped communicating with the victim, but after a month of silence the hacker reestablished contact and, presumably, got the FBI's spyware for his trouble.
The documents appear to settle one of the questions the FBI declined to answer in 2007: whether the bureau obtains search warrants before using the CIPAV, or if it sometimes relies on weaker "pen register" orders that don't require a showing of probable cause that a crime has been committed. In all the criminal cases described in the documents, the FBI sought search warrants.

The records also indicate that the FBI obtained court orders from the Foreign Intelligence Surveillance Court, which covers foreign espionage and terrorism investigations, but the details are redacted.

http://blog.wired.com/27bstroke6/2009/04/fbi-spyware-pro.html

: Re: How the government infected your computer with windows
: nofakenews April 18, 2009, 03:03:03 PM
More FBI Hacking: Feds Crack Wi-Fi to Gather Evidence

Buried in the 150 pages of CIPAV spyware-related documents released by the FBI Thursday is a tantalizing nugget that indicates the bureau's technology experts have more than one way to hack a suspect.

In early 2007, FBI agents with one of the bureau's International Terrorism Operations Sections sought hacking help from the FBI's geek squads. The agents were working a case in Pittsburgh, which is not described in the documents, and wanted to know "if [a] remote computer attack can be conducted against [the] target."

The FBI's Cryptographic and Electronic Analysis Unit, CEAU, responded with two options. One of them was redacted from the released document as a sensitive investigative technique. The other is described this way:  "CEAU advised Pittsburgh that they could assist with a wireless hack to obtain a file tree, but not the hard drive content."

Wi-fi hacking has featured prominently in some big cybercrimes, including the attack on TJ Maxx that exposed at least 45 million customer credit card numbers and other data. In that case, Albert "Segvec" Gonzalez and associates allegedly cracked the retailer's WEP key and used it to gain entry to the corporate network, where he planted packet sniffers to scoop up the data.

But this is the first evidence that the FBI is using the same tactics. Presumably, suspects using one of the better encryption options — like WPA-2 — are immune.

It's not clear why the FBI said it could only obtain a file tree — a hierarchical list of directories and files. It could be to avoid the risk of a judge later ruling that the search warrant was unconstitutionally over-broad, and consequently throwing out the evidence. Or maybe the bureau's hackers don't want to consume all of a target's bandwidth while copying his entire porn directory into the FBI van on the street
http://blog.wired.com/27bstroke6/2009/04/more-fbi-hackin.html
: Re: How the government infected your computer with windows
: Monkeypox April 18, 2009, 04:27:19 PM
If they're going after a suspected criminal (with good reason)  that's one thing.  But what concerns me is that they may go on "fishing expeditions" just to see what's on random peoples computers.

 :-\
: Re: How the government infected your computer with windows
: agentbluescreen April 18, 2009, 06:07:01 PM
If you have a firewall and do not ever use Internet Explorer or ever collect or read any email particularly over Outlook Express that is in HTML format have any netbios disabled these silly CIVAP port scanners can do nothing to gain access.

The number one vulnerability in Windows relies upon the originally software pirated hacks of the Mosaic web browser software (hacked as mshtml.dll) and the netscape Javascript software (jscript.dll) which were also augmented with the king of all file system infectors ActiveX.

When they 'borrowed' this software and reverse engineered it they sought to conceal their unlicensed misdeeds by adding it to the old Windows File Manager, as a hidden dynamic link library in their fancy new (W95) "Windows Explorer" software so they could go to court and claim the software they reverse engineered (so the code was now unrecognizable) and added to Windows  "had always been a part of Windows".  Where in fact the new Windows Explorer has always been and was just another name for Internet Explorer making the file management system on their OS into a web browser that could be scripted (by the script and ActiveX stuff told it on web pages) to behave as a web server and a remote file management system!

Thus in Windows/Internet Exploder any (especially Local or Trusted Zone) web page can take some degree of control over your computer from you behind your back, and virtually all the "Security Patches" that endlessly issue form Microsoft are vain attempts to cripple or block these nefarious behaviors which can also often still be accomplished backwards by causing buffer overflows (memory space overwrites) that can be later activated to mimic shorter genuine supposedly now-forbidden instructions.

Now about the chances of you running into a hostile script or ActiveX control:

They are in fact very high and it's childs play for a spook to put a proxy server between your cable or dsl modem and the real internet, such that this proxy server can add these controls or scripts to any page you view it wants to, in place of a spoofed link on the spoofed copy of the commonly visited page it forces you to see instead of the real mcCoy. This is much harder or impossible to do on encrypted https:// connections which must always produce and show a valid certificate, but not impossible to those with pals at Verisign

The file directory alone thing is an old trick that allows Javascript or Jscript to save the data it has access to into code in a cookie that can then be recovered by the server you visit or uses a hidden popup window in the background. This is basically the same utility that allows you to navigate to a file on your computer to upload it which is something that only you manually and never a script alone should be able to (but this also was carried to moving copying renaming and uploading so walling off these things into a harmless sandbox was the first security issue they tried to tackle). Some of the common file tree names generic to Windows are also totally easy to hack since everybody uses \My Documents\ folders and a host of other common foldernames in common places.


So firstly insist on good old text format only email and use a third party email program without or that does not rely on Windows IE to render HTML (Eudora etc)

Second use a third party web browser that does not have the poorly-patched unlimited privileges of IE/WE to mess with your computer.

Use a good firewall or better yet a third party residential gateway router , and if you need  WiFi do not broadcast even an encrypted open SSID since this invites WEP password hacking and even mac address spoofing. Use a hidden private name SSID (that needs to be guess first) and then configure your wireless routers DHCP server to authorize and give IP leases only the unique hard-coded hardware network mac addresses of the equipment you own and use wirelessly (and those need to be guessed next in addition to WEP especially if you live way out in the country but - encryption is always good).

Minimize or eliminate all remote assistance, remote desktop and use minimal if any file sharing (password protected) over your local network. Limiting such to hardwired ethernet wherever possible.

And for good measure disable all third party add-ons, scripting, and ActiveX controls in IE for both the local (downloaded email) and internet zones and don't use it unless the world is ending. (Get Firefox, Opera, Gekko anything that doesn't use IE's rendering engine and don't be fooled by Chrome skin seatcovers for IE)

ActiveX is by far the worse thing on earth for Windoze since it can run programs start servers install software, worms or spy or malware as it pleases once you turn any unknown (Downloaded Program Files) control on.
: Re: How the government infected your computer with windows
: agentbluescreen April 18, 2009, 06:31:37 PM
Straying further from the topic some non-Windows related stuff:

Use Scroogle.org instead of Google invest in and install a good undesireable "hosts" ad-server-farm blocking file

(ads loaded from places like google and doubleclick on innocent webpages leave you a cookie when they are loaded, and that 'blah.doubleclick.com cookie' can then be read by that family of servers when you load a 'moe.doubleclick.com'  ad on the next page you visit, so they can see you visiting here, and then there, and then there, and then...)

If you are really paranoid uses encrypted port tunnelling to ghost proxy servers or anonymizers to visit sites you want to be isolated from. They're a bit klutzy (a remote web browser running on on a remote webserver-host's client side (its IP address) it visits and you see as a 'webpage within a webpage') but they are the only thing that can at least indirectly keep your IP address out of the DHS and CIA logfiles.


: Re: How the government infected your computer with windows
: dissident99 April 18, 2009, 06:38:58 PM
The simplest way to avoid any viruses or Trojans is to use Linux and Tor.
Try Ubuntu and install TOR or Fedora and TOR and TPTB cannot do $h1t !!

Peace
: Re: How the government infected your computer with windows
: cathiasus April 18, 2009, 06:47:41 PM
What about guberment-dipped SE Linux?
http://en.wikipedia.org/wiki/Selinux (http://en.wikipedia.org/wiki/Selinux)
: Re: How the government infected your computer with windows
: Dig April 18, 2009, 06:50:09 PM
Look up IGI, Larry Potts, Clinton, Windows, Bill Gates for more fun.
: Re: How the government infected your computer with windows
: Monkeypox April 18, 2009, 09:57:25 PM

Try Ubuntu and install TOR or Fedora and TOR and TPTB cannot do $h1t !!
 

Do you really believe the NSA is powerless against Linux?

 :-\
: Re: How the government infected your computer with windows
: robert5 April 20, 2009, 03:41:05 PM
Do you really believe the NSA is powerless against Linux?

yes, especially when it is configured properly.

however, windroids like you could really never grasp that concept.
: Re: How the government infected your computer with windows
: Dig April 20, 2009, 03:45:49 PM
yes, especially when it is configured properly.

however, windroids like you could really never grasp that concept.

What is the configuration?
: Re: How the government infected your computer with windows
: Monkeypox April 20, 2009, 06:54:17 PM
yes, especially when it is configured properly.

however, windroids like you could really never grasp that concept.

Don't be an ass.

BTW genius, I use Linux.
: Re: How the government infected your computer with windows
: lost202a April 20, 2009, 07:32:31 PM
No the problem with Microsoft they are so rich and have such a monoply they do not care.If you want malware ,spyware ,adware ,virus and such get windows .Every weak you will be downloadind updates and explots hackers find to get into your computer or put malware.

Well Linux is open sorce and anyone can change the programing code.The code is out in the open so hackers know the code for Linux .So the explots can be patched.

And because there is different version and anyone can work on it or fix it and update it it is better . Well Microsoft programming in done in India where it is compartmentalize using slave labor where people are tired ,hate the US ,hate Microsoft  ,do not know what the other guy is doing  ,do not know if there is enough water or food on their table after work and nothing in it for them.

Than Microsoft do some testing than release the beta testing and this where fun starts where problems and exploits are found !! After the beta testing you go to store and buy it .But there is still exploits and problems and this where SP1 or SP 2 come in.

I have had windows 3.1 ,95 ,98 ,me ,2000 ,xp and vista and all had problems. It takes year or more after release to the balk of the problems are fixed. But even than there are still updates and exploits hackers find.


The NSA claim to be able to monitor cell phone ,lan line ,email ,internet and so on.And any internet packet traveling on the net can be intercepted. Anyone can do it the quetion do you have smarts how to do it and hardware/software to do it.I'm sure NSA can brake encryption most people use.


: Re: How the government infected your computer with windows
: Lucian Solaris April 20, 2009, 09:59:57 PM
Property seized for being a Linux using computer enthusiast!!!  (http://forum.prisonplanet.com/index.php?topic=99528.0)

In a separate February 2007, Cincinnati-based investigation of hackers who'd successfully targeted an unnamed bank, the documents indicate the FBI's efforts may have been detected. An FBI agent became alarmed when the hacker he was chasing didn't get infected with the spyware after visiting the CIPAV-loaded website. Instead, the hacker "proceeded to visit the site 29 more times," according to a summary of the incident. "In these instances, the CIPAV did not deliver its payload because of system incompatibility."
: Re: How the government infected your computer with windows
: Lucian Solaris April 21, 2009, 01:12:11 AM
bump
: Technology, Policy, Law & Ethics Regarding US Acquisition & Use of Cyberattacks
: BravoLima May 01, 2009, 08:50:10 AM
http://www.nap.edu/catalog.php?record_id=12651 (http://www.nap.edu/catalog.php?record_id=12651)
Technology, Policy, Law & Ethics Regarding US Acquisition & Use of Cyberattack Capabilities
Or how the US Shadow Government has been attacking InfoWars this week to suppress the truth about their crimes against We the People of these united Sovereign State Republics and all humanity.

BravoLima
LIBERTY or DEATH!
: Re: How the government infected your computer with windows
: halfawake May 06, 2009, 04:25:40 PM
Interesting thread! Actually, the government would find my computer pretty boring but I would worry more about them planting something illegal on it to frame me for visiting patriot sites.
: Re: How the government infected your computer with windows
: luckee1 May 07, 2009, 09:44:20 PM
Interesting thread! Actually, the government would find my computer pretty boring but I would worry more about them planting something illegal on it to frame me for visiting patriot sites.

yep!!!

and that is why i keep reading these threads/  I pick up here and there.  I am learning despite being a windroid. 
: Re: How the government infected your computer with windows
: oshea.declan May 07, 2009, 10:09:18 PM



The NSA claim to be able to monitor cell phone ,lan line ,email ,internet and so on.And any internet packet traveling on the net can be intercepted. Anyone can do it the quetion do you have smarts how to do it and hardware/software to do it.I'm sure NSA can brake encryption most people use.




The analogy I use is to think of your Internet use as driving your car on the highway - you are on the information superhighway - of course people can see the color of your car - the registration - how many windows you have - make of car - a Ford or a Chevy - sometimes  a convertible and people on the sidewalk can see what's on your back seat - what shopping you have ... etc ... Once you're on-line it's like driving on the road -- don't expect to be invisible because you're not - far from it - especially if you're using windows - as soon as you switch on your computer it's already connecting to half a dozen different servers on the internet - e.g. windows time server - your isp - your home page if set on browser ... etc ... also your kernel is pinging your modem/router - services are ... etc ... all this info is a piece of cake for Govt agencies to collect as soon as you connect   --- The best advice I could suggest is to switch to linux and configure it properly - you're still on the information superhighway but you can tint those windows and spray flash photo blocker on your reg. plates (metaphorically)
: Hackers breach UC Berkeley computer database
: Monkeypox May 10, 2009, 04:56:31 AM
http://apnews.myway.com//article/20090508/D982ARN00.html

SAN FRANCISCO (AP) - University of California, Berkeley, officials said Friday that hackers infiltrated restricted computer databases, putting at risk health and other personal information on 160,000 students, alumni and others.

The university said data include Social Security numbers, birth dates, health insurance information and some medical records dating back to 1999. Personal medical records - such as patient diagnoses, treatments and therapies - were not compromised, officials said.

The databases also included personal information of parents, spouses and Mills College students who used or were eligible for Berkeley's health services.

In all, 97,000 Social Security numbers were stolen, said Shelton Waggener, UC Berkeley's associate vice chancellor for information technology and its chief information officer.

Social Security numbers can be used by identity thieves to access a person's current credit history, or bank and credit card accounts, according to the California Office of Privacy Protection. The numbers can also be used to open new bank and credit accounts, or even get a driver's license in the victim's name, privacy-protection officials warn.

The school has identified 160,000 total names in the database and contacted everyone regardless of whether their Social Security number also was compromised.

The server breach occurred on Oct. 6, 2008, and lasted until April 9, when campus staff performing routine maintenance found messages the school said were left by the hackers.

"The indications are that the hackers left messages to the system administrator taunting the system administrator that they had broken in," Waggener said. "It's a common hacker approach for identifying themselves."

The school said it had traced the hackers' computers to a number of overseas locations, including China, and turned that information over to the FBI and campus police. An outside Internet security firm has also been hired to conduct an audit of the school's systems and its information security measures.

Although the breach was discovered April 9, former and current students did not receive e-mail notification of the hacks until Friday morning. The university said it took forensic technology experts until April 21 to figure out which databases were hacked.

"Since then a team of more than 20 people from across the campus have been working seven days a week to determine the exact scope and nature of the breach," the school said.

It established a Web site at to answer questions about the incident.http://datatheft.berkeley.edu

Graduate student Kate Monroe, 27, said she was taking the school's warning seriously and planned to have a free fraud alert added to her credit report.

"My mom has dealt with identity theft and it's no joke," Monroe said. "Getting her identity cleaned up has been nearly impossible."

The school said Friday it had not received any reports of identity theft from any students who were notified.

In March 2005, a thief walked into a UC Berkeley office and swiped a computer laptop containing personal information on nearly 100,000 alumni, graduate students and past applicants. Officials said that laptop was recovered before any personal information was breached.

Six months earlier, a computer hacker gained access to UC Berkeley research being done for the state Department of Social Services. Those files contained personal information of about 600,000 people.

: Re: Hackers breach UC Berkeley computer database
: donnay May 10, 2009, 05:49:55 AM
Oh no! Save us from the evil hackers!!  :o

Do they really think we are that stupid---don't answer that.  *SIGH*
: Re: Hackers breach UC Berkeley computer database
: robert5 May 11, 2009, 02:52:36 PM
http://apnews.myway.com//article/20090508/D982ARN00.html

SAN FRANCISCO (AP) - University of California, Berkeley, officials said Friday that hackers infiltrated restricted computer databases, putting at risk health and other personal information on 160,000 students, alumni and others.

The university said data include Social Security numbers, birth dates, health insurance information and some medical records dating back to 1999. Personal medical records - such as patient diagnoses, treatments and therapies - were not compromised, officials said.

The databases also included personal information of parents, spouses and Mills College students who used or were eligible for Berkeley's health services.

In all, 97,000 Social Security numbers were stolen, said Shelton Waggener, UC Berkeley's associate vice chancellor for information technology and its chief information officer.

Social Security numbers can be used by identity thieves to access a person's current credit history, or bank and credit card accounts, according to the California Office of Privacy Protection. The numbers can also be used to open new bank and credit accounts, or even get a driver's license in the victim's name, privacy-protection officials warn.

The school has identified 160,000 total names in the database and contacted everyone regardless of whether their Social Security number also was compromised.

The server breach occurred on Oct. 6, 2008, and lasted until April 9, when campus staff performing routine maintenance found messages the school said were left by the hackers.

"The indications are that the hackers left messages to the system administrator taunting the system administrator that they had broken in," Waggener said. "It's a common hacker approach for identifying themselves."

The school said it had traced the hackers' computers to a number of overseas locations, including China, and turned that information over to the FBI and campus police. An outside Internet security firm has also been hired to conduct an audit of the school's systems and its information security measures.

Although the breach was discovered April 9, former and current students did not receive e-mail notification of the hacks until Friday morning. The university said it took forensic technology experts until April 21 to figure out which databases were hacked.

"Since then a team of more than 20 people from across the campus have been working seven days a week to determine the exact scope and nature of the breach," the school said.

It established a Web site at to answer questions about the incident.http://datatheft.berkeley.edu

Graduate student Kate Monroe, 27, said she was taking the school's warning seriously and planned to have a free fraud alert added to her credit report.

"My mom has dealt with identity theft and it's no joke," Monroe said. "Getting her identity cleaned up has been nearly impossible."

The school said Friday it had not received any reports of identity theft from any students who were notified.

In March 2005, a thief walked into a UC Berkeley office and swiped a computer laptop containing personal information on nearly 100,000 alumni, graduate students and past applicants. Officials said that laptop was recovered before any personal information was breached.

Six months earlier, a computer hacker gained access to UC Berkeley research being done for the state Department of Social Services. Those files contained personal information of about 600,000 people.



Lets see what type of servers Berkeley is running.
http://datatheft.berkeley.edu

Content-Length  25719
Content-Type     text/html
Server               Microsoft-IIS/6.0
X-Powered-By    ASP.NET

again, Microsoft & their shoddy software.
: Re: Hackers breach UC Berkeley computer database
: wvoutlaw2002 May 12, 2009, 01:14:12 PM
Wasn't BSD created at UC Berkeley?
: Re: Hackers breach UC Berkeley computer database
: robert5 May 15, 2009, 01:18:17 AM
Wasn't BSD created at UC Berkeley?

yes, it was. but that does not mean that the campus administration uses it.
: China blocks U.S. from cyber warfare
: Letsbereal May 15, 2009, 02:10:51 PM
China blocks U.S. from cyber warfare
12 May 2009
, by Bill Gertz (The Washington Times)
http://www.washingtontimes.com/news/2009/may/12/china-bolsters-for-cyber-arms-race-with-us/

version of this story incorrectly stated the number of cyber intrusions detected by the security firm Solutionary in March. It was 128 per minute. The story also misidentified Kevin G. Coleman, a computer security specialist at Technolytics. He is a consultant to the office of the director of national intelligence. Both errors have been corrected in this version.
China has developed more secure operating software for its tens of millions of computers and is already installing it on government and military systems, hoping to make Beijing's networks impenetrable to U.S. military and intelligence agencies.

The secure operating system, known as Kylin, was disclosed to Congress during recent hearings that provided new details on how China's government is preparing to wage cyberwarfare with the United States.

"We are in the early stages of a cyber arms race and need to respond accordingly," said Kevin G. Coleman, a private security specialist who advises the government on cybersecurity. He discussed Kylin during a hearing of the U.S. China Economic and Security Review Commission on April 30.

The deployment of Kylin is significant, Mr. Coleman said, because the system has "hardened" key Chinese servers. U.S. offensive cyberwar capabilities have been focused on getting into Chinese government and military computers outfitted with less secure operating systems like those made by Microsoft Corp.

"This action also made our offensive cybercapabilities ineffective against them, given the cyberweapons were designed to be used against Linux, UNIX and Windows," he said.

The secure operating system was disclosed as computer hackers in China - some of them sponsored by the communist government and military - are engaged in aggressive attacks against the United States, said officials and experts who disclosed new details of what was described as a growing war in cyberspace.

These experts say Beijing's military is recruiting computer hackers for its forces, including one specialist identified in congressional testimony who set up a company that was traced to attacks that penetrated Pentagon computers.

Chinese Embassy spokesman Wang Baodong declined immediate comment. But Jiang Yu, a Chinese Foreign Ministry spokesman, said April 23 that the reports of Chinese hacking into Pentagon computers were false.

"Relevant authorities of the Chinese government attach great importance to cracking down on cybercrimes," Ms. Jiang said. "We believe it is extremely irresponsible to accuse China of being the source of attacks prior to any serious investigation."

Mr. Coleman, a computer security specialist at Technolytics and a consultant to the office of the director of national intelligence and U.S. Strategic Command, said Chinese state or state-affiliated entities are on a wartime footing in seeking electronic information from the U.S. government, contractors and industrial computer networks.

Mr. Coleman said in an interview that China's Kylin system was under development since 2001 and the first computers to use it are government and military servers that were converted beginning in 2007.

Additionally, Mr. Coleman said, the Chinese have developed a secure microprocessor that, unlike U.S.-made chips, is known to be hardened against external access by a hacker or automated malicious software.

"If you add a hardened microchip and a hardened operating system, that makes a really good solid platform for defending infrastructure [from external attack]," Mr. Coleman said.

U.S. operating system software, including Microsoft, used open-source and offshore code that makes it less secure and vulnerable to software "trap doors" that could allow access in wartime, he explained.

"What's so interesting from a strategic standpoint is that in the cyberarena, China is playing chess while we're playing checkers," he said.

Asked whether the United States would win a cyberwar with China, Mr. Coleman said it would be a draw because China, the United States and Russia are matched equally in the new type of warfare.

Rafal A. Rohozinski, a Canadian computer security specialist who also testified at the commission hearing, explained how he took part in a two-year investigation that uncovered a sophisticated worldwide computer attack network that appeared to be a Chinese-government-sponsored program called GhostNet, whose electronic strikes were traced to e-mails from Hainan island in the South China Sea.

GhostNet was able to completely take over targeted computers and then download documents and information. Some of the data stolen were sensitive financial and visa information on foreign government networks at overseas embassies, Mr. Rohozinski said.

The China-based computer network used sophisticated break-in techniques that are generally beyond the capabilities of nongovernment hackers, Mr. Rohozinski said.

Using surveillance techniques, the investigators observed GhostNet hackers stealing sensitive computer documents from embassy computers and nongovernmental organizations.

"It was a do-it-yourself signals intelligence operation," Mr. Rohozinski said of the network, which took over about 1,200 computers in 103 nations, targeted specifically at overseas Tibetans linked to the exiled Dalai Lama.

Mr. Rohozinski, chief executive officer of the SecDev Group and an advisory board member at the Citizen Lab at the Munk Center for International Studies at the University of Toronto in Ontario, said the GhostNet operation was likely part of a much bigger cyberintelligence effort by China to silence or thwart its perceived opponents.

A third computer specialist, Alan Paller, told the Senate Committee on Homeland Security and Governmental Affairs on April 29 that China's military in 2005 recruited Tan Dailin, a graduate student at Sichuan University, after he showed off his hacker skills at an annual contest.

Mr. Paller, a computer security specialist with the SANS Institute, said the Chinese military put the hacker through a 30-day, 16-hour-a-day workshop "where he learned to develop really high-end attacks and honed his skills."

A hacker team headed by Mr. Tan then won other computer warfare contests against Chinese military units in Chengdu, in Sichuan province.

Mr. Paller said that a short time later, Mr. Tan "set up a little company. No one's exactly sure where all the money came from, but it was in September 2005 when he won it. By December, he was found inside [Defense Department] computers, well inside DoD computers," Mr. Paller said.

A Pentagon official said at the time that Chinese military hackers were detected breaking into the unclassified e-mail on a network near the office of Defense Secretary Robert M. Gates in June 2007.

Additional details of Chinese cyberattacks were disclosed recently by Joel F. Brenner, the national counterintelligence executive, the nation's most senior counterintelligence coordinator.

Mr. Brenner stated in a speech in Texas last month that cyberactivities by China and Russia are widespread and "we know how to deal with these," including widely reported "Chinese penetrations of unclassified DoD networks."

"Those are more sophisticated, though hardly state of the art," he said. "Frankly, I worry more about attacks we can't even see, which the Russians are good at. The Chinese are relentless and don't seem to care about getting caught. And we have seen Chinese network operations inside certain of our electricity grids."

Mr. Brenner said there are minimal concerns about a Chinese cyberattack to shut down U.S. banking networks because "they have too much money invested here.

"Our electricity grid? No, not now. But if there were a dust-up over Taiwan, these answers might be different," he said.

Aggressive Chinese computer hacking has been known for years, but the U.S. government in the past was reluctant to detail the activities.

The CIA, for example, sponsored research in the late 1990s that sought to minimize Chinese cyberwarfare capabilities, under the idea that highlighting such activities would hype the threat.

Researcher James Mulvenon, for instance, stated during a 1998 conference that China's People's Liberation Army (PLA) "does not currently have a coherent [information warfare] doctrine, certainly nothing compared to U.S. doctrinal writings on the subject."

Mr. Mulvenon stated in one report that "while PLA [information warfare] capabilities are growing, they do not match even the primitive sophistication of their underlying strategies."

Mr. Mulvenon has since changed his views and has identified Chinese computer-based warfare as a major threat to the Pentagon.

Mr. Coleman said China's military is equal to U.S. and Russian military cyberwarfare.

"This is a three-horse race, and it is a dead heat," Mr. Coleman said.

The National University of China is the strategic adviser to the Chinese military on cyberwarfare and the Ministry of Science and Technology, he said.

Several computer security specialists recently sounded public alarm about the growing number of cyberattacks from China and Russia.

China, based on state-approved writings, thinks the United States is "already is carrying out offensive cyberespionage and exploitation against China," Mr. Coleman said.

In response, China is taking steps to protect its own computer and information networks so that it can "go on the offensive," he said.

Mr. Coleman said one indication of the problem was identified by Solutionary, a computer security company that in March detected 128 "acts of cyberagression" per minute tied to Internet addresses in China.

"These acts should serve as a warning that clearly indicates just how far along China's cyberintelligence collection capabilities are," Mr. Coleman said.

A Pentagon spokesman, Air Force Lt. Col. Eric Butterbaugh, would not comment on Chinese cyberattacks directly but said "cyberspace is a war-fighting domain, critical to military operations: We must protect it."

The Pentagon's Global Information Grid is hit with "millions of scans" - not intrusion attempts - every day, Lt. Butterbaugh said.

"The nature of the threat is large and diverse, and includes recreational hackers, self-styled cybervigilantes, various groups with nationalistic or ideological agendas, transnational actors, and nation-states," he said. "We have seen attempts by a variety of state and nonstate sponsored organizations to gain unauthorized access to, or otherwise degrade, DoD information systems."

Air Force Gen. Kevin Chilton, commander of the U.S. Strategic Command, said May 7 that a joint cybercommand is needed under the Pentagon to better integrate military and civilian cybercapabilities and defenses. Gen. Chilton said he favors creating the joint command at Fort Meade, Md., where the National Security Agency is located. The command should be a subunit of Strategic Command, located at Offutt Air Force Base, Neb.

Mr. Gates said last month that the National Security Council is heading up a strategic review of U.S. cybercapabilties and is considering creating a subunified command within Strategic Command.

Pentagon spokesman Bryan Whitman said Mr. Gates has not decided on the subunified command to handle cyberwarfare issues and is waiting for the completion of the White House review of cyberwarfare and security issues, which is past due from the 60-day deadline imposed by Congress.

Mr. Gates "thought it would be prudent to wait for their work before looking at potential organization structures," Mr. Whitman said in an interview.

Bill Gertz Contact: http://www.washingtontimes.com/staff/bill-gertz/contact


China blocks U.S. from cyber warfare http://tinyurl.com/ozhn4q
: Re: China blocks U.S. from cyber warfare
: Monkeypox May 16, 2009, 01:49:19 AM
"This action also made our offensive cybercapabilities ineffective against them, given the cyberweapons were designed to be used against Linux, UNIX and Windows," he said.

For those of you who think you're totally secure using Linux or UNIX.

 ;)
: The Possible Reason The Forum Was Hacked!!!
: TheWeavingSpider June 23, 2009, 09:18:28 PM
I think that the possible reason for the forum being hacked was to steal all our account info (passwords, usernames, ect.) so that someone posing as one of us posts some sorta nonsense and gets some of us in trouble, then a news story about "Dangerous Truthers" pops up and the infowar agianst us is furthered and reaches a new high.

I think that maybe another Oswald may happen here, meaning that someone could pose as one of us, create a topic discussing some dangerous activity (like an assassination attempt, or a bombing or something), then a CIA operative caries it out, and one of us are blamed for it. Then of course the first scenario would more then likely play out as well.

Give me your opinions and ideas, I'd really like to get Lucian Solaris's take on this since he seems to be savy when it comes to tech.
: Re: The Possible Reason The Forum Was Hacked!!!
: trailhound June 23, 2009, 09:26:14 PM
lol made we had a good laugh at your expense sunday night i think it was. You were just posting away and whole gang of us were hanging out on the propagandamatrix forum chatting and watching the Prison Planet Forum. We could lurk but not post. Anyways we were wandering if you suspected something was wrong.  :)
: Re: The Possible Reason The Forum Was Hacked!!!
: TheWeavingSpider June 23, 2009, 09:31:07 PM
lol made we had a good laugh at your expense sunday night i think it was. You were just posting away and whole gang of us were hanging out on the propagandamatrix forum chatting and watching the Prison Planet Forum. We could lurk but not post. Anyways we were wandering if you suspected something was wrong.  :)

What are you talking about? Which thread was this?

I know I posted a few times in the "Did the forum get hacked?" thread, but not much in any other forum, never even heard of Propaganda Matrix til someone from the Infowars tech staff directed me towards it.
: Re: The Possible Reason The Forum Was Hacked!!!
: Monkeypox June 23, 2009, 10:17:11 PM
I think that the possible reason for the forum being hacked was to steal all our account info (passwords, usernames, ect.) so that someone posing as one of us posts some sorta nonsense and gets some of us in trouble, then a news story about "Dangerous Truthers" pops up and the infowar agianst us is furthered and reaches a new high.

I think that maybe another Oswald may happen here, meaning that someone could pose as one of us, create a topic discussing some dangerous activity (like an assassination attempt, or a bombing or something), then a CIA operative caries it out, and one of us are blamed for it. Then of course the first scenario would more then likely play out as well.

Give me your opinions and ideas, I'd really like to get Lucian Solaris's take on this since he seems to be savy when it comes to tech.

I agree.  I said that exact thing to some other members in a PM today.
: Re: The Possible Reason The Forum Was Hacked!!!
: Boubear June 23, 2009, 10:20:01 PM
That's why it's important, to change your password now, if you haven't already!!
: Re: The Possible Reason The Forum Was Hacked!!!
: trailhound June 23, 2009, 10:31:57 PM
What are you talking about? Which thread was this?

I know I posted a few times in the "Did the forum get hacked?" thread, but not much in any other forum, never even heard of Propaganda Matrix til someone from the Infowars tech staff directed me towards it.

http://forum.prisonplanet.com/index.php?topic=112443.msg702812#msg702812

http://forum.prisonplanet.com/index.php?topic=112416.msg702803#msg702803

http://forum.prisonplanet.com/index.php?topic=112438.msg702802#msg702802

http://forum.prisonplanet.com/index.php?topic=111806.msg702782#msg702782

http://forum.prisonplanet.com/index.php?topic=111806.msg702780#msg702780

http://forum.prisonplanet.com/index.php?topic=111806.msg702779#msg702779

Not that many but it was funny at the time :D
: Re: The Possible Reason The Forum Was Hacked!!!
: TheWeavingSpider June 23, 2009, 11:38:19 PM
That's why it's important, to change your password now, if you haven't already!!

Good idea boubear.
: Re: The Possible Reason The Forum Was Hacked!!!
: moxiez June 23, 2009, 11:47:33 PM
That's why it's important, to change your password now, if you haven't already!!

It's quite worthless since the account management portion of this forum is HTTP (and not HTTPS)... your new password will be sent over the wire in plaintext, sniffable by any g'uberment router (see AT&T closet in SF for example):

(http://secondpagemedia.com/blog/wp-content/uploads/2009/04/641a.jpg)
Room 641a at AT&T's San Francisco switching center

But then again, if it was another sub-group... maybe it would be prudent! ;)
: Re: The Possible Reason The Forum Was Hacked!!!
: Lucian Solaris June 23, 2009, 11:52:06 PM
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Yea, shit happens.  I did forum 'sploiting back in the day but nothing like SQL injection.  I'm sure this was most likely a DoS (not a DDoS) to bring the forum to its knees.  Anything that knocks down a service is a DoS attack, unless it's a distributed effort (then it's a DDoS).

SQL injections are between moderate to dangerous vulnerabilities; moderate in the sense that cleanup is gonna be messy, dangerous in the sense of information harvesting like password hashes.  I figure many of you have weak passwords (dictionary words or passwords 8 chars or less) and I am willing to bet that many in THAT group use the same password for at least their e-mail accounts.

The worst case compromise would be one that got MySQL to dump e-mail addresses, usernames, and password hashes.  Why?  Because it's trivial to run those hashes against a Rainbow Table.

This security issue applies to almost anything that takes user input, processes it, and stores it in a database.  If the PHP/ASP was written lacking input sanity checks, you get SQL injection vulnerabilities (which is LIKE a buffer overflow).  I doubt it's the admin's fault for this, as I'm sure he's either multi-hatted and cannot worry about upgrading to the latest edition of SMF each time an edition comes out, or the admin isn't paid enough.  Shit happens and you get this.

I am willing to assist in any way technically for free, though I'm sure there are people on payroll who know more than I do.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 - *.:{Hack.I.T Edition r0001}:.*

iJ4EAREKAAYFAkpBZ7gACgkQ+7Rzy15t3vZ5tQIAkFP4zbpnnkdVQcA87GgUeofY
crLeDrBbLQHFHaZvDdkQ2AkKxFHOb2ge0rpPO//qK/eld4S3u1AFZ6MZ6RNvOgH/
Q+BRP89FJcWBf7rk8PN6ivgr6k55aDsv2mSD6BXpdHS+V6AMCZAwtFbB2Hd3ZRVP
uc61MTelvaMaYOI3Ky+sKQ==
=XaSb
-----END PGP SIGNATURE-----
: Re: The Possible Reason The Forum Was Hacked!!!
: Femacamper June 24, 2009, 01:11:03 AM
I'm changing my password just for posterity.
: Re: The Possible Reason The Forum Was Hacked!!!
: Lucian Solaris June 24, 2009, 01:36:20 AM
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

My password has been changed to something LIKE:
kKe4@h8fVcoy3NDv

Obviously the above password is an example and it has not been, nor ever will be, used by me.  I like to use paranoid passwords for obvious reasons, as it twarts all but the largest rainbow tables, and they are a pain in the ass to brute force.

Actually, if I may make a request, that this forum support the use of Public/Private cryptographic keys for user login as a choice.  It would eliminate the need for a password AND it would be of no use if the public key the server has is 'compromised', as only the private key (the one you keep secret and use for login) is the counterpart to your public key.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 - *.:{Hack.I.T Edition r0001}:.*

iJ4EAREKAAYFAkpBuxoACgkQ+7Rzy15t3vYu4AIAjT1fb8RWvf/yIQ5L5kDPkz+A
QSKUYyFepTMFLvesZizkO6bn875YT29Ii0tIk4u7IZi8xQ2muagera4RiGKktAH9
HfQh85Iyg8myVM54wKBZnTKx2FFSQOXsOx3wp8ueXWxkvuRSFN0WOuMdKZYr+ewK
P2ZUz/DVcPeER3kVU7Il1w==
=9WBC
-----END PGP SIGNATURE-----

I'm changing my password just for posterity.
: Turmoil fuels 'hacktivist' attacks on Web sites
: Monkeypox June 25, 2009, 04:39:35 PM
http://apnews.myway.com//article/20090625/D991I4VG0.html

By JORDAN ROBERTSON
 

SAN FRANCISCO (AP) - For about 90 minutes Wednesday, visitors to the Oregon University System's Web site found themselves taken for a ride they didn't ask for. They were redirected to another site under the control of a hacker, who posted an 89-word screed criticizing the protests in Iran.

"We never cheated in elections," the site read, in black and red. The message included invective aimed at President Barack Obama and made derogatory comments about Iranian opposition leader Mir Hossein Mousavi, who claims the June 12 presidential election was rigged.

As Internet attacks go, this type isn't uncommon, and the site was quickly restored to normal. The attack also didn't appear to harm visitors' machines: The site appeared to only serve up a political message rather than a computer virus, as some hacked sites carry. Very few people were likely affected, too: The site averages fewer than 1,000 hits a day.

What the incident shows, though, is how political turmoil can spill quickly into unexpected parts of the Internet, as sites that have nothing to do with a conflict often get hijacked and turned into bully pulpits for so-called "hacktivists" bent on advancing a political cause, rather than making money.

"It's a bit like graffiti on the subway," said Graham Cluley, senior technology consultant with Sophos, a computer security software company. "Web sites that aren't properly protected are like blank subway walls. Hackers can come by and spray their political messages."

The schism in Iran over the disputed presidential election has already led to a range of Internet attacks. Some activists have been urging supporters to try to take down government sites with so-called "denial-of-service" attacks, in which the sites are flooded with so much Internet traffic that their servers buckle. Mounting those attacks can be relatively easy using widely available hacking programs.

That assault may be working: Many official Iranian sites are currently inaccessible, though it's unclear whether the outages are hacking-related. For its part, Iran has employed filtering technology to restrict what sites people in the country can visit.

The incident at the Oregon University System, which oversees Oregon's seven public universities, is just one example of what happens repeatedly whenever a political conflict flares these days. The war in Iraq, fighting in Israel, the Beijing Olympics and the Russia-Georgia conflict all saw examples of hackers commandeering sites to push their political message.

Sites that are hacked in this way aren't necessarily targeted for their political affiliations. Instead, hackers seek them out because of security vulnerabilities in their computer networks. Those vulnerabilities can be simple to find with automated tools hackers have built to sniff out weaknesses in Web sites' programming code.

Figuring out the culprits is usually very hard, sometimes impossible, because it's easy to cover your tracks online. And unless the hackers leave some kind of hint that they're associated with a larger criminal gang, there's little chance law enforcement will get deeply involved.

"More and more people are kind of thinking this is acceptable behavior on the Internet," Cluley said. "If you're clever and smart and don't do something dumb, your chances of getting caught are probably quite small."

Oregon University System spokeswoman Diane Saunders said the school system was analyzing computer files for clues about who might be responsible. She said the hackers were able to access the site through a vulnerability in third-party software that tracks the number of visitors to the site. That vulnerability has now been fixed.

In many cases, major world events give online criminals a great opening to try and lure more victims into garden-variety Internet swindles.

Alan Paller, director of research for the SANS Institute, a computer security training organization, said hundreds of fake Web sites spring up after every big news event to try and fool people into coughing up their money or personal data, or both. Sometimes they'll take the form of fake Red Cross sites, for example, that solicit donations.

The bad guys are really good at making fake sites look real. They're also relentless advertisers: Spam volumes also surge after a big news event, with crooks trying to direct victims to sites that will infect their computers.

Paller says the effectiveness of those campaigns "is almost entirely determined by how well they exploit current news stories" and craft provocative headlines to sucker somebody into clicking on the link.

The hackers behind Oregon University System's Web site attack got noticed - for 90 minutes at least.
: Hackers crash Dutch anti-piracy site
: Letsbereal June 28, 2009, 03:56:28 PM
Hackers crash Dutch anti-piracy site
25 June 2009
, by our news desk (NRC Handelsblad International)
http://www.nrc.nl/international/article2282196.ece/Hackers_crash_Dutch_anti-piracy_site

Hackers on Wednesday crashed the website of the Brein foundation, a Dutch advocacy group for the entertainment industry which just this week filed a lawsuit against the Swedish download site Pirate Bay
According to Tim Kuik of Brein the attack started hours after the foundation served the owners of Pirate Bay, a Swedish site that allows people to illegally download movies, music and games, with summons to appear before a court in Amsterdam on July 21. The summons were sent over Twitter and Facebook because the foundation's lawyers had not been able to physically locate the site's owners. Brein wants Pirate Bay blocked for users in the Netherlands.

The attack, which Kuik says was a coordinated Distributed Denial of Service attack (DOSS) attack, was so fierce that the foundation's website, anti-piracy.nl, was shut down. A DOSS attack is when a large number simultaneously send requests to a particular website, causing the server to crash. "Our servers are protected, so it must have taken a large number of computers to shut us down," Kuik said.

Brein protects the rights of the entertainment industry, and it currently has the Swedish torrent site Pirate Bay in its sights. The three founders of Pirate Bay - Fredrik Neij, Peter Sunde and Gottfrid Svartholm Warg - have already been given prison sentences and a 2.6 million-euro fine by a Swedish court. But pending an appeal in the case, the website remains active, including in the Netherlands.

The Pirate Bay file-sharing site is related to the Swedish Pirate Party, which won 7.1 percent of Swedish votes (1 seat) in the recent European election.

Kuik says he's not upset about the attack. "I think it's rather amusing. This was probably done by people who are always talking about freedom information. But if they don't like what someone is saying, they want the information removed."


Hackers crash Dutch anti-piracy site http://tinyurl.com/lralh6
: U r pwned: text messaging paves way for hacking
: Hardware 952 July 31, 2009, 11:42:26 PM
http://hosted.ap.org/dynamic/stories/U/US_TEC_HACKER_CONFERENCE_PHONE_MISCHIEF?SITE=SCCHA&SECTION=HOME&TEMPLATE=DEFAULT




LAS VEGAS (AP) -- Getting a text message is akin to someone sliding a piece of mail under your door: You may not have asked for it, you can't stop its delivery and you have to deal with it whether you want to or not.

The fact that text messages appear on mobile phones without any interaction from the user, and sometimes with limited interference from the cellular network operators, can give criminals an opening to break into those devices, as three teams of researchers showed Thursday at the Black Hat security conference here.

Their targets ran the gamut.

Apple Inc.'s iPhones and phones running Microsoft Corp.'s Windows Mobile and Google Inc.'s Android operating systems were all shown to be vulnerable. In some cases, the problems weren't with software, but the way cellular networks process messages.

The findings are troubling as people increasingly use their phones for handling sensitive data, like e-mail and online banking.

Phones are morphing into mini-computers, which means they're going to start getting attacked like PCs.

In some respects, phones are relatively safer. Cellular carriers control their networks more tightly than anyone controls the Internet, so they're in a better position to stop new types of attacks that crop up.

Telling the difference between harmful and legitimate traffic can be tricky, though. And anonymity still is possible given the proliferation of prepaid plans that don't require long-term contracts; a carrier can trace an attack to a particular phone but not necessarily to a particular person.

The techniques demonstrated Thursday show that even disciplined and safety-conscious users could have their phones hacked because they can't totally control what's coming into them.

Innocent people could have their smart phones knocked offline, commanded to visit sites hosting pornography or viruses, or even turned into remote-controlled subordinates of a criminal gang behind an attack.

Take this example about the iPhone, from Charlie Miller, a well-known hacker of Apple Inc. and other products, and his co-presenter Collin Mulliner, a Ph.D. student in telecommunications security at the Technical University of Berlin.

They showed how they can disconnect an iPhone from the cellular network by sending it a single, maliciously crafted text message - a message the victim never sees. The messages exploit bugs in the way iPhones handle certain messages and are used to crash parts of the software.

They even said it's possible to remotely control an iPhone by sending 500 messages to a single victim's phone. Those messages contain the necessary commands for the attack and would get executed automatically by exploiting a weakness in the way the iPhone's memory responds to that volume of traffic.

Miller said messaging attacks are so attractive, and are going to become more common, because the underlying technology is a core phone feature that can't be turned off.

"It's such a powerful attack vector," Miller said. "All I need to know is your phone number. As long as their phone's on, I can send this and their phone's going to do something with this. ... It's always on, it's always there, the user doesn't have to do anything - it's the perfect attack vector."

Miller and Mulliner also found problems in phones running Android (that problem has been fixed) and Windows Mobile (they say that problem hasn't been fixed yet).

In response, Apple issued a software fix Friday. The company said users will be prompted to download the fix when they plug their iPhones into their computers.

Microsoft said it is investigating the matter. Google confirmed that its vulnerability was fixed.

Sometimes the culprit isn't a software flaw but the way the phones were configured at the factory to handle messaging traffic. Hackers can break in if the phones are too permissive in what types of traffic they accept.

John Hering and Kevin Mahaffey, co-founders of Flexilis Inc., and Anthony Lineberry, a senior software engineer with the Los Angeles-based mobile security firm, made browser screens pop up and direct victims to any page of their choosing by sending specially crafted messages to phones made by Taiwan-based HTC Corp. and sold under major carriers' brand names.

The user never sees a text message pop up; the mobile Web browser suddenly springs to life and navigates to a page the user didn't ask for.

The researchers said spammers have latched onto this type of attack in Europe and Asia.

They said the problem they found wasn't in the Windows Mobile software on the devices, but rather in the way the manufacturer configured software settings on some phones, allowing anyone to send certain messaging commands to them.

A call to HTC's North American headquarters wasn't returned Thursday.

The carriers play a critical role in stopping these types of attacks.

Because they have a stranglehold on what comes in and out of their networks, they can stop malicious traffic from ever hitting a user's cell phone by filtering out types of traffic that attackers shouldn't be able to send. Hackers are able to game the system when they're allowed to push commands that only the carrier should be allowed to send.

That was the theme of a talk by Zane Lackey, senior security consultant with San Francisco-based iSEC Partners Inc., and Luis Miras, an independent security researcher.

They showed how they can trick a cell phone into pulling in content from a computer under their control. The content never passes through the cellular carrier's security gauntlet as it's supposed to.

The hack works because Lackey and Miras figured out how to attach a "notification" alert - something they said only the carrier should be allowed to send - to administrative messages they sent through an unidentified carrier's network.

The alert tells victims they have a message, such as one instructing them to update settings. To the recipient's phone, it looks the same as a notice sent by the carrier.

If the user chooses to update the device, the phone then reaches out for the content - on computers under a hacker's control.

"The way carriers built their networks, there were a lot of security assumptions based on the idea that only the carrier would be able to send certain messages," Lackey said. "Those assumptions are invalid."

The flip side to the dangers the researchers have uncovered in mobile devices is that they're often able to write programs to help companies and individual users look for vulnerabilities in their devices. That could protect against future attacks.
: Coordinated cyber attack disrupts high-profile websites
: Godfather77 August 07, 2009, 07:12:25 AM
'Massive attack' strikes websites
Friday, 7 August 2009
Full article:- http://news.bbc.co.uk/1/hi/technology/8189162.stm

High-profile websites including Google, Facebook and Twitter have been targeted by hackers in what is described as a "massively co-ordinated attack". Other sites such as blogging platform Live Journal were also reportedly targeted in the attack on Thursday.

Twitter was taken offline for more than two hours whilst Facebook's service was "degraded", according to the firms. Google said it had defended its sites and was now working with the other firms to investigate the attack.

"Google systems prevented substantive impact to our services," the company said in a statement.

The company has not confirmed which services were targeted in the attack, but it is thought that its e-mail service Gmail and and video site YouTube were under fire.

"We are aware that a handful of non-Google sites were impacted by [an]... attack this morning, and are in contact with some affected companies to help investigate this attack," the company said.

Twitter co-founder Biz Stone wrote on its own blog: "Twitter has been working closely with other companies and services affected by what appears to be a single, massively co-ordinated attack."

He said that the motivation for the attack was unclear and that the company would "prefer not to speculate".

However, Max Kelly, chief security officer at Facebook, told technology website CNET News that the attack was a strike targeted at a single user, pro-Georgian blogger Cyxymu.

"It was a simultaneous attack across a number of properties targeting him to keep his voice from being heard," he told the website.

Friday marks one year since the outbreak of war between Russia and Georgia.

Writing on his blog, Graham Cluley of security firm Sophos said: "This raises the astonishing thought that a vendetta against a single user caused Twitter to crumble, forcing us to ask serious questions about the site's fragility."
: Hackers turn the tables on cops, hack police computers
: Dig August 19, 2009, 01:28:40 AM
Hackers turn the tables on cops, hack police computers
http://rawstory.com/blog/2009/08/hackers-hack-cops-computers/


It doesn't pay to brag if you're a cop.

Police officers in Australia found themselves on the receiving end of hackers they were trying to prosecute after leaving a password for their computers blank.

Hackers broke into police computers after police bragged that they had taken down a number of hackers in Brighton, Melbourne, on the website r00t-y0u.org. Trouble is, they didn't seem to protect themselves from their own targets. After getting search warrants to target the site's administrators, they found that the alleged hackers were already onto them.

The Sydney Morning Herald noted in an exclusive Tuesday:

What the federal police did not know was that hackers had already cottoned on to their plan... (a) hacker wrote "I couldn't stop laughing" on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure. Police had also "left the MYSQL password blank".

"These dipshits are using an automatic digital forensics and incident response tool," the hacker wrote. "All of this had been done within 30-40 minutes. Could of been faster if I didn't stop to laugh so much." ...

The hackers also mocked police for bragging about their sting, asserting that the police officers' claims were overblown.

[One alleged] hacker slammed the federal police for "making it sound like they can bust 'hackers', when all they have done is busted a COUPLE script kiddies". "Script kiddies" is hacker parlance for novice hackers.

The second of these messages contained several links to screenshots allegedly proving that the writer had access to the federal police's server.

These included shots of files containing fake IDs and stolen credit card numbers, as well as the federal police's server information.

A posting on the r00t forum now alleges the site has been monitored and that all postings have been logged. But the tech site The Register suggests that the message has been posted by a hacker defacing the site, or as part of a mockery of the police's efforts.

"This underground form [sic] has been monitored by law enforcement - every post, private message and all registration information has been captured," the message reads. "All member IP addressed and have been logged and identification processes are now underway.

"The creation and distribution of malware, denial of service attacks and accessing stolen information are serious crimes," it continues.

"Every movement on this forum has been tracked and where there is information to suggest a person has committed a criminal act, referrals will be forwarded to the relevant authority in each jurisdiction," it adds. "There have already been a number of arrests as a result of current investigations. This message should serve as a warning not to engage in criminal activity."

-John Byrne
: Re: Hackers turn the tables on cops, hack police computers
: Unintelligable Name August 19, 2009, 02:58:26 AM
They hacked the Police computers.. got in... and did what exactly? Laughed and logged out?
: Re: Hackers turn the tables on cops, hack police computers
: Monkeypox August 19, 2009, 03:23:47 AM
They hacked the Police computers.. got in... and did what exactly? Laughed and logged out?

It appears so.

 :D
: Secret Service Paid TJX Hacker $75,000 a Year
: bigbrothertech March 22, 2010, 10:16:46 PM
Convicted TJX hacker Albert Gonzalez earned $75,000 a year working undercover for the U.S. Secret Service, informing on bank card thieves before he was arrested in 2008 for running his own multimillion-dollar card-hacking operation.The information comes from one of Gonzalez's best friends and convicted accomplices, Stephen Watt.http://www.bigbrothertech.com/news/TJXHacker.html (http://www.bigbrothertech.com/news/TJXHacker.html)
: Re: Secret Service Paid TJX Hacker $75,000 a Year
: Monkeypox March 25, 2010, 04:06:43 PM
When you lie down with dogs...
: Law Enforcement Appliance Subverts SSL
: portuguese anarchist March 28, 2010, 05:00:19 AM
http://www.wired.com/threatlevel/2010/03/packet-forensics/

Law Enforcement Appliance Subverts SSL

By Ryan Singel    March 24, 2010 | 1:55 pm | Categories: Surveillance, Threats

(http://www.wired.com/images_blogs/threatlevel/2010/03/packet_forensics.jpg)

That little lock on your browser window indicating you are communicating securely with your bank or e-mail account may not always mean what you think its means.

Normally when a user visits a secure website, such as Bank of America, Gmail, PayPal or eBay, the browser examines the website’s certificate to verify its authenticity.

At a recent wiretapping convention, however, security researcher Chris Soghoian discovered that a small company was marketing internet spying boxes to the feds. The boxes were designed to intercept those communications — without breaking the encryption — by using forged security certificates, instead of the real ones that websites use to verify secure connections. To use the appliance, the government would need to acquire a forged certificate from any one of more than 100 trusted Certificate Authorities.

The attack is a classic man-in-the-middle attack, where Alice thinks she is talking directly to Bob, but instead Mallory found a way to get in the middle and pass the messages back and forth without Alice or Bob knowing she was there.

The existence of a marketed product indicates the vulnerability is likely being exploited by more than just information-hungry governments, according to leading encryption expert Matt Blaze[1], a computer science professor at University of Pennsylvania.

“If the company is selling this to law enforcement and the intelligence community, it is not that large a leap to conclude that other, more malicious people have worked out the details of how to exploit this,” Blaze said.

The company in question is known as Packet Forensics, which advertised its new man-in-the-middle capabilities in a brochure handed out at the Intelligent Support Systems (ISS) conference[2], a Washington, D.C., wiretapping convention that typically bans the press. Soghoian attended the convention, notoriously capturing a Sprint manager bragging[3] about the huge volumes of surveillance requests it processes for the government.

According to the flyer: “Users have the ability to import a copy of any legitimate key they obtain (potentially by court order) or they can generate ‘look-alike’ keys designed to give the subject a false sense of confidence in its authenticity.” The product is recommended to government investigators, saying “IP communication dictates the need to examine encrypted traffic at will.” And, “Your investigative staff will collect its best evidence while users are lulled into a false sense of security afforded by web, e-mail or VOIP encryption.”

Packet Forensics doesn’t advertise the product on its website, and when contacted by Wired.com, asked how we found out about it. Company spokesman Ray Saulino initially denied the product performed as advertised, or that anyone used it. But in a follow-up call the next day, Saulino changed his stance.

“The technology we are using in our products has been generally discussed in internet forums and there is nothing special or unique about it,” Saulino said. “Our target community is the law enforcement community.”

Blaze described the vulnerability as an exploitation of the architecture of how SSL is used to encrypt web traffic, rather than an attack on the encryption itself. SSL, which is known to many as HTTPS, enables browsers to talk to servers using high-grade encryption, so that no one between the browser and a company’s server can eavesdrop on the data. Normal HTTP traffic can be read by anyone in between — your ISP, a wiretap at your ISP, or in the case of an unencrypted Wi-Fi connection, by anyone using a simple packet-sniffing tool.

In addition to encrypting the traffic, SSL authenticates that your browser is talking to the website you think it is. To that end, browser makers trust a large number of Certificate Authorities — companies that promise to check a website operator’s credentials and ownership before issuing a certificate. A basic certificate costs less than $50 today, and it sits on a website’s server, guaranteeing that the BankofAmerica.com website is actually owned by Bank of America. Browser makers have accredited more than 100 Certificate Authorities from around the world, so any certificate issued by any one of those companies is accepted as valid.

To use the Packet Forensics box, a law enforcement or intelligence agency would have to install it inside an ISP, and persuade one of the Certificate Authorities — using money, blackmail or legal process — to issue a fake certificate for the targeted website. Then they could capture your username and password, and be able to see whatever transactions you make online.

Technologists at the Electronic Frontier Foundation, who are working on a proposal to fix this whole problem, say hackers can use similar techniques to steal your money or your passwords. In that case, attackers are more likely to trick a Certificate Authority into issuing a certificate, a point driven home last year when two security researchers demonstrated how they could get certificates for any domain on the internet simply by using a special character in a domain name[4].

“It is not hard to do these attacks,” said Seth Schoen, an EFF staff technologist. “There is software that is being published for free among security enthusiasts and underground that automate this.”

China, which is known for spying on dissidents and Tibetan activists, could use such an attack to go after users of supposedly secure services, including some Virtual Private Networks, which are commonly used to tunnel past China’s firewall censorship. All they’d need to do is convince a Certificate Authority to issue a fake certificate. When Mozilla added a Chinese company, China Internet Network Information Center, as a trusted Certificate Authority in Firefox this year, it set off a firestorm of debate[5], sparked by concerns that the Chinese government could convince the company to issue fake certificates to aid government surveillance.

In all, Mozilla’s Firefox has its own list of 144 root authorities. Other browsers rely on a list supplied by the operating system manufacturers, which comes to 264 for Microsoft and 166 for Apple. Those root authorities can also certify secondary authorities, who can certify still more — all of which are equally trusted by the browser.

The list of trusted root authorities includes the United Arab Emirates-based Etilisat, a company that was caught last summer secretly uploading spyware onto 100,000 customers’ BlackBerries[6].

Soghoian says fake certificates would be a perfect mechanism for countries hoping to steal intellectual property from visiting business travelers. The researcher published a paper on the risks[7] (.pdf) Wednesday, and promises he will soon release a Firefox add-on to notify users when a site’s certificate is issued from an authority in a different country than the last certificate the user’s browser accepted from the site.

EFF’s Schoen, along with fellow staff technologist Peter Eckersley and security expert Chris Palmer, want to take the solution further, using information from around the net so browsers can eventually tell a user with certainty when they are being attacked by someone using a fake certificate. Currently, browsers warn users when they encounter a certificate that doesn’t belong to a site, but many people simply click through the multiple warnings.

“The basic point is that in the status quo there is no double check and no accountability,” Schoen said. “So if Certificate Authorities are doing things that they shouldn’t, no one would know, no one would observe it. We think at the very least there needs to be a double check.”

EFF suggests a regime that relies on a second level of independent notaries to certify each certificate, or an automated mechanism to use anonymous Tor exit nodes to make sure the same certificate is being served from various locations on the internet — in case a user’s local ISP has been compromised, either by a criminal or a government agency using something like Packet Forensics’ appliance.

One of the most interesting questions raised by Packet Forensics’ product is how often do governments use such technology and do Certificate Authorities comply? Christine Jones, the general counsel for Go Daddy — one of the net’s largest issuers of SSL certificates — says her company has never gotten such a request from a government in her eight years at the company.

“I’ve read studies and heard speeches in academic circles that theorize that concept, but we never would issue a ‘fake’ SSL certificate,” Jones said, arguing that would violate the SSL auditing standards and put them at risk of losing their certification. “Theoretically it would work, but the thing is we get requests from law enforcement every day, and in entire time we have been doing this, we have never had a single instance where law enforcement asked us to do something inappropriate.”

VeriSign, the net’s largest Certiicate Authority, echoes GoDaddy.

“Verisign has never issued a fake SSL certificate, and to do so would be against our policies,” said vice president Tim Callan.

Matt Blaze notes that domestic law enforcement can get many records, such as a person’s Amazon purchases, with a simple subpoena, while getting a fake SSL certificate would certainly involve a much higher burden of proof and technical hassles for the same data.

Intelligence agencies would find fake certificates more useful, he adds. If the NSA got a fake certificate for Gmail — which now uses SSL as the default for e-mail sessions in their entirety (not just their logins) — they could install one of Packet Forensics’ boxes surreptitiously at an ISP in, for example, Afghanistan, in order to read all the customer’s Gmail messages. Such an attack, though, could be detected with a little digging, and the NSA would never know if they’d been found out.

Despite the vulnerabilities, experts are pushing more sites to join Gmail in wrapping their entire sessions in SSL.

“I still lock my doors even though I know how to pick the lock,” Blaze said.

Update 15:55 Pacific: The story was updated with comment from Verisign.

Image: Detail from Packet Forensics brochure.


---
1. http://www.crypto.com/blog
2. http://www.issworldtraining.com/ISS_WASH/
3. http://www.wired.com/threatlevel/2009/12/gps-data/
4. http://www.wired.com/threatlevel/2009/07/kaminsky/
5. http://www.freedom-to-tinker.com/blog/felten/mozilla-debates-whether-trust-chinese-ca
6. http://www.wired.com/threatlevel/2009/07/blackberry-spies/
7. http://files.cloudprivacy.net/ssl-mitm.pdf
: Re: Law Enforcement Appliance Subverts SSL
: Monkeypox March 31, 2010, 06:48:45 PM
If "Law Enforcement" can subvert SSL, then so can criminals.
: Symantec uncovers 1,100 infected NHS PCs
: H0llyw00d April 25, 2010, 01:14:15 PM
Symantec is warning computer users to keep anti-virus tools up to date, after discovering an information-stealing botnet that has compromised 1,100 NHS computers.

The security firm said in a blog post that it had been monitoring two FTP servers related to the Qakbot botnet, and found that it had uploaded 4GB of confidential information in just two weeks.

The data included online banking and credit card information, social network and webmail credentials and internet search histories.

"One unusual aspect of Qakbot is that, even though its purpose is to steal information associated with home users, it has also been successful at compromising computers in corporate environments and government departments," the blog noted.

"For instance, there are over 100 compromised computers on a Brazilian regional government network. More alarmingly, the logs show a significant Qakbot infection on a major national health organisation network in the UK."

However, despite the worryingly high number of infected NHS computers, Symantec said that there is currently no evidence to suggest that any customer or patient data has been stolen.

"If you are reading this and are worried about malicious third parties gaining access to your online accounts, now would be a good time to ensure that you change all of your passwords related to your online presence," the blog post advised.

"What's clear from the data we have analysed is that people use bad habits for creating their passwords."
: "Wired for War" US Army's Goal of 20,000 "Nett Warriors" by 2016
: birther truther tenther September 24, 2010, 06:58:02 PM
(http://www.nationaldefensemagazine.org/archive/2010/October/PublishingImages/NettWarrior1.jpg)


Retrieved from:
http://www.nationaldefensemagazine.org/archive/2010/October/Pages/ArmyMakesNewAttemptToFieldNetworkedSoldierSystem.aspx



Army Makes New Attempt To Field Networked Soldier System

After nearly 20 years of development and some $500 million spent on a now-defunct program, the Army is making another attempt to connect infantrymen to the battlefield network with a wearable system of hands-free computers and radios.

The Nett Warrior program has taken bits and pieces from the Land Warrior ensemble cancelled in 2007 and is currently testing three prototypes that officials say will provide soldiers and commanders with better navigation, friendly force tracking and communication devices.

“It tells you where you are, where your buddies are and what your mission is,” said Jason Regnier, the Army’s deputy product manager for Nett Warrior.


The Land Warrior program began nearly 20 years ago when the idea for a high-tech, omniscient system that would be worn by soldiers sounded more like science fiction than military fact. The Army cancelled the program after complaints from soldiers and politicians about its functionality and cost. The initiative did much to point the way forward for soldier technology, but it failed to reach the battlefield in great numbers. After the program’s termination, an infantry brigade took rehashed versions of the system to Iraq. Parts of Land Warrior also made it to Afghanistan, but the system as a whole ultimately missed the high mark set by the program.

The Army’s vision of connecting every soldier to a network did not die with Land Warrior, though. It almost immediately began planning a follow-up system to give ground soldiers tools generally reserved for those in planes, tanks and command centers.

Prototypes of Nett Warrior currently are being tested at Fort Riley, Kan. There, soldiers are wearing the systems during scenarios that include a “cordon and search” of hilly terrain and a “movement to contact” with an enemy in an urban environment. The prototypes come from three competing contractors — General Dynamics C4 Systems, Raytheon and Rockwell Collins. Each received contracts between $5 million and $5.5 million for their work thus far.

All three competitors have a history with soldier systems. General Dynamics was the prime contractor on Land Warrior, but Rockwell Collins built a lot of the hardware and Raytheon provided the radio for the system. Using three competing companies during the development phase of the program likely will mean that the Army will get more bang for its buck come production time, said Lt. Col. Roland Gaddy, the program’s product manager. “It drives down price and drives up innovation,” he said.

As stated in the Army’s promotional materials for Nett Warrior, the program’s mission is to “provide unparalleled situational awareness and understanding to the dismounted leader allowing for faster, more accurate decisions in the tactical fight and connecting the dismounted soldier to the network.”

The system takes its name from World War II Medal of Honor recipient Col. Robert B. Nett, who died in 2008. He led an attack in 1944 against Japanese soldiers in the Philippines, killing seven of them with his rifle and bayonet despite having been wounded multiple times. A Connecticut native, Nett enlisted in the Army in 1940 at the age of 17 and served until 1978.

Nett Warrior features many of the same components as its predecessor. The centerpiece of the system is a full-color, hands-free viewing monitor attached to an eyepiece that gives the soldier the illusion of looking at a 17-inch screen. Consisting of a computer, navigation system, control unit, radio, microphone and headphones, the ensemble allows dismounted leaders to track themselves, other soldiers and the enemy on the hands-free device. A protective vest hides the wiring for the system.

It’s a command-and-control center for the body and “a revolutionary change to the way we fight,” Gaddy said. “Finally, commanders have that situational awareness when they get out of the back of the vehicle, out of that helicopter, out of that airplane.”

One of the issues the Army struggled with in Land Warrior is who would wear the system. Nett Warrior has been designed for team leaders and above to connect them with infantrymen out of the line of sight. The ensemble will be compatible with coming devices like the “rifleman’s radio,” which aims to bring each individual soldier into the network. Recalling his own experiences, Gaddy said it was easy to lose track of a team of soldiers almost as soon as they jumped out of a vehicle.

“That’s a scary thought when you’re driving around with Bradleys and tanks,” he said, adding that deaths from friendly fire should drop because of Nett Warrior. “Not only do I want to kill the bad guy, I want to prevent my guys from getting killed. I’m really worried about where I’m at and where my buddies are at.” Nett Warrior will keep everyone on the same page, Gaddy said.

The contractors are determined to improve upon Land Warrior by focusing on what the Army calls “SWAP” — the size, weight and power of the system. Gaddy called it the top priority at this point. Much of the criticism aimed at Land Warrior concerned its overall heft. Early on, the gear weighed a cumbersome 40 pounds, though it had been trimmed to a little more than 14 pounds when the brigade took it to Iraq. The three Nett Warrior prototypes average about 11.8 pounds.

“Our focus is to continue driving the size and weight to the lowest levels possible,” said Dave Treichler, manager of Raytheon’s effort. Nett Warrior seeks to do away with the question, “Do I carry bullets or water, or my Land Warrior system?” he added.

But before it reaches the battlefield, the Army wants to ensure that everything on it works. A foot soldier puts technology through the ringer, and industry is at a crossroads trying to develop devices rugged enough to take a beating, said Rockwell Collins’ Preston Johnson, who likens it to the critical juncture with unmanned aerial systems a decade ago.

“Everybody was worried about getting the thing to fly somewhere and being able to recover it without crashing the darn thing,” said Johnson, the company’s business development lead for soldier systems. “It was all about the hardware functioning.”

There isn’t a worse environment for electronics than the body of a ground soldier who trudges in extreme temperatures through water, dust and dirt, Johnson said. He throws himself on the ground, bangs into doors and crawls in the mud. “It’s almost impossible to make things for the soldier environment too rugged,” Johnson added.

The new system also will consume less power while providing more memory and a graphical user interface inspired by soldiers with battlefield experience, Gaddy noted.

The Army took a new approach to the design of its latest soldier system. It provided each contractor with a liaison team consisting of combat veterans. These “embedded users” worked side by side with the contractors as they developed their versions of Nett Warrior.

“They provided instant answers to questions we had,” Treichler said. The Army has put Nett Warrior on the fast track and meeting the deadlines would have been impossible without the liaison teams, he added. The approach brought engineers in contact with the end user before having to deliver a final product. This eliminated guessing games and repeated attempts to build something just to watch it fail, contractors said.

“Soldier acceptance is critical,” said Mark Showah, integrated systems director at General Dynamics. “You can field systems on vehicle platforms and they won’t complain about the size.” Hanging heavy equipment on a human body comes at a price. Knowing how a soldier feels about the gear while still in the lab saves time, money and frustration, Showah explained. Many user suggestions are included in Nett Warrior.

For example, it’s common practice for soldiers who have just cleared a building to break a chemical light and hang it on the structure. This lets other troops know the building has been investigated, but it also imparts information to the enemy. Soldiers indicated that they wanted a way to record and view such actions secretly, Showah said. Nett Warrior’s software allows them to mark cleared buildings on a map that can be shared through the network with other units.

“Consumer needs are driven by consumers,” Gaddy said. “Who better to give feedback than the guys who have to use it in the field?”

Wars have changed since Nett’s service, and the system that bears his name brings together two Army slogans — the “soldier as a system” and “every soldier is a sensor.” The 2010 Army modernization strategy refers to the individual soldier as the “center of gravity” and says the service’s primary goal is to integrate these men and women into the network. The Army wants “integrated networked” soldiers in all brigade combat teams by 2025, according to the strategy.

“Bringing battle command and networked connectivity down to dismounted leaders is a breakthrough,” Showah said, adding that the technology can’t afford to advance at the expense of reliability. “These systems need to work every time a soldier turns it on, every time they look at it.”

The prototypes already have been through a series of environmental and electrical tests. The operational exercises at Fort Riley will run through November. The Army plans to decide in March or April of 2011 which contractor or combination of contractors will be called on to produce the definitive version of Nett Warrior. The ultimate goal is to provide 20,000 systems to 30 infantry brigade combat teams by fiscal year 2016. The Army plans to begin fielding the gear within two years.

The Marine Corps also has asked to see the prototypes strictly for analysis purposes, Gaddy said.

Systems like Nett Warrior will play a big role in the Army’s vision of connecting the Pentagon to the front lines in real time. And it won’t stop there, Regnier said.

