Translate

Tuesday 28 June 2011

Motorists are to be told officially for the first time which traffic cameras are the country's biggest money spinners under a new "transparency" move to be launched on Monday

Mike Penning, the Road Safety Minister, will order police and local authorities to stop treating drivers like "cash cows" and open up a whole range of previously hidden statistics to the public, The Sunday Telegraph has learned.
The evidence will give a broad picture - for the first time - of whether cameras have been effective in saving lives and preventing injury - or whether they are simply useful revenue raisers.
Up until now authorities have been reluctant to publish admit which cameras were the biggest income generators, with details having to be prised out of them using Freedom of Information laws.
One unit, at the southern end of the M11 in Essex, brought in fines totalling £2.3million in five years, while another, in Battersea, was estimated to earn £1million a year.
Now, however, local authorities will have to publish the numbers of accidents and casualties at camera sites - both before and after they were installed - within weeks.

 

French search engine seeks multi-million euro damages from Google

French search engine seeks multi-million euro damages from Google

1plusV pleads with Mountain View to end 'suffocation' of market
By Kelly Fiveash • Get more from this author

Posted in Music and Media, 28th June 2011 10:34 GMT
Free whitepaper - Email storage affecting productivity? SaaS email archiving can help
A French search engine is demanding damages of €295m from Google, in a legal spat over Mountain View's dominance of the market.

1plusV, a local rival to Google in France, alleged that Mountain View's command of the search engine biz had blocked the development of services offered by competitors in the country.



The French outfit charged that Google's dominance prevented lesser-known companies from lapping up ad revenue, and claimed that the world's largest search engine prioritises its own sites in query results over that of its rivals.

Paris-based 1plusV said it sought lost profits from Google in a lawsuit filed to the Paris Commercial Court this morning, reports Bloomberg.

The firm is also calling on Google to publish details of alleged antitrust business behaviour on its French homepage for three months.

"Google employed a number of anti-competitive practices and unethical behavior over a period of four years to cripple 1plusV's ability to generate business and advertising," said 1plusV in a statement to the news wire.

It claimed that the the actions included "suffocation of technological competitors" and "manipulation of 'natural results'".

1plusV said that between 2007 and 2010, around 30 "vertical search engines" created by the French firm had been blacklisted by Google.

It said that Google's ad service Adsense had suffocated the market by forcing rival search engines to adopt the web kingpin's technology.

"We have only just received the complaint so we can't comment in detail yet," Google's Brussels spokesman Al Verney told Bloomberg.

"We always try to do what's best for our users. It's the key principle that drives our company and we look forward to explaining this."

The lawsuit in France comes just days after Google confirmed that the US Federal Trade Commission had opened an antitrust investigation into its search and advertising practices.

That probe joins a growing list of complaints filed against Google including an ongoing investigation in the EU, that is expected to cover similar ground.

In the European Union, three vertical search engines have filed complaints against Google including UK-based Foundem and 1plusV.

The company filed a fresh complaint to the European Commission in February this year when it alleged Google was tying search terms and its AdWords service in an anti-competitive fashion, much the same way as Microsoft had bundled its Internet Explorer browser with its Windows operating system.

I

 

Hacking suspect Ryan Cleary 'has Asperger's syndrome

19-year-old charged with hacking the website of the UK Serious Organised Crime Agency has been diagnosed with Asperger's syndrome, a court has heard.

Ryan Cleary, from Wickford, Essex, was arrested as part of a Scotland Yard and FBI probe into online hacking group LulzSec.

His counsel told City of Westminster Magistrates' Court he had the form of autism, along with agoraphobia.

He was granted bail, but remains in custody after prosecutors objected.

Ben Cooper, defending Mr Cleary, said he was concerned the alleged hacker would have to remain in custody over the weekend.

The court was told he is of high intelligence but has difficulty interacting with other people.

But prosecutors refused to reconsider their bail appeal.

Mr Cleary is alleged to have set up a distributed denial of service (DDOS) attack on the Serious Organised Crime Agency (Soca) on 20 June.

A DDOS attack typically involves flooding a target website with data, in an attempt to overwhelm it so it cannot serve its legitimate users.

'Botnet conspiracy'
He has been accused of attacking the website of the International Federation of the Phonographic Industry in November 2010.

And Mr Cleary also allegedly attacked the British Phonographic Industry's website in October.

He was charged under the Criminal Law Act and Computer Misuse Act by the Met Police's e-crime unit.


The alleged offences were carried out from this house in Essex
The charges against Mr Cleary include conspiring with other unknown people on or before 20 June to construct a botnet - a collection of hijacked home computers - to conduct distributed denial of service attacks.

He is also charged with making, adapting, supplying or offering to supply a botnet, intending that it should be used to commit, or to assist in the commission of a distributed denial of service attack.

The bail appeal will go to a Plea and Case Management Hearing at Southwark Crown Court on 30 August.

If Mr Cleary wins bail he will be banned from having any possession which can access the internet.

No internet access will be allowed at his home, which he will be prohibited from leaving without his mother, Rita Cleary.

Mr Cleary has not entered a plea to any of the charges.

 

Motion Picture Association petitions BT to block access to Newzbin

The Motion Picture Association has applied for a high court injunction that would force internet provider BT to block public access to a file-sharing hub.

The outcome of this trial, which is a UK legal first, could set an alarming precedent. If the high court rules in favour of the MPA it could allow the entertainment industry to strong-arm BT and other broadband providers into censoring the internet.

The website in question is the British site Newzbin, an infamous black-market website that provides curated links to pirated movies, music and software on the Usenet discussion forums.

The site has had a tumultuous history with the law and the MPA. Its owner, Chris Elsworth, was found guilty of deliberately indexing copyrighted content in 2010. Newzbin then went into administration and the website and domain names were sold.

The site reappeared -- under new ownership and with fresh servers offshore from the Seychelles -- later that year.

Now the MPA has seemingly decided that if it can't take it offline, it can block people from accessing it. The industry body -- which represents studios like Sony, Fox, Warner and Paramount -- has targeted BT because of its dominating customer base and website-blocking technology.

BT has been using software called Cleanfeed since 2004 to automatically bar access to child abuse and pornography websites. Other ISPs license the technology or use similar systems -- and are instructed by the government to do so. The MPA wants BT to use Cleanfeed to cut access to Newzbin.

In a statement to BBC News, European president of the MPA, Chris Marcich, said, "Newzbin has no regard for UK law and it is unacceptable that it continues to infringe copyright on a massive and commercial scale. We have explored every route to get Newzbin to take down the infringing material and are left with no option but to challenge this in the courts."

BT has issued a statement to The Telegraph, stating, ""We can confirm that we will be appearing in court, following an application for an injunction by members of the MPA."

