Monday 31 August 2015

WikiLeaks’ Assange stays indoors, fears CIA drone attack

WikiLeaks founder Julian Assange fears he will be sent to the United States, where he could face the death penalty, and even worries that he will be targeted by a CIA drone.

Assange, who faces extradition to Sweden on rape charges and has been holed up at the Ecuadorean Embassy in London since 2012, said in an interview withThe Times Magazine that things have become so dangerous that he cannot even poke his head out of the embassy’s balcony doors.

“There are security issues with being on the balcony; there have been bomb threats and assassination threats from various people,” he said during the interview.

Assange did, however, appear on the balcony of the embassy building with the Rev. Jesse Jackson, the American civil rights activist, who visited Assange for more than an hour during a stop in London on August 21.

“There are security issues with being on the balcony; there have been bomb threats and assassination threats from various people.”

– Julian Assange, Wikileaks founder

Assange, 44, who hails from Australia, faces rape allegations in Sweden, although Swedish prosecutors have dropped their investigation into lesser sexual assault allegations after failing to question Assange within the 5-year statute of limitations period.

Assange says he believes the situation will be resolved in the next two years, but has refused to travel to Sweden, saying he fears it would lead to him being extradited to the United States because of an investigation into WikiLeaks’ dissemination of hundreds of thousands of classified U.S. documents.

Assange published the classified U.S. information that he received from NSA leaker Edward Snowden, the former NSA contract systems analyst who is living in Russia on a temporary grant of asylum after leaking a massive volume of government documents.

He said Snowden is in Russia on Assange’s advice; Assange said: “He preferred Latin America, but my advice was that he should take asylum in Russia despite the negative PR consequences, because my assessment is that he had a significant risk he could be kidnapped from Latin America on CIA orders.

“Kidnapped or possibly killed.”

On the possibility of being “droned” by the CIA, Assange told the magazine: “I’m a white guy. Unless I convert to Islam, it’s not that likely that I’ll be droned, but we have seen things creeping toward that.”

View the original content and more from this author here: http://ift.tt/1hptlRi



from hacker samurai http://ift.tt/1FbtIo0
via IFTTT

Hackers steal Catholic Church employee data

(NEWSCHANNEL 3) – Employees at Michigan Catholic churches are the latest victims of cyber criminals.

Hackers accessed data of more than 10,000 people working for Catholic churches or church affiliates across the state.

The Michigan Catholic Conference told the Detroit Free Press that names and social security numbers were likely stolen.

The employees work at churches, schools, hospitals and orphanages.

Priests or nuns were not affected because their data is on a separate computer system.

View the original content and more from this author here: http://ift.tt/1hO90FX



from hacker samurai http://ift.tt/1KxVYaw
via IFTTT

Uber Hires Hackers To Protect Self-Driving Car

Uber hired Charlie Miller and Chris Valasek, the same men who hacked into the Jeep Cherokee remote driving system two months ago, to lead the company’s efforts in protecting their vehicles against hackers.
Uber Screenshot
To ensure the safety of their self-driving vehicles, Uber hired two hackers who will begin working within the week. (Photo : Google Commons)

Uber hired two security engineers to work on the company’s new, self-driving car technology, according to Reuters.

The two engineers, Charlie Miller and Chris Valasek, are the same men who hacked into the Jeep Cherokee remote driving system two months ago, taking over the vehicles,according to TIME.

The hack demonstrated the ease in which hackers could take over these systems, exposing serious and detrimental security flaws that caused Fiat Chrysler to recall 1.4 million vehicles, according to Inquisitr.

At the time of the hack, Charlie Miller worked at Twitter Inc., while Chris Valasek worked at IOActive. They have both since resigned and will begin working at Uber within the week, according to Reuters.

Because of their headline-making hack, the two will be working at Uber’s Advanced Technologies Center research lab where they will be entrusted with ensuring the safety of Uber’s driverless car project, according to Inquisitr.

Uber also announced on Tuesday that it has entered into a partnership with the University of Arizona where they will be given grant money for research and development of this futuristic project, according to Reuters.

Uber will begin testing these self-driving vehicles in Tuscan, Arizona, however, driverless car prototypes have already been spotted on the road in Pittsburgh, according to Inquisitr.

View the original content and more from this author here: http://ift.tt/1Q30D4I



from hacker samurai http://ift.tt/1PGvIKI
via IFTTT

Russian-speaking hackers breach 97 websites, many of them dating ones

49 78 0 Comment 12 Email U.S. Weighs Sanctions Over China For Cyber Hacking: REPORT

WASHINGTON, Aug 30 (Reuters) – The White House is considering applying sanctions against companies and individuals in China it believes have benefited from Chinese hacking of U.S. trade secrets, the Washington Post reported on Sunday.

The newspaper, citing several unidentified Obama administration officials, said a final determination on whether to issue the sanctions was expected soon, possibly as early as the next two weeks.

Suspicions that Chinese hackers were behind a series of data breaches in the United States have been an irritant in relations between the world’s two largest economies as President Xi Jinping prepares to make his first visit to the United States next month.

Obama administration officials have said China is the top suspect in the massive hacking of a U.S. government agency that compromised the personnel records of at least 4.2 million current and former government workers. China has denied involvement.

U.S. government officials and cyber analysts say Chinese hackers are using high-tech tactics to build massive databases that could be used for traditional espionage, such as recruiting spies or gaining access to secure data on other networks.

A White House official had no immediate comment on the report. The State Department did not immediately respond to a request for comment.

A senior administration official said in reply to a Reuters query that President Barack Obama noted when he signed an executive order earlier this year enabling the use of economic sanctions against cyber hackers that the administration “is pursuing a comprehensive strategy to confront such actors.”

“That strategy includes diplomatic engagement, trade policy tools, law enforcement mechanisms, and imposing sanctions on individuals or entities that engage in certain significant, malicious cyber-enabled activities,” the official said.

“We are assessing all of our options to respond to these threats in a manner and time frame of our choosing,” the official added.

The Post quoted an administration official as saying the possible sanctions move “sends a signal to Beijing that the administration is going to start fighting back on economic espionage, and it sends a signal to the private sector that we’re on your team. It tells China, enough is enough.”

The newspaper said the sanctions would not be imposed as retaliation for the suspected hacking of the U.S. government personnel records, as they were deemed to have been carried out for intelligence reasons rather than to benefit Chinese industry.

View the original content and more from this author here: http://ift.tt/1UgwTqT



from hacker samurai http://ift.tt/1PGvIKC
via IFTTT

WikiLeaks’ Assange stays indoors, fears CIA drone attack | hacker samurai


from Hacker Samurai http://ift.tt/1FbtIo0
via IFTTT

Hackers steal Catholic Church employee data | hacker samurai


from Hacker Samurai http://ift.tt/1KxVYaw
via IFTTT

Uber Hires Hackers To Protect Self-Driving Car | hacker samurai


from Hacker Samurai http://ift.tt/1PGvIKI
via IFTTT

Russian-speaking hackers breach 97 websites, many of them dating ones | hacker samurai


from Hacker Samurai http://ift.tt/1JGpmdW
via IFTTT

hackersamurai.com


from Hacker Samurai http://ift.tt/1PGvIKC
via IFTTT

Saturday 29 August 2015

WikiLeaks founder Julian Assange fears assassination attempt | hacker samurai


from Hacker Samurai http://ift.tt/1Er418k
via IFTTT

Uber Is Hiring The Two Hackers That Were Able To Hack The Jeep Cherokee | hacker samurai


from Hacker Samurai http://ift.tt/1Er42ZT
via IFTTT

Iranian Military Hackers Launched Google Phishing Campaign Against US, Middle East Activists:...


from Hacker Samurai http://ift.tt/1UjrIRN
via IFTTT

WikiLeaks founder Julian Assange fears assassination attempt

WikiLeaks founder Julian Assange fears he may be assassinated if he steps outside the Ecuadorian embassy.

In an interview with The Times Magazine, Mr Assange said he has not had any fresh air or sunlight for three years because it is too dangerous to leave the building.

He told the magazine: “There are security issues with being on the balcony. There have been bomb threats and assassination threats from various people.”

Despite believing it is “not likely” that he will be shot, he worries that if he is ever free he could be kidnapped or “droned” by the CIA.

“I’m a white guy,” Mr Assange said. “Unless I convert to Islam it’s not that likely that I’ll be droned, but we have seen things creeping towards that.”

Yet, he believes his controversial public figure status has led to “quite a number of threats by unstable people”.

The Australian was granted political asylum by the government of Ecuador under the 1951 Refugee Convention in 2012.

He believes he risks extradition to the US from the UK and Sweden, where he is under investigation for his involvement with Wikileaks. He also faces extradition to Sweden for an investigation into an alleged rape.

Over a period of nearly five years, he has been detained without charge in prison, under house arrest and in the embassy, with round-the-clock police guard thought to cost more than £11 million.

Mr Assange believes his situation will be resolved in the next two years, by which point he will have spent five years living in the embassy.

View the original content and more from this author here: http://ift.tt/1fMCVwk



from hacker samurai http://ift.tt/1Er418k
via IFTTT

Uber Is Hiring The Two Hackers That Were Able To Hack The Jeep Cherokee

The recent hack of the Jeep Cherokee was a pretty important story, and it resulted in Fiat Chrysler, the owner of Jeep, recalling a number of vehicles to undergo a software patch. This was reportedly the first recalling for a hack-related software issue ever.

It seems as though Uber has taken notice of the story, however, and has hired Charlie Miller and Chris Valasek, the people behind the hack. An engineer at the Uber Advanced Technology Center in Pittsburgh made the announcement in a tweet.

