TOKYO MASTER BANNER

MINISTRY OF TOKYO
US-ANGLO CAPITALISMEU-NATO IMPERIALISM
Illegitimate Transfer of Inalienable European Rights via Convention(s) & Supranational Bodies
Establishment of Sovereignty-Usurping Supranational Body Dictatorships
Enduring Program of DEMOGRAPHICS WAR on Europeans
Enduring Program of PSYCHOLOGICAL WAR on Europeans
Enduring Program of European Displacement, Dismemberment, Dispossession, & Dissolution
No wars or conditions abroad (& no domestic or global economic pretexts) justify government policy facilitating the invasion of ancestral European homelands, the rape of European women, the destruction of European societies, & the genocide of Europeans.
U.S. RULING OLIGARCHY WAGES HYBRID WAR TO SALVAGE HEGEMONY
[LINK | Article]

*U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR*

Who's preaching world democracy, democracy, democracy? —Who wants to make free people free?
[info from Craig Murray video appearance, follows]  US-Anglo Alliance DELIBERATELY STOKING ANTI-RUSSIAN FEELING & RAMPING UP TENSION BETWEEN EASTERN EUROPE & RUSSIA.  British military/government feeding media PROPAGANDA.  Media choosing to PUBLISH government PROPAGANDA.  US naval aggression against Russia:  Baltic Sea — US naval aggression against China:  South China Sea.  Continued NATO pressure on Russia:  US missile systems moving into Eastern Europe.     [info from John Pilger interview follows]  War Hawk:  Hillary Clinton — embodiment of seamless aggressive American imperialist post-WWII system.  USA in frenzy of preparation for a conflict.  Greatest US-led build-up of forces since WWII gathered in Eastern Europe and in Baltic states.  US expansion & military preparation HAS NOT BEEN REPORTED IN THE WEST.  Since US paid for & controlled US coup, UKRAINE has become an American preserve and CIA Theme Park, on Russia's borderland, through which Germans invaded in the 1940s, costing 27 million Russian lives.  Imagine equivalent occurring on US borders in Canada or Mexico.  US military preparations against RUSSIA and against CHINA have NOT been reported by MEDIA.  US has sent guided missile ships to diputed zone in South China Sea.  DANGER OF US PRE-EMPTIVE NUCLEAR STRIKES.  China is on HIGH NUCLEAR ALERT.  US spy plane intercepted by Chinese fighter jets.  Public is primed to accept so-called 'aggressive' moves by China, when these are in fact defensive moves:  US 400 major bases encircling China; Okinawa has 32 American military installations; Japan has 130 American military bases in all.  WARNING PENTAGON MILITARY THINKING DOMINATES WASHINGTON. ⟴  
Showing posts with label Hacker. Show all posts
Showing posts with label Hacker. Show all posts

July 02, 2016

Atlantic Council Wants War on Russia



US MILITARY
ATLANTIC COUNCIL
& US STATE DEPT. WEASELS
WANT WAR
Plotting War on Russia

[CLICK IMAGE TO ENLARGE]

RT-News

Breedlove’s war: Emails show ex-NATO general plotting US conflict with Russia

Published time: 1 Jul, 2016 20:09
Edited time: 1 Jul, 2016 20:10


Hacked private emails of the US general formerly in charge of NATO reveal a campaign to pressure the White House into escalating the conflict with Russia over Ukraine, involving several influential players in Washington.

The emails, posted by the site DCLeaks, show correspondence between General Philip M. Breedlove, former head of the US European Command and supreme commander of NATO forces, with several establishment insiders concerning the situation in Ukraine following the February 2014 coup that ousted the elected government in favor of a US-backed regime.

[Wesley] Clark, who commanded NATO during the 1999 war in Yugoslavia, reached out to Breedlove in April 2014. On April 8, he forwarded “intelligence” obtained by Anatoly Pinchuk and Dmitry Tymchuk, activists close to the new regime, claiming a Russian invasion was in the works.

The information was conveyed by Phillip Karber, an ex-Marine and president of the Potomac Foundation, whom Clark calls a “colleague” and “our guy.” Karber wrote about observing the Russian border from inside a Ukrainian tank, and eagerly transmitted Tymchuk and Pinchuk’s calls for support. Contacted by The Intercept on Friday, Karber confirmed the authenticity of several emails in the leaked cache.

Reporting on his meeting with Ambassador Pyatt on April 6, Karber wrote: “State is the one trying to be pro-active and recognizes need to do more faster,” while General Martin Dempsey – at that point the chairman of the Joint Chiefs of Staff – was “dragging his feet in order to save [military] relations with Russians.”

In an email dated April 12, Clark referred to his exchange with “Toria” Nuland – the assistant secretary of state for Europe and Eurasia, who personally backed the Ukrainian revolution – pushing for open US support for the regime in Ukraine to use force against protesters in the east. Prior to the coup, Washington had strongly warned Kiev not to use force against the anti-government demonstrators in the city.