In 2010, Torrentfreak conducted an interview with "Mr White", who is allegedly the anonymous new owner of Newzbin. When asked what he would do if the MPA took new interest in the site, White said, "We'll just do a Pirate Bay on them. We can run faster than them and shapeshift."

The trial will be held at the High Court on 28 June 2011.

 

People who post ratings on websites tend to exaggerate, research suggests

Five-star product ratings on Amazon and restaurant review websites have long reassured online shoppers and diners that they will not be wasting their money.

Now, however, new research suggests that perhaps we should treat some of them with caution.

The findings, to be published in the Economic Journal, show that, in a world where everyone is competing to get their message across, there is a strong incentive for people to express extreme opinions.

According to Dr Kohei Kawamura, an economics lecturer at Edinburgh University, this incentive means that responses to survey questions that are more elaborate than simple "yes or no" are subject to exaggeration and, as a result, "less credible".

Using complex mathematical modelling, Kawamura traced how individuals reached their decisions when allowed to give more than a yes or no answer. The modelling suggests that in these situations individuals tend to exaggerate their views to compete for influence and attention. Consequently, as the number of information providers becomes larger, extreme messages prevail and such messages tend to be less credible.

Kawamura says his findings are relevant to a range of situations, from complex political issues to how seriously we should take customer reviews online. They indicate that we should "discount" one-star and five-star reviews because the reviewers are, by nature, inclined to post extreme responses to influence other potential customers.

"Think about the Amazon website, which has star rating from one to five for every product it sells," Kawamura said. "When there are many reviewers, each reviewer has only a small influence on potential customers and their temptation to write extreme reviews becomes large. This means we should discount extreme reviews more heavily when there are a larger number of reviews."

In contrast, simple binary questions – "yes or no", "for or against" – are revealed to be the most effective way of obtaining an accurate reading of public opinion. Such an approach is widely used when canvassing in referendums and opinion polls even though the issues are more complex.

"Since they have no chance to exaggerate, the outcome is completely trustworthy," Kawamura said. "The research demonstrates that simple binary opinion polls can indeed be just as informative as more detailed surveys, when many people are asked."

 

Wednesday 22 June 2011

British authorities charge teenager with launching DDoS attack, and anti-LulzSec group says it's tracing identities of the hacking group's members.

hacking group known as LulzSec shows no signs of slowing down. Early on Wednesday, the group announced that it had taken offline Brazil's official government website, as well as the Brazilian president's website. As of Wednesday afternoon, both sites still appeared to be unreachable.
LulzSec's activities and taunts come despite the arrest of a 19-year-old hacking suspect on Tuesday, outside London, who was reportedly involved in the group. "Seems the glorious leader of LulzSec got arrested, it's all over now... wait... we're all still here! Which poor bastard did they take down?" said LulzSec via Twitter.

We spoke with Chris Sather, Product Management for Network Defense at McAfee about McAfee's next generation firewalls that analyze relationships and not protocols.
LulzSec said the person arrested by British police, named by authorities on Wednesday as Ryan Cleary, ran a server on which one of LulzSec's many chat rooms had been hosted. "Clearly the UK police are so desperate to catch us that they've gone and arrested someone who is, at best, mildly associated with us. Lame," said the group via Twitter.
On Wednesday, British police charged Cleary on multiple counts, including an October 2010 distributed denial of service (DDoS) attack against the British Phonographic Industry website, and Monday's botnet-driven DDoS attack against the UK's Serious Organized Crime Agency (SOCA) website. That attack occurred under the #AntiSec banner, which is a LulzSec's joint operation with Anonymous.
2010 Threats: Why they happened and the tools available to thwart them.
Take a quick look back to prepare for future threats.
In the United States, meanwhile, an unnamed government official told The New York Times that a Tuesday raid against a data center in Reston, Va., run by DigitalOne, was in pursuit of information related to LulzSec and its affiliates, although the company whose information was targeted wasn't named. In the raid, FBI agents apparently seized hardware running multiple, hosted websites, knocking the others--not targeted in the investigation--offline.
Sergej Ostroumow, DigitalOne's chief executive, said in an email to customers that "tens of clients" had been affected, saying that "after F.B.I.'s unprofessional 'work' we can not restart our own servers, that's why our Web site is offline and support doesn't work." The company, which leases space from the data center's operator and had no employees onsite, hoped to bring the offline sites back up by Wednesday.
The FBI wasn't available for immediate comment.
If authorities are closing in on LulzSec, the group doesn't appear to be backing off. On Wednesday, the group released, via Pastebin, contact information for what it said were two people who tried to snitch on LulzSec by "leaking some of our affiliates' logs." LulzSec alleged that the two people--named as Marshal Webb and Michael Dean Major--had orchestrated last month's hack and defacement of the Eidos Montreal website. In that attack, hackers reportedly stole information on at least 80,000 users of the company's Deus Ex: Human Revolution game.
LulzSec also warned that there had been a rash of Pastebin posts purposing to be from the group, such as the announcement that LulzSec planned to release a complete copy of the U.K. 2011 census data. "That wasn't us--don't believe fake LulzSec releases unless we put out a tweet first," the group said via its Twitter feed.
Are law enforcement agencies close to unmasking LulzSec? While British police did bust Cleary, aka "ViraL," he had already been publicly named--in anonymous Pastebin posts released last month--as someone who interacted with LulzSec members via IRC. Some posts also alleged that he was a "4chan DDoS attacker," referring to the freewheeling 4chan forum and imageboard in which all members are supposed to be anonymous.
Cleary was also mentioned in multiple tweets earlier this month from Twitter user Power2All. Those messages warned LulzSec via Twitter to "avoid and ignore lulzco IRC net, your IP will be compromised by Ryan Cleary." According to Power2All, Cleary's server logged IP addresses and leaked them to the Internet.
In the wake of Tuesday's arrest of Cleary, a post on the anti-LulzSec blog "LulzSec Exposed" also said that Cleary was "just an IRC operator" for LulzSec, and that the group's leader went by the handle of Sabu. It also said that the arrest of Cleary would give law enforcement agencies a leg up on LulzSec. "Bad news for LulzSec, count your days as we count your heads," said a blog post on LulzSec Exposed. "As Ryan is arrested, your IRC irc.lulzco.org logs are with FBI, SOCA and Interpol."
The group also alleged that LulzSec members, having been exposed, were starting to flee, and that the group's joint operations with Anonymous are a ploy to keep the LulzSec brand going. "They also want to keep the legacy of Lulzsec even after their arrests by recruiting new people ... to continue it and create havoc among security companies."
Also on Wednesday, LulzSec Exposed named Power2All, the admin for the Anonymous IRC channel (Anonops), as Netherlands-based PHP programmer Jasper Lingers. But a message via the Power2All Twitter feed fired back, "I am not lulzsec, neither anonymous. AnonOps is a platform to chat on ... Nothing illegal about a chat server."