Charlie Miller previously worked at Twitter, and Chris Valasek worked at a security firm called IOActive. The two will be officially announced as new hires at Uber on Monday, in an effort to grow the company’s technology efforts.

The news comes only a few days after Uber announced a partnership with the University of Arizona, a partnership that will see further development on autonomous car technology, which Uber has been working on for a number of months now.

When the report of the hacking first broke, Fiat Chrysler recalled a whopping 1.4 million cars equipped with Uconnect, which is where the cars failed in security. Owners were able to install the patch through a simple USB stick.

The hack of the Jeep is not the only car hacking to take place of late. Vulnerabilities were also found in Tesla cars as well as in GM’s OnStar system. Miller and Valasek’s hack was the most significant, largely because it allowed hackers to gain almost complete control over the car.

Uber’s self-driving car efforts are certainly gaining steam, and it will be interesting to see what the company comes up with. Many suggest that the company will one day use autonomous cars instead of drivers as a way to save money. Uber also recently acquired mapping company deCarta, as well as a large portion of Microsoft’s Bing Maps. This technology will be extremely important in the development of the company’s self-driving cars.

View the original content and more from this author here: http://ift.tt/1fMCVwi



from hacker samurai http://ift.tt/1Er42ZT
via IFTTT

hackersamurai.com


from Hacker Samurai http://ift.tt/1UjrIRL
via IFTTT

Hackers Stole $1.2 Billion From Businesses in New Scam | hacker samurai


from Hacker Samurai http://ift.tt/1UjrKc9
via IFTTT

Iranian Military Hackers Launched Google Phishing Campaign Against US, Middle East Activists: Researchers

Iranian expatriates and American activists are being focused by an “elaborate phishing marketing campaign” that permits hackers to take management of their Google account, based on new analysis from Citizen Lab. Iranian government-backed hackers are believed to be accountable, with researchers connecting this assault marketing campaign with an identical one which coincided with the 2013 presidential election.

The revealed Thursday named Jillian York, the director of worldwide freedom of expression on the Digital Frontier Basis, as one goal of the hacking marketing campaign. York, who has written on the and on a , stated a United Kingdom telephone quantity referred to as her on the morning of August 21. The caller had a German accident, York stated, and claimed to be a Reuters journalist making an attempt to interview her, at which level she informed him to ship an e mail.

The message seemed to be from the information group’s “Tech Dep” and contained quite a lot of errors, together with the misspelling “Reutures.” York and different targets have been additionally requested to comply with a hyperlink to a phony website asking them to enter their consumer credentials. The hackers would use that info instantly, triggering a textual content message that claimed to be Google saying there had been an unauthorized try and entry their account with a verification code hooked up.

The goal would then enter that code into the pretend web site, surrendering full management of the account. The hack is a uncommon instance of intruders taking management of accounts that depend on two issue authentication, one of many best and most dependable methods for Web customers to guard their accounts on-line. It’s not clear what number of hacks have been profitable; the report is predicated on failed makes an attempt.

“There’s little question that this comes from Iran’s Revolutionary Guard, which has been very vicious towards the free press and free speech,” Omid Memarian, an exiled Iranian journalist and one of many marketing campaign’s targets, . The assault makes use of a number of the similar hallmarks employed by Iranian hackers in 2013. Google’s Safety weblog reported on June 12, 2013, simply days earlier than the election of President Hassan Rouhani, that safety software program all of the sudden detected tens of hundreds of assaults on Iranian customers.

“These campaigns, which originate from inside Iran, symbolize a big bounce within the general quantity of phishing exercise within the area,” Eric Grosse, Google’s vice chairman of safety engineering, . “The timing and concentrating on of the campaigns recommend that the assaults are politically motivated in reference to the Iranian presidential election on Friday.”

View the original content and more from this author here: http://ift.tt/1LIuWih



from hacker samurai http://ift.tt/1UjrIRN
via IFTTT

Hackers’ helper: A young malware creator deserves stiff punishment

Morgan C. Culbertson pleaded guilty in federal court Tuesday to designing and trying to sell Android phone hijacking malware on Darkode, an online marketplace for criminals and hackers.

The Carnegie Mellon University student from Churchill confessed to conspiring with another hacker from the Netherlands. The malware makes it possible for criminals to read private texts, steal files, take photos and record conversations without the owners of Android phones knowing.

Mr. Culbertson, 20, admitted to committing a crime and expressed some remorse before U.S. District Judge Maurice Cohill Jr. In December the defendant will be sentenced to up to a decade in prison.

By designing the malware and entering into a marketing scheme with several programmers on the so-called Dark Web, Mr. Culbertson has proven himself not only tech-savvy, but also criminal-minded. His danger to society should not be underestimated because of his youth and academic privilege.

His sentence should reflect the seriousness of his crime, which had the potential of exposing the private property of countless people to Internet predators who would wreak mischief, damage and loss on them.

Ten years in prison without online access would be a deterrent to other young hackers who are tempted to use their computer expertise to rob the rest of us. Mr. Culbertson has admitted his guilt, so it’s up to Judge Cohill to respond to that confession with a stiff sentence.

View the original content and more from this author here: http://ift.tt/1LIuXTt



from hacker samurai http://ift.tt/1UjrIRL
via IFTTT

Hackers Stole $1.2 Billion From Businesses in New Scam

You have more than likely heard about hackers and the multiple hacks that have happened at businesses throughout the years, such as Home Depot, Target, and Ashley Madison. A new scam though is happening to businesses, which since October 2013 has costed the companies nearly $1.2 billion according to the FBI.The scam is known as “business email compromise” and it is basically when the hackers pose as the CEO of a certain company, and then ask the employees to hand over certain financial information that should remain confidential. The first thing that happens is that the hackers will send a phishing email to the CEO or another top-ranking executive, which then allows the hackers to gain access to that account, and then the hackers send an email from that executive’s account. There are also some hackers who create a dummy email to then phish the financial departments into thinking that the email is coming from the CEO of the company. Other times, the hackers are posing at the lawyers for the company and asking for the financial information immediately. The hackers then will wire the money out of the company and put it into their own coffers, but that is only after the needed information about the company’s accounts have been passed onto them.

The FBI has said this is a widespread scam, although banks and companies have recently gotten better about noticing the scam emails, but all 50 states have reported this scam, and over 79 counties have seen it as well. In 2015, there has already been a 270 percent increase in victims that have been identified due to this scam, and this has exposed the huge losses that the businesses are incurring as a result of the email scam. The FBI announced this week that there have been more than 7,000 companies just in the United States that have been victims of this scam since October 2013, and that amounts to about $750 million. The total loss for the last two years including the companies reporting to the foreign law enforcement agencies have equaled out to $1.2 billion. For some businesses, the loss from this scam can be devastating, and can lead to the company going out of business.

Just this month, a networking firm, Ubiquiti, has reported that an “outside entity” was targeting its finance department by sending out what seemed like a company email. A hacker ended up stealing $46.7 million from the company’s accounts. The company did recover about $8.1 million of that money that the hacker stole, and Ubiquiti said that it should be able to get back $6.8 million more from that company. The company had also said that it is working with overseas and United States officials and law enforcement in order to retrieve the remaining $31.8 million.

This scam is more than just about trying to get money out of businesses because the damage done to the reputation of the business can be horrific. The fact that the hackers are so easily able to get the financial information also leads to the question of how are the employees not noticing that these are phishing emails? A lot of the emails may look like they are coming from a true email from the business, the issue is often that it can be easily to spot because there is a number where there should be a letter or a letter instead of a number, such as @conveg1es.com instead of convergies.com. The CEO and other executives need to be better versed in knowing how to tell these email addresses apart, including looking at the entire email address before sending off any information. It would also be a good idea for companies to have a number that you can call when you get these emails that would let you know whether or not such emails were going out or someone that could tell the person the emails would not have been sent from any company email, including from Human Resources or any other financial department.

View the original content and more from this author here: http://ift.tt/1LIuXTp



from hacker samurai http://ift.tt/1UjrKc9
via IFTTT

Friday 28 August 2015

Ashley Madison founder steps down | hacker samurai


from Hacker Samurai http://ift.tt/1WWUtI2
via IFTTT

Ashley Madison founder steps down

Assange: What Wikileaks Teaches Us About How the U.S. Operates | hacker samurai


from Hacker Samurai http://ift.tt/1NEid0w
via IFTTT

Assange: What Wikileaks Teaches Us About How the U.S. Operates

In an introduction to a new book, The WikiLeaks Files: The World According to U.S. Empire (Verso, 2015), Wikileaks editor-in-chief Julian Assange explains how the leaked U.S. documents have lifted the veil on the imperialist nature of American foreign policy.

One day, a monk and two novices found a heavy stone in their path. “We will throw it away,” said the novices. But before they could do so, the monk took his ax and cleaved the stone in half. After seeking his approval, the novices then threw the halves away.

“Why did you cleave the stone only to have us throw it away?” they asked. The monk pointed to the distance the half stones had traveled. Growing excited, one of the novices took the monk’s ax and rushed to where one half of the stone had landed. Cleaving it, he threw the quarter, whereupon the other novice grabbed the ax from him and rushed after it. He too cleaved the stone fragment and threw it afield.

Try Newsweek: subscription offers

The novices continued on in this fashion, laughing and gasping, until the halves were so small they traveled not at all and drifted into their eyes like dust. The novices blinked in bewilderment. “Every stone has its size,” said the monk.

At the time of writing, WikiLeaks has published 2,325,961 diplomatic cables and other US State Department records, comprising some two billion words. This stupendous and seemingly insurmountable body of internal state literature, which if printed would amount to some 30,000 volumes, represents something new.

Like the State Department, it cannot be grasped without breaking it open and considering its parts. But to randomly pick up isolated diplomatic records that intersect with known entities and disputes, as some daily newspapers have done, is to miss “the empire” for its cables.