The future of the program could include cell phones, voice translation, sensors and the ability to control unmanned systems. “The user defines the next requirement,” Regnier said.

And soldiers are having their say this time around, all the way from the lab to the battlefield.



The following retrieved from:
http://contracting.tacom.army.mil/majorsys/nettwarrior/Nett%20Warrior%20ExecSum.pdf

NETT WARRIOR
PRODUCTION CONTRACT
DRAFT EXECUTIVE SUMMARY
1. Overview
On the Army’s 235th birthday June 14, 2010, the Ground Soldier System Increment I
was renamed Nett Warrior in honor of COL Robert B. Nett. Nett Warrior (NW) provides
dismounted leaders increased situational awareness, decreased reaction times, and a
reduced risk of fratricide. These capabilities are informed by combat experiences from
the Land Warrior (LW) system. The performance of LW validated the need for a
dismounted battle command system for today’s Warfighter. The Army terminated the
LW program due to competing priorities; however, a recognized need still exists for the
Army to provide these capabilities to the ground Soldier. The path to fulfill this need is
the Nett Warrior.
Nett Warrior integrates mature commercial electronic technologies and government
furnished equipment such as secure communications to provide improved situational
awareness and network connectivity capabilities at various echelon levels within a
brigade combat team while minimizing the size, weight and power impacts to the
Soldier. The Soldiers using Nett Warrior will be predominately dismounted conducting
combat operations. Nett Warrior modularity is required to permit tailoring for mission
requirements and allow for varying combat load configurations.
The Nett Warrior is designated as Category XI, Military Electronics, and Category XIII,
Auxiliary Military Equipment, on the U.S. Munitions List.
Note to all prospective Nett Warrior offerors and prospective subcontractors: Project
Manager Soldier Warrior is denying release of Nett Warrior controlled unclassified
information (CUI), to include FOUO, Distribution C, D, X or other controlled markings, to
any foreign persons, companies, or Governments.
2. Nett Warrior Production Acquisition Strategy
This Executive Summary is for informational purposes only. The following strategy is
a DRAFT that is being published solely for comment. Publishing this document
does not obligate the Government in any way and the Government reserves the
right to change any/all of the strategy listed here at any time.
In accordance with the DoDI 5000.02 and the Office of the Secretary of Defense
Memorandum on Prototyping and Competition, three Technology Development (TD)
contracts were awarded on 15 April 2009 to General Dynamics C4 Systems of
Scottsdale, Arizona; Raytheon Network Centric Systems of McKinney, Texas; and
Rockwell Collins of Cedar Rapids, Iowa.
The systems developed under these current
TD contracts are undergoing Developmental Tests (DT) and will undergo a Limited User
Test (LUT) later this year. It is the Army’s intent, with the appropriate approvals, to limit
the competition to the existing TD contractors that successfully complete the TD phase.
With the successful achievement of Milestone C in March/April 2011, the Government
plans to award one or more Firm Fixed type contract(s) to meet Production and
Deployment requirements for fielding contractor-built parts of the Nett Warrior systems.
The Government plans to use the “Best Value” source selection process for selecting
the awardee(s).
Table 1 below provides the current Nett Warrior quantity projections of systems to be
procured for the Production and Deployment Phase. This includes projected Low Rate
Initial Production (LRIP) and Full Rate Production (FRP) quantities for the first five years
of fielding. The procurement anticipated by this announcement will cover an estimated
three to five years of production quantities.

(http://i55.tinypic.com/20a2bs4.jpg)





(http://www.militaryaerospace.com/etc/medialib/platform-7/mae/articles/exclusive-content/2010/07.Par.12049.Image.120.0.1.gif)

Soldier systems rely on technological advances to make electronics and electro-optics small, lightweight, and power-efficient

Jul 28, 2010

By John Keller

When it comes to tactical networking on the battlefield, Rockwell Collins is one of the experts. Collins, along with Raytheon and General Dynamics, is competing for a U.S. Army program called Nett Warrior -- named in June for World War II Medal of Honor recipient Col. Robert B. Nett.

Nett Warrior, which concentrates on establishing digital data links among soldiers fighting together, essentially picks up where Land Warrior leaves off. Nett Warrior technology is worn on a soldier's body to provide networked situational awareness by blending radio, global positioning system, helmet-mounted display, and a hand-held data input device. Wiring is integrated into a protective vest.

"Nett Warrior consists of a body-worn computer system -- something that lets you run software -- a means of displaying that data to the soldier, and a means of sharing that information among those in the battle space," Grigg says.

This system, which should be fielded around 2013, will enable soldiers to see their locations, the locations of their buddies, and the locations of known enemies on a moving map. "The intent is to provide situational awareness," Grigg explains. Although the enabling technologies for Nett Warrior exist today, "the drive is to get to more power-efficient, smaller, lighter-weight radios, computers, and display technologies," he says.

Read rest of that article here:
http://www.militaryaerospace.com/index/display/article-display/9944734553/articles/military-aerospace-electronics/exclusive-content/2010/7/soldier-systems_rely.html



: Sony sues PS3 hacker George Hotz for jailbreaking, restoring OtherOS
: wvoutlaw2002 January 17, 2011, 05:45:29 AM
Sony sues Hotz, hacking group over PS3 hacks (http://s0.2mdn.net/1833838/BNjeter.html?rfp=http://www.betanews.com/article/Sony-sues-Hotz-hacking-group-over-PS3-hacks/1294869035)
Ed Oswald
January 12, 2011

Sony has filed suit against George Hotz -- more commonly known for his work in jailbreaking iPhones -- and a hacker group called "failoverfl0w," accusing both of copyright infringement and other related charges over their work to circumvent Sony's PlayStation 3 copyright protection.

The Japanese game maker is partially at fault here, having failed to use properly secure cryptography in order to ensure that pirated software can not run on the console. Hackers discovered the private key, and now can allow copied versions of games to run on the console without any issues.

Hotz and the others are being charged with breach of contract, several copyright infringement charges, as well as violations of copyright law in the state of California. Sony seeks both injunctive relief and punitive damages.

"Hackers will succeed in their attempts to ensure that pirated software can be run on the PS3 system, resulting in the destruction of SCEA's business" unless the court takes actions, Sony argues in the suit.

FULL ARTICLE (http://s0.2mdn.net/1833838/BNjeter.html?rfp=http://www.betanews.com/article/Sony-sues-Hotz-hacking-group-over-PS3-hacks/1294869035)
: ‘Anonymous’ hacks DC security firm that probed its membership‎
: charrington February 08, 2011, 01:29:01 AM
(http://www.rawstory.com/images/new/anonymouslogo0207.jpg)
The online group of hacktivists known as "Anonymous" infiltrated the network and websites of an Internet security company after learning the company planned to sell information about the group to the FBI.

The website of Washington DC-based HBGary Federal was hijacked Sunday along with the Twitter account of CEO Aaron Barr. The company's website was defaced with a message that read, "This domain seized by Anonymous under section #14 of the rules of the Internet."

"Your recent claims of 'infiltrating' Anonymous amuse us, and so do your attempts at using Anonymous as a means to garner press attention for yourself," the messaged continued. "How's this for attention?"

Barr told the Financial Times over the weekend that he had identified the "core leaders" of the group and had information that could lead to their arrest.

He told the Times he infiltrated "Anonymous" to demonstrate the security risks to organizations from social media and networking.

In addition to hacking the company's website and Twitter account, "Anonymous" gained access to more than 44,000 company e-mails, which were released to the public in a 4.71 gigabyte Torrent file. The group also gained access to the report that was allegedly going to be sold to the FBI and posted it online (.pdf).

"Anonymous" claims that most of the information gathered was either publicly available or inaccurate.

"The lack of quality in Aaron Barr's undertaken research is worth noting," the group said in a statement. "Aaron Barr missed a great deal of information that has been available online, and in fact failed to identify some of those whose identities were never intended to be hidden. People such as DailyKos' diarist blogger Barrett Brown, and the administrator of anonnews.org, joepie91, whose identities could have been found in under a minute with a simple Google search."

"Anonymous does not have leaders," the statement added. "We are not a group, we are not an organization. We are just an idea. What we have done today will appear harsh. It is harsh. We will respond to those who seek to threaten us. We understand that our participants have been concerned about recent FBI raids and companies such as HBGary Federal lurking and logging our chats, so we’ve given all of Anonymous a message: we will fight back."

Burr reportedly talked to members of "Anonymous" in an IRC chatroom, claiming he never intended to sell the information he gathered to the FBI.

"Ok I am going to say this one more time," he told the room. "I did this for research. The FBI called me because of my research. The email you are referring to about selling data was about a model built on this type of research. It was not to sell specifically this data. I was going to use it to describe the process of how social media exploitation works."

"Do I regret it now? Sure," he told Forbes on Monday. "I’m getting personal threats from people, and I have two kids. I have two four-year old kids. Nothing is worth that."

"I had expected some potential retribution," he said. "I knew some folks would take my research as some kind of personal attack which it absolutely was not. I thought they might take down our Web site with a DDoS attack. I did not prepare for them to do what they did."

Barr told Forbes he had to unplug his router at home because "Anonymous" was trying to crack it.

Three teenagers aged 15, 16 and 19 along with two men, aged 20 and 26, were arrested...
MORE

http://www.rawstory.com/rs/2011/02/anonymous-hacks-security-firm-probed-membership/
: How one man tracked down Anonymous—and paid a heavy price.
: charrington February 10, 2011, 12:44:07 PM
(http://static.arstechnica.net/assets/2011/02/anonymous-egg-list-thumb-640xauto-19522.jpg)
Aaron Barr believed he had penetrated Anonymous. The loose hacker collective had been responsible for everything from anti-Scientology protests to pro-Wikileaks attacks on MasterCard and Visa, and the FBI was now after them. But matching their online identities to real-world names and locations proved daunting. Barr found a way to crack the code.

In a private e-mail to a colleague at his security firm HBGary Federal, which sells digital tools to the US government, the CEO bragged about his research project.

"They think I have nothing but a heirarchy based on IRC [Internet Relay Chat] aliases!" he wrote. "As 1337 as these guys are suppsed to be they don't get it. I have pwned them! :)"

But had he?
"We are kind of pissed at him right now"
Barr's "pwning" meant finding out the names and addresses of the top Anonymous leadership. While the group claimed to be headless, Barr believed this to be a lie; indeed, he told others that Anonymous was a tiny group.

"At any given time there are probably no more than 20-40 people active, accept during hightened points of activity like Egypt and Tunisia where the numbers swell but mostly by trolls," he wrote in an internal e-mail. (All e-mails in this investigative report are provided verbatim, typos and all.) "Most of the people in the IRC channel are zombies to inflate the numbers."

The show was run by a couple of admins he identified as "Q," "Owen," and "CommanderX"—and Barr had used social media data and subterfuge to map those names to three real people, two in California and one in New York.

Near the end of January, Barr began publicizing his information, though without divulging the names of the Anonymous admins. When the Financial Times picked up the story and ran a piece on it on February 4, it wasn't long before Barr got what he wanted—contacts from the FBI, the Director of National Intelligence, and the US military. The FBI had been after Anonymous for some time, recently kicking in doors while executing 40 search warrants against group members.

Confident in his abilities, Barr told one of the programmers who helped him on the project, "You just need to program as good as I analyze."

But on February 5, one day after the Financial Times article and six days before Barr's sit-down with the FBI, Anonymous did some "pwning" of its own. "Ddos!!! Fckers," Barr sent from his iPhone as a distributed denial of service attack hit his corporate network. He then pledged to "take the gloves off."

When the liberal blog Daily Kos ran a story on Barr's work later that day, some Anonymous users commented on it. Barr sent out an e-mail to colleagues, and he was getting worked up: "They think all I know is their irc names!!!!! I know their real fing names. Karen [HBGary Federal's public relations head] I need u to help moderate me because I am getting angry. I am planning on releasing a few names of folks that were already arrested. This battle between us will help spur publicity anyway."

Indeed, publicity was the plan. Barr hoped his research would "start a verbal braul between us and keep it going because that will bring more media and more attention to a very important topic."

But within a day, Anonymous had managed to infiltrate HBGary Federal's website and take it down, replacing it with a pro-Anonymous message ("now the Anonymous hand is bitch-slapping you in the face.") Anonymous got into HBGary Federal's e-mail server, for which Barr was the admin, and compromised it, extracting over 40,000 e-mails and putting them up on The Pirate Bay, all after watching his communications for 30 hours, undetected. In an after-action IRC chat, Anonymous members bragged about how they had gone even further, deleting 1TB of HBGary backup data.

They even claimed to have wiped Barr's iPad remotely.

The situation got so bad for the security company that HBGary, the company which partially owns HBGary Federal, sent its president Penny Leavy into the Anonymous IRC chat rooms to swim with the sharks—and to beg them to leave her company alone. (Read the bizarre chat log.) Instead, Anonymous suggested that, to avoid more problems, Leavy should fire Barr  and "take your investment in aaron's company and donate it to BRADLEY MANNINGS DEFENCE FUND." Barr should cough off up a personal contribution, too; say, one month's salary?

As for Barr's "pwning," Leavy couldn't backtrack from it fast enough. "We have...
MORE

http://arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars
: Re: How one man tracked down Anonymous—and paid a heavy price.
: tinfoiltruth February 10, 2011, 01:49:42 PM
great story, but if what is said in the story is true, the government doesn't have as much control of Social media as a lot of people say.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: decepticon February 10, 2011, 02:11:52 PM
great story, but if what is said in the story is true, the government doesn't have as much control of Social media as a lot of people say.

how do you come to that conclusion ? there's a difference between having control of something, and being able to use that something to actually get what you want out of it.

 it's not like the anon have facebook profiles with their real names and pictures of themselves and blogs about how they just pulled off a dDOS attack...
: Re: How one man tracked down Anonymous—and paid a heavy price.
: jesussdad February 10, 2011, 02:23:20 PM
interesting stuff.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: Kilika February 10, 2011, 02:29:15 PM
The system is letting those clowns get away with their childish antics. The feds could corral those kiddy keymashers if they wanted to, but I suspect they are part of the fed's operations. I mean seriously, one guy is able to track them down and the feds can't? Bull, I'm not buying it at all.

The feds have control and access of "social media" all they want, and the Patriot Act allows it. Look at the military and their cyberwar programs and they can't track these idiots down? I say bull again.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: decepticon February 10, 2011, 02:46:26 PM
The system is letting those clowns get away with their childish antics. The feds could corral those kiddy keymashers if they wanted to, but I suspect they are part of the fed's operations. I mean seriously, one guy is able to track them down and the feds can't? Bull, I'm not buying it at all.

The feds have control and access of "social media" all they want, and the Patriot Act allows it. Look at the military and their cyberwar programs and they can't track these idiots down? I say bull again.

first off it's not one guy, he works for a security firm. if you would have read the article you would have noticed that. and whether or not they actually found an elite member is in question, they just arrested a guy, nothing has been proven.

and once again, these guys don't have facebook accounts with their real names and pictures of themselves with their address, i'm a noob and i know better than that. they know what facebook is. the fed is able able to easily track and monitor the real idiots who put their real information on there. people who want to hide are not so easily hearded.

and if you haven't noticed the mask they use to represent themselves are from the character on V for Vendetta who "is the resistence". these guys aren't much different idealogically from the people on this forum, the difference is they actually do stuff.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: Kilika February 10, 2011, 03:14:04 PM
and if you haven't noticed the mask they use to represent themselves are from the character on V for Vendetta who "is the resistence". these guys aren't much different idealogically from the people on this forum, the difference is they actually do stuff.

Yeah, they do stuff alright, and at the same time don't have the courage to stand up publically and voice their displeasure for whatever they supposedly stand for. Instead, they hide and cower in the dark recesses of society like little bugs.

So from your post, I gather you support these clowns? Can you tell I hate hacking, and have a very low opinion of people of their pursuation? To me those types are anti-social introverted cowards. A hack is a hack.

Just because you don't like somebody, that doesn't give you the right to cause harm or damage to someone's property. They are no better than idiots who run around damaging storefronts at G20 meeting protests while wearing masks. They are digital anarchists.

I've had long discussions with some of that type (both black and white hats) over gaming when I was in game development and we were talking about cheating in gaming. Some of the attitudes of these types is unbelievable. They think they can just run amok doing whatever they want just because they think they got some kind of leet skills. Whatever.

It just a bunch of punk kids, or adults that never grew up that are seriously misguided in the way they show their displeasure.

I mean seriously, don't you think it strange these guys haven't been caught? With as much stuff as they are alledgely to have done? There is NO WAY they are getting away all on their own. They got government help, and some of them are most likely wearing military uniforms I suspect.

Why? It's a perfect cover, a digital false flag to show how much society needs the government(not!) to help them stop these raskle hackers from destoying legitimate business.

Sorry, I ain't buying it.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: _CREATIONIST_ February 10, 2011, 03:33:17 PM
I dont put anything past 4chan. The anonymous group are basically people who frequent 4chan, and while there may be a few feds intermingled in this, 4chan is an animal all it's own and the one lesson to be learned from this is that you DO NOT mess with these guys. The guy doused himself in gasoline and expected not to get burned.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: Kilika February 10, 2011, 03:45:45 PM
I dont put anything past 4chan. The anonymous group are basically people who frequent 4chan, and while there may be a few feds intermingled in this, 4chan is an animal all it's own and the one lesson to be learned from this is that you DO NOT mess with these guys. The guy doused himself in gasoline and expected not to get burned.

Those types get away with it because of the fear people have. If society would stand up to those type groups they would have no place to hide. But yet nobody really does anything because the vast majority don't have the skills technically to deal with them. Isn't it amazing how a bunch of hacks can attack a security firm and basically bring it down? Sorry, that wasn't any kid hackers from some forums that learned some coding in their basement. These people are trained for that stuff, and I say it has the stench of government all over it.

Just like a bunch of robe-wearing radicals living in caves didn't do 9/11. Those "radical terrorists" had help big time.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: decepticon February 10, 2011, 03:52:34 PM
well seeing what has happened to people who stand up and vocalize their displeasure, i don't really blame them. (see jfk). it's not that i support them and think they're great or anything, but i don't fault them for trying to crash the matrix. and they don't attack people because they don't like them, they attack people who they believe are attempting to block free speech. and in this guys case, people who attack them cuz he doesn't like them. so i think this jackass got/is getting what was coming to him.

ya i've played my share of video games, and i never "hacked" to get a good score. comparing a video game hacker to anon doesn't really hold water for me. video gamers hack for vanity, anon hacks to attempt to better society. whether or not they actually do is a whole nother topic.

i don't really think its strange they haven't been "exterminated", they don't have a leader, they don't have meetings. to use your analogy, it would be like my house was infested with cockroaches, and every day i come home i smash every one that comes out of hiding. this goes on for 2+ years and i think to myself, man i must have killed 5000 cockroaches by now, yet every day i come home i see just as many as the day before, isn't it odd i haven't killed them all ? of course i haven't, cuz for every one i've caught in the light, there are 300 more in the walls reproducing like jack rabbits.

of course they could all work for the government, people could say the same about people that post on this forum, as a "hey look what they're doing with free speech, it needs to be banned !" so that is a circular argument that cannot really be proven or disproven.

don't really care what you are buying cuz i'm not trying to sell you anything, just giving my opinion.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: Kilika February 10, 2011, 04:11:10 PM
anon hacks to attempt to better society

And that is the exact attitude hackers have. It's nothing more than digital vandalism, yet those types think because it's just 1's and 0's it's no big deal. It's one thing to actively protest, but when you start vandalizing other people's property outside the rule of law, well, you've taken matters into your own hands in total disregard for the law, which makes them no better than the targets of the assaults.

And that is my opinion.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: decepticon February 10, 2011, 04:47:51 PM
yeah i suppose when the founding fathers started the american revolution they sat down and said "ok guys, we want to revolt and overthrow this ruthless tyrant, but let's make sure we stay well within english rule of law so that we are good upstanding subjects of the crown as we overthrow it. perhaps someone should send a letter to the king and let him know of our dismay, and that he should expect a revolution presently" /sarcasm

but back in reality, they attacked british forts in the dead of night in a time of peace, and british blood was shed. what a bunch of insubordinates, no wonder they are remembered in infamy.


all is fair in love and war.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: Kilika February 10, 2011, 04:49:49 PM
 ::)
: Re: How one man tracked down Anonymous—and paid a heavy price.
: Elder February 10, 2011, 05:02:57 PM
Yeah, they do stuff alright, and at the same time don't have the courage to stand up publically and voice their displeasure for whatever they supposedly stand for. Instead, they hide and cower in the dark recesses of society like little bugs.

How are you gonna say that an anonymous group of people don't stand up in public?  What do you know, other than your speculation which is based on another's speculation?  I bet these people do go out to protest and whatnot but don't reveal that they are part of the anonymous.  The whole point of anonymous is like fight club- you do not talk about fight club.  When you are out in the world you are Jack and Jill, but online you are an Anonymous.

So from your post, I gather you support these clowns? Can you tell I hate hacking, and have a very low opinion of people of their pursuation? To me those types are anti-social introverted cowards. A hack is a hack.

I like how people like you here throw out these attacks w/o any knowledge or facts.
>anti-social introverted cowards<  I like those clowns.  I must be cointelpro.
Why do you hate hacking?  Oh, that's right, because it means doing something other than posting uselessly on a message board.  I forgot where I was...  Hacking doesn't damage anything.  Deleting files might be implied as damage, but if they were intel files about you and your friends, you'd delete them too.

Just because you don't like somebody, that doesn't give you the right to cause harm or damage to someone's property. They are no better than idiots who run around damaging storefronts at G20 meeting protests while wearing masks. They are digital anarchists.

Digital anarchists?  Yeah, no one should police the internet.  I agree with them.  And they don't arbitrarily attack people/ servers.  Unless it's like, against other "anon boards" and that's really more of a game/ fun.

I've had long discussions with some of that type (both black and white hats) over gaming when I was in game development and we were talking about cheating in gaming. Some of the attitudes of these types is unbelievable. They think they can just run amok doing whatever they want just because they think they got some kind of leet skills. Whatever.

I've never ever heard an anon talk about black or white hats.  In fact most shit about anon isn't refuted because showing up to defend anon kinda outs you.  A game is supposed to be mentally challenging.  Some people use all their ability to have a good time and I support that.  You call it cheating in a game, I call it being better equipped to win.

Do you see the theme?  They think they're elite because of their knowledge.  You think you're elite because of your morals.  The man thinks he's elite because of his influence.  "Ah, vanity.  Definitely my favorite sin."

It just a bunch of punk kids, or adults that never grew up that are seriously misguided in the way they show their displeasure.

Yeah, taking on mega-corporations directly in a setting in which there are no rules and using an extensive knowledge of electronic systems to evade detection and covering friendly activities in a blanket of confusion while using their own systems of security to keep the anon's actions secure is WAY childish.  Damn kids these days...

I mean seriously, don't you think it strange these guys haven't been caught? With as much stuff as they are alledgely to have done? There is NO WAY they are getting away all on their own. They got government help, and some of them are most likely wearing military uniforms I suspect.

So, because you don't understand these things, because you don't have intimate and advanced knowledge of networking, computers, coding, and electronic security these guys can't possibly know this either.  OK.  You ever heard of a whistleblower?  Maybe some people gain specific knowledge and access and pass it on to anonymous for the use of good?  Oh, wait, you don't see any good here.

Why? It's a perfect cover, a digital false flag to show how much society needs the government(not!) to help them stop these raskle hackers from destoying legitimate business.

Sorry, I ain't buying it.

Yeah, no matter what the government tells you Anonymous is not teh turrerist.  The government can only blame stuff on anonymous as they do the tea party.  The establishment always attacks freedom.  Anon has never done anything that messes with your life or destroys legitimate business.  And if the man killed the net, they would hack it back online or provide the backdoor.

Those types get away with it because of the fear people have. If society would stand up to those type groups they would have no place to hide. But yet nobody really does anything because the vast majority don't have the skills technically to deal with them. Isn't it amazing how a bunch of hacks can attack a security firm and basically bring it down? Sorry, that wasn't any kid hackers from some forums that learned some coding in their basement. These people are trained for that stuff, and I say it has the stench of government all over it.

Just like a bunch of robe-wearing radicals living in caves didn't do 9/11. Those "radical terrorists" had help big time.

Clearly from your repeated posting, you have no clue how electronic security/ networking/ devices and access work.
The way the attacks are run are so simple and so very easily covered by a shadow of reasonable doubt that you can't stop them.  I could post instructions and you could be part of an attack in less than 1 minute, depending on your connection and ability to follow instructions.

Stand up to what?  Dudes posting funny memes and pr0n and downloading movies and music?  Yeahr get dem turrerists!
No place to hide?  When you're online you're in their house!  On their field.  This is what they know.  You don't need government resources or funding to get a computer and to read books and learn.  This ain't no 9/11.  There ain't no required gear that you can't afford.  There ain't no explosives needed to be placed by the presidents family.  It's a computer virus combined with a little direction and effort.  No money or special skills needed.  They do not know anything special that you aren't capable of knowing.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: tinfoiltruth February 10, 2011, 05:15:41 PM
How are you gonna say that an anonymous group of people don't stand up in public?  What do you know, other than your speculation which is based on another's speculation?  I bet these people do go out to protest and whatnot but don't reveal that they are part of the anonymous.  The whole point of anonymous is like fight club- you do not talk about fight club.  When you are out in the world you are Jack and Jill, but online you are an Anonymous.

I like how people like you here throw out these attacks w/o any knowledge or facts.
>anti-social introverted cowards<  I like those clowns.  I must be cointelpro.
Why do you hate hacking?  Oh, that's right, because it means doing something other than posting uselessly on a message board.  I forgot where I was...  Hacking doesn't damage anything.  Deleting files might be implied as damage, but if they were intel files about you and your friends, you'd delete them too.

Digital anarchists?  Yeah, no one should police the internet.  I agree with them.  And they don't arbitrarily attack people/ servers.  Unless it's like, against other "anon boards" and that's really more of a game/ fun.

I've never ever heard an anon talk about black or white hats.  In fact most shit about anon isn't refuted because showing up to defend anon kinda outs you.  A game is supposed to be mentally challenging.  Some people use all their ability to have a good time and I support that.  You call it cheating in a game, I call it being better equipped to win.

Do you see the theme?  They think they're elite because of their knowledge.  You think you're elite because of your morals.  The man thinks he's elite because of his influence.  "Ah, vanity.  Definitely my favorite sin."

Yeah, taking on mega-corporations directly in a setting in which there are no rules and using an extensive knowledge of electronic systems to evade detection and covering friendly activities in a blanket of confusion while using their own systems of security to keep the anon's actions secure is WAY childish.  Damn kids these days...

So, because you don't understand these things, because you don't have intimate and advanced knowledge of networking, computers, coding, and electronic security these guys can't possibly know this either.  OK.  You ever heard of a whistleblower?  Maybe some people gain specific knowledge and access and pass it on to anonymous for the use of good?  Oh, wait, you don't see any good here.

Yeah, no matter what the government tells you Anonymous is not teh turrerist.  The government can only blame stuff on anonymous as they do the tea party.  The establishment always attacks freedom.  Anon has never done anything that messes with your life or destroys legitimate business.  And if the man killed the net, they would hack it back online or provide the backdoor.

Clearly from your repeated posting, you have no clue how electronic security/ networking/ devices and access work.
The way the attacks are run are so simple and so very easily covered by a shadow of reasonable doubt that you can't stop them.  I could post instructions and you could be part of an attack in less than 1 minute, depending on your connection and ability to follow instructions.

Stand up to what?  Dudes posting funny memes and pr0n and downloading movies and music?  Yeahr get dem turrerists!
No place to hide?  When you're online you're in their house!  On their field.  This is what they know.  You don't need government resources or funding to get a computer and to read books and learn.  This ain't no 9/11.  There ain't no required gear that you can't afford.  There ain't no explosives needed to be placed by the presidents family.  It's a computer virus combined with a little direction and effort.  No money or special skills needed.  They do not know anything special that you aren't capable of knowing.

yup
: Re: How one man tracked down Anonymous—and paid a heavy price.
: Kilika February 10, 2011, 05:53:35 PM
you do not talk about fight club

Why? And why not reveal one is part of those people? Because what they do is illegal, that's why. If a person breaks the law in an effort to combat something they feel is wrong, they are no better than the the ones they are protesting against. Evil for evil never works in the end. There is a reason why people hide, and it isn't because they are abiding by the law, it's because they don't want to get caught doing things they know is illegal.

Why do you hate hacking?  Oh, that's right, because it means doing something other than posting uselessly on a message board.  I forgot where I was...  Hacking doesn't damage anything.  Deleting files might be implied as damage, but if they were intel files about you and your friends, you'd delete them too.

Look, I've been working on computers for over 20 years, I know the deal, so it's not like I'm sitting back runing my mouth out of ignornace. My first computer class was WAY back in 1981. I choose not to know how to hack because I simply don't agree with breaking into other people's stuff. It's called respecting other people's property.

And yes, hacking does do damage. If you go into some businesses database and wipe it clean, you just did damage to their property without authorization. That's criminal, and you should go to jail for it.

And no, I would not delete them because I wouldn't be there in the first place. Unlike some, I respect other people's property, regardless of what they have. There is such a thing as rule of law, and if they get caught, they'll learn how illegal their activity really is.

Digital anarchists?  Yeah, no one should police the internet.  I agree with them.  And they don't arbitrarily attack people/ servers.  Unless it's like, against other "anon boards" and that's really more of a game/ fun.

You just proved my point. You people think it's all just a game of cat and mouse, catch me if you can mentality. And from this post, it sounds like your more than in agreement. I think you spoke too much. Too bad you don't have the 133t skills to go in and delete these files, afterall, it's just fun isn't it?

I've never ever heard an anon talk about black or white hats.  In fact most shit about anon isn't refuted because showing up to defend anon kinda outs you.  A game is supposed to be mentally challenging.  Some people use all their ability to have a good time and I support that.  You call it cheating in a game, I call it being better equipped to win.

Do you see the theme?  They think they're elite because of their knowledge.  You think you're elite because of your morals.  The man thinks he's elite because of his influence.  "Ah, vanity.  Definitely my favorite sin."

Then you haven't been listening. You got kiddy coders and button mashers, then you get people who actually have some skills, and that community is either black or white hats. Thought you were up on all that?

But the bolded part is the classic attitude of game cheaters, because they have no gaming skills at all, so they are forced to cheat to "level up". They don't want to be bothered with actually playing by the rules because they are weak and lazy. I bet you just love wall hacks don't you? Your kind makes me sick to my stomach!

Care to state your actual age child? Because I've heard your exact attitude from many kids in the gaming world. Too fat and lazy to actually learn something, but you'll spend all kinds of time trying to circumvent the rules.

You do realize that a game is created with rules for a reason right? Apparently not. I guess you think they are there just to be broken. The whole point of a game is to have fun with an agreed-upon set of rules. But you types I guess don't care about rules.

And you talk to me about morals! Figues you'd revel in sin. You apparently have no morals expect your own, and no I don't think I'm elite, just forgiven. Thank you Jesus!

to keep the anon's actions secure

Why would you want to keep your actions "secure"? Because you know good and well what your doing is illegal and you'd go to jail if caught. Tell the FBI your just being secure and having fun, and see what they tell you. I'd recommend your friends stop before they have to explain to their cellmate Bubba they were just having fun.

Anon has never done anything that messes with your life or destroys legitimate business

Are you really that deluded?

Clearly from your repeated posting, you have no clue how electronic security/ networking/ devices and access work.

From my repeated posting? What does that mean in relation to any knowledge? As I stated, I've been working with computers most of my adult life. Granted it's hardware maintenance and a dash of programming, but still I have no doubt I have more knowledge about it than you, since I suspect I was being trained on computers before you were even alive. Ever used a card reader? I bet you never even seen one in person. You want to talk coding big boy? Try coding with punch cards. I was trained how to do it, and have done it. Seriously, you don't want to go there!

When you're online you're in their house!  On their field.

So your telling me hackers own the internet? I thought Al Gore did! ::)

You ever heard of a whistleblower?

Get real dude! They aren't whistleblowers, they are criminals breaking the law, that's why they hide their identities.

And you really should wake up and smell reality, Your playing in a world that could get you tossed in prison.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: Elder February 10, 2011, 07:05:27 PM
Why? And why not reveal one is part of those people? Because what they do is illegal, that's why. If a person breaks the law in an effort to combat something they feel is wrong, they are no better than the the ones they are protesting against. Evil for evil never works in the end. There is a reason why people hide, and it isn't because they are abiding by the law, it's because they don't want to get caught doing things they know is illegal.

Yes, every law is justice and every gubberment offical is a GOD.

YOU ARE RIGHT THERE THOUGH.  They don't want to "get caught" by evil, parasitic Agent Smiths.
The Jews hid from the Nazis.  What they were doing was illegal.  What the people helping them did was illegal.

Look, I've been working on computers for over 20 years, I know the deal, so it's not like I'm sitting back runing my mouth out of ignornace. My first computer class was WAY back in 1981. I choose not to know how to hack because I simply don't agree with breaking into other people's stuff. It's called respecting other people's property.

And yes, hacking does do damage. If you go into some businesses database and wipe it clean, you just did damage to their property without authorization. That's criminal, and you should go to jail for it.

Are you running a bait and switch or are you just not on point?
Anonymous does not go in and wipe business databases FOR FUN or FOR NO REASON and if you were targeting them, and they targeted you because of it, then you got what you deserved.

And no, I would not delete them because I wouldn't be there in the first place. Unlike some, I respect other people's property, regardless of what they have. There is such a thing as rule of law, and if they get caught, they'll learn how illegal their activity really is.

You just proved my point. You people think it's all just a game of cat and mouse, catch me if you can mentality. And from this post, it sounds like your more than in agreement. I think you spoke too much. Too bad you don't have the 133t skills to go in and delete these files, afterall, it's just fun isn't it?

Love that vanity.  And that switch.  I mention they raid other anon sites for fun, you imply I am one of them, here, on a mission.  And that athoratay.

Then you haven't been listening. You got kiddy coders and button mashers, then you get people who actually have some skills, and that community is either black or white hats. Thought you were up on all that?

But the bolded part is the classic attitude of game cheaters, because they have no gaming skills at all, so they are forced to cheat to "level up". They don't want to be bothered with actually playing by the rules because they are weak and lazy. I bet you just love wall hacks don't you? Your kind makes me sick to my stomach!

Care to state your actual age child? Because I've heard your exact attitude from many kids in the gaming world. Too fat and lazy to actually learn something, but you'll spend all kinds of time trying to circumvent the rules.

You do realize that a game is created with rules for a reason right? Apparently not. I guess you think they are there just to be broken. The whole point of a game is to have fun with an agreed-upon set of rules. But you types I guess don't care about rules.

Oookay.  I don't play video games.  Or watch TV.  I read books and go to movies, and hang out online.  Notice I only have like 50 posts.
Also, I'm 30, tall, very fit, a college drop-out with a 4.0 gpa (they're so full of it that I decided I didn't need their permission to be a productive member of society, I could just go out and do it and learn about whatever I take interest in) I work two jobs now while I'm young and single and it's easy and the economy sucks, (and I noticed I get random awesome opportunities because I'm always around people and I actually have cash) and I didn't need anyone to tell me what is right.  I base my OPINION (thats all anyone has) of what is right on a wide set of philosophies that I have read.  But you'll probably read that as "the road to Hell is broad."

And you talk to me about morals! Figues you'd revel in sin. You apparently have no morals expect your own, and no I don't think I'm elite, just forgiven. Thank you Jesus!

Forgiven?  That's a word you're using in place of elite.  I mentioned that your elitism extended from your morals because you back your opinion with religion.  Thinking you are special, or part of a special group, that'd be the required foundation of elitism.

Why would you want to keep your actions "secure"? Because you know good and well what your doing is illegal and you'd go to jail if caught. Tell the FBI your just being secure and having fun, and see what they tell you. I'd recommend your friends stop before they have to explain to their cellmate Bubba they were just having fun.

Are you really that deluded?

Implying I know any anonymous or are a part of any such group.
Yes, we should all bow to King George's laws of warrant-less wiretaps, add noisome...

From my repeated posting? What does that mean in relation to any knowledge? As I stated, I've been working with computers most of my adult life. Granted it's hardware maintenance and a dash of programming, but still I have no doubt I have more knowledge about it than you, since I suspect I was being trained on computers before you were even alive. Ever used a card reader? I bet you never even seen one in person. You want to talk coding big boy? Try coding with punch cards. I was trained how to do it, and have done it. Seriously, you don't want to go there!

I was just saying that I've never read a post from you that implied you had any advanced computer knowledge.  Okay, here's the first one.

So your telling me hackers own the internet? I thought Al Gore did! ::)

I like strawmen, let's do it: you can only own what you can keep and defend.

Get real dude! They aren't whistleblowers, they are criminals breaking the law, that's why they hide their identities.

Lol.  Really?  Is that what you think?

And you really should wake up and smell reality, Your playing in a world that could get you tossed in prison.

Implying again that I've done or admitted to doing anything illegal.
I'm fairly certain I know how real real is. 
There is a real possibility of a scientific dictatorship as Alex describes.  Will the hackers still be stupid ignorant basement-dwelling children when they fight to free the internet of censorship and dictatorial control?
: Re: How one man tracked down Anonymous—and paid a heavy price.
: charrington February 11, 2011, 02:12:29 AM
Yeah, they do stuff alright, and at the same time don't have the courage to stand up publically and voice their displeasure for whatever they supposedly stand for. Instead, they hide and cower in the dark recesses of society like little bugs.

So from your post, I gather you support these clowns? Can you tell I hate hacking, and have a very low opinion of people of their pursuation? To me those types are anti-social introverted cowards. A hack is a hack.

Just because you don't like somebody, that doesn't give you the right to cause harm or damage to someone's property. They are no better than idiots who run around damaging storefronts at G20 meeting protests while wearing masks. They are digital anarchists.

I've had long discussions with some of that type (both black and white hats) over gaming when I was in game development and we were talking about cheating in gaming. Some of the attitudes of these types is unbelievable. They think they can just run amok doing whatever they want just because they think they got some kind of leet skills. Whatever.

It just a bunch of punk kids, or adults that never grew up that are seriously misguided in the way they show their displeasure.

I mean seriously, don't you think it strange these guys haven't been caught? With as much stuff as they are alledgely to have done? There is NO WAY they are getting away all on their own. They got government help, and some of them are most likely wearing military uniforms I suspect.

Why? It's a perfect cover, a digital false flag to show how much society needs the government(not!) to help them stop these raskle hackers from destoying legitimate business.

Sorry, I ain't buying it.
Some of them have been caught - but if you read up on botnets you'll see why it's at times impossible to trace them. Believe me there are ways you can do things and not be seen online. 20-40 ish in age -- if you want to experience / learn it for yourself -- head over to 4chan and start asking questions. Although I really don't recommend that at all.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: kaostrophe February 11, 2011, 03:47:18 AM
always haters, i wish i had the skills
: Re: How one man tracked down Anonymous—and paid a heavy price.
: charrington February 11, 2011, 04:15:13 AM
always haters, i wish i had the skills
No kidding ...
: Re: How one man tracked down Anonymous—and paid a heavy price.
: Kilika February 11, 2011, 07:15:17 AM
Okay, whatever. Some people just don't get it. ::)
: Re: How one man tracked down Anonymous—and paid a heavy price.
: charrington February 11, 2011, 02:57:52 PM
Okay, whatever. Some people just don't get it. ::)
Truer words have yet to be spoken.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: Albert_Pike February 17, 2011, 04:51:02 AM
I think the Church of Scientology (a ruthless and violent criminal organization disguised as a religion) quickly infiltrated anonymous and did them in good. They even stalked and threatened the lives of Dozens of it's leading members. I'm not sure if anyone in anonymous was actually murdered by CoS though..

Anonymous is comprised of mostly teenagers and twenty-somethings. The immature drunk and obnoxious college party-type kids, potheads, and depraved sexual deviants. I side with the morals of anon's efforts to expose Scientology as a relentless thieving and sometimes murdering, global criminal organization. But I can't justify the morals behind hacking credit card companies.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: tinfoiltruth February 17, 2011, 09:47:09 AM
I think the Church of Scientology (a ruthless and violent criminal organization disguised as a religion) quickly infiltrated anonymous and did them in good. They even stalked and threatened the lives of Dozens of it's leading members. I'm not sure if anyone in anonymous was actually murdered by CoS though..

Anonymous is comprised of mostly teenagers and twenty-somethings. The immature drunk and obnoxious college party-type kids, potheads, and depraved sexual deviants. I side with the morals of anon's efforts to expose Scientology as a relentless thieving and sometimes murdering, global criminal organization. But I can't justify the morals behind hacking credit card companies.

never hacked any credit card company's. they did a DDoS which is not hacking. Hacking is the act of gaining access to someones system. they had no more access then you do to there website.

now in the case of this story they did hack there email server to get information, and I believe they deleted backups.

either way my point is if your are going to accuse someone of something atleast accusing them of the right thing.
: Re: How one man tracked down Anonymous—and paid a heavy price.
: 37 February 17, 2011, 10:07:36 AM
Anonymous speaks: the inside story of the HBGary hack
http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/


This is a great analysis of how it happened...and is written in a manner that even the layman can understand what went down. 

Sorry if someone else posted it...but, bump worthy if so.
: Computer expert says US behind Stuxnet worm
: charrington March 04, 2011, 11:38:39 PM
A German computer security expert said Thursday he believes the United States and Israel's Mossad unleashed the malicious Stuxnet worm on Iran's nuclear program.

"My opinion is that the Mossad is involved," Ralph Langner said while discussing his in-depth Stuxnet analysis at a prestigious TED conference in the Southern California city of Long Beach.

"But, the leading source is not Israel... There is only one leading source, and that is the United States."

There has been widespread speculation Israel was behind the Stuxnet worm that has attacked computers in Iran, and Tehran has blamed the Jewish state and the United States for the killing of two nuclear scientists in November and January.

"The idea behind Stuxnet computer worm is really quite simple," Langner said. "We don't want Iran to get the bomb."

The malicious code was crafted to stealthily take control of valves and rotors at an Iranian nuclear plant, according to Langner.

"It was engineered by people who obviously had inside information," he explained. "They probably also knew the shoe size of the operator."

Stuxnet targets computer control systems made by German industrial giant Siemens and commonly used to manage water supplies, oil rigs, power plants and other critical infrastructure.

"The idea here is to circumvent digital data systems, so the human operator could not get there fast enough," Langner said.

"When digital safety systems are compromised, really bad things can happen -- your plant can blow up.

Most Stuxnet infections have been discovered in Iran, g...
MORE

http://www.breitbart.com/article.php?id=CNG.5eda08e8eb1b42b79c577796fd7c8cba.da1&show_article=1
: 16 yr old Girl is Anonymous member that Hacked HBGary and exposed company
: charrington March 17, 2011, 01:00:48 PM
Next time you see a flock of teenage girls in the mall, note that one of them might be Kayla. As your average 16-year-old, she regularly hangs out with friends, works part time at a salon and hopes one day to be a teacher.

Behind the scenes though, she’s a big time supporter of Anonymous, the loosely knit global hacking group that brought down the Web sites of MasterCard and PayPal in defence of WikiLeaks. That’s what she claims at least. Kayla flits around the web with so covert an identity that I cannot fully verify her age or gender.

Still, the girl known on chat forums as ‘k, and who spoke to me by e-mail as “Kayla,” is no figment of the Internet’s imagination: she helped all but destroy a company. When Aaron Barr, the now-former CEO of software security firm HBGary Federal, claimed in a press report that he could identify members of the Anonymous collective through social media, she and four other hackers broke into his company’s servers in revenge, defacing his Web site, purging data and posting more than 50,000 of his emails online for the world to see, all within the space of 24 hours.

Kayla played a crucial role, posing as HBGary CEO Greg Hoglund to an IT administrator (who happened to be Nokia security specialist Jussi Jaakonaho) to gain access to the company’s servers. Read their email correspondence here and here. In the fallout, Barr’s emails revealed HBGary had proposed a dirty tricks campaign against WikiLeaks to a law firm representing Bank of America. Other security firms distanced themselves. Kayla and her buddies had opened a can of worms.

Today while HBGary picks up the pieces, Kayla still spends a few hours a night on Anonymous chat channels looking for her next target. Most recently it was the Libyan government, helping get information to Libyan citizens in the Internet blackout.

With just half a dozen close friends online, she has a strict regimen to remain invisible on the web. Each night she wipes every one of her web accounts and deletes every email in her inbox.  She has no physical hard drive and boots her computer from a microSD card. “I could hide this card anywhere or chew into a million pieces in a few seconds,” she says by e-mail. She keeps her operating system on a USB stick and uses a virtual machine (VM) to carry out her online shenanigans.

So paranoid is Kayla of being caught or hacked by others, that despite several requests she would not speak to me on Skype to verify an adolescent-sounding voice. Our only evidence: others in Anonymous vouch for her age, her emails are punctuated with smiley faces and “lols” and she is relatively well-known on hacking forums. Still, rumors abound that Kayla is a mid-20s male from New Jersey named Corey Barnhill, who also goes by the pseudonym Xyrix.

When I put this to Kayla she countered that in 2008 (aged 14) she and a few other users of an early Anonymous IRC network called partyvan, hacked the account of fellow user Xyrix in defence of an online friend. Kayla used Xyrix’s (Corey’s) account to social engineer an IRC operator and got her target’s personal information. The operator thought Xyrix was Kayla, added her to Xyrix’s Encyclopedia Dramatica page, and the rest is history.

How did this mystery girl become a hacker? Kayla says that’s down to her dad, a software engineer who won custody over her after a divorce that deemed him the “more ’stable’ parent.” They moved to the countryside where others her age were few and far between. The house was meanwhile littered with programming books on Linux kernel, Intel manuals and networking books. “I just started reading them,” she says. By the time Kayla was 14 she could fully program C and x86 assembly.

“My dad encouraged it at first,” she says. “He thought it was awesome I was so in to what he did.” Dad allegedly showed her how to find bugs in C source code and exploit them. It was all harmless and Kayla had only been using the Internet to talk to friends on MSN. But she began looking into hacking, and learned scripting languages like Perl, Python and PHP, figuring out how to use databases like MySQL and how to attack them using SQL injection.

She registered at a few online hacking forums but was snubbed because of her age–apparent because in the early days she gave her personal details when registering. “Fair enough I was only 14 but it made me so angry,” she says. She took revenge by hacking into the forums themselves and disrupting things, impressing some of the users–though things got weird when one or two developed crushes.

Then an older male user that she hacked into hit back by digging up her e-mail address and phone number from old MSN information that was still on the web. He called her house and threatened to contact the police. Upon realising how he’d got her details–it was “like a slap in the face”–Kayla did everything she could to scrub the web clean of her identify.

In December 2008, she wrought havoc on one of the most famous forums of all, 4chan’s notorious /b/ channel, finding and exploited an SQL injection bug on its content management system, hacking in and causing mayhem on the forum for a few hours.

Meanwhile, Anonymous was emerging from that very online community to become the gateway to pseudo-political activism it is today. Earlier that year in January 2008, many of its users gathered on 4chan to hack the Church of Scientology after it tried to remove a controversial video of Tom Cruise on YouTube.

Kayla eventually found her way onto the Anonymous IRC, partyvan. “I just went along with everyone else and used Internet magic to generate lulz,” she says. Anonymous at first was causing trouble online for fun, hacking other hackers and trolls (folks who post spurious comments on forums) and posting their private messages online. “It was all good fun.”

While other people her age were browsing Facebook, Kayla was advancing her programming skills, memorizing Windows Opcodes and scouring source code for exploitable bugs, learning off information that was freely available on the Internet.

Eventually, she joined Anonymous’ Operation Payback and helped launch distributed denial of service (DDoS) attacks against  an Indian company that was DDoS-ing bittorrent site Pirate Bay. “I never really cared for politics and such until I started hanging round the Payback IRC,” she says. “I started to see the world for the corrupt mess it really is. A world where politicians and corporations could bend the rules and laws to suit their own needs.”

These days Kayla’s dad is aware of her activities with Anonymous, and while he is concerned about the legal implications–she lives in a country where she could be tried as an adult–she says he finds the whole thing “hilarious.”

Meanwhile she refuses to be chained to her computer, limiting herself to a few hours a night online. She rarely visits online forums–they’re “boring”–and a few days a week takes a course in college to further her goal of being a teacher. She lives in an English-speaking country–not the U.K.–but won’t say more about it.

Kayla is understandably cagey...
MORE

http://blogs.forbes.com/parmyolson/2011/03/16/is-this-the-girl-that-hacked-hbgary/ [/b]
: Re: 16 yr old Girl is Anonymous member that Hacked HBGary and exposed company
: ekimdrachir March 17, 2011, 01:44:22 PM
Winning!
: Re: 16 yr old Girl is Anonymous member that Hacked HBGary and exposed company
: twotone March 22, 2011, 03:24:00 PM
That's awesome.
: Re: 16 yr old Girl is Anonymous member that Hacked HBGary and exposed company
: iks83 March 23, 2011, 03:17:29 AM
Well its a nice story but also unverifiable. Still someone should inject some info about whats really going on into their payback IRC channel. They defend wikileaks like a religion and Ass-ange like he is the new messiah. They could do so much good but they have no clue whats going on. Probably most of them are obamanoids and environ-mentals.
: Anonymous f**k up sony's shit
: jesussdad April 06, 2011, 07:32:44 PM
i was just searching around for why i can't sign in and play some red dead redemption online and was pleased to discover it was for good reason on this forum
http://www.psu.com/forums/threads/272293-PSN-Error-Code-80710092

http://www.youtube.com/watch?v=tcSCUU4Fg9k&feature=player_embedded
: Re: Anonymous f**k up sony's shit
: jesussdad April 07, 2011, 10:54:55 AM
well i managed to get some play last but its down again today. i still dont mind but i was under the impression that they would only be attacking ps store. anyways some good mixed comments on this link.

http://arstechnica.com:80/tech-policy/news/2011/04/anonymous-attacks-sony-to-protest-ps3-hacker-lawsuit.ars?comments=1#comments-bar
: Re: Anonymous f**k up sony's shit
: Seroquel XR April 07, 2011, 12:57:11 PM
http://forum.prisonplanet.com/index.php?topic=205355.0 (http://forum.prisonplanet.com/index.php?topic=205355.0)
: Re: Anonymous f**k up sony's shit
: jesussdad April 10, 2011, 08:57:42 AM
im a bit torn on this issue now. im all for being able to use an alternative os or making home brew software but since this issue has been around ive seen a massive increase in online cheaters and its just ruining it for the majority.
: Department of Homeland Security Out to Get PSN Hackers
: nirosive April 30, 2011, 06:14:37 PM
PS3 false flag?  :-\

The external intrusion into the PlayStation Network has led to undoubtedly the worst fiasco in the PlayStation universe since the ApocalyPS3 of 2010. If the readers are like us, then we’re all not only sick of the PSN being down but are also sick of all the news surrounding it with little to no positive light at the end of the tunnel. Finally, there finally appears to be some progress in the making thanks to the unveiling of some assuring details.

Despite the word that SCEA is working around the clock with third-party security organizations to bring the network back up for our online gaming pleasure, users were not told what team was conducting the investigations, how large the said company was, and to what extent their resources were spanning out to. However, in a surprising turn of events, the United States Department of Homeland Security revealed that the federal division is lending their hand in assessing the damages of the PSN’s breach. According to Chris Ortman of the DHS:

    The Department of Homeland Security is aware of the recent cyber intrusion to Sony’s PlayStation Network and Qriocity music service. DHS’ U. S. Computer Emergency Readiness Team is working with law enforcement, international partners and Sony to assess the situation.

Also lending their aid straight out of the US legislature is also the Federal Bureau of Investigation. According to one of the officials on the case, Special Agent Darrell Foxworth:

    The FBI is aware of the reports concerning the alleged intrusion into the Sony on line game server and we have been in contact with Sony concerning this matter. We are presently reviewing the available information in an effort to determine the facts and circumstances concerning this alleged criminal activity.

While cabinets of the government are not necessarily hired for situations, the DHS and FBI have justified their involvement on the situation, despite it being an attack on a gaming infrastructure of all things, due to the sheer number of PSN users that may have potentially been affected along with the fact that financial credentials of citizens are on the line. While it definitely is safe to say that the big guns are on the scene, there is no telling with situations in which hackers are involved.

http://playstationlifestyle.net/2011/04/30/department-of-homeland-security-out-to-get-psn-hackers/
: Sony announces 25 million extra users hacked
: charrington May 03, 2011, 11:49:56 AM
(http://onlinegamernews.net/sites/default/files/styles/large/public/field/image/playstation_network.jpg)
They have just announced that 25 million extra game user accounts have been hacked. The network, which they promised would be back up in a week has still been undergoing downtime since April 20. Last week Sony admitted that 77 million personal details may have been stolen by hackers.

Since this breach has happened, Sony’s shares have dropped by 4%. I guess this is really a matter of showing what games console is the most secure. Obviously in this case it is Microsoft’s Xbox 360. Which has had some game glitches in it’s time, but nothing compared to this huge cyber attack on the Playstation.

If Sony doesn’t sort a fix very soon, then their sales and shares will decrease on a large scale. I’m pretty sure most Playstatio...

MORE
http://www.thetechblog.co.uk/wp3/?p=117
: Anonymous strikes again: Iranian and UAE governments hacked
: charrington June 04, 2011, 03:06:12 PM
Hackers have broken into the networks of both the Iranian and the Dubai governments, stealing more than 10,000 email messages as well as system usernames and passwords and releasing them online.

The Iranian Ministry of Foreign Affairs succumbed to a hacking attack perpetrated by Anonymous, which yielded the bulk of the email addresses. And, on Friday afternoon, a lone hacker – apparently with links to the group – struck the Dubai government’s system, releasing a “historic list of former gov.ae email passwords”, the domain used by the Arab Emirate.

While the first hack yielded around 10,000 emails, taken from the Iranian government and took control of some of its servers, the second was much smaller, including only around 100 usernames with passwords taken from the Dubai government, which are thought to be out-of-date. However, they serve to indicate the group’s reach just one day after another hacking group carried out an attack which yet again rocked Sony.

The hacktivist responsible for targeting Dubai said he had carried out the assault “because it’s time governments learn they have no power on the internet. This is our world”.

Reports first surfaced on technology and hacking blogs yesterday that Anonymous, perhaps the best-known of the so-called “hacktivists” had broken into the Iranian government’s system. One of the hackers reportedly sent a message to The Next Web from the Iranian servers they controlled in a bid to prove their authenticity.

According to Joel Falconer, writing for the technology blog, the emails in Anonymous’ possession and released on file-sharing site Pirate Bay include approvals and rejections for visas and passports.

He quotes a source from the group as saying: “It’s near the election’s anniversary. [Iran’s contested 2009 election] We had to do something.”

Falconer reports the source, predictably unnamed, as saying the group takes down Iranian government servers on a regular basis. The source also threatened a further attack: “For the election’s anniversary, we have a complete DDoS [Denial of Service] attack day,” he told Falconer.

On Friday evening, the @Anony_Ops Twitter account, said to be used to announce Anonymous operations, tweeted: Anonymous releases Dubai, UAE government’s usernames and passwords…They should’ve expected us!” as...
Continued...

http://blogs.independent.co.uk/2011/06/03/anonymous-strikes-again-iranian-and-uae-governments-hacked/
: Spanish police says that they have arrested the leaders of Anonymous in Spain
: charrington June 10, 2011, 12:17:39 PM
(http://media.winnipegfreepress.com/images/648*441/PW101-515_2011_190904_high.jpg)
File - In this May 15, 2011 file photo people wearing masks often used by a group that calls itself "Anonymous" take part in a rally in Madrid. Spanish police arrested three suspected computer hackers that allegedly belonged to a loose-knit international activist group that has attacked corporate and government websites around the world, authorities said Friday June 10, 2011. A National Police statement identified the three detainees as leaders of the Spanish section of a group that calls itself "Anonymous." (AP Photo/Arturo Rodriguez)

MADRID - Spanish police say they have arrested three suspected computer hackers for allegedly belonging to a loose-knit international activist group that has attacked corporate and government websites around the world.

A National Police statement issued Friday identified the three detainees as leaders of the Spanish section of a group that calls itself "Anonymous."

Police said a computer server in one of their homes was used to co-ordinate and carry out the cyber attacks on targets including two major Spanish banks, the Italian energy company Enel and the governments of Egypt, Algeria, Libya, Iran, Chile, Colombia and New Zealand.

The statement said the only other co...
Continued...

http://www.winnipegfreepress.com/world/breakingnews/123602479.html
: IMF Hit by Cyber Attack
: charrington June 11, 2011, 08:11:15 PM
WASHINGTON—The International Monetary Fund is investigating a recent cyber attack that hit its network, the latest in a series of high-profile hacking incidents against major corporations and institutions.

The fund declined to disclose the nature of the attack, whether its systems were infiltrated or whether any confidential information had been compromised. The extent of any infiltration remains unclear.

"We had an incident," said IMF spokesman David Hawley. "We're investigating it and the fund is completely functional." He said IMF staff received a "routine notification" about the incident by email Wednesday asking them to contact their tech department "if they saw anything suspicious."

The threat against the institution is the latest in a recent series as it responds to economic turmoil in several European nations. Earlier this month, the IMF said it had taken precautions after a group called Anonymous indicated its hackers would target the IMF web site in response to the strict austerity measures in its rescue package for Greece.

The IMF has faced repeated cyber attacks in recent years. It routinely collects sensitive information about the financial conditions of its 187 member nations. Some data in its computer systems could conceivably be used to influence or trade currencies, bonds and other financial instruments in markets around the world.

The latest infiltration was sophisticated in that it involved significant reconnaissance prior to the attack, and code written specifically to penetrate the IMF, said Tom Kellermann, a former cybersecurity specialist at the World Bank who has been tracking the incident.

"This isn't malware you've seen before," he said, making it that much more difficult to detect. The concern, Mr. Kellermann said, is that hackers designed their attack to gain market-moving insider information.

The attackers appeared to have broad access to IMF systems, which would give them visibility into IMF plans, particularly as it relates to bailing out the economies of countries on shaky financial footing, Mr. Kellermann said.

The IMF spokesman wouldn't comment on any specific details of the incident, which was first reported Saturday by the New York Times.

The attack on the IMF led the World Bank this week to cut a network link between the two institutions, even though the tie is not used for confidential financial information or other sensitive data. The IMF and World Bank, whose headquarters are next door to each other in Washington, work closely together on economic concerns of their member nations around the world.

A World Bank official said Saturday the network link with the IMF "involved nonpublic, nonsensitive information and it was cut out of an abundance of caution."

The network link between the two institutions has been severe
Continued...

http://online.wsj.com/article/SB10001424052702304259304576380034225081432.html
: Re: IMF Hit by Cyber Attack
: Paranoid Puppet Master June 12, 2011, 04:39:58 AM
I came across the same subject on Bloomberg, and I thought this particular line was interesting:

The incident occurred before former Managing Director Dominique Strauss-Kahn was arrested for sexual assault on May 14, according to the person, a security expert who couldn’t be identified because he wasn’t authorized to speak on the subject. He didn’t say which government is thought to be behind the intrusion, which he said involved the removal of a “large quantity” of data.


And then later:

The FBI has said it would increase efforts to combat cyber-attacks by criminal gangs, industrial spies and foreign governments.

So, they have already ruled out that it could have been someone from the US government, only "foreign" governments would attack the IMF right?

http://www.bloomberg.com/news/2011-06-11/imf-computer-system-infiltrated-by-hackers-said-to-work-for-foreign-state.html (http://www.bloomberg.com/news/2011-06-11/imf-computer-system-infiltrated-by-hackers-said-to-work-for-foreign-state.html)
: Re: IMF Hit by Cyber Attack
: charrington June 12, 2011, 10:23:24 AM
I came across the same subject on Bloomberg, and I thought this particular line was interesting:
 

And then later:

So, they have already ruled out that it could have been someone from the US government, only "foreign" governments would attack the IMF right?

http://www.bloomberg.com/news/2011-06-11/imf-computer-system-infiltrated-by-hackers-said-to-work-for-foreign-state.html (http://www.bloomberg.com/news/2011-06-11/imf-computer-system-infiltrated-by-hackers-said-to-work-for-foreign-state.html)

Yes I believe I've read that elsewhere also -- I think they are blaming it on a "Nation State" so it wouldn't be an American attack - that is if you still believe anything they tell you. Even if it were true it doesn't mean it's not American funded. Right?
: LulzSec strikes again
: charrington June 13, 2011, 11:30:38 PM
Dear Internets,

It has come to our unfortunate attention that NATO and our good friend Barrack
Osama-Llama 24th-century Obama have recently upped the stakes with regard to hacking.
They now treat hacking as an act of war. So, we just hacked an FBI affiliated website
(Infragard, specifically the Atlanta chapter) and leaked its user base. We also took
complete control over the site and defaced it, check it out if it's still up: http://infragardatlanta.org/

While not very many logins (around 180), we'd like to take the time to point out that all
of them are affiliated with the FBI in some way. Most of them reuse their passwords in other places,
which is heavily frowned upon in the FBI/Infragard handbook and generally everywhere else too.

One of them, Karim Hijazi, used his Infragard password for his personal gmail, and the gmail of
the company he owns. "Unveillance", a whitehat company that specializes in data breaches and botnets,
was compromised because of Karim's incompetence. We stole all of his personal emails and his company
emails. We also briefly took over, among other things, their servers and their botnet control panel.

After doing so, we contacted Karim and told him what we did. After a few discussions, he offered to
pay us to eliminate his competitors through illegal hacking means in return for our silence. Karim,
a member of an FBI-related website, was willing to give us money and inside info in order to destroy
his opponents in the whitehat world. We even discussed plans for him to give us insider botnet information.

Naturally we were just stringing him along to further expose the corruption of ...
Continued...

http://lulzsecurity.com/releases/f**k_fbi_friday_PRETENTIOUS%20PRESS%20STATEMENT.txt
: Re: LulzSec strikes again
: WakeUpAmerica June 13, 2011, 11:39:57 PM
My article on it: http://forum.prisonplanet.com/index.php?topic=210496.0

I speculate about it possibly being a red team op
: Facing Prison, PS3 Hacker Tells Sony: You'll Have to "Kill Me" to Silence Me
: charrington June 19, 2011, 03:04:13 PM
(http://images.dailytech.com/nimage/20497_Freedom_Braveheart_Wide.jpg)
Sony harassment of the modding/hacking community continues even as it faces a record number of intrusions

People often ask what exactly Sony Corp. (6758 (http://www.google.com/finance?q=TYO%3A6758)) did to convince hackers groups like LulzSec and Anonymous to hack the company 19 times  (http://www.dailytech.com/Welcome+to+2011+Year+of+the+Hacker/article21896.htm)so far [1][2][3][4][5][6][7].  An answer may lie in cases like that of Alexander Egorenkov.

Mr. Egorenkov, a young German and associate of the team of German hardware hackers fail0verflow helped people jailbreak the PlayStation 3 by authoring the "Hypervisor Bible" (http://www.monova.org/torrent/4242761/PS3_-_Hypervisor_-_Bible.html) [torrent] a guide to Sony's PS3 software protection layer.  Mr. Egorenkov, who goes by "graf_chokolo" online, says his goal was simply to allow people to make full use of the hardware they legally bought.

Sony initially encouraged Linux (OtherOS) installs on PS3s, but with the launch of the PS3 Slim (http://www.dailytech.com/Update+PS3+Slim+Officially+Announced+Will+Go+On+Sale+September+1/article16010.htm) killed the support and issued patches that blocked existing machines from utilizing the newly disallowed Linux.

When famed U.S. iPhone hacker George "GeoHot" Hotz and the folks at fail0verflow hacked the PS3 and reallowed Linux via jailbreak (http://www.dailytech.com/GeoHot+Fail0verflow+Pwn+Sony+PS3+Post+Root+Keys/article20549.htm), an outraged Sony lashed out.  Harassing Mr. Hotz with court-aided intrusions into his private online accounts, (http://www.dailytech.com/Geohot+Fail0verflow+Sued+by+Sony+for+PS3+Jailbreaking/article20645.htm) Sony similarly worked to punish Mr. Egorenkov for trying to free users from Sony's restraints.

They convinced German authorities to raid Mr. Egorenkov's home and seize his personal computers and electronics.  They also filed suit against him in Hamburg District Court (Docket no. 310 O 24/11) for 1M € (appr. $1.43M USD) in damages.  The court ordered him to take down any copies of the "Hypervisor Bible". 

Mr. Egorenkov refused to comply.  He uploaded a backup copy of "coolstuff.rar", which Sony's lawyer Peter Ruess says includes "copies, decrypted copies and reverse-engineered information of files belonging to the confidential core firmware used in the PlayStation3 which is distributed by our client." 

Backups were given to friends to prevent Sony's efforts to permanently remove the guide.

Sony motioned for Mr. Egorenkov to be found in violation of court order, which a Hamburg judge affirmed.  A defiant Mr. Egorenkov writes that Sony would have to kill him to keep him silent.  He writes:

    The SONY's lawyer asked me why I'm doing what I'm doing, because of my hatred for SONY? He cannot understand why I'm doing it, because he is paid for what he does. I'm not. I don't hold a grudge against SONY even now Hatred clouds your mind, keeps you from more important things. I have a better use for my mind and knowledge.

    So, SONY you failed again, you took my equipment but my mind is still free and you canot control it. You failed again. They are just tools, I can get new ones and will continue my HV reversing and bringing back PS3 Linux which you took from us. If you want me to stop then you should just kill me because I cannot live without programming, HV and Linux kernel hacking You know who am I and where I live, so come and get me !!!

(Capitalization edited for readability.)

Well, unlike GeoHot who was fortunate enough to earn a reportedly favorable settlement with Sony, Mr. Egorenkov was not so fortunate.  He's reportedly bankrupt and has been ordered to go to prison in Germany if he can't find a way to pay up for his court costs and damages to Sony.

He writes on his blog:

    Hi guys, no money left anymore. Going to jail soon probably because I cannot pay court costs.

    But I'm ready to stand up for everything I said and go to jail for that too. It’s not important to win, more important is to show them that we are ready to fight, that they cannot scare me off easily. Yeah, I'm ready to go to jail for my believes and my principles.

    Most of people probably think that all computer and kernel hackers are weak kids, hiding in a cellar, eating pizza whole day, writing software and looking for attention Maybe, but that’s NOT me. And I will get out eventually and continue my work. My work means very much to me.

(Capitalization edited for readability.)

People interested in supporting Mr. Egorenkov's efforts to retain his freedom are encouraged to donate here.

It's sad the inconvenience to gamers that the recent attacks on Sony have caused.  But one has to wonder if Sony isn't partially to blame for it, given its belligerent stance towards its most tech-savvy users.

This behavior stands in sharp con...
Continued...

http://www.dailytech.com/Facing+Prison+PS3+Hacker+Tells+Sony+Youll+Have+to+Kill+Me+to+Silence+Me/article21939.htm (http://www.dailytech.com/Facing+Prison+PS3+Hacker+Tells+Sony+Youll+Have+to+Kill+Me+to+Silence+Me/article21939.htm)
: Sony just got breached for the 20th time in two months.
: charrington June 21, 2011, 12:01:09 AM
Sony’s unprecedented spree of security breaches in the last two months may be finally cooling off, as profit- and attention-seeking hackers move on to other vulnerable targets. But it’s not quite over yet.

Over the weekend hackers announced that they had gained access to 177,000 emails through a SQL injection vulnerability on Sony Pictures’ French website. That’s the same sort of vulnerability intruders have used to breach Sony Pictures Russia, Sony Portugal, Sony Europe and Sony Ericsson Canada. And according to Attrition.org, a breach-focused website that has been closely counting the Sony attacks, this attack represents the 20th breach in just the 60 days since Sony announced that its PlayStation Network had been hacked sometime between the 17th and 19th of April.

The hackers responsible, an 18-year-old Lebanese computer science student who uses the handle Idahc and another French hacker who goes by the name Auth3ntiq, claim in their announcement that they exposed the site’s vulnerability as a proof-of-concept, though they include 70 users’ email addresses as a sample of the compromised data. “We are not black hats,” they write.

In an interview with Idahc last week, he told me he considers himself a grey-hat hacker who’s working to publicize Sony’s lax attitude toward security and push the company to fix its exposure of users’ data, although he has never directly contacted the company to help Sony fix its bugs. “I didn’t even publish all the information I had,” he wrote to me at the time. “It is not my goal to destroy. I want to help Sony.”

In one thin sign of good news for Sony, the attack comes 12 days after the company’s last breach, the longest interval since May and a sign that the Sony-hacking meme may be finally wearing thin for the hacker community.

Attrition.org notes that Sony’s stock ...
Continued...

http://blogs.forbes.com/andygreenberg/2011/06/20/in-sonys-20th-breach-in-two-months-hacker-claims-177000-sony-emails-compromised/ (http://blogs.forbes.com/andygreenberg/2011/06/20/in-sonys-20th-breach-in-two-months-hacker-claims-177000-sony-emails-compromised/)
: 19-year-old suspected of being mastermind behind computer hacking group LulzSec
: charrington June 21, 2011, 06:10:12 PM
19-year-old suspected of being mastermind behind computer hacking group LulzSec arrested in UK

Officers from the Metropolitan Police Central e-Crime Unit (PCeU) have arrested a 19-year-old man in a pre-planned intelligence-led operation.

The arrest follows an investigation into network intrusions and Distributed Denial of Service (DDoS) attacks against a number of international business and intelligence agencies by what is believed to be the same hacking group.

The teenager was arrested on suspicion of Computer Misuse Act, and Fraud Act offences and was taken to a central London police station, where he currently remains in custody for questioning.

Searches at a residential address in Wickford, Essex, following the arrest last night have led to the examination of a significant amount of material. These forensic examinations remain ongoing.