 

Monday 20 June 2011

New web domain suffixes approved by ICANN

THE cyber sphere was warned to prepare for a bumpy regulatory ride after the peak naming authority yesterday passed a resolution to allow organisations to run their own generic domain suffixes alongside the likes of .net, .org and .com.

The Internet Corporation for Assigned Names and Numbers board yesterday ratified the protocols for companies and organisations to apply for the generic top-level domains (gTLDs) at its 41st international convention in Singapore.

In a landslide 18-to-one (and two abstentions), the board passed a resolution to accept applications for generic top-level-domains for three months from January 12, next year.

The announcement ends an era of fractious and protracted negotiations among internet stakeholders on how to get the protocols and processes for applying for the domains correct.

Placing his vote in the affirmative, ICANN board member Steve Crocker warned ICANN staff and the internet community to get ready for a period of frenetic activity and some conflict as the application process opens.



"Strap yourself in. There'll be a little bit of turbulence along the way, but it will be an exciting ride," Mr Crocker said.

Former ICANN vice-president Paul Levins said the resolution marked the biggest change in the internet addressing system since its inception.

"This is an enormous change," Mr Levins said.

"We don't know all the innovations this will produce, but what we know is that it will produce a lot of it.

"It's not been some overnight decision. It's been part of ICANN'S remit since its establishment in 1999 -- to introduce competition and increase the number of gTLDs."

The new system is expected to radically change the landscape of the internet naming system as it will vastly expand the range of domain names used on the web beyond the 21 common domain suffixes and 30 or so well-known country code names with which consumers are familiar.

ICANN anticipates that between 300 and 1000 new gTLDs could be created under the application process.

Domain registry services provider Melbourne IT recently surveyed 150 of its largest customers and found that 92 per cent were interested in applying for a gTLD matching their brand.

It would also allow cities, states and provinces to create web name suffixes based on their titles. For instance, New York, Paris and Berlin are among cities expected to apply for the top-level-domains .nyc, .paris and .berlin.

In Australia, Sydney and Melbourne have expressed interest in applying for the names .melbourne and .sydney.

The move is also expected to result in a flurry of activity developing gTLDs in non-Roman characters.

ICANN is expected to begin a market education program before opening the application process next year.

The first gTLD names are not expected to be approved until late next year.

 

Saturday 18 June 2011

Oracle Corp is seeking damages "in the billions of dollars" from Google Inc

Oracle Corp is seeking damages "in the billions of dollars" from Google Inc in a patent lawsuit over the smartphone market, according to a court filing.

The disclosure on Thursday was the first time either side publicly mentioned the cumulative scale of Oracle's damages claims.

Oracle sued Google last year, claiming the Web search company's Android mobile operating technology infringes Oracle's Java patents. Oracle bought the Java programing language through its acquisition of Sun Microsystems in January 2010.

Some see the lawsuit as a sign of a growing business rivalry between the two companies.

The case is also part of a wider web of litigation among phone makers and software firms over who owns the patents used in smartphones and tablets, as rivals aggressively rush into a market in which Apple jump-started with iPhone and iPad.

Barring any settlements, a trial between Oracle and Google is expected to begin by November.

Google has called an Oracle damages report "unreliable and results-oriented," and asked a U.S. judge in San Francisco to ignore it, court documents show. In disputing Oracle's methodology, Google also asked the court to keep private some damages information Google disclosed in a court filing.

Oracle then accused Google of trying to conceal the fact Oracle's damages claims in the case are in the billions, according to a document filed on Thursday. Oracle said it did not object to having the information about its damages become public.

Due to Oracle's stance, U.S. District Judge William Alsup ordered Google on Thursday to make public the damages information by Friday.

A Google representative declined to comment.

The case in U.S. District Court, Northern District of California, is Oracle America, Inc v. Google Inc, 10-3561.

Sega Pass website hacked

Sega has warned that the Sega Pass network of sites, which includes its gaming forums and press resources websites, has been hacked.

The gaming company revealed the hack on Friday by sending an email to registered members. It reassured users that no payment information had been compromised as it uses third-party payment providers to handle transactions.

"Over the last 24 hours we have identified that unauthorised entry was gained to our Sega Pass database," the email said. "We immediately took the appropriate action to protect our consumers' data and isolate the location of the breach. We have launched an investigation into the extent of the breach of our public systems."

The company said that the information obtained included email addresses, dates of birth and encrypted passwords. It re-iterated that none of the passwords obtained were stored in plain text.

The hack is the latest in a recent trend to centre on gaming companies. Sony has been the victim of repeated attacks to its gaming network and websites. In June, Nintendo also said it had been hacked.

Update: The LulzSec hacker group has offered to help Sega find the hackers responsible.

"@Sega - contact us. We want to help you destroy the hackers that attacked you. We love the Dreamcast, these people are going down," LulzSec posted on Twitter on Friday.

 

Student who ran file sharing site TVShack could face extradition to US

The mother of a British student who is facing extradition to the United States over alleged copyright offences online has spoken of her anguish that he could face a possible jail sentence.

In a case carrying echoes of that of Gary McKinnon, the computer hacker who has spent years fighting US extradition, 23-year-old undergraduate Richard O'Dwyer was arrested late last month at the request of the US immigration and customs enforcement department.

Until last year, when police and US officials first visited him at his student accommodation in Sheffield, O'Dwyer ran a website called TVShack which provided links to other sites where users could download pirated versions of films and television shows. He appeared before magistrates in the capital this week for a preliminary hearing into the planned extradition, which he is fighting.

The case seemed "beyond belief", said O'Dwyer's mother, Julia, from Chesterfield. "The first he knew about it was this visit from the police and the American officials in November," she said. "He shut the website down the very next day and I don't think he expected it to go this far. But then in May he even had to spend a night in Wandsworth prison as the court was too slow for us to sort out his passport and bail.

"Richard's still studying in Sheffield. He's doing his best not to think about it. But it's a real strain for the family. I wake up every morning and think about it. What we can do? I'm no expert but I've read the extradition treaty from cover to cover."

It is the UK's 2003 extradition agreement with the US, campaigners say, which is at the centre of the problem. Much criticised in the case of McKinnon, it currently contains no provision for what is known legally as forum, which would allow a UK judge to consider whether a case is best heard in the UK or abroad.

O'Dwyer's mother says she is baffled why a case with no direct links to the US – her son last went there aged five – should be heard in the US. Her lawyers agree.

"The (computer) server was not based in the US at all," O'Dwyer's barrister, Ben Cooper, who has also been heavily involved in the McKinnon case, told Tuesday's hearing at Westminster magistrates court. "Mr O'Dwyer did not have copyrighted material on his website; he simply provided a link. The essential contention is that the correct forum for this trial is in fact here in Britain, where he was at all times."

