Thursday, March 28, 2013

IS NORTH KOREA PLANNING TO START WORLD WAR III?

IS NORTH KOREA PLANNING TO START WORLD WAR III?
IS NORTH KOREA PLANNING TO START WORLD WAR III?
IS NORTH KOREA PLANNING TO START WORLD WAR III?
North Korea announced for a nuclear preemptive attack on Washington D.C this week in a rally where thousands of North Koreans gathered around a North Korean general.  Such an incident took place in result of the inflexible UN sanctions imposed on North Korea as well as the South Korean and American military exercises taking place. It was a situation where the North Korean dictator Kim Jong Un publically revealed their next move to retaliate against America. According to the plan if not Washington D.C then South Korea (the ally of America) was the plan B for their nuclear attack strategy.
As soon as the news broke out it has been the hot topic all around the Globe, and especially The United States. For threatening a Super power is not a joke. Though North Korea is far away from perfecting a nuclear weapon every day they are getting closer and even if they are not in a position to attack, the threat itself is terrifying for the American people.
The reason why Kim Jong Un is confronting the Super Power is because he thinks that Pyongyang is the next target for the world, and besides that he wants to assure his citizens that he has kept them safe from any external threat from enemies like United States. Whereas on the other side North Korea is known for the lack of human rights and domestic issues she is facing. According to a recent Human rights watch report there are almost 200,000 political prisoners forced into labor camps and tortured along with their spouses, parents and children.
Dennis Keith Rodman an American Hall of Fame professional basketball player is the first American to spend two days with a Korean dictator. He came back with a message for President Obama by Kim Jong Un, that Rodman said was “to call him (Kim Jong Un)”. The white house was not happy with Rodman’s visit to North Korea; they said they are not going to be acting on the message. However the white house administration spoke to the media and assured that there was a line of communication between the two states. And said that North Korea should be spending more on mitigating the tension and torture its own people were suffering then on sport events.
According to Rodman the Korean Dictator Kim Jong Un is AWESOME, and is a great guy. Well Mr. Rodman someone threatening to launch a preemptive nuclear war cannot really be the best person to hang around with!

Monday, March 18, 2013

Hundreds of new British phone-hacking cases alleged

The new cases reportedly were discovered through tips provided by an inside informant.

A lawyer for victims of phone hacking by Britain's News of the World says a new conspiracy uncovered by British investigators has hundreds of potential victims from the now defunct tabloid that was part of media baron Rupert Murdoch's global news empire.
Hugh Tomlinson made the announcement Monday at Britain's High Court during legal arguments related to the lawsuits against Murdoch's News International, which published the tabloid at the center of the scandal.
The company has already paid millions of pounds in settlements and could face another round of lawsuits if the reports of new hacking cases are true.
Tomlinson did not elaborate, but The Guardian newspaper reports that the new allegations come from a phone-hacking suspect who turned informer.
The hacking cases, which have greatly damaged the reputation of the British tabloid press, initially involved phones of celebrities and members of the royal family. But they erupted into a major scandal after allegations surfaced in 2011 that the phone of a murdered 13-year-old school girl, Milly Dowler, had been hacked as well as phones from deceased British soldiers.
The Guardian, quoting unidentified sources, reports that the 600 potential cases surfaced after police received the phone records of an insider who will become a witness for the prosecution.
It says the potential new litigants fall in into three groups: new victims; other victims who have have already sued over past cases but are not barred from going to court again; and a third group who signed agreements potentially barring them from suing again.
Information from the same informant led to arrests last week of the editor of the Sunday Mirror, Tina Weaver, and four former colleagues arrested on suspicion of conspiring to hack phones, The Guardian reports.
So far, eight former staff members of the News of the World, which Murdoch closed after the phone-hacking scandal broke, face allegations of conspiring to hack phones. These include former editors Rebekah Brooks and Andy Coulson.
Brooks resigned in 2011 as a top executive with News International, which oversees the British arm of Murdoch's media company.
Coulson, also a former editor of the tabloid, resigned in 2011 as communications director for Prime Minister David Cameron in the wake of the hacking allegations.
Both have denied allegations of wrongdoing in the phone-hacking cases.
The revelations of new victims came only hours after British politicians announced they had struck a last-minute deal over press regulation, unveiling a new code meant to curb the worst abuses of the country's scandal-tarred media.
The code follows days of heated debate over how to implement the recommendations of Lord Justice Brian Leveson, tasked with cleaning up a newspaper industry plunged into crisis by revelations of widespread phone hacking.
Victims' groups have lobbied for an independent watchdog whose powers are enshrined in law but media groups have said that threatens press freedom.
The deal struck early Monday appears to be a complicated compromise.
Contributing: Associated Press

Sunday, March 17, 2013

Cypherpunk rising: WikiLeaks, encryption, and the coming surveillance dystopia

In 1989, when the internet was predominantly ASCII-based and HyperCard had yet to give birth (or at least act as a midwife) to the world wide web, R.U. Sirius launched Mondo 2000. “I’d say it was arguably the representative underground magazine of its pre-web day,” William Gibson said in a recent interview. “Posterity, looking at this, should also consider Mondo 2000 as a focus of something that was happening.”

Twenty years ago, it was cypherpunk that was happening.

And it’s happening again today.