The PCeU was assisted by officers from Essex Police ...

http://content.met.police.uk/News/eCrime-unit-arrest-man/1260269113895/1257246745756 (http://content.met.police.uk/News/eCrime-unit-arrest-man/1260269113895/1257246745756)
: 'Anonymous' Warns NATO: 'This is no Longer your World'
: Sold2Christ July 05, 2011, 04:34:16 AM

NATO has poked the bear of the internet (which responded by announcing that it's actually a hydra).

Anthropomorphic confusion aside, a NATO security report about "Anonymous"—the mysterious "hacktivist" group responsible for attacks on MasterCard, Visa, PayPal, Amazon and, most recently, Sony—has led the underground group to respond by cautioning NATO, "This is no longer your world. It is our world - the people's world."

(More on TIME.com: Spain Nabs Alleged 'Anonymous' PlayStation Network Hackers)

NATO's report, issued last month, warned about the rising tide of politically-motivated cyberattacks, singling out Anonymous as the most sophisticated and high-profile of the known hacktivist groups:

"Today, the ad hoc international group of hackers and activists is said to have thousands of operatives and has no set rules or membership. It remains to be seen how much time Anonymous has for pursuing such paths. The longer these attacks persist the more likely countermeasures will be developed, implemented, the groups will be infiltrated and perpetrators persecuted," the report read, also asking, "Can one invoke Article 5 of the Washington Treaty after a cyber attack? And what response mechanisms should the Alliance employ against the attacker? Should the retaliation be limited to cyber means only, or should conventional military strikes also be considered?"



Read more: http://techland.time.com/2011/06/10/anonymous-warns-nato-this-is-not-your-world/#ixzz1RDa2u6n5
: Re: 'Anonymous' Warns NATO: 'This is no Longer your World'
: CmdrSoCal August 06, 2011, 07:55:12 PM
what is anonymous going to do, hack my ps3 again. anonymous are probably collectivist false flag cyber douches.
: Court Says Sending Too Many Emails To Someone Is Computer Hacking
: Jordan August 10, 2011, 12:17:00 AM
Okay, the courts are just getting out of hand when it comes to the Computer Fraud and Abuse Act (CFAA), which is supposed to be used against cases of malicious hacking. Most people would naturally assume that this meant situations in which someone specifically broke into a protected computing system and either copied stuff or destroyed stuff. And yet, because of terrible drafting, the law is broad and vague and courts are regularly stretching what the CFAA covers in dangerous ways.

The latest example, found via Michael Scott is that the Sixth Circuit appeals court has overturned a district court ruling, and is now saying that a labor union can be sued for violating the CFAA because it asked members to email and call an employer many times, in an effort to protest certain actions. Now some of the volume may have hurt the business, but does it reach the level of hacking? What's really troubling is even just the focus on emails:

    The e-mails wreaked more havoc: they overloaded Pulte's system, which limits the number of e-mails in an inbox; and this, in turn, stalled normal business operations because Pulte's employees could not access business-related e-mails or send e-mails to customers and vendors

So... because Pulte's IT folks set up their email boxes such that they could only hold a certain number of emails, suddenly this raises to the level of "hacking"? That seems like a stretch, and you can definitely see how such a rule can and likely will be abused. Especially since the court made some very broad statements, including:

    [We] conclude that a transmission that weakens a sound computer system—or, similarly, one that diminishes a plaintiff’s ability to use data or a system—causes damage.

Broad enough for you? I can see this ruling being cited in all sorts of abusive trials now.

http://www.techdirt.com/articles/20110809/03492415447/court-says-sending-too-many-emails-to-someone-is-computer-hacking.shtml
: Re: Court Says Sending Too Many Emails To Someone Is Computer Hacking
: Georgiacopguy August 10, 2011, 12:34:44 AM
Maybe their concept of denial of service attack is a bit outdated or out of whack...lol. "I cannot get my email because they filled my email box...they are denying me service!!! HAXORS!"
: Anonymous threatens Congress over copyright bill.
: Jordan August 25, 2011, 02:53:05 PM
Hackers from the group Anonymous released a video on the Web this week in which the collective calls out Congress for a controversial new bill that could put Internet users in prison for streaming videos online.

Should S.978 be put on the books, streaming copyrighted material on the Web could land a person in jail for up to five years in addition to costing thousands of dollars in fines. The video released from Anonymous specifically challenges how the law would punish video game users for sharing their own game play on the Web, which the hackers say is a form of censorship and a denial of the free flow of information.

Anonymous also notes that even providing a link to copyrighted content could cause users to wind up with legal woes and says that the legislation is a “tyrannical scheme” courtesy of Congress. The bill was introduced to the Senate in May of this year but has not made it to the voting room floor yet. The official description for S. 978 reads that the bill is being brought before lawmakers “To amend the criminal penalty provision for criminal infringement of a copyright, and for other purposes.”

Minnesota Democratic Senator Amy Klobuchar is a co-sponsor of the bill, and she says that the legislation is not as harsh as weary Web users seem to think. "The bill is not intended nor does it allow law enforcement to prosecute people who may stream videos and other copyrighted works to their friends without intending to profit from the work of the copyright owner," Klobuchar said at a Senate Judiciary Committee meeting in June. "It also does not allow prosecutors to go after individuals that innocently post links on their blogs to copyrighted protected works."

It could, however, cause felony charges if lawmakers seem to think that sharing content causes the copyright owner to miss out on money they could be making.

Anonymous hackers in Germany have already gone after authorities overseas for similar acts they consider censorship. On Monday Anonymous disabled the website of GEMA, a German watchdog that keeps an eye open for infringement of copyrighted music. Earlier this year hacktivists launched a denial-of-service attack on their site.

Congress isn’t exactly a new target for Anonymous either. In the past, hacktivists associated with the collective infiltrated the websites for the US Senate. Recently the group also targeted the Bay Area Rapid Transit (BART) system in San Francisco over murders carried out by transit cops.


https://rt.com/usa/news/anonymous-congress-copyright-bill-159/
: FBI arrests LulzSec member "recursion" for Sony Pictures hack
: Jordan September 23, 2011, 01:26:55 PM
The FBI has announced that it has arrested LulzSec member Cody Kretsinger, 23, of Phoenix, Arizona, known as "recursion," charging him with conspiracy and the unauthorized impairment of a protected computer.

Kretsinger is accused of using SQL injection attacks to obtain confidential information from the systems of Sony Pictures Entertainment. Kretsinger and his co-conspirators are then claimed to have disseminated the stolen information via the LulzSec Web site, and publicized it on Twitter. The FBI also asserts that Kretsinger wiped his hard disk in order to avoid detection by law enforcement.

To hide his identity when performing the attack, the FBI claims that Kretsinger used VPN service HideMyAss.com. In spite of this, activity was traced to an address in Arizona.

Fox News is reporting that a second man was arrested in San Francisco, after allegedly attacking Web sites belonging to Santa Cruz County as part of an Anonymous operation. Fox is also claiming that search warrants have been executed in New Jersey, Minnesota, and Montana.


http://arstechnica.com/tech-policy/news/2011/09/fbi-arrests-lulzsec-member-for-sony-pictures-hack.ars
: Federal Trojan's got a "Big Brother" - Bundestrojaner
: Letsbereal October 20, 2011, 11:40:50 PM
Federal Trojan's got a "Big Brother"
18 October 2011
, by Tillmann Werner Kaspersky Lab Expert (Securelist)
http://www.securelist.com/en/blog/208193167/Federal_Trojan_s_got_a_Big_Brother

Excerpt:

About two weeks ago, the German Chaos Computer Club (CCC) has published an analysis report of a backdoor trojan that they claim had been used by German police during investigations in order to capture VoIP and IM communication on a suspect's PC.

Our friends over at F-Secure published a blog post last week where they wrote about another file that, according to them, seemed to be the dropper component of the trojan.

They were kind enough to share the MD5 hash of the file, so we could pull it from our collection. Stefan and I took a closer look.

The dropper carries five other binaries in its resource table, so there are six components in total – each with a different purpose – all of which have been analyzed by us.

Amongst the new things we found in there are two rather interesting ones: firstly, this version is not only capable of running on 32 bit systems; it also includes support for 64 bit versions of Windows.

Secondly, the list of target processes to monitor is longer than the one mentioned in the CCC report.

The number of applications infected by the various components is 15 in total.
: How the US Justice Department legally hacked my Twitter account
: Jordan November 13, 2011, 02:39:53 PM
Birgitta Jónsdóttir's Twitter account: a US court has ruled that Twitter must comply with a Department of Justice demand to release private data held by the social media company, which it seeks as part of its investigation into WikiLeaks. Photograph: guardiannews.com

Before my Twitter case, in which the US Department of Justice has demanded that the social media site hands over personal information about my account which it deems necessary to its investigation of WikiLeaks, I didn't think much about what rights I would be signing off when accepting user agreement in my computer. The text is usually lengthy, in a legal language that most people don't understand. Very few people read the user agreements, and very few understand their legal implications if someone in the real world would try to use one against them.

Many of us who use the internet – be it to write emails, work or browse its growing landscape: mining for information, connecting with others or using it to organise ourselves in various groups of the like-minded – are not aware of that our behavior online is being monitored. Profiling has become a default with companies such as Google and Facebook. These companies have huge databases recording our every move within their environment, in order to groom advertising to our interests. For them, we are only consumers to push goods at, in order to sell ads through an increasingly sophisticated business model. For them, we are not regarded as citizens with civic rights.

This notion needs to change. No one really knew where we were heading a few years ago: neither we the users, nor the companies harvesting our personal information for profit. Very few of us imagined that governments that claim to be democratic would invade our online privacy with no regard to the fundamental rights we are supposed to have in the real world. We might look to China and other stereotypical totalitarian states and expect them to violate the free flow of information and our digital privacy, but not – surely? – our very own democratically elected governments.

What I have learned about my lack of rights in the last few months is of concern for everyone who uses the internet and calls for actions to raise people's awareness about their legal rights and ways to improve legal guidelines about digital media, be it locally or globally. The problem – and the dilemma we are facing – is that there are no proper standards, no basic laws in place that deal with the fundamental question: are we to be treated as consumers or citizens online? There is no international charter that says we should have the same civic rights as we have in the offline world.

Our legal systems are slow compared to the speed of online development. With the social media explosion, many people have put into databases very sensitive information about themselves and others without knowing that they have no rights to defend themselves against attempts by governments to obtain that personal data – whether their own local authorities or, as in my case, a foreign government acting internationally. According to the ruling of the US federal judge in my Twitter case, we have fortified those rights of government agencies when we agreed to the terms and conditions set by the company hosting our data. Even if that information is not held on servers in the US, the company would only need to have an office in the US for authorities to be able to demand its release to them.

So, we have to rely on, for example, Amazon, Facebook, Google and Twitter to look out for our interests. But it might not always be in their interests to look out for us.

The reason we make international treaties and declarations about human rights is because, somewhere along the line, we agreed that certain rights are sacred and universal. We need to make the same principles applicable to our human rights online, as they are offline. These two worlds have fused together, and there is no way to define them as separate anymore.

If is too easy for governments to access the information stored online, it is too easy for that access to be abused. If someone wanted to go through all my regular mail, they would have to obtain a search warrant in advance. No such thing happened in the Twitter case. I am, according to the US Justice Department, not under a criminal investigation, yet its officials demanded Twitter surrender my personal messages and IP numbers without my knowledge. It has never been so easy for Big Brother to pry on all our most sacred information without us ever even knowing.

http://www.guardian.co.uk/commentisfree/cifamerica/2011/nov/11/us-justice-department-legally-hacked-twitter
: Ramnit worm steals 31,000 UK Facebook logins
: Letsbereal January 07, 2012, 01:46:55 PM
Ramnit worm steals 31,000 UK Facebook logins
6 January, 2012
, by David Meyer (ZDNet UK)
http://www.zdnet.co.uk/news/security-threats/2012/01/06/ramnit-worm-steals-31000-uk-facebook-logins-40094759/

Hackers have used a Ramnit worm variant to harvest 31,000 Facebook usernames and passwords from British users, but most of the stolen information is out of date, according to the social-networking company.
: Mikko Hypponen: Three types of online attack - From your Government.
: Jordan January 20, 2012, 02:27:24 AM
Cybercrime expert Mikko Hypponen talks us through three types of online attack on our privacy and data -- and only two are considered crimes. "Do we blindly trust any future government? Because any right we give away, we give away for good."


http://www.ted.com/talks/mikko_hypponen_three_types_of_online_attack.html
: Interpol arrests 25 suspected members of ‘Anonymous’ hackers group
: Jordan February 29, 2012, 09:56:35 AM
Interpol has arrested 25 suspected members of the ‘Anonymous’ hackers group in a swoop on over a dozen cities in Europe and Latin America, the global police body said Tuesday.

“Operation Unmask was launched in mid-February following a series of coordinated cyber-attacks originating from Argentina, Chile, Colombia and Spain,” said the world police body based in the French city of Lyon.

The statement cited attacks on the websites of the Colombian Ministry of Defense and the presidency, as well as on Chile’s Endesa electricity company and its National Library, among others.

The operation was carried out by police from Argentina, Chile, Colombia and Spain, the statement said, with 250 items of computer equipment and mobile phones seized in raids on 40 premises in 15 cities.

Police also seized credit cards and cash from the suspects, aged 17 to 40.

“This operation shows that crime in the virtual world does have real consequences for those involved, and that the Internet cannot be seen as a safe haven for criminal activity,” said Interpol’s acting director of police services.

However, it was not clear what evidence there was to prove those arrested were part of Anonymous, an extremely loose-knit international movement of online activists, or “hacktivists.”

Spanish police said earlier they had arrested four suspected hackers accused of sabotaging websites and publishing confidential data on the Internet.

They were accused of hacking political parties’ and companies’ websites and adding fangs to the faces of leaders in photographs online, and publishing data identifying top officials’ security guards, Spanish police said.

The operation, carried out after trawling through computer logs in order to trace IP addresses, also netted 10 suspects in Argentina, six in Chile and five in Colombia, Spanish police said.

They said one of the suspects went by the nicknames Thunder and Pacotron and was suspected of running the computer network used by Anonymous in Spain and Latin America, via servers in the Czech Republic and Bulgaria.

He was arrested in the southern Spanish city of Malaga.

Two of the suspects were in detention while one was bailed and the fourth was a minor who was left in the care of his parents.

http://www.alarabiya.net/articles/2012/02/28/197604.html
: Re: Interpol arrests 25 suspected members of ‘Anonymous’ hackers group
: jerryweaver February 29, 2012, 10:29:08 AM
The Interpol website has reportedly become the latest target of the so-called 'Hacktivist Anonymous group' which advocates Internet freedom. The attack came as Interpol announced it arrested 25 suspected hackers from the movement in Europe and South America.

VIDEO REPORT HERE...

Or ANONYMOUS is being scapegoated by 'both sides of the Corporate War Machine', that's the East and the West in collusion.

http://www.youtube.com/watch?v=ZY6Zbn2W8QQ&feature=player_embedded (http://www.youtube.com/watch?v=ZY6Zbn2W8QQ&feature=player_embedded)
: Interpol Site Knocked Offline Following Anonymous Arrests
: One Revelator February 29, 2012, 01:05:34 PM
February 28, 2012, 10:11 pm
Interpol Site Knocked Offline Following Anonymous Arrests
By NICOLE PERLROTH
Justin Sullivan/Getty Images

Interpol’s Web site went down Tuesday just hours after the international police agency announced the arrest of 25 suspected members of the hacking collective Anonymous in Argentina, Chile, Colombia and Spain.

On Twitter, hackers affiliated with Anonymous took credit for the attack and openly encouraged their sympathizers to keep Interpol’s site offline by flooding its servers with traffic.

The attack followed Interpol’s announcement Tuesday that it had arrested suspected Anonymous hackers in an operation it called Operation Unmask. With cooperation from authorities in Argentina, Chile, Colombia and Spain, Interpol said it seized 250 pieces of technology equipment and mobile phones at 40 premises across 15 cities. Interpol said authorities had seized credit cards and cash from the some of the hackers, ages 17 to 40.

Interpol said it started the operation in mid-February following a series of coordinated cyber attacks against Spanish political parties’ Web sites; Colombia’s defense ministry and presidential Web sites; Chile’s national library; Endesa, a Chilean electricity company; and other targets.

More:
http://bits.blogs.nytimes.com/2012/02/28/interpol-site-knocked-offline-following-anonymous-arrests/
: Re: Computer expert says US behind Stuxnet worm
: Dok March 04, 2012, 01:05:27 PM
Former NSA Head: Hitting Iran with Stuxnet Was a 'Good Idea'

The former top-ranking military intelligence officer in the U.S. armed forces discusses Stuxnet on this week's episode of "60 Minutes," and he may give some ammunition to cybersecurity watchers who believe the United States had something to do with the sophisticated computer worm that wreaked havoc on Iran's nuclear program in 2010.

Retired Gen. Mike Hayden called the sabotaging of Iran's nuclear program with Stuxnet a "good idea" during an interview with Steve Kroft to be aired this Sunday, according to an episode teaser sent out by "60 Minutes" on Friday (see preview clip below).

Hayden, a former director of both the National Security Agency (1999-2005) and the Central Intelligence Agency (2005-06), told the CBS news show that he doesn't know who was behind Stuxnet, but in the 18 months since the cyberattack that destroyed more than 1,000 Iranian centrifuges occurred, there has been much speculation that either the U.S., Israel, or both countries may have developed and deployed the worm.

"This was a good idea, alright? But I also admit this was a big idea, too," Hayden told Kroft. "The rest of the world is looking at this and saying 'Clearly, someone has legitimated this kind of activity as acceptable.'"

Stuxnet, unlike the computer viruses that attack PCs and other consumer devices, targets critical infrastructure systems—specifically industrial control systems like the SCADA systems used to control centrifuges used at Iran's nuclear reactor.

Hayden told "60 Minutes" that Stuxnet, or something like it, could one day be used against the U.S. "So there are those out there who can take a look at this ... and maybe even attempt to turn it to their own purposes," he said.

rest: http://www.pcmag.com/article2/0,2817,2401111,00.asp
: US and China engage in cyber war games
: Letsbereal April 17, 2012, 04:04:14 PM
US and China engage in cyber war games
16 April 2012
, by Nick Hopkins (The Guardian)
http://www.guardian.co.uk/technology/2012/apr/16/us-china-cyber-war-games

Exclusive: US and Chinese officials take part in war games in bid to prevent military escalation from cyber attacks

The US and China have been discreetly engaging in "war games" amid rising anger in Washington over the scale and audacity of Beijing-co-ordinated cyber attacks on western governments and big business, the Guardian has learned.

State department and Pentagon officials, along with their Chinese counterparts, were involved in two war games last year that were designed to help prevent a sudden military escalation between the sides if either felt they were being targeted.

Another session is planned for May.

Though the exercises have given the US a chance to vent its frustration at what appears to be state-sponsored espionage and theft on an industrial scale, China has been belligerent.

"China has come to the conclusion that the power relationship has changed, and it has changed in a way that favours them," said Jim Lewis, a senior fellow and director at the Centre for Strategic and International Studies (CSIS) thinktank in Washington.

"The PLA [People's Liberation Army] is very hostile. They see the US as a target. They feel they have justification for their actions. They think the US is in decline."

The war games have been organised through the CSIS and a Beijing thinktank, the China Institute of Contemporary International Relations.

This has allowed government officials, and those from the US intelligence agencies, to have contact in a less formal environment.

Known as "Track 1.5" diplomacy, it is the closest governments can get in conflict management without full-blown talks.

"We co-ordinate the war games with the state department and department of defence," said Lewis, who brokered the meetings, which took place in Beijing last June, and in Washington in December.

"The officials start out as observers and become participants … it is very much the same on the Chinese side. Because it is organised between two thinktanks they can speak more freely."

During the first exercise, both sides had to describe what they would do if they were attacked by a sophisticated computer virus, such as Stuxnet, which disabled centrifuges in Iran's nuclear programme.

In the second, they had to describe their reaction if the attack was known to have been launched from the other side.

"The two war games have been quite amazing," said Lewis. "The first one went well, the second one not so well.

"The Chinese are very astute. They send knowledgeable people. We want to find ways to change their behaviour … [but] they can justify what they are doing.

Their attitude is, they have experienced imperialism and they had a century of humiliation."

Lewis said the Chinese have a "sense that they have been treated unfairly".

"The Chinese have a deep distrust of the US. They are concerned about US military capabilities.

They tend to think we have a grand strategy to preserve US hegemony and they see a direct challenge.

"The [Chinese officials] who favour co-operation are not as strong as the people who favour conflict."

The need for the meetings has been underlined in recent months as the US and the UK have tried to increase pressure on China, which they regard as chiefly responsible for the theft of billions of dollars of plans and intellectual property from defence manufacturers, government departments, and private companies at the heart of America's national infrastructure.

Analysts say this amounts to "preparation of the battlefield", and both the UK and the US have warned Beijing to expect retaliation if it continues.

In recent months, the US has made clear it is turning its military focus away from Europe towards the Pacific to protect American interests in the region.

"Of the countries actively involved in cyber espionage, China is the only one likely to be a military competitor to the US," Lewis said.

"US and Chinese forces are in close proximity and there are hostile incidents … The odds of miscalculation are high, so we are trying to get a clear understanding of each side's position."

Lewis believes the US is preparing to become more aggressive towards China, saying President Barack Obama has already tasked internal working groups in the White House to consider tougher sanctions.

Without naming China, a senior executive in the FBI told the Guardian the threats posed from cyber attacks were alarming.

"We know that the capabilities of foreign states are substantial and we know the type of information that they are targeting," said Shawn Henry, executive assistant director of the FBI's cyber unit.

"We have seen adversaries that have been in networks for many months or even years in some cases, undetected. They have essentially had free rein over those networks …

They have complete ability to disrupt that network entirely."

Frank Cilluffo, who was George Bush's special assistant on homeland security, said the time had come to confront China.

"We need to talk about offensive capabilities to deter bad actors. You cannot expect companies to defend against foreign intelligence services.

There are certain things we should do if someone is doing the cyber equivalent of intelligence preparation of the battlefield of our energy infrastructure.

"To me that's off grounds. That demands a response. What other incentive could there be to map our infrastructure in the event of a crisis?

"We have a stronger hand in conventional military and diplomatic means. We need to show them our cards. All instruments on the table. I think we do have to start talking active defence."

He said the US had to be proactive or, in time, people would start losing confidence in the integrity of the internet and computer systems.

"If I don't invest because I am afraid, if I don't use the web because I am afraid, if you lose trust and confidence in those systems, the bad guys have won. Checkmate."

The state department refused to speak about the war games, or say which officials took part.

A spokesman said: "The United States is committed to engaging countries to build a global environment in which all states recognise and adhere to norms of acceptable behaviour in cyberspace.

We are engaging broadly with the Chinese government on cyber issues so that we can find common ground on these issues which have increasing importance in our bilateral relationship."

The Pentagon declined to comment or say which of its officials took part in the war games.

China has consistently denied being responsible for cyber attacks on the US and other western countries. It says it is also the victim of this kind of espionage.

The Chinese defence minister, Liang Guanglie, has said Beijing "stands firmly against all kinds of cyber crimes".

"It is hard to attribute the real source of attacks and we need to work together to make sure that this security problem won't be a problem," he said.

"Actually in China we also suffered quite a wide range [of], and frequent, cyber attacks.

The Chinese government attaches importance also on cyber security and stands firmly against all kinds of cyber crimes.

It is important for everyone to obey or follow laws and regulations in terms of cyber security."

The People's Daily, the Chinese newspaper that most reflects the views of China's ruling Communist party, said last year that linking China to internet hacking attacks was irresponsible.

"As the number of hacking attacks on prominent international businesses and organisations has grown this year, some western media have repeatedly depicted China as the villain behind the scenes."
: 'Flame' or 'Worm.32.Flame', 'Shamoon' or 'W32.Disttrack', 'Gauss' and 'Dorifel'
: Letsbereal August 19, 2012, 09:50:27 AM
Shamoon the Wiper - Copycats at Work https://www.securelist.com/en/blog?print_mode=1&weblogid=208193786

Lately we're dealing with 'Flame-Virus' or 'Worm.32.Flame', 'Shamoon' or 'W32.Disttrack', 'Gauss' and the ‘Dorifel-Virus

'Flame-Virus'

The Flame: Questions and Answers http://www.securelist.com/en/blog/208193522/The_Flame_Questions_and_Answers#page_top

'Shamoon'

The Shamoon Attacks http://www.symantec.com/connect/blogs/shamoon-attacks

Shamoon, a two-stage targeted attack http://blog.seculert.com/2012/08/shamoon-two-stage-targeted-attack.html

'Gauss'

The Mystery of the Encrypted Gauss Payload http://www.securelist.com/en/blog/208193781/The_Mystery_of_the_Encrypted_Gauss_Payload

Gauss: Abnormal Distribution http://www.securelist.com/en/analysis/204792238/Gauss_Abnormal_Distribution

More on ‘Gauss” http://www.securelist.com/en/downloads/vlpdfs/kaspersky-lab-gauss.pdf

Dorifel-Virus

Virus found also at the Dutch Ministry of Economic Affairs (google trans from Dutch) http://tinyurl.com/8gzao5o

The target of these viruses lately are Government departements, Energy Installations and Financial transactions.

This is prove in itself, in my opinion, that we’re not talking about ‘simple’ sript kiddies here but about organized coordinated attacks from US secret service agencies aka NSA and CIA together with Mossad.

Goal is to upset the governments so much that they will vote in favor of legislation which will clampdown on the free internet we daily enjoy now.
: GoDaddy hacker sends millions of websites offline
: EvadingGrid September 11, 2012, 04:46:12 AM
'Anonymous' hacking shuts down ALL websites hosted by GoDaddy including thousands of small businesses

    Web hosting giant hacked and all of the websites run through GoDaddy were shut down temporarily as a result of Monday's attack
    Service was eventually restored for the bulk of customers by 5:43pm


http://www.dailymail.co.uk/sciencetech/article-2201336/Anonymous-hacking-shuts-ALL-websites-hosted-GoDaddy-including-thousands-small-businesses.html

Thousands and possibly millions of websites hosted by GoDaddy.com were down for several hours on Monday, causing trouble for the mainly small businesses that rely on the service.

A Twitter feed that claims to be affiliated with the 'Anonymous' hacker group says it was behind the outage, but this couldn't be confirmed by the Associated Press.


: GoDaddy stopped by massive DDoS attack
: EvadingGrid September 11, 2012, 04:48:51 AM
GoDaddy stopped by massive DDoS attack
Millions of sites may be affected – not by Anonymous, it appears

By Neil McAllister in San Francisco
10th September 2012
http://www.theregister.co.uk/2012/09/10/godaddy_ddos_attack/

A lone hacker has claimed responsibility for an ongoing denial-of-service attack that may have knocked out millions of websites hosted by world's largest domain registrar GoDaddy.

The attack began at around 10.00 Pacific time (17.00 GMT/18.00 BST) and appears to affect the registrar's DNS servers. Any site that is hosted with GoDaddy could be affected, although as of 13.00 Pacific (20.00GMT/21.00BST) the company reported that at least some service had been restored.
: Re: GoDaddy hacker sends millions of websites offline
: EvadingGrid September 11, 2012, 04:51:11 AM
So mainstream media are saying its the 'infamous' hacker group anonymous, but others such as The Register state that it is not 'anonymous'

Opinions ?
: Re: GoDaddy hacker sends millions of websites offline
: jofortruth September 11, 2012, 09:05:25 AM
GoDaddy attack likely a psyop to discredit Anonymous while pushing cyber security executive order
http://www.naturalnews.com/037141_Anonymous_GoDaddy_executive_order.html


: Re: GoDaddy hacker sends millions of websites offline
: TahoeBlue September 11, 2012, 11:28:28 AM

http://domainincite.com/5803-go-daddy-confirms-xxx-pricing-will-host-porn-sites
Go Daddy confirms .xxx pricing, will host porn sites
Kevin Murphy, August 15, 2011
...

That apparently includes Mike Berkens, who broke the news last week.
 
Go Daddy also confirmed that it will host .xxx porn sites, though only on its paid-for hosting accounts.
 
I’ve always been a little confused by Go Daddy’s hosting terms of service. By my reading, porn was outright banned. Apparently I was dead wrong.
 
The company’s general counsel, Christine Jones, said in a statement:

Go Daddy’s Web hosting agreement does not currently prohibit pornography, except in the case of ad-supported hosting. Those terms will continue for all TLDs, including .xxx, unless otherwise prohibited by our agreements with the various registry operators.
...
: Re: Hackers turn the tables on cops, hack police computers
: susanc October 01, 2012, 12:50:24 AM
That is a criminal offense. What actually the police is doing?They need not stop the hacking.
: "The Worm Turns" As Chevron 'Infected' By Stuxnet Collateral Damage
: Letsbereal November 13, 2012, 03:12:28 AM
"The Worm Turns" As Chevron 'Infected' By Stuxnet Collateral Damage
10 November 2012
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2012-11-10/worm-turns-chevron-infected-stuxnet-collateral-damage

Excerpt:

"I don't think the US government even realized how far it had spread" is how the collateral damage from the Iran-attacking Stuxnet computer virus is described by Chevron.

The sleep San-Ramon-based oil giant admitted this week that from 2010 on "we're finding it in our systems and so are other companies... so now we have to deal with it."

It would seem that little consideration for just how viral this cyber warfare tactic has become and this news (reported by Russia Today) is the first time a US company has come clean about the accidental infection.

Discovered in 2010, the Stuxnet worm was reported with all but certainty to be the creation of the United States, perhaps with the assistance of Israel, to set back Iran’s nuclear enrichment program as a preemptive measure against an eventual war.

In a June 2012 article published by The New York Times, government agents with direct knowledge of Stuxnet claimed that first President George W. Bush, then Barack Obama, oversaw the deployment of the worm as part of a well-crafted cyberassault on Iran.

On the record, the federal government maintains ignorance on the subject of Stuxnet, but perhaps Chevron sums up the impact of Stuxnet best (given the escalating Iranian enrichment program):

"I think the downside of what they did is going to be far worse than what they actually accomplished."

Via Russia Today:

America’s cyberwar is already seeing collateral damage, and it’s hitting the country’s own billion-dollar companies.

Oil giants Chevron say the Stuxnet computer virus made by the US to target Iran infected their systems as well
.
: Re: "The Worm Turns" As Chevron 'Infected' By Stuxnet Collateral Damage
: jerryweaver November 13, 2012, 06:48:14 AM
Virus Aimed at Iran Infected Chevron Network

http://online.wsj.com/article/SB10001424127887324894104578107223667421796.html



By RACHAEL KING

Stuxnet, a sophisticated computer virus that former U.S. officials say was created by the U.S. and Israel to spy on and attack Iran's nuclear-enrichment facilities in Natanz, also infected Chevron Corp.'s CVX +0.09% network in 2010, shortly after it escaped from its intended target.

Chevron found the virus in its systems after the malware's existence was first reported in a blog post in July 2010, according to Mark Koelmel, general manager of the earth-sciences department at the big U.S. oil company. The U.S. government has never officially acknowledged the Stuxnet program.

"I don't think the U.S. government even realized how far [the virus] had spread," said Mr. Koelmel, who oversees earth-science research and development at Chevron and is familiar with how information technology is used at the company.

"I think the downside of what they did is going to be far worse than what they actually accomplished," he said.

30,000

Number of Saudi Arabian Oil Co. computers on which data was destroyed in August by the so-called Shamoon virus, according to U.S. officials, who blame Iranian hackers.

Chevron, which is based in San Ramon, Calif., wasn't hurt by Stuxnet, said company spokesman Morgan Crinklaw. "We make every effort to protect our data systems from those types of threats," he said.

Chevron's experience with Stuxnet appears to be the result of the malware's unintentional release into cyberspace, much like an experimental virus escaping from a medical lab.

But many companies also are being specifically targeted by viruses, sometimes by less-sophisticated groups or individuals attempting to retaliate against perceived cyberaggression by the U.S. Although they have fewer resources behind them, those guerrilla campaigns are nonetheless capable of doing real, physical damage to the targeted facilities.

Chevron is the first U.S. company to acknowledge that its systems were infected by Stuxnet. But most security experts suspect that the vast majority of hacking incidents go unreported for reasons of security, or to avoid embarrassment.

The devices targeted by Stuxnet, called programmable logic controllers, are used to automate factory equipment. PLCs are made by huge companies, including Siemens AG SIE.XE +0.08% of Germany, whose devices were in use at the Iranian facility.

Millions of the devices have been sold world-wide, exposing the industrial companies that depend on them to the risk of being infected.

U.S. officials, meanwhile, blame Iranian hackers with government ties for the so-called Shamoon virus that destroyed data on 30,000 computers belonging to Saudi Arabian Oil Co. in August. Defense officials said a Qatari natural-gas company called Rasgas also was attacked in August. The incidents show how cyberattacks have escalated in speed and scale during the past few months.

"All told, the Shamoon virus was probably the most destructive attack that the private sector has seen to date," U.S. Secretary of Defense Leon Panetta said in an Oct. 11 speech at a Business Executives for National Security dinner.

Aramco said it quickly recovered from the August attack, but expects more such threats in the future. Rasgas said the August attack had no impact on its operations.

"The real worry that a lot of us have been talking about for a year or so is that instead of just stealing information, [hackers are] gaining control of target systems so that they can cause" physical damage, said Ed Skoudis, who teaches cybersecurity classes at the SANS Institute, a private organization that trains cybersecurity experts and conducts information-security research.

Employees who have a deep understanding of cybersecurity and their company's systems are the only defense against viruses like Stuxnet, which often target vulnerabilities that security researchers haven't yet identified or software vendors haven't patched, said Alan Paller, who founded SANS. He said those employees need to understand malware and techniques for fighting it, such as deep-packet inspection, which involves a very detailed examination of traffic on a computer network.

They must also have a deep knowledge of what network traffic should look like. "There are probably only 18 to 20 people in the [U.S.] who have those fundamental skills," Mr. Paller said.
: Re: "The Worm Turns" As Chevron 'Infected' By Stuxnet Collateral Damage
: jerryweaver November 13, 2012, 07:27:13 AM
I wonder how much the bill is to fix STUXNET PLC security issues and who is getting paid to do it.

Y2K cost estimate

International Data Corp. predicts that Y2K bug-related glitches will eventually take a $21 billion bite out of the global economy.


http://news.cnet.com/Y2K-cost-estimate-cut-by-2-billion/2100-1091_3-235131.html
: Hackers take down Groupon's Israeli site: report
: Letsbereal November 20, 2012, 04:50:35 AM
Hackers take down Groupon's Israeli site: report
19 November 2012
, by Rex Crum - San Francisco (MarketWatch)
http://www.marketwatch.com/story/hackers-take-down-groupons-israeli-site-report-2012-11-19

Hackers claiming be from Pakistan managed to shut down the Israeli site of online daily deal company Groupon Inc. on Monday, according a report in the Jerusalem Post.

The Post said the hackers claimed to be from a pro-Palestinian group and took over the site at http://groupon.il early Monday morning to post messages warning Israeli troops against launching a ground attack on Gaza.

The reported hacking of the Groupon site came a day after Israel's Finance Ministry said more than 44 million hack attacks have been made on Israeli government Web sites since Israel began launching air raids on Gaza last Wednesday.

Groupon officials didn't immediately comment on the matter.


A much younger Q in the latest James Bond Movie: http://forum.prisonplanet.com/index.php?topic=238415.0

"Has it that I can do more harm on my laptop sitting in my pyama’s before my first cup of earl grey than you can do in an year in the field". ;D
: Cyber Warfare's Sneaky Ploys in Israel-Hamas Fight - Vid
: Letsbereal November 21, 2012, 11:04:10 AM
Cyber Warfare's Sneaky Ploys in Israel-Hamas Fight http://www.bloomberg.com/video/cyber-warfare-s-role-in-the-israeli-hamas-conflict-qa9_DhaGQoyUTcC5NqxGrQ.html

Nov. 20, 2012 (Bloomberg) -- SVP of National Security Policy at Potomac Institute Admiral Jamie Barnett discusses the changing face of warfare.

"Where is in the past what you would do is sending in your special forces to take out communications networks, to take out radar sites.

Now what your doing is send in your cyberwarfare people to do the very same thing trough basicaly network attack"


"Has it that I can do more harm on my laptop sitting in my pyama’s before my first cup of earl grey than you can do in an year in the field."

Q to James Bond in the latest Bond movie Skyfall: http://forum.prisonplanet.com/index.php?topic=238415.0
: Forum Prison Planet Infected with MarketMatch
: Letsbereal January 02, 2013, 08:13:53 PM
Forum Prison Planet Infected with MarketMatch

Every Market Watch (without space) is being changed into MarketMatch.

Also every link like http://www.market (without space) watch.com/story/stock-market-will-blindside-investors-in-2013-2013-01-01?link=MW_Nav_NV

Is changed into http://www.marketwatch.com/story/stock-market-will-blindside-investors-in-2013-2013-01-01?link=MW_Nav_NV

This is not only with new posts but also ALL posts with Market-Watch have been somehow changed???

Like this one from December 23, 2011 http://forum.prisonplanet.com/index.php?topic=225254.0
: Re: Forum Prison Planet Infected with MarketMatch
: EvadingGrid January 02, 2013, 08:24:34 PM
Got me puzzled
: Re: Forum Prison Planet Infected with MarketMatch
: TahoeBlue January 02, 2013, 09:50:37 PM
http://www.market (without space) watch.com/

http://www.marketmatch.com/

watchit - see if it moves...

yep it moved~!!! infected

see if marketme is touched
http://www.marketme.com/

nope

can I modify?

http://www.marketmatch.com/

nope modify hits it

i did a search and not all the links are broken yet and I can't find a notice of a market web server virus.

Also it doesn't seem to be in the post code.
: Re: Forum Prison Planet Infected with MarketMatch
: kerrymti January 02, 2013, 09:58:22 PM
I don't have any problem going to marketwatch.com
: Re: Forum Prison Planet Infected with MarketMatch
: TahoeBlue January 02, 2013, 09:59:56 PM
I don't have any problem going to marketmatch.com

the problem is the replacement of market watch with market "match"

: Re: Forum Prison Planet Infected with marketwatch
: TahoeBlue January 03, 2013, 01:25:11 PM
problem seems fixed?

http://www.market watch.com/

http://www.marketwatch.com/
: Re: Forum Prison Planet Infected with marketwatch
: Letsbereal January 03, 2013, 03:45:54 PM
problem seems fixed?

Yep, Global Moderator @EvadingGrid did some quick fixing on the spammer hack. Permanent fix implemented later.

But was a good moment to clean up my own comp from malware and such to be sure it wasn't only me seeing the changes and thus possibly the cause of the altering.

Found mostly spyware on my comp I think. No big deal.
: Re: Forum Prison Planet Infected with marketwatch
: EvadingGrid January 03, 2013, 04:12:42 PM
Yep, Global Moderator @EvadingGrid did some quick fixing on the spammer hack. Permanent fix implemented later.

But was a good moment to clean up my own comp from malware and such to be sure it wasn't only me seeing the changes and thus possibly the cause of the altering.

Found mostly spyware on my comp I think. No big deal.

Optimus solved the last part of the puzzle.

Problem resolved by TeamWork.
: Anonymous Claims It Hacked Fed, Releases Confidential Banker Information
: Letsbereal February 04, 2013, 12:25:20 PM
Anonymous Claims It Hacked Fed, Releases Confidential Banker Information
4 February 2013
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2013-02-04/anonymous-claims-it-hacked-fed-releases-confidential-banker-information

A year and a half ago, when the hacker group Anonymous launched its anti-Bernanke, anti-Fed campaign dubbed Operation Empire State Rebellion (or OpESR),

we stated, rhetorically and jokingly, that "perhaps in the aftermath of the IMF "very major breach" by anonymous hackers,

it is really time to make sure all external access points to FedWire and FedLine are truly safe and sound.

It will be very sad if it is uncovered that this source of externally accessible portal to hundreds of billions in emergency Fed funding has been somehow compromised.

Just imagine the loss of confidence in the system... Why, a global distributed attack would really stretch the Fed's 1,200-strong police force quite thin."

It appears that either FedWire or FedLine may not have been "truly safe and sound" after all.

Recall that a week ago in retribution for the suicide of Aaron Swartz, Anonymous launched yet another "operation" this time titled "Last Resort",

as a result of which it hacked the Department of Justice and released a 1.3 GB folder of still encrypted "warhead" data containing files each named for Supreme Court Justices.

And while there has been no additional disclosure on this latest operation, Anonymous may have reverted to the mothballed OpESR, by hacking none other than the Fed.

As ZD reports, last night Anonymous once again hacked a .gov site, this time the Alabama Criminal Justice Information Center (ACJIC).

But it was not the site hacked that was material, but rather what was posted on it.

What was posted is an extended data dump sheet, titled "oops we did it again" which lists some 4,606 rows of confidential credential data including titles, names, addresses, emails, phone numbers, logins, password hashes, and much more.

The spreadsheet can be found at this link http://acjic.alabama.gov/documents/oops-we-did-it-again.html

And while the data contains primarily B-grade information, with no New York bank disclosure at least on a cursory check, a more important question is where was this data sources.

Anonymous itself provides a clue in a tweet from last night:

And judging by the level of detail, it is possible that Anonymous did indeed hack either FedWire or FedLine, although it is just as possible this was merely grabbing root data in some low security regional Fed website.

Anonymous provides some additional information in a further tweet:

In other words, to Anonymous this is merely an escalation of its Anti-DOJ campaign demanding structural changes (good luck) as retribution for the Swartz death. It is unlikely it will get them.

What is curious, however, is if Anonymous really did penetrate one of the Fed's critical money clearing networks, and if indeed it has access to key financial data at the granular, regional bank level.

A bigger question then is just how much more Fed-level access does Anonymous have, and will it resort to it as its demands are unmet by the DOJ in the coming days.

Or in other words, what else can and will Anonymous release?
: Re: Anonymous Claims It Hacked Fed, Releases Confidential Banker Information
: EvadingGrid February 04, 2013, 01:04:45 PM
I'll believe it when I see it ...
: Re: Anonymous Claims It Hacked Fed, Releases Confidential Banker Information
: LoudMcCloud February 06, 2013, 02:07:51 PM
What if Anonymous is the Government?
: Re: Anonymous Claims It Hacked Fed, Releases Confidential Banker Information
: EvadingGrid February 07, 2013, 01:42:12 AM
What if Anonymous is the Government?

The Govt is campaigning to persuade the people that it needs to own and control the internet.



: Re: Anonymous Claims It Hacked Fed, Releases Confidential Banker Information
: LoudMcCloud February 13, 2013, 02:21:16 AM
Your right, the government understands that knowledge is power.  They understand that people cant think properly after a bigmac and a coke.  They know we will not fight back until its too late.  I am just happy I will see the merging of man and machine.
: Re: Anonymous Claims It Hacked Fed, Releases Confidential Banker Information
: EvadingGrid February 13, 2013, 02:24:01 AM
I'll believe it when I see it ...


I am still waiting . . . .
 ;D
: Re: Anonymous Claims It Hacked Fed, Releases Confidential Banker Information
: EvadingGrid February 13, 2013, 02:27:36 AM
Your right, the government understands that knowledge is power.  They understand that people cant think properly after a bigmac and a coke.  They know we will not fight back until its too late.  I am just happy I will see the merging of man and machine.

Hey and I'm happy to see you joined the forum, so "welcome to the forum"   ;D
: Chinese army unit leading hacking vs. U.S.: report
: Letsbereal February 19, 2013, 11:24:27 AM
Chinese army unit leading hacking vs. U.S.: report
19 February 2013
, by Michael Kitchen - Los Angeles (MarketWatch)
http://www.marketwatch.com/story/chinese-army-unit-leading-hacking-vs-us-report-2013-02-19

An overwhelming percentage of cyber-attacks on U.S. corporations and government agencies is believed to be the work of the Chinese People's Liberation Army's secretive "Unit 61398," the New York Times reported Monday, citing research from computer-security firm Mandiant.

The Mandiant study tracked individual members of Unit 61398, also known as the "Comment Crew" or the "Shanghai Group," the report said.

It quoted Mandiant chief executive and founder Kevin Mandia as saying that "either [the attacks] are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood."

The cyber-warfare unit is based in a nondescript building in a Shanghai suburb "surrounded by restaurants, massage parlors and a wine importer," the New York Times report said.

The Chinese government denies that it sponsors any computer hacking attacks, which it deems illegal.
: Re: Chinese army unit leading hacking vs. U.S.: report
: LoudMcCloud February 21, 2013, 12:09:14 AM
I don't believe this one bit.  This is just a way for our US gov. to control the internet.  Anyone else see through the propaganda? 

http://www.thinredlinenews.com
: Re: Chinese army unit leading hacking vs. U.S.: report
: EvadingGrid February 21, 2013, 03:04:33 AM
I don't believe this one bit.  This is just a way for our US gov. to control the internet.  Anyone else see through the propaganda?  

http://www.thinredlinenews.com

Yup....

What they do is tunnel from the places like the USA into China or Russia, then they appear to have a Foreign IP Address. Any look up tool such as "Trace-Route", "WhoIs" or "GeoIP"  will incorrectly state the attack is coming from China / Russia.

That is not to say no internet scum live in these countries, but really most of them are poor people trying to scrape a few dollars working for Western Spam Companies and SEO Search Engine Optimization companies. This is not exactly in the same league as trying to hack the pentagon.



What they do not do use  :

Hide My Ass
TOR
or other lamer n00b anonymizers.

Now that should give the reader some food for thought, especially if you are foolish and paranoid enough to signup to one of these n00b companies to try and hide your IP.
: Re: Chinese army unit leading hacking vs. U.S.: report
: LoudMcCloud February 21, 2013, 03:39:55 AM
China wants the US to have stricter internet and gun laws.


http://www.thinredlinenews.com
: China Cyberspies Outwit U.S. Stealing Military Secrets
: Letsbereal May 02, 2013, 07:59:07 AM
China Cyberspies Outwit U.S. Stealing Military Secrets
2 May 2013
, by Michael Riley & Ben Elgin (Bloomberg)
http://www.bloomberg.com/news/2013-05-01/china-cyberspies-outwit-u-s-stealing-military-secrets.html

Excerpt:

Among defense contractors, QinetiQ North America (QQ/) is known for spy-world connections and an eye- popping product line.

Its contributions to national security include secret satellites, drones, and software used by U.S. special forces in Afghanistan and the Middle East.

Former CIA Director George Tenet was a director of the company from 2006 to 2008 and former Pentagon spy chief Stephen Cambone heads a major division.

Its U.K. parent was created as a spinoff of a government weapons laboratory that inspired Q’s lab in Ian Fleming’s James Bond thrillers, a connection QinetiQ (pronounced kin-EH-tic) still touts.

QinetiQ’s espionage expertise didn’t keep Chinese cyber- spies from outwitting the company.

In a three-year operation, hackers linked to China’s military infiltrated QinetiQ’s computers and compromised most if not all of the company’s research.

At one point, they logged into the company’s network by taking advantage of a security flaw identified months earlier and never fixed.

“We found traces of the intruders in many of their divisions and across most of their product lines,” said Christopher Day,

until February a senior vice president for Verizon Communications Inc. (VZ)’s Terremark security division, which was hired twice by QinetiQ to investigate the break-ins.

“There was virtually no place we looked where we didn’t find them.”
: Secret Intelligence Fuels U.S. Hacking Fight With China
: Letsbereal June 07, 2013, 04:04:30 PM
Secret Intelligence Fuels U.S. Hacking Fight With China
7 June 2013
, by Michael Riley (Bloomberg)
http://www.bloomberg.com/news/2013-06-07/secret-intelligence-fuels-u-s-hacking-fight-with-china.html

Excerpt:

When Barack Obama meets with President Xi Jinping at a California estate known as Sunnylands today, China’s hacking will be high on the agenda, pushed there by a drumbeat of bad news linking that country’s military to attacks on U.S. companies and defense contractors.

The seeds of the dispute, though, are at least three years old. That’s when a set of key intelligence breakthroughs and devastating attacks, including a breach of Google Inc. (GOOG)’s computers, reshaped the White House view of China’s cyber spying.

Although public information about the breach at Google and almost three dozen other companies was sketchy, that wasn’t the case for the U.S. government, according to a person familiar with the investigation.

Within 24 hours of Google’s January 12, 2010, announcement, U.S. investigators knew the attack had been state sponsored. Within three weeks, they had pinned it on a specific unit of the People’s Liberation Army, the person said.

The attacks on Google and the other companies were especially worrisome because they targeted technology that makes up the underpinnings of the Internet.

The attack on Google, dubbed Operation Aurora by McAfee Inc. (MFE) researchers, came about the same time that U.S. investigators were making a separate breakthrough.

After years of trying, they identified several key individuals in the attacks against U.S. companies, placing them at the heart of China’s intelligence apparatus.

The Justice Department’s national security division is now considering criminal indictments against some of those individuals, according to a second person familiar with the matter who asked not to be identified because it wasn’t public.
: How Twitter Dodged Attack That Took Down New York Times
: Letsbereal August 29, 2013, 12:56:29 PM
How Twitter Dodged Attack That Took Down New York Times
29 August 2013
, by Jordan Robertson (Bloomberg)
http://www.bloomberg.com/news/print/2013-08-29/how-twitter-dodged-attack-that-took-down-new-york-times.html

Chalk one up for Twitter Inc.

While the New York Times and Google  had visitors to their sites redirected this week by hackers, the microblogging service was better able to deflect attacks because of a simple tool called a registry lock.

Like alerts sent to credit-card users when something bad happens, the feature notifies website managers of attempts by intruders to tamper with critical information, such as Web-address data.

The cost? As little as $50 a year.

Large banks, e-commerce companies, gambling sites and pornographers have used registry locks from VeriSign Inc. (VRSN) and NeuStar Inc. (NSR) to prevent unauthorized changes.

Attacks by the Syrian Electronic Army routed New York Times readers to a site that displayed the group’s initials and altered some registration data.

They underscore how vulnerable many companies are to relatively unsophisticated attacks, which can take down sites and harm their businesses.

“This is certainly an ah-ha moment,” said Rodney Joffe, a senior technologist at NeuStar.

The Sterling, Virginia-based company began offering registry locks in 2010 and requires that website domain information be accompanied by two layers of verification, such as additional codes from security tokens.

“It is a niche business but there’s no reason for it to be,” he said. “It’s the kind of thing you have to do today.”

While Twitter’s site operated normally, twitter.co.uk was inaccessible for some users.

The Syrian Electronic Army, which backs the country’s president, Bashar al-Assad, claimed responsibility for the New York Times and Twitter intrusions, as well as the Washington Post this month and the Financial Times in early May.

Unknown hackers altered Google’s website in the Palestinian territories, displaying a map without Israel.


Raising Bar

The attacks exploited weaknesses in a registration network called the Domain Name System, exposing risks that site operators face because they’re relying on third parties to handle their online addresses.

Weaknesses in DNS, which was created in the 1980s to help computers find websites using names instead of numbers, haven’t been seen as a significant threat outside of the financial-services and retail sectors up to now,

according to John Pescatore, director of emerging-security trends at the SANS Institute in Stamford, Connecticut.

“There are still a lot of sloppy practices,” Pescatore said. “There’s a lot of room to raise the bar.”

Because Twitter, based in San Francisco, monitors its DNS information in real time and had implemented a registry lock, it was better prepared than the New York Times, according to HD Moore, chief research officer at Rapid7, a Boston-based security firm.

Since the attacks, many other companies have moved to institute similar safeguards, he said.


DNS Flaw

Twitter has had its DNS records hacked before.

The company acknowledged in 2009 that its DNS records were compromised by hackers who defaced the site with a message about Iran.

Jim Prosser, a spokesman for Twitter, declined to comment on the company’s security measures.

A vast system that underpins how computers locate each other, DNS is often called the phone book of the Internet. In 2008, Dan Kaminsky, a security researcher, uncovered a flaw in the system that would let hackers easily impersonate legitimate sites.

He worked with technology companies to fix it.

The finding prompted several companies that process financial transactions online to adopt additional security measures to ensure their domain information is secure, while others stayed on the sidelines, according to SANS’s Pescatore.


Security Steps

NeuStar and VeriSign, another provider of registry lock services, declined to identify the companies using its registry lock services.

Danny McPherson, chief security officer of VeriSign, said in a statement that the technology gives customers more control over who can change information.

Eileen Murphy, a spokeswoman for the New York Times (NYT) Co., said the newspaper is looking at additional measures.

“In light of this attack and the apparent vulnerability even at what had been highly secure registrars, we are tightening all of our security,” she said.

Jay Nancarrow a spokesman for Google, declined to comment on the company’s security.

The company’s Palestine site itself wasn’t hacked and Google is talking with the domain manager to resolve the issue, he said.

One complication of hosting sites with addresses of specific countries or regions is that many of the registration providers don’t use registry locks and other protective steps, said Paco Hope, a principal consultant with Cigital Inc.

“When you’re a company like the New York Times or Twitter or Google, your stock in trade is the Internet, it’s the service you offer, and that’s why it makes sense to put in a lot more security,” Hope said.

The rise in sophisticated hacking attacks is helping fuel a market for computer-security technology that is expected to exceed $65.7 billion this year, according to Gartner Inc.

Many companies that didn’t prioritize a threat involving their DNS records are now rethinking that approach, SANS’s Pescatore said.

“It’s one of several Achilles’ heels of using the Internet,” he said.
: Hackers took source code for Adobe Acrobat, ColdFusion and ColdFusion Builder
: Letsbereal October 04, 2013, 01:55:13 AM
Adobe says customer info, source code hacked
4 October 2013
, by Jim Finkle and Joseph Menn - Boston (Reuters - NBC News)
http://www.nbcnews.com/technology/adobe-says-customer-info-source-code-hacked-8C11332195

“The hackers took source code for Adobe Acrobat, which is used to create electronic documents in the PDF format, as well as ColdFusion and ColdFusion Builder, used to create Internet applications, Adobe said.”


Many Adobe users here because of Adobe Acrobat for PDF reading.

Not installed at the moment, lucky me. Maybe lookin for an alternative later.
: Dark Web Rising: McAfee Founder To Launch New “NSA Killer” Privacy Device
: Letsbereal October 08, 2013, 12:18:26 AM
Dark Web Rising: McAfee Founder To Launch New “NSA Killer” Privacy Device
3 October 2013
, by Mac Slavo (SHTFplan)
http://www.shtfplan.com/headline-news/dark-web-rising-mcafee-founder-to-launch-new-nsa-killer-privacy-device_10032013


John McAfee on AJS1 0/07/2013 http://youtu.be/LEDVrUq6fPY?t=1h37m48s
: Interview With The Syrian Electronic Army
: Letsbereal October 11, 2013, 07:58:18 AM
Interview With The Syrian Electronic Army http://www.youtube.com/watch?v=n8e2DIoQSwI

3 October 2013, SyrianGirlpartisan
: The Cybersecurity Industry Is Hiring, But Young People Aren't Interested
: Letsbereal October 23, 2013, 08:50:12 PM
The Cybersecurity Industry Is Hiring, But Young People Aren't Interested
23 October 2013
, by Ben Richmond (VICE)
http://motherboard.vice.com/blog/the-cybersecurity-industry-is-hiring-but-young-people-arent-interested

Check it out, I’m working on a reboot of The Graduate, set in 2013.

Simon and Garfunkel are out, Skrillex is in, and that scene at Dustin Hoffman’s graduation party where everyone’s giving him advice and is being all out of touch and stuff goes like this:

“Come with me for a minute I want to talk to you. I just want to say one word to you. Just one word. Are you listening? Cybersecurity. There’s a great future in cybersecurity.”

Cybersecurity, as an industry, is booming. According to the Bureau of Labor Statistics, jobs as network systems and information security professionals are expected to grow by 53% through 2018.

Yet, just like Hoffman doesn’t have any interest in plastics in 1963, young people today aren’t interested in getting jobs in cybersecurity.

By all accounts it's a growing and potentially secure, lucrative job.

But according to a new survey by the defense tech company Raytheon, only 24% of millennials have any interest in cybersecurity as a career.

40% of respondents would want to be a "TV or movie entertainer," while 26% had interest in being a lawyer. (Respondents could pick multiple careers.)

Like many new tech fields, there was a conspicuous gender gap—just 14% of young women as compared to 35% of young men were interested in a jobs in cybersecurity.

A survey among those already working in the field found more than 80% of people they interviewed were male.

The pay is actually pretty good. A Semper Secure survey found that workers in cybersecurity were pulling down an average of $116,000 a year.

Given that job prospects are otherwise exceedingly grim for young folks, why aren’t they all packing lecture halls on Cisco Systems?

Part of that is that it probably just doesn’t occur to them that “cybersecurity person” is a job that you can have.

The survey found 82% of millennials reporting that no high school teacher or guidance counselor ever mentioned careers in cybersecurity.

But also the survey found that millennials are prioritizing “Interesting work” above things like “competitive pay” and “security clearance.”

Not only does “cybersecurity” sound like an amorphous field to many young folks, it has a ring of tedium to it, of sitting in windowless rooms, listening to the fans on the servers whirr.

Of course, some millennials do love computers, and that Semper survey states that people working in cybersecurity found it to be challenging and interesting work.

Problem is, for whatever reason, the type of person who’s really into hacking, like apt to go to hacking conferences like DefCon, aren’t interested in being the digital era’s wall-builders.

The cybersecurity industry’s focal point is in DC, and you can guess what that means.

Recent recruiting efforts by the federal government to recruit young hackers straight out of high school and at hacker conferences like DefCon have done little to assuage suspicions that cybersecurity means hacking for “The Man.”

The summer of Snowden has reinforced the idea that there’s something inherently pernicious in doing so; an informal Motherboard survey at DefCon found that when asked if attendees would work for the NSA, the overwhelming response was "Hell no!"

In summation, the problem is that millennials either haven’t heard of careers in cybersecurity, or, if they have, it sounds like a boring and potentially unethical boy’s club. Not a great combination.

So what do young folks wanna do?

The survey found they want to be entertainers, and failing that, entrepeneurs, which opens the possibility that they’ll become cybersecurity personnel once life beats hope and aspirations out of them and they’re willing to say “Hello darkness, my old friend.”

Until then, I’ve got plenty of people to audition for my reworking of The Graduate.


Why Shouldn't I Work for the NSA? (Good Will Hunting) http://www.youtube.com/watch?v=UrOZllbNarw
: Mapping The Real-Time Global Cyberwar
: Letsbereal October 24, 2013, 10:45:54 AM
Mapping The Real-Time Global Cyberwar
23 October 2013
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2013-10-23/mapping-real-time-global-cyberwar
: Re: Mapping The Real-Time Global Cyberwar
: Geniocrat October 24, 2013, 11:43:16 AM
With 4 out of 5 people government dependent.

3 out of 5 people unemployed.

Along with more and more businesses shutting down everyday.

This whole NSA cyberwar is just going to put money into an already hyper-inflated economy.

The Governors should have at least some plans on the table when the dollar collpases.
: Re: The Cybersecurity Industry Is Hiring, But Young People Aren't Interested
: Geniocrat October 24, 2013, 12:05:56 PM
Maybe young people realize that they have no future cuz of these guys and aren't willing to join them.

A lot smarter than the American adults who haven't made the Bilderberg connection to the 2 major parties yet.

Sad to wait until I am 60 where these youth will be smart enougt to vote all these Globalists out.
: Adobe Breach Impacted At Least 38 Million Users
: Letsbereal October 31, 2013, 04:01:06 AM
10/13/2013 Adobe Breach Impacted At Least 38 Million Users
http://krebsonsecurity.com/2013/10/adobe-breach-impacted-at-least-38-million-users/

10/03/2013 Illegal Access to Adobe Source Code
http://blogs.adobe.com/asset/2013/10/illegal-access-to-adobe-source-code.html

10/03/2013 Important Customer Security Announcement
http://blogs.adobe.com/conversations/2013/10/important-customer-security-announcement.html
: Re: Hackers took source code for Adobe Acrobat, ColdFusion and ColdFusion Builder
: Letsbereal November 06, 2013, 01:19:33 AM
Adobe confirms stolen passwords were encrypted, not hashed - System hit was not protected by traditional best practices, used 3DES instead
4 November 2013
, by Steve Ragan (CSO)
http://www.csoonline.com/article/742570/adobe-confirms-stolen-passwords-were-encrypted-not-hashed

Researchers have revealed, and Adobe has confirmed, that the millions passwords stolen during the breach in October were not originally stored according to industry best practices.

Instead of being hashed, the passwords were encrypted, which could make things a little easier for those looking to crack them.

In a statement to CSO, confirming details revealed by Ars Technica on Friday, Adobe says that the passwords stolen during the breach in October were not hashed as originally assumed by many, but they were encrypted,

meaning that Adobe engineers were (at one time) not following best practices when it comes to passwords.

For password storage and protection, the general best practice is to use an algorithm designed for password protection, the top options being bcrypt, scrypt, PBKDF2, or SHA-2.

The reason for using such algorithms for password protection is the fact that, when implemented, they make brute-force cracking attempts nearly impossible.

The difficulty is compounded when they are hashed with a long, per-user salt — creating what is commonly known as a salted hash.

In fact, when passwords are not properly hashed, any organization being graded against the OWASP Top 10 will immediately run afoul of item A6, Sensitive Data Exposure.

Adobe says that they've followed best practices for password storage and protection for more than a year now, as their authentication systems were upgraded to use SHA-256, with salt, to protect customer passwords.

However, this upgraded system was not what the attackers hit. "This system was not the subject of the attack we publicly disclosed on October 3, 2013.

The authentication system involved in the attack was a backup system and was designated to be decommissioned.

The system involved in the attack used Triple DES encryption to protect all password information stored," Adobe spokesperson, Heather Edell told CSO.

The use of Triple DES (3DES) to protect passwords goes against traditional best practices, because depending on how the passwords are encrypted, if an attacker can guess the keys, the passwords can and will be recovered.

However, attacking 3DES directly isn't easy.

So while Adobe's methods haven't made things terribly convenient for those attempting to crack the stolen list of passwords, they haven't made it impossible either.

Already, passive examinations of the list with more than 130 million Adobe accounts has turned out some interesting data.

Jeremi Gosney, from Stricture Consulting Group, was able to compile a Top 100 list of common passwords due to several key bits of data: http://stricture-group.com/files/adobe-top100.txt


Source code and 2.9 million accounts raided by attackers in Adobe breach http://www.csoonline.com/article/740951/source-code-and-2.9-million-accounts-raided-by-attackers-in-adobe-breach

Stolen Adobe account data goes public, Photoshop source code breached http://www.csoonline.com/article/742228/stolen-adobe-account-data-goes-public-photoshop-source-code-breached
: Hackers take blog and social media accounts on Skype
: Letsbereal January 03, 2014, 02:49:54 PM
Hackers take blog and social media accounts on Skype https://twitter.com/Skype/status/418550480000671744

The hack took place Wednesday evening on New Year's Day.
: Microsoft Skype's Facebook, Twitter accounts hacked
: Letsbereal January 03, 2014, 02:56:34 PM
Microsoft Skype's Facebook, Twitter accounts hacked
2 January 2014
, (Reuters)
http://articles.economictimes.indiatimes.com/2014-01-02/news/45799493_1_microsoft-skype-electronic-army-nsa


TWEET: Don't use Microsoft emails (Hotmail, Outlook) They are monitoring your accounts and selling the data to governments.

More details soon #SEA
: Exclusive: More well-known U.S. retailers victims of cyber attacks - sources
: Letsbereal January 12, 2014, 08:00:08 PM
Exclusive: More well-known U.S. retailers victims of cyber attacks - sources
12 January 2014
, by Jim Finkle and Mark Hosenball - Boston/Washington (Reuters)
http://www.reuters.com/article/2014/01/12/us-target-databreach-retailers-idUSBREA0B01720140112


Target Provides Update on Data Breach and Financial Performance
10 January 2014
, Minneapolis (Target)
http://pressroom.target.com/news/target-provides-update-on-data-breach-and-financial-performance
: Heartbleed: Moving Toward Government Control of the Internet
: Letsbereal April 09, 2014, 04:24:08 PM
Heartbleed: Moving Toward Government Control of the Internet
9 April 2014
, by Kurt Nimmo (Infowars)
http://www.infowars.com/heartbleed-moving-toward-government-control-of-the-internet/

The HeartBleed Bug: Security Now 450 https://www.youtube.com/watch?v=oAJNnowrxSA


Heartbleed Internet Bug: Pretext For Web Lockdown?
9 April 2014
, by Paul Joseph Watson (Infowars)
http://www.infowars.com/heartbleed-internet-bug-pretext-for-web-lockdown/

Heartbleed: 'Secure' internet wasn't safe https://www.youtube.com/watch?v=bzmCGceWXtw
: Cyberthreat Real-Time Map
: Letsbereal April 10, 2014, 10:40:15 AM
Cyberthreat Real-Time Map http://cybermap.kaspersky.com/

Malware http://nl.wikipedia.org/wiki/Malware
: CHINA CALLS U.S. THE BIGGEST ATTACKER OF CYBER SPACE: XINHUA
: Letsbereal May 20, 2014, 08:25:15 AM
China Publishes Data Claiming US Is World's Largest Cyber Attacker
19 May 2014
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2014-05-19/china-publishes-data-claiming-us-worlds-largest-cyber-attacker

Well that didn't take long. Having already responded angrily to the US charging 5 military officers with cyber espionage, China has published details of the US cyber attacks:

*CHINA CALLS U.S. THE BIGGEST ATTACKER OF CYBER SPACE: XINHUA

From 3/19 to 5/18, they claim to have found 135 host computers in the US carrying 563 phishing pages targeting Chinese sites that directly controlled 1.18 million computers.

But Jay Carney said earlier that "the US does not engage in economic espionage."

As Xinhua reports,

A spokesperson for China's State Internet Information Office on Monday published the latest data of U.S. cyber attack, saying that China is a solid defender of cyber security.

The U.S. is the biggest attacker of China's cyber space, the spokesperson said, adding that the U.S. charges of hacking against five Chinese military officers on Monday are "groundless".

Latest data from the National Computer Network Emergency Response Technical Team Coordination Center of China (NCNERTTCC) showed that from March 19 to May 18, a total of 2,077 Trojan horse networks or botnet servers in the U.S. directly controlled 1.18 million host computers in China.

The NCNERTTCC found 135 host computers in the U.S. carrying 563 phishing pages targeting Chinese websites that led to 14,000 phishing operations.

In the same period, the center found 2,016 IP addresses in the U.S. had implanted backdoors in 1,754 Chinese websites, involving 57,000 backdoor attacks.

The U.S. attacks, infiltrates and taps Chinese networks belonging to governments, institutions, enterprises, universities and major communication backbone networks.

Those activities target Chinese leaders, ordinary citizens and anyone with a mobile phone. In the meantime, the U.S. repeatedly accuses China of spying and hacking.

China has repeatedly asked the U.S. to stop, but it never makes any statement on its wiretaps, nor does it desist, not to mention make apology to the Chinese people.

After the Prism program leaked by Edward Snowden, the United States was accused by the whole world. However, it has never made retrospection, instead, it accuses others.

The spokesperson said the Chinese government opposes any kinds of cyber crimes, and any groundless accusations against the country.

If the United States goes its own way, China will take countermeasures, the spokesperson said.


Of course, the real way the Chinese can quiet down the US is by signing that Russian "holy grail" gas deal this week.
: Re: CHINA CALLS U.S. THE BIGGEST ATTACKER OF CYBER SPACE: XINHUA
: Letsbereal May 20, 2014, 04:57:43 PM
China Halts Cybersecurity Cooperation After U.S. Spying Charges
20 May 2014
, by Ting Shi and Michael Riley (Bloomberg)
http://www.bloomberg.com/news/print/2014-05-20/china-suspends-cybersecurity-cooperation-with-u-s-after-charges.html

Excerpt:

China’s decision to suspend its involvement in a cybersecurity working group with the U.S. after being accused of commercial spying threatens to undo efforts aimed at finding common ground to tackle hacking.

China halted the dialogue and threatened further retaliation after the U.S. indicted five Chinese military officials yesterday for allegedly stealing trade secrets.

China’s Foreign Ministry called the U.S. move a “serious violation of the basic norms of international relations,” while China’s State Internet Information Office likened the U.S. actions to “a thief yelling ‘Catch the thief.’”

The group was established last year when U.S. Secretary of State John Kerry visited Beijing and the two sides tried to patch up ties that have long been dogged by accusations of cyber espionage.

It met in Washington in July, even after former U.S. National Security Agency whistle-blower Edward Snowden began making revelations about Amercia’s cyber-spying that included hacking into computers in China since 2009.

“Beijing and Washington had reached a certain consensus that both sides don’t point the finger at each other regarding cyber-hacking,” said Shi Yinghong, director of U.S. Studies at Renmin University in Beijing.

“Now this hard-won dialogue channel in this strategic area has been damaged.”

The charges follow a campaign by the Obama administration dating back at least three years to escalate public pressure on China to stop economic spying.

By bringing the indictment, the U.S. draws a distinction between government surveillance for national security and the theft of commercial secrets of private companies to boost Chinese competitors.
: The Ultimate Hack - HFT Hedge Fund's Trades "Slowed Down" By Malicious Malware
: Letsbereal June 19, 2014, 02:18:18 PM
The Ultimate Hack - HFT Hedge Fund's Trades "Slowed Down" By Malicious Malware
19 June 2014
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2014-06-19/ultimate-hack-hft-hedge-funds-trades-slowed-down-malicious-malware

UPDATE: Sure enough, this was serious!

*FBI, N.Y. POLICE ANNOUNCE FINANCIAL CYBER CRIMES TASK FORCE

Hacking Target... or The Pentagon... or Alcoa... or some Chinese military installation is all well and good; but mess with the US equity markets' mainstay market structure and it's getting serious.

As BAE Systems reports, hackers slowed down high-speed trading at a large hedge fund last year and rerouted information about the company’s trades to offsite computers.