Kiev’s
summer “anti-terrorist operation” ended in crushing defeat in August, and the first armistice between the government and rebels was signed in Minsk in September. Meanwhile, the so-called Islamic State jihadist group arose in Iraq and Syria, drawing US attention away from Eastern Europe with gruesome beheadings of Westerners. Frustrated by the White House’s reluctance to back his belligerent agenda in Ukraine, Breedlove reached out to Powell, a retired general and former secretary of state.

“I seek your counsel on two fronts,.... how to frame this opportunity in a time where all eyes are on ISIL all the time,... and two,... how to work this personally with the POTUS,” Breedlove wrote to Powell in September 2014. Powell’s response was not made available.

Breedlove was introduced to Powell by Harlan Ullman, a senior fellow at the Atlantic Council and the author of the “shock and awe” doctrine used by the Bush administration in the 2003 invasion of Iraq.

In October 2014, Ullman urged Breedlove to reach out to Vice President Joe Biden. Aside from Powell, Ullman wrote, “I know of no better way of getting into 1600,” referring to the White House’s address on Pennsylvania Avenue.

In November, Ullman also suggested Breedlove should get together with David O'Sullivan, the new EU envoy to Washington. Noting that Europe “seems to be a six letter expletive in the White House,” Ullman adds that “perhaps quiet collaboration between him and NATO (SecGen) as well might be useful.”


“Obama or Kerry needs to be convinced that Putin must be confronted,” Ullman wrote in February 2015, before the ‘Minsk II’ talks.

He also gave Breedlove pointers on getting into the good graces of Ash Carter, the new Defense Secretary. “I would take or pretend to take careful notes.  Ash is an academic. And he is trained that students who take good notes rise to be A grades.  This may be maskarova.  But it is useful maskarova,” Ullman wrote, misspelling the Russian word for camouflage (maskirovka).  [COMMENT:  Маскировка / Maskirovvka - Russian military deception doctrine, est. start 12th Century - concealment, decoys, dummies, deceptive manoevres, denial, disinformation etc [wikipedia] ]

Washington did approve hundreds of millions of dollars in “non-lethal” aid to Ukrainian troops, including the notorious “volunteer battalions,” in the 2016 military budget.

Breedlove continued to push for more aggressive US involvement, claiming a heavy Russian troop presence in Ukraine – which was later denied even by the government in Kiev. In March this year, the general was telling US lawmakers that Russia and Syria were “deliberately weaponizing migration in an attempt to overwhelm European structures and break European resolve.”

Breedlove was replaced at the helm of EUCOM and NATO in May, and officially retired from the military on July 1. He was replaced by US Army General Curtis Scaparrotti, whose public statements suggest a similar level of hostility for Russia.


US-ANGLO
CAPITALIST PRESS
NOT COVERING
[CLICK IMAGE TO ENLARGE]

COMMENT

No time to look at this properly, right now.
Not even sure I copied this properly.  Oops.

Had too much fun playing with the NATO Love Doll.  
Got to run.   LOL




June 17, 2016

Democratic National Committee Hack




WikiLeaks



Another WikiLeaks bit of news.

Someone has been hacking the Democrats (Democratic National Committee, formal governing body of the US Democratic Party).
Looks like they've been at it for ages and, according to the Wordpress site, data has been transferred to WikiLeaks for release.

In the meantime, there's a report on Trump, information on Democrats donors/donations, and some other documents.

Huge amounts of money are being donated. At first glance, many of the donors appear to have Jewish names.

I'm sort of gingerly checking out the Wordpress site, wondering if it's booby-trapped.   I'm scared to click on anything.  LOL

Might leave for later.  Need sleep.




January 13, 2016

US Director of National Intelligence (James Clapper) - HACKED

Article
SOURCE
https://archive.is/K75wv#selection-1376.0-1501.196


HACKED

James Clapper
US Director of National Intelligence
Hacked by:  CWA / Crackas With Attitude
Series of accounts
redirect calls to:  Fee Palestine Movement
confirmed by Office of DNI spox: Brian Hale
FBI has not responded to request for comment
Teen Who Hacked CIA Email Is Back to Prank US Spy Chief

Written by Lorenzo Franceschi-Bicchierai
January 12, 2016 // 12:34 PM EST

One of the “teenage hackers” who broke into the CIA director’s AOL email account last year hasn’t given up targeting government intelligence officials. His latest victim is the Director of National Intelligence James Clapper, Motherboard has learned.

A group of hackers calling themselves “Crackas With Attitude” or CWA made headlines in October, hacking into CIA Director John Brennan’s email account and apparently getting access to several online tools and portals used by US law enforcement agencies. The hackers' exploits prompted the FBI to issue an alert warning government officials of their attacks.

One of the group’s hackers, who’s known as “Cracka,” contacted me on Monday, claiming to have broken into a series of accounts connected to Clapper, including his home telephone and internet, his personal email, and his wife’s Yahoo email. While in control of Clapper’s Verizon FiOS account, Cracka claimed to have changed the settings so that every call to his house number would get forwarded to the Free Palestine Movement. When they gained notoriety last year, Cracka and CWA claimed their actions were all in support of the Palestine cause.