Some experts on digital law question whether providing links to illegal downloads rather than directly hosting them would even constitute an offence in the UK. In February last year charges involving fraud and copyright against a similar site, TV-Links, were dismissed after a judge ruled that linking alone was not illegal.

"If it's an offence under UK law, then it has to be prosecuted and tested under UK law," said James Firth of the Open Digital Policy Organisation thinktank. "If there is no offence under UK law, then there is no 'victim' to copyright infringement and no case for extradition."

Civil liberties groups have also questioned why the government has not swiftly amended the extradition law by enacting a pre-existing but dormant forum clause, given that both coalition parties were heavily critical of it while in opposition. In September last year the home secretary, Theresa May, instead ordered a wider, year-long review of all extradition laws.

"The government hasn't acted in time. This is exactly what we warned against," said Isabella Sankey, director of policy for Liberty. "Enacting the forum amendment would have been quite simple. It's not that we're arguing that in every case where activity has taken place here we shouldn't allow people to be extradited. But we should at least be leaving our judges some discretion to look at the circumstances."

 

Monday 13 June 2011

The International Monetary Fund has become the latest, and potentially the most serious, victim of an attack by computer hackers.


The organisation, which has been orchestrating the sensitive bailouts of European governments and dealing with the fallout from an attempted rape charge against its former boss, had been under assault for several months, it discovered last week.

The fund told staff that its computer system had been compromised, but did not make a public announcement. It is still trying to discover the extent of the attack, its source and its motives. Yesterday, it would say only that the fund remains "fully functional".


In an internal memo, IMF chief information officer Jonathan Palmer said: "Last week we detected some suspicious file transfers, and the subsequent investigation established that a Fund desktop computer had been compromised and used to access some Fund systems. At this point, we have no reason to believe that any personal information was sought for fraud purposes."

The IMF is the organisation for governments that find themselves on the verge of financial crisis, so the discovery of the attack caused concern that sensitive information about the finances of governments might have fallen into the wrong hands. Speculators trading currencies or government bonds on the global financial markets could make profitable use of such stolen information, while internal political opponents and foreign intelligence services could also find explosive information about government dealings with the fund.

Also under suspicion is the "hacktivist" group Anonymous, a loose affiliation of hackers who have taken aim at companies and organisations over several years. Its high-profile attacks have stepped up since the controversy over WikiLeaks's publication of leaked military and diplomatic documents. Last month, Anonymous condemned the Greek government and the IMF for accepting a €110bn bailout package that was conditional on cutting public services, without letting citizens vote on the agreement.

The deal – and a second deal now under negotiation with the IMF and other eurozone governments – subjects the people of Greece to "prolonged poverty and a dramatic decrease in their standards of living", Anonymous said. "The people of Greece have been left with no other option than to take to the streets in a peaceful revolution against the economic tyrants that are the IMF."

The IMF said at the time of the Anonymous threat that it was taking action to strengthen its systems against hackers.

The attack began before the arrest of the IMF's managing director, Dominique Strauss-Kahn, in New York on 14 May on charges that he attempted to rape a hotel maid. He resigned his post and is now under house arrest in a rented house in Manhattan, awaiting trial.

The French finance minister Christine Lagarde is the front-runner to replace him, after nominations closed last Friday. A surprise candidate, Stanley Fischer, a governor of the Bank of Israel and former IMF deputy chief, has also put his name forward, though his bid is seen as a long-shot because he is both above the formal age limit of 65 and a US citizen. The US already holds the top post at the World Bank, the IMF's sister organisation.

Jeff Moss, a veteran computer hacker who worked under the pseudonym The Dark Tangent and who advised the Obama administration on cyber-security, said he believed the IMF attack could have been conducted on behalf of a nation-state looking to either steal sensitive information about key IMF strategies or embarrass the organisation to undermine its clout. He told Reuters it could inspire attacks on other large institutions. "If they can't catch them, I'm afraid it might embolden others to try," he said.

On Friday, Spain arrested three people it said were members of Anonymous, on suspicion of being part of the attacks on the websites of Banco Bilbao Vizcaya Argentaria, the country's second biggest bank, and Enel, the Italian owner of Spanish power company Endesa.

Over the weekend, access to the website of Spain's national police force was blocked in an apparent reprisal attack by hackers. On its Twitter feed, Anonymous had warned the Spanish authorities: "We are Legion, so EXPECT US.

Hot on the heels of Spain's recent arrest of three members of the hacking group known as "Anonymous," Turkish police are now claiming to have rounded up an additional 32 members of the group.

Hot on the heels of Spain's recent arrest of three members of the hacking group known as "Anonymous," Turkish police are now claiming to have rounded up an additional 32 members of the group.

According to Security Week:

"The Anatolia news agency said today that the suspects were taken into custody after conducting raids in a dozen cities for suspected ties to Anonymous.

The group recently targeted Web sites of the country's telecommunications watchdog, the prime minister's office and parliament as a protest to Turkey's plans to introduce Internet filters."

Spanish authorities arrested three members late last week with alleged ties to the infamous PlayStation Network hacks. The BBC reports that in retaliation to the arrests in Spain, other members of Anonymous apparently knocked Spain's police website offline for about an hour yesterday.

Sunday 12 June 2011

County council fined £120,000 for emailing intimate details to cab firm

Intimate details of 241 vulnerable individuals were wrongly emailed to a cab firms mini-bus companies by Surrey County Council, it can be revealed.
A catalogue of privacy blunders at the council has been uncovered by the Information Commissioner’s Office, which has fined Surrey £120,000 for breaches of the Data Protection Act.
In May last year, a member of staff working for an Adult Social Care Team emailed the unencrypted file that contained 241 individuals’ physical and mental health details to the wrong group email address. Although the Council tried to recall the message, it could not confirm that all recipients had destroyed it and had not forwarded it on to others.
The next month, confidential personal details were accidentally emailed to people who had signed up to receive a council newsletter.
In January of this year, the council’s Children Services department sent confidential sensitive information about an individual’s health, to the wrong internal group email address.
Christopher Graham, the Information Commissioner, said, ““This significant penalty fully reflects the seriousness of the case. Any organisation handling sensitive information must have appropriate levels of security in place. Surrey County Council has paid the price for their failings and this case should act as a warning to others that lax data protection practices will not be tolerated.”
The ICO’s office said that £120,000 penalty reflected the council’s failure to ensure that it had appropriate security measures in place to handle sensitive information. The council said it had subsequently improved its policies and training and developed an ‘early warning’ system.
A Surrey County Council spokesman said: “These incidents should never have occurred and we have apologised to the people involved. Immediate action has been taken to prevent this happening again. Measures have already been taken to reduce the risk of sensitive personal data being wrongly addressed and extra training on handling data securely has been given. We accept the commissioner’s findings but feel the money we were fined by another public sector organisation would have been better spent making further improvements in Surrey."

