Jump to content

Rate this topic

Recommended Posts

(salam)

 

Chancellor Merkel's office had "stealthy" spyware.

 

http://www.telegraph.co.uk/news/worldnews/europe/germany/11956338/Germany-investigates-alleged-GCHQ-spying-in-Angela-Merkels-office.html

 

-by Jason Huggler in Berlin, 26Oct15  1951 GMT

 

--this was found inside Merkel's office on an aide's laptop

 

-called Regin malware which was identified by Symantec and Kapersky last year and announced in Nov2014. A search for Regin will bring up several descriptions of this malware.

 

-Regin is also described as "stealthy" as its design allows it to be scanned and missed by many anti-viral algorithms.

 

-This latest in a series of espionage discoveries follows a recent (last week) disclosure that the US was paying for information bought from German intell employees. (Not just the BND)

 

Opine w/factoid: Because Germany, among other responses, is limiting some "cooperation" with the US and UK over this and previous intrusions --some approaching the proctological level-- domestic political pressure is being mounted against Merkel, et alia, with "encouragement" of the recent and continuing anti-refugee rallies. A standard tactic used by the US as also seen by the use of union riots in Australia and some-of-the-same people brought into Maidan Square, Kiev in the current "rallies". All paid for.

Germany is a key ally and a major economic influence, plus has good relations with Russia and China.

What are US control-freak stew-pee-does imagine they're accomplishing?

Share this post


Link to post
Share on other sites

(salam)

 

Spying on Americans

 

Under the individual national laws on surveillance prohibiting "spying" on their own citizens, the 5 peeping-Tom eyes with 5 eavesdropping Ears have arrangements whereby they spy and invade other country's citizens.

 

So, in pursuing invasive activities, one country peeps into another country's lives of their subjects and then reports to the host 'target' country.

 

to wit:  "Internet firms to be banned from offering unbreakable encryption under new laws", by Tom Whitehead, 02Nov15, 1516GMT

 

http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/11970391/Internet-firms-to-be-banned-from-offering-out-of-reach-communications-under-new-laws.html

 

As the article mentions, American companies like Apple and Google are singled out for compliance. HHmmmmmmm

 

And as usual, terrorists, pedophiles and criminals are the excuse. Of course, if you are a 'drug lord', your are using multi-layered encryption and code words to begin with.

 

For further reading on this new UK law,  the link above, and search   .  "Investigatory Powers Bill"

Edited by hasanhh

Share this post


Link to post
Share on other sites

(salam)

 

1] Wired, "Yes, The NSA Worried About Whether Spying Would Backfire", 13Nov15

 

Note: the time of the article is 1446 hrs which is 1946GMT

-the time of the Paris Attacks is 2120GMT at Gate D, Stade de France where the massacres began with this first attack.

 

 

http://wired.com/2015/11/yes-the-nsa-worried-about-whether-spying-would-backfire/

 

Saying that the Snowden Revelations are the cause, the forum said, "We saw people ... stop using communication ... and go to different service providers."

 

 

 

2] International Business Times, "Paris ISlS attacks spur calls to renew NSA spy program as Americans again weigh Privacy vs Security", by Paul McDougall, 16Nov15, 1540EST

http://www.ibtimes.com/paris-isis-attacks-spur-calls-renew-nsa-spy-program-americans-again-weigh-privacy-vs-2186861

 

--Section 215 -after an extension- is set to expire 30Nov15. These functions/programs are continued by the NSA's interpretation of Section 702 of FISA

 

--Despite post Charlie Hebdo "black box" storage, the French "fail to detect" anything. See PBS below.

 

--the NSA stores 5+ Billion calls per day, which "makes it more difficult" to find anything.

 

Opine: Why "renew" a program that obviously had no effect on detection. Before 9-11, the NSA budget was $60Billion every year. Post 9-11, NSA budget ranged from $80Billion to $120+Billion. Times ( x ) 14 years is well in excess of $1 Trillion and has about nothing to show for it. Every time something happened the NSA found it ex post facto, even on domestic incidents.

 

3A]  PBS News Hour, Mon16Nov15, Judy Woodruff reporting. Even Friday morning, the day of the attack, the US warned France that "chatter" was saying there was an impending attack "in Europe" but no "specificity" to say where. France was aware of activities in Belgium.

And: gov't activities and procedures and are ineffective; that suspects are using different means of communication that are "undetectable".

Opine: But gov't wants more of the same. :wacko:

To Wit:

3B] PBS Nightly Business Report, Mon16Nov15, reported on the Paris Attacks also, saying that the French were "completely off-guard".

---showed a good example of how criminals and terrorists are bypassing surveillance: texting on encrypted, invitation-only  Play Station .

 

Opine: Which is a simple example of how Big Mother Gov't peeping-Tom garbage is a totalitarian waste of money and debt.