Each corpus has its size.

To obtain the right level of abstraction, one which considers the relationships between most of the cables for a region or country rather than considering cables in isolation, a more scholarly approach is needed. This approach is so natural that it seems odd that it has not been tried before.

The study of empires has long been the study of their communications. Carved into stone or inked into parchment, empires from Babylon to the Ming dynasty left records of the organizational center communicating with its peripheries.

However, by the 1950s, students of historical empires realized that somehow the communications medium was the empire. Its methods for organizing the inscription, transportation, indexing and storage of its communications and for designating who was authorized to read and write them, in a real sense constituted the empire. When the methods an empire used to communicate changed, the empire also changed.

Speech has a short temporal range, but stone has a long one. Some writing methods, such as engraving into stone, suited the transmission of compressed institutional rules that needed to be safely communicated into future months and years. But these methods did not allow for rapidly unfolding events, or for offi- cial nuance or discretion: they were set in stone.

To address the gaps, empires with slow writing systems still had to rely heavily on humanity’s oldest and yet most ephemeral communications medium: oral conventions, speech.

Other methods, such as papyrus, were light and fast to create, but fragile. Such communications materials had the advantage of being easy to construct and transport, unifying occupied regions through rapid information flow that in turn could feed a reactive central management. Such a well connected center could integrate the streams of intelligence coming in and swiftly project its resulting decisions outwards, albeit with resulting tendencies toward short-termism and micromanagement.

While a sea, desert, or mountain could be crossed or bypassed at some expense, and energy resources discovered or stolen, the ability to project an empire’s desires, structure and knowledge across space and time forms an absolute boundary to its existence.

Cultures and economies communicate using all manner of techniques across the regions and years of their existence, from the evolution of jokes shared virally between friends to the diffusion of prices across trade routes.

This does not by itself make an empire. The structured attempt at managing an extended cultural and economic system using communications is the hallmark of empire. And it is the records of these communications, never intended to be dissected, and so especially vulnerable to dissection, that form the basis for understanding the nature of the world’s sole remaining “empire.”

Anatomy of the U.S. Empire

And where is this empire?

Each working day, 71,000 people across 191 countries representing twenty-seven different US government agencies wake and make their way past flags, steel fences and armed guards into one of the 276 fortified buildings that comprise the 169 embassies and other missions of the US Department of State.

They are joined in their march by representatives and operatives from twenty-seven other US government departments and agencies, including the Central Intelligence Agency, the National Security Agency, the Federal Bureau of Investigation and the various branches of the US military.

Inside each embassy is an ambassador who is usually close to domestic US political, business or intelligence power; career diplomats who specialize in the politics, economy and public diplomacy of their host state; managers, researchers, military attachés, spies under foreign-service cover, personnel from other US government agencies (for some embassies this goes as far as overt armed military or covert special operations forces); contractors, security personnel, technicians, locally hired translators, cleaners and other service personnel.

Above them, radio and satellite antennas scrape the air, some reaching back home to receive or disgorge diplomatic and CIA cables, some to relay the communications of US military ships and planes, others emplaced by the National Security Agency in order to mass-intercept the mobile phones and other wireless traffic of the host population.

The US diplomatic service dates back to the Revolution, but it was in the post–World War II environment that the modern State Department came to be.

Its origins coincided with the appointment of Henry Kissinger as secretary of state, in 1973. Kissinger’s appointment was unusual in several respects. Kissinger did not just head up the State Department; he was also concurrently appointed national security advisor, facilitating a tighter integration between the foreign relations and military and intelligence arms of the US government.

While the State Department had long had a cable system, the appointment of Kissinger led to logistical changes in how cables were written, indexed and stored. For the first time, the bulk of cables were transmitted electronically. This period of major innovation is still present in the way the department operates today.

The US Department of State is unique among the formal bureaucracies of the United States. Other agencies aspire to administrate one function or another, but the State Department represents, and even houses, all major elements of US national power. It provides cover for the CIA, buildings for the NSA mass-interception equipment, office space and communications facilities for the FBI, the military and other government agencies and staff to act as sales agents and political advisors for the largest US corporations.

One cannot properly understand an institution like the State Department from the outside, any more than Renaissance artists could discover how animals worked without opening them up and poking about inside. As the diplomatic apparatus of the United States, the State Department is directly involved in putting a friendly face on empire, concealing its underlying mechanics.

Every year, more than $1 billion is budgeted for “public diplomacy,” a circumlocutory term for outward-facing propaganda. Public diplomacy explicitly aims to influence journalists and civil society, so that they serve as conduits for State Department messaging.

While national archives have produced impressive collections of internal state communications, their material is intentionally withheld or made difficult to access for decades, until it is stripped of potency. This is inevitable, as national archives are not structured to resist the blowback (in the form of withdrawn funding or termination of officials) that timely, accessible archives of international significance would produce.

What makes the revelation of secret communications potent is that we were not supposed to read them. The internal communications of the US Department of State are the logistical by-product of its activities: their publication is the vivisection of a living empire, showing what substance flowed from which state organ and when.

Diplomatic cables are not produced in order to manipulate the public, but are aimed at elements of the rest of the US state apparatus and are therefore relatively free from the distorting influence of public relations. Reading them is a much more effective way of understanding an institution like the State Department than reading reports by journalists on the public pronouncements of Hillary Clinton, or [White House Communications Director] Jen Psaki.

While in their internal communications State Department officials must match their pens to the latest DC orthodoxies should they wish to stand out in Washington for the “right” reasons and not the “wrong” ones, these elements of political correctness are themselves noteworthy and visible to outsiders who are not sufficiently indoctrinated.

Many cables are deliberative or logistical, and their causal relationships across time and space with other cables and with externally documented events create a web of interpretive constraints that reliably show how the US Department of State and the agencies that inter-operate with its cable system understand their place in the world.

Only by approaching this corpus holistically—over and above the documentation of each individual abuse, each localized atrocity—does the true human cost of empire heave into view.

Wikileaks Files_RGB_300dpiVESO BOOKS

National Security Religiosity and the International Studies Association

While there exists a large literature in the structural or realpolitik analysis of key institutions of US power, a range of ritualistic and even quasi-religious phenomena surrounding the national security sector in the United States suggests that these approaches alone lack explanatory power.

These phenomena are familiar in the ritual of flag-folding, the veneration of orders and elaborate genuflection to rank, but they can be seen also in the extraordinary reaction to WikiLeaks’ disclosures, where it is possible to observe some of their more interesting features.

When WikiLeaks publishes US government documents with classification markings—a type of national-security “holy seal,” if you will—two parallel campaigns begin: first, the public campaign of downplaying, diverting attention from and reframing any revelations that are a threat to the prestige of the national security class; and, second, an internal campaign within the national security state itself to digest what has happened.

When documents carrying such seals are made public, they are transubstantiated into forbidden objects that become toxic to the “state within a state”—the more than 5.1 million Americans (as of 2014) with active security clearances, and those on its extended periphery who aspire to its economic or social patronage.

There is a level of hysteria and non-corporeality exhibited in this reaction to WikiLeaks’ disclosures that is not easily captured by traditional theories of power. Many religions and cults imbue their priestly class with additional scarcity value by keeping their religious texts secret from the public or the lower orders of the devoted. This technique also permits the priestly class to adopt different psychological strategies for different levels of indoctrination.

What is laughable, hypocritical, or Machiavellian to the public or lower levels of “clearance” is embraced by those who have become sufficiently indoctrinated or co-opted into feeling that their economic or social advantage lies in accepting that which they would normally reject.

Publicly, the US government has claimed, falsely, that anyone without a security clearance distributing “classified” documents is violating the Espionage Act of 1917. But the claims of the interior “state within a state” campaign work in the opposite direction. There, it orders the very people it publicly claims are the only ones who can legally read classified documents to refrain from reading documents WikiLeaks and associated media have published with classification markings on them, lest they be “contaminated” by them.

While a given document can be read by cleared staff when it issues from classified government repositories, it is forbidden for the same staff to set eyes on the exact same document when it emerges from a public source. Should cleared employees of the national security state read such documents in the public domain, they are expected to self-report their contact with the newly profaned object, and destroy all traces of it.

This response is, of course, irrational. The classified cables and other documents published by WikiLeaks and associated media are completely identical to the original versions officially available to those with the necessary security clearance, since this is where they originated. They are electronic copies.

Not only are they indistinguishable—there is literally no difference at all between them. Not a word. Not a letter. Not a single bit.

The implication is that there is a non-physical property that inhabits documents once they receive their classification markings, and that this magical property is extinguished not by copying the document but by making the copy public. The now public document has, to devotees of the national security state, not merely become devoid of this magical property and reverted to a mundane object, it has been inhabited by another non- physical property: an evil one.

This kind of religious thinking has consequences. Not only is it the excuse used by the US government to block millions of people working for the “state within a state” from reading more than thirty different WikiLeaks domains—the same excuse that was used to block The New York Times, Guardian, Der Spiegel, Le Monde, El País and other outlets publishing WikiLeaks materials.

In fact, in 2011 the US government sent what might be called a “WikiLeaks fatwa” to every federal government agency, every federal government employee, and every federal government security contractor:

The recent disclosure of US Government documents by WikiLeaks has caused damage to our national security … Classified information, whether or not already posted on public websites, disclosed to the media, or otherwise in the public domain remains classified and must be treated as such until such time it is declassified by an appropriate US government authority …

Contractors who inadvertently discover potentially classified information in the public domain shall report its existence immediately to their Facility Security Officers. Companies are instructed to delete the offending material by holding down the SHIFT key while pressing the DELETE key for Windows-based systems and clearing of the internet browser cache.