 

The International Monetary Fund (IMF) says it has been targeted by a sophisticated cyber attack.



Officials at the fund gave few details but said the attack earlier this year had been "a very major breach" of its systems, the New York Times reports.

Cyber security officials said the hack was designed to install software to create a "digital insider presence".

The IMF, which holds sensitive economic data about many countries, said its operations were fully functional.

The cyber attack took place over several months, and happened before former IMF chief Dominique Strauss-Kahn was arrested over sexual assault charges.

"I can confirm that we are investigating an incident," said spokesman David Hawley.

"I am not in a position to elaborate further on the extent of the cyber security incident."

The New York Times said IMF staff had been told of the intrusion on Wednesday by e-mail, but that the Fund had not made a public announcement.

The e-mail warned that "suspicious file transfers" had been detected and that an investigation had shown a desktop at the Fund had been "compromised and used to access some Fund systems".

There was "no reason to believe that any personal information was sought for fraud purposes," it said.

High profile breaches
A cyber security expert told Reuters the infiltration had been a targeted attack which installed software designed to give a nation state a "digital insider presence" at the IMF.

"The code was developed and released for this purpose," said Tom Kellerman, who has worked for the Fund.

Bloomberg quoted an unnamed security expert as saying the hackers were connected to a foreign government. However, such attacks are very difficult to trace.

The World Bank said it briefly cut its network connection with the Fund out "an abundance of caution".

"The World Bank Group, like any other large organisation, is increasingly aware of potential threats to the security of our information system and we are constantly working to improve our defences," said spokesman Rich Mills.

The incident is the latest in a string of high-profile cyber security breaches.

In April, the Sony Playstation network was shut down after hackers stole the personal data of about 100 million accounts and in May, US defence firm Lockheed Martin said it had come under a significant cyber-attack.

CIA Director Leon Panetta told the US Congress earlier this week that a large-scale cyber attack while would cripples power, finance, security and governmental systems was "a real possibility in today's world".

Another day, another hack, this time, it was UK's largest games publisher, Codemasters, who admitted that it was hacked and that the criminals managed to steal the names, date of birth, passwords and email addresses of thousands of customers.

Another day, another hack, this time, it was UK's largest games publisher, Codemasters, who admitted that it was hacked and that the criminals managed to steal the names, date of birth, passwords and email addresses of thousands of customers.

In an extraordinary turn, Codemasters have been forced to pull down their websites and have currently redirected both their US and UK websites to their Facebook page, highlighting not only the importance of the social networking website but also Codemasters inability to provide with a proper plan B. A spokesperson for the company confirmed that "A new website will launch later in the year."


Interestingly, Codemasters' player accounts system and its community forums are still active at the time of writing even though the company has suspended the ability to change forum/codeM passwords.

On Thursday, a note was posted on Codemasters Forum by the director of Community Relations, saying that the main site was compromised on the 3rd of June.

The intruders managed to get access to Codemasters corporate website and subdomains as well a the DiRT 3 VIP code redemption page, the Codemasters EStore (where they had access to Customer names and addresses, email addresses, telephone numbers, encrypted passwords and order history) as well as the main Codemasters CodeM database.

Friday 10 June 2011

One of the UK's biggest computer games developers has confirmed the personal details of many of its customers have been stolen, after its systems were hacked.

 

Codemasters - which makes games for consoles including the Microsoft Xbox and Nintendo Wii - has said customer names and addresses, e-mail addresses, telephone numbers and encrypted passwords have been taken.

It follows a number of similar computer hacks, including two against Sony which saw the data of almost 100 million users taken.

Codemasters has now taken its website off line, following the breach last Friday.

The company said it had emailed every customer ever registered on the site in the wake of the data theft but insisted no payment details have been compromised.

Offering its apologies for the security breach, the firm urged users to be "extra cautious of potential scams, via email, phone, or post that ask you for personal or sensitive information".

"Unfortunately, Codemasters is the latest victim in ongoing targeted attacks against numerous game companies," it told recipients of the letter.

 

"We assure you that we are doing everything within our legal means to track down the perpetrators and take action to the full extent of the law.

"We apologise for this incident and regret any inconvenience caused. We are contacting all customers who may have been affected directly."

Users of the website were also encouraged to change any passwords "associated with other Codemasters accounts".

Spokesman Rich Eddy said the company still had no idea who targeted the site but said the attack could "quite possibly" affect tens of thousands of people.

Visitors to the website - codemasters.com - were being directed to its Facebook page.

A new site will be launched later in the year.

Last month, Japanese company Sony revealed it had suffered two massive breaches of security.

The first attack - which saw the theft of data from 77 million users of its PlayStation network - was one of the worst break-ins in internet history.

In the second intrusion, an extra 24.6 million computer game users may have had their personal details stolen.  

Thursday 9 June 2011

Computer hackers have penetrated NHS systems, triggering fears that the security of highly sensitive patient records is at risk.



The hackers are part of the same online gang that recently hacked into electronics giant Sony, accessing the images of a million users. 

The self-styled 'pirate ninjas', known as Lulz Security, sent a warning to the NHS that its computer networks were vulnerable to cyber attack.


The self-styled 'pirate ninjas', known as Lulz Security, sent a warning to the NHS that its computer networks were vulnerable to cyber attack. 

In an email to health staff, hackers gave evidence of some of the passwords, saying: 'While you aren't considered an enemy - your work is of course brilliant - we did stumble upon several of your admin passwords.'

The hackers added: 'We mean you no harm and only want to help you fix your tech issues.' 

Their warning was relayed on Twitter - but with sensitive passwords blacked out.

Health officials have played down the security lapse, insisting it affected only local systems and that no patient records were accessed.

But they immediately issued emergency instructions to NHS systems administrators on how to protect IT systems. 


Health officials have played down the security lapse, insisting it affected only local systems and that no patient records were accessed (file picture)

Politicians and campaigners warned that the security breach showed how vulnerable the NHS was to data leaks.

Government plans to put all patients into a centralised database have already been condemned by the National Audit Office.

The £11.4billion IT system was declared a disaster by experts, who warned it would not provide value for money.

 

Tory MP Richard Bacon, a member of the Public Accounts Committee, said: 'This highlights a very serious problem which the NHS and Department of Health seem to have downplayed.

'It also points to further danger as we move towards centralised medical records. It will concern millions of people who want their records to be in safe hands.'

Daniel Hamilton, of campaign group Big Brother Watch, said: 'The NHS has had plenty of warning that security is not up to scratch; this should not have been possible in the first place.

'It is another nail in the coffin of the case for centralising patient records.'

