
My Tarot Card for 2011.
Drawn at random, of course.
- ferg
As part of an international criminal probe into computer attacks launched this month against perceived corporate enemies of WikiLeaks, the FBI has raided a Texas business and seized a computer server that investigators believe was used to launch a massive electronic attack on PayPal, The Smoking Gun has learned.
The FBI investigation began earlier this month after PayPal officials contacted agents and “reported that an Internet activist group using the names ‘4chan’ and “Anonymous” appeared to be organizing a distributed denial of service (“DDoS”) attack against the company,” according to an FBI affidavit excerpted here.
The PayPal assault was part of “Operation Payback,” an organized effort to attack firms that suspended or froze WikiLeaks’s accounts in the wake of the group’s publication of thousands of sensitive Department of State cables. As noted by the FBI, other targets of this “Anonymous” effort included Visa, Mastercard, Sarah Palin’s web site, and the Swedish prosecutor pursuing sex assault charges against Julian Assange, the WikiLeaks founder.
On December 9, PayPal investigators provided FBI agents with eight IP addresses that were hosting an “Anonymous” Internet Relay Chat (IRC) site that was being used to organize denial of service attacks. The unidentified administrators of this IRC “then acted as the command and control” of a botnet army of computers that was used to attack target web sites.
"I love It's a Wonderful Life because it teaches us that family, friendship, and virtue are the true definitions of wealth."This has become a Christmas tradition with me now -- Merry Christmas.
- Will Chen, writing on his blog Wise Bread (props, Boing Boing). He continues that "...in 1947, however, the FBI considered this anti-consumerist message as subversive Communist propaganda."
The CIA has launched a task force to assess the impact of the exposure of thousands of U.S. diplomatic cables and military files by WikiLeaks.
Officially, the panel is called the WikiLeaks Task Force. But at CIA headquarters, it's mainly known by its all-too-apt acronym: W.T.F.
The irreverence is perhaps understandable for an agency that has been relatively unscathed by WikiLeaks. Only a handful of CIA files have surfaced on the WikiLeaks Web site, and records from other agencies posted online reveal remarkably little about CIA employees or operations.
Even so, CIA officials said the agency is conducting an extensive inventory of the classified information, which is routinely distributed on a dozen or more networks that connect agency employees around the world.
And the task force is focused on the immediate impact of the most recently released files. One issue is whether the agency's ability to recruit informants could be damaged by declining confidence in the U.S. government's ability to keep secrets.
DHS has issued final rules which enable it to exempt certain information contained in Suspicious Activity Reports (SARs) from some provisions of the Privacy Act because the information it might obtain from such SARs could be very beneficial to the government in its pursuit of criminal, civil and administrative enforcement matters.
However, the U.S. financial industry, which attempts to support such initiatives by DHS to gather terrorism-related information, raised specific concerns during the comment period about the possible release of sensitive proprietary information under the Freedom of Information Act. DHS was not very reassuring to the financial services industry in the final rule it published in the Federal Register on Dec. 21.
For example, BITS, a membership organization of financial services vendors who own or operate critical infrastructure information systems, asked DHS whether it planned to gather SARs related exclusively to information about “physical security threats,” or whether it also plans to gather SARs generated under the Bank Secrecy Act about suspect financial transactions and money-laundering activities. After explaining that DHS participates in a nationwide effort to collect and assess SARs -- in an initiative which is overseen by the Department of Justice -- DHS noted on Dec. 21 that the SARs it intends to collect “are not limited to physical security threats.”
Federal prosecutors, seeking to build a case against the WikiLeaks leader Julian Assange for his role in a huge dissemination of classified government documents, are looking for evidence of any collusion in his early contacts with an Army intelligence analyst suspected of leaking the information.
Justice Department officials are trying to find out whether Mr. Assange encouraged or even helped the analyst, Pfc. Bradley Manning, to extract classified military and State Department files from a government computer system. If he did so, they believe they could charge him as a conspirator in the leak, not just as a passive recipient of the documents who then published them.