Early cypherpunk in fact and fiction

Cypherpunk was both an exciting new vision for social change and a fun subculture dedicated to making it happen Flashback: Berkeley, California 1992. I pick up the ringing phone. My writing partner, St. Jude Milhon, is shouting down the line: "I’ve got it! Cypherpunk!"
Jude was an excitable girl and she was particularly excitable when there was a new boyfriend involved. She’d been raving about Eric Hughes for days. I paid no attention.
At the time, Jude and I were contracted to write a novel titled How to Mutate and Take Over the World. I wanted the fiction to contain the truth. I wanted to tell people how creative hackers could do it — mutate and take over the world — by the end of the decade. Not knowing many of those details ourselves, we threw down a challenge on various hacker boards and in the places where extropians gathered to share their superhuman fantasies. "Take on a character," we said, "and let that character mutate and/or take over." The results were vague and unsatisfying. These early transhumanists didn’t actually know how to mutate, and the hackers couldn’t actually take over the world. It seemed that we were asking for too much too soon.
And so I wound up there, holding the phone away from my ear as Jude shouted out the solution, at least to the "taking over" part of our problem. Strong encryption, she explained, will sever all the ties binding us to hostile states and other institutions. Encryption will level the playing field, protecting even the least of us from government interference. It will liberate pretty much everything, toute de suite. The cypherpunks would make this happen.
For Jude, cypherpunk was both an exciting new vision for social change and a fun subculture dedicated to making it happen. Sure, I was skeptical. But I was also desperate for something to hang the plot of our book on. A few days later I found myself at the feet of Eric Hughes — who, along with John Gilmore and Tim May, is considered one of the founders of the cypherpunk movement — getting the total download.
This was my first exposure to "The Crypto Anarchist Manifesto." Written by Tim May, it opens by mimicking The Communist Manifesto: "A specter is haunting the modern world, the specter of crypto anarchy." In a fit of hyperbole that perfectly foreshadowed the mood of tech culture in the 1990s — from my own Mondo 2000 to the "long boom" of digital capitalism — May declared that encrypted communication and anonymity online would "alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret." The result would be nothing less than "both a social and economic revolution."
Just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed wire around intellectual property.
Those words were written way back in 1988. By 1993, a bunch of crypto freaks were gathering fairly regularly in the San Francisco Bay Area. In his lengthy Wired cover story, Steven Levy would describe them as mostly "having beards and long hair — like Smith Brothers [cough drops] gone digital." Their antics would become legendary.
John Gilmore set off a firestorm by sharing classified documents on cryptography that a friend of his had found in public libraries (they had previously been declassified). The NSA threatened Gilmore with a charge of violating the Espionage Act, but after he responded with publicity and his own legal threats, the NSA — probably recognizing in Gilmore a well-connected dissident who they couldn’t intimidate — backed down and once again declassified the documents.
Phil Zimmermann’s PGP (Pretty Good Privacy) software was being circulated largely thanks to cypherpunk enthusiasts. According to Tim May’s Cyphernomicon, PGP was "the most important crypto tool" available at the time, "having single-handedly spread public key methods around the world." It was available free of charge for non-commercial users, and complete source code was included with all copies. Most importantly, May wrote, "almost no understanding of how PGP works in detail is needed," so anyone could use its encryption to securely send data over the net.
In April 1993, the Clinton administration announced its encryption policy initiative. The Clipper Chip was an NSA-developed encryption chipset for "secure" voice communication (the government would have a key for every chip manufactured). "Not to worry," Phil Zimmermann cuttingly wrote in an essay about PGP. "The government promises that they will use these keys to read your traffic only ‘when duly authorized by law." Not that anyone believed the promises. "To make Clipper completely effective," Zimmermann continued, "the next logical step would be to outlaw other forms of cryptography." This threat brought cypherpunks to the oppositional front lines in one of the early struggles over Internet rights, eventually defeating government plans.
John Gilmore summed up the accomplishments of the cypherpunks in a recent email: "We did reshape the world," he wrote. "We broke encryption loose from government control in the commercial and free software world, in a big way. We built solid encryption and both circumvented and changed the corrupt US legal regime so that strong encryption could be developed by anyone worldwide and deployed by anyone worldwide," including WikiLeaks.
As the 1990s rolled forward, many cypherpunks went to work for the man, bringing strong crypto to financial services and banks (on the whole, probably better than the alternative). Still, crypto-activism continued and the cypherpunk mailing list blossomed as an exchange for both practical encryption data and spirited, sometimes-gleeful argumentation, before finally peaking in 1997. This was when cypherpunk’s mindshare seemed to recede, possibly in proportion to the utopian effervescence of the early cyberculture. But the cypherpunk meme may now be finding a sort of rebirth in one of the biggest and most important stories in the fledgeling 21st century.

I am annoyed

This is beginning to sound very much like a dystopian fantasy
Flashback: 1995. Julian Assange’s first words on the cypherpunk email list: “I am annoyed.”
Of course, Julian Assange has gone on to annoy powerful players all over the world as the legendary fugitive editor-in-chief and spokesperson for WikiLeaks, publisher of secret information, news leaks, and classified media from anonymous sources. And while the mass media world has tracked nearly every aspect of Assange’s personal drama, it’s done very little to increase people’s understanding of WikiLeaks’ underlying technologies or the principles those technologies embody.
In the recent book Cypherpunks: Freedom and the Future of the Internet, Assange enlists the help of three fellow heroes of free information to set the record straight, aligning those principles with the ideas that Tim May dreamed up in 1989 with "The Crypto Anarchist Manifesto."
The book is based on a series of conversations filmed for the television show The World Tomorrow while Assange was on house arrest in Norfolk, England during all of 2011. Attending were Jacob Appelbaum, the American advocate and researcher for the Tor project who has been in the sights of US authorities since substituting as a speaker for Assange at a US hackers conference; Andy Müller-Maguhn, one of the earliest members of the legendary Chaos Computer Club; and Jérémie Zimmerman, a French advocate for internet anonymity and freedom.
The conversation is sobering. If 1990s cypherpunk, like the broader tech culture that it was immersed in, was a little bit giddy with its potential to change the world, contemporary cypherpunk finds itself on the verge of what Assange calls "a postmodern surveillance dystopia, from which escape for all but the most skilled individuals will be impossible."
How did we get here? The obvious political answer is 9/11. The event provided an opportunity for a vast expansion of national security states both here and abroad, including, of course, a diminution of protections against surveillance. The legalities involved in the US are a confusing and ever-shifting set of rules that are under constant legal contestation in the courts. Whatever the letter of the law, a September 2012 ACLU bulletin gave us the essence of the situation:
Justice Department documents released today by the ACLU reveal that federal law enforcement agencies are increasingly monitoring Americans’ electronic communications, and doing so without warrants, sufficient oversight, or meaningful accountability.
The documents, handed over by the government only after months of litigation, are the attorney general’s 2010 and 2011 reports on the use of "pen register" and "trap and trace" surveillance powers. The reports show a dramatic increase in the use of these surveillance tools, which are used to gather information about telephone, email, and other Internet communications. The revelations underscore the importance of regulating and overseeing the government’s surveillance power.
"In fact," the report continues, "more people were subjected to pen register and trap and trace surveillance in the past two years than in the entire previous decade."
Beyond the political and legal powers vested in the US intelligence community and in others around the world, there is the very real fact that technology once only accessible to the world’s superpowers is now commercially available. One example documented on WikiLeaks (and discussed in Cypherpunks) is the Zebra strategic surveillance system sold by VASTech. For $10 million, the South African company will sell you a turnkey system that can intercept all communications in a middle-sized country. A similar system called Eagle was used in Gadhafi’s Libya, as first reported by The Wall Street Journal in 2011. Sold by the French company Amesys, this is a commercial product, right down to the label on the box: "Nationwide Intercept System." In the face of systems designed to scoop up all electronic communication and store it indefinitely, any showcase civil libertarian exceptions written into the surveillance laws are meaningless. But the threat isn’t limited to the surveillance state. There are more than a few self-interested financial players with $10 million lying around, many of whom would love to track all the private data in a several thousand mile radius.
All of this is beginning to sound very much like a dystopian fantasy from cyberpunk science fiction.