The cyber-attack targeted the hedge fund’s trade order entry system and added gaps to the company’s trading algorithm - delaying orders by milliseconds.

The hack went undetected for 8 weeks. Though the hedge fund was not named, it is believed that 'organized crime' is behind the hack - ironic really...

As Bloomberg reports,

Hackers rerouted information about a hedge fund’s high-speed trades last year to offsite computers, a security official with BAE Systems Plc said.

The hackers sought out monetary gain, targeting the hedge fund’s trade order entry system and adding gaps to the company’s trading algorithm, Paul Henninger, global product director at BAE Systems Applied Intelligence, said in an interview.

The attack slowed down high-speed trading at the hedge fund, which BAE wouldn’t name.

This is the first time we’ve seen criminals actively go after a business system and effectively take over that system and create sabotage,” said Paul Henninger, global product director for BAE Systems Applied Intelligence.

The attack was going on for eight weeks and BAE was called in by the company at the end of 2013, Henninger said.

It has all the signatures of an organized crime attack,” he said.

*HACKERS PENETRATED A LARGE HEDGE FUND, BAE SYSTEMS TELLS CNBC

*BAE SAYS HACKERS STALLED HIGH-SPEED TRADES AT FUND: CNBC

*ATTACKS DELAYED TRADES BY MILLISECONDS, BAE'S HENNINGER SAYS

*HACKERS SAID TO SEEK MONETARY GAIN IN ATTACK ON HEDGE FUND: BAE

*HEDGE FUND HAD TRADING SLOWED BY HACKERS IN 2013, BAE SAYS

*HACKERS REROUTED HIGH-SPEED TRADING INFORMATION, BAE SAYS

*ATTACK ON HEDGE FUND WENT UNDETECTED FOR EIGHT WEEKS, BAE SAYS

*ORGANIZED CRIME SAID TO BE BEHIND HEDGE FUND HACKER ATTACK


What better way to crash a stock market than to hack the HFTs?
: U.S. Ambassador Baucus Says China Cyber Theft Is a Threat
: Letsbereal June 25, 2014, 04:57:18 PM
U.S. Ambassador Baucus Says China Cyber Theft Is a Threat
25 June 2014
, (Bloomberg News)
http://www.bloomberg.com/news/print/2014-06-25/u-s-ambassador-baucus-says-china-cyber-theft-is-a-threat.html

Excerpt:

The U.S. will use diplomatic and legal means to halt China’s computer theft of trade secrets, its new ambassador in Beijing said today, amid escalating tensions between the two sides over cybersecurity.

“Cyber-enabled theft of trade secrets by state actors in China has emerged as a major threat to our economic and thus national security,” Max Baucus, who took up the post of U.S. ambassador to China in March, told members of the American business community during a speech in Beijing today.

Relations have been strained since five Chinese military officers were indicted last month on charges of hacking U.S. corporate networks for commercial ends.

China rejected the charges and subsequently announced plans to vet technology companies operating in the country for potential national security threats.

State owned media published attacks on U.S. vendors including Cisco Systems Inc., Apple Inc. (AAPL), Microsoft Corp. (MSFT) and Google Inc.

“Besides being criminal in nature, this behavior runs counter to China’s WTO commitments,” Baucus said, referring to the terms China agreed to when it joined the World Trade Organization in 2001.

“We won’t sit idly by when a crime is committed in the real world, so why should we when it happens in cyber space?

We will continue to use diplomatic and legal means to make clear that this type of behavior must stop.”

Baucus was confirmed as ambassador to China on Feb. 6 and he arrived the following month.

A U.S. Senator from Montana prior to his confirmation, Baucus has said he will work to boost trade with China and press that nation over issues including breaches of computer security.


We watch the NSA cyber threat every day.
: Anti-Hacking Team Sees 'Red Threat' Unless Firms Share Data
: Letsbereal June 30, 2014, 01:39:13 PM
Anti-Hacking Team Sees 'Red Threat' Unless Firms Share Data
30 June 2014
, by Chris Strohm (Bloomberg)
http://www.bloomberg.com/news/print/2014-06-30/anti-hacking-team-sees-red-threat-unless-firms-share-data.html

Excerpt:

In an 11-story office building in the Washington suburbs, hundreds of U.S. cybersecurity analysts work around the clock to foil hackers. Possible breaches of government networks show up as red flashes on screens that line the walls.

Something big is coming, some of the analysts say.

They’re speaking not of any imminent hack, but of what they see as a chance to expand their influence.

So far, their five-year-old National Cybersecurity and Communications Integration Center has largely occupied itself monitoring threats to government networks.

Now, with backing on Capitol Hill, it is poised to bolster its role as an anti-hacking coordinator between U.S. banks, utilities and other companies operating the networks that millions of Americans use daily.

“If we don’t know what’s going on, we can’t respond to it,” Larry Zelvin, director of the center, said in an interview.

“Sometimes we don’t know about an attack until it comes up in the news or social media.”

U.S. lawmakers are fast-tracking a measure that would legally protect companies that tell the center and each other about malicious activities on their networks.

The legislation is designed to address industry executives’ concerns that disclosing these vulnerabilities could expose them to lawsuits or regulators’ scrutiny, or that certain communications with competitors could invite antitrust actions.
: Hackers Find Open Back Door to Power Grid With Renewables
: Letsbereal July 03, 2014, 11:21:27 AM
Hackers Find Open Back Door to Power Grid With Renewables
2 July 2014
, by Louise Downing and Jim Polson (Bloomberg)
http://www.bloomberg.com/news/print/2014-07-01/renewable-energy-s-expansion-exposing-grids-to-hacking.html

Making the electricity grid greener is boosting its vulnerability to computer hacking, increasing the risk that spies or criminals can cause blackouts.

Adding wind farms, solar panels and smart meters to the power distribution system opens additional portals through which hackers can attack the grid, according to computer security experts advising governments and utilities.

Where traditionally the grid took power from a few sources, it’s now absorbing it from thousands.

The communication networks and software that link green energy sources to the grid as well as the electronic meters that send real time power usage to consumers and utilities are providing new back-door entry paths for computer hackers to raise havoc with the grid.

The disclosure this week that hackers known as “Dragonfly” and “Energetic Bear” gained access to power networks across the U.S. and Europe in the past 15 months is a reminder of how vulnerable the system has become.

“Attacks against the grid have moved from theory to reality,” said Raj Samani, chief technology officer for Europe, Middle East and Africa, at McAfee Inc., a unit of Intel Corp. (INTC) that’s one of the biggest security software providers.

Utilities, already grappling with other challenges to the grid, may spend what may run into the billions of dollars for computer security.

A new multitude of energy inputs is forcing grid managers to run systems that communicate real-time data on power flows to consumers and power plants, bringing networks that were previously closely controlled into contact with computer and telecommunication systems used by millions.

‘Documented Attacks’

“There have been documented attacks, both cyber and physical on the electric grid which resulted in equipment damage, service disruption and long term repair,” said Sean McGurk, global manager for critical infrastructure protection at Verizon Communications Inc. (VZ), the largest U.S. wireless carrier.

America's Hulking, Creaky Power Machine

In the U.S., President Barack Obama signed an executive order in February calling for work to assess which parts of the grid are most at risk.

Many utilities aren’t waiting for the government’s findings.

Dominion Resources Inc. (D), owner of Virginia’s largest electric company, told investors in February it will spend $500 million over five years to harden critical substations.

American Electric Power Co. (AEP)’s Ohio utility has asked regulators to grant the right to levy a special charge for cyber security.

“We cannot predict potential costs,” said Melissa McHenry, a spokeswoman for the company, based in Columbus, Ohio.

Millions Budgeted

About a third of the 61 power and utility companies surveyed by Ernst & Young LLP said they’re spending more than $3 million a year -- at least $183 million in total -- on information security including protection from cyber threats.

Utility chief executive officers began meeting last year with senior Homeland Security officials on ways to detect attacks, block them, and prepare to restore power quickly when one succeeds, said Scott Aaronson, senior director for national security policy at the Edison Electric Institute, a utility trade group based in Washington.

“In the past 18 months, we’ve done more to improve situational awareness that we had in the previous five years,” Aaronson said.

In Europe, the story is much the same. Consulting and testing services associated with cybersecurity at utilities there will more than double to €412 million ($564 million) a year by 2016, according to International Data Corp. (IDC), a market researcher based in Framingham, Massachusetts.

Smart Meters

Already, the energy industry was the sixth-most targeted sector worldwide last year.

It was the top target in the U.S., accounting for 59% of the 256 attacks recorded last year by the U.S.

Department of Homeland Security. Almost all the specifics of the incidents are kept quiet to prevent damage to the companies victimized.

In the past, all power use was measured by mechanical meters, which required a utility worker to inspect and read them.

Now, utilities are turning to smart meters that communicate data on flows minute by minute both to customers and utilities.

In Britain, the government wants most homes to have smart meters by 2020, opening millions of new access points for attackers.

Similar programs are in place across the U.S. and Europe.

“Anytime you introduce more software, you introduce more complexity and inevitably more potential holes to the system,” said Gavin O’Gorman, a threat intelligence analyst at Symantec Corp. (SYMC), the security company based in Mountain View, California, that identified the “Dragonfly” threat.

Rogue Programmer

Energy companies are only starting to understand the vulnerabilities that smart meters bring, said Nick Hunn, chief technology officer at WiFore, a U.K.-based wireless technology consultant.

Every meter being deployed in the U.K. has a “relay” that can disconnect a household from the power supply.

This is controlled by the utility from a computer keyboard.

Since the same code goes into all meters, it would take just one small piece of code inserted by a rogue programmer to disconnect the power from millions of meters and disable the remote connection to the utility, Hunn said.

“If you talk to the utilities about what you have to protect against, it’s about transformers shorting out and trees falling on lines,” Hunn said.

“That’s what they’ve been dealing with for the past 100 years.”

‘Dragonfly’ Incident

In the “Dragonfly” incident, hackers thought to be in Eastern Europe started targeting power companies with spam in February 2013 and gained access to networks at three companies a few months later.

Symantec didn’t name the companies. It said most of the incidents were in Spain, the U.S., France and Italy. Renewable energy companies were targeted.

The “Dragonfly” hackers used a French website of a clean power provider as a “watering hole,” where victims from the targeted company visit and pick up infected code, Symantec said.

They were able to compromise industrial control systems and install malware that can replicate itself and spread to other computers.

“Dragonfly” was the latest in a series of breaches affecting energy companies.

In June, the U.S. traced dozens of surveillance sorties in 2012 and 2013 on gas pipelines and electric utilities to the People’s Liberation Army in China.

Teenage Breach

“There’s a reluctance to talk about attacks because no one wants to disclose their vulnerabilities,” said Sameer Patil, associate fellow of Gateway House, a researcher in Mumbai specialized in terrorism and national security.

It has seen attacks from Chinese and Pakistani hackers against Indian utilities.

In one of the very few cases that reached the public, a 17-year-old in the Netherlands was arrested in March 2012 in Barendrecht for breaching hundreds of servers maintained by KPN NV (KPN), a telecommunications company providing smart-meter services to utilities.

“The amount of renewables being integrated into the grid is challenging reliability because there are more information and computer technology components being introduced in the grid,” said Maurice Adriaensen, a consultant for DNV GL who is co-chairman of a pan-European group advising on smart meters.

“The amount of cyber vulnerabilities is increasing.”

Peter Terium, chairman of the management board of RWE AG (RWE), Germany’s second-largest power company said even the most secure and well tested networks are not entirely impregnable.

‘‘Nothing is un-hackable,’’ he said.


More on Cybersecurity:

Russian Hackers Threaten Power Companies, Researchers Say http://www.bloomberg.com/news/print/2014-06-30/symantec-warns-energetic-bear-hackers-threaten-energy-firms.html

Anti-Hacking Team Sees 'Red Threat' Unless Firms Share Data http://www.bloomberg.com/news/print/2014-06-30/anti-hacking-team-sees-red-threat-unless-firms-share-data.html

UglyGorilla Hack of U.S. Utility Exposes Cyberwar Threat http://www.bloomberg.com/news/print/2014-06-13/uglygorilla-hack-of-u-s-utility-exposes-cyberwar-threat.html

64 Million Attacks in One Year, and Other Troubles With the Cloud http://www.bloomberg.com/slideshow/2013-03-25/from-black-hat-to-blackouts-storms-in-the-cloud.html
: AFP: Malware "Dragonfly" Aims at US, Europe Energy Sector
: Letsbereal July 05, 2014, 11:08:26 AM
AFP: Malware "Dragonfly" Aims at US, Europe Energy Sector
30 June 2014
, (EXSKF)
http://ex-skf.blogspot.de/2014/06/afp-malware-dragonfly-aims-at-us-europe.html

AFP news says:

The US security firm Symantec said it identified malware targeting industrial control systems which could sabotage electric grids, power generators and pipelines

This Stuxnet-like malware attack is likely to be government-sponsored, says Symantec. No word about nuclear power plants.
: 'Dragonfly' Virus Strikes U.S. Power Plants! They Admit They Can't Stop It!
: Letsbereal July 07, 2014, 06:09:17 PM
'Dragonfly' Virus Strikes U.S. Power Plants! They Admit They Can't Stop It! https://www.youtube.com/watch?v=KXt5VbgqFlE

7 July 2014, DAHBOO77

U.S. and European energy companies have become the target of a "Dragonfly" virus out of Eastern Europe that goes after energy grids, major electricity generation firms, petroleum pipelines operators and energy industrial equipment providers.

Unearthed by the cyber security firm Symantec, Dragonfly has been in operation since at least 2011.

Its malware software allows its operators to not only monitor in real time, but also disrupt and even sabotage wind turbines, gas pipelines and power plants -- all with the click of a computer mouse.

The attacks have disrupted industrial control system equipment providers by installing the malware during downloaded updates for computers running the ICS equipment.

'Dragonfly' virus strikes U.S. power plants http://www.wnd.com/2014/07/dragonfly-virus-strikes-u-s-power-plants/
: Banks Dreading Computer Hacks Call for Cyber War Council
: Letsbereal July 08, 2014, 07:26:17 PM
Banks Dreading Computer Hacks Call for Cyber War Council
8 July 2014
, by Carter Dougherty (Bloomberg)
http://www.bloomberg.com/news/print/2014-07-08/banks-dreading-computer-hacks-call-for-cyber-war-council.html

Excerpt:

Wall Street’s biggest trade group has proposed a government-industry cyber war council to stave off terrorist attacks that could trigger financial panic by temporarily wiping out account balances, according to an internal document.

The proposal by the Securities Industry and Financial Market Association, known as Sifma, calls for a committee of executives and deputy-level representatives from at least eight U.S. agencies including the Treasury Department, the National Security Agency and the Department of Homeland Security, all led by a senior White House official.

The trade association also reveals in the document that Sifma has retained former NSA director Keith Alexander to “facilitate” the joint effort with the government.

Alexander, in turn, has brought in Michael Chertoff, the former Secretary of Homeland Security, and his firm, Chertoff Group.

The document sketches an unusually frank and pessimistic view by the industry of its readiness for attacks wielded by nation-states or terrorist groups that aim to “destroy data and machines.”

It says the concerns are “compounded by the dependence of financial institutions on the electric grid,” which is also vulnerable to physical and cyber attack.

“The systemic consequences could well be devastating for the economy as the resulting loss of confidence in the security of individual and corporate savings and assets could trigger widespread runs on financial institutions that likely would extend well beyond the directly impacted banks, securities firms and asset managers,” Sifma wrote in the document, dated June 27.

Liz Pierce, a spokesman for Sifma, declined to comment on the document, adding that the group “is doing everything possible to help the industry prepare for and defend against cyberattacks.”

Caitlin Hayden, spokeswoman for the White House National Security Council, declined to comment.
: Wall Street Joins U.S. Intelligence Cronies To Form Fascist "Cyber War Council"
: Letsbereal July 09, 2014, 08:14:48 AM
Wall Street Joins U.S. Intelligence Cronies To Form Fascist "Cyber War Council"
8 July 2014
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2014-07-08/fed-going-attempt-controlled-collapse
: Hackers bypass online security at 34 banks
: Letsbereal July 22, 2014, 08:40:48 PM
Hackers bypass online security at 34 banks
22 July 2014
, by Priya Anand - New York (MarketWatch)
http://www.marketwatch.com/story/hackers-bypass-online-security-at-34-banks-2014-07-22

Cybercriminals are sneaking past security protections to access online accounts across 34 banks in Switzerland, Sweden, Austria and Japan.

And in doing so, experts say, the hackers are defeating what’s often touted as one of the more effective online security protocols.


The attack can get past two-factor authentication, which requires customers to type in a code sent to their cellphone or inbox to ensure the user is who he or she claims to be,

by convincing customers to download a malicious smartphone app, according to a report released Tuesday by the security firm Trend Micro.

The researchers dubbed the technique “Emmental” — like the Swiss cheese — because they say it shows the security flaws in online banking.

So far, funds “in the seven figures” have been taken from bank accounts, according to Trend Micro spokesman Thomas Moore.

In typical form, the attack begins with realistic-looking phishing emails that install malware to give hackers control.

Then the malware deletes itself, leaving no traces, and users are redirected to malicious servers when using banking websites.

The website asks users to log in, and then install a special mobile app to receive the security code to log on.

Instead of fostering more secure transactions, the app intercepts customer data.

Two-factor authentication, hailed as an essential second gatepost for online accounts, can sometimes prove to be an empty promise.

Experts have found that the text messages that banks send customers can be intercepted, or in other cases, the hackers can scrape peoples’ screens to know the answers to extra security questions.

Last month, PayPal said it was working to fix a flaw in its two-step authentication that virtually made the extra layer useless.

“This is a threat that’s going to migrate west,” says Tom Kellermann, Trend Micro’s chief cybersecurity officer, adding that European banking security is more stringent and “if this attack code is viable against those institutions, then it will be even more prevalent here in the U.S.”

The researchers said they found Russian slang in the app’s code, including the phrase “Obnilim rid,” which translates to “set to zero.”

They also found connections originating from Romania, according to the report.

“This shows technical sophistication on par with the intelligence community,” Kellermann says.
: Chinese hacked U.S. military contractors, senate panel says
: Letsbereal September 19, 2014, 07:59:01 AM
Chinese hacked U.S. military contractors, senate panel says
18 September 2014
, by Danny Yadron (MarketWatch)
http://www.marketwatch.com/story/chinese-hacked-us-military-contractors-senate-panel-says-2014-09-18

Hackers linked to China’s government broke into computer networks of private transportation companies working for the U.S. military 20 times in one year, Senate investigators said on Wednesday.

But the probe by the Senate Armed Services Committee found that officials of the U.S.

Transportation Command, responsible for moving troops and goods across the globe, were told about just two of those incidents.

If a system was compromised, military officers might not have known, the panel said.

Transportation Command makes extensive use of passenger and cargo airlines as well as ship operators, and its leadership has acknowledged its communications with outside companies make it the part of the military most vulnerable to cyberattack.

The committee’s study covered June 2012 to June 2013 and highlights a complaint by many government and corporate leaders: Large organizations often aren’t told about data breaches at suppliers and subcontractors.

That means incidents that seem minor could prove crucial in a later cyberattack.

The report appears to spotlight a vulnerability for the U.S. military. Because Defense Department networks are heavily fortified, it can be easier to infiltrate civilian companies.

The report didn’t disclose the names of affected contractors.


The Chinese just want to know what it gonna cost them to buy them off when push come to shove.
: Unhappy Workers Hacking Employers on the Rise, FBI Says
: Letsbereal September 25, 2014, 12:41:48 AM
Unhappy Workers Hacking Employers on the Rise, FBI Says
24 September 2014
, by Chris Strohm (Bloomberg)
http://www.bloomberg.com/news/print/2014-09-23/unhappy-workers-hacking-employers-on-the-rise-fbi-says.html

Employees with an ax to grind are increasingly using Internet cloud services and other computer tools to hack their current or former companies, the Federal Bureau of Investigation and Homeland Security Department said.

The workers use services like Dropbox Inc.’s cloud storage or software that lets them gain remote access to corporate networks and steal trade secrets and other data, the agencies said in a public service notice yesterday on a government website.

Companies victimized by current or former employees incur costs “from $5,000 to $3 million,” the agencies said without naming specific companies or incidents.

The thefts have “resulted in several significant FBI investigations” in which individuals used their access to destroy or steal data, obtain customer information and commit fraud using customer accounts, according to the notice.

The alert comes as Home Depot Inc. (HD) and JPMorgan Chase & Co. (JPM) have confronted hacking attacks suspected of coming from outside the companies and shows that companies need to be alert to insider threats.

“While corporations devote significant resources to protecting against external threats, managers must also remain aware of the potential damage that can be caused from within by employees intent on causing harm to network systems,” an FBI spokesman, Joshua Campbell, said in a statement.

The hacking also can give an individual a competitive advantage at a new company, according to the alert.

“Multiple incidents were reported in which disgruntled or former employees attempted to extort their employer for financial gain by modifying and restricting access to company websites, disabling content management system functions, and conducting distributed denial of service attacks,” the agencies said.
: Accused Russian Hacker May Be in U.S. Hands Soon
: Letsbereal November 04, 2014, 10:10:22 PM
Accused Russian Hacker May Be in U.S. Hands Soon
4 November 2014
, by Fred Pals and David Voreacos (Bloomberg)
http://www.bloomberg.com/news/print/2014-11-04/dutch-to-hand-russian-hacking-suspect-drinkman-to-u-s-.html

Excerpt:

A Russian charged with leading the most prolific hacking ring to hit corporate America moved a step closer to a U.S. courtroom instead of the Dutch jail where he’s been held since his arrest two years ago.

Vladimir Drinkman was indicted in July 2013 on charges of hacking 17 retailers, financial institutions and payment processors, including Nasdaq OMX Group Inc. (NDAQ), 7-Eleven Inc., Carrefour SA and J.C. Penney Co. (JCP) to steal more than 160 million credit- and debit-card numbers.

Since then, the U.S. and Russia have waged a legal and diplomatic battle over where Drinkman, 34, must face justice.

The U.S. wants him in federal court in New Jersey. Russia wants to put him on trial there for cybercrime fraud. Both nations seek to extradite him.

The U.S. appeared to win today, when Dutch Justice Minister Ivo Opstelten approved Drinkman’s extradition to the U.S. because it asked 14 months earlier than Russia.

Drinkman, who opposes his extradition to the U.S., can appeal through a process known as preliminary relief proceedings, which is “his last and only resort,” said Justice Ministry spokesman Job van de Sande. He wouldn’t be specific on timing.

Drinkman’s attorney, Bart Stapert, didn’t immediately return a phone call seeking comment on the ruling.
: Re: Forum Prison Planet Infected with MarketMatch
: Owais November 06, 2014, 01:10:33 AM
No I don't have any Problem with Market.
: Secret Malware in European Union Attack Linked to U.S. and British Intelligence
: Letsbereal November 25, 2014, 07:25:55 AM
Secret Malware in European Union Attack Linked to U.S. and British Intelligence
24 November 2014
, by Morgan Marquis-Boire, Claudio Guarnieri, and Ryan Gallagher (The Intercept)
https://firstlook.org/theintercept/2014/11/24/secret-regin-malware-belgacom-nsa-gchq/

Complex malware known as Regin is the suspected technology behind sophisticated cyberattacks conducted by U.S. and British intelligence agencies on the European Union and a Belgian telecommunications company, according to security industry sources and technical analysis conducted by The Intercept.
: Re: Secret Malware in European Union Attack Linked to U.S. and British Intelligence
: EvadingGrid November 25, 2014, 07:59:36 AM
So don't use windows on servers  . . . .

: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 14, 2014, 03:24:56 PM
(https://upload.wikimedia.org/wikipedia/commons/d/d7/The.Pirate.Bay.Cartoon-small.png)
: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 14, 2014, 04:57:15 PM
http://rt.com/news/214371-anonymous-hacks-emails-pirate-bay/
Anonymous hacks Swedish govt emails over seizure of Pirate Bay servers

 Published time: December 14, 2014 21:05

Swedish government email accounts have been hacked by the Anonymous hacktivist group, in response to last week’s seizure of The Pirate Bay servers by Swedish police.

The group also claimed to have hacked into the government email accounts of Israel, India, Brazil, Argentina, and Mexico.

: Re: INTERNET REGULATION - HACKING
: Sasha December 17, 2014, 08:37:58 PM
The Evidence That North Korea Hacked Sony Is Flimsy
Kim Zetter - 12.17.14  |  5:32 pm

Today Sony canceled the premier of “The Interview” and its entire Christmas-Day release of the movie because of fears that terrorists might attack theaters showing the film.

The actions show just how much power the attackers behind the Sony hack have amassed in a short time. But who exactly are they?

The New York Times reported this evening that North Korea is “centrally involved” in the hack, citing unnamed U.S. intelligence officials. It’s unclear from the Times report what “centrally involved” means and whether the intelligence officials are saying the hackers were state-sponsored or actually agents of the state. The Times also notes that “It is not clear how the United States came to its determination that the North Korean regime played a central role in the Sony attacks.” The public evidence pointing at the Hermit Kingdom is flimsy.

Other theories of attribution focus on hacktivists—motivated by ideology, politics or something else—or disgruntled insiders who stole the data on their own or assisted outsiders in gaining access to it. Recently, the finger has pointed at China.

In the service of unraveling the attribution mess, we examined the known evidence for and against North Korea.

Attribution Is Difficult If Not Impossible

First off, we have to say that attribution in breaches is difficult. Assertions about who is behind any attack should be treated with a hefty dose of skepticism. Skilled hackers use proxy machines and false IP addresses to cover their tracks or plant false clues inside their malware to throw investigators off their trail. When hackers are identified and apprehended, it’s generally because they’ve made mistakes or because a cohort got arrested and turned informant.

Nation-state attacks often can be distinguished by their level of sophistication and modus operandi, but attribution is no less difficult. It’s easy for attackers to plant false flags that point to North Korea or another nation as the culprit.

continues:
http://www.wired.com/2014/12/north-korea-did-not-hack-sony-probs/
: Re: INTERNET REGULATION - HACKING
: Sasha December 17, 2014, 08:40:41 PM
Kim Zetter

"...an American freelance journalist in Oakland, California. She has written on a wide variety of subjects from the Kabbalah to dining out in San Francisco to Israel to cryptography and electronic voting, and her work has been published in newspapers and magazines all over the world, including the Los Angeles Times, San Francisco Chronicle, Jerusalem Post, San Jose Mercury News, Detroit Free Press, and the Sydney Morning Herald. She has been a staff reporter at Wired, a writer and editor at PC World, and a guest on NPR and CNN.

She is probably best known for her reporting for Wired News, where she has written over 100 articles. Some of her work, such as that dealing with the security problems of electronic voting machines,[1] and public interest in the CIA's Kryptos sculpture,[2] introduced stories that were not covered by the mainstream press until months later. Her 2003–2004 series of articles on electronic voting won several awards, and she was shortlisted for the prestigious Investigative Reporters and Editors Award.

Zetter has interviewed and written about many notable people including sculptor Jim Sanborn (creator of the CIA's Kryptos sculpture),[3] Ed Scheidt (Chairman of the CIA's Cryptographic Center),[4] Mike Lynn (about the Cisco scandal in 2005), Australian film director Baz Luhrmann,[5] United States Assistant Attorney General Viet Dinh (creator of the Patriot Act), [6] and the famous cryptographer Bruce Schneier.[7]"
http://en.wikipedia.org/wiki/Kim_Zetter
: Re: INTERNET REGULATION - HACKING
: Sasha December 17, 2014, 08:49:43 PM
Sony hack: Why do analysts believe North Korea is behind attack?
http://www.csmonitor.com/USA/Military/2014/1217/Sony-hack-Why-do-analysts-believe-North-Korea-is-behind-attack
Anna Mulrine, Staff writer  December 17, 2014   

Amy Chang, a research associate at the Center for a New American Security:

“If you look at the trajectory of the hack, and how much data they took, it had to have been taken over a really long period of time,” she says. “It seems to be something that was coordinated with lots of resources.”

Although the breadth and depth of the hack was considerable, Ms. Chang adds, it’s not a particularly tricky thing to pull off with the right manpower.
____

..."it had to have been taken over a really long period of time"...

Was this long enough?

North Korean protests create tricky PR situation for 'The Interview'
http://www.latimes.com/entertainment/movies/moviesnow/la-et-mn-north-korean-protests-pr-the-interview-20140625-story.html
June 25, 2014

North Korean President Kim Jong Un is reported to be a major fan of NBA basketball and classic rocker Eric Clapton, but evidently he’s not big on Seth Rogen movies — or at least not ones in which he’s the butt of the joke.

On Wednesday, a spokesman for North Korea’s Ministry of Foreign Affairs said that the upcoming comedy “The Interview” — in which Rogen and James Franco play a talk show producer and host recruited by the CIA to try to assassinate Kim — was tantamount to an “act of war” and promised “a decisive and merciless countermeasure” if the U.S. government allows the film to hit theaters.
: Re: INTERNET REGULATION - HACKING
: Sasha December 17, 2014, 09:02:45 PM
Can't tell, but lots of the links to this story just went dead, maybe they scrubbed the story entirely or are editing it in light of the FBI's assertion today about North Korea, so... posting cashed full article (from roughly the point where the OP leaves off):
http://webcache.googleusercontent.com/search?q=cache:emSwDRvOmvYJ:www.wired.com/2014/12/north-korea-did-not-hack-sony-probs/+&cd=11&hl=en&ct=clnk&gl=us

Attribution Is Difficult If Not Impossible

First off, we have to say that attribution in breaches is difficult. Assertions about who is behind any attack should be treated with a hefty dose of skepticism. Skilled hackers use proxy machines and false IP addresses to cover their tracks or plant false clues inside their malware to throw investigators off their trail. When hackers are identified and apprehended, it’s generally because they’ve made mistakes or because a cohort got arrested and turned informant.

Nation-state attacks often can be distinguished by their level of sophistication and modus operandi, but attribution is no less difficult. It’s easy for attackers to plant false flags that point to North Korea or another nation as the culprit. And even when an attack appears to be nation-state, it can be difficult to know if the hackers are mercenaries acting alone or with state sponsorship—some hackers work freelance and get paid by a state only when they get access to an important system or useful intelligence; others work directly for a state or military. Then there are hacktivists, who can be confused with state actors because their geopolitical interests and motives jibe with a state’s interests.

Distinguishing between all of these can be impossible unless you’re an intelligence agency like the NSA, with vast reach into computers around the world, and can uncover evidence about attribution in ways that law enforcement agents legally cannot.

So let’s look at what’s known.

Sony and FBI Deny Connection to North Korea

First of all, Sony and the FBI have announced that they’ve found no evidence so far to tie North Korea to the attack. New reports indicate that intelligence officials who are not permitted to speak on the record have concluded that the North Koreans are behind the hack, but have provided no evidence to support this.

Nation-state attacks aren’t generally aren’t noisy and don’t announce themselves with an image of a blazing skeleton posted to infected computers, as occurred on Sony machines, or use a catchy nom-de-hack like Guardians of Peace to identify themselves. Nation-state attackers also generally don’t chastise their victims for having poor security, as purported members of GOP have done in media interviews. Nor do such attacks involve posts of stolen data to Pastebin—the unofficial cloud repository of hackers—where sensitive company files belonging to Sony were leaked this week. These are all hallmarks of hacktivists—groups like Anonymous and LulzSec, who thrive on targeting large corporations for ideological reasons or just the Lulz—or by hackers sympathetic to a political cause.

Despite all of this, media outlets won’t let the narrative go. If there’s anything years of Law and Order reruns should tell us, it’s that focusing on a single suspect can lead to exclusionary bias where clues that contradict the favored theory get ignored.

The Interview a Red Herring?

Initial and hasty media reports about the attackers pointed to cyberwarriors from North Korea, bent on seeking revenge for the Sony movie The Interview. This was based on a complaint North Korea made to the United Nations last July about the Seth Rogen and James Franco flick, which was originally slated to be released in October before being changed to Christmas Day. North Korea’s UN ambassador said the comedy, about a TV host and his producer who get embroiled in an ill-conceived CIA plot to assassinate North Korean President Kim Jong-un, was an act of war that promoted terrorism against North Korea.

“To allow the production and distribution of such a film on the assassination of an incumbent head of a sovereign state should be regarded as the most undisguised sponsoring of terrorism as well as an act of war,” UN ambassador Ja Song Nam wrote the UN secretary general in a letter. “The United States authorities should take immediate and appropriate actions to ban the production and distribution of the aforementioned film; otherwise, it will be fully responsible for encouraging and sponsoring terrorism.”

In other statements, North Korea threatened a “resolute and merciless” response if the U.S. didn’t ban the film.

But in their initial public statement, whoever hacked Sony made no mention of North Korea or the film.  And in an email sent to Sony by the hackers found in documents they leaked, there is also no mention of North Korea or the film. The email was sent to Sony executives on Nov. 21, a few days before the hack went public. Addressed to Sony Pictures CEO Michael Lynton, Chairwoman Amy Pascal and other executives, it appears to be an attempt at extortion, not an expression of political outrage or a threat of war.

“[M]onetary compensation we want,” the email read. “Pay the damage, or Sony Pictures will be bombarded as a whole. You know us very well. We never wait long. You’d better behave wisely.”

To make matters confusing, however, the email wasn’t signed by GOP or Guardians of Peace, who have taken credit for the hack, but by “God’sApstls,” a reference that also appeared in one of the malicious files used in the Sony hack.

A person purporting to be a Guardians of Peace spokesperson then emphasized again, in an interview with CSO Online published Dec. 1, that they are “an international organization … not under direction of any state.” The GOP’s members include, they wrote, “famous figures in the politics and society from several nations such as United States, United Kingdom and France.”

The person also said the Seth Rogen film was not the motive for the hack, but that the film was problematic nonetheless in that it exemplified Sony’s greed and fed political turmoil in the region:

“Our aim is not at the film The Interview as Sony Pictures suggests,” the person told CSO Online. “But it is widely reported as if our activity is related to The Interview. This shows how dangerous film The Interview is. The Interview is very dangerous enough to cause a massive hack attack. Sony Pictures produced the film harming the regional peace and security and violating human rights for money. The news with The Interview fully acquaints us with the crimes of Sony Pictures. Like this, their activity is contrary to our philosophy. We struggle to fight against such greed of Sony Pictures.”

It was only on December 8, after a week of media stories connecting North Korea and the Sony film to the hack, the attackers made their first reference to the film in one of their public announcements. But they continued to trounce the theory that North Korea was behind their actions, and they denied ownership of an email sent to Sony staffers after the hack, threatening them and their families with harm if they didn’t denounce their employer.

At this point, it’s quite possible the media are guilty of inspired the hacker’s narrative, since it was only after news reports tying the attack to the Sony film that GOP began condemning the movie in public statements. This week the hackers have pounced on that narrative, using it to escalate the stakes by making oblique terrorist threats against the film’s New York premier and theaters scheduled to screen it Christmas day. Even if members of GOP lack the means or intent to pull off a terrorist attack on their own, they’ve now created an open invitation for opportunistic attackers to do so in their name—in essence, escalating their crimes and influence to a level no other hackers have achieved to date.

So why do some people continue to claim that North Korea is the culprit? There are two forensic discoveries that fuel this assertion, but they are flimsy.

Evidence: Malicious Files Point to Possible Korean Speakers

Four files that researchers have examined, which appear to be connected to the hack, seem to have been compiled on a machine that was using the Korean language. This refers to the encoding language on a computer; computer users can configure the encoding language so that content on their machine renders in a language they speak. But an attacker can set the language on a compilation machine to any language they want and, researchers note, can even manipulate information about the encoded language after a file is compiled to throw investigators off.

Evidence: Files Show Up In Other Hacks

The Sony attackers didn’t just siphon data from the studio’s networks, they also used a wiper component to destroy data. To do the wiping, they used a driver from a commercially-available product that had been used by other attackers before. The product, called RawDisk, uses drivers that allow administrators to securely delete data from hard drives or for forensic purposes to access memory.

The same product was used in similarly destructive attacks that hit Saudi Arabia and South Korea. Since some people have claimed those were both nation-state attacks—U.S. officials blamed Iran for the Saudi Arabia attack; South Korea blamed China and North Korea for its attack—people assume if the Sony is also a nation-state attack. But the evidence pointing to those other attacks as nation-state attacks is also flimsy.

The 2012 attack in Saudi Arabia, dubbed Shamoon, wiped data from about 30,000 computers belonging to Saudi Aramco, the state-owned oil conglomerate. Although U.S. officials blamed Iran for it, researchers found that malware used in the attack contained sloppy code riddled with errors and attributed it to hacktivists with political motives rather than a nation-state. The malware displayed part of an image of a burning U.S. flag on infected machines before they were wiped. What’s more, a group calling itself the Cutting Sword of Justice took credit for the hack. “This is a warning to the tyrants of this country and other countries that support such criminal disasters with injustice and oppression,” they wrote in a Pastebin post. “We invite all anti-tyranny hacker groups all over the world to join this movement. We want them to support this movement by designing and performing such operations, if they are against tyranny and oppression.”

That sounds like a call to recruit other like-minded activists who might also be opposed to, say, a “criminal” company like Sony.

Last year, a similarly destructive attack, dubbed DarkSeoul by researchers, struck computers at banks and media companies in South Korea. The attack used a logic bomb, set to go off at a specific time, that wiped computers in a coordinated fashion. The attack wiped the hard drives and master boot record of at least three banks and two media companies simultaneously, reportedly putting some ATMs out of operation and preventing South Koreans from withdrawing cash from them. As with the Sony and Saudi Aramco hacks, the attackers used a RawDisk driver for their attack. They also left an image of a skull on the web site of the South Korean president’s office. And an IP address used for one of the attackers’ command-and-control servers matches an IP address the Sony hackers used for one of their command servers.

South Korea alternatively blamed North Korea for the attack as well as China—since an IP address in China appeared to be part of the campaign. Officials later retracted the allegations.

The same group behind this attack are said to be behind other attacks in South Korea that occurred on the anniversary of the Korean War, and behind attacks against the U.S. on July 4.

OK, So Who Hacked Sony?

Regardless of whether the Sony, Saudi Aramco and South Korea attacks are related, the evidence indicating they’re nation-state attacks is circumstantial. And all of the same evidence could easily point to hacktivists. Our money is on the latter.

This is likely a group of various actors who coalesce and disperse, as the Anonymous hackers did, based on their common interests. But even with that said, there is another possibility with regard to the Sony hack: that the studio’s networks weren’t invaded by a single group but by many, some with political interests at heart and others bent on extortion. Therefor, we can’t rule out the possibility that nation-state attackers were also in Sony’s network. An interesting scenario was recently posited by Deadline, suggesting that China may have initiated a breach at Sony during business negotiations with the studio last year, before handing off control to freelance hackers.

1: Update at 8p.m. 12/18/14: Minutes after we published this story examining the known evidence for and against North Korea as the source of the hack, The New York Times and other media outlets announced that the U.S. administration was ready to conclude North Korea was involved in the Sony hack. We have updated the story with this new information.
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O December 17, 2014, 09:13:37 PM
How have Sony's entertainment stock been doing?  Not as good as they would have hoped.  How is Sony 'entertainment stock' doing NOW after the hack?  ;)

-Just say'n
: Re: INTERNET REGULATION - HACKING
: Sasha December 17, 2014, 09:33:13 PM
Good point. 

But how will brand loyalty hold out even with fans after repeated hacks into PlayStation networks and now this?
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O December 17, 2014, 10:38:35 PM
Good point. 

But how will brand loyalty hold out even with fans after repeated hacks into PlayStation networks and now this?

PR firms NEVER think in long terms.

Where is the NSA?  Every time a major hack occurs these assclowns are nowhere to be seen or heard from but, they are very good at getting on corporate media outlets and preaching to us all day long how important their spying on everybody is for saving us all from the very big hacks we see happening with Sony, Target... 
: Re: INTERNET REGULATION - HACKING
: Sasha December 17, 2014, 11:28:46 PM
PR firms NEVER think in long terms.

Where is the NSA?  Every time a major hack occurs these assclowns are nowhere to be seen or heard from but, they are very good at getting on corporate media outlets and preaching to us all day long how important their spying on everybody is for saving us all from the very big hacks we see happening with Sony, Target...

And its working if twitter is any indication. 

A search for "The Interview" yields innumerable people jumping to the conclusion that the FBI report is without reproach and they are opposing the North Korean tyranny by going to see this "Pineapple Express" sequel.

This patronization of state-sponsored assassination is becoming insidiously entwined with patriotism.
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O December 18, 2014, 10:53:58 AM
Why the Sony hack is unlikely to be the work of North Korea.
http://marcrogers.org/2014/12/18/why-the-sony-hack-is-unlikely-to-be-the-work-of-north-korea/

Everyone seems to be eager to pin the blame for the Sony hack on North Korea. However, I think it’s unlikely. Here’s why:1. The broken English looks deliberately bad and doesn’t exhibit any of the classic comprehension mistakes you actually expect to see in “Konglish”. i.e it reads to me like an English speaker pretending to be bad at writing English.
2. The fact that the code was written on a PC with Korean locale & language actually makes it less likely to be North Korea. Not least because they don’t speak traditional “Korean” in North Korea, they speak their own dialect and traditional Korean is forbidden. This is one of the key things that has made communication with North Korean refugees difficult. I would find the presence of Chinese far more plausible.See here – http://www.nytimes.com/2006/08/30/world/asia/30iht-dialect.2644361.html?_r=0

here – http://www.nknews.org/2014/08/north-korean-dialect-as-a-soviet-russian-translation/

and here – http://www.voanews.com/content/a-13-2009-03-16-voa49-68727402/409810.html

This change in language is also most pronounced when it comes to special words, such as technical terms. That’s possibly because in South Korea, many of these terms are “borrowed” from other languages, including English. For example, the Korean word for “Hellicopter” is: 헬리콥터 or hellikobteo. The North Koreans, on the other hand, use a literal translation of “vehicle that goes straight up after takeoff”. This is because such borrowed words are discouraged, if not outright forbidden, in North Korea – http://pinyin.info/news/2005/ban-loan-words-says-north-korea/

Lets not forget also that it is *trivial* to change the language/locale of a computer before compiling code on it.

3. It’s clear from the hard-coded paths and passwords in the malware that whoever wrote it had extensive knowledge of Sony’s internal architecture and access to key passwords. While it’s plausible that an attacker could have built up this knowledge over time and then used it to make the malware, Occam’s razor suggests the simpler explanation of an insider. It also fits with the pure revenge tact that this started out as.

4. Whoever did this is in it for revenge. The info and access they had could have easily been used to cash out, yet, instead, they are making every effort to burn Sony down. Just think what they could have done with passwords to all of Sony’s financial accounts? With the competitive intelligence in their business documents? From simple theft, to the sale of intellectual property, or even extortion – the attackers had many ways to become rich. Yet, instead, they chose to dump the data, rendering it useless. Likewise, I find it hard to believe that a “Nation State” which lives by propaganda would be so willing to just throw away such an unprecedented level of access to the beating heart of Hollywood itself.

5. The attackers only latched onto “The Interview” after the media did – the film was never mentioned by GOP right at the start of their campaign. It was only after a few people started speculating in the media that this and the communication from DPRK “might be linked” that suddenly it became linked. I think the attackers both saw this as an opportunity for “lulz” and as a way to misdirect everyone into thinking it was a nation state. After all, if everyone believes it’s a nation state, then the criminal investigation will likely die.

Wired has just covered this exact point – http://www.wired.com/2014/12/evidence-of-north-korea-hack-is-thin/

6. Whoever is doing this is VERY net and social media savvy. That, and the sophistication of the operation, do not match with the profile of DPRK up until now.

Grugq did an excellent analysis of this aspect his findings are here – http://0paste.com/6875#md

7. Finally, blaming North Korea is the easy way out for a number of folks, including the security vendors and Sony management who are under the microscope for this. Let’s face it – most of today’s so-called “cutting edge” security defenses are either so specific, or so brittle, that they really don’t offer much meaningful protection against a sophisticated attacker or group of attackers. That doesn’t mean that we should let them off and give up every time someone plays the “APT” or “Sophisticated Attacker” card though. This is a significant area of weakness in the security industry – the truth is we are TERRIBLE at protecting against bespoke, unique attacks, let alone true zero days. There is some promising technology out there, but it’s clear that it just isn’t ready yet.

While we are on the subject, and ignoring the inability of traditional AntiVirus to detect bespoke malware, just how did whatever Data Loss Prevention (DLP) solution that Sony uses miss terabytes of data flying out of their network? How did their sophisticated on-premise perimeter security appliances miss such huge anomalies in network traffic, machine usage or host relationships? How did they miss Sony’s own edge being hijacked and used as public bittorrent servers aiding the exfiltration of their data?

8. It probably also suits a number of political agendas to have something that justifies sabre-rattling at North Korea, which is why I’m not that surprised to see politicians starting to point their fingers at the DPRK also.

9. It’s clear from the leaked data that Sony has a culture which doesn’t take security very seriously. From plaintext password files, to using “password” as the password in business critical certificates, through to just the shear volume of aging unclassified yet highly sensitive data left out in the open. This isn’t a simple slip-up or a “weak link in the chain” – this is a serious organization-wide failure to implement anything like a reasonable security architecture.

The reality is, as things stand, Sony has little choice but to burn everything down and start again. Every password, every key, every certificate is tainted now and that’s a terrifying place for an organization to find itself. This hack should be used as the definitive lesson in why security matters and just how bad things can get if you don’t take it seriously.

10. Who do I think is behind this? My money is on a disgruntled (possibly ex) employee of Sony.

Finally for an EXCELLENT blow by blow analysis of the breach and the events that followed, read the following post by my friends from Risk Based Security – https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack
: Re: INTERNET REGULATION - HACKING
: Sasha December 18, 2014, 12:26:15 PM
Yup.

"10. Who do I think is behind this? My money is on a disgruntled (possibly ex) employee of Sony."

Was Sony hack attack an inside job? Claims hackers had help from someone with 'intimate knowledge of email system'

Sony executives believe a criminal gang of hackers that severely compromised the company's computer network had significant inside help.

While North Korea remains the main suspect in the November 24 data breach, it is believed that someone inside Sony or recently fired by the corporation may have facilitated access to the computer network.

A major investigation into the hacking incident has found that the culprits appear to have significant knowledge of Sony's internal computer network leading to fears that the criminals had some internal assistance.

continues:
http://www.dailymail.co.uk/news/article-2877061/Sony-attack-hackers-ex-employees.html
: Re: INTERNET REGULATION - HACKING
: Sasha December 18, 2014, 12:29:18 PM
David Knight just mentioned this one on air.  Definitely related:

Sony leaks reveal Hollywood is trying to break DNS, the backbone of the internet
Russell Brandon - Dec 16, 2014

Most anti-piracy tools take one of two paths: they either target the server that's sharing the files (pulling videos off YouTube or taking down sites like The Pirate Bay) or they make it harder to find (delisting offshore sites that share infringing content). But leaked documents reveal a frightening line of attack that's currently being considered by the MPAA: What if you simply erased any record that the site was there in the first place?

To do that, the MPAA's lawyers would target the Domain Name System (DNS) that directs traffic across the internet. The tactic was first proposed as part of the Stop Online Piracy Act (SOPA) in 2011, but three years after the law failed in Congress, the MPAA has been looking for legal justification for the practice in existing law and working with ISPs like Comcast to examine how a system might work technically. If the system works, DNS-blocking could be the key to the MPAA's long-standing goal of blocking sites from delivering content to the US. At the same time, it represents a bold challenge to the basic engineering of the internet, threatening to break the very backbone of the web and drawing the industry into an increasingly nasty fight with Google.

continues:
http://www.theverge.com/2014/12/16/7401769/the-mpaa-wants-to-strike-at-dns-records-piracy-sopa-leaked-documents
: Re: INTERNET REGULATION - HACKING
: Sasha December 18, 2014, 01:17:05 PM
Bill Richardson on CNN just minutes ago (roughly):

"It hard to believe that North Korea has the sophistication to pull off this kind of attack.  I was just over in North Korea a little while ago with Eric Schmidt.  Their cyber-capacities didn't seem that sophisticated then."

sourced:

American Group Begins Private Trip to North Korea
CHOE SANG-HUN - January 7, 2013

SEOUL, South Korea — Bill Richardson, the former governor of New Mexico, led a private delegation including Eric Schmidt, Google’s executive chairman, to North Korea on Monday, a controversial trip to a country that is among the most hostile to the Internet.

Mr. Richardson, who has visited North Korea several times, called his four-day trip a private humanitarian mission and said he would try to meet with Kenneth Bae, a 44-year-old South Korean-born American citizen who was arrested on charges of “hostile acts” against North Korea after entering the country as a tourist in early November.

“I heard from his son who lives in Washington State, who asked me to bring him back,” Mr. Richardson said in Beijing before boarding a plane bound for Pyongyang. “I doubt we can do it on this trip.”

In a one-sentence dispatch, the North’s state-run Korean Central News Agency confirmed the American group’s arrival in Pyongyang, calling it “a Google delegation.”

Mr. Richardson said his delegation planned to meet with North Korean political, economic and military leaders, and to visit universities.

continues:
http://www.nytimes.com/2013/01/08/world/asia/bill-richardson-and-eric-schmidt-of-google-visit-north-korea.html?_r=0
: Re: INTERNET REGULATION - HACKING
: Sasha December 18, 2014, 01:22:54 PM
North Korea didn't hack Sony Pictures - but who the hell did?
David Gilbert - December 18, 2014

Seth Rogen hacked Sony Pictures. No, wait, it was James Franco. No, sorry, it was Taylor Swift. Justin Bieber? Barack Obama? The Dalai Lama?

Of course none of these people hacked Sony Pictures, but the idea they did is about as ludicrous as suggesting that North Korea was behind the attack. An attack which on Wednesday culminated with Sony Pictures cancelling the release of The Interview.

The identity of the hackers, who go by the name Guardians of Peace, is still a complete mystery. Many theories have been espoused about who they are, where they are located, and what their motivation has been in carrying out a devastating attack on Sony Pictures' systems which after three weeks sees the studio still not back to full capacity.

Here we look at four possible groups behind the attack, but first up is the case for Guardians of Peace (GOP) not being from Pyongyang.

continues:
http://www.ibtimes.co.uk/north-korea-didnt-hack-sony-pictures-who-hell-did-1480082
: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 18, 2014, 02:05:27 PM
I am very suspicious of the whole deal ... was it just a terrible movie?
: Re: INTERNET REGULATION - HACKING
: Sasha December 18, 2014, 03:43:11 PM
I am very suspicious of the whole deal ... was it just a terrible movie?

Haven't seen it.  But lots of people have rated it, whether or not they've seen it.  I don't know what to think about the IMDB rating.  Anti-North Korea backlash?  Is the film really significantly better than Blade Runner (8.2) or Empire Strikes Back (8.9)?

google:
"The Interview", Reviews

44%
Rotten Tomatoes-9 votes

5/12
Entertainment Weekly

53%
Metacritic-7 votes

9.5/10
IMDb- 857 user votes
(from IMDB's site)
: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 18, 2014, 05:16:24 PM
'Cause we all know how the Globalist NW0 is at war with NKorea ...
(http://www.bloomberg.com/image/i65g8Kz.rzwc.jpg)
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 18, 2014, 06:29:32 PM

  Here's my guess on who hacked those computers---NSA near Salt Lake City, Utah.

(https://nsa.gov1.info/utah-data-center/utah-data-center-entrance.jpg)

  Here's some evidence.  THEY CAN HACK INTO MY IPHONE.

  www.macobserver.com/tmo/article/nsa-can-hack-and-spy-on-any-iphone-any-time


     NSA Can Hack and Spy on Any iPhone Any Time


  CHECK OUT THEIR MOTTO AT NSA---IF YOU HAVE NOTHING TO HIDE, YOU HAVE NOTHING TO FEAR.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 18, 2014, 06:36:15 PM
^^^^^^^^^^^

  I'm guessing that John McCain is so frusterated he wants a war with North Korea before he dies.




(http://www.bartcop.com/mccain-straight-jacket-ani.gif)
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O December 18, 2014, 08:14:32 PM
SOPA, CYSPA
Now The Sony's Of The World Have A 'Narrative'
  ;)
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 18, 2014, 08:30:11 PM


  One big SOPA Opera isn't it John?

  Rectally feeding us BS from Hollywood, Utah, Washington DC and elsewhere.
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 18, 2014, 08:42:37 PM
Well the minute I heard that they blamed North Korea, I laughed.
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O December 18, 2014, 08:50:29 PM

  One big SOPA Opera isn't it John?

  Rectally feeding us BS from Hollywood, Utah, Washington DC and elsewhere.

A goofy comedy could be made from this entire event.  The movie starts out serious as moron globalist are seen in their meetings concocting ways to get control of the internet and it just gets more and more 'ZANY'.  ;D
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 18, 2014, 08:57:06 PM

  THE SHEEPLE ARE EATING THIS CRAP UP.

(http://ts1.mm.bing.net/th?&id=HN.608043799007465132&w=300&h=300&c=0&pid=1.9&rs=0&p=0)
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 18, 2014, 08:58:08 PM
I see now how they did it, and it was with 99% likely that it was an insider.

Its a giggle.
They did something really dumb.
They left an almighty hole in there security.
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 18, 2014, 09:00:21 PM
They had this installed.

https://www.eldos.com/rawdisk/spec.php

/me  rolls on the floor laughing paws flailing in the air
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 19, 2014, 06:32:53 AM
www.prisonplanet.com/sony-hack-what-theyre-not-telling-you.html

  Important video from Paul Joseph Watson.

  He believes (as do I ) that the US government is behind this CHRISTMAS SONY SURPRISE.

  HEY OBAMA.  THIS STUFF IS SO EASY TO FIGURE OUT.  YOU AND MCCAIN WANT THE CYBERSECURITY BILL PASSED.

Sony Hack: What They’re Not Telling You
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 19, 2014, 06:40:38 AM
My instinct is that the Nefarious Govt with its Evil Agenda simply took this as an opportunity to advance its INTERNET 2 Agenda.

I'll download it and watch it next, and then post what I think.

: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 19, 2014, 06:42:26 AM
www.theverge.com/2014/12/18/7415291/politicians-respond-to-the-sony-hack-mccain-calls-for-cybersecurity-bill

Politicians respond to Sony hack, call for cybersecurity bill



After weeks of speculation, US officials have told news outlets that North Korea was involved in November's devastating Sony hack. Especially because the group threatened violence if Sony released its North Korea-focused comedy The Interview, this could turn the issue from a major security problem to an international incident, and American politicians have begun formulating their responses — whether that's simple condemnation or calls for new cybersecurity bills.

The White House hasn't said anything about the hacks, or publicly attributed them to North Korea. But Congress members and others have been less circumspect. Representative Peter King (R-NY) called for legislators to pass the Terrorism Risk Insurance Act, which reimburses insurers for terrorism-related losses. The policy was adopted after September 11th, but an extension failed to pass the Senate earlier this week, setting it to expire at the end of the year. King called an expiration "criminal negligence." And Rep. Ed Royce (R-CA), chair of the Foreign Affairs Committee, said in a CNN interview that Sony's decision to cancel The Interview's release was "regrettable" and dangerous. "What message does this send other hackers, other state-sponsors of terrorism  — which North Korea is? That you get a little leverage in the system, you can make these demands and people cede to them."




Senator John McCain (R-AZ) also said that the choice set a "troubling precedent" in cyberwarfare. "The administration's failure to deter our adversaries has emboldened, and will continue to embolden, those seeking to harm the United States through cyberspace," he said in a statement. He reiterated promises to focus on the issue if elected chair of the Armed Services Committee, including plans to create a subcommittee for cybersecurity issues. "Congress as a whole must also address these issues and finally pass long-overdue comprehensive cybersecurity legislation," he said. McCain has been pushing cybersecurity bills for years, including the Secure IT Act, a competitor to the controversial CISPA bill.

In a statement on Tuesday, Senator Dianne Feinstein (D-CA), a major proponent of cybersecurity and author of multiple bills, said that "this is only the latest example of the need for serious legislation to improve the sharing of information between the private sector and the government to help companies strengthen cybersecurity. We must pass an information sharing bill as quickly as possible next year."

Cybersecurity legislation, which would establish a framework for US agencies and companies to share information on threats, has repeatedly stalled in Congress, in part because of privacy concerns — the White House ultimately issued an executive order on the issue in 2013. Nonetheless, Congress, the NSA, and others have warned of major cyberattacks for years. Intelligence agencies don't seem likely to speak until the White House gives an official statement, but former NSA head Keith Alexander significantly built out the agency's cyberwarfare capabilities, establishing and holding the position of US Cyber Command. He also called on Congress to pass a CISPA-style security bill.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 19, 2014, 06:48:49 AM
www.wired.com/2012/02/cybersecurity-act-of-2012/

  McCAIN---ARTICLE POSTED Feb 2012

  Hey McCain/Obama/Feinstein/Peter King/et al--------CHECKMATE




     McCain: Cybersecurity Bill Ineffective Without NSA Monitoring the Net
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 19, 2014, 06:53:55 AM
My instinct is that the Nefarious Govt with its Evil Agenda simply took this as an opportunity to advance its INTERNET 2 Agenda.

I'll download it and watch it next, and then post what I think.

  You are right on.  No time better than Christmas when the SHEEP ARE SHOPPING.

  McCain is probably singing "Have a holly jolly Christmas.  It's the best time of the year TO PASS CYBERSECURITY."
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 19, 2014, 07:04:45 AM
While I was downloading the nightly news I had a quick look at the more techie orientated The Register, and followed a few links.

Most definitely an inside job.
Read this carefully . . .


http://www.theregister.co.uk/2014/12/04/sony_hack_wiper_malware/
Jaime Blasco, director of AlienVault Labs, another researcher who has seen malware samples from the Sony hack, said whoever wrote the malware already knew all about Sony's internal network.

"From the samples we obtained, we can say the attackers knew the internal network from Sony since the malware samples contain hardcoded names of servers inside Sony's network and even credentials - usernames and passwords - that the malware uses to connect to systems inside the network," Blasco explained.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 19, 2014, 07:05:51 AM
www.foxnews.com/politics/2014/12/19/fbi-points-digital-finger-at-north-korea-for-sony-hacking-attack-formal/

  So what do they want?  A war with North Korea, Iran, China and Russia? 


Evidence in Sony hack attack suggests possible involvement by Iran, China or Russia, intel source says
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 19, 2014, 07:09:48 AM
While I was downloading the nightly news I had a quick look at the more techie orientated The Register, and followed a few links.

Most definitely an inside job.
Read this carefully . . .


http://www.theregister.co.uk/2014/12/04/sony_hack_wiper_malware/
Jaime Blasco, director of AlienVault Labs, another researcher who has seen malware samples from the Sony hack, said whoever wrote the malware already knew all about Sony's internal network.

"From the samples we obtained, we can say the attackers knew the internal network from Sony since the malware samples contain hardcoded names of servers inside Sony's network and even credentials - usernames and passwords - that the malware uses to connect to systems inside the network," Blasco explained.


 Interesting.  Paul Joseph Watson discussed some of this on his video.  I'm not a computer expert.  I still think THERE IS SOMETHING MUCH MORE SINISTER GOING ON.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 19, 2014, 07:18:24 AM
nypost.com/2014/12/18/white-house-calls-sony-hack-a-serious-national-security-matter/


  Shouldn't this headline read WH calls Sony hack a 'serious National Security Agency matter'?


White House calls Sony hack a ‘serious-national security matter’
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 19, 2014, 07:20:38 AM
While I was downloading the nightly news I had a quick look at the more techie orientated The Register, and followed a few links.

Most definitely an inside job.
Read this carefully . . .


http://www.theregister.co.uk/2014/12/04/sony_hack_wiper_malware/
Jaime Blasco, director of AlienVault Labs, another researcher who has seen malware samples from the Sony hack, said whoever wrote the malware already knew all about Sony's internal network.

"From the samples we obtained, we can say the attackers knew the internal network from Sony since the malware samples contain hardcoded names of servers inside Sony's network and even credentials - usernames and passwords - that the malware uses to connect to systems inside the network," Blasco explained.


  TPTB could be looking for a lone gunman/lone wolf type to take all the blame.  You know a Lee Harvey Oswald type to take all the blame.  Makes for a perfect ending.
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 19, 2014, 07:59:22 AM
Here is how it happened.

The folks in the Sony Computer Department paid for a licenced copy of RawDisc by EldoS and installed it . . .
https://www.eldos.com/rawdisk/spec.php

This bypasses the Operating System . . . So all the security, even the most elaborate industrial security was ignored by the EldoS RawDisc utility.
I am willing to bet my stash of smoked salmon that somewhere there is a paper trail of invoices, cheques, and so on of the purchase of licenced copy of this software.

The knowledge and experience requirement to make use of this software narrows the list of suspects right down. The person would have had to been a very, very, very good programmer to even realize the potential to abuse the RawDisc EldoS. To use the software, they must have been a highly talented programmer.

The list gets smaller every time we examine the requirements.

(a) Worked for Sony
(b) Worked inside the Computing Department
(c) Knew that the software was installed somewhere in the computing department.
(d) Was an experienced talented motivated programmer.
(e) Was mistreated abused and wronged by Sony.

Now while a lot of people work for Sony, and I do not have access to who was on the pay roll, we are talking about a tiny list of suspects. Probably only one person, whom they recently fired.


Now this employee must have been a smart cookie. We can see that by the list of requirements. So they took great care to leave no fingerprints. The employee would have laid a false trail of evidence. The EldoS RawDisc utility gave them the means to write anything to any disc, on which the utility had been installed. This gave them the means to leave no foot print, to leave no real evidence that would stand up in a court of law.


People like the Feds are simply putting spin on the story to fight for more budget funding.
The management is covering up their own incompetence, they hired and fired this rogue employee.
The managment bought, paid and registered for a licenced copy of the software.
The whitehouse wants internet 2.

: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 19, 2014, 08:06:43 AM
As for sinister, several of the actors must have had contingency plans in place, to manipulate the evidence.

: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 19, 2014, 08:37:45 AM
As for sinister, several of the actors must have had contingency plans in place, to manipulate the evidence.

If you want really sinister, and at this point I will enter into speculation . . . but based on facts and probability.


As I outlined, this so called 'hack' would have required a very, very, talented individual. The problem being that this was not a 5 minute hack. This hack would have taken a lot of time to complete.

This is because of the sheer size of the hack, we are talking TerraBytes of data. This kind of size creates its own problems, it multiplies the size, it vastly increases the risk of getting caught.

Now if an individual tried to do it in "one hit" it would have taken hours and generated a lot of network traffic that would have been noticed. If they spread it out so that the traffic would have not triggered alarm bells, then that would multiply the time factor of what would have taken hours. This is the idea they are selling the public, that the data left the building via the internet.

The other method, would have been to have to smuggled in portable hardrives, usb or what ever into the building and physically copied the data, and then try to smuggle the stolen data out of the building.


What ever the method, there is a reasonable chance of getting caught in the act.


Did they get caught, and after being caught, where they turned into an asset by black ops cia ?
I don't think so, but if you did want a shadow govt angle and some conspiracy p0rn, there ya go.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 19, 2014, 08:56:37 AM


  OK, Hacker Central, somewhere in Eastern North Korea when the Dear Leader was still alive.

  LOL

  It is believed by me that they don't have the technology to DESTROY SONY.

(http://www.comtourist.com/images/large/kim-looking-at-things/kim-jong-il-looking-at-things-070.jpg)
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 19, 2014, 08:59:25 AM


  How can they even think without HEATED ROOMS?

(http://a57.foxnews.com/global.fncstatic.com/static/managed/img/Scitech/876/493/North%20Korea%20Surfing%20the%20Net%202.jpg?ve=1&tl=1)
: Re: INTERNET REGULATION - HACKING
: Sasha December 19, 2014, 05:55:30 PM
What is FBI evidence for North Korea hack attack?
Dave Lee - 19 December 2014

The FBI's analysis has concluded North Korea is to blame for the attack on Sony Pictures - but how can it be sure?

As well Pyongyang having a motive for taking serious issue with The Interview, there's a couple of pieces of key evidence the US is now using to pin the blame.

However, they're not without flaws.

As security researcher Brian Honan put it to me earlier: "I still don't see anything that in a court would convict North Korea beyond reasonable doubt."

continues:
http://www.bbc.com/news/technology-30554444
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O December 19, 2014, 09:34:53 PM
What is FBI evidence for North Korea hack attack?
Dave Lee - 19 December 2014

The FBI's analysis has concluded North Korea is to blame for the attack on Sony Pictures - but how can it be sure?

As well Pyongyang having a motive for taking serious issue with The Interview, there's a couple of pieces of key evidence the US is now using to pin the blame.

However, they're not without flaws.

As security researcher Brian Honan put it to me earlier: "I still don't see anything that in a court would convict North Korea beyond reasonable doubt."

continues:
http://www.bbc.com/news/technology-30554444

Providing NO proof.
: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 19, 2014, 10:46:38 PM
(http://a.abcnews.com/images/International/AP_dennis_rodman_dm_130903_16x9_992.jpg)
Good times Good Times
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O December 20, 2014, 12:27:26 AM
Reaction to the Sony Hack Is 'Beyond the Realm of Stupid'
http://motherboard.vice.com/read/reaction-to-the-sony-hack-is-beyond-the-realm-of-stupid?

Update, 12/18: More Peter Singer on the fallout from the Sony hack—"This will be a case study I can guarantee will be both used and misused in everything from legislation to cybersecurity sales pitches."

It's been a big day for news surrounding the massive, ongoing Sony hack saga.

First, major movie chains announced that they would not be screening The Interview after ​​a nonspecific threat of violence from the​ Guardians of Peace, the hacking collective that attacked Sony. Then, ​the company ​announced it was canceling the release of the movie altogether. Now, the government ​is suggesting that it ​really is ​North Korea behind the attack.

So, yeah, big day.

To help make sense of it all, I called up Peter W. Singer, one of the nation's foremost experts on cybersecurity and cyber war, to get his take. Singer is the author of ​Cybersecurity and Cyberwar: What Everyone Needs to Know and ​Wired for War and is a strategist at the New America Foundation.

Motherboard: Let's just cut to the chase—Are these hackers terrorists? Are they cyberterrorists?

Peter W. Singer: ​ There's two layers to it now. There's the definition of terrorism and the reaction to it, which has been a combination of being both insipid and encouraging to future acts.

The first is what has already happened. Sony has labeled what happened to it as cyberterrorism and various media ​have also ​described it as cyber terrorism. The reality is having your scripts posted online does not constitute a terrorist act. The FBI describes it as an 'act that results in violence.' Losing your next James Bond movie script that talks about violence is not the same thing as an act of violence.

What has happened to Sony already does not meet the definition. They're saying 'This is an act of war.' We're not going to war with North Korea over this act just because Angelina Jolie is now mad at a Sony executive. Acts of war have a different standard.

Literally, we are in the realm of beyond stupid with this.

And then we have the actual threats of violence.
This same group threatened yesterday 9/11-style incidents at any movie theatre that chose to show the movie. Here, we need to distinguish between threat and capability—the ability to steal gossipy emails from a not-so-great protected computer network is not the same thing as being able to carry out physical, 9/11-style attacks in 18,000 locations simultaneously. I can't believe I'm saying this. I can't believe I have to say this.

This group has not shown the capability to do that. Sony is rueing any association it has with the movie right now. We are not in the realm of 9/11. Did movie chains look at the reality of the threat? Or did the movie theater chains utterly cave in? This is beyond the wildest dreams of these attackers.

​I talked with ​Bruce Schneier yesterday, and he said Sony is playing the victim card. Has Sony taken an unfortunate event with this and turned it into an international incident?
Now we get to the part that moves from jokes and silliness to serious, which is: This is not just now a case study in how not to react to cyber threats and a case study in how to not defend your networks, it's now also a case study in how not to respond to terrorism threats.

We have just communicated to any would-be attacker that we will do whatever they want.

It is mind-boggling to me, particularly when you compare it to real things that have actually happened. Someone killed 12 people and shot another 70 people at the opening night of Batman: The Dark Knight [Rises]. They kept that movie in the theaters. You issue an anonymous cyber threat that you do not have the capability to carry out? We pulled a movie from 18,000 theaters.

Right—from the beginning, Sony and the media have taken what has been described as a run-of-the-mill albeit expansive and thorough hack and have scared everyone beyond belief. What happened here?
​ The attackers wonderfully understand the American psyche. This was a hack, but call it 'cyber' and 'terrorism,' and we lose our shit. There's no other way to put it.

Schneier suggested that Sony has been calling this cyber terrorism because it makes it seem worse—it makes it seem like the company was defenseless. Are execs doing this to save their jobs?
​ Yeah, you don't want to be in the category of blame the victim, but Sony has had hacks before. It's ​been hacked ​dating back to 2005, and the executives inside of it are still emailing to each other like it's 1997 and it's the first time they've ever been on email.

Set all of that aside, even the best companies with some of the best cybersecurity in the world get cracked. The banks with JP Morgan, the US military, the White House. The reality is we can either choose a 'lose our shit' mentality, or we can choose a mentality that is far more successful, which is focusing on resilience.

It's about accepting the fact bad things might get in and you can power through them. It's about getting up quickly when you knocked down, which takes the incentive away from the attacker.

Your reaction can either be, 'I give up' or 'No, we're going to show the movie.'

What do you think of the idea some have raised about just releasing the movie online, right now. Or, like, yesterday. Would that be a copout?
​No, I don't think so. But what we're learning about ​Sony and its approaches to piracy ​with the MPAA, it would have put Sony in a fantastically interesting position to say, 'This is what we've been fighting against all these years, but oh, here's the movie.'

But the movie should come out.
This is bringing such publicity to this movie that, for all we know, isn't all that good. It definitely wouldn't have gotten this much free or paid publicity. The problem is, if you don't release the movie, you can't make lemonade out of lemons. That's where they're at right now. By caving in, they may think they're cutting their losses, but they're setting an absolutely horrible precedent that makes every other company less safe moving forward.