Among materials prosecutors are studying is an online chat log in which Private Manning is said to claim that he had been directly communicating with Mr. Assange using an encrypted Internet conferencing service as the soldier was downloading government files. Private Manning is also said to have claimed that Mr. Assange gave him access to a dedicated server for uploading some of them to WikiLeaks.
A federal appeals court on Wednesday rejected the Obama administration’s contention that the government is never required to get a court warrant to obtain cell-site information that mobile-phone carriers retain on their customers.
The decision by the 3rd U.S. Circuit Court of Appeals is one in a string of court decisions boosting Americans’ privacy [.pdf] in the digital age — rulings the government fought against. The most significant and recent decision came Tuesday, when a different federal appeals court said for the first time the government must obtain a court warrant for an internet service provider to grant the authorities access to a suspect’s e-mail.
The case that concluded Wednesday concerns historical cell-site location information, which carriers usually retain for about 18 months. The data identifies the cell tower the customer was connected to at the beginning of a call and at the end of the call — and is often used in criminal prosecutions and investigations.
You might not have heard of OpenBSD, but the free operating system is at the root of many computers and virtual private networks worldwide. So too is the FBI — that is, if you believe a new accusation that surfaced on a public OpenBSD mailing list.
Theo de Raadt, founder of OpenBSD, forwarded an emailed accusation that the FBI tampered with OpenBSD’s Internet protocol security code around 2000 to 2001. The allegation was sent to de Raadt in a private email from Gregory Perry, who claims to have been at one point an FBI consultant and chief technologist at a network security company called NETSEC, which was apparently an early backer of OpenBSD.
“My NDA with the FBI has recently expired, and I wanted to make you aware of the fact that the FBI implemented a number of backdoors and side channel key leaking mechanisms into the [OpenBSD cryptographic framework],” he wrote to de Raadt. “Jason Wright and several other developers were responsible for those backdoors, and you would be well advised to review any and all code commits by Wright as well as the other developers he worked with originating from NETSEC.”
If true, Perry’s accusation — that the FBI paid programmers to slip in code that would leak private encryption keys — would prove to be quite the bombshell. But either way the truth will be hard to come by, a fact that will likely only add to the conspiracy.
FBI agents looking into the theft of customer data belonging to McDonald's are investigating similar breaches that may have hit more than 100 other companies that used email marketing services from Atlanta-based Silverpop Systems .
“The breach is with Silverpop, an email service provider that has over 105 customers,” Stephen Emmett, a special agent in the FBI's Atlanta field office, told The Register. “It appears to be emanating from an overseas location.”
He declined to provide further details.
Over the past week, at least two other sites – one known to have ties to Silverpop and the other that appears to – offered similar warnings to their customers. deviantART, a website that boasts more than 16 million registered accounts, warned its users that their email addresses, user names and birth dates were exposed to suspected spammers as a result of a breach at the email provider.
The government must obtain a court warrant to require internet service providers to turn over stored e-mail to the authorities, a federal appeals court ruled Tuesday.
The decision by the 6th U.S. Circuit Court of Appeals was the first time an appellate court said American’s had that Fourth Amendment protection.
“The government may not compel a commercial ISP to turn over the contents of a subscriber’s emails without first obtaining a warrant [.pdf] based on probable cause,” the appeals court ruled. The decision, one stop short of the Supreme Court, covers Kentucky, Michigan, Ohio and Tennessee.
Kevin Bankston, a privacy attorney with the Electronic Frontier Foundation, applauded the decision.
“I expect e-mail providers across the country will comply with this,” he said in a telephone interview.
RSA, EMC’s security division, is advising customers to apply a two-year-old patch for its Adaptive Authentication product after a researcher discovered hundreds of banking Websites are still open to attack.
RSA Adaptive Authentication is a risk-based fraud prevention and authentication platform that measures risk indicators to identify suspicious activities. According to RSA, versions 2.x and 5.7.x of the on-premise edition of the product are vulnerable to cross-site scripting due to a Flash Shockwave file provided by the Adaptive Authentication system.