After being contacted by an officer of the US Department of State, Columbia University’s School of International and Public Affairs warned its students to “not post links to these documents nor make comments on social media sites such as Facebook or through Twitter. Engaging in these activities would call into question your ability to deal with confidential information, which is part of most positions with the federal government.”

A swathe of government departments and other entities, including even the Library of Congress, blocked internet access to WikiLeaks. The US National Archives even blocked searches of its own database for the phrase “WikiLeaks.”

So absurd did the taboo become that, like a dog snapping mindlessly at everything, eventually it found its mark—its own tail. By March 2012, the Pentagon had gone so far as to create an automatic filter to block any emails, including inbound emails to the Pentagon, containing the word “WikiLeaks.”

As a result, Pentagon prosecutors preparing the case against US intelligence analyst PFC Manning, the alleged source of the Cablegate cables, found that they were not receiving important emails from either the judge or the defense.

But the Pentagon did not remove the filter— instead, chief prosecutor Major Ashden Fein told the court that a new procedure had been introduced to check the filter daily for blocked WikiLeaks-related emails. Military judge Col. Denise Lind said that special alternative email addresses would be set up for the prosecution.

While such religious hysteria seems laughable to those outside the US national security sector, it has resulted in a serious poverty of analysis of WikiLeaks publications in American international relations journals. However, scholars in disciplines as varied as law, linguistics, applied statistics, health and economics have not been so shy.

For instance, in their 2013 paper for the statistics journal Entropy, DeDeo et al.—all US or UK nationals—write that WikiLeaks’ Afghan War Diary “is likely to become a standard set for both the analysis of human conflict and the study of empirical methods for the analysis of complex, multi-modal data.”

There is even an extensive use of WikiLeaks materials, particularly cables, in courts, including domestic courts, from the United Kingdom to Pakistan, and in international tribunals from the European Court of Human Rights to the International Criminal Tribunal for the former Yugoslavia.

Set against the thousands of citations in the courts and in other academic areas, the poverty of coverage in American international relations journals appears not merely odd, but suspicious. These journals, which dominate the study of international relations globally, should be a natural home for the proper analysis of WikiLeaks’ two-billion-word diplomatic corpus.

The US-based International Studies Quarterly (ISQ), a major international relations journal, adopted a policy against accepting manuscripts based on WikiLeaks material—even where it consists of quotes or derived analysis. According to a forthcoming paper, “Who’s Afraid of WikiLeaks? Missed Opportunities in Political Science Research,” the editor of ISQ stated that the journal is currently “in an untenable position,” and that this will remain the case until there is a change in policy from the influential International Studies Association (ISA).

The ISA has over 6,500 members worldwide and is the dominant scholarly association in the field. The ISA also publishes Foreign Policy Analysis, International Political Sociology, International Interactions, International Studies Review, and International Studies Perspectives.

The ISA’s 2014–15 president is Amitav Acharya, a professor at the School of International Service at the American University in Washington, DC. Nearly half of the fifty-six members on its governing council are professors at similar academic departments across the United States, many of which also operate as feeder schools for the US Department of State and other internationally- oriented areas of government.

That the ISA has banned the single most significant US foreign policy archive from appearing in its academic papers—something that must otherwise work against its institutional and academic ambitions—calls into question its entire output, an output that has significantly influenced how the world has come to understand the role of the United States in the international order.

This closing of ranks within the scholar class around the interests of the Pentagon and the State Department is, in itself, worthy of analysis. The censorship of cables from international relations journals is a type of academic fraud. To quietly exclude primary sources for non-academic reasons is to lie by omission.

But it points to a larger insight: the distortion of the field of international relations and related disciplines by the proximity of its academic structures to the US government. Its structures do not even have the independence of the frequently deferent New York Times, which, while it engaged in various forms of cable censorship, at least managed to publish over a hundred.

These journals’ distortion of the study of international relations and censorship of WikiLeaks are clear examples of a problem. But its identification also presents a significant opportunity: to present an analysis of international relations that has not been hobbled by the censorship of classified materials.

The World According to U.S. Empire

The WikiLeaks Files: The World According to U.S. Empire (Verso, 2015) begins to address the need for scholarly analysis of what the millions of documents published by WikiLeaks say about international geopolitics. The chapters use a constellation approach to these documents to reveal how the United States deals with various regional and international power dynamics.

It is impossible to cover the wealth of material or relationships in this first volume, but I hope that this work will stimulate long- form journalists and academics to eclipse it.

Chapter 1 reflects on America’s status as an “empire,” and considers what this means, seeking to characterize US economic, military, administrative and diplomatic power with reference to the long sweep of global history over the last century.

The chapter establishes the “imperialism of free trade” framework that the rest of Part II then develops—a framework wherein American military might is used not for territorial expansion but to perpetuate American economic preeminence. Both themes are considered in more detail in Chapter 2 and Chapter 3. Chapter 1 also situates WikiLeaks in the context of an unprecedented growth in American official secrecy, and the evolution of US power following the commencement of the “war on terror.”

Chapter 2 examines the WikiLeaks materials on the so-called “war on terror.” Besides providing a keen summary of the war crimes and human rights abuses documented in WikiLeaks publications, along with a detailed historical overview of the US invasion and occupation of Iraq and the consequent unfolding disaster there, the chapter also draws conclusions about the ideological and conceptual substructure of America’s “war on terror,” and investigates how an aspect of the imperial prerogative of the United States is to exercise decisive power to ensure that terms like “just war,” “torture,” “terrorism” and “civilian” are defined in its own favor.

The argument adduces evidence from the full range of WikiLeaks publications, along with other sources, such as the recent CIA torture report. In the process, the chapter also examines the double standards and problems arising from the misuse of these concepts (including the attempt to delegitimize and marginalize WikiLeaks itself).

Chapter 3 embarks on a thoroughgoing discussion of the “empire of free trade”—the relationship of the American form of empire with the worldwide promotion of neoliberal economic reform, providing American corporations with access to “global markets.”

The chapter draws on State Department cables published by WikiLeaks, as well as WikiLeaks publications dating back to 2007 concerning the “private sector,” including material on banks and global multilateral treaty negotiations. The chapter provides luminous examples of how the drive toward economic integration buttresses the position of the United States as an arms-length empire, and provides the underlying rationale for the patterns of intervention, military or otherwise, pursued in Latin America and beyond.

Chapter 4 is a do-it-yourself guide on how to use Wiki- Leaks’ Public Library of US Diplomacy (PlusD), written by investigations editor Sarah Harrison. At the time of writing, PlusD contains 2,325,961 cables and other diplomatic records. The State Department uses its own logic to create, transmit and index these records, the totality of which form its primary institutional memory.

Harrison explains how to get started searching, reading and interpreting cable metadata and content, from the infamous CHEROKEE restriction to the use of State Department euphemisms such as “opposing resource nationalism.”

The history of US policy regarding the International Criminal Court (ICC) is a rich case study in the use of diplomacy in a concerted effort to undermine an international institution.

In Chapter 5, Linda Pearson documents what the cables reveal about the efforts of successive US administrations to limit the ICC’s jurisdiction. These include the use of both bribes and threats by the George W. Bush administration to corral states signed up to the ICC into providing immunity from war crimes prosecutions for US persons—and, under the Obama administration, more subtle efforts to shape the ICC into an adjunct of US foreign policy.

Japan and South Korea have been epicenters of US influence within East Asia for decades. The cables document nearly a decade of US efforts to affect domestic political outcomes within these two countries in line with its own long-term interests.

In Chapter 14, investigative journalist Tim Shorrock examines the geopolitical triangle created by US relations with both countries, including its attempts to play one off against the other, as part of long- term efforts to undermine left-wing governments and policies within the region.

Of global GDP growth over the last decade, over 50 percent has been in Southeast Asia. This understanding has led to an explicit reassignment of military, diplomatic and surveillance assets to Southeast Asia, epitomized by Secretary of State Hillary Clinton as a strategy of “forward deployed diplomacy.” In Chapter 15, Richard Heydarian examines the cables on Southeast Asia and situates his findings within a broader historical critique of US influence in the region.

The critique of Western imperialism is most contentious in regions of the world that have historically been US protectorates, such as western Europe. So indoctrinated are European liberals in modern imperialist ideology that even the idea that the United States might be administering a global empire is routinely dismissed with references to concepts like “right to protect,” demonstrating a willful deafness not only to the structure of US power around the world, but also to how it increasingly talks about itself as an “empire.”

In Chapter 6, Michael Busch examines the broad patterns of influence and subversion pursued by the global superpower on the political systems of Europe and its member states. Themes include European government collusion with the CIA’s rendition and torture programs, the subversion of European criminal justice and judicial systems to rescue alleged US government torturers from prosecution and the use of US diplomacy to open up European markets to US aerospace companies, or to invasive, monopolistic technologies and patents, such as Monsanto’s genetically modified organisms.

In Chapter 13, Phyllis Bennis opts for a broad overview of WikiLeaks’ publications on Afghanistan—including not just the State Department cables, but also the Significant Action Reports (SIGACTs) published by WikiLeaks as the Afghan War Diary, and Congressional Research Reports and other documents on Afghanistan published by WikiLeaks prior to 2010.

What emerges is a stark assessment of the folly of US military involvement in Afghanistan since 2001 and its cost in terms of human life and societal well-being.

Geopolitics is complicated, and all the more so in relation to a country like Israel. Israel’s military dominance in the Middle East; its diplomatic relations with other regional players such as Egypt, Syria, Iran, Lebanon and Turkey; its role as an avatar for US imperial policy within the area; its wayward exploitation of its protected status in pursuing its own genocidal policies toward the Palestinian people—all of these themes are brought to the fore in Chapter 9, by Peter Certo and Stephen Zunes, which carefully interrogates the relevant State Department cables.