“I’m pretty sure they don’t even know they've been hacked,” Cracka told me in an online chat.

But Brian Hale, a spokesperson for the Office of the Director of National Intelligence, confirmed the hack to Motherboard on Tuesday.

“We’re aware of the matter and we reported it to the appropriate authorities,” Hale said, declining to answer any other questions on the record. (The FBI did not respond to a request for comment.)

[ARTICLE CONTINUES ...]
https://archive.is/K75wv



---------------------- ꕤ ----------------------

COMMENT

Thought this was funny.

But it's not so funny when you consider the amount of prison time the pranksters will get if they're caught.

The redirect to 'Free Palestine Movement' is cool.  A redirect to Hezbollah or someone like that would be even funnier.

Suspected social engineering hack, according to the article.  Article also said that all hacks, even the big ones, begin with a social engineering component.

Wonder why FBI aren't commenting?  Maybe they're embarrassed?

What I don't understand is this:  if you have access to online tools used by US law enforcement agencies, as a result of the hack, why would you disclose the hack and deprive yourself of those tools?  That doesn't make sense to me.
---------------------- ꕤ ----------------------
EDIT

WikiLeaks notes that VICE have betrayed the source 'handle'. 
Not sure if it's the guy's chat ID or his Twitter handle, or both.


I didn't notice that reading the article first time around.

Journalists don't seem like a good choice for sharing anything secret.  Look at what happened to Israeli whistleblower Mordechai Vanunu:  he did something like 18 years in an Israeli prison, 11 of it in solitary, after being betrayed by Australian newspapers & kidnapped in Europe by Mossad.

With the WikiLeaks electronic submission system people who whistleblow stay anonymous because they're electronically masked, I guess.

It must be hard keeping secrets.  One hint of CIA torture (or hint of anything unpleasant, really) and I'd most probably be squealing.  Secrets are also a burden, as in there's an unpleasant, conflicted feeling that must be endured in order to keep a secret.  Or, there would be for me, I think.  But that's just hypothetical social type of situations.  It would probably be worse for something really important. 



Australia - Victoria - Housing, Disability & Ageing and Mental Health Minister Martin Foley’s official Twitter - Porn Hack

Article
SOURCE
http://www.heraldsun.com.au/business/work/victorian-housing-disability--ageing-and-mental-health-minister-martin-foleys-official-twitter-account-likes-porn/news-story/1773d03f029b708aa2307eb595d8841a


Australia - Victoria - Housing, Disability & Ageing and Mental Health Minister Martin Foley’s official Twitter  - Porn Hack
Victorian Housing, Disability & Ageing and Mental Health Minister Martin Foley’s official Twitter account ‘likes’ porn

January 12, 2016 5:10pm
Therese Allaoui Port Phillip Leader


A VICTORIAN Minister’s official Twitter account has been caught liking hard core pornography images.

But Minister for Housing, Disability & Ageing and Mental Health Martin Foley has said his MP account had been “hacked” after hard core pornography was marked as a favourite tweet on his @MartinFoleyMP Twitter account.

The Twitter account’s like feature enables a user to look back on a “favorited” or “liked” tweet at a later date.

The liked tweets depicted gif images of hard core pornography on at least four separate occasions over the past 12 months.

News Corp has seen screen shots of the images, which include fellatio and anal sex. They are too explicit to publish.

On the same Twitter account today, the state Labor Member for Albert Park claimed he had been hacked.“I have been hacked. Apology for the disgusting material. Security measures being taken now,” tweeted this afternoon.”

He later apologised to his Twitter followers.

    I have been hacked. Apology for the disgusting material. Security measures being taken now
    — Martin Foley (@MartinFoleyMP) January 12, 2016

“It was discovered today that my Twitter account had been hacked and that obscene material had been added to my Likes,” he said.

“This material was removed immediately, a process that took some moments due to complications from the hacking process.

“I apologise to any Twitter followers who were as offended as I was.”

therese.allaoui@news.com.au
http://www.heraldsun.com.au/business/work/victorian-housing-disability--ageing-and-mental-health-minister-martin-foleys-official-twitter-account-likes-porn/news-story/1773d03f029b708aa2307eb595d8841a



---------------------- ꕤ ----------------------

COMMENT

...  LOL


October 25, 2015

Weev On Cuckservative Gavin McInnes & More

Video
SOURCE
| here






"I'm Going To Prison For Arithmetic" Andrew Auernheimer aka Weev
March 2013
Source  | here






YouTube Comment

Wei Bin Wang 2 months ago

"To explain the 'hack' that he did:
On the Apple site, they gave a number to any registered user who uses the site in its URL, and that was what save them the page with their saved email address. What weev did was just add 1 to it, press enter, and it spat out another person's email address. Do the same thing several more times and you'll eventually end up with everyone's email addresses. Hence why he said he was "going to prison for arithmetic."

