Cyberwarfare

Sony hackers threatening to hack a media organisation, please let it be the NZ Herald

Excuse me if I don’t just laugh a little bit at the latest hacker threat…to hack a media organisation.

Now we will get to see weapons grade hypocrisy exhibited as they all claim this is an outrage against their rights as journalists…never-mind they have all been feeding off of the criminal exploits of hackers for some time.

The hackers who infiltrated Sony Pictures Entertainment?s computer servers have threatened to attack an American news media organization,according to an FBI bulletin?obtained by The Intercept.

The threat against the unnamed news organization by the Guardians of Peace, the hacker group that has claimed credit for the Sony attack, ?may extend to other such organizations in the near future,? according to a Joint Intelligence Bulletin of the FBI and the Department of Homeland Security obtained by The Intercept.

Referring to Sony only as ?USPER1?and the news organization as ?USPER2,? the Joint Intelligence Bulletin, dated Dec. 24 and marked For Official Use Only, states that its purpose is ?to provide information on the late-November 2014 cyber intrusion targeting USPER1 and related threats concerning the planned release of the movie, ?The Interview.? Additionally, these threats have extended to USPER2 ?a news media organization?and may extend to other such organizations in the near future.? ? Read more »

Face of the day

Ian Fletcher -Faifax NZ

Ian Fletcher
-Faifax NZ

While in general our MSM seem determined to only focus on the negative possibilities of our Government having these kind of capabilities I for one am glad that they are trying to protect us as the threat is very real. Given the fact that the Labour Party could not even make their website secure from the average Joe on the web clicking on the links they provided aren’t you glad they are not currently in power? They called looking at all the private data and credit card details that they left totally unsecured and in public view on their website ‘hacking’ for goodness sake. Fit to run this country? I don’t think so. What they did was no different to someone not putting privacy settings on their facebook page and then being all outraged when everyone was able to look at their photos and download them.

Spy boss Ian Fletcher has both hands tied behind his back justifying cyber-security defence system Project Cortex

The director of the Government Communications Security Bureau says he can’t say how Cortex will work or exactly which organisations will come under its protection. To do so would risk exposing vulnerabilities, he says. Nor will he say how much Cortex is costing.

Nevertheless, he wants to talk about why the GCSB is making the investment in the system, the existence of which was brought to light by Prime Minister John Key in the lead up to Kim Dotcom’s “moment of truth” event in September.

The Government is due to review the country’s spy agencies and their legislative underpinning next year. Fletcher says the GCSB’s biggest challenge is recruiting the right people in a tight labour market.

The internet has made it easier for “both good things and bad things to happen”, he says.

Read more »

2014 the Year of the Hacker?

West Outlaw, Black Bart, Northern California, English Born American, Bandit, Southern Oregon, Call Charley, Bolton, Wild West -pininterest

West Outlaw, Black Bart, Northern California, English Born American, Bandit, Southern Oregon, Call Charley, Bolton, Wild West
-pinterest

Sheriff

Sheriff -Todalcott.com

 

 

 

 

 

 

 

 

 

 

 

 

 

Here we go again, same problem different day. The Internet has become the Wild West and the Hackers are the outlaws. We desperately need some Sheriffs to saddle up,round them up, then hang em high! We need to use our Government Spy networks to catch them and we need to re-write our laws to bring them up to date with the reality of the Internet.

2014 appears to be the year of the Hacker as they move from targeting individuals that they have a grudge against to targeting corporations. Hacking is no longer just about stealing information to hand to the Media to embarrass or damage an individual or company. It is now used to blackmail. Hacking is also now about disrupting and closing internet services with cyber attacks. Hackers have moved from cyber burglary to cyber terrorism. This is a worrying trend.

Who will be next?

Xbox and PlayStation online services have crashed amid claims a hacking group has disabled their services.

Microsoft and Sony, the companies which make the gaming consoles, have told customers they are aware of connection failures after being hit by a suspected cyber attack.

Read more »

Welcome to the world of online sabotage

Hackers have been portrayed by most in the MSM, as leakers of vitally important information in the public interest. Hackers like to portray themselves as truth seekers and vigilant activists acting in the Public interest against faceless government or capitalist institutions.

What they are, are hostage takers, blackmailers and bullies.