In Chapter 11, on Iran, Gareth Porter provides an excellent companion to the chapter on Israel, choosing to focus on what the cables reveal about the tripartite geopolitical standoff between the US, Israel and Iran, and the shadow this structure casts on the rest of the Middle East.

In particular, Porter focuses on the P5+1 talks about Iran’s nuclear enrichment program, on US efforts to misrepresent intelligence in order to tip the international consensus against Iran, and on the role of Israel as both a catalyst for and an agent of US policy in the Middle East.

The conflict in Iraq is the focus of Chapter 12, by journalist Dahr Jamail, which draws on a wide range of WikiLeaks materials to argue that the United States had a deliberate policy of exacerbating sectarian divisions in Iraq following its invasion and occupation, in the belief that the country would be easier to dominate in such circumstances.

The consequent devastation is documented in painstaking detail using WikiLeaks materials, including US cables, Congressional Research Reports dating between 2005 and 2008 and the Iraq War Logs from 2010.

Jamail pays specific attention to the “Sahwa” movement— the US-sponsored program of counter-insurgency that was implemented to respond to the growing influence of al-Qaeda affiliates among Sunni Iraqis disaffected by the Shia-dominated US-client government of Nouri al-Maliki.

The United States paid large numbers of Iraqis to defect from the Sunni insurgency and instead fight against al-Qaeda, on the promise of receiving regular employment through integration into the Iraqi military. As Jamail argues, the failure of the Maliki government to honor this promise saw huge numbers of US-trained, US-armed and US-financed—but now unemployed—Sunni militants return to the insurgency, eventually swelling the ranks of the former al- Qaeda affiliate in Iraq, which in 2014 became known as ISIS, or the “Islamic State.”

Across Iraq’s northeastern border, in Syria, the cables also describe how the scene was set for the emergence of ISIS. Since the outbreak of the Syrian civil war in 2011, warmongers in the media have demanded the Western military pounding of Syria to depose Bashar Al-Assad—presented, in typical liberal-interventionist fashion, as a “new Hitler.”

The emergence of the Islamic State, to which the Assad government is the only viable counterweight within Syria, has thrown this propagandistic consensus into disarray. But US government designs on Syrian regime change, and its devotion to regional instability, long pre-date the Syrian civil war, as is demonstrated in the cables.

Chapter 10, by Robert Naiman, offers a careful reading of the Damascus cables, pointing out important historical presentiments of the current situation in Syria, and unpicking the benign-sounding human rights constructions of US diplomats to bring into focus the imperialist inflection of US foreign policy and rhetoric toward Syria—including concrete efforts within the country to undermine the government and bring about the chaos of recent months during the entire decade preceding 2011.

Clichés abound about Turkey being a “bridge between East and West,” but it cannot be denied that this country of some seventy-five million people occupies an important position— both as a regional player within Middle Eastern geopolitics and as a large and economically powerful nominal democracy on the fringes of Europe.

As Conn Hallinan argues in Chapter 8, State Department cables illustrate US efforts to exploit the rich geopolitical significance of Turkey. Hallinan uses the cables as a pretext to provide a tour of Turkey’s regional alliances, strategic concerns and internal affairs. Among the topics he covers are the complex strategic energy calculations that necessitate Turkey’s delicate relations with Iran and Russia, even as it cultivates the United States, Europe and Israel in its efforts to gain access to Western markets.

The chapter also examines Turkey’s bargaining power, demonstrated in its use of a veto against the election of former Danish prime minister Anders Rasmussen as the head of NATO, in order to force the United States to pressure the Danish government into suppressing a Denmark-based Kurdish television channel.

The essay also deals with Turkey’s internal issues, such as government policy toward Kurdish separatist groups, and the extraordinary underground political conflict and intrigue between Recep Tayyip Erdoğan and the expatriate political figure Fethullah Gülen.

Since the end of the Cold War, and especially during the so- called “war on terror,” US diplomacy has leaned toward South, Central and East Asia. Except in the case of one or two flare-ups, US-Russian relations receded from the popular consciousness as the main geopolitical dynamic.

This of course has changed as a result of the conflict in the Ukraine. But popular consciousness is not reality. As Russ Wellen shows in Chapter 7, in the decade following the century’s turn the US has pursued a policy of aggressive NATO expansion, challenging Russia’s regional hegemony within Eastern Europe and the former Soviet area and seeking to subvert nuclear treaties to maintain its strategic advantage.

As the cables show, these efforts have not gone unnoticed by Russia, and are recurring points of conflict in US-Russian diplomatic relations, even during the most cordial of periods. The chapter provides the necessary context for recent East-West tensions centering around Syria, Ukraine and the granting of asylum to Edward Snowden, and yields critical insight into a geopolitical relationship that, if mishandled, threatens the survival of our civilization and even of our species.

Perhaps no region of the world demonstrates the full spectrum of US imperial interference as vividly as Latin America. Since the 1950s, US policy in Central and South America has popularized the concept of the CIA coup d’état, deposing democratically elected left-wing governments and installing US-friendly right- wing dictatorships; inaugurating legacies of brutal civil war, death squads, torture and disappearances; and immiserating millions to the benefit of the American ruling class.

As Alexander Main, Jake Johnston, and Dan Beeton note in the first of their chapters on Latin America, Chapter 17, the English-speaking press saw no evil in the State Department cables, concluding that they did not fit “the stereotype of America plotting coups and caring only about business interests and consorting with only the right wing.”

The exact opposite is true: the cables demonstrate a smooth continuity between the brutal US policy in Latin America during the Cold War and the more sophisticated plays at toppling governments that have taken place in recent years.

Chapter 17 offers a broad overview of the use of USAID and “civil society” astroturfing, as well as other, more direct methods of pursuing “regime change” in El Salvador, Nicaragua, Bolivia, Ecuador and Haiti.

Chapter 18, by the same authors, focuses on Venezuela, the socialist enemy of the day, and specifically on US efforts to undermine the country as a regional left-wing bulwark in the wake of the failed US-backed coup against the Chávez government in 2002.

The response of the United States to the release of the WikiLeaks materials betrays a belief that its power resides in a disparity of information: ever more knowledge for the empire, ever less for its subjects.

In 1969, Daniel Ellsberg—later famous for leaking the Pentagon Papers—had a top-secret security clearance. Henry Kissinger had applied for his own top-secret clearance. Ellsberg warned him of its dangers:

[I]t will … become very hard for you to learn from anybody who doesn’t have these clearances. Because you’ll be thinking as you listen to them: “What would this man be telling me if he knew what I know? Would he be giving me the same advice, or would it totally change his predictions and recommendations?” You will deal with a person who doesn’t have those clearances only from the point of view of what you want him to believe and what impression you want him to go away with, since you’ll have to lie carefully to him about what you know. In effect, you will have to manipulate him. You’ll give up trying to assess what he has to say. The danger is, you’ll become something like a moron. You’ll become incapable of learning from most people in the world, no matter how much experience they may have in their particular areas that may be much greater than yours.

Freed from their classified seals, the WikiLeaks materials bridge the gulf between the “morons” with security clearances and nothing to learn, and us, their readers.

View the original content and more from this author here: http://ift.tt/1KRIItb



from hacker samurai http://ift.tt/1NEid0w
via IFTTT

Ashley Madison hacker revealed?

TORONTO – An AC/DC reference at Toronto Police’s Ashley Madison press conference Monday helped spark an American tech journalist’s new theory about the hack.

Brian Krebs, who independently covers cyber crime and security, recently published an article that focuses on a Twitter user who goes by the name Thadeus Zu (@deuszu).

“If Zu wasn’t involved in the hack, he almost certainly knows who was,” Krebs says near the end of the article.

Krebs said he was first alerted to Zu early July 20 after publishing a story about hackers breaking into Ashley Madison, a hookup site with the slogan: Life is short. Have an affair.

He said Zu published a link to the same dataset the Impact Team (the group behind the hack) had confidentially sent him hours earlier.

“Initially, that tweet startled me because I couldn’t find any other sites online that were actually linking to that source code cache,” Krebs said.

But a light went off for Krebs after hearing one particular detail during Monday’s Toronto Police press conference about the hack and subsequent leak of the personal information of millions of Ashley Madison subscribers.

Police said when the employees of Avid Life Media (the parent company of Ashley Madison) sat down at their computers July 12, they “saw a threatening message from the Impact Team” accompanied by AC/DC’s song Thunderstruck.

While going through Zu’s previous tweets, Krebs says he discovered two posts about website attacks that referenced the band.

Krebs says he also noticed that, shortly before Impact Team contacted him, Zu was “feverishly tweeting to several people about setting up “replication servers” to “get the show started.” Included in those posts, Krebs says, was a screenshot showing a YouTube tab linking to Thunderstruck.

In the article, Krebs goes on to dissect Zu’s social media profiles looking for possible clues to Zu’s identity, which remains unconfirmed.

He suggests it’s possible Zu is a “white hat security researcher or confidential informant who has infiltrated the Impact Team.”

Zu took to Twitter on Thursday to respond to the article.

“Hey, target me as much as you want but I want evidence and solid proof,” Zu wrote.

“I am merely trying to make a good example about ATTRIBUTION to avoid more conflicts and wars. That is all that I want. Nothing more.”

The Toronto Sun contacted Zu to seek comment for this story, but hadn’t received a response as of press time.

Toronto Police had no updates about the investigation and wouldn’t discuss Krebs’ theory.

View the original content and more from this author here: http://ift.tt/1MRXc0z



from hacker samurai http://ift.tt/1UhBtjk
via IFTTT

American Drones Are Killing ISIS Hackers Now

ISIS talks a big talk when it comes to hacking, and United States forces just showed they’re not going to put up with it. The Obama administration just announced that a drone strike has killed the organization’s top cyber-terrorist, Junaid Hussain. At least one American leader says the rest of the ISIS hackers should watch their backs.