On how he used it, he didn't use it for anything malicious, he just gave his discovery to a journalist. The safest move was to report the exploit to Apple and get a free job or recommendation on his future career, but it's not in his character to do that. The real fault lies in the incompetent design of such a site that made this "gaping hole" in their security. If weev wasn't there, it was only a matter of time before someone else decided to be curious and add 1 to the number of the URL on that site and discover the exploit themselves.

The way both the media blasted this out of proportions and the way the judicial system handled it is in some ways surprising, and in other ways very disappointing. The guy just added 1 to a number on a website URL a few times and he gets a trip to prison...for arithmetic! Even to this day, I can't believe he got sentenced to jail for that."
source | as above




YouTube Comment

WellingtonBikeCam01 1 year ago

"Someone from AT&T should be in jail over this one."
source | as above




non-pc
Cuckservative

"No defense for Gavin McInnes"

http://weev.livejournal.com/413176.html#comments

Video, Post & Comments



---------------------- ꕤ ----------------------

COMMENT


Bear with video #1 ... it's a little high-energy and seems too much like hard work trying to figure what's going on at first, but it's worthwhile persevering.

Jaw-dropping what this guy went to prison for in the US (and the ridiculously huge financial penalty they've slapped him with).

Above are a couple of the comments I liked on that YouTube source link.

Finally, there's a humorous comment on the state of the MSM.

I find this Weev guy funny.  Funny interesting.   And funny humorous, too.
Wish I was as creative as Weev.  lol




September 17, 2015

10 Hacking Groups Of All Time | Kavita Iyer, Techworm

Article
SOURCE
http://www.techworm.net/2015/09/top-10-well-known-hacking-groups-of-all-time.html




Top 10 Well Known Hacking Groups Of All Time


By Kavita Iyer on September 16, 2015 Technology

World’s 10 most famous hacking groups who have had most success in recent times

Like the animals, hackers also hack their prey in groups. Sometimes these groups become famous for perceived good deeds like hacking ISIS websites done by Anonymous but most of the time these hacker groups operate against the law. Some of the hacker groups have since disbanded after being in public eye. The prime example of infamous hackers group is Lizard Squad. They DDoSed the PlayStation and Xbox servers right during the time of Christmas weekend earning them many villains.

Today we are listing top such 10 most notorious hackers of all time.

1. Lizard Squad

The DDoS attack on Facebook that lowered the popular social media network as well the cyber attacks on Malaysia Airlines website that directed visitors to a page which read “404 – plane not found,” were carried out by the Lizard Squad. While Facebook refused to accept being hacked, Malaysia Airlines stated that their domain had been temporarily redirected elsewhere and that they had not been hacked. Lizard Squad has also hacked Microsoft and Sony[404-Plane Not Found .... lol]

The intentions of Lizard Squad look dark and gloomy due to the diverse history of their work. They are not totally computer hackers as most of the hack they do is comedy. The group is responsible for a high-profile hack of Microsoft Xbox Live and Sony’s Playstation Network. In August 2014, the group posted the ISIS flag on Sony’s servers and made other indirect references to the “cyber caliphate.” The group was arrested by the authorities in the U.S. and England after the Xbox and Playstation hacks.  [lol Cyber Caliphate]

2. Syrian Electronic Army

The Syrian Electronic Army claims to target political opposition groups and claims to support the Syrian President Bashar al-Assad. It calls itself “a group of enthusiastic Syrian youths who could not stay passive towards the massive distortion of facts about the recent uprising in Syria”.

It becomes involved in the use of malware, phishing, defacement, spamming, and denial of service (DDoS) attacks with often posting the Syrian flag on a victim’s website. Some have even assumed as a fact that the group is connected with the Syrian state. The group have targeted the Facebook pages and Twitter accounts of President Barack Obama and French President Nicolas Sarkozy, as well as technology companies and news organizations. Their tone is “serious and political to ironic and humorous.”

3. LulzSec

After the HBGary Federal hack of 2011, LulzSec – Lulz Security abbreviated – formed as an Anonymous spinoff. It’s slogan was “Laughing at your security since 2011.” The group announced itself with a hack against Fox.com, then Sony Pictures in 2011. The group took the CIA website offline[lol ... I'm impressed]

LulzSec had become well known for ridiculing its victims after an attack, which made the analysts compare them to the hacks to internet pranks. In June 2011, a ‘50 days of Lulz’ statement announced that the group had fallen out. However, on July 18, the News Corporation was hacked by the group, who had posted false news about the death of Rupert Murdoch.

In 2012, the LulzSec members were arrested by the FBI after the group’s leader, Sabu, turned them in. Prosecutor Sandip Patel said the group thought of themselves as “latter-day pirates.”

4. Anonymous

“We are Anonymous. We are Legion. We do not forgive. We do not forgive…. Expect us.”

Known most for its hacking and Guy Fawkes masks, Anonymous is a decentralized open online creation group. Reports conceive that Anonymous is made up of thousands of “hacktivists.” The group has compromised religious, corporate and government websites.