There is nothing noble or righteous about their criminal actions as they are saboteurs who revel in their ability to threaten, damage and destroy others.

office_hostages

In America, Sony and their employees have been held hostage by Hackers as much as if they had been physically put in a hostage situation. Lives may not be under threat but livelihoods certainly are. Cyber attacks and the threat of them are a blunt force weapon that has a huge impact when the information stolen is then used by unscrupulous MSM to make money.

Take the MSM out of the equation and you remove the Hackers’ most potent weapon. The MSM give the Hackers legitimacy and power.The MSM are currently the biggest part of the problem. We saw how the Australian Media supported the Police by refusing to give the Hostage taker the legitimacy and attention he demanded in the recent attack in Sydney. It was heart warming to see the Media being part of the solution instead of part of the problem. ? ? Read more »

New Zealand’s Top Investigative reporter?

David Fisher will be devastated to learn that according to this article Nicky Hager is New Zealand’s top investigative reporter.

Even worse he will be shocked to learn that our country is cracking down on the freedom of the Press ( yes really ).

Not only that, but our government is suppressing civil liberties as well, (shock, horror )

But wait there’s more…

Australia and New Zealand are not among the usual suspects when it comes to state suppression of civil liberties. But both countries, stung by Edward J. Snowden?s revelations last year about their intelligence-gathering efforts, have been cracking down on the press: Australia has passed sweeping secrecy laws, while police officers in New Zealand recently raided the home of a reporter who had published information regarding a government scandal.

There has been little international outcry, and Washington is hardly likely to be upset: The two countries harbor the only major intelligence gathering facilities for the National Security Agency in the Southern Hemisphere, and, along with Britain, Canada and the United States, are members of the intelligence-sharing arrangement known as the ?Five Eyes.?

In New Zealand, the journalist targeted in the raid is the country?s top investigative reporter, Nicky Hager, who has been working with Mr. Snowden and the journalist Glenn Greenwald. Mr. Hager has ?long been a pain in the establishment?s neck,? a former prime minister of New Zealand, David Lange, once said, admiringly.

Wow, a quote from a long dead guy. Couldn’t they find anyone among the living to say admiring things about him?

In 1996 Mr. Hager published his book ?Secret Power,? which revealed the relationship between the N.S.A. and New Zealand. Mr. Lange said that he learned more about what the N.S.A. was doing in his country from reading Mr. Hager?s reporting than he did as prime minister.

Across the Tasman Sea, the Australian government recently amended the country?s national security laws so that journalists and whistle-blowers who publish details of ?special intelligence operations? may be sentenced to up to 10 years in prison.

The measures are part of a groundswell of terrorism hysteria. September brought the largest counterterrorism raids in Australian history, in which some 800 state and federal police officers raided homes in several Sydney suburbs with large Muslim populations, acting on what officials said was an intercepted phone call about possible activity by allies of the Islamic State, also known as ISIS.

For all the forces deployed in the raids, only one person was arrested and charged with a terrorism-related crime; in a court appearance in mid-November, his lawyer said the telephone conversation had been mistranslated.

The press has added to the hysteria, spreading a story that Islamic State followers were plotting a public beheading in a square in downtown Sydney ? a claim no public official has made, and a claim for which there is virtually no evidence.

A week after the raids, the ruling center-right Liberal Party proposed the national security amendments aimed at the press and leaks; the opposition Labor Party supported them, and the changes passed with little debate…

…In New Zealand, the fallout from Mr. Snowden?s leaks has been domestic. At a conference in Auckland in September, Mr. Snowden said, via a video hookup from Moscow, that the New Zealand government and the National Security Agency of the United States were engaged in vast domestic surveillance.

The country?s prime minister, John Key, vigorously denied the charges, but then backtracked after Mr. Snowden released supporting documents, saying that he ?may well be right.? Mr. Key added, ?I don?t run the N.S.A.?

It came as no surprise to many when, last month, five detectives and a computer engineer raided the home of Mr. Hager, the journalist who has been working with Mr. Snowden. Over a 10-hour period, they took computers, phones, papers, an iPod and a camera.

The raid may also have arisen out of Mr. Hager?s most recent book, ?Dirty Politics,? in which he revealed that officials in the prime minister?s center-right National Party government had been supplying derogatory information about opposition politicians to a right-wing blogger. The justice minister was forced to resign.