The vulnerability in question was actually patched in 2008, but was brought back into focus recently when Nir Goldshlager, a security consultant with Avnet Technologies, discovered many online banking sites were still vulnerable to attack, something he uncovered after searching for the affected filename in Google. He reported his discovery to RSA in November.
Still, hundreds of sites remain vulnerable, he told eWEEK today.
An East Texas county has halted electronic fund transfers after cyber hackers believed to be in Russia allegedly stole $200,000 in tax-related funds.
The Longview News-Journal reported Tuesday that Gregg County, state and federal authorities are investigating.
Tax assessor/collector Kirk Shields said Monday that local tax payments destined for schools and cities were hijacked.
Shields says confirmation of Nov. 23 theft, discovered in progress and traced to a website in Moscow, has led to changes in the county's method for moving funds.
Thieves use malicious software, known as malware, to infect the computers of unsuspecting users by e-mail. Shields says a county employee who mistakenly unleashed the virus has been suspended for violating cyber-security policy.
Efforts continue to retrieve the funds and identify the hackers.
Russian providers of Internet services may avoid responsibility for offensive or controversial content stored on their servers, according to amendments to the Russian Civil Code proposed by the presidential law codification council, a Russian business daily said on Tuesday.
A new draft Civil Code includes an article stipulating responsibility of Internet providers for their content. The presidential council drew up the amendments to the article following an order by President Dmitry Medvedev, an active Internet user, the Vedomosti paper said.
The bill relieves providers of responsibility for the content if three conditions are met: the controversial content was uploaded to the provider's server "by a client or on his order"; a provider "did not know or should not have known" about the contentiousness of the content; the provider took "prompt measures" to eliminate the consequences of the controversial content storage following a written request by a third party.
The measures to be taken will be specified in a special law on Internet providers, Vedomosti said. According to the proposed amendments, a provider is obligated to delete the content within three days, suspend the domain on a written police request and limit access to questionable information upon a prosecutor's request.
When the European Parliament ordered a halt in February to an American government program to monitor international banking transactions for terrorist activity, the Obama administration was blindsided by the rebuke.
“Paranoia runs deep especially about US intelligence agencies,” a secret cable from the American Embassy in Berlin said. “We were astonished to learn how quickly rumors about alleged U.S. economic espionage” had taken root among German politicians who opposed the program, it said.
The memo was among dozens of State Department cables that revealed the deep distrust of some traditional European allies toward what they considered American intrusion into their citizens’ affairs without stringent oversight.
The program, created in secrecy by the Bush administration after the Sept. 11, 2001, attacks, has allowed American counterterrorism officials to examine banking transactions routed through a vast database run by a Brussels consortium known as Swift. When the program was disclosed in 2006 by The New York Times, just months after the newspaper reported the existence of the National Security Agency’s warrantless wiretapping program, it set off protests in Europe and forced the United States to accept new restrictions.
American counterintelligence investigators are allegedly trying to uncover at least one Russian-handled double agent operating inside the US National Security Agency (NSA), according to information published on Wednesday in The Washington Times.
The paper based its allegation on an interview with an anonymous “former intelligence official” with close ties to the NSA —America’s largest intelligence agency, which is tasked with worldwide communications surveillance as well as communications security.
The anonymous source told the Times that the probe is directly connected to the arrest of nearly a dozen Russian deep-cover operatives by the FBI last summer. Washington eventually exchanged the Russian spies with several Western-handled Russian operatives captured by Moscow and held in Russian prisons. But the FBI allegedly believes that the deep-cover operatives, most of whom used false identity papers and had lived in the US for years, were primarily tasked with aiding at least one Russian-handled double spy operating inside the NSA’s Forge George F. Meade headquarters, in the US state of Maryland.
The anonymous intelligence source said that, not only the FBI, but the NSA is also “convinced” that “one or more Russian spies” are active inside the Agency, as well as perhaps in other Pentagon-affiliated intelligence agencies, including the Defense Intelligence Agency.
The Times contacted NSA and FBI representatives in connection with the anonymous revelations, but both agencies refused comment.