There's a parallel here to the Boston marathon bombing. I am going to be careful on this. The Boston attacks were real, and people died. This is not in the same category. But, a lot of terrorism analysts have talked about how they shut down the entire city of Boston, which was the wrong message. It sends the message to terrorists elsewhere that if two not-so-well trained guys with a jury-rigged rice cooker bomb can shut down an entire American city, what can we do if we're good at this?

So we don't know for sure if it was North Korea or not. But, do you think it was? Does it even matter?
​ It's an issue of attribution. The victims always want to know who did it. In cyber, it's particularly difficult to find out who did it because of technical reasons, but you also have the issue of what burden of proof do we have to meet? Is it a legal burden of proof? Is it a burden of proof for public opinion or a White House situation room burden of proof?

So far, the information that's come out has pointed the finger at North Korean proxy groups, but it's been context based. It wouldn't meet the level needed in a court of law. The context combines the fact that they're pissed about this movie, and certain techniques in it are similar to what has been used in other attacks linked not definitively to North Korea. It's enough for most people to talk about [it being from North Korea], at least.

But, does it matter?
It is, in many ways, besides the point. Even if North Korea steps forward and proudly said, 'We did it,' what is Sony's recourse? Not much. It can sue North Korea, I guess.

The government should help defend this company and prevent hacks, but in terms of exacting punishment on North Korea, what's it going to do? It's not an act of war, it's frickin' annoying for Sony. But it's not an act of war.

We didn't go to war with North Korea when they murdered American soldiers ​in the 1970s with axes. We didn't go to war with ​North Korea when they ​fired missiles over our allies. We didn't go to war with ​North Korea when one of their ​ships torpedoed an alliance partner and killed some of their sailors. You're going to tell me we're now going to go to war because a Sony exec described Angelina Jolie as a diva? It's not happening.
: Re: INTERNET REGULATION - HACKING
: Sasha December 20, 2014, 07:33:37 AM
CNN just reported that North Korea's calling the hack a frame-up.

Anyone who thinks that North Korea did the hack should take a second to realize the personality profile of the dear leader that makes wild, seemingly unaccomplishable threats to the US every few months.

I won't be in any danger of being first to make this point, but Kim Jung Un would be standing on the tallest building in Pyongyang with flags waving behind him, jets in the skies and crying minions building a statue of him violating Lady Liberty in the plaza below.  He'd take credit for cyber-bombing Sony's US propaganda wing in a North Korean minute.
: Re: INTERNET REGULATION - HACKING
: Sasha December 20, 2014, 12:12:24 PM
Crisis Talks? CIA Agent’s Secret Meeting With Sony Exec Revealed In Leaked Emails
Dec 19, 2014

Sony execs were quick to slam President Obama today when he announced he wished the studio had consulted him about shelving the release of The Interview. But Hollywood-Washington relationships weren’t always so icy, RadarOnline.com has learned: Emails released in the leak show recent contact between Sony and the CIA.

According to uncovered emails, a high-ranking CIA agent visited the Los Angeles headquarters of Sony Pictures Entertainment weeks ago, before the company realized its entire computer system had been compromised by hackers the FBI links to North Korea.

Radar will not identify the name of the CIA operative because of national security considerations, but the document indicates the agent was hosted at Sony’s Culver City headquarters by the company’s security chief.

continues:
http://radaronline.com/exclusives/2014/12/sony-email-hack-cia-meeting/
: Re: INTERNET REGULATION - HACKING
: Sasha December 20, 2014, 03:48:20 PM
N. Korea says it was "framed" for Sony cyberattack -
N. Korea pitches collaboration with U.S. on Sony cyberattack

Holly Yan and Kyung Lah, CNN - December 20, 2014

(CNN) -- North Korea slammed U.S. claims that the regime is responsible for a cyberattack on Sony Pictures -- and then proposed the two countries work together.

"Whoever is going to frame our country for a crime should present concrete evidence," the state-run Korean Central News Agency reported Saturday.

"America's childish investigation result and its attempt to frame us for this crime shows their hostile tendency towards us."

But in a rare move, the North Korean regime said both countries should work together.

"While America has been criticized by its own public and continues to point the finger at us, we suggest mutual investigation with America on this case," KCNA said.

"If America refuses our proposal of mutual investigation, continues to link us to this case, and talk about actions in response, they (America) will be met with serious consequences."

continues (vid in link):
http://www.the-news-room.co.za/link/243934_n-korea-says-it-was-framed-for-sony-cyberattack
: Re: INTERNET REGULATION - HACKING
: Sasha December 20, 2014, 03:49:29 PM
(https://pbs.twimg.com/media/B5UrHaSCQAE4yIE.jpg:large)
: Re: INTERNET REGULATION - HACKING
: Sasha December 20, 2014, 04:36:36 PM
Exclusive: Sony Emails Say State Department Blessed Kim Jong-Un Assassination in ‘The Interview’
http://www.thedailybeast.com/articles/2014/12/17/exclusive-sony-emails-allege-u-s-govt-official-ok-d-controversial-ending-to-the-interview.html
William Boot - 12.17.14

excerpted:

The claim that the State Department played an active role in the decision to include the film’s gruesome death scene is likely to cause fury in Pyongyang. Emails between the Sony Entertainment CEO and a security consultant even appear to suggest the U.S. government may support the notion that The Interview would be useful propaganda against the North Korean regime.
___

A series of leaked emails reveal that Sony enlisted the services of Bruce Bennett, a senior defense analyst at the RAND Corporation who specializes in North Korea, to consult with them on The Interview.  After he saw the film, including the gruesome ending where a giant missile hits Kim Jong-Un’s helicopter in slow-mo as Katy Perry’s “Firework” plays, and Kim’s head catches on fire and explodes, Bennett gave his assessment of it in a June 25 email to Lynton, just five days after North Korea's initial threat.

“The North has never executed an artillery attack against the balloon launching areas. So it is very hard to tell what is pure bluster from North Korea, since they use the term ‘act of war’ so commonly,” wrote Bennett. “I also thought a bunch more about the ending. I have to admit that the only resolution I can see to the North Korean nuclear and other threats is for the North Korean regime to eventually go away.”

He added, “In fact, when I have briefed my book on ‘preparing for the possibility of a North Korean collapse’ [Sept 2013], I have been clear that the assassination of Kim Jong-Un is the most likely path to a collapse of the North Korean government. Thus while toning down the ending may reduce the North Korean response, I believe that a story that talks about the removal of the Kim family regime and the creation of a new government by the North Korean people (well, at least the elites) will start some real thinking in South Korea and, I believe, in the North once the DVD leaks into the North (which it almost certainly will). So from a personal perspective, I would personally prefer to leave the ending alone.”

: Re: INTERNET REGULATION - HACKING
: Sasha December 20, 2014, 05:31:34 PM
Sony Attack: U.S. Blames Iran, China and Russia
U.S. intelligence says it has evidence North Korea is not the “sole entity” behind the Sony Pictures malware attack.
http://www.infowars.com/sony-attack-u-s-blames-iran-china-and-russia/

Sony Hack Reinvigorates Support for Privacy-Busting CISPA-Style Legislation
White House, lawmakers exploit crisis to push for draconian data powers
http://www.infowars.com/sony-hack-reinvigorates-support-for-privacy-busting-cispa-style-legislation/
: Re: INTERNET REGULATION - HACKING
: Dude447 December 21, 2014, 09:00:19 AM
Ok I will admit I have done some music audio books and apps on torrent sites .Anyone remember napster ? I am with virgin media they are always blocking web sites but its a losing battle and I dont think most ISP providers are that botherd its the powers that be pulling the strings imo
: Re: INTERNET REGULATION - HACKING
: Dude447 December 21, 2014, 09:01:59 AM
not that I am condoning this
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 21, 2014, 09:40:01 AM
not that I am condoning this

Well, it is a complex subject.

Most of the TV and Film have a hidden financial model. The public are aware that they get paid to do product placement, but they have a much more insidious black budget financing by people like the CIA. Whole story lines and episodes are inserted into TV and Films paid for by the CIA, and other Bad Guys. This is really dark stuff, and regular listenners to the Alex Jones show will often hear Alex Jones recall how he has interviewed an X Files actor who has blown the whistle on all of this.

In particular I recall the spin off series of the X-Files called "The LoneGunMan" in which they did the whole 911 plane flying into the sky scraper plot line - and revealed in the episode that it was Govt / Military Industrial Complex behind the terror attack . . . . months before 911

So while it is possible to get bogged down in all sorts of aspects of file sharing politics, I think I will not loose much sleep if the same people who do the dirty work of the CIA and Military Industrial Complex loose a few pennies to the odd pirate.

I would also like to add that what this whole war is really about is - control .

Anyone for a game of Monopoly ?
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 21, 2014, 09:44:59 AM
Another Torrent Site closed - this one only did Documentaries, it was educational

mvgroup.org


MV Group was an educational peer-2-peer torrent site. It is hard to argue that this group was an evil group. This site has now mysteriously dissappeared.

It seems that one by one the powers that be are purging the internet of torrent sites, in a christmas shutdown offensive.

Please bear in mind that eventually they will be shutting down your favourite websites, such as infowars.com. At that point there will not be any pirate sites for you to sneek a 'pirate' copy of the nightly news or the alex jones show or the kaiser report or what ever . . .

Think I have just found out why such an innocent educational beneficial site got closed down.



https://en.wikipedia.org/wiki/EZTV#EZTV_and_MVGroup
EZTV and MVGroup

In summer of 2008, EZTV and the documentary torrent distribution group MVGroup initiated a partnership that saw MVG's torrents distributed by EZTV on their IRC channel and website. The agreement benefited both sides, as MVG gained increased exposure and a vastly improved seeder base while EZTV expanded the list of shows available through them.

In a statement to TorrentFreak, MVGroup admins said they "would like to take this opportunity to thank EZTV in helping us continue our founder's legacy, to spread high quality educational material via p2p, to everyone, for free (...)".

One month prior to this announcement, MVG's founder Merrin had died after prolonged illness.

: Re: INTERNET REGULATION - HACKING
: Dude447 December 21, 2014, 09:55:05 AM
Well Billy Gates and his massive microsoft empire is well aware that a lot of lets say third world places are running on pirated copies of windows .its the old adage any publicity is good publicity . Personaly I prefer Linux and I think most Mac users have there heads jammed up there arse
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 21, 2014, 10:20:53 AM
Well Billy Gates and his massive microsoft empire is well aware that a lot of lets say third world places are running on pirated copies of windows .its the old adage any publicity is good publicity . Personaly I prefer Linux and I think most Mac users have there heads jammed up there arse

Yes, I knew a businessman who did things like create and market new personal computer designs, he did business with Bill Gates ( which is how come I got to meet Bill Gates ). Now I say this to stress how important his comment was about Bill Gates marketing model. He explained to me, and we are talking a very, very, long time ago, how Bill Gates Business Model was based upon gaining market share through prevalence of piracy. Nowadays we have the internet, and you can read this "theory".

The thing is if these Monopoly people have their wet dream, there will be no free internet of free speech. The irony being that this creep built his empires upon piracy, and he was not in any unique, or the first person to use the piracy to market share business model.

The people need to wake up to realize that the most powerful tool we have is sharing and co-operation. The open source model, and techniques such as peer-2-peer sharing are the future for mankind. The Monopoly Men want to close down all alternatives, and use the internet for their own dark agenda. We need to stay vigilant, or we will loose our free open internet and have it replaced by corporate controlled censored internet 2.

: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 21, 2014, 12:13:30 PM
interesting forbes article:

http://www.forbes.com/sites/erikkain/2014/12/21/the-interview-torrent-might-be-available-if-the-pirate-bay-website-still-existed/

...

Meanwhile…

A couple weeks earlier, Swedish officials raided torrent download site The Pirate Bay. “There has been a crackdown on a server room in Greater Stockholm. This is in connection with violations of copyright law,” Paul Pintér, police national coordinator for IP enforcement, said in a statement according to TorrentFreak.

The website for The Pirate Bay has been down ever since. According to TorrentFreak, “Several other torrent related sites including EZTV, Zoink, Torrage and the Istole tracker are also down.”

...

Which brings us back to Sony and The Interview.  A search for the mostly dead picture quickly reveals that no legitimate torrents of the film exist.
...

With The Pirate Bay down, some are claiming that finding torrents—any torrents, whether legal or illegal—has just become a lot more dangerous. So dangerous, in fact, that the days of torrents may be numbered—at least according to tech writers like Christian Cawley, security editor of MakeUseOf.com, who writes:

“As far as “popular” torrenting is concerned, the comparative safety that existed at The Pirate Bay – even as a legacy of the original founders rather than a focus of those who replaced them – is gone, and safe torrent downloads with it.”

Speaking of the original founders of The Pirate Bay, founder Peter Sunde is shedding few tears over the site’s closure.

“News just reached me that The Pirate Bay has been raided, again,” writes Sunde in a blog post. “That happened over 8 years ago last time. That time, a lot of people went out to protest and rally in the streets. Today few seem to care. And I’m one of them.”
...
On the other hand, with The Pirate Bay and other torrent sites down, and clones running fake, virus-ridden torrents up, is it really a surprise? And if The Pirate Bay was still up and running, would a legitimate torrent already be available?


Update: Many readers and other piracy experts have chimed in and the consensus is clear: There are enough remaining safe torrent sites that if a torrent existed it would be up by now.
: Re: INTERNET REGULATION - HACKING
: Sasha December 21, 2014, 02:14:13 PM
The Unbelievable Story Of A Woman Who Taught North Korea's Elite Undercover
http://www.huffingtonpost.com/2014/10/30/suki-kim-north-korea_n_6069598.html
10/30/2014

Suki Kim:
(5:02 in vid)

...this is a system where just nothing is allowed.  They didn't know what the internet was.  This is [the] school of science and technology in Pyongyang and they didn't know what the internet was. And a lot of them, their major is computer [science].
: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 21, 2014, 02:22:40 PM
(http://ib4.huluim.com/video/4958427?region=US&size=600x400)
NPR sweaty balls - salty nuts - JIT for Xmas  - this movie

https://www.youtube.com/watch?v=z9t5AJNF0so
SNL Christmas Schweddy balls Dec 7th 2003
https://www.youtube.com/watch?v=bPpcfH_HHH8
NPR's Delicious Dish Schweddy Balls - Saturday Night Live
: Re: INTERNET REGULATION - HACKING
: Sasha December 21, 2014, 02:45:55 PM
Tis the season.
: Re: INTERNET REGULATION - HACKING
: Dude447 December 21, 2014, 04:23:03 PM
well if your a pirate just type proxy cough cough
: Re: INTERNET REGULATION - HACKING
: Sasha December 21, 2014, 06:13:36 PM
Report: Sony Will Release 'The Interview' For Free On Its Own Streaming Service Crackle
Sam Richmond - 1h ago

Sony will reportedly release “The Interview” for free on its own streaming service. Sony pulled the film from theaters after threats from hackers.

“The Interview” will see the light of day after all.

Sony plans to release the Seth Rogen, James Franco-driven comedy for free on “Crackle,” its own streaming service, according to the New York Post.

Sony has not made an announcement in regards to releasing the film or commented on the Post’s report, but a lawyer for the company did tell NBC’s Meet The Press Sunday that the film would get distributed at some point, according to Business Insider.

continues:
http://fansided.com/2014/12/21/report-sony-will-release-interview-free-streaming-service-crackle/
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 22, 2014, 06:35:37 AM
http://www.zerohedge.com/news/2014-12-21/hacking-collective-anonymous-says-fbi-lying-north-korea-not-source-hack

 excerpts from the article...
Hacking Collective Anonymous Says FBI Is Lying, "North Korea Is Not Source Of the Hack"                Tyler Durden


 
Having confirmed unequivocally, in a statement by the FBI and reiterated by President Obama, that "the North Korean government is responsible" for hacking Sony, it appears the YouTube-less 'evidence' the FBI provided is being questioned by the hacking-collective 'Anonymous' and former Lulzsec hacker Sabu. As The Daily Beast reports, the hackers blasted, the North Koreans "don’t have the technical capabilities," and added "we all know the hacks didn't come from North Korea, and "all of the evidence FBI cites would be trivial things to do if a hacker was trying to misdirect attention to DPRK." Meanwhile, on Saturday afternoon, Guardians of Peace, the hacking group that’s so far claimed responsibility for wreaking havoc on Sony, posted a message online mocking the FBI’s investigation - a series of gyrating animated bodies shrieking, "You are an idiot!"

 
*  *  *
Of course none of this changes the US Government narrative and that has North Korea upset...

*U.S. `GROUNDLESSLY' BLAMING NORTH KOREA FOR SONY HACK: KCNA
*N. KOREA SAYS SELF-STYLED `GUARDIANS OF PEACE' HACKED SONY:KCNA
*N. KOREA SAYS SONY HACKERS TOOK `RIGHTEOUS ACTION': KCNA
*N. KOREA SAYS IT'S UNAWARE OF `RESIDENCE' OF SONY HACKERS: KCNA
*N. KOREA SAYS IT DOESN'T KNOW WHERE SONY HACKERS ARE: KCNA
Adding

*U.S. ADMINISTRATION INVOLVED IN MAKING OF SONY MOVIE: KCNA
*N. KOREA SAYS `THE INTERVIEW' INCITES TERRORISM: KCNA
*N. KOREA SAYS `FORTUNATE' MOVIE DISTRIBUTION WAS CANCELED: KCNA

: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 22, 2014, 07:05:03 AM
/me  giggles

Ya just have to laugh at the govt and the media putting the blame on North Korea.
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 22, 2014, 07:38:19 AM
well if your a pirate just type proxy cough cough

/me  feigns ignorance

: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 22, 2014, 02:20:27 PM
a little reality:

http://www.hrw.org/world-report/2014/country-chapters/north-korea

North Korea

 (http://www.hrw.org/sites/default/files/imagecache/wr_essay_desktop/media/images/photographs/2011_NKorea_Prison.jpg)

A North Korean prison policewoman stands guard behind fences at a jail on the banks of Yalu River near the Chongsong county of North Korea, opposite the Chinese border city of Dandong on May 8, 2011. © 2011 Reuters


There has been no discernible improvement in human rights in the Democratic People’s Republic of Korea (DPRK or North Korea) since Kim Jong-Un assumed power after his father’s death in 2011. The government continues to impose totalitarian rule. In response to the systematic denial of basic freedoms in the country, the United Nations Human Rights Council unanimously established a commission of inquiry in April 2013 to investigate whether such abuses amount to crimes against humanity and who should be held accountable.

Although North Korea has ratified four key international human rights treaties and technically possesses a constitution with some rights protections, in reality the government represses all forms of freedom of expression and opinion and does not allow any organized political opposition, independent media, free trade unions, civil society organizations, or religious freedom. Those who attempt to assert rights, fail to demonstrate sufficient reverence for the party and its leadership, or otherwise act in ways deemed contrary to state interests face arbitrary arrest, detention, lack of due process, and torture and ill-treatment. The government also practices collective punishment for supposed anti-state offenses, effectively enslaving hundreds of thousands of citizens, including children, in prison camps and other detention facilities with deplorable conditions and forced labor.

Torture and Inhumane Treatment

North Korean refugees living in exile—some of whom fled after Kim Jong-Un took power—told Human Rights Watch that people arrested in North Korea are routinely tortured by officials seeking confessions, bribes, and obedience. Common forms of torture include sleep deprivation, beatings with iron rods or sticks, kicking and slapping, and enforced sitting or standing for hours. Guards also sexually abuse female detainees.

Executions

North Korea’s criminal code stipulates that the death penalty can be applied for vaguely defined offenses such as “crimes against the state” and “crimes against the people.” A December 2007 amendment to the penal code extended the death penalty to additional crimes, including non-violent offenses such as fraud and smuggling, as long as authorities determine the crime is “extremely serious.”

Political Prisoner Camps

North Korean refugees also confirm that persons accused of political offenses are usually sent to brutal forced labor camps, known as kwan-li-so, operated by North Korea’s National Security Agency.

The government practices collective punishment, sending to forced labor camps not only the offender but also their parents, spouse, children, and even grandchildren. These camps are notorious for horrific living conditions and abuse, including induced starvation, little or no medical care, lack of proper housing and clothes, continuous mistreatment and torture by guards, and executions. Forced labor at the kwan-li-so often involves difficult physical labor such as mining, logging, and agricultural work, all done with rudimentary tools in often dangerous and harsh conditions. Death rates in these camps are reportedly extremely high.

North Korea has never acknowledged that these kwan-li-so camps exist, but United States and South Korean officials now estimate that between 80,000 and 120,000 people may be imprisoned in them, including in camp No. 14 in Kaechun, No. 15 in Yodok, No. 16 in Hwasung, and No. 25 in Chungjin.  During the year, new satellite imagery indicated camp No. 22 in Hoeryung has been closed; it is unclear what happened to the estimated 30,000 prisoners previously held at the camp.

Freedom of Information and Movement

The government uses fear—generated mainly by threats of detention, forced labor, and public executions—to prevent dissent, and imposes harsh restrictions on freedom of information and travel.

All media and publications are state controlled, and unauthorized access to non-state radio or TV broadcasts is punished.  North Koreans are punished if found with mobile media such as DVDs or computer ‘flash drives’ containing unauthorized TV programs, such as South Korean drama and entertainment shows. Unauthorized use of Chinese mobile phones to communicate with people outside North Korea is also harshly punished.

...

| - - - -
http://www.usatoday.com/story/news/world/2014/12/22/nkorea-skipping-un-security-council-meeting/20748697/
North Korea faces more heat, this time over human rights
 John Bacon, USA TODAY 1:01 p.m. EST December 22, 2014

When the United Nations Security Council gathers late Monday to discuss North Korea's human rights record, a key would-be participant will be missing: North Korea.

During a U.N. General Assembly gathering last week, 116 countries voted for the resolution accusing North Korea of crimes against humanity. Twenty nations voted against the resolution and 53 abstained.

Now the 15-member Security Council is being urged to refer North Korea to the International Criminal Court. China could use its veto power to protect its volatile ally, and Pyongyang is outspoken in its public defense. North Korean leaders accuse the United States and other democratic nations of bullying the impoverished, communist nation of 25 million people.

Before the General Assembly vote, North Korea had threatened further nuclear testing. If the Security Council takes any action, "maybe we will take necessary measures," diplomat Kim Song said. He did not provide details.

The human rights issue is coming to a head days after the FBI confirmed that North Korea was behind a cyberattack of Sony Pictures. North Korea has denied involvement in the hack, which included threats to moviegoers. That led to a delay, at least, in release of The Interview, a CIA spoof centered around a plot to assassinate North Korean leader Kim Jong Un.

President Obama said he will "respond proportionately" to the cyberattack.

The U.N. Human Rights Council established its Commission of Inquiry targeting North Korea in March 2013, kicking off the investigation into allegations of "systematic, widespread and grave violations of human rights." The commission's report, published in February, leveled withering criticism at Pyongyang for its abuses.

"These crimes against humanity entail extermination, murder, enslavement, torture, imprisonment, rape, forced abortions and other sexual violence, persecution on political, religious, racial and gender grounds, the forcible transfer of populations, the enforced disappearance of persons and the inhumane act of knowingly causing prolonged starvation," the report says.


The report estimated that up to 120,000 political prisoners were detained in four prison camps, where deliberate starvation has been used as a means of control and punishment.

...
: Re: INTERNET REGULATION - HACKING
: Sasha December 22, 2014, 09:35:19 PM
North Korea Loses Its Link to the Internet
http://www.nytimes.com/2014/12/23/world/asia/attack-is-suspected-as-north-korean-internet-collapses.html?_r=0

North Korea goes completely offline: Report
http://www.cnbc.com/id/102289459

Did U.S. Take Down North Korea’s Internet?
http://www.infowars.com/did-u-s-take-down-north-koreas-internet/
“Their networks are under duress,” said Doug Madory, director of Internet analysis at Dyn Research. “This is consistent with a DDoS attack on their routers.”

“The situation now is they are totally offline," Madory told Bloomberg. "I don't know that someone is launching a cyber-attack against North Korea, but this isn't normal for them."

"I haven't seen such a steady beat of routing instability and outages in KP before. Usually there are isolated blips, not continuous connectivity problems. I wouldn't be surprised if they are absorbing some sort of attack presently."
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 22, 2014, 09:43:44 PM
North Korea Loses Its Link to the Internet
http://www.nytimes.com/2014/12/23/world/asia/attack-is-suspected-as-north-korean-internet-collapses.html?_r=0

North Korea goes completely offline: Report
http://www.cnbc.com/id/102289459

Did U.S. Take Down North Korea’s Internet?
http://www.infowars.com/did-u-s-take-down-north-koreas-internet/
“Their networks are under duress,” said Doug Madory, director of Internet analysis at Dyn Research. “This is consistent with a DDoS attack on their routers.”

“The situation now is they are totally offline," Madory told Bloomberg. "I don't know that someone is launching a cyber-attack against North Korea, but this isn't normal for them."

"I haven't seen such a steady beat of routing instability and outages in KP before. Usually there are isolated blips, not continuous connectivity problems. I wouldn't be surprised if they are absorbing some sort of attack presently."

  This means all 5 of the PC's in North Korea lost their connection.  LOL


(http://ts1.mm.bing.net/th?&id=HN.608029574090984839&w=300&h=300&c=0&pid=1.9&rs=0&p=0)
: Re: INTERNET REGULATION - HACKING
: Sasha December 22, 2014, 09:45:52 PM
Dr. Pieczenik presented a compelling case earlier today to Mr. Jones.  The basis was that long standing feuds in Asia are flaring up.  And to this the timely entrance of the CIA into the story only weeks before the publicity of the hack and the close contact of the US State Dept and a randy assassination specialist from the BLAND Corp..  Like so many ops there might be a number of goals involved from a number of different parties.

related:

Japan puts more pressure on North Korea
http://www.atimes.com/atimes/Japan/HF16Dh01.html
Hisane Masaki - Jun 16, 2006

excerpted:

TOKYO - In a significant move aimed at ratcheting up pressure on North Korea, Japan's diet (parliament) is expected to enact on Friday the North Korean Human Rights Act, which calls for economic sanctions against Pyongyang unless progress is made on the country's human-rights situation, including finally resolving the issue of abductions of Japanese nationals.
___

Prime Minister Koizumi has been cautious about imposing sanctions against North Korea. There is even speculation that he might visit Pyongyang again before stepping down in September, when his current term as party president - and hence as premier - expires. But if Abe, an anti-North Korea hardliner and the front-runner in the race to succeed Koizumi, takes the helm of government, the possibility of Japan invoking sanctions will grow.



Shinzo Abe and the Three Magic Arrows
http://mises.org/library/shinzo-abe-and-three-magic-arrows
Andy Sirkis - June 28, 2014

excerpted:

Despite claims to the contrary in the mass media, Japan’s economy is continuing to suffer mightily under the leadership of Prime Minister Abe Shinzo.
___

Only Abe’s bankster friends have profited from this scheme by speculating in the stock market with the counterfeited money that had been credited to their accounts with the central bank computer.


Neoconservatism in Japan, also known as the neo-defense school, is a term used by Asian media only recently to refer to a hawkish new generation of Japanese conservatives. They are distinguished from older Japanese conservatives in that they take a more "active" view of the Japanese Self-Defense Forces and are known for making what would be considered in the West politically incorrect statements (Shintaro Ishihara is particularly well known for this). Despite this, or perhaps because of it, they enjoy fair popularity across the nation, especially with the middle-aged population. The term is used in China, North Korea, and South Korea, as well as in Japan, to describe them.

Shinzo Abe, current Prime Minister of Japan, the successor of Junichiro Koizumi, an anti-North Korea hardliner
http://en.wikipedia.org/wiki/Neoconservatism_in_Japan
: Re: INTERNET REGULATION - HACKING
: Sasha December 22, 2014, 09:47:58 PM
  This means all 5 of the PC's in North Korea lost their connection.  LOL


(http://ts1.mm.bing.net/th?&id=HN.608029574090984839&w=300&h=300&c=0&pid=1.9&rs=0&p=0)

 ;D

Looks like they might even be orange on black screen MS-DOS too.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 22, 2014, 09:53:09 PM
;D

Looks like they might even be orange on black screen MS-DOS too.

And I''ll bet they are playing PONG in Pyongyang.

(http://ts1.mm.bing.net/th?&id=HN.608044773973951367&w=300&h=300&c=0&pid=1.9&rs=0&p=0)
: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 22, 2014, 10:32:24 PM
http://blog.lib.uiowa.edu/drp/2010/06/
(http://blog.lib.uiowa.edu/drp/files/2010/06/brainwashing.jpg)
: Re: INTERNET REGULATION - HACKING
: Sasha December 23, 2014, 08:09:53 AM
FBI Steered Itself Toward Blaming North Korea for Sony Hack
Jason Ditz, December 21, 2014

Everyone is familiar with the basic narrative of the Sony Pictures hack now. North Korea, furious at the upcoming release of “The Interview” starring Seth Rogen, hacked Sony Pictures and threatened them until they pulled the movie.

Everyone “knows” that, especially the FBI, but it’s not what happened. The narrative was manufactured largely after the fact, with an eye toward pinning the hack on North Korea. The evidence shows something different entirely.

The infiltration went on for months before the hackers crashed the Sony Pictures systems, and knew a remarkable lot about the internal workings of their corporate networks. The early statements from the hackers made no mention of North Korea, or “The Interview.”

Indeed, it was only after the US started mentioning that as a possibility, and media outlets started speculating about it, that the hackers latched on to the North Korea excuse and started mentioning any problem with the movie.

Early on, Sony’s own security was seeing the incident as a probable inside job, with a disgruntled former employee almost certainly involved in laying the groundwork for the attack.

Sony only abandoned the “insider” theory after the FBI started pushing the idea of North Korea being responsible, and the movie being the instigating factor. This was convenient for Sony, since it deflected attention from their own internal security failings by making it some huge nation-state attack they couldn’t possibly be expected to withstand.

continues:
http://news.antiwar.com/2014/12/21/fbi-steered-itself-toward-blaming-north-korea-for-sony-hack/#.VJiyB4xYM6I.twitter
: Re: INTERNET REGULATION - HACKING
: Jackson Holly December 23, 2014, 08:12:42 AM

… does this make sense to anybody? A HACKER HOTEL
just across the border in China?


"
… The Chilbosan’s role as a hacker center was disclosed by a defector back in 2004 ...


Inside the ‘Surprisingly Great’ North Korean Hacker Hotel

North Korea is so isolated that rather than bring the Internet to its hackers,
it brings them to it—in a swank hotel in China.


(http://www.tripadvisor.com/Hotel_Review-g297454-d455525-Reviews-Chilbosan-Shenyang_Liaoning.html) (http://www.tripadvisor.com/Hotel_Review-g297454-d455525-Reviews-Chilbosan-Shenyang_Liaoning.html))

The luxury hotel that has been called a command post for North Korean hackers would make for a unique holiday getaway and give you lots to talk about back home.

“Surprisingly Great Hotel - Clean, Tasteful.... and North Korean!” says a trip advisor review for the Chilbosan Hotel in Shenyang, China.

For just $53, you get “a deluxe twin room,” including a North Korean breakfast considerably more substantial than those enjoyed by the vast majority of North Koreans.

The amenities include a fitness room, a sauna, a beauty parlor, and a karaoke setup. There is also broadband Internet access, which is the reason why North Korean hackers have favored this 16-story hotel across the border from their homeland.

The hermit kingdom has maintained an army of thousands of hackers for more than a decade, but it did not establish its first direct connection to the Internet until 2010.

Following the attack, Sony hired the cyber security firm FireEye, which had recently issued a report titled “Digital Breadcrumbs: Seven Clues to Indentifying Who’s Behind Advanced Cyber Attacks.” FireEye as well as the FBI decided that in this case the clues point to North Korea, using computers traced to New York, Thailand, Poland, Italy, Bolivia, Singapore and Cyprus as well as an e-mail service based in France.

ARTICLE HERE~~~>
http://www.thedailybeast.com/articles/2014/12/20/inside-the-surprisingly-great-north-korean-hacker-hotel.html (http://www.thedailybeast.com/articles/2014/12/20/inside-the-surprisingly-great-north-korean-hacker-hotel.html)
: Re: INTERNET REGULATION - HACKING
: Sasha December 23, 2014, 12:27:45 PM
China's been supplying their net connections and by some sources, the hackers themselves.


Is North Korea Hiring Chinese Hackers? - Mar 21, 2013
https://www.techinasia.com/north-korea-hiring-chinese-hackers/


 ...but apparently it's more interwoven than that:


Obama Could Hit China to Punish North Korea - 12.19.14
http://www.thedailybeast.com/articles/2014/12/19/obama-could-hit-china-to-punish-north-korea.html
How would China rein in its ally? For starters, Beijing could order any hackers working for the North Koreans from facilities located inside China to stand down, noted Nicholas Hamisevicz, the director of research and academic affairs at the Korea Economic Institute of America. “Rather than an overt taking out of a facility inside North Korea, hopefully we can let the North Koreans and the Chinese know we take this seriously,” Hamisevicz said.

Experts say that the majority of North Korean hackers are actually working in China, either under the auspices of the government—which has its own first-rate cyberspying and -warfare units—or as freelancers. “China could probably stop this directly and immediately if they wanted,” Jason Healey, the director of the Cyber Statecraft Initiative at the Atlantic Council, wrote in an oped for The Christian Science Monitor.
: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 23, 2014, 12:35:18 PM
(http://i.dailymail.co.uk/i/pix/2014/08/15/article-2725415-208925A500000578-155_964x644.jpg)
N Korea from space

They seem to use all the nuclear power plants electricity to run cyclotrons to produce nuke material.

http://www.bloombergview.com/articles/2014-12-23/north-koreas-nukes-are-scarier-than-its-hacks
North Korea's Nukes Are Scarier Than Its Hacks
Dec 23, 2014 11:55 AM EST
By  Josh Rogin   &  Eli Lake   

While the world’s attention focuses on North Korea’s cyberwar with Sony, the Hermit Kingdom is rapidly increasing its stockpile of nuclear weapons material, with little real pushback from the United States.

A new analysis of North Korea’s nuclear program by a group of top U.S. experts, led by David Albright, president of the Institute for Science and International Security, estimates that North Korea could have enough material for 79 nuclear weapons by 2020.
...
: Re: INTERNET REGULATION - HACKING
: Sasha December 23, 2014, 12:35:57 PM
Sony Set To Announce ‘The Interview,’ Theatrical, VOD Release (Exclusive)
Sharon Waxman on December 23, 2014

After a national clamor to release the film despite threats, Sony finds a way to get the comedy out there

Sony Pictures is set to release the canceled Seth Rogen comedy “The Interview” in theaters and on video on demand, TheWrap has learned.

The plan is to release the film simultaneously in participating theaters and via video on demand. The Plaza theater in Atlanta and the Alamo Drafthouse Cinema in Austin have now said they will distribute the film.

The studio is expected to announce the planned release on Tuesday, according to an individual with knowledge of the studio’s plans.

continues:
http://www.thewrap.com/sony-set-to-announce-the-interview-theatrical-vod-release-exclusive/
: Re: INTERNET REGULATION - HACKING
: Sasha December 23, 2014, 05:06:55 PM
Most of them don't ask any meaningful questions or demand any answers, they do what lobbyists are good at doing - grab hold their patriotic flag and reactionarily play their part in the play...


Congress Seeks a Screening of 'The Interview' and Wants to See the 'Directors Cut'
http://abcnews.go.com/Politics/congress-seeks-screening-interview-directors-cut/story?id=27791011
Dec 23, 2014 - RICK KLEIN

excerpted:

Congress is looking to get into the movie business.

Not for just any movie, of course. Before Sony Pictures announced today that there would be a "limited theatrical release" of "The Interview," there was a growing bipartisan call for Washington to host a screening of the Seth Rogen-James Franco comedy shelved by Sony in the wake of an unprecedented hacking scandal and threats of violence that followed.

Rep. Brad Sherman, D-Calif., offered up the movie theater in the Capitol Visitor Center for an early January screening that would include members of Congress and senior staff. He said policy-makers should know what the buzz is about -- and that North Korean leaders should know they can't stop American artistic expression.
___

Sen. David Vitter, R-La., has sent a letter to President Obama asking for a special White House screening of "The Interview," with members of Congress invited to watch the movie and then have a "serious discussion" about "retaliatory measures we plan to take as a nation against cyber attacks."
: Re: INTERNET REGULATION - HACKING
: Sasha December 24, 2014, 12:49:15 PM
These Cybersecurity Experts Still Don’t Think North Korea Hacked Sony
http://www.buzzfeed.com/sheerafrenkel/did-north-korea-do-it#.lw9Wwee8o

BREAKING: We Can Conclusively Confirm North Korea Was Not Behind #Sony Hack
http://gotnews.com/breaking-can-conclusively-confirm-north-korea-not-behind-sony-hack/

FOX: Suspicion mounting: Sony Hack Inside Job
http://www.fox4beaumont.com/news/features/top-stories/stories/fox-suspicion-mounting-sony-hack-inside-job-5055.shtml

Sony Hack: Studio Security Points to Inside Job
http://www.hollywoodreporter.com/news/sony-hack-studio-security-points-753509
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 24, 2014, 01:51:49 PM


This story is so stupid. If the Feds really believed that North Korea did this, would they let Sony release the film?  I don't think so. I still think the damage was done in Utah. Trying to pick a fight with North Korea is pure nonsense. That's the way I see it. If any of you youngsters see this movie, please give us a review. Movies about assassinating leaders just seems boring.
: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 24, 2014, 02:14:38 PM
It seems like propaganda by Sony to turn the focus away from Unbroken  (Rising Sun Torture ) which opens on Xmas TOO... ,,, Great true story ... I didn't like the book that much ... Now a movie directed by Angelina Jolie so I am suspect ...  No watch this crappy comedy ...

http://time.com/3645696/unbroken-fact-check-true-story/
Louis Zamperini's life was even wilder than the film shows

The Angelina Jolie-directed film Unbroken is generating buzz on the basis of its two outsized personas: Jolie’s, and the late Louis Zamperini (played onscreen by Jack O’Connell). The story of the Olympian-turned-prisoner of war became widely known when Laura Hillenbrand published her biography of him, which served as the source material for Jolie’s film; it’s a remarkable story of survival
,..

http://www.mirror.co.uk/tv/tv-news/real-unbroken-story-olympian-turned-pow-who-3830323
The real Unbroken story: Olympian-turned-POW who stole Adolf Hitler's flag then survived sharks and torture
Jul 08, 2014 22:24 
By Christopher Bucktin
 
At the end of Louis Zamperini's incredible life he even befriended superstar actress Angelina Jolie, who has made it into a film

Every day for two hellish years the Japanese brutes tried to break the young American POW.

They could have killed Louis Zamperini at any moment but that would have spoilt the sadistic satisfaction of two camp guards known as The Butcher and The Bird.

So they tortured him to the brink of death – then pulled him back for more agony.

He was fed scraps of meat writhing with maggots and rubbed in rat droppings, he was injected with Dengue fever, beaten round the temples with a metal buckle and forced to lick his captors boots.

Once he was ordered to stand holding a log above his head as he was punched repeatedly in the stomach.

After 37 minutes furious guards gave up waiting for him to collapse and beat him to the ground.

They had picked on the wrong prisoner. The former Olympic runner had already survived a plane crash, 47 days at sea without food or water, shark attacks, then capture and interrogation.
...
: Re: INTERNET REGULATION - HACKING
: Sasha December 24, 2014, 02:19:31 PM
What kind of logarithmic mechanism was released to wage this arch-silliness on IMDB?  Did so many real people want to cast aside all judgment and reason to vote up this dud in some misdirected attempt to vote down Kim Jung Uck?   

The Interview
112 min   -  Action | Comedy  -  11 December 2014 (USA)   
http://www.imdb.com/title/tt2788710/
Your rating: 9.9
 
Ratings: 9.9/10 from 42,526 users   Metascore:  48/100 
Reviews: 91 user  | 6 critic  |  18  from  Metacritic.com 
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 24, 2014, 02:20:46 PM
It seems like propaganda by Sony to turn the focus away from Unbroken  (Rising Sun Torture ) which opens on Xmas TOO... ,,, Great true story ... I didn't like the book that much ... Now a movie directed by Angelina Jolie so I am suspect ...  No watch this crappy comedy ...

http://time.com/3645696/unbroken-fact-check-true-story/

Louis Zamperini's life was even wilder than the film shows

The Angelina Jolie-directed film Unbroken is generating buzz on the basis of its two outsized personas: Jolie’s, and the late Louis Zamperini (played onscreen by Jack O’Connell). The story of the Olympian-turned-prisoner of war became widely known when Laura Hillenbrand published her biography of him, which served as the source material for Jolie’s film; it’s a remarkable story of survival

I had problems with that web page, but found these links

http://www.rottentomatoes.com/m/unbroken_2014/

http://www.imdb.com/title/tt1809398/
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 24, 2014, 02:22:06 PM
What kind of logarithmic mechanism was released to wage this arch-silliness on IMDB?  Did so many real people want to cast aside all judgment and reason to vote up this dud in some misdirected attempt to vote down Kim Jung Uck?   

The Interview
112 min   -  Action | Comedy  -  11 December 2014 (USA)   
http://www.imdb.com/title/tt2788710/
Your rating: 9.9
 
Ratings: 9.9/10 from 42,526 users   Metascore:  48/100 
Reviews: 91 user  | 6 critic  |  18  from  Metacritic.com

Those will be webbots running on CIA funded servers hiding behind anonymizer servers to mask the IP address.

After all, those sort of voting statistics are similar to a North Korean election result.  ;D  :D  ;)  :)
: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 24, 2014, 02:27:07 PM
I had problems with that web page, but found these links

http://www.rottentomatoes.com/m/unbroken_2014/

http://www.imdb.com/title/tt1809398/

(http://factsanddetails.com/media/2/20120710-History%20in%20pictures%20blog.jpg)

The thing is Jolie is rewriting the story  - A big part of the book is how he found his Christian faith , that was tested and reaffirmed , helping him to survive it all ...

(http://elementarypolitics.files.wordpress.com/2014/05/bataandeathmarch.jpg)
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 24, 2014, 02:38:18 PM


  Is Unbroken out yet?
  I bet Jolee leaves a lot if not about how his Christian faith got him thru his ordeal.
: Re: INTERNET REGULATION - HACKING
: Sasha December 24, 2014, 02:39:41 PM
Those will be webbots running on CIA funded servers hiding behind anonymizer servers to mask the IP address.

After all, those sort of voting statistics are similar to a North Korean election result.  ;D  :D  ;)  :)

It's gotta be something like that.  But if twitter's any indication, there are people of nearly every make and model joyously blathering about how defending liberty requires that they watch this false-flag-promoted, US intel linked film.
: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 24, 2014, 03:07:06 PM

  Is Unbroken out yet?
  I bet Jolee leaves a lot if not about how his Christian faith got him thru his ordeal.

tomorrow - Xmas release -----

I don't know if I am ready to forgive my NWO torturers - my nightmare has not ceased...

http://en.wikipedia.org/wiki/Louis_Zamperini
...
In a televised interview on the Christian Broadcasting Network in 2003, Zamperini related that after the war he'd had nightmares about strangling his former captors, and began drinking heavily, trying to forget his experiences as a POW.[28] His wife Cynthia attended one of the evangelical crusades led by Billy Graham in Los Angeles, and became a born-again Christian.[24] [29]

In 1949, at the encouragement of his wife and her Christian friends, Zamperini reluctantly agreed to attend a crusade. Reminded by Graham's preaching of his prayers during his time on the life raft and imprisonment, Zamperini also recommitted his life to Christianity. Following this he forgave his captors, and his nightmares ceased.
...

see:

http://www.foxnews.com/opinion/2014/12/24/after-unbroken-remarkable-story-louis-zamperini-faith/
...
His wife who genuinely loved him felt she had no choice but to divorce him.  The man who had endured horrific physical and mental abuse, and emerged unbroken from the ravages of war, had succumbed to an enemy that would not let go -- himself.


https://www.youtube.com/watch?v=4FEQZ0j_iM4
: Re: INTERNET REGULATION - HACKING
: Dude447 December 24, 2014, 05:42:45 PM
Well even if North Korea Hacked Sony (which I doubt ) . I would be using it as added promo material for the thing not pulling the plug on getting the  film out  ::)
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 24, 2014, 06:01:01 PM
tomorrow - Xmas release -----

I don't know if I am ready to forgive my NWO torturers - my nightmare has not ceased...

http://en.wikipedia.org/wiki/Louis_Zamperini
...
In a televised interview on the Christian Broadcasting Network in 2003, Zamperini related that after the war he'd had nightmares about strangling his former captors, and began drinking heavily, trying to forget his experiences as a POW.[28] His wife Cynthia attended one of the evangelical crusades led by Billy Graham in Los Angeles, and became a born-again Christian.[24] [29]

In 1949, at the encouragement of his wife and her Christian friends, Zamperini reluctantly agreed to attend a crusade. Reminded by Graham's preaching of his prayers during his time on the life raft and imprisonment, Zamperini also recommitted his life to Christianity. Following this he forgave his captors, and his nightmares ceased.
...

see:

http://www.foxnews.com/opinion/2014/12/24/after-unbroken-remarkable-story-louis-zamperini-faith/
...
His wife who genuinely loved him felt she had no choice but to divorce him.  The man who had endured horrific physical and mental abuse, and emerged unbroken from the ravages of war, had succumbed to an enemy that would not let go -- himself.


https://www.youtube.com/watch?v=4FEQZ0j_iM4

  Amazing.  Thanks Tahoe Blue.
: Re: INTERNET REGULATION - HACKING
: Dude447 December 24, 2014, 07:47:02 PM
I was never and anytime trying to trivialise the korea war
: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 25, 2014, 12:46:29 PM
fyi - you think everything about WWII war crimes had been declassified by now? NO - Not till 2002 and still not everything ....... you need to see this:

http://listverse.com/2014/05/06/10-japanese-atrocities-from-world-war-ii/
10 Japanese Atrocities From World War II

http://www.b-29s-over-korea.com/Japanese-War-Crimes/index4.html
B-29 CREWS TORTURED BY THE JAPANESE - Page 4
...
Use of chemical weapons

According to historians Yoshiaki Yoshimi and Seiya Matsuno, Emperor Hirohito authorized by specific orders the use of chemical weapons in China. For example, during the invasion of Wuhan from August to October 1938, the Emperor authorized the use of toxic gas on 375 separate occasions, despite Article 171 of the Versailles Peace Treaty and a resolution adopted by the League of Nations on May 14, condemning the use of poison gas by Japan.

Preventable famine

Deaths caused by the diversion of resources to the Japanese military in occupied countries are also regarded as war crimes by many people. Millions of civilians in southern Asia — especially Vietnam and the Netherlands East Indies (Indonesia), both of which were major rice-growing countries — died during a preventable famine in 1944–45.

Torture of POWs

Japanese imperial forces are also reported to have utilized widespread use of torture on prisoners, usually in an effort to gather military intelligence quickly. Tortured prisoners were often later executed. A former Japanese Army officer who served in China, Uno Shintaro, stated:

The major means of getting intelligence was to extract information by interrogating prisoners. Torture was an unavoidable necessity. Murdering and burying them follows naturally. You do it so you won't be found out. I believed and acted this way because I was convinced of what I was doing. We carried out our duty as instructed by our masters. We did it for the sake of our country. From our filial obligation to our ancestors. On the battlefield, we never really considered the Chinese humans. When you're winning, the losers look really miserable. We concluded that the Yamato [i.e. Japanese] race was superior.

After the war, a total of 25 individuals were indicted as "Class A" war criminals, and 5,700 individuals were indicted as "Class B" or "Class C" war criminals by Allied criminal trials. This number included 178 ethnic Taiwanese and 148 ethnic Koreans. Of these, 984 were initially condemned to death, 920 were actually executed, 475 received life sentences, 2,944 received some prison terms, 1,018 were acquitted, and 279 were not sentenced or not brought to trial. High ranking executed individuals included Hideki Tojo, Tomoyuki Yamashita, and Masaharu Homma. The most prominent ethnic Korean was Lieutenant General Hong Sa Ik, who orchestrated the organization of prisoner of war camps in Southeast Asia. In 2006, the South Korean government pardoned 83 of the 148 convicted Korean war criminals.

Cannibalism

Many written reports and testimonies collected by the Australian War Crimes Section of the Tokyo tribunal, and investigated by prosecutor William Webb (the future Judge-in-Chief), indicate that Japanese personnel in many parts of Asia and the Pacific committed acts of cannibalism against Allied prisoners of war. In many cases this was inspired by ever-increasing Allied attacks on Japanese supply lines, and the death and illness of Japanese personnel as a result of hunger. However, according to historian Yuki Tanaka: "cannibalism was often a systematic activity conducted by whole squads and under the command of officers". This frequently involved murder for the purpose of securing bodies. For example, an Indian POW, Havildar Changdi Ram, testified that: " on November 12, 1944 the Kempeitai beheaded an Allied pilot. I saw this from behind a tree and watched some of the Japanese cut flesh from his arms, legs, hips, buttocks and carry it off to their quarters... They cut it small pieces and fried it."
 


http://www.archives.gov/iwg/reports/japanese-interim-report-march-2002-1.html
...
Agencies are screening these "possible" files to identify specific documents, files, or bodies of records that are relevant and must be reviewed for declassification and release under the Act. This second survey, still in progress, has identified more than 80,000 pages of relevant records. The IWG now estimates that 200,000 pages of classified material related to Japanese war crimes will be identified to be reviewed for declassification. This amount contrasts markedly with the more than 10 million pages of relevant and related files that are being declassified in the Nazi war crimes portion of the project.
In addition to estimates related to records holdings, each agency provided a resource and workload estimate and an implementation plan outlining its proposed actions to comply fully with the Act.

Having identified bodies of records requiring further review under the Act, the IWG member agencies are making progress in declassification review, attempting to declassify and release to the public as much material as possible, consistent with national security. The IWG is committed to accomplishing this goal. To date, 18,000 pages related to Japanese war crimes have been declassified. These records and the records subsequently declassified will be available for public examination at NARA in College Park, Maryland.
...

JAPAN: Agency Processing and Declassification Status, January 2002
 
[View the table]

NOTE: At the close of 2001, the following agencies had completed their work: NSC and CIA. The following agencies have no relevant records: NSC, Department of Treasury, Department of Commerce, Department of Energy, United States Information Agency, National Aeronautics and Space Administration, Joint Chiefs of Staff.

*NSA is searching an additional 29,000,000 electronically stored pages and will review any relevant documents that are found.
**Includes files only portions of which are directly relevant, but whole file is being included to preserve file integrity.
***Includes materials previously transferred to NARA that have been declassified by CIA and the Department of State.
....

Records of the Office of Strategic Services (OSS)

The 1.2 million pages of recently declassified materials from this record group contain scattered evidence of war crimes committed by the Japanese military during the Asia Pacific War. The OSS records touch on the following topics:

Chinese interrogation of Japanese POW covering the Japanese Bacteriological Warfare Section. Report included bacteria production at the Nanking Headquarters, dissemination of bacteria by plane, a chart giving names of division heads and branch organization in South China, and a sketch map of the Nanking Headquarters. (RG 226/Entry 210, Box 179)
Two sentences in an OSS cable from China stating that a Japanese sergeant attested to dumping poison gas, said to be intended for defensive purposes, into the sea at Hong Kong. (RG 226/Entry 210, Box 184, Folder 1)
"Final Summary Report of BW," 28 September 1945, by Research and Development Branch, OSS. Appendix A summarizes German and Japanese BW efforts and concludes that the "Japanese had perhaps the best informed scientists in BW investigations of any nation in the world" and were a greater potential threat than Germany. Appendix B outlines possible BW devices for use against personnel and vegetation. (RG 226/Entry 145, Box 320, Folder 1)
Atrocities against civilians, looting, and forced conscription committed by Japanese forces in the China-Burma Theater.
Mistreatment of Allied (American, Australian, British, Dutch, and Canadian) inmates held in Japanese civilian internment and prisoner of war camps.
Collaborative efforts between German and Japanese military intelligence and secret police organizations in China and Manchuria.
...

The Historical Record

The Nazi War Crimes Disclosure Act and the Japanese Imperial Government Disclosure Act require that the Government locate, declassify and open remaining classified records related to war criminals and criminality. Initial surveys and estimates indicate that there are relatively few records related to Japanese war crimes that remain classified. However, the IWG has found that there is a large and, to some degree, underused body of records related to Japanese war crimes that either was never classified or has been declassified and open to the public at NARA for some time. Although the IWG continues to find and press for the declassification of records related to Japanese war crimes, as this portion of the report demonstrates, most of the historical record on the topic has long been available.

Implementation of the Act requires, as an essential first step, locating pertinent classified records among the billions of pages of records in NARA of the United States, Federal records centers, and agency storage areas. To accomplish this task, it is necessary to understand the nature and functions of the agencies and programs that created and collected records about Japanese war crimes, war criminals, persecution, and looting. As is often the case with records of the Federal Government, it is the sheer volume, not security classification, which is the major hindrance to the comprehensive exploitation of the records relating to any subject. Historians and other researchers frequently encounter important materials that have been available but never previously found or recognized as valuable.
: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 27, 2014, 11:24:07 AM
As I thought - Unbroken is unspoken of in the media ... with all hype going to the crappy comedy .... - oh we are to accept NWO dictatorships as OK now

Unbroken Official Trailer #1  (https://www.youtube.com/watch?v=XrjJbl7kRrI)

Merry Christmas Mr. Lawrence trailer  (https://www.youtube.com/watch?v=7JTroFovUXw)

http://www.forbes.com/sites/scottmendelson/2014/12/26/christmas-box-office-unbroken-into-the-woods-score-above-selma-american-sniper-score-below/
...

The top opener of Christmas Day is in-fact Angelina Jolie’s Unbroken, which a stunning $15.59 million on its first day, including $850,000 in Wednesday previews. That’s the third-biggest Christmas Day debut ever, behind  Les Miserables ($18m), and Sherlock Holmes ($24m) and just ahead of Django Unchained ($15m) and Marley and Me ($14.8m). It’s the fifth-biggest Christmas Day gross ever.

The Universal Pictures/Comcast Corp. film, which is about an American Olympian who goes through the torments of World War II and then additional suffering as a prisoner in a Japanese POW camp, was positioned as a major Oscar contender with perhaps Ms. Jolie netting a Best Director nomination for her second such-effort. The heat has cooled considerably since the film’s first wave of screenings were of the mixed-positive variety, but a major debut weekend could arguably put it back in play or at least keep in on everyone’s radar.
...

The other semi-wide release yesterday was of course Sony Pictures’ The Interview. The Seth Rogen/James Franco comedy opened on 331 smaller-end theaters and was actually released on Wednesday on Video On Demand after, well, you know. Anyway, I can’t imagine the small theaters who fought to be allowed to play the film were thrilled that Sony went ahead and debuted the picture on VOD nearly 24 hours before the average paying consumer could see it in a theater.

Obviously we don’t have VOD numbers and who knows if Sony will release them, but the film earned around $1 million in theaters yesterday. That points to a $3.5m four-day debut, with the caveat that anyone who absolutely had to see the film in a theater as some kind of patriotic statement has already done so, which leaves the rest of the weekend for general moviegoers who are merely interested in the film and are willing to choose theaters over VOD. Speaking strictly in a financial success, and with the acknowledgment that this release demands the mother of all asterisks, this film is a box office disaster, although we’ll see what it amounts to in terms of the whole day-and-date VOD thing.
...

[ this is what sony doesn't want you to see: ]

(http://www.mygen.com/images/Leonard_Siffleet.jpg)
On 24th October 1943, Australian commando Leonard Siffleet was beheaded on Aitape Beach in Papua New Guinea, along with two Ambonese, H. Pattiwal and M. Reharing.This photograph, of Japanese soldier Yasuno Chikao just before he struck, was taken from the body of a Japanese casualty later in the war.
 - See more at: http://ww2today.com/24th-october-1943-japanese-execute-australian-commando-leonard-siffleet#sthash.zVnYjh3a.dpuf

comments:

DREW DODDS October 15, 2014 at 8:11 pm

JUST THINK OF WHAT KIND OF WORLD WE WOULD HAVE LIVED IN IF THESE EVIL NIPS HAD WON THE WAR. THEY SEEMED TO ENJOY THE TORTURE AND HUMILIATION BESET ON OUR PRISONERS OF WAR. I WILL NEVER BUY A JAP CAR AND AM OF THE GENERATION THAT KNEW MANY CANADIAN , AMERICAN , AND BRITISH POWS OF THE JAPS. AND THEY ALL SAID TO ME THAT THEY PRAISED THE DAY THE ATOM BOMB DROPPED AS THEY WERE ALL EARMARKED FOR EXECUTION IF THERE WAS AN ALLIED LANDING ON JAPAN. WE WILL REMEMBER ALL THOSE BRAVE MEN WHO DIED FIGHTING SUCH TYRANNY AND NOW WE FACE A NEW ENEMY THE TERRORISTS WHO HIDE BEHIND A MASK, LET US BE SWIFT AND NON FORGIVING TO THESE CREATURES OF EVIL.

see also: http://listverse.com/2014/05/06/10-japanese-atrocities-from-world-war-ii/

(http://www.happyanniversarytext.com/wp-content/uploads/2014/11/merry-christmas-mr-lawrence-5.jpg)

Kaori Muraji - 村治佳織 - Merry Christmas,Mr Lawrence (https://www.youtube.com/watch?v=ZA-NjYpRn34)
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 27, 2014, 06:21:42 PM
http://gotnews.com/breaking-ided-two-female-l-based-persons-interest-sony-leak/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+gotnewsdotcom+%28Got+News%29

   more at the link.....

BREAKING: We Have IDed Two Female L.A.-Based Persons of Interest in Sony Leak


A Gotnews.com independent investigation has identified two female, L.A.-based persons of interest in the Sony hacking scandal.

The woman who we will call “Lena2″ is in her mid-to-late thirties and a former Sony pictures employee, who ceased to be employed by Sony in March of this year.

A review of her LinkedIn page shows that she had both the payroll access, the computer savvy, and the accounting background. She had been at the company for eight years.

“Lena2″ had both the access and the means to leak the sensitive Sony material. Gotnews.com is not releasing her real name at this time, but we have identified her as a person of interest, based upon:  Her role as in administering the payroll system;  administrator and her social media accounts fits the profile.. (She deleted her Twitter account.) Despite leaving the company earlier this year, we curiously cannot find a separation letter for her, although hundreds of other separation letters were released by the hackers.

Gotnews.com has already pointed out how the data transfer speeds strongly point to a Sony insider.
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O December 28, 2014, 11:55:44 AM
In a world where NOBODY STANDS FOR ANYTHING THEY WILL FALL FOR EVERY THING, false flags are just part of the day to day scenery.
Is there any wonder why those of us who are TRUELY AWAKE question whether EVERY 'EVENT' is a false flag?
---------------------------------------------------------
‘The Interview’ Flops, FBI ‘North Korean Hack’ Story Also Debunked

Patrick Henningsen
21st Century Wire

Last week, we called it a ‘false flag’ hack, and this week we find out that’s exactly what it was.

Official FBI claims that North Korea was behind the ‘Sony hack’ were debunked today by two leading cyber security firms. More on that later, but first, let’s look at the failure of film itself…

To anyone in media or politics who said this week that it was our “patriotic duty as Americans” to go and see this movie, I hereby banish you to the outer realm of the consensus reality Bardo (in other words, you should be working for the North Korean government, not ruining America).

Despite being hyped and spun with unprecedented faux patriotic fervor, and getting a ton of free publicity from President Obama, Sony Entertainment’s The Interview is officially a flop.

The film was released in 331 independently owned cinemas on Christmas Day, pulling a paltry $1 million in gate receipts, as well as an equally poor showing on the download charts too. The film was a big hit on the ‘illegal’ download front though. According to the blog TorrentFreak, the film was downloaded around 750,000 times as of yesterday (we use the term ‘illegal’ loosely here, because it would a real crime to charge money to see this turkey).

Between Sony, the White House and a highly autistic US media, no other movie in history has been given so much political hype. Unfortunately on this occasion, the steak hasn’t lived up to the sizzle.

The main reason it bombed is the same reason most films bomb – because it’s a really bad film. Reviews have been less than favorable. On the internet’s largest movie review site, Rotten Tomatoes, critic’s scores dropped from 53% before its release, to 47% (and dropping) after its Christmas Day opening - the lowest rating of all major releases. Other sites generally rate it at 2 and a half stars (Dumb and Dumber To got about the same, so you get the picture).

Critics at the Washington Post said the film “isn’t as edgy as its reputation suggests”. Tomatoes described it as containing “middling (average) laughs”, and paints ‘stars’ Seth Rogen and James Franco as merely, “likable” (rather generous). Reviewers at Screen Rant were a bit tougher on Sony’s marginal effort, describing the film as, “not all that buzz-worthy”, and “a juvenile  political fantasy”, which “plays more like a sketch show or sitcom  rather than a theatrical film.”

In fact, this brainchild was hatched by the great Hollywood minds behind celluloid masterpieces like Superbad, The 40 Year Old Virgin and This Is The End - all productions thatwere pitched at the 13-15 year old demographic. In other words, if you want to pay $12 (plus another $10 for nibbles) to see a bad ‘Saturday Night Live’ sketch on a big screen – then The Interview is for you.

Why did Sony go through so much trouble (and money) to push a mediocre cinema production? In 21st Century America, the majority of Americans still get their political analysis and history in entertainment form – getting their history from Hollywood’s prestige biopics – many of which are fictional, or from TV ‘news comedy’ programs presented by John Stewart or Stephen Colbert. This demographic of news consumers will tell you that they don’t really care about news, and that  The Interview is just ‘entertainment’ so it really doesn’t matter whether its fictional or not, because as far as they’re concerned, Kim Jung-Un is a nutty dictator and anything that undermines him is a good thing. This common rationale sounds eerily like many of our US State Department foreign policy briefings. No wonder then, that Sony’s CEO Michael Lynton actually punted The Interview to both the Rand Corporation and the US State Department for approval during the final editing phase this past summer – with both blessing the film’s plot line of the assassination of the North Korean leader. In the end, this was really a western propaganda film about regime change, and one which Washington nation-builders are eager to leak on DVD into North Korea (as mentioned in the Washington Post).

In the end , The Interview, just wasn’t good enough to compete with a number of other better productions released at the same time like Wild, Unbroken, Foxcatcher, Into The Woods, and The Imitation Game - all of which received better reviews and critical acclaim.

The film cost $46 million to make, with the studio and distributors paying an additional $40-50 million to market the production. It may be able to recover its costs over the long run, as curiosity around the publicity stunt is gradually wringed-out over time.

The publicity-driven events also served as a beta run for the studio’s long-term idea of selling its films directly to the public online, cutting out all of the middlemen. Quietly amid last week’s controversy, Sony had launched its own portal for downloading, entitled SeeTheInterview.com, where fans can see the film for $5.99. Similar direct deals were struck with Google Play and YouTube. Figures are not yet available, but studio execs are surely monitoring the numbers closely and will be looking at how best to optimize integrated marketing campaigns in order to coalesce with giant publicity stunts like we saw with The Interview.

It’s Official: Sony Hack was a ‘False Flag’

As 21WIRE predicted last week, Washington’s official conspiracy theory that North Korea was the villain behind the infamous Sony Hack – has crumbled…

Today we can confirm that two cyber security firms, Norse Corporation and Cloud Flare, conducted independent investigations into the hack and the results are a stark opposition to the FBI’s highly creative claim that Pyongyang carried out the historic hack. Experts confirmed that the alleged malware used in the cyber attack was in fact leaked years ago and any hacker could have utilized it since If you remember, immediately after the hack hit the headlines, North Korea denied it, and smirking US media lambasted them for it. But now it’s abundantly clear that Pyongyang were telling the truth – while every single mainstream US broadcast journalist was parroting a huge lie.

Last week we saw an US President, the US State Department, George Clooney, and every single broadcast media anchor and analyst riffing off of the FBI wild conspiracy about how some nefarious, secretive, SPECTRE-like cyber espionage layer nestled in the bowels of Pyongyang, had unleashed this merciless attack on poor Sony. The alleged North Korean hacking cabal was first referred to by FOX News as “Unit 121″, and later called “Bureau 121″ by CNN, and this week finally rebranded to the “Reconnaissance General Bureau”. Just like a Hollywood plot itself, it was all invented. Pure fantasy.

It was also reported that the firms’ investigations had uncovered one former Sony Entertainment employee and security officer referred to as “Lena”, who had high level admin access to the company’s IT system, and who has connections to the hacking group, ‘Guardians of Peace’ (#GOP) who were blamed for the cyber attack. This means that the hack is more likely an ‘inside job’, and the motivations could have a redress for any number of grievances including Sony’s company lay-offs and online piracy prosecutions.

The fact that the President himself used this publicity stunt to grandstand on the issue cyber security shows just how shallow the office has become. What a poor actor he is; standing there, soaking the attention and cracking stupid jokes to the press corps, while simultaneously claiming that the Sony hack was ‘the biggest attack in history’ and that North Korea did it. Two massive porky pies, both of which pave the way for his “sweeping internet reforms”. Talk about an Orwellian abuse of power.

Yes, yes. Another round of lies from Hollywood and Washington propaganda spin-meisters.

One big bad publicity stunt for Sony, and one bad propaganda exercise by Washington DC.
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O December 28, 2014, 11:49:48 PM
False Flagging the World towards War. The CIA Weaponizes Hollywood
http://wakeupfromyourslumber.com/false-flagging-the-world-towards-war-the-cia-weaponizes-hollywood/

Almost all wars begin with false flag operations.

The coming conflicts in North Korea and Russia are no exception.

Mass public hysteria is being manufactured to justify aggression against Moscow and Pyongyang, in retaliation for acts attributed to the North Korean and Russian governments, but orchestrated and carried out by the CIA and the Pentagon.

The false flagging of North Korea: CIA weaponizes Hollywood

The campaign of aggression against North Korea, from the hacking of Sony and the crescendo of noise over the film, The Interview, bears all the markings of a CIA false flag operation.

The hacking and alleged threats to moviegoers has been blamed entirely on North Korea, without a shred of credible evidence beyond unsubstantiated accusations by the FBI. Pyongyang’s responsibility has not been proven. But it has already been officially endorsed, and publicly embraced as fact.

The idea of “America under attack by North Korea” is a lie.

The actual individuals of the mysterious group responsible for the hacking remain conveniently unidentified. A multitude of possibilities—Sony insiders, hackers-for-hire, generic Internet vandalism—have not been explored in earnest. The more plausible involvement of US spying agencies—the CIA, the NSA, etc. , their overwhelming technological capability and their peerless hacking and surveillance powers—remains studiously ignored.

Who benefits? It is illogical for Pyongyang to have done it. Isolated, impoverished North Korea, which has wanted improved relations with the United States for years (to no avail), gains nothing by cyberattacking the United States with its relatively weak capabilities, and face the certainty of overwhelming cyber and military response. On the other hand, Washington benefits greatly from any action that leads to regime change in North Korea.

But discussion about Pyongyang’s involvement—or lack of—risks missing the larger point.

This project, from the creation of The Interview to the well-orchestrated international incident, has been guided by the CIA, the Pentagon, and the State Department from the start. It is propaganda. It is a weapon of psychological warfare. It is an especially perverted example of military-intelligence manipulation of popular culture for the purpose of war.

There is nothing funny about any of it.

The Interview was made with the direct and open involvement of CIA and Rand Corporation operatives for the express purpose of destabilizing North Korea. Star and co-director Seth Rogen has admitted that he worked “directly with people who work in the government as consultants, who I’m convinced are in the CIA”. Originally conceived to be a plot taking place in an “unnamed country”, Sony Pictures co-chairman Michael Lynton, who also sits on the board of the Rand Corporation, encouraged the film makers to make the movie overtly about murdering Kim Jong-Un. Bruce Bennett, the Rand Corporation’s North Korean specialist, also had an active role, expressing enthusiasm that the film would assist regime change and spark South Korean action against Pyongyang. Other government figures from the State Department, even operatives connected to Hillary Clinton, read the script.

The infantile, imbecilic, tasteless, reckless idiots involved with The Interview, including the tasteless Rogen and co-director Evan Goldberg, worked with these military-intelligence thugs for months. “Hung out” with them. They do not seem to have had any problem being the political whores for these Langley death merchants. In fact, they had fun doing it. They seem not to give a damn, or even half a damn, that the CIA and the Pentagon have used them, and co-opted the film for an agenda far bigger than the stupid movie itself. All they seem to care about was that they are getting publicity, and more publicity, and got to make a stupid movie. Idiots.

The CIA has now succeeded in setting off a wave of anti-North Korea war hysteria across America. Witness the ignorant squeals and cries from ignorant Americans about how “we can’t let North Korea blackmail us”, “we can’t let Kim take away our free speech”. Listen to the ridiculous debate over whether Sony has the “courage” to release the film to “stand up to the evil North Koreans” who would “blackmail America” and “violate the rights” of idiot filmgoers, who now see it as a “patriotic duty” to see the film.

These mental midgets—their worldviews shaped by the CIA culture ministry with its endorsed pro-war entertainment, violent video games, and gung-ho shoot ‘em ups—are hopelessly brain-curdled, irretrievably lost. Nihilistic and soulless, as well as stupid, most Americans have no problem seeing Kim Jong-Un killed, on screen or in reality. This slice of ugly America is the CIA’s finest post-9/11 army: violent, hate-filled, easily manipulated, eager to obey sheeple who march to whatever drumbeat they set.

And then there are the truly dumb, fools who are oblivious to most of reality, who would say “hey lighten up, it’s only a comedy” and “it’s only a movie”. Naïve, entitled, exceptionalist Americans think the business of the war—the murderous agenda they and their movie are helping the CIA carry out —is all just a game.

The CIA’s business is death, and that there are actual assassination plans in the files of the CIA, targeting heads of state. Kim Jong-Un is undoubtedly on a real assassination list. This is no funny, either.