 

 

NOW for some GOOD NEWS:

 

4] TVNZ et alia,

http://www.tvnz.co.nz/one-news/world/hacktivist-group-anonymous-vows-retribution-against-isis

Share this post


Link to post
Share on other sites

Assalamallikum,

 

Curious about how internet games could be used for terrorist communications, I found this:

 

http://www.networkworld.com/article/3005364/security/how-isis-uses-video-games-playstation-4-messaging-apps-to-evade-surveillance.html

 

Note paragraph 2 and the quote following para3.

 

The article has a link to the Buzzfeed article.

 

This 2nd article has an interesting subtitle:

 

 --    "But the larger problem, according to intelligence officials, is  what happens when ISlS stops using technology at all".

 

What happens is: back to the pre-tech era. Duh.

 

So be careful when you pass notes like we did in school.

Share this post


Link to post
Share on other sites

OPINE: When you know that hacking has become a "mature industry"; id est It's "down hill" from now on.

 

Tech Times: "NSA Hacker-jinn-Chief: No Need for Zero Days to Hack You, Just Persistence & Focus"

by Anu Passary, 30Jan16 11:21 PM

--Rob Joyce, NSA's Chief of Tailored Access Operations ( TAO )

--speaking at USENIX Enigma security conference on Wed, 27Jan16

--gov't hackers do not need "security lapses"  (the classic case: the German radioman who opened every morning with the same message using a 5 rotor Enigma machine). The Reason:

APT: Advanced Persistent Threats- the automation that keeps trying to login/goin into a network and at the same time keeps waiting for that "free ride" into a network -like on a data or software update.

http://www.techtimes.com/articles/129262/20160130/nsa-hacker-in-chief-no-need-for-zero-days-to-hack-you-just-persistence-and-focus.htm 

 

OPINE Question: OK TAO, you have divine capabilities,:einstein:,  ... but can you read Rukn ?  :hahaha:

Edited by hasanhh
the link

Share this post


Link to post
Share on other sites

16Feb16

"Judge: Apple Must Help US Hack San Bernardino Killer's Phone" -AP, 16Feb16 2227EST by Tami Abdulllah and Eric Tucker

http://abcnews.go.com/Technology/wireStory/judge-apple-us-hack-san-bernardino-killers-phone-36990684 

The Judge, a former prosecutor, has ordered Apple to provide bypass capability to the FBI for the iPhone of Syed Farook.

Farook's iPhone was discovered in a search and has self-destruct capability if an improper/incorrect password is used too many times. Why this info is not available from Google, Facebook or from the local server is not explained by Big Mother gov't.

The Obama administration has policies in place to encourage strong encryption in order to promote Internet and personal security.

Farook had left his iPhone behind -whether deliberately or not- and was later discovered in a search. The harddrive of the other shooters' has still not been discovered and they had smashed their phones beyond recoverable information.

Apple has yet to respond and has 5 days to do so.

Share this post


Link to post
Share on other sites

Update: IRS hacked (ref May 2015)

http://www.theatlantic.com/technology/archive/2016/02/the-irs-hack-was-twice-as-bad-as-we-thought/471255/ 

Individual tax records were stolen at a level previously not known. Reason: the IRS didn't cover a long enough period of time, but the IRS Inspector General did.

First reported that 114,000 individuals had their personal info stolen plus 111,000 "failed attempts".

In a search back to January 2014 the IG found 724,000 stolen and 570,000 attempts.

The hackers used the "Get Transcript" feature and impersonated people with identity theft material.

Opine: Isn't the "Internet of Things" 'wonderful' ?

Share this post


Link to post
Share on other sites

FBI "Lies"  :

11March2016: from a few court documents in the Apple vs. FBI/DoJ

http://www.wired.com/2016/03/new-documents-solve-mysteries-apple-fbi-saga/ 

--Farook's county-owned phone was retrieved from a Lexus with a Search Warrant.

--the last iCloud back-up was 19Oct, the shooting/murders were 22Oct; less than 3 days/72hours

--the iForgot feature was activated (see below)

--the County owns the phone and the password was changed because the FBI asked the County to do so.

--a test by Wired magazine's "Gadget Lab" conducted a test and can open a phone:clap:

:hahaha:  for more laughs, read the article. You younger folks will understand it better than l.

 Opine:  Maybe Wired should bid on a consulting contract to the FBI and DoJ :einstein:

 

Share this post


Link to post
Share on other sites

On Sunday the 20th, the FBI announced a 3rd party had demonstrated a technique to open Farook's phone.

An NPR interview, 22 March 2016, a write for Slate magazine said the NSA released its findings on Farook's metadata and said there are no foreign phone calls or connections.

The court order requiring Apple to develop software as per the Writs Act has been stayed for now.

For some techniques for cracking an iPhone:

http://gizmodo.com/4-theories-about-how-the-fbi-is-cracking-the-san-bernad-1766346763 

Edited by hasanhh

Share this post


Link to post
Share on other sites

Mon28March2016  Apple, Inc. vs. FBI & DoJ

lt is "...unclear who helped the FBI access the phone and what was stored on the device. But some news reports have said the FBI may have sought assistance from an Israeli forensics company."