Total surveillance

If, in 1995, some cypherpunks had published a book about the upcoming "postmodern surveillance dystopia," most commentators would have shrugged it off as just a wee bit paranoid and ushered them into the Philip K. Dick Reading Room. Now, it is more likely that people will shrug and say, "that ship has already sailed."
David Brin seems to think so. The author of The Transparent Society is well known for his skepticism regarding the likelihood of maintaining most types of privacy as well as his relative cheerfulness in the face of near universal transparency. In an email, I asked him about the cypherpunk ethic, as expressed by Julian Assange: "privacy for the weak and transparency for the powerful."
Brin’s response was scathing. The ethic, he says, is "already enshrined in law. A meek normal person can sue for invasion of privacy, a prominent person may not." He’s just getting started:
But at a deeper level it is simply stupid. Any loophole in transparency ‘to protect the meek’ can far better be exploited by the mighty than by the meek. Their shills, lawyers and factotums will (1) ensure that ‘privacy protections’ have big options for the mighty and (2) that those options will be maximally exploited. Moreover (3) as I show in The Transparent Society, encryption-based ‘privacy’ is the weakest version of all. The meek can never verify that their bought algorithm and service is working as promised, or isn’t a bought-out front for the NSA or a criminal gang.
Above all, protecting the weak or meek with shadows and cutouts and privacy laws is like setting up Potemkin villages, designed to create surface illusions. Anyone who believes they can blind society’s elites — of government, commerce, wealth, criminality and tech-geekery — is a fool…
In other words, cypherpunk may be doing a disservice by spreading the illusion of freedom from surveillance.
I posed a similar question to Adrian Lamo, who reported Bradley Manning to federal authorities. Not surprisingly, Lamo is even more cynical.
"Privacy is quite dead," he responded to me in an email. "That people still worship at its corpse doesn’t change that. In [the unreleased documentary] Hackers Wanted I gave out my SSN, and I’ve never had cause to regret that. Anyone could get it trivially. The biggest threat to our privacy is our own limited understanding of how little privacy we truly have."
In Cypherpunks, Assange raises an essential point that at least partly refutes this skepticism: "The universe believes in encryption. It is easier to encrypt information than it is to decrypt it." And while Appelbaum admits that even strong encryption can’t last forever, saying, "We’re probably not using one hundred year (safe) crypto," he implies that pretty good privacy that lasts a pretty long time is far better than no privacy at all.
Assuming that some degree of privacy is still possible, most people don’t seem to think it’s worth the effort. The cypherpunks and their ilk fought to keep things like the PGP encryption program legal — and we don’t use them. We know Facebook and Google leak our personal online habits like a sieve and we don’t make much effort to cover our tracks. Perhaps some of us buy the good citizen cliché that if you’re not doing anything wrong, you don’t have anything to worry about, but most of us are just opting for convenience. We’ve got enough to deal with day to day without engaging in a privacy regimen. Occasionally, some slacker may lose his job because he posted a photo of himself cradling his bong or the like, but as with civil liberties more generally, as long as the daily outrages against individuals don’t reach epic proportions, we rubberneck in horror and then return to our daily activities.
Beneath this complacent surface lies a disquieting and mostly unexamined question. To what degree is the ubiquity of state surveillance a form of intimidation, a way to keep people away from social movements or from directly communicating their views?
Do you hesitate before liking WikiLeaks on Facebook?
"Privacy is quite dead. That people still worship at its corpse doesn’t change that."
Throughout its entire history, the FBI has used secret intelligence operations to spy on, disrupt, and otherwise target activists and groups it considered subversive (mostly on the political left). The most notorious incidents occurred between 1956 and 1971, under the umbrella of COINTELPRO (Counter Intelligence Program). When the FBI’s activities were revealed first in 1971 and later, more fully by the 1976 Church Committee, no politically astute person shrugged it off. It was understood without question that mega surveillance of political activists was an act of suppression period, full stop.
Part of the shock of the COINTELPRO revelations was the FBI’s engagement in illegal activities to destroy political organizations. The government’s violation of its own surveillance laws even trumped the desire to punish the "symbolic bombings" of the Weather Underground. Since the FBI used illegal breaking and entering surveillance in an attempt to destroy the radical group, the leaders received light sentences when they emerged from underground. The same FBI techniques, once illegal, are undoubtedly so legal now under anti-terrorism laws that US Attorney General Holder could conduct the searches personally, dressed like Elvis and surrounded by the Real Housewives of Orange County in front of the cameras on a popular reality show.
"The universe believes in encryption. It is easier to encrypt information than it is to decrypt it."We have, perhaps, already let the surveillance culture slide too long.
It’s not as though the spirit of COINTELPRO has left us. Jacob Appelbaum, who has never been accused of any crime, has been subjected to relentless harassment, starting in the summer of 2010, when he was held up at Newark Airport where he was frisked, his laptop was inspected, and his three mobile phones were taken. He was then passed along to US Army officials for four hours of questioning. One army interrogator told him, menacingly, "You don’t look like you’re going to do so well in prison." Several contacts found on the confiscated cell phones were then also given a hard time at airports and border crossings. In December of that year he was — along with other WikiLeaks activists — one of the subjects of a court order that compelled Twitter to let the feds snoop inside his account. (He only knows this because Twitter won a petition to be able to inform the subjects.) He has since been continually harassed by airport security and has been detained at the US border twelve times.
That this harassment is happening to someone who hasn’t been charged with a crime is particularly frightening.
"The Galgenhumor of our era," Appelbaum told me in an email, "revolves around things that most people simply thought impossible in our lifetime." He lists a number of chilling examples, including indefinite detention under the National Defense Authorization Act of 2012, warrantless wiretaps, drone strikes, state-sponsored malware, and the Patriot Act.
"It isn’t a great time to be a dissenting voice of any kind in our American empire," he continues. But it isn’t the myriad of ways that civil liberties have been gutted that we’ll look back upon. "What we will remember is the absolute silence of so many, when the above things became normalized."

U.S. database on cyber-vulnerabilities is hacked

Ironically, the government site that catalogs vulnerability to malware is brought down by malware 

U.S. database on cyber-vulnerabilities is hacked

A government database on computer vulnerability has a vulnerability problem of its own. According to reports Thursday, the National Vulnerability Database website — which includes databases of security checklists and security-related software flaws — was among sites taken down for two weeks after malware was discovered on their servers.
A number of other sites also belonging to the National Institute of Standards and Technology were also affected. The government agency released the following statement:
NIST began investigating the cause of the unusual activity and the servers were taken offline. Malware was discovered on two NIST Web servers and was then traced to a software vulnerability.
NIST was unsurprisingly pretty good at detecting the issue fast. As IT World noted, its National Vulnerability Database “is a comprehensive repository of information that allows computers to conduct automated searches for the latest known vulnerabilities in hardware or software computing products …  The goal of the NVD is to help organizations and individuals better protect their computers against security threats.”
According to IT world, the irony of the hack has not been lost on security professionals:
Security professional Kim Halavakoski found the database was down when he went to the website to get some vulnerability information, he said in a Google+ post late Wednesday.
“Hacking the NVD and planting malware on the very place where we get our vulnerability information, that is just pure evil!” he wrote.