The real act of war

The provocative, hostile diplomatic stance of the Obama administration speaks for itself. Washington wanted to spark an international incident. It wants regime change in Pyongyang, does not care what North Korea or China think, and does not fear anything North Korea will do about it.

On the other hand, imagine if a film were about the assassination of Benjamin Netanyahu and the toppling of the government in Tel Aviv. Such a film, if it would ever be permitted even in script form, would be stopped cold. If it made it through censors that “magically” never slowed down The Interview (and yes, there is censorship in America, a lot of it) Obama would personally fly to Tel Aviv to apologize. At the very least, Washington would issue statements distancing themselves from the film and its content.

Not so in the case of The Interview. Because American elites actually want the Kim family murdered.

Despite providing no proof of North Korean involvement, President Barack Obama promised a “proportional response”. Promptly, North Korea’s Internet was mysteriously shut down for a day.

Unless one is naïve to believe in this coincidence, all signs point to US spy agencies (CIA, NSA, etc.) or hackers working on behalf of Washington and Langley.

Given the likelihood that North Korea had nothing to do with either the hacking of Sony, the initial pulling of the movie (a big part of the publicity stunt, that was not surprisingly reversed) or the “blackmailing” of moviegoers, the shutting down of North Korea’s Internet was therefore a unilateral, unprovoked act of war. Washington has not officially taken responsibility. For reasons of plausible denial, it never will.

Perhaps it was a dry run. A message. The US got to test how easily it can take down North Korea’s grid. As we witnessed, given overwhelming technological advantage, it was very easy. And when a war against Pyongyang begins in earnest, American forces will know exactly what they will do.

The US is flexing its Asia-Pacific muscles, sending a message not only to Pyongyang, but to China, a big future target. Some of the other muscle-flexing in recent months included the anti-Beijing protests in Hong Kong (assisted by the CIA and the US State Department), ongoing provocations in the South China Sea over disputed oil, and new defense agreements that place new anti-missile systems and missile-guided naval vessels to the region.

The bottom line is that America has once again been mobilized into supporting a new war that could take place soon. The CIA and Sony have successfully weaponized a stupid movie, making it into a cause and a battle cry.

If and when bombs fall on North Korea, blood will be on the hands of the makers of The Interview, every single executive who allowed it to be made, and the hordes who paid to see it.

If America were a decent, sane society, The Interview would be exposed, roundly denounced, boycotted and shunned. Instead it is celebrated.

The CIA should be condemned. Instead, Seth Rogen hangs out with them. America, increasingly dysfunctional, loves them. Obeys them.

The false flagging of Russia

Regarding The Interview, Russian Foreign Ministry spokesman Alexander Lukashevich issued a statement in sympathy with North Korea, correctly calling the film’s concept aggressive and scandalous, and decried the US retaliatory response as counterproductive and dangerous to international relations.

Of course. Washington has no interest in improved international relations.

The Russians should know.

Like Kim Jong-Un, Vladimir Putin has been vilified, demonized and false-flagged, incessantly. If Kim is today’s object of ridicule, Putin is Evil Incarnate.

Consider the hysterical, desperate provocations by Washington in recent months.

A US-NATO coup, engineered by the CIA, toppled the government of Ukraine, planting a pro-US neo-Nazi criminal apparatus on Russia’s doorstep. The CIA and its worldwide network of propagandists pinned the blame on Putin and Russia for aggression, and for obstructing “democracy”.

The MH-17 jetliner is downed by Ukrainian operatives, with the support of the CIA, Mi-6, etc. etc. This false flag operation was blamed on Russia— “Putin’s Missile”. The US and NATO are still trying to pin these murders on Putin.

The war against the Islamic State—a massive CIA false flag operation—seeks to topple with the the Assad government as well as to militarily counter Russia. The ongoing Anglo-American conquest of regional oil and gas supplies, and energy transport routes is also aimed at checkmating Russia and China across the region.

The US and NATO have attacked the Russian federation with sanctions. The US and Saudi Arabia have collapsed oil prices, to further destroy the Russian economy. Full-scale military escalations are being planned. The US Congress is pushing new legislation tantamount to an open declaration of war against Russia.

What next? Perhaps it is time for the CIA to produce a Seth Rogen-James Franco movie about assassinating Putin. Another “parody”. Or how about a movie about killing Assad, or anyone else the United States wants to make into a Public Enemy? Don’t think Langley isn’t working on it.

The return of the Bushes (who were never gone)

In the midst of all escalating war hysteria comes news that Jeb Bush is “actively exploring” running for president in 2016. The long predicted return of the Bush family, the kings of terrorism, the emperors of the false flag operation, back to the White House appears imminent.

The CIA will have its favorite family back in the Oval Office, with true CIA scion to manage the apocalyptic wars are likely to be launched in earnest in the next two years: Russia/Ukraine, North Korea, the Middle East.

Jeb Bush will “finish the job”.

The 2016 presidential “contest” will be a charade. It is likely to put forth two corrupt establishment political “friends” posing as adversaries, when in fact, they are longtime comrades and conspirators. On one side, Hillary (and Bill) Clinton. On the other side, Jeb Bush, with George H.W., George W. and all of the Bush cronies crawling back out of the rotten woodwork. The fact is that the Clintons and Bushes, and their intertwined networks, have run the country since the 1980s, their respective camps taking turns in power, with Obama as transitional figurehead (his administration has always been run by neoliberal elites connected to the Clintonistas, including Hillary Clinton herself).

The collective history of the Bushes stretches back to the very founding of the American intelligence state. It is the very history of modern war criminality. The resume is George H.W. Bush—the CIA operative and CIA Director—is long and bloody, and littered with cocaine dust. The entire Bush family ran the Iran-Contra/CIA drug apparatus, with the Clintons among the Bush network’s full partners in the massive drug/weapons/banking frauds of that era, the effects of which still resonate today. And we need not remind that the Bush clan and 9/11 are responsible for the world of terror and false flag foreign policy and deception that we suffer today.

While it remains too early to know which way the Establishment will go with their selection (and it depends on how world war shakes out between now and 2016), it is highly likely that Jeb

Bush would be the pick.

Hillary Clinton has already been scandalized—“Benghazi-ed”. Jeb Bush, on the other hand, has ideal Establishment/CIA pedigree. He has waited years for the stupid American public to forget the horrors that his family—Georges H.W. and W.— brought humanity. And now Americans , with their ultra-short memories, have indeed forgotten, if they had ever understood it in the first place.

And the American public does not know who Jeb Bush is, beyond the last name. Jeb Bush, whom Barbara Bush always said was the “smart one”, has been involved in Bush narco-criminal business since Iran-Contra. His criminal activities in Florida, his connection with anti-Castro Cuban terrorists and other connections are there, for those who bother to investigate them. His Latin American connections—including his ability to speak fluent Spanish, a Latin wife and a half-Latin son (George P. Bush, the next up and coming political Bush)—conveniently appeals to the fastest-growing demographic, as well as those in the southern hemisphere drug trade. Recent Obama overtures towards the Latino demographic—immigration, Cuba—appear to be a Democratic Party move to counter Jeb Bush’s known strengths in the same demographic.

Today, in the collective American mind, Kim Jong-Un and Vladimir Putin are “the bad guys”. But the mass murdering war criminal Bushes are saints. “Nice guys”.

A Jeb Bush presidency will be a pure war presidency, one that promises terror, more unspeakable than we are experiencing now, lording it over a world engulfed in holocaust.

This is not a movie.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 30, 2014, 08:07:46 AM
http://gotnews.com/breaking-ided-two-female-l-based-persons-interest-sony-leak/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+gotnewsdotcom+%28Got+News%29

   more at the link.....

BREAKING: We Have IDed Two Female L.A.-Based Persons of Interest in Sony Leak


A Gotnews.com independent investigation has identified two female, L.A.-based persons of interest in the Sony hacking scandal.

The woman who we will call “Lena2″ is in her mid-to-late thirties and a former Sony pictures employee, who ceased to be employed by Sony in March of this year.

A review of her LinkedIn page shows that she had both the payroll access, the computer savvy, and the accounting background. She had been at the company for eight years.

“Lena2″ had both the access and the means to leak the sensitive Sony material. Gotnews.com is not releasing her real name at this time, but we have identified her as a person of interest, based upon:  Her role as in administering the payroll system;  administrator and her social media accounts fits the profile.. (She deleted her Twitter account.) Despite leaving the company earlier this year, we curiously cannot find a separation letter for her, although hundreds of other separation letters were released by the hackers.

Gotnews.com has already pointed out how the data transfer speeds strongly point to a Sony insider.

  Headline at Drudge this morning 11-30-2014, 6am MST

SONY HACK WAS 'LAID-OFF STAFF"
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 30, 2014, 08:13:20 AM
^^^^^^^^^^^^^^^^
www.politico.com/story/2014/12/fbi-briefed-on-alternate-sony-hack-theory-113866.html

  more at the link...

FBI briefed on alternate Sony hack theory

FBI agents investigating the Sony Pictures hack were briefed Monday by a security firm that says its research points to laid-off Sony staff, not North Korea, as the perpetrator — another example of the continuing whodunit blame game around the devastating attack.

Even the unprecedented decision to release details of an ongoing FBI investigation and President Barack Obama publicly blaming the hermit authoritarian regime hasn’t quieted a chorus of well-qualified skeptics who say the evidence just doesn’t add up.


Researchers from the cyber intelligence company Norse have said their own investigation into the data on the Sony attack doesn’t point to North Korea at all and instead indicates some combination of a disgruntled employee and hackers for piracy groups is at fault.

The FBI says it is standing by its conclusions, but the security community says they’ve been open and receptive to help from the private sector throughout the Sony investigation.

Norse, one of the world’s leading cyber intelligence firms, has been researching the hack since it was made public just before Thanksgiving.

Norse’s senior vice president of market development said that just the quickness of the FBI’s conclusion that North Korea was responsible was a red flag.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 30, 2014, 08:16:04 AM
http://gotnews.com/breaking-ided-two-female-l-based-persons-interest-sony-leak/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+gotnewsdotcom+%28Got+News%29

   more at the link.....

BREAKING: We Have IDed Two Female L.A.-Based Persons of Interest in Sony Leak


A Gotnews.com independent investigation has identified two female, L.A.-based persons of interest in the Sony hacking scandal.

The woman who we will call “Lena2″ is in her mid-to-late thirties and a former Sony pictures employee, who ceased to be employed by Sony in March of this year.

A review of her LinkedIn page shows that she had both the payroll access, the computer savvy, and the accounting background. She had been at the company for eight years.

“Lena2″ had both the access and the means to leak the sensitive Sony material. Gotnews.com is not releasing her real name at this time, but we have identified her as a person of interest, based upon:  Her role as in administering the payroll system;  administrator and her social media accounts fits the profile.. (She deleted her Twitter account.) Despite leaving the company earlier this year, we curiously cannot find a separation letter for her, although hundreds of other separation letters were released by the hackers.

Gotnews.com has already pointed out how the data transfer speeds strongly point to a Sony insider.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 30, 2014, 08:45:11 AM
gotnews.com/exclusive-breaking-fbi-inquiry-moved-los-angeles-involves-hacker-group-lulsec/

EXCLUSIVE, BREAKING: FBI Inquiry Has Moved To Los Angeles, Involves Hacker From LulzSec Group

DECEMBER 30, 2014 BY CHARLES C. JOHNSON

Sony hack was an inside job
Multiple police, FBI, cyber analyst sources are confirming that the focus of the FBI’s investigation has moved from North Korea to Los Angeles.

A LAPD officer and FBI agent confirmed that the Bureau is no longer looking at a North Korean angle for the Sony leak but have moved to an insider group working with outsider help.

One of the leakers has a direct connection to a Canada-based hacker who affiliated with the hacker group, LulzSec, say our sources.

Gotnews.com was the first to report on an insider connection here.

Gotnews.com is complying with requests by law enforcement and cyber security companies not to name two of the people involved in the Sony insider hack at this time.

Gotnews.com was the among the very first journalists to question the North Korea angle and interviewed multiple security experts at the time.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 30, 2014, 08:47:55 AM
^^^^^^^^^
  tweet by Charles C Johnson, the writer of the above article....


Charles C. Johnson @ChuckCJohnson

Nice to see Politico ripping me off on #NorthKorea. RT FBI briefed on alternate Sony hack theory http://www.politico.com/story/2014/12/fbi-briefed-on-alternate-sony-hack-theory-113866.html …
9:18 PM - 29 Dec 2014
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 30, 2014, 09:20:13 AM
/me  looks up from crystal ball

I suppose I am a one of the gifted psychic's on this thread; because how else could we have called this out right from the very beginning.

 ;D

: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 30, 2014, 09:53:11 AM
/me  looks up from crystal ball

I suppose I am a one of the gifted psychic's on this thread; because how else could we have called this out right from the very beginning.

 ;D
(http://ts1.mm.bing.net/th?&id=HN.608010972584741372&w=300&h=300&c=0&pid=1.9&rs=0&p=0)
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 30, 2014, 10:05:27 AM
/me  rofl
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O December 30, 2014, 10:13:24 AM
So, basically the FBI is doing an about face march BEFORE they look like the lackeys they actually are.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 30, 2014, 10:32:09 AM
/me  rofl

(http://img0.joyreactor.com/pics/post/gif-fat-cat-roll-1201715.gif)
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 30, 2014, 10:48:16 AM
AND THERE IS THE CAT HIGH FIVE.....

(http://ts1.mm.bing.net/th?&id=HN.608034526180871951&w=300&h=300&c=0&pid=1.9&rs=0&p=0)
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 30, 2014, 01:30:51 PM

  source----CNN

  headline on their news program

  FBI Stands By Their Conclusion It Was North Korea


  One thing is for sure.  There is more testosterone than brain cells at the FBI. 

  And the sheep are suppose to believe it because it came from CNN.

: Re: INTERNET REGULATION - HACKING
: TahoeBlue December 30, 2014, 02:42:57 PM
http://www.breitbart.com/national-security/2014/12/30/satanic-japanese-torturer-of-unbroken-hero-louis-zamperini-unrepentant-in-1998-interview/

/...
Mediaite has uncovered a revealing 1998 interview on 60 Minutes with Zamperini and his torturer, Japanese Army Sergeant Mutsuhiro Watanabe, who died in 2003.

Zamperini, who died in 2014, was one of America’s greatest track and field Olympians. He was captured by the Japanese in World War II and subjected to years of brutal treatment. He had served in the Army Air Force on a B-24 Liberator bomber that crashed in the Pacific in 1943 and survived on a raft for over a month before being picked up by a Japanese ship.

Zamparini ended up carrying the Olympic torch for the 1998 Winter Games in Nagano, Japan in a show of forgiveness and reconciliation. CBS interviewed Zamparini and attempted to track down Watanabe, known in Zamperini’s POW camp as “The Bird.”

Mediatite wrote that after the war, Watanabe “had gone into hiding during the American occupation of Japan,” but “in 1952, the United States granted amnesty to Japanese war criminals, after which he emerged to become a businessman.”

Watanabe severely beat Zamperini during his time as a POW, and was reviled among the American captives. Zamparini mentioned in the interview that shortly after the war ended he wanted to return to Japan and exact revenge on his tormentor. However, after the war Zamparini met legendary preacher Billy Graham, becoming a fervent Christian and deciding to forgive his captors rather than take revenge.

The Los Angeles Times reported that Zamperini returned to Japan in a “spirit of forgiveness and reconciliation.” Yet, the Times wrote that, “CBS, which had planned the Zamperini/Watanabe piece for more than a year, hoped to film the two in a moment of reconciliation, but it didn’t happen on Zamperini’s first visit.”

According to the LA Times, Zamperini did not want any “bowing and scraping” from Watanabe, he merely wanted to “meet with him, and smooth it out for him and his family.”

“But his son said no to any meeting. That was a mistake, because now he’ll be seen as a bad guy in his own country, and I wanted to spare him that. See, guys who worked under him were hanged as war criminals. Watanabe avoided all that,” Zamperini said, according to the LA Times.
...
In his 60 Minutes interview with Bob Simon, Watanabe said, “I wasn’t given military orders. Because of my own personal feelings, I treated the prisoners strictly as enemies of Japan.”

Hillenbrand wrote about The Bird’s attitude toward his role in the war and brutal treatment of prisoners in her book:

Watanabe would later admit that in the beginning of his life in exile, he had pondered the question of whether or not he had committed any crime. In the end, he laid the blame on  “sinful, absurd, insane war.” He saw himself as a victim. If he had tugs of conscience over what he’d done, he shrugged them away by assuring himself that the lifting of the fugitive-apprehension order was a personal exoneration. “I was just in a great joy of complete release and liberation,” he wrote in 1956, “that I was not guilty.”

The modern, Japanese reactions to the Unbroken book and movie have been mixed and many hardline Japanese nationalists are furious about negative portrayal of the Japanese military.
...
“When the war ended, it became possible to compare the fates of allied servicemen under the Nazis and the Japanese. Just 4 percent of British and American POWs had died in German hands. Yet 27 percent—35,756 out of 132,134—of Western Allied prisoners lost their lives in Japanese captivity,” Hastings wrote
...
Hastings wrote that the POW’s “liberators were stunned by the stories they heard: of starvation and rampant disease; of men worked to death in their thousands, tortured or beheaded for small infractions of discipline.” He noted that “It seemed incomprehensible that a nation with pretensions to civilisation could have defied every principle of humanity and the supposed rules of war.”
...

http://www.pacificwar.org.au/JapWarCrimes/USWarCrime_Coverup.html
..
In 1952, President Truman's Secretary of State, John Foster Dulles, authored a peace treaty with Japan. This treaty waived the rights to compensation of every prisoner of the Japanese during WW II. Truman granted complete amnesty to every Japanese war criminal who was not then serving a term of imprisonment. Unlike Germany where intensive de-Nazification procedures were employed to prevent former Nazis entering parliament and the bureaucracy, the United States allowed Japanese war criminals to enter parliament and find employment in the government bureaucracy. A striking exmple of this difference of approach between Japan and Germany is the case of convicted war criminal Nobusuke Kishi who was able to rise to the office of Prime Minister of Japan in 1957.

http://en.wikipedia.org/wiki/Treaty_of_San_Francisco
Peace Treaty with Japan (日本国との平和条約 Nihon-koku tono Heiwa-Jōyaku?) or commonly known as the Treaty of San Francisco
(http://upload.wikimedia.org/wikipedia/commons/e/e2/Yoshida_signs_San_Francisco_Peace_Treaty.jpg)
: Re: INTERNET REGULATION - HACKING
: jerryweaver December 30, 2014, 02:46:42 PM
It is amazing this rule by scandal type of an Administration just keeps going and going and going. 
: Re: INTERNET REGULATION - HACKING
: larsonstdoc December 30, 2014, 06:32:27 PM
http://gotnews.com/breaking-gotnews-name-person-interest-sony-hack/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+gotnewsdotcom+%28Got+News%29

BREAKING: Gotnews Has Name of Person of Interest in Sony Hack

(http://gotnews.com/wp-content/uploads/2014/12/Shahana-Manjra-GotNews.jpg)

Gotnews.com has independently confirmed with our law enforcement and cyber-security sources that Shahana Manjra is a person of interest in the Sony hack.

We have had her name since Christmas Eve, but now that other media outlets are trying to scoop us we are publishing it now.

We want to stress that everyone has a presumption of innocence.
: Re: INTERNET REGULATION - HACKING
: EvadingGrid December 30, 2014, 08:13:25 PM
So not only is it an inside job, we are now talking possible suspects !
: hacker-reveals-fingerprint-could-easier-to-hack-then-passwords
: sab January 07, 2015, 10:36:20 PM

https://ph.news.yahoo.com/hacker-reveals-fingerprint-could-easier-191211597.html

Sounds like this is worse >:(
: Re: hacker-reveals-fingerprint-could-easier-to-hack-then-passwords
: decemberfellow January 08, 2015, 12:59:12 AM
Ledger, cash,  money orders, and a 45. The safest and most secure in my book.
: Re: hacker-reveals-fingerprint-could-easier-to-hack-then-passwords
: attietewd January 08, 2015, 01:24:37 AM
Let's see, first they said that carrying cash was unsafe so it would be better to carry a credit card even though identity theft was unheard of with cash....now it's supposed to be better with finger prints...it's all Bullsh*t.  The best was cash and still is.  They just wait for a new and stupider generation to pawn this crap on.  Every time they come up with a new idea the boots have to be higher...for all the bullsh*t.  Or as my dear old dad used to say, the wind blew and the sh*t flew.
: Re: hacker-reveals-fingerprint-could-easier-to-hack-then-passwords
: EvadingGrid January 08, 2015, 03:50:24 AM
I know it annoys atheists, but the explanation that evil satanists want a 666 system fits with all the facts you'll find on the forum.

I suggest that if your an atheist, instead of getting annoyed, ya chill out, and use Occam's Razor, and go with the best theory. Just because it might sound like a crazy story from a book of fairy tales, does not mean that it does not WORK.

They want a one world currency, we know that, its factual.

I say all this, because almost every time this topic comes up, it descends into a "does god exist" which since neither side "listens" to the other is not helpful or productive. We need to warn people that our hidden masters ultimate desire is a one world currency. We need to inform people in simple terms how private banks create money at the stroke of a pen and then charge interest on that money. See, when people actually know a bit more about money, then it all begins to make sense and they will begin to wake up.

Occam's razor
https://en.wikipedia.org/wiki/Occam%27s_razor
: Re: hacker-reveals-fingerprint-could-easier-to-hack-then-passwords
: attietewd January 08, 2015, 01:13:26 PM
I know it annoys atheists, but the explanation that evil satanists want a 666 system fits with all the facts you'll find on the forum.

I suggest that if your an atheist, instead of getting annoyed, ya chill out, and use Occam's Razor, and go with the best theory. Just because it might sound like a crazy story from a book of fairy tales, does not mean that it does not WORK.

They want a one world currency, we know that, its factual.

I say all this, because almost every time this topic comes up, it descends into a "does god exist" which since neither side "listens" to the other is not helpful or productive. We need to warn people that our hidden masters ultimate desire is a one world currency. We need to inform people in simple terms how private banks create money at the stroke of a pen and then charge interest on that money. See, when people actually know a bit more about money, then it all begins to make sense and they will begin to wake up.

Occam's razor
https://en.wikipedia.org/wiki/Occam%27s_razor


I know you are absolutely correct.  It is a fact they want a one world monetary (666) system, I know that.  In order for prophecy to be fulfilled they HAVE to have it.  But forgive me when I revert to purely flesh instead of seeing with spiritual eyes.  it just boggles the mind.  Like earlier for instance, I was looking up at the sky and wondering will the chemtrailing end under another administration?  How can they look at their kids and gkids knowing full well what they are doing to our atmosphere.  But then my mind goes back to someone, somewhere, giving the orders to test the A bomb on American soil, let a lone dropping it anywhere else (hiroshima) in the world.  Lunacy and madness is the face of evil.
: Re: hacker-reveals-fingerprint-could-easier-to-hack-then-passwords
: decemberfellow January 08, 2015, 05:00:55 PM
^^^^^^ the shape of things to come  https://www.youtube.com/watch?v=pEqWCH_4srU (https://www.youtube.com/watch?v=pEqWCH_4srU)

A created song, imagine that.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc January 12, 2015, 01:10:40 PM
http://www.washingtonpost.com/news/checkpoint/wp/2015/01/12/centcom-twitter-account-apparently-hacked-by-islamic-state-sympathizers/

  more at the link...

Social media accounts for the U.S. military’s Central Command appeared to have been hacked on Monday, with the command posting threatening messages on Twitter and YouTube to American troops.

The first rogue tweet was posted about 12:30 p.m. It appeared to come from sympathizers with the Islamic State militant group. CENTCOM has orchestrated the U.S.-led airstrike campaign against the militants in Iraq and Syria, and is beginning to train Iraqi troops to respond to the threat in the region.

The background and profile photo of the CENTCOM account were both changed to show an apparent militant and the phrases “CyberCaliphate” and “i love you isis,” using one of the acronyms for the militant group.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc January 12, 2015, 01:27:29 PM
freebeacon.com/national-security/isis-hacks-centcom-twitter-feed-as-obama-talks-cybersecurity/



Islamic State Hacks CENTCOM Twitter Feed as Obama Talks Cybersecurity
: Re: INTERNET REGULATION - HACKING
: Jackson Holly January 12, 2015, 01:38:23 PM


…. and @ Weekly Standard:

http://www.weeklystandard.com/blogs/centcoms-twitter-hacked-isis_823501.html (http://www.weeklystandard.com/blogs/centcoms-twitter-hacked-isis_823501.html)

(http://i247.photobucket.com/albums/gg148/evinyl/PrisonPlanetForum/isis2preview.jpg) (http://s247.photobucket.com/user/evinyl/media/PrisonPlanetForum/isis2preview.jpg.html)
: Re: INTERNET REGULATION - HACKING
: larsonstdoc January 12, 2015, 01:52:50 PM

www.reuters.com/article/2015/01/12/us-cybersecurity-centcom-hack-idUSKBN0KL1UZ20150112

 
  Hackers post names,  addresses of US Generals
: Re: INTERNET REGULATION - HACKING
: Jackson Holly January 12, 2015, 02:11:18 PM


… Alex says this is no doubt CIA FALSE FLAG.    ???


I'll just leave it at that ...
: Re: INTERNET REGULATION - HACKING
: larsonstdoc January 12, 2015, 02:35:27 PM
I'd have to agree. Must be False Flag Monday. Aimed at more police state and bilking more money out of Americans for more "Cyber Security". LOL
: Re: INTERNET REGULATION - HACKING
: larsonstdoc January 14, 2015, 11:01:07 AM
www.infowars.com/anonymous-hacked-after-linking-centcom-hackers-to-maryland/

  The final nail in the coffin for this thread....



ANONYMOUS HACKED AFTER LINKING CENTCOM HACKERS TO MARYLAND
Anonymous Twitter briefly compromised by alleged "Cyber Caliphate"

by MIKAEL THALEN | INFOWARS.COM | JANUARY 13, 2015

UPDATE: Anonymous has released the name of a hacker thought to be involved with Monday’s ISIS CENTCOM hack. Although some tech experts have questioned the validity of the page and the hackers alleged link to ISIS, the Anon Message Twitter account claims to have discovered a connection.


The alleged hacker appears to be the same jihadist who made headlines in 2014 after heading to Syria from Birmingham.

Hussein was arrested in 2012 for hacking and posting personal information online from Tony Blair.

In response to the discovery, Anonymous also released a statement on a new operation targeting anyone involved with the Cyber Caliphate.

Citizens of the World, We are Anonymous. In light of the recent cyber attacks led by members of ISIS, we have extended our declaration of war to include any and all supporters of the terror group including the CyberCaliphate splinter group who have recently been able to infiltrate one of the US Central Command servers and leaked sensitive information that may likely be used by countries of terrorist origin (North Korea). Although we insist to maintain our distance from any support towards the actions of the United States government, we truly condemn any actions taken by those who associate themselves with ISIS and continue to wreak havoc across the Internet. We are anonymous. We are legion.
The Anonymous account had been allegedly compromised the prior evening.


“The Anon Message” Twitter account’s profile picture and background was altered at around 10:44 p.m. PST, changed to feature the same Islamic State imagery previously seen on CENTCOM’s Twitter and YouTube profiles.

“We shall strike like the thunder, all allegiance to the Islamic State!” a tweet on the account said.

Anonymous was able to reestablish control over the account in less than five minutes, reportedly discovering the exact location of the “Cyber Caliphate” hacker in the process.


Followers of the account immediately noted the group’s quick response time, pointing out the fact that CENTCOM, a group responsible for U.S. security interests in 20 nations, took several hours to appear back online.

The original CENTCOM hack made headlines after the alleged ISIS supporter issued threats against a multitude of groups while linking to a page which appeared to list personal information on US military personnel.

Many questioned the timing of the high-profile incident given the fact that President Obama was delivering an address on cybersecurity at nearly the exact moment.

: Re: INTERNET REGULATION - HACKING
: chris jones January 23, 2015, 08:14:23 PM
 Wasn't the BBC reporting the the 911 attack before it happened?
 Mayby this could ring a bell?
: Re: INTERNET REGULATION - HACKING
: EvadingGrid January 24, 2015, 06:49:47 AM
Wasn't the BBC reporting the the 911 attack before it happened?
 Mayby this could ring a bell?

Yup.

And somebody got out of paying the TV Tax (the BBC is funded by tax payers) because that Building 7 report proved inside knowledge that only an accessory to the terrorists could possibly have had.

They won the case.
: State sponsored cyber-attacks happen more and more often - Kaspersky
: Letsbereal January 24, 2015, 12:38:17 PM
State sponsored cyber-attacks happen more and more often - Kaspersky https://www.youtube.com/watch?v=lPRowgkd6UE

Jan 24, 2015, RT
: Hackers to Target Smart TV Sets After Phones, Kaspersky Predicts
: Letsbereal January 27, 2015, 03:34:32 PM
Hackers to Target Smart TV Sets After Phones, Kaspersky Predicts
26 January 2015
, by Olga Tanas and Ilya Khrennikov (Bloomberg)
http://www.bloomberg.com/news/print/2015-01-26/hackers-to-target-smart-tv-sets-after-phones-kaspersky-predicts.html
: Re: How one man tracked down Anonymous—and paid a heavy price.
: Elisa24 February 02, 2015, 05:50:32 AM
Wow very interesting.
: Re: How the government infected your computer with windows
: Elisa24 February 02, 2015, 06:50:05 AM
Really good information, was looking for this, thanks!
: Re: INTERNET REGULATION - HACKING
: larsonstdoc February 05, 2015, 10:43:19 PM
http://abcnews.go.com/Business/insurer-anthem-reveals-hack-80-million-customer-accounts/story?id=28737506

  WHEN ARE AMERICANS GOING TO DEMAND THAT THEIR PERSONAL DATA BE REMOVED FROM THE INTERNET?  Probably never!!!!

Anthem Inc., the second largest U.S. health insurer, said Wednesday that its computers were hacked and data on as many as 80 million customers and employees may have been exposed.

"Anthem was the target of a very sophisticated external cyber attack," the company said in a letter to its members. "These attackers gained unauthorized access to Anthem’s IT system and have obtained personal information from our current and former members such as their names, birthdays, medical IDs/social security numbers, street addresses, email addresses and employment information, including income data."

It said that there's no evidence that credit card or medical information - such as claims, test results or diagnostic codes - were targeted or compromised. There was no word on how the hackers got in or who may be responsible.
: Re: INTERNET REGULATION - HACKING
: larsonstdoc February 05, 2015, 10:49:46 PM
http://abcnews.go.com/Technology/wireStory/hackers-rewarding-targets-health-care-companies-28759891

Hackers See Rewarding Targets in Health Care Companies

The latest breach at health insurer Anthem Inc. follows a year in which more than 10 million people were affected by health care data breaches — including hacking or accidents that exposed personal information, such as lost laptops — according to a government database that tracks incidents affecting at least 500 people. The numbers, compiled by the Department of Health and Human Services, show that last year was the worst for health care hacking since 2011, when more than 11 million people were affected.

Health care hacking is becoming more of a focus as retailers and other businesses have clamped down on security after massive breaches at companies like Target and Home Depot. That has made it more difficult in some cases for cyber thieves to infiltrate their systems. As a result, they've turned their attention toward health care.

Experts say health care companies can provide many entry points into their systems for crooks to steal data. And once criminals get that information, they can pull off far more extensive and lucrative schemes.

"If someone steals your credit card and home address, they might be able to buy something, but you can usually get that locked down quickly," said Tony Anscombe, a security expert with the cybersecurity firm AVG Technologies. "With medical records and a social security number, it's not so simple."

Anthem said late Wednesday that hackers broke into a database storing information on 80 million people in an attack the company discovered last week. The Blue Cross Blue Shield insurer said the hackers gained access to names, birthdates, email address, employment details, Social Security numbers, incomes and street addresses of people who are currently covered or have had coverage in the past.

The insurer, which covers more than 37 million people, said credit card information wasn't compromised, and it has yet to find any evidence that medical information was targeted. Anthem Inc. doesn't know how many people were affected by the attack, but a spokeswoman said that number was probably in the "tens of millions."

The attackers used custom malware that was designed to avoid detection by anti-virus programs, said David Damato, managing director of FireEye, a Silicon Valley cybersecurity firm and corporate parent of Mandiant, an emergency response group hired by Anthem to investigate the breach. Damato said groups with that ability are typically either sophisticated financial crime rings or hackers backed by "nation states," such as a foreign government. When asked if the investigation is pointing in either direction, Damato said he couldn't answer.
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O February 11, 2015, 06:57:13 PM
SEND IN THE BULLIES!!!!
: Homeland Security to be put in charge of info sharingSPYING
: larsonstdoc February 13, 2015, 08:18:44 PM
http://www.usatoday.com/story/tech/2015/02/12/obama-cybersecurity-silicon-valley/23307837/


Homeland Security to be put in charge of info sharingSPYING

SAN FRANCISCO — President Obama will announce a new executive order on the sharing of cybersecurity threats and information at Friday's cybersecurity summit at Stanford University, the White House said.

Most importantly to Silicon Valley, the president's proposal is expected to cement the role of the Department of Homeland Security, rather than the National Security Agency, as the government lead for information-sharing with the private sector.

"Hopefully the rules will prohibit the use of the information shared being used for surveillance," said Greg Nojime, a senior counsel with the Center for Democracy and Technology in Washington D.C.

Given the anger and anxiety that resulted from revelations by Edward Snowden about the extent of NSA surveillance, knowing that Homeland Security is in charge may calm concerns among Valley companies.

Many tech companies have dealt with extensive push back from their customers both in the United States and overseas over the issue of privacy and protection of the information they hold.

The intent of the executive order is to create a process for establishing rules of the road on information sharing between the privacy sector and the government, Nojime said.

This would be in the form of a hub-and-spoke system, where companies would share information with the government, which would then send it back out to other companies.

However, the president's order wouldn't provide protection from liability for the companies doing the sharing.

That's why it doesn't happen now, said Avivah Litan, a security analyst at the technology research company Gartner.

"There's no meaningful intelligence sharing because of all the lawyers. There's always the threat of lawsuits," she said.
: HACKERS STEAL $300 MILLION IN BANK HEISTS
: EvadingGrid February 14, 2015, 06:39:46 PM
I can not read this because its New York Times, and it wants me to have an account, cookies, google login and all that other spyware.

HACKERS STEAL $300 MILLION IN BANK HEISTS
http://www.nytimes.com/2015/02/15/world/bank-hackers-steal-millions-via-malware.html
: Re: HACKERS STEAL $300 MILLION IN BANK HEISTS
: Jackson Holly February 14, 2015, 08:50:07 PM


… from the NYT link:

"
Kaspersky Lab says it has seen evidence of $300 million in theft through clients, and believes the total could be triple that. But that projection is impossible to verify because the thefts were limited to $10 million a transaction, though some banks were hit several times. In many cases the hauls were more modest, presumably to avoid setting off alarms.

The majority of the targets were in Russia, but many were in Japan, the United States and Europe.


(http://i247.photobucket.com/albums/gg148/evinyl/screenshot_586.jpg) (http://s247.photobucket.com/user/evinyl/media/screenshot_586.jpg.html)
: "We Messed Up Badly" Lenovo Admits Putting Tracking Software On Your PC
: Letsbereal February 20, 2015, 02:51:58 PM
"We Messed Up Badly" Lenovo Admits Putting Tracking Software On Your PC
20 February 2015
, by Simon Black (Zero Hedge)
http://www.zerohedge.com/news/2015-02-20/we-messed-badly-lenovo-admits-putting-tracking-software-your-pc
: Re: "We Messed Up Badly" Lenovo Admits Putting Tracking Software On Your PC
: EvadingGrid February 20, 2015, 03:03:58 PM
OMG

This is so flagrant I have to imagine that even the NSA is shocked.

What would be really funny is if the NSA had bought one of those machines . . . .
: PowerOffHijack: New Android Malware Spies from 'Shut Down' Smartphones
: Letsbereal February 20, 2015, 07:33:07 PM
PowerOffHijack: New Android Malware Spies from 'Shut Down' Smartphones https://www.youtube.com/watch?v=mChV1vzNvhc

Feb 20, 2015 DAHBOO77
: Re: PowerOffHijack: New Android Malware Spies from 'Shut Down' Smartphones
: decemberfellow February 20, 2015, 08:14:28 PM
aw cum-on gubermet wont do dat, you all one a dem crazy conspiritist freak peoples.
: Sophisticated hackers possible ties to the NSA
: Letsbereal February 21, 2015, 11:43:03 AM
Sophisticated hackers possible ties to the NSA

https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf

http://arstechnica.com/security/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/
: ROBERT KING RELEASES FIRST VIDEO CLIP OF JOHN MCAFEE'S ESCAPE INTO GUATEMALA
: jerryweaver February 24, 2015, 02:14:21 PM

ROBERT KING RELEASES FIRST VIDEO CLIP OF JOHN MCAFEE'S ESCAPE INTO GUATEMALA

http://t.co/3thkkeuw86
: Did U.S., U.K. Spies Attack SIM-Card Maker Gemalto's Network?
: Letsbereal February 25, 2015, 07:33:50 AM
Did U.S., U.K. Spies Attack SIM-Card Maker Gemalto's Network?
25 February 2015
, by Marie Mawad (Bloomberg)
http://www.bloomberg.com/news/articles/2015-02-25/gemalto-says-network-breach-likely-linked-to-u-s-u-k-spies

Gemalto NV, the maker of mobile-phone card software, said it detected sophisticated attacks on its networks that were probably carried out by U.S. and U.K. intelligence agencies, but didn’t result in massive theft of keys used to encrypt conversations, messages and data traffic.

Gemalto recorded the intrusions into external parts of its networks in 2010 and 2011 that appear to be linked to operations by the U.K.’s Government Communications Headquarters and the U.S. National Security Agency, the company said Wednesday.

One of the world’s largest developers of security software for SIM cards, Gemalto is responding to a report by The Intercept last week saying spies started intercepting the encoders as they were being shipped to phone companies in countries including Afghanistan, Iran and India.

The report cited documents from former NSA contractor Edward Snowden. The documents showed that SIM-card makers accounted for only a minority of the parties targeted, Gemalto said.

“As a digital security company, people try to hack Gemalto on a regular basis,” Amsterdam-based Gemalto said.

“These intrusions only affected the outer parts of our networks,” it said about the 2010-2011 attacks.

Shares of Gemalto gained as much as 3.2% and rose 2.8% to 70.80 euros at 10:03 a.m. in Amsterdam, giving the company a market capitalization of €6.3 billion ($7.2 billion).

Banks, Governments

It’s unlikely the spies managed to steal large amount of encryption keys that would have helped them monitor wireless communications without the need to get permission for wiretapping, the company said.

Gemalto said that by the time the attacks took place, it “had already widely deployed a secure transfer system with its customers and only rare exceptions to this scheme could have led to theft.”

Still, it advised customers to use newer SIM cards and encrypt their data, while phone carriers should use customized algorithms to lock and unlock traffic.

Even if the encryption keys were stolen, the intelligence services would only be able to spy on communications on second-generation mobile networks, while more advanced 3G and 4G systems aren’t vulnerable to this type of attack, Gemalto said.

None of the company’s other products were impacted by the attack, it said. Gemalto sells SIMs for phones and chips for bank cards.

Under Chief Executive Officer Olivier Piou, the company has diversified and developed security and encryption technology for passports, electronic contracts and payment services using mobiles and bank cards.

The company’s clients include governments, financial institutions and credit card giants like Visa Inc. and MasterCard Inc., as well as companies such as Microsoft Corp. and Boeing Co.

Gemalto spends about 10 million euros each year on upgrading its security.

It makes some adjustments according to customer feedback -- its clients each year conduct their own security audits of Gemalto’s systems. About 500 such audits were done last year.
: Banks and Tech Chiefs Unite to Press Congress for Anti-Hacking Bill
: Letsbereal March 02, 2015, 10:24:17 PM
Banks and Tech Chiefs Unite to Press Congress for Anti-Hacking Bill
2 March 2015
, by Chris Strohm (Bloomberg)
http://www.bloomberg.com/news/articles/2015-03-02/banks-join-tech-chiefs-to-press-congress-for-anti-hacking-bill

JPMorgan, Lockheed Martin and Microsoft are among 32 technology, banking and retail companies urging lawmakers to pass legislation that provides legal protection for sharing hacking threats.
: Re: INTERNET REGULATION - HACKING
: Sasha March 17, 2015, 03:37:17 PM
Premera victim of cyber attack; 11 million customers exposed
http://www.king5.com/story/money/consumer/2015/03/17/premera-cyber-attack/24911465/
March 17, 2015

SEATTLE – Premera Blue Cross said Tuesday it was a victim of a cyberattack and the personal information of 11 million customers may have been exposed.

Premera, based in Mountlake Terrace, said it discovered the attack on January 29 but that the initial attack happened on May 5, 2014.

The attackers may have gained access to customers' sensitive information including names, dates of birth, social security numbers and bank account information. That information dates back as far as 2002.

Premera said that while the attackers may have gained access, there is no evidence thus far that any of the data has been used illegally.

Premera said it will provide two years of free credit monitoring and identity theft protection services to those affected. A call center is also being set up. More information can be found at its website, www.premeraupdate.com

The company said it is working with the FBI and the cybersecurity firm Mandiant to investigate the attack and fix the problem.

The attack affects Premera Blue Cross, Premera Blue Cross Blue Shield of Alaska, and its affiliate brands Vivacity and Connexion Insurance Solutions, Inc.

related:
New Website Exposing Abortion in Obamacare, Continued Lack of Alternatives and Transparency
In 2014, the GAO Report found that all of Washington’s individual plans, except for Premera Blue Cross Blue Shield’s multi-state plans and those from Group Health Cooperative, covered elective abortion.
https://www.lozierinstitute.org/new-website-exposing-abortion-in-obamacare-continued-lack-of-alternatives-and-transparency/

Group Health Omits Abortion Coverage In Plans Sold On Washington Exchange
BridgeSpan Health Company, Premera Blue Cross and its subsidiary, Lifewise Health Plan of Washington, all said their plans offered abortion coverage, with the exception of eight Premera plans that are among BlueCross/Blue Shield Association multistate plans forbidden by federal law to include abortion coverage.
http://kaiserhealthnews.org/news/group-health-abortion-insurance-coverage/
: Re: INTERNET REGULATION - HACKING
: larsonstdoc March 17, 2015, 04:30:45 PM


  If you want your customer''s accounts compromised, throw them on the internet.
: Re: INTERNET REGULATION - HACKING
: Sasha March 17, 2015, 09:43:21 PM
Yessir.  It's like naked actresses and models floating around in the clouds, somebody's gonna hack their way up there.

The Premera story has developed a touch since earlier.

Premera Blue Cross Breach Exposes Financial, Medical Records excerpted
https://krebsonsecurity.com/2015/03/premera-blue-cross-breach-exposes-financial-medical-records/

Premera Blue Cross, a major provider of health care services, disclosed today that an intrusion into its network may have resulted in the breach of financial and medical records of 11 million customers. Although Premera isn’t saying so just yet, there are independent indicators that this intrusion is once again the work of state-sponsored espionage groups based in China.

In a statement posted on a Web site set up to share information about the breach — premeraupdate.com — the company said that it learned about the attack on January 29, 2015. Premera said its investigation revealed that the initial attack occurred on May 5, 2014.
___

There are indications that this may be the work of the Chinese espionage group tied to the breach disclosed earlier this year at Anthem, an intrusion that affected some 78 million Americans.

On Feb. 9, 2015, KrebsOnSecurity carried an exclusive story pointing to clues in the Anthem breach which suggested that the attackers blamed for that breach — a Chinese state-sponsored hacking group known variously as “Deep Panda,” “Axiom,” “Group 72,” and the “Shell_Crew” — began chipping away at Anthem’s defenses in late April 2014. The evidence revolved around an Internet address that researchers had tied to Deep Panda hacking activity, and that address was used to host a site called we11point.com (Anthem was previously known as Wellpoint prior to its corporate name change in late 2014).

related:
New Snowden Documents Reveal Chinese Behind F-35 Hack
http://thediplomat.com/2015/01/new-snowden-documents-reveal-chinese-behind-f-35-hack/

Former NSA leader: China has hacked every major U.S. company
http://www.bizjournals.com/cincinnati/morning_call/2015/03/former-nsa-leader-china-has-hacked-every-major-u-s.html

Report: Israel Passes U.S. Military Technology to China
http://defensetech.org/2013/12/24/report-israel-passes-u-s-military-technology-to-china/

U.S.-Israeli defense technology collaboration began with confrontation
http://www.washingtontimes.com/news/2011/may/23/us-israeli-defense-technology-collaboration-began-/?page=all
“We started having a problem with Israel in the 1990s, especially after the 1996 Chinese missile threats against Taiwan when we got the feeling that China’s ballistic missile technology was modernizing way too fast,” said John Tkacik, a former State Department intelligence analyst on China.
: Re: INTERNET REGULATION - HACKING
: windyacres March 17, 2015, 11:40:36 PM
The last big data hack of a health insurer, they admitted
they didn't use encryption.  I wonder if Premera also didn't.
You know...cheap out on your IT, security, etc. etc.
: Cyber Emergency: Pentagon Drafting Thousands of 'Cyber Forces' for Future Event
: Letsbereal April 15, 2015, 12:43:06 PM
Cyber Emergency: Pentagon Drafting Thousands of 'Cyber Forces' for Future Event https://www.youtube.com/watch?v=5s0G07aeNy4

Apr 15, 2015 DAHBOO77

A week after US officials said a Russian group hacked the White House, Pentagon officials told the Senate that they are creating cyber “surge forces” trained to defend America’s energy, telecommunication and critical infrastructure.

Pentagon drafting thousands of ‘cyber forces’ in prep for cyber emergency http://rt.com/usa/249721-pentagon-recruiting-cyber-pros/
: Raytheon takes control of Websense as it invests $1.7 billion in cyber unit
: Letsbereal April 21, 2015, 12:24:55 PM
Raytheon to invest $1.7 billion in cyber venture
20 April 2015
, by Doug Cameron (MarketWatch)
http://www.marketwatch.com/story/raytheon-to-invest-17-billion-in-cyber-venture-2015-04-20

Raytheon is betting it can leverage the cybersecurity skills it honed for the U.S. military and intelligence agencies to sell to banks and retailers, investing almost $1.7 billion to establish a stand-alone business in an area where its defense peers have struggled to make money.


Raytheon takes control of Websense as it invests $1.7 billion in cyber unit
20 April 2015
, by Doug Cameron (MarketWatch)
http://www.marketwatch.com/story/raytheon-takes-control-of-websense-as-it-invests-17-billion-in-cyber-unit-2015-04-20
: Pentagon Admits Cyberwarfare Plan for First Time
: Letsbereal April 23, 2015, 10:40:01 PM
Pentagon Admits Cyberwarfare Plan for First Time https://www.youtube.com/watch?v=8MXcjs-YbXw

Apr 23, 2015 DAHBOO777

Pentagon Admits Cyberwarfare Plan For First Time http://news.sky.com/story/1470633/pentagon-admits-cyberwarfare-plan-for-first-time

The Pentagon has admitted for the first time it plans to use cyberwarfare in its battle to keep up with its enemies.

In a 33-page 'cybersecurity strategy' the US Department of Defense has publicly laid out the approach plans to take.

The document says the DoD "should be able to use cyber operations to disrupt an adversary's command and control networks, military-related critical infrastructure and weapons capabilities".

The previous strategy, published in 2011, made little reference to clandestine warfare using computer networks, although US officials are known to have spoken privately about the issue.
: US May Use Cyberattacks As Offensive Weapon, DoD Says
: Letsbereal April 25, 2015, 09:27:07 PM
US May Use Cyberattacks As Offensive Weapon, DoD Says
25 April 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-04-25/us-may-use-cyberattacks-offensive-weapon-dod-says
: Re: INTERNET REGULATION - HACKING
: TahoeBlue May 13, 2015, 01:02:34 PM
http://www.dailymail.co.uk/news/article-3079172/North-Korean-defence-minister-executed-anti-aircraft-fire-disrespecting-leader-Kim-Jong-dozing-military-events-answering-back.html
(http://i.dailymail.co.uk/i/pix/2015/05/13/12/article-3079172-289DC03D00000578-829_636x382.jpg)

Kim Jong-Un EXECUTES his defence minister with an anti-aircraft gun in front of hundreds of spectators - because he dozed off during a North Korean military ceremony
Defence minister Hyon Yong-Chol was brutally executed in Pyongyang
He was killed after falling asleep in meetings and talking back to Kim
Officials killed him with an ZPU-4 anti-aircraft gun in front of hundreds of bloodthirsty officials at a military camp near the capital
Likely to have been shot from just 100 feet - despite gun's 26,000 feet range

By Emma Glanfield and John Hall for MailOnline

Published: 22:26 EST, 12 May 2015  | Updated: 06:34 EST, 13 May 2015


Read more: http://www.dailymail.co.uk/news/article-3079172/North-Korean-defence-minister-executed-anti-aircraft-fire-disrespecting-leader-Kim-Jong-dozing-military-events-answering-back.html#ixzz3a2UdAuJk
Follow us: @MailOnline on Twitter | DailyMail on Facebook
: Re: INTERNET REGULATION - HACKING
: EvadingGrid May 13, 2015, 01:18:38 PM
Gosh,. how civilised we are , and how disgusting is N. Korea

As to humans doing such things, I only have to recall what happened after the Indian Mutiny . . .
Executed by being strapped to the front of a cannon . . .

(http://www.citizenthought.net/images/Vereshchagin-Blowing_from_Guns_in_British_India.jpg)


East India Company - Office in North Korea ?
(http://indiannerve.com/wp-content/uploads/2012/12/British-East-India-Company-Flag.png)


: Re: INTERNET REGULATION - HACKING
: larsonstdoc May 13, 2015, 01:35:57 PM
http://www.dailymail.co.uk/news/article-3079172/North-Korean-defence-minister-executed-anti-aircraft-fire-disrespecting-leader-Kim-Jong-dozing-military-events-answering-back.html
(http://i.dailymail.co.uk/i/pix/2015/05/13/12/article-3079172-289DC03D00000578-829_636x382.jpg)

Kim Jong-Un EXECUTES his defence minister with an anti-aircraft gun in front of hundreds of spectators - because he dozed off during a North Korean military ceremony
Defence minister Hyon Yong-Chol was brutally executed in Pyongyang
He was killed after falling asleep in meetings and talking back to Kim
Officials killed him with an ZPU-4 anti-aircraft gun in front of hundreds of bloodthirsty officials at a military camp near the capital
Likely to have been shot from just 100 feet - despite gun's 26,000 feet range

By Emma Glanfield and John Hall for MailOnline

Published: 22:26 EST, 12 May 2015  | Updated: 06:34 EST, 13 May 2015


Read more: http://www.dailymail.co.uk/news/article-3079172/North-Korean-defence-minister-executed-anti-aircraft-fire-disrespecting-leader-Kim-Jong-dozing-military-events-answering-back.html#ixzz3a2UdAuJk
Follow us: @MailOnline on Twitter | DailyMail on Facebook

  I'm guessing his bones are in Japan or Hawaii--if they were shooting from west to east.
: "German secret service intercepted connections to the Netherlands'
: Letsbereal May 19, 2015, 02:40:46 PM
"German secret service intercepted connections to the Netherlands'- update

ORG http://tweakers.net/nieuws/103151/duitse-geheime-dienst-tapte-verbindingen-naar-nederland-af.html?nb=2015-05-19&u=1500

(Google trans Dutch)

In cooperation with the NSA intercepted the German secret service BND internet cables off as the Netherlands, like France and Austria.

This enables a politician of an Austrian political party, which claims to have evidence for it.

Austrian Greens politician because of the spying both the German secret service as a telecom provider Deutsche Telekom, parent company also active in the Netherlands T-Mobile sued.

Since 2005, the Secret Service should work with the telecom provider Internet connections particular to the Netherlands, France, Austria and Luxembourg have drained, reports the German magazine Der Spiegel.

Or with links to Belgium, also a neighbor of Germany are tapped, is unclear.

The connections to the Netherlands would be drained through the DE-CIX, an Internet hub in Germany.

It is unclear what was the extent of the taper.

During a press conference in Berlin did Pilz explained that a connection between Salzburg and Amsterdam has been drained, as well as a connection between Rotterdam and Vienna.

Reported Germany correspondent Jeroen Wollaars of the NIS on Twitter. Pilz reported no further details; according Wollaars he wants to first 'discuss with Dutch politicians.

It is unclear whether the taps were under the Eikonal drain program, which came to light in October.

This joint venture between the NSA and the BND was put stop in 2008, after it appeared that repeated data of German online were shared with the NSA.

That was against the agreement: movement of Germans would be filtered out.

Germany recently stopped by channeling large-scale metadata on Internet traffic to the NSA.

It is unclear whether the intercepted cables to the Netherlands covered by it.

The espionage last month caused quite a stir when, among other aircraft manufacturer Airbus appeared to be overheard.

Sources:

http://www.spiegel.de/netzwelt/netzpolitik/bnd-affaere-oesterreichischer-abgeordneter-zeigt-telekom-und-bnd-an-a-1034297.html

https://twitter.com/wol/status/600584256172199936

https://twitter.com/wol/status/600584490046619648

http://www.sueddeutsche.de/politik/geheimdienste-codewort-eikonal-der-albtraum-der-bundesregierung-1.2157432

https://firstlook.org/theintercept/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/

http://www.nu.nl/internet/4044764/duitsland-beperkt-samenwerking-met-nsa.html

http://www.zeit.de/digital/datenschutz/2015-04/ueberwachung-bnd-half-nsa-wirtschaftsspionage-europa

http://www.bild.de/politik/inland/bnd/wertete-abgefangene-daten-der-nsa-fuer-eigene-zwecke-aus-40780462.bild.html
: IRS Hacked: Government Admits 100,000 Taxpayers' Data Stolen
: Letsbereal May 26, 2015, 05:55:49 PM
IRS Hacked: Government Admits 100,000 Taxpayers' Data Stolen
26 May 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-05-26/irs-hacked-government-admits-100000-taxpayers-data-stolen
: Re: IRS Hacked: Government Admits 100,000 Taxpayers' Data Stolen
: Letsbereal May 27, 2015, 06:30:55 PM
IRS Hacked!: Tech News Today 1267 https://www.youtube.com/watch?v=K7ZZxsriiQs

May 27, 2015 TWiT Netcast Network
: Re: INTERNET REGULATION - HACKING
: Al Bundy May 28, 2015, 12:42:57 PM
Sources: IRS believes massive data theft originated in Russia


http://edition.cnn.com/2015/05/27/politics/irs-cyber-breach-russia/http://
: Exclusive: U.S. tried Stuxnet-style campaign against North Korea but failed
: Letsbereal May 30, 2015, 04:23:26 AM
Exclusive: U.S. tried Stuxnet-style campaign against North Korea but failed - sources
29 May 2015
, by Joseph Menn - San Francisco (Reuters)
http://www.reuters.com/article/2015/05/29/us-usa-northkorea-stuxnet-idUSKBN0OE2DM20150529

The United States tried to deploy a version of the Stuxnet computer virus to attack North Korea's nuclear weapons program five years ago but ultimately failed, according to people familiar with the covert campaign.

The operation began in tandem with the now-famous Stuxnet attack that sabotaged Iran's nuclear program in 2009 and 2010 by destroying a thousand or more centrifuges that were enriching uranium.

Reuters and others have reported that the Iran attack was a joint effort by U.S. and Israeli forces.

According to one U.S. intelligence source, Stuxnet's developers produced a related virus that would be activated when it encountered Korean-language settings on an infected machine.

But U.S. agents could not access the core machines that ran Pyongyang's nuclear weapons program, said another source, a former high-ranking intelligence official who was briefed on the program.

The official said the National Security Agency-led campaign was stymied by North Korea's utter secrecy, as well as the extreme isolation of its communications systems.

A third source, also previously with U.S. intelligence, said he had heard about the failed cyber attack but did not know details.

North Korea has some of the most isolated communications networks in the world.

Just owning a computer requires police permission, and the open Internet is unknown except to a tiny elite.

The country has one main conduit for Internet connections to the outside world, through China.

In contrast, Iranians surfed the Net broadly and had interactions with companies from around the globe.

ADVERTISING

A spokeswoman for the NSA declined to comment for this story. The spy agency has previously declined to comment on the Stuxnet attack against Iran.

The United States has launched many cyber espionage campaigns, but North Korea is only the second country, after Iran, that the NSA is now known to have targeted with software designed to destroy equipment.

Washington has long expressed concerns about Pyongyang's nuclear program, which it says breaches international agreements.

North Korea has been hit with sanctions because of its nuclear and missile tests, moves that Pyongyang sees as an attack on its sovereign right to defend itself.

U.S. Secretary of State John Kerry said last week that Washington and Beijing were discussing imposing further sanctions on North Korea, which he said was "not even close" to taking steps to end its nuclear program.

SIEMENS SOFTWARE

Experts in nuclear programs said there are similarities between North Korea and Iran's operations, and the two countries continue to collaborate on military technology.

Both countries use a system with P-2 centrifuges, obtained by Pakistani nuclear scientist A.Q. Khan, who is regarded as the father of Islamabad's nuclear bomb, they said.

Like Iran, North Korea probably directs its centrifuges with control software developed by Siemens AG that runs on Microsoft Corp's Windows operating system, the experts said.

Stuxnet took advantage of vulnerabilities in both the Siemens and Microsoft programs.

Because of the overlap between North Korea and Iran's nuclear programs, the NSA would not have had to tinker much with Stuxnet to make it capable of destroying centrifuges in North Korea, if it could be deployed there.

Despite modest differences between the programs, "Stuxnet can deal with both of them. But you still need to get it in," said Olli Heinonen, senior fellow at Harvard University's Belfer Center for Science and International Affairs and former deputy director general of the International Atomic Energy Agency.

NSA Director Keith Alexander said North Korea's strict limitations on Internet access and human travel make it one of a few nations "who can race out and do damage with relative impunity" since reprisals in cyberspace are so challenging.

When asked about Stuxnet, Alexander said he could not comment on any offensive actions taken during his time at the spy agency.

David Albright, founder of the Institute for Science and International Security and an authority on North Korea's nuclear program, said U.S. cyber agents probably tried to get to North Korea by compromising technology suppliers from Iran, Pakistan or China.

"There was likely an attempt" to sabotage the North Korean program with software, said Albright, who has frequently written and testified on the country's nuclear ambitions.

OLYMPIC GAMES

The Stuxnet campaign against Iran, code-named Olympic Games, was discovered in 2010.

It remains unclear how the virus was introduced to the Iranian nuclear facility in Natanz, which was not connected to the Internet.

According to cybersecurity experts, Stuxnet was found inside industrial companies in Iran that were tied to the nuclear effort.

As for how Stuxnet got there, a leading theory is that it was deposited by a sophisticated espionage program developed by a team closely allied to Stuxnet's authors, dubbed the Equation Group by researchers at Kaspersky Lab.

The U.S. effort got that far in North Korea as well.

Though no versions of Stuxnet have been reported as being discovered in local computers, Kaspersky Lab analyst Costin Raiu said that a piece of software related to Stuxnet had turned up in North Korea.

Kaspersky had previously reported that the software, digitally signed with one of the same stolen certificates that had been used to install Stuxnet, had been submitted to malware analysis site VirusTotal from an electronic address in China.

But Raiu told Reuters his contacts had assured him that it originated in North Korea, where it infected a computer in March or April 2010.

Some experts said that even if a Stuxnet attack against North Korea had succeeded, it might not have had that big an impact on its nuclear weapons program.

Iran's nuclear sites were well known, whereas North Korea probably has at least one other facility beyond the known Yongbyon nuclear complex, former officials and inspectors said.

In addition, North Korea likely has plutonium, which does not require a cumbersome enrichment process depending on the cascading centrifuges that were a fat target for Stuxnet, they said.

Jim Lewis, an advisor to the U.S. government on cybersecurity issues and a senior fellow at the Center for Strategic and International Studies, said there are limitations to cyber offense.

A cyber attack "is not something you can release and be sure of the results," Lewis said.
: Cybersecurity threats are increasingly from the sea
: Letsbereal June 02, 2015, 07:27:53 PM
[365] Cybersecurity threats are increasingly from the sea https://www.youtube.com/watch?v=XJMZGsA_43Q

Jun 2, 2015 Boom Bust
: Federal Government Suffers Massive Hacking Attack: Security Now
: Letsbereal June 10, 2015, 06:33:41 PM
Federal Government Suffers Massive Hacking Attack: Security Now 511 https://www.youtube.com/watch?v=tGOxf2cWxoc

Jun 9, 2015 TWiT Netcast Network
: Report From Russian Cybersecurity Firm Links Israel To Nuclear Talk Spy Virus
: Letsbereal June 11, 2015, 05:58:59 PM
Report From Russian Cybersecurity Firm Links Israel To Nuclear Talk Spy Virus
11 June 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-06-11/report-russian-cybersecurity-firm-links-israel-nuclear-talk-spy-virus
: Re: INTERNET REGULATION - HACKING
: larsonstdoc June 11, 2015, 06:55:19 PM
http://hosted.ap.org/dynamic/stories/U/US_GOVERNMENT_HACKED?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2015-06-11-15-58-33

WASHINGTON (AP) -- Hackers stole personnel data and Social Security numbers for every federal employee, a government worker union said Thursday, saying that the cyber theft of U.S. employee information was more damaging than the Obama administration has acknowledged.

Sen. Harry Reid, the Democratic leader, said on the Senate floor that the December hack into Office of Personnel Management data was carried out by "the Chinese" without specifying whether he meant the Chinese government or individuals. Reid is one of eight lawmakers briefed on the most secret intelligence information. U.S. officials have declined to publicly blame China, which has denied involvement.

J. David Cox, president of the American Federation of Government Employees, said in a letter to OPM director Katherine Archuleta that based on OPM's internal briefings, "We believe that the Central Personnel Data File was the targeted database, and that the hackers are now in possession of all personnel data for every federal employee, every federal retiree, and up to one million former federal employees."
: Re: INTERNET REGULATION - HACKING
: larsonstdoc June 17, 2015, 11:48:11 PM
http://news.nationalpost.com/news/canada/government-of-canada-websites-under-attack-environment-canada-foreign-affairs-down#__federated=1

The Hacker group Anonymous claimed responsibility Wednesday for what Treasury Board President Tony Clement says was a cyber attack on the Government of Canada’s computer servers. Some federal emails and several department websites crashed early Wednesday afternoon.

Federal cabinet ministers were being briefed about the matter, with sites for Justice, Public Works and Government Services, the main Canada.ca page, Shared Services Canada (the government’s super-IT department) and even the Canadian Security Intelligence Service (CSIS) among some of those that were down.

“Confirmed today that Govt of Canada GC servers have been cyberattacked. Until full service is restored please use 1-800-OCanada,” Clement tweeted.

Government email access for some department and ministerial staff was also down, with political staffers handing out their personal email addresses to media.

A number of sites have since come back online as federal officials look to identify the source of the attack.
: Re: INTERNET REGULATION - HACKING
: decemberfellow June 18, 2015, 12:44:00 AM
Rely on the computer safe and secure......   Yeah  right!  cashless society anyone?







/
: Re: INTERNET REGULATION - HACKING
: windyacres June 18, 2015, 02:26:41 AM
Rely on the computer safe and secure......   Yeah  right!  cashless society anyone?

NO!!!!!  I like my paper money, it's anonymous, it's private,
it's friendly to use, everyone likes it.  Digital dollars flying over
the internet can be disappeared in a blink of an eye.







/
: Re: INTERNET REGULATION - HACKING
: jofortruth June 18, 2015, 09:43:05 AM
'Anonymous' says it cyberattacked federal government to protest Bill C-51
http://www.cbc.ca/news/politics/anonymous-says-it-cyberattacked-federal-government-to-protest-bill-c-51-1.3117360

The online hacker group Anonymous has claimed responsibility for a cyberattack on federal government websites, in protest against the recent passing of the government's anti-terror Bill C-51.

"Today, Anons around the world took a stand for your rights," the group wrote Wednesday afternoon in an online post

"Do we trade our privacy for security? Do we bow down and obey what has become totalitarian rule? Don't fool [yourselves]. The Harper regime does not listen to the people, it acts only in [its] best interests."

The sad thing is nor would the Liberals and NDP (the other main parties in Canada). What has happened to leadership in both of our countries? All these non leaders do today is pander for the globalists and their multiple freedom-ridding agendas. Leadership has gone AWOL in Canada and America! Absolutely shameful!
: Re: INTERNET REGULATION - HACKING
: larsonstdoc June 18, 2015, 10:35:35 AM
'Anonymous' says it cyberattacked federal government to protest Bill C-51
http://www.cbc.ca/news/politics/anonymous-says-it-cyberattacked-federal-government-to-protest-bill-c-51-1.3117360

The sad thing is nor would the Liberals and NDP (the other main parties in Canada). What has happened to leadership in both of our countries? All these non leaders do today is pander for the globalists and their multiple freedom-ridding agendas. Leadership has gone AWOL in Canada and America! Absolutely shameful!

  Without question.  Puppets of the NWO. 
: Hackers Got Hacked: Security Now - FBI Connection
: Letsbereal July 08, 2015, 05:47:01 AM
Hackers Got Hacked: Security Now 515 https://www.youtube.com/watch?v=gLJLaBv_HUE

Jul 7, 2015 TWiT Netcast Network
: Re: Hackers Got Hacked: Security Now - FBI Connection
: EvadingGrid July 08, 2015, 05:49:11 AM
Notorious Hacking Firm Hit with Large-Scale Hack
Internal emails confirm company's contracts with third-world regimes
http://www.infowars.com/notorious-hacking-firm-hit-with-large-scale-hack/

Italian-based company “Hacking Team,” a notorious security firm accused of selling surveillance tech to corrupt governments, had a large trove of internal data leaked online late Sunday evening.
: Company that sells anti-hacking software to US gets hacked
: Letsbereal July 08, 2015, 05:50:29 AM
Company that sells anti-hacking software to US gets hacked https://www.youtube.com/watch?v=1Rh_uvAd8rU

Jul 7, 2015 RT
: ‘Any govt that uses US military software is vulnerable’ – frmr MI5 officer
: Letsbereal July 08, 2015, 08:10:09 AM
‘Any govt that uses US military software is vulnerable’ – frmr MI5 officer on German missile 'hack' https://www.youtube.com/watch?v=CUXcQGP5bYQ

Jul 8, 2015 RT
: Nationwide Computer "Glitch" Grounds All United Airlines Flights
: Letsbereal July 08, 2015, 09:01:20 AM
Nationwide Computer "Glitch" Grounds All United Airlines Flights
8 July 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-07-08/nationwide-computer-glitch-grounds-all-united-airlines-flights

    *UNITED AIRLINES U.S. FLIGHTS GROUNDED, FAA SAYS IN NOTICE

    *FAA CITES 'AUTOMATION ISSUES' IN UNITED AIRLINES STOPPAGE
: Re: INTERNET REGULATION - HACKING
: Georgiacopguy July 08, 2015, 03:59:08 PM
After the United Airlines and stock market crashes, I got to wondering what was going on. Went to zerohedge, when it came back up from being hacked and saw they had a hack attack map from norsecorp. I clicked the link, and there are presently hack attacks coming from Russia and China and we are retaliating. Some of the targets are military bases and NSA server farms. There is one target which is located in St. Louis I found particularly scary and interesting, its the National Geospatial Intelligence agency. Apparently the agency in charge of maintaining the GPS system.

Norsecorp map: http://map.norsecorp.com/v1/

We may be watching history unfold.
: Re: INTERNET REGULATION - HACKING
: jerryweaver July 08, 2015, 04:16:25 PM
I guessing if the net goes down the food riots will start. Most of the US has electronic cards instead of coin. :o
: Re: INTERNET REGULATION - HACKING
: Georgiacopguy July 08, 2015, 04:26:37 PM
So far I cant see any attacks which indicate they are going after net infrastructure, but there is a LOT of Mil/Gov attacks...and that Geospatial one spooked the hell out of me once I put the peices together of what could be in St. Louis they would be going after. For the life of me though, I cannot track down anything in Kirksville, MO that would be a viable target. Seattle, Dallas, Washington State, New York, all are being targeted, I just cant figure out some of these target locations, unless its just showing the telecom or ISP where the attack gets to the US.
: Re: INTERNET REGULATION - HACKING
: Georgiacopguy July 08, 2015, 04:34:33 PM
I just realized, that round icon just off the coast of Africa is an unknown Military server they cannot place the location of. It keeps getting pounded like crazy...and every once in a while, it pounds right back.
: Re: INTERNET REGULATION - HACKING
: jofortruth July 08, 2015, 04:36:27 PM

 I cannot track down anything in Kirksville, MO that would be a viable target.



What about this!

http://www.radomes.org/museum/showsite.php?site=Kirksville+AFS,+MO



Current Use: Active FAA long-range radar site, now with an ARSR-3 radar. This now-FAA long-range radar site is now data-tied into the Joint Surveillance System (post 9/11).




: Re: INTERNET REGULATION - HACKING
: jerryweaver July 08, 2015, 04:43:59 PM
I have seen this before in the recent months.  I wouldn't get too worked about it. Just my opinion.

How often do you monitor the http://map.norsecorp.com/v1/ and is this level of cyber warfare unusual Georgia Cop Guy?

I live near a couple major Bases on the west coast and if the planes start flying I'll let you all know.
: Re: INTERNET REGULATION - HACKING
: jofortruth July 08, 2015, 04:44:25 PM
After the United Airlines and stock market crashes, I got to wondering what was going on. Went to zerohedge, when it came back up from being hacked and saw they had a hack attack map from norsecorp. I clicked the link, and there are presently hack attacks coming from Russia and China and we are retaliating. Some of the targets are military bases and NSA server farms. There is one target which is located in St. Louis I found particularly scary and interesting, its the National Geospatial Intelligence agency. Apparently the agency in charge of maintaining the GPS system.