The group has declared war on Scientology and hacked the Pentagon. In 2012’s Operation Payback, they also attacked MasterCard, Visa and PayPal for refusing to process payments to WikiLeaks, which in turn led WikiLeaks to choose the cryptocurrency Bitcoin. Anonymous supported Occupy Wall Street and hacked the New York Stock Exchange website in 2011.

For being involved in Anonymous, individuals have been arrested in the U.S., UK, Netherlands, Australia, Spain, and Turkey.
5. The Level Seven Crew

Rumored to be encouraged by the seventh level of hell from Dante’s Inferno, ‘the violent’ level, this hacking group hacked 60 high profile computer systems (NASA, The First American National Bank, Sheraton Hotels) in 1999. They also hacked into the US Embassy in China’s website. However, this group broke up and stopped functioning in 2000. [lol ... US Embassy hack sounds funny.]

6. Network Crack Program Hacker (NCPH) Group

It was alleged that the NCPH Group was formed in China in 1994, whose leader Tan Dailin was apparently working for the Chinese army. It is believed that the People’s Liberation Army was funded by the NCPH. The group appears to be based out of Zigon in Sichuan Province.

7. Chaos Computer Club (CCC)

The mission of the Chaos Computer Club is to uncover the security flaws, which basically does not only depend upon illegal activities. It was founded in Berlin during the early 1980s and is one of the largest European hacking groups. The group made its point after they used the Bildschirmtext page to steal 134,000 Deutsch Marks from a Hamburg bank, only to send the money back after having completed its mission the next day, which was to expose a security flaw.

Early CCC member Andy Müller-Maguhn in an interview with OWNI stated: “we needed a lot of legal experts to advise us what we could or could not hack, and to help us distinguish between legal activities and grey areas of legality”. The group’s kindly approach has allowed the CCC to become “an accepted and recognized entity because it has worked to educate the public about technology since the 1980s,” Müller-Maguhn added. The group’s most recent focus has been on the mass surveillance complex, in order to fit in a German hacker ring.
CCC Member Falk Garbsch stated:
There have to be consequences. The work of intelligence services has to be reviewedas does their right to exist. If necessary, their aims and methods will have to be redefined. …We have to think about how these [shared] data are processed and where they can be allowed to resurface. And this is not just the challenge for 2015, but for the next 10 years.
The group has strongly objected French nuclear tests, made full use of COMP128 encryption algorithm of a GSM customer card, stole money on live TV via Microsoft’s ActiveX; and examined the German federal government’s own malware. The group’s press release on the topic reads:

“The malware can not only siphon away intimate data but also offers a remote control or backdoor functionality for uploading and executing arbitrary other programs. Significant design and implementation flaws make all of the functionality available to anyone on the internet.”

The CCC may have characteristics of a Marxist, after being caught selling source code from U.S. corporations and governments to the Soviet Union’s secret police KGB.
8. globalHell

globalHell was founded by street-gang member Patrick Gregory. Data on 115 websites were reportedly destroyed by the group charging millions in damages. In order to get away from street gang life, Gregory had turned to computer. His crew of hackers behaved basically the same as a street gang. “global hell will not die” was reportedly written by the group on the United States Army’s website. Gregory confessed in court to causing $2.5 million in hacking damages.

9. Iran’s Tarh Andishan

Looks like the Tarh Andishan wants to control the world’s web-based systems. Mostly based in Tehran, Iran, the group is approximated to have 20 members. A talented hacker group, Tarh Andishan looks like grew out of a Stuxnet worm virus, which Iran claimed the US and Israel had created.

The Iranian government doubled-down on its cyber warfare. The group uses self-propagating software, backdoors, SQL injection, systems, and other techniques. The group is best known for one of the attacks called “Operation Cleaver.” This hacker group has apparently hacked security systems and airline gates. Most findings were not taken into consideration due to the “grave risk to the physical safety of the world” the group reportedly poses, according to the report.

10. TeaMp0isoN:

A 16-year-old hacker with a pseudonym TriCk started this group in 2010. TeaMp0isoN hacked into Facebook, NATO, the English Defense League, including Tony Blair’s email account. The group broke up and stopped functioning in 2012. However, in 2015, the group rebranded itself as a white-hat computer security research group.

There are several other hacking groups who may be more deadlier than the above. We have listed only those hacker groups who have consistently been able to be in public eye due to their hacking exploits.

You can list the hacker groups which you think should have been included in the top 10 list, in the comments below.

http://www.techworm.net/2015/09/top-10-well-known-hacking-groups-of-all-time.html


---------------------- ꕤ ----------------------
COMMENT

Don't know that I'll remember all these different groups and what they do.

My favourite has to be LulzSec ... I'm super impressed by the CIA hack.  And I think they also did Stratfor and others.
Yeah, Jeremy Hammond.
I think I like the big target prankster hacks the best.  They'd be the funniest.