 

U.S. hackers shut down North Korean Internet, Pyongyang says as war game tensions rise


South Korean army soldiers are silhouetted as they patrol along a barbed-wire fence near the border village of Panmunjom, which has separated the two Koreas since the Korean War, in Paju, north of Seoul, South Korea, Friday, March 15, 2013.
Lee Jin-man / The Associated PressSouth Korean army soldiers are silhouetted as they patrol along a barbed-wire fence near the border village of Panmunjom, which has separated the two Koreas since the Korean War, in Paju, north of Seoul, South Korea, Friday, March 15, 2013.


SEOUL, South Korea — North Korea on Friday blamed South Korea and the United States for cyberattacks that temporarily shut down websites this week at a time of elevated tensions over the North’s nuclear ambitions. Experts, however, indicated it could take months to determine what happened and one analyst suggested hackers in China were a more likely culprit.
Internet access in Pyongyang was intermittent on Wednesday and Thursday, and Loxley Pacific Co., the broadband Internet provider for North Korea, said it was investigating an online attack that took down Pyongyang servers. A spokesman for the Bangkok-based company said Friday that it was not clear where the attack originated.
North Korea’s official Korean Central News Agency blamed the shutdown on the United States and South Korea, accusing the allies of expanding an aggressive stance against Pyongyang into cyberspace with “intensive and persistent virus attacks.”
 
 
South Korea denied the allegation and the U.S. military declined to comment.
Loxley Pacific, which has provided broadband Internet service in North Korea through a joint venture with the government since 2010, said the Internet was back to normal Friday. AP journalists in Pyongyang also were able to access the Internet again Friday after two days of disruptions. Most North Koreans do not have access to the Internet, which remains restricted to a select group.
The cyberattack accusation comes amid a torrent of North Korean criticism against the U.S. and South Korea for holding routine joint military drills that Pyongyang considers preparations for an invasion. North Korea also is incensed by U.N. sanctions punishing Pyongyang for testing a nuclear device that it claims to need as a defense against U.S. aggression.
Lee Jin-man / The Associated Press
Lee Jin-man / The Associated PressA man takes a picture in front of a wire fence, where ribbons hanging with messages wishing for the reunification of the two Koreas, at the Imjingak Pavilion near the border village of Panmunjom, which has separated the two Koreas since the Korean War, in Paju, north of Seoul, South Korea, Friday, March 15, 2013.
“The U.S. thinks that only it can have nuclear weapons. But we have nuclear weapons for justice, and for the sovereignty of our country,” Lt. Ri Yong Kwon of the North’s Korean People’s Army said Friday at the heavily militarized border dividing the Korean Peninsula.
Increasingly, many nations see cyberspace as a new front for warfare. China and the U.S. have accused one another of state-backed cyberspying.
Accusations of cyberattacks on the Korean Peninsula are not new, but it is usually South Korea accusing the North of unleashing hackers on its computer networks. Seoul believes Pyongyang was behind at least two cyberattacks on local companies in 2011 and 2012.
The U.S. thinks that only it can have nuclear weapons. But we have nuclear weapons for justice, and for the sovereignty of our country
South Korean security experts questioned North Korea’s quick blame of Washington and Seoul because it can take months to trace the source of a cyberattack and hackers can easily disguise their locations.
Individual hackers in China, where information about North Korea’s cyberspace and computer software is more widely available than in the U.S. and South Korea, are more likely to blame in this case, said Lim Jong-in, dean of Korea University’s Graduate School of Information Security in Seoul.
“There are many Chinese Internet users who have expressed their hatred of North Korea these days. I think it’s more likely that some of them launched cyberattacks on North Korean websites,” said Lim. “Many in China know much more about North Korea’s IT environments.”
KNS / KCNA / The Associated Press
KNS / KCNA / The Associated PressIn this undated photo released by the Korean Central News Agency (KCNA) and distributed Thursday, March 14, 2013 by the Korea News Service, North Korean leader Kim Jong Un uses a pair of binoculars to watch live ammunition firing drills by the Jangjae Islet Defense Detachment and the Mu Islet Hero Defense Detachment deployed in the southwestern sector in North Korea.
Self-styled Chinese patriotic hackers have attacked the websites of foreign governments and private corporations at times of tension with Japan, France, Germany and others. Outrage might be sparked by territorial disputes, diplomatic snubs or perceived insults to China.
Such hackers, working individually or in tight networks, with or without government knowledge, may have been similarly riled up over North Korea’s latest provocations, including the Feb. 12 nuclear test.
There are many Chinese Internet users who have expressed their hatred of North Korea these days. I think it’s more likely that some of them launched cyberattacks on North Korean websites
China had urged North Korea not to conduct the provocative test, and Beijing gave its support to U.N. sanctions punishing Pyongyang in the wake of the underground explosion, the North’s third. The test has drawn vocal criticism from middle-class urban Chinese and even government-backed scholars.

Hackers shut down celebrity site that revealed financial account details of Jay-Z, Beyonce, Ashton Kutcher and more

The site, www.exposed.eu — ran by hackers presumed to be Russian or from a former Soviet country — said goodbye in a rambling message that poked fun at the nearly two-week-long attack on celebrities and politicians, which revealed details of their financial information.

Updated: Saturday, March 16, 2013, 9:45 PM










Screen grab of hacker web site www.exposed.su.

exposed.su

Screen grab of hacker web site www.exposed.su.

They were looking for loot, but instead got some laughs.
The cyberthieves who hacked into America’s three major credit-history databases and posted sensitive financial information about scores of celebrities last week — from Michelle Obama to Bill Gates — were trolling for big bank accounts to plunder, according to experts.
But when they came across a treasure trove of high-profile names, they couldn’t resist putting the information online.
“It’s extra fun for them, probably a little bit of celebrity gazing,” said Jim Lewis, a senior fellow and director of technology at the Center for Strategic and International Studies.
HACKER17N_1_WEB

LUCY NICHOLSON/REUTERS

Singer Beyonce and her husband Jay-Z were both attacked by hackers.

The hackers’ fun was short-lived, however. They posted a farewell message on their website Saturday — and hours later, the site was down.
RELATED: HACKER TAKES $ INFO FROM JAY-Z, HIL CLINTON, OTHERS
“We have enjoyed every minute of the past 12 days of providing entertainment and laughs to all of you,” the rambling message read, according to TMZ.com. “Sadly it’s time to say bon voyage — we hope — inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love.”
“If you believe that God makes miracles, you have to wonder if Satan has a few up his sleeve.”
HACKER17N_3_WEB

Alex Wong/Getty Images

First lady Michelle Obama was attacked by hackers.

As the cyberthieves gleefully exploited their targets last weekend, the celebrities affected certainly weren’t laughing.
Bill Gates’ spokesman issued a terse “No comment,” while calls to Beyoncé and Jay-Z’s publicist weren’t returned.
Hulk Hogan’s lawyer, David Houston, said the postings created a “huge headache” for the former wrestling star, who didn’t lose any money but has to take numerous steps to protect himself in the future, Houston said.
RELATED: FBI INVESTIGATING HACKERS WHO POSTED PRIVATE INFO OF CELEBS, POLITICIANS
HACKER17N_11_WEB

Jonathan Short/AP

Kim Kardashian was one of the celebrities targeted by hackers.