This is a serious blow to ISIS and a swift act of justice against a top cyber jihadist and recruiter,” said Rep. Michael McCaul, chair of the House Homeland Security Committee. “The strike sends an unmistakable message to the terror group’s ranks: plot against us, even on social media, and we will find you.”

It was just three months ago that ISIS announced the beginning of an “electronic war” against the U.S. And while most of the so-called hacks that ISIS has bragged about on social media appear to be harmless, the U.S. is using very harmful killer robots to combat the threat. The Navy’s “Loose tweets sink fleets” quote has never seemed so prescient.

View the original content and more from this author here: http://ift.tt/1NLKQrI



from hacker samurai http://ift.tt/1LGkZ4W
via IFTTT

Ashley Madison hacker revealed? | hacker samurai


from Hacker Samurai http://ift.tt/1UhBtjk
via IFTTT

American Drones Are Killing ISIS Hackers Now | hacker samurai


from Hacker Samurai http://ift.tt/1LGkZ4W
via IFTTT

Cars are targets for identity theft | hacker samurai


from Hacker Samurai http://ift.tt/1LGkV5k
via IFTTT

Foul-mouthed hackers target council website | hacker samurai


from Hacker Samurai http://ift.tt/1VhKxqJ
via IFTTT

Cars are targets for identity theft

DETROIT — Hackers can already take control of a car. And as vehicles become rolling shopping malls, cybercriminals will have an opportunity to snatch your identity, too.

Eager for a cut of drivers’ purchases of fast food, gas and more, automakers have big plans to bring e-commerce to the dashboard. Ford already has an app that lets drivers dictate an order to Domino’s Pizza using voice controls and a smartphone. General Motors this year began offering AtYourService, which alerts drivers to deals at Dunkin’ Donuts or lets them book a hotel room on Priceline.com using voice commands.

By 2020, as many as 40 per cent of new vehicles sold worldwide will let drivers shop from behind the wheel, predicts Thilo Koslowski, vice-president of the auto practice at Gartner, a leading information technology research and advisory company.

But connected cars will present a rich target, akin to retailers or banks, where hackers can troll for credit card numbers, home addresses, email information and all the other personal details required for identity theft.

“Today the motivation for hacking a car is mischief, with an objective of hurting people or car companies,” Koslowski said.

Once drivers can shop with impunity as they roll down the highway, “the car will definitely be viewed as a vulnerable device.”

Most cars sold today lack the technology for drivers to pay for items they purchase (unless they use a smartphone). But by 2022, some 82.5 million autos worldwide will be connected to the Internet, more than triple the number now, according to researcher IHS Automotive.

In the next two to five years, “buy buttons” connected to smartphone mobile wallets will start appearing on dashboards, according to Richard Crone, who runs payment adviser Crone Consulting LLC. That means motorists will soon be able to buy a pizza, fill up the tank or preorder a half caf skinny macchiato from Starbucks without pulling out their phone or credit card.

Banks and credit card companies are looking to pile in. Visa has developed an app for the dashboard or smartphone that enables the car to buy gasoline, parking and fast food. Commercial deployments will be announced in the next few months. FIS, a payment technology company, is developing a banking app for cars that will let drivers pay bills or check balances.

Commuters want to be connected, and shopping from the steering wheel is the next logical step, said Phil Abram, chief infotainment officer of GM’s OnStar system.

“Over three million times a year, somebody pushes the blue button in a car and asks for directions to a hotel or to ask ‘Where is a coffee shop or gas station?”‘ Abram said in an interview. “The roots of this are in what customers want.”

But automakers this summer have proven easy targets for hackers. Two security experts hacked into a Jeep Cherokee’s infotainment system in July to take control of the engine and transmission as an 18-wheeler was bearing down on it. OnStar also was hacked when a security researcher used a small device hidden on a 2013 Chevrolet Volt to take control of GM’s RemoteLink app, which allowed him to unlock the car and start its engine.

“This has been a bit of a blind spot for automakers,” Mark Boyadjis, a technology analyst for IHS, said of cars’ vulnerability to hacking.

The Jeep hack forced parent company Fiat Chrysler to recall 1.4 million vehicles and ask wireless partner Sprint Corp. to issue a temporary fix over its network. GM worked with the “white hat” hacker to come up with a software patch for RemoteLink within 24 hours, Abram said.

Early services like Ford’s Domino’s app don’t put a driver’s credit card information at risk because that data is stored in the smartphone, the automaker said. Visa’s in-car payments will use a randomly generated digital “token” rather than the credit card number.

Hackers bent on identity theft are expected to infiltrate cars through the entertainment portal, as the Jeep hackers did, or market malicious apps that appear harmless or even helpful, but actually steal personal information.

View the original content and more from this author here: http://ift.tt/1UhzLhV



from hacker samurai http://ift.tt/1LGkV5k
via IFTTT

Foul-mouthed hackers target council website

Swearing on Dacorum website (rude words removed)

Hackers appear to have vandalised Dacorum Borough Council’s website this morning.

Visitors to the authority’s web site who searched for ‘Popular today’ items were greeted with a range of rude words.

Although we cannot reproduce the full text here, it included the phrase ‘council employees are’ followed by a list of insults.
One visitor said: “Although it’s quite funny in a childish sort of way, there are some serious implications if people can hack the council’s website.

“There is a lot of important information on there, which you would not want tampered with.”

Dacorum Borough Council has not yet been available for comment.

The rude words can be found online at

View the original content and more from this author here: http://ift.tt/1MSNUBB



from hacker samurai http://ift.tt/1VhKxqJ
via IFTTT

Thursday 27 August 2015

US to charge hackers who obtained early M&A news: WSJ | hacker samurai


from Hacker Samurai http://ift.tt/1NnddKt
via IFTTT

US to charge hackers who obtained early M&A news: WSJ

U.S. federal prosecutors are preparing to unveil charges as early as Tuesday against a group of traders and hackers that allegedly plotted to get hold of press releases about mergers and acquisitions and trade on them before the deals were made public, the Wall Street Journal reported.

The alleged scheme, which involved more than a half dozen people, is believed to have resulted in tens of millions of dollars in illicit profits, according to people familiar with the matter.

The case could be the largest of its kind and exemplifies the increasingly bridged lines between cybercrime and traditional financial fraud, the WSJ said.

 

View the original content and more from this author here: http://ift.tt/1PhTTiP



from hacker samurai http://ift.tt/1NnddKt
via IFTTT

Wednesday 26 August 2015

Dominic Basulto: Cracking down on hackers hurts innovation | hacker samurai


from Hacker Samurai http://ift.tt/1IwWTGW
via IFTTT

Dominic Basulto: Cracking down on hackers hurts innovation

Every week seems to bring a new hacking story, so it’s perhaps no surprise that the knee-jerk reaction is to take the fight directly to the hackers. By making the penalties tougher, by expanding the scope of federal anti-hacking statutes and making it easier to prosecute wrongdoers, it’ll convince hackers that it’s just not worth the risk, right?

But simply toughening the laws on hackers by extending their scope and reach or extending prison sentences is not going to help catch the real hackers — the criminalized, anonymous hackers who operate in places such as China. Instead, they’re more likely to ensnare the likes of hacktivist heroes such as Aaron Swartz.

Getting tough on hackers by extending the definition of what a hacker is would theoretically mean that people who even so much as retweet or click on a link with unauthorized information could be committing a felony. Moreover, the white hat hackers (the “good guys”) could be ensnared as well, because their work, at its core, is indistinguishable from that of the black hat hackers (the “bad guys”).

And that could have a chilling effect on innovation.

Laws and regulations can’t keep up with the pace of technological change and end up either prosecuting the wrong people or prosecuting the right people, but on charges that far exceed the scope of the crime. Consider that the current anti-hacking federal statute, the Computer Fraud and Abuse Act (CFAA), was enacted in 1986, well before most politicians had ever heard of the Internet.

As a result, you get odd rulings where it’s obvious the law hasn’t kept up with the technology.

If tough hacking laws had been around 20 years ago, it might have stopped Google from launching its method of indexing Web pages or Apple from launching many of its innovative consumer gadgets.

And there’s another reason why tougher laws on hacking would have a chilling effect on innovation, and that’s because it would not require corporations to do more on their end to correct fatal security flaws before they are found by hackers. As we already know from experience, the last thing corporations want to do is to add an extra cost layer to their products by taking action to correct security flaws — even when they know the potential implications of a major security breach. If they know that the law will make it easier to recoup damages from hackers, they could have fewer incentives to find all possible security flaws.

In the case of Ashley Madison, the company didn’t even bother to encrypt the underlying data, which means that once a hacker got into the company, it was a simple task of scooping up names, addresses and credit card information. You could argue that the hackers who broke into Ashley Madison are criminals, but you could just as easily argue that the company was criminally negligent in allowing the security breach to happen in the first place.

If anything, the race to punish similar types of hackers would encourage corporations to deepen their intelligence and security sharing with one another and the government, and that means, you guessed it, even more security surveillance on the Internet. And the more that the tech sector becomes infected with a security surveillance mind-set, the worse it is for innovation.

To see how all this might play out, consider President Barack Obama’s proposed crackdown on hacking, first announced during the State of the Union after the high-profile hacking case of Sony Pictures. The proposals, as the Electronic Frontier Foundation pointed out in January, is a “mishmash of old, outdated policy solutions.” The concern is that overzealous application of new laws could be used to prosecute hackers for anything as minor as violating the terms of service of a Web site.