But the Department of Health denied that any patient information was at risk.

A spokesman said: 'This is a local issue affecting a very small number of website administrators. No patient information has been compromised.

'No national NHS information systems have been affected. The department has issued guidance to the local NHS about how to protect and secure all their information assets.'

Earlier this month, Lulz Security hackers claimed they had broken into servers run by SonyPictures.com, accessing the details of a million users.

The group, known as LulzSec, said it had also hacked into Nintendo's website.

Chancellor George Osborne and Defence Secretary Liam Fox have warned of a higher threat from hacking in recent weeks.

More than 20,000 malicious emails are targeted at UK government networks every month, Mr Osborne said.

 

Wednesday 8 June 2011

Stuxnet virus attack represented a new kind of threat to critical infrastructure.

computer in Iran started repeatedly rebooting itself, seemingly without reason. Suspecting some kind of malicious software (malware), analysts at VirusBlokAda, an antivirus-software company in Minsk, examined the misbehaving machine over the Internet, and soon found that they were right. Disturbingly so: the code they extracted from the Iranian machine proved to be a previously unknown computer virus of unprecedented size and complexity.

On 17 June 2010, VirusBlokAda issued a worldwide alert that set off an international race to track down what came to be known as Stuxnet: the most sophisticated computer malware yet found and the harbinger of a new generation of cyberthreats. Unlike conventional malware, which does its damage only in the virtual world of computers and networks, Stuxnet would turn out to target the software that controls pumps, valves, generators and other industrial machines.

"It was the first time we'd analysed a threat that could cause real-world damage, that could actually cause some machine to break, that might be able to cause an explosion," says Liam O Murchu, chief of security response for the world's largest computer-security firm, Symantec in Mountain View, California.

Stuxnet provided chilling proof that groups or nations could launch a cyberattack against a society's vital infrastructures for water and energy. "We are probably just now entering the era of the cyber arms race," says Mikko Hypponen, chief research officer for F-Secure, an antivirus company based in Helsinki.

Worse yet, the Stuxnet episode has highlighted just how inadequate are society's current defences — and how glaring is the gap in cybersecurity science.

Computer-security firms are competitive in the marketplace, but they generally respond to a threat such as Stuxnet with close collaboration behind the scenes. Soon after VirusBlokAda's alert, for example, Kaspersky Lab in Moscow was working with Microsoft in Redmond, Washington, to hunt down the vulnerabilities that the virus was exploiting in the Windows operating system. (It was Microsoft that coined the name Stuxnet, after one of the files hidden in its code. Technically, Stuxnet was a 'worm', a type of malware that can operate on its own without needing another program to infect. But even experts often call it a 'virus', which has become the generic term for self-replicating malware.)

One of the most ambitious and comprehensive responses was led by Symantec, which kept O Murchu and his worldwide team of experts working on Stuxnet around the clock for three months. One major centre of operations was Symantec's malware lab in Culver City, California, which operates like the digital equivalent of a top-level biological containment facility. A sign on the door warns visitors to leave computers, USB flash drives and smart phones outside: any electronic device that passes through that door, even by mistake, will stay there. Inside the lab, the team began by dropping Stuxnet into a simulated networking environment so that they could safely watch what it did. The sheer size of the virus was staggering: some 15,000 lines of code, representing an estimated 10,000 person hours in software development. Compared with any other virus ever seen, says O Murchu, "it's a huge amount of code".

Equally striking was the sophistication of that code. Stuxnet took advantage of two digital certificates of authenticity stolen from respected companies, and exploited four different 'zero day vulnerabilities' — previously unidentified security holes in Windows that were wide open for hackers to use.

Then there was the virus's behaviour. "Very quickly we realized that it was doing something very unusual," recalls O Murchu. Most notably, Stuxnet was trying to talk to the programmable logic controllers (PLCs) that are used to direct industrial machinery. Stuxnet was very selective, however: although the virus could spread to almost any machine running Windows, the crucial parts of its executable code would become active only if that machine was also running Siemens Step7, one of the many supervisory control and data acquisition (SCADA) systems used to manage industrial processes.



Click for larger image
Many industrial control systems are never connected to the Internet, precisely to protect them from malware and hostile takeover. That led to another aspect of Stuxnet's sophistication. Like most other malware, it could spread over a network. But it could also covertly install itself on a USB drive. So all it would take was one operator unknowingly plugging an infected memory stick into a control-system computer, and the virus could explode into action (see 'How a virus can cripple a nation').

Murky motives

It still wasn't clear what Stuxnet was supposed to do to the Siemens software. The Symantec team got a clue when it realized that the virus was gathering information about the host computers it had infected, and sending the data back to servers in Malaysia and Denmark — presumably to give the unknown perpetrators a way to update the Stuxnet virus covertly. Identifying the command and control servers didn't allow Symantec to identify the perpetrators, but they were able to convince the Internet service providers to cut off the perpetrators' access, rerouting the traffic from the infected computers back to Symantec so that they could eavesdrop. By watching where the traffic to the servers was coming from, O Murchu says, "we were able to see that the majority of infections were in Iran" — at least 60% of them. In fact, the infections seemed to have been appearing there in waves since 2009.

The obvious inference was that the virus had deliberately been directed against Iran, for reasons as yet unknown. But the Symantec investigators couldn't go much further by themselves. They were extremely knowledgeable about computers and networking, but like most malware-protection teams, they had little or no expertise in PLCs or SCADA systems. "At some point in their analysis they just couldn't make any more sense out of what the purpose of this thing was, because they were not able to experiment with the virus in such a lab environment," says Ralph Langner, a control-system security consultant in Hamburg, Germany.

Langner independently took it upon himself to fill that gap. Over the summer, he and his team began running Stuxnet in a lab environment equipped with Siemens software and industrial control systems, and watching how the virus interacted with PLCs. "We began to see very strange and funny results immediately, and I mean by that within the first day of our lab experiment," he says.

Those PLC results allowed Langner to infer that Stuxnet was a directed attack, seeking out specific software and hardware. In mid-September 2010, he announced on his blog that the evidence supported the suspicion that Stuxnet had been deliberately directed against Iran. The most likely target, he then believed, was the Bushehr nuclear power plant.

Industrial sabotage

Speculative though Langner's statements were, the news media quickly picked up on them and spread the word of a targeted cyberweapon. Over the next few months, however, as Langner and others continued to work with the code, the evidence began to point away from Bushehr and towards a uranium-enrichment facility in Natanz, where thousands of centrifuges were separating the rare but fissionable isotope uranium-235 from the heavier uranium-238. Many Western nations believe that this enrichment effort, which ostensibly provides fuel for nuclear power stations, is actually aimed at producing a nuclear weapon. The malware code, according to Langner and others, was designed to alter the speed of the delicate centrifuges, essentially causing the machines to spin out of control and break.