“We are investigating,” was the FBI’s only comment about the cyberexposure, which revealed sensitive info not just about the First Lady but also Vice President Biden, the LAPD chief, U.S. Attorney General Eric Holder and entertainers like Ashton Kutcher, Paris Hilton and Kim Kardashian.
The hackers are presumed to be Russian or from a former Soviet Union country for two reasons: the www.exposed.su site they created to “dox” a host of celebrities was registered there, and that region leads the world in financial cybercrimes, said Lewis.
The thieves might have dipped into some of the accounts of their celebrity victims while they were trolling around, he said. But it’s more than likely that real victims haven’t been revealed — regular Americans who woke up one morning to discover a couple thousand dollars missing from their bank account, or that their identity had been used to buy a Ferrari somewhere in the former Soviet Union.
“We’ll never know how many people actually got hit by this, because the banks won’t tell,” said Lewis. “Don’t forget, no matter how much fun they have toying with celebrities, what they’re actually going after is money, and these hackers will spend considerable time and effort getting it.”
HACKER17N_10_WEB

Darron Cummings/AP

Ashton Kutcher was one of the celebrities targeted by hackers.

Credit-reporting companies, custodians of sensitive personal data from credit-card balances to mortgage debts, are treasure chests for money-skimming thieves. Experian was breached 86 times in October via the accounts of organizations such as banks or auto dealers, according to Bloomberg News.
RELATED: COLIN POWELL’S EMAILS INFILTRATED BY HACKER ‘GUCCIFER’
“This is the modern way of mugging someone, but you don’t have to go outside and confront your target. Hacking is low-risk and has a high payoff, but you do have to put in a lot of hard work upfront,” said Lewis.
Financial crime is a booming underworld industry in parts of the former Soviet Union — so much so that local governments are frequently willing to turn a blind eye. Hackers can usually operate with impunity in areas outside U.S. and Western European jurisdiction as long as they observe three rules, said Lewis: buy off the local cops, don’t hack the neighborhood bank and be prepared to do favors for high-ranking state officials.
HACKER17N_9_WEB

J. Scott Applewhite/AP

Attorney General Eric Holder was also targeted by hackers looking for cash.

In 2007, Estonia suffered a wave of “denial of service” attacks on its banks and state-run facilities, essentially shutting the sites down. The cyberattack was attributed to Russian criminals, but global security experts believe the criminals acted at the request of national officials in Russia’s security forces, said Lewis.
Russian officials rely on criminals as a “proxy force” when dirty work needs to be done online but the government wants to maintain plausible deniability, he said.
Thanks to the cozy relationship between some law enforcement agencies and cyberhackers in certain parts of the world, financial crimes are getting more sophisticated and more brazen.
RELATED: JOURNALIST CHARGED IN HACKING CONSPIRACY SUSPENDED
HACKER17N_8_WEB

Julie Jacobson/AP

Paris Hilton's personal information was exposed by hackers.

In 2011, a group of cybercriminals pulled off a $9 million heist over Labor Day weekend, targeting specific American banks around the country. The thieves had gotten the personal banking information of several dozen wealthy U.S. residents, and over a long holiday weekend they hacked into the accounts and increased their spending limits to $500,000.
They sent operatives to the banks armed with forged bank cards with real account numbers, and withdrew the maximum $500,000 in each account.
The hackers waited a day, then replenished all the accounts with another $500,000 — and sent their operatives in again to withdraw the cash.
That heist was an amazing haul even by hacker standards, said Lewis. Most get rich by taking smaller amounts — a couple of hundred on the low end and tens of thousands on the high end — from many people over many years.
HACKER17N_7_WEB

NICHOLAS KAMM/AFP/Getty Images

Even the Vice President Joe Biden was attacked by hackers.

“Collectively, cybercriminals are stealing hundreds of millions a year,” said Lewis.
RELATED: HACKER BREAKS INTO ACCOUNTS OF FORMER CLINTON AIDE
An average hacker makes a six-figure salary, he said, or a little less depending on how much they have to pay out to cops. The most successful ones run their business like a private enterprise, with an eye toward their bottom line.
They’ve invested time in creating computer programs that will search hacked PCs for anything that contains the word “password,” or “account,” or is a random string of letters and numbers at least eight digits long.
Hackers scan financial newspapers looking for names of CEOs and top executives for major corporations. They can spend weeks combing over online data in an attempt to piece together the personal information of a deep-pocketed target.
Hackers like to embed popular websites with password-searching viruses. Visitors who click are unknowingly letting a cybercriminal right into their online world.
That was the case a few years ago when Russian criminals infected the Super Bowl website a few weeks before the big game, said Lewis. “People were visiting the site like crazy, and that’s exactly the sort of thing they’re looking for,” he said.
Over the past five years, the FBI has become adept at tracking the world’s worst cybercriminals — but most live beyond U.S. jurisdiction.
Perhaps the only drawback for these hackers is that they can never leave the confines of the former Soviet countries that tolerate their crimes. They have to vacation along the Black Sea, where a rash of Russian resort towns cater to cybercriminals.
“One hacker made the mistake of going to Turkey on vacation, and he was arrested right away,” said Lewis.
With Nancy Dillon

Read more: http://www.nydailynews.com/entertainment/gossip/hackers-cash-find-laughs-celebrity-accounts-article-1.1290945#ixzz2NmIuHxfe

Saturday, March 16, 2013

'Pirate Bay' for 3D printing launched

A handgun and license
The idea has grown
out of a project to build a printed gun

 

The company that developed 3D printed gun parts has announced plans to launch a new firm, dedicated to copyright-free blueprints for a range of 3D printable objects.

Defcad, as the firm will be known, has already been dubbed the Pirate Bay of 3D printing.
The site will become a "search engine for 3D printing," according to its founders.
But its flouting of copyright is likely to face legal challenges.

Wiki weapon


The firm is the brainchild of Cody Wilson, law student and self-styled crypto-anarchist.
Last year he set up Defense Distributed, a project aiming to print gun parts.
The project provoked controversy with 3D printing firm MakerBot pulling gun part blueprints from its website in the wake of the Sandy Hook shootings and 3D printer manufacturer Stratasys refusing permission for its machines to be used by the company.
It is also facing legal challenges to shut the site down.
Despite the set-backs, it released a video this month demonstrating an AR-15 with a 3D printed part firing more than 600 rounds.
Meanwhile its blueprints at non-profit Defcad.org have seen 400,000 downloads since the site was launched, according to founder Cody Wilson.
Announcing the new for-profit Defcad.com at the South by South West conference in Texas, Mr Wilson said it was an obvious next step for the wiki weapon project.
"Help us turn Defcad into the world's first unblockable, open-source search engine for 3D printable parts," says Mr Wilson in the video posted on the website looking for funding.
In the video, Mr Wilson said the revolution which many predict 3D printing will bring about will only happen if it can be freed from corporate ties.
The blueprints available on the site will be for "important stuff", he said. "Not trinkets, not garden gnomes but the things institutions and industries have an interest in keeping from us; access, medical devices, drugs, goods, guns."
"Supplying consumers with blueprints to print products designed by third parties is a business model fraught with risk," said Lorna Caddy of law firm Taylor Wessing.
"Many of those products will be protected by intellectual property rights, such as design law. Owners of those rights could assert them in the courts to prevent their designs being further distributed and to seek financial compensation," she added.