In many ways, the U.S. crackdown on hackers is our new war on drugs. Just as the U.S. sought to win the “war on drugs” by adding aggressive charges and excessive punishment to round up all the drug dealers, it’s now trying to win the “war on hackers” by stiffening up the federal anti-hacking statutes to round up all the hackers. By toughening the laws on hacking, you might catch the Internet equivalent of all the low-level drug dealers and mules, but it won’t get to the core of the problem — the high-level, anonymous kingpins who live beyond our borders.

And just as massively criminalizing the war on drugs led to a spike in prison terms and a negative economic drag on society, we could see the same thing with tech culture. Any coder, hacker or technology activist would be at risk of running afoul of the government and its stepped-up campaign against hackers.

Maybe tougher hacker laws will scare off the youngest generation from a life of crime. But it could also scare them off a life of computers, and that would be the greatest shame, because it would shut down the innovation pipeline of the nation. As we’ve seen before with other cyberlegislation, whenever the government thinks it’s doing what’s best for business, it’s not necessarily doing what’s best for innovation.

View the original content and more from this author here: http://ift.tt/1IwWWCz



from hacker samurai http://ift.tt/1IwWTGW
via IFTTT

Obama calls Japanese leader to express regret for WikiLeaks scandal

TOKYO – President Barack Obama has called Japan’s leader to express regret over recent WikiLeaks allegations that the U.S. had spied on senior Japanese officials.

Obama told Prime Minister Shinzo Abe that he thought the trouble the revelations caused Abe and his government was regrettable, a Japanese government spokesman told reporters.

The 40-minute call took place Wednesday morning Japan time.

Japanese officials faced questioning from the media and in parliament after WikiLeaks posted online what appeared to be five U.S. National Security Agency reports on Japanese positions on international trade and climate change. They date from 2007 to 2009. WikiLeaks also posted what it says was an NSA list of 35 Japanese targets for telephone intercepts.

Abe told Obama that the allegations could undermine trust between the countries, and reiterated his request for an investigation of the matter.

The comments from both sides seemed to echo the exchange between Abe and U.S. Vice-President Joe Biden in a similar call earlier this month.

The two leaders also discussed the global economic turmoil, North Korea and climate change.

View the original content and more from this author here: http://ift.tt/1JixAFG



from hacker samurai http://ift.tt/1PxPgAL
via IFTTT

Hackers can steal Gmail passwords from Samsung “smart” refrigerators

The upside of owning a smart refrigerator, or “connecting your fridge to the Internet of Things,” is that instead of keeping track of your cold-food inventory the old-fashioned way, where you have to manually open the refrigerator door and review its contents yourself, your smart refrigerator will monitor the inventory for you by scanning barcodes and/or RFID chips. And with an online connection you can peruse the contents of your fridge when you’re not even home.

The downside is that any computer-controlled device is vulnerable to malware, and any Internet connection can be hacked or broken. This includes smartphones, smart TVs, smart thermostats, smart cameras, smart baby monitors or home security systems, smart cars, and, of course, smart refrigerators.

Smart refrigerator exploit

Security researchers from Pen Test Partners speaking at the DEF CON Hacking Conference announced their discovery of a security exploit that leaves Samsung model RF28HMELBSR smart refrigerators vulnerable to man-in-the-middle attacks (which allow hackers to alter, spy on, or control data while it’s traveling between the sender and receiver).

The problem essentially is that, while the refrigerators do implement SSL (secure socket layers) to encrypt connections, it doesn’t validate SSL certificates, leaving most connections vulnerable to man in the middle attacks. And in the case of the Samsung RF28HMELBSR, this means that, among other things, hackers can steal fridge owners’ Gmail credentials.

Ken Munro, a researcher at Pen Test, said that “The internet-connected fridge is designed to display Gmail Calendar information on its display. It appears to work the same way that any device running a Gmail calendar does. A logged-in user/owner of the calendar makes updates and those changes are then seen on any device that a user can view the calendar on.”

The problem is, “While SSL is in place, the fridge fails to validate the certificate. Hence, hackers who manage to access the network that the fridge is on (perhaps through a de-authentication and fake Wi-Fi access point attack) can Man-In-The-Middle the fridge calendar client and steal Google login credentials from their neighbors, for example.”

Further problems?

Pen Test offered a more technical description of how the exploit could work in a blog post titled “Hacking DEFCON 23’s IOT [Internet of Things] Village Samsung Fridge.”

And the fridges might still have more security flaws waiting to be discovered. The researchers concluded their blog post by saying that they wanted to do more tests before the conference, but didn’t have enough time: “We wanted to pull the terminal unit out of the fridge to get physical access to things like a USB port and serial or JTAG interfaces, but ran out [of] time. However, we still found some interesting bugs that definitely merit further investigation.”

View the original content and more from this author here: http://ift.tt/1PxPurG



from hacker samurai http://ift.tt/1Ei6IIN
via IFTTT

Hackers Pose a Threat to U.S. Natural Gas

With the onset of the Internet of Things, almost anything can now be connected to the internet. It’s not just phones anymore; it’s cars, public transit systems, and even industrial hardware.

This trend has spread to the energy sector, where both manufacturing equipment and energy production equipment can be connected in order to better predict service needs and production rates.

Unfortunately, where there is an internet connection, there is the possibility of a hack.

Energy Secretary Ernest Moniz brought this problem to the National Clean Energy Summit in Las Vegas this week, focusing on the possible cyber threat to the country’s natural gas industry.

You see, there are many aspects of natural gas production and transportation that could be at risk. Moniz states that the utility sector is often the “poster child” for U.S. cyber attacks, and natural gas is no exception.

From the vehicles that transport gas, to the traffic management systems those vehiclesNatgas Smart Meter travel through, to smart meters on compressor stations that send gas through pipelines, the Internet of Things has left the commodity vulnerable to would-be hackers.

Moniz, however, is not calling for a reduction in connections. Rather, he insists that the “training of professionals [is]… not keeping up with demand” and there should be more rigorous training for preventative and repair measures.

Understand, protection of the U.S. natural gas infrastructure is not just important to the natural gas industry, but all industries that rely on it as well.

As the country adheres to the Clean Power Plan, more states will upgrade to natural gas power from coal power plants. And many interstate pipelines will be at risk of hacking.

In 2013, the Department of Homeland security reported one of the first hacking attempts made on compression stations in the Midwest and Plains areas. More recently, cybersecurity firms have reported similar threats to connected vehicles and gas stations.

According to Moniz, the U.S. Department of Energy is partnering with the industry to collaborate on protection and preventative measures.

View the original content and more from this author here: http://ift.tt/1Ei75mX



from hacker samurai http://ift.tt/1Ei6Isy
via IFTTT

Company Breached By Hackers? You’re Being Deceptive, According to FTC And The Court

Enterprise wake-up call: if you’re not doing enough to protect your customer information, the feds might come after your company for unfair and deceptive practices.

That’s the conclusion of an appellate court this week, who decided that the US Federal Trade Commission (FTC) has the power to sue corporations who don’t take adequate measures to protect customer information from hackers.

The FTC had sued Wyndham Hotels and Resorts over a series of security breaches that led to the compromise of the personal information and credit card numbers of 619,000 customers, to the tune of $10.6 million in fraudulent charges.

It could be argued that Wyndham’s security lapses had been particularly egregious. For example, the FTC contended that it wasn’t even using firewalls, perhaps the first line of defense against cyberattacks.

Firewalls, however, were only the tip of the iceberg. “The idea that you can trust any internal network and consider it to be safe with or without firewalls is completely obsolete,” according to cybersecurity expert Satyam Tyagi, CTO of Certes Networks.

View the original content and more from this author here: http://ift.tt/1fEtGyc



from hacker samurai http://ift.tt/1PxPibP
via IFTTT

Ashley Madison Hack: Canadian police offer $523K bounty for Impact Team hackers

The search for the persons responsible for exposing and threatening adultery website Ashley Madison’s staff and clients continues — and the police are now offering money for their capture. In a morning news conference held Monday at the Toronto Police Headquarters, A/Staff Superintendent Bryce Evans said that there have been two unconfirmed cases of suicide related to the dumping of the site’s client names and emails online on Aug. 18. Authorities have also called on “white hat hackers,” or those who do not engage in any criminal activity, to help them catch the persons behind Impact Team.

“Team Impact, I want to make it very clear to you. Your actions are illegal and we will not tolerate it,” said Supt. Evans said in a report from The Toronto Star .

Supt. Evans leads “Project Unicorn,” the task force created to deal with case. The authorities are reportedly offering CAD$500,000 (AU$522,000) to anybody who can point to the identities and whereabouts of the perpetrators.

The staff of Canada-based Avid Life Media, which runs Ashley Madison, reportedly opened their computers to a threat from the Impact Team on July 12, writes CBC News . The message came with the AC/DC song “Thunderstruck” playing in the background. The note reportedly called for the shutdown of the site itself, as well as its sister company Established Men, which is a dating site that pairs young women with older, wealthy men. When the firm refused to follow, the hackers dumped AM’s entire client list online on Aug. 18 with a message that says “time’s up.”

The site reportedly has over 35 million registered members around the world. A second and larger batch of data was dumped a few days after, which included confidential emails involving Avid Life Media chief executive Noel Biderman. Evans added that some Ashley Madison clients have been contacted by the hackers asking for bitcoin in exchange for their silence.

Analysis applied by the website Vocativ states that Canada has the most number of Ashley Madison members, with 6.26 accounts for every 100 people in the country. The U.S. is second with 5.11 accounts per 100 people, followed by Australia with 4.51. Other high locations identified were Hong Kong, Ireland and New Zealand. In absolute terms, the U.S. tops the list with some 16 million members, followed by Brazil. The report notes that this data is based on the “location” selected by the members from the site’s drop-down menu when setting up their profiles.