---------------------- ꕤ ----------------------

more

LulzSec hacker sentenced to 10 years in jail for leaking Stratfor emails

http://www.theverge.com/2013/11/15/5108288/jeremy-hammond-lulzsec-stratfor-hacker-sentenced

How an FBI Informant Orchestrated LulzSec’s Hacking Spree

http://www.thedailybeast.com/articles/2014/06/06/how-an-fbi-informant-orchestrated-lulzsec-s-hacking-spree.html








August 03, 2015

WikiLeaks - Hacking Team Leak - Release Verified as Legitimate / Singapore Surveillance



Singapore is using spyware, and its citizens can’t complain
By Gabey GohAug 03, 2015

Behind the surveillance curtain

Meanwhile, Goh Su Gim (pic), the security advisor at cybersecurity firm F-Secure in Asia, has examined the Hacking Team documents that have been leaked online, and said he believes them to be legitimate.

“Especially the source code and their Galileo product architecture – it is exactly how security researchers have expected it to be,” he told DNA.

“Many have compiled the source code and replicated what products Hacking Team has been selling to the [Singapore] Government,” he added.

The leaked Hacking Team information also includes email threads that point to other Singaporean agencies showing an interest in the Italian company’s spyware, according to Goh.

These agencies include the Centre for Strategic Infocomm Technologies (CSIT), part of the Ministry of Defence; and the Infocomm Technology Division (ICTD) of the Ministry of Home Affairs (MHA) back in 2013.

Goh noted that an Israeli company, Nice Systems which specialises in telephone voice recording, data security and surveillance, serves as a partner working with Hacking Team to sell to CSIT and MHA.

“Interestingly, the MHA was interested in its IPA device (Injection Proxy Appliance),” he said.

“This is a networking device, typically installed alongside an Internet service provider’s servers, that can hijack targets’ Internet traffic without their knowing, and surreptitiously deliver malware to their device or computer.

“Tricking a target into opening a file or going to a phishing site may be not be as easy, and this is the perfect appliance to intercept Internet activity on the fly – for example, if a target wants to watch a video or download a new app, the IPA could intercept and prompt the target to install a booby-trapped version of Adobe Flash with the spyware.

“It is also interesting to note at the end of the [leaked] email, [there is the statement]: ‘(As always, but especially in this country, confidentiality is a must. Thanks.)’,” he added.

Why the IDA?

There were no further documents available to show whether discussions with the CSIT and MHA panned out and were converted to sales, Goh conceded.

He said that the F-Secure team was also unable to independently confirm whether the IDA and other agencies in South-East Asia, besides the publicly published list of clients available on the Internet, were or are Hacking Team customers.

However, Goh noted that given what Hacking Team offers, it may seem more relevant for CSIT and MHA to purchase such tools in the name of homeland security.

“But the IDA is a statutory board of the Singapore Government, under the Ministry of Communications and Information, whose mission is to develop information technology and telecommunications within Singapore – with a view to servicing citizens of all ages and companies of all sizes.

“With that said, since it is not an enforcement agency – there is no use for a surveillance tool, unless it is used for research purposes,” he said.

The IDA did not respond to DNA’s repeated requests for comment.

https://www.digitalnewsasia.com/digital-economy/singapore-is-using-spyware-and-its-citizens-cant-complain?page=0%2C1

-------- -------- --------
COMMENT

Thought this a cool article, as the WikiLeaks publication of the Hacking Team data has been independently verified as legitimate.

Israeli involvement is interesting.

The rest (surveillance capabilities) just freaks me out.  LOL


More re:  SINGAPORE SURVEILLANCE



July 31, 2015

Business Insider - "British spies are officially setting the standard for fighting hackers"



British spies are officially setting the standard for fighting hackers
Business Insider

Alastair Stevenson, Business Insider

Jul. 29, 2015, 7:27 AM 13

UK big ben union flag jack umbrellaREUTERS/Luke MacGregorBritish spy standards have gone international.

A pilot scheme for the UK government’s cyber security training initiative has launched in the US, Canada, Australia and New Zealand – meaning British spies are now setting the international standard for fighting hackers.

The scheme will be run by the Communications-Electronics Security Group (CESG), the information security arm of the GCHQ. It is an extension of the CESG's ongoing UK Certified Professional (CCP) scheme.

The UK scheme launched in October 2012 and is designed to ensure security professionals meet a quality benchmark set by the CESG, assuring potential hirers of their anti-hacker abilities.

The scheme ranks professionals at three levels of competency: Practitioner, Senior Practitioner, and Lead Practitioner.

To date, the scheme has accredited 1,200 UK professionals in a variety of roles, including penetration testers and crypto custodians.

Penetration testers are hackers companies hire to find holes in their defences. Crypto custodians are professionals that manage companies' use of encryption.

Encryption is a security technology that scrambles digital information using specialist mathematics. It makes it so only people in possession of a specific unlock key or password can read the encrypted information.

The pilot international scheme will be limited to security and information risk advisors (SIRA) and IA architects – the people who advise companies on how to protect their data and design their information security systems.