Norsecorp map: http://map.norsecorp.com/v1/

We may be watching history unfold.


https://whyweprotest.net/threads/massive-cyber-attack-targeting-the-us.120199/
: Re: INTERNET REGULATION - HACKING
: jerryweaver July 08, 2015, 04:46:59 PM

https://whyweprotest.net/threads/massive-cyber-attack-targeting-the-us.120199/


This webpage is not available

ERR_SSL_VERSION_OR_CIPHER_MISMATCH

What did that page say jo?



: Re: INTERNET REGULATION - HACKING
: jerryweaver July 08, 2015, 05:00:08 PM
I have seen this before in the recent months.  I wouldn't get too worked about it. Just my opinion.


I was wrong. Watched for a few minutes and the level assualt is pretty intense.
 
Mostly China. I was under the impression that Chinese wanted trade and were winning on that front.
: Re: INTERNET REGULATION - HACKING
: Letsbereal July 08, 2015, 05:07:47 PM
And Now The Wall Street Journal Is Down
8 July 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-07-08/wall-street-journal-down

Things are starting to get interesting. First UAL, then ZH, then the NYSE, and now the WSJ…


That Norse map is a bunch of horseshit propaganda. There ain't such a thing as a 'Real Time Cyber Attack Map'. Americans have been watching too many movies.
: Re: INTERNET REGULATION - HACKING
: jofortruth July 08, 2015, 05:18:35 PM

This webpage is not available

ERR_SSL_VERSION_OR_CIPHER_MISMATCH

What did that page say jo?


Just a guy tracking the attacks!
: Re: INTERNET REGULATION - HACKING
: Georgiacopguy July 08, 2015, 05:22:58 PM
That sounds like a winner there Jo. So thats a RADAR site which is linked to the joint surveillance system (potentially) and the GPS system (potentially). Couple that with United airlines being attacked, the NYSE, and it looks like they may want to destabilize us. But if thats the case, why not shut down the internet...I know plenty of people who would become unstable if they lost ye olde interwebz.
: Re: INTERNET REGULATION - HACKING
: Georgiacopguy July 08, 2015, 05:32:29 PM

Just a guy tracking the attacks!

Those were attacks from like 2014. So far, the numbers I'm seeing rival the numbers he saw in a single day while monitoring.
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O July 08, 2015, 09:13:41 PM
ME THINKS....

One important point left out of this thread, is the fact that paid for US politicians were delivering internet government takeover 'rehearsal' speeches on CSPAN this very day.  Talking points already drafted.

The NWO is hell bent on taking complete control of America's free information.  These "NON" hacking attacks... "No really just trust us..." that a four year old can see through are most likely a dry run by the NSA and DARPA for their 'cyber 911' false flag to cease total control of the internet.


: Re: INTERNET REGULATION - HACKING
: jerryweaver July 08, 2015, 09:52:29 PM
Really John is this the meeting of the usual suspects you are referring to? 

JULY 8, 2015
Terrorist Threats and Encryption Issues
FBI Director James Comey testified at a Senate Intelligence Committee hearing on terrorist threats as well as the effect of commercial encryption on the FBI’s investigative tools.

http://www.c-span.org/video/?326953-1/hearing-threats-encryption-issues

PEOPLE IN THIS VIDEO
James B. Comey Jr.
Director
Federal Bureau of Investigation
Roy Blunt
U.S. Senator
[R] Missouri
Richard Burr
U.S. Senator
[R] North Carolina
Dan Coats
U.S. Senator
[R] Indiana
Susan M. Collins
U.S. Senator
[R] Maine
Tom Cotton
U.S. Senator
[R] Arkansas
Dianne Feinstein
U.S. Senator
[D] California
Martin Heinrich
U.S. Senator
[D] New Mexico
Mazie Hirono
U.S. Senator
[D] Hawaii
John S. McCain III
U.S. Senator
[R] Arizona
Barbara A. Mikulski
U.S. Senator
[D] Maryland
Mark R. Warner
U.S. Senator
[D] Virginia
Ron Wyden
U.S. Senator
[D] Oregon
More People

: Re: INTERNET REGULATION - HACKING
: Dude447 July 08, 2015, 10:13:19 PM
mean while back at hilldogs basement server
: Re: INTERNET REGULATION - HACKING
: jerryweaver July 08, 2015, 10:17:27 PM
^^^^^^^^^^^^^

That's funny.
How many times has various agencies dropped the ball on simple email issues.
: Re: INTERNET REGULATION - HACKING
: jerryweaver July 09, 2015, 04:14:32 AM
According to these guys the attacks are increasing.  5000+ attacks on the US mostly from China already today.

http://map.norsecorp.com/v1/

According to these guys NorseCorp is attempting to be a bigger player in the internet security business.

http://techli.com/2011/09/norse-corp-internet-security/#.

Would Norsecorp falsify data ?

https://www.facebook.com/NorseCorporation


: Re: Hackers Got Hacked: Security Now - FBI Connection
: EvadingGrid July 09, 2015, 04:39:53 AM
I know its wrong to laugh, but I just can not help it.
: Re: INTERNET REGULATION - HACKING
: John_Back_From_The_Club_O July 09, 2015, 06:43:47 AM
Really John is this the meeting of the usual suspects you are referring to? 

JULY 8, 2015
Terrorist Threats and Encryption Issues
FBI Director James Comey testified at a Senate Intelligence Committee hearing on terrorist threats as well as the effect of commercial encryption on the FBI’s investigative tools.

http://www.c-span.org/video/?326953-1/hearing-threats-encryption-issues

PEOPLE IN THIS VIDEO
James B. Comey Jr.
Director
Federal Bureau of Investigation
Roy Blunt
U.S. Senator
[R] Missouri
Richard Burr
U.S. Senator
[R] North Carolina
Dan Coats
U.S. Senator
[R] Indiana
Susan M. Collins
U.S. Senator
[R] Maine
Tom Cotton
U.S. Senator
[R] Arkansas
Dianne Feinstein
U.S. Senator
[D] California
Martin Heinrich
U.S. Senator
[D] New Mexico
Mazie Hirono
U.S. Senator
[D] Hawaii
John S. McCain III
U.S. Senator
[R] Arizona
Barbara A. Mikulski
U.S. Senator
[D] Maryland
Mark R. Warner
U.S. Senator
[D] Virginia
Ron Wyden
U.S. Senator
[D] Oregon
More People

Funny how timing is everything.

Yeah, the government (NSA,FBI) doesn't like 'private' encryption because it doesn't 'require' government to implement successfully and it keeps the bad guys (NSA,FBI) out.

: Re: INTERNET REGULATION - HACKING
: Letsbereal July 09, 2015, 06:57:52 AM
Why would independent hackers help Wall Street to hide a full market crash? NOT!

Why would freedom loving hackers down Zero Hedge. Answer: NOT!

Conclusion: This was an inside job. (As usual I may add)

That Norse map is a bunch of horseshit propaganda.

There ain't such a thing as a 'Real Time Cyber Attack Map'.

Americans have been watching too many movies.
: Re: INTERNET REGULATION - HACKING
: Georgiacopguy July 09, 2015, 03:33:49 PM
Why would independent hackers help Wall Street to hide a full market crash? NOT!

Why would freedom loving hackers down Zero Hedge. Answer: NOT!

Conclusion: This was an inside job. (As usual I may add)

That Norse map is a bunch of horseshit propaganda.

There ain't such a thing as a 'Real Time Cyber Attack Map'.

Americans have been watching too many movies.

You are right, independent hackers wouldn't try to cover up a crash of the NYSE, they would either participate in its crash, orthey would get the word out, depending on their alignment, loyalties, and the reasons for their hacking. No one here has suggested they did attempt to cover it up. I believe what we are seeing are government level attacks aimed at further destabilizing the economy, and faith in it and the NYSE. It was not entirely odd they chose to attack the NYSE before opening bell, when the market was already set to open low or that they crippled the United Airlines computers. They took note in what happens to airline stocks and trust of them when things go badly. They also took note of how badly the airlines were crippled post 9/11 when people lacked trust in them. THey also know this economy is pretty dependent on air travel.

Freedom loving hackers would not take down Zero Hedge. Government shill hackers would, especially if they are trying to stir up fear amongst the very traders who use the NYSE, whether they be floor traders or day traders. In fact, there are significant numbers of day traders who rely on Zero Hedge, and who are waiting for the flag to go up. There are a lot of traders on ZH who are on a hair trigger due to that.

I disagree that it was an inside job. It doesn't follow the usual False Flag narratives. The media is dead silent on it, there is no prelude to war speeches coming from the talking heads, no pundits claiming they are under cyber attack, they are steering as far from the topic as they can, and sticking with the bad code narrative. If it were an inside job, they would be attempting to capitalize on it. So far, they aren't, nor have they telegraphed any intent to do so.

This is twice you have posted the exact same thing saying;
"That Norse map is a bunch of horseshit propaganda.

There ain't such a thing as a 'Real Time Cyber Attack Map'.

Americans have been watching too many movies."

Yet you've made no assertions as to why, or how. Based on the little that I know about how the internet is framed; it is possible to detect and track volumes of data, packets if you will, and most of the attacks that are listed on that map are one form or another of a brute force attack. Which would be easy enough to track if one were to analyze net traffic, and filter out the lower numbers, looking strictly for the higher volumes which match the profile of a brute force DDOS attack or similar. But I ask you, go ahead and back your claims, otherwise, you are bring absolutely nothing to the conversation.
: Huge hack of US government databases hits 21.5 million people
: Letsbereal July 10, 2015, 06:52:46 AM
Huge hack of US government databases hits 21.5 million people https://www.youtube.com/watch?v=duxj2yyER5Y

Jul 10, 2015 euronews
: Re: Huge hack of US government databases hits 21.5 million people
: EvadingGrid July 10, 2015, 06:55:24 AM
Ouch . . . .
: Re: INTERNET REGULATION - HACKING
: chris jones July 10, 2015, 04:02:45 PM
Georgiacop: I believe what we are seeing are government level attacks aimed at further destabilizing the economy, and faith in it and the NYSE. It was not entirely odd they chose to attack the NYSE before opening bell, when the market was already set to open low or that they crippled the United Airlines computers.
  Thats bumpéd.
: Re: INTERNET REGULATION - HACKING
: TahoeBlue July 10, 2015, 04:50:56 PM
https://en.wikipedia.org/wiki/All_your_base_are_belong_to_us
(https://upload.wikimedia.org/wikipedia/en/0/03/Aybabtu.png)

http://www.nationaljournal.com/tech/hack-opm-office-personnel-management-cyber-million-20150709
OPM Announces More Than 21 Million Affected by Second Data Breach
The federal personnel agency finally announced Thursday the scope of a massive hack of security-clearance information first revealed last month.
By Kaveh Waddell and Dustin Volz

July 9, 2015 More than 21 million Social Security numbers were compromised in a breach that affected a database of sensitive information on federal employees held by the Office of Personnel Management, the agency announced Thursday.

This hack is separate from the breach of OPM data that compromised 4.2 million Social Security numbers and was made public in June. Officials have privately linked both intrusions to China.



Of the 21.5 million records that were stolen, 19.7 million belonged to individuals who had undergone background investigations, OPM said. The remaining 1.8 million records belonged to other individuals, mostly applicants' families.

3.6 million people were affected by both breaches, OPM press secretary Sam Schumach said Thursday night, bringing the total number of individuals affected by the pair of OPM hacks to 22.1 million.

The records that were compromised in the breach announced Thursday include detailed, sensitive background information, such as employment history, relatives, addresses, and past drug abuse or emotional disorders. OPM said 1.1 million of the compromised files included fingerprints.

: Re: INTERNET REGULATION - HACKING
: TahoeBlue July 10, 2015, 05:01:45 PM
http://www.nytimes.com/2015/07/11/us/katherine-archuleta-director-of-office-of-personnel-management-resigns.html?_r=0
Katherine Archuleta, Director of Office of Personnel Management, Resigns
By JULIE HIRSCHFELD DAVISJULY 10, 2015

WASHINGTON — Katherine Archuleta, the director of the Office of Personnel Management, resigned under pressure on Friday, one day after the government revealed that two sweeping cyberintrusions at the agency had resulted in the theft of the personal information of more than 22 million people, including those who had applied for sensitive security clearances.

Ms. Archuleta went to the White House on Friday morning to inform President Obama that she was stepping down immediately. She said later in a statement that she felt new leadership was needed at the federal personnel agency to enable it to “move beyond the current challenges.”

Her resignation marked a swift reversal. On Thursday, Ms. Archuleta insisted in a conference call with reporters that she would stay on to address the vulnerabilities that led to the devastating cybertheft. But it did little to calm the aftershocks of the disclosure this week of what appears to be the largest such incident affecting the federal government.

Both attacks are believed to have originated in China, but administration officials have declined to name a culprit, other than to say that they believe the same actor carried out the two intrusions.

Mr. Obama and his administration struggled
on Friday to cope with the fallout from a breach that compromised the Social Security numbers, addresses, financial and health histories and other private details of millions of people, and to come to terms with the longer-term implications of a computer security lapse that has underscored severe weaknesses across the federal government.

...
: Re: INTERNET REGULATION - HACKING
: TahoeBlue July 10, 2015, 05:28:27 PM
Back in June:

http://blogs.reuters.com/great-debate/2015/06/17/has-china-learned-how-to-build-the-perfect-u-s-spy/
Has China learned how to build the perfect U.S. spy?
By Matthew Gault June 17, 2015

Washington’s intelligence community had a bad week. Deep Panda, a hacker collective supposedly backed by Beijing, breached the security of the U.S. Office of Personnel Management and made off with the personal records of 4 million government employees.

A few days later, Washington revealed it had discovered a second hack that was far worse. Deep Panda had nabbed the personnel records of 14 million federal workers, including a detailed form filled out by all military, civilian and intelligence employees.

Analysts fear China will use the information to expose American spies or blackmail government employees. The Sunday Times reinforced those fears when it reported Moscow and Beijing had cracked encrypted files in the possession of former National Security Agency contractor Edward Snowden.

It seemed that negligent security practices and tenacious hackers had exposed the West and all its spies. But Tom Harper, the reporter who wrote the Sunday Times piece, said on CNN that he was repeating what Downing Street had told him and had done no independent reporting to substantiate the claim. It looks like fears in the West of exposed spies were overwrought.

...
The same hackers breached several health insurance companies last summer and made off with the medical records of 11 million people, including members of Blue Cross/Blue Shield’s District of Columbia affiliate CareFirst.

Media pundits spent all week talking about how Deep Panda could compile all this information to craft a potential blackmail database on U.S. operatives for its patron, presumably China. But that’s ridiculous. Beijing is smarter than that.

Espionage is a long game, not a race, and countries are patient. Blackmail is a quick, brutal method of acquiring information in the short term.
...
: Re: INTERNET REGULATION - HACKING
: Georgiacopguy July 12, 2015, 02:37:06 PM
So very odd that Deep Panda sounds decidedly western in influence, as far as named go that is.
: Re: INTERNET REGULATION - HACKING
: muggl3z July 13, 2015, 04:29:53 AM
This map was put together by the company Norse as a demo for sales purposes, it's not accurate:

"For those following the rumors of a concentrated cyber attack on St. Louis via China, reporter Paul Schankman has information from the company causing the stir.  The company’s administrative headquarters is based St. Louis. Because of that, a disproportionately high number of the electronic “honeypots” they use to find suspicious activity are in the area. The map being circulated showing the activity is a public page for demo purposes only and shows only 1 in 100 signals being tracked."

"The company also says that the attacks appearing to come from China may just be internet traffic routed through the country.  It is difficult to be sure where the sources of the threats are coming from."

http://fox2now.com/2015/07/08/is-st-louis-under-a-cyber-attack-threat-map-points-to-china/
: Re: INTERNET REGULATION - HACKING
: acrylic July 13, 2015, 06:25:09 AM
 :o :o wow ... apparently they are already preparing the next target with his hack map
: Re: INTERNET REGULATION - HACKING
: Georgiacopguy July 13, 2015, 09:15:53 AM
Even if it's only showing 1 in 100 that's still pretty mind blowing. The thing is; if you say demo, the. Somebody might take the impression that everything on there is scripted. But it's an actual live feed, it just may have limited scope.

I did find this though;
http://www.networkworld.com/article/2366962/microsoft-subnet/spellbound-by-maps-tracking-hack-attacks-and-cyber-threats-in-real-time.html

I still need to check out the Kaspersky link mentioned in the article when I get to a computer
: Re: Huge hack of US government databases hits 21.5 million people
: acrylic July 14, 2015, 12:53:16 AM
wow... :o its a large number..
: Re: INTERNET REGULATION - HACKING
: Letsbereal July 27, 2015, 11:51:17 AM
NY Magazine Website Taken Down By Hacker
27 July 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-07-27/ny-magazine-website-taken-down-hacker
: Re: HACKING ATTACKS
: Letsbereal July 29, 2015, 06:23:09 PM
Halo Hackers Bring Down Planned Parenthood https://www.youtube.com/watch?v=GXx3mUzgI_c

Jul 29, 2015 The Alex Jones Channel
: Russian Hackers Used Twitter Photos to Communicate with Infected US Computers
: Letsbereal July 31, 2015, 12:17:33 AM
Russian Hackers Used Twitter Photos to Communicate with Infected US Computers https://www.youtube.com/watch?v=q3TBNMTRIeI

Jul 30, 2015 DAHBOO77

Russians hackers used Twitter, photos to reach U.S. computers: report http://www.reuters.com/article/2015/07/29/us-russian-hackers-backdoor-idUSKCN0Q31HV20150729
: Detox Ransome the hacker which hacked BitDefender and stole BitDefender data
: Letsbereal July 31, 2015, 01:23:07 AM
Detox Ransome the hacker which hacked BitDefender and stole BitDefender customer data
30 July 2015
, (Cyberwarzone )
http://cyberwarzone.com/detox-ransome-the-hacker-which-hacked-bitdefender-and-stole-bitdefender-customer-data/
: U.S. Decides to Retaliate Against China’s Hacking
: Letsbereal August 01, 2015, 12:38:10 PM
U.S. Decides to Retaliate Against China’s Hacking
31 July 2015
, by David E. Sanger (The New York Times)
http://www.nytimes.com/2015/08/01/world/asia/us-decides-to-retaliate-against-chinas-hacking.html
: Re: HACKING ATTACKS
: EvadingGrid August 01, 2015, 12:41:15 PM
The trouble is how many times have they put the initial blame on China or Russia, and weeks latter admitted it was a US Company run operation . .. .. .
: Re: HACKING ATTACKS
: Letsbereal August 01, 2015, 04:53:54 PM
The trouble is how many times have they put the initial blame on China or Russia, and weeks latter admitted it was a US Company run operation . .. .. .

Yeah, you're completely correct. This hacking news has become an other tool for propaganda and scapegoating.

You don't know what's real or not and you don't know who's dunnit?

It's known that the main task of the NSA is to steel other people's usable ideas and or secrets or i.a.w. company spying and steeling.

So it wouldn't be a surprise that other countries would try and do the same.

But with the U.S. 'brave new world' ministerium of propaganda on full steam it doesn't matter anymore what's real or not.

How vulnerable are the U.S. stock markets to hackers? http://www.marketwatch.com/story/how-vulnerable-are-the-us-stock-markets-to-hackers-2015-07-31

FBI says hackers shake down big banks, threaten to shut sites if they don’t pay up http://www.marketwatch.com/story/hackers-are-increasingly-extorting-banks-fbi-says-2015-07-30
: Hackers Put Credentials BitDefender Clients Online
: Letsbereal August 04, 2015, 01:15:39 AM
Hackers Put Credentials BitDefender Clients Online
2 August 2015
, (Malware Battle - Blogspot)
http://malwarebattle.blogspot.nl/2015/08/hackers-put-credentials-bitdefender.html

Anti-Virus Firm BitDefender Admits Breach, Hacker Claims Stolen Passwords Are Unencrypted
31 July 2015
, by Thomas Fox-Brewster (Forbes)
http://www.forbes.com/sites/thomasbrewster/2015/07/31/bitdefender-hacked/
: Re: HACKING ATTACKS
: Effie Trinket August 04, 2015, 07:30:21 PM
ALL hacking attacks are INSIDE JOBS carried out by any number of the following ACTUAL TERRORIST CORPORATIONS:

1)  Mitre Corporation (false flag terrorist traitors PROVEN to have been involved in carrying out 9/11).
2)  Science Applications International Corporation (SAIC) (false flag terrorist traitors PROVEN to have been involved in carrying out 9/11).
3)   Raytheon (false flag terrorist traitors PROVEN to have been involved in carrying out 9/11).
4)  Mantech International
5)  SRA International
6)   George Mason University (i.e. Alexander H. Levis, key architect for the global panopticon surveillance/behavioral modification grid).
7)  NARUS (Privatized version of the NSA) PROVEN to have been involved in cyber false flags to help NATO overthrow Libya's puppet dictator.
8 )  Booz Allen Hamilton - Snowden's (a total govt plant intended to desensitize) firm and incidentally HUGE player in multiple false flag attacks including 9/11.  ALso uses artificial intelligence predictive mapping software to map out how globalist released bioweapons will propagate through populations and their characteristics as to how effectively they could exterminate slave humans.

All "chinese hackers" work for the NWO, just like the radicalized "jihadists" do.
: China Responds To US Declaration Of Cyber War
: Letsbereal August 06, 2015, 01:11:13 AM
China Responds To US Declaration Of Cyber War
5 August 2015
, by Xinhua (Zero Hedge)
http://www.zerohedge.com/news/2015-08-05/china-responds-us-declaration-cyber-war
: Russia hacked unclassified Pentagon emails, report says
: Letsbereal August 06, 2015, 05:40:19 PM
Russia hacked unclassified Pentagon emails, report says
6 August 2015
, Washington (MarketWatch)
http://www.marketwatch.com/story/russia-hacked-unclassified-pentagon-emails-report-says-2015-08-06

Russia hacked the Pentagon's Joint Staff unclassified email system, which has been shut down and taken off line for nearly two weeks, NBC News reported, citing unnamed U.S. officials.
: Hackers Access Bank Details of 2.4 Million People From Carphone Warehouse
: Letsbereal August 08, 2015, 03:37:47 PM
Hackers Access Bank Details of 2.4 Million People In Cyber Attack On Carphone Warehouse https://www.youtube.com/watch?v=1tNQhk5baMo

Aug 8, 2015 DAHBOO777

Carphone Warehouse suffers major cyber attack: Hackers put names, addresses and bank details of up to 2.4MILLION customers at risk http://www.dailymail.co.uk/news/article-3190400/Carphone-Warehouse-hackers-accessed-bank-details-2-4MILLION-customers.html
: SEC: $47 million Stolen At Network Manufacturer Through Social Engineering
: Letsbereal August 08, 2015, 07:20:12 PM
SEC: $47 million Stolen At Network Manufacturer Through Social Engineering
4 August 2015
, (SEC)
http://www.sec.gov/Archives/edgar/data/1511737/000157104915006288/t1501817_8k.htm


Also see:

Social Engineering Capture the Flag Results PDF https://www.social-engineer.com/downloads/Social-Engineer_Defcon_19_SECTF_Results_Report.pdf

How Apple and Amazon Security Flaws Led to My Epic Hacking http://www.wired.com/brandlab/2012/08/apple-amazon-mat-honan-hacking/

Yes, I was hacked. Hard http://www.emptyage.com/post/28679875595/yes-i-was-hacked-hard

Gizmodo Twitter Account Hijacked by Foul-Mouthed Hackers http://allthingsd.com/20120803/gizmodo-twitter-account-hijacked-by-foul-mouthed-hackers/#mikeisaac-ethics
: Re: HACKING ATTACKS
: Letsbereal August 08, 2015, 11:13:10 PM
Def Con Conference: Bloomberg West (Full Show 8/07) http://www.bloomberg.com/news/videos/2015-08-07/def-con-conference-bloomberg-west-full-show-8-07-

August 8, 2015 Bloomberg
: Meet the Fraternity Brothers Linked to the JPMorgan Hack
: Letsbereal August 09, 2015, 07:00:08 PM
Meet the Fraternity Brothers Linked to the JPMorgan Hack
6 August 2015
, by Jordan Robertson and Michael Riley (Bloomberg)
http://www.bloomberg.com/news/articles/2015-08-06/from-frat-brothers-to-fbi-suspects
: Carphone Warehouse in customer data breach
: Letsbereal August 10, 2015, 12:00:46 AM
Carphone Warehouse in customer data breach
8 August 2015
, (BBC News)
http://www.bbc.com/news/uk-33835185

Personal details of up to 2.4 million Carphone Warehouse customers may have been accessed in a cyber-attack, the mobile phone retailer says.
: U.S. Identifies Global Insider Trading Ring With Ukraine Hackers
: Letsbereal August 11, 2015, 01:37:14 PM
U.S. Identifies Global Insider Trading Ring With Ukraine Hackers
11 August 2015
, by Keri Geiger (Bloomberg)
http://www.bloomberg.com/news/articles/2015-08-11/u-s-identifies-insider-trading-ring-including-ukraine-hackers

Excerpt:

Exposing a new front in cybercrime, U.S. authorities broke up an alleged insider trading ring that relied on computer hackers to pilfer corporate press announcements and then profited by trading on the sensitive information before it became public.

In morning raids in Georgia and Pennsylvania, federal agents arrested five men in the plot, while four others indicted on hacking and securities fraud charges remain at large.

The hackers, who are thought to be in Ukraine and possibly Russia, allegedly infiltrated the computer servers of PRNewswire Association LLC, Marketwired and Business Wire, a unit of Warren Buffett’s Berkshire Hathaway Inc., over a five-year period.

They siphoned more than 100,000 press releases including corporate data on earnings that could be used to anticipate stock market moves and make profitable trades.

The hackers passed the information to associates in the U.S., who allegedly used it to buy and sell shares of dozens of companies, including Panera Bread Co., Boeing Co., Hewlett-Packard Co., Caterpillar Inc. and Oracle Corp., through retail brokerage accounts.


Or is this merely an other False-Flag to get NATO at the Russian border into Ukraine?
: FAA Glitch Snarls Air Travel on East Coast
: Letsbereal August 15, 2015, 11:07:48 PM
FAA Glitch Snarls Air Travel on East Coast
15 August 2015
, (Newser Editors and Wire Services)
http://www.newser.com/story/211388/faa-glitch-snarls-air-travel-on-east-coast.html

Thousands of travelers along the East Coast faced flight delays today because of technical issues at an FAA center in Virginia, authorities said.

FAA spokeswoman Kathleen Bergen said the agency is investigating an automation problem at an air traffic center in Leesburg, Virginia.

Flights into and out of New York- and Washington-area airports were being grounded, with delays stretching to nearly three hours in some cases.

Information posted on an FAA website indicated that part of the trouble was due to a computer system known as ERAM, which is used by air traffic controllers at 20 centers around the country that handle high-altitude air traffic.

Installation of the system was completed earlier this year at the last of the centers, years behind schedule.

American Airlines said the issues were affecting all East Coast flights and urged passengers to plan accordingly.
: Torrent Clients and BitTorrent Sync can be used for DRDoS attacks
: Letsbereal August 17, 2015, 10:46:12 AM
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks
11 August 2015
, (Use Nix)
https://www.usenix.org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent
: IRS Admits Taxpayer Account Hack Far More Serious Than Initially Reported
: Letsbereal August 17, 2015, 03:44:23 PM
IRS Admits Taxpayer Account Hack Far More Serious Than Initially Reported
17 August 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-08-17/irs-admits-taxpayer-account-hack-far-more-serious-initially-reported
: Re: HACKING ATTACKS
: Letsbereal August 19, 2015, 01:24:47 PM
Adulterers Take Note: 36 Million AshleyMadison Users Exposed
19 August 2015
, by Stefan Nicola and Kristen Schweizer (Bloomberg)
http://www.bloomberg.com/news/articles/2015-08-19/adulterers-take-note-36-million-ashleymadison-accounts-exposed


Is Your Name In The Ashley Madison Hack? Here Are Some Easy Ways To Find Out
19 August 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-08-19/your-name-ashley-madison-hack-here-one-way-find-out
: Millions of Cheaters Exposed in Latest Hack!
: Letsbereal August 20, 2015, 07:59:55 AM
Millions of Cheaters Exposed in Latest Hack! https://www.youtube.com/watch?v=YAM2MECaZaQ

Aug 20, 2015 The Alex Jones Channel
: Joe Biden's Son Blames "Russian Agents" For Ashley Madison Profile
: Letsbereal August 30, 2015, 10:10:40 AM
Joe Biden's Son Blames "Russian Agents" For Ashley Madison Profile
28 August 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-08-28/joe-bidens-son-blames-russian-agents-ashley-madison-profile
: Ashley Madison Chief Executive Officer Noel Biderman stepping down after hack
: Letsbereal August 30, 2015, 10:18:04 AM
Ashley Madison Chief Executive Officer Noel Biderman stepping down after hack
28 August 2015
, Toronto (Ashley Madison)
http://media.ashleymadison.com/statement-from-avid-life-media-august-28-2015/

Effective today, Noel Biderman, in mutual agreement with the company, is stepping down as Chief Executive Officer of Avid Life Media Inc. (ALM) and is no longer with the company.

Until the appointment of a new CEO, the company will be led by the existing senior management team.

This change is in the best interest of the company and allows us to continue to provide support to our members and dedicated employees.

We are steadfast in our commitment to our customer base.

We are actively adjusting to the attack on our business and members’ privacy by criminals.

We will continue to provide access to our unique platforms for our worldwide members.

We are actively cooperating with international law enforcement in an effort to bring those responsible for the theft of proprietary member and business information to justice.
: Re: HACKING ATTACKS
: Dude447 August 30, 2015, 11:13:57 AM
Ashley Madison reeping what they sow imo
: US threatens sanctions against China over purported cyberattacks
: Letsbereal September 01, 2015, 02:21:24 AM
US threatens sanctions against China over purported cyberattacks https://www.youtube.com/watch?v=lk5TbN_49lo

Aug 31, 2015 RT
: iOS Malware Steals Over 225,000 Apple Accounts to Create Free App Utopia
: Letsbereal September 01, 2015, 07:16:53 AM
KeyRaider: iOS Malware Steals Over 225,000 Apple Accounts to Create Free App Utopia
30 August 2015
, by Claud Xiao (Palo Alto Networks)
http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/
: Re: HACKING ATTACKS
: Letsbereal September 03, 2015, 05:51:44 PM
US To Slap Chinese Hackers With Sanctions Ahead Of Xi Visit
3 September 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-09-03/us-slap-chinese-hackers-sanctions-ahead-xi-visit

Obama Faces Whac-a-Mole Challenge If He Sanctions China Hackers
4 September 2015
, by Kasia Klimasinska (Bloomberg)
http://www.bloomberg.com/news/articles/2015-09-04/obama-faces-whac-a-mole-challenge-if-he-sanctions-china-hackers


Those sanctions will further isolate the U.S. so that is great news for the world.
: REALIST NEWS - MR Robot Series Finale, Elite Telling Everything that will happen
: Letsbereal September 05, 2015, 07:07:56 AM
REALIST NEWS - MR Robot Series Finale - Elite Telling Everything that will happen https://www.youtube.com/watch?v=b015nM4GPK4

Sep 4, 2015 jsnip4
: Latvian man charged by U.S. over Gozi computer virus pleads guilty
: Letsbereal September 05, 2015, 04:21:40 PM
Latvian man charged by U.S. over Gozi computer virus pleads guilty
4 September 2015
, by Nate Raymond - New York (Reuters)
http://www.reuters.com/article/2015/09/04/us-usa-cybersecurity-virus-idUSKCN0R420S20150904
: Re: HACKING ATTACKS
: Letsbereal September 07, 2015, 02:08:15 AM
CyberWar & The False Comfort Of Mutually Assured Destruction
6 September 2015
, by Jim Rickards (Zero Hedge)
http://www.zerohedge.com/news/2015-09-06/cyberwar-false-comfort-mutually-assured-destruction
: Re: HACKING ATTACKS
: Letsbereal September 09, 2015, 11:32:25 AM
Cyber-Extortionists Targeting the Financial Sector Are Demanding Bitcoin Ransoms
9 September 2015
, by Olivia Solon (Bloomberg)
http://www.bloomberg.com/news/articles/2015-09-09/bitcoin-ddos-ransom-demands-raise-dd4bc-profile

‘DD4BC’ is carrying out a string of attacks. Should companies cough up?


Probably an other Langley crime.
: Russian-speaking cyber spies exploit satellites
: Letsbereal September 10, 2015, 09:19:01 PM
Russian-speaking cyber spies exploit satellites
9 September 2015
, by Alex Drozhzhin (Kaspersky - Blog)
https://blog.kaspersky.com/turla-apt-exploiting-satellites/9771/


Suspected Russian spyware Turla targets Europe, United States
7 March 2014
, by Peter Apps and Jim Finkle - London/Boston (Reuters)
http://www.reuters.com/article/2014/03/07/us-russia-cyberespionage-insight-idUSBREA260YI20140307
: Re: HACKING ATTACKS
: Letsbereal September 13, 2015, 03:16:19 PM
"Malware attack Bundestag-hack directed to more international organizations"
12 September 2015
, by Johannes Boie and Benedikt Strunz (Süddeutsche Zeitung)
(Google trans from German) http://tinyurl.com/o8loknp

ORG http://www.sueddeutsche.de/politik/hacker-attacke-auf-den-bundestag-experten-identifizieren-angriffs-methode-1.2645171

Experts identify attack method

    - The hacker attack on the Bundestag took place by e-mail, which was disguised as a message from the UN.

    - The attack was not limited to the Bundestag.

    - The e-mail that sent the hackers, is still on federal computers.

    - MPs now complain about the lack of information policy.



Also See:

Cyber-attack: computer network of the Bundestag threatens total loss
10 June 2015
, by Maik Baumgärtner, Sven Röbel and Jörg Schindler (Der Spiegel)
(Google trans from German) http://tinyurl.com/nm35u5p

ORG http://www.spiegel.de/netzwelt/web/cyberattacke-auf-bundestag-es-droht-ein-millionenschaden-a-1038178.html
: Re: HACKING ATTACKS
: Letsbereal September 13, 2015, 10:11:38 PM
US To Slap Chinese Hackers With Sanctions Ahead Of Xi Visit
3 September 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-09-03/us-slap-chinese-hackers-sanctions-ahead-xi-visit

Obama Faces Whac-a-Mole Challenge If He Sanctions China Hackers
4 September 2015
, by Kasia Klimasinska (Bloomberg)
http://www.bloomberg.com/news/articles/2015-09-04/obama-faces-whac-a-mole-challenge-if-he-sanctions-china-hackers


Those sanctions will further isolate the U.S. so that is great news for the world.

An Angry China May Cancel Xi Trip To Washington Over US Cyber Sanctions
13 September 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-09-13/angry-china-may-cancel-xi-trip-washington-over-us-cyber-sanctions
: Re: HACKING ATTACKS
: Letsbereal September 17, 2015, 06:47:34 PM
Computer Glitch Temporarily Halts AA Flights https://www.youtube.com/watch?v=EM-lvjMpx8g

Sep 17, 2015 Associated Press
: OPM Warns Hackers Stole An Estimated 5.6 Million People's Fingerprints
: Letsbereal September 23, 2015, 07:50:46 PM
OPM Warns Hackers Stole An Estimated 5.6 Million People's Fingerprints https://www.youtube.com/watch?v=XZGXeM2Xw1c

Sep 23, 2015 DAHBOO77

Office of Personnel Mgmt: 5.6Million Estimated To Have Fingerprints Stolen In Hack http://breaking911.com/office-of-personnel-mgmt-5-6million-estimated-to-have-fingerprints-stolen-in-hack/
: Government Admits Nearly 6 Million Fingerprints Were Stolen In OPM Hack
: Letsbereal September 23, 2015, 08:00:42 PM
In Major Humiliation, Government Admits Nearly 6 Million Fingerprints Were Stolen In OPM Hack
23 September 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-09-23/major-humiliation-government-admits-nearly-6-million-fingerprints-were-stolen-opm-ha
: Re: HACKING ATTACKS
: Letsbereal September 24, 2015, 05:38:31 PM
FBI Quietly Adds Civil Fingerprint Collection to Criminal Database https://www.youtube.com/watch?v=0lPse7DI8KY

Sep 24, 2015 DAHBOO777

FBI Quietly Adds Civil Fingerprint Collection to Criminal Database http://www.activistpost.com/2015/09/fbi-quietly-adds-civil-fingerprint-collection-to-criminal-database.html
: Obama announces 'understanding' with China's Xi on cyber theft but remains wary
: Letsbereal September 27, 2015, 07:35:56 AM
Obama announces 'understanding' with China's Xi on cyber theft but remains wary
26 September 2015
, by Matt Spetalnick and Michael Martina - Washington (Reuters)
http://www.reuters.com/article/2015/09/26/us-usa-china-idUSKCN0RO2HQ20150926
: Re: HACKING ATTACKS
: Letsbereal October 15, 2015, 09:39:11 AM
New Adobe Flash Zero-Day Used in Pawn Storm Campaign Targeting Foreign Affairs Ministries
13 October 2015
, (Trend Micro)
http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/


New zero-day exploit hits fully patched Adobe Flash [Updated]
14 October 2015
, by Dan Goodin (Ars Technica)
http://arstechnica.com/security/2015/10/new-zero-day-exploit-hits-fully-patched-adobe-flash/


Security Advisory for Adobe Flash Player
14 October 2015
, (Adobe Security Bulletin)
https://helpx.adobe.com/security/products/flash-player/apsa15-05.html
: Re: HACKING ATTACKS
: Letsbereal October 16, 2015, 07:41:00 PM
Russian Hackers Infiltrate Dow Jones  https://www.youtube.com/watch?v=ZuMRho4UI7c

Oct 16, 2015 Bloomberg Business


BS! Langley trying to discredit the Russians and take over the internet.
: Re: HACKING ATTACKS
: Letsbereal October 20, 2015, 01:38:46 PM
CIA Chief's AOL E-Mail Account Hacked By 13-Year Old
20 October 2015
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2015-10-20/cia-chiefs-aol-e-mail-account-hacked-13-year-old
: In Hacking Team's wake, FinFisher spyware rises in popularity with gov. users
: Letsbereal October 20, 2015, 07:50:12 PM
In Hacking Team's wake, FinFisher spyware rises in popularity with government users
19 October 2015
, by Charlie Osborne (Zero Day)
http://www.zdnet.com/article/in-hacking-teams-wake-finfisher-spyware-rises-in-popularity-with-government-users/

Which governments are allegedly using FinFisher for surveillance purposes across the globe?
: Dutch hackers win first and second prize at CyberLympics
: Letsbereal October 21, 2015, 01:22:20 PM
Dutch hackers win first and second prize at CyberLympics http://cyberlympics.org/

1st https://twitter.com/hackersftw

2th https://twitter.com/_SectorC
: Hackers can now control your phone from 16 ft away
: Letsbereal October 21, 2015, 06:13:10 PM
Hackers can now control your phone from 16 ft away https://www.youtube.com/watch?v=cyZAfY7Ge4Q

Oct 21, 2015 RT
: Re: HACKING ATTACKS
: Letsbereal October 21, 2015, 11:21:51 PM
'10-second' hack jogs Fitbits into malware-spreading mode
21 October 2015
, by Darren Pauli (The Register)
http://www.theregister.co.uk/2015/10/21/fitbit_hack/

To avoid viral stains, go jogging alone or with Bluetooth binned

https://blog.fortinet.com/author/axelle-apvrille
: Re: HACKING ATTACKS
: Letsbereal October 22, 2015, 11:31:54 AM
'Network time protocol could be misused for attacks on https and dnssec' http://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf

http://www.ntp.org/
: Re: HACKING ATTACKS
: Letsbereal October 22, 2015, 11:34:46 AM
'10-second' hack jogs Fitbits into malware-spreading mode
21 October 2015
, by Darren Pauli (The Register)
http://www.theregister.co.uk/2015/10/21/fitbit_hack/

To avoid viral stains, go jogging alone or with Bluetooth binned

https://blog.fortinet.com/author/axelle-apvrille

https://twitter.com/cryptax/status/656812647061573632

https://twitter.com/cryptax/status/656950863676743680

https://twitter.com/cryptax/status/656953552234020864

https://www.framadrive.org/index.php/s/7Xal6WfggnFxSFY

http://www.forbes.com/sites/bradmoon/2015/10/21/fitbit-trackers-can-be-hacked-infect-pcs/
: Germany investigating NSA and British partner GCHQ on infected government laptop
: Letsbereal October 27, 2015, 12:34:21 PM
Germany is investigating involvement NSA and British partner GCHQ on infected government laptop
23 October 2015
, (Der Spiegel)
(Google trans from German) http://tinyurl.com/nb4rykj

ORG http://www.spiegel.de/spiegel/vorab/neues-ermittlungsverfahren-wegen-us-spaehangriff-a-1059313.html


: USB stick German Chancellor was infected with Regin-malware
: Letsbereal October 27, 2015, 02:21:22 PM
USB stick German Chancellor was infected with Regin-malware
(google trans from German) http://tinyurl.com/na6veba

ORG http://www.bild.de/bild-plus/politik/inland/cyberkriminalitaet/virus-im-kanzleramt-39127042

Regin: Top-tier espionage tool enables stealthy surveillance
http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance
: Hacking Team launches new spy software for governments
: Letsbereal October 31, 2015, 02:11:27 PM
Hacking Team Is Back with a Bold Pitch to Police
30 October 2015
, by Lorenzo Franceschi-Bicchierai - Staff Writer (Motherboard Vice)
http://motherboard.vice.com/read/hacking-team-is-back-with-a-bold-pitch-to-police


Hacking Team Commercial https://www.youtube.com/watch?v=R63CRBNLE2o
Apr 21, 2013 viewsdesk's channel


Hacking Team hacked, attackers claim 400GB in dumped data
5 July 2015
, (CSO Online)
http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html

Firm made famous for helping governments spy on their citizens left exposed
: Re: HACKING ATTACKS
: Letsbereal November 01, 2015, 03:59:28 PM
UK police make third arrest over TalkTalk cyber attack
31 October 2015
, London (Reuters)
http://www.reuters.com/article/2015/10/31/us-talktalk-cyberattack-idUSKCN0SP16H20151031

Boy, 15, arrested in Northern Ireland over TalkTalk cyber-attack
27 October 2015
, by Ben Quinn and Miles Brignall (The Guardian)
http://www.theguardian.com/business/2015/oct/26/talktalk-cyber-attack-boy-15-arrested-in-northern-ireland

Website attack affecting our customers
22 October 2015
, (Talk Talk)
http://help2.talktalk.co.uk/oct22incident

TalkTalk – could this be an extortion attack?
23 October 2015
, by Kamal Ahmed (BBC News)
http://www.bbc.com/news/business-34613137

Fraud threat to millions of TalkTalk customers
27 February 2015
, by Miles Brignall (The Guardian)
http://www.theguardian.com/money/2015/feb/27/threat-to-millions-of-talktalk-customers
: Re: HACKING ATTACKS
: Letsbereal November 04, 2015, 04:31:39 PM
Hacking Team Is Back: Security Now 532 https://www.youtube.com/watch?v=XGTwLLdT2tA

Nov 3, 2015 TWiT Netcast Network
: Re: HACKING ATTACKS
: Letsbereal November 07, 2015, 10:48:49 PM
CIA Email Hackers Return With Major Law Enforcement Breach
6 November 2015
, by Kim Zetter (Wired)
http://www.wired.com/2015/11/cia-email-hackers-return-with-major-law-enforcement-breach/
: Re: HACKING ATTACKS
: Letsbereal November 10, 2015, 05:51:51 PM
JPMorgan Summer Hack: What We Know https://www.youtube.com/watch?v=Jsu8qml6D-g

Nov 10, 2015 Bloomberg Business
: Re: HACKING ATTACKS
: Letsbereal November 12, 2015, 07:30:54 PM
Crackas With Attitude hack US arrest database https://www.youtube.com/watch?v=sXOqFXX7Eyc

Nov 12, 2015 RT America
: Re: HACKING ATTACKS
: Letsbereal November 13, 2015, 08:21:26 PM
Hired-gun hacking played key role in JPMorgan, Fidelity breaches
13 November 2015
, by Jim Finkle and Joseph Menn - New York/San Francisco (Reuters)
http://www.reuters.com/article/2015/11/13/us-hacking-indictment-outsourcing-idUSKCN0T22E920151113

When U.S. prosecutors this week charged two Israelis and an American fugitive with raking in hundreds of millions of dollars in one of the largest and most complex cases of cyber fraud ever exposed, they also provided an unusual look into the burgeoning industry of criminal hackers for hire.


So no Russians involved at all as was proclaimed earlier ::)
: Anonymous hackers declare war on Islamic State after Paris attacks
: Letsbereal November 16, 2015, 04:48:41 PM
Anonymous hackers declare war on Islamic State after Paris attacks http://www.trust.org/item/20151116121608-pc0fa/

Anonymous | OpParis [ENG]

from Anonymous Italy: https://youtu.be/g-qGl4mVTuY (3:09)

Message des Anonymous suites aux attentats de Paris le 13 novembre 2015

from Anonymous Chambery: https://youtu.be/TXOrgKiSvUo (2:29)
: Re: HACKING ATTACKS
: Letsbereal November 18, 2015, 10:49:39 AM
Cyber Wars: US govt failing to address hacking attacks - report https://www.youtube.com/watch?v=9oIMiRLzj24

Nov 18, 2015 RT
: Re: HACKING ATTACKS
: Letsbereal November 23, 2015, 02:18:32 PM
Damballa discovers new toolset linked to Destover - Attacker’s arsenal helps them to broaden attack surface
18 November 2015
, by Willis McDonald, Sr. Threat Researcher and Loucif Kharouni, Sr. Threat Researcher (Damballa)
https://www.damballa.com/damballa-discovers-new-toolset-linked-to-destover-attackers-arsenal-helps-them-to-broaden-attack-surface/
: Re: HACKING ATTACKS
: Letsbereal November 28, 2015, 08:07:53 AM
A hack could cost a company its credit rating
25 November 2015
, by Priya Anand (MarketWatch)
http://www.marketwatch.com/story/a-hack-could-cost-a-company-its-credit-rating-2015-11-25
: Re: HACKING ATTACKS
: Letsbereal November 29, 2015, 01:06:24 AM
One of the Largest Hacks Yet Exposes Data on Hundreds of Thousands of Kids
27 November 2015
, by Lorenzo Franceschi-Bicchierai (Motherboard Vice)
http://motherboard.vice.com/read/one-of-the-largest-hacks-yet-exposes-data-on-hundreds-of-thousands-of-kids


Statement vtech https://www.vtech.com/en/press_release/2015/statement/
: Re: HACKING ATTACKS
: Letsbereal November 29, 2015, 01:20:29 AM
IP leak affecting VPN providers with port forwarding - Vulnerability “Port Fail” reveals real IP address
26 November 2015
, (Perfect Privacy)
https://www.perfect-privacy.com/blog/2015/11/26/ip-leak-vulnerability-affecting-vpn-providers-with-port-forwarding/
: Re: HACKING ATTACKS
: Letsbereal December 03, 2015, 09:28:59 AM
GCHQ accused of 'persistent' illegal hacking at security tribunal
1 December 2015
, by Owen Bowcott (The Guardian)
http://www.theguardian.com/uk-news/2015/dec/01/gchq-accused-of-persistent-illegal-hacking-at-security-tribunal

UK government monitoring station admits hacking devices for the first time during case brought by Privacy International and internet service providers.

RESPONDENTS’ RESPONSE TO CLAIMANTS’ SCHEDULE https://privacyinternational.org/sites/default/files/Schedule_Of_Public_Statements_CNE_Final.pdf
: Re: HACKING ATTACKS
: Letsbereal December 04, 2015, 11:09:16 AM
Ponmocup – A giant hiding in the shadows
2 December 2015
, by Maarten van Dantzig (Ponmocup )
http://blog.fox-it.com/2015/12/02/ponmocup-a-giant-hiding-in-the-shadows/
: Re: HACKING ATTACKS
: Letsbereal December 05, 2015, 11:24:27 AM
Europol and Microsoft disrupt Dorkbot botnet

EUROPOL WORKS WITH INTERNATIONAL PARTNERS TO TARGET DORKBOT BOTNET
4 December 2015
, The Hague, the Netherlands (Europol)
https://www.europol.europa.eu/content/europol-works-international-partners-target-dorkbot-botnet

Microsoft assists law enforcement to help disrupt Dorkbot botnets
3 December 2015
, (Technet Blogs)
http://blogs.technet.com/b/mmpc/archive/2015/12/03/microsoft-assists-law-enforcement-to-help-disrupt-dorkbot-botnets.aspx

Win32/Dorkbot http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Win32/Dorkbot
: Re: HACKING ATTACKS
: Letsbereal December 06, 2015, 09:19:50 AM
VTech hack exposes ID theft risk in connecting kids to Internet
6 December 2015
, by Jim Finkle and Jeremy Wagstaff - Boston/Singapore (Reuters)
http://uk.reuters.com/article/us-vtech-cyberattack-kids-analysis-idUKKBN0TP0FQ20151206
: Re: HACKING ATTACKS
: Letsbereal December 12, 2015, 01:02:38 PM
More than a million OPM hack victims still not notified
11 December 2015
, by Dustin Volz - Washington (Reuters)
http://www.reuters.com/article/us-usa-cybersecurity-opm-idUSKBN0TU2NI20151211
: Anonymous Just Declared War Against Donald Trump
: Letsbereal December 12, 2015, 01:12:25 PM
Anonymous Just Declared War Against Donald Trump
11 December 2015
, (U.S. Uncut)
http://usuncut.com/resistance/anonymous-begins-optrump/


So it's clear now there is a secret service agency behind Anonymous but which one?

My best guess would be the usual suspect Mossad/ISIS.


Trump Tells GOP Jews: You Won't Support Me Because I Don’t Want Your Money http://www.haaretz.com/world-news/1.689953
: Re: HACKING ATTACKS
: Letsbereal December 17, 2015, 05:14:40 PM
Even security companies are vulnerable to hacks
16 December 2015
, by Priya Anand (MarketWatch)
http://www.marketwatch.com/story/even-security-companies-are-vulnerable-to-hacks-2015-12-16
: Twitter Told a Bunch of Users They May Be Targets of a 'State Sponsored Attack'
: Letsbereal December 20, 2015, 01:43:37 AM
Twitter Told a Bunch of Users They May Be Targets of a 'State Sponsored Attack'
11 December 2015
, by Sarah Jeong (Motherboard)
http://motherboard.vice.com/read/twitter-told-a-bunch-of-users-they-may-be-targets-of-a-state-sponsored-attack

We received a warning from @twitter today stating we may be "targeted by state-sponsored actors" https://twitter.com/coldhakca/status/675443513367007232
: Re: HACKING ATTACKS
: Letsbereal December 22, 2015, 04:53:39 AM
CVE-2015-7755: Juniper ScreenOS Authentication Backdoor
20 December 2015
, by hdmoore Employee in Information Security (Rapid7 Community)
https://community.rapid7.com/community/infosec/blog/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor

IMPORTANT JUNIPER SECURITY ANNOUNCEMENT. CUSTOMER UPDATE: DECEMBER 20, 2015
http://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554

The NSA has targeted Juniper firewalls in the past
17 December 2015
, by Jeremy Kirk Follow (CIO)
http://www.cio.com/article/3016839/security/juniper-warns-of-spying-code-in-firewalls.html

First on CNN: Newly discovered hack has U.S. fearing foreign infiltration
19 December 2015
, by Evan Perez and Shimon Prokupecz (CNN)
http://edition.cnn.com/2015/12/18/politics/juniper-networks-us-government-security-hack/
: Re: HACKING ATTACKS
: Letsbereal December 22, 2015, 05:05:29 AM
Database leak exposes 3.3 million Hello Kitty fans
19 December 2015
, by Steve Ragan (CSO)
http://www.csoonline.com/article/3017171/security/database-leak-exposes-3-3-million-hello-kitty-fans.html

Database leak exposes 3.3 million Hello Kitty fans
20 December 2015
, by Dissent (Data Breaches)
http://www.databreaches.net/database-leak-exposes-3-3-million-hello-kitty-fans/

FAQ about Data Breach on VTech Learning Lodge (last updated: 16:00, December 18, 2015, HKT) https://www.vtech.com/en/press_release/2015/faq-about-data-breach-on-vtech-learning-lodge/
: Re: HACKING ATTACKS
: Letsbereal December 25, 2015, 03:22:20 AM
Hyatt says malware attack targeted cardholder data
24 December 2015
, by Robin Sidel (MarketWatch)
http://www.marketwatch.com/story/hyatt-says-malware-attack-targeted-cardholder-data-2015-12-24

Hyatt Hotels Corp. said an attack on its computer system targeted key data stored on payment cards, but it is still investigating details about the cyberintrusion.

The hotel chain also said it discovered the malware on Nov. 30.

The company’s statements followed its disclosure Wednesday that it had recently identified malicious software on computers that operate its payment-processing systems.

The incident affected properties owned by Hyatt H, -2.35% but not those that are owned by franchisees, the company said.

A company spokeswoman said in an email Thursday that the malware targeted data such as cardholder name, card number, expiration date and the security code.
: Re: HACKING ATTACKS
: Letsbereal December 25, 2015, 06:10:51 AM
Vulnerability with cable Vodafone Germany endangered a million cable customers (Google trans from German) http://tinyurl.com/zg944qo

ORG http://www.heise.de/newsticker/meldung/Fatales-Sicherheitsleck-bei-Kabel-Deutschland-Vodafone-bedrohte-Millionen-Kabel-Kunden-3054052.html
: Re: HACKING ATTACKS
: Letsbereal December 25, 2015, 06:13:55 AM
CVE-2015-7755: Juniper ScreenOS Authentication Backdoor
20 December 2015
, by hdmoore Employee in Information Security (Rapid7 Community)
https://community.rapid7.com/community/infosec/blog/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor

IMPORTANT JUNIPER SECURITY ANNOUNCEMENT. CUSTOMER UPDATE: DECEMBER 20, 2015
http://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554

The NSA has targeted Juniper firewalls in the past
17 December 2015
, by Jeremy Kirk Follow (CIO)
http://www.cio.com/article/3016839/security/juniper-warns-of-spying-code-in-firewalls.html

First on CNN: Newly discovered hack has U.S. fearing foreign infiltration
19 December 2015
, by Evan Perez and Shimon Prokupecz (CNN)
http://edition.cnn.com/2015/12/18/politics/juniper-networks-us-government-security-hack/

NSA and the British GCHQ working together on Hacking Juniper equipment https://www.documentcloud.org/documents/2653542-Juniper-Opportunity-Assessment-03FEB11-Redacted.html
: Re: HACKING ATTACKS
: Letsbereal December 30, 2015, 05:32:08 PM
191 million voters’ personal info exposed by misconfigured database (UPDATED)
28 December 2015
, (Data Breaches)
http://www.databreaches.net/191-million-voters-personal-info-exposed-by-misconfigured-database/
: Re: HACKING ATTACKS
: Letsbereal December 31, 2015, 07:24:17 AM
Microsoft to warn users of suspected hacks by governments
30 December 2015
, by Don Clark (MarketWatch)
http://www.marketwatch.com/story/microsoft-to-warn-users-of-suspected-hacks-by-governments-2015-12-30

Email, cloud users will be alerted if cyberattack appears to be ‘state-sponsored’.
: Web attack knocks BBC websites offline
: Letsbereal December 31, 2015, 08:52:19 AM
Web attack knocks BBC websites offline
31 December 2015
, 2 hours ago (BBC News)
http://www.bbc.com/news/technology-35204915
: Microsoft failed to warn victims of Chinese email hack: former employees
: Letsbereal December 31, 2015, 09:56:39 AM
Microsoft failed to warn victims of Chinese email hack: former employees
31 December 2015
, by Joseph Menn - San Francisco (Bloomberg)
http://www.reuters.com/article/us-microsoft-china-insight-idUSKBN0UE01Z20151231
: Re: HACKING ATTACKS
: Letsbereal January 06, 2016, 09:36:21 AM
Hacker publishes cracking tool for certain UPC wireless routers https://twitter.com/bl4sty/status/682700464861900800

code https://haxx.in/upc_keys.c

https://www.usenix.org/system/files/conference/woot15/woot15-paper-lorente.pdf
: Re: HACKING ATTACKS
: Letsbereal January 06, 2016, 11:43:39 AM
'Anti-IS group' claims BBC website attack
2 January 2016
, (BBC News)
http://www.bbc.com/news/technology-35213415
: Re: HACKING ATTACKS
: Letsbereal January 06, 2016, 02:57:37 PM
"Power failure in Ukraine was caused by targeted malware deployment '

http://arstechnica.com/security/2016/01/first-known-hacker-caused-power-outage-signals-troubling-escalation/

https://www.f-secure.com/documents/996508/1030745/blackenergy_whitepaper.pdf

http://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/
: Re: HACKING ATTACKS
: Letsbereal January 06, 2016, 03:01:48 PM
Hosting Company Linode resets passwords after possible hacking attack

https://blog.linode.com/2016/01/05/security-notification-and-linode-manager-password-reset/

https://news.ycombinator.com/item?id=10845985

http://status.linode.com/incidents/mmdbljlglnfd

http://status.linode.com/incidents/dpdldmhgjbhl

https://www.pagerduty.com/blog/july-2015-security-announcement/
: Re: HACKING ATTACKS
: Effie Trinket January 06, 2016, 04:57:56 PM
ALL hacking attacks are inside jobs perpetrated by US "intel" agencies and treasonous privatized military industrial complex corporations called "defense" contractors (who should really be called "warcrime contractors"). NWO criminal universities like Carnegie Mellon, MIT and GMU are some that are also fully complicit in this as they developed much of the technology used to create false flag attacks against computer/electronic systems, and blame fake, non-existent enemies for their treason and warcrimes.

: Re: HACKING ATTACKS
: Letsbereal January 15, 2016, 05:28:09 PM
How Hackers Took Down a Power Grid - Ukraine was an easy target—but the U.S. has its own weaknesses.
14 January 2016
, by Jordan Robertson and Michael Riley (Bloomberg)
http://www.bloomberg.com/news/articles/2016-01-14/how-hackers-took-down-a-power-grid
: Re: HACKING ATTACKS
: Letsbereal January 30, 2016, 12:47:26 PM
HSBC Says Cyber Attack Continues to Disrupt Online Banking
29 January 2016
, by Stephen Morris (Bloomberg)
http://www.bloomberg.com/news/articles/2016-01-29/hsbc-says-cyber-attack-caused-online-personal-banking-failure
: Re: HACKING ATTACKS
: Letsbereal February 08, 2016, 09:18:56 PM
Russian Hackers Moved Ruble Rate With Malware, Group-IB Says
8 February 2016
, by Jake Rudnitsky and Ilya Khrennikov (Bloomberg)
http://www.bloomberg.com/news/articles/2016-02-08/russian-hackers-moved-currency-rate-with-malware-group-ib-says
: Re: HACKING ATTACKS
: Letsbereal February 10, 2016, 01:08:59 AM
Hackers Harpoon Japan Tax Agency Website in Whaling Protest
10 February 2016
, by Shoko Oda (Bloomberg)
http://www.bloomberg.com/news/articles/2016-02-10/hackers-hit-two-more-japan-websites-amid-whale-hunting-protests


Read: Langley Harpoon Japan Tax Agency Website To Disrupt The Global Economy And Promote Draconian Cyber Laws
: Hacker Plans to Dump Alleged Details of 20,000 FBI, 9,000 DHS Employees
: Letsbereal February 11, 2016, 01:22:40 AM
Hacker Plans to Dump Alleged Details of 20,000 FBI, 9,000 DHS Employees
7 February 2016
, by Joseph Cox (Motherboard)
http://motherboard.vice.com/en_ca/read/hacker-plans-to-dump-alleged-details-of-20000-fbi-9000-dhs-employees

Hackers leak DHS staff directory, claim DOJ is next
7 February 2016
, by Steve Ragan (CSO)
http://www.csoonline.com/article/3030702/security/hackers-leak-dhs-staff-directory-claim-doj-is-next.html
: Re: HACKING ATTACKS
: windyacres February 11, 2016, 03:16:40 AM
Hacker Plans to Dump Alleged Details of 20,000 FBI, 9,000 DHS Employees

I'd like to read that data dump.
: Re: HACKING ATTACKS
: Letsbereal February 14, 2016, 08:10:26 PM
First on CNN: FBI, British police nab alleged 'crackas' hacker
11 February 2016
, by Evan Perez (CNN)
http://edition.cnn.com/2016/02/11/politics/fbi-british-police-crackas-hacker/index.html
: Re: HACKING ATTACKS
: Letsbereal February 17, 2016, 03:33:04 AM
Is There a Solution for DDoS Attacks? https://www.youtube.com/watch?v=qivSb8YnXuM

Feb 16, 2016 TWiT Netcast Network
: Re: HACKING ATTACKS
: windyacres February 18, 2016, 03:33:55 AM
Hollywood hospital hit with ransomware:
 Hackers demand $3.6 million as ransom


Ransomware has locked up a Hollywood hospital’s computers for over a week as hackers demand $3.6 million in ransom.

Computerworld
 Feb 15, 2016

No matter where you work, you don’t want to be told there is an “internal emergency” and you can’t use the computers, but that is precisely the situation at a Hollywood hospital which is a ransomware victim. The attacker demanded an exorbitant 9,000 bitcoin, which is roughly 3.6 million dollars, to unlock the computers.

Hollywood Presbyterian Medical Center President and CEO Allen Stefanek admitted the hospital is suffering from “significant IT issues and declared an internal emergency.” He declined to confirm the 9,000 BTC ransom to NBC4, calling the attack “clearly not malicious” but “random.”

A doctor who wished to remain anonymous told NBC Los Angeles the computer system has been locked up for over a week and the staff was “unable to pull up any patient records.” 911 patients who were not were diverted to other emergency rooms had to register the old-school way – on paper – the same goes for charting patients’ medical records.

Hospital departments have been forced to communicate via “jammed fax lines” and over the phone, added the unnamed staff doctor. “I was told that the hackers demanded 9,000 bitcoin be electronically sent to them, and in exchange, the hackers would send back the key codes to restore the system.”

Although Stefanek claimed the hospital has been “sporadically impacted” for over a week, one hospital tech said Radiation Oncology has been forbidden to turn on its computers and cannot treat patients.

A “full computer shutdown” means the staff can forget about using email and patients can forget about picking up x-rays, CT scans, lab work or other digital records on site; one frustrated woman told NBC the hospital told her it “was hacked,” while other patients are given no explanation as to the long delays in receiving care. The inability to access patient records was dubbed a “very dangerous” situation.

“Patient privacy has not been compromised,” added Stefanek. “At this time we have no evidence that any patient or employee information was subject to unauthorized access or extraction by the attacker.”

The type of ransomware has not been reported as law enforcement works to trace the attacker. Besides the FBI, the LAPD and a cyber forensic team are also investigating the ransomware attack.

Computer forensic expert Eric Robi told Fox 11 that he didn’t know why a hospital was targeted, but the attackers might think “it’s a greater sense of urgency because it’s a hospital and they’ll get payed.”

After analyzing cybersecurity and online privacy trends, the Online Trust Alliance (OTA) reported that cybercriminals are cherry-picking ransomware victims such as businesses with valuable data. Ransom demands are changing from “opportunistic extortion to being market-based;” OTA Executive Director Craig Spiezle explained, “Much like surge pricing for taxis, cybercriminals now target and calculate their ransomware pricing based on company size, market value and much more.”

Most security professionals predict ransomware attacks will only continue to increase. While you frequently hear not to pay extortion, Robi suggested “most of the time it’s cheaper to pay the ransom than to pay to fix the problem.”

http://www.computerworld.com/article/3032310/security/hollywood-hospital-hit-with-ransomware-hackers-demand-3-6-million-as-ransom.html


: Re: HACKING ATTACKS
: Letsbereal February 18, 2016, 02:34:25 PM
Police Arrest Second Alleged Member of Teen Group that Hacked CIA Director
18 February 2016
, by Lorenzo Franceschi-Bicchierai (Motherboard)
https://motherboard.vice.com/read/police-arrest-second-alleged-member-of-teen-group-that-hacked-cia-director
: U.S. Hacked Into Iran’s Critical Civilian Infrastructure For Massive Cyberattack
: Letsbereal February 21, 2016, 10:13:49 AM
U.S. Hacked Into Iran’s Critical Civilian Infrastructure For Massive Cyberattack, New Film Claims
16 February 2016
, by James Ball (BuzzFeed UK)
http://www.buzzfeed.com/jamesball/us-hacked-into-irans-critical-civilian-infrastructure-for-ma

U.S. Had Cyberattack Plan if Iran Nuclear Dispute Led to Conflict
16 February 2016
, by David E. Sanger and Mark Mazzetti - Berlin (The New York Times)
http://www.nytimes.com/2016/02/17/world/middleeast/us-had-cyberattack-planned-if-iran-nuclear-negotiations-failed.html

Zero Days (2016) https://www.berlinale.de/en/programm/berlinale_programm/datenblatt.php?film_id=201608480#tab=filmStills

: Re: HACKING ATTACKS
: Letsbereal February 24, 2016, 09:35:52 PM
Project Shield and Ddos Attacks https://www.youtube.com/watch?v=GywNF1LKUvc

Feb 24, 2016 TWiT Netcast Network
: Re: HACKING ATTACKS
: Letsbereal February 25, 2016, 11:28:42 AM
Google Wants to Save News Sites From Cyberattacks—For Free
24 February 2016
, by Andy Greenberg (Wired)
http://www.wired.com/2016/02/google-wants-save-news-sites-cyberattacks-free/

GOOGLE IDEAS BECOMES JIGSAW
16 February 2016
, by Eric Schmidt is the Executive Chairman of Alphabet Inc. (Medium)
https://medium.com/jigsaw/google-ideas-becomes-jigsaw-bcb5bd08c423#.l467prpar

uProxy https://www.uproxy.org/

Project Shield https://jigsaw.google.com/products/project-shield/

Digital Attack Map http://www.digitalattackmap.com/

Digital Attack Map- Gallary http://www.digitalattackmap.com/gallery/
: More than 11 million HTTPS websites imperiled by new decryption attack
: Letsbereal March 05, 2016, 01:04:39 PM
More than 11 million HTTPS websites imperiled by new decryption attack
1 March 2016
, by Dan Goodin (Ars Technica)
http://arstechnica.com/security/2016/03/more-than-13-million-https-websites-imperiled-by-new-decryption-attack/

Low-cost DROWN attack decrypts data in hours, works against TLS e-mail servers, too.