That interpretation is given credence by reports from the International Atomic Energy Agency (IAEA) in Vienna, which document a precipitous drop in the number of operating centrifuges in 2009, the year that many observers think Stuxnet first infected computers in Iran.

“We are probably just now entering the era of the cyber arms race.”
True, the evidence is circumstantial at best. "We don't know what those machines were doing" when they weren't in operation, cautions Ivanka Barszashka, a Bulgarian physicist who studied Iranian centrifuge performance while she was working with the Federation of American Scientists in Washington DC. "We don't know if they were actually broken or if they were just sitting there." Moreover, the Iranian government has officially denied that Stuxnet destroyed large numbers of centrifuges at Natanz, although it does acknowledge that the infection is widespread in the country. And IAEA inspection reports from late 2010 make it clear that any damage was at most a temporary setback: Iran's enrichment capacity is higher than ever.

However, if Natanz was the target, that does suggest an answer to the mystery of who created Stuxnet, and why. Given the knowledge required — including expertise in malware, industrial security and the specific types and configurations of the industrial equipment being targeted — most Stuxnet investigators concluded early on that the perpetrators were backed by a government.

Governments have tried to sabotage foreign nuclear programmes before, says Olli Heinonen, a senior fellow at the Belfer Center for Science and International Affairs at Harvard University in Cambridge, Massachusetts, and former deputy director-general of the IAEA. In the 1980s and 1990s, for example, Western governments orchestrated a campaign to inject faulty parts into the network that Pakistan used to supply nuclear technology to countries such as Iran and North Korea. Intelligence agencies, including the US Central Intelligence Agency, have also made other attempts to sell flawed nuclear designs to would-be proliferators. "Stuxnet," says Heinonen, "is another way to do the same thing."

Langner argues that the government behind Stuxnet is that of the United States, which has both the required expertise in cyberwarfare and a long-standing goal of thwarting Iran's nuclear ambitions. Throughout the summer of 2010, while Langner, Symantec and all the other investigators were vigorously trading ideas and information about Stuxnet, the US Department of Homeland Security maintained a puzzling silence, even though it operates Computer Emergency Readiness Teams (CERTs) created specifically to address cyberthreats. True, the CERT at the Idaho National Laboratory outside Idaho Falls, which operates one of the world's most sophisticated testbeds for industrial control systems, did issue a series of alerts. But the first, on 20 July 2010, came more than a month after the initial warning from Belarus and contained nothing new. Later alerts followed the same pattern: too little, too late. "A delayed clipping service," said Dale Peterson, founder of Digital Bond, a SCADA security firm in Sunrise, Florida, on his blog.

"There is no way that they could have missed this problem, or that this is all a misunderstanding. That's just not possible," says Langner, who believes that the Idaho lab's anaemic response was deliberate, intended to cover up the fact that Stuxnet had been created there.

But even Langner has to admit that the evidence against the United States is purely circumstantial. (The US government itself will neither confirm nor deny the allegation, as is its practice for any discussion of covert activity.) And the evidence against the other frequently mentioned suspect, Israel, is even more so. Symantec, for example, points out that a name embedded in Stuxnet's code, Myrtus, could be a reference to a biblical story about a planned massacre of Jews in Persia. But other investigators say that such claims are beyond tenuous. "There are no facts" about Israel, declares Jeffrey Carr, founder and chief executive of Taia Global, a cybersecurity consulting company in Tysons Corner, Virginia.

The Aftermath

The 'who?' may never be discovered. Active investigation of Stuxnet effectively came to an end in February 2011, when Symantec posted a final update to its definitive report on the virus, including key details about its execution, lines of attack and spread over time. Microsoft had long since patched the security holes that Stuxnet exploited, and all the antivirus companies had updated their customers' digital immune systems with the ability to recognize and shut down Stuxnet on sight. New infections are now rare — although they do still occur, and it will take years before all the computers with access to Siemens controllers are patched.

If Stuxnet itself has ceased to be a serious threat, however, cybersecurity experts continue to worry about the larger vulnerabilities that it exposed. Stuxnet essentially laid out a blueprint for future attackers to learn from and perhaps improve, say many of the investigators who have studied it. "In a way, you did open the Pandora's box by launching this attack," says Langner of his suspicions about the United States. "And it might turn back to you guys eventually."

Cybersecurity experts are ill-prepared for the threat, in part because they lack ties to the people who understand industrial control systems. "We've got actually two very different worlds that traditionally have not communicated all that much," says Eric Byres, co-founder and chief technology officer of Tofino Industrial Security in Lantzville, Canada. He applauds Symantec, Langner and others for reaching across that divide. But the effort required to make those connections substantially delayed the investigation.

The divide extends into university computer-science departments, say Byres, himself an ex-academic. Researchers tend to look at industrial-control security as a technical problem, rather than an issue requiring serious scientific attention, he says. So when graduate students express interest in looking at, say, cryptography and industrial controls, they are told that the subject is not mathematically challenging enough for a dissertation project.

"I'm not aware of any academic researchers who have invested significantly in the study of Stuxnet," agrees Andrew Ginter, director of industrial security for the North American group of Waterfall Security Solutions, based in Tel Aviv, Israel. Almost the only researchers doing that kind of work are in industrial or government settings — among them a team at the Idaho National Laboratory working on a next-generation system called Sophia, which tries to protect industrial control systems against Stuxnet-like threats by detecting anomalies in the network.

One barrier for academics working on cybersecurity is access to the malware that they must protect against. That was not such a problem for Stuxnet itself, because its code was posted on the web shortly after it was first identified. But in general, the careful safeguards that Symantec and other companies put in place in secure labs to protect the escape of malware may also inadvertently be a barrier for researchers who need to study them. "If you're doing research into biological agents, it's limited groups that have them and they are largely unwilling to share; the same holds true for malware," says Anup Ghosh, chief scientist at the Center for Secure Information Systems at George Mason University in Fairfax, Virginia. "To advance the field, researchers need access to good data sets," says Ghosh, who was once a programme manager at the US Defense Advanced Research Projects Agency, and is now working on a malware detector designed to identify viruses on the basis of how they behave, rather than on specific patterns in their code, known as signatures.

Academic researchers are also inhibited by a certain squeamishness about digital weaponry, according to Herb Lin, chief scientist at the Computer Science and Telecommunications Board of the US National Research Council in Washington DC. He points out that to understand how to guard against cyberattacks, it may help to know how to commit them. Yet teaching graduate students to write malware is "very controversial", he says. "People say, 'What do you mean: you're training hackers?'"

 

Tuesday 7 June 2011

MAN from York has been arrested as part of an FBI investigation into an online attack on the Facebook website

MAN from York has been arrested as part of an FBI investigation into an online attack on the Facebook website, writes Jennifer Bell.