The new US, Canada, Australia and New Zealand tests will be run by the APMG International examination body and CESG.
BUSINESS INSIDER - VIA
http://www.techinsider.io/gchq-has-expanded-its-security-training-scheme-to-run-in-the-us-canada-australia-and-new-zealand-2015-7
---------------------
COMMENT

Thought this was interesting, but now I'm not that sure.  LOL

IA = information assurance

APM Group Ltd (APMG)
=  global accreditation body, UK based (offices all over)

More: 

CCP - 'CESG Certified Professional'
http://apmg-cyber.com/products/ccp-cesg-certified-professional





October 06, 2014

NZ -- Attack on Media -- 'Dirty Politics: Police raid Nicky Hager's home'

NZ >>>

Dirty Politics: Police raid Nicky Hager's home
Updated 16 min ago 4:28 PM Monday Oct 6, 2014


Dirty Politics author Nicky Hager has had his home raided by police searching for the hacker Rawshark.

In a 10-hour search of his house, Hager said computers and papers were seized in what appeared to be an attempt to discover the identity of the person who provided information used in the Dirty Politics book.

The book was an election bombshell based on hacked email and social media material belonging to WhaleOil blogger Cameron Slater.

The person contacted the Herald and Fairfax using the identity Rawshark while using the Twitter handle @whaledump to release information publicly.

Hager said five officers came to his Wellington home last Thursday with a search warrant.

He was in Auckland at the time the police arrived giving lectures at the University of Auckland.

"Soon after the police arrived, the lead detective stated that I was not a suspect in their case, merely a witness." Hager said he told the detective there was nothing in his house which held information that would uncover the source.

"Nonetheless, he and his four colleagues seized a large collection of papers and electronic equipment belonging to my family, including computers, drives, phones, CDs, an IPOD and a camera." [Intimation and harassment?]

Hager said the search and seizure of the material was a "fishing expedition" carried out by officers who had no idea who they were looking for, hoping for a lucky break.

"I am confident that the police took nothing that will help them with their investigation."

Hager said he would not cooperate with police in any way to reveal the Dirty Politics source - or any other source. "I believe the police actions are dangerous for journalism in New Zealand.

"It matters to all people working in the media who could similarly have their property searched and seized to look for sources. People are less likely to help the media if the police act in this way.

"The police want people to respect their role in society; they should in turn respect other people's roles in society."

He said he was speaking to his lawyers about challenging the police action.

Source:  NZ Herald - here.

 
COMMENT


This is HUGE!  

It's another attack on press/media by governments.

In this case a newly elected Key government that waited until after the election to throw its weight around.  Gee, I wonder why.

The press is under attack in the US (where the WH is clamping down on providing information & harassing journalists), in the UK where journalists are spied on by police abusing anti-terror powers, under attack in Australia with the new 'anti-terror' gagging laws ... and under attack in NZ, as above!!!

It seems huge to me.  But I'm new to watching this stuff, so maybe this is an ongoing battle?  Or maybe not.  New laws; new mass surveillance; surveillance (Five Eye) in concert; world wide police state?

Further reading:
NZ - Whistleblower

http://www.zdnet.com/hacker-rawshark-disrupts-nz-election-campaign-7000033148/

"A Cabinet minister has resigned after an email revealed her contact with a controversial blogger"  --  31/08/2014

US - EU Attack on Freedom of Press
 
  Glen Greenwald (via Twitter)


EU's "right to forget" law now resulting in forced removal of NYT articles from Google searches

October 01, 2014

IRAN

IRAN


BBC Spies?
#UK BBC allegedly tried to steal from #Iran govt archives / BBC a cover for spies & dissidents / http://tinyurl.com/l3rmu2h
>BBC is BANNED in #Iran & broadcasts blocked / #UK has no diplomatic presence /since militants stormed #UK consulate in 2011.

#Iran's state TV said intelligence officials foiled BBC's plan to steal items from govt archives / http://tinyurl.com/qfhoy52 / article IBT


#Iran - 2012 - #hacker / attack to jam 2 satellite feeds of BBC Persia into Iran, 2 disrupt London ph lines / multiple automatic calls ..LOL

#Iran / #UK BBC had no immediate comment re BBC hacking claim ... "but Iran has a history of accusing" BBC ... lol nice DEFLECTION BBC!

#Iran accuses BBC of spies & dissidents cover/foiled attempt steal docs govt archives /Guardian runs AP article: http://tinyurl.com/q8k8clr
>> 2012 Iran’s state TV claimed BBC hacked its website to change the results of a poll about Iran’s nuclear programme!!!

#UK >> Is the BBC a hotbed for SPIES and engaged in CYBER-WARFARE with #Iran ??
Iran - Israel & US
Press TV Iran tweeted that US rejected Bibi's UN speech re Iran ... Hmmm, think Bibi might be spitting the dummy right now?

>> Bubble Head Jen Psaki said WA disagrees with Netanyahu's assertion. White House says Iran’s nukes program is peaceful !!

>> article link: >> So why did they hack Iran & destroy centrifuges? Sneaky US is up to *something*

>> US former Pres. Jimmy Carter has attested to the existence of the Israeli nuclear arsenal >> tinyurl.com/kqymkhg 


---------------------------------------------------
COMMENT

This amused me greatly at the time but now I'm over it.