One Million BlackBerry 10 Devices Ordered By…?

The BlackBerry 10 OS launch is fast approaching and we already got to learn the specs of RIM's upcoming BlackBerry L-Series phone. Turns out, there's a much more interesting device in the pipeline dubbed the BlackBerry 10 Aristo.
Revealed in a leaked specifications slide, the Aristo (Greek for "the best") is rocking some serious processing power under the hood and, if the info is trustworthy, this is set to be quite the beast.

The BlackBerry Aristo is powered by a Qualcomm APQ8064 quad-core Krait processor running at 1.5GHz coupled with 2GB of RAM. The smartphone also impresses with a 4.65-inch OLED display of HD resolution. The screen is said to use OCTA Glass made by Samsung, which eliminates an additional touch screen layer and integrates the touch sensor directly onto the AMOLED panel instead.
As a result, the BlackBerry 10 Aristo will measure just 8.85mm thick. It's not the thinnest device out there, but it's certainly the slimmest in RIM's portfolio. Connectivity is reportedly going to be pretty solid as well with NFC, Bluetooth 4.0, microHDMI out, Wi-Fi Direct, DLNA and microUSB.
Above the display stands a 2MP front-facing camera capable of shooting 720p video, while at the back the Aristo will make use of an 8MP snapper with auto focus and LED flash. Naturally, it will have no problems shooting 1080p at 30fps.
There's 16GB of internal storage, which is expandable thanks to the microSD card slot. The leaked slide also suggests a beefy (but non-removable) 2,800mAh battery.
If the slide hasn't been faked, we might be looking at a device well suited to start RIM's fightback.

devalopers wanted


 http://www.skadate.com/blog/wp-content/uploads/2011/02/developers-wanted.jpg

Hey guys. the holidays are coming up again and i had the idea of launching this new html5 game store. Basically i want to be able to make money from my html5 web app's but, and this is a big but. i need a fair amount of games to gain the critical mass a site like this needs to launch so i am asking if any of you guys want in on this project. i am willing to pay. if you are interested please email me at jordaan0@gmail.com.

the apps will be sold on  the newly released blackberry 10 platform (Z10, Q10Z).
please take this into account for screen resolution.

we will be adding support for other platforms like android and ios in the near future, after the blackberry 10 platform can stand on its own feet.

and BTW if you any of you guys have an existing or new web application that is designed for any of these screen sizes please get in contact with me. so we can discuss app pricing
.
thank you for your time

Monday, March 11, 2013

Australia's central Bank hoses down Chinese hack report

Australia's Reserve Bank has confirmed it has been attacked, after a report in the Australian Financial Review claimed its “... computer networks have been repeatedly and successfully hacked in a series of cyber-attacks to infiltrate sensitive internal information, including by Chinese-developed malicious software”.
The Reserve Bank (RBA) is Australia's central bank and has functions broadly comparable to those of the Bank of England or the US Federal Reserve.
 
The AFR report mentions hacks on France that resulted in several thousand confidential documents supposedly making their way in the general direction of China, but does not say if Australian documents were lost.
The RBA has since issued a statement admitting to detecting attacks but has classified them as mere “virus attacks”. Here's what the RBA had to say:
“As reported in today's media, the Bank has on occasion been the target of cyber attacks. The Bank has comprehensive security arrangements in place which have isolated these attacks and ensured that viruses have not been spread across the Bank's network or systems. At no point have these attacks caused the Bank's data or information to be lost or its systems to be corrupted. The Bank's IT systems operate safely, securely and with a high degree of resilience.”
If online criminal activity is as prevalent as security companies constantly tell us, one would expect a high-value target like a Reserve Bank to be a target. One would also expect it to attract expert and motivated attackers, if only because it is hard to imagine the phishers and identity thieves of the world caring much about the Bank's sensitive information or being interested in the almost-certainly complex chore of finding buyers for it.
Something else that is almost certain is that this story will run for a while: a media outlet with a story of this seeming importance will have more than one followup planned, probably with additional revelations.
Whether those followups mention this Deutsche Telecom data will be interesting, as it suggests China is far from the world's most active source of hack attacks. That “prize” goes to the Russian Federation, followed by “rogue” Chinese province/democratic Chinese breakaway state Taiwan.
As the Gartner blog post that brought the Deutsche Telecom data to Vulture South's attention says, “It is fairly well known  by most security professionals that the best hackers on the planet often originate from Russia,  however it is  more newsworthy to talk about  a country such as China whom we trust with many of our manufacturing facilities and research and development activities and have greater resources at their disposal if they intended to inflict harm.” ®

Google Glass: Expect widespread usage bans over privacy concerns

Google Glass is the company's upcoming product that puts a computer on your face. Google is about to release the dorky-looking device and most likely it will be snapped up by the techie crowd. It is an innovative product that pushes live-blogging to the next level, and that will unleash a storm of concern never before seen caused by a mobile gadget
No Google Glass
A bar in Seattle has already generated buzz in tech communities with a preemptive strike against Google Glass. The proprietor doesn't want patrons to have to worry that someone with Google Glasses might be snapping photos. His patrons come in for privacy and he wants to keep it that way.
That may have been nothing more than a publicity stunt but it portends a greater problem for Google Glass. When the general public becomes aware of Google Glass and exactly what it does, expect to see a lot of reactions similar to that of the Seattle bar owner.
Rightly or wrongly there's already a concern about folks taking photos and videos in certain public locations and situations. Pull out a camera in places like public schools, playgrounds, and airports and you might incur the wrath of authorities and parents, especially where public safety of kids are concerned.