A tip-off from the US law enforcement and investigation agency led to officers from Scotland Yard’s e-crime unit swooping on the 26-year-old’s home, after the social networking site’s staff became suspicious.

He is believed to be the first person to be detained in England over a large-scale hacking attack on Facebook, which has more than 600 million users.

The alarm was raised when attempts to breach its systems were spotted.

The man was arrested in York on Thursday evening, and his computer and other electronic devices seized, which are due to be examined by forensic experts. The enquiry is understood to have been launched after extensive discussions between the FBI and the Metropolitan Police. Although few details have been made public, Facebook has confirmed no information from any of its users has been stolen.

The suspected hacker could face extradition to the US and subsequent charges which carry a potential sentence of ten years in jail. The investigation is still ongoing.

Facebook spokeswoman Sophy Tobias said: “While no user data was compromised, we have been working with Scotland Yard and the FBI, as we take any attempt to hack our internal systems extremely seriously.

“However, we have no further comment as this is an ongoing criminal investigation.”

A spokesman for the Metropolitan Police said the 26-year-old had been arrested on “suspicion of computer hacking offences,” and had been released on bond, but they could not provide further details. The FBI has not been available for comment.

Facebook has become a popular target for scammers and hackers aiming to trick users into clicking onto links or install malicious software.

The site contains a mass of personal information which has the potential to be used in “spear-phishing” attacks, which involve email messages written to look like they come from somebody who the intended victim knows.

U.K. Facebook Hacker Arrested

26-year-old man in the U.K. was recently arrested for trying to hack into Facebook.

"Details of the alleged crime, which is still under investigation, are sketchy, but Facebook said Friday that no user information had been stolen," writes Computerworld's Robert McMillan.

"Facebook said it was working with the U.S. Federal Bureau of Investigation (FBI) and London's Metropolitan Police Service," McMillan writes. "'While no user data was [compromised], we have been working with Scotland Yard and the FBI, as we take any attempt to hack our internal systems extremely seriously,' Facebook spokeswoman Sophy Tobias said in an e-mail message. 'However, we have no further comment as this is an ongoing criminal investigation.'"

 

One in four U.S. hackers is an FBI informant, according to an investigation by Britain's Guardian newspaper.


The world of computer hacking has been "so thoroughly infiltrated in the U.S. by the FBI and secret service that it is now riddled with paranoia and mistrust," the paper claims in a report published Monday.

The best-known example of the turncoat "phenomenon," the paper says, is Adrian Lamo, a convicted hacker who turned informant on Bradley Manning, a United States Army soldier who was arrested in May 2010 in Iraq on suspicion of of passing secret documents to the whistle-blower website WikiLeaks.

Writes the Guardian:

Manning had entered into a prolonged instant messaging conversation with Lamo, whom he trusted and asked for advice. Lamo repaid that trust by promptly handing over the 23-year-old intelligence specialist to the military authorities. Manning has now been in custody for more than a year.

Manning was held in solitary confinement in Quantico, Virginia, for nine months when he was moved to Fort Leavenworth in Texas, where some social interaction is allowed, in April.

According to the paper's report:

Cyber policing units have had such success in forcing online criminals to co-operate with their investigations through the threat of long prison sentences that they have managed to create an army of informants deep inside the hacking community.

In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have been run by hacker turncoats acting as FBI moles. In others, undercover FBI agents posing as "carders" – hackers specializing in ID theft – have themselves taken over the management of crime forums, using the intelligence gathered to put dozens of people behind bars.



The Guardian quotes Eric Corley, who publishes the hacker quarterly 2600, as saying that 25 percent of hackers in the U.S. may have been recruited by the federal authorities.

"Owing to the harsh penalties involved and the relative inexperience with the law that many hackers have, they are rather susceptible to intimidation," Corley told the Guardian.

In describing how the FBI and secret service — established in 1865 to target currency counterfeiters, but recently better known as a VIP protection service — have used the threat of prison to create an "army of informants" among online criminals, the paper cites a book by Kevin Poulsen of Wired magazine titled "Kingpin."

Paulson was also the journalist to whom Lamo, who was working as an FBI informant, gave what he purported to be the full chat logs between Manning and Lamo in which Manning reportedly confessed to having been the source for the various classified U.S. cables, documents and video that WikiLeaks released.

Poulson, a former database cracker once sentenced to 51 months in jail after testimony by co-hackers, also first confirmed the arrest of Manning on suspicion of passing classified material to WikiLeaks.

Saturday 4 June 2011

Sony hack: private details of million people posted online

The names, birth dates, addresses, emails, phone numbers and passwords of people who had entered contests promoted by Sony were all published on the internet.
LulzSec, a hacker group, said it had infiltrated the firm's systems to prove how vulnerable they were to "simple attacks".
The data was apparently stolen from Sony Pictures, the company's entertainment distribution arm.
The group has previously launched hacking attacks on the US broadcasters PBS television and Fox.com.
In a message on Twitter, the group said: "1,000,000+ unencrypted users, unencrypted admin accounts, government and military passwords saved in plaintext. #PSN compromised. @Sony."

A longer statement posted on the posted on the pastebin.com website explained the action, saying: "Greetings folks. We're LulzSec, and welcome to Sownage. Enclosed you will find various collections of data stolen from internal Sony networks and websites, all of which we accessed easily and without the need for outside support or money.
"We recently broke into SonyPictures.com and compromised over 1,000,000 users' personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their accounts.
"Among other things, we also compromised all admin details of Sony Pictures (including passwords) along with 75,000 "music codes" and 3.5 million "music coupons"."
The group said they had been unable to copy all the information due to a lack of resources but pasted samples online.
The statement added: "Our goal here is not to come across as master hackers [ ... but] Why do you put such faith in a company that allows itself to become open to these simple attacks?"
The group said Sony's security systems were "disgraceful and insecure: they were asking for it". They said that the data was not encrypted, which would have made their task harder, adding: "This is an embarrassment to Sony."
The latest hack comes just over a month after Sony's enormous PlayStation Network was attacked. In that incident the data of about 70m customers was stolen, in what is thought to have been the largest hack in history.
The network has only come back online in recent weeks, with the cost of the fallout estimated at more than £900m.
LulzSec's claims come at a painful time for Sony – the firm's executives are currently attempting to reassure the US authorities about their efforts to safeguard the company's computer networks.
Cyber security has been in the headlines in recent weeks.
Chinese spies reportedly had months of access to the personal Google emails of senior US officials and human rights activists.
The security breach is the latest attack against high-profile firms, including the giant US defence contractor Lockheed Martin and Google.
Both the US and British governments have announced plans to increase their development of cyber weaponry.
Sony was contacted but was not available for comment.

 

LinkWithin

Related Posts Plugin for WordPress, Blogger...