The case is currently being investigated via a collaborative effort among Cycura, a Toronto-based cyber security firm, the Ontario Provincial Police (OPP), the Royal Canadian Mounted Police (RCMP), the Office of the Privacy Commissioner of Canada, and the Toronto Police Service. The U.S. Federal Bureau of Investigation and U.S. Department of Homeland Security are also conducting its own inquiry in its jurisdiction.

Valerie Lawton, spokesperson for the Office of the Privacy Commissioner of Canada, said that her office is confident that the efforts rendered toward the crime will “lead to arrests and convictions.”

View the original content and more from this author here: http://ift.tt/1Kj5Ch7



from hacker samurai http://ift.tt/1PxPgAH
via IFTTT

Obama calls Japanese leader to express regret for WikiLeaks scandal | hacker samurai


from Hacker Samurai http://ift.tt/1PxPgAL
via IFTTT

Hackers can steal Gmail passwords from Samsung “smart” refrigerators | hacker samurai


from Hacker Samurai http://ift.tt/1Ei6IIN
via IFTTT

Hackers Pose a Threat to U.S. Natural Gas | hacker samurai


from Hacker Samurai http://ift.tt/1Ei6Isy
via IFTTT

Company Breached By Hackers? You’re Being Deceptive, According to FTC And The Court | hacker samurai


from Hacker Samurai http://ift.tt/1PxPibP
via IFTTT

Ashley Madison Hack: Canadian police offer $523K bounty for Impact Team hackers | hacker samurai


from Hacker Samurai http://ift.tt/1PxPgAH
via IFTTT

Tuesday 25 August 2015

Who Sent Saudi Documents to WikiLeaks? | hacker samurai


from Hacker Samurai http://ift.tt/1ESPmgA
via IFTTT

How carmakers are banding together to fight hackers | hacker samurai


from Hacker Samurai http://ift.tt/1ESPjSd
via IFTTT

HILLARY WARNED AUDIENCE THAT “HACKERS BREAK INTO PERSONAL EMAIL ACCOUNTS” | hacker samurai


from Hacker Samurai http://ift.tt/1MQCeka
via IFTTT

Who Sent Saudi Documents to WikiLeaks?

Who stole the Saudi documents, and why? 

(SALEM, Ore.) – WikiLeaks’ publishing of “The Saudi Cables” (http://ift.tt/1K09W5i) – more than half a million top-secret documents from Saudi Arabia’s Foreign Ministry, has gained significant media attention in recent days.

The released documents, which expose Saudi involvement in regional affairs and also its hostile policies towards Iran and Syria, in addition to its allies, has triggered a wave of concern & uncertainty in different countries.

The most important question for readers is, who stole the Saudi documents and what is the purpose behind it?

The Saudi government and Ministry of Foreign Affairs, formed a committee headed by Crown Prince Mohammed bin Nayef. They have opened an investigation to identify those responsible for releasing classified documents from the Saudi Arabia Foreign Ministry.

Analysts expressed very different views on leaked Saudi documents:

Although a group calling itself the ‘Yemeni Cyber Army’ claimed the hacking, it still doesn’t identify who sent them Saudi documents? We should accept that leaking top-secret documents was done by individuals from the Saudi government and foreign ministry. A person or a group gave advanced access to the documents to the Yemeni Cyber Army.

The second possibility is attributable to those countries which show “hostility” toward Saudi Arabia – especially Iran, Syria and Iraq. WikiLeaks repeatedly released documents against these countries. This possibility is not feasible because Iran and Syria are not afraid to stand publicly against Riyadh.

A third possibility can be competitors of Saudi Arabia, particularly Qatar and Turkey. Qatar and Turkey are always ready for regional competition with Saudi Arabia so they are willing to spend a considerable amount of their political and financial resources to reach their goals.

The fourth possibility is Western and Israeli intelligence services, however the support of Saudi Arabia from each of these countries does not match with this possibility.

Russia and China is the fifth possibility. Betrayal of Saudi Arabia in oil prices coincided with EU’s sanctions against Russia over Ukraine That crisis might make the Russians angry enough to take this action.

The sixth is likely to be combined with the prior possibilities. Power struggle in the house of Saud, and King Salman’s unexpected relieving of Crown Prince Muqrin bin Abdulaziz, and also Foreign Minister Saud bin Faisal bin Abdulaziz Al Saud of their positions after four decades of service, could have led to members within the Saudi Arabia’s Royal Family leaking documents, to put pressure on King Salman.

Top-secret documents may also have been leaked by the Royal Court of Saudi Arabia to remove competitors and usurp more power.

Saud al-Faisal’s dismissal and his unexpected death after releasing documents, and death threats for Khalid al-Tuwaijri, Talal bin Abdul Aziz and Ahmed bin Abdulaziz, indicate a bloody struggle for power within the Royal family.

Hence, this possibility with the death of al-Tuwaijri and other competitors of Muhammad bin Salman, will be much stronger than other possibilities.

Mohammed bin Salman killed two birds with one stone by releasing classified documents from the Saudi Arabia Foreign Ministry. On one hand he would cover up his failure in Yemen and on the other hand he would pave the way for getting close to sitting on the Kingdom’s throne.

View the original content and more from this author here: http://ift.tt/1MQCcc1



from hacker samurai http://ift.tt/1ESPmgA
via IFTTT

How carmakers are banding together to fight hackers

As automobiles become more connected to the Internet, drivers will become more vulnerable to hackers. That’s why major automakers are teaming up to try and make sure their cars can’t be hacked.

Companies like Ford, General Motors and Toyota are working through the Alliance of Automobile Manufacturers and the Association of Global Automakers to create an Information Sharing and Analysis Center, reportsAutomotive News. The data-sharing center should be operational by the end of the year, that publication reports.

Computer hackers targeting vehicles have made several big headlines in the past year. Just last month, it was reported that hackers were able to disrupt a Jeep Cherokee being driven by a Wired journalist. In theory, hackers can manipulate advanced car functions like automated parking to affect vehicles’ movement, a potentially massive safety issue.

View the original content and more from this author here: http://ift.tt/1JPU8mA



from hacker samurai http://ift.tt/1ESPjSd
via IFTTT

HILLARY WARNED AUDIENCE THAT “HACKERS BREAK INTO PERSONAL EMAIL ACCOUNTS”

Attempting to defend her use of a private email server, Hillary Clinton has sought to minimize the obvious security risk that doing so posed. She describes her system as “effective and secure,” and notes that it was “on property guarded by the Secret Service.”

Her campaign website proclaims:

The security and integrity of her family’s electronic communications was taken seriously from the onset when it was first set up for President Clinton’s team…

[R]obust protections were put in place and additional upgrades and techniques employed over time as they became available, including consulting and employing third party experts.

But Jeryl Bier, writing for the Weekly Standard, points out that following the WikiLeaks affair, then-Secretary of State Clinton was less sanguine about the security of personal email accounts. In remarks delivered at George Washington University in February 2011, she warned that “[h]ackers break into financial institutions, cell phone networks, and personal email accounts.”

Yes, they do. And the “upgrades, techniques, and third party experts” utilized by financial institutions are sometimes insufficient to thwart hackers.

Previously, in November 2010, Clinton had boasted that she “directed that specific actions be taken at the State Department, in addition to new security safeguards at the Department of Defense and elsewhere, to protect State Department information so that this kind of breach cannot and does not ever happen again.”

An obvious action to protect State Department information would have been for Clinton to stop using a private email server. This would have ruled one important source of state secrets as a target for hackers. Yet Clinton kept right on using her own private server.

In May 2011, Clinton again expressed her understanding of threat inherent in communicating electronically and its national security implication. Asked by NBC’s Savannah Guthrie about her use of the BlackBerry, Clinton replied, “I have a lot of security restraints on what I can and can’t do, but I do try to stay in touch as much as possible, and electronically is by far the easiest way to do that.”

Sadly, “security restraints” did not restrain Clinton from transmitting classified material through an unsecured system.

In sum, even after WikiLeaks, personal “convenience” (actually, Hillary’s obsession with preventing her domestic adversaries from ever finding out how she operated) trumped protecting the nation from a security threat of which Clinton was well aware.

View the original content and more from this author here: http://ift.tt/1JgXko7



from hacker samurai http://ift.tt/1MQCeka
via IFTTT

The Ashley Madison hackers break their silence | hacker samurai


from Hacker Samurai http://ift.tt/1EfEvSV
via IFTTT

RUTGERS UNIVERSITY IS FIGHTING BACK AGAINST COMPUTER HACKERS | hacker samurai


from Hacker Samurai http://ift.tt/1EfEvCH
via IFTTT

The Ashley Madison hackers break their silence

Until now, all that we have heard from the Ashley Madison hackers known as the “Impact Team” were statements embedded in their data leaks.  Statements like: “We have explained the fraud, deceit, and stupidity of ALM and their members. Now everyone get to see their data.”

So what’s the fraud all about? We already knew that the team of hackers was upset about a feature called Full Delete that promised users a scrubbed profile, getting rid of credit card information, emails, addresses and other sensitive information.

But The Impact Team called Avid Life Media’s (ALM) bluff, noting that Full Delete didn’t do anything, despite its $19 price tag and ALM’s $1.77 million profit off the feature.

Therefore, the Impact Team released data for more than 37 million Ashley Madison users, in an effort to shut down the site and company for good.

Outside of their own releases connected to the data dumps, nobody has connected with the Impact Team to hear the rest of their story, until now. Motherboard was given an email address to contact and thus the Impact Team has given its first interview.

View the original content and more from this author here: http://ift.tt/1JiSW87



from hacker samurai http://ift.tt/1EfEvSV
via IFTTT