When public awareness of Google Glass reaches a critical mass and it's understood that these devices can record photos, video, and audio of the wearer's surroundings, an outbreak of bans is sure to result. Don't be surprised if within weeks of the Google Glasses general release we start seeing bans of it cropping up all over the place.
These bans are not going to be the result of Google Glass wearers actually using them, they are going to be a result over the concern that they can be used discretely. Parents are not going to like the exposure that Google Glasses worn in schools, playgrounds, parks, and other places where groups of kids hang out, might bring to their kids.
Authorities who already overreact to those with cameras during stressful public situations are not going to like the fact that Google Glass wearers can record those situations without discovery. This will include the TSA in airports over concerns that wearers might be recording things and "compromising the public's safety." You'll hear that, I can almost guarantee it.
Don't be surprised when those on the sexual offenders list in most states are banned from owning/wearing Google Glasses as part of their punishment.
Businesses are going to quickly realize the exposure to both liability and corporate security and one after another companies, large and small, are going to ban Google Glass use within work areas. Because Google Glass can be used without notice, that ban will extend to even wearing the device on the premises. That will probably be welcomed by non-Glass using workers who will feel uncomfortable that coworkers might be recording them at work.
Then there are the concerns that will surely pop up over wiretapping laws. In many states it's illegal to record anyone without their permission. Imagine the flurry of legal activity that will result due to the fear that Google Glasses wearers have recorded others without notice. This could get messy very quickly.
Outside of the bar in Seattle none of these bans are official yet but don't be surprised when they start happening. People will have a knee-jerk reaction to the realization that Google Glass wearers can snap photos or worse, video of kids, other adults, or anything, really. The public outcry is going to be fast and furious, and authorities are going to do what they can to nip this potential privacy breach in the bud.

Wednesday, March 6, 2013

LinkedIn Wins Dismissal of Privacy Suit Over Hacking

LinkedIn Corp. (LNKD), the biggest online professional-networking service, won dismissal of a lawsuit claiming it failed to follow industry standards and its own promises in encrypting user password information.
The lawsuit, filed last year in federal court in San Jose, California, followed the company’s website being hacked and 6.5 million member passwords being posted on an unrelated website. In June, LinkedIn confirmed its site was hacked. The suit was based on alleged violations of California consumer protection statutes, breach of contract and negligence claims.
  LinkedIn Wins Dismissal of Privacy Lawsuit in California


The LinkedIn Corp. app logo is displayed on an Apple Inc. iPad in Des Plaines, Illinois. Photographer: Tim Boyle/Bloomberg 



Oct. 11 (Bloomberg) -- Jeff Weiner, chief executive officer of LinkedIn Corp., talks about job creation, the company's mobile strategy and premium services. He speaks with Nicole Lapin on Bloomberg Television's "Bloomberg West." (Source: Bloomberg)





In dismissing the case, U.S. District Judge Edward J. Davila said the plaintiffs didn’t read LinkedIn’s allegedly misrepresented privacy policy, which is necessary to support their claims.
The plaintiffs haven’t demonstrated they have standing to bring the lawsuit, Davila said, because they failed to demonstrate a “causal connection” between Mountain View, California-based LinkedIn’s alleged misrepresentation and their harm, according to yesterday’s ruling.
Jay Edelson, a lawyer representing plaintiffs in the case, didn’t immediately return a call yesterday after regular business hours seeking comment on the ruling.
The case is In re LinkedIn User Privacy Litigation, 12- cv-03088, U.S. District Court, Northern District of California (San Jose).
To contact the reporter on this story: Joel Rosenblatt in San Francisco at jrosenblatt@bloomberg.net