Although the 2012 satellite jam is rather cool.

In other news, Israel was critical of Iran at UN General Assembly, while the US has sidled up to Iran and wants to be buddies -- which is very strange.  US is up to something.
Note:  UK no diplomatic presence since 2011.








September 27, 2014

SURVEILLANCE, CYBER-SECURITY & OTHER


SURVEILLANCE, CYBER-SECURITY & OTHER


NSA New Chief Risk Officer Position

NSA/CSS Dir Adm Michael S. Rogers announced creation of new Chief Risk Officer pos'n @ Agency/ tinyurl.com/plruj5r / NSA insurance? #USA

>> Why would a spy agency be involved in insurance?

Cyber-Security
#Hacker / eBay custom Javascript & Flash content expose users / cross-site scripting (XSS) / goo.gl/9FUTzs / criticism eBay

#cybersecurity Windows XP anywhere on network / unpatched & unsupported XP = "Swiss Cheese of operating systems" 4 hackers /bitcoinmag

Taiwan
 Population: 2.619 million (Dec 2010)

>> Taiwan aka: The Republic of China .. Ma Ying-jeou is President .. lawyer, US exposure .. aka "Teflon pot" / controversies

#Taiwan govt investigates Xiaomi /China's smartphone co / on potential #cybersecurity concerns tinyurl.com/jwmly6l / dec'n in 3mths

#China & #Taiwan historical foes /defeated Nationalists fled 2 island / civil war loss 2Communists 1949 / Renegade province

#Surveillance - Xiaomi smartphone accused of sending copies user text-msgs 2 servers mainland China / co. DENIES - tinyurl.com/jwmly6l

>> #China Shi Tao journalist leaked censorship order govt had sent Chinese media: IMPRISONED 2005 b/c YAHOO handover E-MAILS

>Apple has begun 2 store user data on servers @ mainland #CHINA / first time tech giant has stored user data on Chinese soil !

WikiLeaks
#WikiLeaks founder calls Google “a privatized NSA” >>> tinyurl.com/pgz7nwy - DailyDigestNews 

#UN's Ban suppresses information >> not a word about corporations or #Assange or #Wikileaks raised by #Ecuador!! >> innercitypress.com/unga1ecuador09
Believe: Techie corporate fatcat in bed w/ US govt or whistleblower-publisher political prisoner?
VIDEO

>#Assange has the 'luxury' of UK police guards in #Ecuador embassy corridors & elevators. PSYCHOLOGICAL TORTURE - HR violation

>"If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place" - Eric Schmidt

>"Since Google stopped colluding with the Chinese govt ... " >> theinquirer.net/inquirer/news/


Ray McGovern / USA

‘Surveillance state’

"Ex-CIA analyst joins Chico State profs in discussion of Fourth Amendment, government power over Americans"
Ex-CIA Ray McGovern /4th Amendment / #USA / http://tinyurl.com/prut7me 
/#Surveillance has NOT stopped a single terrorist attack NSA's Alexander
Black Market
#Surveillance - Dark Net - 34 countries ops. - drugs busts - Europol - tinyurl.com/mvh5abq - 1,000 ppl / ppl traffic, 600kg cocaine + or
FBI - Fake Cellphone Towers Surveillance
#Surveillance - FBI uses IMSI catchers, ie fake cellphone towers, to pipe private cellphone data thru government monitors / ocregister

International Mobile Subscriber Identity = telephony device - 'man in the middle' attack >> en.wikipedia.org/wiki/IMSI-catc

>> countries w/out encrypted phone data traffic (or weak encryption) render IMSI device unnecessary!

FBI forced state & local law enforcement 2 sign non-disclosure 2 acquire IMSI tech themselves / police militarization!! [ocregister] #USA

>> #USA federal agents want to disseminate spying technology while keeping it a secret >> tinyurl.com/lr3hehn

FBI on Apple & Google Encryption


FBI Director James Comey concerned Apple & Google selling ph's w/ encryption they can’t break >> zdziarski.com/blog/?p=3894 - #surveillance

> above link = The Politics Behind iPhone Encryption and the FBI - Jonathan Zdziarski
#Hacker 'Poison Ivy' / China-based / trying to infect visitors to human rights & environmental NGO sites bit.ly/1qzJ9xz

Roman Seleznev - Russian Alleged Hacker
US Fed judge in hacker case - Roman Seleznev /blocks #Philadelphia law firm Fox Rothschild LLP from acting - tinyurl.com/n5s62wq #Russia

- conflict of interest issue / firm represented some of Roman Seleznev's alleged victims [politico]
Satellite Navigation

#Russia /US refused Russia’s GLONASS satellite navigation system on its territory. Russia then banned use GPS on Russian territory for military purposes

>> Globalnaya navigatsionnaya sputnikovaya sistema = "Global Navigation Satellite System" [wiki]


COMMENT

Buch of random information in the IT, cyber-security, surveillance, hacking and similar category, that I found interesting at the time.