Opine: Which means that one Apple defense --the demands from foreign countries-- is no longer applicable. (no pun intended) Countries, some anyway, can already do it. But not the US and its $1+Trillion spent on electronic surveillance.:party:

http://www.business-standard.com/article/pti-stories/fbi-hacks-attacker-s-iphone-drops-apple-suit-116032900103_1.html 

Share this post


Link to post
Share on other sites

29March16

PBS News Hour guest said that retirees from Israeli MI Unit 822 did the hacking.

It was also said that the FBI "had to drop" its suit against Apple because Apple's assistance was no longer needed.

As to the above "iphone cracking ...challenge", a guest said 'probably a hundred thousand' hackers thought they'd take a look at doing this.

For a partial description of how this hack-in was done:

http://google.com/patents/US20130067056 

which involves "mixed communication" devices and "different access technologies"

Edited by hasanhh

Share this post


Link to post
Share on other sites

 The Apple iPhone Hack

Who did the hack,   who owns who,    and the Feds already used them:

http://www.independent.ie/business/irish/firm-that-hacked-isis-phone-for-fbi-was-used-by-gardai-in-graham-dwyer-case-34593190.html 

gardai = Garda Siochana, the Irish Nat'l Police Service

Note: headline perpetuates the myth  that the San Bernardino murderers were members of lSlL. (As if l pledge allegiance to NASA that makes me a spaceman.)

Share this post


Link to post
Share on other sites

Our Money --safe?

http://nbr.com/2016/04/28/how-80b-moving-through-ny-fed-daily-could-be-vulnerable-to-hackers/ 

-there is no reporting requirement if money is stolen

-malware maybe in the SWIFT

-$81B got out in an $240B attempt

OPINE: "Car NSA Where Are You?" (Parody of "Car 54, Where Are You? --1950s police comedy, q.v.)

hmmmm, maybe "NSA Where Are You?" sounds better.

Share this post


Link to post
Share on other sites

http://blogs.voanews.com/techtronics/2016/04/28/cisco-12-million-pcs-have-backdoors-iots-privacy-dilemma/  <<<----taken down see below

A result of NSA mandated "backdoors" into systems.

Added:

http://www.securityweek.com/cisco-finds-backdoor-installed-12-million-pcs

Edited by hasanhh

Share this post


Link to post
Share on other sites
On ‎4‎/‎29‎/‎2016 at 7:19 AM, hasanhh said:

Our Money --safe?

http://nbr.com/2016/04/28/how-80b-moving-through-ny-fed-daily-could-be-vulnerable-to-hackers/ 

-there is no reporting requirement if money is stolen

-malware maybe in the SWIFT

-$81B got out in an $240B attempt

OPINE: "Car NSA Where Are You?" (Parody of "Car 54, Where Are You? --1950s police comedy, q.v.)

hmmmm, maybe "NSA Where Are You?" sounds better.

GozNym is attacking the SWIFT system and your PC

This is a good introductory piece:

http://securityintelligence.com/time-is-money-goznym-launches-redirection-attacks-in-poland/ 

Here is more:

Victims are "redirected" to Look-Alike sites. If you check you bank account then everything -including the balance- looks fine, but your account has been cleaned out.

Other info at FS-ISAC & grahamcluley.com

This is a Tian Virus integrated into sorena mapping function with andft. This combination has multi-level morphing capability.

@Darth Vader --can you add more or comment?

Share this post


Link to post
Share on other sites
1 hour ago, hasanhh said:

Victims are "redirected" to Look-Alike sites. If you check you bank account then everything -including the balance- looks fine, but your account has been cleaned out.

When I registered with my bank for an online account, I was given a group of images to choose from and I picked one and created a clue word that displays under the image. So when I log on, after I type in my username, my bank shows me my special image and the clue word that I created. If the image or text is not correct or if I don't see my image, I should NOT type in my password. Don't all banks have extra security beyond username and password? 
 

Share this post


Link to post
Share on other sites

^^^^^ @hameedeh  l was always leery of doing anything online. A hold-over from the party-line telephone system. So l have never banked online.

Like the old telephone system, unless you don't care the whole world knows it, never say it on the phone -or online

Share this post


Link to post
Share on other sites

29April to this date 28May16

Update: Nightly Business Report does not keep some of its broadcasts' transcripts in the correct or 'current' date.

For the Malware noted above: http://nbr.com/2016/05/27/serpent-like-malware-targets-your-bank-account/ 

For the next report from NBR, on 27May reported by E.Javers that North Korea had in his report that "several different entities inside the Bangladesh's server". http://archive.org/details/KQED_20160528_020000_Nightly_Business_Report  which are sitting there like observers watching. This element from Javers is in addition to:

http://www.voanews.com/content/north-korea-bank-cyberattacks/3350209.html

http://www.npr.org/2016/05/27/479764874/north-korea-linked-to-cyber-attacks-on-asian-banks 

which explain North Korea as a suspect and probable "link".

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×