Monday, March 4, 2013

Lobbyists Targeting Liberal Groups Channeled Chinese Hackers' Strategy


Attorney General Eric Holder, center, accompanied by U.S. Intellectual Property Enforcement Coordinator Victoria Espinel, left, and Acting Commerce Secretary Rebecca Blank, speaks about strategy to mitigate the theft of US trade secrets, Wednesday, Feb. 20, 2013, in the Eisenhower Executive Office Building on the White House complex in Washington. (AP Photo/Jacquelyn Martin)
The revelation, made by the New York Times and a firm called Mandiant last month, that the Chinese military is engaging in a sophisticated campaign of Internet spying and cyber attacks targeting American corporations and government websites provoked widespread alarm. What hasn’t been noted is that the Chinese plot bears much in common with a conspiracy to spy on and sabotage liberal advocacy groups and unions—a plot developed on behalf of none other than the US Chamber of Commerce back in 2011.
Indeed, Mandiant identified the Chinese plot by combing through the database of hacking tools managed by the same individuals associated with the American firm that had been enlisted to help the Chamber execute its spying and hacking plan, before it was exposed by the hacktivist group Anonymous.
Attorneys for the Chamber were caught negotiating for a contract to launch a cyber campaign using practically identical methods to those attributed to the Chinese, which reportedly could be used to cripple vital infrastructure and plunder trade secrets from Fortune 100 companies. The Chamber was seeking to undermine its political opposition, including the Service Employee International Union (SEIU) and MoveOn.org, but apparently had to scotch the plan after it was revealed by Anonymous.
At the RSA Conference in San Francisco, the “nation’s largest gathering of cyber security professionals,” The Nation spoke to a number of experts who said the same invasive strategies employed by the Chinese military could be easily used in political campaigns and other political contexts by anyone willing to take the risk.
The story of both the Mandiant report and the American lobbyist hacking conspiracy begins in February of 2011, when the hacktivist group Anonymous stole some 70,000 e-mails from a Bethesda, Maryland-based firm called HBGary Federal and dumped them onto the Internet. HBGary Federal was an affiliate of HBGary, a firm that maintained a database and discussion forum of hacking software called Rootkit.com, which served as a “malware repository where researchers stud[ied] hacking techniques from all over the world.” It appears the Chinese hackers, known as the “Comment Crew,” had participated to gain the types of software used to compromise computers owned by dozens of American interests.
The Mandiant report details how the disclosure of Rootkit.com’s user database from Anonymous not only revealed the e-mail account associated with UglyGorilla, or Jack Wang, and SuperHard_M, or Mei Qiang, two of the alleged Chinese hackers, but the IP address that helped confirm the Shanghai Pudong location of the Chinese military office building, from which it launched attacks on US-based targets. As Nate Anderson of Ars Technica reported, the theft of HBGary Federal’s data offered the Mandiant researchers a “treasure trove of information.”
Rootkits, a term used to describe software that can gain access to computer systems without detection, can often be used for malicious purposes. Asked why he thought the Chinese military would participate in an American site like Rootkit.com, Richard Bejtlich, Mandiant’s Chief Security Officer, told The Nation that at least initially, “If you wanted to get up to speed on that technology, that’s where you went.”
Mandiant compared the information from the Rootkit.com user database with data from other cyber security breaches attributed to Chinese hacking attempts to come to the conclusions in their report.
According to the New York Times and Mandiant, the Shanghai-based Unit 61398 of the People’s Liberation Army employing the “Comment Crew” hackers relied largely upon spear-phishing (often an e-mail to trick the recipient into opening a document or attachment containing a malicious piece of software, like a rootkit) to gain access to firms like Coca-Cola, the National Electrical Manufacturers Association, EMC, and Telvent, a company that produces programs for remote access for oil and gas pipelines.
As policymakers and major American companies continue to react to the news about the Chinese hacking, similar threats could play a role in labor organizing and political campaigns.
The disclosure of HBGary Federal’s e-mails revealed one of the most brazen political espionage efforts in recent memory, which underscores this threat.
In October of 2010, HBGary Federal was solicited by Matthew Steckman of the firm Palantir on behalf of attorneys representing the US Chamber of Commerce “about offering a complete intelligence solution” and “social media exploitation.” The Chamber had dealt with critical news about an IRS complaint alleging that the insurance giant AIG had illegally laundered millions of dollars to the Chamber in September. Also around that time, I wrote a separate story for ThinkProgress revealing fundraising documents that showed the Chamber had solicited foreign corporate money for the same 501(c)(6) legal entity the Chamber used to run campaign commercials during the midterm elections. The leaked HBGary Federal e-mails show the Chamber was interested in responding aggressively to this pressure.
By November of that year, Palantir, HBGary Federal and another firm, Berico, had discussed the effort to push back against the Chamber’s critics several times with a number of the Chamber’s attorneys at the law/lobbying firm Hunton and Williams, and had prepared a series of presentations detailing their proposal to the Chamber. One of the attorneys involved in the discussions, Hunton and William's Richard Wyatt, had already been retained by the Chamber to sue the Yes Men, a comedic advocacy group, for impersonating the Chamber at a prank press conference.
The presentations, which were also leaked by Anonymous, contained ethically questionable tactics, like creating a “false document, perhaps highlighting periodical financial information,” to give to a progressive group opposing the Chamber, and then subsequently exposing the document as a fake to undermine the credibility of the Chamber’s opponents. In addition, the group proposed creating a “fake insider persona” to “generate communications” with Change to Win, a federation of labor unions that sponsored the watchdog site, US Chamber Watch.
Even more troubling, however, were plans by the three contractors to use malware and other forms of malicious software to hack into computers owned by the Chamber’s opponents and their families. Boasting that they could develop a “fusion cell” of the kind “developed and utilized by Joint Special Operations Command (JSOC),” the contractors discussed how they could use “custom malware development” and “zero day” exploits to gain control of a target’s computer network. These types of hacks can allow an attacker not only to snoop, but to delete files, monitor keystrokes, and manipulate websites, e-mail archives and any database connected to the target computer.
In January of 2011, Hunton and Williams, which had met with the Chamber to discuss the proposals, sent by courier a CD with target data to the contractors. The targets discussed in e-mails included labor unions SEIU, IBT, UFW, UFCW, AFL-CIO, Change to Win, as well as progressive organizations like the Center for American Progress, MoveOn.org, Courage Campaign, the Ruckus Society, Agit-Pop, Brave New Films and others.
Though HBGary markets itself as a firm that uses its expertise in cyber security to help both companies and the government defend against malicious attacks, the e-mail archives leaked by Anonymous make clear that executives at the firm were interested in selling this technology for offensive capabilities. In an e-mail with Greg Hoglund, the founder of both HBGary and Rootkit.com, and part owner of HB Gary Federal, Aaron Barr, HBGary Federal's chief executive, described a “spear phishing strategy” that could be used on “our adversaries.” In another e-mail chain, HBGary staff discussed using a fake “patriotic video of our soldiers overseas” to induce military officials to open malicious data extraction viruses; in another, they discuss the success of a dummy “evite” e-mail used to maliciously hack target computers.
The tactics described in the proposals are illegal. However, there were no discussions in the leaked e-mails about the legality of using such tactics. Rather, the Chamber’s attorneys and the three contractors quibbled for weeks about how much to charge the Chamber for these hacking services. At one point, they demanded $2 million a month.
HBGary Federal and their partners were scheduled to meet the Chamber to finalize the deal on February 14, 2011. However, on February 4, Barr boasted to the Financial Times that he was preparing to reveal the identities of Anonymous, which responded with the hack that spilled the contents of HBGary Federal’s e-mails and Rootkit.com’s user database. HBGary Federal had also entered into talks about working on behalf of Bank of America to discredit the website Wikileaks and its perceived allies in the media. The e-mail trail ends on February 6th; the Chamber, despite e-mails showing they met with Hunton and Williams to discuss the project, denied any knowledge of the proposal and said they had never compensated the firms or entered into any agreement for the work described in the proposals.
HBGary Federal, which shared the same owners and office space as HBGary, shut down in the wake of the leaked e-mails. Last year, HBGary was acquired by a military contracting firm called ManTech International for $23.8 million, according to disclosures with the Securities and Exchange Commission. The spokesperson for HBGary declined to comment on this story.
Although Rootkit.com is no longer online, similar websites like MetaSploit and TrustedSec offer hackers and cyber security professionals an array of software that could be used by anyone seeking to break into an organization, take control of their network, and seize data.
“There’s nothing so unique about how you break into an organization,” said Nick Levay, the Director of Technical Operations Information Security at the Center for American Progress, who spoke to The Nation by telephone. Levay, an expert on computer security, said there’s “lots of overlap” between the documented Chinese military cyber hacking incidents described by The New York Times and the Mandiant report and the tactics proposed by the contractors working with the Chamber’s attorneys.
Mandiant’s Richard Bejtlich described the malware tools as a firearm that could be used by anyone. “You could buy a firearm but what are you going to do with it? Is it for hunting or self-defense?” Researchers commonly use sites like MetaSploit to develop defense software against certain cyber attacks. Or, Bejtlich said, “Are you outfitting an army to conduct an insurgency where you’re going to harass a foreign military for ten years?”
Levay said that malware or phishing attempts may be difficult to detect if the perpetrator is only interested in gathering intelligence. However, “any disruption or sabotage, they’re going to get caught,” said Levay. Bejtlich made a similar case, arguing that if domestic political organizations or cyber criminals attempt to sabotage computers in the United States, “the Bureau’s going to find you.”
Large firms that have been victimized by malicious hacking, including Google and Intel, at least have the resources to detect and counter most forms of computer crimes. But what about a small company, or political advocacy group with little resources?
“Political campaigns, absolutely, they have to be vigilant that they will be attacked,” said Ajay Uggirala, the Director of Protect and Technical Marketing at the cyber security firm Solera Networks. “It’s going to be a dynamic,” Uggirala explained,  “I wouldn’t be surprised if people use the good tools we have for bad purposes on political candidates.”

Ethical Hacking Tutorials PDF

Today I am going to share some useful Ethical Hacking Tutorials/E-book/PDF .These PDFs are suitable for both the Novice and Expert in the field of Ethical Hacking.


1.Hacking For Beginners (A beginners guide for learning ethical hacking)




Download Link

2.The Hackers Underground Handbook



Download Link



3.Hacking for Dummies ( Access to Other Peoples Systems Made Simple)




Download Link


4.Gray Hat Hacking  (The Ethical Hackers Handbook, 3rd Edition [NepsterJay])





Download Link


5.Hacking Exposed-Web Applications - Web Application Security Secrets & Solutions



Download Link


6.Hacking Exposed - Windows



Download Link


7.Hacking Exposed - Linux



Download Link


8.Hacking Exposed - Malware And Rootkits



Download Link




9. Hacking Exposed-Wireless - Wireless Security Secrets & Solutions






Download Link




.


10.Ankit Fadia's E-book Collections.


Download Link


Please do comment if you need any specific e-books.