May have arisen? He openly admitted to using hacked information that he actively went after. He admitted he talked the hacker into giving it to him. The raid ( that wasn’t a raid ) they had a warrant for goodness sake, was to look for evidence of the identity of the criminal hacker, but not a word of this is this so called investigative article. Oh no, lets frame it instead as suppression of the Press.

Whatever the motivation, the raid, like the Australian anti-whistle-blower laws and President Obama?s anti-leak investigations, is certain to have a chilling effect. Of course, such steps are always explained as a result of a careful balancing between national security and civil liberties. What is becoming increasingly clear is that political self-interest ? which serves no one except the powers that be ? is just as important a factor.

Raymond Bonner is a former New York Times reporter and the author, most recently, of ?Anatomy of Injustice: A Murder Case Gone Wrong.?

Face of the day

Cameron Slater

Cameron Slater

 

So now Cam can add a book (based on e-mails stolen from his computer during a Hacker attack which took down this website for a number of days ) to the two awards on his bookcase.
DP cvr FIN.indd

He is regularly on radio and often on T.V what can he possibly do next?

Head a new Media organisation perhaps?

Keeping yourself safe from hackers the IDF way

There aren’t many people who take on the IDF and survive, so when they give you some advice it is usually sound tactics to take it.

On the IDF Blog they have published a guide to help keep you safe from hackers. It is a good article, and realistic which you don’t see often.

So while the leftwing are all running around trying to protect themselves from the NSA these guys are protecting themselves from people who actually want to kill them. So up to you who you listen to…keyboard warriors or real warriors.

IDF commanders in the field?use their mobile phones and computers every day to help them in their work. While these tools are often critical to a mission?s success, they are also vulnerable to hacking.?Israel?s enemies?are constantly trying to gain access to information in order to compromise IDF operations.

Because of the threats it faces, the IDF has developed expert anti-hacking forces, building?military-wide systems that protect classified data from hackers. But making sure that hackers can?t access data on individual commanders? personal devices is just as important. That?s where Sergeant Major Dror steps in. He travels across the country, visiting IDF bases and showing IDF soldiers and officers just how easy it is for terrorists to steal their private data.

Sgt. Maj. Dror takes the soldiers? personal computers and cellphones, and using free software easily downloaded from the internet, demonstrates how to hack them within a matter of minutes. ?If it?s this easy for me, think of how easy it would be for an organization with the will and the means to hack into your computer or phone,? he says.

We sat down with Sgt Maj. Dror, and asked him to share his top tips for how to keep your data safe: ?? Read more »

Chinese hacking is endemic, both private and state sponsored

The world is focusing more and more on the activities of state sponsored Chinese hackers, but it seems hacking is endemic in China.

Name a target anywhere in China, an official at a state-owned company boasted recently, and his crack staff will break into that person?s computer, download the contents of the hard drive, record the keystrokes and monitor cellphone communications, too.

Pitches like that, from a salesman for Nanjing Xhunter Software, were not uncommon at a crowded trade show this month that brought together Chinese law enforcement officials and entrepreneurs eager to win government contracts for police equipment and services.

?We can physically locate anyone who spreads a rumor on the Internet,? said the salesman, whose company?s services include monitoring online postings and pinpointing who has been saying what about whom.? Read more »

Tagged:

Chinese hackers back at work

The Chinese government sponsored hackers are back in business:

Three months after hackers working for a cyberunit of China?s People?s Liberation Army went silent amid evidence that they had stolen data from scores of American companies and government agencies, they appear to have resumed their attacks ?using different techniques, according to computer industry security experts and American officials.

The Obama administration had bet that ?naming and shaming? the groups, first in?industry reports?and then in the?Pentagon?s own detailed survey?of Chinese military capabilities, might prompt China?s new leadership to crack down on the military?s highly organized team of hackers ? or at least urge them to become more subtle.? Read more »

Tagged:

Chinese hackers caught trying to steal designs of Britains new stealth jet

The Chinese cyber army are at it again, this time they have been busted.

Chinese cyber spies have been caught trying to steal the secrets of Britain?s most sophisticated combat jet, The Mail on Sunday has learned.

A covert unit within the Chinese Army has been using highly sophisticated cyber weapons in a desperate attempt to acquire classified information about the stealthy Joint Strike Fighter (JSF).

Manufacturer Lockheed Martin claims it is thwarting tens of thousands of computer attacks every week to keep secure secrets about the jet ? due to be in service with the Royal Navy and RAF by 2018.? Read more »

×