The DROWN Attack https://drownattack.com/

Test DROWN Attack https://test.drownattack.com/

TLS/SSL Server Supports SSLv2 https://www.rapid7.com/db/vulnerabilities/sslv2-and-up-enabled

[openssl-announce] OpenSSL Security Advisory https://mta.openssl.org/pipermail/openssl-announce/2016-March/000066.html
: Re: HACKING ATTACKS
: Letsbereal March 07, 2016, 10:46:15 PM
Chinese Hackers Break Into NY Fed, Steal $100 Million From Bangladesh Central Bank
7 March 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-03-07/chinese-hackers-break-ny-fed-steal-100-million-bangladesh-central-bank
: Re: HACKING ATTACKS
: Letsbereal March 10, 2016, 05:39:44 PM
The Incredible Story Of How Hackers Stole $100 Million From The New York Fed
10 March 2016
, by Tyler Durden (Zero hedge)
http://www.zerohedge.com/news/2016-03-10/incredible-story-how-hackers-stole-100-million-new-york-fed

$1 Billion Plot to Rob Fed Accounts Leads to Manila Casinos
9 March 2016
, by David Tweed and Arun Devnath (Bloomberg)
http://www.bloomberg.com/news/articles/2016-03-09/the-1-billion-plot-to-rob-fed-accounts-leads-to-manila-casinos
: Re: HACKING ATTACKS
: Letsbereal March 10, 2016, 08:36:31 PM
A Sentinel That Cuts Through Clutter
10 March 2016
, by Jeremy Kahn (Bloomberg)
http://www.bloomberg.com/news/articles/2016-03-10/network-security-u-k-startup-darktrace-logs-a-pattern-of-life
: Re: HACKING ATTACKS
: Letsbereal March 14, 2016, 03:57:35 AM
Anti-cyber-attack biz Staminus is cyber-attacked, mocked by card-leaking tormentors - Hackers leave 'tips when running a security company' memo
11 March 2016
, by John Leyden (The Register)
http://www.theregister.co.uk/2016/03/11/staminus_ddos_outage/

After an easy breach, hackers leave “TIPS WHEN RUNNING A SECURITY COMPANY” - DDoS protection firm Staminus apparently stored customers' credit card data in the clear.
11 March 2016
, by Sean Gallagher (Ars Technica)
http://arstechnica.com/security/2016/03/after-an-easy-breach-hackers-leave-tips-when-running-a-security-company/

Hackers Target Anti-DDoS Firm Staminus
11 March 2016,
(Krebs On Security)
http://krebsonsecurity.com/2016/03/hackers-target-anti-ddos-firm-staminus/
: Re: HACKING ATTACKS
: Letsbereal March 17, 2016, 06:04:54 PM
Hacker Group “Anonymous” Releases Trump’s Social Security, Phone Numbers
17 March 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-03-17/hacker-group-anonymous-releases-trumps-social-security-phone-numbers


Very clear now is that Anonymous=NSA.
: Re: HACKING ATTACKS
: Letsbereal March 23, 2016, 04:16:09 AM
Syrians Accused of Computer Hack That Prompted Stock Drop
22 March 2016
, by Jef Feeley (Bloomberg)
http://www.bloomberg.com/news/articles/2016-03-22/syrians-charged-with-computer-hacking-that-prompted-stock-drop


ahahah this is so ridiculous
: Re: HACKING ATTACKS
: Letsbereal March 24, 2016, 03:38:16 AM
Wireless mice leave billions at risk of computer hack, cyber security firm says https://www.youtube.com/watch?v=swqJJ81X9eI

Mar 23, 2016 Reuters
: Re: HACKING ATTACKS
: Letsbereal March 24, 2016, 06:01:00 PM
U.S. Charges Iranian Hackers in Wall Street Cyber-Attacks
24 March 2016
, by Erik Larson, Patricia Hurtado and Chris Strohm (Bloomberg)
http://www.bloomberg.com/news/articles/2016-03-24/u-s-charges-iranian-hackers-in-wall-street-cyberattacks-im6b43tt
: Re: HACKING ATTACKS
: Letsbereal March 29, 2016, 11:18:51 AM
Petya ransomware reportedly encrypts hard drives, manipulates operating system boot process
26 March 2016
, by Ian Ginos (Neowin)
http://www.neowin.net/news/petya-ransomware-reportedly-encrypts-hard-drives-manipulates-operating-system-boot-process
: Re: HACKING ATTACKS
: Letsbereal March 30, 2016, 09:51:33 AM
Hackers breach computer networks of some big U.S. law firms: WSJ
30 March 2016
, (Reuters)
http://www.reuters.com/article/us-hacking-law-firms-idUSKCN0WW09F

Hackers broke into the computer networks of some big U.S. law firms, including Cravath Swaine & Moore LLP and Weil Gotshal & Manges LLP, the Wall Street Journal reported on Tuesday.
: Re: HACKING ATTACKS
: Letsbereal April 05, 2016, 08:31:52 PM
Hospitals Hacked Despite Warnings of Flaw https://www.youtube.com/watch?v=WrLz_X1fZaI

Apr 5, 2016 Associated Press
: How to Hack an Election
: Letsbereal April 09, 2016, 09:50:37 AM
How to Hack an Election
31 March 2016
, by Jordan Robertson, Michael Riley and Andrew Willis (Bloomberg)
http://www.bloomberg.com/features/2016-how-to-hack-an-election/

Andrés Sepúlveda rigged elections throughout Latin America for almost a decade. He tells his story for the first time.
: Re: HACKING ATTACKS
: Letsbereal April 10, 2016, 02:24:31 PM
Cyber fraudsters reap $2.3 billion through email wire-transfer scams
7 April 2016
, by Jim Finkle - Boston (Reuters)
http://www.reuters.com/article/us-cyber-fraud-email-idUSKCN0X505U
: Hacking Risks Found in U.S. Army's $12 Billion Mobile Network
: Letsbereal April 23, 2016, 03:12:13 PM
Hacking Risks Found in U.S. Army's $12 Billion Mobile Network
22 April 2016
, by Anthony Capaccio (Bloomberg)
http://www.bloomberg.com/news/articles/2016-04-22/hacking-risks-found-in-u-s-army-s-12-billion-mobile-network-inbhkur4
: Re: HACKING ATTACKS
: Letsbereal April 25, 2016, 03:35:04 PM
Computer Virus Discovered In German Nuclear Power Plant
25 April 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-04-25/computer-virus-discovered-german-nuclear-power-plant
: Re: HACKING ATTACKS
: Letsbereal April 27, 2016, 01:06:17 PM
German Nuclear Power Plant Confirms It Was Infected With Computer Viruses
27 April 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-04-27/german-nuclear-power-plant-confirms-it-was-infected-computer-viruses
: Re: HACKING ATTACKS
: Letsbereal April 27, 2016, 03:02:02 PM
Qatar National Bank Says Investigating Alleged Account Data Hack
27 April 2016
, by Mohammed Sergie (Bloomberg)
http://www.bloomberg.com/news/articles/2016-04-27/qatar-national-bank-says-investigating-alleged-account-data-hack
: Re: HACKING ATTACKS
: Letsbereal April 28, 2016, 02:51:27 PM
Goldcorp, Hit by Hackers, Investigates Scope of Data Breach
28 April 2016
, by Danielle Bochove, Jordan Robertson and Gerrit De Vynck (Bloomberg)
http://www.bloomberg.com/news/articles/2016-04-28/goldcorp-confirms-data-breach-and-starts-investigation
: GhostShell, On the Record – Anonymous
: Letsbereal April 30, 2016, 01:19:40 AM
GhostShell, On the Record – Anonymous
15 March 2016
, (Data Breaches)
http://www.databreaches.net/ghostshell-on-the-record-anonymous/

This post is part of an extended interview conducted by DataBreaches.net and CyberWarNews.info with the hacker formerly known as “GhostShell.”

In talking about #OpRomania, GhostShell characterized Anonymous as a “flawed concept.” We asked GhostShell, who still considers himself a member of Anonymous, why he considers it a flawed concept. He explained:

To me there are two main sides in Anonymous. One of them is comprised of millions of individuals that band together under the same umbrella voicing their own opinions on different matters while the second one is made up almost entirely of feds, paid trolls, researchers, informants and entrapped hackers.

The first collective believes that Anonymous is not a group but an idea, that it doesn’t have any leaders or official voice. The latter is basically the exact opposite.

I’m sure you’ve noticed from time to time certain accounts telling others that this person or collective is “not the real anonymous”, “theyre not real anons”. Even in the media it’s being mentioned quite often.

For anyone that’s been to one of these networks they know already that in every op there are leaders running the op, there are those that handle the hacking and those that are forever present, never having or doing anything directly themselves instead just telling the ones that are, how to do it.

It’s the exact procedure as with building and entrapping separate hacker groups. You either follow in line or get out. And if you’re strong enough to stick and follow through with your op you’re going to be discredited publicly or obfuscated. “That’s not the real official anonymous!”. Because we all know you need the super ultra chocolate coated delicious badge of anonymous that proves you’re an official member of the official anonymous group.

Entrapment is the word of the day … it’s gotten to a point where Anonymous is synonymous with the FBI and other agencies both stateside and abroad. Once a hacker gets caught they’re “gone”, they’re no longer able to join and do ops unless they’re doing it for other reasons, but with the feds the problem is they’re always there. They don’t leave the scene they just multiply.

So I think there’s a flaw in both the concept and the execution. In the concept because hackers get caught and removed but the feds and co. remain in a continuous cycle of misinformation. And in the execution because most people get tricked by them into thinking and doing various things.

In a later conversation where we asked if feds had tried to recruit him, GhostShell commented more on entrapment:

I’m pretty sure I lost count at how many times amerifeds and others tried to get me involved in different ops and projects and they even succeeded at times. You have to understand that the scene isn’t as big as people think and within it everyone knows everyone. It’s pretty hard to be a hacker and not get psyopd at least a few times.
: Re: HACKING ATTACKS
: Letsbereal May 02, 2016, 03:18:54 AM
British "Spies" Among Thousands Of names Exposed Following Massive Leak At Largest Mid-East Bank
1 May 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-05-01/british-spies-among-thousands-names-exposed-following-massive-leak-largest-mid-east-
: Re: HACKING ATTACKS
: Letsbereal May 03, 2016, 08:38:25 AM
Hacker Whose Virus Aided Bank Heists Gets Cooperation Reward
2 May 2016
, by Patricia Hurtado (Bloomberg)
http://www.bloomberg.com/news/articles/2016-05-02/hacker-whose-virus-aided-bank-heists-gets-cooperation-reward
: Re: HACKING ATTACKS
: Letsbereal May 10, 2016, 05:47:00 PM
Bangladesh Bank Heist Probe Said to Find Three Groups of Hackers
10 May 2016
, by Arun Devnath and Michael Riley (Bloomberg)
http://www.bloomberg.com/news/articles/2016-05-10/bangladesh-bank-heist-probe-said-to-find-three-groups-of-hackers
: Re: HACKING ATTACKS
: Letsbereal May 12, 2016, 10:10:02 AM
Ukraine site leaks personal info of 4K intl journos accused of ‘collaborating with terrorists’ https://www.youtube.com/watch?v=yNlw1AW5jGA

May 12, 2016 RT
: Re: HACKING ATTACKS
: Letsbereal May 13, 2016, 07:10:13 AM
Anonymous Takes 9 Central Banks Offline — Unleashes Massive Assault on ‘Global Banking Cartel’
9 May 2016
, by Jay Syrmopoulos (The Free Thought Project)
http://thefreethoughtproject.com/anonymous-fires-opening-massive-assault-global-banking-cartel/
: Re: HACKING ATTACKS
: Letsbereal May 13, 2016, 08:17:10 AM
'Guccifer' And The Kremlin's 20,000 Hacked Emails - In The Eye Of Hillary's Perfect Storm
13 May 2016
, by Andrew Napolitano - Lew Rockwell (Zero Hedge)
http://www.zerohedge.com/news/2016-05-12/guccifer-and-kremlins-20000-hacked-emails-eye-hillarys-perfect-storm

New Emails Reveal Hillary Clinton Used Unsecure Private Line To Talk With Top Aides
13 May 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-05-13/new-emails-reveal-hillary-clinton-used-unsecure-private-line-talk-top-aides
: Re: HACKING ATTACKS
: Letsbereal May 14, 2016, 04:58:48 AM
China Seen Boosting Cyber War Focus With Probes Against U.S.
13 May 2016
, by Anthony Capaccio (Bloomberg)
http://www.bloomberg.com/news/articles/2016-05-13/china-cyber-probes-show-electronic-warfare-focus-pentagon-says

Swift Warns of Hacker Attack on Bank After Bangladesh Heist
13 May 2016
, by Trista Kelley and Michael Riley (Bloomberg)
http://www.bloomberg.com/news/articles/2016-05-13/swift-warns-of-new-hacker-attack-on-bank-after-bangladesh-heist

Hackers Target Think Tanks to Get a Peek at U.S. Government Strategy
12 May 2016
, by Nafeesa Syeed (Bloomberg)
http://www.bloomberg.com/news/articles/2016-05-12/it-s-hackers-versus-wonks-as-cybercriminals-seek-leg-up-on-u-s

Cisco Told to Pay $23.5 Million Over Hacker-Security Patents
12 May 2016
, by Jef Feeley and Christopher Yasiejko (Bloomberg)
http://www.bloomberg.com/news/articles/2016-05-12/cisco-told-to-pay-23-5-million-over-hacker-security-patents
: Re: HACKING ATTACKS
: Letsbereal May 16, 2016, 10:52:16 AM
Bitcoin Exchange Gatecoin Hacked; 250 BTC & 185,000 ETH Lost
16 May 2016
, by Elliot Maras (Crypto Coin News)
https://www.cryptocoinsnews.com/bitcoin-exchange-gatecoin-hacked-250-btc-185000-eth-lost/

Gatecoin, a Hong Kong-based digital currency startup that has cited segregated client accounts as a way to minimize exposure to risks, suffered a breach and lost 250 BTC and 185,000 ETH, 15% of its crypto asset deposits.
: Re: HACKING ATTACKS
: Letsbereal May 17, 2016, 05:25:00 AM
Vietnam Success Foiling Hack Shows Risk of Swift Connection
16 May 2016
, by John Boudreau (Bloomberg)
http://www.bloomberg.com/news/articles/2016-05-16/vietnam-bank-hacking-attempt-shows-weakness-of-swift-connection
: Another Day, Another Hack: 117 Million LinkedIn Emails And Passwords
: Letsbereal May 18, 2016, 10:09:37 AM
Another Day, Another Hack: 117 Million LinkedIn Emails And Passwords
18 May 2016
, by Lorenzo Franceschi-Bicchierai - Staff Writer (Motherboard)
http://motherboard.vice.com/en_ca/read/another-day-another-hack-117-million-linkedin-emails-and-password
: LinkedIn Re-Investigating 2012 Data Breach as Victim List Grows
: Letsbereal May 18, 2016, 09:33:38 PM
LinkedIn Re-Investigating 2012 Data Breach as Victim List Grows
18 May 2016
, by Jordan Robertson (Bloomberg)
http://www.bloomberg.com/news/articles/2016-05-18/linkedin-re-investigating-2012-data-breach-as-victim-list-grows

- Hacker selling e-mails, passwords of 117 million users

- Still determining how many accounts are ‘active and accurate’
: Re: HACKING ATTACKS
: Letsbereal May 19, 2016, 03:18:15 PM
REALIST NEWS - Anonymous (The Club?) hackers shut down Bank of England https://www.youtube.com/watch?v=JvDLvPQl6SM

May 19, 2016 jsnip4
: Re: HACKING ATTACKS
: Letsbereal May 20, 2016, 02:00:01 PM
Little Known Lawsuit Exposes Yet Another Major Cyberheist In 'Secure' Global Payments System
20 May 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-05-20/little-known-lawsuit-exposes-yet-another-major-cyberheist-secure-global-payments-sys
: Re: HACKING ATTACKS
: Letsbereal May 29, 2016, 10:15:22 PM
Oregon Senator Warns – Government Is Dramatically Expanding Its Hacking & Surveillance Authority
27 May 2016
, by Mike Krieger - Liberty Blitzkrieg (Zero Hedge)
http://www.zerohedge.com/news/2016-05-27/oregon-senator-warns-government-dramatically-expanding-its-hacking-surveillance-auth

How The Senate Just Took “A Hatchet To American Liberty”
28 May 2016
, by Mike Krieger - Liberty Blitzkrieg (Zero Hedge)
http://www.zerohedge.com/news/2016-05-28/how-senate-just-took-hatchet-american-liberty

: Re: HACKING ATTACKS
: Letsbereal June 02, 2016, 04:56:03 AM
The Fed Was Hacked More Than 50 Times Between 2011 And 2015
1 June 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-06-01/fed-was-hacked-more-50-times-between-2011-and-2015
: Meet Ability Inc – The Israeli Company That Wants To Hack Your Cellphone
: Letsbereal June 02, 2016, 06:59:05 PM
Meet Ability Inc – The Israeli Company That Wants To Hack Your Cellphone
2 June 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-06-02/meet-ability-inc-%E2%80%93-israeli-company-wants-hack-your-cellphone
: Re: HACKING ATTACKS
: Letsbereal June 03, 2016, 07:23:43 PM
Hacked: Seller of millions of personal details on darkweb says more to come https://www.youtube.com/watch?v=CxuPvpUgHJg

Jun 2, 2016 Channel 4 News
: Re: HACKING ATTACKS
: Letsbereal June 28, 2016, 08:18:57 PM
A Massive Botnet of CCTV Cameras Involved in Ferocious DDoS Attacks
27 June 2016
, by Catalin Cimpanu (Softpedia)
http://news.softpedia.com/news/a-massive-botnet-of-cctv-cameras-involved-in-ferocious-ddos-attacks-505722.shtml

All clues lead back to Chinese DVR vendor TVT

A botnet of over 25,000 bots lies at the heart of recent DDoS attacks that are ferociously targeting business around the world.

More exactly, we're talking about massive Layer 7 DDoS attacks that are overwhelming Web servers, occupying their resources and eventually crashing websites.
: Re: HACKING ATTACKS
: Letsbereal August 08, 2016, 06:33:57 AM
Delta Suspends All Flights "Due To System Outage Nationwide" With Computer Systems "Down Everywhere"
8 August 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-08-08/delta-suspends-all-flights-due-system-outage-nationwide-computer-systems-down-everyw
: Hacker Guccifer Puhlishes Complete Personal Info On 200 Congressional Democrats
: Letsbereal August 13, 2016, 09:10:31 AM
“Russian” Hacker Guccifer 2.0 Publishes Complete Personal Information Of 200 Congressional Democrats
13 August 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-08-12/russian-hacker-guccifer-20-publishes-complete-personal-information-200-congressional
: George Soros Hacked, Over 2,500 Internal Docs Released Online
: Letsbereal August 14, 2016, 10:23:28 PM
George Soros Hacked, Over 2,500 Internal Docs Released Online
14 August 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-08-14/george-soros-hacked-over-2500-internal-docs-released-online
: Re: HACKING ATTACKS
: Letsbereal August 16, 2016, 12:14:46 AM
Mysterious Group Hacks The NSA
15 August 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-08-15/mysterious-group-hacks-nsa
: Re: HACKING ATTACKS
: Letsbereal August 17, 2016, 12:45:00 AM
Edward Snowden Explains The Historic NSA Hack: "This Escalation Could Get Messy Fast"
16 August 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-08-16/edward-snowden-explains-historic-nsa-hack-escalation-could-get-messy-fast
: Re: HACKING ATTACKS
: Letsbereal August 18, 2016, 09:38:55 AM
"It’s Snowden Junior" - Former NSA Employees Say NSA Hack Is The Work Of A "Rogue Insider"
18 August 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-08-18/%E2%80%9Cit%E2%80%99s-snowden-junior-former-nsa-employees-say-nsa-hack-work-rogue-insider


Jason Bourne is live!: “Why Shouldn’t I Work for the NSA?” https://www.youtube.com/watch?v=UrOZllbNarw

(http://content.internetvideoarchive.com/content/photos/10473/113424_033.jpg)
: Re: HACKING ATTACKS
: Letsbereal August 18, 2016, 01:14:19 PM
The Biggest Hack Yet: Why A Leak Of Clinton Foundation Documents Is Imminent
18 August 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-08-18/biggest-hack-yet-why-leak-clinton-foundation-documents-may-be-imminent
: Soros got hacked. Can you guess what we found?
: Letsbereal August 18, 2016, 01:29:20 PM
Soros got hacked. Can you guess what we found? #NewWorldNextWeek https://www.youtube.com/watch?v=Gn-RvN54Eos

Aug 18, 2016 corbettreport
: "Evidence Points To Another Snowden At The NSA"
: Letsbereal August 22, 2016, 09:18:39 PM
"Evidence Points To Another Snowden At The NSA"
22 August 2016,
by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-08-22/evidence-points-another-snowden-nsa


Like said; Jason Bourne is Live!: “Why Shouldn’t I Work for the NSA?” https://www.youtube.com/watch?v=UrOZllbNarw


: Re: HACKING ATTACKS
: Letsbereal August 27, 2016, 10:08:59 PM
Russia Says Chinese Hackers Are Getting More Aggressive
25 August 2016
, by Stepan Kravchenko (Bloomberg)
http://www.bloomberg.com/news/articles/2016-08-25/russia-more-prey-than-predator-to-cyber-firm-wary-of-china

: Re: HACKING ATTACKS
: Letsbereal August 31, 2016, 09:11:54 PM
Hackers Stole Account Details for Over 60 Million Dropbox Users
30 August 2016
, by Joseph Cox (Motherboard)
http://motherboard.vice.com/read/hackers-stole-over-60-million-dropbox-accounts

Dropbox employee’s password reuse led to theft of 60M+ user credentials
30 August 2016
, by Kate Conger and Matthew Lynley (Tech Crunch)
https://techcrunch.com/2016/08/30/dropbox-employees-password-reuse-led-to-theft-of-60m-user-credentials/
: Re: HACKING ATTACKS
: Letsbereal August 31, 2016, 09:34:29 PM
Little Known Lawsuit Exposes Yet Another Major Cyberheist In 'Secure' Global Payments System
20 May 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-05-20/little-known-lawsuit-exposes-yet-another-major-cyberheist-secure-global-payments-sys

Exclusive: SWIFT discloses more cyber thefts, pressures banks on security
31 August 2016
, by Jim Finkle (Reuters)
http://www.reuters.com/article/us-cyber-heist-swift-idUSKCN11600C

SWIFT, the global financial messaging system, on Tuesday disclosed new hacking attacks on its member banks as it pressured them to comply with security procedures instituted after February's high-profile $81 million heist at Bangladesh Bank.
: Re: HACKING ATTACKS
: Letsbereal September 01, 2016, 01:31:17 PM
Romanian Hacker Who Exposed Hillary's Private Email Server Sentenced To 52 Months
1 September 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-09-01/romanian-hacker-who-exposed-hillarys-private-email-server-sentenced-52-months


That shows that Romania is a NWO puppet state.
: Re: HACKING ATTACKS
: Letsbereal September 09, 2016, 07:27:59 PM
Two Men Arrested for Allegedly Hacking Senior U.S. Government Officials
8 September 2016
, Alexandria, Va. (Department of Justice - U.S. Attorney’s Office - Eastern District of Virginia)
https://tweakers.net/nieuws/115513/fbi-arresteert-twee-vermeende-leden-crackas-with-attitude.html

Criminal Complaint: https://www.justice.gov/usao-edva/file/890421/download
: Re: HACKING ATTACKS
: Letsbereal September 14, 2016, 08:27:44 PM
Homeland Security Chair Claims He "Misspoke" - 'Russians' Did Not Hack RNC
14 September 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-09-14/russian-hackers-now-blamed-republican-cyberattack

This Is What The Democrats Did Immediately After Realizing They Were Hacked
14 September 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-09-14/what-democrats-did-immediately-after-realizing-they-were-hacked
: Re: HACKING ATTACKS
: Letsbereal September 16, 2016, 09:49:59 PM
A Dire Warning: "Someone Is Learning How To Take Down The Internet"
16 September 2016
, by Mike Krieger - Liberty Blitzkrieg (Zero Hedge)
http://www.zerohedge.com/news/2016-09-16/dire-warning-someone-learning-how-take-down-internet
: Re: HACKING ATTACKS
: Letsbereal September 18, 2016, 09:34:55 PM
Exclusive: Central banks seek global standards in wake of Bangladesh heist
15 September 2016
, by Jonathan Spicer and Tom Bergin - New York/London (Reuters)
http://www.reuters.com/article/us-cyber-heist-basel-taskforce-idUSKCN11L269

The world's major central banks, stung by this year's $81-million heist in Bangladesh, have launched a task force to consider setting broad rules to protect the vast network of cross-border banking from cyber attacks, according to two sources with knowledge of the matter.

Central banks confirm formed task force on payments fraud
16 September 2016
, (Reuters)
http://www.reuters.com/article/us-cyber-heist-basel-taskforce-idUSKCN11M1VM

A committee of the world's major central banks said on Friday it has launched a task force to examine cyber security in cross-border banking and to ensure interbank payments are protected, confirming an earlier Reuters report.
: Re: HACKING ATTACKS
: Letsbereal September 20, 2016, 04:42:08 AM
Email Hack Reveals Stephen Harper's Occult Connection https://www.youtube.com/watch?v=5A2z4LmwB90

Sep 19, 2016 Press For Truth

Colin Powell's email account has been hacked and it is now confirmed that leading Canadian politicians are actively engaging in the occult and occult practices.

In this video Dan Dicks of Press For Truth breaks down the latest hack and shows how Stephen Harper is involved with the Bohemian Grove.
: Re: HACKING ATTACKS
: Letsbereal September 21, 2016, 03:13:13 PM
Banks face wide range of cyber attacks | FT Business https://www.youtube.com/watch?v=nk-2DWWm4Vo

Sep 21, 2016 Financial Times
: Re: HACKING ATTACKS
: Letsbereal September 22, 2016, 08:16:56 AM
200 Million Yahoo User Accounts Hacked
22 September 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-09-22/200-million-yahoo-user-accounts-hacked
: Re: HACKING ATTACKS
: Letsbereal September 22, 2016, 09:38:32 PM
Yahoo Confirms Half A Billion User Accounts Hacked, Blames "State-Sponsored Actor" For Breach
22 September 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-09-22/yahoo-confirms-half-billion-user-accounts-hacked-blames-state-sponsored-actor-breach

White House Hacked: DC Leaks Releases New Emails Of White House Staffer
22 September 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-09-22/white-house-hacked-dc-leaks-releases-new-emails-white-house-staffer
: Yahoo's Record Breaking Data Breach
: Letsbereal September 28, 2016, 04:27:43 AM
Yahoo's Record Breaking Data Breach https://www.youtube.com/watch?v=q3EaUvET4AI

Sep 27, 2016 TWiT Netcast Network

Steve Gibson and Fr. Robert Ballecer talk about Yahoo's security breach affecting at least 500 million accounts. 

How long did Yahoo know about this breach and how did they handle the disclosure?

For the full episode, visit https://twit.tv/sn/579
: Yahoo Admits It Secretly Hacked All User Accounts For US Intelligence
: Letsbereal October 04, 2016, 08:32:11 PM
Yahoo Admits It Secretly Hacked All User Accounts For US Intelligence
4 October 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-10-04/yahoo-admits-secretly-hacking-customer-accounts-us-intelligence

Clinton Foundation Allegedly Hacked Exposing Thousands Of Donor Databases; "Pay To Play" Folder
4 October 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-10-04/clinton-foundation-hacked-exposing-thousands-donor-databases-pay-play-folder
: Re: HACKING ATTACKS
: Letsbereal October 15, 2016, 08:12:34 PM
Second hacker group targets SWIFT users, Symantec warns
11 October 2016
, by Jim Finkle (Reuters)
http://www.reuters.com/article/us-cyber-heist-malware-idUSKCN12B1L3

British banks keep cyber attacks under wraps to protect image
14 October 2016
, by Lawrence White - London (Reuters)
http://www.reuters.com/article/us-britain-banks-cyber-idUSKBN12E0NQ


All the banks keep cyber attacks under wraps!!!

: Europe Launches Largest "Cyber Wargame" In History
: Letsbereal October 16, 2016, 09:37:17 AM
Europe Launches Largest "Cyber Wargame" In History As Threat Of Cyber Terrorism Looms
15 October 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-10-15/europe-launches-largest-cyber-wargame-history-threat-cyber-terrorism-looms
: Re: HACKING ATTACKS
: Letsbereal October 16, 2016, 09:57:29 AM
YAHOO

Yahoo not to hold quarterly earnings call or webcast http://www.reuters.com/article/us-yahoo-earnings-call-idUSKBN12E251

Dozens of U.S. lawmakers request briefing on Yahoo email scanning http://www.reuters.com/article/us-yahoo-nsa-congress-idUSKBN12E1LI

Verizon says Yahoo hack 'material,' could affect deal http://www.reuters.com/article/us-verizon-yahoo-cyber-idUSKCN12D2PW

REUTERS 11-15 Oct.
: Veolia Steps Up Defense of Water Supplies Targeted by Hackers
: Letsbereal October 18, 2016, 06:55:30 PM
Veolia Steps Up Defense of Water Supplies Targeted by Hackers
18 October 2016
, by Francois De Beaupuy (Bloomberg)
http://www.bloomberg.com/news/articles/2016-10-18/veolia-steps-up-defense-of-water-supplies-targeted-by-hackers

We're Afraid of Getting Hacked, But We're Not Doing Much About It - "People are saying, ‘I’m not the DNC, I’m not Hillary’s campaign,'” says a pollster
18 October 2016
, by Max Chafkin (Bloomberg)
http://www.bloomberg.com/news/articles/2016-10-18/we-re-afraid-of-getting-hacked-but-we-re-not-doing-much-about-it

Nothing Brings Banks Together Like A Good Hack - Financial institutions are not inclined to share secrets. That's changing as savvy tech adversaries threaten to breach digital walls
18 October 2016
, by Edward Robinson (Bloomberg)
http://www.bloomberg.com/news/articles/2016-10-18/nothing-unites-banks-like-the-threat-of-hackers-and-cybercrime
: 'Russian Hacker' Arrested In Prague Last Week, Announcement "Tactically Delayed"
: Letsbereal October 19, 2016, 10:25:10 AM
'Russian Hacker' Arrested In Prague Last Week, Announcement "Tactically Delayed" Until Day Of US Debate
19 October 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-10-19/russian-hacker-arrested-prague-last-week-announcement-tactically-delayed-until-day-u
: Re: HACKING ATTACKS
: Letsbereal October 20, 2016, 12:10:53 PM
Trove of Stolen Data Is Said to Include Top-Secret U.S. Hacking Tools
19 October 2016
, by Scott Shane, Matt Apuzzo and Jo Becker (The New York Times)
http://www.nytimes.com/2016/10/20/us/harold-martin-nsa.html

With exploits for firewalls of Cisco and Fortinet.

N.S.A. Contractor Arrested in Possible New Theft of Secrets
5 October 2016
, by Jo Becker, Adam Goldman, Michael S. Schmidt and Matt Apuzzo (The New York Times)
http://www.nytimes.com/2016/10/06/us/nsa-leak-booz-allen-hamilton.html


Czech police arrest Russian tied to 2012 LinkedIn hack
19 October 2016
, (Reuters)
http://www.reuters.com/article/us-czech-usa-russia-cybercrime-idUSKCN12J0MV
: Re: HACKING ATTACKS
: Letsbereal October 20, 2016, 04:54:35 PM
The "Fact" That 17 Intelligence Agencies Confirmed Russia is Behind the Email Hacks Isn’t Actually…A "Fact"
20 October 2016
, by Mark Jeftovic - Rebooting Capitalism (Zero Hedge)
http://www.zerohedge.com/news/2016-10-20/fact-17-intelligence-agencies-confirmed-russia-behind-email-hacks-isn%E2%80%99t-actually%E2%80%A6a-f
: Re: HACKING ATTACKS
: Letsbereal October 21, 2016, 10:49:16 AM
"Enormous Cyber Attack" Takes Down Hundreds Of Websites: How To Track The Global Cyber War
21 October 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-10-21/enormous-cyber-attack-takes-down-hundreds-websites-how-track-global-cyber-war
: Re: HACKING ATTACKS
: Letsbereal October 21, 2016, 03:04:49 PM
DNS Cyber Attack Returns As Northeast Internet Traffic Grinds To A Crawl For Second Time
21 October 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-10-21/enormous-cyber-attack-takes-down-hundreds-websites-how-track-global-cyber-war
: Massive DDoS Attack on Dyn DNS
: Letsbereal October 21, 2016, 09:30:34 PM
Massive DDoS Attack on Dyn DNS https://www.youtube.com/watch?v=GUeeR4B6V_A

Oct 21, 2016 TWiT Netcast Network

Nicole Lee from Engadget joins Jason Howell and Megan Morrone to discuss the rolling DDoS that took down a number of top tier sites using a botnet of IoT devices.

Full episode can be seen at https://twit.tv/tnt/1625
: Re: HACKING ATTACKS
: Letsbereal October 22, 2016, 01:14:29 PM
NSA Whistleblower: US Intelligence Worker Likely Behind DNC Leaks, Not Russia
22 October 2016
, by Alice Salles - The Anti Media (Zero Hedge)
http://www.zerohedge.com/news/2016-10-22/nsa-whistleblower-us-intelligence-worker-likely-behind-dnc-leaks-not-russia
: Re: HACKING ATTACKS
: Letsbereal October 22, 2016, 03:50:04 PM
Mirai Botnet Linked to Dyn DNS DDoS Attacks
21 October 2016
, FP Analyst (Flash Attack)
https://www.flashpoint-intel.com/mirai-botnet-linked-dyn-dns-ddos-attacks/

How the Dyn DDoS attack unfolded
21 October 2016
, by Tim Greene (Network World)
http://www.networkworld.com/article/3134057/security/how-the-dyn-ddos-attack-unfolded.html

A massive botnet patched together and deployed around the world swamped regional DNS data centers.

Update Regarding DDoS Event Against Dyn Managed DNS
21 October 2016
, Incident Report for Dyn, Inc. (Dyn Status)
https://www.dynstatus.com/incidents/5r9mppc1kb77

https://www.dynstatus.com/incidents/nlr4yrr162t8

SYN flood https://en.wikipedia.org/wiki/SYN_flood
: Re: HACKING ATTACKS
: Letsbereal October 23, 2016, 04:22:50 PM
DDoS Attacks https://www.youtube.com/watch?v=MoIu3rKKI0g

Oct 23, 2016 TWiT Netcast Network

DDoS attacks on the internet. Leo Laporte and Florence Ion talk about what happened, what investigations are taking place, and what we suspect might happen in the future.

For the full episode, visit https://twit.tv/tnss/76
: Re: HACKING ATTACKS
: Letsbereal October 24, 2016, 09:40:42 AM
This Is The Chinese Firm Whose Cameras Took Down The Internet On Friday
24 October 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-10-24/chinese-firm-whose-cameras-took-down-internet-friday
: Re: HACKING ATTACKS
: Letsbereal October 24, 2016, 10:25:15 AM
China electronics firm to recall some U.S. products after hacking attack
24 October 2016
, (Reuters)
http://www.reuters.com/article/us-cyber-attacks-manufacturers-idUSKCN12O0MS

Chinese firm Hangzhou Xiongmai Technology Co Ltd said it will recall some of its products sold in the United States after it was identified by security researchers as having made parts for devices that were targeted in a major hacking attack on Friday.

Chinese firm admits its hacked products were behind Friday’s DDOS attack – Botnets created from the Mirai malware were involved in the cyberattack
23 October 2016
, by Michael Kan - IDG News Service (Computer World)
http://www.computerworld.com/article/3134097/security/chinese-firm-admits-its-hacked-products-were-behind-fridays-ddos-attack.html
: Re: HACKING ATTACKS
: Letsbereal October 24, 2016, 03:18:31 PM
Chinese Firm Behind Friday's Internet Outage Slams Critics, Threatens Western Accusers With Lawsuits
24 October 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-10-24/chinese-firm-behind-fridays-internet-outage-slams-critics-threatens-western-accusers

An IoT "Cannon" To "Bring Down The Web" Can Be Yours For Only $7,500
24 October 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-10-24/want-hack-planet-iot-cannon-bring-down-web-can-be-yours-7500
: AT&T Is Spying on Americans for Profit, New Documents Reveal
: Letsbereal October 25, 2016, 08:55:25 PM
AT&T Is Spying on Americans for Profit, New Documents Reveal
25 October 2016
, by Kenneth Lipp (The Daily Beast)
http://www.thedailybeast.com/articles/2016/10/25/at-t-is-spying-on-americans-for-profit.html

The telecom giant is doing NSA-style work for law enforcement—without a warrant—and earning millions of dollars a year from taxpayers.

The Phone Hackers at Cellebrite Have Had Their Firmware Leaked Online
25 October 2016
, by Joseph Cox (Motherboard)
https://motherboard.vice.com/read/the-phone-hackers-at-cellebrite-have-had-their-firmware-leaked-online

Snapchat, Skype put users' "human rights at risk," Amnesty Int'l reports
24 October 2016
, by Shanika Gunaratna (CBS News)
http://www.cbsnews.com/news/snapchat-skype-put-users-privacy-rights-at-risk-amnesty-international/
: Hacker forum members allegedly performed DDoS attack on Dyn
: Letsbereal October 26, 2016, 03:18:49 PM
An After-Action Analysis of the Mirai Botnet Attacks on Dyn
25 October 2016
, by Allison Nixon, John Costello and Zach Wikholm (Flashpoint)
https://www.flashpoint-intel.com/action-analysis-mirai-botnet-attacks-dyn/

New World Hackers https://twitter.com/NewWorldHacking/status/789507555563282432
 
The Jester (hacktivist) https://en.wikipedia.org/wiki/The_Jester_(hacktivist)

Mirai Botnet Linked to Dyn DNS DDoS Attacks
21 October 2016
, FP Analyst (Flashpoint)
https://www.flashpoint-intel.com/mirai-botnet-linked-dyn-dns-ddos-attacks/

Source Code for IoT Botnet ‘Mirai’ Released
1 October 2016
, (Krebs On Security)
https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/

James Clapper: Non-state actor likely to blame for massive cyberattack
25 October 2016
, by Brendan McDermid (Reuters - CBS News)
http://www.cbsnews.com/news/james-clapper-non-state-actor-likely-to-blame-for-massive-cyberattack/
: Investigative journalist warns of ‘censorship’ via DDoS attacks
: Letsbereal October 26, 2016, 03:23:00 PM
The Democratization of Censorship
25 September 2016
, (Krebs on Security)
https://krebsonsecurity.com/2016/09/the-democratization-of-censorship/
: DYN's Statement on Last Week's Botnet Attack
: Letsbereal October 27, 2016, 01:16:13 AM
DYN's Statement on Last Week's Botnet Attack https://www.youtube.com/watch?v=SZJHKgFxcpE

Oct 26, 2016 TWiT Netcast Network

Steve Gibson details what is known, how he found out the problem and DYN's statement on last week's powerful attack.

For the full episode, visit https://twit.tv/shows/security-now/episodes/583
: Re: AT&T Is Spying on Americans for Profit, New Documents Reveal
: Letsbereal October 27, 2016, 07:00:27 PM
AT&T Is Spying on Americans for Profit, New Documents Reveal
25 October 2016
, by Kenneth Lipp (The Daily Beast)
http://www.thedailybeast.com/articles/2016/10/25/at-t-is-spying-on-americans-for-profit.html

The telecom giant is doing NSA-style work for law enforcement—without a warrant—and earning millions of dollars a year from taxpayers.

US Taxpayers Pay AT&T Millions A Year For The Privilege Of Being Spied Upon
27 October 2016
, by Mike Krieger - Liberty Blitzkrieg (Zero Hedge)
http://www.zerohedge.com/news/2016-10-27/us-taxpayers-pay-att-millions-year-privilege-being-spied-upon
: Re: HACKING ATTACKS
: Letsbereal October 30, 2016, 08:35:08 PM
U.S. calls on automakers to make cyber security a priority http://www.reuters.com/article/us-autos-cyber-idUSKCN12O2JG

U.S. banking group forms unit aimed at reducing cyber risk http://www.reuters.com/article/us-banks-cyber-idUSKCN12O1VA

Companies urged to use multiple vendors in wake of cyber attack http://www.reuters.com/article/us-usa-cyber-companies-idUSKCN12O041

PayPal says some customers unable to make payments due to cyber attack on Dyn http://www.reuters.com/article/us-usa-cyber-paypal-idUSKCN12L2KR

REUTERS 21-24 Oct.
: Re: HACKING ATTACKS
: Letsbereal October 30, 2016, 11:01:23 PM
'Anonymous' Threatens North Dakota Governor After Pipeline Employees Caught Infiltrating Protests To Incite Violence
30 October 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-10-30/anonymous-threatens-north-dakota-governor-after-pipeline-employees-caught-infiltrati
: U.S. Govt. Hackers Ready to Hit Back If Russia Tries to Disrupt Election
: Letsbereal November 04, 2016, 11:20:05 PM
US Military Penetrates Russia's Electric Grid, New Executive Orders, Election PSYOPS https://www.youtube.com/watch?v=EVrEfgS39ok
Nov 4, 2016 DAHBOO77

U.S. military hackers have penetrated Russia's electric grid, telecommunications networks and the Kremlin's command systems, making them vulnerable to attack by secret American cyber weapons should the U.S. deem it necessary, according to a senior intelligence official and top-secret documents reviewed by NBC News.


U.S. Govt. Hackers Ready to Hit Back If Russia Tries to Disrupt Election
4 November 2016
, by Ken Dilanian, William M. Arkin and Cynthia McFadden (NBC News)
http://www.nbcnews.com/news/us-news/u-s-hackers-ready-hit-back-if-russia-disrupts-election-n677936

U.S. military hackers have penetrated Russia's electric grid, telecommunications networks and the Kremlin's command systems, making them vulnerable to attack by secret American cyber weapons should the U.S. deem it necessary, according to a senior intelligence official and top-secret documents reviewed by NBC News.


US Military Hackers Claim Penetration of Russian Infrastructure
5 November 2016
, (Sputnik)
https://sputniknews.com/us/201611051047089422-usa-penetration-russian-infrastructure/

US military hackers have penetrated Russia's electric grid, telecommunications networks and Kremlin's command systems, making them vulnerable to attack by secret American cyber weapons, according to a series of reports by a major US television network.


US government hackers ‘penetrate’ Russian electric grid and communication lines to be ‘ready’ in case of election day interference
5 November 2016
, by Rachael Revesz - New York (The Independent)
http://www.independent.co.uk/news/world/americas/us-government-military-hackers-dnc-homeland-security-nsa-clinton-election-day-a7398881.html

US officials are reportedly ‘very concerned' that a cyber breach could cause mass confusion and spread fake information about a ‘rigged system’ on 8 November.
: Re: HACKING ATTACKS
: Letsbereal November 05, 2016, 04:50:48 PM
US 'Military' Hackers "Prepare The Battlefield": Breach Russia's Backbone Ahead Of Possible Election Disruption
5 November 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-11-05/us-military-hackers-prepare-battlefield-breach-russias-backbone-ahead-possible-elect
: Re: HACKING ATTACKS
: Letsbereal November 05, 2016, 10:00:08 PM
Russia Threatens Retaliation If Washington Engages In "State Cyberterrorism"
5 November 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-11-05/russia-threatens-washington-if-it-engages-state-cyberterrorism

Excerpt:

Ironically, so far the only country with a record of conducting cyber-attacks on other nations is the US itself RT points out.

An operation called ‘Olympic Games,’ which was reportedly conducted by the US in corroboration with Israel, involved infecting the computer networks of Iranian uranium enrichment facilities with a computer virus that affected industrial controllers of centrifuges in order to destroy them.

The operation significantly damaged Iran’s production of nuclear fuel at the Natanz site.

Washington decided to go public about it after the virus, dubbed Stuxnet by the IT community, escaped and was identified by major cybersecurity companies.
: Re: HACKING ATTACKS
: Letsbereal November 10, 2016, 06:58:21 AM
Spy agency GCHQ investigates Tesco Bank cyber theft amid fears it was 'state sponsored'
8 November 2016
, by Ben Martin (The Telegraph)
http://www.telegraph.co.uk/business/2016/11/08/spy-agency-gchq-investigates-tesco-bank-cyber-theft/

Tesco has enlisted the help of spy agency GCHQ to assist its investigation of what is the most serious cyber attack ever launched against a British bank.

Tesco Bank says attack cost it £2.5m and hit 9,000 people
8 November 2016
, (BBC News)
http://www.bbc.com/news/business-37915755
: Re: HACKING ATTACKS
: Letsbereal November 15, 2016, 09:20:13 AM
Two major Russian banks say hit by cyber attacks
11 November 2016
, (Reuters)
http://www.reuters.com/article/us-russia-banks-cyber-idUSKBN1361XJ

Two of Russia's largest banks, Sberbank and Alfa Bank, say they have been hit by cyber attacks in recent days.
: Re: HACKING ATTACKS
: Letsbereal November 23, 2016, 06:45:45 PM
HP Enterprise Services Admits To Navy That 134,386 Sailors' Private Data Was Hacked
23 November 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-11-23/hp-enterprise-services-admits-navy-134386-sailors-private-data-was-hacked
: Re: HACKING ATTACKS
: Letsbereal November 28, 2016, 01:02:39 AM
Japan's defense ministry targeted in cyberattack in September: Kyodo https://www.youtube.com/watch?v=N1Pud_F3UyA

Nov 27, 2016 ARIRANG NEWS

It's emerged that Japan's defense ministry and its Self-Defense Forces were targeted in a cyberattack earlier this fall.

Kyodo News Agency reported Sunday, citing Japanese military officials, that the attack occurred in September, targeted multiple sites and information may have been leaked.

The ministry said the hackers are a well-organized group and potentially from another country.

The report said the defense information infrastructure that connects Self-Defense Forces bases and camps was subject to the attack.
: Re: HACKING ATTACKS
: Letsbereal November 29, 2016, 11:45:50 AM
San Francisco Rail System Hacker Hacked
29 November 2016
, (Krebs On Security)
https://krebsonsecurity.com/2016/11/san-francisco-rail-system-hacker-hacked/

The San Francisco Municipal Transportation Agency (SFMTA) was hit with a ransomware attack on Friday, causing fare station terminals to carry the message, “You are Hacked. ALL Data Encrypted.”

Turns out, the miscreant behind this extortion attempt got hacked himself this past weekend, revealing details about other victims as well as tantalizing clues about his identity and location.



Hackers Are Trading Hundreds of Thousands of xHamster Porn Account Details
28 November 2016
, by Joseph Cox (Motherboard)
http://motherboard.vice.com/read/hackers-are-trading-hundreds-of-thousands-of-xhamster-porn-account-details
: Re: HACKING ATTACKS
: Letsbereal November 29, 2016, 12:18:10 PM
German government blames Telekom problems on worldwide attack on DSL routers
28 November 2016
, Bonn (Bundesamt für Sicherheit in der Informationstechnik)
(Google trans from German) http://tinyurl.com/j5jku64

ORG https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2016/Angriff_Router_28112016.html
: Re: HACKING ATTACKS
: Letsbereal November 30, 2016, 01:47:52 AM
San Francisco Muni's Ransomware Hack https://www.youtube.com/watch?v=OaU4WMTL8TY

Nov 29, 2016 TWiT Netcast Network

San Francisco Muni could not take payments Saturday because of a cyber attack that knocked out their fare processing system.
: The FBI Used a 'Non-Public' Vulnerability to Hack Suspects on Tor
: Letsbereal November 30, 2016, 05:43:53 PM
The FBI Used a 'Non-Public' Vulnerability to Hack Suspects on Tor
29 November 2016
, (Motherboard)
http://motherboard.vice.com/read/the-fbi-used-a-non-public-vulnerability-to-hack-suspects-on-tor

When the FBI hacked thousands of computers related to a child porn investigation in 2015, the agency took advantage of a “non-publicly-known vulnerability,” according to a judge in a related case.
: FBI to gain expanded hacking powers as Senate effort to block fails
: Letsbereal December 01, 2016, 10:20:26 AM
FBI to gain expanded hacking powers as Senate effort to block fails
30 November 2016
, by Dustin Volz - Washington (Reuters)
http://www.reuters.com/article/us-usa-cyber-congress-idUSKBN13P2ER
: Re: HACKING ATTACKS
: Letsbereal December 01, 2016, 12:12:52 PM
Starting Today, Feds Can Hack Millions Of Devices With One Warrant
30 November 2016
, by Shaun Bradley - The Anti Media (Zero Hedge)
http://www.zerohedge.com/news/2016-11-30/starting-today-feds-can-hack-millions-devices-one-warrant
: Re: HACKING ATTACKS
: Letsbereal December 01, 2016, 12:46:39 PM
Another False Flag? "Destructive Iranian Hackers" Allegedly "Wreak Havoc" With Saudi Computer Systems
1 December 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-12-01/another-false-flag-destructive-iranian-hackers-allegedly-wreak-havoc-saudi-computer-
: Re: HACKING ATTACKS
: Letsbereal December 01, 2016, 01:10:17 PM
Massive Cyber Attack Hits More Than 900k Routers https://www.youtube.com/watch?v=JwdLB130xtY

Dec 1, 2016 DAHBOO77

More than 900,000 routers belonging to Deutsche Telekom users in Germany were not able to connect to the Internet due to an alleged cyber-attack.

The affected routers were used by the Deutsche Telekom customers also for fixed telephony and TV services.

The problems lasted at least two days, the outage began on Sunday, November 27, at around 17:00, local time.

Deutsche Telekom users all over the country were not able to connect online using the users provided by the company.
: Re: HACKING ATTACKS
: Letsbereal December 02, 2016, 10:14:46 PM
Another Big Cyber-Attack: UK Hit by Same Group That Broke Connections Worldwide https://www.youtube.com/watch?v=UNuuTvnSWOc

Dec 2, 2016 DAHBOO77

TalkTalk and other internet providers stopped providing connections to users after they were hit by a huge cyber attack.

The troubled internet provider has said that it – along with the Post Office and other internet providers across Europe – were hit by the Mirai worm and had their connections taken offline.

That worm is becoming increasingly dangerous. It was blamed for a huge internet outage earlier this year, and works by taking over a variety of unsecured internet devices and then pointing them at weak points in the web’s infrastructure.

This time it appears to have targeted a certain kind of router that is used both by the Post Office and TalkTalk, and so left customers of both companies unable to get online.

Learn More: http://www.independent.co.uk/life-style/gadgets-and-tech/news/internet-down-talktalk-cyber-attack-mirai-worm-routers-not-working-offline-a7451506.html


Hackers Hit Russia's Central Bank, Stealing More Than 2 Billion Rubles https://www.youtube.com/watch?v=5rCDap1RUd0

Dec 2, 2016 DAHBOO77

Hackers stole 2 billion rubles ($31.3 million) from correspondent bank accounts at Russia’s central bank, a spokeswoman at the central bank confirmed Friday, adding that the country was devising new measures to be prepared for further attacks.

“We can’t say exactly when, but we can say today it was stolen,” Ekaterina Glebova, an official in the central bank’s press office, told The Wall Street Journal.

The incident is the latest in a string of high-profile cyberattacks, including a $81 million theft in February from Bangladesh central bank’s account at the U.S. Federal Reserve Bank in New York and others in Vietnam and Ecuador.

The global money transfer network Swift was caught up in that theft, because the Fed acted on fraudulent, but authenticated payment instructions sent over the network.

Learn More: http://www.wsj.com/articles/hackers-steal-31-million-from-accounts-at-russian-central-bank-1480701080
: Re: HACKING ATTACKS
: Letsbereal December 03, 2016, 11:39:46 AM
Russian central bank loses $31 million in cyber attack
2 December 2016
, (Reuters)
http://www.reuters.com/article/us-russia-cenbank-cyberattack-idUSKBN13R1TO


Russia wary of 'state attack' through Dutch servers
2 December 2016
, (FSB)
(Google trans from Russian) http://tinyurl.com/jtje64c

ORG http://www.fsb.ru/fsb/press/message/single.htm%21id%3D10438041%40fsbMessage.html

The command and control server for this attack belong to the Ukrainian hosting company BlazingFast https://blazingfast.io/

BlazingFast check customers for involvement in the preparation of cyber attacks in the Russian Federation
2 December 2016
, Kiev (RIA Novosti)
(Google trans from Russian) http://tinyurl.com/zp7fjh2

ORG https://ria.ru/world/20161202/1482679038.html
: Re: HACKING ATTACKS
: Letsbereal December 08, 2016, 03:01:43 AM
Readers of popular websites targeted by stealthy Stegano exploit kit hiding in pixels of malicious ads
6 December 2016
, by ESET Research (ESET - We Live Security)
http://www.welivesecurity.com/2016/12/06/readers-popular-websites-targeted-stealthy-stegano-exploit-kit-hiding-pixels-malicious-ads/

Millions of readers who visited popular news websites have been targeted by a series of malicious ads redirecting to an exploit kit exploiting several Flash vulnerabilities.

Since at least the beginning of October, users might have encountered ads promoting applications calling themselves “Browser Defence” and “Broxu” using banners.


Researchers Find Fresh Fodder for IoT Attack Cannons
6 December 2016
, (Krebs on Security)
https://krebsonsecurity.com/2016/12/researchers-find-fresh-fodder-for-iot-attack-cannons/

SEC Consult Vulnerability Lab, a software testing firm based in Vienna, Austria https://www.sec-consult.com

Backdoor in Sony IPELA Engine IP Cameras
6 December 2016
, (SEC Consult)
http://blog.sec-consult.com/2016/12/backdoor-in-sony-ipela-engine-ip-cameras.html

SEC Consult Vulnerability Lab Security Advisory < 20161206-0 > https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20161206-0_Sony_IPELA_Engine_IP_Cameras_Backdoors_v10.txt

title: Backdoor vulnerability
product: Sony IPELA ENGINE IP Cameras
(multiple products, see Vulnerable / tested versions below)
vulnerable version: see Vulnerable / tested versions below
fixed version: see Vulnerable / tested versions below
CVE number: -
impact: Critical
homepage: https://pro.sony.com/bbsc/ssr/mkt-security/
found: 2016-10-08
by: Stefan Viehböck (Office Vienna)
SEC Consult Vulnerability Lab

An integrated part of SEC Consult
Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow
Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich
: Georgia Accuses Homeland Security Of Attempting To Hack States Election Database
: Letsbereal December 09, 2016, 03:09:04 AM
Georgia Accuses Homeland Security Of Attempting To Hack State's Election Database
8 December 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-12-08/georgia-accuses-homeland-security-attempting-hack-states-election-database
: Re: HACKING ATTACKS
: Letsbereal December 11, 2016, 03:58:43 AM
Multiple Netgear routers are vulnerable to arbitrary command injection
9 December 2016
, (CERT)
https://www.kb.cert.org/vuls/id/582384

Large-Scale Hacker Attack On German Steel Gigant Thyssenkrupp
8 December 2016
, by Jürgen Berke (Wirtschafts Woche)
(google trans from German) http://tinyurl.com/gmbb7qa

ORG http://www.wiwo.de/unternehmen/industrie/spionageangriff-auf-thyssenkrupp-grossalarm-haette-die-risiken-erhoeht/14948264.html


And now for the (FSM) Fake Stream Media:

Obama Orders Investigation Into Election-Related Hacking
9 December 2016
, by Chris Strohm (Bloomberg)
https://www.bloomberg.com/politics/articles/2016-12-09/obama-orders-investigation-into-election-related-hacking-attacks-iwhy9nww

Germany sees rise in Russian propaganda, cyber attacks
9 December 2016
, (Reuters)
http://in.reuters.com/article/germany-russia-idINKBN13X16C

An other 'False Flag' meme to justify a crack down on internet users.
: Re: HACKING ATTACKS
: Letsbereal December 11, 2016, 10:52:33 PM
If You Are For Peace, You Are A Russian Agent! http://www.zerohedge.com/news/2016-12-11/if-you-are-peace-you-are-russian-agent

Trump Blames Democrats For "Ridiculous" Russia Hacking Report http://www.zerohedge.com/news/2016-12-11/trump-slams-ridiculous-russia-hacking-report-accuses-democrats-being-behind-it

Ex-US Ambassador To Russia Calls For Labeling RT and Sputnik As "Foreign Agents" http://www.zerohedge.com/news/2016-12-11/ex-us-ambassador-russia-calls-labeling-rt-and-sputnik-foreign-agents

Judge Slams "Namby Pamby Pathetic Losers", Asks Obama "Why Are You Obsessed WIth Russia?" http://www.zerohedge.com/news/2016-12-11/judge-slams-namby-pamby-pathetic-losers-asks-obama-why-are-you-obsessed-russia

Former UK Ambassador Blasts "CIA's Blatant Lies", Shows "A Little Simple Logic Destroys Their Claims" http://www.zerohedge.com/news/2016-12-11/former-uk-ambassador-blasts-cias-blatant-lies-shows-little-simple-logic-destroys-the

Democratic Senator: Trump Cabinet Is Full Of "Goldman, Generals And Gazillionaires", Russia Hacking is "Form Of War" http://www.zerohedge.com/news/2016-12-11/democratic-senator-trump-cabinet-full-goldman-generals-and-gazillionaires-russia-hac

American sanctions are an act of war! And U.S. shooting depleted uranium is a crime against humanity.
: Re: HACKING ATTACKS
: JT Coyoté December 11, 2016, 11:13:55 PM
^^^^^^^^^^^^^^^^^^

Some great reading, there LBR, Thanks.

Oldyoti

"Power is not alluring to pure minds."
~Thomas Jefferson
: Re: HACKING ATTACKS
: egypt December 12, 2016, 01:21:24 AM


All this toil & broil.


http://www.crossroad.to/Quotes/brainwashing/2007/bezmenov.htm
...The demoralization process in [the] United States is basically completed already. For the last 25 years... actually, it's over-fulfilled because demoralization now reaches such areas where previously not even Comrade Andropov and all his experts would even dream of such a tremendous success.  Most of it is done by Americans to Americans, thanks to [a] lack of moral standards....

What he said then, is plain as day - now

https://www.youtube.com/watch?v=NkI-RYHETUk


I remember also that Yuri Brezmenov said about the communists  "...they don't go easy, you have to force them out..."

They're being forced out and they aren't going easily...

love, e[/size]
: Re: HACKING ATTACKS
: Letsbereal December 12, 2016, 02:26:29 AM
^^^^^^^^^^^^^^^^^^

Some great reading, there LBR, Thanks.

Oldyoti

"Power is not alluring to pure minds."
~Thomas Jefferson

TnX much appreciated. The U.S. is very hypocritical because as you can learn from this topic, by just scrolling a bit up, is that Russia is also hacked or even better who's not hacked? Everybody is hacking every one but I don't hear other nations complaining about that let alone accuse others of "acts of war". They still seem to think that we're all stupid and can't see trough their not very sophisticated lies, "Weapons of mass destruction", "The war on terror", "He's a Hitler" "If you're not with us you're against us" and the latest "They're all Soviet Agents".
: Re: HACKING ATTACKS
: Letsbereal December 12, 2016, 09:18:16 PM
White House Rejects "False Flag Conspiracies"; States Trump Called On Russia To Hack Clinton http://www.zerohedge.com/news/2016-12-12/white-house-states-trump-called-russia-hack-clinton-live-feed

Trump Slams "Conspiracy Theory" After John Bolton Suggests Russian Hack Was "False Flag" By Obama Administration http://www.zerohedge.com/news/2016-12-12/trump-state-nominee-john-bolton-suggests-russian-hack-was-false-flag-obama-administr

Ten Electoral College Electors Want Briefing On "Russian Interference" Before Presidential Vote http://www.zerohedge.com/news/2016-12-12/ten-electoral-college-electors-want-briefing-russian-interference-presidential-vote

FBI Disputes CIA's "Fuzzy And Ambiguous" Claims That Russia Sought To Influence Presidential Election http://www.zerohedge.com/news/2016-12-12/fbi-disputes-cias-fuzzy-and-ambiguous-claims-russia-sought-influence-presidential-el
: Trump's Wisconsin Victory Confirmed - Gained Net 162 Votes In Statewide Recount
: Letsbereal December 12, 2016, 09:49:26 PM
Trump's Wisconsin Victory Confirmed - Gained Net 162 Votes In Statewide Recount http://www.zerohedge.com/news/2016-12-12/trumps-wisconsin-victory-confirmed-gained-net-162-votes-statewide-recount

PA Judge Denies Recount And Blasts Stein's "Suspicions Of Hacking" That "Border On Irrational" http://www.zerohedge.com/news/2016-12-12/pa-judge-denies-recount-and-blasts-steins-suspicions-hacking-border-irrational

Clinton Campaign, Top Democrats Call For Intel Briefing, Commission Ahead Of Electoral College Vote http://www.zerohedge.com/news/2016-12-12/clinton-campaign-calls-intel-briefing-ahead-electoral-college-vote

Next time when these easy to rig voting machines are used nobody will question them. Very clever.
: Re: HACKING ATTACKS
: Letsbereal December 13, 2016, 01:15:37 AM
Top US Spy Agency Refuses To Endorse CIA's Russian Hacking Assessment Due To "Lack Of Evidence" http://www.zerohedge.com/news/2016-12-12/top-us-spy-agency-refuses-endorse-cias-russian-hacking-assessment-due-lack-evidence

FBI Disputes CIA's "Fuzzy And Ambiguous" Claims That Russia Sought To Influence Presidential Election http://www.zerohedge.com/news/2016-12-12/fbi-disputes-cias-fuzzy-and-ambiguous-claims-russia-sought-influence-presidential-el

Paul Joseph Watson Dismantles Fabricated Russian Narrative http://www.zerohedge.com/news/2016-12-12/paul-joseph-watson-dismantles-fabricated-russian-narrative-created-butt-hurt-leftist

There's A Psy-Op, All Right; But It Isn't "The Russians" http://www.zerohedge.com/news/2016-12-12/theres-psy-op-all-right-it-isnt-russians
: A Brilliantly Horrific New Ransomware Twist
: Letsbereal December 14, 2016, 01:25:35 AM
A Brilliantly Horrific New Ransomware Twist https://www.youtube.com/watch?v=1DZpT2EyuYw

Dec 13, 2016 TWiT Netcast Network
: Re: HACKING ATTACKS
: Letsbereal December 15, 2016, 03:32:46 AM
Georgia Confirms Homeland Security Attempted To Hack Election Database 10 Separate Times
14 December 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-12-14/georgia-confirms-homeland-security-attempted-hack-election-database-10-separate-time
: Re: HACKING ATTACKS
: Letsbereal December 15, 2016, 04:12:10 AM
Yahoo Admits Another Billion Accounts Hacked, Possibly By "State-Sponsored Actor"
14 December 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-12-14/yahoo-admits-another-billion-accounts-hacked-possibly-state-sponsored-actor
: FBI Said To Back CIA Assessment That Russia Intervened To Help Trump Win
: Letsbereal December 16, 2016, 08:10:31 PM
FBI Said To Back CIA Assessment That Russia Intervened To Help Trump Win http://www.zerohedge.com/news/2016-12-16/fbi-said-back-cia-assessment-russia-intervened-help-trump-win-wapo

The CIA Is Accusing Russia Of Doing Exactly What The CIA Does http://www.zerohedge.com/news/2016-12-15/cia-accusing-russia-doing-exactly-what-cia-does

NSA Whistleblower Destroys Obama's Russia Narrative - "Hard Evidence Points To An Inside Leak, Not Hacking" http://www.zerohedge.com/news/2016-12-16/nsa-whistleblower-destroys-obamas-russia-narrative-hard-evidence-points-inside-leak-

Julian Assange Crushes Obama Narrative: "Our Source Is Not The Russian Government" http://www.zerohedge.com/news/2016-12-16/julian-assange-crushes-obama-narrative-our-source-not-russian-government

Trump Doubles Down: "Are We Talking About Same Cyberattack That Revealed Illegal DNC Coordination" http://www.zerohedge.com/news/2016-12-16/trump-doubles-down-are-we-talking-about-same-cyberattack-revealed-illegal-dnc-coordi


Obama Blames Russia For Hacking, Slams "Domestic Propagandists" For Rise Of "Fake News" http://www.zerohedge.com/news/2016-12-16/obama-blames-russia-hacking-slams-domestic-propagandists-rise-fake-news

Will President Obama Declare Cyber-War On Russia (Or Real War On China)? - Press Conference Live Feed http://www.zerohedge.com/news/2016-12-16/will-president-obama-declare-cyber-war-russia-or-real-war-china-press-conference-liv

Obama Told Putin To "Cut It Out" On Hacking http://www.zerohedge.com/news/2016-12-16/obama-told-putin-cut-it-out-hacking

Hillary Tells Angry Donors She Lost Because Of Putin, Comey Letter http://www.zerohedge.com/news/2016-12-16/hillary-tells-angry-donors-she-lost-because-putin-comey-letter

"Infuriated" Podesta Slams "Broken" FBI, Demands "Serious, Sustained Response" Against Russia http://www.zerohedge.com/news/2016-12-16/infuriated-podesta-slams-broken-fbi-demands-serious-sustained-response-against-russi


Putin Lashes Out At Obama: "Show Some Proof Or Shut Up" http://www.zerohedge.com/news/2016-12-16/putin-lashes-out-obama-show-some-proof-or-shut

Princeton & NYU Professor Warns Of Dangers From Liberal Media’s “False Narratives Of A New Cold War” http://www.zerohedge.com/news/2016-12-16/princeton-nyu-professor-warns-dangers-liberal-medias-false-narratives-new-cold-war
: Billion Yahoo database accounts sold three times for $300,000
: Letsbereal December 17, 2016, 03:17:33 AM
Stolen Yahoo Data Includes Government Employee Information
15 december 2016
, by Jordan Robertson (Bloomberg)
https://www.bloomberg.com/news/articles/2016-12-15/stolen-yahoo-data-includes-government-employee-information

- FBI, CIA, NSA, White House workers among hacking victims

- Former intelligence officers say leak could aid foreign spies

Komarov said the group selling the database he acquired are professional cybercriminals who sell mostly to spammers, leading him to conclude that a nation was not behind this crime.


The hackers are Eastern European and Komarov said based on their communications he suspects they may have never met in person.

They are prolific hackers, picking major e-mail providers and social media sites to target based on how much they can sell the logins for.

Their operations have netted more than 3.5 billion records from companies including MySpace, Dropbox and VK.com, a popular Russian social networking site.
: Re: HACKING ATTACKS
: Letsbereal December 18, 2016, 06:41:14 AM
BREAKING NEWS: WASHINGTON POST NOW CONFIRMS DHS HACKED ELECTION IN 20 DIFFERENT STATES https://www.youtube.com/watch?v=W6H6xfch-tw

Dec 18, 2016 ron johnson
: Re: HACKING ATTACKS
: Letsbereal December 18, 2016, 09:29:06 AM
Merry Haxmas! Shadow Brokers strike again!
17 December 2016
, (Hacker House)
https://www.myhackerhouse.com/merry-haxmas-shadowbrokers-strike-again/

Evidence is beginning to mount that the tools may indeed be the craftsmanship of the NSA and GCHQ. It would appear that through bad tradecraft these exploits and tools are now available to 3rd parties, highlighting the very real risk of militarization of cyber space when tools are compromised.

"New publication Shadow Brokers contains comprehensive NSA hacking tools"
2 days ago
, by the grugq (Medium)
https://medium.com/@thegrugq/the-great-cyber-game-commentary-3-a1ae9a70e399

How bad is it?

For the NSA this is definitely a gut punch. There is a lot of operational detail and lessons that are exposed in this (and the earlier Shadow Brokers dump). The upshot is that a lot of it looks pretty old. So this might be “of historic interest only.” I would expect that a lot of the tools and exploits here are no longer the state of the art for NSA, and so their ability to do their mission will not be negatively impacted by this release. Still, damn, that’s gotta hurt.

Are the Shadow Brokers selling NSA tools on ZeroNet?
4 days ago
, (Medium)
https://medium.com/@CleetusBocefus/are-the-shadow-brokers-selling-nsa-tools-on-zeronet-6c335891d62a

“…this is for the people of the sun!”
: Re: HACKING ATTACKS
: Letsbereal December 18, 2016, 02:03:13 PM
Infowars Under Massive Attack By Swarming Net-Bots https://www.youtube.com/watch?v=95cyRkBDqUo

Dec 18, 2016 The Alex Jones Channel
: Re: HACKING ATTACKS
: beardogg0524 December 19, 2016, 02:31:08 PM
If the globalists really wanted to bring Alex down and ruin him, they would find a way to get root access to the Linux servers and plant illegal material on the servers. These hackers are rank amateurs. This is why encryption - even on Linux systems - is highly recommended. If CIA hackers can gain access to your unencrypted home folder and place illegal material in your home folder as hidden files (a decimal point before a file name makes a file hidden in Linux/UNIX/BSD), then you can be brought down in an instant.
: Re: HACKING ATTACKS
: Letsbereal December 22, 2016, 10:02:16 AM
5 Problems With CIA Claims Of Russian Hacking http://www.zerohedge.com/news/2016-12-20/5-problems-cia-claims-russian-hacking

71% Of Americans Don't Believe Russia Was Responsible For Election-Related Hacks http://www.zerohedge.com/news/2016-12-20/71-americans-dont-believe-russia-was-responsible-election-related-hacks

Meet MethBot: Russian Hackers Exposed For "Biggest Ad Fraud Ever" http://www.zerohedge.com/news/2016-12-20/meet-methbot-russian-hackers-exposed-biggest-ad-fraud-ever
: Re: HACKING ATTACKS
: Letsbereal December 23, 2016, 01:24:09 PM
Chinese Military Said To Hack FDIC For Years, Including Computer Of Sheila Bair
23 December 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-12-23/chinese-military-said-hack-fdic-years-including-computer-sheila-bair
: Re: HACKING ATTACKS
: Letsbereal December 30, 2016, 06:18:44 PM
FBI Rapport On Alleged Russian Hacking Activities PDF https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
: Drudge Report Suffers "Biggest DDOS Attack Since Inception"
: Letsbereal December 30, 2016, 08:32:22 PM
Drudge Report Suffers "Biggest DDOS Attack Since Inception" As Obama Unveils Russian Sanctions
30 December 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-12-30/drudge-report-suffers-biggest-ddos-attack-inception-obama-unveils-russian-sanctions
: Re: FBI Rapport On Alleged Russian Hacking Activities
: Letsbereal December 31, 2016, 01:21:09 AM
FBI Rapport On Alleged Russian Hacking Activities PDF https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf

Paul Craig Roberts: Russia Should Be On Full Military Alert https://www.youtube.com/watch?v=9PGv8VZ0QN8

Dec 30, 2016 The Alex Jones Channel
: Re: HACKING ATTACKS
: Letsbereal December 31, 2016, 11:37:20 AM
Russian Hackers Said To "Penetrate US Electricity Grid" Using Outdated Ukrainian Malware
31 December 2016
, by Tyler Durden (Zero Hedge)
http://www.zerohedge.com/news/2016-12-31/russian-hackers-said-penetrate-us-electricity-grid-using-outdated-ukrainian-malware

Excerpt:

According to some cybersecurity specialists, the code came from an outdated Ukrainian hacking tool. As RT notes, IT specialists that have analyzed the code and other evidence published by the US government are questioning whether it really proves a Russian connection, let alone a connection to the Russian government. Wordfence, a cybersecurity firm that specializes in protecting websites running WordPress, a PHP-based platform, published a report on the issue on Friday.

Wordfence said they had traced the malware code to a tool available online, which is apparently funded by donations, called P.A.S. that claims to be “made in Ukraine.” The version tested by the FBI/DHS report is 3.1.7, while the most current version available on the tool’s website is 4.1.1b.

"One might reasonably expect Russian intelligence operatives to develop their own tools or at least use current malicious tools from outside sources,” the report says.

The second part of the analysis deals with the list of IP addresses provided by the US agencies. The report says they “don’t appear to provide any association with Russia” and “are probably used by a wide range of other malicious actors.”

Meanwhile, that little nuance, i.e., the ongoing lack of actual evidence that Russians hacked the Vermont utility let alone the "US elections" however did not stop the Obama administration from accusing Russian government of hacking US computer networks in order to influence the presidential to justify imposing some of the toughest sanctions on Russia yet.
: Re: HACKING ATTACKS
: beardogg0524 January 09, 2017, 12:37:20 PM
I strongly suspect that the DDOS attacks on Drudge were committed by Soros operatives using a combination of Tor Browser and Tails Linux, despite the fact that the NSA labels the use of Tor and Tails as "extremist activity".

http://www.theregister.co.uk/2014/07/03/nsa_xkeyscore_stasi_scandal/

http://www.digitaltrends.com/computing/nsa-labels-linux-tails-users-extremists/

I also strongly suspect that the false-flag cyberattacks on the DNC and election computers will be blamed on "Linux users from Russia" as a pretext to label Linux a "Russian cyberterrorist weapon of mass destruction" and either restrict or ban the download, sharing, and use of Linux - including Ubuntu/Mint/Fedora/RedHat/openSUSE/SUSE Enterprise - and outright ban Tor in the US.